Secure Controls Framework
Download The SCF
Start Here

Set Theory Relationship Mapping (STRM)

Starting with release 2024.1, the SCF leverages NIST IR 8477 Set Theory Relationship Mapping for crosswalk mapping. This is the US Government's gold standard for evaluating cybersecurity and data privacy laws, regulations and frameworks.

5
Relationship Types
200+
LRF Mapped
NIST IR 8477
Gold Standard
EDC
Expert-Derived Content
NIST IR 8477

The Gold Standard for Crosswalk Mapping

NIST IR 8477 provides the definitive practice for crosswalk mapping with no technology needed. It can be performed with a pencil and piece of paper.

Children learn the process of diagramming sentences in grade school (e.g., the Reed–Kellogg model) with pencil and paper. This same process of graphically identifying the relationships between elements forms the basis of STRM. What NIST IR 8477 does is formalize this with Set Theory mathematics to produce rigorous, defensible, and IP-protected crosswalk mappings.

STRM is part of NIST’s broader NIST OLIR Program, an effort to facilitate Subject Matter Experts in defining standardized Online Informative References between elements of their creation and NIST publications.

You can click on the image to the side to see a PDF version of how the SCF is utilizing STRM, as well as an example for what that looks like with a few NIST CSF 2.0 controls:

NIST IR 8477 Set Theory Relationship Mapping (STRM) example PDF showing how the SCF maps controls using set theory Venn diagrams with NIST CSF 2.0 crosswalk examples

Purchase STRM Excel Bundles

The SCF offers editable Excel versions of all STRM mappings. The bundle of Excel versions is $25 (access to redownload is availabe for 30 days from date of purchase).

STRM Methodology

The 5 STRM Relationship Types

Every crosswalk mapping in the SCF uses exactly one of these five mathematically-defined relationship types, ensuring precision and consistency across all 200+ mapped LRF.

Subset Of

The LRF requirement is fully contained within the SCF control. The SCF control is broader in scope and coverage.

Intersects With

The LRF requirement and SCF control share partial overlap. Neither is fully contained within the other.

=

Equal To

The LRF requirement and SCF control are semantically equivalent. They address the same concept at the same scope.

Superset Of

The SCF control is contained within the LRF requirement. The LRF requirement is broader in scope and coverage.

Ø

No Relationship

The LRF requirement and SCF control have no meaningful semantic overlap. No mapping is established.

Relationship Strength (1–10)

Relationship Strength (1–10): Each mapping also receives a numeric strength rating. A rating of 1 indicates a nominal relationship, 5 indicates moderately strong, and 10 indicates the strongest relationship, typically reserved for "Equal To" or where the LRF requirement is a "Subset Of" the SCF control.

Methodology Advantage

Expert-Derived Content (EDC) vs. Natural Language Processing (NLP)

The SCF exclusively uses human subject-matter experts to perform STRM crosswalk mapping. This is a deliberate choice with significant IP, legal and quality implications.

SCF: Expert-Derived Content (EDC)

The SCF leverages human SMEs to perform STRM mapping. This produces content that is:

  • Copyright-protected as original work by human creators
  • Patent-eligible under the “mental steps” doctrine
  • Defensible through documented expert judgment
  • Consistent with NIST IR 8477 gold standard practices

Other Vendors: Natural Language Processing (NLP)

AI/NLP-based crosswalk solutions face significant IP limitations:

  • AI-generated content is not copyright-protectable (no human creator)
  • Potentially free to copy under current US copyright rulings
  • Patent claims may be invalid under the 2014 Supreme Court “mental steps” doctrine
  • Quality depends on training data rather than professional expertise

Why it matters

The SCF's EDC approach means its crosswalk mappings are both higher-quality and legally protected intellectual property, which is exactly how NIST IR 8477 itself was designed to work.

SCF Implementation

How the SCF Utilizes STRM

The SCF applies STRM to every one of its 200+ mapped laws, regulations and frameworks. Each mapping documents the precise set-theoretic relationship between every LRF requirement and the corresponding SCF control.

Focal Document Element (FDE)

Each LRF requirement is defined as a Focal Document Element with a unique identifier. Without a unique FDE value, no granular mapping is possible because there is nothing to map to.

