FBCA CP Section 6.5.1.1, Computer and Security Controls for PKI Certificate Authority Remote Workstations, v2.27
Profile of requirements for the Federal Bridge Certificate Authority (FBCA) Certificate Policy (CP), FBCA CP Section 6.5.1, Computer and Security Controls for PKI Certificate Authority Remote Workstations
Identifier |
https://artifacts.trustmarkinitiative.org/lib/tips/fbca-cp-section-6.5.1.1_-computer-and-security-controls-for-pki-certificate-authority-remote-workstations/2.27/
|
Publication Date |
2018-10-30 |
Issuing Organization |
|
Keywords |
PIV-I,
Security,
Identity,
Federal Bridge
|
Legal Notice |
This artifact is published by the Georgia Tech Research Institute (GTRI) as part of the Trustmark Initiative. This artifact and the information contained herein is provided on an "AS IS" basis, and GTRI disclaims all warranties, express or implied, including but not limited to any warranty that the use of the information herein will not infringe any rights or any implied warranties or merchantability or fitness for a particular purpose. In addition, GTRI disclaims legal liability for any loss incurred as a result of the use or reliance on the document or the information contained herein.
|
Loading...
Trust Expression:
TD_IdentificationandAuthenticationofOrganizationalUsers and TD_AccessEnforcement and TD_RoleBasedAccessControl and TD_SystemProcessIsolation and TD_DocumentedContingencyPlanningPolicy
References (5)
TD
Identification and Authentication of Organizational Users, v1.0
|
Description |
Defines conformance and assessment criteria for compliance with minimum security requirements for identification and authentication of organizational users as related to overall identification and authentication requirements. |
ID |
TD_IdentificationandAuthenticationofOrganizationalUsers |
Provider Reference |
|
TD
Access Enforcement, v1.0
|
Description |
Defines conformance and assessment criteria for compliance with minimum security requirements for access enforcement as related to overall access control requirements. |
ID |
TD_AccessEnforcement |
Provider Reference |
|
TD
Role-Based Access Control, v1.0
|
Description |
Defines conformance and assessment criteria for verifying that an information system enforces a role-based access control policy over defined subjects and objects and controls access based upon organization-defined roles and users authorized to assume such roles. |
ID |
TD_RoleBasedAccessControl |
Provider Reference |
|
TD
System Process Isolation, v1.0
|
Description |
Defines conformance and assessment criteria for compliance with minimum security requirements for system process isolation as related to overall system and communications protection requirements. |
ID |
TD_SystemProcessIsolation |
Provider Reference |
|
TD
Documented Contingency Planning Policy, v1.0
|
Description |
Defines conformance and assessment criteria for compliance with minimum security requirements for documented contingency planning policy as related to overall contingency planning requirements. |
ID |
TD_DocumentedContingencyPlanningPolicy |
Provider Reference |
|
Loading…