Federal Information Security Management Act of 2002
GPTKB entity
Statements (56)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:United_States_federal_law
|
gptkbp:bfsLayer |
5
|
gptkbp:bfsParent |
gptkb:FISMA
|
gptkbp:addresses |
emergency response planning
privacy concerns supply chain security concerns |
gptkbp:aims_to |
protect government information and operations
reduce vulnerabilities in federal systems |
gptkbp:amended_by |
gptkb:Federal_Information_Security_Modernization_Act_of_2014
|
gptkbp:applies_to |
federal executive branch agencies
|
gptkbp:defines |
roles and responsibilities for security
|
gptkbp:effective_date |
February 2003
|
gptkbp:enacted_by |
gptkb:legislation
|
gptkbp:encourages |
research in cybersecurity
use of best practices in security adoption of security technologies |
gptkbp:established |
information security standards
framework for risk management security assessment requirements security training requirements |
gptkbp:facilitates |
collaboration with private sector
development of security metrics |
gptkbp:governed_by |
gptkb:Office_of_Management_and_Budget
|
https://www.w3.org/2000/01/rdf-schema#label |
Federal Information Security Management Act of 2002
|
gptkbp:influenced_by |
gptkb:Research_Institute
|
gptkbp:mandates |
annual security assessments
protection of sensitive information continuous monitoring of information systems implementation of security controls protection against insider threats reporting to Congress on security status |
gptkbp:promotes |
information sharing among agencies
public awareness of cybersecurity issues awareness of cybersecurity risks |
gptkbp:provides |
guidance for federal agencies
framework for information security |
gptkbp:purpose |
to secure federal information systems
|
gptkbp:related_to |
information technology security
|
gptkbp:requires |
federal agencies to develop security programs
reporting of security incidents evaluation of security technologies development of incident response capabilities development of contingency plans development of security policies security audits of information systems training for personnel on security practices risk assessments for information systems security plans for information systems collaboration with law enforcement on cybersecurity matters integration of security into the system development lifecycle |
gptkbp:signed_by |
gptkb:George_W._Bush
|
gptkbp:supports |
cybersecurity initiatives
federal cybersecurity strategy federal cybersecurity workforce development development of cybersecurity policies. federal information assurance efforts |