AICM AtlasCSA AI Controls Matrix
Browse

Controls

Filter by domain, threat, lifecycle phase, architecture layer, control type, or mapping gap.

93 matchesclear
ID
Domain
Title
Type
Threats
AIS-10
AISApplication & Interface Security
API Security
Cloud & AI Related
DPDoSIAPISC+5
AIS-11
AISApplication & Interface Security
Agents Security Boundaries
AI-Specific
DPIAPLoGMM+2
AIS-12
AISApplication & Interface Security
Source Code Managemement
Cloud & AI Related
DPDoSIAPISC+5
AIS-13
AISApplication & Interface Security
AI Sandboxing
AI-Specific
DoSIAPISCLoG+4
AIS-14
AISApplication & Interface Security
AI Cache Protection
AI-Specific
DPDoSIAPISC+4
AIS-15
AISApplication & Interface Security
Prompt Differentation
AI-Specific
DPDoSIAPISC+4
CCC-01
CCCChange Control and Configuration Management
Change Management Policy and Procedures
Cloud & AI Related
DPDoSIAPISC+5
CCC-04
CCCChange Control and Configuration Management
Change Authorization
Cloud & AI Related
DPDoSIAPISC+5
CCC-05
CCCChange Control and Configuration Management
Change Agreements
Cloud & AI Related
DPDoSIAPISC+5
CCC-06
CCCChange Control and Configuration Management
Change Management Baseline
Cloud & AI Related
DPDoSIAPISC+5
CCC-07
CCCChange Control and Configuration Management
Detection of Baseline Deviation
Cloud & AI Related
DPDoSIAPISC+5
CCC-08
CCCChange Control and Configuration Management
Exception Management
Cloud & AI Related
DPDoSIAPISC+5
CCC-09
CCCChange Control and Configuration Management
Change Restoration
Cloud & AI Related
DPDoSIAPISC+5
CEK-03
CEKCryptography, Encryption & Key Management
Data Encryption
Cloud & AI Related
DPDoSIAPISC+5
CEK-04
CEKCryptography, Encryption & Key Management
Encryption Algorithm
Cloud & AI Related
DPDoSIAPISC+5
CEK-05
CEKCryptography, Encryption & Key Management
Encryption Change Management
Cloud & AI Related
DPDoSIAPISC+5
CEK-06
CEKCryptography, Encryption & Key Management
Encryption Change Cost Benefit Analysis
Cloud & AI Related
DPDoSIAPISC+5
CEK-07
CEKCryptography, Encryption & Key Management
Encryption Risk Management
Cloud & AI Related
DPDoSIAPISC+5
CEK-09
CEKCryptography, Encryption & Key Management
Encryption and Key Management Audit
Cloud & AI Related
DPDoSIAPISC+5
CEK-11
CEKCryptography, Encryption & Key Management
Key Purpose
Cloud & AI Related
DPDoSIAPISC+5
CEK-13
CEKCryptography, Encryption & Key Management
Key Revocation
Cloud & AI Related
DPDoSIAPISC+5
CEK-17
CEKCryptography, Encryption & Key Management
Key Deactivation
Cloud & AI Related
DPDoSIAPISC+5
CEK-21
CEKCryptography, Encryption & Key Management
Key Inventory Management
Cloud & AI Related
DPDoSIAPISC+5
DCS-01
DCSDatacenter Security
Off-Site Equipment Disposal Policy and Procedures
Cloud & AI Related
LoGMTSDD
DSP-04
DSPData Security and Privacy Lifecycle Management
Data Classification
Cloud & AI Related
LoGSDD
DSP-08
DSPData Security and Privacy Lifecycle Management
Data Privacy by Design and Default
Cloud & AI Related
IAPISCLoGSDD+1
DSP-09
DSPData Security and Privacy Lifecycle Management
Data Protection Impact Assessment
Cloud & AI Related
ISCLoGSDD
DSP-15
DSPData Security and Privacy Lifecycle Management
Limitation of Production Data Use
Cloud & AI Related
IAPISCLoGSDD
DSP-18
DSPData Security and Privacy Lifecycle Management
Disclosure Notification
Cloud & AI Related
IAPISCLoGSDD
DSP-19
DSPData Security and Privacy Lifecycle Management
Data Location
Cloud & AI Related
ISCLoGSDDMSF
HRS-01
HRSHuman Resources
Background Screening Policy and Procedures
Cloud & AI Related
LoG
HRS-03
HRSHuman Resources
Clean Desk Policy and Procedures
Cloud & AI Related
LoG
HRS-04
HRSHuman Resources
Remote and Home Working Policy and Procedures
Cloud & AI Related
LoG
HRS-05
HRSHuman Resources
Asset returns
Cloud & AI Related
LoG
HRS-06
HRSHuman Resources
Employment Termination
Cloud & AI Related
LoG
HRS-07
HRSHuman Resources
Employment Agreement Process
Cloud & AI Related
LoG
HRS-08
HRSHuman Resources
Employment Agreement Content
Cloud & AI Related
LoG
HRS-10
HRSHuman Resources
Non-Disclosure Agreements
Cloud & AI Related
LoG
IAM-01
IAMIdentity & Access Management
Identity and Access Management Policy and Procedures
Cloud & AI Related
DoSIAPISCLoG+3
IAM-02
IAMIdentity & Access Management
Strong Password Policy and Procedures
Cloud & AI Related
DoSIAPISCLoG+2
IAM-04
IAMIdentity & Access Management
Separation of Duties
Cloud & AI Related
DPIAPISCLoG+3
IAM-05
IAMIdentity & Access Management
Least Privilege
Cloud & AI Related
DPIAPISCLoG+3
IAM-07
IAMIdentity & Access Management
User Access Changes and Revocation
Cloud & AI Related
DPIAPISCLoG+3
IAM-09
IAMIdentity & Access Management
Segregation of Privileged Access Roles
Cloud & AI Related
DPIAPISCLoG+3
IAM-10
IAMIdentity & Access Management
Management of Privileged Access Roles
Cloud & AI Related
DPIAPISCLoG+3
IAM-11
IAMIdentity & Access Management
Customers' Approval for Agreed Privileged Access Roles
Cloud & AI Related
DPIAPISCLoG+3
IAM-12
IAMIdentity & Access Management
Safeguard Logs Integrity
Cloud & AI Related
DPIAPISCLoG+4
IAM-13
IAMIdentity & Access Management
Uniquely Identifiable Users
Cloud & AI Related
DPDoSIAPISC+3
IAM-14
IAMIdentity & Access Management
Strong Authentication
Cloud & AI Related
DoSIAPISCLoG+2
IAM-15
IAMIdentity & Access Management
Passwords and Secrets Management
Cloud & AI Related
DoSIAPISCLoG+2
150 of 93
← PrevPage 1 / 2Next →