includesControl

120 triples
GPTKB property

Alternative names (2)
containsControl controllersIncluded

Random triples
Subject Object
gptkb:Audit_and_Accountability_(AU) gptkb:AU-5_Response_to_Audit_Processing_Failures
gptkb:Security_Assessment_and_Authorization gptkb:CA-1_Security_Assessment_and_Authorization_Policies_and_Procedures
gptkb:Media_Protection_(MP) gptkb:MP-1_Media_Protection_Policy_and_Procedures
gptkb:SANS_Top_20_Critical_Security_Controls Controlled Access Based on the Need to Know
gptkb:Physical_and_Environmental_Protection_(PE) gptkb:PE-9_Power_Equipment_and_Cabling
gptkb:System_and_Information_Integrity_(SI) gptkb:SI-5_Security_Alerts,_Advisories,_and_Directives
gptkb:Security_Assessment_and_Authorization_(CA) gptkb:CA-7_Continuous_Monitoring
gptkb:System_and_Communications_Protection_(SC) gptkb:SC-22_Architecture_and_Provisioning_for_Name/Address_Resolution_Service
gptkb:SANS_Top_20_Critical_Security_Controls Secure Configuration for Network Devices
gptkb:Physical_and_Environmental_Protection_(PE) gptkb:PE-5_Access_Control_for_Output_Devices
gptkb:System_and_Communications_Protection_(SC) gptkb:SC-15_Collaborative_Computing_Devices
gptkb:System_and_Services_Acquisition SA-12 Supply Chain Protection
gptkb:System_and_Information_Integrity gptkb:SI-4_Information_System_Monitoring
gptkb:Security_Assessment_and_Authorization gptkb:CA-5_Plan_of_Action_and_Milestones
gptkb:System_and_Information_Integrity_(SI) gptkb:SI-3_Malicious_Code_Protection
gptkb:SANS_Top_20_Critical_Security_Controls Application Software Security
gptkb:Media_Protection_(MP) gptkb:MP-5_Media_Transport
gptkb:System_and_Information_Integrity gptkb:SI-2_Flaw_Remediation
gptkb:SANS_Top_20_Critical_Security_Controls Secure Configuration for Hardware and Software
gptkb:Physical_and_Environmental_Protection_(PE) gptkb:PE-2_Physical_Access_Authorizations

Please wait…