This is for a digital download of the current Excel spreadsheet versions of the Set Theory Relationship Mapping (STRM) used to crosswalk the Secure Controls Framework (SCF).
There is a one (1) month period of time to access the STRM download (from the date of purchase). Included in the 2025.4 STRM mappings in Excel format include the following:
- AICPA Trust Services Criteria (TSC) with (2022 points of focus)
- APEC Privacy Framework (2015)
- Critical Security Controls (CSC) version 8.1
- Critical Security Controls (CSC) version 8.1 - IG1
- Critical Security Controls (CSC) version 8.1 - IG2
- Critical Security Controls (CSC) version 8.1 - IG3
- GovRAMP Core
- GovRAMP Low
- GovRAMP Low+
- GovRAMP Moderate
- GovRAMP High
- IEC TR 60601-4-5:2021 - Medical electrical equipment - Part 4-5: Guidance and interpretation - Safety-related technical security specifications
- International Maritime Organization (IMO) Guidelines on Maritime Cyber Risk Management
- ISO/IEC 27001:2022 - Information Security Management Systems (ISMS) - Requirements
- ISO/IEC 27002:2022 - Information security, cybersecurity and privacy protection - Information security controls
- ISO/IEC 27701: 2025 - Privacy information management systems
- ISO/IEC 29100:2024 Information technology — Security techniques — Privacy framework
- ISO/IEC 42001:2023 - Information technology - Artificial intelligence - Management system
- Insurance Data Security Model Law (MDL-668)
- NIST AI 100-1 (Artificial Intelligence Risk Management Framework 1.0)
- NIST AI 600-1 (AI RMF Generative Artificial Intelligence Profile)
- NIST SP 800-53 R5 - Security and Privacy Controls for Information Systems and Organizations
- NIST SP 800-53 R5 - Security and Privacy Controls for Information Systems and Organizations (privacy baseline)
- NIST SP 800-53 R5 - Security and Privacy Controls for Information Systems and Organizations (low baseline)
- NIST SP 800-53 R5 - Security and Privacy Controls for Information Systems and Organizations (moderate baseline)
- NIST SP 800-53 R5 - Security and Privacy Controls for Information Systems and Organizations (high baseline)
- NIST SP 800-53 R5 - Security and Privacy Controls for Information Systems and Organizations (Select Not Otherwise Categorized (NOC) controls)
- NIST SP 800-161 R1 - Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations
- NIST SP 800-161 R1 - Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations (C-SCRM Baseline)
- NIST SP 800-161 R1 - Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations (Flow Down)
- NIST SP 800-161 R1 - Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations (Level 1)
- NIST SP 800-161 R1 - Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations (Level 2)
- NIST SP 800-161 R1 - Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations (Level 3)
- NIST SP 800-171 R2 - Protecting CUI in Nonfederal Systems and Organizations
- NIST SP 800-171 R3 - Protecting CUI in Nonfederal Systems and Organizations
- NIST SP 800-171A - Assessing Security Requirements for Controlled Unclassified Information
- NIST SP 800-171A R3 - Assessing Security Requirements for Controlled Unclassified Information
- NIST SP 800-172 - Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations: Enhanced Security Requirements for Critical Programs and High Value Assets
- NIST SP 800-207 - Zero Trust Architecture
- NIST SP 800-218 - Secure Software Development Framework (SSDF) Version 1.1:
- NIST Cybersecurity Framework (CSF) v2.0
- OECD Privacy Principles
- Payment Card Industry Data Security Standard (PCI DSS) v4.01
- Payment Card Industry Data Security Standard (PCI DSS) v4.0.1 - SAQ A
- Payment Card Industry Data Security Standard (PCI DSS) v4.0.1 - SAQ A-EP
- Payment Card Industry Data Security Standard (PCI DSS) v4.0.1 - SAQ B
- Payment Card Industry Data Security Standard (PCI DSS) v4.0.1 - SAQ B-IP
- Payment Card Industry Data Security Standard (PCI DSS) v4.0.1 - SAQ C
- Payment Card Industry Data Security Standard (PCI DSS) v4.0.1 - SAQ C-VT
- Payment Card Industry Data Security Standard (PCI DSS) v4.0.1 - SAQ D Merchant
