216 Compliance Frameworks

Compliance Framework Catalog

Database-managed framework catalog covering security, privacy, industry, and regional compliance programs.

Showing 216 of 216 frameworks

security(52)

SOC 2 Type II

Service trust criteria for security, availability, processing integrity, confidentiality, and privacy.

ISO/IEC 27001

Information Security Management System (ISMS) requirements.

FIPS 140-3

Security requirements for cryptographic modules used in regulated systems.

FedRAMP

Federal authorization program for cloud services in US government.

CMMC

Cybersecurity maturity requirements for defense contractors.

ISO/IEC 42001

AI management system requirements for trustworthy AI governance.

NIST AI Risk Management Framework

Framework for identifying and managing AI risks.

NIST SP 800-161

Supply chain risk management practices for systems and organizations.

NIST Cybersecurity Framework 2.0

Govern, Identify, Protect, Detect, Respond, Recover cybersecurity outcomes.

NIST SP 800-53 Rev.5

Security and privacy controls for federal information systems.

NIST SP 800-171

Protection of Controlled Unclassified Information in nonfederal systems.

FISMA

Federal Information Security Modernization Act requirements.

CSA Cloud Controls Matrix

Cloud security control framework and assurance model.

CIS Controls v8

Prioritized cybersecurity best practices for enterprise defense.

SOC 3

General-use report over trust services criteria for public assurance.

AICPA Trust Services Criteria

Control criteria framework underlying SOC reporting.

CIS Benchmarks

Secure configuration baselines for systems and cloud services.

CNSSI 1253

Security control selection guidance for US national security systems.

CSA STAR

Cloud assurance and transparency registry program.

Cyber Essentials

UK baseline cyber hygiene certification requirements.

Cyber Essentials Plus

Enhanced UK cyber hygiene certification with independent technical verification.

DoD Cloud SRG

Cloud security requirements guide for Department of Defense workloads.

DoD Zero Trust Strategy

US DoD zero trust target architecture and implementation activities.

Essential Eight

Australian baseline cybersecurity mitigation strategies.

FIPS 199

Standards for security categorization of federal information and systems.

FIPS 200

Minimum security requirements for federal information and information systems.

GovRAMP

Government RAMP continuous assurance profile used by state and local public-sector buyers.

ISO 22301

Business continuity management system requirements.

ISO 22316

Organizational resilience principles and indicators for disruption readiness.

ISO 22317

Business impact analysis guidance for continuity and recovery planning.

ISO 22320

Emergency management and incident response command and control requirements.

ISO 31000

Risk management principles and guidelines for enterprises.

ISO/IEC 27002

Information security controls catalogue supporting ISO 27001 implementation.

ISO/IEC 27005

Information security risk management guidance for risk identification and treatment.

ISO/IEC 27017

Cloud security controls guideline for cloud service providers and customers.

ISO/IEC 27035

Information security incident management lifecycle requirements and practices.

ISO/IEC 27036

Supplier relationship security controls for third-party and supply-chain risk.

ISO/IEC 29147

Vulnerability disclosure framework and communication controls.

ISO/IEC 30111

Vulnerability handling process requirements.

NIST Risk Management Framework

Risk management lifecycle for system authorization and operation.

NIST SP 800-171A

Assessment procedures for evaluating NIST 800-171 requirements.

NIST SP 800-172

Enhanced security requirements for high value CUI environments.

NIST SP 800-30

Guide for conducting risk assessments.

NIST SP 800-61

Computer security incident handling guidance.

NIST SSDF

Secure software development framework controls.

NIST Zero Trust Architecture

Zero trust principles and reference architectures.

OWASP ASVS

Application security verification requirements and checklist.

OWASP SAMM

Software assurance maturity model for secure SDLC governance.

SLSA

Supply-chain levels for software artifact integrity and provenance.

SOC for Cybersecurity

AICPA reporting framework for enterprise cybersecurity risk management.

StateRAMP

Security authorization framework for state and local governments.

TX-RAMP

Texas risk and authorization management program for cloud services.

privacy(53)

HIPAA Security Rule

Safeguards for electronic protected health information.

