AICM AtlasCSA AI Controls Matrix
Browse

Controls

Filter by domain, threat, lifecycle phase, architecture layer, control type, or mapping gap.

52 matchesclear
ID
Domain
Title
Type
Threats
AIS-10
AISApplication & Interface Security
API Security
Cloud & AI Related
DPDoSIAPISC+5
AIS-13
AISApplication & Interface Security
AI Sandboxing
AI-Specific
DoSIAPISCLoG+4
AIS-14
AISApplication & Interface Security
AI Cache Protection
AI-Specific
DPDoSIAPISC+4
BCR-01
BCRBusiness Continuity Management and Operational Resilience
Business Continuity Management Policy and Procedures
Cloud & AI Related
DoSISCLoGMT+2
CCC-01
CCCChange Control and Configuration Management
Change Management Policy and Procedures
Cloud & AI Related
DPDoSIAPISC+5
CCC-04
CCCChange Control and Configuration Management
Change Authorization
Cloud & AI Related
DPDoSIAPISC+5
CCC-05
CCCChange Control and Configuration Management
Change Agreements
Cloud & AI Related
DPDoSIAPISC+5
CCC-06
CCCChange Control and Configuration Management
Change Management Baseline
Cloud & AI Related
DPDoSIAPISC+5
CCC-07
CCCChange Control and Configuration Management
Detection of Baseline Deviation
Cloud & AI Related
DPDoSIAPISC+5
CCC-08
CCCChange Control and Configuration Management
Exception Management
Cloud & AI Related
DPDoSIAPISC+5
CCC-09
CCCChange Control and Configuration Management
Change Restoration
Cloud & AI Related
DPDoSIAPISC+5
CEK-03
CEKCryptography, Encryption & Key Management
Data Encryption
Cloud & AI Related
DPDoSIAPISC+5
CEK-04
CEKCryptography, Encryption & Key Management
Encryption Algorithm
Cloud & AI Related
DPDoSIAPISC+5
CEK-05
CEKCryptography, Encryption & Key Management
Encryption Change Management
Cloud & AI Related
DPDoSIAPISC+5
CEK-06
CEKCryptography, Encryption & Key Management
Encryption Change Cost Benefit Analysis
Cloud & AI Related
DPDoSIAPISC+5
CEK-07
CEKCryptography, Encryption & Key Management
Encryption Risk Management
Cloud & AI Related
DPDoSIAPISC+5
CEK-12
CEKCryptography, Encryption & Key Management
Key Rotation
Cloud & AI Related
DPDoSIAPISC+5
CEK-21
CEKCryptography, Encryption & Key Management
Key Inventory Management
Cloud & AI Related
DPDoSIAPISC+5
DCS-01
DCSDatacenter Security
Off-Site Equipment Disposal Policy and Procedures
Cloud & AI Related
LoGMTSDD
DCS-02
DCSDatacenter Security
Off-Site Transfer Authorization Policy and Procedures
Cloud & AI Related
ISCLoGMTSDD+1
DCS-03
DCSDatacenter Security
Secure Area Policy and Procedures
Cloud-Specific
DoSISCLoGMT+2
DCS-05
DCSDatacenter Security
Assets Classification
Cloud & AI Related
DPIAPISCLoG+4
DCS-06
DCSDatacenter Security
Assets Cataloguing and Tracking
Cloud & AI Related
DPIAPISCLoG+4
DCS-08
DCSDatacenter Security
Equipment Identification
Cloud-Specific
MTSDD
IAM-01
IAMIdentity & Access Management
Identity and Access Management Policy and Procedures
Cloud & AI Related
DoSIAPISCLoG+3
IAM-02
IAMIdentity & Access Management
Strong Password Policy and Procedures
Cloud & AI Related
DoSIAPISCLoG+2
IAM-04
IAMIdentity & Access Management
Separation of Duties
Cloud & AI Related
DPIAPISCLoG+3
IAM-05
IAMIdentity & Access Management
Least Privilege
Cloud & AI Related
DPIAPISCLoG+3
IAM-07
IAMIdentity & Access Management
User Access Changes and Revocation
Cloud & AI Related
DPIAPISCLoG+3
IAM-09
IAMIdentity & Access Management
Segregation of Privileged Access Roles
Cloud & AI Related
DPIAPISCLoG+3
IAM-10
IAMIdentity & Access Management
Management of Privileged Access Roles
Cloud & AI Related
DPIAPISCLoG+3
IAM-11
IAMIdentity & Access Management
Customers' Approval for Agreed Privileged Access Roles
Cloud & AI Related
DPIAPISCLoG+3
IAM-12
IAMIdentity & Access Management
Safeguard Logs Integrity
Cloud & AI Related
DPIAPISCLoG+4
IAM-16
IAMIdentity & Access Management
Authorization Mechanisms
Cloud & AI Related
DoSIAPISCLoG+3
IAM-17
IAMIdentity & Access Management
Knowledge Access Control - Need to Know
Cloud & AI Related
IAPISCLoGMT+2
IAM-18
IAMIdentity & Access Management
Output Modification and Special Authorization
AI-Specific
DPIAPISCLoG+3
MDS-13
MDSModel Security
Secure Model Format
Cloud & AI Related
ISCLoGMTSDD+1
SEF-02
SEFSecurity Incident Management, E-Discovery, & Cloud Forensics
Service Management Policy and Procedures
Cloud & AI Related
DPDoSIAPISC+5
SEF-03
SEFSecurity Incident Management, E-Discovery, & Cloud Forensics
Incident Response Plans
Cloud & AI Related
DPDoSIAPISC+5
SEF-04
SEFSecurity Incident Management, E-Discovery, & Cloud Forensics
Incident Response Testing
Cloud & AI Related
DPDoSIAPISC+5
SEF-05
SEFSecurity Incident Management, E-Discovery, & Cloud Forensics
Incident Response Metrics
Cloud & AI Related
DPDoSIAPISC+5
SEF-06
SEFSecurity Incident Management, E-Discovery, & Cloud Forensics
Event Triage Processes
Cloud & AI Related
DPDoSIAPISC+5
SEF-08
SEFSecurity Incident Management, E-Discovery, & Cloud Forensics
Points of Contact Maintenance
Cloud & AI Related
DPDoSIAPISC+5
SEF-09
SEFSecurity Incident Management, E-Discovery, & Cloud Forensics
Incident Response
Cloud & AI Related
DPDoSIAPISC+5
STA-06
STASupply Chain Management, Transparency, and Accountability
SSRM Documentation Review
Cloud & AI Related
DPDoSIAPISC+5
STA-08
STASupply Chain Management, Transparency, and Accountability
Supply Chain Inventory
Cloud & AI Related
DPDoSIAPISC+5
STA-11
STASupply Chain Management, Transparency, and Accountability
Supply Chain Agreement Review
Cloud & AI Related
DPDoSIAPISC+5
STA-14
STASupply Chain Management, Transparency, and Accountability
Supply Chain Governance Review
Cloud & AI Related
DPDoSIAPISC+5
TVM-02
TVMThreat & Vulnerability Management
Malware and Malicious Instructions Protection Policy and Procedures
Cloud & AI Related
DPDoSIAPISC+5
TVM-08
TVMThreat & Vulnerability Management
Vulnerability Prioritization
Cloud & AI Related
DPDoSIAPISC+5
150 of 52
← PrevPage 1 / 2Next →