User endpoint devices
Control type
Information Security Properties
Cybersecurity concepts
Operational capabilities
Security domains
Preventative
Confidentiality
Integrity
Availability
Protect
Asset management
Information protection
Protection