Primary Trust Interoperability Profiles

This page displays a list of primary trust interoperability profiles (TIPs) that have been created on this system.
Trust Interoperability Profile Version
Profile of requirements from the Association for Computing Machinery (ACM) Privacy Recommendations
1.0
Profile of requirements from the Asia-Pacific Economic Cooperation (APEC) Privacy Principles
1.0
Profile of FBI Criminal Justice Information Services (CJIS) requirements as defined by the CJIS Security Policy, version 5.9.
5.9
Profile of requirements for the Federal Bridge Certificate Authority (FBCA) Certificate Policy (CP), version 2.27, for entities operating at the Basic level of assurance (LOA).
2.27
Profile of requirements for the Federal Bridge Certificate Authority (FBCA) Certificate Policy (CP), version 2.27, for entities operating at the High level of assurance (LOA).
2.27
Profile of requirements for the Federal Bridge Certificate Authority (FBCA) Certificate Policy (CP), version 2.27, for entities operating at the Medium level of assurance (LOA).
2.27
Profile of requirements for the Federal Bridge Certificate Authority (FBCA) Certificate Policy (CP), version 2.27, for entities operating at the Medium Hardware level of assurance (LOA).
2.27
Profile of requirements for the Federal Bridge Certificate Authority (FBCA) Certificate Policy (CP), version 2.27, for entities operating at the PIV-I level of assurance (LOA).
2.27
Profile of requirements for the Federal Bridge Certificate Authority (FBCA) Certificate Policy (CP), version 2.27, for entities operating at the Rudimentary level of assurance (LOA).
2.27
Profile of privacy requirements from the Federal Identity, Credential, and Access Management (FICAM) Trust Framework Solutions Trust Framework Provider Adoption Process
1.0
Profile of requirements from the Fusion Center Privacy Policy Development: Privacy, Civil Rights, and Civil Liberties Policy Template
1.0
Profile of requirements from the General Data Protection Regulation (GDPR) (EU) 2016/679 for the role of a Data Controller.
1.0
Profile of requirements from the General Data Protection Regulation (GDPR) (EU) 2016/679 for the role of a Data Processor.
1.0
Profile of the requirements in the HIPAA Regulations (per 45 CFR Section 164) for a Covered Entity by collecting all the relevant TIPs and TDs.
1.0
Profile of all Identity Ecosystem Framework (IDEF) requirements that apply to all identity provider entities participating in the Identity Ecosystem.
1.0
Profile of all Identity Ecosystem Framework (IDEF) requirements that apply to all relying party entities participating in the Identity Ecosystem.
1.0
Profile of Identity Ecosystem Framework (IDEF) supplemental best practices that are not required but are recommended for all identity provider entities participating in the Identity Ecosystem.
1.0
Profile of Identity Ecosystem Framework (IDEF) supplemental best practices that are not required but are recommended for all relying party entities participating in the Identity Ecosystem.
1.0
Profile of requirements in accordance with the security and privacy controls specified by ISO/IEC Publication 27001:2022 and further clarified by ISO/IEC Publication 27002:2022.
2022
Profile of requirements from the NIST Secure Software Development Framework (SSDF), version 1.1.
1.1
Profile of requirements corresponding to all HIGH impact security controls in NIST Special Publication 800-53, r4.
4
Profile of requirements corresponding to all LOW impact security controls in NIST Special Publication 800-53, r4.
4
Profile of requirements corresponding to all MODERATE impact security controls in NIST Special Publication 800-53, r4.
4
Profile of requirements corresponding to all privacy controls in NIST Special Publication 800-53 r4.
4
Profile of requirements that a Credential Service Provider (CSP) must satisfy to comply with the NIST Special Publication 800-63-3 series of documents.
1.0
Profile of requirements that a federated Relying Party (RP) must satisfy to comply with the NIST Special Publication 800-63-3 series of documents.
1.0
Profile of requirements that a Federation Authority must satisfy to comply with the NIST Special Publication 800-63-3 series of documents.
1.0
Profile of requirements that the operator of a Federation Proxy must satisfy to comply with the NIST Special Publication 800-63-3 series of documents.
1.0
Profile of requirements that a federated Identity Provider (IdP) must satisfy to comply with the NIST Special Publication 800-63-3 series of documents.
1.0
Profile of privacy requirements from the Organization of Economic Cooperation and Development (OECD) Privacy Principles
1.0
Profile of privacy requirements from the U.S. EU Safe Harbor Framework
1.0
Profile of requirements from the Secure-by-Design Pledge, published by the U.S. Dept of Homeland Security (DHS) Cybersecurity and Infrastructure Agency (CISA), for providers of enterprise software products and services - including on-premises software, cloud services, and software as a service (SaaS). Enables an organization to demonstrate alignment with the principles and practices articulated by the Secure-by-Design initiative.
1.0
Profile of privacy requirements from the U.S. Department of Health and Human Services (HHS) Privacy and Security Framework
1.0