Entity Attributes

The table below contains a list of attributes intended for the assertion of specific facts about systems and system endpoints by authoritative sources, e.g., Federation Operators, Trust Framework Providers, and Registry Operators.

Prefix Informal Attribute NameVersionData TypeStatus
gfipm Administrative Point of Contact Email Address Text 2.0 Text Active / In Use
gfipm Administrative Point of Contact Fax Number 2.0 Text Active / In Use
gfipm Administrative Point of Contact Full Name 2.0 Text Active / In Use
gfipm Administrative Point of Contact Telephone Number 2.0 Text Active / In Use
gfipm Certificate 2.0 Base-64 Binary Active / In Use
gfipm Description 2.0 Text Active / In Use
gfipm Entity Abbreviation 2.0 Text Active / In Use
gfipm Entity Id 2.0 Text Active / In Use
gfipm Entity Name 2.0 Text Active / In Use
gfipm Owner Agency City Name 2.0 Text Active / In Use
gfipm Owner Agency Country Code 2.0 FIPS 10-4 Country Code Deprecated
gfipm Owner Agency County Code 2.0 FIPS 6-4 County Code Deprecated
gfipm Owner Agency Description Text 2.0 Text Active / In Use
gfipm Owner Agency Name 2.0 Text Active / In Use
gfipm Owner Agency ORI 2.0 Text Active / In Use
gfipm Owner Agency Organization Category Code 2.0 RISS Organization Category Code Active / In Use
gfipm Owner Agency Organization General Category Code 2.0 Organization General Category Code Active / In Use
gfipm Owner Agency Post Office Box Text 2.0 Text Active / In Use
gfipm Owner Agency Postal Code Text 2.0 Text Active / In Use
gfipm Owner Agency State Code 2.0 FIPS 5-2 State Code Active / In Use
gfipm Owner Agency Street Address Text 2.0 Text Active / In Use
gfipm Owner Agency Sub Unit Name 2.0 Text Active / In Use
gfipm Owner Agency Web Site URI 2.0 Text Active / In Use
gfipm Support Point of Contact Email Address Text 2.0 Text Active / In Use
gfipm Support Point of Contact Fax Number 2.0 Text Active / In Use
gfipm Support Point of Contact Full Name 2.0 Text Active / In Use
gfipm Support Point of Contact Telephone Number 2.0 Text Active / In Use
gfipm Technical Point of Contact Email Address Text 2.0 Text Active / In Use
gfipm Technical Point of Contact Fax Number 2.0 Text Active / In Use
gfipm Technical Point of Contact Full Name 2.0 Text Active / In Use
gfipm Technical Point of Contact Telephone Number 2.0 Text Active / In Use
gfipm Technical Role 2.0 GFIPM Technical Role Code Active / In Use
gfipm Technical Role 2.1 GFIPM Technical Role Code V2 Active / In Use
nief Appropriate Attribute Request and Usage Requirements Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief Attribute Encoding Requirements for IDPs and APs Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief Attribute Provider Organization Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief Attributes for IDPOs Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief Attributes for SPOs Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief Entity Descriptor Usage Policy Reference 1.0 Text Active / In Use
nief Entity Id 1.0 Text Proposed
nief Entity Tags 1.0 Text Active / In Use
nief Full Disclosure Requirements for APOs Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief Full Disclosure Requirements for IDPOs Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief Full Disclosure Requirements for SCOs Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief Full Disclosure Requirements for SPOs Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief Health Monitoring Requirements for SPs Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief Identity Provider Organization Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief Member Organization Trustmark Reference 1.0 Trustmark Reference Deprecated
nief Organizational Bona Fides Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief Owner Agency Country Code 1.0 GENC Country Code Active / In Use
nief Owner Agency County Code 1.0 Census County Code Active / In Use
nief SAML Authentication Context Requirements for IDPs Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief SAML Presentation and UI Requirements for IDPs Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief SAML Presentation and UI Requirements for SPs Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief SAML SSO IDP Discovery Requirements for SPs Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief Service Consumer Organization Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief Service Provider Organization Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief Trust Interoperability Profile Reference 1.0 Text Proposed
nief-fbi Bona Fide US Law Enforcement Agency Trustmark Reference 1.0 Trustmark Reference Deprecated
nief-ficam Financial Capacity Requirements for CSPs Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief-ficam LOA 2 Assertions Requirements Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief-ficam LOA 2 Authentication Process Requirements Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief-ficam LOA 2 Registration and Issuance Requirements Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief-ficam LOA 2 Token and Credential Management Requirements Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief-ficam LOA 2 Tokens Requirements Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief-ficam LOA 3 Assertions Requirements Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief-ficam LOA 3 Authentication Process Requirements Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief-ficam LOA 3 Registration and Issuance Requirements Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief-ficam LOA 3 Token and Credential Management Requirements Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief-ficam LOA 3 Tokens Requirements Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief-ficam Privacy Activity Tracking Requirements for CSPs and BAE Responders Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief-ficam Privacy Adequate Notice Requirements for CSPs Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief-ficam Privacy Minimal Attribute Release Requirements for CSPs and BAE Responders Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief-ficam Privacy Opt-In Requirements for CSPs Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief-ficam Privacy Termination Requirements for CSPs and BAE Responders Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief-ficam SAML Attribute Encoding Requirements for CSPs Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief-ficam SAML Authentication Context Requirements for RPs Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief-ficam SAML Authentication Context Value Requirements for CSPs Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief-ficam SAML Metadata Import and Consumption Requirements Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief-ficam SAML SSO Requirements for CSPs Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief-ficam SAML SSO Requirements for RPs Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief-ficam SAML Trust and Security Requirements Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief-nist FIPS 140-2 Validated Modules Requirements Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief-nist Minimum Security Requirements For Access Control Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief-nist Minimum Security Requirements For Audit and Accountability Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief-nist Minimum Security Requirements For Awareness and Training Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief-nist Minimum Security Requirements For Certification Accreditation and Security Assessments Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief-nist Minimum Security Requirements For Configuration Management Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief-nist Minimum Security Requirements For Contingency Planning Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief-nist Minimum Security Requirements For Identification and Authentication Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief-nist Minimum Security Requirements For Incident Response Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief-nist Minimum Security Requirements For Maintenance Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief-nist Minimum Security Requirements For Media Protection Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief-nist Minimum Security Requirements For Personnel Security Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief-nist Minimum Security Requirements For Physical and Environmental Protection Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief-nist Minimum Security Requirements For Planning Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief-nist Minimum Security Requirements For Risk Assessment Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief-nist Minimum Security Requirements For System and Communications Protection Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief-nist Minimum Security Requirements For System and Information Integrity Trustmark Reference 1.0 Trustmark Reference Active / In Use
