Trust Interoperability Profiles (926-950 of 1841)

Trust Interoperability Profile Name Version
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-16 (7): Consistent Attribute Interpretation.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-16 (8): Association Techniques / Technologies.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-16 (9): Attribute Reassignment.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-16: Security Attributes.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-17 (1): Automated Monitoring / Control. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-17 (2): Protection of Confidentiality / Integrity Using Encryption. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-17 (3): Managed Access Control Points. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-17 (4): Privileged Commands / Access. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-17 (6): Protection of Information.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-17 (9): Disconnect / Disable Access.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-17: Remote Access. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-18 (1): Authentication and Encryption. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-18 (3): Disable Wireless Networking.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-18 (4): Restrict Configurations by Users. Applicable to HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-18 (5): Antennas / Transmission Power Levels. Applicable to HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-18: Wireless Access. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-19 (4): Restrictions for Classified Information.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-19 (5): Full Device / Container-Based Encryption. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-19: Access Control for Mobile Devices. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-1: Access Control Policy and Procedures. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-2 (1): Automated System Account Management. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-2 (10): Shared / Group Account Credential Termination.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-2 (11): Usage Conditions. Applicable to HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-2 (12): Account Monitoring / Atypical Usage. Applicable to HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-2 (13): Disable Accounts for High-Risk Individuals. Applicable to HIGH impact systems.
4
This page is also available as JSON and XML.