- Payment Card Industry Data Security Standard (PCI DSS) v4.0.1 - SAQ D Service Provider
- Payment Card Industry Data Security Standard (PCI DSS) v4.0.1 - SAQ P2PE
- Space Attack Research & Tactic Analysis (SPARTA) Countermeasures
- Trusted Information Security Assessment Exchange (TISAX) ISA 6.0.3
- CISA Cross-Sector Cybersecurity Performance Goals (CPG)
- Criminal Justice Information Services (CJIS) Security Policy v5.9.3
- Cybersecurity Maturity Model Certification (CMMC) v2.0 Level 1
- Cybersecurity Maturity Model Certification (CMMC) v2.0 Level 1 Assessment Objectives
- Cybersecurity Maturity Model Certification (CMMC) v2.0 Level 2
- Data Privacy Framework (DPF)
- DoD Zero Trust Execution Roadmap
- DoD Zero Trust Reference Architecture v2
- CISA Secure Software Development Attestation Form (SSDAF)
- Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) Trusted Internet Connections 3.0 Security Capabilities Catalog
- Executive Order 14028 (EO 14028)
- Farm Credit Administration (FCA) Cyber Risk Management
- Fair Information Practice Principles (FIPPs)
- Gramm Leach Bliley Act (GLBA) - CFR 314 (Dec 2023)
- HHS § 155.260 Privacy and Security of Personally Identifiable Information.
- HIPAA Administrative Simplification (2013)
- HIPAA Security Rule (includes mapping to NIST SP 800-66 R2)
- North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) 2024
- Cybersecurity Final Rule (Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure) - 17 CFR Parts 229, 232, 239, 240, and 249
- CA - California Consumer Privacy Act (CCPA) January 2026 (amended California Privacy Rights Act (CPRA))
- NV - Nevada Operation of Gaming Establishments - Regulation 5.260 (Cybersecurity)
- NY - Cybersecurity Requirements for Financial Services Companies (DFS 23 NYCRR500) - 2023 Amendment 2
- OR - Consumer Privacy Act (SB 619)
- TN - Information Protection Act
- TX - SB 2610 (Safe Harbor Law)
- VA - Virginia Consumer Data Protection Act (2023)
- EU Artificial Intelligence (AI)I Act (Regulation (EU) 2024/1689)
- EU Cyber Resilience Act
- EU Cyber Resilience Act - Annexes
- Digital Operational Resilience Act (DORA) (2023)
- General Data Protection Regulation (GDPR)
- ENISA NIS2 (Directive (EU) 2022/2555)
- ENISA NIS2 Annex
- Saudi Arabia IoT CGIoT-1:2024
- Saudi Arabia Personal Data Protection Law (PDPL)
- BOE-A-2022-7191
- UAE National Information Assurance Framework (NIAF)
- Cyber Assessment Framework (CAF) v4.0
- Ministry of Defence Standard 05-138 (14 May 2024)
- Australia Essential Eight
- Australian Government Information Security Manual (ISM) (June 2024)
- China Cybersecurity Law of the People's Republic of China (China Cybersecurity Law) 2017
- India Digital Personal Data Protection Act 2023
- SEBI Cybersecurity and Cyber Resilience Framework (CSCRF)
- NZ Health Information Security Framework (2022)
- HISO 10029:2024 NZ Health Information Security Framework Guidance for Suppliers
B-13
Protecting controlled information in non-Government of Canada systems and organizations (ITSP.10.171)
2 Reviews
-
STRM
You will save a long time trying to map these controls out yourself if all you do is purchase the material for your latest NIS2 project. There are no doubt many ways that this can be applied and if we have this material to show an auditor how the material was organized, I am sure without a doubt that the material will pay off in a big way. The Secure Control Framework is amazing, and I am happy to support the project in any small way that we can.
-
Excellent value and huge time saver!
We use SCF to map product features to multiple compliance frameworks using control cross-walking. Adding the STRM information, especially the actual requirement text, allows us to tailor our answers specifically to the framework. And for the price, it's a real bargain! Even if you only need to copy and paste requirement descriptions manually, you'll end up paying more in lost work time than buying the whole package. Plus, you'll miss out on the STRM weights, which help to prioritize controls.