Trust Interoperability Profile Name | Version |
---|---|
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-16 (3): Maintenance of Attribute Associations by Information System.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-16 (4): Association of Attributes by Authorized Individuals.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-16 (5): Attribute Displays for Output Devices.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-16 (6): Maintenance of Attribute Association by Organization.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-16 (7): Consistent Attribute Interpretation.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-16 (8): Association Techniques / Technologies.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-16 (9): Attribute Reassignment.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-16: Security Attributes.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-17 (1): Automated Monitoring / Control. Applicable to MODERATE impact and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-17 (2): Protection of Confidentiality / Integrity Using Encryption. Applicable to MODERATE impact and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-17 (3): Managed Access Control Points. Applicable to MODERATE impact and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-17 (4): Privileged Commands / Access. Applicable to MODERATE impact and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-17 (6): Protection of Information.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-17 (9): Disconnect / Disable Access.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-17: Remote Access. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-18 (1): Authentication and Encryption. Applicable to MODERATE impact and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-18 (3): Disable Wireless Networking.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-18 (4): Restrict Configurations by Users. Applicable to HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-18 (5): Antennas / Transmission Power Levels. Applicable to HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-18: Wireless Access. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-19 (4): Restrictions for Classified Information.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-19 (5): Full Device / Container-Based Encryption. Applicable to MODERATE impact and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-19: Access Control for Mobile Devices. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-1: Access Control Policy and Procedures. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-2 (1): Automated System Account Management. Applicable to MODERATE impact and HIGH impact systems.
|
4 |