An error occurred:
Close sidebar
Xylok
Home Menu
info@xylok.io
© 2024
Xylok, LLC
Version: v2024.12.1-0560-0560
Xylok
Home Menu
info@xylok.io
© 2024
Xylok, LLC
Version: v2024.12.1-0560-0560
Open sidebar
Navigate
Top
Search
Controls (
282
)
Pages (
8/10
)
AC
AP
AR
AT
AU
CA
CM
CP
DI
DM
IA
IP
IR
MA
MP
PE
PL
PM
PS
RA
SA
SC
SE
SI
TR
UL
Controls
Group
Name
Title
CIA
SA
SA-19
Component Authenticity
---
SA
SA-20
Customized Development of Critical Components
---
SA
SA-21
Developer Screening
HHH
SA
SA-22
Unsupported System Components
HHH
SC
SC-1
System and Communications Protection Policy and Procedures
HHH
SC
SC-2
Application Partitioning
HH-
SC
SC-3
Security Function Isolation
HH-
SC
SC-4
Information in Shared Resources
H--
SC
SC-5
Denial of Service Protection
--H
SC
SC-6
Resource Availability
---
SC
SC-7
Boundary Protection
HH-
SC
SC-8
Transmission Confidentiality and Integrity
HH-
SC
SC-9
Transmission Confidentiality
---
SC
SC-10
Network Disconnect
HH-
SC
SC-11
Trusted Path
---
SC
SC-12
Cryptographic Key Establishment and Management
HH-
SC
SC-13
Cryptographic Protection
HH-
SC
SC-14
Public Access Protections
---
SC
SC-15
Collaborative Computing Devices
H--
SC
SC-16
Transmission of Security Attributes
HH-
SC
SC-17
Public Key Infrastructure Certificates
HH-
SC
SC-18
Mobile Code
-H-
SC
SC-19
Voice Over Internet Protocol
---
SC
SC-20
Secure Name / Address Resolution Service (authoritative Source)
-H-
SC
SC-21
Secure Name / Address Resolution Service (recursive or Caching Resolver)
-H-
SC
SC-22
Architecture and Provisioning for Name / Address Resolution Service
HHH
SC
SC-23
Session Authenticity
-H-
SC
SC-24
Fail in Known State
HH-
SC
SC-25
Thin Nodes
---
SC
SC-26
Honeypots
---
Prev
1...
4
5
6
7
8
9
10
Next