DoD Cybersecurity Architecture
GPTKB entity
Statements (51)
Predicate | Object |
---|---|
gptkbp:instanceOf |
cybersecurity framework
|
gptkbp:alignment |
gptkb:NIST_SP_800-53
gptkb:NIST_SP_800-37 gptkb:NIST_Cybersecurity_Framework |
gptkbp:appliesTo |
mobile devices
operational technology weapons systems cloud environments on-premises environments DoD contractors DoD information systems DoD personnel |
gptkbp:focusesOn |
integrity
availability confidentiality |
gptkbp:governedBy |
gptkb:DoD_Instruction_8510.01
gptkb:DoD_Instruction_8500.01 |
https://www.w3.org/2000/01/rdf-schema#label |
DoD Cybersecurity Architecture
|
gptkbp:includes |
gptkb:Zero_Trust_Architecture
gptkb:Risk_Management_Framework gptkb:Identity,_Credential,_and_Access_Management Continuous Monitoring Network Segmentation Data Encryption |
gptkbp:mandate |
gptkb:Federal_Information_Security_Modernization_Act
gptkb:DoD_Cyber_Strategy |
gptkbp:protectedBy |
classified information
unclassified information controlled unclassified information |
gptkbp:purpose |
protect DoD information systems
|
gptkbp:requires |
asset management
configuration management data loss prevention incident response audit logging vulnerability management endpoint protection malware protection network defense security training cyber threat intelligence security controls assessment supply chain risk management continuous authorization user awareness |
gptkbp:supports |
mission assurance
cyber resilience |
gptkbp:updated |
gptkb:DoD_Zero_Trust_Strategy_2022
|
gptkbp:usedBy |
gptkb:United_States_Department_of_Defense
|
gptkbp:bfsParent |
gptkb:DoD_Enterprise_Security_Services
|
gptkbp:bfsLayer |
7
|