An error occurred:
Close sidebar
Xylok
Home Menu
[email protected]
© 2023
Xylok, LLC
Version: v2023.05.1-9ce1b695-f3c27ef0
Xylok
Home Menu
[email protected]
© 2023
Xylok, LLC
Version: v2023.05.1-9ce1b695-f3c27ef0
Open sidebar
Navigate
Top
Search
Controls (
266
)
Pages (
3/9
)
AC
AP
AR
AT
AU
CA
CM
CP
DI
DM
IA
IP
IR
MA
MP
PE
PL
PM
PS
RA
SA
SC
SE
SI
TR
UL
Controls
Group
Name
Title
CIA
CA
CA-9
Internal System Connections
LL-
CM
CM-1
Configuration Management Policy And Procedures
LL-
CM
CM-2
Baseline Configuration
-L-
CM
CM-3
Configuration Change Control
-L-
CM
CM-4
Security Impact Analysis
-L-
CM
CM-5
Access Restrictions For Change
-L-
CM
CM-6
Configuration Settings
-L-
CM
CM-7
Least Functionality
LL-
CM
CM-8
Information System Component Inventory
-L-
CM
CM-9
Configuration Management Plan
-L-
CM
CM-10
Software Usage Restrictions
-L-
CM
CM-11
User-Installed Software
LL-
CP
CP-1
Contingency Planning Policy And Procedures
LLL
CP
CP-2
Contingency Plan
--L
CP
CP-3
Contingency Training
--L
CP
CP-4
Contingency Plan Testing
--L
CP
CP-6
Alternate Storage Site
--M
CP
CP-7
Alternate Processing Site
MMM
CP
CP-8
Telecommunications Services
--M
CP
CP-9
Information System Backup
LLL
CP
CP-10
Information System Recovery And Reconstitution
--L
CP
CP-11
Alternate Communications Protocols
---
CP
CP-12
Safe Mode
---
CP
CP-13
Alternative Security Mechanisms
---
DI
DI-1
Data Quality
---
DI
DI-2
Data Integrity and Data Integrity Board
---
DM
DM-1
Minimization of Personally Identifiable Information
---
DM
DM-2
Data Retention and Disposal
---
DM
DM-3
Minimization of PII Used In Testing, Training, and Research
---
IA
IA-1
Identification And Authentication Policy And Procedures
LL-
Prev
1
2
3
4
5
6
7
...9
Next