Trust Interoperability Profiles (76-100 of 174)

Trust Interoperability Profile Name Version
Ideal profile of security controls from NIST Special Publication 800-53 r4 for systems that need to operate at a LOW-HIGH-HIGH impact level, as recommended by NIEF. Pertains to systems that operate at LOW confidentiality, HIGH integrity, and HIGH availability. Includes all applicable security controls from NIST SP 800-53 r4, regardless of Priority level. Incorporates security control downgrading guidance, as appropriate, based on recommendations on page 35 of NIST SP 800-53 r4.
1.0
Ideal profile of security controls from NIST Special Publication 800-53 r4 for systems that need to operate at a LOW-HIGH-LOW impact level, as recommended by NIEF. Pertains to systems that operate at LOW confidentiality, HIGH integrity, and LOW availability. Includes all applicable security controls from NIST SP 800-53 r4, regardless of Priority level. Incorporates security control downgrading guidance, as appropriate, based on recommendations on page 35 of NIST SP 800-53 r4.
1.0
Ideal profile of security controls from NIST Special Publication 800-53 r4 for systems that need to operate at a LOW-HIGH-MODERATE impact level, as recommended by NIEF. Pertains to systems that operate at LOW confidentiality, HIGH integrity, and MODERATE availability. Includes all applicable security controls from NIST SP 800-53 r4, regardless of Priority level. Incorporates security control downgrading guidance, as appropriate, based on recommendations on page 35 of NIST SP 800-53 r4.
1.0
Ideal profile of security controls from NIST Special Publication 800-53 r4 for systems that need to operate at a LOW-LOW-HIGH impact level, as recommended by NIEF. Pertains to systems that operate at LOW confidentiality, LOW integrity, and HIGH availability. Includes all applicable security controls from NIST SP 800-53 r4, regardless of Priority level. Incorporates security control downgrading guidance, as appropriate, based on recommendations on page 35 of NIST SP 800-53 r4.
1.0
Ideal profile of security controls from NIST Special Publication 800-53 r4 for systems that need to operate at a LOW-LOW-LOW impact level, as recommended by NIEF. Pertains to systems that operate at LOW confidentiality, LOW integrity, and LOW availability. Includes all applicable security controls from NIST SP 800-53 r4, regardless of Priority level. Incorporates security control downgrading guidance, as appropriate, based on recommendations on page 35 of NIST SP 800-53 r4.
1.0
Ideal profile of security controls from NIST Special Publication 800-53 r4 for systems that need to operate at a LOW-LOW-MODERATE impact level, as recommended by NIEF. Pertains to systems that operate at LOW confidentiality, LOW integrity, and MODERATE availability. Includes all applicable security controls from NIST SP 800-53 r4, regardless of Priority level. Incorporates security control downgrading guidance, as appropriate, based on recommendations on page 35 of NIST SP 800-53 r4.
1.0
Ideal profile of security controls from NIST Special Publication 800-53 r4 for systems that need to operate at a LOW-MODERATE-HIGH impact level, as recommended by NIEF. Pertains to systems that operate at LOW confidentiality, MODERATE integrity, and HIGH availability. Includes all applicable security controls from NIST SP 800-53 r4, regardless of Priority level. Incorporates security control downgrading guidance, as appropriate, based on recommendations on page 35 of NIST SP 800-53 r4.
1.0
Ideal profile of security controls from NIST Special Publication 800-53 r4 for systems that need to operate at a LOW-MODERATE-LOW impact level, as recommended by NIEF. Pertains to systems that operate at LOW confidentiality, MODERATE integrity, and LOW availability. Includes all applicable security controls from NIST SP 800-53 r4, regardless of Priority level. Incorporates security control downgrading guidance, as appropriate, based on recommendations on page 35 of NIST SP 800-53 r4.
