Trustmark Definitions (1326-1350 of 3247)

Trustmark Definition Name Version
Defines conformance and assessment criteria for verifying that an organization's incident response training addresses individuals' actions.
1.0
Defines conformance and assessment criteria for verifying that an organization's incident response training addresses points of contact.
1.0
Defines conformance and assessment criteria for verifying that an organization employs automated mechanisms to provide a more thorough and realistic incident response training environment.
1.0
Defines conformance and assessment criteria for verifying that an organization incorporates simulated events into incident response training.
1.0
Addresses the requirement for the organizations to use independent auditors for PKI compliance audits.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for indication of use of collaborative computing devices as related to overall system and communications protection requirements.
1.0
Addresses the requirement for the individual personnel shall be specifically designated to one of the four PKI trusted roles: Administrative, Officer, Auditor or Operator.
1.0
Specifies that a health care related organization must have policies for granting access to electronic protected health information.
1.0
Specifies that a health care related organization must implement procedures for granting access to electronic protected health information.
1.0
Specifies that a health care related organization must have policies that, based upon the organization's access authorization policies, establish, document, review, and modify a user's right of access to a workstation.
1.0
Specifies that a health care related organization must implement procedures that, based upon theorganization's access authorization policies, establish, document, review, and modify a user's right of access to a workstation.
1.0
Specifies that if an organization is a health care clearinghouse that is part of a larger organization, the clearinghouse must have policies that protect the electronic protected health information of the clearinghouse from unauthorized access by the larger organization.
1.0
Specifies that if an organization is a health care clearinghouse that is part of a larger organization, the clearinghouse must implement procedures that protect the electronic protected health information of the clearinghouse from unauthorized access by the larger organization.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for information and system are categorized as related to overall risk assessment requirements.
1.0
Defines conformance and assessment criteria for verifying that an information system enforces approved authorizations.
1.0
Defines conformance and assessment criteria for verifying that an information system provides access from a single device to computing platforms, applications, or data residing on multiple different security domains, while preventing any information flow between the different security domains.
1.0
Defines conformance and assessment criteria for verifying that an organization employs organization-defined solutions in approved configurations to control the flow of organization-defined information across security domains.
1.0
Defines conformance and assessment criteria for verifying that an information system provides the capability for privileged administrators to configure organization-defined security policy filters to support different security policies.
1.0
Defines conformance and assessment criteria for verifying that an information system prevents encrypted information from bypassing content-checking mechanisms.
1.0
Defines conformance and assessment criteria for verifying that an information system, when transferring information between different security domains, uses organization-defined data type identifiers to validate data essential for information flow decisions.
1.0
Defines conformance and assessment criteria for verifying that an information system, when transferring information between different security domains, decomposes information into organization-defined policy-relevant subcomponents for submission to policy enforcement mechanisms.
1.0
Defines conformance and assessment criteria for verifying that an information system, when transferring information between different security domains, examines the information for the presence of [Assignment: organized-defined unsanctioned information and prohibits the transfer of such information in accordance with the organization-defined security policy.
1.0
Defines conformance and assessment criteria for verifying that an information system uniquely identifies and authenticates source and destination points by organization, system, application, and/or individual for information transfer.
1.0
Defines conformance and assessment criteria for verifying that an information system enforces dynamic information flow control based on organization-defined policies.
1.0
Defines conformance and assessment criteria for verifying that an information system enforces organization-defined limitations on embedding data types within other data types.
1.0
This page is also available as JSON and XML.