Statements (32)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Process
|
gptkbp:appliesTo |
Networks
Applications Physical Security IT Systems |
gptkbp:frequency |
Continuous
Periodic |
gptkbp:goal |
Ensure Compliance
Reduce Risk Improve Security Posture |
https://www.w3.org/2000/01/rdf-schema#label |
Security Assessment
|
gptkbp:method |
Vulnerability Assessment
Penetration Testing Configuration Review Security Audit |
gptkbp:output |
Security Assessment Report
Risk Register Remediation Plan |
gptkbp:performedBy |
Internal Teams
Security Professionals Third-party Auditors |
gptkbp:purpose |
Assess Risk Exposure
Evaluate Security Controls Identify Security Vulnerabilities |
gptkbp:relatedTo |
gptkb:Information_Security
Risk Management |
gptkbp:standardizedBy |
gptkb:HIPAA
gptkb:PCI_DSS gptkb:NIST_SP_800-53 gptkb:ISO/IEC_27001 |
gptkbp:bfsParent |
gptkb:NIST_SP_800-171
|
gptkbp:bfsLayer |
7
|