Secure Controls Framework
Download The SCF
Start Here

Set Theory Relationship Mapping (STRM)

Starting with release 2024.1, the SCF leverages NIST IR 8477 Set Theory Relationship Mapping for crosswalk mapping. This is the US Government's gold standard for evaluating cybersecurity and data privacy laws, regulations and frameworks.

5
Relationship Types
200+
LRF Mapped
NIST IR 8477
Gold Standard
EDC
Expert-Derived Content
NIST IR 8477

The Gold Standard for Crosswalk Mapping

NIST IR 8477 provides the definitive practice for crosswalk mapping with no technology needed. It can be performed with a pencil and piece of paper.

Children learn the process of diagramming sentences in grade school (e.g., the Reed–Kellogg model) with pencil and paper. This same process of graphically identifying the relationships between elements forms the basis of STRM. What NIST IR 8477 does is formalize this with Set Theory mathematics to produce rigorous, defensible, and IP-protected crosswalk mappings.

STRM is part of NIST’s broader NIST OLIR Program, an effort to facilitate Subject Matter Experts in defining standardized Online Informative References between elements of their creation and NIST publications.

You can click on the image to the side to see a PDF version of how the SCF is utilizing STRM, as well as an example for what that looks like with a few NIST CSF 2.0 controls:

NIST IR 8477 Set Theory Relationship Mapping (STRM) example PDF showing how the SCF maps controls using set theory Venn diagrams with NIST CSF 2.0 crosswalk examples

Purchase STRM Excel Bundles

The SCF offers editable Excel versions of all STRM mappings. The bundle of Excel versions is $25 (access to redownload is availabe for 30 days from date of purchase).

STRM Methodology

The 5 STRM Relationship Types

Every crosswalk mapping in the SCF uses exactly one of these five mathematically-defined relationship types, ensuring precision and consistency across all 200+ mapped LRF.

Subset Of

The LRF requirement is fully contained within the SCF control. The SCF control is broader in scope and coverage.

Intersects With

The LRF requirement and SCF control share partial overlap. Neither is fully contained within the other.

=

Equal To

The LRF requirement and SCF control are semantically equivalent. They address the same concept at the same scope.

Superset Of

The SCF control is contained within the LRF requirement. The LRF requirement is broader in scope and coverage.

Ø

No Relationship

The LRF requirement and SCF control have no meaningful semantic overlap. No mapping is established.

Relationship Strength (1–10)

Relationship Strength (1–10): Each mapping also receives a numeric strength rating. A rating of 1 indicates a nominal relationship, 5 indicates moderately strong, and 10 indicates the strongest relationship, typically reserved for "Equal To" or where the LRF requirement is a "Subset Of" the SCF control.

Methodology Advantage

Expert-Derived Content (EDC) vs. Natural Language Processing (NLP)

The SCF exclusively uses human subject-matter experts to perform STRM crosswalk mapping. This is a deliberate choice with significant IP, legal and quality implications.

SCF: Expert-Derived Content (EDC)

The SCF leverages human SMEs to perform STRM mapping. This produces content that is:

  • Copyright-protected as original work by human creators
  • Patent-eligible under the “mental steps” doctrine
  • Defensible through documented expert judgment
  • Consistent with NIST IR 8477 gold standard practices

Other Vendors: Natural Language Processing (NLP)

AI/NLP-based crosswalk solutions face significant IP limitations:

  • AI-generated content is not copyright-protectable (no human creator)
  • Potentially free to copy under current US copyright rulings
  • Patent claims may be invalid under the 2014 Supreme Court “mental steps” doctrine
  • Quality depends on training data rather than professional expertise

Why it matters

The SCF's EDC approach means its crosswalk mappings are both higher-quality and legally protected intellectual property, which is exactly how NIST IR 8477 itself was designed to work.

SCF Implementation

How the SCF Utilizes STRM

The SCF applies STRM to every one of its 200+ mapped laws, regulations and frameworks. Each mapping documents the precise set-theoretic relationship between every LRF requirement and the corresponding SCF control.

Focal Document Element (FDE)

Each LRF requirement is defined as a Focal Document Element with a unique identifier. Without a unique FDE value, no granular mapping is possible because there is nothing to map to.

SCF Control Mapping

Each FDE is mapped to the most appropriate SCF control with a documented relationship type (Subset Of, Intersects With, Equal To, Superset Of, or No Relationship) and a strength score of 1–10.

