An error occurred:
Close sidebar
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: v2025.01.2-fe6a-066d
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: v2025.01.2-fe6a-066d
Open sidebar
Navigate
Top
Search
Controls (
44
)
Pages (
1/2
)
All Controls
Controls
Group
Name
Title
CIA
SC
SC-1
System and Communications Protection Policy and Procedures
LLL
SC
SC-2
Application Partitioning
MM-
SC
SC-3
Security Function Isolation
HH-
SC
SC-4
Information in Shared Resources
M--
SC
SC-5
Denial of Service Protection
--L
SC
SC-6
Resource Availability
---
SC
SC-7
Boundary Protection
LL-
SC
SC-8
Transmission Confidentiality and Integrity
LL-
SC
SC-9
Transmission Confidentiality
---
SC
SC-10
Network Disconnect
MM-
SC
SC-11
Trusted Path
---
SC
SC-12
Cryptographic Key Establishment and Management
LL-
SC
SC-13
Cryptographic Protection
LL-
SC
SC-14
Public Access Protections
---
SC
SC-15
Collaborative Computing Devices
L--
SC
SC-16
Transmission of Security Attributes
---
SC
SC-17
Public Key Infrastructure Certificates
LL-
SC
SC-18
Mobile Code
-L-
SC
SC-19
Voice Over Internet Protocol
LLL
SC
SC-20
Secure Name / Address Resolution Service (authoritative Source)
-L-
SC
SC-21
Secure Name / Address Resolution Service (recursive or Caching Resolver)
-L-
SC
SC-22
Architecture and Provisioning for Name / Address Resolution Service
LLL
SC
SC-23
Session Authenticity
-L-
SC
SC-24
Fail in Known State
HH-
SC
SC-25
Thin Nodes
---
SC
SC-26
Honeypots
---
SC
SC-27
Platform-independent Applications
---
SC
SC-28
Protection of Information at Rest
LL-
SC
SC-29
Heterogeneity
---
SC
SC-30
Concealment and Misdirection
---
1
2
Next