| Control | Description |
|---|---|
| I | Any vulnerability, the exploitation of which will directly and immediately result in loss of Confidentiality, Availability, or Integrity. |
| II | Any vulnerability, the exploitation of which has a potential to result in loss of Confidentiality, Availability, or Integrity. |
| III | Any vulnerability, the existence of which degrades measures to protect against loss of Confidentiality, Availability, or Integrity. |