Secure Controls Framework
Download The SCF
SCF COREFAQAboutContact
Free Content

Cybersecurity & Data Protection Assessment Standards (CDPAS)

The CDPAS is a cohesive, consistent set of standards to govern cybersecurity and data protection related Third-Party Assessment, Attestation and Certification Services (3PAAC Services). By following the CDPAS methodology, practitioners can improve the currently disjointed approach used to perform assessments of cybersecurity and/or data privacy controls.

9
Standards
3PAAC
Services Governed
FREE
Creative Commons
Intended Audience

A Standard for Third-Party Assessment, Attestation & Certification (3PAAC)

The SCF took on an ambitious project to “build a better mousetrap” to fix the common complaints associated with audits and assessments. The CDPAS empowers organizations to develop cybersecurity and data protection assessment strategies tailored to their specific mission, business needs, threats, and operational environments.

The CDPAS is not “one-size-fits-all.” Instead, the guidance should be adopted and tailored to the unique size, resources, and risk circumstances of each Organization Seeking Assessment (OSA) and Third-Party Assessment Organization (3PAO). It can be modified or augmented with OSA-specific requirements, policies, or compliance obligations due to statutory, regulatory and/or contractual requirements.

As part of 3PAAC Services, a 3PAO is expected to: (1) Conduct an assessment of applicable cybersecurity and/or data protection controls within an assessment boundary; (2) Provide an attestation based on the findings in a Report on Conformity (ROC); and (3) Finalize the process by authorizing the issue of a certification, if sufficient conformity is achieved.

Assessment vs. Audit

The CDPAS focuses on third-party assessments, not audits. Per NIST, an assessment is the testing or evaluation of security controls to determine the extent to which controls are implemented correctly and producing the desired outcome. An audit is the independent examination of records to ensure compliance with established controls and procedures.

Intended Audience

Who Uses CDPAS?

The intended audience of the CDPAS is the “assessment ecosystem,” including Organizations Seeking Assessment (OSAs), Third-Party Assessment Organizations (3PAOs), individual assessors, and External Service Providers (ESPs).

Organizations Seeking Assessment (OSAs)

Organizations undergoing cybersecurity or data protection assessments. OSAs use CDPAS to understand assessment expectations, prepare evidence packages, define assessment boundaries, and maintain conformity through proactive governance and annual affirmation.

Third-Party Assessment Organizations (3PAOs)

Companies that perform assessment, attestation, and certification services. 3PAOs use CDPAS as the authoritative standard for conducting consistent, defensible 3PAAC Services using SCF-defined evidence and maturity criteria.

Individual Assessors

Assessment Team Leads (ATLs) and Assessment Technical Experts (ATEs) who execute the assessment. CDPAS defines their professional duty of care, independence requirements, subject matter competency, and conflict of interest avoidance obligations.

Consultants & Advisory Firms

External consultants who advise organizations on cybersecurity and privacy program readiness. CDPAS provides the methodology they need to prepare clients for formal third-party assessments and conformity certification.

Managed Service Providers (MSPs / MSSPs)

Service providers responsible for inherited controls within an OSA’s assessment boundary. CDPAS addresses control inheritance, reciprocity, First-Party Declarations (1PDs), and Third-Party Attestations (3PAs) for shared responsibility models.

Cloud Service Providers (CSPs)

CSPs that host systems within an OSA’s assessment boundary. CDPAS standards for control inheritance and reciprocity ensure CSP-provided controls are properly evaluated and documented in the Report on Conformity (ROC).

CDPAS Standards

Nine Standards Governing 3PAAC Services

The CDPAS defines nine standards covering the full lifecycle of a cybersecurity and data protection assessment, from professional duty of care through maintaining ongoing conformity.

