AICM AtlasCSA AI Controls Matrix
Browse

Controls

Filter by domain, threat, lifecycle phase, architecture layer, control type, or mapping gap.

126 matchesclear
ID
Domain
Title
Type
Threats
AIS-10
AISApplication & Interface Security
API Security
Cloud & AI Related
DPDoSIAPISC+5
AIS-11
AISApplication & Interface Security
Agents Security Boundaries
AI-Specific
DPIAPLoGMM+2
AIS-12
AISApplication & Interface Security
Source Code Managemement
Cloud & AI Related
DPDoSIAPISC+5
AIS-13
AISApplication & Interface Security
AI Sandboxing
AI-Specific
DoSIAPISCLoG+4
AIS-14
AISApplication & Interface Security
AI Cache Protection
AI-Specific
DPDoSIAPISC+4
AIS-15
AISApplication & Interface Security
Prompt Differentation
AI-Specific
DPDoSIAPISC+4
BCR-01
BCRBusiness Continuity Management and Operational Resilience
Business Continuity Management Policy and Procedures
Cloud & AI Related
DoSISCLoGMT+2
BCR-03
BCRBusiness Continuity Management and Operational Resilience
Business Continuity Strategy
Cloud & AI Related
DoSISCLoGSDD+1
BCR-10
BCRBusiness Continuity Management and Operational Resilience
Response Plan Exercise
Cloud & AI Related
DoSISCLoGSDD+1
BCR-11
BCRBusiness Continuity Management and Operational Resilience
Equipment Redundancy
Cloud & AI Related
CCC-01
CCCChange Control and Configuration Management
Change Management Policy and Procedures
Cloud & AI Related
DPDoSIAPISC+5
CCC-04
CCCChange Control and Configuration Management
Change Authorization
Cloud & AI Related
DPDoSIAPISC+5
CCC-05
CCCChange Control and Configuration Management
Change Agreements
Cloud & AI Related
DPDoSIAPISC+5
CCC-06
CCCChange Control and Configuration Management
Change Management Baseline
Cloud & AI Related
DPDoSIAPISC+5
CCC-07
CCCChange Control and Configuration Management
Detection of Baseline Deviation
Cloud & AI Related
DPDoSIAPISC+5
CCC-08
CCCChange Control and Configuration Management
Exception Management
Cloud & AI Related
DPDoSIAPISC+5
CCC-09
CCCChange Control and Configuration Management
Change Restoration
Cloud & AI Related
DPDoSIAPISC+5
CEK-01
CEKCryptography, Encryption & Key Management
Encryption and Key Management Policy and Procedures
Cloud & AI Related
LoGSDD
CEK-02
CEKCryptography, Encryption & Key Management
CEK Roles and Responsibilities
Cloud & AI Related
IAPISCLoGSDD
CEK-03
CEKCryptography, Encryption & Key Management
Data Encryption
Cloud & AI Related
DPDoSIAPISC+5
CEK-04
CEKCryptography, Encryption & Key Management
Encryption Algorithm
Cloud & AI Related
DPDoSIAPISC+5
CEK-05
CEKCryptography, Encryption & Key Management
Encryption Change Management
Cloud & AI Related
DPDoSIAPISC+5
CEK-06
CEKCryptography, Encryption & Key Management
Encryption Change Cost Benefit Analysis
Cloud & AI Related
DPDoSIAPISC+5
CEK-07
CEKCryptography, Encryption & Key Management
Encryption Risk Management
Cloud & AI Related
DPDoSIAPISC+5
CEK-08
CEKCryptography, Encryption & Key Management
Customer Key Management Capability
Cloud & AI Related
DPDoSIAPISC+4
CEK-09
CEKCryptography, Encryption & Key Management
Encryption and Key Management Audit
Cloud & AI Related
DPDoSIAPISC+5
CEK-10
CEKCryptography, Encryption & Key Management
Key Generation
Cloud & AI Related
DPDoSIAPISC+5
CEK-11
CEKCryptography, Encryption & Key Management
Key Purpose
Cloud & AI Related
DPDoSIAPISC+5
CEK-12
CEKCryptography, Encryption & Key Management
Key Rotation
Cloud & AI Related
DPDoSIAPISC+5
CEK-13
CEKCryptography, Encryption & Key Management
Key Revocation
Cloud & AI Related
DPDoSIAPISC+5
CEK-14
CEKCryptography, Encryption & Key Management
Key Destruction
Cloud & AI Related
DPDoSIAPISC+5
CEK-15
CEKCryptography, Encryption & Key Management
Key Activation
Cloud & AI Related
DPDoSIAPISC+5
CEK-16
CEKCryptography, Encryption & Key Management
Key Suspension
Cloud & AI Related
DPDoSIAPISC+5
CEK-17
CEKCryptography, Encryption & Key Management
Key Deactivation
Cloud & AI Related
DPDoSIAPISC+5
CEK-18
CEKCryptography, Encryption & Key Management
Key Archival
Cloud & AI Related
DPDoSIAPISC+5
CEK-19
CEKCryptography, Encryption & Key Management
Key Compromise
Cloud & AI Related
DPDoSIAPISC+5
CEK-20
CEKCryptography, Encryption & Key Management
Key Recovery
Cloud & AI Related
DPDoSIAPISC+5
CEK-21
CEKCryptography, Encryption & Key Management
Key Inventory Management
Cloud & AI Related
DPDoSIAPISC+5
DCS-01
DCSDatacenter Security
Off-Site Equipment Disposal Policy and Procedures
Cloud & AI Related
LoGMTSDD
DCS-02
DCSDatacenter Security
Off-Site Transfer Authorization Policy and Procedures
Cloud & AI Related
ISCLoGMTSDD+1
DCS-03
DCSDatacenter Security
Secure Area Policy and Procedures
Cloud-Specific
DoSISCLoGMT+2
DCS-05
DCSDatacenter Security
Assets Classification
Cloud & AI Related
DPIAPISCLoG+4
DCS-06
DCSDatacenter Security
Assets Cataloguing and Tracking
Cloud & AI Related
DPIAPISCLoG+4
DCS-07
DCSDatacenter Security
Controlled Physical Access Points
Cloud-Specific
DPDoSIAPISC+5
DCS-08
DCSDatacenter Security
Equipment Identification
Cloud-Specific
MTSDD
DCS-09
DCSDatacenter Security
Secure Area Authorization
Cloud-Specific
MTSDD
DCS-10
DCSDatacenter Security
Surveillance System
Cloud-Specific
DoSLoGMT
DCS-11
DCSDatacenter Security
Adverse Event Response Training
Cloud-Specific
DoSMTSDD
DCS-12
DCSDatacenter Security
Cabling Security
Cloud-Specific
DoSLoGSDDMSF
DCS-13
DCSDatacenter Security
Environmental Systems
Cloud-Specific
DoSMSF
150 of 126
← PrevPage 1 / 3Next →