Multi-Framework Compliance

Because all LRF are mapped to common SCF controls using STRM, a single SCF control can simultaneously satisfy requirements across dozens of laws, regulations and frameworks. This enables true multi-framework compliance efficiency.

Available STRMs

Published STRM Mappings

Excel versions of the STRM mappings are available for purchase at the SCF Store. The following STRM mappings are currently published:

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Americas
✓ STRM
Canada
Canada - Protecting controlled information in non-Government of Canada systems and organizations (ITSP.10.171)
Download STRM (PDF) →
Americas
✓ STRM
Canada
Canada - OSFI B-13 (2022)
Download STRM (PDF) →
APAC
✓ STRM
New Zealand
New Zealand - HISO 10029:2024 NZ Health Information Security Framework Guidance for Suppliers
Download STRM (PDF) →
APAC
✓ STRM
New Zealand
New Zealand - HISF MicroSmall (2023)
Download STRM (PDF) →
APAC
✓ STRM
New Zealand
New Zealand - HISF MLHSP (2023)
Download STRM (PDF) →
APAC
✓ STRM
India
India - SEBI Cybersecurity and Cyber Resilience Framework (2024)
Download STRM (PDF) →
APAC
✓ STRM
India
India Digital Personal Data Protection Act (2023)
Download STRM (PDF) →
APAC
✓ STRM
China
China - Cybersecurity Law of the People's Republic of China (2017)
Download STRM (PDF) →
APAC
✓ STRM
Australia
Australia - Information Security Manual (ISM) (June 2024)
Download STRM (PDF) →
APAC
✓ STRM
Australia
Australia -Essential Eight maturity model and ISM mapping (2024)
Download STRM (PDF) →
EMEA
✓ STRM
United Kingdom
UK - Ministry of Defence Standard 05-138 (2024) - L3
Download STRM (PDF) →
EMEA
✓ STRM
United Kingdom
UK - Ministry of Defence Standard 05-138 (2024) - L2
Download STRM (PDF) →
EMEA
✓ STRM
United Kingdom
UK - Ministry of Defence Standard 05-138 (2024) - L0
Download STRM (PDF) →
EMEA
✓ STRM
United Kingdom
UK - Ministry of Defence Standard 05-138 (2024) - L1
Download STRM (PDF) →
EMEA
✓ STRM
United Kingdom
UK - Ministry of Defence Standard 05-138 (2024)
Download STRM (PDF) →
EMEA
✓ STRM
Spain
Royal Decree 311/2022, of May 3, which regulates the National Security Scheme (BOE-A-2022-7191)
Download STRM (PDF) →
EMEA
✓ STRM
United Kingdom
UK - Cyber Assessment Framework (CAF) v4.0
Download STRM (PDF) →
EMEA
✓ STRM
UAE
UAE - National Information Assurance Framework (NIAF) (2023)
Download STRM (PDF) →
EMEA
✓ STRM
Saudi Arabia
Saudi Arabia - Personal Data Protection Law (PDPL) (2023)
Download STRM (PDF) →
USA
✓ STRM
State
Colorado Privacy Act (2021)
Download STRM (PDF) →
EMEA
✓ STRM
Saudi Arabia
Saudi Arabia - Cybersecurity Guidelines for Internet of Things (CGIoT-1:2024)
Download STRM (PDF) →
EMEA
✓ STRM
EU
European Union Agency for Cybersecurity NIS2 (Directive (EU) 2022/2555)
Download STRM (PDF) →
EMEA
✓ STRM
EU
European Union Agency for Cybersecurity NIS2 Annex (2024)
Download STRM (PDF) →
EMEA
✓ STRM
EU
European Union General Data Protection Regulation (2016)
Download STRM (PDF) →
EMEA
✓ STRM
EU
Digital Operational Resilience Act (2023)
Download STRM (PDF) →