SCF Control Mapping

Each FDE is mapped to the most appropriate SCF control with a documented relationship type (Subset Of, Intersects With, Equal To, Superset Of, or No Relationship) and a strength score of 1–10.

Multi-Framework Compliance

Because all LRF are mapped to common SCF controls using STRM, a single SCF control can simultaneously satisfy requirements across dozens of laws, regulations and frameworks. This enables true multi-framework compliance efficiency.

Available STRMs

Published STRM Mappings

Excel versions of the STRM mappings are available for purchase at the SCF Store. The following STRM mappings are currently published:

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Americas
✓ STRM
Canada
Canada - Protecting controlled information in non-Government of Canada systems and organizations (ITSP.10.171)
Download STRM (PDF) →
Americas
✓ STRM
Canada
Canada - OSFI B-13 (2022)
Download STRM (PDF) →
APAC
✓ STRM
New Zealand
New Zealand - HISO 10029:2024 NZ Health Information Security Framework Guidance for Suppliers
Download STRM (PDF) →
APAC
✓ STRM
New Zealand
New Zealand - HISF MicroSmall (2023)
Download STRM (PDF) →
APAC
✓ STRM
New Zealand
New Zealand - HISF MLHSP (2023)
Download STRM (PDF) →
APAC
✓ STRM
India
India - SEBI Cybersecurity and Cyber Resilience Framework (2024)
Download STRM (PDF) →
APAC
✓ STRM
India
India Digital Personal Data Protection Act (2023)
Download STRM (PDF) →
APAC
✓ STRM
China
China - Cybersecurity Law of the People's Republic of China (2017)
Download STRM (PDF) →
APAC
✓ STRM
Australia
Australia - Information Security Manual (ISM) (June 2024)
Download STRM (PDF) →
APAC
✓ STRM
Australia
Australia -Essential Eight maturity model and ISM mapping (2024)
Download STRM (PDF) →
EMEA
✓ STRM
United Kingdom
UK - Ministry of Defence Standard 05-138 (2024) - L3
Download STRM (PDF) →
EMEA
✓ STRM
United Kingdom
UK - Ministry of Defence Standard 05-138 (2024) - L2
Download STRM (PDF) →
EMEA
✓ STRM
United Kingdom
UK - Ministry of Defence Standard 05-138 (2024) - L0
Download STRM (PDF) →
EMEA
✓ STRM
United Kingdom
UK - Ministry of Defence Standard 05-138 (2024) - L1
Download STRM (PDF) →
EMEA
✓ STRM
United Kingdom
UK - Ministry of Defence Standard 05-138 (2024)
Download STRM (PDF) →
EMEA
✓ STRM
Spain
Royal Decree 311/2022, of May 3, which regulates the National Security Scheme (BOE-A-2022-7191)
Download STRM (PDF) →
EMEA
✓ STRM
United Kingdom
UK - Cyber Assessment Framework (CAF) v4.0
Download STRM (PDF) →
EMEA
✓ STRM
UAE
UAE - National Information Assurance Framework (NIAF) (2023)
Download STRM (PDF) →
EMEA
✓ STRM
Saudi Arabia
Saudi Arabia - Personal Data Protection Law (PDPL) (2023)
Download STRM (PDF) →
USA
✓ STRM
State
Colorado Privacy Act (2021)
Download STRM (PDF) →
EMEA
✓ STRM
Saudi Arabia
Saudi Arabia - Cybersecurity Guidelines for Internet of Things (CGIoT-1:2024)
Download STRM (PDF) →
EMEA
✓ STRM
EU
European Union Agency for Cybersecurity NIS2 (Directive (EU) 2022/2555)
Download STRM (PDF) →
EMEA
✓ STRM
EU
European Union Agency for Cybersecurity NIS2 Annex (2024)
Download STRM (PDF) →
EMEA
✓ STRM
EU
European Union General Data Protection Regulation (2016)
Download STRM (PDF) →
EMEA
✓ STRM
EU
Digital Operational Resilience Act (2023)
Download STRM (PDF) →

