Trust Interoperability Profiles (1201-1225 of 1846)

Trust Interoperability Profile Name Version
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CP-7 (4): Preparation for Use. Applicable to HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CP-7 (6): Inability to Return to Primary Site.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CP-7: Alternate Processing Site. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CP-8 (1): Priority of Service Provisions. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CP-8 (2): Single Points of Failure. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CP-8 (3): Separation of Primary / Alternate Providers. Applicable to HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CP-8 (4): Provider Contingency Plan. Applicable to HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CP-8 (5): Alternate Telecommunication Service Testing.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CP-8: Telecommunications Services. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CP-9 (1): Testing for Reliability / Integrity. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CP-9 (2): Test Restoration Using Sampling. Applicable to HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CP-9 (3): Separate Storage for Critical Information. Applicable to HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CP-9 (5): Transfer to Alternate Storage Site. Applicable to HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CP-9 (6): Redundant Secondary System.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CP-9 (7): Dual Authorization.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control CP-9: Information System Backup. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-10: Adaptive Identification and Authentication.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-11: Re-Authentication.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-1: Identification and Authentication Policy and Procedures. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-2 (1): Network Access to Privileged Accounts. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-2 (10): Single Sign-On.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-2 (11): Remote Access - Separate Device. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-2 (12): Acceptance of PIV Credentials. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-2 (13): Out-Of-Band Authentication.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-2 (2): Network Access to Non-Privileged Accounts. Applicable to MODERATE impact and HIGH impact systems.
4
This page is also available as JSON and XML.