Secure Controls Framework
Download The SCF
SCF COREFAQAboutContact
GRC Fundamentals

The Output of GRC Practices

Effective GRC programs produce measurable outputs: cybersecurity assurance backed by due diligence documentation and due care evidence. The SCF's Common Controls Framework™ (CCF) structure provides the control catalog that makes this assurance auditable, defensible, and continuously verifiable.

Cybersecurity Assurance

What Does Effective GRC Actually Produce?

The measurable output of a GRC program is cybersecurity assurance: documented evidence that an organization has both understood its obligations (due diligence) and taken appropriate action (due care) to address them.

Too often, GRC programs are judged by the policies they write, the audits they pass, or the certifications they achieve. But the true output is organizational resilience and legal defensibility: the ability to demonstrate to regulators, auditors, customers, and the board that cybersecurity controls are identified, implemented, operating, and monitored.

The SCF is the Common Controls Framework™ that closes the gap between GRC intent and demonstrable assurance by providing a unified control catalog that maps every control to applicable evidence artifacts, audit criteria, and framework mappings simultaneously.

Assurance = Due Diligence + Due Care

Due diligence is the documentation of what the organization is required to do and what it has decided to do. Due care is the evidence that it is actually doing it. Both are required for full cybersecurity assurance. Neither alone is sufficient.

Core Outputs

Due Diligence vs. Due Care: The Two Pillars of Assurance

Both are required. One without the other leaves dangerous gaps in legal defensibility, audit readiness, and genuine cybersecurity program maturity.

Due Diligence: Documentation of Obligations & Intent

Due diligence is the GRC function's planning and documentation output, providing evidence that the organization has identified its obligations, understood them, and made explicit decisions about how to address them. This includes: compliance obligation register (MCR + DSR), policies and standards documents, risk assessments and risk register entries, RASCI/ownership assignments, board and executive awareness briefings, framework gap analyses, third-party contract provisions (TPRM), and decisions to accept, transfer, or mitigate risk.

Due Care: Evidence That Controls Are Operating

Due care is the GRC program's execution and operations output, providing evidence that the organization is actually running the controls it said it would, generating artifacts that prove ongoing compliance and security. This includes: SOP execution logs and records, configuration baselines and change records, security training completion records, vulnerability scan results and remediation tracking, access review certifications, incident response records, audit findings and remediation evidence, and Evidence Request List (ERL) artifacts.

Why Organizations Fail at Assurance

Most GRC failures result from an imbalance: excellent due diligence (great policies on paper) with poor due care (controls not actually operating), or accidental due care (controls running but no documentation of why or how). The SCF's Evidence Request List (ERL) directly addresses this by pre-mapping every SCF control to the specific evidence artifacts that demonstrate due care, closing the policy-to-practice gap.

Output Components

The Policy–Standard–Procedure Hierarchy

Governance produces a structured documentation hierarchy that together constitutes the due diligence record. Each layer serves a distinct purpose and audience, conflating them is one of the most common GRC “word crimes.”

Policy

The “what” and “why.” Policies are high-level management directives that establish the organization’s security intent and requirements. They are mandatory, executive-approved, and audience-facing toward the entire organization.

  • Written for executives and all employees.
  • Defines mandatory requirements.
  • Technology-neutral and vendor-agnostic.
  • Primary due diligence artifact.

Standard

The “how much” and “how well.” Standards define specific, measurable requirements for implementing a policy. They establish performance thresholds, configuration baselines, and minimum acceptable practices for control operators.

  • Written for control owners and architects.
  • Defines measurable performance criteria.
  • Technology-aware but not vendor-specific.
  • Bridges policy to procedure.

Procedure (SOP)

The “how”, step by step. Standardized Operating Procedures (SOPs) are the granular, technical instructions that control operators follow to execute controls. SOPs generate the evidence artifacts that prove due care.

  • Written for control operators (technical staff).
  • Step-by-step, vendor-specific instructions.
  • Execution generates due care evidence.
  • Primary due care artifact producer.
SCF Evidence Framework

The Evidence Request List (ERL): Making Assurance Auditable

The SCF’s Evidence Request List (ERL) is a critical GRC output tool that pre-maps every control in the Common Controls Framework™ to the specific evidence artifacts an auditor, regulator, or assessor would request to verify due care.

Rather than discovering what evidence is needed during an audit (and scrambling to produce it), organizations using the SCF ERL know in advance exactly what artifacts must exist to satisfy each control. This transforms GRC from a reactive audit response to a proactive assurance program.

Pre-mapped to all 1,400+ SCF controls

Organized by control domain for efficient evidence collection

Cross-referenced to framework mappings (HIPAA, PCI, NIST, ISO, etc.)

Supports both internal audit and third-party assessment

Available as part of the free CCF™ download

STRM-Validated Evidence Mappings

The SCF uses NIST IR 8477 Set Theory Relationship Mapping (STRM) to validate how control mappings relate to each other. This means the evidence mappings in the ERL are not guesswork. They are mathematically validated relationships between controls and evidence requirements across all 200+ mapped laws, regulations & frameworks.

Governance Output

RASCI: Assigning Control Ownership

A critical governance output is the clear assignment of control ownership. The RASCI model ensures every control has a defined Responsible, Accountable, Supportive, Consulted, and Informed party, eliminating accountability gaps.

R: Responsible

Does the work. The control operator executes the SOP and generates due care evidence.

A: Accountable

Owns the outcome. The control owner is ultimately responsible for control effectiveness and compliance.

S: Supportive

Provides support. Assists the responsible party andoften provides technical resources or tooling.

C: Consulted

Provides input. Subject matter experts (legal, IT, privacy) are consulted on control design.

I: Informed

Kept in the loop. Executives, audit, and board are informed of control status and risk posture.

Why RASCI Is a Critical GRC Output

Without documented RASCI assignments, cybersecurity controls operate in an accountability vacuum. When an incident occurs or an auditor asks “who owns this control?”, the inability to provide a clear, documented answer is itself a governance failure and is a signal to regulators that the program lacks operational rigor. The SCF control catalog includes RASCI guidance for all 33 domains.

Assurance Audiences

GRC Outputs Serve Multiple Audiences

Regulators & Auditors

Require due diligence documentation (policies) and due care evidence (SOP artifacts, logs, reports) to verify compliance with applicable laws and regulations. The ERL pre-maps all required evidence.

Board of Directors

Requires risk-contextualized reporting: which controls are implemented, which gaps remain, what the residual risk is, and how the program is maturing against benchmarks like the SCR-CMM.

Customers & Partners

Third-party risk management programs require evidence of your security controls. SCF TPRM questionnaire templates and ERL artifacts make customer assessments efficient and audit-friendly.

Legal Counsel

In litigation and data breach scenarios, due diligence and due care documentation is the difference between an affirmative defense and liability. The SCF’s comprehensive control catalog and ERL support legal defensibility.

GRC Platforms

The SCF is used by leading GRC platforms worldwide. Importable as .csv or NIST OSCAL JSON, the CCF™ integrates directly into tool-driven GRC workflows, automating evidence collection and control tracking.

Insurance Underwriters

Cyber insurance underwriters increasingly require evidence of a functioning GRC program. Organizations with documented MCR + DSR frameworks and ERL-backed evidence demonstrate lower risk profiles.