Trust Interoperability Profiles (1576-1600 of 1841)

Trust Interoperability Profile Name Version
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-27: Platform-Independent Applications.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-28 (1): Cryptographic Protection.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-28 (2): Off-Line Storage.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-28: Protection of Information at Rest. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-29 (1): Virtualization Techniques.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-29: Heterogeneity.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-2: Application Partitioning. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-3 (1): Hardware Separation.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-3 (2): Access / Flow Control Functions.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-3 (3): Minimize Nonsecurity Functionality.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-3 (4): Module Coupling and Cohesiveness.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-3 (5): Layered Structures.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-30 (2): Randomness.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-30 (3): Change Processing / Storage Locations.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-30 (4): Misleading Information.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-30 (5): Concealment of System Components.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-30: Concealment and Misdirection.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-31 (1): Test Covert Channels for Exploitability.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-31 (2): Maximum Bandwidth.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-31 (3): Measure Bandwidth in Operational Environments.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-31: Covert Channel Analysis.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-32: Information System Partitioning.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-34 (1): No Writable Storage.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-34 (2): Integrity Protection / Read-Only Media.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-34 (3): Hardware-Based Protection.
4
This page is also available as JSON and XML.