# Control Library

| Control Category                        | Control ID   | Control Summary                         | Control Description                                                                | Applicable ITRA Levels (1 / 2/ 3)       | EOS Risk Assessment |
| --------------------------------------- | ------------ | --------------------------------------- | ---------------------------------------------------------------------------------- | --------------------------------------- | ------------------- |
| IT & Cybersecurity Governance           | CTRL-GOV-001 | Digital Security Governance Program     | Mechanisms to implement cybersecurity and privacy governance controls.             | - / - / -                               | -                   |
| IT & Cybersecurity Governance           | CTRL-GOV-002 | Publishing IT Documentation             | Mechanisms to establish/maintain/disseminate IT policies/standards/procedures.     | - / - / -                               | -                   |
| IT & Cybersecurity Governance           | CTRL-GOV-003 | Periodic Review of IT Documentation     | Mechanisms to review program/policies at intervals or upon changes.                | - / - / -                               | -                   |
| Asset Management                        | CTRL-AST-001 | Asset Inventories                       | Mechanisms for asset inventories, including software, granularity, accountability. | Y / - / -                               | Y                   |
| Asset Management                        | CTRL-AST-002 | Network Diagrams & DFDs                 | Mechanisms for maintaining diagrams with security details and data flows.          | - / - / -                               | -                   |
| Asset Management                        | CTRL-AST-003 | Secure Disposal of Equipment            | Mechanisms for secure disposal/destruction/repurpose per standards.                | - / - / Y (ITRC)                        | Y (ITRC)            |
| Asset Management                        | CTRL-AST-004 | BYOD Usage                              | Mechanisms to govern BYOD program risks.                                           | - / - / -                               | -                   |
| Artificial & Autonomous Technologies    | CTRL-AAT-001 | AI TEVV Trustworthiness Assessment      | Mechanisms to evaluate AI/AAT for trustworthy behavior/security.                   | - / - / -                               | -                   |
| Business Continuity & Disaster Recovery | CTRL-BCD-001 | Identify Critical Assets                | Mechanisms to document critical systems supporting missions.                       | - / - / -                               | -                   |
| Business Continuity & Disaster Recovery | CTRL-BCD-002 | Contingency Plan Testing                | Mechanisms for tests/exercises to evaluate plan effectiveness.                     | Y / Y / -                               | Y (ITRC)            |
| Business Continuity & Disaster Recovery | CTRL-BCD-003 | Data Backups                            | Mechanisms for backups/verification per RTO/RPO, with access restrictions/crypto.  | Y / Y / Y (ITRC)                        | -                   |
| Business Continuity & Disaster Recovery | CTRL-BCD-004 | Contingency Planning & Updates          | Mechanisms to update plans with needs/changes/testing.                             | - / - / -                               | -                   |
| Capacity & Performance Planning         | CTRL-CAP-001 | Capacity Planning                       | Mechanisms for capacity planning during contingencies.                             | - / - / Y (ITRC)                        | -                   |
| Capacity & Performance Planning         | CTRL-CAP-002 | Performance Monitoring                  | Automated mechanisms for monitoring/alerting system health.                        | Y / Y / Y (ITRC)                        | -                   |
| Change Management                       | CTRL-CHG-001 | Configuration Change Control            | Mechanisms for governing change control processes.                                 | - / - / -                               | -                   |
| Change Management                       | CTRL-CHG-002 | Prohibition Of Changes                  | Mechanisms to prohibit unauthorized changes.                                       | - / - / -                               | -                   |
| Change Management                       | CTRL-CHG-003 | Test, Validate & Document Changes       | Mechanisms for testing/documenting in non-prod before prod.                        | - / - / -                               | -                   |
| Cloud Security                          | CTRL-CLD-001 | Cloud Infrastructure Onboarding         | Mechanisms to secure cloud services per standards.                                 | - / - / -                               | -                   |
| Cloud Security                          | CTRL-CLD-002 | Cloud Security Architecture             | Mechanisms for secure cloud design/maintenance.                                    | - / - / -                               | -                   |
| Cloud Security                          | CTRL-CLD-003 | API Security                            | Mechanisms for secure interoperability.                                            | Y / - / -                               | -                   |
