Statements (49)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:public_policy
|
gptkbp:address |
insider threats
cyber threat intelligence supply chain risk management |
gptkbp:appliesTo |
gptkb:Department_of_Defense
gptkb:military contractors |
gptkbp:citation |
gptkb:Federal_Information_Security_Modernization_Act_(FISMA)
gptkb:NIST_SP_800-53 gptkb:NIST_SP_800-37 gptkb:Committee_on_National_Security_Systems_(CNSS)_policies |
gptkbp:enforcedBy |
gptkb:Defense_Information_Systems_Agency
gptkb:DoD_Components |
gptkbp:governs |
cybersecurity practices
|
https://www.w3.org/2000/01/rdf-schema#label |
DoD Cybersecurity Policy
|
gptkbp:includes |
gptkb:DoD_Directive_8500.01
gptkb:DoD_Instruction_8510.01 gptkb:DoD_Instruction_8500.01 |
gptkbp:mandate |
compliance with NIST standards
use of RMF (Risk Management Framework) |
gptkbp:oversees |
gptkb:DoD_Chief_Information_Officer
|
gptkbp:protectedBy |
classified information
unclassified information DoD information systems |
gptkbp:requires |
risk management
cloud security configuration management data loss prevention access control continuous monitoring incident response patch management audit logging network segmentation vulnerability management cybersecurity training cybersecurity awareness training security controls assessment mobile device security authorization to operate (ATO) encryption of sensitive data protection of Controlled Unclassified Information (CUI) continuous authorization multifactor authentication reporting of cybersecurity incidents supply chain cybersecurity |
gptkbp:updated |
gptkb:DoD_CIO
|
gptkbp:bfsParent |
gptkb:DoD_Public_Key_Infrastructure
|
gptkbp:bfsLayer |
7
|