Trustmark Definitions (1676-1700 of 3247)

Trustmark Definition Name Version
Defines privacy requirements for organizations to transmit only those attributes requested by relying parties.
1.0
Defines privacy requirements for documentation to distinguish between information needed to conduct authentication and any other information requested by a relying party.
1.0
Defines privacy requirements related to the deletion of sensitive information after calculation for statistical purposes.
1.0
Defines privacy requirements related limiting the collection of sensitive information.
1.0
Defines privacy requirements related limiting the disclosure of sensitive information.
1.0
Defines privacy requirements related to technological limitations on the use of sensitive information.
1.0
Defines privacy requirements related to limitations on the use of sensitive information.
1.0
This Trustmark Definition specifies a minimum ECDSA key size for PKI.
1.0
This Trustmark Definition specifies a minimum RSA key size for private keys use with PKI.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for minimum content of audit records as related to overall audit and accountability requirements.
1.0
This Trustmark Definition specifies a minimum ECDSA public key size for PKI.
1.0
This Trustmark Definition specifies minimum symmetric and asymmetric RSA key sizes for TLS and similar protocols used to protect PKI information.
1.0
This Trustmark Definition specifies a minimum RSA key size for private keys use with PKI.
1.0
Defines conformance and assessment criteria for verifying that an organization defines mission/business processes with consideration for information security and the resulting risk to individuals.
1.0
Defines conformance and assessment criteria for verifying that an organization defines mission/business processes with consideration for information security and the resulting risk to organizational assets.
1.0
Defines conformance and assessment criteria for verifying that an organization defines mission/business processes with consideration for information security and the resulting risk to organizational operations.
1.0
Defines conformance and assessment criteria for verifying that an organization defines mission/business processes with consideration for information security and the resulting risk to other organizations.
1.0
Defines conformance and assessment criteria for verifying that an organization defines mission/business processes with consideration for information security and the resulting risk to the Nation.
1.0
Defines conformance and assessment criteria for verifying that an organization determines information protection needs arising from the defined mission/business processes.
1.0
Defines conformance and assessment criteria for verifying that an organization revises information protection needs arising from the defined mission/business processes until achievable protection needs are obtained.
1.0
Addresses the requirement for organization principal certificate authorities (CAs) operated offline to notify the FPKIMA upon emergency CRL issuance.
1.0
Defines conformance and assessment criteria for verifying that an organization defines acceptable mobile code and mobile code technologies.
1.0
Defines conformance and assessment criteria for verifying that an organization establishes implementation guidance for acceptable mobile code and mobile code technologies.
1.0
Defines conformance and assessment criteria for verifying that an organization defines unacceptable mobile code and mobile code technologies.
1.0
Defines conformance and assessment criteria for verifying that an organization establishes usage restrictions for acceptable mobile code and mobile code technologies.
1.0
This page is also available as JSON and XML.