An error occurred:
Close sidebar
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: releases-v2025.04.2-01be-daa4
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: releases-v2025.04.2-01be-daa4
Open sidebar
Navigate
Top
Search
Controls (
282
)
Pages (
4/10
)
AC
AP
AR
AT
AU
CA
CM
CP
DI
DM
IA
IP
IR
MA
MP
PE
PL
PM
PS
RA
SA
SC
SE
SI
TR
UL
Controls
Group
Name
Title
CIA
DI
DI-2
DATA INTEGRITY AND DATA INTEGRITY BOARD
---
DM
DM-1
MINIMIZATION OF PERSONALLY IDENTIFIABLE INFORMATION
---
DM
DM-2
DATA RETENTION AND DISPOSAL
---
DM
DM-3
MINIMIZATION OF PII USED IN TESTING, TRAINING, AND RESEARCH
---
IA
IA-1
Identification and Authentication Policy and Procedures
LL-
IA
IA-2
Identification and Authentication (organizational Users)
LL-
IA
IA-3
Device Identification and Authentication
LL-
IA
IA-4
Identifier Management
LL-
IA
IA-5
Authenticator Management
LL-
IA
IA-6
Authenticator Feedback
L--
IA
IA-7
Cryptographic Module Authentication
LL-
IA
IA-8
Identification and Authentication (non-organizational Users)
LL-
IA
IA-9
Service Identification and Authentication
---
IA
IA-10
Adaptive Identification and Authentication
HH-
IA
IA-11
Re-authentication
HH-
IP
IP-1
CONSENT
---
IP
IP-2
INDIVIDUAL ACCESS
---
IP
IP-3
REDRESS
---
IP
IP-4
COMPLAIN MANAGEMENT
---
IR
IR-1
Incident Response Policy and Procedures
LLL
IR
IR-2
Incident Response Training
LLL
IR
IR-3
Incident Response Testing
LLL
IR
IR-4
Incident Handling
LLL
IR
IR-5
Incident Monitoring
LLL
IR
IR-6
Incident Reporting
LLL
IR
IR-7
Incident Response Assistance
LLL
IR
IR-8
Incident Response Plan
LLL
IR
IR-9
Information Spillage Response
L--
IR
IR-10
Integrated Information Security Analysis Team
MMM
MA
MA-1
System Maintenance Policy and Procedures
LLL
Prev
1
2
3
4
5
6
7
8
...10
Next