gptkbp:instance_of
|
gptkb:Publications
|
gptkbp:aims_to
|
Enhance security posture
|
gptkbp:audience
|
IT security professionals
|
gptkbp:content_type
|
Guideline
|
gptkbp:covers
|
Penetration testing
Vulnerability assessment
Security testing methodologies
|
gptkbp:focus
|
Information security testing
|
https://www.w3.org/2000/01/rdf-schema#label
|
NIST SP 800-115
|
gptkbp:includes
|
Reporting and documentation standards
Testing tools and techniques
|
gptkbp:is_adopted_by
|
gptkb:educational_institutions
Government agencies
Private sector organizations
|
gptkbp:is_cited_in
|
gptkb:NIST_SP_800-37
gptkb:NIST_SP_800-171_A
gptkb:NIST_SP_800-53_A
gptkb:NIST_SP_800-171
gptkb:NIST_SP_800-160
gptkb:NIST_SP_800-39
gptkb:ISO/_IEC_27001
CIS Controls
Various cybersecurity frameworks
NIST SP 800-53 B
NIST SP 800-115 A
NIST SP 800-30 A
|
gptkbp:is_part_of
|
gptkb:NIST_Risk_Management_Framework
gptkb:Cybersecurity
|
gptkbp:is_referenced_in
|
gptkb:NIST_SP_800-30
gptkb:NIST_SP_800-53
|
gptkbp:is_related_to
|
Incident response
Security controls
Compliance assessments
|
gptkbp:is_updated_by
|
gptkb:NIST_SP_800-53_A
|
gptkbp:is_used_for
|
Application security testing
Network security testing
System security testing
|
gptkbp:is_used_in
|
Federal Information Security Management Act (FISMA) compliance
|
gptkbp:part_of
|
gptkb:NIST_Special_Publication_series
|
gptkbp:provides
|
Guidance for risk assessment
Best practices for security testing
Assessment planning guidance
|
gptkbp:provides_guidance_on
|
Security assessment
|
gptkbp:publication_year
|
gptkb:2008
|
gptkbp:published_by
|
gptkb:National_Academy_of_Sciences
|
gptkbp:related_to
|
gptkb:Cybersecurity
|
gptkbp:title
|
Technical Guide to Information Security Testing and Assessment
|
gptkbp:bfsParent
|
gptkb:NIST_800_series
gptkb:NIST_Special_Publication_800-30
gptkb:NIST_SP_800-39
|
gptkbp:bfsLayer
|
6
|