nief-nist Minimum Security Requirements For System and Services Acquisition Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Acceptance Criteria Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Acceptance of Federal PIV Credentials For Non-Organizational Users Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Acceptance of PIV Credentials Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Access Authorizations Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Access Control for Shared Secret Files Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Access Enforcement Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Account Creation Approvals Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Account Manager Notification Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Account Managers Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Account Monitoring Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Analysis of Vulnerability Scan Reports Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Approval of Non-Local Maintenance Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Approval of System Maintenance Activities Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Assessment of Security Controls Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Assignment of Identifiers Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Assignment of Personnel Position Risk Designations Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Assistance and Support Resources for Incident Response Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Audit Processing Failure Actions Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Audit Processing Failure Alerts Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Audit Record Generation Capability Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Audit Record Retention Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Audit Storage Capacity Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Authentication of Subscribers for Token and Credential Renewal and Re-Issuance Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Authenticator Content Protection Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Authenticator Default Content Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Authenticator Distribution Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Authenticator Distribution Verification Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Authenticator Feedback Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Authenticator Lifetime Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Authenticator Protection Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Authenticator Refresh Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Authenticator Reuse Conditions Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Authenticator Revocation Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Authenticator Strength Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Authorization of Identifiers Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Authorization of Internal System Connections Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Authorization of Non-Escorted Maintenance Personnel Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Authorizing Official Assigned Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Automatic Lockout Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Automation of Vulnerability Management Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark BAE SAML for AP Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark BAE SAML for AR Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Backup of System Documentation Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Backup of System Information Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Backup of User Information Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Baseline Configuration Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Basic Encryption of Shared Secret Files Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Basic Implementation of Personal Knowledge Pre-Registered Knowledge Tokens Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Basic In-Person Subscriber Credential Issuance Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Basic Password Storage Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Basic Renewal and Re-Issuance of Tokens and Credentials Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Bona Fide US Law Enforcement Agency Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Bona Fides for US Organizations Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Consecutive Invalid Logon Attempts Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Continuous Monitoring - Reporting Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Continuous Monitoring Metrics Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Continuous Monitoring Response Actions Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Continuous Security Status Monitoring Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Control and Documentation of Peer-To-Peer File Sharing Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Control of Physical Ingress and Egress Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Control of Publicly Accessible Areas Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Coordination With Incident Response Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Coordination of Contingency Planning Activities Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Coordination of Security Audit Function Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Corrective Actions Based on System Contingency Plan Test Results Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Correlation and Analysis of Monitoring and Assessment Information Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Credentials Issued For Facility Access Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Cryptographic Key Management Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Cryptographic Module Authentication Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Cryptographic Protection of Stored Passwords Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Cryptographic Protection of Transmissions Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Cryptographic Protection of Transmitted Passwords Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Defined Frequency for Continuous Monitoring Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Defined Frequency for Monitoring Supporting Assessments Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Defined Mechanisms For Hardware Token-Based Authentication Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Defined Minimum Changed Characters for Passwords Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Defined Minimum Password Complexity Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Defined Password Lifetime Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Defined Password Reuse Limits Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Defined Procedures for Account Management Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Defined Software Installation Policies Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Defined System Maintenance Record Content Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Defined and Documented System Development Life Cycle Security Roles and Responsibilities Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Determination of Auditable Events Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Determination of Events to be Audited Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Discrete Information Security Budget Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Discretionary Access Control Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Dissemination of Access Control Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Dissemination of Access Control Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Dissemination of Audit and Accountability Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Dissemination of Audit and Accountability Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Dissemination of Configuration Management Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Dissemination of Configuration Management Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Dissemination of Contingency Planning Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Dissemination of Contingency Planning Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Dissemination of Identification and Authentication Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Dissemination of Identification and Authentication Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Dissemination of Incident Response Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Dissemination of Incident Response Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Dissemination of Information System Risk Assessment Results Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Dissemination of Media Protection Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Dissemination of Media Protection Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Dissemination of Personnel Security Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Dissemination