Trust Interoperability Profiles (1026-1050 of 1841)

Trust Interoperability Profile Name Version
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AT-2 (1): Practical Exercises.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AT-2 (2): Insider Threat. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AT-2: Security Awareness Training. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AT-3 (1): Environmental Controls.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AT-3 (2): Physical Security Controls.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AT-3 (3): Practical Exercises.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AT-3 (4): Suspicious Communications and Anomalous System Behavior.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AT-3: Role-Based Security Training. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AT-4: Security Training Records. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-10 (1): Association of Identities.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-10 (2): Validate Binding of Information Producer Identity.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-10 (3): Chain of Custody.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-10 (4): Validate Binding of Information Reviewer Identity.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-10: Non-Repudiation. Applicable to HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-11 (1): Long-Term Retrieval Capability.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-11: Audit Record Retention. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-12 (1): System-Wide / Time-Correlated Audit Trail. Applicable to HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-12 (2): Standardized Formats.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-12 (3): Changes by Authorized Individuals. Applicable to HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-12: Audit Generation. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-13 (1): Use of Automated Tools.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-13 (2): Review of Monitored Sites.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-13: Monitoring for Information Disclosure.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-14 (1): System Start-Up.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-14 (2): Capture/Record and Log Content.
4
This page is also available as JSON and XML.