Trustmark Definition Name | Version |
---|---|
Defines conformance and assessment criteria for compliance with minimum security requirements for continuous monitoring response actions as related to overall certification accreditation and security assessments requirements.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization employs assessors or assessment teams with the independence to monitor the security controls in the information system on an ongoing basis.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization employs trend analyses to determine if security control implementations, the frequency of continuous monitoring activities, and/or the types of activities used in the continuous monitoring process need to be modified based on empirical data.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for continuous security status monitoring as related to overall certification accreditation and security assessments requirements.
|
1.0 |
Defines conformance and assessment criteria for verifying that contractor access to sensitive information pursuant to a written agreement.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization's contractor agreements for access to sensitive information specifically identify the agency's purpose and scope of providing services.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization's contractor agreements for access to CJI incorporate the CJIS Security Addendum.
|
1.0 |
Specifies requirements in accordance with General Data Protection Regulation (GDPR) Art. 6(1)(b).
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for control and documentation of peer-to-peer file sharing as related to overall configuration management requirements.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization controls access to networks processing sensitive information.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization controls access to sensitive information based on logical location.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization controls access to sensitive information based on network addresses.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization controls access to sensitive information based on physical location.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization controls access to sensitive information based on time of access.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for control of physical ingress and egress as related to overall physical and environmental protection requirements.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for control of publicly accessible areas as related to overall physical and environmental protection requirements.
|
1.0 |
Addresses backup handling for keys used with PKI.
|
1.0 |
Addresses backup handling for keys used with PKI.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization employs automated mechanisms to conduct maintenance.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization employs automated mechanisms to document maintenance.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization employs automated mechanisms to schedule maintenance.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization employs automated mechanisms to conduct repairs.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization employs automated mechanisms to document repairs.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization employs automated mechanisms to schedule repairs.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization produces up-to date, accurate, and complete records of all maintenance actions requested, scheduled, in process, and completed.
|
1.0 |