Trustmark Definitions (451-475 of 3493)

Trustmark Definition Name Version
Addresses requirements for organization PKI certificate authorities (CAs) specifying rules for interpreting names in Subscriber certificates in a referenced certificate profile.
1.0
Addresses requirements for mechanisms and procedures designed to ensure the availability of PKI Certificate Revocation Lists (CRLs)
1.0
This Trustmark Definition defines conformance and assessment criteria for compliance with minimum security requirements for access enforcement as related to overall access control requirements.
1.0
Addresses backup handling for keys used with PKI.
1.0
Addresses requirements for the Organization designating the person or Organization to asserts whether CPS conforms to CP.
1.0
Addresses requirements for whether the determination that the CPS conforms to the CP is based on the results and recommendations of an independent compliance auditor.
1.0
Addresses requirements for organization PKI certificate authorities (CAs) submitting the results of their compliance audits to the appropriate authority for approval.
1.0
Addresses requirements for the Certification Practice Statement (CPS) conforming to the Certificate Policy (CP).
1.0
Addresses requirements for the Organization CA's CPS meeting all facets of the CP.
1.0
Addresses requirements for organization PKI certificate authorities (CAs) submitting their CPS to the appropriate authority for approval.
1.0
Defines conformance and assessment criteria for verifying that all changes to services provided by a service provider that are subject to the CJIS Security Policy managed by the CJA, authorized agency, or FBI.
1.0
Specifies requirements in accordance with General Data Protection Regulation (GDPR) Art. 12(5).
1.0
Defines conformance and assessment criteria for verifying that CHRI is only stored for extended periods under limited circumstances.
1.0
Defines conformance and assessment criteria for verifying that the management control of network security remains with the CJA.
1.0
Defines conformance and assessment criteria for verifying that organizations have not outsourced the management of security requirements.
1.0
Defines conformance and assessment criteria for verifying that an organization's CSA ISO established security incident response and reporting procedures.
1.0
Defines conformance and assessment criteria for verifying that an organization's policies do not permit anything prohibited by the CJIS Security Policy.
1.0
Defines conformance and assessment criteria for compliance with one-time password requirements defined by CJIS Security Policy.
1.0
Defines conformance and assessment criteria for verifying that an organization has implemented physical controls for media to ensure the security of the data where encryption of the data isn't possible.
1.0
Defines conformance and assessment criteria for verifying that an organization protects physical media at the same level as the information would be protected in electronic form.
1.0
Defines conformance and assessment criteria for verifying that an organization has documented protection measures more stringent than the CJIS security policy that have been imposed by their CSA.
1.0
Defines conformance and assessment criteria for verifying that the CJIS Agency Coordinator receives information from the CGA (e.g., system updates) and disseminates it to appropriate Contractor employees.
1.0
Defines conformance and assessment criteria for verifying that the CJIS Agency Coordinator does not permit untrained contractor employees to access CJI.
1.0
Defines conformance and assessment criteria for verifying that the CJIS Agency Coordinator ensures compliance by the Contractor with NCIC validation requirements.
1.0
Defines conformance and assessment criteria for verifying that a CJIS Agency Coordinator fulfills their responsibilities for the supervision and integrity of the system, training and continuing education of employees and operators.
1.0
This page is also available as JSON and XML.