Trust Interoperability Profile Name | Version |
---|---|
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PL-1: Security Planning Policy and Procedures. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PL-2 (3): Plan / Coordinate with Other Organizational Entities. Applicable to MODERATE impact and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PL-2: System Security Plan. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PL-4 (1): Social Media and Networking Restrictions. Applicable to MODERATE impact and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PL-4: Rules of Behavior. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PL-7: Security Concept of Operations.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PL-8 (1): Defense-In-Depth.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PL-8 (2): Supplier Diversity.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PL-8: Information Security Architecture. Applicable to MODERATE impact and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PL-9: Central Management.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PM-10: Security Authorization Process.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PM-11: Mission/Business Process Definition.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PM-12: Insider Threat Program.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PM-13: Information Security Workforce.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PM-14: Testing, Training, and Monitoring.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PM-15: Contacts with Security Groups and Associations.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PM-16: Threat Awareness Program.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PM-1: Information Security Program Plan.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PM-2: Senior Information Security Officer.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PM-3: Information Security Resources.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PM-4: Plan of Action and Milestones Process.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PM-5: Information System Inventory.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PM-6: Information Security Measures of Performance.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PM-7: Enterprise Architecture.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control PM-8: Critical Infrastructure Plan.
|
4 |