of Personnel Security Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Dissemination of Physical and Environmental Protection Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Dissemination of Physical and Environmental Protection Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Dissemination of Risk Assessment Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Dissemination of Risk Assessment Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Dissemination of Security Assessment and Authorization Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Dissemination of Security Assessment and Authorization Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Dissemination of Security Awareness and Training Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Dissemination of Security Awareness and Training Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Dissemination of Security Planning Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Dissemination of Security Planning Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Dissemination of System Maintenance Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Dissemination of System Maintenance Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Dissemination of System and Communications Protection Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Dissemination of System and Communications Protection Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Dissemination of System and Information Integrity Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Dissemination of System and Information Integrity Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Dissemination of System and Services Acquisition Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Dissemination of System and Services Acquisition Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documentation and Approval of Deviations from Defined Configuration Settings Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documentation of Actions Not Requiring Identification or Authentication Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documentation of Individuals' Basic Security Awareness Training Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documentation of Individuals' Specific Information System Security Training Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documentation of Internal Connections Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documentation of Prohibited and-or Restricted Configuration Items Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documentation of System Maintenance Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented Access Agreements Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented Access Control Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented Access Control Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented Audit and Accountability Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented Audit and Accountability Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented Configuration Management Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented Configuration Management Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented Contingency Planning Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented Contingency Planning Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented Identification and Authentication Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented Identification and Authentication Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented Incident Response Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented Incident Response Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented Information System Risk Assessment Results Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented Interconnection Security Agreements Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented Media Protection Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented Media Protection Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented Personnel Security Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented Personnel Security Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented Personnel Security Requirements Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented Physical and Environmental Protection Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented Physical and Environmental Protection Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented Rationale for Audited Events Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented Risk Assessment Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented Risk Assessment Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented Security Assessment and Authorization Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented Security Assessment and Authorization Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented Security Awareness and Training Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented Security Awareness and Training Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented Security Categorization Results Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented Security Planning Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented Security Planning Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented System Component Inventory Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented System Maintenance Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented System Maintenance Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented System and Communications Protection Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented System and Communications Protection Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented System and Information Integrity Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented System and Information Integrity Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented System and Services Acquisition Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Documented System and Services Acquisition Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Emergency Lighting Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Enforcement of Software Installation Policies Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Escort of Visitors Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Established Configuration Settings Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Established Personnel Security Requirements Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Established System Rules of Behavior Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Establishment of Remote Access restrictions Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Event Triggered Review of Physical Access Logs Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Expiration of Tokens and Credentials With Grace Periods Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Expiration of Tokens and Credentials Without Grace Periods Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark External Provider Compliance With Organizational Security Requirements Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark FICAM Approved Products Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark FICAM Approved Third-Party Credentials For Non-Organizational Users Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark FICAM Issued Profiles Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark FICAM SAML CSP Authentication Context Value Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark FICAM SAML Metadata Import and Consumption Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark FICAM SAML SSO for CSP Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark FICAM SAML SSO for RP Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark FICAM TFP-Certified CSP - LOA 1 Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark FICAM TFP-Certified CSP - LOA 2 Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark FICAM TFP-Certified CSP - LOA 3 Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark FICAM TFP-Certified CSP - LOA 4 Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark FIPS 140-2 Validated Crypto Modules Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark FIPS-201 Approved PIV Products Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark FPKI PIV-I Certified Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Fire Protection Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Flaw Identification Reporting and Correction Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Flaw Remediation Incorporated Into Configuration Management Process Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Forwarding of Security Incident Information Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Generation of Audit Records Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Good Standing of Subscribers at Financial Institutions Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Granular Mappable Audit Time Stamps Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Group and Role Authenticator Changes Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Group and Role Membership Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark High Entropy