This is for a digital download of the current Excel spreadsheet versions of the Set Theory Relationship Mapping (STRM) used to crosswalk the Secure Controls Framework (SCF).
There is a one (1) month period of time to access the STRM download (from the date of purchase). Included in the 2026.1 STRM mappings in Excel format include the following:
- AICPA Privacy Management Framework (PMF) (2020)
- Trust Services Criteria (TSC) (2017)
- APEC Privacy Framework (2015)
- Standard 200-1 (v1.0)
- Critical Security Controls (CSC) (v8.1)
- Critical Security Controls (CSC) (v8.1) - IG1
- Critical Security Controls (CSC) (v8.1) - IG2
- Critical Security Controls (CSC) (v8.1) - IG3
- Control Objectives for Information and Related Technologies (COBIT) (2019)
- Committee of Sponsoring Organizations (COSO) (2013)
- Cloud Controls Matrix (CCM) (v4.1.0)
- IoT Security Controls Framework (v2)
- Cyber Resilience Capability Maturity Model (CR-CMM) (2026)
- GovRAMP
- GovRAMP Core
- GovRAMP Low
- GovRAMP Low+
- GovRAMP Moderate
- GovRAMP High
- IEC TR 60601-4-5 (2021)
- IEC 62443-2-1 (2024)
- IEC 62443-3-3 (2013)
- IEC 62443-4-1 (2018)
- IEC 62443-4-2 (2019)
- International Maritime Organization (IMO) Guidelines on Maritime Cyber Risk Management (2025)
- ISO 21434 (2021)
- ISO 22301 (2019)
- ISO 27001 (2022)
- ISO 27002 (2022)
- ISO 27017 (2015)
- ISO 27018 (2025)
- ISO 27701 (2025)
- ISO 29100 (2024)
- ISO 31000 (2018)
- ISO 31010 (2009)
- ISO 42001 (2023)
- MITRE ATT&CK (v16.1)
- Content Security Best Practices Common Guidelines (v5.3.1)
- Insurance Data Security Model Law 668 (2017)
- NIST AI 100-1 (AI RMF 1.0)
- NIST AI 600-1
- NIST Privacy Framework (v1.0)
- NIST SP 800-37 R2
- NIST SP 800-39
- NIST SP 800-53 R5
- NIST SP 800-53 R5 - Privacy Baseline
- NIST SP 800-53 R5 - Low Baseline
- NIST SP 800-53 R5 - Moderate Baseline
- NIST SP 800-53 R5 - High Baseline
- NIST SP 800-66 R2
- NIST SP 800-82 R3
- NIST SP 800-82 R3 - Low OT Overlay
- NIST SP 800-82 R3 - Moderate OT Overlay
- NIST SP 800-82 R3 - High OT Overlay
- NIST SP 800-160 (Vol 2, Rev 1)
- NIST SP 800-161 R1 UDP1
- NIST SP 800-161 R1 UDP1 - C-SCRM Baseline
- NIST SP 800-161 R1 UDP1 - Flow Down Baseline
- NIST SP 800-161 R1 UDP1 - Level 1 Baseline
- NIST SP 800-161 R1 UDP1 - Level 2 Baseline
- NIST SP 800-161 R1 UDP1 - Level 3 Baseline
- NIST SP 800-171 R2
- NIST SP 800-171 R3
- NIST SP 800-171A
- NIST SP 800-171A R3
- NIST SP 800-172
- NIST SP 800-207
- NIST SP 800-218
- NIST Cybersecurity Framework (v2.0)
- OECD Privacy Principles (2010)
- OWASP Top 10 (2025)
- Payment Card Industry Data Security Standard (PCI DSS) (v4.01)
- Payment Card Industry Data Security Standard (PCI DSS) - SAQ A (v4.0.1)
- Payment Card Industry Data Security Standard (PCI DSS) - SAQ A-EP (v4.0.1)
- Payment Card Industry Data Security Standard (PCI DSS) - SAQ B (v4.0.1)
- Payment Card Industry Data Security Standard (PCI DSS) - SAQ B-IP (v4.0.1)
- Payment Card Industry Data Security Standard (PCI DSS) - SAQ C (v4.0.1)
- Payment Card Industry Data Security Standard (PCI DSS) - SAQ C-VT (v4.0.1)
- Payment Card Industry Data Security Standard (PCI DSS) - SAQ D Merchant (v4.0.1)
- Payment Card Industry Data Security Standard (PCI DSS) - SAQ D Service Provider (v4.0.1)
- Payment Card Industry Data Security Standard (PCI DSS) - SAQ P2PE (v4.0.1)
- Data Privacy Management Principle (DPMP) (2025)
- SPARTA Countermeasures
- SWIFT Customer Security Controls Framework (2025)
- TISAX ISA (6.0.3)
- UL 2900-1 (2017)
- UL 2900-2-2 (2016)
- UN Regulation No. 155 (2021)
- UNECE WP.29 (2020)
- CERT-RMM (v1.2)
- Children's Online Privacy Protection Act (COPPA) (2024)
- CISA Secure Software Development Attestation Form (SSDAF) (2024)
- CISA Trusted Internet Connections 3.0 Security Capabilities Catalog (TIC 3.0)
- CISA Cross-Sector Cybersecurity Performance Goals (CPG) (2.0)
- Criminal Justice Information Services (CJIS) Security Policy (v6.0)
- Cybersecurity Capability Maturity Model (C2M2) (v2.1)
- Cybersecurity Maturity Model Certification (CMMC) 2.0 - Level 1
- Cybersecurity Maturity Model Certification (CMMC) 2.0 - Level 1 Assessment Objectives
- Cybersecurity Maturity Model Certification (CMMC) 2.0 - Level 2
- Cybersecurity Maturity Model Certification (CMMC) 2.0 - Level 3
- Data Privacy Framework (2023)
- Department of War (DoW) - Zero Trust Execution Roadmap (v1.1)
- Department of War (DoW) - Zero Trust Reference Architecture (v2)
- DFARS 252.204-7012
