Trustmark Definition Name | Version |
---|---|
Defines conformance and assessment criteria for verifying that an information system enforces a role-based access control policy over defined subjects and objects and controls access based upon organization-defined roles and users authorized to assume such roles.
|
1.0 |
Addresses the requirement for organization personnel to receive role-based operational training.
|
1.0 |
Addresses the requirement for key-pairs in role-based PKI certificates to be unique to each individual certificate.
|
1.0 |
Addresses the requirement for sponsors of role-based PKI certificates to hold an individual certificate issued by the same CA at the same or higher assurance level as the role-based certificates they sponsor.
|
1.0 |
Addresses the requirement for role-based PKI certificates to be issued only to individual subscribers.
|
1.0 |
Addresses the requirement for an organization to prohibit the sharing of role-based PKI certificates.
|
1.0 |
Addresses the requirement for role-based PKI certificates to be protected in the same manner as individual certificates.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization establishes and administers privileged user accounts in accordance with a role-based access scheme that organizes allowed information system access and privileges into roles.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization takes organization-defined actions when privileged role assignments are no longer appropriate. .
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization monitors privileged role assignments.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization provides organization-defined personnel or roles with initial and recurring training in the employment and operation of environmental controls.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization provides organization-defined personnel or roles with initial and recurring training in the employment and operation of physical security controls.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization includes practical exercises in security training that reinforce training objectives.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization provides training to its personnel on indicators of malicious code to recognize suspicious communications and anomalous behavior in organizational information systems.
|
1.0 |
Addresses the requirement that roles for which role-based PKI certificates may be issued are limited to those that uniquely identify a specific individual within an organization.
|
1.0 |
This Trustmark Definition specifies a minimum RSA key size for private keys use with PKI.
|
1.0 |
This Trustmark Definition specifies a minimum RSA key size for private keys use with PKI.
|
1.0 |
This Trustmark Definition specifies a minimum RSA key size for private keys use with PKI.
|
1.0 |
Addresses naming requirements for End Entity certificates issued with a rudimentary level of assurance.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization includes in the rules of behavior, explicit restrictions on posting organizational information on public websites.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization includes in the rules of behavior, explicit restrictions on the use of social media/networking sites.
|
1.0 |
Defines conformance and assessment criteria for verifying that an information system enters a safe mode of operation with organization-defined restrictions of safe mode of operation when organization-defined conditions are detected.
|
1.0 |
Defines conformance and assessment criteria for verifying that the organization has established appropriate administrative, technical and physical safeguards to ensure the security and confidentiality of stored sensitive information.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for sanctions for non-compliance as related to overall personnel security requirements.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization ensures that the sanitization or destruction of media is witnessed or carried out by authorized personnel.
|
1.0 |