Trust Interoperability Profiles (1676-1700 of 1841)

Trust Interoperability Profile Name Version
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-2 (1): Central Management. Applicable to HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-2 (2): Automated Flaw Remediation Status. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-2 (3): Time to Remediate Flaws / Benchmarks for Corrective Actions.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-2 (5): Automatic Software / Firmware Updates.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-2 (6): Removal of Previous Versions of Software / Firmware.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-2: Flaw Remediation. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-3 (1): Central Management. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-3 (10): Malicious Code Analysis.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-3 (2): Automatic Updates. Applicable to MODERATE impact and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-3 (4): Updates Only by Privileged Users.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-3 (6): Testing / Verification.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-3 (7): Nonsignature-Based Detection.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-3 (8): Detect Unauthorized Commands.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-3 (9): Authenticate Remote Commands.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-3: Malicious Code Protection. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (1): System-Wide Intrusion Detection System.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (10): Visibility of Encrypted Communications.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (11): Analyze Communications Traffic Anomalies.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (12): Automated Alerts.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (13): Analyze Traffic / Event Patterns.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (14): Wireless Intrusion Detection.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (15): Wireless to Wireline Communications.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (16): Correlate Monitoring Information.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (17): Integrated Situational Awareness.
4
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (18): Analyze Traffic / Covert Exfiltration.
4
This page is also available as JSON and XML.