Browse
Controls
Filter by domain, threat, lifecycle phase, architecture layer, control type, or mapping gap.
150 matchesclear
ID
Domain
Title
Type
Threats
AIS-01
AISApplication & Interface Security
Application and Interface Security Policy and ProceduresCloud & AI Related
IAPISCLoGMT+2
AIS-02
AISApplication & Interface Security
Application Security Baseline RequirementsCloud & AI Related
DPDoSIAPISC+5
AIS-04
AISApplication & Interface Security
Secure Application Development LifecycleCloud & AI Related
DPDoSIAPISC+5
BCR-01
BCRBusiness Continuity Management and Operational Resilience
Business Continuity Management Policy and ProceduresCloud & AI Related
DoSISCLoGMT+2
BCR-02
BCRBusiness Continuity Management and Operational Resilience
Risk Assessment and Impact AnalysisCloud & AI Related
DoSISCLoGSDD+1
BCR-03
BCRBusiness Continuity Management and Operational Resilience
Business Continuity StrategyCloud & AI Related
DoSISCLoGSDD+1
BCR-04
BCRBusiness Continuity Management and Operational Resilience
Business Continuity PlanningCloud & AI Related
DoSISCLoGSDD+1
BCR-06
BCRBusiness Continuity Management and Operational Resilience
Business Continuity ExercisesCloud & AI Related
DoSISCLoGSDD+1
BCR-07
BCRBusiness Continuity Management and Operational Resilience
CommunicationCloud & AI Related
DoSISCLoGSDD+1
BCR-10
BCRBusiness Continuity Management and Operational Resilience
Response Plan ExerciseCloud & AI Related
DoSISCLoGSDD+1
CCC-01
CCCChange Control and Configuration Management
Change Management Policy and ProceduresCloud & AI Related
DPDoSIAPISC+5
CCC-03
CCCChange Control and Configuration Management
Change Management TechnologyCloud & AI Related
DPDoSIAPISC+5
CCC-04
CCCChange Control and Configuration Management
Change AuthorizationCloud & AI Related
DPDoSIAPISC+5
CCC-05
CCCChange Control and Configuration Management
Change AgreementsCloud & AI Related
DPDoSIAPISC+5
CCC-06
CCCChange Control and Configuration Management
Change Management BaselineCloud & AI Related
DPDoSIAPISC+5
CCC-07
CCCChange Control and Configuration Management
Detection of Baseline DeviationCloud & AI Related
DPDoSIAPISC+5
CCC-08
CCCChange Control and Configuration Management
Exception ManagementCloud & AI Related
DPDoSIAPISC+5
CCC-09
CCCChange Control and Configuration Management
Change RestorationCloud & AI Related
DPDoSIAPISC+5
CEK-02
CEKCryptography, Encryption & Key Management
CEK Roles and ResponsibilitiesCloud & AI Related
IAPISCLoGSDD
CEK-04
CEKCryptography, Encryption & Key Management
Encryption AlgorithmCloud & AI Related
DPDoSIAPISC+5
CEK-05
CEKCryptography, Encryption & Key Management
Encryption Change ManagementCloud & AI Related
DPDoSIAPISC+5
CEK-06
CEKCryptography, Encryption & Key Management
Encryption Change Cost Benefit AnalysisCloud & AI Related
DPDoSIAPISC+5
CEK-07
CEKCryptography, Encryption & Key Management
Encryption Risk ManagementCloud & AI Related
DPDoSIAPISC+5
CEK-08
CEKCryptography, Encryption & Key Management
Customer Key Management CapabilityCloud & AI Related
DPDoSIAPISC+4
CEK-09
CEKCryptography, Encryption & Key Management
Encryption and Key Management AuditCloud & AI Related
DPDoSIAPISC+5
CEK-21
CEKCryptography, Encryption & Key Management
Key Inventory ManagementCloud & AI Related
DPDoSIAPISC+5
DCS-02
DCSDatacenter Security
Off-Site Transfer Authorization Policy and ProceduresCloud & AI Related
ISCLoGMTSDD+1
1–50 of 150