gptkbp:instanceOf
|
concept
|
gptkbp:appliesTo
|
Organizations
Personnel
IT Systems
Physical Facilities
|
gptkbp:category
|
Corrective Control
Detective Control
Preventive Control
|
gptkbp:example
|
gptkb:Access_Control
gptkb:Security_Awareness_Training
gptkb:fire
Patch Management
Encryption
Change Management
Multi-factor Authentication
Antivirus Software
intrusion prevention system
Network Segmentation
Security Policy
Data Loss Prevention
Video Surveillance
Security Monitoring
Security Audits
Vulnerability Scanning
Penetration Testing
Incident Response Plan
Backup Procedures
Physical Locks
User Access Reviews
|
gptkbp:goal
|
Ensure Compliance
Mitigate Threats
Reduce Vulnerabilities
|
gptkbp:hasType
|
Physical Control
Technical Control
Administrative Control
|
https://www.w3.org/2000/01/rdf-schema#label
|
Security Control
|
gptkbp:purpose
|
Reduce Risk
Protect Assets
Prevent Security Breaches
|
gptkbp:regulates
|
gptkb:SOX
gptkb:FISMA
gptkb:GDPR
gptkb:GLBA
Laws and Regulations
|
gptkbp:relatedTo
|
gptkb:Information_Security
Cybersecurity
Risk Management
|
gptkbp:usedIn
|
gptkb:HIPAA
gptkb:PCI_DSS
gptkb:NIST_SP_800-53
gptkb:ISO_27001
Compliance Frameworks
|
gptkbp:bfsParent
|
gptkb:Calcutta_Police
gptkb:AU-10_Non-repudiation
gptkb:PE-11_Emergency_Power
gptkb:PE-3_Physical_Access_Control
gptkb:PE-9_Power_Equipment_and_Cabling
gptkb:SC-20_Secure_Name/Address_Resolution_Service_(Authoritative_Source)
gptkb:SC-21_Secure_Name/Address_Resolution_Service_(Recursive_or_Caching_Resolver)
gptkb:SI-3_Malicious_Code_Protection
gptkb:SI-4_Information_System_Monitoring
gptkb:SI-6_Security_Function_Verification
|
gptkbp:bfsLayer
|
8
|