Secure Controls Framework (SCF) Laws, Regulations & Frameworks (LRF)
The SCF contains a considerable breadth of coverage. If you download the SCF, you will find these listed on the "Authoritative Sources" tab. These Authoritative Sources are categorized by:
- Universal / Common Frameworks
- United States (US)
- Europe Middle East & Africa (EMEA)
- Asia Pacific (APAC)
- Americas (non-US)
To understand the coverage for these Laws, Regulations and Frameworks (LRF), please read through how the SCF leverages Set Theory Relationship Mapping (STRM) according to NIST IR 8477 to demonstrate how SCF controls address targeted LRF requirements.
Universal / Common Frameworks
- AICPA: Service Organization Control - Trust Services Criteria (TSC) - SOC2 (2022 points of focus)
- BSI: Standard 200-1
- CIS: Critical Security Controls (CSC) version 8.1
- CIS: Critical Security Controls (CSC) version 8.1 - IG1
- CIS: Critical Security Controls (CSC) version 8.1 - IG2
- CIS: Critical Security Controls (CSC) version 8.1 - IG3
- ISACA: Control Objectives for Information and Related Technologies (COBIT) 2019
- COSO: Committee of Sponsoring Organizations (COSO) 2017 Framework
- CSA: Cloud Controls Matrix (CCM) v4CSA: CSA IoT Security Controls Framework v2
- EU: European Union Agency for Network and Information Security (ENISA)
- AICPA: Generally Accepted Privacy Principles (GAPP)
- IEC: IEC TR 60601-4-5:2021
- IEC: IEC 62443-4-2:2019 - Security for industrial automation and control systems
- IEC: ISO/SAE 21434:2021 - Road vehicles — Cybersecurity engineering
- ISO: 22301:2019 - Security and resilience — Business continuity management systems — Requirements
- ISO: 27001:2013 - Information Security Management Systems (ISMS) - Requirements
- ISO: 27001:2022 - Information Security Management Systems (ISMS) - Requirements
- ISO: 27002:2013 - Code of Practice for Information Security Controls
- ISO: 27002:2022 - Information security, cybersecurity and privacy protection - Information security controls
- ISO: 27017:2015 - Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
- ISO: 27018:2014 - Code of Practice for PI in Public Clouds Acting as PI Processors
- ISO: 27701:2019 - Security techniques - Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management — Requirements and guidelines
- ISO: 29100:2011 - Privacy Framework
- ISO: 31000:2009 - Risk Management
- ISO: 31010:2009 - Risk Assessment Techniques
- ISO: ISO/IEC 42001:2023 - Information technology - Artificial intelligence - Management system
- MITRE: MITRE ATT&CK - NIST 800-53 mappings
- MPA: MPA Content Security Best Practices Common Guidelines v5.1
- NAIC: Insurance Data Security Model Law (MDL-668)
- NIST: NIST Artificial Intelligence Risk Management Framework (AI RMF) v1.0
- NIST: NIST Privacy Framework v1.0
- NIST: NIST SP 800-37 - Guide for Applying the RMF to Federal Information Systems rev2
- NIST: NIST SP 800-39 - Managing Information Security Risk
- NIST: NIST SP 800-53 R4 - Security and Privacy Controls for Information Systems and Organizations
- NIST: NIST SP 800-53 R4 - Security and Privacy Controls for Information Systems and Organizations (low baseline)
- NIST: NIST SP 800-53 R4 - Security and Privacy Controls for Information Systems and Organizations (moderate baseline)
- NIST: NIST SP 800-53 R4 - Security and Privacy Controls for Information Systems and Organizations (high baseline)
- NIST: NIST SP 800-53 R5 - Security and Privacy Controls for Information Systems and Organizations
