NIST RMF Roles for Startups

Who does what when you have 5 people. Or 50. And why some roles must never be combined.

The value: Companies that assign NIST RMF roles correctly pass audits faster, close enterprise deals, and become acquisition targets. Two companies where I handled security got acquired: Krizo (acquired by Dataminr for EUR 6M) and Omnio (50 people, acquired by IBM). Security was not a blocker. It was a feature. This is what proper role assignment enables.

Index

The Problem: Too Many Hats

NIST SP 800-37 defines over a dozen distinct roles for risk management. In a government agency with thousands of employees, each role gets its own person or team.

In a startup, you might have 5 people total.

At Omnio (50 people, acquired by IBM), I was the CISO. I was also an individual contributor writing security controls in Rust, designing cloud architecture, and coordinating pentests. At Krizo (5-10 people, acquired by Dataminr for EUR 6M), I was officially a "Software Developer" but effectively ran security. I landed every major client: Vodafone, Maersk, BCG, Palo Alto Networks, Fujifilm. All by handling their security questionnaires, writing policies, and proving we were trustworthy.

Different company sizes. Same reality: one person wearing many hats. That person was me.

This is not inherently wrong. NIST explicitly allows it. Their guidance states: "there may be differences in naming conventions for risk management roles and how risk management responsibilities are allocated among organizational personnel (e.g., multiple individuals filling a single role or one individual filling multiple roles)."

But there is a critical caveat: "Organizations ensure that there are no conflicts of interest when assigning the same individual to multiple risk management roles."

Some combinations are forbidden. Not by preference. By logic.

The NIST RMF Roles

Before we discuss what can and cannot be combined, here are the key roles from NIST SP 800-37r2:

Organization-Level Roles

System-Level Roles

Conflicts of Interest: What Cannot Be Combined

Critical Rule: You cannot assess your own work. Independence is not optional for certain roles.

The Authorizing Official

The Authorizing Official (AO) is special. They are "the only organizational official who can accept the security and privacy risk to organizational operations, organizational assets, and individuals."

This role cannot be delegated in substance. The AO can have a designated representative to handle day-to-day activities, but "the only activity that cannot be delegated by the authorizing official to the designated representative is the authorization decision and signing of the associated authorization decision document."

In a startup, the AO is typically your CEO or a C-level executive. They sign off on risk acceptance. This is not a technical role. It is a business accountability role.

The Control Assessor

The Control Assessor determines if controls are "implemented correctly, operating as intended, and producing the desired outcome." This requires independence.

NIST is explicit: "The required level of assessor independence is determined by the authorizing official... Assessor independence is a factor in preserving an impartial and unbiased assessment process."

You cannot implement a control and then assess its effectiveness. You cannot be the system owner and the control assessor for that system. The person who built it cannot objectively evaluate whether it works.

Forbidden Combinations

Role A Role B Why It Cannot Be Combined
System Owner Control Assessor (for that system) Cannot objectively assess your own system
Security Engineer Control Assessor (for those controls) Cannot assess controls you implemented
Common Control Provider Control Assessor (for those controls) Cannot assess your own common controls
CISO (implementing controls) Control Assessor If you designed or implemented it, you cannot assess it
Authorizing Official System Owner (typically) Should not accept risk for systems you own

What Can Be Combined

Many roles can safely be combined. The key principle: as long as you are not checking your own work, combinations are generally acceptable.

The 5-Person Company

At Krizo (5-10 people, crisis management SaaS, acquired by Dataminr for EUR 6M), everyone did everything. I was officially a "Software Developer" but I handled all security questionnaires, wrote all policies, coordinated pentests, and landed every major client: Vodafone, Maersk, BCG, Palo Alto Networks, Fujifilm.

Here is a realistic role allocation for a tiny startup:

Person NIST RMF Roles
CEO/Founder Head of Agency, Authorizing Official, Risk Executive, Mission/Business Owner
CTO/Technical Cofounder CIO, System Owner, Security Architect, Common Control Provider
Developer 1 Systems Security Engineer, System Administrator
Developer 2 Systems Security Engineer, System Administrator, Control Assessor (for Developer 1's work)
Operations/Business Information Owner, Privacy Officer, Acquisition Officer
The key insight: Even with 5 people, you can maintain separation of duties. Developer 1 assesses Developer 2's controls. Developer 2 assesses Developer 1's controls. Neither assesses their own work.

