Trustmark Definition Name | Version |
---|---|
Defines conformance and assessment criteria for compliance with minimum security requirements for continuous security status monitoring as related to overall certification accreditation and security assessments requirements.
|
1.0 |
Defines conformance and assessment criteria for verifying that contractor access to sensitive information pursuant to a written agreement.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization's contractor agreements for access to sensitive information specifically identify the agency's purpose and scope of providing services.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization's contractor agreements for access to CJI incorporate the CJIS Security Addendum.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for control and documentation of peer-to-peer file sharing as related to overall configuration management requirements.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization controls access to networks processing sensitive information.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization controls access to sensitive information based on logical location.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization controls access to sensitive information based on network addresses.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization controls access to sensitive information based on physical location.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization controls access to sensitive information based on time of access.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for control of physical ingress and egress as related to overall physical and environmental protection requirements.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for control of publicly accessible areas as related to overall physical and environmental protection requirements.
|
1.0 |
Addresses backup handling for keys used with PKI.
|
1.0 |
Addresses backup handling for keys used with PKI.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization employs automated mechanisms to conduct maintenance.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization employs automated mechanisms to document maintenance.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization employs automated mechanisms to schedule maintenance.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization employs automated mechanisms to conduct repairs.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization employs automated mechanisms to document repairs.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization employs automated mechanisms to schedule repairs.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization produces up-to date, accurate, and complete records of all maintenance actions requested, scheduled, in process, and completed.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization produces up-to date, accurate, and complete records of all repair actions requested, scheduled, in process, and completed.
|
1.0 |
Defines conformance and assessment criteria for verifying that an information system does not release information outside of the established system boundary unless organization-defined security safeguards are used to validate the appropriateness of the information designated for release.
|
1.0 |
Defines conformance and assessment criteria for verifying that an information system does not release information outside of the established system boundary unless the receiving organization-defined information system or system component provides organization-defined security safeguards.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for coordination of contingency planning activities as related to overall contingency planning requirements.
|
1.0 |