Trustmark Definitions (1851-1875 of 3493)

Trustmark Definition Name Version
Defines privacy requirements related limiting the disclosure of sensitive information.
1.0
Defines privacy requirements related to technological limitations on the use of sensitive information.
1.0
Defines privacy requirements related to limitations on the use of sensitive information.
1.0
This Trustmark Definition specifies a minimum ECDSA key size for PKI.
1.0
This Trustmark Definition specifies a minimum RSA key size for private keys use with PKI.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for minimum content of audit records as related to overall audit and accountability requirements.
1.0
Specifies requirements in accordance with General Data Protection Regulation (GDPR) Art. 35(7).
1.0
This Trustmark Definition specifies a minimum ECDSA public key size for PKI.
1.0
This Trustmark Definition specifies minimum symmetric and asymmetric RSA key sizes for TLS and similar protocols used to protect PKI information.
1.0
This Trustmark Definition specifies a minimum RSA key size for private keys use with PKI.
1.0
Defines conformance and assessment criteria for verifying that an organization defines mission/business processes with consideration for information security and the resulting risk to individuals.
1.0
Defines conformance and assessment criteria for verifying that an organization defines mission/business processes with consideration for information security and the resulting risk to organizational assets.
1.0
Defines conformance and assessment criteria for verifying that an organization defines mission/business processes with consideration for information security and the resulting risk to organizational operations.
1.0
Defines conformance and assessment criteria for verifying that an organization defines mission/business processes with consideration for information security and the resulting risk to other organizations.
1.0
Defines conformance and assessment criteria for verifying that an organization defines mission/business processes with consideration for information security and the resulting risk to the Nation.
1.0
Defines conformance and assessment criteria for verifying that an organization determines information protection needs arising from the defined mission/business processes.
1.0
Defines conformance and assessment criteria for verifying that an organization revises information protection needs arising from the defined mission/business processes until achievable protection needs are obtained.
1.0
Addresses the requirement for organization principal certificate authorities (CAs) operated offline to notify the FPKIMA upon emergency CRL issuance.
1.0
Defines conformance and assessment criteria for verifying that an organization defines acceptable mobile code and mobile code technologies.
1.0
Defines conformance and assessment criteria for verifying that an organization establishes implementation guidance for acceptable mobile code and mobile code technologies.
1.0
Defines conformance and assessment criteria for verifying that an organization defines unacceptable mobile code and mobile code technologies.
1.0
Defines conformance and assessment criteria for verifying that an organization establishes usage restrictions for acceptable mobile code and mobile code technologies.
1.0
Defines conformance and assessment criteria for verifying that an organization authorizes the use of mobile code within the information system.
1.0
Defines conformance and assessment criteria for verifying that an organization controls the use of mobile code within the information system.
1.0
Defines conformance and assessment criteria for verifying that an organization monitors the use of mobile code within the information system.
1.0
This page is also available as JSON and XML.