Trustmark Definitions (76-100 of 3301)

Trustmark Definition Name Version
Addresses the requirement that roles for which role-based PKI certificates may be issued are limited to those that uniquely identify a specific individual within an organization.
1.0
Specifies that a health care related organization must implement procedures to document repairs and modifications to the physical components of a facility which are related to security.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for control of publicly accessible areas as related to overall physical and environmental protection requirements.
1.0
Defines conformance and assessment criteria for verifying that an organization allocates sufficient budget and staffing resources to implement and operate the organization-wide privacy program.
1.0
Defines conformance and assessment criteria for verifying that an organization measures the bandwidth of organization-defined subset of identified covert channels in the operational environment of the information system.
1.0
Defines conformance and assessment criteria for verifying that an organization prohibits the direct connection of an organization-defined information system to a public network.
1.0
Defines conformance and assessment criteria for verifying that an organization's agreements for the sharing of sensitive information address NCIC validation requirements.
1.0
Specifies requirements for contents of the business associate contract between a covered entity and its business associate(s). The business associate must make its internal documents available to the Secretary to determine the covered entity's compliance.
1.0
Relying Parties must require assertions to be encrypted or delivered via protected and authenticated channels.
1.0
Defines conformance and assessment criteria for verifying that the State appointed a Compact Officer pursuant to the National Crime Prevention and Privacy Compact.
1.0
Defines conformance and assessment criteria for verifying that an organization requires that mobile devices functioning as a wireless access point are configured in accordance with all requirements applicable to the organization's other wireless access points.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for review and update of system maintenance policy as related to overall maintenance requirements.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for account managers as related to overall access control requirements.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for authenticator distribution procedures as related to overall identification and authentication requirements.
1.0
This Trustmark Definition defines conformance and assessment criteria for storing cryptographic module activation data separate from removable hardware associated with remote workstations used to administer the CA.
1.0
Defines conformance and assessment criteria for verifying that an information system maintains reviewer/releaser identity and credentials within the established chain of custody for all information reviewed or released.
1.0
Defines conformance and assessment criteria for verifying that an organization defines mission/business processes with consideration for information security and the resulting risk to organizational assets.
1.0
Defines privacy requirements related to individuals obtaining sensitive information that is held about them.
1.0
Defines conformance and assessment criteria for verifying that an information system implements multifactor authentication for network access to non-privileged accounts.
1.0
Defines privacy requirements for organizations to document the procedures and practices it follows to enable evaluation of user compliance with its system requirements.
1.0
Defines privacy requirements for organizations to identify who is responsible for ensuring that enforcement procedures of the privacy policy are adequate and enforced.
1.0
Specifies requirements for acceptable key generation parameters for use with PKI.
1.0
Defines privacy requirements for organizations to document the conditions under which it will NOT disclose information to an individual about whom information has been gathered.
1.0
Defines conformance and assessment criteria for verifying that an rganization physically controls and securely stores organization-defined types of digital and/or non-digital media within organization-defined controlled areas.
1.0
Defines conformance and assessment criteria for compliance with minimum security requirements for information system risk assessment updates as related to overall risk assessment requirements.
1.0
This page is also available as JSON and XML.