No matching frameworks found. Try a different search term or filter.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
General
✓ STRM
NIST
NIST SP 800-171A R3 - Assessing Security Requirements for Controlled Unclassified Information
Download STRM (PDF) →
General
✓ STRM
NIST
NIST SP 800-171 R2 - Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations
Download STRM (PDF) →
General
✓ STRM
NIST
NIST SP 800-171 R3 - Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations
Download STRM (PDF) →
General
✓ STRM
NIST
NIST SP 800-161 R1 UDP1 - Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations - Level 3 Baseline
Download STRM (PDF) →
General
✓ STRM
NIST
NIST SP 800-161 R1 UDP1 - Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations - Level 2 Baseline
Download STRM (PDF) →
General
✓ STRM
NIST
NIST SP 800-161 R1 UDP1 - Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations - Level 1 Baseline
Download STRM (PDF) →
General
✓ STRM
NIST
NIST SP 800-161 R1 UDP1 - Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations - Flow Down Baseline
Download STRM (PDF) →
General
✓ STRM
NIST
NIST SP 800-161 R1 UDP1 - Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations - C-SCRM Baseline
Download STRM (PDF) →
General
✓ STRM
NIST
NIST SP 800-161 R1 UDP1 - Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations
Download STRM (PDF) →
General
✓ STRM
NIST
NIST SP 800-160 Volume 2, Revision 1 - Developing Cyber-Resilient Systems: A Systems Security Engineering Approach
Download STRM (PDF) →
General
✓ STRM
NIST
NIST SP 800-82 R3 - Guide to Operational Technology (OT) Security - High OT Overlay
Download STRM (PDF) →
General
✓ STRM
NIST
NIST SP 800-82 R3 - Guide to Operational Technology (OT) Security - Moderate OT Overlay
Download STRM (PDF) →
General
✓ STRM
NIST
NIST SP 800-82 R3 - Guide to Operational Technology (OT) Security - Low OT Overlay
Download STRM (PDF) →
General
✓ STRM
NIST
NIST SP 800-82 R3 - Guide to Operational Technology (OT) Security - Low OT Overlay
Download STRM (PDF) →
General
✓ STRM
NIST
NIST SP 800-66 R2 - Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule: A Cybersecurity Resource Guide
Download STRM (PDF) →
General
✓ STRM
NIST
NIST SP 800-53 R5 - Security and Privacy Controls for Information Systems and Organizations - High Baseline
Download STRM (PDF) →
General
✓ STRM
NIST
NIST SP 800-53 R5 - Security and Privacy Controls for Information Systems and Organizations - Moderate Baseline
Download STRM (PDF) →
General
✓ STRM
NIST
NIST SP 800-53 R5 - Security and Privacy Controls for Information Systems and Organizations - Low Baseline
Download STRM (PDF) →
General
✓ STRM
NIST
NIST SP 800-53 R5 - Security and Privacy Controls for Information Systems and Organizations - Privacy Baseline
Download STRM (PDF) →
General
✓ STRM
NIST
NIST SP 800-53 R5 - Security and Privacy Controls for Information Systems and Organizations
Download STRM (PDF) →
General
✓ STRM
NIST
NIST SP 800-39 - Managing Information Security Risk: Organization, Mission, and Information System View
Download STRM (PDF) →
General
✓ STRM
NIST
NIST SP 800-37 R2 - Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy
Download STRM (PDF) →
General
✓ STRM
NIST
NIST Privacy Framework v1.0
Download STRM (PDF) →
General
✓ STRM
NIST
NIST AI 600-1 - Artificial Intelligence Risk Management Framework: Generative Artificial Intelligence Profile
Download STRM (PDF) →
General
✓ STRM
NIST
NIST AI 100-1 - Artificial Intelligence Risk Management Framework (AI RMF 1.0)
Download STRM (PDF) →