No matching frameworks found. Try a different search term or filter.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
General
✓ STRM
United Nations
United Nations Regulation No. 155 - Cyber security and cyber security management system (2021)
Download STRM (PDF) →
General
✓ STRM
United Nations
United Nations Economic Commission for Europe - Working Party on Automated/autonomous and Connected Vehicles -Proposal for a new UN Regulation on uniform provisions concerning the approval of vehicles with regards to cyber security and cyber security manag
Download STRM (PDF) →
General
✓ STRM
UL
UL 2900-2-2 Ed. 1-2016 - Outline of Investigation for Software Cybersecurity for Network-Connectable Products, Part 2-2: Particular Requirements for Industrial Control Systems
Download STRM (PDF) →
General
✓ STRM
UL
UL 2900-1- Software Cybersecurity for Network-Connectable Products, Part 1: General Requirements (2017)
Download STRM (PDF) →
General
✓ STRM
TISAX
Trusted Information Security Assessment Exchange (TISAX) 6.0.3
Download STRM (PDF) →
General
✓ STRM
SWIFT
Society for Worldwide Interbank Financial Telecommunication Customer Security Controls Framework 2025
Download STRM (PDF) →
General
✓ STRM
SPARTA
Space Attack Research & Tactic Analysis (SPARTA) Countermeasures
Download STRM (PDF) →
General
✓ STRM
SCF
Secure Controls Framework (SCF) Data Privacy Management Principles (2025)
Download STRM (PDF) →
General
✓ STRM
PCI SSC
Payment Card Industry Data Security Standard v4.0.1 - Self-Assessment Questionnaire P2PE
Download STRM (PDF) →
General
✓ STRM
PCI SSC
Payment Card Industry Data Security Standard v4.0.1 - Self-Assessment Questionnaire D Service Provider
Download STRM (PDF) →
General
✓ STRM
PCI SSC
Payment Card Industry Data Security Standard v4.0.1 - Self-Assessment Questionnaire D Merchant
Download STRM (PDF) →
General
✓ STRM
PCI SSC
Payment Card Industry Data Security Standard v4.0.1 - Self-Assessment Questionnaire C-VT
Download STRM (PDF) →
General
✓ STRM
PCI SSC
Payment Card Industry Data Security Standard v4.0.1 - Self-Assessment Questionnaire B-IP
Download STRM (PDF) →
General
✓ STRM
PCI SSC
Payment Card Industry Data Security Standard v4.0.1 - Self-Assessment Questionnaire C
Download STRM (PDF) →
General
✓ STRM
PCI SSC
Payment Card Industry Data Security Standard v4.0.1 - Self-Assessment Questionnaire B
Download STRM (PDF) →
General
✓ STRM
PCI SSC
Payment Card Industry Data Security Standard v4.0.1 - Self-Assessment Questionnaire A-EP
Download STRM (PDF) →
General
✓ STRM
OWASP
Open Worldwide Application Security Project (OWASP) Top 10 (2025)
Download STRM (PDF) →
General
✓ STRM
PCI SSC
Payment Card Industry Data Security Standard v4.0.1 - Self-Assessment Questionnaire A
Download STRM (PDF) →
General
✓ STRM
PCI SSC
Payment Card Industry Data Security Standard v4.01
Download STRM (PDF) →
General
✓ STRM
OECD
Organisation for Economic Co-operation and Development Privacy Principles
Download STRM (PDF) →
General
✓ STRM
NIST
NIST Cybersecurity Framework v2.0
Download STRM (PDF) →
General
✓ STRM
NIST
NIST SP 800-218 - Secure Software Development Framework (SSDF) Version 1.1: Recommendations for Mitigating the Risk of Software Vulnerabilities
Download STRM (PDF) →
General
✓ STRM
NIST
NIST SP 800-207 - Zero Trust Architecture
Download STRM (PDF) →
General
✓ STRM
NIST
NIST SP 800-172 - Enhanced Security Requirements for Protecting Controlled Unclassified Information: A Supplement to NIST Special Publication 800-171
Download STRM (PDF) →
General
✓ STRM
NIST
NIST SP 800-171A - Assessing Security Requirements for Controlled Unclassified Information
Download STRM (PDF) →

