Trust Interoperability Profiles (1101-1125 of 1841)

Trust Interoperability Profile Name Version
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CA-3 (4): Connections to Public Networks.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CA-3 (5): Restrictions on External System Connections. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CA-3: System Interconnections. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CA-5 (1): Automation Support for Accuracy / Currency.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CA-5: Plan of Action and Milestones. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CA-6: Security Authorization. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CA-7 (1): Independent Assessment. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CA-7 (3): Trend Analyses.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CA-7: Continuous Monitoring. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CA-8 (1): Independent Penetration Agent or Team.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CA-8 (2): Red Team Exercises.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CA-8: Penetration Testing. Applicable to HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CA-9 (1): Security Compliance Checks.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CA-9: Internal System Connections. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CM-10 (1): Open Source Software.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CM-10: Software Usage Restrictions. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CM-11 (1): Alerts for Unauthorized Installations.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CM-11 (2): Prohibit Installation Without Privileged Status.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CM-11: User-Installed Software. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CM-1: Configuration Management Policy and Procedures. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CM-2 (1): Reviews and Updates. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CM-2 (2): Automation Support for Accuracy / Currency. Applicable to HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CM-2 (3): Retention of Previous Configurations. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CM-2 (6): Development and Test Environments.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CM-2 (7): Configure Systems, Components, or Devices for High-Risk Areas. Applicable to MODERATE impact and HIGH impact systems.
4
This page is also available as JSON and XML.