Professional Documents
Culture Documents
NAME
TITLE
ACCESS CONTROL
AC-1
ACCESS CONTROL
AC-1a.
ACCESS CONTROL
AC-1a.1.
ACCESS CONTROL
AC-1a.2.
ACCESS CONTROL
AC-1b.
ACCESS CONTROL
AC-1b.1.
ACCESS CONTROL
AC-1b.2.
ACCESS CONTROL
AC-2
ACCOUNT MANAGEMENT
ACCESS CONTROL
AC-2a.
ACCOUNT MANAGEMENT
ACCESS CONTROL
AC-2b.
ACCOUNT MANAGEMENT
ACCESS CONTROL
AC-2c.
ACCOUNT MANAGEMENT
ACCESS CONTROL
AC-2d.
ACCOUNT MANAGEMENT
ACCESS CONTROL
AC-2e.
ACCOUNT MANAGEMENT
ACCESS CONTROL
AC-2f.
ACCOUNT MANAGEMENT
ACCESS CONTROL
AC-2g.
ACCOUNT MANAGEMENT
ACCESS CONTROL
AC-2h.
ACCOUNT MANAGEMENT
ACCESS CONTROL
AC-2h.1.
ACCOUNT MANAGEMENT
ACCESS CONTROL
AC-2h.2.
ACCOUNT MANAGEMENT
ACCESS CONTROL
AC-2h.3.
ACCOUNT MANAGEMENT
ACCESS CONTROL
AC-2i.
ACCOUNT MANAGEMENT
ACCESS CONTROL
AC-2i.1.
ACCOUNT MANAGEMENT
ACCESS CONTROL
AC-2i.2.
ACCOUNT MANAGEMENT
ACCESS CONTROL
AC-2i.3.
ACCOUNT MANAGEMENT
ACCESS CONTROL
AC-2j.
ACCOUNT MANAGEMENT
ACCESS CONTROL
AC-2k.
ACCOUNT MANAGEMENT
ACCESS CONTROL
AC-2 (1)
ACCESS CONTROL
AC-2 (2)
ACCESS CONTROL
AC-2 (3)
ACCESS CONTROL
AC-2 (4)
ACCESS CONTROL
AC-2 (5)
INACTIVITY LOGOUT
ACCESS CONTROL
AC-2 (6)
ACCESS CONTROL
AC-2 (7)
ROLE-BASED SCHEMES
ACCESS CONTROL
AC-2 (7)(a)
ROLE-BASED SCHEMES
ACCESS CONTROL
AC-2 (7)(b)
ROLE-BASED SCHEMES
ACCESS CONTROL
AC-2 (7)(c)
ROLE-BASED SCHEMES
ACCESS CONTROL
AC-2 (8)
ACCESS CONTROL
AC-2 (9)
ACCESS CONTROL
AC-2 (10)
ACCESS CONTROL
AC-2 (11)
USAGE CONDITIONS
ACCESS CONTROL
AC-2 (12)
ACCESS CONTROL
AC-2 (12)(a)
ACCESS CONTROL
AC-2 (12)(b)
ACCESS CONTROL
AC-2 (13)
ACCESS CONTROL
AC-3
ACCESS ENFORCEMENT
ACCESS CONTROL
AC-3 (1)
ACCESS CONTROL
AC-3 (2)
DUAL AUTHORIZATION
ACCESS CONTROL
AC-3 (3)
ACCESS CONTROL
AC-3 (3)(a)
ACCESS CONTROL
AC-3 (3)(b)
ACCESS CONTROL
AC-3 (3)(b)(1)
ACCESS CONTROL
AC-3 (3)(b)(2)
ACCESS CONTROL
AC-3 (3)(b)(3)
ACCESS CONTROL
AC-3 (3)(b)(4)
ACCESS CONTROL
AC-3 (3)(b)(5)
ACCESS CONTROL
AC-3 (3)(c)
ACCESS CONTROL
AC-3 (4)
ACCESS CONTROL
AC-3 (4)(a)
ACCESS CONTROL
AC-3 (4)(b)
ACCESS CONTROL
AC-3 (4)(c)
ACCESS CONTROL
AC-3 (4)(d)
ACCESS CONTROL
AC-3 (4)(e)
ACCESS CONTROL
AC-3 (5)
SECURITY-RELEVANT INFORMATION
ACCESS CONTROL
AC-3 (6)
ACCESS CONTROL
AC-3 (7)
ACCESS CONTROL
AC-3 (8)
ACCESS CONTROL
AC-3 (9)
CONTROLLED RELEASE
ACCESS CONTROL
AC-3 (9)(a)
CONTROLLED RELEASE
ACCESS CONTROL
AC-3 (9)(b)
CONTROLLED RELEASE
ACCESS CONTROL
AC-3 (10)
ACCESS CONTROL
AC-4
ACCESS CONTROL
AC-4 (1)
ACCESS CONTROL
AC-4 (2)
PROCESSING DOMAINS
ACCESS CONTROL
AC-4 (3)
ACCESS CONTROL
AC-4 (4)
ACCESS CONTROL
AC-4 (5)
ACCESS CONTROL
AC-4 (6)
METADATA
ACCESS CONTROL
AC-4 (7)
ACCESS CONTROL
AC-4 (8)
ACCESS CONTROL
AC-4 (9)
HUMAN REVIEWS
ACCESS CONTROL
AC-4 (10)
ACCESS CONTROL
AC-4 (11)
ACCESS CONTROL
AC-4 (12)
ACCESS CONTROL
AC-4 (13)
ACCESS CONTROL
AC-4 (14)
ACCESS CONTROL
AC-4 (15)
DETECTION OF UNSANCTIONED
INFORMATION
ACCESS CONTROL
AC-4 (16)
INFORMATION TRANSFERS ON
INTERCONNECTED SYSTEMS
ACCESS CONTROL
AC-4 (17)
DOMAIN AUTHENTICATION
ACCESS CONTROL
AC-4 (18)
ACCESS CONTROL
AC-4 (19)
VALIDATION OF METADATA
ACCESS CONTROL
AC-4 (20)
APPROVED SOLUTIONS
ACCESS CONTROL
AC-4 (21)
ACCESS CONTROL
AC-4 (22)
ACCESS ONLY
ACCESS CONTROL
AC-5
SEPARATION OF DUTIES
ACCESS CONTROL
AC-5a.
SEPARATION OF DUTIES
ACCESS CONTROL
AC-5b.
SEPARATION OF DUTIES
ACCESS CONTROL
AC-5c.
SEPARATION OF DUTIES
ACCESS CONTROL
AC-6
LEAST PRIVILEGE
ACCESS CONTROL
AC-6 (1)
ACCESS CONTROL
AC-6 (2)
ACCESS CONTROL
AC-6 (3)
ACCESS CONTROL
AC-6 (4)
ACCESS CONTROL
AC-6 (5)
PRIVILEGED ACCOUNTS
ACCESS CONTROL
AC-6 (6)
ACCESS CONTROL
AC-6 (7)
ACCESS CONTROL
AC-6 (7)(a)
ACCESS CONTROL
AC-6 (7)(b)
ACCESS CONTROL
AC-6 (8)
ACCESS CONTROL
AC-6 (9)
ACCESS CONTROL
AC-6 (10)
ACCESS CONTROL
AC-7
ACCESS CONTROL
AC-7a.
ACCESS CONTROL
AC-7b.
ACCESS CONTROL
AC-7 (1)
ACCESS CONTROL
AC-7 (2)
ACCESS CONTROL
AC-8
ACCESS CONTROL
AC-8a.
ACCESS CONTROL
AC-8a.1.
ACCESS CONTROL
AC-8a.2.
ACCESS CONTROL
AC-8a.3.
ACCESS CONTROL
AC-8a.4.
ACCESS CONTROL
AC-8b.
ACCESS CONTROL
AC-8c.
ACCESS CONTROL
AC-8c.1.
ACCESS CONTROL
AC-8c.2.
ACCESS CONTROL
AC-8c.3.
ACCESS CONTROL
AC-9
ACCESS CONTROL
AC-9 (1)
UNSUCCESSFUL LOGONS
ACCESS CONTROL
AC-9 (2)
ACCESS CONTROL
AC-9 (3)
ACCESS CONTROL
AC-9 (4)
ACCESS CONTROL
AC-10
ACCESS CONTROL
AC-11
SESSION LOCK
ACCESS CONTROL
AC-11a.
SESSION LOCK
ACCESS CONTROL
AC-11b.
SESSION LOCK
ACCESS CONTROL
AC-11 (1)
PATTERN-HIDING DISPLAYS
ACCESS CONTROL
AC-12
SESSION TERMINATION
ACCESS CONTROL
AC-12 (1)
ACCESS CONTROL
AC-12 (1)(a)
ACCESS CONTROL
AC-12 (1)(b)
ACCESS CONTROL
AC-13
ACCESS CONTROL
AC-14
ACCESS CONTROL
AC-14a.
ACCESS CONTROL
AC-14b.
ACCESS CONTROL
AC-14 (1)
NECESSARY USES
ACCESS CONTROL
AC-15
AUTOMATED MARKING
ACCESS CONTROL
AC-16
SECURITY ATTRIBUTES
ACCESS CONTROL
AC-16a.
SECURITY ATTRIBUTES
ACCESS CONTROL
AC-16b.
SECURITY ATTRIBUTES
ACCESS CONTROL
AC-16c.
SECURITY ATTRIBUTES
ACCESS CONTROL
AC-16d.
SECURITY ATTRIBUTES
ACCESS CONTROL
AC-16 (1)
ACCESS CONTROL
AC-16 (2)
ACCESS CONTROL
AC-16 (3)
ACCESS CONTROL
AC-16 (4)
ASSOCIATION OF ATTRIBUTES BY
AUTHORIZED INDIVIDUALS
ACCESS CONTROL
AC-16 (5)
ACCESS CONTROL
AC-16 (6)
ACCESS CONTROL
AC-16 (7)
ACCESS CONTROL
AC-16 (8)
ACCESS CONTROL
AC-16 (9)
ATTRIBUTE REASSIGNMENT
ACCESS CONTROL
AC-16 (10)
ATTRIBUTE CONFIGURATION BY
AUTHORIZED INDIVIDUALS
ACCESS CONTROL
AC-17
REMOTE ACCESS
ACCESS CONTROL
AC-17a.
REMOTE ACCESS
ACCESS CONTROL
AC-17b.
REMOTE ACCESS
ACCESS CONTROL
AC-17 (1)
ACCESS CONTROL
AC-17 (2)
PROTECTION OF CONFIDENTIALITY /
INTEGRITY USING ENCRYPTION
ACCESS CONTROL
AC-17 (3)
ACCESS CONTROL
AC-17 (4)
ACCESS CONTROL
AC-17 (4)(a)
ACCESS CONTROL
AC-17 (4)(b)
ACCESS CONTROL
AC-17 (5)
ACCESS CONTROL
AC-17 (6)
PROTECTION OF INFORMATION
ACCESS CONTROL
AC-17 (7)
ACCESS CONTROL
AC-17 (8)
ACCESS CONTROL
AC-17 (9)
ACCESS CONTROL
AC-18
WIRELESS ACCESS
ACCESS CONTROL
AC-18a.
WIRELESS ACCESS
ACCESS CONTROL
AC-18b.
WIRELESS ACCESS
ACCESS CONTROL
AC-18 (1)
ACCESS CONTROL
AC-18 (2)
MONITORING UNAUTHORIZED
CONNECTIONS
ACCESS CONTROL
AC-18 (3)
ACCESS CONTROL
AC-18 (4)
ACCESS CONTROL
AC-18 (5)
ACCESS CONTROL
AC-19
ACCESS CONTROL
AC-19a.
ACCESS CONTROL
AC-19b.
ACCESS CONTROL
AC-19 (1)
ACCESS CONTROL
AC-19 (2)
ACCESS CONTROL
AC-19 (3)
ACCESS CONTROL
AC-19 (4)
ACCESS CONTROL
AC-19 (4)(a)
ACCESS CONTROL
AC-19 (4)(b)
ACCESS CONTROL
AC-19 (4)(b)(1)
ACCESS CONTROL
AC-19 (4)(b)(2)
ACCESS CONTROL
AC-19 (4)(b)(3)
ACCESS CONTROL
AC-19 (4)(b)(4)
ACCESS CONTROL
AC-19 (4)(c)
ACCESS CONTROL
AC-19 (5)
ACCESS CONTROL
AC-20
ACCESS CONTROL
AC-20a.
ACCESS CONTROL
AC-20b.
ACCESS CONTROL
AC-20 (1)
ACCESS CONTROL
AC-20 (1)(a)
ACCESS CONTROL
AC-20 (1)(b)
ACCESS CONTROL
AC-20 (2)
ACCESS CONTROL
AC-20 (3)
ACCESS CONTROL
AC-20 (4)
ACCESS CONTROL
AC-21
INFORMATION SHARING
ACCESS CONTROL
AC-21a.
INFORMATION SHARING
ACCESS CONTROL
AC-21b.
INFORMATION SHARING
ACCESS CONTROL
AC-21 (1)
ACCESS CONTROL
AC-21 (2)
ACCESS CONTROL
AC-22
ACCESS CONTROL
AC-22a.
ACCESS CONTROL
AC-22b.
ACCESS CONTROL
AC-22c.
ACCESS CONTROL
AC-22d.
ACCESS CONTROL
AC-23
ACCESS CONTROL
AC-24
ACCESS CONTROL
AC-24 (1)
ACCESS CONTROL
AC-24 (2)
ACCESS CONTROL
AC-25
REFERENCE MONITOR
AWARENESS AND
TRAINING
AT-1
AWARENESS AND
TRAINING
AT-1a.
AWARENESS AND
TRAINING
AT-1a.1.
AWARENESS AND
TRAINING
AT-1a.2.
AWARENESS AND
TRAINING
AT-1b.
AWARENESS AND
TRAINING
AT-1b.1.
AWARENESS AND
TRAINING
AT-1b.2.
AWARENESS AND
TRAINING
AT-2
AWARENESS AND
TRAINING
AT-2a.
AWARENESS AND
TRAINING
AT-2b.
AWARENESS AND
TRAINING
AT-2c.
AWARENESS AND
TRAINING
AT-2 (1)
PRACTICAL EXERCISES
AWARENESS AND
TRAINING
AT-2 (2)
INSIDER THREAT
AWARENESS AND
TRAINING
AT-3
AWARENESS AND
TRAINING
AT-3a.
AWARENESS AND
TRAINING
AT-3b.
AWARENESS AND
TRAINING
AT-3c.
AWARENESS AND
TRAINING
AT-3 (1)
ENVIRONMENTAL CONTROLS
AWARENESS AND
TRAINING
AT-3 (2)
AWARENESS AND
TRAINING
AT-3 (3)
PRACTICAL EXERCISES
AWARENESS AND
TRAINING
AT-3 (4)
AWARENESS AND
TRAINING
AT-4
AWARENESS AND
TRAINING
AT-4a.
AWARENESS AND
TRAINING
AT-4b.
AWARENESS AND
TRAINING
AT-5
AUDIT AND
ACCOUNTABILITY
AU-1
AUDIT AND
ACCOUNTABILITY
AU-1a.
AUDIT AND
ACCOUNTABILITY
AU-1a.1.
AUDIT AND
ACCOUNTABILITY
AU-1a.2.
AUDIT AND
ACCOUNTABILITY
AU-1b.
AUDIT AND
ACCOUNTABILITY
AU-1b.1.
AUDIT AND
ACCOUNTABILITY
AU-1b.2.
AUDIT AND
ACCOUNTABILITY
AU-2
AUDIT EVENTS
AUDIT AND
ACCOUNTABILITY
AU-2a.
AUDIT EVENTS
AUDIT AND
ACCOUNTABILITY
AU-2b.
AUDIT EVENTS
AUDIT AND
ACCOUNTABILITY
AU-2c.
AUDIT EVENTS
AUDIT AND
ACCOUNTABILITY
AU-2d.
AUDIT EVENTS
AUDIT AND
ACCOUNTABILITY
AU-2 (1)
AUDIT AND
ACCOUNTABILITY
AU-2 (2)
AUDIT AND
ACCOUNTABILITY
AU-2 (3)
AUDIT AND
ACCOUNTABILITY
AU-2 (4)
PRIVILEGED FUNCTIONS
AUDIT AND
ACCOUNTABILITY
AU-3
AUDIT AND
ACCOUNTABILITY
AU-3 (1)
AUDIT AND
ACCOUNTABILITY
AU-3 (2)
AUDIT AND
ACCOUNTABILITY
AU-4
AUDIT AND
ACCOUNTABILITY
AU-4 (1)
AUDIT AND
ACCOUNTABILITY
AU-5
AUDIT AND
ACCOUNTABILITY
AU-5a.