for Look-Up Secret Tokens Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark High Entropy for Memorized Secret Tokens Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark High Entropy for Pre-Registered Knowledge Tokens Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark High Input Entropy for Out-of-Band Token Authentication Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark ID Assurance - LOA 2 CSP Authentication Process Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark ID Assurance - LOA 2 CSP Registration and Issuance Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark ID Assurance - LOA 2 CSP Token and Credential Management Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark ID Assurance - LOA 2 CSP Tokens Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark ID Assurance - LOA 3 CSP Authentication Process Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark ID Assurance - LOA 3 CSP Registration and Issuance Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark ID Assurance - LOA 3 CSP Token and Credential Management Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark ID Assurance - LOA 3 CSP Tokens Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Identification and Authentication of Organizational Users Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Identification of Actions Not Requiring Identification or Authentication Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Identified Account Types Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Identifier Inactivity Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Identifier Reuse Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Identifier Selection Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Implementation of Established Configuration Settings Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Implementation of Multi-Factor Hardware Cryptographic Tokens Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Implementation of Multi-Factor One-Time-Password Hardware Tokens Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Implementation of Multi-Factor Software Cryptographic Tokens Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Implementation of Out-of-Band Tokens Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Implementation of Pre-Registered Knowledge Tokens With High Cardinality Of Personal Knowledge Questions Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Implementation of Pre-Registered Knowledge Tokens With Minimum Cardinality Of Personal Knowledge Questions Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Implementation of Single-Factor One-Time-Password Device Tokens Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark In-Person Registration Applicant Tracking with Biometrics Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark In-Person Registration Applicant Tracking with Temporary Secrets Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark In-Person Subscriber Credential Issuance with Inspection of Institution-Issued Picture ID Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark In-Person Visual Inspection of Registration Applicant Financial Account Number Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark In-Person Visual Inspection of Registration Applicant Primary Government Picture ID Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark In-Person Visual Inspection of Registration Applicant Secondary Government ID Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Incident Handling - Analysis Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Incident Handling - Containment Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Incident Handling - Coordination Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Incident Handling - Detection Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Incident Handling - Eradication Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Incident Handling - Lessons Learned Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Incident Handling - Preparation Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Incident Handling - Recovery Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Incident Monitoring Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Incident Response Plan Approach Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Incident Response Plan Communication of Changes Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Incident Response Plan Defines Reportable Incidents Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Incident Response Plan Distribution Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Incident Response Plan Metrics Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Incident Response Plan Organizational Requirements Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Incident Response Plan Protection Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Incident Response Plan Resources Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Incident Response Plan Review and Approval Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Incident Response Plan Roadmap Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Incident Response Plan Structure Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Incident Response Plan Updates Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Indication of Use of Collaborative Computing Devices Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Information Handling and Retention Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Information Security Requirements Definition Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Information Security Resource Allocation Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Information Security Risk Management Integrated Into System Development Life Cycle Activities Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Information Security Roles In The System Development Life Cycle Mapped to Individuals Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Information System Administrator Documentation - Known Administrative Vulnerabilities Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Information System Administrator Documentation - Secure Configuration Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Information System Administrator Documentation - Use and Maintenance Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Information System Component Delivery and Removal Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Information System Documentation - Attempts to Obtain Documentation Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Information System Documentation - Distribution Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Information System Documentation - Documentation Protection Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Information System Monitoring - Attack Detection Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Information System Monitoring - Legal Compliance Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Information System Monitoring - Monitoring Adjusted To Risks Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Information System Monitoring - Monitoring Device Placement Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Information System Monitoring - Protection of Collected Information Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Information System Monitoring - Reporting Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Information System Monitoring - Unauthorized Connections Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Information System Monitoring - Unauthorized Use Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Information System Risk Assessment Implementation Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Information System Risk Assessment Results Reviewed Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Information System Risk Assessment Updates Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Information System Security Categorization Review and Approval Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Information System User Documentation - Methods of Secure User Interaction Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Information System User Documentation - User Security Functions Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Information System User Documentation - User Security Responsibilities Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Information and System Are Categorized Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Initial Authenticator Content Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Initial Basic Security Awareness Training Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Initial Contingency Planning Training Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Initial Incident Response Training Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Initial Role-Based Security Training Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Input Entropy for Multi-Factor Hardware Cryptographic Token Authentication Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Input Entropy for Multi-Factor Software Cryptographic Token Authentication Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Input Entropy for Single-Factor