Trustmark Definition Name | Version |
---|---|
Addresses the requirement for an independent third party to validate the execution of PKI CA key generation procedures.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization implements a threat awareness program.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization's threat awareness program includes a cross-organization information-sharing capability.
|
1.0 |
Defines conformance and assessment criteria for verifying that an information system identifies a secondary authoritative time source that is located in a different geographic region than the primary authoritative time source.
|
1.0 |
Defines conformance and assessment criteria for verifying that an information system compares and synchronizes internal system clocks with an organization-defined authoritative time source. .
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for timely implementation of security-relevant updates as related to overall system and information integrity requirements.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization obtains maintenance support and/or spare parts for organization-defined information system components within a defined time period of failure.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization employs automated mechanisms to transfer predictive maintenance data to a computerized maintenance management system.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization performs predictive maintenance on organization-defined information system components at organization-defined time intervals.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization performs preventive maintenance on organization-defined information system components at organization-defined time intervals.
|
1.0 |
Specifies requirements in accordance with General Data Protection Regulation (GDPR) Art. 12(3).
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for timestamping of audit records as related to overall audit and accountability requirements.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for tracking of quantity licensed software and documentation as related to overall configuration management requirements.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization's baseline security awareness training for all information technology personnel (system administrators, security administrators, network administrators, etc.) addresses access control measures.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization's baseline security awareness training for authorized personnel with access to sensitive information addresses individual accountability.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization's baseline security awareness training for authorized personnel with access to sensitive information addresses the use of acknowledgement statements.
|
1.0 |
Defines conformance and assessement criteria for the training provided to Local Agency Security Officers as to audit findings.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization's baseline security awareness training for authorized personnel with access to sensitive information addresses the protection of information subject to confidentiality concerns.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization's baseline security awareness training for information technology personnel (system administrators, security administrators, network administrators, etc.) addresses data backup and storage.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization's baseline security awareness training for authorized personnel with access to sensitive information addresses desktop security.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization's baseline security awareness training for authorized personnel with access to sensitive information addresses handling unknown e-mail/attachments.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization's baseline security awareness training for authorized personnel with access to sensitive information addresses the use of encryption and the transmission of sensitive/confidential information over the Internet.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization's baseline security awareness training for authorized personnel with access to sensitive information addresses handheld device security.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization's baseline security awareness training for authorized personnel with access to sensitive information addresses Web usage--allowed versus prohibited; monitoring of user activity.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization's baseline security awareness training for authorized personnel with access to sensitive information addresses laptop security.
|
1.0 |