Standard
Name
Key Requirements
1
Professional Duty of Care
Ethical conduct, independence, subject matter competency, and conflict of interest (COI) avoidance for assessors and 3PAOs.
2
Secure Practices
Security & data protection by design, Statement of Work (SOW), assessment-specific DPIA, IP protections, protection/use/disposal of assessment information, and sampling methodology.
3
Due Diligence for OSAs
Assessment boundary demarcation, graphical boundary representation, stakeholder identification, control reciprocity/inheritance, Statement of Applicability (SoA), defined risk tolerance, maturity level, materiality thresholds, and internal assessment.
4
Due Diligence for Assessors & 3PAOs
Formalized assessment plan, defined assessment boundaries, control applicability validation, Evidence Request List (ERL), explicit authorization for testing, First-Party Declarations (1PD), Third-Party Attestations (3PA), and stakeholder validation.
5
Due Care for OSAs
Proactive governance, non-conformity oversight, and annual affirmation of continued conformity.
6
Due Care for Assessors & 3PAOs
Assessment methods, assessment rigor (3 levels: Standard, Enhanced, Comprehensive), control applicability-based assessment, Assessment Objectives (AOs), control designation, objectivity, adequate sampling, and assessment tools/automation.
7
Quality Control
Assessment findings documentation and objective peer review of assessment work.
8
Conformity Designation
Report on Conformity (ROC) issuance and process for assessment finding challenges.
9
Maintaining Conformity
Plan of Action & Milestones (POA&M), changes affecting the assessment boundary, and reassessments due to material change.
Key Concepts

Materiality: The Foundation of Risk-Based Assessment

CDPAS introduces the concept of materiality into cybersecurity assessments, borrowed from financial audit standards, ensuring assessments focus on what matters most to the organization's risk posture.

A material control is such a fundamental cybersecurity and/or data protection control that it is not capable of having compensating controls, and its absence or failure exposes an organization to a material impact. CDPAS requires organizations to define materiality thresholds and designate material risks, material threats, and material incidents.

Material Control: A control so fundamental that its absence or failure could have a material impact, not capable of compensating controls.

Material Risk: A scenario where exposure to danger, harm, or loss has a material impact (e.g., significant financial impact, class action lawsuit, death).

Material Threat: A threat vector that causes damage or danger with a material impact (e.g., nation-state operations, poorly governed AI, dysfunctional management).

Material Incident: An occurrence that jeopardizes CIAS (Confidentiality, Integrity, Availability, Safety) with a material impact on the organization.

Material Weakness: A deficiency where reasonable threats will not be prevented or detected in a timely manner, directly affecting assurance.

Assessment Rigor: Three Levels

CDPAS defines three levels of assessment rigor to match the sensitivity and risk profile of the assessment boundary:

  • Level 1 Standard (baseline rigor for standard assessments);
  • Level 2 Enhanced (increased rigor for elevated risk or regulatory requirements); and
  • Level 3 Comprehensive (maximum rigor for high-risk or critical infrastructure with exhaustive evidence review).
SCF Tool Integration

CDPAS Works With the SCF Assessment Ecosystem

CDPAS is the procedural standard that ties the entire SCF assessment ecosystem together. Each SCF tool plays a specific role in the 3PAAC process.

Evidence Request List (ERL)

The ERL establishes a finite list of supporting evidence used in an assessment. Prior to the start of the assessment, an ERL is provided by the 3PAO to the OSA with standardized evidence expectations.

SCR-CMM Maturity Model

Provides the maturity scoring standard used during CDPAS assessments. Organizations define their target maturity level, and controls are assessed against CMM Level 1–5 criteria.

Unified Scoping Guide (USG)

Defines the assessment boundary, including the People, Processes, Technologies, Data and/or Facilities (PPTDF) in scope. The USG output feeds directly into CDPAS Standard 3 (Due Diligence).

SCR-RMM Risk Management Model

Provides the risk context for CDPAS findings. Risk tolerance, risk appetite, and risk thresholds defined through the RMM inform the materiality designations required by CDPAS.

SCF Control Catalog

The 1,400+ control catalog provides the assessment objects. CDPAS uses the MCR/DSR classification and Statement of Applicability (SoA) to scope which controls are assessed.

