Trustmark Definition Name | Version |
---|---|
Specifies requirements in accordance with General Data Protection Regulation (GDPR) Art. 28(3)(h).
|
1.0 |
Addresses requirements for the use of trademarks in names in organization-issued PKI certificates.
|
1.0 |
Defines conformance and assessment criteria for verifying that the organization's user agreements with the FBI CJIS Division have been coordinated with the CSA head.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization requires users to "activate" certificates used for authentication on each use.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization ensures that user-based certificates used for authentication purposes are specific to an individual user and not to a particular device.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization prohibits multiple users from utilizing the same certificate for authentication purposes.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization archives user identifiers.
|
1.0 |
Defines conformance and assessment criteria for verifying that an information system provides user logout capabilities.
|
1.0 |
Addresses requirements for User Principal Names (UPNs) in PKI certificates to be unique.
|
1.0 |
Addresses requirements for User Principal Names (UPNs) in PKI certificates to reflect organizational structures.
|
1.0 |
Defines conformance and assessment criteria for verifying that an information system alerts organization-defined personnel or roles when the unauthorized installation of software is detected.
|
1.0 |
Defines conformance and assessment criteria for verifying that an information system prohibits user installation of software without explicit privileged status.
|
1.0 |
Defines conformance and assessment criteria for verifying that the organization requires users to provide a reason for III inquiries when requested.
|
1.0 |
Defines conformance and assessment criteria for verifying that private contractors acknowledge and abide by all aspects of the CJIS Security Addendum.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization requires users to directly initiate session lock mechanisms to prevent inadvertent viewing when a device is unattended.
|
1.0 |
Addresses the requirement for PKI CA key pair generation to create a verifiable audit trail that the security requirements for procedures were followed.
|
1.0 |
Specifies requirements in accordance with General Data Protection Regulation (GDPR) Art. 8(2).
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for verification of physical access authorizations as related to overall physical and environmental protection requirements.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for verification of security controls following system maintenance as related to overall maintenance requirements.
|
1.0 |
Federation authorities must have mechanisms in place to establish the security, identity, privacy, and interoperability standards for the federation, as well as providing details on how they ensure participants meet those requirements.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization requires that escorts for privileged remote sessions are able to end the session at any time.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization monitors privileged remote sessions.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization requires that escorts for privileged remote sessions are familiar with the system/area in which the work is being performed.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization utilizes VLAN technology to segment VoIP traffic from data traffic.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization maintains audit logs for all virtual machines and hosts and stores the logs outside the hosts' virtual environment.
|
1.0 |