Secure Controls Framework
Download The SCF
Start Here

Set Theory Relationship Mapping (STRM)

Starting with release 2024.1, the SCF leverages NIST IR 8477 Set Theory Relationship Mapping for crosswalk mapping. This is the US Government's gold standard for evaluating cybersecurity and data privacy laws, regulations and frameworks.

5
Relationship Types
200+
LRF Mapped
NIST IR 8477
Gold Standard
EDC
Expert-Derived Content
NIST IR 8477

The Gold Standard for Crosswalk Mapping

NIST IR 8477 provides the definitive practice for crosswalk mapping with no technology needed. It can be performed with a pencil and piece of paper.

Children learn the process of diagramming sentences in grade school (e.g., the Reed–Kellogg model) with pencil and paper. This same process of graphically identifying the relationships between elements forms the basis of STRM. What NIST IR 8477 does is formalize this with Set Theory mathematics to produce rigorous, defensible, and IP-protected crosswalk mappings.

STRM is part of NIST’s broader NIST OLIR Program, an effort to facilitate Subject Matter Experts in defining standardized Online Informative References between elements of their creation and NIST publications.

You can click on the image to the side to see a PDF version of how the SCF is utilizing STRM, as well as an example for what that looks like with a few NIST CSF 2.0 controls:

NIST IR 8477 Set Theory Relationship Mapping (STRM) example PDF showing how the SCF maps controls using set theory Venn diagrams with NIST CSF 2.0 crosswalk examples

Purchase STRM Excel Bundles

The SCF offers editable Excel versions of all STRM mappings. The bundle of Excel versions is $25 (access to redownload is availabe for 30 days from date of purchase).

STRM Methodology

The 5 STRM Relationship Types

Every crosswalk mapping in the SCF uses exactly one of these five mathematically-defined relationship types, ensuring precision and consistency across all 200+ mapped LRF.

Subset Of

The LRF requirement is fully contained within the SCF control. The SCF control is broader in scope and coverage.

Intersects With

The LRF requirement and SCF control share partial overlap. Neither is fully contained within the other.

=

Equal To

The LRF requirement and SCF control are semantically equivalent. They address the same concept at the same scope.

Superset Of

The SCF control is contained within the LRF requirement. The LRF requirement is broader in scope and coverage.

Ø

No Relationship

The LRF requirement and SCF control have no meaningful semantic overlap. No mapping is established.

Relationship Strength (1–10)

Relationship Strength (1–10): Each mapping also receives a numeric strength rating. A rating of 1 indicates a nominal relationship, 5 indicates moderately strong, and 10 indicates the strongest relationship, typically reserved for "Equal To" or where the LRF requirement is a "Subset Of" the SCF control.

Methodology Advantage

Expert-Derived Content (EDC) vs. Natural Language Processing (NLP)

The SCF exclusively uses human subject-matter experts to perform STRM crosswalk mapping. This is a deliberate choice with significant IP, legal and quality implications.

SCF: Expert-Derived Content (EDC)

The SCF leverages human SMEs to perform STRM mapping. This produces content that is:

  • Copyright-protected as original work by human creators
  • Patent-eligible under the “mental steps” doctrine
  • Defensible through documented expert judgment
  • Consistent with NIST IR 8477 gold standard practices

Other Vendors: Natural Language Processing (NLP)

AI/NLP-based crosswalk solutions face significant IP limitations:

  • AI-generated content is not copyright-protectable (no human creator)
  • Potentially free to copy under current US copyright rulings
  • Patent claims may be invalid under the 2014 Supreme Court “mental steps” doctrine
  • Quality depends on training data rather than professional expertise

Why it matters

The SCF's EDC approach means its crosswalk mappings are both higher-quality and legally protected intellectual property, which is exactly how NIST IR 8477 itself was designed to work.

SCF Implementation

How the SCF Utilizes STRM

The SCF applies STRM to every one of its 200+ mapped laws, regulations and frameworks. Each mapping documents the precise set-theoretic relationship between every LRF requirement and the corresponding SCF control.

Focal Document Element (FDE)

Each LRF requirement is defined as a Focal Document Element with a unique identifier. Without a unique FDE value, no granular mapping is possible because there is nothing to map to.

SCF Control Mapping

Each FDE is mapped to the most appropriate SCF control with a documented relationship type (Subset Of, Intersects With, Equal To, Superset Of, or No Relationship) and a strength score of 1–10.

