The SCF is the Common Controls Framework™ (CCF) — the world’s most comprehensive, free cybersecurity and data privacy metaframework. One unified control catalog. 262+ laws and frameworks mapped. Used globally by organizations of every size.
The SCF eliminates the need for separate compliance programs. Implement one tailored SCF control set — it simultaneously satisfies HIPAA, ISO 27001, NIST CSF, SOC 2, PCI DSS, GDPR, and every other applicable framework.
The SCF maps to 262+ unique laws, regulations, and frameworks across General, US, EMEA, APAC, and Americas jurisdictions. HIPAA, GDPR, NIST CSF 2.0, ISO 27001, CMMC, PCI DSS, SOC 2 — and hundreds more — all mapped through rigorous STRM methodology.
The SCF is importable into any GRC platform in two formats: standard .CSV for universal compatibility, and NIST OSCAL JSON for machine-readable, standards-based integration. No proprietary lock-in. No licensing fees for the core framework.
Starting with SCF 2024.1, all crosswalk mappings use NIST IR 8477 Set Theory Relationship Mapping (STRM) — the US Government’s gold standard. Every mapping documents a precise mathematical relationship type and strength score, making coverage defensible and auditable.
The SCF is the exclusively trademarked Common Controls Framework™ (CCF). No other framework holds this designation. The domains commoncontrolsframework.com and common-controls-framework.com both redirect to the SCF, reflecting its singular status as the definitive CCF.
Learn More →The SCF is never static. As laws change, new frameworks emerge, and threat landscapes evolve, the SCF is continuously updated by its expert volunteer community. Your compliance program stays current without heroic manual effort or expensive vendor updates.
The SCF is built and maintained entirely by volunteer cybersecurity and GRC professionals — CISOs, architects, engineers, auditors, privacy experts, and consultants — who donate their expertise because stronger security practices benefit everyone. No vendor bias. No sales agenda.
The SCF is the only major metaframework that uses NIST IR 8477 Set Theory Relationship Mapping (STRM) — a mathematically rigorous, transparent methodology for every crosswalk mapping.
Every mapping between an SCF control and an LRF requirement documents a precise relationship type and a numeric strength score. Auditors, assessors, and regulators can verify exactly how and why an SCF control satisfies a given requirement.
The SCF's participation in the NIST OLIR Program — with accepted OLIRs for NIST CSF v1.1 and SP 800-171 R2 — provides independent government-recognized validation of the SCF's mapping quality.
The SCF is designed for real-world implementation — not just documentation. Import the complete control catalog directly into the GRC tools your organization already uses.
Available as a standard .CSV for universal compatibility, or as NIST OSCAL JSON for standards-based, machine-readable integration. The SCF’s stable control ID taxonomy (e.g., GOV-03, IAC-06) means version management across GRC systems is predictable and reliable.
Universal compatibility. Import directly into any GRC platform, spreadsheet tool, or custom database. No special tooling required.
Machine-readable format adhering to the NIST Open Security Controls Assessment Language (OSCAL) standard — ideal for automated GRC pipelines and DevSecOps integration.
The SCF is natively supported by dozens of enterprise GRC platforms. No proprietary lock-in. No licensing fees for the core framework.
Every control in the SCF is organized into one of 33 logically structured domains — providing a universal taxonomy that means the same thing to every organization using the SCF, worldwide.
The SCF is developed and maintained by volunteer cybersecurity and GRC professionals from around the world — with no financial incentive to push a particular agenda.
The security community wins when every organization has access to world-class controls guidance. Attackers share methods freely. Defenders should too. That conviction is the foundation of the SCF.
The SCF Council's volunteer contributors include CISOs, security architects, engineers, auditors, GRC specialists, privacy experts, and compliance consultants who donate their expertise because improving security practices everywhere benefits society as a whole.
Senior practitioners defining enterprise security strategy and governance structures.
Governance, risk, and compliance professionals with deep regulatory expertise.
Technical architects who translate governance requirements into implementable designs.
Data privacy attorneys and privacy engineers contributing to PRI domain controls.
Operational security professionals ensuring controls reflect real-world implementation realities.
Third-party assessors ensuring controls are audit-ready and defensible under scrutiny.
Get the full SCF spreadsheet in .CSV or NIST OSCAL JSON format. No registration. No cost. No strings attached.
Work through the “Start Here” section to understand what the SCF is, how the SCRMS works, and how STRM mapping proves compliance coverage.
Use the Security, Compliance and Resilience Management System (SCRMS) as your operational guide for building a mature, auditable cybersecurity program.
Download the SCF — 1,400+ controls, 33 domains, 262+ laws and frameworks mapped — and start building your unified cybersecurity program today.
No registration. No cost. Licensed under Creative Commons. Volunteer-maintained by the SCF Council.