Trustmark Definitions (2801-2825 of 3247)

Trustmark Definition Name Version
Defines conformance and assessment criteria for verifying that an organization's security awareness training addresses the reporting of security events and weaknesses.
1.0
Defines conformance and assessment criteria for verifying that an organization's security awareness training addresses risks associated with handling sensitive information.
1.0
Defines conformance and assessment criteria for verifying that an organization's security awareness training addresses visitor control and physical access.
1.0
Defines conformance and assessment criteria for verifying that an organization provides training on insider threats.
1.0
Defines conformance and assessment criteria for verifying that an organization includes practical exercises in security awareness training that simulate actual cyber attacks.
1.0
Addresses the requirement for security checks of unattended facilities housing Organization CA equipment.
1.0
Addresses the requirement for security checks of unattended facilities housing remote workstations used to administer the Organization CA.
1.0
Addresses the requirement for security checks to verify the area is secured against unauthorized access.
1.0
Addresses the requirement for security checks to verify equipment state related to cryptographic modules.
1.0
Addresses the requirement for security checks to verify that physical security systems (e.g., door locks, vent covers) are functioning properly.
1.0
Addresses the requirement for security checks to verify that security containers are properly secured.
1.0
Defines conformance and assessment criteria for verifying that an organization develops a security Concept of Operations (CONOPS) for the information system containing at a minimum, how the organization intends to operate the system from the perspective of information security.
1.0
Defines conformance and assessment criteria for verifying that an organization reviews and updates the security Concept of Operations (CONOPS) for the information system at an organization-defined frequency.
1.0
Addresses the requirement for the strength of the security controls to be commensurate with the level of threat in the device's environment.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for security documentation protection as related to overall system and services acquisition requirements.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for security documentation requirements as related to overall system and services acquisition requirements.
1.0
Defines conformance and assessment criteria for verifying that an organization applies information system security engineering principles in the specification, design, development, implementation, and modification of the information system.
1.0
Defines conformance and assessment criteria for verifying that the organization manages evidence related to security incidents in conformance with the rules in the relevant jurisdiction(s).
1.0
Defines conformance and assessment criteria for verifying that an information system isolates security functions from non-security functions.
1.0
Defines conformance and assessment criteria for verifying that an information system isolates security functions enforcing access and information flow control from nonsecurity functions and from other security functions.
1.0
Defines conformance and assessment criteria for verifying that an information system utilizes underlying hardware separation mechanisms to implement security function isolation.
1.0
Defines conformance and assessment criteria for verifying that an organization implements security functions as a layered structure minimizing interactions between layers of the design and avoiding any dependence by lower layers on the functionality or correctness of higher layers.
1.0
Defines conformance and assessment criteria for verifying that an organization minimizes the number of nonsecurity functions included within the isolation boundary containing security functions.
1.0
Defines conformance and assessment criteria for verifying that an organization implements security functions as largely independent modules that maximize internal cohesiveness within modules and minimize coupling between modules.
1.0
Defines conformance and assessment criteria for verifying that an information system notifies organization-defined personnel or roles of failed security verification tests.
1.0
This page is also available as JSON and XML.