Act 19628 - Protection of Personal Data
22 controlsAct of 29 August 1997 on the Protection of Personal Data
29 controlsAct of 8 December 1992
59 controlsAct of 9 November 2018 on Personal Data Protection (Official Gazette No. 87/18)
56 controlsAct on the Protection of Personal Information (June 2020)
58 controlsAICPA Trust Services Criteria (TSC) with (2022 points of focus)
Note: used for SOC 2 audits
412 controlsAK - Alaska Personal Information Protection Act (PIPA)
17 controlsAPEC Privacy Framework (2015)
14 controlsAustralia - Code of Practice - Securing the Internet of Things for Consumers
15 controlsAustralia Essential Eight
37 controlsAustralian Government Information Security Manual (ISM) (June 2024)
336 controlsAustralia Privacy Principles
26 controlsBanking Supervisory Requirements for IT (BAIT)
91 controlsBermuda Monetary Authority Cyber Code of Conduct
61 controlsBOE-A-2022-7191
73 controlsCalifornia Consumer Privacy Act (CCPA) January 2026 (amended California Privacy Rights Act (CPRA))
258 controlsCERT Resilience Management Model v1.2
292 controlsChildren's Online Privacy Protection Act (COPPA)
6 controlsChina Cybersecurity Law of the People's Republic of China (China Cybersecurity Law) 2017
27 controlsChina Data Security Law of the People's Republic of China
15 controlsCISA Cross-Sector Cybersecurity Performance Goals (CPG)
127 controlsCISA Secure Software Development Attestation Form (SSDAF)
43 controlsCloud Computing Compliance Controls Catalogue (C5) 2020
239 controlsCloud Controls Matrix (CCM) v4
334 controlsCO - Colorado Privacy Act
53 controlsCommittee of Sponsoring Organizations (COSO) 2017 Framework
103 controlsControl Objectives for Information and Related Technologies (COBIT) 2019
149 controlsCriminal Justice Information Services (CJIS) Security Policy v5.9.3
223 controlsCritical Security Controls (CSC) version 8.1
234 controlsCritical Security Controls (CSC) version 8.1 - IG1
91 controlsCritical Security Controls (CSC) version 8.1 - IG2
187 controlsCritical Security Controls (CSC) version 8.1 - IG3
206 controlsCritical Systems Cybersecurity Controls (CSCC – 1: 2019)
152 controlsCSA IoT Security Controls Framework v2
261 controlsCyber Assessment Framework (CAF) for Aviation Guidance (CAP1850)
43 controlsCyber Assessment Framework (CAF) v4.0
67 controlsCyber Essentials
26 controlsCyber Hygiene Practice
21 controlsCybersecurity Capability Maturity Model (C2M2) v2.1
219 controlsCybersecurity Final Rule (Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure) - 17 CFR Parts 229, 232, 239, 240, and 249
39 controlsCybersecurity Maturity Model Certification (CMMC) v2.0 Level 1
52 controlsCybersecurity Maturity Model Certification (CMMC) v2.0 Level 1 Assessment Objectives
14 controlsCybersecurity Maturity Model Certification (CMMC) v2.0 Level 2
198 controlsCybersecurity Maturity Model Certification (CMMC) v2.0 Level 3
222 controlsCybersecurity Methodology for an Organization v1.0
393 controlsData Privacy Act of 2012
30 controlsData Privacy Framework (DPF)
31 controlsData Protection Act
18 controlsData Protection Act
10 controlsData Protection Act (2003)
25 controlsDecision on Strengthening Network Information Protection
10 controlsDefense Federal Acquisition Regulation Supplement (DFARS) 252.204-7008 - 7012
