Trust Interoperability Profile Name | Version |
---|---|
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-2 (1): Central Management. Applicable to HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-2 (2): Automated Flaw Remediation Status. Applicable to MODERATE impact and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-2 (3): Time to Remediate Flaws / Benchmarks for Corrective Actions.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-2 (5): Automatic Software / Firmware Updates.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-2 (6): Removal of Previous Versions of Software / Firmware.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-2: Flaw Remediation. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-3 (1): Central Management. Applicable to MODERATE impact and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-3 (10): Malicious Code Analysis.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-3 (2): Automatic Updates. Applicable to MODERATE impact and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-3 (4): Updates Only by Privileged Users.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-3 (6): Testing / Verification.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-3 (7): Nonsignature-Based Detection.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-3 (8): Detect Unauthorized Commands.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-3 (9): Authenticate Remote Commands.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-3: Malicious Code Protection. Applicable to LOW impact, MODERATE impact, and HIGH impact systems.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (1): System-Wide Intrusion Detection System.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (10): Visibility of Encrypted Communications.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (11): Analyze Communications Traffic Anomalies.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (12): Automated Alerts.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (13): Analyze Traffic / Event Patterns.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (14): Wireless Intrusion Detection.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (15): Wireless to Wireline Communications.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (16): Correlate Monitoring Information.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (17): Integrated Situational Awareness.
|
4 |
Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control SI-4 (18): Analyze Traffic / Covert Exfiltration.
|
4 |