Trustmark Definition Name | Version |
---|---|
Defines conformance and assessment criteria for verifying that an organization issues public key certificates under an [Assignment: organization-defined certificate policy].
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization obtains public key certificates from an approved service provider.
|
1.0 |
Addresses the requirements for limiting the lifetime of public keys for PKI certificates used to sign code and content.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for publicly accessible content - authorization to post to public system as related to overall access control requirements.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for publicly accessible content - review of posted content as related to overall access control requirements.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for publicly accessible content - review prior to public posting as related to overall access control requirements.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for publicly accessible content - training as related to overall access control requirements.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for re-acknowledgement required for updated system rules of behavior as related to overall security planning requirements.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization requires users and devices to re-authenticate when organization-defined circumstances or situations occur.
|
1.0 |
Addresses the requirement for organization PKI certificate authorities (CAs) that support re-key, to accept requests for certification of a new public key for currently cross-certified Organization Principal CAs from the PKI sponsors.
|
1.0 |
Addresses the requirement for organization PKI certificate authorities (CAs) that support re-key, to accept requests for certification of a new public key for currently cross-certified Organization Principal CAs from the subject of the certificate.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for re-screening of authorized individuals as related to overall personnel security requirements.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for re-signing of updated or renewed access agreements as related to overall personnel security requirements.
|
1.0 |
Addresses requirements for establishing that an organization requires a REAL ID Act compliant picture ID for the purpose of identity proofing.
|
1.0 |
Addresses the requirements for data to recorded for archive in accordance with assurance levels as outlined in the FBCA Certificate Policy
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for records for non-local system maintenance as related to overall maintenance requirements.
|
1.0 |
Defines privacy requirements related to the ability of individuals to amend inaccurate sensitive information about themselves.
|
1.0 |
Defines privacy requirements related to providing reasons why a challenge of information held by the sensitive information controller was denied.
|
1.0 |
Defines privacy requirements related to the sharing of documented disputes of sensitive information.
|
1.0 |
Defines privacy requirements related to organizations monitoring their ability to receive and act on complaints with respect to sensitive information.
|
1.0 |
Defines privacy requirements related to providing a timely means for correction of erroneous sensitive information.
|
1.0 |
Defines privacy requirements related to the ability of individuals to amend inaccurate sensitive information about themselves.
|
1.0 |
Defines privacy requirements related to the costs of the ability of individuals to correct, amend, or delete sensitive information about themselves.
|
1.0 |
Defines privacy requirements related to the ability of individuals to delete inaccurate sensitive information about themselves.
|
1.0 |
Defines privacy requirements related to providing means to dispute the accuracy of sensitive information.
|
1.0 |