AICM AtlasCSA AI Controls Matrix
Browse

Controls

Filter by domain, threat, lifecycle phase, architecture layer, control type, or mapping gap.

128 matchesclear
ID
Domain
Title
Type
Threats
STA-03
STASupply Chain Management, Transparency, and Accountability
SSRM Supply Chain
Cloud & AI Related
DPIAPISCLoG+4
STA-04
STASupply Chain Management, Transparency, and Accountability
SSRM Guidance
Cloud & AI Related
DPIAPISCLoG+4
STA-05
STASupply Chain Management, Transparency, and Accountability
SSRM Control Ownership
Cloud & AI Related
DPDoSIAPISC+5
STA-06
STASupply Chain Management, Transparency, and Accountability
SSRM Documentation Review
Cloud & AI Related
DPDoSIAPISC+5
STA-07
STASupply Chain Management, Transparency, and Accountability
SSRM Control Implementation
Cloud & AI Related
DPDoSIAPISC+5
STA-08
STASupply Chain Management, Transparency, and Accountability
Supply Chain Inventory
Cloud & AI Related
DPDoSIAPISC+5
STA-09
STASupply Chain Management, Transparency, and Accountability
Supply Chain Risk Management
Cloud & AI Related
DPDoSIAPISC+5
STA-10
STASupply Chain Management, Transparency, and Accountability
Primary Service and Contractual Agreement
Cloud & AI Related
DPDoSIAPISC+5
STA-11
STASupply Chain Management, Transparency, and Accountability
Supply Chain Agreement Review
Cloud & AI Related
DPDoSIAPISC+5
STA-12
STASupply Chain Management, Transparency, and Accountability
Supply Chain Compliance Assessment
Cloud & AI Related
DPDoSIAPISC+5
STA-13
STASupply Chain Management, Transparency, and Accountability
Supply Chain Service Agreement Compliance
Cloud & AI Related
DPDoSIAPISC+5
STA-14
STASupply Chain Management, Transparency, and Accountability
Supply Chain Governance Review
Cloud & AI Related
DPDoSIAPISC+5
STA-15
STASupply Chain Management, Transparency, and Accountability
Supply Chain Data Security Assessment
Cloud & AI Related
DPDoSIAPISC+5
STA-16
STASupply Chain Management, Transparency, and Accountability
Service Bill of Material (BOM)
AI-Specific
IAPISCLoGSDD+1
TVM-01
TVMThreat & Vulnerability Management
Threat and Vulnerability Management Policy and Procedures
Cloud & AI Related
DPDoSIAPISC+5
TVM-02
TVMThreat & Vulnerability Management
Malware and Malicious Instructions Protection Policy and Procedures
Cloud & AI Related
DPDoSIAPISC+5
TVM-03
TVMThreat & Vulnerability Management
Vulnerability Identification
Cloud & AI Related
DPDoSIAPISC+5
TVM-04
TVMThreat & Vulnerability Management
Detection Updates
Cloud & AI Related
DPDoSIAPISC+4
TVM-05
TVMThreat & Vulnerability Management
External Library Vulnerabilities
Cloud & AI Related
IAPISCLoGSDD+1
TVM-06
TVMThreat & Vulnerability Management
Penetration Testing
Cloud & AI Related
DoSIAPISCLoG+4
TVM-07
TVMThreat & Vulnerability Management
Vulnerability Remediation Schedule
Cloud & AI Related
DPDoSIAPISC+4
TVM-08
TVMThreat & Vulnerability Management
Vulnerability Prioritization
Cloud & AI Related
DPDoSIAPISC+5
TVM-12
TVMThreat & Vulnerability Management
Threat Analysis and Modelling
AI-Specific
DPDoSIAPISC+5
TVM-13
TVMThreat & Vulnerability Management
Threat Response
Cloud & AI Related
DPDoSIAPISC+5
UEM-05
UEMUniversal Endpoint Management
Endpoint Management
Cloud & AI Related
DPDoSIAPISC+5
UEM-07
UEMUniversal Endpoint Management
Operating Systems
Cloud & AI Related
IAPISCLoGMM+1
UEM-08
UEMUniversal Endpoint Management
Storage Encryption
Cloud & AI Related
DPIAPISCLoG+3
UEM-14
UEMUniversal Endpoint Management
Third-Party Endpoint Security Posture
Cloud & AI Related
DPDoSIAPISC+5
101128 of 128
← PrevPage 3 / 3Next →