Trustmark Definition Name | Version |
---|---|
Defines conformance and assessment criteria for verifying that an organization meets the Advanced Authentication requirements of the CJIS Security Policy.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization meets the Advanced Authentication requirements of the CJIS Security Policy.
|
1.1 |
Defines conformance and assessment criteria for verifying that private organizations performing criminal justice functions meet the same training and certification criteria required by governmental agencies performing similar functions.
|
1.0 |
Addresses the requirement for organization PKI certificate authorities (CAs) to record destruction of PKI cards.
|
1.0 |
Addresses the requirement for organization PKI certificate authorities (CAs) to collect PKI Cards from Subscribers whenever the cards are no longer valid, whenever possible.
|
1.0 |
Addresses the requirement for organization PKI certificate authorities (CAs) to destroy PKI Cards from Subscribers whenever the cards are no longer valid, whenever possible.
|
1.0 |
Addresses the requirement for Organization CA delegates to collect PKI Cards from Subscribers whenever the cards are no longer valid.
|
1.0 |
Addresses the requirement for Organization CA delegates to destroy PKI Cards from Subscribers whenever the cards are no longer valid.
|
1.0 |
Addresses the requirement for Organization CA delegates to record destruction of PKI cards.
|
1.0 |
Addresses the requirement for organization PKI certificate authorities to require that they be informed of any changes in subscriber affiliation for certificates issued that express an affiliation with a given entity.
|
1.0 |
Addresses the requirement that an organization's certificate policy identify the components of the Entity PKI responsible for authenticating subscriber identity.
|
1.0 |
Addresses requirements for an organization's PKI certificate policy to certificate application procedures.
|
1.0 |
Addresses the requirement for organizations to send notice and take action on identified PKI compliance discrepancies.
|
1.0 |
Addresses the requirement for the Organization PKI PMA to be responsible for ensuring audits are conducted for all PKI functions.
|
1.0 |
Addresses requirements for Organization PKIs responsibility for operation of repositories to support their PKI operations.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization prohibits publicly accessible computers from processing sensitive information.
|
1.0 |
Defines conformance and assessment criteria for verifying that organizations receiving access to sensitive information have entered into a signed written agreement with the organization providing access.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization has signed agreements with all organizations that provide it access to sensitive information.
|
1.0 |
Defines conformance and assessment criteria for verifying that the organization requires authorized personally owned mobile devices to comply with the requirements of the CJS Security Policy.
|
1.0 |
Defines conformance and assessment criteria for verifying that the organization's ISO has ensured that LASOs institute the CSA incident response reporting procedures at the local level.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization's ISO has been identified as the point of contact for security-related issues for their agency.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization's policies are consistent with applicable legal requirements.
|
1.0 |
Defines conformance and assessment criteria for verifying that private organizations performing criminal justice functions are subject to the same extent of audit review as are local user agencies.
|
1.0 |
Specifies that a health care related organization must have another arrangement in place that meets the requirements of Section 164.504(e)(3).
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for out of cycle basic security awareness training as related to overall awareness and training requirements.
|
1.0 |