Trustmark Definitions (3376-3400 of 3493)

Trustmark Definition Name Version
Addresses the requirement for two or more persons to be needed for CA signing key activation.
1.0
Addresses the requirement for two person physical access control for CA equipment.
1.0
Addresses the requirement for two person physical access control for cryptographic modules.
1.0
This Trustmark Definition defines conformance and assessment criteria for compliance with minimum security requirements for control of physical ingress and egress as related to overall physical and environmental protection requirements.
1.0
Defines conformance and assessment criteria for verifying that an information system purges/wipes information from organization-defined mobile devices based on organization-defined purging/wiping requirements/techniques after organization-defined number consecutive, unsuccessful device logon attempts.
1.0
Defines conformance and assessment criteria for verifying that an organization provides justification and documents approval for the continued use of unsupported system components required to satisfy mission/business needs.
1.0
Defines conformance and assessment criteria for verifying that an organization replaces information system components when support for the components is no longer available from the developer, vendor, or manufacturer.
1.0
Defines conformance and assessment criteria for verifying that an organization provides [Selection (one or more): in-house support; organization-defined support from external providers for unsupported information system components.
1.0
Addresses the requirement for an organization to not include any unverified information in PKI certificates at other than the rudimentary assurance level.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for updates to contingency planning training as related to overall contingency planning requirements.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for updates to incident response training as related to overall incident response requirements.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for updates to plan of action and milestones as related to overall certification accreditation and security assessments requirements.
1.0
Defines conformance and assessment criteria for verifying that an organization authorizes, monitors, and controls the use of organization-defined information system components within the information system for which usage restrictions have been established.
1.0
Defines conformance and assessment criteria for verifying that an organization establishes usage restrictions and implementation guidance for organization-defined information system components based on the potential to cause damage to the information system if used maliciously.
1.0
Specifies requirements in accordance with General Data Protection Regulation (GDPR) Art. 47(1).
1.0
Specifies requirements in accordance with General Data Protection Regulation (GDPR) Art. 49(1).
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for use of external information systems - access from external systems as related to overall access control requirements.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for use of external information systems - external storage, processing, transmission of information as related to overall access control requirements.
1.0
Defines conformance and assessment criteria for verifying that an organization only permits external access when the external systems have met defined security controls.
1.0
Defines conformance and assessment criteria for verifying that an organization requires approved agreements for use of external information systems.
1.0
Defines conformance and assessment criteria for verifying that an organization prohibits the use of organization-defined network accessible storage devices in external information systems.
1.0
Defines conformance and assessment criteria for verifying that an organization restricts or prohibits the use of non-organizationally owned information systems, system components, or devices to process, store, or transmit organizational information.
1.0
Addresses requirements for exclusive use of new PKI Certificate Authority private signing keys.
1.0
Addresses requirements for the use of old PKI Certificate Authority private signing keys.
1.0
Specifies requirements in accordance with General Data Protection Regulation (GDPR) Art. 28(2).
1.0
This page is also available as JSON and XML.