Standards and Frameworks
Explore mapped standards and frameworks that connect requirements to concrete controls and underlying queries.
Connector filter
Showing 22 of 22 entries
AWS Well-Architected Framework
The AWS Well-Architected Framework helps you understand the pros and cons of decisions you make while building systems on AWS. By using the Framework you will learn architectural best practices for designing and operating reliable, secure, efficient, cost-effective, and sustainable systems in the cloud.
Applies to
Covered asset types
CIS Alibaba (Aliyun) Cloud Foundation Benchmark
## Statement
Applies to
Covered asset types
CIS Amazon Elastic Kubernetes Service (EKS) Benchmark
### Statement
Applies to
Covered asset types
CIS Amazon Web Services (AWS) Foundations Benchmark
## Statement
Applies to
Covered asset types
CIS Amazon Web Services (AWS) Foundations Benchmark
## Statement
Applies to
Covered asset types
CIS Amazon Web Services (AWS) Foundations Benchmark
## Statement - AWS CIS 3.0.0
Applies to
Covered asset types
CIS Google Cloud Foundation Benchmark
## Statement
Applies to
Covered asset types
CIS Kubernetes Benchmark
### Statement
Applies to
Covered asset types
CIS Microsoft Azure Foundations Benchmark
#Statement
Applies to
Covered asset types
Cyscale Security Framework
## Statement
Applies to
Covered asset types
DORA - Digital Operational Resilience Act
#Statement
Applies to
Covered asset types
GDPR - General Data Protection Regulation (EU)
## Statement
Applies to
Covered asset types
HIPAA - Health Insurance Portability and Accountability Act (US)
## Statement
Applies to
Covered asset types
HITRUST CSF - Health Information Trust Alliance
The CSF was designed with security and privacy professionals in mind. By taking an abstraction of what is core to and common across most dominant frameworks, the architecture was deliberately chosen to facilitate straightforward understanding and easy consumption. Each control category in the CSF includes control objectives and control specifications, leveraging the primary categories from the ISO/IEC framework, as well as the inclusion of specific categories for an information security management program and risk management practices which collectively help to ensure organizational, regulatory compliance, and system controls are properly specified and implemented. The core structure is then integrated with various authoritative sources, along with the experience and leading practices of the HITRUST Community, to create specific implementation requirements for each control. All requirements are mapped to the related framework, standard, or regulation, and noted as an authoritative source.
Applies to
Covered asset types
ISO/IEC 27001:2013 - Information security management systems
## Statement
Applies to
Covered asset types
ISO/IEC 27001:2022 - Information security management systems
## Statement
Applies to
Covered asset types
LGPD - General Personal Data Protection Law
This Law provides for the processing of personal data, including in digital media, by a natural person or legal entity governed by public or private law, in order to protect the fundamental rights of liberty and privacy and the free development of personality of the natural person.
Applies to
Covered asset types
MAS Technology Risk Management Guidelines
## Statement
Applies to
Covered asset types
NIST 800-53 - NIST Special Publication 800-53
## Statement
Applies to
Covered asset types
PCI-DSS - PCI Security Standards Council - Payment Card Industry Data Security Standard
#Statement
Applies to
Covered asset types
PCI-DSS - PCI Security Standards Council - Payment Card Industry Data Security Standard
## Statement
Applies to
Covered asset types
SOC 2 - American Institute of CPAs (AICPA) - Service Organization Control 2
## Statement
Applies to
Covered asset types
Alibaba Cloud
AWS
Google Cloud
Kubernetes
Microsoft Azure
Okta
Google Workspace