Multi-Framework Compliance

Because all LRF are mapped to common SCF controls using STRM, a single SCF control can simultaneously satisfy requirements across dozens of laws, regulations and frameworks. This enables true multi-framework compliance efficiency.

Available STRMs

Published STRM Mappings

Excel versions of the STRM mappings are available for purchase at the SCF Store. The following STRM mappings are currently published:

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
USA
✓ STRM
Federal
Federal Acquisition Regulation 52.204-27 - Prohibition on a ByteDance Covered Application
Download STRM (PDF) →
USA
✓ STRM
Federal
Federal Acquisition Regulation 52.204-25 (NDAA Section 889) - Prohibition on Contracting With Entities Using Certain Telecommunications and Video Surveillance Services or Equipment
Download STRM (PDF) →
USA
✓ STRM
Federal
Federal Acquisition Regulation 52.204-21 - Basic Safeguarding of Covered Contractor Information Systems
Download STRM (PDF) →
USA
✓ STRM
Federal
Fair & Accurate Credit Transactions Act (FACTA) & Fair Credit Reporting Act (FCRA) (2023)
Download STRM (PDF) →
USA
✓ STRM
Federal
Executive Order 14028 - Improving the Nation's Cybersecurity
Download STRM (PDF) →
USA
✓ STRM
Federal
Department of War (DoW) - Zero Trust Reference Architecture v2
Download STRM (PDF) →
USA
✓ STRM
Federal
Defense Federal Acquisition Regulation Supplement 252.204-7012
Download STRM (PDF) →
USA
✓ STRM
Federal
Data Privacy Framework (2023)
Download STRM (PDF) →
USA
✓ STRM
Federal
Department of War (DoW) - Zero Trust Execution Roadmap v1.1
Download STRM (PDF) →
USA
✓ STRM
Federal
US Department of Justice - Criminal Justice Information Services (CJIS) Security Policy v6.0
Download STRM (PDF) →
USA
✓ STRM
Federal
Department of War (DoW) - Cybersecurity Maturity Model Certification v2.0 - Level 3
Download STRM (PDF) →
USA
✓ STRM
Federal
Department of War (DoW) - Cybersecurity Maturity Model Certification v2.0 - Level 2
Download STRM (PDF) →
USA
✓ STRM
Federal
Department of War (DoW) - Cybersecurity Maturity Model Certification v2.0 - Level 1 Assessment Objectives
Download STRM (PDF) →
USA
✓ STRM
Federal
Department of War (DoW) - Cybersecurity Maturity Model Certification v2.0 - Level 1
Download STRM (PDF) →
USA
✓ STRM
Federal
Department of Energy (DOE) - Cybersecurity Capability Maturity Model version 2.1
Download STRM (PDF) →
USA
✓ STRM
Federal
Cybersecurity & Infrastructure Security Agency (CISA) Cross-Sector Cybersecurity Performance Goals 2.0
Download STRM (PDF) →
USA
✓ STRM
Federal
Cybersecurity & Infrastructure Security Agency (CISA) Trusted Internet Connections 3.0 Security Capabilities Catalog
Download STRM (PDF) →
USA
✓ STRM
Federal
Cybersecurity & Infrastructure Security Agency (CISA) Secure Software Development Attestation Form (SSDAF) (2024)
Download STRM (PDF) →
USA
✓ STRM
Federal
Children's Online Privacy Protection Act (COPPA) (2024)
Download STRM (PDF) →
USA
✓ STRM
Federal
US Computer Emergency Response Team Resilience Management Model Version 1.2
Download STRM (PDF) →
General
✓ STRM
United Nations
United Nations Regulation No. 155 - Cyber security and cyber security management system (2021)
Download STRM (PDF) →
General
✓ STRM
United Nations
United Nations Economic Commission for Europe - Working Party on Automated/autonomous and Connected Vehicles -Proposal for a new UN Regulation on uniform provisions concerning the approval of vehicles with regards to cyber security and cyber security manag
Download STRM (PDF) →
General
✓ STRM
UL
UL 2900-2-2 Ed. 1-2016 - Outline of Investigation for Software Cybersecurity for Network-Connectable Products, Part 2-2: Particular Requirements for Industrial Control Systems
Download STRM (PDF) →
General
✓ STRM
UL
UL 2900-1- Software Cybersecurity for Network-Connectable Products, Part 1: General Requirements (2017)
Download STRM (PDF) →
General
✓ STRM
TISAX
Trusted Information Security Assessment Exchange (TISAX) 6.0.3
Download STRM (PDF) →

