- Identification And Authentication - 1
- Audit And Accountability - 2
- Access Control - 3
- Storage Cryptographic Protection - 4
- Malicious Code Protection - 5
- Integrity Protection - 6
- Remaining Information Protection - 8
- Web Application Comprehensive Protection - 9
- IP Restriction - 7
- The Boss - 10