Trust Interoperability Profile Name | Version |
---|---|
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-3 (3): Mandatory Access Control.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-3 (4): Discretionary Access Control.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-3 (5): Security-Relevant Information.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-3 (7): Role-Based Access Control.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-3 (8): Revocation of Access Authorizations.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-3 (9): Controlled Release.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-3: Access Enforcement. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-4 (1): Object Security Attributes.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-4 (10): Enable / Disable Security Policy Filters.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-4 (11): Configuration of Security Policy Filters.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-4 (12): Data Type Identifiers.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-4 (13): Decomposition into Policy-Relevant Subcomponents.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-4 (14): Security Policy Filter Constraints.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-4 (15): Detection of Unsanctioned Information.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-4 (17): Domain Authentication.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-4 (18): Security Attribute Binding.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-4 (19): Validation of Metadata.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-4 (2): Processing Domains.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-4 (20): Approved Solutions.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-4 (21): Physical / Logical Separation of Information Flows.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-4 (22): Access Only.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-4 (3): Dynamic Information Flow Control.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-4 (4): Content Check Encrypted Information.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-4 (5): Embedded Data Types.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-4 (6): Metadata.
|
4 |