Trustmark Definitions (951-975 of 3247)

Trustmark Definition Name Version
Addresses requirements for an electronic facial image to be collected during identity proofing for PKI card issuance.
1.0
Addresses the requirement for copies of private keys that are delivered electronically to not be retained.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for emergency lighting as related to overall physical and environmental protection requirements.
1.0
Defines conformance and assessment criteria for verifying that an organization provides emergency lighting for all areas within the facility supporting essential missions and business functions.
1.0
Addresses the requirement for organization principle PKI certificate authorities operated in an offline manner to meet the requirements for issuing Emergency CRLs as specified in the organization's certificate policy.
1.0
Defines conformance and assessment criteria for verifying that an organization provides a short-term uninterruptible power supply to facilitate an orderly shutdown of the information system in the event of a primary power source loss.
1.0
Defines conformance and assessment criteria for verifying that an organization provides a short-term uninterruptible power supply to facilitate transition of the information system to long-term alternate power] in the event of a primary power source loss.
1.0
Defines conformance and assessment criteria for verifying that an organization provides a long-term alternate power supply for the information system that is capable of maintaining minimally required operational capability in the event of an extended loss of the primary power source.
1.0
Defines conformance and assessment criteria for verifying that an organization provides a long-term alternate power supply for the information system that is self-contained, not reliant on external power generation, and capable of maintaining [Selection: minimally required operational capability; full operational capability in the event of an extended loss of the primary power source. .
1.0
Defines conformance and assessment criteria for verifying that an organization provides the capability of shutting off power to the information system or individual system components in emergency situations.
1.0
Defines conformance and assessment criteria for verifying that an organization protects emergency power shutoff capability from unauthorized activation.
1.0
Defines conformance and assessment criteria for verifying that an organization places emergency shutoff switches or devices in defined locations to facilitate safe and easy access for personnel.
1.0
Addresses requirements for encoding the UUID within the serialNumber attribute of Card Authentication Certificates
1.0
Defines conformance and assessment criteria for verifying that an organization require passphrases used to unlock encrypted data at rest to be changed when previously authorized personnel no longer require access.
1.0
Defines conformance and assessment criteria for verifying that an organization requires passphrases used to unlock encrypted data at rest to not be a dictionary word.
1.0
Defines conformance and assessment criteria for verifying that an organization requires a minimum passphrase length to unlock encrypted data at rest.
1.0
Defines conformance and assessment criteria for verifying that an organization requires multiple files maintained in the same unencrypted folder to have separate and distinct passphrases.
1.0
Defines conformance and assessment criteria for verifying that an organization requires passphrases used to unlock encrypted data at rest to include a minimum number of character types.
1.0
Defines conformance and assessment criteria for verifying that cryptographic modules employed by the organization certified to meet FIPS 140-2 standards.
1.0
Addresses the requirement for the encryption of electronically delivered private key material.
1.0
Defines conformance and assessment criteria for verifying that an organization using encryption for access control employs FIPS 140-2 compliant cryptography.
1.0
Addresses requirements for End Entity certificates containing only valid Uniform Resource Identifiers (URIs) that are accessible by relying parties.
1.0
This Trustmark Definition specifies a minimum Diffie-Hellman key size for PKI.
1.0
This Trustmark Definition specifies a minimum DSA key size for private keys use with PKI.
1.0
This Trustmark Definition specifies a minimum DSA key size for public keys use with PKI.
1.0
This page is also available as JSON and XML.