gptkbp:instance_of
|
gptkb:publishing_company
|
gptkbp:bfsLayer
|
3
|
gptkbp:bfsParent
|
gptkb:software
|
gptkbp:addresses
|
gptkb:software
|
gptkbp:aims_to
|
Enhance Security Posture
|
gptkbp:audience
|
IT Professionals
|
gptkbp:collaborated_with
|
Public-Private Partnerships
|
gptkbp:contains
|
gptkb:historical_event
|
gptkbp:content_type
|
Technical Report
|
gptkbp:contributed_to
|
Cybersecurity Best Practices
|
gptkbp:developed_by
|
gptkb:NIST_Cybersecurity_Division
|
gptkbp:discusses
|
gptkb:Company
|
gptkbp:emphasizes
|
Least Privilege Access
|
gptkbp:focus_area
|
gptkb:Company
|
https://www.w3.org/2000/01/rdf-schema#label
|
NIST Special Publication 800-207
|
gptkbp:includes
|
Implementation Scenarios
|
gptkbp:is_a_document_that
|
800-207
|
gptkbp:is_a_framework_for
|
gptkb:software
|
gptkbp:is_adopted_by
|
gptkb:Educational_Institution
Private Sector Organizations
|
gptkbp:is_aligned_with
|
International Standards
|
gptkbp:is_available_on
|
NIST Website
|
gptkbp:is_cited_in
|
gptkb:Company
Academic Research
Policy Documents
Legislative Proposals
|
gptkbp:is_discussed_in
|
Webinars
Podcasts
|
gptkbp:is_evaluated_by
|
Case Studies
Security Audits
|
gptkbp:is_influenced_by
|
gptkb:standard
|
gptkbp:is_informed_by
|
gptkb:software
|
gptkbp:is_integrated_with
|
Security Operations Centers
|
gptkbp:is_part_of
|
gptkb:Federal_Information_Security_Modernization_Act
gptkb:NIST_Risk_Management_Framework
gptkb:NIST_Special_Publication_800_series
NIST Cybersecurity Publications
|
gptkbp:is_promoted_by
|
Conferences
Cybersecurity Organizations
|
gptkbp:is_referenced_in
|
Training Materials
Federal Agencies
Technical Blogs
|
gptkbp:is_related_to
|
gptkb:software
|
gptkbp:is_reviewed_by
|
Cybersecurity Experts
|
gptkbp:is_supported_by
|
Research Grants
Government Initiatives
|
gptkbp:is_used_in
|
Compliance Assessments
|
gptkbp:is_utilized_in
|
Incident Response Planning
Security Assessments
Security Frameworks
|
gptkbp:part_of
|
gptkb:NIST_Special_Publication_series
|
gptkbp:provides
|
Security Controls
|
gptkbp:provides_information_on
|
Implementing Zero Trust Architecture
|
gptkbp:published_by
|
gptkb:Research_Institute
|
gptkbp:published_year
|
August 2020
|
gptkbp:related_to
|
gptkb:software
|
gptkbp:replaced_by
|
NISTSP 800-207 Draft
|
gptkbp:status
|
gptkb:Final
|
gptkbp:suitable_for
|
Advisory Committees
|
gptkbp:supports
|
gptkb:software
|
gptkbp:title
|
Zero Trust Architecture
|
gptkbp:updates
|
NISTSP 800-53
|