Statements (66)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:publishing_company
|
gptkbp:addresses |
privacy risks
|
gptkbp:aimsTo |
protect organizational operations
|
gptkbp:contains |
access control
incident response system and communications protection |
gptkbp:description |
security and privacy controls
|
gptkbp:developedBy |
risk assessment
|
gptkbp:focusesOn |
security controls
|
gptkbp:hasCollaboratedWith |
public-private partnerships
interagency working groups |
https://www.w3.org/2000/01/rdf-schema#label |
NIST SP 800-53U
|
gptkbp:includes |
control baselines
|
gptkbp:isAccessibleBy |
cloud services
|
gptkbp:isAssignedTo |
NIST Cybersecurity Framework
national security objectives federal risk management framework |
gptkbp:isAttendedBy |
international organizations
private sector organizations |
gptkbp:isAvenueFor |
risk management practices
|
gptkbp:isCitedIn |
government regulations
|
gptkbp:isDesignedFor |
enhance security posture
|
gptkbp:isEvaluatedBy |
security professionals
compliance officers security benchmarks |
gptkbp:isIncorporatedIn |
security policies
incident response plans organizational security frameworks |
gptkbp:isInformedBy |
threat intelligence
industry best practices |
gptkbp:isIntegratedWith |
other NIST standards
|
gptkbp:isInvolvedIn |
gptkb:ISO/IEC_standards
|
gptkbp:isMaintainedBy |
gptkb:NIST_SP_800-53_Revision_5
|
gptkbp:isPartOf |
NIST Special Publication series
federal cybersecurity strategy federal information assurance federal information security management |
gptkbp:isPromotedBy |
federal agencies
|
gptkbp:isPromotedThrough |
workshops and seminars
|
gptkbp:isReferencedBy |
security compliance audits
|
gptkbp:isReferencedIn |
cybersecurity policies
security frameworks security training programs FISMA |
gptkbp:isRelatedTo |
cybersecurity frameworks
|
gptkbp:isReviewedBy |
security assessments
security experts |
gptkbp:isSupportedBy |
NIST publications
|
gptkbp:isUpdatedBy |
to reflect new threats
|
gptkbp:isUsedBy |
government agencies
develop contingency plans develop security plans create security policies assess vulnerabilities |
gptkbp:isUsedFor |
security assessments
|
gptkbp:isUtilizedFor |
data protection
security audits security risk analysis |
gptkbp:isUtilizedIn |
information technology governance
|
gptkbp:isVisitedBy |
gptkb:NIST_Risk_Management_Framework
|
gptkbp:provides |
guidance for risk management
|
gptkbp:providesGuidanceOn |
continuous monitoring
|
gptkbp:publishedBy |
gptkb:National_Institute_of_Standards_and_Technology
|
gptkbp:purpose |
federal information systems
|
gptkbp:supports |
federal compliance
|
gptkbp:updates |
gptkb:NIST_SP_800-53
|