Trustmark Definition Name | Version |
---|---|
Specifies requirements in accordance with the security and privacy controls specified by ISO/IEC Publication 27001:2022, related to securing offices, rooms and facilities.
|
2022 |
Specifies requirements in accordance with the security and privacy controls specified by ISO/IEC Publication 27001:2022, related to security of assets off-premises.
|
2022 |
Specifies requirements in accordance with the security and privacy controls specified by ISO/IEC Publication 27001:2022, related to security of network services.
|
2022 |
Specifies requirements in accordance with the security and privacy controls specified by ISO/IEC Publication 27001:2022, related to security testing in development and acceptance.
|
2022 |
Specifies requirements in accordance with the security and privacy controls specified by ISO/IEC Publication 27001:2022, related to segregation of duties.
|
2022 |
Specifies requirements in accordance with the security and privacy controls specified by ISO/IEC Publication 27001:2022, related to segregation of networks.
|
2022 |
Specifies requirements in accordance with the security and privacy controls specified by ISO/IEC Publication 27001:2022, related to separation of development, test and production environments.
|
2022 |
Specifies requirements in accordance with the security and privacy controls specified by ISO/IEC Publication 27001:2022, related to storage media.
|
2022 |
Specifies requirements in accordance with the security and privacy controls specified by ISO/IEC Publication 27001:2022, related to supporting utilities.
|
2022 |
Specifies requirements in accordance with the security and privacy controls specified by ISO/IEC Publication 27001:2022, related to terms and conditions of employment.
|
2022 |
Specifies requirements in accordance with the security and privacy controls specified by ISO/IEC Publication 27001:2022, related to test information.
|
2022 |
Specifies requirements in accordance with the security and privacy controls specified by ISO/IEC Publication 27001:2022, related to threat intelligence.
|
2022 |
Specifies requirements in accordance with the security and privacy controls specified by ISO/IEC Publication 27001:2022, related to use of cryptography.
|
2022 |
Specifies requirements in accordance with the security and privacy controls specified by ISO/IEC Publication 27001:2022, related to use of privileged utility programs.
|
2022 |
Specifies requirements in accordance with the security and privacy controls specified by ISO/IEC Publication 27001:2022, related to user end point devices.
|
2022 |
Specifies requirements in accordance with the security and privacy controls specified by ISO/IEC Publication 27001:2022, related to web filtering.
|
2022 |
Specifies requirements in accordance with the security and privacy controls specified by ISO/IEC Publication 27001:2022, related to working in secure areas.
|
2022 |
Defines conformance and assessment criteria for compliance with minimum security requirements for key and combination changes as related to overall physical and environmental protection requirements.
|
1.0 |
Addresses requirements for protection of PKI private keys during transfer.
|
1.0 |
Defines conformance and assessment criteria for verifying that the LASO ensures that the approved and appropriate security measures are in place and working as expected.
|
1.0 |
Defines conformance and assessment criteria for verifying that the LASO ensure that personnel security screening procedures are being followed as stated in the CJIS Security Policy.
|
1.0 |
Defines conformance and assessment criteria for verifying that the LASO has identified and documented how equipment is connected to the state system.
|
1.0 |
Defines conformance and assessment criteria for verifying that the LASO has identified who is using the CSA approved hardware, software, and firmware and ensured only authorized access.
|
1.0 |
Defines conformance and assessment criteria for verifying that the LASO supports policy compliance and ensures the CSA ISO is promptly informed of security incidents.
|
1.0 |
Addresses the requirement for the latency of PKI certificate status information distributed on-line by organization PKI certificate authorities (CAs) to meet the requirements for CRL issuance stated in the corresponding certificate policy
|
1.0 |