gptkbp:instanceOf
|
gptkb:publishing_company
|
gptkbp:appliesTo
|
Federal_Information_Systems
|
gptkbp:contains
|
control families
|
gptkbp:focusesOn
|
information security
|
https://www.w3.org/2000/01/rdf-schema#label
|
NIST Special Publication 800-53 Revision 4
|
gptkbp:includes
|
privacy controls
|
gptkbp:isAttendedBy
|
international organizations
state governments
private sector organizations
|
gptkbp:isCitedBy
|
gptkb:Federal_Information_Security_Modernization_Act
gptkb:NIST_SP_800-30
NIST Cybersecurity Framework
GAO_reports
|
gptkbp:isCitedIn
|
gptkb:NIST_SP_800-160
gptkb:OMB_Circular_A-130
FISMA reports
|
gptkbp:isInfluencedBy
|
ISO/IEC 27001
|
gptkbp:isPartOf
|
gptkb:NIST_Risk_Management_Framework
NIST Special Publication series
federal cybersecurity strategy
NIST cybersecurity publications
federal risk management framework
|
gptkbp:isReferencedIn
|
gptkb:NIST_SP_800-37
gptkb:NIST_SP_800-171
gptkb:NIST_SP_800-53A
gptkb:NIST_SP_800-60
gptkb:NIST_SP_800-53C
gptkb:NIST_SP_800-53B
FIPS 199
|
gptkbp:isRelatedTo
|
risk management
data protection
cybersecurity frameworks
security frameworks
information assurance
|
gptkbp:isUpdatedBy
|
gptkb:NIST_Special_Publication_800-53_Revision_5
|
gptkbp:isUsedBy
|
gptkb:U.S._Government
|
gptkbp:isUsedFor
|
security assessments
compliance assessment
system security planning
|
gptkbp:isUsedIn
|
security training
|
gptkbp:isUtilizedFor
|
audit purposes
policy development
federal agencies
contractors
|
gptkbp:isVisitedBy
|
gptkb:NIST_Computer_Security_Division
gptkb:NIST's_Federal_Information_Security_Program
federal information systems
|
gptkbp:provides
|
security controls
|
gptkbp:providesGuidanceOn
|
risk assessment
|
gptkbp:publicationDate
|
April 2013
|
gptkbp:publishedBy
|
gptkb:National_Institute_of_Standards_and_Technology
|
gptkbp:replacedBy
|
gptkb:NIST_Special_Publication_800-53_Revision_3
|
gptkbp:title
|
Security_and_Privacy_Controls_for_Federal_Information_Systems_and_Organizations
|