- NIST: NIST SP 800-53 R5 - Security and Privacy Controls for Information Systems and Organizations - Privacy Baseline
- NIST: NIST SP 800-53 R5 - Security and Privacy Controls for Information Systems and Organizations - Low Baseline
- NIST: NIST SP 800-53 R5 - Security and Privacy Controls for Information Systems and Organizations - Moderate Baseline
- NIST: NIST SP 800-53 R5 - Security and Privacy Controls for Information Systems and Organizations - High Baseline
- NIST: NIST SP 800-53 R5 - Security and Privacy Controls for Information Systems and Organizations - Select Not Otherwise Categorized (NOC) controls
- NIST: NIST SP 800-63B - Digital Identity Guidelines (partial mapping)
- NIST: NIST SP 800-82 R3 - Guide to Industrial Control Systems (ICS) Security
- NIST: NIST SP 800-82 - Guide to Industrial Control Systems (ICS) Security
- NIST: NIST SP 800-82 - Guide to Industrial Control Systems (ICS) Security
- NIST: NIST SP 800-160 - Systems Security Engineering
- NIST: NIST SP 800-161 R1 - Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations
- NIST: NIST SP 800-161 R1 - Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations (C-SCRM Baseline)
- NIST: NIST SP 800-161 R1 - Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations (Flow Down)
- NIST: NIST SP 800-161 R1 - Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations (Level 1)
- NIST: NIST SP 800-161 R1 - Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations (Level 2)
- NIST: NIST SP 800-161 R1 - Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations (Level 3)
- NIST: NIST SP 800-171 R2 - Protecting CUI in Nonfederal Systems and Organizations
- NIST: NIST SP 800-171 R3
- NIST: NIST SP 800-171A - Assessing Security Requirements for Controlled Unclassified Information
- NIST: NIST 800-171A R3
- NIST: NIST SP 800-172 - Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations: Enhanced Security Requirements for Critical Programs and High Value Assets
- NIST: NIST SP 800-207 - Zero Trust Architecture
- NIST: NIST SP 800-218 - Secure Software Development Framework (SSDF) Version 1.1:
- NIST: NIST Cybersecurity Framework (CSF) v1.1
- NIST: NIST Cybersecurity Framework (CSF) v2.0
- OWASP: OWASP Top 10 Most Critical Web Application Security Risks
- PCI SSC: Payment Card Industry Data Security Standard (PCI DSS)
- PCI SSC: Payment Card Industry Data Security Standard (PCI DSS) v4.01
- PCI SSC: Payment Card Industry Data Security Standard (PCI DSS) v4.0.1 - SAQ A
- PCI SSC: Payment Card Industry Data Security Standard (PCI DSS) v4.0.1 - SAQ A-EP
- PCI SSC: Payment Card Industry Data Security Standard (PCI DSS) v4.0.1 - SAQ B
- PCI SSC: Payment Card Industry Data Security Standard (PCI DSS) v4.0.1 - SAQ B-IP
- PCI SSC: Payment Card Industry Data Security Standard (PCI DSS) v4.0.1 - SAQ C
- PCI SSC: Payment Card Industry Data Security Standard (PCI DSS) v4.0.1 - SAQ C-VT
- PCI SSC: Payment Card Industry Data Security Standard (PCI DSS) v4.0.1 - SAQ D Merchant
- PCI SSC: Payment Card Industry Data Security Standard (PCI DSS) v4.0.1 - SAQ D Service Provider
- PCI SSC: Payment Card Industry Data Security Standard (PCI DSS) v4.0.1 - SAQ P2PE
- Shared Assessments: Shared Assessments Standard Information Gathering Questionnaire (SIG) 2024
- SPARTA: Space Attack Research & Tactic Analysis (SPARTA) Countermeasures
- SWIFT: SWIFT Customer Security Controls Framework 2021
- TISAX: TISAX ISA 6.0.3
- UL: 2900-1 - Software Cybersecurity for Network-Connectable Products
- United Nations: UN Regulation No. 155 - Cyber security and cyber security management system
