NIST SP 800-60
E700394
NIST SP 800-60 is a U.S. National Institute of Standards and Technology guideline that provides a methodology for mapping federal information and information systems to security impact levels to support risk management and FISMA compliance.
Statements (46)
| Predicate | Object |
|---|---|
| instanceOf |
NIST Special Publication
ⓘ
U.S. federal government standard ⓘ information security guideline ⓘ |
| appliesTo |
federal information
ⓘ
federal information systems ⓘ |
| author | National Institute of Standards and Technology NERFINISHED ⓘ |
| basedOn | Federal Information Processing Standards Publication 199 NERFINISHED ⓘ |
| countryOfOrigin |
United States of America
ⓘ
surface form:
United States
|
| defines |
methodology for mapping information systems to security impact levels
ⓘ
methodology for mapping information to security impact levels ⓘ |
| focusesOn |
information security
ⓘ
risk management ⓘ security categorization ⓘ |
| governs |
mapping of management and support information types
ⓘ
mapping of mission-based information types ⓘ |
| hasPart |
Volume I
ⓘ
Volume II ⓘ |
| language | English ⓘ |
| objective |
facilitate selection of appropriate security controls
ⓘ
support consistent security categorization of federal information ⓘ support consistent security categorization of federal information systems ⓘ |
| partOfSeries | NIST Special Publication 800 series NERFINISHED ⓘ |
| publisher | National Institute of Standards and Technology NERFINISHED ⓘ |
| relatedTo |
FIPS 199
NERFINISHED
ⓘ
FIPS 200 NERFINISHED ⓘ NIST SP 800-37 NERFINISHED ⓘ NIST SP 800-53 NERFINISHED ⓘ |
| scope | civilian federal agencies ⓘ |
| supports |
Federal Information Security Management Act compliance
ⓘ
Federal Information Security Modernization Act compliance ⓘ federal information system risk management ⓘ |
| targetAudience |
federal agencies
ⓘ
information security program managers ⓘ information system owners ⓘ risk managers ⓘ |
| usedFor |
classifying information types
ⓘ
determining security impact levels ⓘ supporting system authorization decisions ⓘ |
| usesConcept |
availability impact level
ⓘ
confidentiality impact level ⓘ high impact ⓘ integrity impact level ⓘ low impact ⓘ moderate impact ⓘ |
| Volume I | Guide for Mapping Types of Information and Information Systems to Security Categories NERFINISHED ⓘ |
| Volume II | Appendices to Guide for Mapping Types of Information and Information Systems to Security Categories NERFINISHED ⓘ |
Referenced by (1)
Full triples — surface form annotated when it differs from this entity's canonical label.