No matching frameworks found. Try a different search term or filter.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
General
✓ STRM
NAIC
National Association of Insurance Commissioners Insurance Data Security Model Law (MDL-668) (2017)
Download STRM (PDF) →
General
✓ STRM
MPA
Motion Picture Association (MPA) Content Security Best Practices Common Guidelines v5.3.1
Download STRM (PDF) →
General
✓ STRM
MITRE
MITRE Adversarial Tactics, Techniques, and Common Knowledge - NIST 800-53 mappings
Download STRM (PDF) →
General
✓ STRM
ISO
ISO/IEC 42001:2023 - Information technology - Artificial intelligence - Management system
Download STRM (PDF) →
General
✓ STRM
ISO
IEC 31010:2019 - Risk management - Risk assessment techniques
Download STRM (PDF) →
General
✓ STRM
ISO
ISO/IEC 29100:2024 - Information technology - Security techniques - Privacy framework
Download STRM (PDF) →
General
✓ STRM
ISO
ISO 31000:2018 - Risk management - Guidelines
Download STRM (PDF) →
General
✓ STRM
ISO
ISO/IEC 27701:2025 - Information security, cybersecurity and privacy protection - Privacy information management systems - Requirements and guidance
Download STRM (PDF) →
General
✓ STRM
ISO
ISO/IEC 27018:2025 - Information security, cybersecurity and privacy protection - Guidelines for protection of personally identifiable information (PII) in public clouds acting as PII processors
Download STRM (PDF) →
General
✓ STRM
ISO
ISO/IEC 27017:2015 - Information technology - Security techniques -Code of practice for information security controls based on ISO/IEC 27002 for cloud services
Download STRM (PDF) →
General
✓ STRM
ISO
ISO/IEC 27002:2022 - Information security, cybersecurity and privacy protection - Information security controls
Download STRM (PDF) →
General
✓ STRM
ISO
ISO/IEC 27001:2022 - Information security, cybersecurity and privacy protection - Information security management systems - Requirements
Download STRM (PDF) →
General
✓ STRM
ISO
ISO 22301:2019 - Security and resilience - Business continuity management systems - Requirements
Download STRM (PDF) →
General
✓ STRM
IEC
ISO/SAE 21434:2021 - Road vehicles - Cybersecurity engineering
Download STRM (PDF) →
General
✓ STRM
IMO
International Maritime Organization (IMO) Guidelines on Maritime Cyber Risk Management (2025)
Download STRM (PDF) →
General
✓ STRM
IEC
International Electrotechnical Commission 62443-4-1:2018 - Security for industrial automation and control systems - Part 4-1: Secure product development lifecycle requirements
Download STRM (PDF) →
General
✓ STRM
IEC
International Electrotechnical Commission 62443-4-2 Ed. 1.0 b:2019 - Security for industrial automation and control systems - Part 4-2: Technical security requirements for IACS components
Download STRM (PDF) →
General
✓ STRM
IEC
International Electrotechnical Commission 62443-3-3:2013 - Industrial communication networks - Network and system security - Part 3-3: System security requirements and security levels
Download STRM (PDF) →
General
✓ STRM
IEC
International Electrotechnical Commission 62443-2-1:2024 - Security for industrial automation and control systems - Part 2-1: Security program requirements for IACS asset owners
Download STRM (PDF) →
General
✓ STRM
IEC
International Electrotechnical Commission Technical Report 60601-4-5:2021 - Medical electrical equipment - Part 4-5: Guidance and interpretation - Safety-related technical security specifications
Download STRM (PDF) →
General
✓ STRM
GovRAMP
Government Risk and Authorization Management Program (GovRAMP) - High
Download STRM (PDF) →
General
✓ STRM
GovRAMP
Government Risk and Authorization Management Program (GovRAMP) - Moderate
Download STRM (PDF) →
General
✓ STRM
GovRAMP
Government Risk and Authorization Management Program (GovRAMP) - Core Controls
Download STRM (PDF) →
General
✓ STRM
GovRAMP
Government Risk and Authorization Management Program (GovRAMP)
Download STRM (PDF) →
General
✓ STRM
GovRAMP
Government Risk and Authorization Management Program (GovRAMP) - Low+
Download STRM (PDF) →

