Trustmark Definitions (2826-2850 of 3493)

Trustmark Definition Name Version
Defines conformance and assessment criteria for verifying that an information system uses encryption to protect remote access sessions.
1.0
Defines conformance and assessment criteria for verifying that an organization ensures that users protect information about remote access mechanisms from unauthorized use and disclosure.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for remote activation of collaborative computing devices as related to overall system and communications protection requirements.
1.0
Defines conformance and assessment criteria for verifying that an organization requires remote administrative personnel to be authenticated prior to or during remote access sessions.
1.0
Defines conformance and assessment criteria for verifying that an organization requires that remote administrative personnel are identified prior to having remote access.
1.0
Addresses requirements for remote authentication of human PKI subscribers.
1.0
Addresses requirements for address confirmation for remote authentication of human PKI subscribers.
1.0
Defines conformance and assessment criteria for verifying that an organization requires that connections for remote administrative personnel are protected with an encrypted path.
1.0
Defines conformance and assessment criteria for verifying that an organization requires that connections for remote administrative personnel are protected with a FIPS 140-2 certified encrypted path.
1.0
This Trustmark Definition defines conformance and assessment criteria for compliance with requirements for securing cryptographic modules.
1.0
Addresses the requirements for ensuring all removable media and paper containing sensitive plain-text information is stored in secure containers.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for removal from authorized physical access list as related to overall physical and environmental protection requirements.
1.0
Addresses the requirement for CA Hardware cryptographic modules to be removed when not in use.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for removal of systems or components for maintenance as related to overall maintenance requirements.
1.0
Defines conformance and assessment criteria for verifying that an organization reports atypical account usage.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for reporting of audit record review findings as related to overall audit and accountability requirements.
1.0
Addresses the requirements PKI Certificate Authorities to investigate and report signing key loss to the FPKIPA.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for reporting of suspected incidents as related to overall incident response requirements.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for reporting of suspected security weaknesses as related to overall incident response requirements.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for reporting of suspected security weaknesses as related to overall incident response requirements.
1.1
Addresses the requirement for a request to revoke a certificate to explain the reason for revocation.
1.0
Addresses the requirement for a request to revoke a PKI certificate to identify the certificate to be revoked.
1.0
Addresses the requirement for requests to revoke a certificate to permit the request to be authenticated through a digital signature.
1.0
Addresses the requirement for requests to revoke a certificate to permit the request to be authenticated through a manual signature.
1.0
Addresses the requirement for two person control to be enforced.
1.0
This page is also available as JSON and XML.