Trust Interoperability Profiles (1001-1025 of 1841)

Trust Interoperability Profile Name Version
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-4 (7): One-Way Flow Mechanisms.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-4 (8): Security Policy Filters.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-4 (9): Human Reviews.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-4: Information Flow Enforcement. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-5: Separation of Duties. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-6 (1): Authorize Access to Security Functions. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-6 (10): Prohibit Non-Privileged Users from Executing Privileged Functions. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-6 (2): Non-Privileged Access for Nonsecurity Functions. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-6 (3): Network Access to Privileged Commands. Applicable to HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-6 (4): Separate Processing Domains.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-6 (5): Privileged Accounts. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-6 (6): Privileged Access by Non-Organizational Users.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-6 (7): Review of User Privileges.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-6 (8): Privilege Levels for Code Execution.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-6 (9): Auditing Use of Privileged Functions. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-6: Least Privilege. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-7 (2): Purge / Wipe Mobile Device.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-7: Unsuccessful Logon Attempts. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-8: System Use Notification. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-9 (1): Unsuccessful Logons.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-9 (2): Successful / Unsuccessful Logons.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-9 (3): Notification of Account Changes.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-9 (4): Additional Logon Information.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-9: Previous Logon (Access) Notification.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AT-1: Security Awareness and Training Policy and Procedures. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
This page is also available as JSON and XML.