Trust Interoperability Profiles (26-50 of 174)

Trust Interoperability Profile Name Version
Profile for proper assertion of the NIEF Authenticator Assurance Level user attribute as defined by the NIEF Attribute Registry. See https://nief.org/attribute-registry/attributes/user/nief/AuthenticatorAssuranceLevel/1.0/.
1.0
Profile for proper assertion of the NIEF Background Check Status Indicator user attribute as defined by the NIEF Attribute Registry. See https://nief.org/attribute-registry/attributes/user/nief/BackgroundCheckStatusIndicator/1.0/.
1.0
Profile for proper assertion of the NIEF Federation Assurance Level user attribute as defined by the NIEF Attribute Registry. See https://nief.org/attribute-registry/attributes/user/nief/FederationAssuranceLevel/1.0/.
1.0
Profile for proper assertion of the NIEF FICAM Assurance Level Code user attribute as defined by the NIEF Attribute Registry. See https://nief.org/attribute-registry/attributes/user/nief/FICAMAssuranceLevelCode/1.0/.
1.0
Profile for proper assertion of the NIEF Identity Assurance Level user attribute as defined by the NIEF Attribute Registry. See https://nief.org/attribute-registry/attributes/user/nief/IdentityAssuranceLevel/1.0/.
1.0
Profile for proper assertion of the NIEF Identity Provider ID user attribute as defined by the NIEF Attribute Registry. See https://nief.org/attribute-registry/attributes/user/nief/IdentityProviderId/1.0/.
1.0
Profile for proper assertion of the NIEF United States Law Enforcement Officer Indiactor user attribute as defined by the NIEF Attribute Registry. See https://nief.org/attribute-registry/attributes/user/nief/UnitedStatesLawEnforcementOfficerIndicator/1.0/.
1.0
Profile for proper assertion of the NIEF Unique Subject ID user attribute as defined by the NIEF Attribute Registry. See https://nief.org/attribute-registry/attributes/user/nief/UniqueSubjectId/1.0/.
1.0
NIEF profile of identity provider attribute assertion requirements for federated user access to systems that provide data from the Border and Transportation Security information type, as defined by NIST Special Publication 800-60, Volume II, Revision 1, Section D.2.1. Border and Transportation Security includes facilitating or deterring entry and exit of people, goods, and conveyances at and between U.S. ports of entry, as well as ensuring the security of transportation and infrastructure networks, facilities, vehicles, and personnel within the United States. Border control involves enforcing the laws regulating the admission of foreign-born persons (i.e., aliens) to the United States. This includes patrolling and monitoring borders and deportation of illegal aliens. Some border control information is also associated with other mission information types (e.g., criminal apprehension, and criminal investigation and surveillance information). In such cases, the impact levels of the associated mission information may determine impact levels associated with border control information. Some aspects of ensuring security of transportation and infrastructure networks, facilities, vehicles, and personnel within the United States are also covered under the information types associated with the transportation mission. In some cases the border control information may be classified. Any classified information is treated under separate rules established for national security information.
1.0
NIEF profile of identity provider attribute assertion requirements for federated user access to systems that provide data from the Citizen Protection information type, as defined by NIST Special Publication 800-60, Volume II, Revision 1, Section D.16.3. Citizen protection involves all activities performed to protect the general population of the United States from criminal activity.
1.0
NIEF profile of identity provider attribute assertion requirements for federated user access to systems that provide data from the Crime Prevention information type, as defined by NIST Special Publication 800-60, Volume II, Revision 1, Section D.16.7. Crime prevention entails all efforts designed to create safer communities through the control and reduction of crime by addressing the causes of crime and reducing the opportunities of crime.
1.0
NIEF profile of identity provider attribute assertion requirements for federated user access to systems that provide data from the Criminal Apprehension information type, as defined by NIST Special Publication 800-60, Volume II, Revision 1, Section D.16.1. Criminal apprehension supports activities associated with the tracking and capture of groups or individuals believed to be responsible for committing Federal crimes.
1.0
NIEF profile of identity provider attribute assertion requirements for federated user access to systems that provide data from the Criminal Incarceration information type, as defined by NIST Special Publication 800-60, Volume II, Revision 1, Section D.18.1. Criminal incarceration includes activities associated with the housing, custody and general care of criminals sentenced to serve time in penitentiaries.
