Trustmark Definition Name | Version |
---|---|
Defines conformance and assessment criteria for verifying that an information system uses encryption to protect remote access sessions.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization ensures that users protect information about remote access mechanisms from unauthorized use and disclosure.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for remote activation of collaborative computing devices as related to overall system and communications protection requirements.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization requires remote administrative personnel to be authenticated prior to or during remote access sessions.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization requires that remote administrative personnel are identified prior to having remote access.
|
1.0 |
Addresses requirements for remote authentication of human PKI subscribers.
|
1.0 |
Addresses requirements for address confirmation for remote authentication of human PKI subscribers.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization requires that connections for remote administrative personnel are protected with an encrypted path.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization requires that connections for remote administrative personnel are protected with a FIPS 140-2 certified encrypted path.
|
1.0 |
This Trustmark Definition defines conformance and assessment criteria for compliance with requirements for securing cryptographic modules.
|
1.0 |
Removable media and paper containing sensitive plain-text information is stored in secure containers
Addresses the requirements for ensuring all removable media and paper containing sensitive plain-text information is stored in secure containers.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for removal from authorized physical access list as related to overall physical and environmental protection requirements.
|
1.0 |
Addresses the requirement for CA Hardware cryptographic modules to be removed when not in use.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for removal of systems or components for maintenance as related to overall maintenance requirements.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization reports atypical account usage.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for reporting of audit record review findings as related to overall audit and accountability requirements.
|
1.0 |
Addresses the requirements PKI Certificate Authorities to investigate and report signing key loss to the FPKIPA.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for reporting of suspected incidents as related to overall incident response requirements.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for reporting of suspected security weaknesses as related to overall incident response requirements.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for reporting of suspected security weaknesses as related to overall incident response requirements.
|
1.1 |
Addresses the requirement for a request to revoke a certificate to explain the reason for revocation.
|
1.0 |
Addresses the requirement for a request to revoke a PKI certificate to identify the certificate to be revoked.
|
1.0 |
Addresses the requirement for requests to revoke a certificate to permit the request to be authenticated through a digital signature.
|
1.0 |
Addresses the requirement for requests to revoke a certificate to permit the request to be authenticated through a manual signature.
|
1.0 |
Addresses the requirement for two person control to be enforced.
|
1.0 |