An error occurred:
Close sidebar
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: releases-v2025.04.2-01be-daa4
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: releases-v2025.04.2-01be-daa4
Open sidebar
Navigate
Top
Search
Controls (
282
)
Pages (
8/10
)
AC
AP
AR
AT
AU
CA
CM
CP
DI
DM
IA
IP
IR
MA
MP
PE
PL
PM
PS
RA
SA
SC
SE
SI
TR
UL
Controls
Group
Name
Title
CIA
SA
SA-19
Component Authenticity
-L-
SA
SA-20
Customized Development of Critical Components
---
SA
SA-21
Developer Screening
---
SA
SA-22
Unsupported System Components
HHH
SC
SC-1
System and Communications Protection Policy and Procedures
LLL
SC
SC-2
Application Partitioning
MM-
SC
SC-3
Security Function Isolation
HH-
SC
SC-4
Information in Shared Resources
M--
SC
SC-5
Denial of Service Protection
--L
SC
SC-6
Resource Availability
---
SC
SC-7
Boundary Protection
LL-
SC
SC-8
Transmission Confidentiality and Integrity
LL-
SC
SC-9
Transmission Confidentiality
---
SC
SC-10
Network Disconnect
MM-
SC
SC-11
Trusted Path
---
SC
SC-12
Cryptographic Key Establishment and Management
LL-
SC
SC-13
Cryptographic Protection
LL-
SC
SC-14
Public Access Protections
---
SC
SC-15
Collaborative Computing Devices
L--
SC
SC-16
Transmission of Security Attributes
---
SC
SC-17
Public Key Infrastructure Certificates
LL-
SC
SC-18
Mobile Code
-L-
SC
SC-19
Voice Over Internet Protocol
LLL
SC
SC-20
Secure Name / Address Resolution Service (authoritative Source)
-L-
SC
SC-21
Secure Name / Address Resolution Service (recursive or Caching Resolver)
-L-
SC
SC-22
Architecture and Provisioning for Name / Address Resolution Service
LLL
SC
SC-23
Session Authenticity
-L-
SC
SC-24
Fail in Known State
HH-
SC
SC-25
Thin Nodes
---
SC
SC-26
Honeypots
---
Prev
1...
4
5
6
7
8
9
10
Next