AUDIT AND
ACCOUNTABILITY
AU-5b.
AUDIT AND
ACCOUNTABILITY
AU-5 (1)
AUDIT AND
ACCOUNTABILITY
AU-5 (2)
REAL-TIME ALERTS
AUDIT AND
ACCOUNTABILITY
AU-5 (3)
AUDIT AND
ACCOUNTABILITY
AU-5 (4)
SHUTDOWN ON FAILURE
AUDIT AND
ACCOUNTABILITY
AU-6
AUDIT AND
ACCOUNTABILITY
AU-6a.
AUDIT AND
ACCOUNTABILITY
AU-6b.
AUDIT AND
ACCOUNTABILITY
AU-6 (1)
PROCESS INTEGRATION
AUDIT AND
ACCOUNTABILITY
AU-6 (2)
AUDIT AND
ACCOUNTABILITY
AU-6 (3)
AUDIT AND
ACCOUNTABILITY
AU-6 (4)
AUDIT AND
ACCOUNTABILITY
AU-6 (5)
AUDIT AND
ACCOUNTABILITY
AU-6 (6)
AUDIT AND
ACCOUNTABILITY
AU-6 (7)
PERMITTED ACTIONS
AUDIT AND
ACCOUNTABILITY
AU-6 (8)
AUDIT AND
ACCOUNTABILITY
AU-6 (9)
AUDIT AND
ACCOUNTABILITY
AU-6 (10)
AUDIT AND
ACCOUNTABILITY
AU-7
AUDIT AND
ACCOUNTABILITY
AU-7a.
AUDIT AND
ACCOUNTABILITY
AU-7b.
AUDIT AND
ACCOUNTABILITY
AU-7 (1)
AUTOMATIC PROCESSING
AUDIT AND
ACCOUNTABILITY
AU-7 (2)
AUDIT AND
ACCOUNTABILITY
AU-8
TIME STAMPS
AUDIT AND
ACCOUNTABILITY
AU-8a.
TIME STAMPS
AUDIT AND
ACCOUNTABILITY
AU-8b.
TIME STAMPS
AUDIT AND
ACCOUNTABILITY
AU-8 (1)
AUDIT AND
ACCOUNTABILITY
AU-8 (1)(a)
AUDIT AND
ACCOUNTABILITY
AU-8 (1)(b)
AUDIT AND
ACCOUNTABILITY
AU-8 (2)
AUDIT AND
ACCOUNTABILITY
AU-9
AUDIT AND
ACCOUNTABILITY
AU-9 (1)
AUDIT AND
ACCOUNTABILITY
AU-9 (2)
AUDIT AND
ACCOUNTABILITY
AU-9 (3)
CRYPTOGRAPHIC PROTECTION
AUDIT AND
ACCOUNTABILITY
AU-9 (4)
AUDIT AND
ACCOUNTABILITY
AU-9 (5)
DUAL AUTHORIZATION
AUDIT AND
ACCOUNTABILITY
AU-9 (6)
AUDIT AND
ACCOUNTABILITY
AU-10
NON-REPUDIATION
AUDIT AND
ACCOUNTABILITY
AU-10 (1)
ASSOCIATION OF IDENTITIES
AUDIT AND
ACCOUNTABILITY
AU-10 (1)(a)
ASSOCIATION OF IDENTITIES
AUDIT AND
ACCOUNTABILITY
AU-10 (1)(b)
ASSOCIATION OF IDENTITIES
AUDIT AND
ACCOUNTABILITY
AU-10 (2)
AUDIT AND
ACCOUNTABILITY
AU-10 (2)(a)
AUDIT AND
ACCOUNTABILITY
AU-10 (2)(b)
AUDIT AND
ACCOUNTABILITY
AU-10 (3)
CHAIN OF CUSTODY
AUDIT AND
ACCOUNTABILITY
AU-10 (4)
AUDIT AND
ACCOUNTABILITY
AU-10 (4)(a)
AUDIT AND
ACCOUNTABILITY
AU-10 (4)(b)
AUDIT AND
ACCOUNTABILITY
AU-10 (5)
DIGITAL SIGNATURES
AUDIT AND
ACCOUNTABILITY
AU-11
AUDIT AND
ACCOUNTABILITY
AU-11 (1)
AUDIT AND
ACCOUNTABILITY
AU-12
AUDIT GENERATION
AUDIT AND
ACCOUNTABILITY
AU-12a.
AUDIT GENERATION
AUDIT AND
ACCOUNTABILITY
AU-12b.
AUDIT GENERATION
AUDIT AND
ACCOUNTABILITY
AU-12c.
AUDIT GENERATION
AUDIT AND
ACCOUNTABILITY
AU-12 (1)
AUDIT AND
ACCOUNTABILITY
AU-12 (2)
STANDARDIZED FORMATS
AUDIT AND
ACCOUNTABILITY
AU-12 (3)
AUDIT AND
ACCOUNTABILITY
AU-13
AUDIT AND
ACCOUNTABILITY
AU-13 (1)
AUDIT AND
ACCOUNTABILITY
AU-13 (2)
AUDIT AND
ACCOUNTABILITY
AU-14
SESSION AUDIT
AUDIT AND
ACCOUNTABILITY
AU-14 (1)
SYSTEM START-UP
AUDIT AND
ACCOUNTABILITY
AU-14 (2)
AUDIT AND
ACCOUNTABILITY
AU-14 (3)
AUDIT AND
ACCOUNTABILITY
AU-15
AUDIT AND
ACCOUNTABILITY
AU-16
CROSS-ORGANIZATIONAL AUDITING
AUDIT AND
ACCOUNTABILITY
AU-16 (1)
IDENTITY PRESERVATION
AUDIT AND
ACCOUNTABILITY
AU-16 (2)
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-1
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-1a.
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-1a.1.
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-1a.2.
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-1b.
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-1b.1.
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-1b.2.
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-2
SECURITY ASSESSMENTS
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-2a.
SECURITY ASSESSMENTS
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-2a.1.
SECURITY ASSESSMENTS
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-2a.2.
SECURITY ASSESSMENTS
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-2a.3.
SECURITY ASSESSMENTS
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-2b.
SECURITY ASSESSMENTS
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-2c.
SECURITY ASSESSMENTS
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-2d.
SECURITY ASSESSMENTS
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-2 (1)
INDEPENDENT ASSESSORS
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-2 (2)
SPECIALIZED ASSESSMENTS
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-2 (3)
EXTERNAL ORGANIZATIONS
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-3
SYSTEM INTERCONNECTIONS
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-3a.
SYSTEM INTERCONNECTIONS
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-3b.
SYSTEM INTERCONNECTIONS
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-3c.
SYSTEM INTERCONNECTIONS
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-3 (1)
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-3 (2)
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-3 (3)
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-3 (4)
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-3 (5)
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-4
SECURITY CERTIFICATION
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-5
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-5a.
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-5b.
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-5 (1)
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-6
SECURITY AUTHORIZATION
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-6a.
SECURITY AUTHORIZATION
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-6b.
SECURITY AUTHORIZATION
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-6c.
SECURITY AUTHORIZATION
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-7
CONTINUOUS MONITORING
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-7a.
CONTINUOUS MONITORING
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-7b.
CONTINUOUS MONITORING
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-7c.
CONTINUOUS MONITORING
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-7d.
CONTINUOUS MONITORING
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-7e.
CONTINUOUS MONITORING
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-7f.
CONTINUOUS MONITORING
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-7g.
CONTINUOUS MONITORING
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-7 (1)
INDEPENDENT ASSESSMENT
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-7 (2)
TYPES OF ASSESSMENTS
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-7 (3)
TREND ANALYSES
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-8
PENETRATION TESTING
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-8 (1)
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-8 (2)
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-9
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-9a.
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-9b.
SECURITY ASSESSMENT
AND AUTHORIZATION
CA-9 (1)
CONFIGURATION
MANAGEMENT
CM-1
CONFIGURATION
MANAGEMENT
CM-1a.
CONFIGURATION
MANAGEMENT
CM-1a.1.
CONFIGURATION
MANAGEMENT
CM-1a.2.
CONFIGURATION
MANAGEMENT
CM-1b.
CONFIGURATION
MANAGEMENT
CM-1b.1.
CONFIGURATION
MANAGEMENT
CM-1b.2.
CONFIGURATION
MANAGEMENT
CM-2
BASELINE CONFIGURATION
CONFIGURATION
MANAGEMENT
CM-2 (1)
CONFIGURATION
MANAGEMENT
CM-2 (1)(a)
CONFIGURATION
MANAGEMENT
CM-2 (1)(b)
CONFIGURATION
MANAGEMENT
CM-2 (1)(c)
CONFIGURATION
MANAGEMENT
CM-2 (2)
CONFIGURATION
MANAGEMENT
CM-2 (3)
CONFIGURATION
MANAGEMENT
CM-2 (4)
UNAUTHORIZED SOFTWARE
CONFIGURATION
MANAGEMENT
CM-2 (5)
AUTHORIZED SOFTWARE
CONFIGURATION
MANAGEMENT
CM-2 (6)
CONFIGURATION
MANAGEMENT
CM-2 (7)
CONFIGURATION
MANAGEMENT
CM-2 (7)(a)
CONFIGURATION
MANAGEMENT
CM-2 (7)(b)
CONFIGURATION
MANAGEMENT
CM-3
CONFIGURATION
MANAGEMENT
CM-3a.
CONFIGURATION
MANAGEMENT
CM-3b.
CONFIGURATION
MANAGEMENT
CM-3c.
CONFIGURATION
MANAGEMENT
CM-3d.
CONFIGURATION
MANAGEMENT
CM-3e.
CONFIGURATION
MANAGEMENT
CM-3f.
CONFIGURATION
MANAGEMENT
CM-3g.
CONFIGURATION
MANAGEMENT
CM-3 (1)
CONFIGURATION
MANAGEMENT
CM-3 (1)(a)
CONFIGURATION
MANAGEMENT
CM-3 (1)(b)
CONFIGURATION
MANAGEMENT
CM-3 (1)(c)
CONFIGURATION
MANAGEMENT
CM-3 (1)(d)
CONFIGURATION
MANAGEMENT
CM-3 (1)(e)
CONFIGURATION
MANAGEMENT
CM-3 (1)(f)
CONFIGURATION
MANAGEMENT
CM-3 (2)
CONFIGURATION
MANAGEMENT
CM-3 (3)
CONFIGURATION
MANAGEMENT
CM-3 (4)
SECURITY REPRESENTATIVE
CONFIGURATION
MANAGEMENT
CM-3 (5)
CONFIGURATION
MANAGEMENT
CM-3 (6)
CRYPTOGRAPHY MANAGEMENT
CONFIGURATION
MANAGEMENT
CM-4
CONFIGURATION
MANAGEMENT
CM-4 (1)
CONFIGURATION
MANAGEMENT
CM-4 (2)
CONFIGURATION
MANAGEMENT
CM-5
CONFIGURATION
MANAGEMENT
CM-5 (1)
CONFIGURATION
MANAGEMENT
CM-5 (2)
CONFIGURATION
MANAGEMENT
CM-5 (3)
SIGNED COMPONENTS
CONFIGURATION
MANAGEMENT
CM-5 (4)
DUAL AUTHORIZATION
CONFIGURATION
MANAGEMENT
CM-5 (5)
CONFIGURATION
MANAGEMENT
CM-5 (5)(a)
CONFIGURATION
MANAGEMENT
CM-5 (5)(b)
CONFIGURATION
MANAGEMENT
CM-5 (6)
CONFIGURATION
MANAGEMENT
CM-5 (7)
CONFIGURATION
MANAGEMENT
CM-6
CONFIGURATION SETTINGS
CONFIGURATION
MANAGEMENT
CM-6a.
CONFIGURATION
MANAGEMENT
CM-6b.
CONFIGURATION
MANAGEMENT
CM-6c.
CONFIGURATION
MANAGEMENT
CM-6d.
CONFIGURATION
MANAGEMENT
CM-6 (1)
CONFIGURATION
MANAGEMENT
CM-6 (2)
CONFIGURATION
MANAGEMENT
CM-6 (3)
CONFIGURATION
MANAGEMENT
CM-6 (4)
CONFORMANCE DEMONSTRATION
CONFIGURATION
MANAGEMENT
CM-7
LEAST FUNCTIONALITY
CONFIGURATION
MANAGEMENT
CM-7a.
LEAST FUNCTIONALITY
CONFIGURATION
MANAGEMENT
CM-7b.
LEAST FUNCTIONALITY
CONFIGURATION
MANAGEMENT
CM-7 (1)
PERIODIC REVIEW
CONFIGURATION
MANAGEMENT
CM-7 (1)(a)
PERIODIC REVIEW
CONFIGURATION
MANAGEMENT
CM-7 (1)(b)
PERIODIC REVIEW
CONFIGURATION
MANAGEMENT
CM-7 (2)
CONFIGURATION
MANAGEMENT
CM-7 (3)
REGISTRATION COMPLIANCE
CONFIGURATION
MANAGEMENT
CM-7 (4)
CONFIGURATION
MANAGEMENT
CM-7 (4)(a)
CONFIGURATION
MANAGEMENT
CM-7 (4)(b)
CONFIGURATION
MANAGEMENT
CM-7 (4)(c)
CONFIGURATION
MANAGEMENT
CM-7 (5)
CONFIGURATION
MANAGEMENT
CM-7 (5)(a)
CONFIGURATION
MANAGEMENT
CM-7 (5)(b)
CONFIGURATION
MANAGEMENT
CM-7 (5)(c)
CONFIGURATION
MANAGEMENT
CM-8
CONFIGURATION
MANAGEMENT
CM-8a.
CONFIGURATION
MANAGEMENT
CM-8a.1.
CONFIGURATION
MANAGEMENT
CM-8a.2.
CONFIGURATION
MANAGEMENT
CM-8a.3.
CONFIGURATION
MANAGEMENT
CM-8a.4.
CONFIGURATION
MANAGEMENT
CM-8b.
CONFIGURATION
MANAGEMENT
CM-8 (1)
CONFIGURATION
MANAGEMENT
CM-8 (2)
AUTOMATED MAINTENANCE
CONFIGURATION
MANAGEMENT
CM-8 (3)
CONFIGURATION
MANAGEMENT
CM-8 (3)(a)
CONFIGURATION
MANAGEMENT
CM-8 (3)(b)
CONFIGURATION
MANAGEMENT
CM-8 (4)
ACCOUNTABILITY INFORMATION
CONFIGURATION
MANAGEMENT
CM-8 (5)
NO DUPLICATE ACCOUNTING OF
COMPONENTS
CONFIGURATION
MANAGEMENT
CM-8 (6)
CONFIGURATION
MANAGEMENT
CM-8 (7)
CENTRALIZED REPOSITORY
CONFIGURATION
MANAGEMENT
CM-8 (8)
CONFIGURATION
MANAGEMENT
CM-8 (9)
CONFIGURATION
MANAGEMENT
CM-8 (9)(a)
CONFIGURATION
MANAGEMENT
CM-8 (9)(b)
CONFIGURATION
MANAGEMENT
CM-9
CONFIGURATION
MANAGEMENT
CM-9a.
CONFIGURATION
MANAGEMENT
CM-9b.
CONFIGURATION
MANAGEMENT
CM-9c.
CONFIGURATION
MANAGEMENT
CM-9d.
CONFIGURATION
MANAGEMENT
CM-9 (1)
ASSIGNMENT OF RESPONSIBILITY
CONFIGURATION
MANAGEMENT
CM-10
CONFIGURATION
MANAGEMENT
CM-10a.
CONFIGURATION
MANAGEMENT
CM-10b.
CONFIGURATION
MANAGEMENT
CM-10c.
CONFIGURATION
MANAGEMENT
CM-10 (1)
CONFIGURATION
MANAGEMENT
CM-11
USER-INSTALLED SOFTWARE
CONFIGURATION
MANAGEMENT
CM-11a.
USER-INSTALLED SOFTWARE
CONFIGURATION
MANAGEMENT
CM-11b.
USER-INSTALLED SOFTWARE
CONFIGURATION
MANAGEMENT
CM-11c.
USER-INSTALLED SOFTWARE
CONFIGURATION
MANAGEMENT
CM-11 (1)
CONFIGURATION
MANAGEMENT
CM-11 (2)
CONTINGENCY PLANNING
CP-1
CONTINGENCY PLANNING
CP-1a.
CONTINGENCY PLANNING
CP-1a.1.
CONTINGENCY PLANNING
CP-1a.2.
CONTINGENCY PLANNING
CP-1b.
CONTINGENCY PLANNING
CP-1b.1.
