gptkbp:instanceOf
|
gptkb:NIST_Special_Publication
|
gptkbp:author
|
gptkb:Andrew_Regenscheid
gptkb:Karen_Scarfone
gptkb:Michael_Bartock
gptkb:Murugiah_Souppaya
|
gptkbp:citesStandard
|
gptkb:NIST_SP_800-53
gptkb:NIST_SP_800-37
gptkb:NIST_SP_800-115
|
gptkbp:countryOfOrigin
|
gptkb:United_States
|
gptkbp:documentType
|
800-190
|
gptkbp:focusesOn
|
container orchestration
container management
container security
application containers
|
gptkbp:guidanceSystem
|
securing containerized applications
|
gptkbp:hasSection
|
security recommendations
container image security
container lifecycle
container orchestration security
monitoring and auditing
networking and storage security
runtime security
threats to container environments
|
https://www.w3.org/2000/01/rdf-schema#label
|
SP 800-190
|
gptkbp:language
|
English
|
gptkbp:publicationDate
|
2017-12
|
gptkbp:publishedBy
|
gptkb:National_Institute_of_Standards_and_Technology
|
gptkbp:series
|
gptkb:NIST_Special_Publication_800_Series
|
gptkbp:targetAudience
|
IT professionals
system administrators
security practitioners
|
gptkbp:title
|
gptkb:Application_Container_Security_Guide
|
gptkbp:url
|
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-190.pdf
|
gptkbp:bfsParent
|
gptkb:NIST
|
gptkbp:bfsLayer
|
5
|