Browse
Controls
Filter by domain, threat, lifecycle phase, architecture layer, control type, or mapping gap.
19 matchesclear
ID
Domain
Title
Type
Threats
CEK-01
CEKCryptography, Encryption & Key Management
Encryption and Key Management Policy and ProceduresCloud & AI Related
LoGSDD
CEK-02
CEKCryptography, Encryption & Key Management
CEK Roles and ResponsibilitiesCloud & AI Related
IAPISCLoGSDD
CEK-04
CEKCryptography, Encryption & Key Management
Encryption AlgorithmCloud & AI Related
DPDoSIAPISC+5
CEK-05
CEKCryptography, Encryption & Key Management
Encryption Change ManagementCloud & AI Related
DPDoSIAPISC+5
CEK-06
CEKCryptography, Encryption & Key Management
Encryption Change Cost Benefit AnalysisCloud & AI Related
DPDoSIAPISC+5
CEK-07
CEKCryptography, Encryption & Key Management
Encryption Risk ManagementCloud & AI Related
DPDoSIAPISC+5
CEK-09
CEKCryptography, Encryption & Key Management
Encryption and Key Management AuditCloud & AI Related
DPDoSIAPISC+5
1–19 of 19
← PrevPage 1 / 1Next →