CONTINGENCY PLANNING
CP-1b.2.
CONTINGENCY PLANNING
CP-2
CONTINGENCY PLAN
CONTINGENCY PLANNING
CP-2a.
CONTINGENCY PLAN
CONTINGENCY PLANNING
CP-2a.1.
CONTINGENCY PLAN
CONTINGENCY PLANNING
CP-2a.2.
CONTINGENCY PLAN
CONTINGENCY PLANNING
CP-2a.3.
CONTINGENCY PLAN
CONTINGENCY PLANNING
CP-2a.4.
CONTINGENCY PLAN
CONTINGENCY PLANNING
CP-2a.5.
CONTINGENCY PLAN
CONTINGENCY PLANNING
CP-2a.6.
CONTINGENCY PLAN
CONTINGENCY PLANNING
CP-2b.
CONTINGENCY PLAN
CONTINGENCY PLANNING
CP-2c.
CONTINGENCY PLAN
CONTINGENCY PLANNING
CP-2d.
CONTINGENCY PLAN
CONTINGENCY PLANNING
CP-2e.
CONTINGENCY PLAN
CONTINGENCY PLANNING
CP-2f.
CONTINGENCY PLAN
CONTINGENCY PLANNING
CP-2g.
CONTINGENCY PLAN
CONTINGENCY PLANNING
CP-2 (1)
CONTINGENCY PLANNING
CP-2 (2)
CAPACITY PLANNING
CONTINGENCY PLANNING
CP-2 (3)
CONTINGENCY PLANNING
CP-2 (4)
CONTINGENCY PLANNING
CP-2 (5)
CONTINGENCY PLANNING
CP-2 (6)
CONTINGENCY PLANNING
CP-2 (7)
CONTINGENCY PLANNING
CP-2 (8)
CONTINGENCY PLANNING
CP-3
CONTINGENCY TRAINING
CONTINGENCY PLANNING
CP-3a.
CONTINGENCY TRAINING
CONTINGENCY PLANNING
CP-3b.
CONTINGENCY TRAINING
CONTINGENCY PLANNING
CP-3c.
CONTINGENCY TRAINING
CONTINGENCY PLANNING
CP-3 (1)
SIMULATED EVENTS
CONTINGENCY PLANNING
CP-3 (2)
CONTINGENCY PLANNING
CP-4
CONTINGENCY PLANNING
CP-4a.
CONTINGENCY PLANNING
CP-4b.
CONTINGENCY PLANNING
CP-4c.
CONTINGENCY PLANNING
CP-4 (1)
CONTINGENCY PLANNING
CP-4 (2)
CONTINGENCY PLANNING
CP-4 (2)(a)
CONTINGENCY PLANNING
CP-4 (2)(b)
CONTINGENCY PLANNING
CP-4 (3)
AUTOMATED TESTING
CONTINGENCY PLANNING
CP-4 (4)
CONTINGENCY PLANNING
CP-5
CONTINGENCY PLANNING
CP-6
CONTINGENCY PLANNING
CP-6a.
CONTINGENCY PLANNING
CP-6b.
CONTINGENCY PLANNING
CP-6 (1)
CONTINGENCY PLANNING
CP-6 (2)
CONTINGENCY PLANNING
CP-6 (3)
ACCESSIBILITY
CONTINGENCY PLANNING
CP-7
CONTINGENCY PLANNING
CP-7a.
CONTINGENCY PLANNING
CP-7b.
CONTINGENCY PLANNING
CP-7c.
CONTINGENCY PLANNING
CP-7 (1)
CONTINGENCY PLANNING
CP-7 (2)
ACCESSIBILITY
CONTINGENCY PLANNING
CP-7 (3)
PRIORITY OF SERVICE
CONTINGENCY PLANNING
CP-7 (4)
CONTINGENCY PLANNING
CP-7 (5)
CONTINGENCY PLANNING
CP-7 (6)
CONTINGENCY PLANNING
CP-8
TELECOMMUNICATIONS SERVICES
CONTINGENCY PLANNING
CP-8 (1)
CONTINGENCY PLANNING
CP-8 (1)(a)
CONTINGENCY PLANNING
CP-8 (1)(b)
CONTINGENCY PLANNING
CP-8 (2)
CONTINGENCY PLANNING
CP-8 (3)
CONTINGENCY PLANNING
CP-8 (4)
CONTINGENCY PLANNING
CP-8 (4)(a)
CONTINGENCY PLANNING
CP-8 (4)(b)
CONTINGENCY PLANNING
CP-8 (4)(c)
CONTINGENCY PLANNING
CP-8 (5)
CONTINGENCY PLANNING
CP-9
CONTINGENCY PLANNING
CP-9a.
CONTINGENCY PLANNING
CP-9b.
CONTINGENCY PLANNING
CP-9c.
CONTINGENCY PLANNING
CP-9d.
CONTINGENCY PLANNING
CP-9 (1)
CONTINGENCY PLANNING
CP-9 (2)
CONTINGENCY PLANNING
CP-9 (3)
CONTINGENCY PLANNING
CP-9 (4)
CONTINGENCY PLANNING
CP-9 (5)
CONTINGENCY PLANNING
CP-9 (6)
CONTINGENCY PLANNING
CP-9 (7)
DUAL AUTHORIZATION
CONTINGENCY PLANNING
CP-10
CONTINGENCY PLANNING
CP-10 (1)
CONTINGENCY PLANNING
CP-10 (2)
TRANSACTION RECOVERY
CONTINGENCY PLANNING
CP-10 (3)
CONTINGENCY PLANNING
CP-10 (4)
CONTINGENCY PLANNING
CP-10 (5)
FAILOVER CAPABILITY
CONTINGENCY PLANNING
CP-10 (6)
COMPONENT PROTECTION
CONTINGENCY PLANNING
CP-11
CONTINGENCY PLANNING
CP-12
SAFE MODE
CONTINGENCY PLANNING
CP-13
IDENTIFICATION AND
AUTHENTICATION
IA-1
IDENTIFICATION AND
AUTHENTICATION
IA-1a.
IDENTIFICATION AND
AUTHENTICATION
IA-1a.1.
IDENTIFICATION AND
AUTHENTICATION
IA-1a.2.
IDENTIFICATION AND
AUTHENTICATION
IA-1b.
IDENTIFICATION AND
AUTHENTICATION
IA-1b.1.
IDENTIFICATION AND
AUTHENTICATION
IA-1b.2.
IDENTIFICATION AND
AUTHENTICATION
IA-2
IDENTIFICATION AND
AUTHENTICATION
IA-2 (1)
IDENTIFICATION AND
AUTHENTICATION
IA-2 (2)
IDENTIFICATION AND
AUTHENTICATION
IA-2 (3)
IDENTIFICATION AND
AUTHENTICATION
IA-2 (4)
IDENTIFICATION AND
AUTHENTICATION
IA-2 (5)
GROUP AUTHENTICATION
IDENTIFICATION AND
AUTHENTICATION
IA-2 (6)
IDENTIFICATION AND
AUTHENTICATION
IA-2 (7)
IDENTIFICATION AND
AUTHENTICATION
IA-2 (8)
IDENTIFICATION AND
AUTHENTICATION
IA-2 (9)
IDENTIFICATION AND
AUTHENTICATION
IA-2 (10)
SINGLE SIGN-ON
IDENTIFICATION AND
AUTHENTICATION
IA-2 (11)
IDENTIFICATION AND
AUTHENTICATION
IA-2 (12)
IDENTIFICATION AND
AUTHENTICATION
IA-2 (13)
OUT-OF-BAND AUTHENTICATION
IDENTIFICATION AND
AUTHENTICATION
IA-3
IDENTIFICATION AND
AUTHENTICATION
IA-3 (1)
CRYPTOGRAPHIC BIDIRECTIONAL
AUTHENTICATION
IDENTIFICATION AND
AUTHENTICATION
IA-3 (2)
IDENTIFICATION AND
AUTHENTICATION
IA-3 (3)
IDENTIFICATION AND
AUTHENTICATION
IA-3 (3)(a)
IDENTIFICATION AND
AUTHENTICATION
IA-3 (3)(b)
IDENTIFICATION AND
AUTHENTICATION
IA-3 (4)
DEVICE ATTESTATION
IDENTIFICATION AND
AUTHENTICATION
IA-4
IDENTIFIER MANAGEMENT
IDENTIFICATION AND
AUTHENTICATION
IA-4a.
IDENTIFIER MANAGEMENT
IDENTIFICATION AND
AUTHENTICATION
IA-4b.
IDENTIFIER MANAGEMENT
IDENTIFICATION AND
AUTHENTICATION
IA-4c.
IDENTIFIER MANAGEMENT
IDENTIFICATION AND
AUTHENTICATION
IA-4d.
IDENTIFIER MANAGEMENT
IDENTIFICATION AND
AUTHENTICATION
IA-4e.
IDENTIFIER MANAGEMENT
IDENTIFICATION AND
AUTHENTICATION
IA-4 (1)
IDENTIFICATION AND
AUTHENTICATION
IA-4 (2)
SUPERVISOR AUTHORIZATION
IDENTIFICATION AND
AUTHENTICATION
IA-4 (3)
IDENTIFICATION AND
AUTHENTICATION
IA-4 (4)
IDENTIFICATION AND
AUTHENTICATION
IA-4 (5)
DYNAMIC MANAGEMENT
IDENTIFICATION AND
AUTHENTICATION
IA-4 (6)
CROSS-ORGANIZATION MANAGEMENT
IDENTIFICATION AND
AUTHENTICATION
IA-4 (7)
IN-PERSON REGISTRATION
IDENTIFICATION AND
AUTHENTICATION
IA-5
AUTHENTICATOR MANAGEMENT
IDENTIFICATION AND
AUTHENTICATION
IA-5a.
AUTHENTICATOR MANAGEMENT
IDENTIFICATION AND
AUTHENTICATION
IA-5b.
AUTHENTICATOR MANAGEMENT
IDENTIFICATION AND
AUTHENTICATION
IA-5c.
AUTHENTICATOR MANAGEMENT
IDENTIFICATION AND
AUTHENTICATION
IA-5d.
AUTHENTICATOR MANAGEMENT
IDENTIFICATION AND
AUTHENTICATION
IA-5e.
AUTHENTICATOR MANAGEMENT
IDENTIFICATION AND
AUTHENTICATION
IA-5f.
AUTHENTICATOR MANAGEMENT
IDENTIFICATION AND
AUTHENTICATION
IA-5g.
AUTHENTICATOR MANAGEMENT
IDENTIFICATION AND
AUTHENTICATION
IA-5h.
AUTHENTICATOR MANAGEMENT
IDENTIFICATION AND
AUTHENTICATION
IA-5i.
AUTHENTICATOR MANAGEMENT
IDENTIFICATION AND
AUTHENTICATION
IA-5j.
AUTHENTICATOR MANAGEMENT
IDENTIFICATION AND
AUTHENTICATION
IA-5 (1)
PASSWORD-BASED AUTHENTICATION
IDENTIFICATION AND
AUTHENTICATION
IA-5 (1)(a)
PASSWORD-BASED AUTHENTICATION
IDENTIFICATION AND
AUTHENTICATION
IA-5 (1)(b)
PASSWORD-BASED AUTHENTICATION
IDENTIFICATION AND
AUTHENTICATION
IA-5 (1)(c)
PASSWORD-BASED AUTHENTICATION
IDENTIFICATION AND
AUTHENTICATION
IA-5 (1)(d)
PASSWORD-BASED AUTHENTICATION
IDENTIFICATION AND
AUTHENTICATION
IA-5 (1)(e)
PASSWORD-BASED AUTHENTICATION
IDENTIFICATION AND
AUTHENTICATION
IA-5 (1)(f)
PASSWORD-BASED AUTHENTICATION
IDENTIFICATION AND
AUTHENTICATION
IA-5 (2)
PKI-BASED AUTHENTICATION
IDENTIFICATION AND
AUTHENTICATION
IA-5 (2)(a)
PKI-BASED AUTHENTICATION
IDENTIFICATION AND
AUTHENTICATION
IA-5 (2)(b)
PKI-BASED AUTHENTICATION
IDENTIFICATION AND
AUTHENTICATION
IA-5 (2)(c)
PKI-BASED AUTHENTICATION
IDENTIFICATION AND
AUTHENTICATION
IA-5 (2)(d)
PKI-BASED AUTHENTICATION
IDENTIFICATION AND
AUTHENTICATION
IA-5 (3)
IDENTIFICATION AND
AUTHENTICATION
IA-5 (4)
IDENTIFICATION AND
AUTHENTICATION
IA-5 (5)
IDENTIFICATION AND
AUTHENTICATION
IA-5 (6)
PROTECTION OF AUTHENTICATORS
IDENTIFICATION AND
AUTHENTICATION
IA-5 (7)
IDENTIFICATION AND
AUTHENTICATION
IA-5 (8)
IDENTIFICATION AND
AUTHENTICATION
IA-5 (9)
CROSS-ORGANIZATION CREDENTIAL
MANAGEMENT
IDENTIFICATION AND
AUTHENTICATION
IA-5 (10)
IDENTIFICATION AND
AUTHENTICATION
IA-5 (11)
IDENTIFICATION AND
AUTHENTICATION
IA-5 (12)
BIOMETRIC-BASED AUTHENTICATION
IDENTIFICATION AND
AUTHENTICATION
IA-5 (13)
IDENTIFICATION AND
AUTHENTICATION
IA-5 (14)
IDENTIFICATION AND
AUTHENTICATION
IA-5 (15)
IDENTIFICATION AND
AUTHENTICATION
IA-6
AUTHENTICATOR FEEDBACK
IDENTIFICATION AND
AUTHENTICATION
IA-7
IDENTIFICATION AND
AUTHENTICATION
IA-8
IDENTIFICATION AND
AUTHENTICATION
IA-8 (1)
IDENTIFICATION AND
AUTHENTICATION
IA-8 (2)
IDENTIFICATION AND
AUTHENTICATION
IA-8 (3)
IDENTIFICATION AND
AUTHENTICATION
IA-8 (4)
IDENTIFICATION AND
AUTHENTICATION
IA-8 (5)
IDENTIFICATION AND
AUTHENTICATION
IA-9
IDENTIFICATION AND
AUTHENTICATION
IA-9 (1)
INFORMATION EXCHANGE
IDENTIFICATION AND
AUTHENTICATION
IA-9 (2)
TRANSMISSION OF DECISIONS
IDENTIFICATION AND
AUTHENTICATION
IA-10
IDENTIFICATION AND
AUTHENTICATION
IA-11
RE-AUTHENTICATION
INCIDENT RESPONSE
IR-1
INCIDENT RESPONSE
IR-1a.
INCIDENT RESPONSE
IR-1a.1.
INCIDENT RESPONSE
IR-1a.2.
INCIDENT RESPONSE
IR-1b.
INCIDENT RESPONSE
IR-1b.1.
INCIDENT RESPONSE
IR-1b.2.
INCIDENT RESPONSE
IR-2
INCIDENT RESPONSE
IR-2a.
INCIDENT RESPONSE
IR-2b.
INCIDENT RESPONSE
IR-2c.
INCIDENT RESPONSE
IR-2 (1)
SIMULATED EVENTS
INCIDENT RESPONSE
IR-2 (2)
INCIDENT RESPONSE
IR-3
INCIDENT RESPONSE
IR-3 (1)
AUTOMATED TESTING
INCIDENT RESPONSE
IR-3 (2)
INCIDENT RESPONSE
IR-4
INCIDENT HANDLING
INCIDENT RESPONSE
IR-4a.
INCIDENT HANDLING
INCIDENT RESPONSE
IR-4b.
INCIDENT HANDLING
INCIDENT RESPONSE
IR-4c.
INCIDENT HANDLING
INCIDENT RESPONSE
IR-4 (1)
INCIDENT RESPONSE
IR-4 (2)
DYNAMIC RECONFIGURATION
INCIDENT RESPONSE
IR-4 (3)
CONTINUITY OF OPERATIONS
INCIDENT RESPONSE
IR-4 (4)
INFORMATION CORRELATION
INCIDENT RESPONSE
IR-4 (5)
INCIDENT RESPONSE
IR-4 (6)
INCIDENT RESPONSE
IR-4 (7)
INCIDENT RESPONSE
IR-4 (8)
INCIDENT RESPONSE
IR-4 (9)
INCIDENT RESPONSE
IR-4 (10)
INCIDENT RESPONSE
IR-5
INCIDENT MONITORING
INCIDENT RESPONSE
IR-5 (1)
INCIDENT RESPONSE
IR-6
INCIDENT REPORTING
INCIDENT RESPONSE
IR-6a.
INCIDENT REPORTING
INCIDENT RESPONSE
IR-6b.
