Trust Interoperability Profiles (1551-1575 of 1841)

Trust Interoperability Profile Name Version
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-15 (4): Explicitly Indicate Current Participants.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-15: Collaborative Computing Devices. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-16 (1): Integrity Validation.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-16: Transmission of Security Attributes.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-17: Public Key Infrastructure Certificates. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-18 (1): Identify Unacceptable Code / Take Corrective Actions.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-18 (2): Acquisition / Development / Use.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-18 (3): Prevent Downloading / Execution.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-18 (4): Prevent Automatic Execution.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-18 (5): Allow Execution Only in Confined Environments.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-18: Mobile Code. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-19: Voice Over Internet Protocol. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-1: System and Communications Protection Policy and Procedures. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-2 (1): Interfaces for Non-Privileged Users.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-20 (2): Data Origin / Integrity.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-20: Secure Name / Address Resolution Service (Authoritative Source). Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-21: Secure Name / Address Resolution Service (Recursive or Caching Resolver). Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-22: Architecture and Provisioning for Name / Address Resolution Service. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-23 (1): Invalidate Session Identifiers at Logout.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-23 (3): Unique Session Identifiers with Randomization.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-23 (5): Allowed Certificate Authorities.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-23: Session Authenticity. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-24: Fail in Known State. Applicable to HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-25: Thin Nodes.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-26: Honeypots.
4
This page is also available as JSON and XML.