gptkbp:instance_of
|
gptkb:document
gptkb:Publications
|
gptkbp:addresses
|
Privacy risks
|
gptkbp:aims_to
|
protect organizational operations
|
gptkbp:applies_to
|
federal information systems
Federal Information Systems
|
gptkbp:available_at
|
NIST website
|
gptkbp:collaborated_with
|
other NIST publications
|
gptkbp:contains
|
security controls
|
gptkbp:controls
|
Access control
Incident response
Configuration management
System and communications protection
|
gptkbp:developed_by
|
gptkb:NIST_Computer_Security_Division
|
gptkbp:first_published
|
gptkb:2005
|
gptkbp:focuses_on
|
gptkb:Risk_Management
security and privacy controls
|
https://www.w3.org/2000/01/rdf-schema#label
|
NIST SP 800-53
|
gptkbp:includes
|
Control families
control families
|
gptkbp:is_adopted_by
|
gptkb:State_governments
Local governments
non-profit organizations
cloud security
international organizations
state governments
Private sector organizations
private sector organizations
Critical infrastructure protection
|
gptkbp:is_available_in
|
gptkb:PDF_format
|
gptkbp:is_cited_in
|
gptkb:NIST_SP_800-171_A
gptkb:NIST_SP_800-53_A
gptkb:NIST_SP_800-160
gptkb:Cybersecurity
gptkb:ISO/_IEC_27001
gptkb:OMB_Circular_A-130
government regulations
NIST SP 800-53 B
|
gptkbp:is_compliant_with
|
gptkb:Federal_Information_Security_Modernization_Act
|
gptkbp:is_designed_for
|
risk assessment
|
gptkbp:is_evaluated_by
|
industry standards
security auditors
|
gptkbp:is_incorporated_in
|
cybersecurity frameworks
|
gptkbp:is_influenced_by
|
gptkb:ISO/_IEC_27001
|
gptkbp:is_influential_in
|
Cybersecurity policy development
|
gptkbp:is_informed_by
|
cybersecurity incidents
|
gptkbp:is_integrated_with
|
security frameworks
|
gptkbp:is_part_of
|
gptkb:NIST_Risk_Management_Framework
gptkb:Federal_Information_Security_Modernization_Act_(FISMA)_compliance
gptkb:NIST_Special_Publication_series
Information security management
Risk management process
federal cybersecurity framework
Cybersecurity risk management
federal cybersecurity strategy
federal risk management strategy
|
gptkbp:is_promoted_by
|
cybersecurity training programs
|
gptkbp:is_referenced_in
|
gptkb:FISMA
gptkb:Federal_Risk_and_Authorization_Management_Program_(Fed_RAMP)
contractual agreements
security policies
security compliance frameworks
|
gptkbp:is_related_to
|
gptkb:NIST_SP_800-37
gptkb:NIST_SP_800-53_C
gptkb:NIST_SP_800-171
gptkb:Cybersecurity
|
gptkbp:is_reviewed_by
|
Public stakeholders
cybersecurity experts
by NIST
|
gptkbp:is_supported_by
|
gptkb:NIST_SP_800-53_C
NIST SP 800-53 B
|
gptkbp:is_updated_by
|
gptkb:NIST_SP_800-53_A
every few years
NIST SP 800-53 B
|
gptkbp:is_used_by
|
government agencies
|
gptkbp:is_used_for
|
Data protection
Risk assessment
security assessments
Security assessments
System security planning
|
gptkbp:is_used_in
|
Continuous monitoring
|
gptkbp:is_used_to
|
develop security policies
assess vulnerabilities
develop risk management strategies
|
gptkbp:is_utilized_by
|
IT departments
|
gptkbp:is_utilized_for
|
incident response planning
compliance assessments
|
gptkbp:is_utilized_in
|
security audits
|
gptkbp:latest_version
|
Revision 5
|
gptkbp:provides
|
guidelines for risk management
Assessment procedures
|
gptkbp:provides_guidance_on
|
continuous monitoring
Security controls for information systems
|
gptkbp:published_by
|
gptkb:NIST
gptkb:National_Academy_of_Sciences
|
gptkbp:purpose
|
Provide a catalog of security and privacy controls
|
gptkbp:related_to
|
gptkb:Cybersecurity
|
gptkbp:supports
|
Compliance with FISMA
|
gptkbp:updates
|
gptkb:2020
|
gptkbp:used_by
|
Government agencies
|
gptkbp:bfsParent
|
gptkb:Cybersecurity
|
gptkbp:bfsLayer
|
3
|