An error occurred:
Close sidebar
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: releases-v2025.04.2-01be-daa4
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: releases-v2025.04.2-01be-daa4
Open sidebar
Navigate
Top
Search
Controls (
282
)
Pages (
7/10
)
AC
AP
AR
AT
AU
CA
CM
CP
DI
DM
IA
IP
IR
MA
MP
PE
PL
PM
PS
RA
SA
SC
SE
SI
TR
UL
Controls
Group
Name
Title
CIA
PS
PS-3
Personnel Screening
LL-
PS
PS-4
Personnel Termination
LLL
PS
PS-5
Personnel Transfer
LLL
PS
PS-6
Access Agreements
LL-
PS
PS-7
Third-party Personnel Security
LL-
PS
PS-8
Personnel Sanctions
LLL
RA
RA-1
Risk Assessment Policy and Procedures
LLL
RA
RA-2
Security Categorization
LLL
RA
RA-3
Risk Assessment
LLL
RA
RA-4
Risk Assessment Update
---
RA
RA-5
Vulnerability Scanning
LLL
RA
RA-6
Technical Surveillance Countermeasures Survey
---
SA
SA-1
System and Services Acquisition Policy and Procedures
LLL
SA
SA-2
Allocation of Resources
LLL
SA
SA-3
System Development Life Cycle
LLL
SA
SA-4
Acquisition Process
LLL
SA
SA-5
Information System Documentation
LLL
SA
SA-6
Software Usage Restrictions
---
SA
SA-7
User-installed Software
---
SA
SA-8
Security Engineering Principles
LLL
SA
SA-9
External Information System Services
LLL
SA
SA-10
Developer Configuration Management
-L-
SA
SA-11
Developer Security Testing and Evaluation
MMM
SA
SA-12
Supply Chain Protection
LLL
SA
SA-13
Trustworthiness
---
SA
SA-14
Criticality Analysis
HHH
SA
SA-15
Development Process, Standards, and Tools
LLL
SA
SA-16
Developer-provided Training
HHH
SA
SA-17
Developer Security Architecture and Design
HHH
SA
SA-18
Tamper Resistance and Detection
---
Prev
1...
3
4
5
6
7
8
9
10
Next