Trustmark Definition Name | Version |
---|---|
Defines privacy requirements related to the protection of sensitive information from alteration.
|
1.0 |
Defines privacy requirements related to the protection of sensitive information from alteration.
|
1.0 |
Defines privacy requirements related to the protection of sensitive information from destruction.
|
1.0 |
Defines privacy requirements related to the protection of sensitive information from loss.
|
1.0 |
Defines privacy requirements related to the protection of sensitive information from misuse.
|
1.0 |
Defines privacy requirements related to the protection of sensitive information from unauthorized access.
|
1.0 |
Defines privacy requirements for sensitive information controllers to periodically reassess the safeguards used to protect sensitive information.
|
1.0 |
Defines privacy requirements for sensitive information controllers to periodically review the safeguards used to protect sensitive information.
|
1.0 |
Defines privacy requirements for sensitive information controllers to protect sensitive information that they hold with appropriate safeguards against risks.
|
1.0 |
Defines privacy requirements for sensitive information controllers to protect sensitive information that they hold with appropriate safeguards proportional to the context in which it is held.
|
1.0 |
Defines privacy requirements for sensitive information controllers to protect sensitive information that they hold with appropriate safeguards proportional to the likelihood of harm threatened.
|
1.0 |
Defines privacy requirements for sensitive information controllers to protect sensitive information that they hold with appropriate safeguards proportional to the sensitivity of the information.
|
1.0 |
Defines privacy requirements for sensitive information controllers to protect sensitive information that they hold with appropriate safeguards proportional to the severity of harm threatened.
|
1.0 |
Defines privacy requirements related to technical safeguards for confidentiality of sensitive information.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization documents the types of actions to be taken in response to security alerts and advisories.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization takes appropriate actions in response to security alerts and advisories.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization employs automated mechanisms to make security alert and advisory information available throughout the organization.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for security assessment plan - defined assessment procedures as related to overall certification accreditation and security assessments requirements.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for security assessment plan - environment, team, roles, and responsibilities documented as related to overall certification accreditation and security assessments requirements.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for security assessment plan - security controls and enhancements under assessment documented as related to overall certification accreditation and security assessments requirements.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for security assessment results provided as related to overall certification accreditation and security assessments requirements.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization accepts the results of an assessment of organization-defined information system performed by organization-defined external organization when the assessment meets organization-defined requirements.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization employs assessors or assessment teams with the independence to conduct security control assessments.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization includes in-depth monitoring; vulnerability scanning; malicious user testing; insider threat assessment; performance/load testing; or other forms of security assessment as part of overall security control assessments.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for security assurance requirements as related to overall system and services acquisition requirements.
|
1.0 |