Statements (66)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:publishing_company
|
gptkbp:aimsTo |
information security
|
gptkbp:appliesTo |
federal information systems
|
gptkbp:contains |
security controls
|
gptkbp:developedBy |
cybersecurity
|
gptkbp:focusesOn |
security and privacy controls
|
gptkbp:hasCollaboratedWith |
academic institutions
industry stakeholders |
https://www.w3.org/2000/01/rdf-schema#label |
NIST SP 800-53V
|
gptkbp:includes |
control families
|
gptkbp:isAccessibleBy |
cloud computing
|
gptkbp:isAssignedTo |
privacy regulations
national security objectives international security frameworks |
gptkbp:isAttendedBy |
international organizations
private sector organizations |
gptkbp:isAvailableIn |
NIST website
|
gptkbp:isAvenueFor |
data protection
incident management risk management framework |
gptkbp:isCitedBy |
other security standards
|
gptkbp:isConsidered |
best practice
a standard for security controls |
gptkbp:isDesignedFor |
information system security
|
gptkbp:isDocumentedIn |
official reports
|
gptkbp:isEvaluatedBy |
auditors
risk mitigation strategies security benchmarks compliance effectiveness |
gptkbp:isIncorporatedIn |
security policies
organizational practices |
gptkbp:isInfluencedBy |
gptkb:ISO/IEC_standards
|
gptkbp:isInformedBy |
emerging technologies
cyber threat intelligence best practices in cybersecurity |
gptkbp:isIntegratedWith |
other NIST publications
|
gptkbp:isPartOf |
cybersecurity framework
NIST Special Publication series federal cybersecurity strategy |
gptkbp:isPromotedBy |
NIST outreach programs
|
gptkbp:isPromotedThrough |
training programs
|
gptkbp:isReferencedBy |
academic research
industry standards |
gptkbp:isReferencedIn |
federal regulations
government contracts |
gptkbp:isReflectedIn |
gptkb:NIST_SP_800-53
|
gptkbp:isRelatedTo |
FISMA
|
gptkbp:isReviewedBy |
effectiveness
policy makers security professionals |
gptkbp:isSupportedBy |
federal funding
technical guidance |
gptkbp:isUpdatedBy |
every few years
|
gptkbp:isUsedBy |
government agencies
assess security posture |
gptkbp:isUsedFor |
compliance assessment
|
gptkbp:isUtilizedFor |
incident response planning
contractors vulnerability management |
gptkbp:isUtilizedIn |
security assessments
security audits |
gptkbp:isVisitedBy |
NIST_Special_Publication_Working_Group
|
gptkbp:provides |
guidelines for risk management
|
gptkbp:publishedBy |
gptkb:National_Institute_of_Standards_and_Technology
|
gptkbp:renovated |
2020
|
gptkbp:supports |
risk assessment
|