Trust Interoperability Profile Name | Version |
---|---|
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-27: Platform-Independent Applications.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-28 (1): Cryptographic Protection.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-28 (2): Off-Line Storage.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-28: Protection of Information at Rest. Applicable to MODERATE impact and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-29 (1): Virtualization Techniques.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-29: Heterogeneity.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-2: Application Partitioning. Applicable to MODERATE impact and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-3 (1): Hardware Separation.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-3 (2): Access / Flow Control Functions.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-3 (3): Minimize Nonsecurity Functionality.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-3 (4): Module Coupling and Cohesiveness.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-3 (5): Layered Structures.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-30 (2): Randomness.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-30 (3): Change Processing / Storage Locations.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-30 (4): Misleading Information.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-30 (5): Concealment of System Components.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-30: Concealment and Misdirection.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-31 (1): Test Covert Channels for Exploitability.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-31 (2): Maximum Bandwidth.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-31 (3): Measure Bandwidth in Operational Environments.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-31: Covert Channel Analysis.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-32: Information System Partitioning.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-34 (1): No Writable Storage.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-34 (2): Integrity Protection / Read-Only Media.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-34 (3): Hardware-Based Protection.
|
4 |