Trustmark Definitions (1001-1025 of 3493)

Trustmark Definition Name Version
Defines conformance and assessment criteria for verifying that an organization provides a short-term uninterruptible power supply to facilitate transition of the information system to long-term alternate power] in the event of a primary power source loss.
1.0
Defines conformance and assessment criteria for verifying that an organization provides a long-term alternate power supply for the information system that is capable of maintaining minimally required operational capability in the event of an extended loss of the primary power source.
1.0
Defines conformance and assessment criteria for verifying that an organization provides a long-term alternate power supply for the information system that is self-contained, not reliant on external power generation, and capable of maintaining [Selection: minimally required operational capability; full operational capability in the event of an extended loss of the primary power source. .
1.0
Defines conformance and assessment criteria for verifying that an organization provides the capability of shutting off power to the information system or individual system components in emergency situations.
1.0
Defines conformance and assessment criteria for verifying that an organization protects emergency power shutoff capability from unauthorized activation.
1.0
Defines conformance and assessment criteria for verifying that an organization places emergency shutoff switches or devices in defined locations to facilitate safe and easy access for personnel.
1.0
Addresses requirements for encoding the UUID within the serialNumber attribute of Card Authentication Certificates
1.0
Defines conformance and assessment criteria for verifying that an organization require passphrases used to unlock encrypted data at rest to be changed when previously authorized personnel no longer require access.
1.0
Defines conformance and assessment criteria for verifying that an organization requires passphrases used to unlock encrypted data at rest to not be a dictionary word.
1.0
Defines conformance and assessment criteria for verifying that an organization requires a minimum passphrase length to unlock encrypted data at rest.
1.0
Defines conformance and assessment criteria for verifying that an organization requires multiple files maintained in the same unencrypted folder to have separate and distinct passphrases.
1.0
Defines conformance and assessment criteria for verifying that an organization requires passphrases used to unlock encrypted data at rest to include a minimum number of character types.
1.0
Defines conformance and assessment criteria for verifying that cryptographic modules employed by the organization certified to meet FIPS 140-2 standards.
1.0
Addresses the requirement for the encryption of electronically delivered private key material.
1.0
Defines conformance and assessment criteria for verifying that an organization using encryption for access control employs FIPS 140-2 compliant cryptography.
1.0
Addresses requirements for End Entity certificates containing only valid Uniform Resource Identifiers (URIs) that are accessible by relying parties.
1.0
This Trustmark Definition specifies a minimum Diffie-Hellman key size for PKI.
1.0
This Trustmark Definition specifies a minimum DSA key size for private keys use with PKI.
1.0
This Trustmark Definition specifies a minimum DSA key size for public keys use with PKI.
1.0
This Trustmark Definition specifies a minimum Elliptic Curve key size for private keys use with PKI.
1.0
Addresses the requirement for end-entity certificates shall contain public keys that are at least 160 bits for elliptic curve algorithms.
1.0
This Trustmark Definition specifies a minimum RSA key size for private keys use with PKI.
1.0
This Trustmark Definition specifies a minimum RSA key size for public keys use with PKI.
1.0
Addresses the requirement for all end-entity certificates associated with PKI to contain public keys that conform to NIST SP 800-78.
1.0
Defines privacy requirements related to the enforcement of Safe Harbor Privacy Principles.
1.0
This page is also available as JSON and XML.