27 controlsDepartment of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) Trusted Internet Connections 3.0 Security Capabilities Catalog
150 controlsDepartment of Homeland Security (DHS) Zero Trust Capability Framework (ZTCF)
202 controlsDigital Operational Resilience Act (DORA) (2023)
103 controlsDoD Zero Trust Execution Roadmap
117 controlsDoD Zero Trust Reference Architecture v2
37 controlsENISA NIS2 Annex
224 controlsENISA NIS2 (Directive (EU) 2022/2555)
68 controlsEssential Cybersecurity Controls (ECC – 1 : 2018)
190 controlsEU Artificial Intelligence (AI)I Act (Regulation (EU) 2024/1689)
119 controlsEU Cyber Resilience Act
18 controlsEU Cyber Resilience Act - Annexes
23 controlsEuropean Banking Authority (EBA) Guidelines on ICT and security risk management
148 controlsEuropean Union Agency for Network and Information Security (ENISA)
61 controlsExecutive Order 14028 (EO 14028)
44 controlsFair & Accurate Credit Transactions Act (FACTA) / Fair Credit Reporting Act (FCRA)
2 controlsFair Information Practice Principles (FIPPs)
30 controlsFamily Educational Rights and Privacy Act (FERPA)
16 controlsFarm Credit Administration (FCA) Cyber Risk Management
81 controlsFederal Acquisition Regulation (FAR) 52.204-21
54 controlsFederal Acquisition Regulation (FAR) 52.204-25 (NDAA Section 889)
1 controlsFederal Acquisition Regulation (FAR) 52.204-27 Prohibition on a ByteDance Covered Application
5 controlsFederal Act concerning the Protection of Personal Data (DSG 2000)
63 controlsFederal Act on Data Protection (FADP)
16 controlsFederal Data Protection Act
18 controlsFederal Financial Institutions Examination Council (FFIEC)
72 controlsFederal Law of 27 July 2006 N 152-FZ
28 controlsFederal Law on Protection of Personal Data held by Private Parties
23 controlsFederal Risk and Authorization Management Program R4 (FedRAMP R4)
432 controlsFederal Risk and Authorization Management Program R4 (FedRAMP R4) (high baseline)
431 controlsFederal Risk and Authorization Management Program R4 (FedRAMP R4) (Li-SAAS) baseline)
150 controlsFederal Risk and Authorization Management Program R4 (FedRAMP R4) (low baseline)
150 controlsFederal Risk and Authorization Management Program R4 (FedRAMP R4) (moderate baseline)
342 controlsFederal Risk and Authorization Management Program R5 (FedRAMP)
423 controlsFederal Risk and Authorization Management Program R5 (FedRAMP R5) (high baseline)
423 controlsFederal Risk and Authorization Management Program R5 (FedRAMP R5) (Li-SAAS) baseline)
175 controlsFederal Risk and Authorization Management Program R5 (FedRAMP R5) (low baseline)
176 controlsFederal Risk and Authorization Management Program R5 (FedRAMP R5) (moderate baseline)
343 controlsFederal Trade Commission (FTC) Act
3 controlsFinancial Industry Regulatory Authority (FINRA)
4 controlsFood & Drug Administration (FDA) 21 CFR Part 11
48 controlsGeneral Data Protection Law (LGPD)
33 controlsGeneral Data Protection Regulation (GDPR)
42 controlsGenerally Accepted Privacy Principles (GAPP)
50 controlsGovRAMP Moderate
347 controlsGramm Leach Bliley Act (GLBA) - CFR 314 (Dec 2023)
72 controlsHealth Industry Cybersecurity Practices (HICP) - Large Practice
233 controlsHealth Industry Cybersecurity Practices (HICP) - Medium Practice
138 controlsHealth Industry Cybersecurity Practices (HICP) - Small Practice
83 controlsHHS § 155.260 Privacy and Security of Personally Identifiable Information.
