Statements (30)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:publisher
|
| gptkbp:containsDocument |
gptkb:NIST_SP_800-53
gptkb:NIST_SP_800-30 gptkb:NIST_SP_800-37 gptkb:NIST_SP_800-115 gptkb:NIST_SP_800-82 gptkb:NIST_SP_800-171 gptkb:NIST_SP_800-34 gptkb:NIST_SP_800-39 gptkb:NIST_SP_800-63 gptkb:NIST_SP_800-61 |
| gptkbp:countryOfOrigin |
gptkb:United_States
|
| gptkbp:firstPublished |
1990
|
| gptkbp:focusesOn |
computer security
cybersecurity information security |
| gptkbp:language |
English
|
| gptkbp:publishedBy |
gptkb:National_Institute_of_Standards_and_Technology
|
| gptkbp:relatedTo |
gptkb:NIST_SP_500_series
gptkb:FIPS_publications |
| gptkbp:targetAudience |
gptkb:government
federal agencies |
| gptkbp:usedFor |
guidance
risk management security controls best practices |
| gptkbp:website |
https://csrc.nist.gov/publications/sp800
|
| gptkbp:bfsParent |
gptkb:NIST_Special_Publications
|
| gptkbp:bfsLayer |
6
|
| https://www.w3.org/2000/01/rdf-schema#label |
NIST SP 800 series
|