Trust Interoperability Profiles (1526-1550 of 1841)

Trust Interoperability Profile Name Version
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-4 (3): Development Methods / Techniques / Practices.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-4 (5): System / Component / Service Configurations.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-4 (6): Use of Information Assurance Products.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-4 (7): NIAP-Approved Protection Profiles.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-4 (8): Continuous Monitoring Plan.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-4 (9): Functions / Ports / Protocols / Services in Use. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-4: Acquisition Process. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-5: Information System Documentation. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-8: Security Engineering Principles. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-9 (1): Risk Assessments / Organizational Approvals.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-9 (2): Identification of Functions / Ports / Protocols / Services. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-9 (3): Establish / Maintain Trust Relationship with Providers.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-9 (4): Consistent Interests of Consumers and Providers.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-9 (5): Processing, Storage, and Service Location.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SA-9: External Information System Services. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-10: Network Disconnect. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-11 (1): Logical Isolation.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-11: Trusted Path.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-12 (1): Availability. Applicable to HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-12 (2): Symmetric Keys.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-12 (3): Asymmetric Keys.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-12: Cryptographic Key Establishment and Management. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-13: Cryptographic Protection. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-15 (1): Physical Disconnect.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-15 (3): Disabling / Removal in Secure Work Areas.
4
This page is also available as JSON and XML.