Trustmark Definition Name | Version |
---|---|
Defines conformance and assessment criteria for verifying that an information system implements replay-resistant authentication mechanisms for network access to non-privileged accounts.
|
1.0 |
Defines conformance and assessment criteria for verifying that an information system implements multifactor authentication for network access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access and the device meets organization-defined strength of mechanism requirements.
|
1.0 |
Defines conformance and assessment criteria for verifying that an information system implements replay-resistant authentication mechanisms for network access to privileged accounts.
|
1.0 |
Defines conformance and assessment criteria for verifying that an information system implements multifactor authentication for network access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access and the device meets organization-defined strength of mechanism requirements.
|
1.0 |
Defines conformance and assessment criteria for verifying that an information system implements organization-defined out-of-band authentication under organization-defined conditions.
|
1.0 |
Defines conformance and assessment criteria for verifying that an information system implements multifactor authentication for remote access to privileged and non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access and the device meets organization-defined strength of mechanism requirements.
|
1.0 |
Defines conformance and assessment criteria for verifying that an information system provides a single sign-on capability for organization-defined information system accounts and services.
|
1.0 |
Specifies requirements in accordance with NIST Secure Software Development Framework (SSDF), version 1.1, Practice RV.1: Identification and Confirmation of Vulnerabilities on an Ongoing Basis. Requires an organization to help ensure that vulnerabilities are identified more quickly so that they can be remediated more quickly in accordance with risk, reducing the window of opportunity for attackers.
|
1.1 |
Defines conformance and assessment criteria for compliance with minimum security requirements for identification of actions not requiring identification or authentication as related to overall access control requirements.
|
1.0 |
Addresses the requirement for organization PKI certificate authorities (CAs) to require that the identification of Subscribers meet the requirements specified for Subscriber identification in the organization certificate policy.
|
1.0 |
Addresses the requirement that for organization PKI certificate authorities (CAs), the identification of Subscribers must meet the requirements specified for Subscriber identification in the X.509 Certificate Policy For The Federal Bridge Certification Authority (FBCA)
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization specifies which information system components carry out auditing activities.
|
1.0 |
This Trustmark Definition defines conformance and assessment criteria for compliance with requirements individuals to identify themselves before being permitted to perform any actions set forth for their defined PKI roles or identity.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for identified account types as related to overall access control requirements.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for identifier inactivity as related to overall identification and authentication requirements.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization coordinates with organization-defined external organizations for cross-organization management of identifiers.
|
1.0 |
Defines conformance and assessment criteria for verifying that an information system dynamically manages identifiers.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization manages individual identifiers by uniquely identifying each individual with an organization-defined characteristic identifying individual status.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization requires that the registration process to receive an individual identifier be conducted in person before a designated registration authority.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization requires multiple forms of certification of individual identification be presented to the registration authority.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization prohibits the use of information system account identifiers that are the same as public identifiers for individual electronic mail accounts.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization requires that the registration process to receive an individual identifier includes supervisor authorization.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for identifier reuse as related to overall identification and authentication requirements.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for identifier selection as related to overall identification and authentication requirements.
|
1.0 |
Addresses requirements for in-person identity proofing before a Trusted Agent of a PKI Registration Authority.
|
1.0 |