An error occurred:
Close sidebar
Xylok
Home Menu
info@xylok.io
© 2024
Xylok, LLC
Version: v2024.12.1-0560-0560
Xylok
Home Menu
info@xylok.io
© 2024
Xylok, LLC
Version: v2024.12.1-0560-0560
Open sidebar
Navigate
Top
Search
Controls (
282
)
Pages (
3/10
)
AC
AP
AR
AT
AU
CA
CM
CP
DI
DM
IA
IP
IR
MA
MP
PE
PL
PM
PS
RA
SA
SC
SE
SI
TR
UL
Controls
Group
Name
Title
CIA
CA
CA-5
Plan of Action and Milestones
HHH
CA
CA-6
Security Authorization
HHH
CA
CA-7
Continuous Monitoring
HHH
CA
CA-8
Penetration Testing
HHH
CA
CA-9
Internal System Connections
HH-
CM
CM-1
Configuration Management Policy and Procedures
HH-
CM
CM-2
Baseline Configuration
-H-
CM
CM-3
Configuration Change Control
-H-
CM
CM-4
Security Impact Analysis
-H-
CM
CM-5
Access Restrictions for Change
-H-
CM
CM-6
Configuration Settings
-H-
CM
CM-7
Least Functionality
HH-
CM
CM-8
Information System Component Inventory
-H-
CM
CM-9
Configuration Management Plan
-H-
CM
CM-10
Software Usage Restrictions
-H-
CM
CM-11
User-installed Software
HH-
CP
CP-1
Contingency Planning Policy and Procedures
HHH
CP
CP-2
Contingency Plan
--H
CP
CP-3
Contingency Training
--H
CP
CP-4
Contingency Plan Testing
--H
CP
CP-5
Contingency Plan Update
---
CP
CP-6
Alternate Storage Site
--H
CP
CP-7
Alternate Processing Site
--H
CP
CP-8
Telecommunications Services
--H
CP
CP-9
Information System Backup
HHH
CP
CP-10
Information System Recovery and Reconstitution
--H
CP
CP-11
Alternate Communications Protocols
---
CP
CP-12
Safe Mode
---
CP
CP-13
Alternative Security Mechanisms
---
DI
DI-1
DATA QUALITY
---
Prev
1
2
3
4
5
6
7
...10
Next