Federal Risk and Authorization Management Program
GPTKB entity
Statements (124)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:program
|
gptkbp:aims_to |
reduce the time and cost of security authorizations
|
gptkbp:aims_to_improve |
security posture of federal agencies
|
gptkbp:benefits |
federal agencies
|
gptkbp:communication |
official channels
|
gptkbp:created_by |
gptkb:U._S._federal_government
|
gptkbp:encourages |
risk management practices
innovation in cloud services |
gptkbp:established_in |
gptkb:2011
|
gptkbp:facilitates |
collaboration between agencies
|
gptkbp:focuses_on |
gptkb:cloud_services
|
gptkbp:governed_by |
gptkb:Federal_Information_Security_Management_Act
|
gptkbp:has_impact_on |
cloud adoption in government
|
https://www.w3.org/2000/01/rdf-schema#label |
Federal Risk and Authorization Management Program
|
gptkbp:includes |
gptkb:Fed_RAMP_Marketplace
|
gptkbp:is_accessible_by |
public sector organizations
|
gptkbp:is_aligned_with |
international standards
OMB policies federal security standards federal cybersecurity policies federal cybersecurity regulations federal risk management policies |
gptkbp:is_collaborative_with |
gptkb:private_sector
academic institutions state and local governments |
gptkbp:is_designed_for |
federal agencies and contractors
|
gptkbp:is_documented_in |
policy frameworks
federal guidelines official guidelines federal reports federal compliance documents federal cybersecurity reports |
gptkbp:is_evaluated_by |
gptkb:government_accountability_office
effectiveness performance metrics regulatory compliance independent assessors user satisfaction peer reviews external auditors cost-effectiveness government oversight bodies security effectiveness NIST standards federal oversight committees federal compliance agencies security compliance effectiveness |
gptkbp:is_focused_on |
gptkb:vulnerability
data protection data security incident response security compliance continuous improvement threat intelligence security awareness training cyber risk management security policy development security governance |
gptkbp:is_influenced_by |
emerging technologies
|
gptkbp:is_informed_by |
industry feedback
|
gptkbp:is_integrated_with |
other federal initiatives
|
gptkbp:is_part_of |
gptkb:National_Guard
federal IT modernization efforts federal information assurance framework federal risk management framework cloud security framework U. S. federal cybersecurity strategy federal IT security strategy federal cybersecurity ecosystem federal cybersecurity strategy framework |
gptkbp:is_promoted_by |
gptkb:federal_CIO_council
professional organizations cybersecurity agencies |
gptkbp:is_promoted_through |
gptkb:educational_resources
public relations campaigns social media campaigns networking events public awareness campaigns conferences and seminars community engagement initiatives outreach programs workshops and webinars stakeholder engagement activities |
gptkbp:is_recognized_by |
industry standards
|
gptkbp:is_reviewed_by |
stakeholders
|
gptkbp:is_supported_by |
gptkb:United_States_federal_law
training programs various federal agencies federal budgets federal cybersecurity initiatives federal cybersecurity workforce federal cybersecurity grants federal cybersecurity frameworks federal cybersecurity strategies cloud service industry federal cybersecurity initiatives. federal cybersecurity partnerships federal cybersecurity resources |
gptkbp:is_updated_by |
regular reviews
|
gptkbp:is_utilized_by |
federal contractors
|
gptkbp:is_utilized_for |
security audits
security risk assessments security compliance assessments cloud service risk assessments cloud service evaluations cloud service authorizations cloud service compliance checks cloud service security evaluations security compliance verification |
gptkbp:operated_by |
gptkb:General_Services_Administration
|
gptkbp:promotes |
best practices in security
|
gptkbp:provides |
security assessments
templates for documentation |
gptkbp:provides_access_to |
security documentation
|
gptkbp:provides_guidance_on |
security requirements
|
gptkbp:provides_training_for |
security professionals
|
gptkbp:purpose |
to provide a standardized approach to security assessment and authorization
|
gptkbp:requires |
third-party assessments
|
gptkbp:supports |
cloud service providers
|
gptkbp:uses |
security controls
|
gptkbp:bfsParent |
gptkb:Federal_Information_Security_Management_Act
gptkb:FISMA gptkb:Federal_Information_Security_Modernization_Act_(FISMA)_compliance |
gptkbp:bfsLayer |
5
|