An error occurred:
Close sidebar
Xylok
Home Menu
info@xylok.io
© 2024
Xylok, LLC
Version: v2024.12.1-0560-0560
Xylok
Home Menu
info@xylok.io
© 2024
Xylok, LLC
Version: v2024.12.1-0560-0560
Open sidebar
Navigate
Top
Search
Controls (
282
)
Pages (
4/10
)
AC
AP
AR
AT
AU
CA
CM
CP
DI
DM
IA
IP
IR
MA
MP
PE
PL
PM
PS
RA
SA
SC
SE
SI
TR
UL
Controls
Group
Name
Title
CIA
DI
DI-2
DATA INTEGRITY AND DATA INTEGRITY BOARD
---
DM
DM-1
MINIMIZATION OF PERSONALLY IDENTIFIABLE INFORMATION
---
DM
DM-2
DATA RETENTION AND DISPOSAL
---
DM
DM-3
MINIMIZATION OF PII USED IN TESTING, TRAINING, AND RESEARCH
---
IA
IA-1
Identification and Authentication Policy and Procedures
HH-
IA
IA-2
Identification and Authentication (organizational Users)
HH-
IA
IA-3
Device Identification and Authentication
HH-
IA
IA-4
Identifier Management
HH-
IA
IA-5
Authenticator Management
HH-
IA
IA-6
Authenticator Feedback
H--
IA
IA-7
Cryptographic Module Authentication
HH-
IA
IA-8
Identification and Authentication (non-organizational Users)
HH-
IA
IA-9
Service Identification and Authentication
HH-
IA
IA-10
Adaptive Identification and Authentication
HH-
IA
IA-11
Re-authentication
HH-
IP
IP-1
CONSENT
---
IP
IP-2
INDIVIDUAL ACCESS
---
IP
IP-3
REDRESS
---
IP
IP-4
COMPLAIN MANAGEMENT
---
IR
IR-1
Incident Response Policy and Procedures
HHH
IR
IR-2
Incident Response Training
HHH
IR
IR-3
Incident Response Testing
HHH
IR
IR-4
Incident Handling
HHH
IR
IR-5
Incident Monitoring
HHH
IR
IR-6
Incident Reporting
HHH
IR
IR-7
Incident Response Assistance
HHH
IR
IR-8
Incident Response Plan
HHH
IR
IR-9
Information Spillage Response
H--
IR
IR-10
Integrated Information Security Analysis Team
---
MA
MA-1
System Maintenance Policy and Procedures
HHH
Prev
1
2
3
4
5
6
7
8
...10
Next