36 controlsHIPAA Administrative Simplification (2013)
171 controlsHIPAA Security Rule (includes mapping to NIST SP 800-66 R2)
136 controlsHISO 10029:2024 NZ Health Information Security Framework Guidance for Suppliers
102 controlsICT Security Guide CCN-STIC 825
99 controlsIEC 62443-4-2:2019 - Security for industrial automation and control systems
Part 4-2: Technical security requirements for IACS components
129 controlsIEC TR 60601-4-5:2021 - Medical electrical equipment - Part 4-5: Guidance and interpretation - Safety-related technical security specifications
26 controlsIL - Illinois Biometric Information Privacy Act (BIPA)
11 controlsIL - Illinois Identity Protection Act (IPA)
5 controlsIL - Illinois Personal Information Protection Act (PIPA)
10 controlsIndia Digital Personal Data Protection Act 2023
41 controlsInformational Self-Determination and Freedom of Information (Act CXII of 2011)
27 controlsInformation Technology Rules (Privacy Rules)
12 controlsInsurance Data Security Model Law (MDL-668)
58 controlsInternal Revenue Service (IRS) 1075
445 controlsInternational Maritime Organization (IMO) Guidelines on Maritime Cyber Risk Management
75 controlsInternational Traffic in Arms Regulation (ITAR) [limited to Part 120]
23 controlsISO/IEC 22301:2019 - Security and resilience — Business continuity management systems — Requirements
31 controlsISO/IEC 27001:2022 - Information Security Management Systems (ISMS) - Requirements
51 controlsISO/IEC 27002:2022 - Information security, cybersecurity and privacy protection - Information security controls
316 controlsISO/IEC 27017:2015 - Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
215 controlsISO/IEC 27018:2014 - Code of Practice for PI in Public Clouds Acting as PI Processors
17 controlsISO/IEC 27701: 2025 - Privacy information management systems
59 controlsISO/IEC 29100:2024 Information technology — Security techniques — Privacy framework
43 controlsISO/IEC 31000:2009 - Risk Management
18 controlsISO/IEC 31010:2009 - Risk Assessment Techniques
29 controlsISO/IEC 42001:2023 - Information technology - Artificial intelligence - Management system
149 controlsISO/SAE 21434:2021 - Road vehicles — Cybersecurity engineering
102 controlsJapan Information System Security Management and Assessment Program (ISMAP)
248 controlsKenya Data Protection Act (2019)
41 controlsLaw 1581 of 2012
29 controlsLaw No. 18,331 - Protection of Personal Data and Action "Habeas Data"
32 controlsMA - 201 CMR 17.00
44 controlsMinistry of Defence Standard 05-138 (14 May 2024)
214 controlsMITRE ATT&CK - NIST 800-53 mappings
128 controlsMonitory Authority of Singapore (MAS) Technology Risk Management (TRM) Guidelines (2021)
214 controlsMPA Content Security Best Practices Common Guidelines v5.1
230 controlsNational Industrial Security Program Operating Manual (NISPOM)
179 controlsNational Science & Technology Council (NSTC) NSPM-33
47 controlsNaval Nuclear Propulsion Information (NNPI)
122 controlsNew Zealand Information Security Manual (NZISM) v3.6
291 controlsNigeria Data Protection Regulation (2019)
25 controlsNIST AI 100-1 (Artificial Intelligence Risk Management Framework 1.0)
158 controlsNIST AI 600-1 (AI RMF Generative Artificial Intelligence Profile)
139 controlsNIST Cybersecurity Framework (CSF) v2.0
253 controlsNIST Privacy Framework v1.0
187 controlsNIST SP 800-160 - Systems Security Engineering
44 controlsNIST SP 800-161 R1 - Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations
341 controlsNIST SP 800-161 R1 - Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations (C-SCRM Baseline)
126 controlsNIST SP 800-161 R1 - Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations (Flow Down)
94 controlsNIST SP 800-161 R1 - Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations (Level 1)
