Trustmark Definitions (3101-3125 of 3247)

Trustmark Definition Name Version
Defines conformance and assessment criteria for verifying that an organization's baseline security awareness training for authorized personnel with access to sensitive information addresses the protection of information through hardcopy destruction.
1.0
Defines conformance and assessment criteria for verifying that an organization's baseline security awareness training for authorized personnel with access to sensitive information addresses social engineering.
1.0
Defines conformance and assessment criteria for verifying that an organization's baseline security awareness training for authorized personnel with access to sensitive information addresses handling Spam.
1.0
Defines conformance and assessment criteria for verifying that an organization's baseline security awareness training for all information technology personnel (system administrators, security administrators, network administrators, etc.) addresses timely application of system patches.
1.0
Defines conformance and assessment criteria for verifying that an organization's baseline security awareness training for authorized personnel with access to sensitive information addresses rules that describe responsibilities and expected behavior with regard to information system usage.
1.0
Defines conformance and assessment criteria for verifying that an organization's baseline security awareness training for authorized personnel with access to sensitive information addresses threats, vulnerabilities, and risks associated with accessing systems and services processing sensitive information.
1.0
Defines conformance and assessment criteria for verifying that baseline security awareness training for authorized personnel with access to sensitive information addresses usage and handling of that information.
1.0
Specifies that a covered entity must have policies and procedures to train all members of its workforce on the policies and procedures with respect to protected health information required by the Privacy Rule.
1.0
Addresses requirements for the transfer of PKI records archive data to new media.
1.0
Defines conformance and assessment criteria for verifying that an information system protects the confidentiality of transmitted information.
1.0
Defines conformance and assessment criteria for verifying that an information system implements cryptographic mechanisms to conceal or randomize communication patterns unless otherwise protected by organization-defined alternative physical safeguards.
1.0
This Trustmark Definition addresses the requirement for a system to employ encryption for transmitted information.
1.0
Defines conformance and assessment criteria for verifying that an information system implements cryptographic mechanisms to protect message externals unless otherwise protected by organization-defined alternative physical safeguards.
1.0
This Trustmark Definition addresses the requirement for a system to employ physical protection for transmitted information.
1.0
Defines conformance and assessment criteria for verifying that an information system maintains the confidentiality and/or integrity of information during preparation for transmission and during reception.
1.0
Defines conformance and assessment criteria for verifying that an information system protects the integrity of transmitted information.
1.0
Defines conformance and assessment criteria for verifying that an organization's transmission medium is exempt from CJIS Security Policy encryption requirements.
1.0
Addresses the requirement for PKI key activation data to be distinct in time and place from the associated cryptographic module when the activation data is transmitted.
1.0
Defines conformance and assessment criteria for verifying that an information system associates organization-defined security attributes with information exchanged between information systems and between system components.
1.0
Defines conformance and assessment criteria for verifying that an information system validates the integrity of transmitted security attributes.
1.0
Specifies that a health care related organization must implement a mechanism to encrypt electronically transmitted electronic protected health information whenever deemed appropriate.
1.0
Specifies that a health care related organization must implement security measures to ensure that electronically transmitted electronic protected health information is not improperly modified without detection until disposed of.
1.0
Specifies that a health care related organization must implement technical security measures to guard against unauthorized access to electronic protected health information that is being transmitted over an electronic communications network.
1.0
This Trustmark Definition addresses the requirement for a system to provide trusted paths for user access.
1.0
Defines conformance and assessment criteria for verifying that an information system provides a trusted communications path that is logically isolated and distinguishable from other paths.
1.0
This page is also available as JSON and XML.