Secure Controls Framework
↓ Download SCF
GRC Fundamentals ▼
SCF Certified ▼
Organization-Level SCF Certifications
SCF Conformity Assessment Program (CAP)SCF Assessment Guides
SCF Training & Individual-Level Certifications
SCF PractitionerSCF ArchitectSCF Assessor
FAQAboutSwag
Cybersecurity & Privacy Assessment · Evidence-Based · Free Forever

CDPAS — Cybersecurity & Data Protection Assessment Standards

The CDPAS provides a structured, evidence-based methodology for assessing cybersecurity and data protection programs — built directly on the Common Controls Framework™ and designed to support self-assessments, third-party audits, and regulatory examinations.

4
Assessment Types
33
Domains Covered
1,400+
Assessable Controls
FREE
Creative Commons
⬇ Download the CDPASExplore Additional SCF Content
Cybersecurity & Privacy Assessment · Evidence-Based · Free Forever

CDPAS — Cybersecurity & Data Protection Assessment Standards

The CDPAS provides a structured, evidence-based methodology for assessing cybersecurity and data protection programs — built directly on the Common Controls Framework™ and designed to support self-assessments, third-party audits, and regulatory examinations.

Common Controls Framework™

The SCF is the exclusive, trademarked Common Controls Framework™ (CCF™) — a Living Control Set with 33 domains, 1,400+ controls, and mappings to 200+ laws, regulations & frameworks. CDPAS is the assessment methodology built on the CCF™ to produce defensible, evidence-based results. Free. Always.

CDPAS integrates directly with the SCF Evidence Request List (ERL), Unified Scoping Guide (USG), and SCR-CMM maturity scoring — the complete SCF assessment ecosystem in one coordinated framework.

Common Controls Framework™

The SCF is the exclusive, trademarked Common Controls Framework™ (CCF™) — a Living Control Set with 33 domains, 1,400+ controls, and mappings to 200+ laws, regulations & frameworks. CDPAS is the assessment methodology built on the CCF™ to produce defensible, evidence-based results. Free. Always.

CDPAS integrates directly with the SCF Evidence Request List (ERL), Unified Scoping Guide (USG), and SCR-CMM maturity scoring — the complete SCF assessment ecosystem in one coordinated framework.

About CDPAS

A Single Assessment Standard for Cybersecurity & Privacy

Most organizations run separate assessments for cybersecurity and data privacy — different methodologies, different evidence packages, different auditors, different timelines. CDPAS unifies both under a single, evidence-based assessment standard built on the SCF CCF™.

CDPAS defines how assessments are scoped, conducted, evidenced, scored, and reported. It is the procedural layer that sits on top of the SCF control catalog and SCR-CMM maturity model — telling assessors exactly what evidence to examine, how to evaluate it, and how to communicate findings in a consistent, defensible format.

Whether the output is a self-assessment scorecard, a third-party audit report, a regulatory examination response, or a board-level security assurance package, CDPAS provides the methodology to produce it consistently.

Volunteer-Driven. Creative Commons Licensed.
CDPAS in the SCF Assessment Ecosystem

CDPAS is developed by volunteer cybersecurity assessors, auditors, and GRC practitioners and released at no cost under Creative Commons Attribution 4.0. No license, no fee, no registration.

About CDPAS

A Single Assessment Standard for Cybersecurity & Privacy

Most organizations run separate assessments for cybersecurity and data privacy — different methodologies, different evidence packages, different auditors, different timelines. CDPAS unifies both under a single, evidence-based assessment standard built on the SCF CCF™.

CDPAS defines how assessments are scoped, conducted, evidenced, scored, and reported. It is the procedural layer that sits on top of the SCF control catalog and SCR-CMM maturity model — telling assessors exactly what evidence to examine, how to evaluate it, and how to communicate findings in a consistent, defensible format.

Whether the output is a self-assessment scorecard, a third-party audit report, a regulatory examination response, or a board-level security assurance package, CDPAS provides the methodology to produce it consistently.

CDPAS is developed by volunteer cybersecurity assessors, auditors, and GRC practitioners and released at no cost under Creative Commons Attribution 4.0. No license, no fee, no registration.

CDPAS in the SCF Assessment Ecosystem
How CDPAS connects to the other SCF tools and models

How CDPAS connects to the other SCF tools and models

4
Assessment Types
ERL
Evidence Standard
CMM
Scoring Basis
USG
Scoping Method
4
Assessment Types
ERL
Evidence Standard
CMM
Scoring Basis
USG
Scoping Method
The CDPAS Seven-Phase Assessment Process

The CDPAS Seven-Phase Assessment Process

CDPAS defines a structured seven-phase process that applies consistently across all four assessment types — ensuring repeatable, defensible, and comparable results regardless of who conducts the assessment.

