{
  "$TMF_VERSION": "1.4",
  "PublicationDateTime": "2021-04-26T00:00:00.000Z",
  "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-34 (3): Hardware-Based Protection.",
  "Keywords": [
    "800-53",
    "Communications Protection",
    "Hardware-Based Protection",
    "NIST",
    "Security",
    "System"
  ],
  "Issuer": {
    "Identifier": "https://trustmarkinitiative.org/",
    "PrimaryContact": {
      "Email": "help@trustmarkinitiative.org",
      "Telephone": "555-555-5555",
      "Kind": "PRIMARY",
      "WebsiteURL": "https://trustmarkinitiative.org/",
      "Responder": ""
    },
    "Name": "TMI"
  },
  "Sources": [{
    "Identifier": "SP800-53R4",
    "Reference": "NIST Special Publication 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations, National Institute of Standards and Technology, April 2013 (Includes updates as of 01-15-2014). Available at <a href=\"http://dx.doi.org/10.6028/NIST.SP.800-53r4\">http://dx.doi.org/10.6028/NIST.SP.800-53r4<\/a>.",
    "$id": "source-2112165102"
  }],
  "Name": "NIST SP 800-53 r4 Security Control SC-34 (3): Hardware-Based Protection",
  "TrustExpression": "TD_ref1 and TD_ref2",
  "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-34-_3__-hardware-based-protection/4/",
  "Version": "4",
  "References": {"TrustmarkDefinitionRequirements": [
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tds/non-modifiable-executable-programs-_-hardware-based-protection-_-hardware-write-protect/1.0/",
      "Description": "Defines conformance and assessment criteria for verifying that an organization employs hardware-based, write-protect for organization-defined information system firmware components.",
      "Number": 1,
      "Version": "1.0",
      "TrustmarkDefinitionReference": {
        "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tds/non-modifiable-executable-programs-_-hardware-based-protection-_-hardware-write-protect/1.0/",
        "Description": "Defines conformance and assessment criteria for verifying that an organization employs hardware-based, write-protect for organization-defined information system firmware components.",
        "Number": 1,
        "Version": "1.0",
        "Name": "Non-Modifiable Executable Programs | Hardware-Based Protection | Hardware Write-Protect"
      },
      "$Type": "TrustmarkDefinitionRequirement",
      "Name": "Non-Modifiable Executable Programs | Hardware-Based Protection | Hardware Write-Protect",
      "$id": "TD_ref1"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tds/non-modifiable-executable-programs-_-hardware-based-protection-_-procedures-for-managing-write-protect/1.0/",
      "Description": "Defines conformance and assessment criteria for verifying that an organization implements specific procedures for organization-defined authorized individuals to manually disable hardware write-protect for firmware modifications and re-enable the write-protect prior to returning to operational mode.",
      "Number": 2,
      "Version": "1.0",
      "TrustmarkDefinitionReference": {
        "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tds/non-modifiable-executable-programs-_-hardware-based-protection-_-procedures-for-managing-write-protect/1.0/",
        "Description": "Defines conformance and assessment criteria for verifying that an organization implements specific procedures for organization-defined authorized individuals to manually disable hardware write-protect for firmware modifications and re-enable the write-protect prior to returning to operational mode.",
        "Number": 2,
        "Version": "1.0",
        "Name": "Non-Modifiable Executable Programs | Hardware-Based Protection | Procedures for Managing Write-Protect"
      },
      "$Type": "TrustmarkDefinitionRequirement",
      "Name": "Non-Modifiable Executable Programs | Hardware-Based Protection | Procedures for Managing Write-Protect",
      "$id": "TD_ref2"
    }
  ]},
  "Primary": "false",
  "LegalNotice": "This document and the information contained herein is provided on an \"AS IS\" basis, and the Georgia Tech Research Institute disclaims all warranties, express or implied, including but not limited to any warranty that the use of the information herein will not infringe any rights or any implied warranties or merchantability or fitness for a particular purpose. In addition, the Georgia Tech Research Institute disclaims legal liability for any loss incurred as a result of the use or reliance on the document or the information contained herein.",
  "$Type": "TrustInteroperabilityProfile"
}