Trustmark Definitions (1676-1700 of 3493)

Trustmark Definition Name Version
Specifies requirements in accordance with the security and privacy controls specified by ISO/IEC Publication 27001:2022, related to securing offices, rooms and facilities.
2022
Specifies requirements in accordance with the security and privacy controls specified by ISO/IEC Publication 27001:2022, related to security of assets off-premises.
2022
Specifies requirements in accordance with the security and privacy controls specified by ISO/IEC Publication 27001:2022, related to security of network services.
2022
Specifies requirements in accordance with the security and privacy controls specified by ISO/IEC Publication 27001:2022, related to security testing in development and acceptance.
2022
Specifies requirements in accordance with the security and privacy controls specified by ISO/IEC Publication 27001:2022, related to segregation of duties.
2022
Specifies requirements in accordance with the security and privacy controls specified by ISO/IEC Publication 27001:2022, related to segregation of networks.
2022
Specifies requirements in accordance with the security and privacy controls specified by ISO/IEC Publication 27001:2022, related to separation of development, test and production environments.
2022
Specifies requirements in accordance with the security and privacy controls specified by ISO/IEC Publication 27001:2022, related to storage media.
2022
Specifies requirements in accordance with the security and privacy controls specified by ISO/IEC Publication 27001:2022, related to supporting utilities.
2022
Specifies requirements in accordance with the security and privacy controls specified by ISO/IEC Publication 27001:2022, related to terms and conditions of employment.
2022
Specifies requirements in accordance with the security and privacy controls specified by ISO/IEC Publication 27001:2022, related to test information.
2022
Specifies requirements in accordance with the security and privacy controls specified by ISO/IEC Publication 27001:2022, related to threat intelligence.
2022
Specifies requirements in accordance with the security and privacy controls specified by ISO/IEC Publication 27001:2022, related to use of cryptography.
2022
Specifies requirements in accordance with the security and privacy controls specified by ISO/IEC Publication 27001:2022, related to use of privileged utility programs.
2022
Specifies requirements in accordance with the security and privacy controls specified by ISO/IEC Publication 27001:2022, related to user end point devices.
2022
Specifies requirements in accordance with the security and privacy controls specified by ISO/IEC Publication 27001:2022, related to web filtering.
2022
Specifies requirements in accordance with the security and privacy controls specified by ISO/IEC Publication 27001:2022, related to working in secure areas.
2022
Defines conformance and assessment criteria for compliance with minimum security requirements for key and combination changes as related to overall physical and environmental protection requirements.
1.0
Addresses requirements for protection of PKI private keys during transfer.
1.0
Defines conformance and assessment criteria for verifying that the LASO ensures that the approved and appropriate security measures are in place and working as expected.
1.0
Defines conformance and assessment criteria for verifying that the LASO ensure that personnel security screening procedures are being followed as stated in the CJIS Security Policy.
1.0
Defines conformance and assessment criteria for verifying that the LASO has identified and documented how equipment is connected to the state system.
1.0
Defines conformance and assessment criteria for verifying that the LASO has identified who is using the CSA approved hardware, software, and firmware and ensured only authorized access.
1.0
Defines conformance and assessment criteria for verifying that the LASO supports policy compliance and ensures the CSA ISO is promptly informed of security incidents.
1.0
Addresses the requirement for the latency of PKI certificate status information distributed on-line by organization PKI certificate authorities (CAs) to meet the requirements for CRL issuance stated in the corresponding certificate policy
1.0
This page is also available as JSON and XML.