Trustmark Definitions (726-750 of 3493)

Trustmark Definition Name Version
Defines conformance and assessment criteria for verifying that the CSA ISO documents technical compliance with the CJIS Security Policy.
1.0
Defines conformance and assessment criteria for verifying that the CSA ISO serves as the security point of contact (POC) to the FBI CJIS Division ISO.
1.0
Credential Service Providers (CSPs) must comply with records retention policies as appropriate for the organization, including adhering to applicable laws, regulations, and policies. CSPs must also inform their subscribers of their records retention policy.
1.0
Addresses the requirement for CSSes to sign responses using the same hash algorithm used by the CA to sign CRLs.
1.0
Addresses the requirement for CSSes to sign responses using the same signature algorithm used by the CA to sign CRLs.
1.0
Addresses the requirement for CSSes to sign responses using the same key size used by the CA to sign CRLs.
1.0
Defines conformance and assessment criteria for verifying that an organization re-implements or custom develops organization-defined critical information system components.
1.0
Specifies requirements in accordance with General Data Protection Regulation (GDPR) Art. 5(1)(c).
1.0
Defines conformance and assessment criteria for verifying that an organization employs organization-defined data mining prevention and detection techniques for organization-defined data storage objects to adequately detect and protect against data mining.
1.0
Defines privacy requirements related to ensuring that sensitive information is not destroyed in an unauthorized manner.
1.0
Defines privacy requirements related to the timely notice of changes to sensitive information.
1.0
Defines privacy requirements for organizations to maintain provenance over sensitive information.
1.0
Defines privacy requirements related to organizations NOT processing sensitive information in a way that is incompatible with the purposes for which it has been collected or subsequently authorized.
1.0
Addresses the requirement for an organization to protect all data received from sources used to confirm Subscriber attributes.
1.0
Addresses requirements for recording the date that the identity of a PKI certificate applicant is verified.
1.0
Defines conformance and assessment criteria for verifying that an organization changed the default administrative password on IP phones and VoIP switches.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for defined and documented system development life cycle security roles and responsibilities as related to overall system and services acquisition requirements.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for defined frequency for continuous monitoring as related to overall certification accreditation and security assessments requirements.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for defined frequency for monitoring supporting assessments as related to overall certification accreditation and security assessments requirements.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for defined mechanisms for hardware token-based authentication as related to overall identification and authentication requirements.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for defined minimum changed characters for passwords as related to overall identification and authentication requirements.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for defined minimum password complexity as related to overall identification and authentication requirements.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for defined password lifetime as related to overall identification and authentication requirements.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for defined password reuse limits as related to overall identification and authentication requirements.
1.0
Defines conformance and assessment criteria for verifying that an organization has established minimum PIN lifetime requirements.
1.0
This page is also available as JSON and XML.