gptkbp:instance_of
|
gptkb:publishing_company
|
gptkbp:bfsLayer
|
4
|
gptkbp:bfsParent
|
gptkb:NIST_Cybersecurity_Framework_for_Communications_Sector
gptkb:NIST_Cybersecurity_Framework_for_Financial_Services
gptkb:NIST_Cybersecurity_Framework_Manufacturing_Profile
gptkb:National_Institute_of_Standards_and_Technology_Cybersecurity_Framework
|
gptkbp:addresses
|
privacy risks
|
gptkbp:aims_to
|
enhance information security
|
gptkbp:applies_to
|
federal information systems
|
gptkbp:collaborated_with
|
various stakeholders
|
gptkbp:contains
|
control families
|
gptkbp:developed_by
|
NIST Special Publication Working Group
|
gptkbp:first_published
|
gptkb:2005
|
gptkbp:focuses_on
|
security controls
|
https://www.w3.org/2000/01/rdf-schema#label
|
NIST Special Publication 800-53
|
gptkbp:includes
|
assessment procedures
|
gptkbp:is_a_framework_for
|
security assessments
|
gptkbp:is_adopted_by
|
state and local governments
private sector organizations
|
gptkbp:is_available_on
|
NIST website
|
gptkbp:is_cited_in
|
gptkb:OMB_Circular_A-130
|
gptkbp:is_compatible_with
|
ISO/ IEC standards
|
gptkbp:is_considered
|
a comprehensive guide
|
gptkbp:is_considered_as
|
best practice
|
gptkbp:is_critical_for
|
information assurance
|
gptkbp:is_designed_to
|
protect organizational operations
|
gptkbp:is_essential_for
|
data protection
|
gptkbp:is_evaluated_by
|
gptkb:auditors
|
gptkbp:is_influential_in
|
cybersecurity policy
|
gptkbp:is_informed_by
|
emerging threats
|
gptkbp:is_integrated_with
|
other NIST publications
|
gptkbp:is_often_used_in
|
for cybersecurity standards
|
gptkbp:is_part_of
|
gptkb:Federal_Information_Security_Modernization_Act
gptkb:Company
gptkb:NIST_Special_Publication_series
|
gptkbp:is_promoted_by
|
gptkb:NIST
|
gptkbp:is_referenced_in
|
gptkb:FISMA
cybersecurity frameworks
security training programs
|
gptkbp:is_reviewed_by
|
security experts
to ensure relevance
|
gptkbp:is_supported_by
|
government funding
|
gptkbp:is_used_by
|
government agencies
|
gptkbp:is_used_for
|
compliance assessment
|
gptkbp:is_used_in
|
risk assessments
|
gptkbp:is_used_to
|
develop security policies
|
gptkbp:is_utilized_in
|
incident response planning
contractors
|
gptkbp:latest_version
|
Revision 5
|
gptkbp:provides
|
security and privacy controls
|
gptkbp:provides_information_on
|
risk management framework
|
gptkbp:published_by
|
gptkb:Research_Institute
|
gptkbp:related_to
|
gptkb:Company
|
gptkbp:requires
|
federal agencies
|
gptkbp:supports
|
continuous monitoring
|
gptkbp:title
|
Security and Privacy Controls for Information Systems and Organizations
|
gptkbp:updates
|
gptkb:2020
few years
|