AICM AtlasCSA AI Controls Matrix
Browse

Controls

Filter by domain, threat, lifecycle phase, architecture layer, control type, or mapping gap.

17 matchesclear
ID
Domain
Title
Type
Threats
CEK-01
CEKCryptography, Encryption & Key Management
Encryption and Key Management Policy and Procedures
Cloud & AI Related
LoGSDD
CEK-02
CEKCryptography, Encryption & Key Management
CEK Roles and Responsibilities
Cloud & AI Related
IAPISCLoGSDD
CEK-03
CEKCryptography, Encryption & Key Management
Data Encryption
Cloud & AI Related
DPDoSIAPISC+5
CEK-04
CEKCryptography, Encryption & Key Management
Encryption Algorithm
Cloud & AI Related
DPDoSIAPISC+5
CEK-05
CEKCryptography, Encryption & Key Management
Encryption Change Management
Cloud & AI Related
DPDoSIAPISC+5
CEK-06
CEKCryptography, Encryption & Key Management
Encryption Change Cost Benefit Analysis
Cloud & AI Related
DPDoSIAPISC+5
CEK-07
CEKCryptography, Encryption & Key Management
Encryption Risk Management
Cloud & AI Related
DPDoSIAPISC+5
CEK-09
CEKCryptography, Encryption & Key Management
Encryption and Key Management Audit
Cloud & AI Related
DPDoSIAPISC+5
CEK-10
CEKCryptography, Encryption & Key Management
Key Generation
Cloud & AI Related
DPDoSIAPISC+5
CEK-11
CEKCryptography, Encryption & Key Management
Key Purpose
Cloud & AI Related
DPDoSIAPISC+5
CEK-12
CEKCryptography, Encryption & Key Management
Key Rotation
Cloud & AI Related
DPDoSIAPISC+5
CEK-13
CEKCryptography, Encryption & Key Management
Key Revocation
Cloud & AI Related
DPDoSIAPISC+5
CEK-14
CEKCryptography, Encryption & Key Management
Key Destruction
Cloud & AI Related
DPDoSIAPISC+5
CEK-16
CEKCryptography, Encryption & Key Management
Key Suspension
Cloud & AI Related
DPDoSIAPISC+5
CEK-17
CEKCryptography, Encryption & Key Management
Key Deactivation
Cloud & AI Related
DPDoSIAPISC+5
CEK-18
CEKCryptography, Encryption & Key Management
Key Archival
Cloud & AI Related
DPDoSIAPISC+5
CEK-20
CEKCryptography, Encryption & Key Management
Key Recovery
Cloud & AI Related
DPDoSIAPISC+5
117 of 17
← PrevPage 1 / 1Next →