Statements (64)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:Publications
|
gptkbp:addresses |
security controls
|
gptkbp:aims_to |
protect controlled unclassified information
|
gptkbp:applies_to |
federal contractors
|
gptkbp:collaborated_with |
industry stakeholders
|
gptkbp:contains |
assessment procedures
|
gptkbp:developed_by |
gptkb:NIST
federal information systems |
gptkbp:focuses_on |
security requirements
|
https://www.w3.org/2000/01/rdf-schema#label |
NIST SP 800-171 A
|
gptkbp:includes |
appendices for assessment
|
gptkbp:is_adopted_by |
data protection
private sector organizations |
gptkbp:is_aligned_with |
gptkb:ISO_9001
federal cybersecurity policies |
gptkbp:is_applicable_to |
CUI environments
|
gptkbp:is_cited_in |
contractual agreements
|
gptkbp:is_considered_as |
best practice guide
|
gptkbp:is_designed_to |
enhance information security
organizations handling CUI |
gptkbp:is_evaluated_by |
effectiveness
security benchmarks third-party assessors |
gptkbp:is_guided_by |
gptkb:NIST_Risk_Management_Framework
|
gptkbp:is_incorporated_in |
security assessments
|
gptkbp:is_influenced_by |
FIPS standards
|
gptkbp:is_informed_by |
security research
|
gptkbp:is_integrated_with |
organizational policies
|
gptkbp:is_part_of |
gptkb:NIST_800_series
gptkb:Cybersecurity national security framework information security governance federal information security management |
gptkbp:is_promoted_by |
government initiatives
cybersecurity awareness campaigns |
gptkbp:is_promoted_through |
workshops
|
gptkbp:is_referenced_in |
gptkb:DFARS
federal regulations contractual obligations security frameworks security compliance documents |
gptkbp:is_related_to |
cybersecurity best practices
information assurance |
gptkbp:is_reviewed_by |
security professionals
|
gptkbp:is_supported_by |
training resources
government resources |
gptkbp:is_updated_by |
gptkb:NIST_SP_800-171_B
|
gptkbp:is_used_by |
government agencies
|
gptkbp:is_used_for |
compliance assessments
|
gptkbp:is_used_to |
assess compliance
evaluate security posture guide security practices |
gptkbp:is_utilized_by |
contractors handling CUI
|
gptkbp:is_utilized_for |
risk assessments
|
gptkbp:is_utilized_in |
federal contracts
|
gptkbp:provides |
assessment methods
|
gptkbp:provides_guidance_on |
security assessment
|
gptkbp:publication_year |
December 2018
|
gptkbp:published_by |
gptkb:National_Academy_of_Sciences
|
gptkbp:related_to |
gptkb:NIST_SP_800-171
|
gptkbp:supports |
risk management framework
|
gptkbp:title |
Assessing Security Requirements for Controlled Unclassified Information
|
gptkbp:bfsParent |
gptkb:NIST_SP_800-53
|
gptkbp:bfsLayer |
4
|