No matching frameworks found. Try a different search term or filter.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
USA
✓ STRM
State
Colorado Privacy Act (2021)
Download STRM (PDF) →
USA
✓ STRM
State
Virginia Consumer Data Protection Act (2023)
Download STRM (PDF) →
USA
✓ STRM
State
Vermont Data Broker Registration Act (Act 171 of 2018)
Download STRM (PDF) →
USA
✓ STRM
State
Texas Risk & Authorization Management Program 2.0 - Level 2
Download STRM (PDF) →
USA
✓ STRM
State
Texas Safe Harbor Law (SB2610) (2025)
Download STRM (PDF) →
USA
✓ STRM
State
Texas Risk & Authorization Management Program 2.0 - Level 1
Download STRM (PDF) →
USA
✓ STRM
State
Texas SB820 (2019)
Download STRM (PDF) →
USA
✓ STRM
State
Tennessee Information Protection Act (TIPA) (2025)
Download STRM (PDF) →
USA
✓ STRM
State
Texas Identity Theft Enforcement and Protection Act (BC521) (2009)
Download STRM (PDF) →
USA
✓ STRM
State
Texas DIR Security Control Standards Catalog v2.2
Download STRM (PDF) →
USA
✓ STRM
State
Texas Consumer Data Protection Act (2025)
Download STRM (PDF) →
USA
✓ STRM
State
New York Department of Financial Services 23NYCRR Part 500 (2023 Amendment 2)
Download STRM (PDF) →
USA
✓ STRM
State
Oregon Consumer Privacy Act (SB 619) (2023)
Download STRM (PDF) →
USA
✓ STRM
State
Oregon Consumer Information Protection Act (ORS 646A) (2025)
Download STRM (PDF) →
USA
✓ STRM
State
New York SHIELD Act (SB S5575B) (2019)
Download STRM (PDF) →
USA
✓ STRM
State
Nevada SB220 (2019)
Download STRM (PDF) →
USA
✓ STRM
State
Nevada Privacy Law (2023)- CHAPTER 603A - SECURITY AND PRIVACY OF PERSONAL INFORMATION
Download STRM (PDF) →
USA
✓ STRM
State
Nevada Operation of Gaming Establishments - Regulation 5.260 (Cybersecurity)
Download STRM (PDF) →
USA
✓ STRM
State
Massachusetts 201 CMR 17.00 (2008)
Download STRM (PDF) →
USA
✓ STRM
State
Illinois Personal Information Protection Act (PIPA) (2006)
Download STRM (PDF) →
USA
✓ STRM
State
Illinois Identity Protection Act (IPA) (2009)
Download STRM (PDF) →
USA
✓ STRM
State
Illinois Biometric Information Privacy Act (BIPA) (2008)
Download STRM (PDF) →
USA
✓ STRM
State
California SB1386 (2002)
Download STRM (PDF) →
USA
✓ STRM
State
California SB327 (2018)
Download STRM (PDF) →
USA
✓ STRM
State
Alaska Personal Information Protection Act (PIPA) (2009)
Download STRM (PDF) →

No matching frameworks found. Try a different search term or filter.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
EMEA
✓ STRM
United Kingdom
UK - Ministry of Defence Standard 05-138 (2024) - L3
Download STRM (PDF) →
EMEA
✓ STRM
United Kingdom
UK - Ministry of Defence Standard 05-138 (2024) - L2
Download STRM (PDF) →
EMEA
✓ STRM
United Kingdom
UK - Ministry of Defence Standard 05-138 (2024) - L0
Download STRM (PDF) →
EMEA
✓ STRM
United Kingdom
UK - Ministry of Defence Standard 05-138 (2024) - L1
Download STRM (PDF) →
EMEA
✓ STRM
United Kingdom
UK - Ministry of Defence Standard 05-138 (2024)
Download STRM (PDF) →
EMEA
✓ STRM
Spain
Royal Decree 311/2022, of May 3, which regulates the National Security Scheme (BOE-A-2022-7191)
Download STRM (PDF) →
EMEA
✓ STRM
United Kingdom
UK - Cyber Assessment Framework (CAF) v4.0
Download STRM (PDF) →
EMEA
✓ STRM
UAE
UAE - National Information Assurance Framework (NIAF) (2023)
Download STRM (PDF) →
EMEA
✓ STRM
Saudi Arabia
Saudi Arabia - Personal Data Protection Law (PDPL) (2023)
Download STRM (PDF) →
EMEA
✓ STRM
Saudi Arabia
Saudi Arabia - Cybersecurity Guidelines for Internet of Things (CGIoT-1:2024)
Download STRM (PDF) →
EMEA
✓ STRM
EU
European Union Agency for Cybersecurity NIS2 (Directive (EU) 2022/2555)
Download STRM (PDF) →
EMEA
✓ STRM
EU
European Union Agency for Cybersecurity NIS2 Annex (2024)
Download STRM (PDF) →
EMEA
✓ STRM
EU
European Union General Data Protection Regulation (2016)
Download STRM (PDF) →
EMEA
✓ STRM
EU
Digital Operational Resilience Act (2023)
Download STRM (PDF) →
EMEA
✓ STRM
EU
European Union Cyber Resilience Act - Annexes (2022)
Download STRM (PDF) →
EMEA
✓ STRM
EU
European Union Cyber Resilience Act (2022)
Download STRM (PDF) →
EMEA
✓ STRM
EU
European Union Artificial Intelligence Act (Regulation (EU) 2024/1689)
Download STRM (PDF) →

