Statements (54)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:Company
|
gptkbp:appliesTo |
Information technology systems
|
gptkbp:availableIn |
public document
|
gptkbp:contains |
security controls
|
gptkbp:covers |
databases
operating systems applications network devices |
gptkbp:developedBy |
gptkb:Defense_Information_Systems_Agency
|
https://www.w3.org/2000/01/rdf-schema#label |
DISA STIG
|
gptkbp:includes |
best practices
baseline configurations remediation steps |
gptkbp:isAssociatedWith |
risk management
incident response information assurance system hardening |
gptkbp:isAttendedBy |
government agencies
private sector organizations |
gptkbp:isChallengedBy |
resource constraints
staff training needs complexity of implementation budget limitations rapid technology changes |
gptkbp:isDocumentedIn |
technical manuals
training materials official guidelines |
gptkbp:isEquippedWith |
DoD_contracts
|
gptkbp:isEvaluatedBy |
compliance checks
security assessments penetration testing |
gptkbp:isLocatedIn |
system administrators
|
gptkbp:isPartOf |
Risk Management Framework
cybersecurity compliance |
gptkbp:isPromotedBy |
government initiatives
industry standards cybersecurity awareness programs |
gptkbp:isPublishedIn |
STIG repository
|
gptkbp:isReferencedBy |
security frameworks
|
gptkbp:isRelatedTo |
gptkb:NIST_SP_800-53
CIS_Controls |
gptkbp:isReviewedBy |
security professionals
|
gptkbp:isSupportedBy |
automated tools
manual processes |
gptkbp:isUpdatedBy |
true
|
gptkbp:isUsedIn |
security audits
vulnerability assessments |
gptkbp:provides |
checklists
assessment procedures implementation guidance |
gptkbp:purpose |
Provide security guidelines for IT systems
|
gptkbp:regulatoryCompliance |
gptkb:Federal_Information_Security_Management_Act
|
gptkbp:renovated |
gptkb:DISA
|
gptkbp:usedBy |
gptkb:U.S._Department_of_Defense
|