gptkbp:instance_of
|
gptkb:Publications
|
gptkbp:addresses
|
Privacy Risks
|
gptkbp:applies_to
|
Federal Information Systems
|
gptkbp:available_at
|
NIST Website
|
gptkbp:collaborated_with
|
Industry Experts
Federal Agencies
|
gptkbp:contains
|
gptkb:accordion
|
gptkbp:content_type
|
Technical Report
|
gptkbp:developed_by
|
gptkb:NIST_Computer_Security_Division
|
gptkbp:focuses_on
|
gptkb:Risk_Management
|
https://www.w3.org/2000/01/rdf-schema#label
|
NIST Special Publication 800-37 Revision 2
|
gptkbp:includes
|
gptkb:Best_Practices
|
gptkbp:is_a_framework_for
|
Information Security Risk Management
|
gptkbp:is_adopted_by
|
Risk Management Training
U. S. Government Agencies
|
gptkbp:is_aligned_with
|
gptkb:National_Cybersecurity_Strategy
Federal Cybersecurity Strategy
|
gptkbp:is_applicable_to
|
gptkb:cloud_computing
|
gptkbp:is_cited_in
|
gptkb:NIST_Special_Publication_800-53
Cybersecurity Policies
Information Security Standards
|
gptkbp:is_designed_for
|
gptkb:Risk_Management
|
gptkbp:is_distributed_by
|
NIST Publications Catalog
|
gptkbp:is_evaluated_by
|
Effectiveness
Independent Reviewers
|
gptkbp:is_incorporated_in
|
Federal Risk Management Framework
Cybersecurity Risk Management Programs
|
gptkbp:is_influenced_by
|
gptkb:ISO/_IEC_27001
|
gptkbp:is_informed_by
|
Emerging Threats
Risk Management Best Practices
|
gptkbp:is_part_of
|
gptkb:NIST_Risk_Management_Framework
gptkb:Cybersecurity
gptkb:NIST_Special_Publication_series
Risk Management Framework Series
|
gptkbp:is_promoted_by
|
Cybersecurity Conferences
Cybersecurity Awareness Campaigns
|
gptkbp:is_promoted_through
|
gptkb:Workshops
|
gptkbp:is_referenced_in
|
gptkb:Federal_Information_Security_Modernization_Act
gptkb:NIST_SP_800-171
Cybersecurity Framework Implementation
Risk Management Framework Implementation Guide
|
gptkbp:is_related_to
|
gptkb:Cybersecurity
|
gptkbp:is_reviewed_by
|
Stakeholders
Every Year
Cybersecurity Experts
|
gptkbp:is_supported_by
|
Training Materials
Guidance Documents
|
gptkbp:is_updated_by
|
Every Few Years
NIST Special Publication 800-37 Revision 3
|
gptkbp:is_used_for
|
Compliance Assessment
|
gptkbp:is_used_in
|
gptkb:Federal_Risk_and_Authorization_Management_Program
|
gptkbp:is_used_to
|
Assess Security Controls
|
gptkbp:is_utilized_by
|
Private Sector Organizations
Risk Management Professionals
|
gptkbp:is_utilized_for
|
Incident Response Planning
System Security Planning
|
gptkbp:provides
|
Implementation Guidance
|
gptkbp:provides_guidance_on
|
Security and Privacy Risk Management
|
gptkbp:published_by
|
gptkb:NIST
|
gptkbp:release_date
|
2020-09-10
|
gptkbp:replaces
|
gptkb:NIST_Special_Publication_800-37_Revision_1
|
gptkbp:status
|
gptkb:Final
|
gptkbp:supports
|
Continuous Monitoring
|
gptkbp:target_audience
|
Information Security Professionals
|
gptkbp:bfsParent
|
gptkb:NIST_Risk_Management_Framework
|
gptkbp:bfsLayer
|
5
|