Trustmark Definitions (401-425 of 3247)

Trustmark Definition Name Version
Defines conformance and assessment criteria for verifying that an organization ensures that cellular devices use advanced authentication when required.
1.2
Defines conformance and assessment criteria for verifying that an organization ensures that available critical patches and upgrades to the operating system of cellular devices are tested in accordance with section 5.10.4.1 of the CJIS Security Policy.
1.0
Defines conformance and assessment criteria for verifying that an organization employs compensating controls to meet advanced authentication requirements.
1.1
Defines conformance and assessment criteria for verifying that an organization ensures that cellular devices are configured for local device authentication in accordance with Section 5.13.9.1 of the CJIS Security Policy.
1.0
Defines conformance and assessment criteria for verifying that an organization ensures that cellular devices are configured for local device authentication.
1.0
Defines conformance and assessment criteria for verifying that an organization ensures that all sensitive information resident on cellular devices is encrypted.
1.0
Defines conformance and assessment criteria for verifying that an organization ensures that cached information (to include authenticators such as passwords and PINs) is erased in applications on cellular devices when sessions are terminated.
1.0
Defines conformance and assessment criteria for verifying that an organization employs malicious code protection or runs a MDM system that facilitates the ability to provide anti-malware services from the agency level
1.0
Defines conformance and assessment criteria for verifying that an organization ensures that available critical patches and upgrades to the operating system of cellular devices are tested prior to being applied.
1.0
Defines conformance and assessment criteria for verifying that an organization ensures that available critical patches and upgrades to the operating system of cellular devices are applied as soon as they become available.
1.0
Defines conformance and assessment criteria for verifying that an organization employs personal firewalls on cellular devices that facilitate the ability to provide firewall services at an organizational level.
1.0
Defines conformance and assessment criteria for verifying that an organization centrally manages organization-defined security controls and related processes.
1.0
Addresses the requirements for limiting the lifetime of PKI subscriber signing certificates and their private keys.
1.0
Addresses acceptable hash algorithms for use with PKI.
1.0
Addresses the requirement for CAs that generate certificates and CRLs to use SHA-1, SHA-224, SHA-256, SHA-384, or SHA-512 hash algorithm when generating digital signatures.
1.0
This Trustmark Definition specifies a minimum Hash Algorithm standard for generating signatures on certificates.
1.0
This Trustmark Definition specifies a minimum Hash Algorithm standard for generating signatures on certificates.
1.0
Addresses requirements for mechanisms and procedures designed to ensure the availability of PKI CA certificates
1.0
Addresses requirements for CA certificates containing only valid Uniform Resource Identifiers (URIs) that are accessible by relying parties.
1.0
This Trustmark Definition defines conformance and assessment criteria for compliance with minimum security requirements for access enforcement as related to overall access control requirements.
1.0
This Trustmark Definition defines conformance and assessment criteria for compliance with minimum security requirements for access enforcement as related to overall access control requirements.
1.0
Addresses the requirement that CA certificates created by the Organization shall be checked to ensure that all extensions are properly populated.
1.0
Addresses the requirement that CA certificates created by the Organization shall be checked to ensure that all fields are properly populated.
1.0
Addresses the requirement that after generation, the Organization shall post CA certificates in the repository system.
1.0
Addresses the requirement that after verification, the Organization shall post CA certificates in the repository system.
1.0
This page is also available as JSON and XML.