Trustmark Definition Name | Version |
---|---|
Defines conformance and assessment criteria for verifying that an information system writes audit trails to hardware-enforced, write-once media.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization authorizes read-only access to audit information to an organization-defined subset of privileged users.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for protection of audit tools as related to overall audit and accountability requirements.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for protection of backup information as related to overall contingency planning requirements.
|
1.0 |
Addresses the requirement for the strength of the security controls shall protect the device's hardware, software, and the cryptographic token and its activation data from compromise.
|
1.0 |
Addresses the requirement for an organization to protect escrowed PKI keys at no less than the level of security in which they are generated, delivered, and/or protected by the subscriber.
|
1.0 |
Defines conformance and assessment criteria for verifying that an information system protects the confidentiality of [Assignment: organization-defined information at rest].
|
1.0 |
Defines conformance and assessment criteria for verifying that an information system protects the integrity of [Assignment: organization-defined information at rest].
|
1.0 |
Defines conformance and assessment criteria for verifying that an information system implements cryptographic mechanisms to prevent unauthorized disclosure and modification of [Assignment: organization-defined information] on [Assignment: organization-defined information system components].
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization removes from online storage and stores off-line in a secure location organization-defined information.
|
1.0 |
Addresses the requirement for all copies of CA private signature keys to be protected in the same manner as the original.
|
1.0 |
Specifies requirements in accordance with General Data Protection Regulation (GDPR) Art. 15(3).
|
1.0 |
Specifies requirements in accordance with General Data Protection Regulation (GDPR) Art. 13(2).
|
1.0 |
Specifies requirements in accordance with General Data Protection Regulation (GDPR) Art. 14(2).
|
1.0 |
Specifies requirements in accordance with General Data Protection Regulation (GDPR) Art. 13(1).
|
1.0 |
Specifies requirements in accordance with General Data Protection Regulation (GDPR) Art. 14(1).
|
1.0 |
Specifies requirements in accordance with General Data Protection Regulation (GDPR) Art. 14(3).
|
1.0 |
Specifies requirements in accordance with NIST Secure Software Development Framework (SSDF), version 1.1, Practice PS.2: Provision of a Mechanism for Verifying Software Release Integrity. Requires an organization to help software acquirers ensure that the software they acquire is legitimate and has not been tampered with.
|
1.1 |
Specifies requirements in accordance with General Data Protection Regulation (GDPR) Art. 20(1).
|
1.0 |
Addresses naming requirements for PKI certificates.
|
1.0 |
Specifies requirements in accordance with General Data Protection Regulation (GDPR) Art. 37(7).
|
1.0 |
Specifies requirements in accordance with General Data Protection Regulation (GDPR) Art. 6(1)(e).
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization issues public key certificates under an [Assignment: organization-defined certificate policy].
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization obtains public key certificates from an approved service provider.
|
1.0 |
Addresses the requirements for limiting the lifetime of public keys for PKI certificates used to sign code and content.
|
1.0 |