{
  "$TMF_VERSION": "1.4",
  "PublicationDateTime": "2021-04-26T00:00:00.000Z",
  "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (4): Threat Modeling / Vulnerability Analysis.",
  "Keywords": [
    "800-53",
    "NIST",
    "Security",
    "Services Acquisition",
    "System",
    "Threat Modeling / Vulnerability Analysis"
  ],
  "Issuer": {
    "Identifier": "https://trustmarkinitiative.org/",
    "PrimaryContact": {
      "Email": "help@trustmarkinitiative.org",
      "Telephone": "555-555-5555",
      "Kind": "PRIMARY",
      "WebsiteURL": "https://trustmarkinitiative.org/",
      "Responder": ""
    },
    "Name": "TMI"
  },
  "Sources": [{
    "Identifier": "SP800-53R4",
    "Reference": "NIST Special Publication 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations, National Institute of Standards and Technology, April 2013 (Includes updates as of 01-15-2014). Available at <a href=\"http://dx.doi.org/10.6028/NIST.SP.800-53r4\">http://dx.doi.org/10.6028/NIST.SP.800-53r4<\/a>.",
    "$id": "source-2112165102"
  }],
  "Name": "NIST SP 800-53 r4 Security Control SA-15 (4): Threat Modeling / Vulnerability Analysis",
  "TrustExpression": "TD_ref1",
  "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sa-15-_4__-threat-modeling-_-vulnerability-analysis/4/",
  "Version": "4",
  "References": {"TrustmarkDefinitionRequirements": [{
    "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tds/development-process_-standards_-and-tools-_-threat-modeling-_-vulnerability-analysis/1.0/",
    "Description": "Defines conformance and assessment criteria for verifying that an organization requires that developers perform threat modeling and a vulnerability analysis for the information system at organization-defined breadth/depth that:\n(a) Uses organization-defined information concerning impact, environment of operations, known or assumed threats, and acceptable risk levels;\n(b) Employs organization-defined tools and methods; and\n(c) Produces evidence that meets organization-defined acceptance criteria.\n.",
    "Number": 1,
    "Version": "1.0",
    "TrustmarkDefinitionReference": {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tds/development-process_-standards_-and-tools-_-threat-modeling-_-vulnerability-analysis/1.0/",
      "Description": "Defines conformance and assessment criteria for verifying that an organization requires that developers perform threat modeling and a vulnerability analysis for the information system at organization-defined breadth/depth that:\n(a) Uses organization-defined information concerning impact, environment of operations, known or assumed threats, and acceptable risk levels;\n(b) Employs organization-defined tools and methods; and\n(c) Produces evidence that meets organization-defined acceptance criteria.\n.",
      "Number": 1,
      "Version": "1.0",
      "Name": "Development Process, Standards, And Tools | Threat Modeling / Vulnerability Analysis"
    },
    "$Type": "TrustmarkDefinitionRequirement",
    "Name": "Development Process, Standards, And Tools | Threat Modeling / Vulnerability Analysis",
    "$id": "TD_ref1"
  }]},
  "Primary": "false",
  "LegalNotice": "This document and the information contained herein is provided on an \"AS IS\" basis, and the Georgia Tech Research Institute disclaims all warranties, express or implied, including but not limited to any warranty that the use of the information herein will not infringe any rights or any implied warranties or merchantability or fitness for a particular purpose. In addition, the Georgia Tech Research Institute disclaims legal liability for any loss incurred as a result of the use or reliance on the document or the information contained herein.",
  "$Type": "TrustInteroperabilityProfile"
}