An error occurred:
Close sidebar
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: releases-v2025.10.2 - rmfrev5
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: releases-v2025.10.2 - rmfrev5
Open sidebar
Navigate
Top
Search
Controls (
32
)
Pages (
1/2
)
All Controls
Controls
Group
Name
Title
CIA
PM
PM-1
Information Security Program Plan
LLL
PM
PM-2
Information Security Program Leadership Role
LLL
PM
PM-3
Information Security and Privacy Resources
LLL
PM
PM-4
Plan of Action and Milestones Process
LLL
PM
PM-5
System Inventory
LLL
PM
PM-6
Measures of Performance
LLL
PM
PM-7
Enterprise Architecture
LLL
PM
PM-8
Critical Infrastructure Plan
LLL
PM
PM-9
Risk Management Strategy
LLL
PM
PM-10
Authorization Process
LLL
PM
PM-11
Mission and Business Process Definition
LLL
PM
PM-12
Insider Threat Program
LLL
PM
PM-13
Security and Privacy Workforce
LLL
PM
PM-14
Testing, Training, and Monitoring
LLL
PM
PM-15
Security and Privacy Groups and Associations
LLL
PM
PM-16
Threat Awareness Program
LLL
PM
PM-17
Protecting Controlled Unclassified Information on External Systems
LLL
PM
PM-18
Privacy Program Plan
LLL
PM
PM-19
Privacy Program Leadership Role
LLL
PM
PM-20
Dissemination of Privacy Program Information
LLL
PM
PM-21
Accounting of Disclosures
LLL
PM
PM-22
Personally Identifiable Information Quality Management
LLL
PM
PM-23
Data Governance Body
LLL
PM
PM-24
Data Integrity Board
LLL
PM
PM-25
Minimization of Personally Identifiable Information Used in Testing, Training, and Research
LLL
PM
PM-26
Complaint Management
LLL
PM
PM-27
Privacy Reporting
LLL
PM
PM-28
Risk Framing
LLL
PM
PM-29
Risk Management Program Leadership Roles
LLL
PM
PM-30
Supply Chain Risk Management Strategy
LLL
1
2
Next