INCIDENT REPORTING
INCIDENT RESPONSE
IR-6 (1)
AUTOMATED REPORTING
INCIDENT RESPONSE
IR-6 (2)
INCIDENT RESPONSE
IR-6 (3)
INCIDENT RESPONSE
IR-7
INCIDENT RESPONSE
IR-7 (1)
INCIDENT RESPONSE
IR-7 (2)
INCIDENT RESPONSE
IR-7 (2)(a)
INCIDENT RESPONSE
IR-7 (2)(b)
INCIDENT RESPONSE
IR-8
INCIDENT RESPONSE
IR-8a.
INCIDENT RESPONSE
IR-8a.1.
INCIDENT RESPONSE
IR-8a.2.
INCIDENT RESPONSE
IR-8a.3.
INCIDENT RESPONSE
IR-8a.4.
INCIDENT RESPONSE
IR-8a.5.
INCIDENT RESPONSE
IR-8a.6.
INCIDENT RESPONSE
IR-8a.7.
INCIDENT RESPONSE
IR-8a.8.
INCIDENT RESPONSE
IR-8b.
INCIDENT RESPONSE
IR-8c.
INCIDENT RESPONSE
IR-8d.
INCIDENT RESPONSE
IR-8e.
INCIDENT RESPONSE
IR-8f.
INCIDENT RESPONSE
IR-9
INCIDENT RESPONSE
IR-9a.
INCIDENT RESPONSE
IR-9b.
INCIDENT RESPONSE
IR-9c.
INCIDENT RESPONSE
IR-9d.
INCIDENT RESPONSE
IR-9e.
INCIDENT RESPONSE
IR-9f.
INCIDENT RESPONSE
IR-9 (1)
RESPONSIBLE PERSONNEL
INCIDENT RESPONSE
IR-9 (2)
TRAINING
INCIDENT RESPONSE
IR-9 (3)
POST-SPILL OPERATIONS
INCIDENT RESPONSE
IR-9 (4)
INCIDENT RESPONSE
IR-10
MAINTENANCE
MA-1
MAINTENANCE
MA-1a.
MAINTENANCE
MA-1a.1.
MAINTENANCE
MA-1a.2.
MAINTENANCE
MA-1b.
MAINTENANCE
MA-1b.1.
MAINTENANCE
MA-1b.2.
MAINTENANCE
MA-2
CONTROLLED MAINTENANCE
MAINTENANCE
MA-2a.
CONTROLLED MAINTENANCE
MAINTENANCE
MA-2b.
CONTROLLED MAINTENANCE
MAINTENANCE
MA-2c.
CONTROLLED MAINTENANCE
MAINTENANCE
MA-2d.
CONTROLLED MAINTENANCE
MAINTENANCE
MA-2e.
CONTROLLED MAINTENANCE
MAINTENANCE
MA-2f.
CONTROLLED MAINTENANCE
MAINTENANCE
MA-2 (1)
RECORD CONTENT
MAINTENANCE
MA-2 (2)
MAINTENANCE
MA-2 (2)(a)
MAINTENANCE
MA-2 (2)(b)
MAINTENANCE
MA-3
MAINTENANCE TOOLS
MAINTENANCE
MA-3 (1)
INSPECT TOOLS
MAINTENANCE
MA-3 (2)
INSPECT MEDIA
MAINTENANCE
MA-3 (3)
MAINTENANCE
MA-3 (3)(a)
MAINTENANCE
MA-3 (3)(b)
MAINTENANCE
MA-3 (3)(c)
MAINTENANCE
MA-3 (3)(d)
MAINTENANCE
MA-3 (4)
MAINTENANCE
MA-4
NONLOCAL MAINTENANCE
MAINTENANCE
MA-4a.
NONLOCAL MAINTENANCE
MAINTENANCE
MA-4b.
NONLOCAL MAINTENANCE
MAINTENANCE
MA-4c.
NONLOCAL MAINTENANCE
MAINTENANCE
MA-4d.
NONLOCAL MAINTENANCE
MAINTENANCE
MA-4e.
NONLOCAL MAINTENANCE
MAINTENANCE
MA-4 (1)
MAINTENANCE
MA-4 (1)(a)
MAINTENANCE
MA-4 (1)(b)
MAINTENANCE
MA-4 (2)
MAINTENANCE
MA-4 (3)
MAINTENANCE
MA-4 (3)(a)
MAINTENANCE
MA-4 (3)(b)
MAINTENANCE
MA-4 (4)
AUTHENTICATION / SEPARATION OF
MAINTENANCE SESSIONS
MAINTENANCE
MA-4 (4)(a)
AUTHENTICATION / SEPARATION OF
MAINTENANCE SESSIONS
MAINTENANCE
MA-4 (4)(b)
AUTHENTICATION / SEPARATION OF
MAINTENANCE SESSIONS
MAINTENANCE
MA-4 (4)(b)(1)
AUTHENTICATION / SEPARATION OF
MAINTENANCE SESSIONS
MAINTENANCE
MA-4 (4)(b)(2)
AUTHENTICATION / SEPARATION OF
MAINTENANCE SESSIONS
MAINTENANCE
MA-4 (5)
MAINTENANCE
MA-4 (5)(a)
MAINTENANCE
MA-4 (5)(b)
MAINTENANCE
MA-4 (6)
CRYPTOGRAPHIC PROTECTION
MAINTENANCE
MA-4 (7)
MAINTENANCE
MA-5
MAINTENANCE PERSONNEL
MAINTENANCE
MA-5a.
MAINTENANCE PERSONNEL
MAINTENANCE
MA-5b.
MAINTENANCE PERSONNEL
MAINTENANCE
MA-5c.
MAINTENANCE PERSONNEL
MAINTENANCE
MA-5 (1)
MAINTENANCE
MA-5 (1)(a)
MAINTENANCE
MA-5 (1)(a)(1)
MAINTENANCE
MA-5 (1)(a)(2)
MAINTENANCE
MA-5 (1)(b)
MAINTENANCE
MA-5 (2)
MAINTENANCE
MA-5 (3)
MAINTENANCE
MA-5 (4)
FOREIGN NATIONALS
MAINTENANCE
MA-5 (4)(a)
FOREIGN NATIONALS
MAINTENANCE
MA-5 (4)(b)
FOREIGN NATIONALS
MAINTENANCE
MA-5 (5)
NONSYSTEM-RELATED MAINTENANCE
MAINTENANCE
MA-6
TIMELY MAINTENANCE
MAINTENANCE
MA-6 (1)
PREVENTIVE MAINTENANCE
MAINTENANCE
MA-6 (2)
PREDICTIVE MAINTENANCE
MAINTENANCE
MA-6 (3)
MEDIA PROTECTION
MP-1
MEDIA PROTECTION
MP-1a.
MEDIA PROTECTION
MP-1a.1.
MEDIA PROTECTION
MP-1a.2.
MEDIA PROTECTION
MP-1b.
MEDIA PROTECTION
MP-1b.1.
MEDIA PROTECTION
MP-1b.2.
MEDIA PROTECTION
MP-2
MEDIA ACCESS
MEDIA PROTECTION
MP-2 (1)
MEDIA PROTECTION
MP-2 (2)
CRYPTOGRAPHIC PROTECTION
MEDIA PROTECTION
MP-3
MEDIA MARKING
MEDIA PROTECTION
MP-3a.
MEDIA MARKING
MEDIA PROTECTION
MP-3b.
MEDIA MARKING
MEDIA PROTECTION
MP-4
MEDIA STORAGE
MEDIA PROTECTION
MP-4a.
MEDIA STORAGE
MEDIA PROTECTION
MP-4b.
MEDIA STORAGE
MEDIA PROTECTION
MP-4 (1)
CRYPTOGRAPHIC PROTECTION
MEDIA PROTECTION
MP-4 (2)
MEDIA PROTECTION
MP-5
MEDIA TRANSPORT
MEDIA PROTECTION
MP-5a.
MEDIA TRANSPORT
MEDIA PROTECTION
MP-5b.
MEDIA TRANSPORT
MEDIA PROTECTION
MP-5c.
MEDIA TRANSPORT
MEDIA PROTECTION
MP-5d.
MEDIA TRANSPORT
MEDIA PROTECTION
MP-5 (1)
MEDIA PROTECTION
MP-5 (2)
DOCUMENTATION OF ACTIVITIES
MEDIA PROTECTION
MP-5 (3)
CUSTODIANS
MEDIA PROTECTION
MP-5 (4)
CRYPTOGRAPHIC PROTECTION
MEDIA PROTECTION
MP-6
MEDIA SANITIZATION
MEDIA PROTECTION
MP-6a.
MEDIA SANITIZATION
MEDIA PROTECTION
MP-6b.
MEDIA SANITIZATION
MEDIA PROTECTION
MP-6 (1)
MEDIA PROTECTION
MP-6 (2)
EQUIPMENT TESTING
MEDIA PROTECTION
MP-6 (3)
NONDESTRUCTIVE TECHNIQUES
MEDIA PROTECTION
MP-6 (4)
MEDIA PROTECTION
MP-6 (5)
CLASSIFIED INFORMATION
MEDIA PROTECTION
MP-6 (6)
MEDIA DESTRUCTION
MEDIA PROTECTION
MP-6 (7)
DUAL AUTHORIZATION
MEDIA PROTECTION
MP-6 (8)
MEDIA PROTECTION
MP-7
MEDIA USE
MEDIA PROTECTION
MP-7 (1)
MEDIA PROTECTION
MP-7 (2)
MEDIA PROTECTION
MP-8
MEDIA DOWNGRADING
MEDIA PROTECTION
MP-8a.
MEDIA DOWNGRADING
MEDIA PROTECTION
MP-8b.
MEDIA DOWNGRADING
MEDIA PROTECTION
MP-8c.
MEDIA DOWNGRADING
MEDIA PROTECTION
MP-8d.
MEDIA DOWNGRADING
MEDIA PROTECTION
MP-8 (1)
DOCUMENTATION OF PROCESS
MEDIA PROTECTION
MP-8 (2)
EQUIPMENT TESTING
MEDIA PROTECTION
MP-8 (3)
MEDIA PROTECTION
MP-8 (4)
CLASSIFIED INFORMATION
PHYSICAL AND
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-1
PE-1a.
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-1a.1.
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-1a.2.
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-1b.
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-1b.1.
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-1b.2.
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-2
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-2a.
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-2b.
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-2c.
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-2d.
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-2 (1)
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-2 (2)
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-2 (3)
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-3
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-3a.
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-3a.1.
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-3a.2.
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-3b.
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-3c.
PE-3d.
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-3e.
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-3f.
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-3g.
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-3 (1)
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-3 (2)
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-3 (3)
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-3 (4)
LOCKABLE CASINGS
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-3 (5)
TAMPER PROTECTION
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-3 (6)
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-4
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-5
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-5 (1)
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-5 (1)(a)
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-5 (1)(b)
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-5 (2)
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-5 (2)(a)
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-5 (2)(b)
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-5 (3)
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-6
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-6a.
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-6b.
PE-6c.
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-6 (1)
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-6 (2)
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-6 (3)
VIDEO SURVEILLANCE
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-6 (4)
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-7
VISITOR CONTROL
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-8
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-8a.
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-8b.
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-8 (1)
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-8 (2)
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-9
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-9 (1)
REDUNDANT CABLING
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-9 (2)
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-10
EMERGENCY SHUTOFF
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-10a.
EMERGENCY SHUTOFF
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-10b.
EMERGENCY SHUTOFF
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-10c.
EMERGENCY SHUTOFF
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-10 (1)
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-11
EMERGENCY POWER
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-11 (1)
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-11 (2)
PE-11 (2)(a)
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-11 (2)(b)
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-11 (2)(c)
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-12
EMERGENCY LIGHTING
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-12 (1)
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-13
FIRE PROTECTION
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-13 (1)
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-13 (2)
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-13 (3)
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-13 (4)
INSPECTIONS
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-14
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-14a.
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-14b.
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-14 (1)
AUTOMATIC CONTROLS
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-14 (2)
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-15
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-15 (1)
AUTOMATION SUPPORT
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-16
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-17
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-17a.
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-17b.
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-17c.
PE-18
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-18 (1)
FACILITY SITE
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-19
INFORMATION LEAKAGE
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-19 (1)
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-20
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-20a.
ENVIRONMENTAL
PROTECTION
PHYSICAL AND
PE-20b.
ENVIRONMENTAL
PROTECTION
PLANNING
PL-1
PLANNING
PL-1a.
PLANNING
PL-1a.1.
PLANNING
PL-1a.2.
PLANNING
PL-1b.
PLANNING
PL-1b.1.
PLANNING
PL-1b.2.
PLANNING
PL-2
PLANNING
PL-2a.
PLANNING
PL-2a.1.
PLANNING
PL-2a.2.
PLANNING
PL-2a.3.
PLANNING
PL-2a.4.
PLANNING
PL-2a.5.
PLANNING
PL-2a.6.
PLANNING
PL-2a.7.
PLANNING
PL-2a.8.
PLANNING
PL-2a.9.
PLANNING
PL-2b.
PLANNING
PL-2c.
PLANNING
PL-2d.
PLANNING
PL-2e.
PLANNING
PL-2 (1)
CONCEPT OF OPERATIONS
PLANNING
PL-2 (2)
FUNCTIONAL ARCHITECTURE
PLANNING
PL-2 (3)
PLANNING
PL-3
PLANNING
PL-4
RULES OF BEHAVIOR
PLANNING
PL-4a.
RULES OF BEHAVIOR
PLANNING
PL-4b.
RULES OF BEHAVIOR
PLANNING
PL-4c.
RULES OF BEHAVIOR
PLANNING
PL-4d.
RULES OF BEHAVIOR
PLANNING
PL-4 (1)
PLANNING
PL-5
PLANNING
PL-6
PLANNING
PL-7
PLANNING
PL-7a.
PLANNING
PL-7b.
PLANNING
PL-8
PLANNING
PL-8a.
PLANNING
PL-8a.1.
PLANNING
PL-8a.2.
PLANNING
PL-8a.3.
PLANNING
PL-8b.
PLANNING
PL-8c.
PLANNING
PL-8 (1)
DEFENSE-IN-DEPTH
PLANNING
PL-8 (1)(a)
DEFENSE-IN-DEPTH
PLANNING
PL-8 (1)(b)
DEFENSE-IN-DEPTH
PLANNING
PL-8 (2)
SUPPLIER DIVERSITY
PLANNING
PL-9
CENTRAL MANAGEMENT
PERSONNEL SECURITY
PS-1
PERSONNEL SECURITY
PS-1a.
PERSONNEL SECURITY
PS-1a.1.
PERSONNEL SECURITY
PS-1a.2.
PERSONNEL SECURITY
PS-1b.
PERSONNEL SECURITY
PS-1b.1.
PERSONNEL SECURITY
PS-1b.2.
PERSONNEL SECURITY
PS-2
PERSONNEL SECURITY
PS-2a.
PERSONNEL SECURITY
PS-2b.
PERSONNEL SECURITY
PS-2c.
PERSONNEL SECURITY
PS-3
PERSONNEL SCREENING
PERSONNEL SECURITY
PS-3a.
PERSONNEL SCREENING
PERSONNEL SECURITY
PS-3b.
PERSONNEL SCREENING
PERSONNEL SECURITY
PS-3 (1)
CLASSIFIED INFORMATION
PERSONNEL SECURITY
PS-3 (2)
FORMAL INDOCTRINATION
PERSONNEL SECURITY
PS-3 (3)
PERSONNEL SECURITY
PS-3 (3)(a)
PERSONNEL SECURITY
PS-3 (3)(b)
PERSONNEL SECURITY
PS-4
PERSONNEL TERMINATION
PERSONNEL SECURITY
PS-4a.
PERSONNEL TERMINATION
PERSONNEL SECURITY
PS-4b.
PERSONNEL TERMINATION
PERSONNEL SECURITY
PS-4c.
PERSONNEL TERMINATION
PERSONNEL SECURITY
PS-4d.
PERSONNEL TERMINATION
PERSONNEL SECURITY
PS-4e.
PERSONNEL TERMINATION
PERSONNEL SECURITY
PS-4f.
PERSONNEL TERMINATION
PERSONNEL SECURITY
PS-4 (1)
POST-EMPLOYMENT REQUIREMENTS
PERSONNEL SECURITY
PS-4 (1)(a)
POST-EMPLOYMENT REQUIREMENTS
PERSONNEL SECURITY
PS-4 (1)(b)
POST-EMPLOYMENT REQUIREMENTS
PERSONNEL SECURITY
PS-4 (2)
AUTOMATED NOTIFICATION
PERSONNEL SECURITY
PS-5
PERSONNEL TRANSFER
PERSONNEL SECURITY
PS-5a.
