Skip to content
CSF Tools Logo

CSF Tools

  • Home
  • Visualizations
  • References
  • Blog
  • CSA Cloud Controls Matrix
  • Cloud Controls Matrix v3.0.1
  • IPY: Interoperability & Portability

IPY-02: Data Request

Control Family:

Interoperability & Portability

Control Statement

All structured and unstructured data shall be available to the customer and provided to them upon request in an industry-standard format (e.g., .doc, .xls, .pdf, logs, and flat files).

  • Home
  • Disclaimer
  • Privacy Policy
  • Contact Us

Share

  • Facebook
  • Twitter
  • LinkedIn
  • Reddit
  • Mail
Security Visualizations

Frameworks and Controls

  • NIST Cybersecurity Framework
    • Cybersecurity Framework v1.1 [Summary]
  • NIST Privacy Framework
    • Privacy Framework v1.0 [Summary]
  • NIST Special Publication 800-53
    • NIST SP 800-53, Revision 4 [Summary]
    • NIST SP 800-53, Revision 5 [Summary]
  • NIST Special Publication 800-171
    • NIST SP 800-171 Revision 2 [Summary]
  • CSA Cloud Controls Matrix
    • Cloud Controls Matrix v3.0.1 [Summary]
      • AIS: Application & Interface Security
      • AAC: Audit Assurance & Compliance
      • BCR: Business Continuity Management & Operational Resilience
      • CCC: Change Control & Configuration Management
      • DSI: Data Security & Information Lifecycle Management
      • DCS: Datacenter Security
      • EKM: Encryption & Key Management
      • GRM: Governance and Risk Management
      • HRS: Human Resources
      • IAM: Identity & Access Management
      • IVS: Infrastructure & Virtualization Security
      • IPY: Interoperability & Portability
        • IPY-01: APIs
        • IPY-02: Data Request
        • IPY-03: Policy & Legal
        • IPY-04: Standardized Network Protocols
        • IPY-05: Virtualization
      • MOS: Mobile Security
      • SEF: Security Incident Management, E-Discovery, & Cloud Forensics
      • STA: Supply Chain Management, Transparency, and Accountability
      • TVM: Threat and Vulnerability Management
  • CIS Critical Security Controls
    • Critical Security Controls v7.1 [Summary]
    • Critical Security Controls v8 [Summary]
  • STRIDE-LM Threat Model
  • Home
  • Visualizations
  • References
  • Blog
CSF Tools Privacy Policy Proudly powered by WordPress