1.0
Ideal profile of security controls from NIST Special Publication 800-53 r4 for systems that need to operate at a LOW-MODERATE-MODERATE impact level, as recommended by NIEF. Pertains to systems that operate at LOW confidentiality, MODERATE integrity, and MODERATE availability. Includes all applicable security controls from NIST SP 800-53 r4, regardless of Priority level. Incorporates security control downgrading guidance, as appropriate, based on recommendations on page 35 of NIST SP 800-53 r4.
1.0
Ideal profile of security controls from NIST Special Publication 800-53 r4 for systems that need to operate at a MODERATE-HIGH-HIGH impact level, as recommended by NIEF. Pertains to systems that operate at MODERATE confidentiality, HIGH integrity, and HIGH availability. Includes all applicable security controls from NIST SP 800-53 r4, regardless of Priority level. Incorporates security control downgrading guidance, as appropriate, based on recommendations on page 35 of NIST SP 800-53 r4.
1.0
Ideal profile of security controls from NIST Special Publication 800-53 r4 for systems that need to operate at a MODERATE-HIGH-LOW impact level, as recommended by NIEF. Pertains to systems that operate at MODERATE confidentiality, HIGH integrity, and LOW availability. Includes all applicable security controls from NIST SP 800-53 r4, regardless of Priority level. Incorporates security control downgrading guidance, as appropriate, based on recommendations on page 35 of NIST SP 800-53 r4.
1.0
Ideal profile of security controls from NIST Special Publication 800-53 r4 for systems that need to operate at a MODERATE-HIGH-MODERATE impact level, as recommended by NIEF. Pertains to systems that operate at MODERATE confidentiality, HIGH integrity, and MODERATE availability. Includes all applicable security controls from NIST SP 800-53 r4, regardless of Priority level. Incorporates security control downgrading guidance, as appropriate, based on recommendations on page 35 of NIST SP 800-53 r4.
1.0
Ideal profile of security controls from NIST Special Publication 800-53 r4 for systems that need to operate at a MODERATE-LOW-HIGH impact level, as recommended by NIEF. Pertains to systems that operate at MODERATE confidentiality, LOW integrity, and HIGH availability. Includes all applicable security controls from NIST SP 800-53 r4, regardless of Priority level. Incorporates security control downgrading guidance, as appropriate, based on recommendations on page 35 of NIST SP 800-53 r4.
1.0
Ideal profile of security controls from NIST Special Publication 800-53 r4 for systems that need to operate at a MODERATE-LOW-LOW impact level, as recommended by NIEF. Pertains to systems that operate at MODERATE confidentiality, LOW integrity, and LOW availability. Includes all applicable security controls from NIST SP 800-53 r4, regardless of Priority level. Incorporates security control downgrading guidance, as appropriate, based on recommendations on page 35 of NIST SP 800-53 r4.
1.0
Ideal profile of security controls from NIST Special Publication 800-53 r4 for systems that need to operate at a MODERATE-LOW-MODERATE impact level, as recommended by NIEF. Pertains to systems that operate at MODERATE confidentiality, LOW integrity, and MODERATE availability. Includes all applicable security controls from NIST SP 800-53 r4, regardless of Priority level. Incorporates security control downgrading guidance, as appropriate, based on recommendations on page 35 of NIST SP 800-53 r4.
1.0
Ideal profile of security controls from NIST Special Publication 800-53 r4 for systems that need to operate at a MODERATE-MODERATE-HIGH impact level, as recommended by NIEF. Pertains to systems that operate at MODERATE confidentiality, MODERATE integrity, and HIGH availability. Includes all applicable security controls from NIST SP 800-53 r4, regardless of Priority level. Incorporates security control downgrading guidance, as appropriate, based on recommendations on page 35 of NIST SP 800-53 r4.
1.0
Ideal profile of security controls from NIST Special Publication 800-53 r4 for systems that need to operate at a MODERATE-MODERATE-LOW impact level, as recommended by NIEF. Pertains to systems that operate at MODERATE confidentiality, MODERATE integrity, and LOW availability. Includes all applicable security controls from NIST SP 800-53 r4, regardless of Priority level. Incorporates security control downgrading guidance, as appropriate, based on recommendations on page 35 of NIST SP 800-53 r4.
