Trust Interoperability Profile Name | Version |
---|---|
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-12 (10): Validate as Genuine and Not Altered.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-12 (11): Penetration Testing / Analysis of Elements, Processes, and Actors.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-12 (12): Inter-Organizational Agreements.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-12 (13): Critical Information System Components.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-12 (14): Identity and Traceability.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-12 (15): Processes to Address Weaknesses or Deficiencies.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-12 (2): Supplier Reviews.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-12 (5): Limitation of Harm.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-12 (7): Assessments Prior to Selection / Acceptance / Update.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-12 (8): Use of All-Source Intelligence.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-12 (9): Operations Security.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-12: Supply Chain Protection. Applicable to HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-13: Trustworthiness.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-14: Criticality Analysis.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (1): Quality Metrics.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (10): Incident Response Plan.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (11): Archive Information System / Component.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (2): Security Tracking Tools.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (3): Criticality Analysis.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (4): Threat Modeling / Vulnerability Analysis.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (5): Attack Surface Reduction.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (6): Continuous Improvement.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (7): Automated Vulnerability Analysis.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (8): Reuse of Threat / Vulnerability Information.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (9): Use of Live Data.
|
4 |