86 controlsNIST SP 800-161 R1 - Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations (Level 2)
261 controlsNIST SP 800-161 R1 - Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations (Level 3)
271 controlsNIST SP 800-171A - Assessing Security Requirements for Controlled Unclassified Information
136 controlsNIST SP 800-171A R3 - Assessing Security Requirements for Controlled Unclassified Information
217 controlsNIST SP 800-171 R2 - Protecting CUI in Nonfederal Systems and Organizations
252 controlsNIST SP 800-171 R3 - Protecting CUI in Nonfederal Systems and Organizations
408 controlsNIST SP 800-172 - Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations: Enhanced Security Requirements for Critical Programs and High Value Assets
74 controlsNIST SP 800-207 - Zero Trust Architecture
95 controlsNIST SP 800-218 - Secure Software Development Framework (SSDF) Version 1.1:
58 controlsNIST SP 800-37 - Guide for Applying the RMF to Federal Information Systems rev2
37 controlsNIST SP 800-39 - Managing Information Security Risk
21 controlsNIST SP 800-53 R4 - Security and Privacy Controls for Information Systems and Organizations
652 controlsNIST SP 800-53 R4 - Security and Privacy Controls for Information Systems and Organizations (high baseline)
361 controlsNIST SP 800-53 R4 - Security and Privacy Controls for Information Systems and Organizations (low baseline)
151 controlsNIST SP 800-53 R4 - Security and Privacy Controls for Information Systems and Organizations (moderate baseline)
286 controlsNIST SP 800-53 R5 - Security and Privacy Controls for Information Systems and Organizations
777 controlsNIST SP 800-53 R5 - Security and Privacy Controls for Information Systems and Organizations (high baseline)
421 controlsNIST SP 800-53 R5 - Security and Privacy Controls for Information Systems and Organizations (low baseline)
199 controlsNIST SP 800-53 R5 - Security and Privacy Controls for Information Systems and Organizations (moderate baseline)
343 controlsNIST SP 800-53 R5 - Security and Privacy Controls for Information Systems and Organizations (privacy baseline)
117 controlsNIST SP 800-53 R5 - Security and Privacy Controls for Information Systems and Organizations (Select Not Otherwise Categorized (NOC) controls)
392 controlsNIST SP 800-63B - Digital Identity Guidelines (partial mapping)
5 controlsNIST SP 800-82 - Guide to Industrial Control Systems (ICS) Security - High OT Overlay
437 controlsNIST SP 800-82 - Guide to Industrial Control Systems (ICS) Security - Moderate OT Overlay
357 controlsNIST SP 800-82 R3 - Guide to Industrial Control Systems (ICS) Security- Low OT Overlay
208 controlsNorth American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) 2024
122 controlsNV - Nevada Operation of Gaming Establishments - Regulation 5.260 (Cybersecurity)
20 controlsNV - SB220 (Nevada Privacy Law)
7 controlsNY - Cybersecurity Requirements for Financial Services Companies (DFS 23 NYCRR500) - 2023 Amendment 2
157 controlsNY - SHIELD Act (SB S5575B)
28 controlsNZ Health Information Security Framework (2022)
123 controlsOECD Privacy Principles
14 controlsOffice of the Superintendent of Financial Institutions Canada (OSFI) - Cyber Security Self-Assessment Guidance
141 controlsOperational Technology Cybersecurity Controls (OTCC -1: 2022)
198 controlsOR - Consumer Privacy Act (SB 619)
34 controlsOWASP Top 10 Most Critical Web Application Security Risks
131 controlsPayment Card Industry Data Security Standard (PCI DSS) v4.01
364 controlsPayment Card Industry Data Security Standard (PCI DSS) v4.0.1 - SAQ A
70 controlsPayment Card Industry Data Security Standard (PCI DSS) v4.0.1 - SAQ A-EP
239 controlsPayment Card Industry Data Security Standard (PCI DSS) v4.0.1 - SAQ B
