the NIST Cybersecurity Framework
GPTKB entity
Statements (50)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:Company
|
gptkbp:aimsTo |
improve cybersecurity risk management
|
gptkbp:composedOf |
Core
Profiles Implementation Tiers |
gptkbp:developedBy |
gptkb:National_Institute_of_Standards_and_Technology
|
gptkbp:hasVolunteers |
for organizations
|
https://www.w3.org/2000/01/rdf-schema#label |
the NIST Cybersecurity Framework
|
gptkbp:includes |
Detect function
Identify function Protect function Recover function Respond function |
gptkbp:isAvailableIn |
multiple formats
|
gptkbp:isBasedOn |
existing standards
|
gptkbp:isConsidered |
best practice
|
gptkbp:isDesignedFor |
be scalable
be adaptable be cost-effective |
gptkbp:isEvaluatedBy |
regulatory bodies
auditors cybersecurity professionals |
gptkbp:isInfluencedBy |
ISO/IEC 27001
NIST Special Publication 800-53 COBIT |
gptkbp:isNotedFor |
for compliance
|
gptkbp:isPartOf |
different types of organizations
|
gptkbp:isPromotedBy |
gptkb:U.S._government
industry associations cybersecurity organizations |
gptkbp:isReviewedBy |
stakeholders
experts practitioners |
gptkbp:isSupportedBy |
gptkb:NIST_Cybersecurity_Framework_Manufacturing_Profile
training resources online tools implementation guides NIST Cybersecurity Framework Critical Infrastructure Profile NIST_Cybersecurity_Framework_Healthcare_Profile |
gptkbp:isUpdatedBy |
periodically
|
gptkbp:isUsedFor |
incident response planning
risk assessment security program management |
gptkbp:isUsedIn |
government agencies
private sector critical infrastructure sectors |
gptkbp:promotes |
risk management
|
gptkbp:providesGuidanceOn |
organizations
|
gptkbp:publishedIn |
2014
|
gptkbp:supports |
cybersecurity resilience
|