AC |
Access Control |
Access |
AT |
Awareness and Training |
Roles and Responsibilities |
AU |
Audit and Accountability |
Roles and Responsibilities; Compliance Audits |
CA |
Security Assessment and Authorization |
Risk Management; Access |
CM |
Configuration Management |
Configuration and Change Management |
CP |
Contingency Planning |
Business Continuity and Disaster Recovery |
IA |
Identification and Authentication |
Access |
IR |
Incident Response |
Incident Response; Breach Notification |
MA |
Maintenance |
Configuration and Change Management |
PE |
Physical and Environmental Protection |
Facility and Physical Security |
PL |
Planning |
Security Program Overview; Security Architecture & Operating Model |
PS |
Personnel Security |
HR & Personnel Security |
RA |
Risk Assessment |
Risk Management |
SA |
System and Services Acquisition |
Third Party Security, Vendor Risk Management and Systems/Services Acquisition |
SC |
System and Communications Protection |
Data Management; Data Protection; and Threat Detection & Prevention |
SI |
System and Information Integrity |
Data Management; Data Protection; Product Security & Secure Software Development; Vulnerability Management;and System Audits, Monitoring & Assessments |
PM |
Program Management |
Security Program Overview; Roles and Responsibilities; and Policy Management |