58 controlsPayment Card Industry Data Security Standard (PCI DSS) v4.0.1 - SAQ B-IP
121 controlsPayment Card Industry Data Security Standard (PCI DSS) v4.0.1 - SAQ C
229 controlsPayment Card Industry Data Security Standard (PCI DSS) v4.0.1 - SAQ C-VT
115 controlsPayment Card Industry Data Security Standard (PCI DSS) v4.0.1 - SAQ D Merchant
323 controlsPayment Card Industry Data Security Standard (PCI DSS) v4.0.1 - SAQ D Service Provider
341 controlsPayment Card Industry Data Security Standard (PCI DSS) v4.0.1 - SAQ P2PE
47 controlsPersonal Data Act
23 controlsPersonal Data Act
25 controlsPersonal Data Ordinance
14 controlsPersonal Data Privacy Protection Law (PDPPL)
56 controlsPersonal Data Protection Act
27 controlsPersonal Data Protection Act
23 controlsPersonal Data Protection Act of 2010
25 controlsPersonal Data Protection Act of 2012
30 controlsPersonal Data Protection Code
28 controlsPersonal Data Protection Law
19 controlsPersonal Information Protection Act
37 controlsPersonal Information Protection and Electronic Documents Act (PIPEDA)
28 controlsPersonal Information Protection Law of the People's Republic of China
79 controlsPrivacy Act of 1998
23 controlsPrivacy Act of 2020
20 controlsProtecting controlled information in non-Government of Canada systems and organizations (ITSP.10.171)
408 controlsProtection of Individuals with Regard to the Processing of Personal Data (2472/1997)
17 controlsProtection of Personal Data - MEN-2018-147-APN-PTE
25 controlsProtection of Personal Information Act (POPIA)
101 controlsProtection of Personal Law No. 25,326
30 controlsProtection of Privacy Law, 5741 – 1981
22 controlsProtection of the Person in the Processing of His Personal Data
17 controlsPrudential Standard CPS 230 - Operational Risk Management
41 controlsPrudential Standard CPS 234 Information Security
52 controlsRegulation on Protection of Personal Data in Electronic Communications Sector
17 controlsRoyal Decree 1720/2007 (protection of personal data)
17 controlsSACS-002 - Third Party Cybersecurity Standard
185 controlsSarbanes Oxley Act (SOX)
2 controlsSaudi Arabia IoT CGIoT-1:2024
119 controlsSaudi Arabian Monetary Authority (SAMA) Cyber Security Framework (CSF) Version 1.0 (May 2017)
50 controlsSaudi Arabia Personal Data Protection Law (PDPL)
36 controlsSEBI Cybersecurity and Cyber Resilience Framework (CSCRF)
170 controlsSecond Payment Services Directive (PSD2)
30 controlsSecurity Directive 1580/82-2022-01 (Rail Cybersecurity Mitigation Actions and Testing)
69 controlsShared Assessments Standard Information Gathering Questionnaire (SIG) 2025
127 controlsSocial Security Administration (SSA) Electronic Information Exchange Security Requirements
109 controlsSpace Attack Research & Tactic Analysis (SPARTA) Countermeasures
81 controlsSpain Royal Decree 311/2022
73 controlsStandard 200-1
25 controlsSWIFT Customer Security Controls Framework 2021
127 controlsTN - Information Protection Act
30 controlsTrusted Information Security Assessment Exchange (TISAX) ISA 6.0.3
155 controlsTX - Consumer Data Protection Act (CDPA)
28 controlsTX - DIR Security Control Standards Catalog v2.0
208 controlsTX - SB 2610 (Safe Harbor Law)
6 controlsTX - Texas Risk & Authorization Management Program (TX-RAMP) Level 1
144 controlsTX - Texas Risk & Authorization Management Program (TX-RAMP) Level 2
331 controlsUAE National Information Assurance Framework (NIAF)
20 controlsUL 2900-1 - Software Cybersecurity for Network-Connectable Products
64 controlsUN Regulation No. 155 - Cyber security and cyber security management system
44 controlsUS Centers for Medicare & Medicaid Services MARS-E Document Suite, Version 2.0
375 controlsVA - Virginia Consumer Data Protection Act (2023)
44 controlsVT - Act 171 of 2018 (Data Broker Registration Act)
59 controls