Trust Interoperability Profiles (1501-1525 of 1846)

Trust Interoperability Profile Name Version
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15: Development Process, Standards, and Tools. Applicable to HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-16: Developer-Provided Training. Applicable to HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-17 (1): Formal Policy Model.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-17 (2): Security-Relevant Components.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-17 (3): Formal Correspondence.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-17 (4): Informal Correspondence.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-17 (5): Conceptually Simple Design.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-17 (6): Structure for Testing.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-17 (7): Structure for Least Privilege.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-17: Developer Security Architecture and Design. Applicable to HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-18 (1): Multiple Phases of SDLC.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-18 (2): Inspection of Information Systems, Components, or Devices.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-18: Tamper Resistance and Detection.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-19 (1): Anti-Counterfeit Training.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-19 (2): Configuration Control for Component Service / Repair.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-19 (3): Component Disposal.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-19 (4): Anti-Counterfeit Scanning.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-19: Component Authenticity.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-1: System and Services Acquisition Policy and Procedures. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-20: Customized Development of Critical Components.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-21 (1): Validation of Screening.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-21: Developer Screening.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-22 (1): Alternative Sources for Continued Support.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-22: Unsupported System Components.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-2: Allocation of Resources. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
This page is also available as JSON and XML.