Statements (63)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:publishing_company
|
gptkbp:addresses |
Privacy controls
|
gptkbp:aimsTo |
Provide guidelines for assessing security controls
|
gptkbp:description |
Assessment of security and privacy controls
|
gptkbp:developedBy |
Security assessments
|
gptkbp:firstPublished |
2008
|
gptkbp:hasExhibition |
Assessment scenarios
|
https://www.w3.org/2000/01/rdf-schema#label |
NIST 800-53A
|
gptkbp:includes |
Assessment tools
Control assessment methods |
gptkbp:isAccessibleBy |
Information systems
Cloud computing environments |
gptkbp:isAssignedTo |
ISO/IEC 27001
Best practices in cybersecurity Risk management principles |
gptkbp:isAttendedBy |
International organizations
State governments |
gptkbp:isCitedIn |
gptkb:Federal_Information_Security_Modernization_Act
|
gptkbp:isDesignedFor |
Risk management
|
gptkbp:isEvaluatedBy |
Security assessors
|
gptkbp:isIncorporatedIn |
Security frameworks
Continuous monitoring strategies Security assessment plans |
gptkbp:isInformedBy |
Industry standards
|
gptkbp:isIntegratedWith |
Other NIST publications
System owners |
gptkbp:isInvolvedIn |
Federal standards
|
gptkbp:isPartOf |
gptkb:NIST_Risk_Management_Framework
Information security management Cybersecurity Framework Federal cybersecurity strategy |
gptkbp:isPromotedBy |
NIST publications
|
gptkbp:isReferencedBy |
gptkb:NIST_800-171
gptkb:NIST_800-37 FISMA |
gptkbp:isReferencedIn |
gptkb:Federal_Risk_and_Authorization_Management_Program
Cybersecurity policies |
gptkbp:isRelatedTo |
Risk assessment
|
gptkbp:isReviewedBy |
Cybersecurity experts
|
gptkbp:isSupportedBy |
Training programs
NIST Cybersecurity Framework |
gptkbp:isUpdatedBy |
NIST_800-53_Revision_5
|
gptkbp:isUsedBy |
Evaluate security posture
Assess organizational risk Document security controls |
gptkbp:isUsedFor |
Compliance assessment
System security planning |
gptkbp:isUsedIn |
Federal cybersecurity programs
|
gptkbp:isUtilizedFor |
Private sector organizations
Compliance verification Risk assessment methodologies |
gptkbp:isVisitedBy |
gptkb:NIST's_Risk_Management_Framework
Stakeholder input NIST_Special_Publication_Working_Group |
gptkbp:partOf |
Risk Management Framework
|
gptkbp:provides |
Assessment criteria
Assessment procedures |
gptkbp:providesGuidanceOn |
Control assessment frequency
|
gptkbp:publishedBy |
gptkb:National_Institute_of_Standards_and_Technology
|
gptkbp:relatedTo |
NIST_800-53
|
gptkbp:renovated |
2014
|
gptkbp:supports |
Continuous monitoring
|
gptkbp:usedBy |
Federal agencies
|