GDPR

General Data Protection Regulation for EU personal data protection.

GLBA

Financial privacy and safeguards requirements.

FERPA

Student education record privacy requirements.

PPRA

Protection of Pupil Rights Amendment requirements for US educational institutions.

COPPA

Children's Online Privacy Protection Act requirements for online services directed to children.

SOPIPA

Student Online Personal Information Protection Act obligations for edtech vendors.

CCPA

California consumer privacy rights and disclosure obligations.

CPRA

California privacy rights expansion with sensitive data obligations.

ISO/IEC 27701

Privacy Information Management System (PIMS) extension to ISO 27001.

42 CFR Part 2

US confidentiality protections for substance use disorder patient records.

Australia Privacy Act 1988

Australian privacy principles and data handling obligations.

Colorado Privacy Act

Colorado privacy obligations for controllers and processors.

Connecticut CTDPA

Connecticut data privacy controls and rights handling obligations.

Delaware DPDPA

Delaware personal data privacy act controls and requirements.

EU-US Data Privacy Framework

Cross-border data transfer commitments and safeguards.

GDPR DPIA Program

Data protection impact assessment operational framework.

Hong Kong PDPO

Personal data privacy ordinance compliance obligations.

India DPDP Act

Digital personal data protection requirements in India.

Indiana Consumer Data Protection Act

Indiana privacy governance and consumer rights controls.

Iowa Consumer Data Protection Act

Iowa privacy law obligations for covered entities.

ISO/IEC 27018

Protection of personally identifiable information (PII) in public cloud environments.

Japan APPI

Act on the Protection of Personal Information requirements.

Kentucky Consumer Data Protection Law

Kentucky privacy controls for controllers and processors.

Korea PIPA

Korean personal information protection obligations.

LGPD

Brazilian general data protection law obligations.

Malaysia PDPA

Personal data protection act requirements for commercial entities.

Maryland Online Data Privacy Act

Maryland privacy law with heightened data minimization requirements.

Minnesota Consumer Data Privacy Law

Minnesota privacy compliance requirements for data handling.

Montana Consumer Data Privacy Act

Montana privacy obligations for data controllers and processors.

Nebraska Data Privacy Act

Nebraska personal data governance and rights obligations.

New Hampshire Privacy Law

State privacy controls for transparency and consumer rights.

New Jersey Data Privacy Act

New Jersey consumer privacy requirements and obligations.

New Zealand Privacy Act 2020

New Zealand privacy principles and breach reporting controls.

NIST Privacy Framework

Risk-based privacy engineering and governance outcomes.

Oregon Consumer Privacy Act

Oregon privacy controls for consumer requests and data governance.

Philippines Data Privacy Act

Data privacy governance and breach reporting requirements.

PIPEDA

Canadian federal privacy law for personal information protection.

Quebec Law 25

Quebec privacy modernization obligations and governance controls.

Rhode Island Data Transparency and Privacy

Rhode Island privacy requirements for regulated entities.

Saudi PDPL

Saudi personal data protection law obligations and transfer restrictions.

Singapore PDPA

Singapore personal data protection obligations and accountability.

South Africa POPIA

Protection of personal information act governance and safeguards.

Swiss FADP

Swiss federal data protection obligations and transfer controls.

Tennessee Information Protection Act

Tennessee privacy framework and affirmative defense controls.

Texas TDPSA

Texas data privacy and security act obligations.

Thailand PDPA

Thailand data privacy law for collection, use, and disclosure controls.

TRUSTe Privacy Program

Privacy program assurance and accountability controls.

Turkey KVKK

Turkish data protection law compliance requirements.

UAE PDPL

UAE personal data protection law requirements and safeguards.

UK GDPR

United Kingdom data protection regime based on GDPR principles.

Utah UCPA

Utah consumer privacy law compliance requirements.

Virginia CDPA

Virginia privacy law with controller and processor obligations.

industry(86)

PCI DSS

Payment card data security requirements.

PCI PIN Security

PIN processing and key management requirements for payment systems.

PCI P2PE

Point-to-point encryption standard for secure payment acceptance.

PCI Software Security Framework

Secure software and lifecycle standards for payment applications.

