An error occurred:
Close sidebar
Xylok
Home Menu
info@xylok.io
© 2024
Xylok, LLC
Version: v2024.12.1-0560-0560
Xylok
Home Menu
info@xylok.io
© 2024
Xylok, LLC
Version: v2024.12.1-0560-0560
Open sidebar
Navigate
Top
Search
Controls (
282
)
Pages (
7/10
)
AC
AP
AR
AT
AU
CA
CM
CP
DI
DM
IA
IP
IR
MA
MP
PE
PL
PM
PS
RA
SA
SC
SE
SI
TR
UL
Controls
Group
Name
Title
CIA
PS
PS-3
Personnel Screening
HH-
PS
PS-4
Personnel Termination
HHH
PS
PS-5
Personnel Transfer
HHH
PS
PS-6
Access Agreements
HH-
PS
PS-7
Third-party Personnel Security
HH-
PS
PS-8
Personnel Sanctions
HHH
RA
RA-1
Risk Assessment Policy and Procedures
HHH
RA
RA-2
Security Categorization
HHH
RA
RA-3
Risk Assessment
HHH
RA
RA-4
Risk Assessment Update
---
RA
RA-5
Vulnerability Scanning
HHH
RA
RA-6
Technical Surveillance Countermeasures Survey
---
SA
SA-1
System and Services Acquisition Policy and Procedures
HHH
SA
SA-2
Allocation of Resources
HHH
SA
SA-3
System Development Life Cycle
HHH
SA
SA-4
Acquisition Process
HHH
SA
SA-5
Information System Documentation
HHH
SA
SA-6
Software Usage Restrictions
---
SA
SA-7
User-installed Software
---
SA
SA-8
Security Engineering Principles
HHH
SA
SA-9
External Information System Services
HHH
SA
SA-10
Developer Configuration Management
-H-
SA
SA-11
Developer Security Testing and Evaluation
HHH
SA
SA-12
Supply Chain Protection
---
SA
SA-13
Trustworthiness
---
SA
SA-14
Criticality Analysis
---
SA
SA-15
Development Process, Standards, and Tools
HHH
SA
SA-16
Developer-provided Training
HHH
SA
SA-17
Developer Security Architecture and Design
HHH
SA
SA-18
Tamper Resistance and Detection
---
Prev
1...
3
4
5
6
7
8
9
10
Next