| AC | Access Control | Access |
| AT | Awareness and Training | Roles and Responsibilities |
| AU | Audit and Accountability | Roles and Responsibilities; Compliance Audits |
| CA | Security Assessment and Authorization | Risk Management; Access |
| CM | Configuration Management | Configuration and Change Management |
| CP | Contingency Planning | Business Continuity and Disaster Recovery |
| IA | Identification and Authentication | Access |
| IR | Incident Response | Incident Response; Breach Notification |
| MA | Maintenance | Configuration and Change Management |
| PE | Physical and Environmental Protection | Facility and Physical Security |
| PL | Planning | Security Program Overview; Security Architecture & Operating Model |
| PS | Personnel Security | HR & Personnel Security |
| RA | Risk Assessment | Risk Management |
| SA | System and Services Acquisition | Third Party Security, Vendor Risk Management and Systems/Services Acquisition |
| SC | System and Communications Protection | Data Management; Data Protection; and Threat Detection & Prevention |
| SI | System and Information Integrity | Data Management; Data Protection; Product Security & Secure Software Development; Vulnerability Management;and System Audits, Monitoring & Assessments |
| PM | Program Management | Security Program Overview; Roles and Responsibilities; and Policy Management |