An error occurred:
Close sidebar
Xylok
Home Menu
info@xylok.io
© 2024
Xylok, LLC
Version: v2024.10.3-0fa4-8a67
Xylok
Home Menu
info@xylok.io
© 2024
Xylok, LLC
Version: v2024.10.3-0fa4-8a67
Open sidebar
Navigate
Top
Search
Controls (
41
)
Pages (
1/2
)
All Controls
Controls
Group
Name
Title
CIA
SC
SC-1
System And Communications Protection Policy And Procedures
LLL
SC
SC-2
Application Partitioning
MM-
SC
SC-3
Security Function Isolation
HH-
SC
SC-4
Information In Shared Resources
M--
SC
SC-5
Denial Of Service Protection
--L
SC
SC-6
Resource Availability
---
SC
SC-7
Boundary Protection
LL-
SC
SC-8
Transmission Confidentiality And Integrity
LL-
SC
SC-10
Network Disconnect
MM-
SC
SC-11
Trusted Path
---
SC
SC-12
Cryptographic Key Establishment And Management
LL-
SC
SC-13
Cryptographic Protection
LL-
SC
SC-15
Collaborative Computing Devices
L--
SC
SC-16
Transmission Of Security Attributes
---
SC
SC-17
Public Key Infrastructure Certificates
LL-
SC
SC-18
Mobile Code
-L-
SC
SC-19
Voice Over Internet Protocol
LLL
SC
SC-20
Secure Name / Address Resolution Service (Authoritative Source)
-L-
SC
SC-21
Secure Name / Address Resolution Service (Recursive Or Caching Resolver)
-L-
SC
SC-22
Architecture And Provisioning For Name / Address Resolution Service
LLL
SC
SC-23
Session Authenticity
-L-
SC
SC-24
Fail In Known State
HH-
SC
SC-25
Thin Nodes
---
SC
SC-26
Honeypots
---
SC
SC-27
Platform-Independent Applications
---
SC
SC-28
Protection Of Information At Rest
LL-
SC
SC-29
Heterogeneity
---
SC
SC-30
Concealment And Misdirection
---
SC
SC-31
Covert Channel Analysis
---
SC
SC-32
Information System Partitioning
---
1
2
Next