An error occurred:
Close sidebar
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: releases-v2025.10.2 - rmfrev5
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: releases-v2025.10.2 - rmfrev5
Open sidebar
Navigate
Top
Search
Controls (
47
)
Pages (
1/2
)
All Controls
Controls
Group
Name
Title
CIA
SC
SC-1
Policy and Procedures
LLL
SC
SC-2
Separation of System and User Functionality
MM-
SC
SC-3
Security Function Isolation
HH-
SC
SC-4
Information in Shared System Resources
L--
SC
SC-5
Denial-of-service Protection
--L
SC
SC-6
Resource Availability
---
SC
SC-7
Boundary Protection
LL-
SC
SC-8
Transmission Confidentiality and Integrity
LL-
SC
SC-10
Network Disconnect
LL-
SC
SC-11
Trusted Path
---
SC
SC-12
Cryptographic Key Establishment and Management
LL-
SC
SC-13
Cryptographic Protection
LL-
SC
SC-15
Collaborative Computing Devices and Applications
L--
SC
SC-16
Transmission of Security and Privacy Attributes
MM-
SC
SC-17
Public Key Infrastructure Certificates
LL-
SC
SC-18
Mobile Code
-L-
SC
SC-20
Secure Name/Address Resolution Service (Authoritative Source)
-L-
SC
SC-21
Secure Name/Address Resolution Service (Recursive or Caching Resolver)
-L-
SC
SC-22
Architecture and Provisioning for Name/Address Resolution Service
LLL
SC
SC-23
Session Authenticity
-L-
SC
SC-24
Fail in Known State
HH-
SC
SC-25
Thin Nodes
---
SC
SC-26
Decoys
---
SC
SC-27
Platform-independent Applications
---
SC
SC-28
Protection of Information at Rest
LL-
SC
SC-29
Heterogeneity
---
SC
SC-30
Concealment and Misdirection
---
SC
SC-31
Covert Channel Analysis
---
SC
SC-32
System Partitioning
---
SC
SC-34
Non-modifiable Executable Programs
---
1
2
Next