Statements (63)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:publishing_company
|
gptkbp:aimsTo |
protect organizational operations
|
gptkbp:appliesTo |
Federal_Information_Systems
|
gptkbp:contains |
security and privacy controls
|
gptkbp:focusesOn |
security controls
|
gptkbp:hasCollaboratedWith |
Industry stakeholders
|
https://www.w3.org/2000/01/rdf-schema#label |
NIST SP 800-53G
|
gptkbp:includes |
control baselines
|
gptkbp:isAccessibleBy |
Information_Technology_systems
|
gptkbp:isAssignedTo |
Global standards
Federal standards |
gptkbp:isAttendedBy |
International organizations
State governments |
gptkbp:isAvenueFor |
Information assurance
|
gptkbp:isCitedBy |
Federal agencies
|
gptkbp:isConsidered |
Best practice
Continuous monitoring Framework for security controls |
gptkbp:isDesignedFor |
Risk management
Enhance security posture |
gptkbp:isEvaluatedBy |
Auditors
Effectiveness Security benchmarks |
gptkbp:isIncorporatedIn |
Security training programs
|
gptkbp:isInfluencedBy |
ISO/IEC 27001
|
gptkbp:isInformedBy |
Threat assessments
|
gptkbp:isIntegratedWith |
gptkb:Federal_Information_Security_Management_Act
Organizational policies Other NIST publications |
gptkbp:isInvolvedIn |
NIST guidelines
|
gptkbp:isPartOf |
Information Security Management
NIST Cybersecurity Framework Cybersecurity policy framework |
gptkbp:isPromotedBy |
gptkb:NIST_Cybersecurity_Division
|
gptkbp:isPromotedThrough |
Workshops and seminars
|
gptkbp:isReferencedBy |
Security policies
|
gptkbp:isReferencedIn |
Compliance frameworks
Cybersecurity frameworks FISMA |
gptkbp:isRelatedTo |
gptkb:NIST_Risk_Management_Framework
|
gptkbp:isReviewedBy |
Cybersecurity experts
By NIST experts |
gptkbp:isSupportedBy |
Documentation
Training materials |
gptkbp:isUpdatedBy |
gptkb:NIST_SP_800-53_Revision_5
Every few years |
gptkbp:isUsedBy |
gptkb:U.S._Government
Mitigate risks Assess security risks |
gptkbp:isUsedFor |
Compliance assessment
|
gptkbp:isUtilizedFor |
Data protection
Private sector organizations |
gptkbp:isUtilizedIn |
Incident response planning
Risk assessments |
gptkbp:isVisitedBy |
NIST
|
gptkbp:partOf |
NIST Special Publication series
|
gptkbp:provides |
framework for selecting security controls
|
gptkbp:providesGuidanceOn |
Privacy controls
|
gptkbp:publicationDate |
2013
|
gptkbp:publishedBy |
gptkb:National_Institute_of_Standards_and_Technology
|
gptkbp:relatedTo |
Risk Management Framework
|
gptkbp:replacedBy |
NIST_SP_800-53F
|
gptkbp:title |
Security and Privacy Controls for Information Systems and Organizations
|