Trustmark Definitions (1701-1725 of 3493)

Trustmark Definition Name Version
Addresses the requirement for the latency of PKI certificate status information distributed on-line by organization PKI certificate authorities (CAs) to meet or exceed the requirements for CRL issuance stated in the corresponding certificate policy
1.0
Addresses the requirement for the latency of PKI certificate status information distributed on-line by organization delegated status responders to meet or exceed the requirements for CRL issuance stated in the corresponding certificate policy.
1.0
Specifies requirements in accordance with General Data Protection Regulation (GDPR) Art. 5(1)(a).
1.0
Defines conformance and assessment criteria for verifying that an organization employs a deny-all, permit-by-exception policy to allow the execution of authorized software programs on the information system.
1.0
Defines conformance and assessment criteria for verifying that an organization identifies software programs authorized to execute on the information system.
1.0
Defines conformance and assessment criteria for verifying that an organization regularly reviews and updates the list of authorized software programs.
1.0
Defines conformance and assessment criteria for verifying that an organization reviews the information system to identify unnecessary and/or nonsecure functions.
1.0
Defines conformance and assessment criteria for verifying that an organization reviews the information system to identify unnecessary and/or nonsecure ports.
1.0
Defines conformance and assessment criteria for verifying that an organization reviews the information system to identify unnecessary and/or nonsecure protocols.
1.0
Defines conformance and assessment criteria for verifying that an organization reviews the information system to identify unnecessary and/or nonsecure services.
1.0
Defines conformance and assessment criteria for verifying that an information system prevents program execution in accordance with organization-defined policies and rules.
1.0
Defines conformance and assessment criteria for verifying that an organization ensures compliance with organization-defined registration requirements for functions, ports, protocols, and services.
1.0
Defines conformance and assessment criteria for verifying that an organization employs an allow-all, deny-by-exception policy to prohibit the execution of unauthorized software programs on the information system.
1.0
Defines conformance and assessment criteria for verifying that an organization identifies software programs not authorized to execute on the information system.
1.0
Defines conformance and assessment criteria for verifying that an organization regularly reviews and updates the list of unauthorized software programs.
1.0
Defines conformance and assessment criteria for verifying that an organization disables functions within the information system deemed to be unnecessary and/or nonsecure.
1.0
Defines conformance and assessment criteria for verifying that an organization disables ports within the information system deemed to be unnecessary and/or nonsecure.
1.0
Defines conformance and assessment criteria for verifying that an organization disables protocols within the information system deemed to be unnecessary and/or nonsecure.
1.0
Defines conformance and assessment criteria for verifying that an organization disables services within the information system deemed to be unnecessary and/or nonsecure.
1.0
Defines conformance and assessment criteria for verifying that an organization employs the principle of least privilege.
1.0
Defines conformance and assessment criteria for verifying that an information system prevents organization-defined software from executing at higher privilege levels than users executing the software.
1.0
Defines conformance and assessment criteria for verifying that an organization prohibits privileged access to the information system by non-organizational users.
1.0
Defines conformance and assessment criteria for verifying that an organization reassigns or removes privileges, if necessary, to correctly reflect organizational mission/business needs.
1.0
Defines conformance and assessment criteria for verifying that an organization reviews the privileges assigned to organization-defined roles or classes of users to validate the need for such privileges at an organization-defined frequency.
1.0
Defines conformance and assessment criteria for verifying that an information system provides separate processing domains to enable finer-grained allocation of user privileges.
1.0
This page is also available as JSON and XML.