User endpoint devices

Control type Information Security Properties Cybersecurity concepts Operational capabilities Security domains
Preventative Confidentiality
Integrity
Availability
Protect Asset management
Information protection
Protection