- United Nations: UNECE WP.29
US-Specific Laws, Regulations & Frameworks (LRF)
- Federal: Cybersecurity Capability Maturity Model v2.1
- Federal: CERT Resilience Management Model v1.2
- Federal: CISA Cross-Sector Cybersecurity Performance Goals (CPG)
- Federal: CISA Secure Software Development Attestation Form (SSDAF)
- Federal: US DOJ / FBI - Criminal Justice Information Services (CJIS) Security Policy v5.9.3
- Federal: Cybersecurity Maturity Model Certification (CMMC) v2.0 Level 1
- Federal: Cybersecurity Maturity Model Certification (CMMC) v2.0 Level 2
- Federal: Cybersecurity Maturity Model Certification (CMMC) v2.0 Level 3
- Federal: US Centers for Medicare & Medicaid Services MARS-E Document Suite, Version 2.0
- Federal: Children's Online Privacy Protection Act (COPPA)
- Federal: Data Privacy Framework (DPF)
- Federal: DoD Zero Trust Reference Architecture v2
- Federal: Defense Federal Acquisition Regulation Supplement (DFARS) 252.204-7008 - 7012
- Federal: Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) Trusted Internet Connections 3.0 Security Capabilities Catalog
- Federal: Department of Homeland Security (DHS) Zero Trust Capability Framework (ZTCF)
- Federal: Fair & Accurate Credit Transactions Act (FACTA) / Fair Credit Reporting Act (FCRA)
- Federal: Federal Acquisition Regulation (FAR) 52.204-21
- Federal: Federal Acquisition Regulation (FAR) 52.204-27 Prohibition on a ByteDance Covered Application
- Federal: Federal Acquisition Regulation (FAR) 889
- Federal: Food & Drug Administration (FDA) 21 CFR Part 11
- Federal: Federal Risk and Authorization Management Program R4 (FedRAMP R4)
- Federal: Federal Risk and Authorization Management Program R4 (FedRAMP R4) (low baseline)
- Federal: Federal Risk and Authorization Management Program R4 (FedRAMP R4) (moderate baseline)
- Federal: Federal Risk and Authorization Management Program R4 (FedRAMP R4) (high baseline)
- Federal: Federal Risk and Authorization Management Program R4 (FedRAMP R4) (Li-SAAS) baseline)
- Federal: Federal Risk and Authorization Management Program R5 (FedRAMP)
- Federal: Federal Risk and Authorization Management Program R5 (FedRAMP R5) (low baseline)
- Federal: Federal Risk and Authorization Management Program R5 (FedRAMP R5) (moderate baseline)
- Federal: Federal Risk and Authorization Management Program R5 (FedRAMP R5) (high baseline)
- Federal: Federal Risk and Authorization Management Program R5 (FedRAMP R5) (Li-SAAS) baseline)
- Federal: Family Educational Rights and Privacy Act (FERPA)
- Federal: Federal Financial Institutions Examination Council (FFIEC)
- Federal: Financial Industry Regulatory Authority (FINRA)
- Federal: Federal Trade Commission (FTC) Act
- Federal: Gramm Leach Bliley Act (GLBA) - CFR 314 (Dec 2023)
- Federal: HIPAA Administrative Simplification (2013)
- Federal: HIPAA Security Rule (includes mapping to NIST SP 800-66 R2)
- Federal: Health Industry Cybersecurity Practices (HICP) - Small Practice
- Federal: Health Industry Cybersecurity Practices (HICP) - Medium Practice
- Federal: Health Industry Cybersecurity Practices (HICP) - Large Practice
- Federal: Internal Revenue Service (IRS) 1075
- Federal: International Traffic in Arms Regulation (ITAR) [limited to Part 120]
- Federal: North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP)
- Federal: National Industrial Security Program Operating Manual (NISPOM)
- Federal: Naval Nuclear Propulsion Information (NNPI)
- Federal: National Science & Technology Council (NSTC) NSPM-33
