Trust Interoperability Profiles (976-1000 of 1841)

Trust Interoperability Profile Name Version
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-3 (3): Mandatory Access Control.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-3 (4): Discretionary Access Control.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-3 (5): Security-Relevant Information.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-3 (7): Role-Based Access Control.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-3 (8): Revocation of Access Authorizations.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-3 (9): Controlled Release.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-3: Access Enforcement. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-4 (1): Object Security Attributes.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-4 (10): Enable / Disable Security Policy Filters.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-4 (11): Configuration of Security Policy Filters.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-4 (12): Data Type Identifiers.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-4 (13): Decomposition into Policy-Relevant Subcomponents.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-4 (14): Security Policy Filter Constraints.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-4 (15): Detection of Unsanctioned Information.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-4 (17): Domain Authentication.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-4 (18): Security Attribute Binding.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-4 (19): Validation of Metadata.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-4 (2): Processing Domains.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-4 (20): Approved Solutions.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-4 (21): Physical / Logical Separation of Information Flows.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-4 (22): Access Only.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-4 (3): Dynamic Information Flow Control.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-4 (4): Content Check Encrypted Information.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-4 (5): Embedded Data Types.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control AC-4 (6): Metadata.
4
This page is also available as JSON and XML.