NIST SP 800-30

GPTKB entity

Statements (53)
Predicate Object
gptkbp:instance_of gptkb:Publications
gptkbp:aims_to Improve risk management practices
gptkbp:audience gptkb:organization
gptkbp:contains Risk assessment process
gptkbp:content_type Guideline
gptkbp:focuses_on Risk assessment
https://www.w3.org/2000/01/rdf-schema#label NIST SP 800-30
gptkbp:includes Risk assessment tools
gptkbp:is_adopted_by Private sector organizations
gptkbp:is_cited_in gptkb:NIST_SP_800-37
gptkb:NIST_SP_800-53_A
gptkb:NIST_SP_800-171
gptkb:NIST_SP_800-53
gptkb:NIST_SP_800-60
gptkb:NIST_SP_800-39
gptkb:ISO/_IEC_27001
gptkb:ISO/_IEC_27005
gptkbp:is_part_of gptkb:Cybersecurity
Risk Management Framework (RMF)
gptkbp:is_referenced_in gptkb:FISMA
gptkbp:is_related_to gptkb:assessment_tools
gptkb:Compliance_Management
gptkb:Cybersecurity
gptkb:administration
Audit
Risk management
Stakeholder engagement
Risk tolerance
Business continuity planning
Mitigation strategies
Risk appetite
Disaster recovery planning
gptkbp:is_supported_by gptkb:NIST_Risk_Management_Framework
gptkb:Cybersecurity
NIST SP 800-53 Rev. 5
NIST SP 800-37 Rev. 2
gptkbp:is_used_by gptkb:Federal_agencies
gptkbp:is_used_for Incident response planning
Continuous monitoring
Compliance assessments
Security planning
gptkbp:part_of gptkb:NIST_Special_Publication_series
gptkbp:provides Risk assessment methodology
gptkbp:provides_guidance_on Vulnerability assessment
Impact analysis
Threat identification
gptkbp:publication_year gptkb:2012
gptkbp:published_by gptkb:National_Academy_of_Sciences
gptkbp:related_to Information security
gptkbp:title Guide for Conducting Risk Assessments
gptkbp:updates NIST SP 800-30 Rev. 1
gptkbp:bfsParent gptkb:NIST_SP_800-37
gptkbp:bfsLayer 5