- Federal: Cybersecurity Final Rule (Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure) - 17 CFR Parts 229, 232, 239, 240, and 249
- Federal: Sarbanes Oxley Act (SOX)
- Federal: Social Security Administration (SSA) Electronic Information Exchange Security Requirements
- State: StateRAMP Low (Category 1)
- State: StateRAMP Low+ (Category 2)
- State: StateRAMP Moderate (Category 3)
- Federal: Security Directive 1580/82-2022-01 (Rail Cybersecurity Mitigation Actions and Testing)
- State: AK - Alaska Personal Information Protection Act (PIPA)
- State: CA - SB327State: California Consumer Privacy Act (CCPA) / California Privacy Rights Act (CPRA) - November 2022 versionState: CA - SB1386
- State: CO - Colorado Privacy Act
- State: IL - Illinois Biometric Information Privacy Act (PIPA)
- State: IL - Illinois Identity Protection Act (IPA)
- State: IL - Illinois Personal Information Protection Act (PIPA)
- State: MA - 201 CMR 17.00
- State: NV - SB220
- State: NY - Cybersecurity Requirements for Financial Services Companies (DFS 23 NYCRR500) - 2023 Amendment 2
- State: NY - SHIELD Act (SB S5575B)
- State: OR - ORS 646A
- State: OR - Consumer Privacy Act (SB 619)
- State: SC - South Carolina Insurance Data Security Act
- State: TN - Information Protection ActState: TX - BC521
- State: TX - Cybersecurity Act
- State: TX - Consumer Data Protection Act (CDPA)
- State: TX - DIR Security Control Standards Catalog v2.0
- State: TX - Texas Risk & Authorization Management Program (TX-RAMP)
- State: TX - Texas Risk & Authorization Management Program (TX-RAMP)
- State: TX - 2019 - SB820
- State: Virginia Consumer Data Protection Act (2023)
- State: VT - Act 171 of 2018 (Data Broker Registration Act)
EMEA-Specific Laws, Regulations & Frameworks (LRF)
- EU: European Banking Authority (EBA) Guidelines on ICT and security risk management
- EU: Digital Operational Resilience Act (DORA) (2023)
- EU: General Data Protection Regulation (GDPR)
- EU: ENISA NIS2 (Directive (EU) 2022/2555)
- EU: Second Payment Services Directive (PSD2)
- EU: EU-US Data Privacy Framework
- Austria: Federal Act concerning the Protection of Personal Data (DSG 2000)
- Belgium: Act of 8 December 1992
- Germany: Federal Data Protection Act
- Germany: Banking Supervisory Requirements for IT (BAIT)
- Germany: Cloud Computing Compliance Controls Catalogue (C5) 2020
- Greece: Protection of Individuals with Regard to the Processing of Personal Data (2472/1997)
- Hungary: Informational Self-Determination and Freedom of Information (Act CXII of 2011)
- Ireland: Data Protection Act (2003)
- Israel: Cybersecurity Methodology for an Organization v1.0
- Israel: Protection of Privacy Law, 5741 – 1981
- Italy: Personal Data Protection Code
- Kenya: Kenya Data Protection Act (2019)
- Netherlands: Personal Data Protection Act
- Nigeria: Nigeria Data Protection Regulation (2019)
- Norway: Personal Data Act
- Poland: Act of 29 August 1997 on the Protection of Personal Data
- Qatar: Personal Data Privacy Protection Law (PDPPL)
- Russia: Federal Law of 27 July 2006 N 152-FZ
- Saudi Arabia: Critical Systems Cybersecurity Controls (CSCC – 1: 2019)
- Saudi Arabia: Saudi Arabia IoT CGIoT-1:2024
- Saudi Arabia: Essential Cybersecurity Controls (ECC – 1 : 2018)
- Saudi Arabia: Operational Technology Cybersecurity Controls (OTCC -1: 2022)
- Saudi Arabia: Saudi Arabia Personal Data Protection Law (PDPL)
- Saudi Arabia: SACS-002 - Third Party Cybersecurity Standard
- Saudi Arabia: Saudi Arabian Monetary Authority (SAMA) Cyber Security Framework (CSF) Version 1.0 (May 2017)