| Cloud Security                          | CTRL-CLD-004 | Virtual Machine Images                  | Mechanisms for VM image integrity.                                                 | - / - / -                               | -                   |
| Cloud Security                          | CTRL-CLD-005 | Multi-Tenant Environments               | Mechanisms for tenant segmentation.                                                | Y / - / -                               | -                   |
| Cloud Security                          | CTRL-CLD-006 | Data Handling & Portability             | Mechanisms for secure data protocols in cloud.                                     | Y / - / -                               | -                   |
| Cloud Security                          | CTRL-CLD-007 | Sensitive Data In Public Clouds         | Mechanisms to limit sensitive data in public clouds.                               | Y / - / -                               | -                   |
| Cloud Security                          | CTRL-CLD-008 | Cloud Access Point                      | Mechanisms for CAP boundary protection/monitoring.                                 | - / - / -                               | -                   |
| Compliance                              | CTRL-CPL-001 | Statutory/Regulatory Compliance         | Mechanisms for identifying/implementing compliance controls.                       | - / - / Y (ITRC) (If personal data)     | -                   |
| Configuration Management                | CTRL-CFG-001 | System Hardening                        | Mechanisms for secure baselines per standards; automate/report.                    | Y / Y / Y (ITRC)                        | -                   |
| Configuration Management                | CTRL-CFG-002 | Configuration Enforcement               | Automated mechanisms for endpoint config monitoring/enforcement.                   | - / - / -                               | -                   |
| Continuous Monitoring                   | CTRL-MON-001 | Centralized Security Event Logs         | Mechanisms for SIEM centralized log collection/analysis.                           | Y / Y / Y (ITCS)                        | -                   |
| Continuous Monitoring                   | CTRL-MON-002 | Anomalous Behavior                      | Mechanisms to detect/respond to anomalous behavior.                                | - / - / -                               | -                   |
| Cryptographic Protections               | CTRL-CRY-001 | Transmission Confidentiality            | Crypto mechanisms for data in transmission.                                        | Y / Y / - (ITCS) (If confidential data) | -                   |
| Cryptographic Protections               | CTRL-CRY-002 | Transmission Integrity                  | Crypto mechanisms for data integrity in transmission.                              | - / - / -                               | -                   |
| Cryptographic Protections               | CTRL-CRY-003 | Encrypting Data At Rest                 | Crypto mechanisms for data at rest.                                                | Y / Y / - (ITCS) (If confidential data) | -                   |
| Cryptographic Protections               | CTRL-CRY-004 | Cryptographic Key Management            | Mechanisms for key management.                                                     | Y / - / -                               | -                   |
| Data Classification & Handling          | CTRL-DCH-001 | Data & Asset Classification             | Mechanisms for categorizing data/assets per requirements.                          | - / - / -                               | -                   |
| Data Classification & Handling          | CTRL-DCH-002 | Digital Media Sanitization              | Mechanisms for sanitizing media per classification.                                | - / - / -                               | -                   |
| Data Classification & Handling          | CTRL-DCH-003 | Removable Media Security                | Mechanisms to restrict removable media per parameters.                             | Y / - / -                               | -                   |
| Data Classification & Handling          | CTRL-DCH-004 | Use of External Systems                 | Mechanisms to govern external data handling.                                       | - / - / -                               | -                   |
| Data Classification & Handling          | CTRL-DCH-005 | Limitations on Use                      | Mechanisms to restrict sensitive data use/distribution.                            | - / - / -                               | -                   |
| Data Classification & Handling          | CTRL-DCH-006 | Periodic Scans for Sensitive Data       | Mechanisms to scan for sensitive data.                                             | - / - / -                               | -                   |
| Data Classification & Handling          | CTRL-DCH-007 | Ad-Hoc Large File Transfers             | Mechanisms to secure large file exchanges.                                         | Y / - / -                               | -                   |
| Data Classification & Handling          | CTRL-DCH-008 | Media & Data Retention                  | Mechanisms for retention per obligations.                                          | Y / - / -                               | -                   |
