Statements (32)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:Process
|
| gptkbp:appliesTo |
Networks
Applications Physical Security IT Systems |
| gptkbp:frequency |
Continuous
Periodic |
| gptkbp:goal |
Ensure Compliance
Reduce Risk Improve Security Posture |
| gptkbp:method |
Vulnerability Assessment
Penetration Testing Configuration Review Security Audit |
| gptkbp:output |
Security Assessment Report
Risk Register Remediation Plan |
| gptkbp:performedBy |
Internal Teams
Security Professionals Third-party Auditors |
| gptkbp:purpose |
Assess Risk Exposure
Evaluate Security Controls Identify Security Vulnerabilities |
| gptkbp:relatedTo |
gptkb:Information_Security
Risk Management |
| gptkbp:standardizedBy |
gptkb:HIPAA
gptkb:PCI_DSS gptkb:NIST_SP_800-53 gptkb:ISO/IEC_27001 |
| gptkbp:bfsParent |
gptkb:NIST_SP_800-171
|
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
Security Assessment
|