- AC: Access Control
- AC-1: Access Control Policy And Procedures
- AC-2: Account Management
- AC-3: Access Enforcement
- AC-3 (9): Controlled Release
- AC-6: Least Privilege
- AC-7: Unsuccessful Login Attempts
- AC-8: System Use Notification
- AC-14: Permitted Actions Without Identification Or Authentication
- AC-17: Remote Access
- AC-18: Wireless Access
- AC-19: Access Control For Mobile Devices
- AC-20: Use Of External Information Systems
- AC-22: Publicly Accessible Content
- AU: Audit And Accountability
- AU-1: Audit And Accountability Policy And Procedures
- AU-2: Auditable Events
- AU-3: Content Of Audit Records
- AU-4: Audit Storage Capacity
- AU-5: Response To Audit Processing Failures
- AU-6: Audit Review, Analysis, And Reporting
- AU-8: Time Stamps
- AU-9: Protection Of Audit Information
- AU-11: Audit Record Retention
- AU-12: Audit Generation
- CM: Configuration Management
- CP: Contingency Planning
- IA: Identification And Authentication
- IA-1: Identification And Authentication Policy And Procedures
- IA-2: Identification And Authentication (Organizational Users)
- IA-2 (1): Network Access To Privileged Accounts
- IA-2 (12): Acceptance Of Piv Credentials
- IA-4: Identifier Management
- IA-5: Authenticator Management
- IA-5 (1): Password-Based Authentication
- IA-5 (11): Hardware Token-Based Authentication
- IA-6: Authenticator Feedback
- IA-7: Cryptographic Module Authentication
- IA-8: Identification And Authentication (Non-Organizational Users)
- IA-8 (1): Acceptance Of Piv Credentials From Other Agencies
- IA-8 (2): Acceptance Of Third-Party Credentials
- IA-8 (3): Use Of Ficam-Approved Products
- IA-8 (4): Use Of Ficam-Issued Profiles
- IR: Incident Response
- MA: Maintenance
- MP: Media Protection
- PE: Physical And Environmental Protection
- PE-1: Physical And Environmental Protection Policy And Procedures
- PE-2: Physical Access Authorizations
- PE-3: Physical Access Control
- PE-6: Monitoring Physical Access
- PE-8: Visitor Access Records
- PE-12: Emergency Lighting
- PE-13: Fire Protection
- PE-14: Temperature And Humidity Controls
- PE-15: Water Damage Protection
- PE-16: Delivery And Removal
- PL: Planning
- PS: Personnel Security
- RA: Risk Assessment
- SA: System And Services Acquisition
- SC: System And Communications Protection
- SC-1: System And Communications Protection Policy And Procedures
- SC-5: Denial Of Service Protection
- SC-7: Boundary Protection
- SC-12: Cryptographic Key Establishment And Management
- SC-13: Cryptographic Protection
- SC-15: Collaborative Computing Devices
- SC-20: Secure Name / Address Resolution Service
- SC-21: Secure Name / Address Resolution Service
- SC-22: Architecture And Provisioning For Name / Address Resolution Service
- SC-39: Process Isolation
- AT: Awareness And Training
- CA: Assessment Authorization And Monitoring
- SI: System And Information Integrity