Trust Interoperability Profiles (1251-1275 of 1846)

Trust Interoperability Profile Name Version
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-5 (14): Managing Content of PKI Trust Stores.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-5 (15): FICAM-Approved Products and Services.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-5 (2): PKI-Based Authentication. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-5 (3): In-Person or Trusted Third-Party Registration. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-5 (4): Automated Support for Password Strength Determination.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-5 (5): Change Authenticators Prior to Delivery.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-5 (6): Protection of Authenticators.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-5 (7): No Embedded Unencrypted Static Authenticators.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-5 (8): Multiple Information System Accounts.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-5 (9): Cross-Organization Credential Management.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-5: Authenticator Management. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-6: Authenticator Feedback. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-7: Cryptographic Module Authentication. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-8 (1): Acceptance of PIV Credentials from Other Agencies. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-8 (2): Acceptance of Third-Party Credentials. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-8 (3): Use of FICAM-Approved Products. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-8 (4): Use of FICAM-Issued Profiles. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-8 (5): Acceptance of PIV-I Credentials.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-8: Identification and Authentication (Non-Organizational Users). Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-9 (1): Information Exchange.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-9 (2): Transmission of Decisions.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-9: Service Identification and Authentication.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IR-10: Integrated Information Security Analysis Team.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IR-1: Incident Response Policy and Procedures. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IR-2 (1): Simulated Events. Applicable to HIGH impact systems.
4
This page is also available as JSON and XML.