Federal Information Security Management Act
GPTKB entity
Statements (56)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:United_States_federal_law
|
gptkbp:aimsTo |
Protect government information and operations
|
gptkbp:amends |
gptkb:Federal_Information_Security_Modernization_Act
|
gptkbp:appliesTo |
Federal executive branch agencies
|
gptkbp:defines |
Roles and responsibilities for information security
|
gptkbp:effectiveDate |
February 2003
|
gptkbp:enactedBy |
gptkb:United_States_Congress
|
gptkbp:encourages |
Use of best practices in cybersecurity
|
gptkbp:established |
gptkb:National_Institute_of_Standards_and_Technology
Minimum security requirements |
gptkbp:facilitates |
Collaboration between agencies
|
gptkbp:governedBy |
gptkb:Office_of_Management_and_Budget
|
https://www.w3.org/2000/01/rdf-schema#label |
Federal Information Security Management Act
|
gptkbp:includes |
Guidelines for information security programs
|
gptkbp:influences |
State and local government cybersecurity policies
|
gptkbp:isAssignedTo |
NIST Special Publication 800-53
|
gptkbp:isCitedIn |
Cybersecurity legislation
|
gptkbp:isConnectedTo |
gptkb:Federal_Information_Technology_Acquisition_Reform_Act
gptkb:Federal_Information_Security_Modernization_Act_of_2014 Cybersecurity Framework |
gptkbp:isDiscussedIn |
Cybersecurity policy forums
Legislative hearings on cybersecurity |
gptkbp:isEvaluatedBy |
gptkb:Office_of_Inspector_General
National Cybersecurity Assessments |
gptkbp:isExaminedBy |
gptkb:Department_of_Homeland_Security
|
gptkbp:isIncorporatedIn |
Federal cybersecurity training programs
|
gptkbp:isInfluencedBy |
National_Security_Agency_guidelines
|
gptkbp:isInformedBy |
Risk management best practices
|
gptkbp:isLocatedIn |
Chief Information Officers
|
gptkbp:isPartOf |
Information Assurance framework
Federal cybersecurity strategy National cybersecurity policy framework |
gptkbp:isPortrayedBy |
Security incidents
|
gptkbp:isPromotedBy |
Cybersecurity education initiatives
|
gptkbp:isReferencedIn |
Federal agency reports
Federal cybersecurity strategy documents |
gptkbp:isRelatedTo |
gptkb:Federal_Risk_and_Authorization_Management_Program
Privacy Act of 1974 |
gptkbp:isReviewedBy |
Congressional committees
Cybersecurity advisory committees |
gptkbp:isSubjectTo |
Government Accountability Office audits
|
gptkbp:isSupportedBy |
gptkb:Federal_Information_Security_Modernization_Act
gptkb:Cybersecurity_and_Infrastructure_Security_Agency Public-private partnerships in cybersecurity |
gptkbp:mandates |
Security controls
Annual security assessments |
gptkbp:promotes |
Risk management framework
Cybersecurity awareness among employees |
gptkbp:provides |
For federal information security policies
|
gptkbp:providesTrainingFor |
Information security personnel
|
gptkbp:purpose |
To secure federal information systems
|
gptkbp:relatedTo |
Information security
|
gptkbp:requires |
Security policies and procedures
Federal agencies to develop security programs |
gptkbp:signature |
gptkb:George_W._Bush
|
gptkbp:supports |
Continuous monitoring of information systems
|