gptkbp:instance_of
|
gptkb:Publications
|
gptkbp:aims_to
|
Improve risk management practices
|
gptkbp:audience
|
gptkb:organization
|
gptkbp:contains
|
Risk assessment process
|
gptkbp:content_type
|
Guideline
|
gptkbp:focuses_on
|
Risk assessment
|
https://www.w3.org/2000/01/rdf-schema#label
|
NIST SP 800-30
|
gptkbp:includes
|
Risk assessment tools
|
gptkbp:is_adopted_by
|
Private sector organizations
|
gptkbp:is_cited_in
|
gptkb:NIST_SP_800-37
gptkb:NIST_SP_800-53_A
gptkb:NIST_SP_800-171
gptkb:NIST_SP_800-53
gptkb:NIST_SP_800-60
gptkb:NIST_SP_800-39
gptkb:ISO/_IEC_27001
gptkb:ISO/_IEC_27005
|
gptkbp:is_part_of
|
gptkb:Cybersecurity
Risk Management Framework (RMF)
|
gptkbp:is_referenced_in
|
gptkb:FISMA
|
gptkbp:is_related_to
|
gptkb:assessment_tools
gptkb:Compliance_Management
gptkb:Cybersecurity
gptkb:administration
Audit
Risk management
Stakeholder engagement
Risk tolerance
Business continuity planning
Mitigation strategies
Risk appetite
Disaster recovery planning
|
gptkbp:is_supported_by
|
gptkb:NIST_Risk_Management_Framework
gptkb:Cybersecurity
NIST SP 800-53 Rev. 5
NIST SP 800-37 Rev. 2
|
gptkbp:is_used_by
|
gptkb:Federal_agencies
|
gptkbp:is_used_for
|
Incident response planning
Continuous monitoring
Compliance assessments
Security planning
|
gptkbp:part_of
|
gptkb:NIST_Special_Publication_series
|
gptkbp:provides
|
Risk assessment methodology
|
gptkbp:provides_guidance_on
|
Vulnerability assessment
Impact analysis
Threat identification
|
gptkbp:publication_year
|
gptkb:2012
|
gptkbp:published_by
|
gptkb:National_Academy_of_Sciences
|
gptkbp:related_to
|
Information security
|
gptkbp:title
|
Guide for Conducting Risk Assessments
|
gptkbp:updates
|
NIST SP 800-30 Rev. 1
|
gptkbp:bfsParent
|
gptkb:NIST_SP_800-37
|
gptkbp:bfsLayer
|
5
|