Trustmark Definition Name | Version |
---|---|
Defines conformance and assessment criteria for verifying that an information system maintains the confidentiality and/or integrity of information during preparation for transmission and during reception.
|
1.0 |
Defines conformance and assessment criteria for verifying that an information system protects the integrity of transmitted information.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization's transmission medium is exempt from CJIS Security Policy encryption requirements.
|
1.0 |
Specifies requirements in accordance with General Data Protection Regulation (GDPR) Art. 20(2).
|
1.0 |
Addresses the requirement for PKI key activation data to be distinct in time and place from the associated cryptographic module when the activation data is transmitted.
|
1.0 |
Defines conformance and assessment criteria for verifying that an information system associates organization-defined security attributes with information exchanged between information systems and between system components.
|
1.0 |
Defines conformance and assessment criteria for verifying that an information system validates the integrity of transmitted security attributes.
|
1.0 |
Specifies that a health care related organization must implement a mechanism to encrypt electronically transmitted electronic protected health information whenever deemed appropriate.
|
1.0 |
Specifies that a health care related organization must implement security measures to ensure that electronically transmitted electronic protected health information is not improperly modified without detection until disposed of.
|
1.0 |
Specifies that a health care related organization must implement technical security measures to guard against unauthorized access to electronic protected health information that is being transmitted over an electronic communications network.
|
1.0 |
Specifies requirements in accordance with General Data Protection Regulation (GDPR) Art. 12(1).
|
1.0 |
This Trustmark Definition addresses the requirement for a system to provide trusted paths for user access.
|
1.0 |
Defines conformance and assessment criteria for verifying that an information system provides a trusted communications path that is logically isolated and distinguishable from other paths.
|
1.0 |
Addresses requirements for a trusted person representing a PKI certificate applicant when the applicant is unable to perform face-to-face registration.
|
1.0 |
This Trustmark Definition defines conformance and assessment criteria for compliance with minimum security requirements for personnel screening criteria as related to overall personnel security requirements.
|
1.0 |
This Trustmark Definition defines conformance and assessment criteria for compliance with minimum security requirements for personnel screening criteria as related to overall personnel security requirements.
|
1.0 |
This Trustmark Definition defines conformance and assessment criteria for compliance with minimum security requirements for personnel screening criteria as related to overall personnel security requirements.
|
1.0 |
This Trustmark Definition defines conformance and assessment criteria for compliance with minimum security requirements for personnel screening criteria as related to overall personnel security requirements.
|
1.0 |
This Trustmark Definition defines conformance and assessment criteria for compliance with minimum security requirements for personnel screening criteria as related to overall personnel security requirements.
|
1.0 |
This Trustmark Definition defines conformance and assessment criteria for compliance with minimum security requirements for personnel screening criteria as related to overall personnel security requirements.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization: a. Describes the trustworthiness required in the organization-defined information system, information system component, or information system service supporting its critical missions/business functions; and b. Implements an organization-defined assurance overlay to achieve such trustworthiness.
|
1.0 |
Addresses requirements for electronic fingerprints to be collected during identity proofing for PKI card issuance.
|
1.0 |
Addresses requirements for two Non-Federal Government I.D.s to be used for the purpose of identity proofing.
|
1.0 |
Addresses the requirement for two or more persons to be needed for CA key generation.
|
1.0 |
Addresses the requirement for two or more persons to be needed for CA signing key backup.
|
1.0 |