| Data Classification & Handling          | CTRL-DCH-009 | Information Location                    | Mechanisms to identify info locations.                                             | - / - / -                               | -                   |
| Data Classification & Handling          | CTRL-DCH-010 | Transfer of Sensitive Data              | Mechanisms to govern cross-border transfers.                                       | Y / - / -                               | -                   |
| Embedded Technology                     | CTRL-EMB-001 | Internet of Things (IoT)                | Mechanisms to manage IoT risks.                                                    | - / - / -                               | -                   |
| Embedded Technology                     | CTRL-EMB-002 | Operational Technology (OT)             | Mechanisms to manage OT risks.                                                     | - / - / -                               | -                   |
| Endpoint Security                       | CTRL-END-001 | Malicious Code Protection               | Mechanisms for antimalware detection/eradication.                                  | Y / Y / - (ITCS)                        | -                   |
| Endpoint Security                       | CTRL-END-002 | Endpoint Protection Measures            | Mechanisms for endpoint CIA/safety protection.                                     | Y / - / -                               | -                   |
| Endpoint Security                       | CTRL-END-003 | Prohibit Installation Without Privilege | Mechanisms to prohibit unprivileged installs.                                      | Y / - / -                               | -                   |
| Endpoint Security                       | CTRL-END-004 | Endpoint File Integrity Monitoring      | Mechanisms for FIM detection/reporting.                                            | - / - / -                               | -                   |
| Endpoint Security                       | CTRL-END-005 | Phishing & Spam Protection              | Mechanisms for anti-phishing/spam.                                                 | - / - / -                               | -                   |
| Human Resources Security                | CTRL-HRS-001 | Roles & Responsibilities                | Mechanisms to define cybersecurity responsibilities.                               | - / - / -                               | -                   |
| Human Resources Security                | CTRL-HRS-002 | Personnel Screening                     | Mechanisms for screening before access.                                            | - / - / -                               | -                   |
| Human Resources Security                | CTRL-HRS-003 | Confidentiality Agreements              | Mechanisms for NDAs/confidentiality agreements.                                    | - / - / -                               | -                   |
| Identification & Authentication         | CTRL-IAC-001 | Organizational User Identification      | Mechanisms for AAA organizational users.                                           | Y / Y / Y (ITCS)                        | -                   |
| Identification & Authentication         | CTRL-IAC-002 | Non-Organizational User Identification  | Mechanisms for AAA third-party users.                                              | Y / - / -                               | -                   |
| Identification & Authentication         | CTRL-IAC-003 | Multi-Factor Authentication             | Mechanisms for MFA in specified scenarios.                                         | - / - / -                               | -                   |
| Identification & Authentication         | CTRL-IAC-004 | User Provisioning & De-Provisioning     | Mechanisms for registration/de-registration/revocation.                            | Y / - / -                               | -                   |
| Identification & Authentication         | CTRL-IAC-005 | Role-Based Access Control               | Mechanisms for RBAC with need-to-know.                                             | Y / - / -                               | -                   |
| Identification & Authentication         | CTRL-IAC-006 | Account Management                      | Mechanisms for governing account types.                                            | - / - / -                               | -                   |
| Identification & Authentication         | CTRL-IAC-007 | Privileged Account Management           | Mechanisms for restricting privileged access.                                      | Y / Y / Y (ITRC)                        | -                   |
| Identification & Authentication         | CTRL-IAC-008 | Password-Based Authentication           | Mechanisms for strong password criteria.                                           | Y / - / -                               | -                   |
| Incident Response                       | CTRL-IRO-001 | Incident Handling                       | Mechanisms for incident lifecycle.                                                 | - / - / -                               | -                   |
| Incident Response                       | CTRL-IRO-002 | Integrated Incident Response Team       | Mechanisms for establishing response team.                                         | - / - / -                               | -                   |
