AICM AtlasCSA AI Controls Matrix
Browse

Controls

Filter by domain, threat, lifecycle phase, architecture layer, control type, or mapping gap.

233 matchesclear
ID
Domain
Title
Type
Threats
STA-10
STASupply Chain Management, Transparency, and Accountability
Primary Service and Contractual Agreement
Cloud & AI Related
DPDoSIAPISC+5
STA-11
STASupply Chain Management, Transparency, and Accountability
Supply Chain Agreement Review
Cloud & AI Related
DPDoSIAPISC+5
STA-12
STASupply Chain Management, Transparency, and Accountability
Supply Chain Compliance Assessment
Cloud & AI Related
DPDoSIAPISC+5
STA-13
STASupply Chain Management, Transparency, and Accountability
Supply Chain Service Agreement Compliance
Cloud & AI Related
DPDoSIAPISC+5
STA-14
STASupply Chain Management, Transparency, and Accountability
Supply Chain Governance Review
Cloud & AI Related
DPDoSIAPISC+5
STA-15
STASupply Chain Management, Transparency, and Accountability
Supply Chain Data Security Assessment
Cloud & AI Related
DPDoSIAPISC+5
STA-16
STASupply Chain Management, Transparency, and Accountability
Service Bill of Material (BOM)
AI-Specific
IAPISCLoGSDD+1
TVM-01
TVMThreat & Vulnerability Management
Threat and Vulnerability Management Policy and Procedures
Cloud & AI Related
DPDoSIAPISC+5
TVM-02
TVMThreat & Vulnerability Management
Malware and Malicious Instructions Protection Policy and Procedures
Cloud & AI Related
DPDoSIAPISC+5
TVM-03
TVMThreat & Vulnerability Management
Vulnerability Identification
Cloud & AI Related
DPDoSIAPISC+5
TVM-05
TVMThreat & Vulnerability Management
External Library Vulnerabilities
Cloud & AI Related
IAPISCLoGSDD+1
TVM-06
TVMThreat & Vulnerability Management
Penetration Testing
Cloud & AI Related
DoSIAPISCLoG+4
TVM-07
TVMThreat & Vulnerability Management
Vulnerability Remediation Schedule
Cloud & AI Related
DPDoSIAPISC+4
TVM-08
TVMThreat & Vulnerability Management
Vulnerability Prioritization
Cloud & AI Related
DPDoSIAPISC+5
TVM-09
TVMThreat & Vulnerability Management
Vulnerability Management Reporting
Cloud & AI Related
LoG
TVM-10
TVMThreat & Vulnerability Management
Vulnerability Management Metrics
Cloud & AI Related
LoG
TVM-11
TVMThreat & Vulnerability Management
Guardrails
AI-Specific
LoG
TVM-12
TVMThreat & Vulnerability Management
Threat Analysis and Modelling
AI-Specific
DPDoSIAPISC+5
TVM-13
TVMThreat & Vulnerability Management
Threat Response
Cloud & AI Related
DPDoSIAPISC+5
UEM-01
UEMUniversal Endpoint Management
Endpoint Devices Policy and Procedures
Cloud & AI Related
DPDoSIAPISC+5
UEM-02
UEMUniversal Endpoint Management
Application and Service Approval
Cloud & AI Related
DPIAPISCLoG+3
UEM-03
UEMUniversal Endpoint Management
Compatibility
Cloud & AI Related
ISCLoG
UEM-04
UEMUniversal Endpoint Management
Endpoint Inventory
Cloud & AI Related
ISCLoG
UEM-05
UEMUniversal Endpoint Management
Endpoint Management
Cloud & AI Related
DPDoSIAPISC+5
UEM-06
UEMUniversal Endpoint Management
Automatic Lock Screen
Cloud & AI Related
LoGSDD
UEM-07
UEMUniversal Endpoint Management
Operating Systems
Cloud & AI Related
IAPISCLoGMM+1
UEM-08
UEMUniversal Endpoint Management
Storage Encryption
Cloud & AI Related
DPIAPISCLoG+3
UEM-09
UEMUniversal Endpoint Management
Anti-Malware Detection and Prevention
Cloud & AI Related
LoGMSF
UEM-10
UEMUniversal Endpoint Management
Software Firewall
Cloud & AI Related
DoSIAPISCLoG+3
UEM-11
UEMUniversal Endpoint Management
Data Loss Prevention
Cloud & AI Related
LoGMTSDD
UEM-12
UEMUniversal Endpoint Management
Remote Locate
Cloud & AI Related
LoG
UEM-13
UEMUniversal Endpoint Management
Remote Wipe
Cloud & AI Related
LoGSDD
UEM-14
UEMUniversal Endpoint Management
Third-Party Endpoint Security Posture
Cloud & AI Related
DPDoSIAPISC+5
201233 of 233
← PrevPage 5 / 5Next →