gptkbp:instance_of
|
gptkb:Publications
|
gptkbp:aims_to
|
Improve information security risk management
|
gptkbp:applies_to
|
Federal Information Systems
|
gptkbp:focuses_on
|
gptkb:Risk_Management
|
https://www.w3.org/2000/01/rdf-schema#label
|
NIST SP 800-37 Revision 2
|
gptkbp:includes
|
Continuous monitoring
Security controls selection
Security categorization
|
gptkbp:is_cited_in
|
gptkb:Federal_Information_Security_Modernization_Act
gptkb:NIST_SP_800-30
gptkb:NIST_SP_800-53_A
gptkb:NIST_SP_800-53_C
gptkb:NIST_SP_800-171
gptkb:NIST_SP_800-160
gptkb:NIST_SP_800-39
gptkb:OMB_Circular_A-130
gptkb:FISMA
NIST SP 800-53 B
NIST SP 800-53 A Rev 5
NIST SP 800-53 B Rev 5
NIST SP 800-53 C Rev 5
|
gptkbp:is_part_of
|
gptkb:NIST_Risk_Management_Framework
|
gptkbp:is_referenced_in
|
gptkb:NIST_SP_800-53
|
gptkbp:is_related_to
|
gptkb:Cybersecurity
Information Assurance
|
gptkbp:is_used_by
|
U. S. Government Agencies
|
gptkbp:part_of
|
gptkb:Cybersecurity
|
gptkbp:provides
|
Guidelines for applying the Risk Management Framework
|
gptkbp:provides_guidance_on
|
Assessment of security controls
|
gptkbp:publication_year
|
December 2018
|
gptkbp:published_by
|
gptkb:National_Academy_of_Sciences
|
gptkbp:replaces
|
gptkb:NIST_SP_800-37_Revision_1
|
gptkbp:bfsParent
|
gptkb:NIST_SP_800-37
|
gptkbp:bfsLayer
|
5
|