For critical assessments, you need external help. This is where a fractional CISO or external assessor becomes valuable. They provide the independence you cannot create internally.

Practical Reality at 5 People

The 50-Person Company

At Omnio (50 people, industrial IoT, acquired by IBM), we had more structure than a tiny startup but still significant role overlap. Here is how I handled it:

My Roles as CISO

At Omnio (50 people, industrial IoT), I also read and implemented the full NIST 800-53 series for CMMC/DoD readiness. Not just the appendices. The whole thing. IBM wanted to push Omnio for DoD contracts, and I did all the legwork before the acquisition.

Roles I Delegated

Because I implemented controls, I could not assess them. I delegated assessment responsibilities:

Realistic Role Distribution at 50 People

Person/Team NIST RMF Roles
CEO Head of Agency, Authorizing Official, Risk Executive (chair)
CTO CIO, Enterprise Architect, System Owner (platform)
CISO (dedicated or fractional) SAISO, Security Architect, Common Control Provider
Engineering Leads System Owners (their systems), Systems Security Engineers
DevOps/Platform Team System Administrators, Control Implementers
Legal/Compliance Privacy Officer, Acquisition oversight
External Auditor Control Assessor
What changed from 5 to 50: More dedicated roles. The CISO is not also the CTO. Engineering leads own their systems. Legal handles privacy. But the separation of duties principle remains the same: whoever builds it does not assess it.

How KeibiSoft Helps

I have been the person wearing all these hats. At Krizo (acquired by Dataminr) and Omnio (acquired by IBM), I filled most of these roles while also writing code and closing deals. Now I help other companies do the same thing, faster.

Roles We Fill

NIST RMF Role KeibiSoft Service What You Actually Get
CISO (SAISO) Fractional CISO Security leadership that closes deals. At Krizo, I handled questionnaires for Vodafone, Maersk, BCG, Palo Alto, Fujifilm (100% conversion). At Omnio, I unblocked deals with IBM, ABB, Schneider Electric, Siemens.
Security Architect Cloud Security Architecture Threat modeling, control selection, architecture review. I design systems that pass enterprise scrutiny.
Control Assessor Audit Readiness Independent assessment of your controls. I did not build them, so I can objectively assess them. Required for ISO 27001, SOC 2.
Common Control Provider ISMS Documentation Policy and procedure development. I wrote the Omnio ISMS in LaTeX. Auditors called it "the best they had seen."
Systems Security Engineer DevSecOps Integration Microsoft SSDLC, OWASP DevSecOps, secure coding practices. I implement, not just advise.
Risk Executive support Executive Briefings Risk analysis for your CEO/CTO. Clear documentation so they can make informed authorization decisions.

The Independence Advantage

When your internal team implements controls, they cannot objectively assess them. This is not a suggestion. It is a NIST requirement.

KeibiSoft provides the independence you need. When I act as Control Assessor, I evaluate what you built. When I act as Security Architect, I design solutions that your team implements. The separation is maintained.

This is exactly what I did at Omnio (50 people) and Krizo (5 people). At both companies, I delegated the Control Assessor role to external auditors because I could not assess my own work. Now I can be that external assessor for you.

Scaling With You: 5 to 50 to 200

5-Person Startup

At 5 people, you cannot afford a full-time CISO. You probably cannot afford a full-time security person at all. I become your entire security function:

15-30 Person Scale-up

At this size, you might have someone doing security part-time, but they are also doing DevOps or engineering. I fill the gaps:

50+ Person Company

At 50 people, you might have a dedicated security person. I provide specialized expertise:

The bottom line: The NIST roles do not change based on company size. What changes is how you fill them. At 5 people, one external person (me) fills many roles. At 50 people, I fill specific gaps where independence or specialized expertise is required. At any size, the separation of duties principle remains: whoever builds it cannot assess it.

Conclusion

NIST RMF defines roles for a reason. Separation of duties prevents conflicts of interest. Independent assessment ensures objectivity. Clear accountability ensures someone signs off on risk.

Startups cannot have 17 dedicated security professionals. But they can follow the principles:

Whether you have 5 people or 50, the question is the same: who does what, and are there any forbidden combinations? Answer that clearly, document it, and you have the foundation of a compliant security program.

Two companies I helped got acquired. Security was not a blocker. It was a feature. The role assignments were documented. The controls were assessed by independent parties. The documentation matched reality.

If you need help figuring out who should do what in your organization, or if you need an independent party to fill the roles your team cannot, get in touch.