PERSONNEL TRANSFER
PERSONNEL SECURITY
PS-5b.
PERSONNEL TRANSFER
PERSONNEL SECURITY
PS-5c.
PERSONNEL TRANSFER
PERSONNEL SECURITY
PS-5d.
PERSONNEL TRANSFER
PERSONNEL SECURITY
PS-6
ACCESS AGREEMENTS
PERSONNEL SECURITY
PS-6a.
ACCESS AGREEMENTS
PERSONNEL SECURITY
PS-6b.
ACCESS AGREEMENTS
PERSONNEL SECURITY
PS-6c.
ACCESS AGREEMENTS
PERSONNEL SECURITY
PS-6c.1.
ACCESS AGREEMENTS
PERSONNEL SECURITY
PS-6c.2.
ACCESS AGREEMENTS
PERSONNEL SECURITY
PS-6 (1)
PERSONNEL SECURITY
PS-6 (2)
PERSONNEL SECURITY
PS-6 (2)(a)
PERSONNEL SECURITY
PS-6 (2)(b)
PERSONNEL SECURITY
PS-6 (2)(c)
PERSONNEL SECURITY
PS-6 (3)
POST-EMPLOYMENT REQUIREMENTS
PERSONNEL SECURITY
PS-6 (3)(a)
POST-EMPLOYMENT REQUIREMENTS
PERSONNEL SECURITY
PS-6 (3)(b)
POST-EMPLOYMENT REQUIREMENTS
PERSONNEL SECURITY
PS-7
PERSONNEL SECURITY
PS-7a.
PERSONNEL SECURITY
PS-7b.
PERSONNEL SECURITY
PS-7c.
PERSONNEL SECURITY
PS-7d.
PERSONNEL SECURITY
PS-7e.
PERSONNEL SECURITY
PS-8
PERSONNEL SANCTIONS
PERSONNEL SECURITY
PS-8a.
PERSONNEL SANCTIONS
PERSONNEL SECURITY
PS-8b.
PERSONNEL SANCTIONS
RISK ASSESSMENT
RA-1
RISK ASSESSMENT
RA-1a.
RISK ASSESSMENT
RA-1a.1.
RISK ASSESSMENT
RA-1a.2.
RISK ASSESSMENT
RA-1b.
RISK ASSESSMENT
RA-1b.1.
RISK ASSESSMENT
RA-1b.2.
RISK ASSESSMENT
RA-2
SECURITY CATEGORIZATION
RISK ASSESSMENT
RA-2a.
SECURITY CATEGORIZATION
RISK ASSESSMENT
RA-2b.
SECURITY CATEGORIZATION
RISK ASSESSMENT
RA-2c.
SECURITY CATEGORIZATION
RISK ASSESSMENT
RA-3
RISK ASSESSMENT
RISK ASSESSMENT
RA-3a.
RISK ASSESSMENT
RISK ASSESSMENT
RA-3b.
RISK ASSESSMENT
RISK ASSESSMENT
RA-3c.
RISK ASSESSMENT
RISK ASSESSMENT
RA-3d.
RISK ASSESSMENT
RISK ASSESSMENT
RA-3e.
RISK ASSESSMENT
RISK ASSESSMENT
RA-4
RISK ASSESSMENT
RA-5
VULNERABILITY SCANNING
RISK ASSESSMENT
RA-5a.
VULNERABILITY SCANNING
RISK ASSESSMENT
RA-5b.
VULNERABILITY SCANNING
RISK ASSESSMENT
RA-5b.1.
VULNERABILITY SCANNING
RISK ASSESSMENT
RA-5b.2.
VULNERABILITY SCANNING
RISK ASSESSMENT
RA-5b.3.
VULNERABILITY SCANNING
RISK ASSESSMENT
RA-5c.
VULNERABILITY SCANNING
RISK ASSESSMENT
RA-5d.
VULNERABILITY SCANNING
RISK ASSESSMENT
RA-5e.
VULNERABILITY SCANNING
RISK ASSESSMENT
RA-5 (1)
RISK ASSESSMENT
RA-5 (2)
RISK ASSESSMENT
RA-5 (3)
RISK ASSESSMENT
RA-5 (4)
DISCOVERABLE INFORMATION
RISK ASSESSMENT
RA-5 (5)
PRIVILEGED ACCESS
RISK ASSESSMENT
RA-5 (6)
RISK ASSESSMENT
RA-5 (7)
RISK ASSESSMENT
RA-5 (8)
RISK ASSESSMENT
RA-5 (9)
RISK ASSESSMENT
RA-5 (10)
RISK ASSESSMENT
RA-6
TECHNICAL SURVEILLANCE
COUNTERMEASURES SURVEY
SA-1
SA-1a.
SA-1a.1.
SA-1a.2.
SA-1b.
SA-1b.1.
SA-1b.2.
SA-2
ALLOCATION OF RESOURCES
SA-2a.
ALLOCATION OF RESOURCES
SA-2b.
ALLOCATION OF RESOURCES
SA-2c.
ALLOCATION OF RESOURCES
SA-3
SA-3a.
SA-3b.
SA-3c.
SA-3d.
SA-4
ACQUISITION PROCESS
SA-4a.
ACQUISITION PROCESS
SA-4b.
ACQUISITION PROCESS
SA-4c.
ACQUISITION PROCESS
SA-4d.
ACQUISITION PROCESS
SA-4e.
ACQUISITION PROCESS
SA-4f.
ACQUISITION PROCESS
SA-4g.
ACQUISITION PROCESS
SA-4 (1)
SA-4 (2)
SA-4 (3)
SA-4 (4)
SA-4 (5)
SA-4 (5)(a)
SA-4 (5)(b)
SA-4 (6)
SA-4 (6)(a)
SA-4 (6)(b)
SA-4 (7)
SA-4 (7)(a)
SA-4 (7)(b)
SA-4 (8)
SA-4 (9)
SA-4 (10)
SA-5
SA-5a.
SA-5a.1.
SA-5a.2.
SA-5a.3.
SA-5b.
SA-5b.1.
SA-5b.2.
SA-5b.3.
SA-5c.
SA-5d.
SA-5e.
SA-5 (1)
SA-5 (2)
SA-5 (3)
HIGH-LEVEL DESIGN
SA-5 (4)
LOW-LEVEL DESIGN
SA-5 (5)
SOURCE CODE
SA-6
SA-7
USER-INSTALLED SOFTWARE
SA-8
SA-9
SA-9a.
SA-9b.
SA-9c.
SA-9 (1)
SA-9 (1)(a)
SA-9 (1)(b)
SA-9 (2)
SA-9 (3)
SA-9 (4)
SA-9 (5)
SA-10
SA-10a.
SA-10b.
SA-10c.
SA-10d.
SA-10e.
SA-10 (1)
SA-10 (2)
ALTERNATIVE CONFIGURATION
MANAGEMENT PROCESSES
SA-10 (3)
SA-10 (4)
TRUSTED GENERATION
SA-10 (5)
SA-10 (6)
TRUSTED DISTRIBUTION
SA-11
SA-11a.
SA-11b.
SA-11c.
SA-11d.
SA-11e.
SA-11 (1)
SA-11 (2)
SA-11 (3)
INDEPENDENT VERIFICATION OF
ASSESSMENT PLANS / EVIDENCE
SA-11 (3)(a)
INDEPENDENT VERIFICATION OF
ASSESSMENT PLANS / EVIDENCE
SA-11 (3)(b)
INDEPENDENT VERIFICATION OF
ASSESSMENT PLANS / EVIDENCE
SA-11 (4)
SA-11 (5)
PENETRATION TESTING
SA-11 (6)
SA-11 (7)
SA-11 (8)
SA-12
SA-12 (1)
SA-12 (2)
SUPPLIER REVIEWS
SA-12 (3)
SA-12 (4)
DIVERSITY OF SUPPLIERS
SA-12 (5)
LIMITATION OF HARM
SA-12 (6)
SA-12 (7)
SA-12 (8)
SA-12 (9)
OPERATIONS SECURITY
SA-12 (10)
SA-12 (11)
SA-12 (12)
INTER-ORGANIZATIONAL AGREEMENTS
SA-12 (13)
SA-12 (14)
SA-12 (15)
SA-13
TRUSTWORTHINESS
SA-13a.
TRUSTWORTHINESS
SA-13b.
TRUSTWORTHINESS
SA-14
CRITICALITY ANALYSIS
SA-14 (1)
SA-15
SA-15a.
SA-15a.1.
SA-15a.2.
SA-15a.3.
SA-15a.4.
SA-15b.
SA-15 (1)
QUALITY METRICS
SA-15 (1)(a)
QUALITY METRICS
SA-15 (1)(b)
QUALITY METRICS
SA-15 (2)
SA-15 (3)
CRITICALITY ANALYSIS
SA-15 (4)
SA-15 (4)(a)
SA-15 (4)(b)
SA-15 (4)(c)
SA-15 (5)
SA-15 (6)
CONTINUOUS IMPROVEMENT
SA-15 (7)
SA-15 (7)(a)
SA-15 (7)(b)
SA-15 (7)(c)
SA-15 (7)(d)
SA-15 (8)
SA-15 (9)
SA-15 (10)
SA-15 (11)
SA-16
DEVELOPER-PROVIDED TRAINING
SA-17
SA-17a.
SA-17b.
SA-17c.
SA-17 (1)
SA-17 (1)(a)
SA-17 (1)(b)
SA-17 (2)
SECURITY-RELEVANT COMPONENTS
SA-17 (2)(a)
SECURITY-RELEVANT COMPONENTS
SA-17 (2)(b)
SECURITY-RELEVANT COMPONENTS
SA-17 (3)
FORMAL CORRESPONDENCE
SA-17 (3)(a)
FORMAL CORRESPONDENCE
SA-17 (3)(b)
FORMAL CORRESPONDENCE
SA-17 (3)(c)
FORMAL CORRESPONDENCE
SA-17 (3)(d)
FORMAL CORRESPONDENCE
SA-17 (3)(e)
FORMAL CORRESPONDENCE
SA-17 (4)
INFORMAL CORRESPONDENCE
SA-17 (4)(a)
INFORMAL CORRESPONDENCE
SA-17 (4)(b)
INFORMAL CORRESPONDENCE
SA-17 (4)(c)
INFORMAL CORRESPONDENCE
SA-17 (4)(d)
INFORMAL CORRESPONDENCE
SA-17 (4)(e)
INFORMAL CORRESPONDENCE
SA-17 (5)
SA-17 (5)(a)
SA-17 (5)(b)
SA-17 (6)
SA-17 (7)
SA-18
SA-18 (1)
SA-18 (2)
SA-19
COMPONENT AUTHENTICITY
SA-19a.
COMPONENT AUTHENTICITY
SA-19b.
COMPONENT AUTHENTICITY
SA-19 (1)
ANTI-COUNTERFEIT TRAINING
SA-19 (2)
SA-19 (3)
COMPONENT DISPOSAL
SA-19 (4)
ANTI-COUNTERFEIT SCANNING
SA-20
SA-21
DEVELOPER SCREENING
SA-21a.
DEVELOPER SCREENING
SA-21b.
DEVELOPER SCREENING
SA-21 (1)
VALIDATION OF SCREENING
SA-22
SA-22a.
SA-22b.
SA-22 (1)
SYSTEM AND
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-1
SC-1a.
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-1a.1.
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-1a.2.
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-1b.
COMMUNICATIONS
PROTECTION
SYSTEM AND
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-1b.1.
SC-1b.2.
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-2
APPLICATION PARTITIONING
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-2 (1)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-3
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-3 (1)
HARDWARE SEPARATION
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-3 (2)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-3 (3)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-3 (4)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-3 (5)
LAYERED STRUCTURES
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-4
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-4 (1)
SECURITY LEVELS
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-4 (2)
PERIODS PROCESSING
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-5
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-5 (1)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-5 (2)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-5 (3)
DETECTION / MONITORING
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-5 (3)(a)
DETECTION / MONITORING
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-5 (3)(b)
DETECTION / MONITORING
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-6
RESOURCE AVAILABILITY
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-7
BOUNDARY PROTECTION
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-7a.
BOUNDARY PROTECTION
COMMUNICATIONS
PROTECTION
SYSTEM AND
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-7b.
BOUNDARY PROTECTION
SC-7c.
BOUNDARY PROTECTION
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-7 (1)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-7 (2)
PUBLIC ACCESS
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-7 (3)
ACCESS POINTS
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-7 (4)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-7 (4)(a)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-7 (4)(b)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-7 (4)(c)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-7 (4)(d)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-7 (4)(e)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-7 (5)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-7 (6)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-7 (7)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-7 (8)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-7 (9)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-7 (9)(a)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-7 (9)(b)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-7 (10)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-7 (11)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-7 (12)
HOST-BASED PROTECTION
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-7 (13)
COMMUNICATIONS
PROTECTION
SYSTEM AND
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-7 (14)
SC-7 (15)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-7 (16)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-7 (17)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-7 (18)
FAIL SECURE
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-7 (19)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-7 (20)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-7 (21)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-7 (22)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-7 (23)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-8
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-8 (1)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-8 (2)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-8 (3)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-8 (4)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-9
TRANSMISSION CONFIDENTIALITY
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-10
NETWORK DISCONNECT
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-11
TRUSTED PATH
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-11 (1)
LOGICAL ISOLATION
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-12
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-12 (1)
AVAILABILITY
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-12 (2)
SYMMETRIC KEYS
COMMUNICATIONS
PROTECTION
SYSTEM AND
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-12 (3)
ASYMMETRIC KEYS
SC-12 (4)
PKI CERTIFICATES
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-12 (5)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-13
CRYPTOGRAPHIC PROTECTION
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-13 (1)
FIPS-VALIDATED CRYPTOGRAPHY
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-13 (2)
NSA-APPROVED CRYPTOGRAPHY
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-13 (3)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-13 (4)
DIGITAL SIGNATURES
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-14
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-15
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-15a.
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-15b.
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-15 (1)
PHYSICAL DISCONNECT
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-15 (2)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-15 (3)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-15 (4)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-16
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-16 (1)
INTEGRITY VALIDATION
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-17
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-18
MOBILE CODE
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-18a.
MOBILE CODE
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-18b.
MOBILE CODE
COMMUNICATIONS
PROTECTION
SYSTEM AND
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-18c.
MOBILE CODE
SC-18 (1)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-18 (2)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-18 (3)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-18 (4)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-18 (5)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-19
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-19a.
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-19b.
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-20
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-20a.
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-20b.
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-20 (1)
CHILD SUBSPACES
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-20 (2)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-21
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-21 (1)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-22
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-23
SESSION AUTHENTICITY
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-23 (1)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-23 (2)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-23 (3)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-23 (4)
COMMUNICATIONS
PROTECTION
SYSTEM AND
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-23 (5)
SC-24
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-25
THIN NODES
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-26
HONEYPOTS
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-26 (1)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-27
PLATFORM-INDEPENDENT APPLICATIONS
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-28
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-28 (1)
CRYPTOGRAPHIC PROTECTION
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-28 (2)
OFF-LINE STORAGE
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-29
HETEROGENEITY
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-29 (1)
VIRTUALIZATION TECHNIQUES
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-30
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-30 (1)
VIRTUALIZATION TECHNIQUES
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-30 (2)
RANDOMNESS
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-30 (3)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-30 (4)
MISLEADING INFORMATION
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-30 (5)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-31
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-31a.
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-31b.
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-31 (1)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-31 (2)
MAXIMUM BANDWIDTH
COMMUNICATIONS
PROTECTION
SYSTEM AND
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-31 (3)
SC-32
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-33
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-34
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-34a.
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-34b.
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-34 (1)
NO WRITABLE STORAGE
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-34 (2)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-34 (3)
HARDWARE-BASED PROTECTION
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-34 (3)(a)
HARDWARE-BASED PROTECTION
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-34 (3)(b)
HARDWARE-BASED PROTECTION
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-35
HONEYCLIENTS
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-36
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-36 (1)
POLLING TECHNIQUES
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-37
OUT-OF-BAND CHANNELS
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-37 (1)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-38
OPERATIONS SECURITY
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-39
PROCESS ISOLATION
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-39 (1)
HARDWARE SEPARATION
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-39 (2)
THREAD ISOLATION
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-40
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-40 (1)
ELECTROMAGNETIC INTERFERENCE
COMMUNICATIONS
PROTECTION
SYSTEM AND
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-40 (2)
SC-40 (3)
COMMUNICATIONS
PROTECTION
SYSTEM AND
IMITATIVE OR MANIPULATIVE
COMMUNICATIONS DECEPTION
SC-40 (4)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-41
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-42
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-42a.
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-42b.
