An error occurred:
Close sidebar
Xylok
Home Menu
[email protected]
© 2024
Xylok, LLC
Version: v2024.04.1-c0c9-98fb
Xylok
Home Menu
[email protected]
© 2024
Xylok, LLC
Version: v2024.04.1-c0c9-98fb
Open sidebar
Navigate
Top
Search
Controls (
266
)
Pages (
7/9
)
AC
AP
AR
AT
AU
CA
CM
CP
DI
DM
IA
IP
IR
MA
MP
PE
PL
PM
PS
RA
SA
SC
SE
SI
TR
UL
Controls
Group
Name
Title
CIA
RA
RA-5
Vulnerability Scanning
LLL
RA
RA-6
Technical Surveillance Countermeasures Survey
---
SA
SA-1
System And Services Acquisition Policy And Procedures
LLL
SA
SA-2
Allocation Of Resources
LLL
SA
SA-3
System Development Life Cycle
LLL
SA
SA-4
Acquisition Process
LLL
SA
SA-5
Information System Documentation
LLL
SA
SA-8
Security Engineering Principles
LLL
SA
SA-9
External Information System Services
LLL
SA
SA-10
Developer Configuration Management
-L-
SA
SA-11
Developer Security Testing And Evaluation
MMM
SA
SA-12
Supply Chain Protection
LLL
SA
SA-13
Trustworthiness
---
SA
SA-14
Criticality Analysis
HHH
SA
SA-15
Development Process, Standards, And Tools
LLL
SA
SA-16
Developer-Provided Training
HHH
SA
SA-17
Developer Security Architecture And Design
HHH
SA
SA-18
Tamper Resistance And Detection
---
SA
SA-19
Component Authenticity
-L-
SA
SA-20
Customized Development Of Critical Components
---
SA
SA-21
Developer Screening
---
SA
SA-22
Unsupported System Components
HHH
SC
SC-1
System And Communications Protection Policy And Procedures
LLL
SC
SC-2
Application Partitioning
MM-
SC
SC-3
Security Function Isolation
HH-
SC
SC-4
Information In Shared Resources
M--
SC
SC-5
Denial Of Service Protection
--L
SC
SC-6
Resource Availability
---
SC
SC-7
Boundary Protection
LL-
SC
SC-8
Transmission Confidentiality And Integrity
LL-
Prev
1...
3
4
5
6
7
8
9
Next