Effective GRC programs produce measurable outputs: cybersecurity assurance backed by due diligence documentation and due care evidence. The SCF's Common Controls Framework™ (CCF) structure provides the control catalog that makes this assurance auditable, defensible, and continuously verifiable.
The measurable output of a GRC program is cybersecurity assurance: documented evidence that an organization has both understood its obligations (due diligence) and taken appropriate action (due care) to address them.
Too often, GRC programs are judged by the policies they write, the audits they pass, or the certifications they achieve. But the true output is organizational resilience and legal defensibility: the ability to demonstrate to regulators, auditors, customers, and the board that cybersecurity controls are identified, implemented, operating, and monitored.
The SCF is the Common Controls Framework™ that closes the gap between GRC intent and demonstrable assurance by providing a unified control catalog that maps every control to applicable evidence artifacts, audit criteria, and framework mappings simultaneously.
Assurance = Due Diligence + Due Care
Due diligence is the documentation of what the organization is required to do and what it has decided to do. Due care is the evidence that it is actually doing it. Both are required for full cybersecurity assurance. Neither alone is sufficient.
Both are required. One without the other leaves dangerous gaps in legal defensibility, audit readiness, and genuine cybersecurity program maturity.
Due diligence is the GRC function's planning and documentation output, providing evidence that the organization has identified its obligations, understood them, and made explicit decisions about how to address them. This includes: compliance obligation register (MCR + DSR), policies and standards documents, risk assessments and risk register entries, RASCI/ownership assignments, board and executive awareness briefings, framework gap analyses, third-party contract provisions (TPRM), and decisions to accept, transfer, or mitigate risk.
Due care is the GRC program's execution and operations output, providing evidence that the organization is actually running the controls it said it would, generating artifacts that prove ongoing compliance and security. This includes: SOP execution logs and records, configuration baselines and change records, security training completion records, vulnerability scan results and remediation tracking, access review certifications, incident response records, audit findings and remediation evidence, and Evidence Request List (ERL) artifacts.
Why Organizations Fail at Assurance
Most GRC failures result from an imbalance: excellent due diligence (great policies on paper) with poor due care (controls not actually operating), or accidental due care (controls running but no documentation of why or how). The SCF's Evidence Request List (ERL) directly addresses this by pre-mapping every SCF control to the specific evidence artifacts that demonstrate due care, closing the policy-to-practice gap.
Governance produces a structured documentation hierarchy that together constitutes the due diligence record. Each layer serves a distinct purpose and audience, conflating them is one of the most common GRC “word crimes.”
The “what” and “why.” Policies are high-level management directives that establish the organization’s security intent and requirements. They are mandatory, executive-approved, and audience-facing toward the entire organization.
The “how much” and “how well.” Standards define specific, measurable requirements for implementing a policy. They establish performance thresholds, configuration baselines, and minimum acceptable practices for control operators.
The “how”, step by step. Standardized Operating Procedures (SOPs) are the granular, technical instructions that control operators follow to execute controls. SOPs generate the evidence artifacts that prove due care.
The SCF’s Evidence Request List (ERL) is a critical GRC output tool that pre-maps every control in the Common Controls Framework™ to the specific evidence artifacts an auditor, regulator, or assessor would request to verify due care.
Rather than discovering what evidence is needed during an audit (and scrambling to produce it), organizations using the SCF ERL know in advance exactly what artifacts must exist to satisfy each control. This transforms GRC from a reactive audit response to a proactive assurance program.
Pre-mapped to all 1,400+ SCF controls
Organized by control domain for efficient evidence collection
Cross-referenced to framework mappings (HIPAA, PCI, NIST, ISO, etc.)
Supports both internal audit and third-party assessment
Available as part of the free CCF™ download
STRM-Validated Evidence Mappings
The SCF uses NIST IR 8477 Set Theory Relationship Mapping (STRM) to validate how control mappings relate to each other. This means the evidence mappings in the ERL are not guesswork. They are mathematically validated relationships between controls and evidence requirements across all 200+ mapped laws, regulations & frameworks.
A critical governance output is the clear assignment of control ownership. The RASCI model ensures every control has a defined Responsible, Accountable, Supportive, Consulted, and Informed party, eliminating accountability gaps.
Does the work. The control operator executes the SOP and generates due care evidence.
Owns the outcome. The control owner is ultimately responsible for control effectiveness and compliance.
Provides support. Assists the responsible party andoften provides technical resources or tooling.
Provides input. Subject matter experts (legal, IT, privacy) are consulted on control design.
Kept in the loop. Executives, audit, and board are informed of control status and risk posture.
Why RASCI Is a Critical GRC Output
Without documented RASCI assignments, cybersecurity controls operate in an accountability vacuum. When an incident occurs or an auditor asks “who owns this control?”, the inability to provide a clear, documented answer is itself a governance failure and is a signal to regulators that the program lacks operational rigor. The SCF control catalog includes RASCI guidance for all 33 domains.
Require due diligence documentation (policies) and due care evidence (SOP artifacts, logs, reports) to verify compliance with applicable laws and regulations. The ERL pre-maps all required evidence.
Requires risk-contextualized reporting: which controls are implemented, which gaps remain, what the residual risk is, and how the program is maturing against benchmarks like the SCR-CMM.
Third-party risk management programs require evidence of your security controls. SCF TPRM questionnaire templates and ERL artifacts make customer assessments efficient and audit-friendly.
In litigation and data breach scenarios, due diligence and due care documentation is the difference between an affirmative defense and liability. The SCF’s comprehensive control catalog and ERL support legal defensibility.
The SCF is used by leading GRC platforms worldwide. Importable as .csv or NIST OSCAL JSON, the CCF™ integrates directly into tool-driven GRC workflows, automating evidence collection and control tracking.
Cyber insurance underwriters increasingly require evidence of a functioning GRC program. Organizations with documented MCR + DSR frameworks and ERL-backed evidence demonstrate lower risk profiles.