Trust Interoperability Profiles (951-975 of 1841)

Trust Interoperability Profile Name Version
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-2 (2): Removal of Temporary / Emergency Accounts. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-2 (3): Disable Inactive Accounts. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-2 (4): Automated Audit Actions. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-2 (5): Inactivity Logout. Applicable to HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-2 (6): Dynamic Privilege Management.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-2 (7): Role-Based Schemes.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-2 (8): Dynamic Account Creation.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-2 (9): Restrictions on Use of Shared / Group Accounts.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-20 (1): Limits on Authorized Use. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-20 (2): Portable Storage Devices. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-20 (3): Non-Organizationally Owned Systems / Components / Devices.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-20 (4): Network Accessible Storage Devices.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-20: Use of External Information Systems. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-21 (1): Automated Decision Support.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-21 (2): Information Search and Retrieval.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-21: Information Sharing. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-22: Publicly Accessible Content. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-23: Data Mining Protection.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-24 (1): Transmit Access Authorization Information.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-24 (2): No User or Process Identity.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-24: Access Control Decisions.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-25: Reference Monitor.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-2: Account Management. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-3 (10): Audited Override of Access Control Mechanisms.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-3 (2): Dual Authorization.
4
This page is also available as JSON and XML.