1.0
Ideal profile of security controls from NIST Special Publication 800-53 r4 for systems that need to operate at a MODERATE-MODERATE-MODERATE impact level, as recommended by NIEF. Pertains to systems that operate at MODERATE confidentiality, MODERATE integrity, and MODERATE availability. Includes all applicable security controls from NIST SP 800-53 r4, regardless of Priority level. Incorporates security control downgrading guidance, as appropriate, based on recommendations on page 35 of NIST SP 800-53 r4.
1.0
Profile for proper assertion of all NIEF Mandatory Attributes as defined by the NIEF Attribute Registry. See https://nief.org/attribute-registry/bundles/NIEF-Mandatory/.
1.0
Profile for proper assertion of all NIEF Mandatory Attributes as defined by the NIEF Attribute Registry. See https://nief.org/attribute-registry/bundles/NIEF-Mandatory/.
2.0
Minimal profile of security controls from NIST Special Publication 800-53 r4 for systems that handle the Border and Transportation Security information type, as defined by NIST Special Publication 800-60, Volume II, Revision 1, Section D.2.1. Border and Transportation Security includes facilitating or deterring entry and exit of people, goods, and conveyances at and between U.S. ports of entry, as well as ensuring the security of transportation and infrastructure networks, facilities, vehicles, and personnel within the United States. Border control involves enforcing the laws regulating the admission of foreign-born persons (i.e., aliens) to the United States. This includes patrolling and monitoring borders and deportation of illegal aliens. Some border control information is also associated with other mission information types (e.g., criminal apprehension, and criminal investigation and surveillance information). In such cases, the impact levels of the associated mission information may determine impact levels associated with border control information. Some aspects of ensuring security of transportation and infrastructure networks, facilities, vehicles, and personnel within the United States are also covered under the information types associated with the transportation mission. In some cases the border control information may be classified. Any classified information is treated under separate rules established for national security information. Systems that handle Border and Transportation Security information should operate at an impact level of MODERATE confidentiality, MODERATE integrity, and MODERATE availability, as recommended by NIST.
1.0
Minimal profile of security controls from NIST Special Publication 800-53 r4 for systems that handle the Citizen Protection information type, as defined by NIST Special Publication 800-60, Volume II, Revision 1, Section D.16.3. Citizen protection involves all activities performed to protect the general population of the United States from criminal activity. Systems that handle Citizen Protection information should operate at an impact level of MODERATE confidentiality, MODERATE integrity, and MODERATE availability, as recommended by NIST.
1.0
Minimal profile of security controls from NIST Special Publication 800-53 r4 for systems that handle the Crime Prevention information type, as defined by NIST Special Publication 800-60, Volume II, Revision 1, Section D.16.7. Crime prevention entails all efforts designed to create safer communities through the control and reduction of crime by addressing the causes of crime and reducing the opportunities of crime. Systems that handle Crime Prevention information should operate at an impact level of LOW confidentiality, LOW integrity, and LOW availability, as recommended by NIST.
1.0
Minimal profile of security controls from NIST Special Publication 800-53 r4 for systems that handle the Criminal Apprehension information type, as defined by NIST Special Publication 800-60, Volume II, Revision 1, Section D.16.1. Criminal apprehension supports activities associated with the tracking and capture of groups or individuals believed to be responsible for committing Federal crimes. Systems that handle Criminal Apprehension information should operate at an impact level of LOW confidentiality, LOW integrity, and MODERATE availability, as recommended by NIST.
1.0
Minimal profile of security controls from NIST Special Publication 800-53 r4 for systems that handle the Criminal Incarceration information type, as defined by NIST Special Publication 800-60, Volume II, Revision 1, Section D.18.1. Criminal incarceration includes activities associated with the housing, custody and general care of criminals sentenced to serve time in penitentiaries. Systems that handle Criminal Incarceration information should operate at an impact level of LOW confidentiality, MODERATE integrity, and LOW availability, as recommended by NIST.
1.0
This page is also available as JSON and XML.