Statements (50)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:publishing_company
|
gptkbp:addresses |
cloud computing security
|
gptkbp:focusesOn |
security and privacy controls
|
gptkbp:hasCollaboratedWith |
industry stakeholders
|
https://www.w3.org/2000/01/rdf-schema#label |
NIST SP 800-53W
|
gptkbp:includes |
control baselines
|
gptkbp:isAccessibleBy |
all federal agencies
|
gptkbp:isAssignedTo |
gptkb:NIST_Risk_Management_Framework
gptkb:ISO/IEC_standards |
gptkbp:isAttendedBy |
non-profit organizations
international standards state governments |
gptkbp:isAvailableIn |
NIST website
|
gptkbp:isCitedIn |
federal regulations
|
gptkbp:isDesignedFor |
enhance security posture
|
gptkbp:isEvaluatedBy |
best practices
auditors |
gptkbp:isIncorporatedIn |
security frameworks
|
gptkbp:isInfluencedBy |
NIST Cybersecurity Framework
|
gptkbp:isInformedBy |
threat intelligence
|
gptkbp:isIntegratedWith |
government agencies
other NIST publications |
gptkbp:isInvolvedIn |
2020
FISMA |
gptkbp:isPartOf |
federal cybersecurity strategy
federal information security management NIST_SP_800_series |
gptkbp:isPromotedBy |
cybersecurity organizations
|
gptkbp:isPromotedThrough |
workshops
|
gptkbp:isPublishedIn |
NIST
|
gptkbp:isReferencedIn |
academic research
security policies cybersecurity guidelines |
gptkbp:isRelatedTo |
risk management framework
information assurance |
gptkbp:isReviewedBy |
security experts
government oversight bodies |
gptkbp:isSupportedBy |
training materials
|
gptkbp:isUpdatedBy |
gptkb:NIST_SP_800-53_Revision_5
every few years |
gptkbp:isUsedBy |
private sector organizations
develop security policies |
gptkbp:isUsedFor |
compliance assessments
|
gptkbp:isUtilizedFor |
incident response planning
|
gptkbp:isUtilizedIn |
security audits
risk assessment processes |
gptkbp:isVisitedBy |
gptkb:NIST_Computer_Security_Division
|
gptkbp:provides |
security controls catalog
|
gptkbp:providesGuidanceOn |
federal information systems
|
gptkbp:supports |
cybersecurity frameworks
|