1.0
NIEF profile of identity provider attribute assertion requirements for federated user access to systems that provide data from the Criminal Investigation and Surveillance information type, as defined by NIST Special Publication 800-60, Volume II, Revision 1, Section D.16.2. Criminal investigation and surveillance includes the collection of evidence required to determine responsibility for a crime and the monitoring and questioning of affected parties.
1.0
NIEF profile of identity provider attribute assertion requirements for federated user access to systems that provide data from the Criminal Rehabilitation information type, as defined by NIST Special Publication 800-60, Volume II, Revision 1, Section D.18.2. Criminal Rehabilitation includes all government activities devoted to providing convicted criminals with the educational resources and life skills necessary to rejoin society as responsible and contributing members.
1.0
NIEF profile of identity provider attribute assertion requirements for federated user access to systems that provide data from the Emergency Response information type, as defined by NIST Special Publication 800-60, Volume II, Revision 1, Section D.4.4. Emergency Response involves the immediate actions taken to respond to a disaster (e.g., wildfire management). These actions include providing mobile telecommunications, operational support, power generation, search and rescue, and medical life saving actions. Impacts to emergency response information and the information systems that process and store emergency response information could result in negative impacts on cross-jurisdictional coordination within the critical emergency services infrastructure and the general effectiveness of organizations tasked with emergency response missions.
1.0
NIEF profile of identity provider attribute assertion requirements for federated user access to systems that provide data from the Key Asset and Critical Infrastructure Protection information type, as defined by NIST Special Publication 800-60, Volume II, Revision 1, Section D.2.2. Key Asset and Critical Infrastructure Protection involves assessing key asset and critical infrastructure vulnerabilities and taking direct action to mitigate vulnerabilities, enhance security, and ensure continuity and necessary redundancy in government operations and personnel. The Critical Infrastructure Information Protection Act of 2002 (6 U.S.C. 131-134) places specific controls on the dissemination of critical infrastructure information (see Volume I, 3.5.2.3). Under the provisions of Executive Order 13292, some anti-terrorism information is subject to security classification. National security information is outside the scope of this guideline.
1.0
NIEF profile of identity provider attribute assertion requirements for federated user access to systems that provide data from the Leadership Protection information type, as defined by NIST Special Publication 800-60, Volume II, Revision 1, Section D.16.4. Leadership protection involves all activities performed to protect the health and well being of the president, vice-president, their families, and other high-level government officials. Some leadership protection information may be classified. All classified information is treated under separate rules established for national security information and is outside the scope of this guideline.
1.0
NIEF profile of identity provider attribute assertion requirements for federated user access to systems that provide data from the Property Protection information type, as defined by NIST Special Publication 800-60, Volume II, Revision 1, Section D.16.5. Property protection entails all activities performed to ensure the security of civilian and government property.
1.0
NIEF profile of identity provider attribute assertion requirements for federated user access to systems that provide data from the Substance Control information type, as defined by NIST Special Publication 800-60, Volume II, Revision 1, Section D.16.6. Substance control supports activities associated with the enforcement of legal substances (i.e., alcohol and tobacco) and illegal narcotics laws including trafficking, possession, sale, distribution, and other related activities.
1.0
NIEF profile of identity provider attribute assertion requirements for federated user access to systems that provide data from the Trade Law Enforcement information type, as defined by NIST Special Publication 800-60, Volume II, Revision 1, Section D.16.8. Trade law enforcement refers to the enforcement of anti-boycott, international loan, and general trade laws.
1.0
Profile of NIEF's recommended data privacy policies and practices, based on privacy control guidance from NIST Special Publication 800-53 r4.
1.0
NIEF Profile for proper assertion of all three digital identity assurance level attributes -- identity assurance, authenticator assurance, and federation assurance -- as defined by NIST Special Publication 800-63-3.
1.0
NIEF federation assurance profile for relying party (RP) / service provider (SP) systems. Derived from NIST Special Publication 800-63C requirements.
1.0
Profile for proper assertion of all NIEF Highly Recommended Attributes as defined by the NIEF Attribute Registry. See https://nief.org/attribute-registry/bundles/NIEF-Highly-Recommended/.
1.0
This page is also available as JSON and XML.