Trust Interoperability Profile Name | Version |
---|---|
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-34: Non-Modifiable Executable Programs.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-35: Honeyclients.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-36 (1): Polling Techniques.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-36: Distributed Processing and Storage.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-37 (1): Ensure Delivery / Transmission.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-37: Out-Of-Band Channels.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-38: Operations Security.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-39 (1): Hardware Separation.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-39 (2): Thread Isolation.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-39: Process Isolation. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-3: Security Function Isolation. Applicable to HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-4 (2): Periods Processing.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-40 (1): Electromagnetic Interference.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-40 (2): Reduce Detection Potential.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-40 (3): Imitative or Manipulative Communications Deception.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-40 (4): Signal Parameter Identification.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-40: Wireless Link Protection.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-41: Port and I/O Device Access.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-42 (1): Reporting to Authorized Individuals or Roles.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-42 (2): Authorized Use.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-42 (3): Prohibit Use of Devices.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-42: Sensor Capability and Data.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-43: Usage Restrictions.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-44: Detonation Chambers.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SC-4: Information in Shared Resources. Applicable to MODERATE impact and HIGH impact systems.
|
4 |