An error occurred:
Close sidebar
Xylok
Home Menu
info@xylok.io
© 2024
Xylok, LLC
Version: v2024.12.1-0560-0560
Xylok
Home Menu
info@xylok.io
© 2024
Xylok, LLC
Version: v2024.12.1-0560-0560
Open sidebar
Navigate
Top
Search
Controls (
282
)
Pages (
9/10
)
AC
AP
AR
AT
AU
CA
CM
CP
DI
DM
IA
IP
IR
MA
MP
PE
PL
PM
PS
RA
SA
SC
SE
SI
TR
UL
Controls
Group
Name
Title
CIA
SC
SC-27
Platform-independent Applications
---
SC
SC-28
Protection of Information at Rest
HH-
SC
SC-29
Heterogeneity
---
SC
SC-30
Concealment and Misdirection
---
SC
SC-31
Covert Channel Analysis
---
SC
SC-32
Information System Partitioning
---
SC
SC-33
Transmission Preparation Integrity
---
SC
SC-34
Non-modifiable Executable Programs
---
SC
SC-35
Honeyclients
---
SC
SC-36
Distributed Processing and Storage
---
SC
SC-37
Out-of-band Channels
---
SC
SC-38
Operations Security
HHH
SC
SC-39
Process Isolation
HH-
SC
SC-40
Wireless Link Protection
---
SC
SC-41
Port and I/O Device Access
--H
SC
SC-42
Sensor Capability and Data
---
SC
SC-43
Usage Restrictions
---
SC
SC-44
Detonation Chambers
---
SE
SE-1
INVENTORY OF PERSONALLY IDENTIFIABLE INFORMATION
---
SE
SE-2
PRIVACY INCIDENT RESPONSE
---
SI
SI-1
System and Information Integrity Policy and Procedures
HHH
SI
SI-2
Flaw Remediation
-H-
SI
SI-3
Malicious Code Protection
-H-
SI
SI-4
Information System Monitoring
HHH
SI
SI-5
Security Alerts, Advisories, and Directives
-H-
SI
SI-6
Security Function Verification
-H-
SI
SI-7
Software, Firmware, and Information Integrity
-H-
SI
SI-8
Spam Protection
-HH
SI
SI-9
Information Input Restrictions
---
SI
SI-10
Information Input Validation
-H-
Prev
1...
5
6
7
8
9
10
Next