| Incident Response                       | CTRL-IRO-003 | Chain of Custody & Forensics            | Mechanisms for forensics/chain of custody.                                         | - / - / -                               | -                   |
| Incident Response                       | CTRL-IRO-004 | RCA & Lessons Learned                   | Mechanisms to incorporate lessons learned.                                         | - / - / -                               | -                   |
| Maintenance                             | CTRL-MNT-001 | Controlled Maintenance                  | Mechanisms for lifecycle maintenance.                                              | - / - / -                               | -                   |
| Maintenance                             | CTRL-MNT-002 | Maintenance Monitoring                  | Mechanisms for tracking maintenance quality.                                       | - / - / -                               | -                   |
| Mobile Device Management                | CTRL-MDM-001 | Access Control For Mobile Devices       | Mechanisms for mobile access controls.                                             | - / - / -                               | -                   |
| Mobile Device Management                | CTRL-MDM-002 | Device/Container Encryption             | Crypto mechanisms for mobile encryption.                                           | - / - / -                               | -                   |
| Mobile Device Management                | CTRL-MDM-003 | Remote Purging                          | Mechanisms for remote info purge.                                                  | - / - / -                               | -                   |
| Network Security                        | CTRL-NET-001 | Layered Network Defenses                | Mechanisms for layered security design.                                            | Y / Y / - (ITCS)                        | -                   |
| Network Security                        | CTRL-NET-002 | Boundary Protection                     | Mechanisms for boundary monitoring/control.                                        | Y / - / -                               | -                   |
| Network Security                        | CTRL-NET-003 | Data Flow Enforcement (ACLs)            | Mechanisms for firewall/router configs.                                            | Y / - / -                               | -                   |
| Network Security                        | CTRL-NET-004 | Network Segmentation                    | Mechanisms for resource isolation.                                                 | Y / Y / - (ITCS)                        | -                   |
| Network Security                        | CTRL-NET-005 | NIDS/NIPS                               | Mechanisms for intrusion detection/prevention.                                     | Y / - / -                               | -                   |
| Network Security                        | CTRL-NET-006 | Remote Access                           | Mechanisms for secure remote access methods.                                       | Y / Y / - (ITCS)                        | -                   |
| Network Security                        | CTRL-NET-007 | Wireless Networking                     | Mechanisms for wireless control/monitoring.                                        | Y / - / -                               | -                   |
| Network Security                        | CTRL-NET-008 | Data Loss Prevention                    | Mechanisms for DLP on sensitive info.                                              | Y / Y / - (ITCS) (If confidential data) | -                   |
| Network Security                        | CTRL-NET-009 | DNS & Content Filtering                 | Mechanisms for proxy/filtering traffic.                                            | Y / - / -                               | -                   |
| Physical & Environmental Security       | CTRL-PES-001 | Physical Access Control                 | Mechanisms for physical access enforcement.                                        | Y / - / -                               | -                   |
| Physical & Environmental Security       | CTRL-PES-002 | Supporting Utilities                    | Mechanisms for utility protection (power, water, etc.).                            | Y / - / -                               | -                   |
| Project & Resource Management           | CTRL-PRM-001 | SDLC Management                         | Mechanisms for SDLC change control.                                                | - / - / -                               | -                   |
| Risk Management                         | CTRL-RSK-001 | Risk Management Program                 | Mechanisms for risk controls implementation.                                       | - / - / -                               | -                   |
| Risk Management                         | CTRL-RSK-002 | Data Protection Impact Assessment       | Mechanisms for DPIA on PD systems.                                                 | Y / - / -                               | -                   |
| Secure Engineering & Architecture       | CTRL-SEA-001 | Alignment With Enterprise Architecture  | Mechanisms for architecture alignment with security.                               | Y / - / -                               | -                   |
