Trust Interoperability Profile Name | Version |
---|---|
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-2 (2): Removal of Temporary / Emergency Accounts. Applicable to MODERATE impact and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-2 (3): Disable Inactive Accounts. Applicable to MODERATE impact and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-2 (4): Automated Audit Actions. Applicable to MODERATE impact and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-2 (5): Inactivity Logout. Applicable to HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-2 (6): Dynamic Privilege Management.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-2 (7): Role-Based Schemes.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-2 (8): Dynamic Account Creation.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-2 (9): Restrictions on Use of Shared / Group Accounts.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-20 (1): Limits on Authorized Use. Applicable to MODERATE impact and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-20 (2): Portable Storage Devices. Applicable to MODERATE impact and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-20 (3): Non-Organizationally Owned Systems / Components / Devices.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-20 (4): Network Accessible Storage Devices.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-20: Use of External Information Systems. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-21 (1): Automated Decision Support.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-21 (2): Information Search and Retrieval.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-21: Information Sharing. Applicable to MODERATE impact and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-22: Publicly Accessible Content. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-23: Data Mining Protection.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-24 (1): Transmit Access Authorization Information.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-24 (2): No User or Process Identity.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-24: Access Control Decisions.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-25: Reference Monitor.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-2: Account Management. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-3 (10): Audited Override of Access Control Mechanisms.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-3 (2): Dual Authorization.
|
4 |