Trust Interoperability Profile Name | Version |
---|---|
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (15): Wireless to Wireline Communications.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (16): Correlate Monitoring Information.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (17): Integrated Situational Awareness.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (18): Analyze Traffic / Covert Exfiltration.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (19): Individuals Posing Greater Risk.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (2): Automated Tools for Real-Time Analysis. Applicable to MODERATE impact and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (20): Privileged Users.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (21): Probationary Periods.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (22): Unauthorized Network Services.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (23): Host-Based Devices.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (24): Indicators of Compromise.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (3): Automated Tool Integration.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (4): Inbound and Outbound Communications Traffic. Applicable to MODERATE impact and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (5): System-Generated Alerts. Applicable to MODERATE impact and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (7): Automated Response to Suspicious Events.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (9): Testing of Monitoring Tools.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4: Information System Monitoring. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-5 (1): Automated Alerts and Advisories. Applicable to HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-5: Security Alerts, Advisories, and Directives. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-6 (2): Automation Support for Distributed Testing.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-6 (3): Report Verification Results.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-6: Security Function Verification. Applicable to HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-7 (1): Integrity Checks. Applicable to MODERATE impact and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-7 (10): Protection of Boot Firmware.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-7 (11): Confined Environments with Limited Privileges.
|
4 |