{
  "$TMF_VERSION": "1.4",
  "PublicationDateTime": "2021-04-26T00:00:00.000Z",
  "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-7 (4): External Telecommunications Services. Applicable to MODERATE impact and HIGH impact systems.",
  "Keywords": [
    "800-53",
    "Communications Protection",
    "External Telecommunications Services",
    "High",
    "Moderate",
    "NIST",
    "Security",
    "System"
  ],
  "Issuer": {
    "Identifier": "https://trustmarkinitiative.org/",
    "PrimaryContact": {
      "Email": "help@trustmarkinitiative.org",
      "Telephone": "555-555-5555",
      "Kind": "PRIMARY",
      "WebsiteURL": "https://trustmarkinitiative.org/",
      "Responder": ""
    },
    "Name": "TMI"
  },
  "Sources": [{
    "Identifier": "SP800-53R4",
    "Reference": "NIST Special Publication 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations, National Institute of Standards and Technology, April 2013 (Includes updates as of 01-15-2014). Available at <a href=\"http://dx.doi.org/10.6028/NIST.SP.800-53r4\">http://dx.doi.org/10.6028/NIST.SP.800-53r4<\/a>.",
    "$id": "source-2112165102"
  }],
  "Name": "NIST SP 800-53 r4 Security Control SC-7 (4): External Telecommunications Services",
  "TrustExpression": "TD_ref1 and TD_ref2 and TD_ref3 and TD_ref4 and TD_ref5",
  "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-sc-7-_4__-external-telecommunications-services/4/",
  "Version": "4",
  "References": {"TrustmarkDefinitionRequirements": [
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tds/boundary-protection-_-external-telecommunications-services---managed-interfaces/1.0/",
      "Description": "Defines conformance and assessment criteria for verifying that an organization implements a managed interface for each external telecommunication service.",
      "Number": 1,
      "Version": "1.0",
      "TrustmarkDefinitionReference": {
        "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tds/boundary-protection-_-external-telecommunications-services---managed-interfaces/1.0/",
        "Description": "Defines conformance and assessment criteria for verifying that an organization implements a managed interface for each external telecommunication service.",
        "Number": 1,
        "Version": "1.0",
        "Name": "Boundary Protection | External Telecommunications Services - Managed Interfaces"
      },
      "$Type": "TrustmarkDefinitionRequirement",
      "Name": "Boundary Protection | External Telecommunications Services - Managed Interfaces",
      "$id": "TD_ref1"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tds/boundary-protection-_-external-telecommunications-services---traffic-flow-policies/1.0/",
      "Description": "Defines conformance and assessment criteria for verifying that an organization establishes a traffic flow policy for each managed interface.",
      "Number": 2,
      "Version": "1.0",
      "TrustmarkDefinitionReference": {
        "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tds/boundary-protection-_-external-telecommunications-services---traffic-flow-policies/1.0/",
        "Description": "Defines conformance and assessment criteria for verifying that an organization establishes a traffic flow policy for each managed interface.",
        "Number": 2,
        "Version": "1.0",
        "Name": "Boundary Protection | External Telecommunications Services - Traffic Flow Policies"
      },
      "$Type": "TrustmarkDefinitionRequirement",
      "Name": "Boundary Protection | External Telecommunications Services - Traffic Flow Policies",
      "$id": "TD_ref2"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tds/boundary-protection-_-external-telecommunications-services---protection-of-transmitted-information/1.0/",
      "Description": "Defines conformance and assessment criteria for verifying that an organization protects the confidentiality and integrity of the information being transmitted across each interface.",
      "Number": 3,
      "Version": "1.0",
      "TrustmarkDefinitionReference": {
        "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tds/boundary-protection-_-external-telecommunications-services---protection-of-transmitted-information/1.0/",
        "Description": "Defines conformance and assessment criteria for verifying that an organization protects the confidentiality and integrity of the information being transmitted across each interface.",
        "Number": 3,
        "Version": "1.0",
        "Name": "Boundary Protection | External Telecommunications Services - Protection of Transmitted Information"
      },
      "$Type": "TrustmarkDefinitionRequirement",
      "Name": "Boundary Protection | External Telecommunications Services - Protection of Transmitted Information",
      "$id": "TD_ref3"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tds/boundary-protection-_-external-telecommunications-services---review-of-traffic-flow-exceptions/1.0/",
      "Description": "Defines conformance and assessment criteria for verifying that an organization reviews exceptions to the traffic flow policy at an organization-defined frequency and removes exceptions that are no longer supported by an explicit mission/business need.",
      "Number": 4,
      "Version": "1.0",
      "TrustmarkDefinitionReference": {
        "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tds/boundary-protection-_-external-telecommunications-services---review-of-traffic-flow-exceptions/1.0/",
        "Description": "Defines conformance and assessment criteria for verifying that an organization reviews exceptions to the traffic flow policy at an organization-defined frequency and removes exceptions that are no longer supported by an explicit mission/business need.",
        "Number": 4,
        "Version": "1.0",
        "Name": "Boundary Protection | External Telecommunications Services - Review of Traffic Flow Exceptions"
      },
      "$Type": "TrustmarkDefinitionRequirement",
      "Name": "Boundary Protection | External Telecommunications Services - Review of Traffic Flow Exceptions",
      "$id": "TD_ref4"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tds/boundary-protection-_-external-telecommunications-services---documentation-of-traffic-flow-exceptions/1.0/",
      "Description": "Defines conformance and assessment criteria for verifying that an organization documents each exception to the traffic flow policy with a supporting mission/business need and duration of that need.",
      "Number": 5,
      "Version": "1.0",
      "TrustmarkDefinitionReference": {
        "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tds/boundary-protection-_-external-telecommunications-services---documentation-of-traffic-flow-exceptions/1.0/",
        "Description": "Defines conformance and assessment criteria for verifying that an organization documents each exception to the traffic flow policy with a supporting mission/business need and duration of that need.",
        "Number": 5,
        "Version": "1.0",
        "Name": "Boundary Protection | External Telecommunications Services - Documentation of Traffic Flow Exceptions"
      },
      "$Type": "TrustmarkDefinitionRequirement",
      "Name": "Boundary Protection | External Telecommunications Services - Documentation of Traffic Flow Exceptions",
      "$id": "TD_ref5"
    }
  ]},
  "Primary": "false",
  "LegalNotice": "This document and the information contained herein is provided on an \"AS IS\" basis, and the Georgia Tech Research Institute disclaims all warranties, express or implied, including but not limited to any warranty that the use of the information herein will not infringe any rights or any implied warranties or merchantability or fitness for a particular purpose. In addition, the Georgia Tech Research Institute disclaims legal liability for any loss incurred as a result of the use or reliance on the document or the information contained herein.",
  "$Type": "TrustInteroperabilityProfile"
}