Trust Interoperability Profiles (1476-1500 of 1841)

Trust Interoperability Profile Name Version
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-12 (14): Identity and Traceability.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-12 (15): Processes to Address Weaknesses or Deficiencies.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-12 (2): Supplier Reviews.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-12 (5): Limitation of Harm.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-12 (7): Assessments Prior to Selection / Acceptance / Update.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-12 (8): Use of All-Source Intelligence.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-12 (9): Operations Security.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-12: Supply Chain Protection. Applicable to HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-13: Trustworthiness.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-14: Criticality Analysis.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (1): Quality Metrics.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (10): Incident Response Plan.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (11): Archive Information System / Component.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (2): Security Tracking Tools.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (3): Criticality Analysis.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (4): Threat Modeling / Vulnerability Analysis.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (5): Attack Surface Reduction.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (6): Continuous Improvement.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (7): Automated Vulnerability Analysis.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (8): Reuse of Threat / Vulnerability Information.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (9): Use of Live Data.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15: Development Process, Standards, and Tools. Applicable to HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-16: Developer-Provided Training. Applicable to HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-17 (1): Formal Policy Model.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-17 (2): Security-Relevant Components.
4
This page is also available as JSON and XML.