ITAR

International Traffic in Arms Regulations export control requirements for defense articles and technical data.

DFARS 252.204-7012

Safeguarding covered defense information and cyber incident reporting clause.

DFARS 252.204-7021

Cybersecurity maturity model certification requirements for defense suppliers.

SOX

Sarbanes-Oxley corporate governance and financial control requirements.

COSO Internal Control Framework

Internal control and enterprise risk management framework aligned with SOX governance expectations.

FFIEC CAT

Cybersecurity assessment tool for financial institutions.

SWIFT CSCF

SWIFT customer security controls framework baseline and mandatory controls.

NYDFS 23 NYCRR 500

Cybersecurity regulation for financial services entities in New York.

NYDFS Part 200 (BitLicense)

New York virtual currency business activity licensing and compliance controls.

AML/KYC Program

Anti-money laundering and customer due diligence controls.

CryptoCurrency Security Standard (CCSS)

Security controls for cryptocurrency systems, key management, and operational resilience.

HITRUST CSF

Certifiable framework harmonizing healthcare and security requirements.

FDA 21 CFR Part 11

Electronic records and signatures requirements for life sciences.

TISAX

Automotive information security assessment framework.

NERC CIP

Critical infrastructure protection requirements for bulk electric systems.

CPNI

Customer Proprietary Network Information safeguards for telecommunications carriers.

Gaming Control Board Standards

Jurisdictional controls for online gaming operations, AML, responsible gaming, and audit trails.

GLI-19 Interactive Gaming Systems

Technical standards for interactive gaming systems and security controls.

FINRA

Broker-dealer supervisory and compliance obligations.

SOC 1 Type II

Controls relevant to internal control over financial reporting for service organizations.

APRA CPS 234

Information security prudential standard for APRA-regulated entities.

AS9100

Aerospace quality and risk controls.

Automotive SPICE

Process capability model for automotive software and systems development.

Bank Secrecy Act

US anti-money laundering and recordkeeping requirements.

Basel III Operational Risk

Capital and risk management requirements for financial institutions.

CJIS Security Policy

Criminal Justice Information Services security policy requirements.

CMS MIPS Program

Quality payment program reporting and performance obligations.

COBIT 2019

Enterprise IT governance and management objectives.

EAR

Export Administration Regulations for dual-use items and technology export controls.

ETSI EN 303 645

Cybersecurity baseline for consumer IoT devices and services.

FATF Travel Rule

Virtual asset transfer information-sharing obligations.

FDA eCTD

Electronic common technical document submission requirements.

FFIEC IT Handbook

Guidance for IT risk management and cybersecurity examinations.

GAMP 5

Risk-based validation guidance for automated systems in life sciences.

GMP

Good manufacturing practice quality requirements.

GxP

Good practice quality guidelines for regulated life sciences.

HKMA TRM

Hong Kong monetary authority technology risk management requirements.

IATF 16949

Automotive quality management system requirements.

ICH E6(R2) Good Clinical Practice

International GCP standard for clinical trial governance and data integrity.

IEC 61508

Functional safety of electrical/electronic/programmable safety-related systems.

IEC 62304

Medical device software lifecycle process requirements.

IEC 62443

Industrial automation and control systems cybersecurity standards.

IEC 81001-5-1

Health software and health IT systems security requirements.

IRS Publication 1075

Tax information security safeguards for federal tax data.

ISO 13485

Quality management for medical device lifecycle and compliance.

ISO 14001

Environmental management system controls and compliance obligations.

ISO 14971

Medical device risk management and hazard control practices.

ISO 26262

Road vehicle functional safety requirements for automotive systems.

ISO 28000

Security management system for supply chains and logistics operations.

ISO 28001

Supply chain security management and resilience best practices.

ISO 31030

Travel risk management guidance for duty-of-care and operational safety.

ISO 37001

Anti-bribery management system requirements for corruption risk controls.

ISO 37301

Compliance management system standard with auditable governance and controls.

ISO 45001

Occupational health and safety management system requirements.

ISO 50001

Energy management system standard for efficiency and energy governance.

