Trust Interoperability Profile Name | Version |
---|---|
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-32: Information System Partitioning.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-34 (1): No Writable Storage.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-34 (2): Integrity Protection / Read-Only Media.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-34 (3): Hardware-Based Protection.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-34: Non-Modifiable Executable Programs.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-35: Honeyclients.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-36 (1): Polling Techniques.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-36: Distributed Processing and Storage.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-37 (1): Ensure Delivery / Transmission.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-37: Out-Of-Band Channels.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-38: Operations Security.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-39 (1): Hardware Separation.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-39 (2): Thread Isolation.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-39: Process Isolation. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-3: Security Function Isolation. Applicable to HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-4 (2): Periods Processing.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-40 (1): Electromagnetic Interference.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-40 (2): Reduce Detection Potential.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-40 (3): Imitative or Manipulative Communications Deception.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-40 (4): Signal Parameter Identification.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-40: Wireless Link Protection.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-41: Port and I/O Device Access.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-42 (1): Reporting to Authorized Individuals or Roles.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-42 (2): Authorized Use.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-42 (3): Prohibit Use of Devices.
|
4 |