Trustmark Definitions (276-300 of 3247)

Trustmark Definition Name Version
Defines conformance and assessment criteria for compliance with minimum security requirements for authenticator default content as related to overall identification and authentication requirements.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for authenticator distribution procedures as related to overall identification and authentication requirements.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for authenticator distribution verification as related to overall identification and authentication requirements.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for authenticator feedback as related to overall identification and authentication requirements.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for authenticator lifetime as related to overall identification and authentication requirements.
1.0
Defines conformance and assessment criteria for verifying that an organization employs automated tools to determine if password authenticators are sufficiently strong to satisfy organization-defined requirements.
1.0
Defines conformance and assessment criteria for verifying that an information system, for biometric-based authentication, employs mechanisms that satisfy organization-defined biometric quality requirements.
1.0
Defines conformance and assessment criteria for verifying that an organization requires developers/installers of information system components to provide unique authenticators or change default authenticators prior to delivery/installation.
1.0
Defines conformance and assessment criteria for verifying that an organization coordinates with organization-defined external organizations for cross-organization management of credentials.
1.0
Defines conformance and assessment criteria for verifying that an information system dynamically provisions identities.
1.0
Defines conformance and assessment criteria for verifying that an information system prohibits the use of cached authenticators after organization-defined time period.
1.0
Defines conformance and assessment criteria for verifying that an organization uses only FICAM-approved path discovery and validation products and services.
1.0
Defines conformance and assessment criteria for verifying that an organization requires that the registration process to receive organization-defined types of and/or specific authenticators be conducted in person before a defined registration authority with authorization by organization-defined personnel or roles.
1.0
Defines conformance and assessment criteria for verifying that an organization, for PKI-based authentication, employs a deliberate organization-wide methodology for managing the content of PKI trust stores installed across all platforms including networks, operating systems, browsers, and applications.
1.0
Defines conformance and assessment criteria for verifying that an organization implements organization-defined security safeguards to manage the risk of compromise due to individuals having accounts on multiple information systems.
1.0
Defines conformance and assessment criteria for verifying that an organization ensures that unencrypted static authenticators are not embedded in applications or access scripts or stored on function keys.
1.0
Defines conformance and assessment criteria for verifying that an information system, for PKI-based authentication implements a local cache of revocation data.
1.0
Defines conformance and assessment criteria for verifying that an information system, for PKI-based authentication validates certifications by constructing and verifying a certification path to an accepted trust anchor including checking certificate status information.
1.0
Defines conformance and assessment criteria for verifying that an information system, for PKI-based authentication enforces authorized access to the corresponding private key.
1.0
Defines conformance and assessment criteria for verifying that an information system, for PKI-based authentication maps the authenticated identity to the account of the individual or group.
1.0
Defines conformance and assessment criteria for verifying that an organization protects authenticators commensurate with the security category of the information to which use of the authenticator permits access.
1.0
Defines conformance and assessment criteria for verifying that an organization requires that the registration process to receive organization-defined types of and/or specific authenticators be conducted by a trusted third party before organization-defined registration authority with authorization by organization-defined personnel or roles.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for authenticator protection as related to overall identification and authentication requirements.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for authenticator refresh as related to overall identification and authentication requirements.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for authenticator reuse conditions as related to overall identification and authentication requirements.
1.0
This page is also available as JSON and XML.