Compliance Frameworks

Comprehensive implementation guidance and scenario-based policies for major cybersecurity compliance frameworks

Implementation Guides
Compliance Checklists
Scenario-Based Policies
Industry Best Practices
Scenario-Based Implementation
Real-world scenarios and practical implementation guidance for each framework

Each framework guide includes detailed scenarios, company profiles, implementation checklists, and practical tools to help organizations achieve compliance efficiently.

What's Included:

  • • Company scenarios
  • • Implementation steps
  • • Compliance checklists

Tools & Resources:

  • • Technology recommendations
  • • Assessment templates
  • • Best practices
NIST Cybersecurity Framework
Risk Management Framework (RMF) and associated publications for federal systems and critical infrastructure

Key Areas

Risk Management
Security Controls
Critical Infrastructure
Federal Compliance
View Guide
ISO 27001/27002
Information Security Management System (ISMS) implementation and controls based on ISO standards

Key Areas

ISMS
Risk Assessment
Security Controls
International Standards
View Guide
SOC 2
Trust Services Criteria for security, availability, confidentiality, processing integrity, and privacy

Key Areas

Security
Availability
Processing Integrity
Confidentiality
Privacy
View Guide
CIS Controls
Critical Security Controls v8 with Implementation Groups for organizations of all sizes

Key Areas

Basic Controls
Foundational
Organizational
SMB Security
View Guide
GDPR
General Data Protection Regulation compliance for EU data processing and privacy rights

Key Areas

Data Protection
Privacy
EU Compliance
Data Subject Rights
View Guide
PCI DSS
Payment Card Industry Data Security Standard for cardholder data protection

Key Areas

Cardholder Data
Network Security
Vulnerability Management
Access Control
View Guide
HIPAA
Health Insurance Portability and Accountability Act for healthcare data protection

Key Areas

PHI Protection
Security Rule
Privacy Rule
Healthcare Compliance
View Guide
MITRE ATT&CK
Adversary tactics and techniques framework for threat detection and response

Key Areas

Threat Intelligence
Detection Engineering
Red Team
Blue Team
View Guide
COBIT
Control Objectives for Information and Related Technologies for IT governance

Key Areas

IT Governance
Risk Management
Performance Management
Enterprise
View Guide
FAIR
Factor Analysis of Information Risk for quantitative cyber risk assessment

Key Areas

Risk Quantification
Financial Analysis
Decision Support
Executive Reporting
View Guide
FedRAMP
Federal Risk and Authorization Management Program for cloud services

Key Areas

Federal Cloud
Authorization
Continuous Monitoring
Government
View Guide
ITIL
Information Technology Infrastructure Library for IT service management

Key Areas

Service Management
ITSM
Incident Response
Change Management
View Guide

Global Compliance Frameworks

Regional and country-specific data protection and cybersecurity regulations

LGPD
Lei Geral de Proteção de Dados - Brazil's comprehensive data protection regulation

Key Areas

Data Protection
Privacy
Brazil Compliance
Personal Data
View Guide
India IT Act
Information Technology Act 2000 and amendments for digital governance and cybersecurity in India

Key Areas

Digital Governance
Cybersecurity
India Compliance
Data Protection
View Guide
CCPA
California Consumer Privacy Act for consumer data protection and privacy rights

Key Areas

Consumer Privacy
Data Rights
California Compliance
Transparency
View Guide

Framework Categories

Security Standards

NIST, ISO 27001, CIS Controls

Privacy Regulations

GDPR, HIPAA, LGPD, CCPA

Audit Frameworks

SOC 2, PCI DSS, FedRAMP

Threat Intelligence

MITRE ATT&CK, FAIR