Trust Interoperability Profiles (1526-1550 of 1846)

Trust Interoperability Profile Name Version
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-3: System Development Life Cycle. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-4 (1): Functional Properties of Security Controls. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-4 (10): Use of Approved PIV Products. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-4 (2): Design / Implementation Information for Security Controls. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-4 (3): Development Methods / Techniques / Practices.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-4 (5): System / Component / Service Configurations.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-4 (6): Use of Information Assurance Products.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-4 (7): NIAP-Approved Protection Profiles.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-4 (8): Continuous Monitoring Plan.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-4 (9): Functions / Ports / Protocols / Services in Use. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-4: Acquisition Process. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-5: Information System Documentation. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-8: Security Engineering Principles. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-9 (1): Risk Assessments / Organizational Approvals.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-9 (2): Identification of Functions / Ports / Protocols / Services. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-9 (3): Establish / Maintain Trust Relationship with Providers.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-9 (4): Consistent Interests of Consumers and Providers.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-9 (5): Processing, Storage, and Service Location.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-9: External Information System Services. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-10: Network Disconnect. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-11 (1): Logical Isolation.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-11: Trusted Path.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-12 (1): Availability. Applicable to HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-12 (2): Symmetric Keys.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-12 (3): Asymmetric Keys.
4
This page is also available as JSON and XML.