Trust Interoperability Profiles (1501-1525 of 1841)

Trust Interoperability Profile Name Version
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-17 (3): Formal Correspondence.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-17 (4): Informal Correspondence.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-17 (5): Conceptually Simple Design.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-17 (6): Structure for Testing.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-17 (7): Structure for Least Privilege.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-17: Developer Security Architecture and Design. Applicable to HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-18 (1): Multiple Phases of SDLC.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-18 (2): Inspection of Information Systems, Components, or Devices.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-18: Tamper Resistance and Detection.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-19 (1): Anti-Counterfeit Training.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-19 (2): Configuration Control for Component Service / Repair.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-19 (3): Component Disposal.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-19 (4): Anti-Counterfeit Scanning.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-19: Component Authenticity.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-1: System and Services Acquisition Policy and Procedures. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-20: Customized Development of Critical Components.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-21 (1): Validation of Screening.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-21: Developer Screening.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-22 (1): Alternative Sources for Continued Support.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-22: Unsupported System Components.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-2: Allocation of Resources. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-3: System Development Life Cycle. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-4 (1): Functional Properties of Security Controls. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-4 (10): Use of Approved PIV Products. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-4 (2): Design / Implementation Information for Security Controls. Applicable to MODERATE impact and HIGH impact systems.
4
This page is also available as JSON and XML.