An error occurred:
Close sidebar
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: releases-v2025.04.2-01be-daa4
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: releases-v2025.04.2-01be-daa4
Open sidebar
Navigate
Top
Search
Controls (
282
)
Pages (
3/10
)
AC
AP
AR
AT
AU
CA
CM
CP
DI
DM
IA
IP
IR
MA
MP
PE
PL
PM
PS
RA
SA
SC
SE
SI
TR
UL
Controls
Group
Name
Title
CIA
CA
CA-5
Plan of Action and Milestones
LLL
CA
CA-6
Security Authorization
LLL
CA
CA-7
Continuous Monitoring
LLL
CA
CA-8
Penetration Testing
-H-
CA
CA-9
Internal System Connections
LL-
CM
CM-1
Configuration Management Policy and Procedures
LL-
CM
CM-2
Baseline Configuration
-L-
CM
CM-3
Configuration Change Control
-L-
CM
CM-4
Security Impact Analysis
-L-
CM
CM-5
Access Restrictions for Change
-L-
CM
CM-6
Configuration Settings
-L-
CM
CM-7
Least Functionality
LL-
CM
CM-8
Information System Component Inventory
-L-
CM
CM-9
Configuration Management Plan
-L-
CM
CM-10
Software Usage Restrictions
-L-
CM
CM-11
User-installed Software
LL-
CP
CP-1
Contingency Planning Policy and Procedures
LLL
CP
CP-2
Contingency Plan
--L
CP
CP-3
Contingency Training
--L
CP
CP-4
Contingency Plan Testing
--L
CP
CP-5
Contingency Plan Update
---
CP
CP-6
Alternate Storage Site
--M
CP
CP-7
Alternate Processing Site
MMM
CP
CP-8
Telecommunications Services
--M
CP
CP-9
Information System Backup
LLL
CP
CP-10
Information System Recovery and Reconstitution
--L
CP
CP-11
Alternate Communications Protocols
---
CP
CP-12
Safe Mode
---
CP
CP-13
Alternative Security Mechanisms
---
DI
DI-1
DATA QUALITY
---
Prev
1
2
3
4
5
6
7
...10
Next