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-42 (1)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-42 (2)
AUTHORIZED USE
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-42 (3)
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-43
USAGE RESTRICTIONS
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-43a.
USAGE RESTRICTIONS
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-43b.
USAGE RESTRICTIONS
COMMUNICATIONS
PROTECTION
SYSTEM AND
SC-44
DETONATION CHAMBERS
COMMUNICATIONS
PROTECTION
SYSTEM AND INFORMATION SI-1
INTEGRITY
FLAW REMEDIATION
FLAW REMEDIATION
FLAW REMEDIATION
FLAW REMEDIATION
FLAW REMEDIATION
CENTRAL MANAGEMENT
CENTRAL MANAGEMENT
AUTOMATIC UPDATES
NON-PRIVILEGED USERS
TESTING / VERIFICATION
TESTING / VERIFICATION
TESTING / VERIFICATION
NONSIGNATURE-BASED DETECTION
SYSTEM-GENERATED ALERTS
AUTOMATED ALERTS
PRIVILEGED USERS
PROBATIONARY PERIODS
HOST-BASED DEVICES
INDICATORS OF COMPROMISE
INTEGRITY CHECKS
TAMPER-EVIDENT PACKAGING
CRYPTOGRAPHIC PROTECTION
INTEGRITY VERIFICATION
CODE AUTHENTICATION
SPAM PROTECTION
SPAM PROTECTION
SPAM PROTECTION
CENTRAL MANAGEMENT
AUTOMATIC UPDATES
PREDICTABLE BEHAVIOR
ERROR HANDLING
ERROR HANDLING
ERROR HANDLING
TRANSFERRING COMPONENT
RESPONSIBILITIES
FAILOVER CAPABILITY
NON-PERSISTENCE
MEMORY PROTECTION
FAIL-SAFE PROCEDURES
PROGRAM MANAGEMENT
PM-1
PROGRAM MANAGEMENT
PM-1a.
PROGRAM MANAGEMENT
PM-1a.1.
PROGRAM MANAGEMENT
PM-1a.2.
PROGRAM MANAGEMENT
PM-1a.3.
PROGRAM MANAGEMENT
PM-1a.4.
PROGRAM MANAGEMENT
PM-1b.
PROGRAM MANAGEMENT
PM-1c.
PROGRAM MANAGEMENT
PM-1d.
PROGRAM MANAGEMENT
PM-2
PROGRAM MANAGEMENT
PM-3
PROGRAM MANAGEMENT
PM-3a.
PROGRAM MANAGEMENT
PM-3b.
PROGRAM MANAGEMENT
PM-3c.
PROGRAM MANAGEMENT
PM-4
PROGRAM MANAGEMENT
PM-4a.
PROGRAM MANAGEMENT
PM-4a.1.
PROGRAM MANAGEMENT
PM-4a.2.
PROGRAM MANAGEMENT
PM-4a.3.
PROGRAM MANAGEMENT
PM-4b.
PROGRAM MANAGEMENT
PM-5
PROGRAM MANAGEMENT
PM-6
PROGRAM MANAGEMENT
PM-7
ENTERPRISE ARCHITECTURE
PROGRAM MANAGEMENT
PM-8
PROGRAM MANAGEMENT
PM-9
PROGRAM MANAGEMENT
PM-9a.
PROGRAM MANAGEMENT
PM-9b.
PROGRAM MANAGEMENT
PM-9c.
PROGRAM MANAGEMENT
PM-10
PROGRAM MANAGEMENT
PM-10a.
PROGRAM MANAGEMENT
PM-10b.
PROGRAM MANAGEMENT
PM-10c.
PROGRAM MANAGEMENT
PM-11
PROGRAM MANAGEMENT
PM-11a.
PROGRAM MANAGEMENT
PM-11b.
PROGRAM MANAGEMENT
PM-12
PROGRAM MANAGEMENT
PM-13
PROGRAM MANAGEMENT
PM-14
PROGRAM MANAGEMENT
PM-14a.
PROGRAM MANAGEMENT
PM-14a.1.
PROGRAM MANAGEMENT
PM-14a.2.
PROGRAM MANAGEMENT
PM-14b.
PROGRAM MANAGEMENT
PM-15
PROGRAM MANAGEMENT
PM-15a.
PROGRAM MANAGEMENT
PM-15b.
PROGRAM MANAGEMENT
PM-15c.
PROGRAM MANAGEMENT
PM-16
PRIORITY
BASELINE-IMPACT
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
HIGH
P1
HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P3
HIGH
P3
MODERATE,HIGH
P3
MODERATE,HIGH
P3
MODERATE,HIGH
P3
MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P3
LOW,MODERATE,HIGH
P3
LOW,MODERATE,HIGH
P3
LOW,MODERATE,HIGH
P3
LOW,MODERATE,HIGH
P3
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
HIGH
P1
HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P3
LOW,MODERATE,HIGH
P3
LOW,MODERATE,HIGH
P3
LOW,MODERATE,HIGH
P3
LOW,MODERATE,HIGH
P3
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P3
LOW,MODERATE,HIGH
P3
LOW,MODERATE,HIGH
P3
LOW,MODERATE,HIGH
P3
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
MODERATE,HIGH
P1
HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P2
MODERATE,HIGH
P3
MODERATE,HIGH
P4
MODERATE,HIGH
P5
MODERATE,HIGH
P6
MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
HIGH
P1
HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P3
LOW,MODERATE,HIGH
P3
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P0
HIGH
P0
HIGH
P0
HIGH
P0
HIGH
P0
HIGH
P0
HIGH
P0
HIGH
P0
HIGH
P0
HIGH
P0
HIGH
P0
HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
MODERATE,HIGH
P2
HIGH
P2
HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P3
LOW,MODERATE,HIGH
P3
LOW,MODERATE,HIGH
P3
LOW,MODERATE,HIGH
P3
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
HIGH
P2
HIGH
P1
MODERATE,HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
P1
P1
P1
P1
P1
P1
LOW,MODERATE,HIGH
P1
P1
P1
P1
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE
P1
MODERATE
P1
MODERATE
P1
MODERATE
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
MODERATE,HIGH
P1
HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
MODERATE,HIGH
P1
HIGH
P1
MODERATE,HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
HIGH
P2
HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
MODERATE,HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
MODERATE,HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P0
HIGH
P0
HIGH
P0
HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
MODERATE,HIGH
P1
HIGH
P1
HIGH
P1
MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
HIGH
P2
HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
LOW,MODERATE,HIGH
P1
HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P3
MODERATE,HIGH
P3
MODERATE,HIGH
P3
MODERATE,HIGH
P3
HIGH
P3
HIGH
P3
HIGH
P3
HIGH
P3
HIGH
P3
HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
MODERATE,HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
LOW,MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
HIGH
P1
HIGH
P3
LOW,MODERATE,HIGH
P3
LOW,MODERATE,HIGH
P3
LOW,MODERATE,HIGH
P3
HIGH
P3
HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
HIGH
P1
HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
HIGH
P2
LOW,MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P3
HIGH
P3
HIGH
P0
HIGH
P0
HIGH
P0
HIGH
P0
HIGH
P0
HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P0
MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P3
LOW,MODERATE,HIGH
P3
LOW,MODERATE,HIGH
P3
LOW,MODERATE,HIGH
P3
LOW,MODERATE,HIGH
P3
LOW,MODERATE,HIGH
P3
LOW,MODERATE,HIGH
P3
LOW,MODERATE,HIGH
P3
LOW,MODERATE,HIGH
P3
LOW,MODERATE,HIGH
P3
LOW,MODERATE,HIGH
P3
LOW,MODERATE,HIGH
P3
LOW,MODERATE,HIGH
P3
LOW,MODERATE,HIGH
P3
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P3
LOW,MODERATE,HIGH
P3
LOW,MODERATE,HIGH
P3
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P0
MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P1
MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P0
HIGH
P0
HIGH
P0
HIGH
P0
HIGH
P0
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P2
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P0
HIGH
P0
HIGH
P0
HIGH
P0
HIGH
P0
HIGH
P0
HIGH
P0
HIGH
P0
HIGH
P0
HIGH
P0
HIGH
P0
HIGH
P0
HIGH
P0
HIGH
P0
HIGH
P0
HIGH
P0
HIGH
P0
HIGH
P0
HIGH
P0
HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P2
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P1
MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
HIGH
P0
HIGH
P0
HIGH
P0
HIGH
P0
HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
LOW,MODERATE,HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P1
HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P1
MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P2
MODERATE,HIGH
P2
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P0
LOW,MODERATE,HIGH
P1
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
P0
MODERATE,HIGH
DESCRIPTION
The organization:
Develops, documents, and disseminates to [Assignment:
organization-defined personnel or roles]:
An access control policy that addresses purpose, scope, roles,
responsibilities, management commitment, coordination
among
organizational
and compliance;
and
Procedures
to facilitateentities,
the implementation
of the
access
control policy and associated access controls; and
Reviews and updates the current:
Access control policy [Assignment: organization-defined
frequency]; and
Access control procedures [Assignment: organization-defined
frequency].
The organization:
Identifies and selects the following types of information system
accounts to support organizational missions/business functions:
[Assignment:
organization-defined
information
system
account
Assigns account
managers for information
system
accounts;
types];
Establishes conditions for group and role membership;
Specifies authorized users of the information system, group
and role membership, and access authorizations (i.e.,
privileges)
and other
(as required)
for each account;
Requires approvals
byattributes
[Assignment:
organization-defined
personnel or roles] for requests to create information system
accounts;
Creates, enables, modifies, disables, and removes information
system accounts in accordance with [Assignment: organizationdefined
or conditions];
Monitorsprocedures
the use of information
system accounts;
Notifies account managers:
When accounts are no longer required;
When users are terminated or transferred; and
When individual information system usage or need-to-know
changes;
Authorizes access to the information system based on:
A valid access authorization;
The information system alerts [Assignment: organizationdefined personnel or roles] when the unauthorized installation
of
software
is detected.
The
information
system prohibits user installation of software
without explicit privileged status.
The organization:
Develops, documents, and disseminates to [Assignment:
organization-defined personnel or roles]:
A contingency planning policy that addresses purpose, scope,
roles, responsibilities, management commitment, coordination
among
organizational
and compliance;
and
Procedures
to facilitateentities,
the implementation
of the
contingency
planning policy and associated contingency planning controls;
and
Reviews and updates the current:
Contingency planning policy [Assignment: organization-defined
frequency]; and
Contingency planning procedures [Assignment: organizationdefined frequency].
The organization:
Develops a contingency plan for the information system that:
Identifies essential missions and business functions and
associated contingency requirements;
Provides recovery objectives, restoration priorities, and metrics;
Addresses contingency roles, responsibilities, assigned
individuals with contact information;
Addresses maintaining essential missions and business
functions despite an information system disruption,
compromise,
or failure;
Addresses eventual,
full information system restoration without
deterioration of the security safeguards originally planned and
implemented;
and
Is reviewed and
approved by [Assignment: organization-defined
personnel or roles];
Distributes copies of the contingency plan to [Assignment:
organization-defined key contingency personnel (identified by
name
and/orcontingency
by role) andplanning
organizational
elements];
Coordinates
activities
with incident
handling activities;
Reviews the contingency plan for the information system
[Assignment: organization-defined frequency];
Updates the contingency plan to address changes to the
organization, information system, or environment of operation
and
problems encountered
contingency
plan
Communicates
contingencyduring
plan changes
to [Assignment:
implementation,
execution,
or
testing;
organization-defined key contingency personnel (identified by
name and/or by role) and organizational elements]; and
The organization:
Schedules, performs, documents, and reviews records of
maintenance and repairs on information system components in
accordance
with
manufacturer
or vendoractivities,
specifications
and/or
Approves and
monitors
all maintenance
whether
organizational
requirements;
performed on site or remotely and whether the equipment is
serviced
site
or removedorganization-defined
to another location; personnel or
Requires on
that
[Assignment:
roles] explicitly approve the removal of the information system
or
systemequipment
components
organizational
facilities
for off-site
Sanitizes
to from
remove
all information
from associated
maintenance
or
repairs;
media prior to removal from organizational facilities for off-site
maintenance
or repairs;
Checks all potentially
impacted security controls to verify that
the controls are still functioning properly following maintenance
or
repair [Assignment:
actions; and organization-defined maintenanceIncludes
related information] in organizational maintenance records.
[Withdrawn: Incorporated into MA-2].
The organization:
Employs automated mechanisms to schedule, conduct, and
document maintenance and repairs; and
Produces up-to date, accurate, and complete records of all
maintenance and repair actions requested, scheduled, in
process,
and completed.
The organization
approves, controls, and monitors information
system maintenance tools.
The organization inspects the maintenance tools carried into a
facility by maintenance personnel for improper or unauthorized
modifications.
The organization checks media containing diagnostic and test
programs for malicious code before the media are used in the
information
system.
The organization
prevents the unauthorized removal of
maintenance equipment containing organizational information
by:
Verifying that there is no organizational information contained
on the equipment;
Sanitizing or destroying the equipment;
Retaining the equipment within the facility; or
Obtaining an exemption from [Assignment: organizationdefined personnel or roles] explicitly authorizing removal of the
equipment
from system
the facility.
The information
restricts the use of maintenance tools
to authorized personnel only.
The organization:
Approves and monitors nonlocal maintenance and diagnostic
activities;
Reviews physical access logs [Assignment: organizationdefined frequency] and upon occurrence of [Assignment:
organization-defined
orand
potential
indications
of the
events];
Coordinates results ofevents
reviews
investigations
with
and
organizational incident response capability.
The organization monitors physical intrusion alarms and
surveillance equipment.
The organization employs automated mechanisms to recognize
[Assignment: organization-defined classes/types of intrusions]
and
initiate [Assignment:
The organization
employsorganization-defined
video surveillance ofresponse
[Assignment:
actions].
organization-defined operational areas] and retains video
recordings
for [Assignment:
organization-defined
time period].
The organization
monitors physical
access to the information
system in addition to the physical access monitoring of the
facility
as [Assignment:
organization-defined
[Withdrawn:
Incorporated
into PE-2 and PE-3].physical spaces
containing one or more components of the information
system].
The organization:
Maintains visitor access records to the facility where the
information system resides for [Assignment: organizationdefined
period];
Reviewstime
visitor
accessand
records [Assignment: organizationdefined frequency].
The organization employs automated mechanisms to facilitate
the maintenance and review of visitor access records.
[Withdrawn: Incorporated into PE-2].
The organization protects power equipment and power cabling
for the information system from damage and destruction.
The organization employs redundant power cabling paths that
are physically separated by [Assignment: organization-defined
distance].
The organization employs automatic voltage controls for
[Assignment: organization-defined critical information system
components].
The organization:
Provides the capability of shutting off power to the information
system or individual system components in emergency
situations;
Places emergency shutoff switches or devices in [Assignment:
organization-defined location by information system or system
component]
to facilitate
safe
and easy
accessfrom
for personnel;
Protects emergency
power
shutoff
capability
unauthorized
and
activation.
[Withdrawn: Incorporated into PE-10].
The organization provides a short-term uninterruptible power
supply to facilitate [Selection (one or more): an orderly
shutdown
of the information
system; transition
the supply
The organization
provides a long-term
alternateof
power
information
system
to
long-term
alternate
power]
in the event
for the information system that is capable of maintaining
of
a primary
power operational
source loss.capability in the event of an
minimally
required
extended loss of the primary power source.
Acceptance criteria.
The organization requires the developer of the information
system, system component, or information system service to
provide
a description
of the
functional
properties
of the security
The organization
requires
the
developer
of the information
controls
to
be
employed.
system, system component, or information system service to
provide
design and
implementation
information
for the security
The organization
requires
the developer
of the information
controls
to be employed
thator
includes:
[Selection
(one
or to
system, system
component,
information
system
service
more):
security-relevant
external
system
interfaces;
high-level
demonstrate
the use of a system
development
life cycle that
[Withdrawn:
Incorporated
into CM-8
(9)].
design;
design;
source
code
or hardware
schematics;
includeslow-level
[Assignment:
organization-defined
state-of-the[Assignment:
organization-defined
design/implementation
practice system/security engineering methods, software
The
organization
requires
the developer
of the information
information]]
at
[Assignment:
organization-defined
level of
development
methods,
testing/evaluation/validation
system,
system
or information
detail].
techniques,
and component,
quality control
processes]. system service to:
The organization implements [Assignment: organizationdefined additional monitoring] of individuals who have been
identified
by [Assignment:
organization-defined
sources] as
The organization
implements
[Assignment: organizationposing
increased
level of risk.
definedan
additional
monitoring]
of privileged users.
