gptkbp:instanceOf
|
gptkb:publishing_company
|
gptkbp:addresses
|
Cybersecurity threats
|
gptkbp:appliesTo
|
Federal_Information_Systems
|
gptkbp:citedBy
|
gptkb:NIST_SP_800-30
gptkb:ISO/IEC_15288
gptkb:NIST_SP_800-37
gptkb:NIST_SP_800-53
|
gptkbp:documentType
|
Technical Report
|
gptkbp:emphasizes
|
Continuous monitoring
|
gptkbp:focusArea
|
Systems Engineering
|
gptkbp:goal
|
Provide guidance on security engineering
|
https://www.w3.org/2000/01/rdf-schema#label
|
NIST SP 800-160
|
gptkbp:includes
|
Best practices
|
gptkbp:isAttendedBy
|
Private sector organizations
|
gptkbp:isCitedIn
|
gptkb:Federal_Information_Security_Modernization_Act
|
gptkbp:isIntegratedWith
|
Security professionals
Project managers
Risk managers
System engineers
Acquisition professionals
|
gptkbp:isPartOf
|
gptkb:NIST_Risk_Management_Framework
Cybersecurity Framework
NIST Cybersecurity Framework
|
gptkbp:isReferencedBy
|
gptkb:Federal_Acquisition_Regulation
|
gptkbp:isRelatedTo
|
System security engineering principles
|
gptkbp:isSupportedBy
|
gptkb:NIST_SP_800-30
gptkb:NIST_Risk_Management_Framework
gptkb:NIST_SP_800-53
NIST Cybersecurity Framework
NIST Special Publication series
|
gptkbp:isUpdatedBy
|
NIST_SP_800-160,_Revision_2
|
gptkbp:isUsedBy
|
Government agencies
|
gptkbp:isUsedIn
|
Project management
Information assurance
System development life cycle
Cybersecurity risk management
Software development life cycle
|
gptkbp:isVisitedBy
|
gptkb:NIST_Computer_Security_Division
|
gptkbp:partOf
|
NIST Special Publication series
|
gptkbp:provides
|
Security requirements
|
gptkbp:providesGuidanceOn
|
Security controls
|
gptkbp:publicationDate
|
2016
|
gptkbp:publishedBy
|
gptkb:National_Institute_of_Standards_and_Technology
|
gptkbp:relatedTo
|
Risk Management Framework
|
gptkbp:replacedBy
|
NIST_SP_800-160,_Revision_1
|
gptkbp:supports
|
System lifecycle
|
gptkbp:title
|
Systems Security Engineering
|