NIST Cybersecurity Framework Manufacturing Profile
GPTKB entity
Statements (78)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:Company
|
gptkbp:addresses |
Supply Chain Risks
|
gptkbp:aimsTo |
Cyber Resilience
|
gptkbp:associated_with |
Industry Standards
|
gptkbp:designedFor |
Manufacturing Sector
|
gptkbp:developedBy |
NIST
|
gptkbp:encourages |
Information Sharing
|
gptkbp:facilitates |
Compliance with Regulations
|
gptkbp:focusesOn |
Risk Management
|
gptkbp:hasCollaboratedWith |
Academic Institutions
Industry Groups Government Partners Non-Profit_Organizations |
https://www.w3.org/2000/01/rdf-schema#label |
NIST Cybersecurity Framework Manufacturing Profile
|
gptkbp:includes |
Best Practices
Implementation Guidance Implementation Tiers Core Functions |
gptkbp:isAccessibleBy |
Small and Medium Enterprises
|
gptkbp:isAssignedTo |
gptkb:NIST_SP_800-171
gptkb:NIST_SP_800-53 gptkb:ISO/IEC_Standards NIST CSF |
gptkbp:isAttendedBy |
Large_Enterprises
|
gptkbp:isBasedOn |
Risk Management Framework
|
gptkbp:isDesignedFor |
Enhance Security Posture
|
gptkbp:isEnhancedBy |
Emerging Technologies
|
gptkbp:isEvaluatedBy |
Performance Metrics
Surveys Performance Reviews Case Studies Peer Reviews Compliance Auditors Third-Party_Assessors |
gptkbp:isFocusedOn |
Access Control
Network Security Data Protection Incident Management Physical Security Operational Technology Security |
gptkbp:isInformedBy |
Regulatory Requirements
Threat Intelligence Cybersecurity_Research Best_Available_Technologies |
gptkbp:isIntegratedWith |
Other Cybersecurity Frameworks
|
gptkbp:isPartOf |
NIST Cybersecurity Framework
|
gptkbp:isPromotedBy |
Government Agencies
Industry Leaders Publications Trade_Associations |
gptkbp:isPromotedThrough |
Conferences
Workshops Webinars Social_Media |
gptkbp:isReferencedIn |
Cybersecurity Policies
|
gptkbp:isSupportedBy |
Community Engagement
Online Resources Technical Assistance Training Resources Resource Guides Incident Response Teams Cybersecurity_Tools |
gptkbp:isUpdatedBy |
NIST
|
gptkbp:isUsedBy |
Manufacturers
|
gptkbp:isUsedFor |
Risk Assessment
|
gptkbp:isUtilizedFor |
Threat Assessment
Security Awareness Training Security Audits Business Continuity Planning Incident Response Planning Security Policy Development Data Breach Response Vulnerability_Management |
gptkbp:promotes |
Collaboration among Stakeholders
|
gptkbp:provides |
Assessment Tools
Self-Assessment Tools |
gptkbp:providesGuidanceOn |
Cybersecurity Practices
|
gptkbp:supports |
Continuous_Improvement
|