Statements (61)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:publishing_company
|
gptkbp:addresses |
supply chain risk management
|
gptkbp:aimsTo |
information security
|
gptkbp:appliesTo |
federal information systems
|
gptkbp:developedBy |
continuous monitoring
|
gptkbp:focusesOn |
security and privacy controls
|
gptkbp:hasCollaboratedWith |
international organizations
industry partners |
gptkbp:hasMember |
incident response
|
https://www.w3.org/2000/01/rdf-schema#label |
NIST SP 800-53R
|
gptkbp:includes |
control families
|
gptkbp:isAccessibleBy |
non-federal organizations
|
gptkbp:isAssignedTo |
gptkb:ISO/IEC_standards
NIST Cybersecurity Framework |
gptkbp:isAttendedBy |
state governments
private sector organizations |
gptkbp:isAvailableIn |
digital format
|
gptkbp:isCitedIn |
academic research
security policies |
gptkbp:isDesignedFor |
protect information systems
|
gptkbp:isDistributedBy |
NIST website
|
gptkbp:isEvaluatedBy |
effectiveness
independent auditors security controls |
gptkbp:isIncorporatedIn |
organizational policies
security training programs cybersecurity assessments |
gptkbp:isInformedBy |
emerging threats
lessons learned |
gptkbp:isIntegratedWith |
other NIST publications
|
gptkbp:isInvolvedIn |
federal regulations
|
gptkbp:isPartOf |
Risk Management Framework
NIST Special Publication series federal cybersecurity strategy federal information security management |
gptkbp:isPromotedBy |
NIST outreach programs
|
gptkbp:isPromotedThrough |
workshops and seminars
|
gptkbp:isReferencedBy |
FISMA
security implementations |
gptkbp:isReferencedIn |
government contracts
cybersecurity frameworks best practice guidelines |
gptkbp:isReviewedBy |
security experts
government oversight bodies |
gptkbp:isSupportedBy |
technical documentation
stakeholder feedback |
gptkbp:isUpdatedBy |
every few years
|
gptkbp:isUsedBy |
government agencies
security posture |
gptkbp:isUsedFor |
policy development
compliance assessments |
gptkbp:isUtilizedFor |
security audits
|
gptkbp:isUtilizedIn |
risk assessments
training materials |
gptkbp:isVisitedBy |
NIST
|
gptkbp:provides |
guidelines for risk management
|
gptkbp:providesGuidanceOn |
privacy controls
|
gptkbp:publishedBy |
gptkb:National_Institute_of_Standards_and_Technology
|
gptkbp:renovated |
2020
|
gptkbp:replacedBy |
gptkb:NIST_SP_800-53_Rev._4
|
gptkbp:supports |
cybersecurity frameworks
|