NIST's cybersecurity framework
GPTKB entity
Statements (62)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:Company
|
gptkbp:bfsLayer |
5
|
gptkbp:bfsParent |
gptkb:NIST_Cryptographic_Module_Validation_Program
|
gptkbp:adapted_into |
international organizations
|
gptkbp:aims_to |
improve cybersecurity posture
|
gptkbp:applies_to |
all sectors
|
gptkbp:based_on |
existing standards and guidelines
|
gptkbp:consists_of |
five core functions
|
gptkbp:developed_by |
gptkb:Research_Institute
|
gptkbp:encourages |
collaboration among stakeholders
|
https://www.w3.org/2000/01/rdf-schema#label |
NIST's cybersecurity framework
|
gptkbp:includes |
Protect
Recover Identify Detect Respond |
gptkbp:is_adopted_by |
government agencies
non-profit organizations private sector organizations |
gptkbp:is_cited_in |
gptkb:academic_research
government publications industry reports |
gptkbp:is_designed_to |
be scalable
be flexible be cost-effective |
gptkbp:is_evaluated_by |
government audits
third-party assessments |
gptkbp:is_influential_in |
cybersecurity policy development
|
gptkbp:is_integrated_with |
other risk management frameworks
|
gptkbp:is_part_of |
gptkb:NIST_Special_Publication_800-53
cybersecurity best practices U. S. federal cybersecurity policy |
gptkbp:is_promoted_by |
government initiatives
workshops conferences public awareness campaigns webinars cybersecurity communities |
gptkbp:is_referenced_in |
gptkb:legislation
executive orders |
gptkbp:is_reviewed_by |
cybersecurity experts
|
gptkbp:is_supported_by |
gptkb:NIST_Cybersecurity_Center_of_Excellence
online resources industry partnerships training materials guidance documents |
gptkbp:is_used_by |
organizations worldwide
|
gptkbp:is_used_for |
incident response planning
business continuity planning compliance purposes cybersecurity training data protection strategies vendor risk management cybersecurity assessments supply chain risk management security architecture development |
gptkbp:provides |
a common language for cybersecurity
guidance for managing cybersecurity risks |
gptkbp:published_by |
gptkb:2014
|
gptkbp:supports |
risk management
|
gptkbp:updates |
gptkb:NIST
|
gptkbp:volunteer_opportunities |
gptkb:theorem
|