Trust Interoperability Profile Name | Version |
---|---|
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-6 (7): Permitted Actions.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-6 (8): Full Text Analysis of Privileged Commands.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-6 (9): Correlation with Information from Nontechnical Sources.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-6: Audit Review, Analysis, and Reporting. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-7 (1): Automatic Processing. Applicable to MODERATE impact and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-7 (2): Automatic Sort and Search.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-7: Audit Reduction and Report Generation. Applicable to MODERATE impact and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-8 (1): Synchronization with Authoritative Time Source. Applicable to MODERATE impact and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-8 (2): Secondary Authoritative Time Source.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-8: Time Stamps. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-9 (1): Hardware Write-Once Media.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-9 (2): Audit Backup on Separate Physical Systems / Components. Applicable to HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-9 (3): Cryptographic Protection. Applicable to HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-9 (4): Access by Subset of Privileged Users. Applicable to MODERATE impact and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-9 (5): Dual Authorization.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-9 (6): Read Only Access.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AU-9: Protection of Audit Information. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
|
4 |
NIST SP 800-53 r4 Security Control CA-1: Security Assessment and Authorization Policy and Procedures
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CA-1: Security Assessment and Authorization Policy and Procedures. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CA-2 (1): Independent Assessors. Applicable to MODERATE impact and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CA-2 (2): Specialized Assessments. Applicable to HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CA-2 (3): External Organizations.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CA-2: Security Assessments. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CA-3 (1): Unclassified National Security System Connections.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CA-3 (2): Classified National Security System Connections.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CA-3 (3): Unclassified Non-National Security System Connections.
|
4 |