Trustmark Definitions (526-550 of 3493)

Trustmark Definition Name Version
Specifies requirements in accordance with General Data Protection Regulation (GDPR) Art. 34(1).
1.0
Addresses the requirement for all communications among an organization's PKI authorities supporting the certificate application and issuance process are authenticated.
1.0
Addresses the requirement for all communications among an organization's PKI authorities supporting the certificate application and issuance process are protected from modification.
1.0
Addresses the requirement for communications between PKI trusted roles and their PKI certificate authority to be protected from modification.
1.0
Defines conformance and assessment criteria for verifying that an organization has agreed to abide by the terms and conditions described in the Compact Council Security and Management Control Outsourcing Standard.
1.0
Specifies rules for determining a health care related organization's starting date of compliance with the privacy rules based on the type of health care organization.
1.0
Specifies rules for determining a health care related organization's starting date of compliance with the privacy rules based on the type of health care organization.
1.0
Specifies rules for determining a health care related organization's starting date of compliance with the privacy rules based on the type of health care organization.
1.0
Specifies rules for determining a health care related organization's starting date of compliance with the privacy rules based on the type of health care organization.
1.0
Specifies a health care related organization's starting compliance date for the Security Rule, based on the type of organization.
1.0
Specifies a health care related organization's starting compliance date for the Security Rule, based on the type of organization.
1.0
Specifies a health care related organization's starting compliance date for the Security Rule, based on the type of organization.
1.0
Specifies a health care related organization's starting compliance date for the Security Rule, based on the type of organization.
1.0
Specifies requirements in accordance with General Data Protection Regulation (GDPR) Art. 41(4).
1.0
Specifies requirements in accordance with General Data Protection Regulation (GDPR) Art. 44.
1.0
Defines conformance and assessment criteria for verifying that an organization develops and implements anti-counterfeit policy that include the means to detect and prevent counterfeit components from entering the information system.
1.0
Defines conformance and assessment criteria for verifying that an organization develops and implements anti-counterfeit procedures that include the means to detect and prevent counterfeit components from entering the information system.
1.0
Defines conformance and assessment criteria for verifying that an organization reports counterfeit information system components to the source of the counterfeit component, organization-defined external reporting organizations, and/or organization-defined personnel or roles.
1.0
Defines conformance and assessment criteria for verifying that an organization scans for counterfeit information system components at an organization-defined frequency.
1.0
Defines conformance and assessment criteria for verifying that an organization trains organization-defined personnel or roles to detect counterfeit information system components (including hardware, software, and firmware).
1.0
Defines conformance and assessment criteria for verifying that an organization disposes of information system components using organization-defined techniques and methods.
1.0
Defines conformance and assessment criteria for verifying that an organization maintains configuration control over organization-defined information system components awaiting service/repair and serviced/repaired components awaiting return to service.
1.0
Addresses the requirement that only component softwarerelated to the operation of a PKI Certificate Authority are installed.
1.0
Addresses the requirement for computing and communications devices named as PKI certificate subjects to have a human sponsor.
1.0
Defines conformance and assessment criteria for verifying that an organization employs organization-defined concealment and misdirection techniques for organization-defined information systems at organization-defined time periods to confuse and mislead adversaries.
1.0
This page is also available as JSON and XML.