Properties (72)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:publishing_company
|
gptkbp:addresses |
cybersecurity threats
|
gptkbp:aimsTo |
enhance information security
|
gptkbp:contains |
control families
|
gptkbp:documentType |
guideline
|
gptkbp:focusesOn |
security and privacy controls
|
gptkbp:hasCollaboratedWith |
with academic institutions
with industry stakeholders with private sector partners other NIST publications |
https://www.w3.org/2000/01/rdf-schema#label |
NIST SP 800-175B
|
gptkbp:includes |
best practices
|
gptkbp:isAssignedTo |
gptkb:NIST_Risk_Management_Framework
international standards |
gptkbp:isAttendedBy |
state governments
private sector organizations |
gptkbp:isAvailableIn |
NIST website
|
gptkbp:isCitedBy |
policy makers
security professionals cybersecurity frameworks |
gptkbp:isCitedIn |
academic research
academic publications government reports |
gptkbp:isDesignedFor |
improve risk management practices
|
gptkbp:isIncorporatedIn |
cybersecurity training programs
|
gptkbp:isInfluencedBy |
cybersecurity standards development
|
gptkbp:isInformedBy |
emerging technologies
industry best practices cybersecurity risk assessments |
gptkbp:isPartOf |
national cybersecurity strategy
national security strategy federal cybersecurity initiatives national cybersecurity framework cybersecurity policy framework federal cybersecurity policy federal information assurance framework federal information security management federal risk management framework |
gptkbp:isPromotedBy |
NIST publications
|
gptkbp:isPromotedThrough |
workshops and seminars
|
gptkbp:isRecognizedFor |
incident response
|
gptkbp:isReferencedIn |
federal regulations
government contracts NIST Cybersecurity Framework cybersecurity legislation cybersecurity training materials security compliance frameworks |
gptkbp:isRelatedTo |
gptkb:NIST_SP_800-171
|
gptkbp:isReviewedBy |
cybersecurity experts
|
gptkbp:isSupportedBy |
federal funding
cybersecurity grants |
gptkbp:isUpdatedBy |
to reflect new threats
|
gptkbp:isUsedBy |
government organizations
develop security policies evaluate security controls guide security policy development |
gptkbp:isUsedFor |
security control selection
|
gptkbp:isUtilizedFor |
compliance assessments
|
gptkbp:isUtilizedIn |
risk assessment methodologies
federal cybersecurity training cybersecurity audits |
gptkbp:isVisitedBy |
gptkb:NIST_Cybersecurity_Division
stakeholder input public comment process |
gptkbp:partOf |
NIST_SP_800_series
|
gptkbp:provides |
framework for risk management
|
gptkbp:providesGuidanceOn |
security assessments
|
gptkbp:publishedBy |
gptkb:National_Institute_of_Standards_and_Technology
|
gptkbp:purpose |
federal agencies
|
gptkbp:releaseDate |
2020
|
gptkbp:supports |
compliance_with_FISMA
|
gptkbp:updates |
gptkb:NIST_SP_800-53
|