Trust Interoperability Profile Name | Version |
---|---|
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-5 (14): Managing Content of PKI Trust Stores.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-5 (15): FICAM-Approved Products and Services.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-5 (2): PKI-Based Authentication. Applicable to MODERATE impact and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-5 (3): In-Person or Trusted Third-Party Registration. Applicable to MODERATE impact and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-5 (4): Automated Support for Password Strength Determination.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-5 (5): Change Authenticators Prior to Delivery.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-5 (6): Protection of Authenticators.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-5 (7): No Embedded Unencrypted Static Authenticators.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-5 (8): Multiple Information System Accounts.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-5 (9): Cross-Organization Credential Management.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-5: Authenticator Management. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-6: Authenticator Feedback. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-7: Cryptographic Module Authentication. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-8 (1): Acceptance of PIV Credentials from Other Agencies. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-8 (2): Acceptance of Third-Party Credentials. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-8 (3): Use of FICAM-Approved Products. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-8 (4): Use of FICAM-Issued Profiles. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-8 (5): Acceptance of PIV-I Credentials.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-8: Identification and Authentication (Non-Organizational Users). Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-9 (1): Information Exchange.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-9 (2): Transmission of Decisions.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-9: Service Identification and Authentication.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IR-10: Integrated Information Security Analysis Team.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IR-1: Incident Response Policy and Procedures. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IR-2 (1): Simulated Events. Applicable to HIGH impact systems.
|
4 |