The organization implements [Assignment: organizationdefined additional monitoring] of individuals during
[Assignment:
organization-defined
probationary
The information
system detects network
servicesperiod].
that have not
been authorized or approved by [Assignment: organizationdefined
authorization
or approval
processes]
and [Selection
The organization
implements
[Assignment:
organization(one
or
more):
audits;
alerts
[Assignment:
organization-defined
defined host-based monitoring mechanisms] at [Assignment:
personnel
or roles]]. information system components].
organization-defined
The information system
discovers, collects, distributes, and
uses indicators of compromise.
The organization:
Receives information system security alerts, advisories, and
directives from [Assignment: organization-defined external
organizations]
on an
ongoing
basis;advisories, and directives as
Generates internal
security
alerts,
deemed necessary;
Disseminates security alerts, advisories, and directives to:
[Selection (one or more): [Assignment: organization-defined
personnel
orsecurity
roles]; [Assignment:
organization-defined
Implements
directives in accordance
with established
elements
within
the
organization];
organizationtime frames, or notifies the issuing [Assignment:
organization of
the degree
defined
external
organizations]];
and
of
noncompliance.
The organization employs automated mechanisms to make
security alert and advisory information available throughout
the
The organization.
information system:
Verifies the correct operation of [Assignment: organizationdefined security functions];
Performs this verification [Selection (one or more):
[Assignment: organization-defined system transitional states];
upon
command
by user
with appropriate privilege;
Notifies
[Assignment:
organization-defined
personnel or roles]
[Assignment:
organization-defined
frequency]];
of failed security verification tests; and
[Selection (one or more): shuts the information system down;
restarts the information system; [Assignment: organizationdefined
alternative
action(s)]]
[Withdrawn:
Incorporated
into when
SI-6]. anomalies are discovered.
The information system implements automated mechanisms to
support the management of distributed security testing.
The organization reports the results of security function
verification to [Assignment: organization-defined personnel or
roles].
The organization employs integrity verification tools to detect
unauthorized changes to [Assignment: organization-defined
software,
firmware,
and information].
The information
system
performs an integrity check of
[Assignment: organization-defined software, firmware, and
information] [Selection (one or more): at startup; at
[Assignment: organization-defined transitional states or
security-relevant events]; [Assignment: organization-defined
frequency]].
The organization:
Implements a process for ensuring that plans of action and
milestones for the security program and associated
organizational
systems:
Are developed information
and maintained;
Document the remedial information security actions to
adequately respond to risk to organizational operations and
assets,
individuals,
other organizations,
and reporting
the Nation; and
Are reported
in accordance
with OMB FISMA
requirements.
Reviews plans of action and milestones for consistency with the
organizational risk management strategy and organizationwide
priorities fordevelops
risk response
actions. an inventory of its
The organization
and maintains
information systems.
The organization develops, monitors, and reports on the results
of information security measures of performance.
The organization develops an enterprise architecture with
consideration for information security and the resulting risk to
organizational
operations,
assets, issues
individuals,
The organization
addressesorganizational
information security
in the
other
organizations,
and
the
Nation.
development, documentation, and updating of a critical
infrastructure
and key resources protection plan.
The organization:
Develops a comprehensive strategy to manage risk to
organizational operations and assets, individuals, other
organizations,
and
Nation associated
with
the operation
Implements the
riskthe
management
strategy
consistently
across
and
use
of
information
systems;
the organization; and
Reviews and updates the risk management strategy
[Assignment: organization-defined frequency] or as required, to
address
organizational changes.
The organization:
Manages (i.e., documents, tracks, and reports) the security
state of organizational information systems and the
environments
in which to
those
systems
through security
Designates individuals
fulfill
specificoperate
roles and
authorization
processes;
responsibilities within the organizational risk management
process;
and
Fully integrates
the security authorization processes into an
organization-wide risk management program.
The organization:
Defines mission/business processes with consideration for
information security and the resulting risk to organizational
operations,
assets, individuals,
other
Determines organizational
information protection
needs arising
from the
organizations,
and
the
Nation;
and
defined mission/business processes and revises the processes
as
until
achievablean
protection
needsprogram
are obtained.
Thenecessary,
organization
implements
insider threat
that
includes a cross-discipline insider threat incident handling
team.
SUPPLEMENTAL GUIDANCE
This control addresses the establishment of policy and
procedures for the effective implementation of selected
security controls and control enhancements in the AC family.
Policy and procedures reflect applicable federal laws, Executive
Orders, directives, regulations, policies, standards, and
guidance. Security program policies and procedures at the
organization level may make the need for system-specific
policies and procedures unnecessary. The policy can be
included as part of the general information security policy for
organizations or conversely, can be represented by multiple
policies reflecting the complex nature of certain organizations.
The procedures can be established for the security program in
general and for particular information systems, if needed. The
organizational risk management strategy is a key factor in
establishing policy and procedures.
Information system account types include, for example,
individual, shared, group, system, guest/anonymous,
emergency, developer/manufacturer/vendor, temporary, and
service. Some of the account management requirements listed
above can be implemented by organizational information
systems. The identification of authorized users of the
information system and the specification of access privileges
reflects the requirements in other security controls in the
security plan. Users requiring administrative privileges on
information system accounts receive additional scrutiny by
appropriate organizational personnel (e.g., system owner,
mission/business owner, or chief information security officer)
responsible for approving such accounts and privileged access.
Organizations may choose to define access privileges or other
attributes by account, by type of account, or a combination of
both. Other attributes required for authorizing access include,
for example, restrictions on time-of-day, day-of-week, and
point-of-origin. In defining other account attributes,
organizations consider system-related requirements (e.g.,
scheduled maintenance, system upgrades) and
mission/business requirements, (e.g., time zone differences,
customer requirements, remote access to support travel
requirements). Failure to consider these factors could affect
information system availability. Temporary and emergency
accounts are accounts intended for short-term use.
Organizations establish temporary accounts as a part of normal
account activation procedures when there is a need for shortterm accounts without the demand for immediacy in account
activation. Organizations establish emergency accounts in
response to crisis situations and with the need for rapid
account activation. Therefore, emergency account activation
may bypass normal account authorization processes.
Emergency and temporary accounts are not to be confused
with infrequently used accounts (e.g., local logon accounts
used for special tasks defined by organizations or when
network resources are unavailable). Such accounts remain
available and are not subject to automatic disabling or removal
dates. Conditions for disabling or deactivating accounts
all
types of information
system
components
from
which
information
flows between
those
components.
This
type of
information
can
be
transmitted
(e.g.,
servers,
mobile
devices,
enhanced
protection
limits
the
potential
harm
from
cyber
Encrypting information for transmission protects information
notebook
computers,
printers,
copiers,
scanners,
facsimile
attacks
and errors. disclosure
The degreeand
of separation
provided
varies
from unauthorized
modification.
Cryptographic
machines).
Communication
paths
outside
the
physical
depending
upon
the
mechanisms
chosen.
Boundary
protection
mechanisms
implemented
to protect information
integrity
Information
can
be either
unintentionally
orgateways,
maliciously
protection
ofexample,
a controlled
boundary
are
exposed
to the
mechanisms
include,
for
example,
routers,
andhave
include,
for
cryptographic
hash
functions
which
disclosed
or
modified
during
preparation
forProtecting
transmission
possibility
of
interception
and
modification.
the or
firewalls
separating
system
components
into
physically
common
application
in digital
signatures,
checksums,
and
during
reception
including,
for
example,
during
aggregation,
at
This
control
enhancement
addresses
protection
against
confidentiality
and/or
integrity
of
organizational
information
separate
networks
or subnetworks,
cross-domain
devices
message
authentication
codes.
Alternative
physical
security
protocol
transformation
points,
and
during
packing/unpacking.
unauthorized
disclosure
of
information.
Message
can
be accomplished
byexample,
physical
means
(e.g.,
byexternals
employing
separating
subnetworks,
virtualization
techniques,
and
safeguards
include,
for
distribution
These
unauthorized
disclosures
orprotected
modifications
compromise
include,
for
example,
message
headers/routing
information.
protected
distribution
systems)
or
by
logical
means
(e.g., using
encrypting
information
flows
among
system
components
This
control enhancement
addresses
protection against
systems.
the
confidentiality
or
integrity
of theOrganizations
information.
This
control
enhancement
prevents
the
exploitation
of message
employing
encryption
techniques).
relying
on
distinct
encryption
keys.
unauthorized disclosure of information. Communication
externals
and
applies
to
both
internal
and
external
networks
or
commercial
providers
offering
transmission
services
as
patterns include, for example, frequency, periods, amount, and
links
that
may
be
visible
to
individuals
who
are
not
authorized
commodity services
rather
than as fully dedicated
predictability.
Changes
to communications
patternsservices
can reveal
users.
Header/routing
information
is
sometimes
transmitted
(i.e.,
services
which
can
be
highly
specialized
to
individual
information having intelligence value especially when
This
control
applies
toavailable
both
internal
and
external
networks.
unencrypted
because
the
is obtain
notrelated
properly
identified
customer
needs),
may
findinformation
it
difficult
to
the
necessary
combined
with
other
information
to
Terminating
network
connections
associated
with
by
organizations
as
having
significant
value
or
because
assurances
regarding
the
implementation
of
needed
security
missions/business functions supported by organizational
communications
sessions
include,
for in
example,
de-allocating
encrypting
information
can by
result
lower
controls
for the
transmission
In suchinput
Trusted
paths
are
mechanisms
which
users network
(through
information
systems.
Thisconfidentiality/integrity.
control
enhancement
prevents
the
associated
TCP/IP
address/port
pairs
at
the
operating
system
performance
and/or
higher
costs.
Alternative
physical
situations,
organizations
determine
what
types
of
devices)
can
directly
with security functions
of
derivation
of communicate
intelligence based
on communications
patterns
level,
or de-allocating
networking
assignments
the
safeguards
include,
for
example,
protected
distribution
confidentiality/integrity
services
are
available
inatstandard,
information
systems
with
theand
requisite
assurance
to
and applies
to both internal
external
networks
orsupport
links that
application
level
multiple
application
sessions
are
using
systems.
commercial
telecommunication
service
packages.
Ifbe
itusers.
is a
information
security
policies.
The
mechanisms
can
activated
may be visible
toifindividuals
who
are not
authorized
single,
operating
system-level
network
connection.
Time
infeasible
or
impractical
to
obtain
the
necessary
security
only
by users
the and
security
functionsinofcontinuous,
organizational
Encrypting
theorlinks
transmitting
Cryptographic
key management
and
establishment
canare
be
periods
inactivity
may
be
established
organizations
and
controls of
and
assurances
of
control
effectiveness
information
systems.
User
responses
via by
trusted
paths
fixed/random
patterns
prevents
the
derivation
ofthrough
intelligence
performed
using
manual
procedures
or
automated
mechanisms
include,
example,
time
periods
by
type
of
network
access
or
appropriate
contracting
vehicles,
organizations
protected
from
modifications
by or
disclosure
toimplement
untrusted
from thefor
system
communications
patterns.
Alternative
physical
with
supporting
manual
procedures.
Organizations
define
key
for
specific
network
accesses.
appropriate
compensating
security
controls
or
explicitly
accept
Escrowing
encryption
keys
is a protected
common
ensuring
applications.
Organizations
employ
trusted practice
paths
forfor
highsafeguardsofinclude,
for example,
distribution
management
requirements
in accordance
with
applicable
the
additional
risk.eventbetween
availability
in the
of loss
ofsecurity
keys (e.g.,
due
toof
forgotten
assurance
connections
functions
systems.
federal
laws,systems
Executive
Orders,
directives,
regulations,
policies,
passphrase).
information
and
users (e.g.,
during
system logons).
standards,
and
guidance,
specifying
appropriate
options,
Enforcement of trusted communications paths is typically
levels,
and
Organizations
manage
stores to
provided
viaparameters.
an implementation
that meets
the trust
reference
ensure
that
only
approved
trust
anchors
are
in
such
trust
monitor concept.
stores. This includes certificates with visibility external to
organizational information systems and certificates related to
the internal operations of systems.
Automated tools include, for example, host-based, networkbased, transport-based, or storage-based event monitoring
tools or Security Information and Event Management (SIEM)
technologies that provide real time analysis of alerts and/or
notifications generated by organizational information systems.
Unusual/unauthorized activities or conditions related to
information system inbound and outbound communications
traffic
include,
for example,
internal
traffic
that indicates
the
Alerts may
be generated
from
a variety
of sources,
including,
presence
of
malicious
code
within
organizational
information
for example, audit records or inputs from malicious code
systems
ormechanisms,
propagating among
system
components,
the
protection
intrusion
detection
or prevention
unauthorized
exporting
of
information,
or
signaling
to
external
mechanisms, or boundary protection devices such as firewalls,
information
systems.
Evidence
of
malicious
code
is
used
to
gateways, and routers. Alerts can be transmitted, for example,
Least-disruptive
actions
may
include,
for
example,
initiating
identify
potentially
compromised
information
systems
or
telephonically, by electronic mail messages, or by text
requests
for Organizational
human components.
responses.
information
system
messaging.
personnel on the notification list can
include, for example, system administrators, mission/business
owners, system owners, or information system security officers.
Testing intrusion-monitoring tools is necessary to ensure that
the tools are operating correctly and continue to meet the
monitoring
objectives
organizations.
The frequency
Organizations
balanceof
the
potentially conflicting
needsoffor
testing
depends
on
the
types
of
tools
used
by
organizations
encrypting communications traffic and for having insight into
and
methods
of deployment.
such
trafficwithin
from
aorganizational
monitoring perspective.
some include,
Anomalies
informationFor
systems
organizations,
the
need
to
ensure
the
confidentiality
for example, large file transfers, long-time persistent of
communications
traffic
is paramount;
for others,
missionconnections,
unusual
protocols
andon
ports
use, and
attempted
This
controlisenhancement
focuses
the in
security
alerts
assurance
of
greater
concern.
Organizations
determine
communications
with
suspected
malicious
external
addresses.
generated
byvisibility
organizations
and transmitted
automated
whether the
requirement
applies to using
internal
encrypted
means.
In
contrast
to
the
alerts
generated
by
information
traffic, encrypted traffic intended for external destinations, or a
systems
SI-4
(5), which
subset ofinthe
traffic
types.tend to focus on information sources
internal to the systems (e.g., audit records), the sources of
information for this enhancement can include other entities as
well (e.g., suspicious activity reports, reports on potential
insider threats).