Cryptographic Device Token Authentication Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Interconnection Security Agreements Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Intrusion Alarms Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Inventory of Physical Access Devices Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Key and Combination Changes Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Logical Separation of Publicly Accessible Information System Components Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Login Banner (Generic) Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Login Banner (U.S. Federal Government) Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Login Banner Acknowledgement Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Login Banner for Publicly Accessible Systems Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Low Entropy for Look-Up Secret Tokens Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Low Entropy for Memorized Secret Tokens Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Low Entropy for Pre-Registered Knowledge Tokens Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Low Input Entropy for Out-of-Band Token Authentication Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Maintenance Personnel Authorization Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Maintenance of List for Authorized Physical Access Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Maintenance of Physical Access Logs Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Maintenance of Visitor Access Records Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Malicious Code Protection - Employed at Information System Entry Points Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Malicious Code Protection - Handling of False Positives Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Malicious Code Protection - Periodic Scans Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Malicious Code Protection - Real-Time Scans Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Malicious Code Protection - Updates Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Malicious Code Protection Employed at Information System Exit Points Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Management of Information System External Interfaces Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Mandatory Access Control Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Media Access Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Media Sanitization Mechanism Strength Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Media Use Restrictions Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Minimum Content of Audit Records Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Mitigation of Basic Subscriber Authentication Threats Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Mitigation of Basic Token Threats Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Mitigation of Malicious Code Threats on Authentication Tokens Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Mitigation of Phishing and Pharming for Subscriber Authentication Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Mobile Device Configuration Requirements Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Mobile Device Connection Authorization Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Mobile Device Connection Requirements Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Mobile Device Implementation Guidance Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Mobile Device Usage Restrictions Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Monitoring and Control of Configuration Settings Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Monitoring of External Provider Security Compliance Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Monitoring of Individuals' Basic Security Awareness Training Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Monitoring of Individuals' Specific Information System Security Training Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Monitoring of Information System External Boundary Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Monitoring of Information System Internal Boundaries Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Monitoring of Software Installation Policy Compliance Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Monitoring of System Maintenance Activity Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Monitoring of Visitor Activity Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Multifactor Authentication For Network Access to Privileged Accounts Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark NIEF APO Asserted Attributes Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark NIEF APO Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark NIEF Audit Compliance Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark NIEF BAE LUID Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark NIEF Certificate Policy Cryptographic Management Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark NIEF FICAM IDPO Financial Capacity Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark NIEF FICAM SAML RP Authentication Context Request Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark NIEF Full Disclosure - APO Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark NIEF Full Disclosure - IDPO Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark NIEF Full Disclosure - SCO Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark NIEF Full Disclosure - SPO Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark NIEF IDP and AP Attribute Encoding Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark NIEF IDPO Asserted Attributes Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark NIEF IDPO Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark NIEF Member Organization Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark NIEF Private Key Use Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark NIEF Public Key Use Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark NIEF SAML IDP Authentication Context Value Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark NIEF SCO Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark NIEF SP Health Monitoring Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark NIEF SPO Requested Attributes Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark NIEF SPO Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark NIEF Technical Control Exceptions Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark NIST 800-53 Moderate Controls Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark NIST 800-63 LOA 2 Derived Credential Issuance Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark NIST 800-63 LOA 3 Derived Credential Issuance Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark NIST 800-63 LOA 4 Derived Credential Issuance Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Non-Local System Maintenance Consistent With Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Non-Local System Maintenance Session Termination Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Non-Organizational Users Uniquely Identified and Authenticated Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Notification of Sanctions Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Ongoing Security Control Assessments Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Out of Cycle Basic Security Awareness Training Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Out of Cycle Role-Based Security Training Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Oversight of External Information System Services Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark PKI 2048 bit RSA Keys Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark PKI Accountable Private Key Backup Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark PKI Chain of Custody Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark PKI FIPS 140-2 Modules Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark PKI FIPS Private Key Destruction Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark PKI Key Pair Generation Location Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark PKI Key Parameters Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark PKI Meaningful Names Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark PKI No Anonymity or Pseudonyms Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark PKI Private Key Materials Encrypted Outside Module Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark PKI Private Key Transfer Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark PKI Private Keys Not Archived Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark PKI Private Keys Stay In Modules Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark PKI RSA Key Pair Generation Algorithm Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark PKI ReKey Conditions Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark PKI SHA-256 Hash Algorithm Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark PKI Two-Year Certificate Lifetime Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Password Hashing for