No matching frameworks found. Try a different search term or filter.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
USA
✓ STRM
State
California Consumer Privacy Act (CCPA) (January 2026) - amended California Privacy Rights Act (CPRA)
Download STRM (PDF) →
USA
✓ STRM
Federal
Transportation Security Administration Security Directive 1580/82-2022-01 - Rail Cybersecurity Mitigation Actions and Testing
Download STRM (PDF) →
USA
✓ STRM
Federal
Sarbanes Oxley Act (2002)
Download STRM (PDF) →
USA
✓ STRM
Federal
SEC Cybersecurity Rule (2023)
Download STRM (PDF) →
USA
✓ STRM
Federal
North American Electric Reliability Corporation Critical Infrastructure Protection (2024)
Download STRM (PDF) →
USA
✓ STRM
Federal
National Industrial Security Program Operating Manual (2020)
Download STRM (PDF) →
USA
✓ STRM
Federal
Safeguarding of Naval Nuclear Propulsion Information (NNPI) (2010)
Download STRM (PDF) →
USA
✓ STRM
Federal
US Centers for Medicare & Medicaid Services MARS-E Document Suite, Version 2.0
Download STRM (PDF) →
USA
✓ STRM
Federal
Internal Revenue Service 1075 (2021)
Download STRM (PDF) →
USA
✓ STRM
Federal
HIPAA Security Rule (2013)
Download STRM (PDF) →
USA
✓ STRM
Federal
HIPAA Administrative Simplification (2013)
Download STRM (PDF) →
USA
✓ STRM
Federal
Gramm Leach Bliley Act - CFR 314 (Dec 2023)
Download STRM (PDF) →
USA
✓ STRM
Federal
HHS § 155.260 - Privacy and Security of Personally Identifiable Information (2016)
Download STRM (PDF) →
USA
✓ STRM
Federal
Federal Trade Commission (FTC) Act
Download STRM (PDF) →
USA
✓ STRM
Federal
US Fair Information Practice Principles (FIPPs) (1973)
Download STRM (PDF) →
USA
✓ STRM
Federal
Financial Industry Regulatory Authority (FINRA) Cybersecurity Rules
Download STRM (PDF) →
USA
✓ STRM
Federal
Family Educational Rights and Privacy Act (FERPA) (2010)
Download STRM (PDF) →
USA
✓ STRM
Federal
Federal Risk and Authorization Management Program R5 - Li-SAAS Baseline
Download STRM (PDF) →
USA
✓ STRM
Federal
Federal Risk and Authorization Management Program R5 - High Baseline
Download STRM (PDF) →
USA
✓ STRM
Federal
Federal Risk and Authorization Management Program R5 - Moderate Baseline
Download STRM (PDF) →
USA
✓ STRM
Federal
Federal Risk and Authorization Management Program R5 - Low Baseline
Download STRM (PDF) →
USA
✓ STRM
Federal
Food & Drug Administration 21 CFR Part 11 (2025)
Download STRM (PDF) →
USA
✓ STRM
Federal
Farm Credit Administration Cyber Risk Management (2023)
Download STRM (PDF) →
USA
✓ STRM
Federal
Federal Acquisition Regulation 52.204-27 - Prohibition on a ByteDance Covered Application
Download STRM (PDF) →
USA
✓ STRM
Federal
Federal Acquisition Regulation 52.204-25 (NDAA Section 889) - Prohibition on Contracting With Entities Using Certain Telecommunications and Video Surveillance Services or Equipment
Download STRM (PDF) →

No matching frameworks found. Try a different search term or filter.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
EMEA
✓ STRM
United Kingdom
UK - Ministry of Defence Standard 05-138 (2024) - L3
Download STRM (PDF) →
EMEA
✓ STRM
United Kingdom
UK - Ministry of Defence Standard 05-138 (2024) - L2
Download STRM (PDF) →
EMEA
✓ STRM
United Kingdom
UK - Ministry of Defence Standard 05-138 (2024) - L0
Download STRM (PDF) →
EMEA
✓ STRM
United Kingdom
UK - Ministry of Defence Standard 05-138 (2024) - L1
Download STRM (PDF) →
EMEA
✓ STRM
United Kingdom
UK - Ministry of Defence Standard 05-138 (2024)
Download STRM (PDF) →
EMEA
✓ STRM
Spain
Royal Decree 311/2022, of May 3, which regulates the National Security Scheme (BOE-A-2022-7191)
Download STRM (PDF) →
EMEA
✓ STRM
United Kingdom
UK - Cyber Assessment Framework (CAF) v4.0
Download STRM (PDF) →
EMEA
✓ STRM
UAE
UAE - National Information Assurance Framework (NIAF) (2023)
Download STRM (PDF) →
EMEA
✓ STRM
Saudi Arabia
Saudi Arabia - Personal Data Protection Law (PDPL) (2023)
Download STRM (PDF) →
EMEA
✓ STRM
Saudi Arabia
Saudi Arabia - Cybersecurity Guidelines for Internet of Things (CGIoT-1:2024)
Download STRM (PDF) →
EMEA
✓ STRM
EU
European Union Agency for Cybersecurity NIS2 (Directive (EU) 2022/2555)
Download STRM (PDF) →
EMEA
✓ STRM
EU
European Union Agency for Cybersecurity NIS2 Annex (2024)
Download STRM (PDF) →
EMEA
✓ STRM
EU
European Union General Data Protection Regulation (2016)
Download STRM (PDF) →
EMEA
✓ STRM
EU
Digital Operational Resilience Act (2023)
Download STRM (PDF) →
EMEA
✓ STRM
EU
European Union Cyber Resilience Act - Annexes (2022)
Download STRM (PDF) →
EMEA
✓ STRM
EU
European Union Cyber Resilience Act (2022)
Download STRM (PDF) →
EMEA
✓ STRM
EU
European Union Artificial Intelligence Act (Regulation (EU) 2024/1689)
Download STRM (PDF) →

