gptkbp:instanceOf
|
crypt
|
gptkbp:appliesTo
|
federal information systems
organizations handling federal data
|
gptkbp:contains
|
security controls
privacy controls
control families
|
gptkbp:controlFamiliesCount
|
20
|
gptkbp:countryOfOrigin
|
gptkb:United_States
|
gptkbp:exampleControlFamily
|
gptkb:Access_Control
gptkb:Awareness_and_Training
gptkb:Contingency_Planning
gptkb:Program_Management
gptkb:Supply_Chain_Risk_Management
gptkb:System_and_Communications_Protection
gptkb:System_and_Information_Integrity
gptkb:Privacy_Controls
gptkb:Security_Assessment_and_Authorization
gptkb:System_and_Services_Acquisition
Maintenance
Planning
Incident Response
Risk Assessment
Configuration Management
Audit and Accountability
Identification and Authentication
Media Protection
Personnel Security
Physical and Environmental Protection
|
gptkbp:firstPublished
|
2005
|
gptkbp:focusesOn
|
security and privacy controls
|
gptkbp:fullName
|
gptkb:NIST_Special_Publication_800-53
|
https://www.w3.org/2000/01/rdf-schema#label
|
NIST 800-53
|
gptkbp:language
|
English
|
gptkbp:latestReleaseVersion
|
September 2020
Revision 5
|
gptkbp:license
|
public domain
|
gptkbp:publishedBy
|
gptkb:National_Institute_of_Standards_and_Technology
|
gptkbp:relatedTo
|
gptkb:FISMA
gptkb:NIST_Cybersecurity_Framework
NIST 800-171
NIST 800-37
|
gptkbp:status
|
active
|
gptkbp:targetAudience
|
federal agencies
contractors
organizations seeking compliance
|
gptkbp:usedFor
|
risk management
compliance
information security
|
gptkbp:website
|
https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final
|
gptkbp:bfsParent
|
gptkb:Security_Health_Analytics
|
gptkbp:bfsLayer
|
6
|