NIST cybersecurity framework
GPTKB entity
Statements (65)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:Company
|
gptkbp:bfsLayer |
4
|
gptkbp:bfsParent |
gptkb:National_Cybersecurity_Strategy
|
gptkbp:adapted_into |
different organizational needs
|
gptkbp:aims_to |
improve cybersecurity risk management
|
gptkbp:based_on |
existing standards and guidelines
|
gptkbp:collaborated_with |
academic institutions
industry experts |
gptkbp:consists_of |
five core functions
|
gptkbp:developed_by |
gptkb:Research_Institute
|
gptkbp:encourages |
collaboration among stakeholders
|
gptkbp:facilitates |
communication about cybersecurity risks
|
https://www.w3.org/2000/01/rdf-schema#label |
NIST cybersecurity framework
|
gptkbp:includes |
Protect
Recover Identify Detect Respond |
gptkbp:is_adopted_by |
non-profit organizations
international organizations various industries critical infrastructure sectors |
gptkbp:is_aligned_with |
international standards
national security objectives |
gptkbp:is_designed_for |
organizations of all sizes
|
gptkbp:is_documented_in |
gptkb:NIST_Special_Publication_800-171
gptkb:NIST_Special_Publication_800-37 |
gptkbp:is_evaluated_by |
third-party assessments
cybersecurity assessments cybersecurity audits cybersecurity maturity assessments cybersecurity benchmarks |
gptkbp:is_incorporated_in |
cybersecurity policies
|
gptkbp:is_influenced_by |
gptkb:ISO/_IEC_27001
|
gptkbp:is_informed_by |
cybersecurity research
|
gptkbp:is_integrated_with |
business continuity plans
other risk management frameworks |
gptkbp:is_part_of |
gptkb:NIST_Special_Publication_800-53
|
gptkbp:is_promoted_by |
government initiatives
workshops and seminars publications cybersecurity conferences cybersecurity organizations |
gptkbp:is_referenced_in |
executive orders
cybersecurity legislation |
gptkbp:is_related_to |
cybersecurity best practices
|
gptkbp:is_reviewed_by |
stakeholders
|
gptkbp:is_supported_by |
online resources
training resources government funding cybersecurity frameworks NIST Cybersecurity Framework Toolkit |
gptkbp:is_used_by |
government agencies
private sector organizations |
gptkbp:is_used_for |
compliance purposes
|
gptkbp:is_used_to |
assess cybersecurity posture
|
gptkbp:is_utilized_in |
incident response planning
cybersecurity training programs risk assessment processes |
gptkbp:provides |
guidance for organizations
a common language for cybersecurity |
gptkbp:published_by |
gptkb:2014
|
gptkbp:supports |
risk management
|
gptkbp:updates |
gptkb:2020
|
gptkbp:volunteer_opportunities |
gptkb:theorem
|