Trustmark Definitions (1776-1800 of 3247)

Trustmark Definition Name Version
Defines conformance and assessment criteria for verifying that an organization employs tools and techniques to monitor network events, detect attacks, and provide identification of unauthorized use.
1.0
Addresses the requirement for any network software present to be necessary to perform intended functions.
1.0
Addresses the requirement for the generation of new ceritifcates following the loss or compromize of PKI Certificate Authority signing keys.
1.0
Addresses requirements for collecting new facial images each time a PKI card is issued.
1.0
Specifies that a covered entity must not require individuals to waive certain rights as a condition for services.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for non-local system maintenance consistent with policy as related to overall maintenance requirements.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for non-local system maintenance session termination as related to overall maintenance requirements.
1.0
Defines conformance and assessment criteria for verifying that an information system at organization-defined information system components loads and executes organization-defined applications from hardware-enforced, read-only media.
1.0
Defines conformance and assessment criteria for verifying that an information system at organization-defined information system components loads and executes the operating environment from hardware-enforced, read-only media.
1.0
Defines conformance and assessment criteria for verifying that an organization employs hardware-based, write-protect for organization-defined information system firmware components.
1.0
Defines conformance and assessment criteria for verifying that an organization implements specific procedures for organization-defined authorized individuals to manually disable hardware write-protect for firmware modifications and re-enable the write-protect prior to returning to operational mode.
1.0
Defines conformance and assessment criteria for verifying that an organization protects the integrity of information prior to storage on read-only media and controls the media after such information has been recorded onto the media.
1.0
Defines conformance and assessment criteria for verifying that an organization employs organization-defined information system components with no writeable storage that is persistent across component restart or power on/off.
1.0
Addresses requirements for CA certificates including a non-NULL subject DN.
1.0
Addresses requirements for certificates issued to end entities to include a non-NULL subject DN.
1.0
Addresses requirements for RA certificates including a non-NULL subject DN.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for non-organizational users uniquely identified and authenticated as related to overall identification and authentication requirements.
1.0
Defines conformance and assessment criteria for verifying that an organization implements non-persistent organization-defined information system components and services that are initiated in a known state and terminated periodically at an organization-defined frequency.
1.0
Defines conformance and assessment criteria for verifying that an organization implements non-persistent organization-defined information system components and services that are initiated in a known state and terminated upon end of session of use.
1.0
Defines conformance and assessment criteria for verifying that an organization ensures that software and data employed during information system component and service refreshes are obtained from organization-defined trusted sources.
1.0
Defines conformance and assessment criteria for verifying that an organization requires the use of non-privileged accounts when non-privileged functions are being performed.
1.0
Defines conformance and assessment criteria for verifying that an information system protects against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation.
1.0
Defines conformance and assessment criteria for verifying that an information system performs organization-defined actions in the event of an information reviewer identity to the information binding validation error.
1.0
Defines conformance and assessment criteria for verifying that an information system performs organization-defined actions in the event of a producer identity to information binding validation error.
1.0
Defines conformance and assessment criteria for verifying that an information system binds the identity of the information producer with the information to organization-defined strength of binding.
1.0
This page is also available as JSON and XML.