- Executive Order 14028 - Improving the Nation's Cybersecurity
- Fair & Accurate Credit Transactions Act (FACTA) & Fair Credit Reporting Act (FCRA) (2023)
- FAR 52.204-21
- FAR 52.204-25 (NDAA Section 889)
- FAR 52.204-27
- Farm Credit Administration (FCA) Cyber Risk Management (2023)
- Food & Drug Administration (FDA) 21 CFR Part 11 (2025)
- FedRAMP R5 - Low Baseline
- FedRAMP R5 - Moderate Baseline
- FedRAMP R5 - High Baseline
- FedRAMP R5 - Li-SAAS Baseline
- Family Educational Rights and Privacy Act (FERPA) (2010)
- FINRA Cybersecurity Rules
- US Fair Information Practice Principles (FIPPs) (1973)
- Federal Trade Commission (FTC) Act
- Gramm Leach Bliley Act (GLBA) (2023)
- HHS § 155.260 (2016)
- HIPAA Administrative Simplification (2013)
- HIPAA Security Rule (2013)
- IRS 1075 (2021)
- MARS-E Document Suite (2.0)
- NERC Critical Infrastructure Protection (CIP) (2024)
- National Industrial Security Program Operating Manual (NISPOM) (2020)
- Safeguarding of NNPI (2010)
- SEC Cybersecurity Rule (2023)
- SOX (2002)
- TSA Security Directive 1580/82-2022-01
- Alaska Personal Information Protection Act (PIPA) (2009)
- California SB327 (2018)
- California Consumer Privacy Act (CCPA) (2026)
- California SB1386 (2002)
- Colorado Privacy Act (2021)
- Illinois Biometric Information Privacy Act (BIPA) (2008)
- Illinois Identity Protection Act (IPA) (2009)
- Illinois Personal Information Protection Act (PIPA) (2006)
- Massachusetts 201 CMR 17.00 (2008)
- Nevada Privacy Law (2023)
- Nevada Operation of Gaming Establishment (NOGE) Regulation 5.260 (2024)
- Nevada SB220 (2019)
- New York Department of Financial Services 23NYCRR Part 500 (2023 Amendment 2)
- New York SHIELD Act (SB S5575B) (2019)
- Oregon Consumer Information Protection Act (ORS 646A) (2025)
- Oregon Consumer Privacy Act (SB 619) (2023)
- Tennessee Information Protection Act (TIPA) (2025)
- Texas Identity Theft Enforcement and Protection Act (BC521) (2009)
- Texas Consumer Data Protection Act (2025)
- Texas DIR Security Control Standards Catalog (v2.2)
- Texas SB820 (2019)
- Texas Safe Harbor Law (SB2610) (2025)
- TX-RAMP 2.0 - Level 1
- TX-RAMP 2.0 - Level 2
- Virginia Consumer Data Protection Act (2023)
- Vermont Data Broker Registration Act (Act 171 of 2018)
- EU Artificial Intelligence Act (AI Act) (2024)
- EU Cyber Resilience Act (CRA) (2022)
- EU Cyber Resilience Act Annexes (CRA Annexes) (2022)
- EU Digital Operational Resilience Act (DORA) (2023)
- EU General Data Protection Regulation (GDPR) (2016)
- EU NIS2 Directive (2022)
- EU NIS2 Annex (2024)
- Saudi Arabia - Cybersecurity Guidelines for Internet of Things (CGIoT-1:2024)
- Saudi Arabia - Personal Data Protection Law (PDPL) (2023)
- Spain - BOE-A-2022-7191
- UAE - National Information Assurance Framework (NIAF) (2023)
- UK - Cyber Assessment Framework (CAF) (v4.0)
- UK - Defstan 05-138 (2024)
- UK - Defstan 05-138 (2024) - L0
- UK - Defstan 05-138 (2024) - L1
- UK - Defstan 05-138 (2024) - L2
- UK - Defstan 05-138 (2024) - L3
- Australia - Essential Eight (2024)
- Australia - Information Security Manual (ISM) (June 2024)
- China - Cybersecurity Law (2017)
- India - DPDPA (2023)
- India - SEBI CSCRF (2024)
- Japan - Information System Security Management and Assessment Program (ISMAP)
- New Zealand - HISF MLHSP (2023)
- New Zealand - HISF MicroSmall (2023)
- New Zealand - HISF Guidance for Suppliers (2023)
- Canada - OSFI B-13 (2022)
- Canada - ITSP.10.171 (2025)
2 Reviews
-
STRM
You will save a long time trying to map these controls out yourself if all you do is purchase the material for your latest NIS2 project. There are no doubt many ways that this can be applied and if we have this material to show an auditor how the material was organized, I am sure without a doubt that the material will pay off in a big way. The Secure Control Framework is amazing, and I am happy to support the project in any small way that we can.
-
Excellent value and huge time saver!
We use SCF to map product features to multiple compliance frameworks using control cross-walking. Adding the STRM information, especially the actual requirement text, allows us to tailor our answers specifically to the framework. And for the price, it's a real bargain! Even if you only need to copy and paste requirement descriptions manually, you'll end up paying more in lost work time than buying the whole package. Plus, you'll miss out on the STRM weights, which help to prioritize controls.