Trustmark Definitions (3351-3375 of 3493)

Trustmark Definition Name Version
Defines conformance and assessment criteria for verifying that an information system maintains the confidentiality and/or integrity of information during preparation for transmission and during reception.
1.0
Defines conformance and assessment criteria for verifying that an information system protects the integrity of transmitted information.
1.0
Defines conformance and assessment criteria for verifying that an organization's transmission medium is exempt from CJIS Security Policy encryption requirements.
1.0
Specifies requirements in accordance with General Data Protection Regulation (GDPR) Art. 20(2).
1.0
Addresses the requirement for PKI key activation data to be distinct in time and place from the associated cryptographic module when the activation data is transmitted.
1.0
Defines conformance and assessment criteria for verifying that an information system associates organization-defined security attributes with information exchanged between information systems and between system components.
1.0
Defines conformance and assessment criteria for verifying that an information system validates the integrity of transmitted security attributes.
1.0
Specifies that a health care related organization must implement a mechanism to encrypt electronically transmitted electronic protected health information whenever deemed appropriate.
1.0
Specifies that a health care related organization must implement security measures to ensure that electronically transmitted electronic protected health information is not improperly modified without detection until disposed of.
1.0
Specifies that a health care related organization must implement technical security measures to guard against unauthorized access to electronic protected health information that is being transmitted over an electronic communications network.
1.0
Specifies requirements in accordance with General Data Protection Regulation (GDPR) Art. 12(1).
1.0
This Trustmark Definition addresses the requirement for a system to provide trusted paths for user access.
1.0
Defines conformance and assessment criteria for verifying that an information system provides a trusted communications path that is logically isolated and distinguishable from other paths.
1.0
Addresses requirements for a trusted person representing a PKI certificate applicant when the applicant is unable to perform face-to-face registration.
1.0
This Trustmark Definition defines conformance and assessment criteria for compliance with minimum security requirements for personnel screening criteria as related to overall personnel security requirements.
1.0
This Trustmark Definition defines conformance and assessment criteria for compliance with minimum security requirements for personnel screening criteria as related to overall personnel security requirements.
1.0
This Trustmark Definition defines conformance and assessment criteria for compliance with minimum security requirements for personnel screening criteria as related to overall personnel security requirements.
1.0
This Trustmark Definition defines conformance and assessment criteria for compliance with minimum security requirements for personnel screening criteria as related to overall personnel security requirements.
1.0
This Trustmark Definition defines conformance and assessment criteria for compliance with minimum security requirements for personnel screening criteria as related to overall personnel security requirements.
1.0
This Trustmark Definition defines conformance and assessment criteria for compliance with minimum security requirements for personnel screening criteria as related to overall personnel security requirements.
1.0
Defines conformance and assessment criteria for verifying that an organization: a. Describes the trustworthiness required in the organization-defined information system, information system component, or information system service supporting its critical missions/business functions; and b. Implements an organization-defined assurance overlay to achieve such trustworthiness.
1.0
Addresses requirements for electronic fingerprints to be collected during identity proofing for PKI card issuance.
1.0
Addresses requirements for two Non-Federal Government I.D.s to be used for the purpose of identity proofing.
1.0
Addresses the requirement for two or more persons to be needed for CA key generation.
1.0
Addresses the requirement for two or more persons to be needed for CA signing key backup.
1.0
This page is also available as JSON and XML.