RELATED
PM-9
AC-3,AC-4,AC-5,AC-6,AC-10,AC-17,AC19,AC-20,AU-9,IA-2,IA-4,IA-5,IA-8,CM5,CM-6,CM-11,MA-3,MA-4,MA-5,PL4,SC-13
AU-2,AU-12
SC-23
AC-16
AC-16
CA-7
PS-4
AC-2,AC-4,AC-5,AC-6,AC-16,AC-17,AC18,AC-19,AC-20,AC-21,AC-22,AU9,CM-5,CM-6,CM-11,MA-3,MA-4,MA5,PE-3
CP-9,MP-6
AC-25,SC-11
CM-3
AU-2,AU-6
AC-3,AC-17,AC-19,AC-21,CM-6,CM7,SA-8,SC-2,SC-5,SC-7,SC-18
AC-16
SI-4
SI-4
AC-16,SI-7
SI-3
IA-2,IA-3,IA-4,IA-5
AC-16,SC-16
AC-3,AC-6,PE-3,PE-4,PS-2
AC-2,AC-3,AC-5,CM-6,CM-7,PL-2
AC-17,AC-18,AC-19
PL-4
AC-17
AC-4,SC-3,SC-30,SC-32
CM-6
IA-8
CA-7
AU-2
AC-2,AC-9,AC-14,IA-5
AC-19,MP-5,MP-6,SC-13
AC-7,PL-4
AC-7
SC-10,SC-23
CP-2,IA-2
AC-3,AC-4,AC-6,AC-21,AU-2,AU-10,SC16,MP-3
AC-4
AC-6,AU-2
AC-2,AC-3,AC-18,AC-19,AC-20,CA3,CA-7,CM-8,IA-2,IA-3,IA-8,MA-4,PE17,PL-4,SC-10,SI-4
AU-2,AU-12
SC-8,SC-12,SC-13
SC-7
AC-6
AT-2,AT-3,PS-6
AC-2,AC-3,AC-17,AC-19,CA-3,CA-7,CM8,IA-2,IA-3,IA-8,PL-4,SI-4
SC-8,SC-13
AC-19
AC-3,SC-15
PE-19
AC-3,AC-7,AC-18,AC-20,CA-9,CM-2,IA2,IA-3,MP-2,MP-4,MP-5,PL-4,SC-7,SC43,SI-3,SI-4
CA-6,IR-4
MP-5,SC-13,SC-28
AC-3,AC-17,AC-19,CA-3,PL-4,SA-9
CA-2
AC-3
AC-3,AC-4,AT-2,AT-3,AU-13
AC-3,AC-16,SC-3,SC-39
PM-9
AT-3,AT-4,PL-4
CA-2,CA-7,CP-4,IR-3
PL-4,PM-12,PS-3,PS-6
AT-2,AT-4,PL-4,PS-7,SA-3,SA-12,SA-16
PE-1,PE-13,PE-14,PE-15
PE-2,PE-3,PE-4,PE-5
AT-2,AT-3,PM-14
PM-9
AC-6,AC-17,AU-3,AU-12,MA-4,MP2,MP-4,SI-4
AU-2,AU-8,AU-12,SI-11
AU-6,AU-7
AU-2,AU-5,AU-6,AU-7,AU-11,SI-4
AU-4,SI-12
AU-15
AC-2,AC-3,AC-6,AC-17,AT-3,AU-7,AU16,CA-7,CM-5,CM-10,CM-11,IA-3,IA5,IR-5,IR-6,MA-4,MP-4,PE-3,PE-6,PE14,PE-16,RA-5,SC-7,SC-18,SC-19,SI3,SI-4,SI-7
AU-12,PM-7
AU-12,IR-4
AU-2,AU-12
AU-12,IR-4,RA-5
AU-3,AU-9,AU-11,AU-12
AT-2
AU-6
AU-2,AU-12
AU-3,AU-12
AC-3,AC-6,MP-2,MP-4,PE-2,PE-3,PE-6
AU-4,AU-5
AU-4,AU-5,AU-11
AU-10,SC-12,SC-13
AC-5
AC-3,MP-2
SC-12,SC-8,SC-13,SC-16,SC-17,SC-23
AC-4,AC-16
AC-3,AC-4,AC-16
AC-4,AC-16
AC-4,AC-16
AU-4,AU-5,AU-9,MP-6
AC-3,AU-2,AU-3,AU-6,AU-7
AU-8,AU-12
AU-7
PE-3,SC-7
AC-3,AU-4,AU-5,AU-9,AU-11
AU-5
AU-6
PM-9
CA-5,CA-6,CA-7,PM-9,RA-5,SA-11,SA12,SI-4
PE-3,SI-2
AC-3,AC-4,AC-20,AU-2,AU-12,AU16,CA-7,IA-3,SA-9,SC-7,SI-4
CM-7
CA-2,CA-7,CM-4,PM-4
CA-2,CA-7,PM-9,PM-10
CA-2,CA-5,CA-6,CM-3,CM-4,PM-6,PM9,RA-5,SA-11,SA-12,SI-2,SI-4
SA-12
CA-2
AC-3,AC-4,AC-18,AC-19,AU-2,AU12,CA-7,CM-2,IA-3,SC-7,SI-4
CM-6
PM-9
CM-3,CM-6,CM-8,CM-9,SA-10,PM5,PM-7
CM-5
CM-7,RA-5
CM-4,SC-3,SC-7
CA-7,CM-2,CM-4,CM-5,CM-6,CM-9,SA10,SI-2,SI-12
SC-13
CA-2,CA-7,CM-3,CM-9,SA-4,SA-5,SA10,SI-2
SA-11,SC-3,SC-7
SA-11
AC-3,AC-6,PE-3
AU-2,AU-12,AU-6,CM-3,CM-6
AU-6,AU-7,CM-3,CM-5,PE-6,PE-8
CM-7,SC-13,SI-7
AC-5,CM-3
AC-2
AC-2
AC-19,CM-2,CM-3,CM-7,SI-4
CA-7,CM-4
IR-4,SI-7
AC-6,CM-2,RA-5,SA-5,SC-7
AC-18,CM-7,IA-2
CM-8,PM-5
CM-6,CM-8,PM-5
CM-2,CM-6,CM-8,PM-5,SA-10,SC-34,SI7
CM-2,CM-6,PM-5
SI-7
AC-17,AC-18,AC-19,CA-7,SI-3,SI-4,SI7,RA-5
CM-2,CM-6
SA-4
CM-2,CM-3,CM-4,CM-5,CM-8,SA-10
AC-17,CM-8,SC-7
AC-3,CM-2,CM-3,CM-5,CM-6,CM-7,PL-4
CA-7,SI-4
AC-6
PM-9
AC-14,CP-6,CP-7,CP-8,CP-9,CP-10,IR4,IR-8,MP-2,MP-4,MP-5,PM-8,PM-11
PE-12
PE-12
PE-12
PE-12
SA-9
SA-14,SA-15
AT-2,AT-3,CP-2,IR-2
CP-2,CP-3,IR-3
IR-8,PM-8
CP-7
CP-10,SC-24
CP-2,CP-7,CP-9,CP-10,MP-4
RA-3
RA-3
CP-2,CP-6,CP-8,CP-9,CP-10,MA-6
RA-3
RA-3
CM-2,CM-6
CP-2,CP-6,CP-7
CP-2,CP-6,MP-4,MP-5,SC-13
CP-4
CP-4
CM-2,CM-8
CP-7,CP-10
AC-3,MP-2
CA-2,CA-6,CA-7,CP-2,CP-6,CP-7,CP9,SC-24
CM-2
AC-3,AC-6,PE-3
CP-2
PM-9
AC-2,AC-3,AC-14,AC-17,AC-18,IA-4,IA5,IA-8
AC-6
AC-6
AC-6
AC-6
AU-2,PE-3,SA-4
IA-10,IA-11,SC-37
AC-17,AC-18,AC-19,CA-3,IA-4,IA-5
SC-8,SC-12,SC-13
AU-2,AU-3,AU-6,AU-12
AC-2,IA-2,IA-3,IA-5,IA-8,SC-37
AT-2
AT-2
AC-16
AC-2,AC-3,AC-6,CM-6,IA-2,IA-4,IA-8,PL4,PS-5,PS-6,SC-12,SC-13,SC-17,SC-28
IA-6
IA-6
CA-2,CA-7,RA-5
PE-18
SC-12,SC-13
AC-2,AC-14,AC-17,AC-18,IA-2,IA-4,IA5,MA-4,RA-3,SA-12,SC-8
AU-2,PE-3,SA-4
AU-2
SA-4
SA-4
AU-2
SC-8
AU-6,SI-4
AC-11
PM-9
AT-3,CP-3,IR-8
CP-4,IR-8
AT-2
AU-6,CM-6,CP-2,CP-4,IR-2,IR-3,IR-8,PE6,SC-5,SC-7,SI-3,SI-4,SI-7
AC-2,AC-4,AC-16,CM-2,CM-3,CM-4
CP-10
AU-6,IR-8,PE-6,SC-5,SC-7,SI-3,SI-4,SI-7
AU-7,IR-4
IR-4,IR-5,IR-8
IR-7
AT-2,IR-4,IR-6,IR-8,SA-9
MP-2,MP-4,MP-5
PM-9
CM-3,CM-4,MA-4,MP-6,PE-16,SA-12,SI2
CA-7,MA-3
MA-2,MA-5,MP-6
SI-7
SI-3
AC-2,AC-3,AC-5,AC-6
AC-2,AC-3,AC-6,AC-17,AU-2,AU-3,IA2,IA-4,IA-5,IA-8,MA-2,MA-5,MP-6,PL2,SC-7,SC-10,SC-17
AU-2,AU-6,AU-12
MA-3,SA-12,SI-3,SI-7
SC-13
SC-8,SC-13
SC-13
AC-2,IA-8,MP-2,PE-2,PE-3,PE-4,RA-3
MP-6,PL-2
PS-3
PS-3
PS-3
CM-8,CP-2,CP-7,SA-14,SA-15
PM-9
AC-3,IA-2,MP-4,PE-2,PE-3,PL-2
AC-16,PL-2,RA-3
CP-6,CP-9,MP-2,MP-7,PE-3
AU-2,AU-9,AU-6,AU-12
AC-19,CP-9,MP-3,MP-4,RA-3,SC-8,SC13,SC-28
MP-2
MA-2,MA-4,RA-3,SC-4
SI-12
SI-3
AC-3,MP-2
AC-19,PL-4
PL-4
MP-6
PM-9
PE-3,PE-4,PS-3
AC-2,AC-3,AC-6
IA-2,IA-4,IA-5
PS-2,PS-6
AU-2,AU-6,MP-2,MP-4,PE-2,PE-4,PE5,PS-3,RA-3
PS-2
AC-4,SC-7
CP-6,CP-7
SA-12
CA-2,CA-7
MP-2,MP-4,PE-2,PE-3,PE-5,SC-7,SC-8
PE-2,PE-3,PE-4,PE-18
CA-7,IR-4,IR-8
SI-4
PS-2,PS-3
PE-4
PE-15
AT-3,CP-2,CP-7
CP-2,CP-7
AT-3
AT-3
CM-3,MA-2,MA-3,MP-5,SA-12
AC-17,CP-7
CP-2,PE-19,RA-3
PM-8
CM-8
PM-9
AC-2,AC-6,AC-14,AC-17,AC-20,CA2,CA-3,CA-7,CM-9,CP-2,IR-8,MA-4,MA5,MP-2,MP-4,MP-5,PL-7,PM-1,PM-7,PM8,PM-9,PM-11,SA-5,SA-17
CP-4,IR-4
AC-2,AC-6,AC-8,AC-9,AC-17,AC-18,AC19,AC-20,AT-2,AT-3,CM-11,IA-2,IA-4,IA5,MP-7,PS-6,PS-8,SA-5
PL-2
CM-2,CM-6,PL-2,PM-7,SA-5,SA17,Appendix J
SC-29,SC-36
SA-12
PM-9
AT-3,PL-2,PS-3
AC-2,IA-4,PE-2,PS-2
AC-3,AC-4
AC-3,AC-4
AC-2,IA-4,PE-2,PS-5,PS-6
AC-2,IA-4,PE-2,PS-4
PL-4,PS-2,PS-3,PS-4,PS-8
PS-2,PS-3,PS-4,PS-5,PS-6,SA-9,SA-21
PL-4,PS-6
PM-9
CM-8,MP-4,RA-3,SC-7
RA-2,PM-9
CA-2,CA-7,CM-4,CM-6,RA-2,RA-3,SA11,SI-2
SI-3,SI-7
SI-3,SI-5
AU-13
IR-4,IR-5,SI-4
AU-6
PM-9
PM-3,PM-11
AT-3,PM-7,SA-8
CM-6,PL-2,PS-7,SA-3,SA-5,SA-8,SA11,SA-12
SA-5
SA-5
SA-12
CM-8
SC-8,SC-12,SC-13
SC-12,SC-13
CA-7
CM-7,SA-9
IA-2,IA-8
CM-6,CM-8,PL-2,PL-4,PS-2,SA-3,SA-4
PM-7,SA-3,SA-4,SA-17,SC-2,SC-3
CA-3,IR-7,PS-7
CA-6,RA-3
CM-7
CM-3,CM-4,CM-9,SA-12,SI-2
SI-7
SI-7
CA-2,CM-4,SA-3,SA-4,SA-5,SI-2
PM-15,RA-5
AT-3,CA-7,RA-5,SA-12
AT-3,CM-8,IR-4,PE-16,PL-8,SA-3,SA4,SA-8,SA-10,SA-14,SA-15,SA-18,SA19,SC-29,SC-30,SC-38,SI-7
SA-19
CA-2,SA-11
SA-15
RA-5
RA-2,SA-4,SA-8,SA-14,SC-3
CP-2,PL-2,PL-8,PM-1,SA-8,SA-12,SA13,SA-15,SA-20
SA-3,SA-8
SA-4,SA-14
SA-4
CM-7
RA-5
IR-8
AT-2,AT-3,SA-5
PL-8,PM-7,SA-3,SA-8
SA-5
SA-5
SA-5
SC-3
SA-11
AC-5,AC-6
PE-3,SA-12,SI-7
SA-3
SI-4
PE-3,SA-12,SI-7
CP-2,SA-8,SA-14
PS-3,PS-7
PL-2,SA-3
PM-9
SA-4,SA-8,SC-3
AC-3
AC-3,AC-6,SA-4,SA-5,SA-8,SA-13,SC2,SC-7,SC-39
AC-3,AC-4,MP-6
SC-6,SC-7
CA-7,SI-4
AC-4,AC-17,CA-3,CM-7,CP-8,IR-4,RA3,SC-5,SC-13
SC-8
AC-3,AU-2
AU-2,AU-6,SC-38,SC-44,SI-3,SI-4
SI-3
AC-3
SA-8,SC-2,SC-3
PE-4,PE-19
AC-2,AC-3,AU-2,SI-4
SC-4
CP-2,SC-24
CA-9,SC-3
AC-17,PE-4
SC-13
AU-10
SC-12,SC-13
SC-12,SC-13
AC-16,AC-25
SC-13,SC-17
AC-2,AC-3,AC-7,AC-17,AC-18,AU-9,AU10,CM-11,CP-9,IA-3,IA-7,MA-4,MP2,MP-4,MP-5,SA-4,SC-8,SC-12,SC28,SI-7
AC-21
AC-3,AC-4,AC-16
AU-10,SC-8
SC-12
AU-2,AU-12,CM-2,CM-6,SI-3
CM-6,SC-7,SC-15
AU-10,SC-8,SC-12,SC-13,SC-21,SC-22
SC-20,SC-22
SC-2,SC-20,SC-21,SC-24
SC-8,SC-10,SC-11
SC-13
SC-13
CP-2,CP-10,CP-12,SC-7,SC-22
SC-30
SC-30,SC-44,SI-3,SI-4
SC-29
AC-3,AC-6,CA-7,CM-3,CM-5,CM-6,PE3,SC-8,SC-13,SI-3,SI-7
AC-19,SC-12
SA-12,SA-14,SC-27
SC-26,SC-29,SI-14
AC-3,AC-4,PL-2
AC-4,SA-8,SC-2,SC-3,SC-7
AC-3,SI-7
AC-19,MP-7
AC-5,CM-3,CM-5,CM-9,MP-2,MP-4,MP5,SA-12,SC-28,SI-3
SC-26,SC-44,SI-3,SI-4
CP-6,CP-7
SI-4
AC-2,CM-3,CM-5,CM-7,IA-4,IA-5,MA4,SC-12,SI-3,SI-4,SI-7
RA-2,RA-5,SA-12
AC-3,AC-4,AC-6,SA-4,SA-5,SA-8,SC2,SC-3
AC-18,SC-5
SC-12,SC-13
SC-12,SC-13
SC-12,SC-13
SC-12,SC-13
CM-6,SC-7
SC-7,SC-25,SC-26,SC-30
PM-9
CA-2,CA-7,CM-3,CM-5,CM-8,MA-2,IR4,RA-5,SA-10,SA-11,SI-11
CM-6,SI-4
CM-3,MP-2,SA-4,SA-8,SA-12,SA-13,SC7,SC-26,SC-44,SI-2,SI-4,SI-7
AU-2,SI-8
SI-8
AC-6,CM-5
CA-2,CA-7,RA-5
AU-6
SC-12,SC-13,SC-23
AC-3,AC-4,AC-8,AC-17,AU-2,AU-6,AU7,AU-9,AU-12,CA-7,IR-4,PE-3,RA-5,SC7,SC-26,SC-35,SI-3,SI-7
AU-5,PE-6
CP-9
AC-18,IA-3
AC-18,IA-3
AC-18
AU-6
SA-12
AC-6,CM-7,SA-5,SA-9
SI-2
CA-7,CM-6
SI-2
SA-12,SI-4,SI-5
SA-12,SC-8,SC-13,SI-3
AU-3,SI-2,SI-8
SC-13
IR-4,IR-5,SI-4
AU-2,AU-6,AU-12
SA-5
AT-2,AT-3,SC-5,SC-7,SI-3
AU-3,SI-2,SI-7
CM-3,CM-5
AU-2,AU-3,SC-31
AC-16,AU-5,AU-11,MP-2,MP-4
CP-2,CP-10,MA-6
SC-30,SC-34
SI-3,SI-4
AC-25,SC-3
CP-12,CP-13,SC-24,SI-13
PM-8
PM-4,SA-2
CA-5
PL-2,PL-8,PM-11,RA-2,SA-3
PM-1,PM-9,PM-11,RA-3
RA-3
CA-6
PM-7,PM-8,RA-2
AC-6,AT-2,AU-6,AU-7,AU-10,AU-12,AU13,CA-7,IA-4,IR-4,MP-7,PE-2,PS-3,PS4,PS-5,PS-8,SC-7,SC-38,SI-4,PM-1,PM14
AT-2,AT-3
AT-3,CA-7,CP-4,IR-3,SI-4
SI-5
PM-12,PM-16