No matching frameworks found. Try a different search term or filter.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
USA
✓ STRM
State
Colorado Privacy Act (2021)
Download STRM (PDF) →
USA
✓ STRM
State
Virginia Consumer Data Protection Act (2023)
Download STRM (PDF) →
USA
✓ STRM
State
Vermont Data Broker Registration Act (Act 171 of 2018)
Download STRM (PDF) →
USA
✓ STRM
State
Texas Risk & Authorization Management Program 2.0 - Level 2
Download STRM (PDF) →
USA
✓ STRM
State
Texas Safe Harbor Law (SB2610) (2025)
Download STRM (PDF) →
USA
✓ STRM
State
Texas Risk & Authorization Management Program 2.0 - Level 1
Download STRM (PDF) →
USA
✓ STRM
State
Texas SB820 (2019)
Download STRM (PDF) →
USA
✓ STRM
State
Tennessee Information Protection Act (TIPA) (2025)
Download STRM (PDF) →
USA
✓ STRM
State
Texas Identity Theft Enforcement and Protection Act (BC521) (2009)
Download STRM (PDF) →
USA
✓ STRM
State
Texas DIR Security Control Standards Catalog v2.2
Download STRM (PDF) →
USA
✓ STRM
State
Texas Consumer Data Protection Act (2025)
Download STRM (PDF) →
USA
✓ STRM
State
New York Department of Financial Services 23NYCRR Part 500 (2023 Amendment 2)
Download STRM (PDF) →
USA
✓ STRM
State
Oregon Consumer Privacy Act (SB 619) (2023)
Download STRM (PDF) →
USA
✓ STRM
State
Oregon Consumer Information Protection Act (ORS 646A) (2025)
Download STRM (PDF) →
USA
✓ STRM
State
New York SHIELD Act (SB S5575B) (2019)
Download STRM (PDF) →
USA
✓ STRM
State
Nevada SB220 (2019)
Download STRM (PDF) →
USA
✓ STRM
State
Nevada Privacy Law (2023)- CHAPTER 603A - SECURITY AND PRIVACY OF PERSONAL INFORMATION
Download STRM (PDF) →
USA
✓ STRM
State
Nevada Operation of Gaming Establishments - Regulation 5.260 (Cybersecurity)
Download STRM (PDF) →
USA
✓ STRM
State
Massachusetts 201 CMR 17.00 (2008)
Download STRM (PDF) →
USA
✓ STRM
State
Illinois Personal Information Protection Act (PIPA) (2006)
Download STRM (PDF) →
USA
✓ STRM
State
Illinois Identity Protection Act (IPA) (2009)
Download STRM (PDF) →
USA
✓ STRM
State
Illinois Biometric Information Privacy Act (BIPA) (2008)
Download STRM (PDF) →
USA
✓ STRM
State
California SB1386 (2002)
Download STRM (PDF) →
USA
✓ STRM
State
California SB327 (2018)
Download STRM (PDF) →
USA
✓ STRM
State
Alaska Personal Information Protection Act (PIPA) (2009)
Download STRM (PDF) →

No matching frameworks found. Try a different search term or filter.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
EMEA
✓ STRM
United Kingdom
UK - Ministry of Defence Standard 05-138 (2024) - L3
Download STRM (PDF) →
EMEA
✓ STRM
United Kingdom
UK - Ministry of Defence Standard 05-138 (2024) - L2
Download STRM (PDF) →
EMEA
✓ STRM
United Kingdom
UK - Ministry of Defence Standard 05-138 (2024) - L0
Download STRM (PDF) →
EMEA
✓ STRM
United Kingdom
UK - Ministry of Defence Standard 05-138 (2024) - L1
Download STRM (PDF) →
EMEA
✓ STRM
United Kingdom
UK - Ministry of Defence Standard 05-138 (2024)
Download STRM (PDF) →
EMEA
✓ STRM
Spain
Royal Decree 311/2022, of May 3, which regulates the National Security Scheme (BOE-A-2022-7191)
Download STRM (PDF) →
EMEA
✓ STRM
United Kingdom
UK - Cyber Assessment Framework (CAF) v4.0
Download STRM (PDF) →
EMEA
✓ STRM
UAE
UAE - National Information Assurance Framework (NIAF) (2023)
Download STRM (PDF) →
EMEA
✓ STRM
Saudi Arabia
Saudi Arabia - Personal Data Protection Law (PDPL) (2023)
Download STRM (PDF) →
EMEA
✓ STRM
Saudi Arabia
Saudi Arabia - Cybersecurity Guidelines for Internet of Things (CGIoT-1:2024)
Download STRM (PDF) →
EMEA
✓ STRM
EU
European Union Agency for Cybersecurity NIS2 (Directive (EU) 2022/2555)
Download STRM (PDF) →
EMEA
✓ STRM
EU
European Union Agency for Cybersecurity NIS2 Annex (2024)
Download STRM (PDF) →
EMEA
✓ STRM
EU
European Union General Data Protection Regulation (2016)
Download STRM (PDF) →
EMEA
✓ STRM
EU
Digital Operational Resilience Act (2023)
Download STRM (PDF) →
EMEA
✓ STRM
EU
European Union Cyber Resilience Act - Annexes (2022)
Download STRM (PDF) →
EMEA
✓ STRM
EU
European Union Cyber Resilience Act (2022)
Download STRM (PDF) →
EMEA
✓ STRM
EU
European Union Artificial Intelligence Act (Regulation (EU) 2024/1689)
Download STRM (PDF) →

