Trustmark Definitions (426-450 of 3493)

Trustmark Definition Name Version
Defines conformance and assessment criteria for verifying that an organization ensures that available critical patches and upgrades to the operating system of cellular devices are applied as soon as they become available.
1.0
Defines conformance and assessment criteria for verifying that an organization employs personal firewalls on cellular devices that facilitate the ability to provide firewall services at an organizational level.
1.0
Defines conformance and assessment criteria for verifying that an organization centrally manages organization-defined security controls and related processes.
1.0
Addresses the requirements for limiting the lifetime of PKI subscriber signing certificates and their private keys.
1.0
Addresses acceptable hash algorithms for use with PKI.
1.0
Addresses the requirement for CAs that generate certificates and CRLs to use SHA-1, SHA-224, SHA-256, SHA-384, or SHA-512 hash algorithm when generating digital signatures.
1.0
This Trustmark Definition specifies a minimum Hash Algorithm standard for generating signatures on certificates.
1.0
This Trustmark Definition specifies a minimum Hash Algorithm standard for generating signatures on certificates.
1.0
Addresses requirements for mechanisms and procedures designed to ensure the availability of PKI CA certificates
1.0
Addresses requirements for CA certificates containing only valid Uniform Resource Identifiers (URIs) that are accessible by relying parties.
1.0
This Trustmark Definition defines conformance and assessment criteria for compliance with minimum security requirements for access enforcement as related to overall access control requirements.
1.0
This Trustmark Definition defines conformance and assessment criteria for compliance with minimum security requirements for access enforcement as related to overall access control requirements.
1.0
Addresses the requirement that CA certificates created by the Organization shall be checked to ensure that all extensions are properly populated.
1.0
Addresses the requirement that CA certificates created by the Organization shall be checked to ensure that all fields are properly populated.
1.0
Addresses the requirement that after generation, the Organization shall post CA certificates in the repository system.
1.0
Addresses the requirement that after verification, the Organization shall post CA certificates in the repository system.
1.0
Addresses the requirement for CAs to validate that individuals hold the roles identified in pseudonymous PKI certificates that identify subjects by their organizational roles.
1.0
Addresses the requirement for CAs to validate that individuals hold the roles identified in pseudonymous PKI certificates that identify subjects by their organizational roles.
1.0
Addresses requirements for the Organization CA ensuring that the applicant's identity information is verified in accordance with the process established by the applicable CP.
1.0
Addresses requirements for the Organization CA ensuring that the applicant's identity information is verified in accordance with the process established by the applicable CPS.
1.0
Addresses the requirement for CA signature keys to not be escrowed.
1.0
Addresses requirements for the mechanisms for posting information into a repository including the availability of the information as required by the certificate information posting stipulations of the CP.
1.0
Addresses requirements for the mechanisms for posting information into a repository including the availability of the information as required by the retrieval stipulations of the CP.
1.0
Addresses the requirements for limiting the lifetime of self-signed PKI certificates used as trust anchors.
1.0
Addresses requirements for organization PKI certificate authorities (CAs) specifying rules for interpreting names in Subscriber certificates in the Organization Certificate Policy (CP).
1.0
This page is also available as JSON and XML.