Trustmark Definitions (1226-1250 of 3247)

Trustmark Definition Name Version
Specifies requirements in accordance with Identity Ecosystem Framework (IDEF) requirement INTEROP-2: THIRD-PARTY CREDENTIALS.
1.0
Specifies requirements in accordance with Identity Ecosystem Framework (IDEF) requirement PRIVACY-8: THIRD-PARTY LIMITATIONS.
1.0
Specifies requirements in accordance with Identity Ecosystem Framework (IDEF) requirement SECURE-7: TOKEN CONTROL.
1.0
Specifies requirements in accordance with Identity Ecosystem Framework (IDEF) requirement SECURE-10: UPTIME.
1.0
Specifies requirements in accordance with Identity Ecosystem Framework (IDEF) requirement USABLE-2: USABILITY ASSESSMENT.
1.0
Specifies requirements in accordance with Identity Ecosystem Framework (IDEF) requirement USABLE-6: USABILITY FEEDBACK.
1.0
Specifies requirements in accordance with Identity Ecosystem Framework (IDEF) requirement USABLE-1: USABILITY PRACTICES.
1.0
Specifies requirements in accordance with Identity Ecosystem Framework (IDEF) requirement PRIVACY-6: USAGE NOTICE.
1.0
Specifies requirements in accordance with Identity Ecosystem Framework (IDEF) requirement PRIVACY-7: USER DATA CONTROL.
1.0
Specifies requirements in accordance with Identity Ecosystem Framework (IDEF) requirement PRIVACY-9: USER NOTICE OF CHANGES.
1.0
Specifies requirements in accordance with Identity Ecosystem Framework (IDEF) requirement PRIVACY-10: USER OPTION TO DECLINE.
1.0
Specifies requirements in accordance with Identity Ecosystem Framework (IDEF) requirement INTEROP-7: USER REDRESS.
1.0
Specifies requirements in accordance with Identity Ecosystem Framework (IDEF) requirement USABLE-7: USER REQUESTS.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for identification and authentication of organizational users as related to overall identification and authentication requirements.
1.0
Defines conformance and assessment criteria for verifying that an information system accepts and electronically verifies Personal Identity Verification-I (PIV-I) credentials.
1.0
Defines conformance and assessment criteria for verifying that an organization requires individuals to be authenticated with an individual authenticator when a group authenticator is employed.
1.0
Defines conformance and assessment criteria for verifying that an information system implements multifactor authentication for local access to non-privileged accounts.
1.0
Defines conformance and assessment criteria for verifying that an information system implements multifactor authentication for local access to privileged accounts.
1.0
Defines conformance and assessment criteria for verifying that an information system implements multifactor authentication for network access to non-privileged accounts.
1.0
Defines conformance and assessment criteria for verifying that an information system implements replay-resistant authentication mechanisms for network access to non-privileged accounts.
1.0
Defines conformance and assessment criteria for verifying that an information system implements multifactor authentication for network access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access and the device meets organization-defined strength of mechanism requirements.
1.0
Defines conformance and assessment criteria for verifying that an information system implements replay-resistant authentication mechanisms for network access to privileged accounts.
1.0
Defines conformance and assessment criteria for verifying that an information system implements multifactor authentication for network access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access and the device meets organization-defined strength of mechanism requirements.
1.0
Defines conformance and assessment criteria for verifying that an information system implements organization-defined out-of-band authentication under organization-defined conditions.
1.0
Defines conformance and assessment criteria for verifying that an information system implements multifactor authentication for remote access to privileged and non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access and the device meets organization-defined strength of mechanism requirements.
1.0
This page is also available as JSON and XML.