Trustmark Definitions (701-725 of 3493)

Trustmark Definition Name Version
Addresses the requirement for an organization to issue a certificate revocation list (CRL) within an organization-defined time when subscriber certificate is revoked due to compromise or suspected compromise of a private key.
1.0
Addresses the requirement for organizations cross-certified with the FBPKI to document how it chooses to back up its archive records.
1.0
Addresses requirements for the organizations ensuring interoperability with the FBCA repository.
1.0
Defines conformance and assessment criteria for verifying that an organization employs organization-defined methods for coordinating organization-defined audit information among external organizations when audit information is transmitted across organizational boundaries.
1.0
Defines conformance and assessment criteria for verifying that an organization requires that the identity of individuals be preserved in cross-organizational audit trails.
1.0
Defines conformance and assessment criteria for verifying that an organization provides cross-organizational audit information to organization-defined organizations based on cross-organizational sharing agreements.
1.0
Defines conformance and assessment criteria for verifying that an organization produces, controls, and distributes asymmetric cryptographic keys using NSA-approved key management technology and processes, approved PKI Class 3 certificates or prepositioned keying material, approved PKI Class 3 or Class 4 certificates and hardware security tokens, or another method that protects the user's private key.
1.0
Defines conformance and assessment criteria for verifying that an organization maintains availability of information in the event of the loss of cryptographic keys by users.
1.0
Defines conformance and assessment criteria for verifying that an organization produces, controls, and distributes symmetric cryptographic keys using NIST FIPS-compliant, NSA-approved key management, or other technology and processes.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for cryptographic key management as related to overall system and communications protection requirements.
1.0
This Trustmark Definition defines conformance and assessment criteria for compliance with security requirements for the memorization of cryptographic module activation data.
1.0
This Trustmark Definition defines conformance and assessment criteria for compliance with security requirements for the recording of cryptographic module activation data.
1.0
This Trustmark Definition defines conformance and assessment criteria for compliance with security requirements for securing cryptographic module activation data.
1.0
This Trustmark Definition defines conformance and assessment criteria for storing cryptographic module activation data separate from associated cryptographic modules.
1.0
This Trustmark Definition defines conformance and assessment criteria for storing cryptographic module activation data separate from removable hardware associated with remote workstations used to administer the CA.
1.0
This Trustmark Definition defines conformance and assessment criteria for compliance with requirements for securing cryptographic module activation data.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for cryptographic module authentication as related to overall identification and authentication requirements.
1.0
Addresses the requirement to deactivate PKI cryptographic modules after use.
1.0
Addresses the requirement for Cryptographic modules to be validated to the FIPS 140 level.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for cryptographic protection of stored passwords as related to overall identification and authentication requirements.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for cryptographic protection of transmitted passwords as related to overall identification and authentication requirements.
1.0
Addresses the requirement forcryptography used to achieve bind subscriber identities to public keys to be at least as strong as the CA keys used to sign certificates.
1.0
Defines conformance and assessment criteria for verifying that each CSA head or SIB Chief executed a signed written user agreement with the FBI CJIS Division stating their willingness to demonstrate conformity with the CJIS Security Policy before accessing and participating in CJIS records information programs.
1.0
Defines conformance and assessment criteria for verifying that the signed user agreement between the organization and the FBI CJIS Division include the standards and sanctions governing utilization of CJIS systems.
1.0
Defines conformance and assessment criteria for verifying that the CSA ISO document and provide assistance for implementing the security-related controls for the Interface Agency and its users.
1.0
This page is also available as JSON and XML.