No matching frameworks found. Try a different search term or filter.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
APAC
✓ STRM
New Zealand
New Zealand - HISO 10029:2024 NZ Health Information Security Framework Guidance for Suppliers
Download STRM (PDF) →
APAC
✓ STRM
New Zealand
New Zealand - HISF MicroSmall (2023)
Download STRM (PDF) →
APAC
✓ STRM
New Zealand
New Zealand - HISF MLHSP (2023)
Download STRM (PDF) →
APAC
✓ STRM
India
India - SEBI Cybersecurity and Cyber Resilience Framework (2024)
Download STRM (PDF) →
APAC
✓ STRM
India
India Digital Personal Data Protection Act (2023)
Download STRM (PDF) →
APAC
✓ STRM
China
China - Cybersecurity Law of the People's Republic of China (2017)
Download STRM (PDF) →
APAC
✓ STRM
Australia
Australia - Information Security Manual (ISM) (June 2024)
Download STRM (PDF) →
APAC
✓ STRM
Australia
Australia -Essential Eight maturity model and ISM mapping (2024)
Download STRM (PDF) →

No matching frameworks found. Try a different search term or filter.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Americas
✓ STRM
Canada
Canada - Protecting controlled information in non-Government of Canada systems and organizations (ITSP.10.171)
Download STRM (PDF) →
Americas
✓ STRM
Canada
Canada - OSFI B-13 (2022)
Download STRM (PDF) →

No matching frameworks found. Try a different search term or filter.

Community Involvement

How To Submit a Community STRM Mapping

The SCF welcomes community involvement. The SCF Council provides a downloadable Community STRM Template that practitioners can use to perform their own crosswalk mapping and submit for possible inclusion in a future SCF release.

01

Define the Focal Document

Open the STRM template’s “STRM Overview” tab and complete the two highlighted cells identifying:

  • The Focal Document (FD), which is the law, regulation or framework you are mapping
  • The Reference Document (RD), which is the SCF (the document being mapped to)

Prerequisites: familiarity with NIST IR 8477 and professional competence to conduct crosswalk mapping.

02

Perform the STRM Mapping

Complete the “Community STRM submission” tab using these columns:

  • FDE number (mandatory unique identifier)
  • FDE name (if available)
  • FDE description (exact text of the requirement)
  • Proposed SCF control name
  • SCF control number
  • SCF control description
  • STRM relationship type (1 of 5 options)
  • Relationship strength (1–10 rating)
  • Optional notes / justification
03

Submit to the SCF Council

Once your STRM exercise is complete, email the completed Excel spreadsheet to the SCF Council for review:

support@securecontrolsframework.com

Submissions are evaluated by the SCF Council and may be included in a future SCF release. The SCF Council will contact you if there are questions about your submission.

Additional SCF Content

Explore Further

Included LRF

Browse all 200+ laws, regulations and frameworks mapped in the SCF across 5 global regions.

NIST OLIR Participation

The SCF is a recognized NIST OLIR Program participant with accepted OLIRs for NIST CSF v1.1 and SP 800-171 R2.

SCF Domains

Explore the 33 control domains that form the Common Controls Framework at the heart of the SCF.

Download the SCF

Get the free SCF spreadsheet with all controls, all LRF mappings, and all STRM relationships included.