- Serbia: Act of 9 November 2018 on Personal Data Protection (Official Gazette No. 87/18)
- South Africa: Protection of Personal Information Act (POPIA)
- Spain: BOE-A-2022-7191
- Spain: Royal Decree 1720/2007 (protection of personal data)
- Spain: Spain Royal Decree 311/2022
- Spain: ICT Security Guide CCN-STIC 825
- Sweden: Personal Data Act
- Switzerland: Federal Act on Data Protection (FADP)
- Turkey: Regulation on Protection of Personal Data in Electronic Communications Sector
- UAE: UAE National Information Assurance Framework (NIAF)
- United Kingdom: Cyber Assessment Framework (CAF) v3.1
- United Kingdom: Cyber Assessment Framework (CAF) for Aviation Guidance (CAP1850)
- United Kingdom: Cyber Essentials
- United Kingdom: Data Protection Act
- United Kingdom: Ministry of Defence Standard 05-138 (14 May 2024)
- United Kingdom: UK General Data Protection Regulation
APAC-Specific Laws, Regulations & Frameworks (LRF)
- Australia: Australia Essential Eight
- Australia: Privacy Act of 1998
- Australia: Australia Privacy Principles
- Australia: Australian Government Information Security Manual (ISM) (June 2024)
- Australia: Australia - Code of Practice - Securing the Internet of Things for Consumers
- Australia: Prudential Standard CPS 230 - Operational Risk Management
- Australia: Prudential Standard CPS 234 Information Security
- China: China Cybersecurity Law of the People's Republic of China (China Cybersecurity Law) 2017
- China: China Data Security Law of the People's Republic of China
- China: Decision on Strengthening Network Information Protection
- China: Personal Information Protection Law of the People's Republic of China
- Hong Kong: Personal Data Ordinance
- India: India Digital Personal Data Protection Act 2023
- India: Information Technology Rules (Privacy Rules)
- Japan: Act on the Protection of Personal Information (June 2020)
- Japan: Japan Information System Security Management and Assessment Program (ISMAP)
- Malaysia: Personal Data Protection Act of 2010
- New Zealand: NZ Health Information Security Framework (2022)
- New Zealand: HISO 10029:2024 NZ Health Information Security Framework Guidance for Suppliers
- New Zealand: New Zealand Information Security Manual (NZISM) v3.6
- New Zealand: Privacy Act of 2020
- Philippines: Data Privacy Act of 2012
- Singapore: Personal Data Protection Act of 2012
- Singapore: Cyber Hygiene Practice
- Singapore: Monitory Authority of Singapore (MAS) Technology Risk Management (TRM) Guidelines (2021)
- South Korea: Personal Information Protection Act
- Taiwan: Personal Data Protection Act
Americas (Non-US)-Specific Laws, Regulations & Frameworks (LRF)
- Argentina: Protection of Personal Law No. 25,326
- Argentina: Protection of Personal Data - MEN-2018-147-APN-PTE
- Bahamas: Data Protection Act
- Bermuda: Bermuda Monetary Authority Cyber Code of Conduct
- Brazil: General Data Protection Law (LGPD)
- Canada: Office of the Superintendent of Financial Institutions Canada (OSFI) - Cyber Security Self-Assessment Guidance
- Canada: Protecting controlled information in non-Government of Canada systems and organizations (ITSP.10.171)
- Canada: B-13
- Canada: Personal Information Protection and Electronic Documents Act (PIPEDA)
- Chile: Act 19628 - Protection of Personal Data
- Colombia: Law 1581 of 2012
- Costa Rica: Protection of the Person in the Processing of His Personal Data
- Mexico: Federal Law on Protection of Personal Data held by Private Parties
- Peru: Personal Data Protection Law
- Uruguay: Law No. 18,331 - Protection of Personal Data and Action "Habeas Data"