Controls Library
Defensive Strategy: Configure and manage the technical and operational safeguards monitored by AI Agents. AI Actions:
| CTL-CM-01 | CAB Approval Process | active | 2 | PAPolicy Agent | 1 |
| CTL-CM-02 | CI/CD Automated Gates | active | 2 | PAPolicy Agent | 1 |
| CTL-CM-03 | Pull Request Peer Review | active | 1 | PAPolicy Agent | 2 |
| CTL-PRIV-01 | Automated Account Deletion | active | 1 | PAPolicy Agent | 1 |
| CTL-ACC-01 | Offboarding Automation | active | 1 | AAAccess Agent | 1 |
| CTL-ACC-02 | Quarterly Access Review | active | 1 | AAAccess Agent | 1 |
| CTL-PHYS-01 | Biometric Data Center Access | active | 1 | PAPolicy Agent | 0 |
| CTL-PHYS-02 | UPS Maintenance Schedule | active | 1 | PAPolicy Agent | 0 |
| CTL-VEND-01 | Vendor Security Review | active | 1 | PAPolicy Agent | 1 |
| CTL-VEND-02 | Vendor Business Continuity Check | draft | 1 | PAPolicy Agent | 0 |
| CTL-INC-01 | SIEM Alerting Rules | active | 1 | PAPolicy Agent | 0 |