An error occurred:
Close sidebar
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: releases-v2025.07.1-5f5778 - rmfrev4
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: releases-v2025.07.1-5f5778 - rmfrev4
Open sidebar
Navigate
Top
Search
CCIs (
5137
)
Pages (
84/172
)
CCIs
Number
Definition
Status
Related
CCI-002521
Defines the out-of-band channels to be employed for the physical delivery or electronic transmission of organization-defined information, system components, or devices.
Draft
SC-37
CCI-002522
Defines the information, system components, or devices that are to be electronically transmitted or physically delivered via organization-defined out-of-band channels.
Draft
SC-37
CCI-002523
Defines the individuals or systems authorized to be recipients of organization-defined information, system components, or devices to be delivered by employing organization-defined out-of-band channels for electronic transmission or physical delivery.
Draft
SC-37
CCI-002524
Employ organization-defined out-of-band channels for the physical delivery or electronic transmission of organization-defined information, system components, or devices to organization-defined individuals or systems.
Draft
SC-37
CCI-002525
Defines the controls to be employed to ensure only organization-defined individuals or systems receive organization-defined information, system components, or devices.
Draft
SC-37(1)
CCI-002526
Defines the information, system components, or devices which are to be received only by organization-defined individuals or systems.
Draft
SC-37(1)
CCI-002527
Employ organization-defined controls to ensure only organization-defined individuals or systems receive the organization-defined information, system components, or devices.
Draft
SC-37(1)
CCI-002528
Defines the operations security controls to be employed to protect key organizational information throughout the system development life cycle.
Draft
SC-38
CCI-002529
Employ organization-defined operations security controls to protect key organizational information throughout the system development life cycle.
Draft
SC-38
CCI-002530
Maintain a separate execution domain for each executing system process.
Draft
SC-39
CCI-002531
Implement hardware separation mechanisms to facilitate process isolation.
Draft
SC-39(1)
CCI-002532
Defines the multi-threaded processing in which a separate execution domain is maintained by the system for each thread.
Draft
SC-39(2)
CCI-002533
Maintain a separate execution domain for each thread in organization-defined multi-threaded processing.
Draft
SC-39(2)
CCI-002534
Defines types of signal parameter attacks or references to sources for such attacks from which the system protects organization-defined wireless links.
Draft
SC-40
CCI-002535
Defines the external and internal wireless links the system is to protect from organization-defined types of signal parameter attacks or references to sources for such attacks.
Draft
SC-40
CCI-002536
Protect organization-defined external and internal wireless links from organization-defined types of signal parameter attacks or references to sources for such attacks.
Draft
SC-40
CCI-002537
Defines the level of protection against the effects of intentional electromagnetic interference to be achieved by implemented cryptographic mechanisms.
Draft
SC-40(1)
CCI-002538
Implement cryptographic mechanisms that achieve an organization-defined level of protection against the effects of intentional electromagnetic interference.
Draft
SC-40(1)
CCI-002539
Defines the level of reduction the system is to implement to reduce the detection potential of wireless links.
Draft
SC-40(2)
CCI-002540
Implement cryptographic mechanisms to reduce the detection potential of wireless links to an organization-defined level of reduction.
Draft
SC-40(2)
CCI-002541
Implement cryptographic mechanisms to identify and reject wireless transmissions that are deliberate attempts to achieve imitative or manipulative communications deception based on signal parameters.
Draft
SC-40(3)
CCI-002542
Defines the wireless transmitters that are to have cryptographic mechanisms implemented to prevent the identification of the wireless transmitters.
Draft
SC-40(4)
CCI-002543
Implement cryptographic mechanisms to prevent the identification of organization-defined wireless transmitters by using the transmitter signal parameters.
Draft
SC-40(4)
CCI-002544
Defines the systems or system components on which organization-defined connection ports or input/output devices are to be physically or logically disabled or removed.
Draft
SC-41
CCI-002545
Defines the connection ports or input/output devices that are to be physically or logically disabled or removed from organization-defined systems or system components.
Draft
SC-41
CCI-002546
Physically or logically disable or remove organization-defined connection ports or input/output devices on organization-defined systems or system components.
Draft
SC-41
CCI-002547
Defines the exceptions where remote activation of sensors is allowed.
Draft
SC-42
CCI-002548
Prohibit the use of devices possessing organization-defined environmental sensing capabilities in organization-defined facilities, areas, or systems; and/or the remote activation of environmental sensing capabilities on organizational systems or system components except for the organization-defined exceptions where remote activation of sensors is allowed.
Draft
SC-42
CCI-002549
Defines the class of users to receive explicit indication of sensor use.
Draft
SC-42
CCI-002550
Provide an explicit indication of sensor use to the organization-defined class of users.
Draft
SC-42
Prev
1...
80
81
82
83
84
85
86
87
88
...172
Next