Control Families Flashcards

(40 cards)

1
Q

AC

A

Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AT

A

Awareness and Training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AU

A

Audit and Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CA

A

Assessment, Authorization, and Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CM

A

Configuration Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CP

A

Contingency Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IA

A

Identification and Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IR

A

Incident Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

MA

A

Maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

MP

A

Media Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PE

A

Physical and Environmental Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

PL

A

Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

PM

A

Program Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

PS

A

Personnel Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

PT

A

PII Processing and Transparency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RA

A

Risk Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SA

A

System and Sevices Acquisition

18
Q

SC

A

System and Communications Protection

19
Q

SI

A

System and Information Integrity

20
Q

SR

A

Supply Chain Risk Management

21
Q

AC-2

A

Account Management

22
Q

AU-2

A

Event Logging

23
Q

CA-2

A

Control Assessments

24
Q

CM-2

A

Baseline Configuration

25
CP-2
Contingency Plan
26
IA-2
Identification and Authentication (Organizational Users)
27
IR-2
Incident Response Training
28
MA-2
Controlled Maintenance
29
MP-2
Media Access
30
PE-2
Physical Access Authorizations
31
PL-2
System Security and Privacy Plans
32
PM-2
Information Security Program Leadership Role
33
PS-2
Position Risk Designation
34
PT-2
Authority to Process Peronally Identifiable Information
35
RA-2
Security Categorization
36
SA-2
Allocation of Resources
37
SC-2
Separation of System and User Functionality
38
SI-2
Flaw Remediation
39
SR-2
Supply Chain Risk Management Plan
40
SP 800-53
Security and Privacy Controls for Information Systems