SCF-CAP Conformity Assessment

CDPAS is the methodology standard used in the SCF Conformity Assessment Program (SCF-CAP). Organizations pursuing SCF-CAP certification must undergo a CDPAS-governed assessment by an accredited 3PAO.

Detailed Standards

CDPAS Standards: Complete Requirements

Each of the nine CDPAS standards contains specific sub-requirements. Below is the complete list of standards and their component requirements.

Standard
#
Standard Name
Standard 1: Professional Duty of Care
1.1
Ethical Conduct
1.2
Independence
1.3
Subject Matter Competency
1.4
Conflict of Interest (COI) Avoidance
Standard 2: Secure Practices
2.1
Security & Data Protection by Design & by Default
2.2
Statement of Work (SOW)
2.3
Assessment-Specific Data Protection Impact Assessment (DPIA)
2.4
Intellectual Property (IP) Protections
2.5
Protection of Assessment Information
2.6
Use of Assessment Information
2.7
Disposal of Assessment Information
2.8
Sampling Methodology
Standard 3: Due Diligence for OSAs
3.1
Adherence To Data Protection Requirements
3.2
Assessment Boundary Demarcation
3.3
Graphical Representation of Assessment Boundary
3.4
Stakeholder Identification
3.5
Control Reciprocity
3.6
Control Inheritance
3.7
Statement of Applicability (SoA) - Defined Cybersecurity and/or Data Privacy Controls
3.8
Defined Risk Tolerance
3.9
Defined Maturity Level
3.10
Defined Materiality Threshold
3.11
Material Risk Designation
3.12
Material Threat Designation
3.13
Material Incident Designation
3.14
Internal Assessment
3.15
Implemented Capability
Standard 4: DUE DILIGENCE - ASSESSORS &3PAOS
4.1
Formalized Assessment Plan
4.2
Defined Assessment Boundaries
4.3
Validate Control Applicability
4.4
Defined Evidence Request List (ERL)
4.5
Explicit Authorization For Testing
4.6
First-Party Declarations (1PD) - Control Inheritance
4.7
Third-Party Attestations (3PA) - Control Inheritance & Reciprocity
4.8
Stakeholder Validation
STANDARD 5: DUE CARE - OSAS
5.1
Proactive Governance
5.2
Non-Conformity Oversight
5.3
Annual Affirmation
STANDARD 6: DUE CARE - ASSESSORS &3PAOS
6.1
Assessment Methods
6.2
Assessment Rigor
6.3
Assessing Based On Control Applicability
6.4
Assessment Objectives (AOs)
6.5
Control Designation
6.6
Objectivity Through Reasonable Interpretation
6.7
Adequate Sampling
6.8
Assessment Tools & Automation
STANDARD 7: QUALITY CONTROL
7.1
Assessment Findings
7.2
Objective Peer Review
STANDARD 8: CONFORMITY DESIGNATION
8.1
Report On Conformity (ROC)
8.2
Assessment Finding Challenges
STANDARD 9: MAINTAINING CONFORMITY
9.1
Plan of Action & Milestones (POA&M)
9.2
Changes Affecting The Assessment Boundary
9.3
Reassessments Due To Material Change
Assessment Lifecycle

Plan-Do-Check-Act (PDCA)

CDPAS assessments operate within a continuous PDCA improvement cycle, with each assessment cycle informing remediation and the next conformity evaluation.

P

PLAN

Define assessment boundary (PPTDF) using USG. Complete due diligence (Standards 3–4): assessment plan, SoA, ERL, stakeholder identification, control inheritance/reciprocity, and materiality thresholds.

D

DO

Execute due care (Standards 5–6): conduct the assessment using examine, interview, and test methods at the defined rigor level. Assess controls against Assessment Objectives (AOs). Document all findings.

C

CHECK

Quality control (Standard 7): perform objective peer review of findings. Issue conformity designation (Standard 8): produce the Report on Conformity (ROC). Process any finding challenges.

A

ACT

Maintain conformity (Standard 9): develop POA&M for findings, monitor changes to the assessment boundary, conduct reassessments for material changes, and complete annual affirmation.