Browse
Controls
Filter by domain, threat, lifecycle phase, architecture layer, control type, or mapping gap.
8 matchesclear
ID
Domain
Title
Type
Threats
CEK-01
CEKCryptography, Encryption & Key Management
Encryption and Key Management Policy and ProceduresCloud & AI Related
LoGSDD
CEK-02
CEKCryptography, Encryption & Key Management
CEK Roles and ResponsibilitiesCloud & AI Related
IAPISCLoGSDD
CEK-04
CEKCryptography, Encryption & Key Management
Encryption AlgorithmCloud & AI Related
DPDoSIAPISC+5
CEK-05
CEKCryptography, Encryption & Key Management
Encryption Change ManagementCloud & AI Related
DPDoSIAPISC+5
CEK-06
CEKCryptography, Encryption & Key Management
Encryption Change Cost Benefit AnalysisCloud & AI Related
DPDoSIAPISC+5
CEK-07
CEKCryptography, Encryption & Key Management
Encryption Risk ManagementCloud & AI Related
DPDoSIAPISC+5
1–8 of 8
← PrevPage 1 / 1Next →