| Security Awareness & Training           | CTRL-SAT-001 | Security & Privacy Awareness            | Mechanisms for role-relevant training.                                             | - / - / -                               | -                   |
| Security Awareness & Training           | CTRL-SAT-002 | Training Records                        | Mechanisms for documenting/monitoring training.                                    | - / - / -                               | -                   |
| Security Operations                     | CTRL-OPS-001 | Security Operations Center              | Mechanisms for 24x7 SOC.                                                           | - / - / -                               | -                   |
| Technology Development & Acquisition    | CTRL-TDA-001 | Secure Coding                           | Mechanisms for secure coding principles.                                           | Y / Y / Y                               | -                   |
| Technology Development & Acquisition    | CTRL-TDA-002 | Separation of Environments              | Mechanisms for separate dev/test/prod environments.                                | Y / - / -                               | -                   |
| Technology Development & Acquisition    | CTRL-TDA-003 | Security Testing in Development         | Mechanisms for ST\&E plans/remediation.                                            | - / - / -                               | -                   |
| Technology Development & Acquisition    | CTRL-TDA-004 | Use of Live Data                        | Mechanisms for approving live data in dev/test.                                    | Y / - / -                               | -                   |
| Technology Development & Acquisition    | CTRL-TDA-005 | Access to Source Code                   | Mechanisms to limit software library changes.                                      | - / - / -                               | -                   |
| Third-Party Management                  | CTRL-TPM-001 | Third-Party Criticality Assessments     | Mechanisms for assessing critical suppliers.                                       | - / - / -                               | -                   |
| Third-Party Management                  | CTRL-TPM-002 | Third-Party Services                    | Mechanisms for mitigating third-party risks.                                       | - / - / -                               | -                   |
| Third-Party Management                  | CTRL-TPM-003 | Third-Party Contract Requirements       | Mechanisms for reviewing contracts/NDAs.                                           | - / - / -                               | -                   |
| Third-Party Management                  | CTRL-TPM-004 | Monitoring Third-Party Disclosure       | Mechanisms for monitoring unauthorized disclosure.                                 | - / - / -                               | -                   |
| Third-Party Management                  | CTRL-TPM-005 | Review of Third-Party Services          | Mechanisms for auditing TSP compliance.                                            | - / - / -                               | -                   |
| Third-Party Management                  | CTRL-TPM-006 | Third-Party Incident Capabilities       | Mechanisms for response planning with suppliers.                                   | - / - / -                               | -                   |
| Threat Management                       | CTRL-THR-001 | Threat Intelligence Feeds               | Mechanisms for using threat intel.                                                 | - / - / -                               | -                   |
| Threat Management                       | CTRL-THR-002 | Insider Threat Program                  | Mechanisms for insider threat program.                                             | - / - / -                               | -                   |
| Vulnerability & Patch Management        | CTRL-VPM-001 | Vulnerability Remediation Process       | Mechanisms for identifying/remediating vulnerabilities.                            | Y / - / -                               | -                   |
| Vulnerability & Patch Management        | CTRL-VPM-002 | Software & Firmware Patching            | Mechanisms for patching OS/apps/firmware.                                          | Y / Y / - (ITRC)                        | -                   |
| Vulnerability & Patch Management        | CTRL-VPM-003 | Vulnerability Scanning                  | Mechanisms for recurring scanning.                                                 | Y / Y / Y (ITCS)                        | -                   |
| Vulnerability & Patch Management        | CTRL-VPM-004 | Penetration Testing                     | Mechanisms for conducting pen testing.                                             | Y / Y / - (ITCS)                        | -                   |
| Web Security                            | CTRL-WEB-001 | Web Application Firewall                | Mechanisms for deploying WAFs.                                                     | Y / - / -                               | -                   |
| Web Security                            | CTRL-WEB-002 | Client-Facing Web Services              | Mechanisms for protecting client data in web services.                             | - / - / -                               | -                   |
