Browse
Controls
Filter by domain, threat, lifecycle phase, architecture layer, control type, or mapping gap.
59 matchesclear
ID
Domain
Title
Type
Threats
CCC-01
CCCChange Control and Configuration Management
Change Management Policy and ProceduresCloud & AI Related
DPDoSIAPISC+5
CCC-04
CCCChange Control and Configuration Management
Change AuthorizationCloud & AI Related
DPDoSIAPISC+5
CCC-05
CCCChange Control and Configuration Management
Change AgreementsCloud & AI Related
DPDoSIAPISC+5
CCC-06
CCCChange Control and Configuration Management
Change Management BaselineCloud & AI Related
DPDoSIAPISC+5
CCC-07
CCCChange Control and Configuration Management
Detection of Baseline DeviationCloud & AI Related
DPDoSIAPISC+5
CCC-08
CCCChange Control and Configuration Management
Exception ManagementCloud & AI Related
DPDoSIAPISC+5
CCC-09
CCCChange Control and Configuration Management
Change RestorationCloud & AI Related
DPDoSIAPISC+5
CEK-04
CEKCryptography, Encryption & Key Management
Encryption AlgorithmCloud & AI Related
DPDoSIAPISC+5
CEK-06
CEKCryptography, Encryption & Key Management
Encryption Change Cost Benefit AnalysisCloud & AI Related
DPDoSIAPISC+5
CEK-09
CEKCryptography, Encryption & Key Management
Encryption and Key Management AuditCloud & AI Related
DPDoSIAPISC+5
CEK-21
CEKCryptography, Encryption & Key Management
Key Inventory ManagementCloud & AI Related
DPDoSIAPISC+5
DSP-08
DSPData Security and Privacy Lifecycle Management
Data Privacy by Design and DefaultCloud & AI Related
IAPISCLoGSDD+1
DSP-09
DSPData Security and Privacy Lifecycle Management
Data Protection Impact AssessmentCloud & AI Related
ISCLoGSDD
DSP-14
DSPData Security and Privacy Lifecycle Management
Disclosure of Data Sub-processorsCloud & AI Related
IAPISCSDD
DSP-15
DSPData Security and Privacy Lifecycle Management
Limitation of Production Data UseCloud & AI Related
IAPISCLoGSDD
DSP-18
DSPData Security and Privacy Lifecycle Management
Disclosure NotificationCloud & AI Related
IAPISCLoGSDD
IAM-01
IAMIdentity & Access Management
Identity and Access Management Policy and ProceduresCloud & AI Related
DoSIAPISCLoG+3
IAM-02
IAMIdentity & Access Management
Strong Password Policy and ProceduresCloud & AI Related
DoSIAPISCLoG+2
IAM-07
IAMIdentity & Access Management
User Access Changes and RevocationCloud & AI Related
DPIAPISCLoG+3
IAM-09
IAMIdentity & Access Management
Segregation of Privileged Access RolesCloud & AI Related
DPIAPISCLoG+3
IAM-10
IAMIdentity & Access Management
Management of Privileged Access RolesCloud & AI Related
DPIAPISCLoG+3
IAM-11
IAMIdentity & Access Management
Customers' Approval for Agreed Privileged Access RolesCloud & AI Related
DPIAPISCLoG+3
IAM-15
IAMIdentity & Access Management
Passwords and Secrets ManagementCloud & AI Related
DoSIAPISCLoG+2
IAM-17
IAMIdentity & Access Management
Knowledge Access Control - Need to KnowCloud & AI Related
IAPISCLoGMT+2
IAM-18
IAMIdentity & Access Management
Output Modification and Special AuthorizationAI-Specific
DPIAPISCLoG+3
SEF-02
SEFSecurity Incident Management, E-Discovery, & Cloud Forensics
Service Management Policy and ProceduresCloud & AI Related
DPDoSIAPISC+5
SEF-03
SEFSecurity Incident Management, E-Discovery, & Cloud Forensics
Incident Response PlansCloud & AI Related
DPDoSIAPISC+5
SEF-04
SEFSecurity Incident Management, E-Discovery, & Cloud Forensics
Incident Response TestingCloud & AI Related
DPDoSIAPISC+5
SEF-05
SEFSecurity Incident Management, E-Discovery, & Cloud Forensics
Incident Response MetricsCloud & AI Related
DPDoSIAPISC+5
SEF-06
SEFSecurity Incident Management, E-Discovery, & Cloud Forensics
Event Triage ProcessesCloud & AI Related
DPDoSIAPISC+5
SEF-08
SEFSecurity Incident Management, E-Discovery, & Cloud Forensics
Points of Contact MaintenanceCloud & AI Related
DPDoSIAPISC+5
SEF-09
SEFSecurity Incident Management, E-Discovery, & Cloud Forensics
Incident ResponseCloud & AI Related
DPDoSIAPISC+5
STA-06
STASupply Chain Management, Transparency, and Accountability
SSRM Documentation ReviewCloud & AI Related
DPDoSIAPISC+5
1–50 of 59