Storage Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Performance of System Maintenance Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Periodic Basic Security Awareness Training Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Periodic Contingency Planning Training Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Periodic Incident Response Training Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Periodic Review and Update of Interconnection Security Agreements Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Periodic Review of Incident Response Plan Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Periodic Review of List Authorized for Physical Access Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Periodic Review of Physical Access Logs Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Periodic Review of Visitor Access Records Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Periodic Role-Based Security Training Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Personal Knowledge Pre-Registered Knowledge Token Authentication Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Personnel Screening Criteria Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Personnel Termination - Credential Revocation Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Personnel Termination - Disabling of Access Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Personnel Termination - Exit Interviews Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Personnel Termination - Organizational Notification Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Personnel Termination - Organizational Retention of Access To Information and Systems Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Personnel Termination - Retrieval of Security-Related Property Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Personnel Transfers - Modification of Access Authorizations Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Personnel Transfers - Notification Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Personnel Transfers - Review of Access Authorizations Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Personnel Transfers - Timely Actions Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Physical Access Devices are Secured Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Physical Security Incident Detection and Response Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Physical Separation of Publicly Accessible Information System Components Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Plan of Action and Milestones Development Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Policies for Token and Credential Renewal and Re-Issuance Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Privacy - Appropriate Attribute Request and Usage Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Privacy - CSP Adequate Notice Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Privacy - CSP End-User Opt-In Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Privacy - CSP and AP End-User Activity Tracking Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Privacy - CSP and AP End-User Service Termination Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Privacy - CSP and AP Minimal Attribute Release Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Procedures for Authenticator Loss Damage or Compromise Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Production of Security Assessment Report Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Prohibition on Reuse of Temporary Secrets for In-Person Registration Applicant Tracking Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Protection of Audit Information Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Protection of Audit Tools Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Protection of Backup Information Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Protection of Subscriber Registration Information Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Protection of Subscriber Registration Transactions Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Publicly Accessible Content - Authorization to Post To Public System Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Publicly Accessible Content - Review Prior To Public Posting Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Publicly Accessible Content - Review of Posted Content Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Publicly Accessible Content - Training Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Re-Acknowledgement Required For Updated System Rules of Behavior Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Re-Signing of Updated or Renewed Access Agreements Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Re-screening of Authorized Individuals Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Records Verification of Registration Applicant Financial Account Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Records Verification of Registration Applicant Primary Government ID Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Records Verification of Registration Applicant Utility Account Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Records for Non-Local System Maintenance Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Registration Applicant Biometric Recording for Non-Repudiation of Registration Application Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Registration Subscriber Voice Recording for Non-Repudiation Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Registration of Pseudonymous Subscriber Names Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Registration of Verified Subscriber Names Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Reissuance of Shared/Group Credentials Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Remote Access Authorization Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Remote Activation of Collaborative Computing Devices Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Remote Registration Applicant Tracking with Temporary Secrets Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Remote Subscriber Credential Issuance by Employers and Educational Institutions Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Remote Visual Inspection of Registration Applicant Financial Account Number Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Remote Visual Inspection of Registration Applicant Primary Government ID Number Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Remote Visual Inspection of Registration Applicant Utility Account Number Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Removal From Authorized Physical Access List Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Removal of Systems or Components for Maintenance Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Renewal and Re-Issuance of Passwords Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Reporting of Audit Record Review Findings Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Reporting of Suspected Incidents Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Resistance of Subscriber Registration and Issuance Threats Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Restriction of Multi-Factor One-Time-Password Hardware Token Authenticator Lifetimes Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Restriction of Single-Factor One-Time-Password Device Token Authenticator Lifetimes Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Retention of Individual Training Records Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review and Update of Access Agreements Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review and Update of Identification and Authentication Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review and Update of Identification and Authentication Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review and Update of Incident Response Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review and Update of Incident Response Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review and Update of Media Protection Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review and Update of Media Protection Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review and Update of Personnel Security Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review and Update of Personnel Security Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review and Update of Physical and Environmental Protection Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review and Update of Physical and Environmental Protection Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review and Update of Position Risk Designations Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review and Update of Risk Assessment Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review and Update of Risk Assessment Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review and Update of Security Planning Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review and Update of Security Planning Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review and Update of System Maintenance Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review and Update of System