No matching frameworks found. Try a different search term or filter.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
APAC
✓ STRM
New Zealand
New Zealand - HISO 10029:2024 NZ Health Information Security Framework Guidance for Suppliers
Download STRM (PDF) →
APAC
✓ STRM
New Zealand
New Zealand - HISF MicroSmall (2023)
Download STRM (PDF) →
APAC
✓ STRM
New Zealand
New Zealand - HISF MLHSP (2023)
Download STRM (PDF) →
APAC
✓ STRM
India
India - SEBI Cybersecurity and Cyber Resilience Framework (2024)
Download STRM (PDF) →
APAC
✓ STRM
India
India Digital Personal Data Protection Act (2023)
Download STRM (PDF) →
APAC
✓ STRM
China
China - Cybersecurity Law of the People's Republic of China (2017)
Download STRM (PDF) →
APAC
✓ STRM
Australia
Australia - Information Security Manual (ISM) (June 2024)
Download STRM (PDF) →
APAC
✓ STRM
Australia
Australia -Essential Eight maturity model and ISM mapping (2024)
Download STRM (PDF) →

No matching frameworks found. Try a different search term or filter.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Americas
✓ STRM
Canada
Canada - Protecting controlled information in non-Government of Canada systems and organizations (ITSP.10.171)
Download STRM (PDF) →
Americas
✓ STRM
Canada
Canada - OSFI B-13 (2022)
Download STRM (PDF) →

No matching frameworks found. Try a different search term or filter.

Community Involvement

How To Submit a Community STRM Mapping

The SCF welcomes community involvement. The SCF Council provides a downloadable Community STRM Template that practitioners can use to perform their own crosswalk mapping and submit for possible inclusion in a future SCF release.

01

Define the Focal Document

Open the STRM template’s “STRM Overview” tab and complete the two highlighted cells identifying:

  • The Focal Document (FD), which is the law, regulation or framework you are mapping
  • The Reference Document (RD), which is the SCF (the document being mapped to)

Prerequisites: familiarity with NIST IR 8477 and professional competence to conduct crosswalk mapping.

02

Perform the STRM Mapping

Complete the “Community STRM submission” tab using these columns:

  • FDE number (mandatory unique identifier)
  • FDE name (if available)
  • FDE description (exact text of the requirement)
  • Proposed SCF control name
  • SCF control number
  • SCF control description
  • STRM relationship type (1 of 5 options)
  • Relationship strength (1–10 rating)
  • Optional notes / justification
03

Submit to the SCF Council

Once your STRM exercise is complete, email the completed Excel spreadsheet to the SCF Council for review:

support@securecontrolsframework.com

Submissions are evaluated by the SCF Council and may be included in a future SCF release. The SCF Council will contact you if there are questions about your submission.

Additional SCF Content

Explore Further

Included LRF

Browse all 200+ laws, regulations and frameworks mapped in the SCF across 5 global regions.

NIST OLIR Participation

The SCF is a recognized NIST OLIR Program participant with accepted OLIRs for NIST CSF v1.1 and SP 800-171 R2.

SCF Domains

Explore the 33 control domains that form the Common Controls Framework at the heart of the SCF.

Download the SCF

Get the free SCF spreadsheet with all controls, all LRF mappings, and all STRM relationships included.