Protection Profiles in Development
The following table lists all U.S. Government Protection Profiles currently being developed or modified and gives a general indication of their current status. For additional information, please send inquiries to firstname.lastname@example.org.
Proposed Protection Profile Development Process
~ 3 months +
|Protection Profile Status as of 19 May 2013|
|PP Name||Tech Type||Phase||Est. Completion|
|Certificate Authority||Certificate Management||Phase 1||CY 2013, Q2|
|Multifunction Printer||Multi Function Device||Phase 1||CY 2013, Q3|
|Intrusion Prevention Systems||IDS/IPS||Phase 1||CY 2013, Q3|
|Applications on an Operating System||Miscellaneous||Phase 1||CY 2013, Q3|
|Mobility Suite (OS, MDM, DAR, VPN, VOIP)||Mobility||Phase 1||CY 2013, Q3|
|Hardware Security Module||Miscellaneous||Phase 1||CY 2013, Q3|
|Software File Encryption||Encrypted Storage||Phase 2||CY 2013, Q2|
|Authentication Server||Miscellaneous||Phase 2||TBD|
|Virtualization||Miscellaneous||Phase 2||CY 2013, Q3|
Notes: The above estimated completion dates are subject to change. Each PP will need to be reviewed and depending on the comments received may require additional time to complete. The PP may also need additional time for public release co-ordination.