Maintenance Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review and Update of System Rules of Behavior Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review and Update of System and Communications Protection Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review and Update of System and Communications Protection Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review and Update of System and Information Integrity Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review and Update of System and Information Integrity Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review and Update of System and Services Acquisition Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review and Update of System and Services Acquisition Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review of Access Control Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review of Access Control Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review of Accounts Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review of Audit Records Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review of Audit and Accountability Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review of Audit and Accountability Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review of Configuration Management Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review of Configuration Management Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review of Contingency Planning Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review of Contingency Planning Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review of Security Assessment and Authorization Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review of Security Assessment and Authorization Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review of Security Awareness and Training Policy Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review of Security Awareness and Training Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review of System Component Inventory Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review of System Contingency Plan Test Results Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Review of System Maintenance Records Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Revocation of Tokens and Credentials Within 24 Hours Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Revocation of Tokens and Credentials Within 72 Hours Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark SAML Attribute NameFormat URI for CSP Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark SAML IDP-Initiated SSO for IDP Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark SAML IDP-Initiated SSO for RP Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark SAML SSO IDP Discovery for SP Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark SAML Trust and Security Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark SAML UI for SP-Initiated SSO Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Sanctions for Non-Compliance Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Sanitization of Equipment to be Removed for Maintenance Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Sanitization of Media Prior To Disposal Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Sanitization of Media Prior To Release Out of Organizational Control Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Sanitization of Media Prior To Reuse Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Scheduling of System Maintenance Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Screening of Individuals Prior To Authorizing Access Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Secure Name and Address Resolution - Architecture Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Secure Name and Address Resolution - Data Origin and Integrity Verification Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Secure Name and Address Resolution - Fault Tolerance Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Secure Name and Address Resolution - Recursive or Caching Resolver Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Secure Name and Address Resolution - Security Status of Child Zones Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Security - Minimum Access Control Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Security - Minimum Audit and Accountability Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Security - Minimum Awareness and Training Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Security - Minimum Certification Accreditation and Security Assessments Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Security - Minimum Configuration Management Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Security - Minimum Contingency Planning Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Security - Minimum Identification and Authentication Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Security - Minimum Incident Response Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Security - Minimum Maintenance Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Security - Minimum Media Protection Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Security - Minimum Personnel Security Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Security - Minimum Physical and Environmental Protection Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Security - Minimum Planning Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Security - Minimum Risk Assessment Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Security - Minimum System and Communications Protection Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Security - Minimum System and Information Integrity Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Security - Minimum System and Services Acquisition Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Security Assessment Plan - Defined Assessment Procedures Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Security Assessment Plan - Environment Team Roles and Responsibilities Documented Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Security Assessment Plan - Security Controls and Enhancements Under Assessment Documented Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Security Assessment Results Provided Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Security Assurance Requirements Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Security Documentation Protection Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Security Documentation Requirements Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Security Functional Requirements Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Security Impact Analysis Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Security Strength Requirements Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Selectable Audit of Events Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Separation of Duties Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Sharing of Information System Vulnerability Scan Results Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Sharing of Long-Term Subscriber Authentication Secrets Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Signed Access Agreements Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Signed Acknowledgements for System Rules of Behavior Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Software Firmware and Information Integrity Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Software Usage In Compliance with Contracts and Copyrights Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Specified Privileges For Each Account Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Strong Authenticators for Non-Local Maintenance Sessions Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Strong Subscriber Authentication for Token and Credential Renewal and Re-Issuance Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Subscriber Authentication Process Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Subscriber Credential Issuance by Financial Institutions Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Subscriber Credential Issuance with Confirmation of Physical Address of Record Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Subscriber Credential Issuance with Email Address Confirmation Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Subscriber Credential Issuance with Notice of Issuance to Confirmed Physical Address Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Subscriber Credential Issuance with Secrets Reset Upon First Use Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Subscriber Credential Issuance with Secrets Valid for At Most Seven Days Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Subscriber Credential Issuance with Telephone Confirmation via Text Message Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Subscriber Credential Issuance with Telephone Confirmation via Voice Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Subscriber Credential Issuance with Verification of Link Between Electronic and Physical Addresses Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Subscriber Registration Applications Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Subscriber