An error occurred:
Close sidebar
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: v2025.01.2-fe6a-066d
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: v2025.01.2-fe6a-066d
Open sidebar
Navigate
Top
Search
Controls (
22
)
All Controls
Controls
Group
Name
Title
CIA
SA
SA-1
System and Services Acquisition Policy and Procedures
LLL
SA
SA-2
Allocation of Resources
LLL
SA
SA-3
System Development Life Cycle
LLL
SA
SA-4
Acquisition Process
LLL
SA
SA-5
Information System Documentation
LLL
SA
SA-6
Software Usage Restrictions
---
SA
SA-7
User-installed Software
---
SA
SA-8
Security Engineering Principles
LLL
SA
SA-9
External Information System Services
LLL
SA
SA-10
Developer Configuration Management
-L-
SA
SA-11
Developer Security Testing and Evaluation
MMM
SA
SA-12
Supply Chain Protection
LLL
SA
SA-13
Trustworthiness
---
SA
SA-14
Criticality Analysis
HHH
SA
SA-15
Development Process, Standards, and Tools
LLL
SA
SA-16
Developer-provided Training
HHH
SA
SA-17
Developer Security Architecture and Design
HHH
SA
SA-18
Tamper Resistance and Detection
---
SA
SA-19
Component Authenticity
-L-
SA
SA-20
Customized Development of Critical Components
---
SA
SA-21
Developer Screening
---
SA
SA-22
Unsupported System Components
HHH
1