ISO 55001

Asset management system standard for critical infrastructure and lifecycle governance.

ISO 9001

Quality management systems with governance and process controls.

ISO/IEC 17020

Requirements for operation of inspection bodies and independent assessments.

ISO/IEC 17025

Laboratory competence requirements for testing and calibration facilities.

ISO/IEC 20000-1

IT service management system requirements.

ISO/IEC 38500

Corporate governance of IT with board-level accountability and oversight controls.

ISO/SAE 21434

Road vehicle cybersecurity engineering lifecycle controls.

MAS TRM Guidelines

Technology risk management guidelines for financial institutions in Singapore.

Maturity Model for Cybersecurity in Acquisition Ecosystems (MCIAE)

Acquisition ecosystem cybersecurity maturity controls for defense supply chains.

Nacha Operating Rules

ACH network operating rules for payments, returns, and data security.

NAIC Model Laws

Insurance cybersecurity and privacy model law obligations.

NCQA Accreditation

Healthcare quality and accreditation requirements for managed care and plans.

NIST SP 800-82

Industrial control systems security guidance.

OFAC Sanctions Compliance

Sanctions screening and blocked-party transaction controls.

Open Banking UK Security Profile

Security profile and API controls for open banking participants.

Open Finance Brazil

Brazil open finance security and consent obligations.

OSFI B-13

Canadian financial sector technology and cyber risk management guideline.

Outside Counsel Guidelines (OCG)

Client-imposed legal and security obligations for law firms and legal technology providers.

PCI Secure Software Standard

Secure software lifecycle controls for payment applications.

SAE J3061

Cybersecurity process framework for automotive systems engineering.

SAMA Cybersecurity Framework

Saudi central bank cybersecurity framework for financial institutions.

SEC Cyber Disclosure Rule

Cyber incident and risk governance disclosure obligations for public issuers.

SR 11-7 Model Risk Management

Model risk governance and validation expectations.

SSAE 18

Attestation standards for service organization control examinations.

SWIFT CSP

Security control framework for SWIFT-connected institutions.

UNECE R155

Vehicle cybersecurity management system requirements.

UNECE R156

Software update management system requirements for vehicles.

regional(25)

EU MiCA

Markets in Crypto-Assets regulation for crypto asset service providers in EU.

EU AI Act

Risk-based regulatory regime for AI systems in the European Union.

EU MDR 2017/745

Medical device regulation requirements in the European Union.

EU IVDR 2017/746

In vitro diagnostic medical devices regulation for EU market access.

EU DORA

Digital operational resilience requirements for financial entities in EU.

Canada AIDA

Artificial Intelligence and Data Act obligations for high-impact AI systems.

eIDAS

Electronic identification and trust services regulation in EU.

eIDAS 2.0

EU digital identity wallet and trust service evolution requirements.

EU AI Liability Directive

Proposed liability framework impacting AI documentation and traceability.

EU Cyber Resilience Act

Cybersecurity requirements for products with digital elements.

EU Data Act

Data access and sharing obligations for connected products and services.

EU Data Governance Act

Framework for data sharing services and altruism intermediaries.

GDPR + NIS2 Combined Program

Integrated privacy and cyber operations program for EU entities.

MiFID II

Financial market conduct, recordkeeping, and governance controls.

NIS Directive

Legacy EU cybersecurity directive obligations.

NIS2 Directive

EU network and information security obligations for essential entities.

NIS2 Supply Chain Program

Supplier and third-party cybersecurity governance under NIS2.

PSD2

Payment services directive with strong customer authentication controls.

Section 508

US federal accessibility requirements for ICT products and services.

SEPA Rulebooks

European payments rulebooks for credit transfer and direct debit schemes.

Singapore AI Verify

AI governance testing and process controls framework.

Solvency II

Insurance governance and risk management requirements in EU.

UK AI Governance Principles

UK cross-sector principles for safe AI deployment and governance.

UK NIS Regulations

UK network and information systems obligations for essential services.

WCAG 2.2

Web content accessibility guidelines for inclusive digital services.

Need a framework that's not listed?

We continuously expand the catalog. Request additions and we'll prioritize based on regulatory impact.