| 💼 NIST SP 800-53 Revision 5 → 💼 AC-4 Information Flow Enforcement | 32 | 69 | 123 | | no data |
| 💼 NIST SP 800-53 Revision 5 → 💼 AC-17(2) Remote Access _ Protection of Confidentiality and Integrity Using Encryption | | 12 | 21 | | no data |
| 💼 NIST SP 800-53 Revision 5 → 💼 IA-5(1) Authenticator Management _ Password-based Authentication | | | 13 | | no data |
| 💼 NIST SP 800-53 Revision 5 → 💼 SC-7(4) Boundary Protection _ External Telecommunications Services | | | 49 | | no data |
| 💼 NIST SP 800-53 Revision 5 → 💼 SC-8 Transmission Confidentiality and Integrity | 5 | 8 | 25 | | no data |
| 💼 NIST SP 800-53 Revision 5 → 💼 SC-8(1) Transmission Confidentiality and Integrity _ Cryptographic Protection | | 8 | 23 | | no data |
| 💼 NIST SP 800-53 Revision 5 → 💼 SC-8(2) Transmission Confidentiality and Integrity _ Pre- and Post-transmission Handling | | | 16 | | no data |
| 💼 NIST SP 800-53 Revision 5 → 💼 SC-12(3) Cryptographic Key Establishment and Management _ Asymmetric Keys | | | 10 | | no data |
| 💼 NIST SP 800-53 Revision 5 → 💼 SC-13 Cryptographic Protection | 4 | | 32 | | no data |
| 💼 NIST SP 800-53 Revision 5 → 💼 SC-23 Session Authenticity | 5 | | 15 | | no data |
| 💼 NIST SP 800-53 Revision 5 → 💼 SC-23(5) Session Authenticity _ Allowed Certificate Authorities | | | | | no data |
| 💼 NIST SP 800-53 Revision 5 → 💼 SI-7(6) Software, Firmware, and Information Integrity _ Cryptographic Protection | | | 27 | | no data |