The SCRMS is the playbook to implement secure, compliant and resilient capabilties. The SCRMS also includes a prioritized implementation guide that answers the "Where do I start?" question about building a SCF-based cybersecurity and data protection program.
The SCF’s holistic, technology-agnostic framework for designing, implementing, and maintaining secure, compliant, and resilient capabilities that covers an organization’s People, Processes, Technology, Data, and Facilities, regardless of how or where data is stored, processed, or transmitted.
9
SCRMS Principles
4
PDCA Phases
3
Core Components
PPTDF
Coverage Scope
The Secure Controls Framework® (SCF) Security, Compliance & Resilience Management System (SCRMS) is intended to be utilized as a holistic, technology-agnostic framework for an entity to design, implement and maintain secure, compliant and resilient capabilities, covering an organization’s People, Processes, Technology, Data and Facilities (PPTDF), regardless of how or where data is stored, processed and/or transmitted.
The SCRMS is not a “one-size-fits-all” playbook. It is designed to be adopted and tailored to the unique size, resources, and risk circumstances of each organization. The SCRMS expands upon and modernizes traditional Information Security Management System (ISMS) models, replacing siloed “management systems” with a single, unified operational framework that governs cybersecurity, data privacy, risk, and compliance together.
By design, the SCRMS expands upon and modernizes the concept of traditional Information Security Management System (ISMS) models, due to the archaic nature of multiple, siloed “management systems” that are necessary to provide reasonable governance practices (e.g., Artificial Intelligence Management System (AIMS) add-on). The use of siloed ISMS, AIMS and similar stand-alone management systems fails to address the reality of modern business practices, since it is overly leveraged for marketing purposes. This does not serve assurance needs to demonstrate security, compliance or resilience that entities require. The SCRMS offers a broader “security, compliance and resilience ecosystem” mindset that is designed to provide the necessary coverage to address applicable risks and threats that entities face.
Without an overarching concept of operations for the broader GRC function, organizations find that their governance, risk, compliance, and privacy teams operate in silos. Unfortunately, that approach produces unclear roles, duplicated effort, and gaps in coverage. The SCRMS directly solves this. The SCRMS enables an entity to align with one, or more, laws, regulations and/or frameworks. For example, an entity that aligns with NIST CSF 2.0, but also has obligations for PCI DSS, ISO 27001, ISO 42001, HIPAA Security Rule and SOC 2 can leverage a “living control set” that is capable of adjusting to the specific security, compliance and resilience requirements it must address.
What Is The SCRMS?
The SCRMS is designed to be:
The SCRMS defines specific, actionable meaning for each of its three pillars that goes above and beyond vague aspirations to concrete operational outcomes.
Being “secure” means the organization has implemented controls proportional to its risk profile across all five PPTDF dimensions. Security is not binary. It is a measurable, risk-based posture that evolves with threats and business context. This includes having defined policies, documented procedures, trained personnel, and verified technical controls that address the organization’s identified threats and vulnerabilities.
Being “compliant” means the organization has identified all applicable Minimum Compliance Requirements (MCR) from laws, regulations, and contractual obligations. Compliance is demonstrated through evidence. Compliance is not a checkbox exercise. It requires ongoing monitoring, documentation, and audit readiness across every applicable legal and regulatory jurisdiction where the organization operates.
Being “resilient” means the organization can absorb disruption, adapt to adverse events, and recover to normal operations within defined Recovery Time Objectives (RTO) and Recovery Point Objectives (RPO). Resilience encompasses business continuity, disaster recovery, incident response readiness, and supply chain resilience, ensuring the organization survives and learns from adverse events.
Any organization using the SCF. The SCRMS is designed for any organization seeking to move beyond ad-hoc security practices to a structured, sustainable, and auditable cybersecurity program.
Establish a defensible, risk-based program with clear governance lines and measurable outcomes.
Replace fragmented compliance tracking with a unified, controls-centric approach to risk and compliance management.
Map all applicable laws, regulations, and frameworks to a common control set that can help reduce redundancy and audit fatigue.
Translate governance requirements into actionable technical controls mapped to actual systems, data, and processes.
The SCRMS is built on three interlocking components that together form a complete implementation system. This spans the control catalog through to day-to-day operational governance.
The SCF is the foundational control catalog that is a comprehensive, open-source library of cybersecurity and data privacy controls covering all 33 domains. The SCF serves as the “What?” question to define the specific controls an organization needs to implement.
Controls in the SCF are mapped to 261+ laws, regulations, and frameworks via Set Theory Relationship Mapping (STRM), enabling organizations to satisfy multiple compliance obligations through a single control implementation.
The SCRMS is the operational framework that defines “how” an organization builds and runs its cybersecurity program. It provides the governance model, principles, processes, and organizational accountability structures.
The SCRMS operationalizes the SCF control catalog through its nine principles and PDCA lifecycle, ensuring controls are not just selected but actually implemented, monitored, and continuously improved.
The SCRMS-PIG is a “how-to-GRC” playbook that serves as a step-by-step guide for prioritizing and sequencing SCRMS implementation based on an organization’s risk profile, maturity level, and compliance obligations.
Rather than leaving organizations to figure out where to start, the PIG provides concrete, sequenced guidance for standing up each component of the SCRMS in a logical order that generates early wins while building toward a mature program.
