AICM AtlasCSA AI Controls Matrix
Browse

Controls

Filter by domain, threat, lifecycle phase, architecture layer, control type, or mapping gap.

66 matchesclear
ID
Domain
Title
Type
Threats
AIS-10
AISApplication & Interface Security
API Security
Cloud & AI Related
DPDoSIAPISC+5
AIS-13
AISApplication & Interface Security
AI Sandboxing
AI-Specific
DoSIAPISCLoG+4
AIS-14
AISApplication & Interface Security
AI Cache Protection
AI-Specific
DPDoSIAPISC+4
AIS-15
AISApplication & Interface Security
Prompt Differentation
AI-Specific
DPDoSIAPISC+4
BCR-01
BCRBusiness Continuity Management and Operational Resilience
Business Continuity Management Policy and Procedures
Cloud & AI Related
DoSISCLoGMT+2
BCR-03
BCRBusiness Continuity Management and Operational Resilience
Business Continuity Strategy
Cloud & AI Related
DoSISCLoGSDD+1
BCR-10
BCRBusiness Continuity Management and Operational Resilience
Response Plan Exercise
Cloud & AI Related
DoSISCLoGSDD+1
CCC-01
CCCChange Control and Configuration Management
Change Management Policy and Procedures
Cloud & AI Related
DPDoSIAPISC+5
CCC-04
CCCChange Control and Configuration Management
Change Authorization
Cloud & AI Related
DPDoSIAPISC+5
CCC-05
CCCChange Control and Configuration Management
Change Agreements
Cloud & AI Related
DPDoSIAPISC+5
CCC-06
CCCChange Control and Configuration Management
Change Management Baseline
Cloud & AI Related
DPDoSIAPISC+5
CCC-07
CCCChange Control and Configuration Management
Detection of Baseline Deviation
Cloud & AI Related
DPDoSIAPISC+5
CCC-08
CCCChange Control and Configuration Management
Exception Management
Cloud & AI Related
DPDoSIAPISC+5
CCC-09
CCCChange Control and Configuration Management
Change Restoration
Cloud & AI Related
DPDoSIAPISC+5
CEK-03
CEKCryptography, Encryption & Key Management
Data Encryption
Cloud & AI Related
DPDoSIAPISC+5
CEK-04
CEKCryptography, Encryption & Key Management
Encryption Algorithm
Cloud & AI Related
DPDoSIAPISC+5
CEK-05
CEKCryptography, Encryption & Key Management
Encryption Change Management
Cloud & AI Related
DPDoSIAPISC+5
CEK-06
CEKCryptography, Encryption & Key Management
Encryption Change Cost Benefit Analysis
Cloud & AI Related
DPDoSIAPISC+5
CEK-07
CEKCryptography, Encryption & Key Management
Encryption Risk Management
Cloud & AI Related
DPDoSIAPISC+5
CEK-12
CEKCryptography, Encryption & Key Management
Key Rotation
Cloud & AI Related
DPDoSIAPISC+5
CEK-21
CEKCryptography, Encryption & Key Management
Key Inventory Management
Cloud & AI Related
DPDoSIAPISC+5
DCS-02
DCSDatacenter Security
Off-Site Transfer Authorization Policy and Procedures
Cloud & AI Related
ISCLoGMTSDD+1
DCS-03
DCSDatacenter Security
Secure Area Policy and Procedures
Cloud-Specific
DoSISCLoGMT+2
DCS-05
DCSDatacenter Security
Assets Classification
Cloud & AI Related
DPIAPISCLoG+4
DCS-06
DCSDatacenter Security
Assets Cataloguing and Tracking
Cloud & AI Related
DPIAPISCLoG+4
DCS-12
DCSDatacenter Security
Cabling Security
Cloud-Specific
DoSLoGSDDMSF
DCS-14
DCSDatacenter Security
Secure Utilities
Cloud-Specific
DoSMSF
DCS-15
DCSDatacenter Security
Equipment Location
Cloud-Specific
DoSLoGMSF
DSP-08
DSPData Security and Privacy Lifecycle Management
Data Privacy by Design and Default
Cloud & AI Related
IAPISCLoGSDD+1
DSP-19
DSPData Security and Privacy Lifecycle Management
Data Location
Cloud & AI Related
ISCLoGSDDMSF
IAM-01
IAMIdentity & Access Management
Identity and Access Management Policy and Procedures
Cloud & AI Related
DoSIAPISCLoG+3
IAM-12
IAMIdentity & Access Management
Safeguard Logs Integrity
Cloud & AI Related
DPIAPISCLoG+4
IAM-13
IAMIdentity & Access Management
Uniquely Identifiable Users
Cloud & AI Related
DPDoSIAPISC+3
IAM-14
IAMIdentity & Access Management
Strong Authentication
Cloud & AI Related
DoSIAPISCLoG+2
IAM-15
IAMIdentity & Access Management
Passwords and Secrets Management
Cloud & AI Related
DoSIAPISCLoG+2
IAM-16
IAMIdentity & Access Management
Authorization Mechanisms
Cloud & AI Related
DoSIAPISCLoG+3
IAM-17
IAMIdentity & Access Management
Knowledge Access Control - Need to Know
Cloud & AI Related
IAPISCLoGMT+2
IAM-19
IAMIdentity & Access Management
Agent Access Restriction
Cloud & AI Related
DoSIAPISCLoG+3
I&S-01
I&SInfrastructure Security
Infrastructure and Virtualization Security Policy and Procedures
Cloud & AI Related
DoSISCLoGSDD+1
I&S-02
I&SInfrastructure Security
Capacity and Resource Planning
Cloud & AI Related
DoSLoGMSF
I&S-03
I&SInfrastructure Security
Network Security
Cloud & AI Related
DoSISCLoGSDD+1
I&S-05
I&SInfrastructure Security
Production and Non-Production Environments
Cloud & AI Related
LoGSDDMSF
I&S-06
I&SInfrastructure Security
Segmentation and Segregation
Cloud & AI Related
LoGSDDMSF
LOG-06
LOGLogging and Monitoring
Clock Synchronization
Cloud & AI Related
LoGMSF
LOG-09
LOGLogging and Monitoring
Log Protection
Cloud & AI Related
DoSLoGSDDMSF
LOG-11
LOGLogging and Monitoring
Transaction/Activity Logging
Cloud & AI Related
DoSLoGSDDMSF
LOG-12
LOGLogging and Monitoring
Access Control Logs
Cloud-Specific
LoGSDDMSF
LOG-13
LOGLogging and Monitoring
Failures and Anomalies Reporting
Cloud & AI Related
LoGMSF
MDS-11
MDSModel Security
Model Failure
AI-Specific
DPDoSIAPISC+4
MDS-13
MDSModel Security
Secure Model Format
Cloud & AI Related
ISCLoGMTSDD+1
150 of 66
← PrevPage 1 / 2Next →