Trust Interoperability Profile Name | Version |
---|---|
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-12 (14): Identity and Traceability.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-12 (15): Processes to Address Weaknesses or Deficiencies.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-12 (2): Supplier Reviews.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-12 (5): Limitation of Harm.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-12 (7): Assessments Prior to Selection / Acceptance / Update.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-12 (8): Use of All-Source Intelligence.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-12 (9): Operations Security.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-12: Supply Chain Protection. Applicable to HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-13: Trustworthiness.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-14: Criticality Analysis.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (1): Quality Metrics.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (10): Incident Response Plan.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (11): Archive Information System / Component.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (2): Security Tracking Tools.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (3): Criticality Analysis.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (4): Threat Modeling / Vulnerability Analysis.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (5): Attack Surface Reduction.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (6): Continuous Improvement.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (7): Automated Vulnerability Analysis.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (8): Reuse of Threat / Vulnerability Information.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15 (9): Use of Live Data.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-15: Development Process, Standards, and Tools. Applicable to HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-16: Developer-Provided Training. Applicable to HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-17 (1): Formal Policy Model.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-17 (2): Security-Relevant Components.
|
4 |