Trustmark Definition Name | Version |
---|---|
Defines conformance and assessment criteria for verifying that an organization authorizes the use of mobile code within the information system.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization controls the use of mobile code within the information system.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization monitors the use of mobile code within the information system.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization ensures that the acquisition, development, and use of mobile code to be deployed in the information system meets organization-defined mobile code requirements.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization allows execution of permitted mobile code only in confined virtual machine environments.
|
1.0 |
Defines conformance and assessment criteria for verifying that an information system identifies organization-defined unacceptable mobile code and takes organization-defined corrective actions.
|
1.0 |
Defines conformance and assessment criteria for verifying that an information system prevents the automatic execution of mobile code in organization-defined software applications and enforces organization-defined actions prior to executing the code.
|
1.0 |
Defines conformance and assessment criteria for verifying that an information system prevents the download and execution of organization-defined unacceptable mobile code.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for mobile device configuration requirements as related to overall access control requirements.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for mobile device connection authorization as related to overall access control requirements.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for mobile device connection requirements as related to overall access control requirements.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for mobile device implementation guidance as related to overall access control requirements.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization employs a MDM system for cellular devices that facilitates the ability to provide antivirus services at an organizational level.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization will automatically wipe mobile devices after a certain amount of failed access attempts.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization's Mobile Device Management (MDM) solution provides centralized management.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization ensures that sensitive information is only transferred between authorized applications and storage areas of the mobile devices.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization's Mobile Device Management (MDM) solution provides the ability to detect "rooted" and "jailbroken" devices.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization detects unauthorized configurations, software, or applications on mobile devices with access to sensitive information.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization employs a Mobile Device Management (MDM) system for cellular devices that provides firewall services at an organizational level.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization implements folder level encryption on mobile devices with access to sensitive information.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization implements Mobile Device Management (MDM) on mobile devices that are permitted to access sensitive information.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization is able to determine the location of all agency owned devices.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization applies mandatory policy settings to mobile devices with access to sensitive information.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization's Mobile Device Management (MDM) solution provides the ability to remotely lock devices.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization's Mobile Device Management (MDM) solution provides the ability to remotely wipe devices.
|
1.0 |