AICM AtlasCSA AI Controls Matrix
Browse

Controls

Filter by domain, threat, lifecycle phase, architecture layer, control type, or mapping gap.

166 matchesclear
ID
Domain
Title
Type
Threats
CEK-13
CEKCryptography, Encryption & Key Management
Key Revocation
Cloud & AI Related
DPDoSIAPISC+5
CEK-14
CEKCryptography, Encryption & Key Management
Key Destruction
Cloud & AI Related
DPDoSIAPISC+5
CEK-15
CEKCryptography, Encryption & Key Management
Key Activation
Cloud & AI Related
DPDoSIAPISC+5
CEK-16
CEKCryptography, Encryption & Key Management
Key Suspension
Cloud & AI Related
DPDoSIAPISC+5
CEK-17
CEKCryptography, Encryption & Key Management
Key Deactivation
Cloud & AI Related
DPDoSIAPISC+5
CEK-18
CEKCryptography, Encryption & Key Management
Key Archival
Cloud & AI Related
DPDoSIAPISC+5
CEK-19
CEKCryptography, Encryption & Key Management
Key Compromise
Cloud & AI Related
DPDoSIAPISC+5
CEK-20
CEKCryptography, Encryption & Key Management
Key Recovery
Cloud & AI Related
DPDoSIAPISC+5
DCS-01
DCSDatacenter Security
Off-Site Equipment Disposal Policy and Procedures
Cloud & AI Related
LoGMTSDD
DCS-02
DCSDatacenter Security
Off-Site Transfer Authorization Policy and Procedures
Cloud & AI Related
ISCLoGMTSDD+1
DCS-05
DCSDatacenter Security
Assets Classification
Cloud & AI Related
DPIAPISCLoG+4
DCS-08
DCSDatacenter Security
Equipment Identification
Cloud-Specific
MTSDD
DSP-02
DSPData Security and Privacy Lifecycle Management
Secure Disposal
Cloud & AI Related
LoGSDD
DSP-05
DSPData Security and Privacy Lifecycle Management
Data Flow Documentation
Cloud & AI Related
ISCLoGSDD
DSP-07
DSPData Security and Privacy Lifecycle Management
Data Protection by Design and Default
Cloud & AI Related
DPDoSIAPISC+5
DSP-08
DSPData Security and Privacy Lifecycle Management
Data Privacy by Design and Default
Cloud & AI Related
IAPISCLoGSDD+1
DSP-10
DSPData Security and Privacy Lifecycle Management
Sensitive Data Transfer
Cloud & AI Related
IAPISCLoGSDD
DSP-12
DSPData Security and Privacy Lifecycle Management
Limitation of Purpose in Personal Data Processing
Cloud & AI Related
IAPISCLoGSDD
DSP-15
DSPData Security and Privacy Lifecycle Management
Limitation of Production Data Use
Cloud & AI Related
IAPISCLoGSDD
DSP-17
DSPData Security and Privacy Lifecycle Management
Sensitive Data Protection
Cloud & AI Related
IAPISCLoGSDD+1
DSP-20
DSPData Security and Privacy Lifecycle Management
Data Provenance and Transparency
Cloud & AI Related
DPIAPISCLoG+2
DSP-21
DSPData Security and Privacy Lifecycle Management
Data Poisoning Prevention & Detection
AI-Specific
DPISCLoGMSF
DSP-22
DSPData Security and Privacy Lifecycle Management
Privacy Enhancing Technologies
AI-Specific
IAPISCLoGSDD
GRC-02
GRCGovernance, Risk and Compliance
Risk Management Program
Cloud & AI Related
ISCLoGSDD
GRC-04
GRCGovernance, Risk and Compliance
Policy Exception Process
Cloud & AI Related
ISCLoGSDD
GRC-05
GRCGovernance, Risk and Compliance
Information Security Program
Cloud & AI Related
ISCLoGSDD
GRC-07
GRCGovernance, Risk and Compliance
Information System Regulatory Mapping
Cloud & AI Related
LoGSDD
GRC-13
GRCGovernance, Risk and Compliance
Explainability Requirement
AI-Specific
DPIAPISCLoG+3
GRC-14
GRCGovernance, Risk and Compliance
Explainability Evaluation
AI-Specific
DPIAPISCLoG+3
IAM-01
IAMIdentity & Access Management
Identity and Access Management Policy and Procedures
Cloud & AI Related
DoSIAPISCLoG+3
IAM-02
IAMIdentity & Access Management
Strong Password Policy and Procedures
Cloud & AI Related
DoSIAPISCLoG+2
IAM-03
IAMIdentity & Access Management
Identity Inventory
Cloud & AI Related
DoSIAPISCLoG+2
IAM-04
IAMIdentity & Access Management
Separation of Duties
Cloud & AI Related
DPIAPISCLoG+3
IAM-05
IAMIdentity & Access Management
Least Privilege
Cloud & AI Related
DPIAPISCLoG+3
IAM-06
IAMIdentity & Access Management
User Access Provisioning
Cloud & AI Related
DPIAPISCLoG+3
IAM-07
IAMIdentity & Access Management
User Access Changes and Revocation
Cloud & AI Related
DPIAPISCLoG+3
IAM-08
IAMIdentity & Access Management
User Access Review
Cloud & AI Related
DPIAPISCLoG+3
IAM-09
IAMIdentity & Access Management
Segregation of Privileged Access Roles
Cloud & AI Related
DPIAPISCLoG+3
IAM-10
IAMIdentity & Access Management
Management of Privileged Access Roles
Cloud & AI Related
DPIAPISCLoG+3
IAM-11
IAMIdentity & Access Management
Customers' Approval for Agreed Privileged Access Roles
Cloud & AI Related
DPIAPISCLoG+3
IAM-12
IAMIdentity & Access Management
Safeguard Logs Integrity
Cloud & AI Related
DPIAPISCLoG+4
IAM-13
IAMIdentity & Access Management
Uniquely Identifiable Users
Cloud & AI Related
DPDoSIAPISC+3
IAM-14
IAMIdentity & Access Management
Strong Authentication
Cloud & AI Related
DoSIAPISCLoG+2
IAM-16
IAMIdentity & Access Management
Authorization Mechanisms
Cloud & AI Related
DoSIAPISCLoG+3
IAM-17
IAMIdentity & Access Management
Knowledge Access Control - Need to Know
Cloud & AI Related
IAPISCLoGMT+2
IAM-18
IAMIdentity & Access Management
Output Modification and Special Authorization
AI-Specific
DPIAPISCLoG+3
IAM-19
IAMIdentity & Access Management
Agent Access Restriction
Cloud & AI Related
DoSIAPISCLoG+3
IPY-01
IPYInteroperability & Portability
Interoperability and Portability Policy and Procedures
Cloud & AI Related
IAPLoGSDD
IPY-02
IPYInteroperability & Portability
Application Interface Availability
Cloud & AI Related
IAPLoGSDD
I&S-01
I&SInfrastructure Security
Infrastructure and Virtualization Security Policy and Procedures
Cloud & AI Related
DoSISCLoGSDD+1
51100 of 166