Trustmark Definition Name | Version |
---|---|
Addresses the requirement for an organization to issue a certificate revocation list (CRL) within an organization-defined time when subscriber certificate is revoked due to compromise or suspected compromise of a private key.
|
1.0 |
Addresses the requirement for organizations cross-certified with the FBPKI to document how it chooses to back up its archive records.
|
1.0 |
Addresses requirements for the organizations ensuring interoperability with the FBCA repository.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization employs organization-defined methods for coordinating organization-defined audit information among external organizations when audit information is transmitted across organizational boundaries.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization requires that the identity of individuals be preserved in cross-organizational audit trails.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization provides cross-organizational audit information to organization-defined organizations based on cross-organizational sharing agreements.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization produces, controls, and distributes asymmetric cryptographic keys using NSA-approved key management technology and processes, approved PKI Class 3 certificates or prepositioned keying material, approved PKI Class 3 or Class 4 certificates and hardware security tokens, or another method that protects the user's private key.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization maintains availability of information in the event of the loss of cryptographic keys by users.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization produces, controls, and distributes symmetric cryptographic keys using NIST FIPS-compliant, NSA-approved key management, or other technology and processes.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for cryptographic key management as related to overall system and communications protection requirements.
|
1.0 |
This Trustmark Definition defines conformance and assessment criteria for compliance with security requirements for the memorization of cryptographic module activation data.
|
1.0 |
This Trustmark Definition defines conformance and assessment criteria for compliance with security requirements for the recording of cryptographic module activation data.
|
1.0 |
This Trustmark Definition defines conformance and assessment criteria for compliance with security requirements for securing cryptographic module activation data.
|
1.0 |
This Trustmark Definition defines conformance and assessment criteria for storing cryptographic module activation data separate from associated cryptographic modules.
|
1.0 |
This Trustmark Definition defines conformance and assessment criteria for storing cryptographic module activation data separate from removable hardware associated with remote workstations used to administer the CA.
|
1.0 |
This Trustmark Definition defines conformance and assessment criteria for compliance with requirements for securing cryptographic module activation data.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for cryptographic module authentication as related to overall identification and authentication requirements.
|
1.0 |
Addresses the requirement to deactivate PKI cryptographic modules after use.
|
1.0 |
Addresses the requirement for Cryptographic modules to be validated to the FIPS 140 level.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for cryptographic protection of stored passwords as related to overall identification and authentication requirements.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for cryptographic protection of transmitted passwords as related to overall identification and authentication requirements.
|
1.0 |
Addresses the requirement forcryptography used to achieve bind subscriber identities to public keys to be at least as strong as the CA keys used to sign certificates.
|
1.0 |
Defines conformance and assessment criteria for verifying that each CSA head or SIB Chief executed a signed written user agreement with the FBI CJIS Division stating their willingness to demonstrate conformity with the CJIS Security Policy before accessing and participating in CJIS records information programs.
|
1.0 |
Defines conformance and assessment criteria for verifying that the signed user agreement between the organization and the FBI CJIS Division include the standards and sanctions governing utilization of CJIS systems.
|
1.0 |
Defines conformance and assessment criteria for verifying that the CSA ISO document and provide assistance for implementing the security-related controls for the Interface Agency and its users.
|
1.0 |