An error occurred:
Close sidebar
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: releases-v2025.04.2-01be-daa4
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: releases-v2025.04.2-01be-daa4
Open sidebar
Navigate
Top
Search
Controls (
282
)
Pages (
6/10
)
AC
AP
AR
AT
AU
CA
CM
CP
DI
DM
IA
IP
IR
MA
MP
PE
PL
PM
PS
RA
SA
SC
SE
SI
TR
UL
Controls
Group
Name
Title
CIA
PE
PE-18
Location of Information System Components
--H
PE
PE-19
Information Leakage
---
PE
PE-20
Asset Monitoring and Tracking
---
PL
PL-1
Security Planning Policy and Procedures
LLL
PL
PL-2
System Security Plan
LLL
PL
PL-3
System Security Plan Update
---
PL
PL-4
Rules of Behavior
LLL
PL
PL-5
Privacy Impact Assessment
---
PL
PL-6
Security-related Activity Planning
---
PL
PL-7
Security Concept of Operations
---
PL
PL-8
Information Security Architecture
LLL
PL
PL-9
Central Management
---
PM
PM-1
Information Security Program Plan
LLL
PM
PM-2
Senior Information Security Officer
LLL
PM
PM-3
Information Security Resources
LLL
PM
PM-4
Plan of Action and Milestones Process
LLL
PM
PM-5
Information System Inventory
LLL
PM
PM-6
Information Security Measures of Performance
LLL
PM
PM-7
Enterprise Architecture
LLL
PM
PM-8
Critical Infrastructure Plan
LLL
PM
PM-9
Risk Management Strategy
LLL
PM
PM-10
Security Authorization Process
LLL
PM
PM-11
Mission/business Process Definition
LLL
PM
PM-12
Insider Threat Program
LLL
PM
PM-13
Information Security Workforce
LLL
PM
PM-14
Testing, Training, and Monitoring
LLL
PM
PM-15
Contacts with Security Groups and Associations
LLL
PM
PM-16
Threat Awareness Program
LLL
PS
PS-1
Personnel Security Policy and Procedures
LLL
PS
PS-2
Position Risk Designation
LLL
Prev
1...
2
3
4
5
6
7
8
9
10
Next