Trustmark Definitions (1151-1175 of 3493)

Trustmark Definition Name Version
Defines conformance and assessment criteria for verifying that an organization employs automated mechanisms at an organization-defined frequency to determine the state of information system components with regard to flaw remediation.
1.0
Defines conformance and assessment criteria for verifying that an organization installs organization-defined security-relevant software and firmware updates automatically to organization-defined information system components.
1.0
Defines conformance and assessment criteria for verifying that an organization centrally manages the flaw remediation process.
1.0
Defines conformance and assessment criteria for verifying that an organization removes organization-defined software and firmware components after updated versions have been installed.
1.0
Defines conformance and assessment criteria for verifying that an organization measures the time between flaw identification and flaw remediation; and establishes organization-defined benchmarks for taking corrective actions.
1.0
Defines conformance and assessment criteria for verifying that the organization has formal information security event reporting and escalation procedures in place.
1.0
Addresses formatting requirements for electronic facial images collected during identity proofing for PKI card issuance.
1.0
Addresses formatting requirements for electronic fingerprints collected during identity proofing for PKI card issuance.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for forwarding of security incident information as related to overall incident response requirements.
1.0
Specifies requirements in accordance with General Data Protection Regulation (GDPR) Art. 7(4).
1.0
Specifies requirements in accordance with General Data Protection Regulation (GDPR) Art. 15(1).
1.0
Specifies requirements in accordance with General Data Protection Regulation (GDPR) Art. 17(1).
1.0
Specifies requirements in accordance with General Data Protection Regulation (GDPR) Art. 21(2).
1.0
Specifies requirements in accordance with General Data Protection Regulation (GDPR) Art. 21(1).
1.0
Specifies requirements in accordance with General Data Protection Regulation (GDPR) Art. 16.
1.0
Specifies requirements in accordance with General Data Protection Regulation (GDPR) Art. 18(1).
1.0
Defines conformance and assessment criteria for verifying that an organization, if assigned a P (limited access) ORI, does NOT permit the use of the full access ORI of another agency to conduct any inquiry transactions.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for generation of audit records as related to overall audit and accountability requirements.
1.0
Addresses the requirement for the generation of new keys following the loss or compromize of PKI Certificate Authority signing keys.
1.0
Addresses acceptable key generation parameters for use with PKI
1.0
Defines conformance and assessment criteria for verifying that an organization develops operational privacy policies that govern the appropriate privacy and security controls for programs, information systems, or technologies involving PII.
1.0
Defines conformance and assessment criteria for verifying that an organization develops operational privacy procedures that govern the appropriate privacy and security controls for programs, information systems, or technologies involving PII.
1.0
Defines conformance and assessment criteria for verifying that an organization disseminates operational privacy policies that govern the appropriate privacy and security controls for programs, information systems, or technologies involving PII.
1.0
Defines conformance and assessment criteria for verifying that an organization disseminates operational privacy procedures that govern the appropriate privacy and security controls for programs, information systems, or technologies involving PII.
1.0
Defines conformance and assessment criteria for verifying that an organization implements operational privacy policies that govern the appropriate privacy and security controls for programs, information systems, or technologies involving PII.
1.0
This page is also available as JSON and XML.