An error occurred:
Close sidebar
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: releases-v2025.10.2 - rmfrev5
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: releases-v2025.10.2 - rmfrev5
Open sidebar
Navigate
Top
Search
Controls (
299
)
Pages (
9/10
)
AC
AT
AU
CA
CM
CP
IA
IR
MA
MP
PE
PL
PM
PS
PT
RA
SA
SC
SI
SR
Controls
Group
Name
Title
CIA
SC
SC-26
Decoys
---
SC
SC-27
Platform-independent Applications
---
SC
SC-28
Protection of Information at Rest
LL-
SC
SC-29
Heterogeneity
---
SC
SC-30
Concealment and Misdirection
---
SC
SC-31
Covert Channel Analysis
---
SC
SC-32
System Partitioning
---
SC
SC-34
Non-modifiable Executable Programs
---
SC
SC-35
External Malicious Code Identification
---
SC
SC-36
Distributed Processing and Storage
---
SC
SC-37
Out-of-band Channels
---
SC
SC-38
Operations Security
LLL
SC
SC-39
Process Isolation
LL-
SC
SC-40
Wireless Link Protection
---
SC
SC-41
Port and I/O Device Access
--L
SC
SC-42
Sensor Capability and Data
---
SC
SC-43
Usage Restrictions
---
SC
SC-44
Detonation Chambers
---
SC
SC-45
System Time Synchronization
-L-
SC
SC-46
Cross Domain Policy Enforcement
---
SC
SC-47
Alternate Communications Paths
--L
SC
SC-48
Sensor Relocation
---
SC
SC-49
Hardware-enforced Separation and Policy Enforcement
---
SC
SC-50
Software-enforced Separation and Policy Enforcement
---
SC
SC-51
Hardware-based Protection
---
SI
SI-1
Policy and Procedures
LLL
SI
SI-2
Flaw Remediation
-L-
SI
SI-3
Malicious Code Protection
-L-
SI
SI-4
System Monitoring
LLL
SI
SI-5
Security Alerts, Advisories, and Directives
-L-
Prev
1...
5
6
7
8
9
10
Next