Trustmark Definitions (2526-2550 of 3247)

Trustmark Definition Name Version
Defines conformance and assessment criteria for compliance with minimum security requirements for production of security assessment report as related to overall certification accreditation and security assessments requirements.
1.0
Defines conformance and assessment criteria for verifying that an information system prevents non-privileged users from executing privileged functions.
1.0
Addresses requirements for a party named in a PKI certificate that generates its own keys to prove possession of the private key that corresponds to the public key in the certificate request.
1.0
Addresses the requirement for organization PKI certificate authorities (CAs) to require that proof of all subject information changes be provided to a designated agent before a modified certificate is issued.
1.0
Addresses the requirement for organization PKI certificate authorities (CAs) to require that proof of all subject information changes be provided to a registration authority before a modified certificate is issued.
1.0
Addresses the requirement for organization PKI certificate authorities (CAs), to verify proof of all subject information changes before a modified certificate is issued.
1.0
Addresses the requirement for the last person who departs the facility to initial a sign-out sheet asserting that all necessary physical protection mechanisms are in place and activated.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for protection of audit information as related to overall audit and accountability requirements.
1.0
Defines conformance and assessment criteria for verifying that an information system implements cryptographic mechanisms to protect the integrity of audit tools.
1.0
Defines conformance and assessment criteria for verifying that an information system backs up audit records at an organization-defined frequency onto a physically different system or system component than the system or component being audited.
1.0
Defines conformance and assessment criteria for verifying that an information system implements cryptographic mechanisms to protect the integrity of audit information and audit tools.
1.0
Defines conformance and assessment criteria for verifying that an information system implements cryptographic mechanisms to protect the integrity of audit information.
1.0
Defines conformance and assessment criteria for verifying that an organization enforces dual authorization for movement and/or deletion of organization-defined audit information.
1.0
Defines conformance and assessment criteria for verifying that an information system writes audit trails to hardware-enforced, write-once media.
1.0
Defines conformance and assessment criteria for verifying that an organization authorizes read-only access to audit information to an organization-defined subset of privileged users.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for protection of audit tools as related to overall audit and accountability requirements.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for protection of backup information as related to overall contingency planning requirements.
1.0
Addresses the requirement for the strength of the security controls shall protect the device's hardware, software, and the cryptographic token and its activation data from compromise.
1.0
Addresses the requirement for an organization to protect escrowed PKI keys at no less than the level of security in which they are generated, delivered, and/or protected by the subscriber.
1.0
Defines conformance and assessment criteria for verifying that an information system protects the confidentiality of [Assignment: organization-defined information at rest].
1.0
Defines conformance and assessment criteria for verifying that an information system protects the integrity of [Assignment: organization-defined information at rest].
1.0
Defines conformance and assessment criteria for verifying that an information system implements cryptographic mechanisms to prevent unauthorized disclosure and modification of [Assignment: organization-defined information] on [Assignment: organization-defined information system components].
1.0
Defines conformance and assessment criteria for verifying that an organization removes from online storage and stores off-line in a secure location organization-defined information.
1.0
Addresses the requirement for all copies of CA private signature keys to be protected in the same manner as the original.
1.0
Addresses naming requirements for PKI certificates.
1.0
This page is also available as JSON and XML.