Trustmark Definitions (3226-3247 of 3247)

Trustmark Definition Name Version
Defines conformance and assessment criteria for compliance with minimum security requirements for wireless access usage restrictions as related to overall access control requirements.
1.0
Defines conformance and assessment criteria for verifying that an organization reduces the probability that usable wireless signals can be received outside of organization-controlled boundaries.
1.0
Defines conformance and assessment criteria for verifying that an information system protects wireless access to the system.
1.0
Defines conformance and assessment criteria for verifying that an organization disables wireless networking capabilities internally embedded within information system components prior to issuance and deployment when they are not intended for use, .
1.0
Defines conformance and assessment criteria for verifying that an organization identifies and explicitly authorizes users allowed to independently configure wireless networking capabilities.
1.0
Defines conformance and assessment criteria for verifying that an organization prohibits the use of WEP and WPA for wireless encryption.
1.0
Defines conformance and assessment criteria for verifying that an information system protects external and internal organization-defined wireless links from organization-defined types of signal parameter attacks or references to sources for such attacks.
1.0
Defines conformance and assessment criteria for verifying that an information system implements cryptographic mechanisms that achieve organization-defined level of protection against the effects of intentional electromagnetic interference.
1.0
Defines conformance and assessment criteria for verifying that an information system implements cryptographic mechanisms to identify and reject wireless transmissions that are deliberate attempts to achieve imitative or manipulative communications deception based on signal parameters.
1.0
Defines conformance and assessment criteria for verifying that an information system implements cryptographic mechanisms to reduce the detection potential of wireless links to organization-defined level of reduction.
1.0
Defines conformance and assessment criteria for verifying that an information system implements cryptographic mechanisms to prevent the identification of organization-defined wireless transmitters by using the transmitter signal parameters.
1.0
Specifies that a health care related organization must implement procedures for the authorization of workforce members who work with electronic protected health information or in locations where it might be accessed.
1.0
Specifies that a health care related organization must implement procedures to determine that the access of a workforce member to electronic protected health information is appropriate.
1.0
Specifies that a health care related organization must have policies to ensure that all members of its workforce have appropriate access to electronic protected health information and to prevent access to those not authorized.
1.0
Specifies that a health care related organization must implement procedures for the supervision of workforce members who work with electronic protected health information or in locations where it might be accessed.
1.0
Specifies that a health care related organization must implement procedures for terminating access to electronic protected health information when the employment of a workforce member ends or as required by applicable regulations.
1.0
Specifies that a health care related organization must have policies for physical safeguards for all workstations that access electronic protected health information, to restrict access to authorized users.
1.0
Specifies that a health care related organization must implement physical safeguards for all workstations that access electronic protected health information, to restrict access to authorized users.
1.0
Specifies that a health care related organization must document policies that specify the proper functions to be performed, the manner in which those functions are to be performed, and the physical attributes of the surroundings of a specific workstation or class of workstation that can access electronic protected health information.
1.0
Specifies that a health care related organization must implement procedures that specify the proper functions to be performed, the manner in which those functions are to be performed, and the physical attributes of the surroundings of a specific workstation or class of workstation that can access electronic protected health information.
1.0
Addresses requirements for an organization's X.500 Directory Server System to be accessible through the Lightweight Directory Access Protocol (LDAP).
1.0
Addresses requirements for mechanisms for posting information into a repository including an X.500 Directory Server System.
1.0
This page is also available as JSON and XML.