Trustmark Definitions (126-150 of 3301)

Trustmark Definition Name Version
Defines conformance and assessment criteria for verifying that an organization disables services within the information system deemed to be unnecessary and/or nonsecure.
1.0
Specifies requirements in accordance with Identity Ecosystem Framework (IDEF) requirement INTEROP-1: THIRD PARTY AUTHENTICATION.
1.0
Addresses requirements for mechanisms for posting information into a repository including an X.500 Directory Server System.
1.0
Addresses requirements for electronic fingerprints to be collected during identity proofing for PKI card issuance.
1.0
Addresses requirements for the mechanisms for posting information into a repository including access control and communication mechanisms when needed to protect repository information.
1.0
This Trustmark Definition defines conformance and assessment criteria for compliance with minimum security requirements for systems to finish pending actions on power loss.
1.0
Specifies that a health care related organization must have policies that, based upon the organization's access authorization policies, establish, document, review, and modify a user's right of access to a workstation.
1.0
Defines privacy requirements related to ensuring that sensitive information is not destroyed in an unauthorized manner.
1.0
This Trustmark Definition defines conformance and assessment criteria for compliance with requirements for securing sensitive CA equipment.
1.0
Addresses the requirement for an organization to prohibit the sharing of role-based PKI certificates.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for out of cycle basic security awareness training as related to overall awareness and training requirements.
1.0
Defines conformance and assessment criteria for verifying that an organization validates that the service set identifier (SSID) character strings used on its wireless access points do not contain any information that identifies the organization or the services accessible.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for documented personnel security procedures as related to overall personnel security requirements.
1.0
Defines conformance and assessment criteria for verifying that an organization centrally manages spam protection mechanisms.
1.0
Defines conformance and assessment criteria for verifying that an information system provides an explicit indication of current participants in organization-defined online meetings and teleconferences.
1.0
This Trustmark Definition defines conformance and assessment criteria for compliance with minimum security requirements for systems to lock out input on loss of air conditioning.
1.0
Defines conformance and assessment criteria for verifying that an organization prohibits cloud providers from using metadata derived from senitive information for any purpose.
1.0
Defines conformance and assessment criteria for verifying that an organization defines mission/business processes with consideration for information security and the resulting risk to individuals.
1.0
Defines conformance and assessment criteria for verifying that an organization provides means, where feasible and appropriate, for individuals to authorize the use of personally identifiable information (PII) prior to its collection.
1.0
Specifies requirements in accordance with Identity Ecosystem Framework (IDEF) requirement PRIVACY-3: ATTRIBUTE MINIMIZATION.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for documented audit and accountability procedures as related to overall audit and accountability requirements.
1.0
Defines conformance and assessment criteria for verifying that an organization implements a Privacy Incident Response Plan.
1.0
Addresses requirements for an organization to resolve name disputes regarding organization-issued PKI certificates.
1.0
Defines conformance and assessment criteria for verifying that an organization employs assessors or assessment teams with the independence to monitor the security controls in the information system on an ongoing basis.
1.0
Addresses requirements for establishing that an organization requires a State Government-issued Picture I.D. for the purpose of identity proofing.
1.0
This page is also available as JSON and XML.