A formal process for evaluating, documenting, and approving information system security and privacy controls before and during operation.
Assessment and authorization (A&A) is a formal, documented process used to evaluate the security and privacy controls of an information system and decide whether that system is approved to operate. It is widely used in government and regulated environments, and is often aligned with frameworks such as NIST SP 800-53.
In most programs, A&A encompasses:
The output typically includes an assessment report, a risk or security posture summary, and an authorization decision with defined terms, conditions, and review cycles.
In industrial and manufacturing contexts, A&A is applied to information systems and operational technology (OT) that handle production data, quality records, configuration data, or regulated product information. Examples include:
For organizations working with U.S. federal agencies or handling controlled unclassified information, A&A activities are often aligned with programs such as FISMA, FedRAMP, or CMMC, which reference NIST SP 800-53 control baselines.
Practically, an A&A process commonly includes:
In manufacturing operations, evidence may include configuration records, change control logs, access management records, network diagrams, backup and recovery test results, and monitoring or incident records relevant to production systems.
A&A vs. certification: A&A is a process and decision framework used within broader regulatory or contractual programs. It is not itself a certification and does not guarantee compliance to a particular standard. Instead, it uses control catalogs (such as NIST SP 800-53) as inputs to a documented risk decision.
A&A vs. routine audits: Routine internal audits or inspections may feed evidence into an A&A, but A&A culminates in a formal authorization decision about whether a system is allowed to operate under defined conditions.