An error occurred:
Close sidebar
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: releases-v2025.12.1 - rmfrev5
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: releases-v2025.12.1 - rmfrev5
Open sidebar
Navigate
Top
Search
Controls (
299
)
Pages (
3/10
)
AC
AT
AU
CA
CM
CP
IA
IR
MA
MP
PE
PL
PM
PS
PT
RA
SA
SC
SI
SR
Controls
Group
Name
Title
CIA
CM
CM-10
Software Usage Restrictions
-L-
CM
CM-11
User-installed Software
LL-
CM
CM-12
Information Location
MMM
CM
CM-13
Data Action Mapping
---
CM
CM-14
Signed Components
-M-
CP
CP-1
Policy and Procedures
LLL
CP
CP-2
Contingency Plan
--L
CP
CP-3
Contingency Training
--L
CP
CP-4
Contingency Plan Testing
--L
CP
CP-6
Alternate Storage Site
--M
CP
CP-7
Alternate Processing Site
--M
CP
CP-8
Telecommunications Services
--M
CP
CP-9
System Backup
LLL
CP
CP-10
System Recovery and Reconstitution
--L
CP
CP-11
Alternate Communications Protocols
---
CP
CP-12
Safe Mode
---
CP
CP-13
Alternative Security Mechanisms
---
IA
IA-1
Policy and Procedures
LL-
IA
IA-2
Identification and Authentication (Organizational Users)
LL-
IA
IA-3
Device Identification and Authentication
LL-
IA
IA-4
Identifier Management
LL-
IA
IA-5
Authenticator Management
LL-
IA
IA-6
Authentication Feedback
L--
IA
IA-7
Cryptographic Module Authentication
LL-
IA
IA-8
Identification and Authentication (Non-organizational Users)
LL-
IA
IA-9
Service Identification and Authentication
LL-
IA
IA-10
Adaptive Authentication
HH-
IA
IA-11
Re-authentication
LL-
IA
IA-12
Identity Proofing
LL-
IA
IA-13
Identity Providers and Authorization Servers
---
Prev
1
2
3
4
5
6
7
...10
Next