Trust Interoperability Profile | Version |
---|---|
Profile of requirements from the Association for Computing Machinery (ACM) Privacy Recommendations
|
1.0 |
Profile of requirements from the Asia-Pacific Economic Cooperation (APEC) Privacy Principles
|
1.0 |
Profile of FBI Criminal Justice Information Services (CJIS) requirements as defined by the CJIS Security Policy, version 5.9.
|
5.9 |
Profile of requirements for the Federal Bridge Certificate Authority (FBCA) Certificate Policy (CP), version 2.27, for entities operating at the Basic level of assurance (LOA).
|
2.27 |
Profile of requirements for the Federal Bridge Certificate Authority (FBCA) Certificate Policy (CP), version 2.27, for entities operating at the High level of assurance (LOA).
|
2.27 |
Profile of requirements for the Federal Bridge Certificate Authority (FBCA) Certificate Policy (CP), version 2.27, for entities operating at the Medium level of assurance (LOA).
|
2.27 |
Profile of requirements for the Federal Bridge Certificate Authority (FBCA) Certificate Policy (CP), version 2.27, for entities operating at the Medium Hardware level of assurance (LOA).
|
2.27 |
Profile of requirements for the Federal Bridge Certificate Authority (FBCA) Certificate Policy (CP), version 2.27, for entities operating at the PIV-I level of assurance (LOA).
|
2.27 |
Profile of requirements for the Federal Bridge Certificate Authority (FBCA) Certificate Policy (CP), version 2.27, for entities operating at the Rudimentary level of assurance (LOA).
|
2.27 |
Profile of privacy requirements from the Federal Identity, Credential, and Access Management (FICAM) Trust Framework Solutions Trust Framework Provider Adoption Process
|
1.0 |
Profile of requirements from the Fusion Center Privacy Policy Development: Privacy, Civil Rights, and Civil Liberties Policy Template
|
1.0 |
Profile of requirements from the General Data Protection Regulation (GDPR) (EU) 2016/679 for the role of a Data Controller.
|
1.0 |
Profile of requirements from the General Data Protection Regulation (GDPR) (EU) 2016/679 for the role of a Data Processor.
|
1.0 |
Profile of the requirements in the HIPAA Regulations (per 45 CFR Section 164) for a Covered Entity by collecting all the relevant TIPs and TDs.
|
1.0 |
Profile of all Identity Ecosystem Framework (IDEF) requirements that apply to all identity provider entities participating in the Identity Ecosystem.
|
1.0 |
Profile of all Identity Ecosystem Framework (IDEF) requirements that apply to all relying party entities participating in the Identity Ecosystem.
|
1.0 |
Profile of Identity Ecosystem Framework (IDEF) supplemental best practices that are not required but are recommended for all identity provider entities participating in the Identity Ecosystem.
|
1.0 |
Profile of Identity Ecosystem Framework (IDEF) supplemental best practices that are not required but are recommended for all relying party entities participating in the Identity Ecosystem.
|
1.0 |
Profile of requirements in accordance with the security and privacy controls specified by ISO/IEC Publication 27001:2022 and further clarified by ISO/IEC Publication 27002:2022.
|
2022 |
Profile of requirements from the NIST Secure Software Development Framework (SSDF), version 1.1.
|
1.1 |
Profile of requirements corresponding to all HIGH impact security controls in NIST Special Publication 800-53, r4.
|
4 |
Profile of requirements corresponding to all LOW impact security controls in NIST Special Publication 800-53, r4.
|
4 |
Profile of requirements corresponding to all MODERATE impact security controls in NIST Special Publication 800-53, r4.
|
4 |
Profile of requirements corresponding to all privacy controls in NIST Special Publication 800-53 r4.
|
4 |
Profile of requirements that a Credential Service Provider (CSP) must satisfy to comply with the NIST Special Publication 800-63-3 series of documents.
|
1.0 |
Profile of requirements that a federated Relying Party (RP) must satisfy to comply with the NIST Special Publication 800-63-3 series of documents.
|
1.0 |
Profile of requirements that a Federation Authority must satisfy to comply with the NIST Special Publication 800-63-3 series of documents.
|
1.0 |
Profile of requirements that the operator of a Federation Proxy must satisfy to comply with the NIST Special Publication 800-63-3 series of documents.
|
1.0 |
Profile of requirements that a federated Identity Provider (IdP) must satisfy to comply with the NIST Special Publication 800-63-3 series of documents.
|
1.0 |
Profile of privacy requirements from the Organization of Economic Cooperation and Development (OECD) Privacy Principles
|
1.0 |
Profile of privacy requirements from the U.S. EU Safe Harbor Framework
|
1.0 |
Profile of requirements from the Secure-by-Design Pledge, published by the U.S. Dept of Homeland Security (DHS) Cybersecurity and Infrastructure Agency (CISA), for providers of enterprise software products and services - including on-premises software, cloud services, and software as a service (SaaS). Enables an organization to demonstrate alignment with the principles and practices articulated by the Secure-by-Design initiative.
|
1.0 |
Profile of privacy requirements from the U.S. Department of Health and Human Services (HHS) Privacy and Security Framework
|
1.0 |