An error occurred:
Close sidebar
Xylok
Home Menu
info@xylok.io
© 2024
Xylok, LLC
Version: v2024.12.1-0560-0560
Xylok
Home Menu
info@xylok.io
© 2024
Xylok, LLC
Version: v2024.12.1-0560-0560
Open sidebar
Navigate
Top
Search
Controls (
282
)
Pages (
6/10
)
AC
AP
AR
AT
AU
CA
CM
CP
DI
DM
IA
IP
IR
MA
MP
PE
PL
PM
PS
RA
SA
SC
SE
SI
TR
UL
Controls
Group
Name
Title
CIA
PE
PE-18
Location of Information System Components
--H
PE
PE-19
Information Leakage
---
PE
PE-20
Asset Monitoring and Tracking
---
PL
PL-1
Security Planning Policy and Procedures
HHH
PL
PL-2
System Security Plan
HHH
PL
PL-3
System Security Plan Update
---
PL
PL-4
Rules of Behavior
HHH
PL
PL-5
Privacy Impact Assessment
---
PL
PL-6
Security-related Activity Planning
---
PL
PL-7
Security Concept of Operations
HHH
PL
PL-8
Information Security Architecture
HHH
PL
PL-9
Central Management
-H-
PM
PM-1
Information Security Program Plan
---
PM
PM-2
Senior Information Security Officer
---
PM
PM-3
Information Security Resources
---
PM
PM-4
Plan of Action and Milestones Process
---
PM
PM-5
Information System Inventory
---
PM
PM-6
Information Security Measures of Performance
---
PM
PM-7
Enterprise Architecture
---
PM
PM-8
Critical Infrastructure Plan
---
PM
PM-9
Risk Management Strategy
---
PM
PM-10
Security Authorization Process
---
PM
PM-11
Mission/business Process Definition
---
PM
PM-12
Insider Threat Program
---
PM
PM-13
Information Security Workforce
---
PM
PM-14
Testing, Training, and Monitoring
---
PM
PM-15
Contacts with Security Groups and Associations
---
PM
PM-16
Threat Awareness Program
---
PS
PS-1
Personnel Security Policy and Procedures
HHH
PS
PS-2
Position Risk Designation
HHH
Prev
1...
2
3
4
5
6
7
8
9
10
Next