Statements (63)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:Publications
|
gptkbp:addresses |
Risk assessment
|
gptkbp:aims_to |
Improve information security posture
|
gptkbp:audience |
Organizations managing information security risks
|
gptkbp:content_type |
Guideline
|
gptkbp:describes |
Risk management roles and responsibilities
|
gptkbp:emphasizes |
Continuous monitoring
|
gptkbp:focus_area |
Information Security Risk Management
|
https://www.w3.org/2000/01/rdf-schema#label |
NIST SP 800-39
|
gptkbp:includes |
Best practices for risk management
|
gptkbp:is_cited_in |
gptkb:NIST_SP_800-30
gptkb:NIST_SP_800-115 gptkb:NIST_SP_800-37 gptkb:NIST_SP_800-171_A gptkb:NIST_SP_800-171 gptkb:NIST_SP_800-53 gptkb:NIST_SP_800-60 gptkb:OMB_Circular_A-130 gptkb:FISMA NIST SP 800-53 Rev. 5 NIST SP 800-37 Rev. 2 NIST SP 800-53 B NIST SP 800-39 A NIST SP 800-39 B NIST SP 800-39 C NIST SP 800-39 D NIST SP 800-39 E NIST SP 800-39 F NIST SP 800-39 G NIST SP 800-39 H NIST SP 800-39 I NIST SP 800-39 J NIST SP 800-39 K NIST SP 800-39 L NIST SP 800-39 M NIST SP 800-39 N NIST SP 800-39 O NIST SP 800-39 P NIST SP 800-39 Q NIST SP 800-39 R NIST SP 800-39 S NIST SP 800-39 T NIST SP 800-39 U NIST SP 800-39 V NIST SP 800-39 W NIST SP 800-39 X NIST SP 800-39 Y NIST SP 800-39 Z |
gptkbp:is_part_of |
gptkb:Cybersecurity
|
gptkbp:is_referenced_in |
gptkb:NIST_SP_800-53_A
gptkb:NIST_SP_800-160 |
gptkbp:is_used_by |
gptkb:Federal_agencies
|
gptkbp:outlines |
Risk management strategies
|
gptkbp:part_of |
gptkb:NIST_Special_Publication_series
|
gptkbp:provides |
Risk management framework overview
|
gptkbp:provides_guidance_on |
Risk management processes
|
gptkbp:publication_year |
March 2011
|
gptkbp:published_by |
gptkb:National_Academy_of_Sciences
|
gptkbp:related_to |
gptkb:NIST_Risk_Management_Framework
|
gptkbp:supports |
Compliance with federal regulations
|
gptkbp:title |
Managing Information Security Risk
|
gptkbp:bfsParent |
gptkb:NIST_SP_800-37
|
gptkbp:bfsLayer |
5
|