FBCA CP Section 5.4.8, Vulnerability Assessments, v2.27
Profile of base requirements for the Federal Bridge Certificate Authority (FBCA) Certificate Policy (CP), version 2.27, Section 5.4.8, Vulnerability Assessments, for entities operating at all levels of assurance (LOA).
Identifier |
https://artifacts.trustmarkinitiative.org/lib/tips/fbca-cp-section-5.4.8_-vulnerability-assessments/2.27/
|
Publication Date |
2021-02-04 |
Issuing Organization |
|
Keywords |
PIV-I,
Security,
Identity,
Federal Bridge
|
Legal Notice |
This artifact is published by the Georgia Tech Research Institute (GTRI) as part of the Trustmark Initiative. This artifact and the information contained herein is provided on an "AS IS" basis, and GTRI disclaims all warranties, express or implied, including but not limited to any warranty that the use of the information herein will not infringe any rights or any implied warranties or merchantability or fitness for a particular purpose. In addition, GTRI disclaims legal liability for any loss incurred as a result of the use or reliance on the document or the information contained herein.
|
Loading...
Trust Expression:
TD_InformationSystemMonitoringAttackDetection and TD_InformationSystemMonitoringUnauthorizedConnections and TD_InformationSystemMonitoringUnauthorizedUse
References (3)
TD
Information System Monitoring - Attack Detection, v1.0
|
Description |
Defines conformance and assessment criteria for compliance with minimum security requirements for information system monitoring - attack detection as related to overall system and information integrity requirements. |
ID |
TD_InformationSystemMonitoringAttackDetection |
Provider Reference |
|
TD
Information System Monitoring - Unauthorized Connections, v1.0
|
Description |
Defines conformance and assessment criteria for compliance with minimum security requirements for information system monitoring - unauthorized connections as related to overall system and information integrity requirements. |
ID |
TD_InformationSystemMonitoringUnauthorizedConnections |
Provider Reference |
|
TD
Information System Monitoring - Unauthorized Use, v1.0
|
Description |
Defines conformance and assessment criteria for compliance with minimum security requirements for information system monitoring - unauthorized use as related to overall system and information integrity requirements. |
ID |
TD_InformationSystemMonitoringUnauthorizedUse |
Provider Reference |
|
Sources (1)
FBCA-CP |
X.509 Certificate Policy For the Federal Bridge Certification Authority (FBCA), Version 2.27. December 2, 2013. |
Loading…