Statements (52)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Field of study
|
gptkbp:appliesTo |
gptkb:Critical_Infrastructure
gptkb:Government_Agencies Organizations |
gptkbp:component |
Monitoring
Risk Assessment Policy Development Implementation of Controls Review and Improvement |
gptkbp:goal |
Mitigate risks
Ensure business continuity Maintain compliance Protect assets |
https://www.w3.org/2000/01/rdf-schema#label |
Security Management
|
gptkbp:practicedIn |
gptkb:Chief_Information_Security_Officers
Security Consultants Security Managers |
gptkbp:relatedTo |
gptkb:Access_Control
gptkb:Information_Security gptkb:Security_Awareness_Training gptkb:ISO/IEC_27001 Risk Management Business Continuity Security Operations Compliance Corporate Security Incident Response Disaster Recovery Physical Security Security Policy Security Controls Asset Protection Security Audit Security Governance Security Risk Assessment Security Strategy |
gptkbp:requires |
Security Procedures
Security Policies Continuous Improvement Security Training Incident Response Plan Regular Audits |
gptkbp:standardizedBy |
gptkb:HIPAA
gptkb:PCI_DSS gptkb:NIST_SP_800-53 gptkb:ISO/IEC_27001 gptkb:GDPR gptkb:Sarbanes-Oxley_Act gptkb:SOC_2 gptkb:COBIT |
gptkbp:bfsParent |
gptkb:Check_Point
|
gptkbp:bfsLayer |
5
|