The SCRMS is explicitly designed to address cybersecurity and data privacy holistically across all five dimensions of an organization, not just technology.
Most security frameworks focus primarily on technology controls. The SCRMS recognizes that security failures often originate in people (insider threats, training gaps), processes (undefined procedures, poor change management), and facilities (physical access, environmental controls), not just technology.
Training, awareness, hiring, HR security, insider threat, access governance
Policies, standards, procedures, change management, incident handling
Systems, networks, endpoints, cloud, applications, tooling, configurations
Classification, handling, retention, privacy, encryption, data governance
Physical security, environmental controls, data center access, visitor management
The SCRMS treats controls as the central nexus of cybersecurity and data privacy operations. Unlike traditional GRC which is often process-centric, the SCRMS is controls-centric, enabling every organizational function to map to a common control language.
Controls that represent the minimum bar required by external obligations such as laws, regulations, and contracts. These are non-negotiable. Not implementing them creates legal or contractual exposure.
Controls selected based on the organization's own risk appetite and judgment. These go beyond the minimum and represent best-practice enhancements driven by internal risk management.
The SCRMS uses the Plan-Do-Check-Act (PDCA) cycle as its foundational operational model. It provides a logical way to design, build, operate, and improve a cybersecurity program over time.
Define scope, applicable laws, reg, frameworks, and risk appetite. Identify MCR and DSR. Select applicable SCF controls. Build your Minimum Security Requirements (MSR) blueprint.
Implement selected controls. Publish policies, standards, and procedures. Assign stakeholder accountability. Leverage the SCRMS as a “paint by numbers” implementation guide.
Assess control effectiveness via the SCF Conformity Assessment Program (SCF CAP). Measure maturity using the SCR-CMM. Monitor using built-in risk and threat catalogs.
Remediate gaps from the Check phase. Update controls as laws change via the Living Control Set. Continuously improve. Prove compliance to regulators, auditors, insurers, and customers.
There are nine principles associated with the SCRMS. Together they form a complete operational methodology, from initial scoping through continuous program evolution.
Establishing context is both a due diligence and due care element of a cybersecurity program, since context changes with time. Considerations include: mission/vision/strategy; statutory, regulatory, and contractual requirements; fiscal constraints; organizational structure; applicable geographic-specific requirements; and internal and external stakeholder expectations.
A tailored set of cybersecurity and data protection controls must exist for a SCRMS implementation. This control set must be tailored to the organization’s unique requirements, combining Minimum Compliance Requirements (MCR) and Discretionary Security Requirements (DSR). This blend of “must have” and “nice to have” establishes the organization’s tailored control set.
The organization must define maturity expectations for its cybersecurity and data protection controls. From the SCRMS perspective, maturity expectations define entity-specific “what right looks like” for control implementation and ongoing operation. These maturity-based criteria apply across People, Processes, Technologies, Data, and Facilities (PPTDF) and directly support the organization’s security, compliance, and resilience goals.
Governance documentation is the written foundation of a cybersecurity program. This includes policies, standards, procedures, guidelines, and plans. Without published documentation, controls cannot be consistently applied, audited, or enforced. The SCF provides a direct mapping between controls and the governance documentation required to support them.
Every control must have an owner. Accountability structures ensure that cybersecurity responsibilities are clearly assigned to specific roles across the organization, not just the security team. This includes executives (risk ownership), managers (policy enforcement), and operational staff (procedure execution). Undefined accountability is one of the most common root causes of control failures.
Not all controls carry equal risk weight. Organizations with finite resources must prioritize implementation based on risk exposure, compliance criticality, and threat relevance. The SCRMS provides guidance for risk-based prioritization so that the most impactful controls are implemented first, ensuring early risk reduction even before a complete control set is in place.
Situational awareness is achieved through continuous monitoring, metrics collection, and periodic assessments. This principle covers logging, monitoring, alerting, and audit programs. Without situational awareness, organizations cannot detect incidents, measure control effectiveness, or demonstrate compliance. The SCRMS aligns this principle directly to the Check phase of the PDCA cycle.
Risk management is the engine of the SCRMS Act phase. It encompasses: identifying and treating current deficiencies, assessing emerging threats and vulnerabilities, making risk acceptance decisions, tracking remediation, and reporting risk status to stakeholders. The SCF’s risk management controls (GOV, RSK domains) provide the specific control requirements for building a functional risk management function.
The SCRMS is a living system. Cybersecurity threats, business contexts, and regulatory landscapes all change over time. Organizations must build continuous improvement into the SCRMS lifecycle by reviewing the program periodically, updating controls and governance documentation, reassessing risk, and incorporating lessons learned from incidents and audits into the next planning cycle.
Now that you understand how the SCRMS works, explore the core tools and resources you’ll need to implement it.
01
Get the full SCF spreadsheet, including the control catalog, STRM mappings, and domain structure that powers the SCRMS.
02
Explore all 33 SCF domains and understand how the Universal Control Taxonomy organizes every control.
03
See all 200+ laws, regulations, and frameworks mapped in the SCF, your complete compliance coverage map.
04
Understand how Set Theory Relationship Mapping (NIST IR 8477) proves SCF controls satisfy LRF requirements.