Trustmark Definitions (2751-2775 of 3247)

Trustmark Definition Name Version
Defines privacy requirements related to the protection of sensitive information from alteration.
1.0
Defines privacy requirements related to the protection of sensitive information from alteration.
1.0
Defines privacy requirements related to the protection of sensitive information from destruction.
1.0
Defines privacy requirements related to the protection of sensitive information from loss.
1.0
Defines privacy requirements related to the protection of sensitive information from misuse.
1.0
Defines privacy requirements related to the protection of sensitive information from unauthorized access.
1.0
Defines privacy requirements for sensitive information controllers to periodically reassess the safeguards used to protect sensitive information.
1.0
Defines privacy requirements for sensitive information controllers to periodically review the safeguards used to protect sensitive information.
1.0
Defines privacy requirements for sensitive information controllers to protect sensitive information that they hold with appropriate safeguards against risks.
1.0
Defines privacy requirements for sensitive information controllers to protect sensitive information that they hold with appropriate safeguards proportional to the context in which it is held.
1.0
Defines privacy requirements for sensitive information controllers to protect sensitive information that they hold with appropriate safeguards proportional to the likelihood of harm threatened.
1.0
Defines privacy requirements for sensitive information controllers to protect sensitive information that they hold with appropriate safeguards proportional to the sensitivity of the information.
1.0
Defines privacy requirements for sensitive information controllers to protect sensitive information that they hold with appropriate safeguards proportional to the severity of harm threatened.
1.0
Defines privacy requirements related to technical safeguards for confidentiality of sensitive information.
1.0
Defines conformance and assessment criteria for verifying that an organization documents the types of actions to be taken in response to security alerts and advisories.
1.0
Defines conformance and assessment criteria for verifying that an organization takes appropriate actions in response to security alerts and advisories.
1.0
Defines conformance and assessment criteria for verifying that an organization employs automated mechanisms to make security alert and advisory information available throughout the organization.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for security assessment plan - defined assessment procedures as related to overall certification accreditation and security assessments requirements.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for security assessment plan - environment, team, roles, and responsibilities documented as related to overall certification accreditation and security assessments requirements.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for security assessment plan - security controls and enhancements under assessment documented as related to overall certification accreditation and security assessments requirements.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for security assessment results provided as related to overall certification accreditation and security assessments requirements.
1.0
Defines conformance and assessment criteria for verifying that an organization accepts the results of an assessment of organization-defined information system performed by organization-defined external organization when the assessment meets organization-defined requirements.
1.0
Defines conformance and assessment criteria for verifying that an organization employs assessors or assessment teams with the independence to conduct security control assessments.
1.0
Defines conformance and assessment criteria for verifying that an organization includes in-depth monitoring; vulnerability scanning; malicious user testing; insider threat assessment; performance/load testing; or other forms of security assessment as part of overall security control assessments.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for security assurance requirements as related to overall system and services acquisition requirements.
1.0
This page is also available as JSON and XML.