NIST Security and Privacy Controls
GPTKB entity
Statements (51)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Framework
|
gptkbp:appliesTo |
Federal_Information_Systems
|
gptkbp:category |
Control families
Control enhancements Impact levels Control_baselines |
gptkbp:developedBy |
NIST
|
gptkbp:focusesOn |
Risk management
|
https://www.w3.org/2000/01/rdf-schema#label |
NIST Security and Privacy Controls
|
gptkbp:includes |
Control families
|
gptkbp:isAssignedTo |
ISO/IEC 27001
COBIT |
gptkbp:isAttendedBy |
State governments
Private sector organizations |
gptkbp:isChallengedBy |
Regulatory changes
Complexity of systems Resource constraints Emerging technologies New threats |
gptkbp:isDocumentedIn |
NIST Special Publication 800-37
NIST Special Publication 800-53A NIST Special Publication 800-171 NIST Special Publication 800-60 |
gptkbp:isEvaluatedBy |
Compliance
Efficiency Scalability Adaptability Effectiveness Assessment procedures |
gptkbp:isLocatedIn |
Information security programs
|
gptkbp:isPartOf |
NIST Special Publication 800-53
|
gptkbp:isPromotedBy |
Conferences
Workshops Training programs NIST publications |
gptkbp:isReferencedBy |
gptkb:Federal_Information_Security_Modernization_Act
|
gptkbp:isRelatedTo |
Cybersecurity Framework
|
gptkbp:isReviewedBy |
Security professionals
Annual reviews |
gptkbp:isSupportedBy |
gptkb:NIST_Risk_Management_Framework
NIST Cybersecurity Framework |
gptkbp:isUpdatedBy |
Revision cycles
|
gptkbp:isUsedFor |
Risk assessments
Security audits Compliance assessments Privacy assessments |
gptkbp:provides |
Privacy controls
Security controls |
gptkbp:purpose |
Provide guidelines for managing security and privacy risks
|
gptkbp:renovated |
gptkb:NIST_Special_Publication_800-53_Revision_5
|
gptkbp:usedBy |
Organizations
|