Browse
Controls
Filter by domain, threat, lifecycle phase, architecture layer, control type, or mapping gap.
131 matchesclear
ID
Domain
Title
Type
Threats
AIS-01
AISApplication & Interface Security
Application and Interface Security Policy and ProceduresCloud & AI Related
IAPISCLoGMT+2
AIS-02
AISApplication & Interface Security
Application Security Baseline RequirementsCloud & AI Related
DPDoSIAPISC+5
AIS-03
AISApplication & Interface Security
Application Security MetricsCloud & AI Related
DoSIAPLoGSDD+1
AIS-04
AISApplication & Interface Security
Secure Application Development LifecycleCloud & AI Related
DPDoSIAPISC+5
AIS-05
AISApplication & Interface Security
Application Security TestingCloud & AI Related
DPDoSIAPISC+5
AIS-06
AISApplication & Interface Security
Secure Application DeploymentCloud & AI Related
DPDoSIAPISC+5
AIS-07
AISApplication & Interface Security
Application Vulnerability RemediationCloud & AI Related
DPDoSIAPISC+5
CCC-01
CCCChange Control and Configuration Management
Change Management Policy and ProceduresCloud & AI Related
DPDoSIAPISC+5
CCC-04
CCCChange Control and Configuration Management
Change AuthorizationCloud & AI Related
DPDoSIAPISC+5
CCC-05
CCCChange Control and Configuration Management
Change AgreementsCloud & AI Related
DPDoSIAPISC+5
CCC-06
CCCChange Control and Configuration Management
Change Management BaselineCloud & AI Related
DPDoSIAPISC+5
CCC-07
CCCChange Control and Configuration Management
Detection of Baseline DeviationCloud & AI Related
DPDoSIAPISC+5
CCC-08
CCCChange Control and Configuration Management
Exception ManagementCloud & AI Related
DPDoSIAPISC+5
CCC-09
CCCChange Control and Configuration Management
Change RestorationCloud & AI Related
DPDoSIAPISC+5
CEK-04
CEKCryptography, Encryption & Key Management
Encryption AlgorithmCloud & AI Related
DPDoSIAPISC+5
CEK-05
CEKCryptography, Encryption & Key Management
Encryption Change ManagementCloud & AI Related
DPDoSIAPISC+5
CEK-07
CEKCryptography, Encryption & Key Management
Encryption Risk ManagementCloud & AI Related
DPDoSIAPISC+5
CEK-09
CEKCryptography, Encryption & Key Management
Encryption and Key Management AuditCloud & AI Related
DPDoSIAPISC+5
CEK-21
CEKCryptography, Encryption & Key Management
Key Inventory ManagementCloud & AI Related
DPDoSIAPISC+5
DSP-07
DSPData Security and Privacy Lifecycle Management
Data Protection by Design and DefaultCloud & AI Related
DPDoSIAPISC+5
DSP-08
DSPData Security and Privacy Lifecycle Management
Data Privacy by Design and DefaultCloud & AI Related
IAPISCLoGSDD+1
DSP-10
DSPData Security and Privacy Lifecycle Management
Sensitive Data TransferCloud & AI Related
IAPISCLoGSDD
DSP-11
DSPData Security and Privacy Lifecycle Management
Personal Data Access, Reversal, Rectification and DeletionCloud & AI Related
IAPISCLoGSDD+1
DSP-12
DSPData Security and Privacy Lifecycle Management
Limitation of Purpose in Personal Data ProcessingCloud & AI Related
IAPISCLoGSDD
DSP-13
DSPData Security and Privacy Lifecycle Management
Personal Data Sub-processingCloud & AI Related
IAPISCLoGSDD
DSP-14
DSPData Security and Privacy Lifecycle Management
Disclosure of Data Sub-processorsCloud & AI Related
IAPISCSDD
DSP-15
DSPData Security and Privacy Lifecycle Management
Limitation of Production Data UseCloud & AI Related
IAPISCLoGSDD
DSP-16
DSPData Security and Privacy Lifecycle Management
Data Retention and DeletionCloud & AI Related
IAPISCLoGSDD+1
DSP-17
DSPData Security and Privacy Lifecycle Management
Sensitive Data ProtectionCloud & AI Related
IAPISCLoGSDD+1
DSP-18
DSPData Security and Privacy Lifecycle Management
Disclosure NotificationCloud & AI Related
IAPISCLoGSDD
DSP-20
DSPData Security and Privacy Lifecycle Management
Data Provenance and TransparencyCloud & AI Related
DPIAPISCLoG+2
DSP-22
DSPData Security and Privacy Lifecycle Management
Privacy Enhancing TechnologiesAI-Specific
IAPISCLoGSDD
1–50 of 131