Registration Process Policies and Practice Statements Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Subscriber Registration Recording Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Supervision of Maintenance Personnel Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Supply Chain Protection Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark System Authorizations Periodically Updated Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark System Configured for Essential Capabilities Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark System Contingency Plan - Communication of Changes Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark System Contingency Plan Distribution Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark System Contingency Plan Essential Items Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark System Contingency Plan Full Restoration Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark System Contingency Plan Maintenance of Essential Missions and Functions Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark System Contingency Plan Periodic Review Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark System Contingency Plan Protection Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark System Contingency Plan Recovery Objectives Priorities and Metrics Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark System Contingency Plan Review and Approval Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark System Contingency Plan Roles Responsibilities and Assigned Individuals Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark System Contingency Plan Testing Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark System Contingency Plan Updates Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark System Cryptographic Protection Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark System Denial of Service Protection Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark System Development Environment Description Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark System Development Life Cycle Security Management Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark System Operational Environment Description Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark System Process Isolation Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark System Recovery and Reconstitution Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark System Security Alerts Advisories and Directives - Distribution Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark System Security Alerts Advisories and Directives - Implementation Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark System Security Alerts Advisories and Directives - Internal Generation Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark System Security Alerts Advisories and Directives - Monitoring Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark System Security Plan Approval Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark System Security Plan Content Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark System Security Plan Distribution Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark System Security Plan Protection Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark System Security Plan Review Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark System Security Plan Updates Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Systems Authorized Prior to Commencing Operations Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Systems Used Exclusively for NIEF Functions Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Tamper Protection Safeguards Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Tamper Resistance and Protection Program Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Temperature and Humidity Controls Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Temporary Passwords Permitted Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Testing of Flaw Remediation Updates Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Third-Party Providers - Compliance Monitoring Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Third-Party Providers - Compliance With Personnel Security Requirements Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Third-Party Providers - Notification of Terminations and Transfers Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Throttling of Look-Up Secret Token Authentication Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Throttling of Memorized Secret Token Authentication Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Throttling of Out-of-Band Token Authentication Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Throttling of Pre-Registered Knowledge Token Authentication Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Timely Implementation of Security-Relevant Updates Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Timestamping of Audit Records Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Token and Credential Provenance Record Retention Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Token and Credential Provenance Record Retention for Seven Years and Six Months Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Token and Credential Provenance Record Retention for Ten Years and Six Months Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Token and Credential Provenance Record Retention for US Executive Branch Agencies Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Tracking of Quantity Licensed Software and Documentation Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Trusted Path Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Trusted Relationship Between CSPs and RAs Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Trustmark Recipient Identifiers 1.0 URI Active / In Use
trustmark Unique Identification of Subscribers Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Updates to Contingency Planning Training Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Updates to Incident Response Training Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Updates to Plan of Action and Milestones Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Use of Approved Cryptography for Protection of Subscriber Authentication Session Data Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Use of Approved Cryptography for Subscriber Authentication Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Use of Authentication-Derived Keys to Authenticate Data Transfers Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Use of External Information Systems - Access From External Systems Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Use of External Information Systems - External Storage Processing Transmission of Information Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Use of FIPS Modules for Multi-Factor Hardware Cryptographic Tokens Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Use of FIPS Modules for Multi-Factor One-Time-Password Hardware Tokens Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Use of FIPS Modules for Multi-Factor Software Cryptographic Tokens Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Use of FIPS Modules for Shared Secret File Encryption Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Use of FIPS Modules for Single-Factor Cryptographic Device Tokens Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Use of FIPS Modules for Single-Factor One-Time-Password Device Token Authentication Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Use of Multi-Factor Subscriber Authentication Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Valid X.509 Certificates Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Validation of Tokens and Credentials Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Verification of Applicant Post-Secondary Education or Training Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Verification of Applicant State or Federal Licensure Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Verification of Original Credentials for Derived Credentials Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Verification of Physical Access Authorizations Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Verification of Security Controls Following System Maintenance Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Vulnerability Remediation Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Vulnerability Scanning of Information Systems Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Water Damage Protection Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Weak Mitigation of Subscriber Authentication MITM Threats Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Wireless Access Authorization Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Wireless Access Configuration/Connection Requirements Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Wireless Access Implementation Guidance Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark Wireless Access Usage Restrictions Trustmark Reference 1.0 Trustmark Reference Active / In Use
trustmark X.509 Certificate Attributes Trustmark Reference 1.0 Trustmark Reference Active / In Use