Trust Interoperability Profile Name | Version |
---|---|
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-12: Cryptographic Key Establishment and Management. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-13: Cryptographic Protection. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-15 (1): Physical Disconnect.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-15 (3): Disabling / Removal in Secure Work Areas.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-15 (4): Explicitly Indicate Current Participants.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-15: Collaborative Computing Devices. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-16 (1): Integrity Validation.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-16: Transmission of Security Attributes.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-17: Public Key Infrastructure Certificates. Applicable to MODERATE impact and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-18 (1): Identify Unacceptable Code / Take Corrective Actions.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-18 (2): Acquisition / Development / Use.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-18 (3): Prevent Downloading / Execution.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-18 (4): Prevent Automatic Execution.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-18 (5): Allow Execution Only in Confined Environments.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-18: Mobile Code. Applicable to MODERATE impact and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-19: Voice Over Internet Protocol. Applicable to MODERATE impact and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-1: System and Communications Protection Policy and Procedures. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-2 (1): Interfaces for Non-Privileged Users.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-20 (2): Data Origin / Integrity.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-20: Secure Name / Address Resolution Service (Authoritative Source). Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-21: Secure Name / Address Resolution Service (Recursive or Caching Resolver). Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-22: Architecture and Provisioning for Name / Address Resolution Service. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-23 (1): Invalidate Session Identifiers at Logout.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-23 (3): Unique Session Identifiers with Randomization.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-23 (5): Allowed Certificate Authorities.
|
4 |