Properties (49)
Predicate | Object |
---|---|
gptkbp:instanceOf |
framework
|
gptkbp:developedBy |
gptkb:National_Institute_of_Standards_and_Technology
|
gptkbp:enables |
compliance reporting
|
gptkbp:facilitates |
security automation
|
https://www.w3.org/2000/01/rdf-schema#label |
SCAP
|
gptkbp:includes |
gptkb:Security_Content_Automation_Protocol
Common Vulnerabilities and Exposures Open Vulnerability and Assessment Language Extensible Configuration Checklist Description Format |
gptkbp:isAttendedBy |
international organizations
|
gptkbp:isComposedOf |
multiple standards
|
gptkbp:isDocumentedIn |
NIST Special Publication 800-53
NIST Special Publication 800-126 NIST Special Publication 800-171 NIST Special Publication 800-30 NIST Special Publication 800-137 |
gptkbp:isLocatedIn |
various security tools
|
gptkbp:isPartOf |
gptkb:Security_Operations_Center
gptkb:Federal_Information_Security_Management_Act Compliance Management Security Governance Threat Intelligence Risk Assessment Process Cybersecurity Framework Information Assurance Security Operations National Cybersecurity Strategy Risk Management Framework Security Policy Development Security Architecture Incident Response Process Security_Risk_Management Vulnerability_Management_Program Continuous_Diagnostics_and_Mitigation |
gptkbp:isRelatedTo |
cybersecurity
information security |
gptkbp:isSupportedBy |
various vendors
|
gptkbp:isUpdatedBy |
NIST
|
gptkbp:isUsedFor |
policy compliance
vulnerability scanning configuration auditing |
gptkbp:provides |
configuration management
security compliance checking standardized vulnerability assessment |
gptkbp:purpose |
automate vulnerability management
|
gptkbp:supports |
automated security assessments
continuous monitoring |
gptkbp:usedBy |
government agencies
private sector organizations |