AICM AtlasCSA AI Controls Matrix
Browse

Controls

Filter by domain, threat, lifecycle phase, architecture layer, control type, or mapping gap.

105 matchesclear
ID
Domain
Title
Type
Threats
A&A-01
A&AAudit & Assurance
Audit and Assurance Policy and Procedures
Cloud & AI Related
DPDoSIAPISC+5
A&A-02
A&AAudit & Assurance
Independent Assessments
Cloud & AI Related
DPDoSIAPISC+5
A&A-03
A&AAudit & Assurance
Risk Based Planning Assessment
Cloud & AI Related
DPIAPISCLoG+4
A&A-04
A&AAudit & Assurance
Requirements Compliance
Cloud & AI Related
DPDoSIAPISC+5
A&A-05
A&AAudit & Assurance
Audit Management Process
Cloud & AI Related
DPDoSIAPISC+5
A&A-06
A&AAudit & Assurance
Remediation
Cloud & AI Related
DPDoSIAPISC+5
AIS-13
AISApplication & Interface Security
AI Sandboxing
AI-Specific
DoSIAPISCLoG+4
CCC-02
CCCChange Control and Configuration Management
Quality Testing
Cloud & AI Related
DPDoSIAPISC+5
CCC-03
CCCChange Control and Configuration Management
Change Management Technology
Cloud & AI Related
DPDoSIAPISC+5
CCC-04
CCCChange Control and Configuration Management
Change Authorization
Cloud & AI Related
DPDoSIAPISC+5
CCC-05
CCCChange Control and Configuration Management
Change Agreements
Cloud & AI Related
DPDoSIAPISC+5
CCC-06
CCCChange Control and Configuration Management
Change Management Baseline
Cloud & AI Related
DPDoSIAPISC+5
CCC-07
CCCChange Control and Configuration Management
Detection of Baseline Deviation
Cloud & AI Related
DPDoSIAPISC+5
CCC-08
CCCChange Control and Configuration Management
Exception Management
Cloud & AI Related
DPDoSIAPISC+5
CCC-09
CCCChange Control and Configuration Management
Change Restoration
Cloud & AI Related
DPDoSIAPISC+5
CEK-03
CEKCryptography, Encryption & Key Management
Data Encryption
Cloud & AI Related
DPDoSIAPISC+5
CEK-04
CEKCryptography, Encryption & Key Management
Encryption Algorithm
Cloud & AI Related
DPDoSIAPISC+5
CEK-05
CEKCryptography, Encryption & Key Management
Encryption Change Management
Cloud & AI Related
DPDoSIAPISC+5
CEK-06
CEKCryptography, Encryption & Key Management
Encryption Change Cost Benefit Analysis
Cloud & AI Related
DPDoSIAPISC+5
CEK-07
CEKCryptography, Encryption & Key Management
Encryption Risk Management
Cloud & AI Related
DPDoSIAPISC+5
DCS-01
DCSDatacenter Security
Off-Site Equipment Disposal Policy and Procedures
Cloud & AI Related
LoGMTSDD
DSP-02
DSPData Security and Privacy Lifecycle Management
Secure Disposal
Cloud & AI Related
LoGSDD
DSP-19
DSPData Security and Privacy Lifecycle Management
Data Location
Cloud & AI Related
ISCLoGSDDMSF
GRC-02
GRCGovernance, Risk and Compliance
Risk Management Program
Cloud & AI Related
ISCLoGSDD
GRC-07
GRCGovernance, Risk and Compliance
Information System Regulatory Mapping
Cloud & AI Related
LoGSDD
IAM-01
IAMIdentity & Access Management
Identity and Access Management Policy and Procedures
Cloud & AI Related
DoSIAPISCLoG+3
IAM-02
IAMIdentity & Access Management
Strong Password Policy and Procedures
Cloud & AI Related
DoSIAPISCLoG+2
IAM-03
IAMIdentity & Access Management
Identity Inventory
Cloud & AI Related
DoSIAPISCLoG+2
IAM-04
IAMIdentity & Access Management
Separation of Duties
Cloud & AI Related
DPIAPISCLoG+3
IAM-05
IAMIdentity & Access Management
Least Privilege
Cloud & AI Related
DPIAPISCLoG+3
IAM-06
IAMIdentity & Access Management
User Access Provisioning
Cloud & AI Related
DPIAPISCLoG+3
IAM-07
IAMIdentity & Access Management
User Access Changes and Revocation
Cloud & AI Related
DPIAPISCLoG+3
IAM-08
IAMIdentity & Access Management
User Access Review
Cloud & AI Related
DPIAPISCLoG+3
IAM-09
IAMIdentity & Access Management
Segregation of Privileged Access Roles
Cloud & AI Related
DPIAPISCLoG+3
IAM-10
IAMIdentity & Access Management
Management of Privileged Access Roles
Cloud & AI Related
DPIAPISCLoG+3
IAM-11
IAMIdentity & Access Management
Customers' Approval for Agreed Privileged Access Roles
Cloud & AI Related
DPIAPISCLoG+3
IAM-12
IAMIdentity & Access Management
Safeguard Logs Integrity
Cloud & AI Related
DPIAPISCLoG+4
IAM-13
IAMIdentity & Access Management
Uniquely Identifiable Users
Cloud & AI Related
DPDoSIAPISC+3
IAM-14
IAMIdentity & Access Management
Strong Authentication
Cloud & AI Related
DoSIAPISCLoG+2
IAM-15
IAMIdentity & Access Management
Passwords and Secrets Management
Cloud & AI Related
DoSIAPISCLoG+2
IAM-16
IAMIdentity & Access Management
Authorization Mechanisms
Cloud & AI Related
DoSIAPISCLoG+3
IAM-17
IAMIdentity & Access Management
Knowledge Access Control - Need to Know
Cloud & AI Related
IAPISCLoGMT+2
IAM-18
IAMIdentity & Access Management
Output Modification and Special Authorization
AI-Specific
DPIAPISCLoG+3
IAM-19
IAMIdentity & Access Management
Agent Access Restriction
Cloud & AI Related
DoSIAPISCLoG+3
I&S-01
I&SInfrastructure Security
Infrastructure and Virtualization Security Policy and Procedures
Cloud & AI Related
DoSISCLoGSDD+1
I&S-02
I&SInfrastructure Security
Capacity and Resource Planning
Cloud & AI Related
DoSLoGMSF
I&S-05
I&SInfrastructure Security
Production and Non-Production Environments
Cloud & AI Related
LoGSDDMSF
LOG-01
LOGLogging and Monitoring
Logging and Monitoring Policy and Procedures
Cloud & AI Related
DoSIAPLoGSDD+1
LOG-02
LOGLogging and Monitoring
Audit Logs Protection
Cloud & AI Related
DoSIAPLoGSDD+1
LOG-03
LOGLogging and Monitoring
Security Monitoring and Alerting
Cloud & AI Related
DoSIAPLoGMM+2
150 of 105
← PrevPage 1 / 3Next →