Statements (32)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:publisher
|
gptkbp:containsDocument |
gptkb:NIST_SP_800-53
gptkb:NIST_SP_800-30 gptkb:NIST_SP_800-37 gptkb:NIST_SP_800-115 gptkb:NIST_SP_800-82 gptkb:NIST_SP_800-171 gptkb:NIST_SP_800-34 gptkb:NIST_SP_800-39 gptkb:NIST_SP_800-63 gptkb:NIST_SP_800-61 |
gptkbp:countryOfOrigin |
gptkb:United_States
|
gptkbp:firstPublished |
1990
|
gptkbp:focusesOn |
computer security
cybersecurity information security |
https://www.w3.org/2000/01/rdf-schema#label |
NIST SP 800 series
|
gptkbp:language |
English
|
gptkbp:publishedBy |
gptkb:National_Institute_of_Standards_and_Technology
|
gptkbp:relatedTo |
gptkb:NIST_SP_500_series
gptkb:FIPS_publications |
gptkbp:targetAudience |
gptkb:government
federal agencies |
gptkbp:usedFor |
guidance
risk management security controls best practices |
gptkbp:website |
https://csrc.nist.gov/publications/sp800
|
gptkbp:bfsParent |
gptkb:SP_800-38E
gptkb:SP_800-90C gptkb:NIST_Special_Publications |
gptkbp:bfsLayer |
6
|