- AC: Access Control
- AC-1: Policy and Procedures
- AC-2: Account Management
- AC-3: Access Enforcement
- AC-3 (14): Individual Access
- AC-7: Unsuccessful Logon Attempts
- AC-8: System Use Notification
- AC-14: Permitted Actions Without Identification or Authentication
- AC-17: Remote Access
- AC-18: Wireless Access
- AC-19: Access Control for Mobile Devices
- AC-20: Use of External Systems
- AC-21: Information Sharing
- AC-22: Publicly Accessible Content
- AT: Awareness And Training
- AU: Audit And Accountability
- AU-1: Policy and Procedures
- AU-2: Event Logging
- AU-3: Content of Audit Records
- AU-4: Audit Log Storage Capacity
- AU-5: Response to Audit Logging Process Failures
- AU-6: Audit Record Review, Analysis, and Reporting
- AU-8: Time Stamps
- AU-9: Protection of Audit Information
- AU-11: Audit Record Retention
- AU-12: Audit Record Generation
- CA: Assessment Authorization And Monitoring
- CM: Configuration Management
- CP: Contingency Planning
- IA: Identification And Authentication
- IA-1: Policy and Procedures
- IA-2: Identification and Authentication (organizational Users)
- IA-2 (1): Multi-factor Authentication to Privileged Accounts
- IA-2 (2): Multi-factor Authentication to Non-privileged Accounts
- IA-2 (8): Access to Accounts — Replay Resistant
- IA-2 (12): Acceptance of PIV Credentials
- IA-4: Identifier Management
- IA-5: Authenticator Management
- IA-5 (1): Password-based Authentication
- IA-6: Authentication Feedback
- IA-7: Cryptographic Module Authentication
- IA-8: Identification and Authentication (non-organizational Users)
- IA-8 (1): Acceptance of PIV Credentials from Other Agencies
- IA-8 (2): Acceptance of External Authenticators
- IA-8 (4): Use of Defined Profiles
- IA-11: Re-authentication
- IR: Incident Response
- MA: Maintenance
- MP: Media Protection
- PE: Physical And Environmental Protection
- PL: Planning
- PS: Personnel Security
- RA: Risk Assessment
- SA: System And Services Acquisition
- SC: System And Communications Protection
- SC-1: Policy and Procedures
- SC-5: Denial-of-service Protection
- SC-7: Boundary Protection
- SC-12: Cryptographic Key Establishment and Management
- SC-13: Cryptographic Protection
- SC-15: Collaborative Computing Devices and Applications
- SC-20: Secure Name/address Resolution Service (authoritative Source)
- SC-21: Secure Name/address Resolution Service (recursive or Caching Resolver)
- SC-22: Architecture and Provisioning for Name/address Resolution Service
- SC-39: Process Isolation
- SI: System And Information Integrity
- SI-1: Policy and Procedures
- SI-2: Flaw Remediation
- SI-3: Malicious Code Protection
- SI-4: System Monitoring
- SI-5: Security Alerts, Advisories, and Directives
- SI-12: Information Management and Retention
- SI-12 (1): Limit Personally Identifiable Information Elements
- SI-12 (2): Minimize Personally Identifiable Information in Testing, Training, and Research
- SI-12 (3): Information Disposal
- SI-18: Personally Identifiable Information Quality Operations