CC6.1—Logical Access Security
>Control Description
Deploy logical access controls (software, infrastructure, architecture) to protect information assets.
>Cross-Framework Mappings
NIST CSF 2.0
via AICPA TSC mapping structureNIST SP 800-53 r5
via AICPA TSC mapping structureSCF
via AICPA TSC mapping structureCRY-01
CompareCRY-03
CompareCRY-05
CompareCRY-08
CompareCRY-09
CompareCRY-09.1
CompareCRY-09.2
CompareIAC-01
CompareIAC-02
CompareIAC-03
CompareIAC-04
CompareIAC-05
CompareIAC-08
CompareIAC-09
CompareIAC-09.1
CompareIAC-10
CompareIAC-10.8
CompareIAC-15
CompareIAC-16
CompareIAC-20
CompareIAC-21
CompareNET-01
CompareNET-03
CompareNET-03.1
CompareNET-04
CompareNET-05.1
CompareNET-06
CompareNET-06.1
CompareAsk AI
Configure your API key to use AI features.