No matching frameworks found. Try a different search term or filter.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
APAC
✓ STRM
New Zealand
New Zealand - HISO 10029:2024 NZ Health Information Security Framework Guidance for Suppliers
Download STRM (PDF) →
APAC
✓ STRM
New Zealand
New Zealand - HISF MicroSmall (2023)
Download STRM (PDF) →
APAC
✓ STRM
New Zealand
New Zealand - HISF MLHSP (2023)
Download STRM (PDF) →
APAC
✓ STRM
India
India - SEBI Cybersecurity and Cyber Resilience Framework (2024)
Download STRM (PDF) →
APAC
✓ STRM
India
India Digital Personal Data Protection Act (2023)
Download STRM (PDF) →
APAC
✓ STRM
China
China - Cybersecurity Law of the People's Republic of China (2017)
Download STRM (PDF) →
APAC
✓ STRM
Australia
Australia - Information Security Manual (ISM) (June 2024)
Download STRM (PDF) →
APAC
✓ STRM
Australia
Australia -Essential Eight maturity model and ISM mapping (2024)
Download STRM (PDF) →

No matching frameworks found. Try a different search term or filter.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Americas
✓ STRM
Canada
Canada - Protecting controlled information in non-Government of Canada systems and organizations (ITSP.10.171)
Download STRM (PDF) →
Americas
✓ STRM
Canada
Canada - OSFI B-13 (2022)
Download STRM (PDF) →

No matching frameworks found. Try a different search term or filter.

Community Involvement

How To Submit a Community STRM Mapping

The SCF welcomes community involvement. The SCF Council provides a downloadable Community STRM Template that practitioners can use to perform their own crosswalk mapping and submit for possible inclusion in a future SCF release.

01

Define the Focal Document

Open the STRM template’s “STRM Overview” tab and complete the two highlighted cells identifying:

  • The Focal Document (FD), which is the law, regulation or framework you are mapping
  • The Reference Document (RD), which is the SCF (the document being mapped to)

Prerequisites: familiarity with NIST IR 8477 and professional competence to conduct crosswalk mapping.

02

Perform the STRM Mapping

Complete the “Community STRM submission” tab using these columns:

  • FDE number (mandatory unique identifier)
  • FDE name (if available)
  • FDE description (exact text of the requirement)
  • Proposed SCF control name
  • SCF control number
  • SCF control description
  • STRM relationship type (1 of 5 options)
  • Relationship strength (1–10 rating)
  • Optional notes / justification
03

Submit to the SCF Council

Once your STRM exercise is complete, email the completed Excel spreadsheet to the SCF Council for review:

support@securecontrolsframework.com

Submissions are evaluated by the SCF Council and may be included in a future SCF release. The SCF Council will contact you if there are questions about your submission.

Additional SCF Content

Explore Further

Included LRF

Browse all 200+ laws, regulations and frameworks mapped in the SCF across 5 global regions.

NIST OLIR Participation

The SCF is a recognized NIST OLIR Program participant with accepted OLIRs for NIST CSF v1.1 and SP 800-171 R2.

SCF Domains

Explore the 33 control domains that form the Common Controls Framework at the heart of the SCF.

Download the SCF

Get the free SCF spreadsheet with all controls, all LRF mappings, and all STRM relationships included.