Asset Management
5 controlsAsset Transportation Authorization Business Continuity
5 controlsBackup Management
2 controlsConfiguration Management
6 controlsBaseline Configuration Standard Time Clock Synchronization Change Management
2 controlsChange Management Workflow Cryptography
4 controlsApproved Cryptographic Technology Data Management
14 controlsData Classification Criteria Entity Management
8 controlsBoard of Directors Structure and Purpose Identity and Access Management
11 controlsLogical Access Provisioning Incident Response
7 controlsIncident Reporting Contact Information Mobile Device Management
3 controlsConfiguration Management: Mobile Devices Network Operations
4 controlsNetwork Policy Enforcement Points Inbound and Outbound Network Traffic: DMZ Requirements Security Governance
84 controlsProprietary Rights Agreement Information Security Program Content People Resources
5 controlsOrganization Property Collection Privacy
29 controlsPII Processing Agreements Record of Processing Activity Proactive Security
2 controlsRisk Management
14 controlsService Risk Rating Assignment Service Lifecycle
9 controlsService Lifecycle Workflow Cybersecurity & Data Privacy Requirements Definition Systems Monitoring
5 controlsSystem Security Monitoring System Availability Monitoring Site Operations
8 controlsPhysical Protection and Positioning of Cabling Provisioning Physical Access Training and Awareness
7 controlsGeneral Security Awareness Training Developer Security Training Payment Card Processing Security Awareness Training Third-Party Management
5 controlsThird-Party Assurance Review Vendor Non-disclosure Agreements Vulnerability Management
4 controlsSystem Design Documentation
2 controlsAchieving Resilience Requirements