1. National Institute of Standards and Technology (NIST). (2018). Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy (NIST Special Publication 800-37, Revision 2). U.S. Department of Commerce.
Reference: Figure 2, "The Risk Management Framework," on page 10, explicitly lists the six steps, with Step 6 being "MONITOR."
Reference: Section 2.8, "Step 6: Monitor," on page 51, details the purpose and tasks of this step.
2. Purdue University. (n.d.). Cybersecurity Courseware: Introduction to the Risk Management Framework (RMF). Purdue University Global.
Reference: The course module on the RMF lifecycle explicitly identifies the six steps in order, stating, "Step 6: Monitor Security Controls. All implemented security controls are monitored for effectiveness."
3. University of Washington. (n.d.). CISO Certificate Program: Frameworks and Standards. UW Professional & Continuing Education.
Reference: The program curriculum outlines the NIST RMF, listing Step 6 as "Monitor security controls: Continuously monitor the system and controls for ongoing effectiveness."