Phase Activity
CDPAS-1 Scope Definition — Define the assessment boundary: systems, data flows, locations, and legal entities in scope. Identify all applicable laws, regulations, and frameworks that create MCR obligations.
CDPAS-2 Control Selection — Select the SCF controls applicable to the defined scope. For regulatory exams, map regulator requirements to the corresponding SCF controls using the STRM crosswalk.
CDPAS-3 Evidence Planning — For each in-scope control, identify the evidence items required to assess it using the SCF Evidence Request List (ERL). Communicate evidence requirements to the assessed organization in advance.
CDPAS-4 Evidence Collection — Collect, review, and validate the evidence submitted against the ERL requirements. Document any evidence gaps or exceptions. Interview relevant personnel for inquiry-based evidence items.
CDPAS-5 Control Assessment — Assess each in-scope control using the SCR-CMM criteria. Assign a CMM score (1–5) supported by the collected evidence. Document observations, gaps, and the basis for each score.
CDPAS-6 Scoring & Reporting — Aggregate control scores to domain-level and program-level maturity scores. Document findings with observation, criterion, condition, cause, and recommendation for each gap identified.
CDPAS-7 Remediation Planning — Prioritize findings by MCR/DSR classification and risk weighting. Develop remediation plans with owners, timelines, and target CMM levels. Schedule follow-on assessment to validate remediation.
Finding Documentation Standard

Structured Findings — Not Just a Checklist

CDPAS requires every gap identified during an assessment to be documented in a structured finding format — borrowed from federal audit standards — ensuring findings are actionable and defensible.

A CDPAS finding is not just a checkbox that says “control not implemented.” Each finding documents exactly what was observed, what the standard requires, why the gap exists, and what needs to change — giving the assessed organization a clear, specific roadmap for remediation.

Sample CDPAS Finding — IAC-09

SCF Tool Integration

CDPAS Works With Every SCF Tool

CDPAS is the procedural layer that ties the entire SCF assessment ecosystem together. Each SCF tool plays a specific role in the CDPAS process.

Unified Scoping Guide (USG)

Defines what is in scope for the CDPAS assessment — systems, data, locations, and applicable laws. The USG output is the direct input to CDPAS-1 (Scope Definition). Without proper scoping, no assessment is reliable.

Learn About USG →Learn About USG →

Evidence Request List (ERL)

Defines exactly what evidence must be collected for each SCF control. CDPAS uses the ERL in phases 3 and 4 to drive evidence planning and collection — ensuring no required evidence is overlooked and every finding is supported by documented proof.

Learn About ERL →

SCR-CMM Maturity Model

Provides the scoring standard for CDPAS Phase 5 assessments. Every control is scored on the 1–5 CMM scale. CDPAS findings always include a CMM score, making results comparable across organizations and over time.

Learn About SCR-CMM →

SCR-RMM Risk Management Model

Provides the risk context for CDPAS findings. CDPAS Phase 6 uses RMM risk scores to prioritize findings by residual risk — ensuring remediation plans address the highest-risk gaps first, not just the most numerous.

Learn About SCR-RMM →

SCF Control Catalog

The 1,400+ control catalog is the assessment object — every control is a potential assessment point. CDPAS uses the MCR/DSR classification and proposed risk weighting from the catalog to scope and prioritize assessment activity.

Download SCF →

SCF-CAP Conformity Assessment

CDPAS Type 2 (Third-Party Assessment) is the methodology used in the SCF Conformity Assessment Program (SCF-CAP). Organizations pursuing SCF-CAP certification must undergo a CDPAS Type 2 assessment by an accredited SCF assessor.

Learn About SCF-CAP →
SCF Tool Integration

CDPAS Works With Every SCF Tool

CDPAS is the procedural layer that ties the entire SCF assessment ecosystem together. Each SCF tool plays a specific role in the CDPAS process.

Unified Scoping Guide (USG)

Defines what is in scope for the CDPAS assessment — systems, data, locations, and applicable laws. The USG output is the direct input to CDPAS-1 (Scope Definition). Without proper scoping, no assessment is reliable.

Learn About USG →
Learn About USG →

Evidence Request List (ERL)

Defines exactly what evidence must be collected for each SCF control. CDPAS uses the ERL in phases 3 and 4 to drive evidence planning and collection — ensuring no required evidence is overlooked and every finding is supported by documented proof.

Learn About ERL →
Learn About ERL →

SCR-CMM Maturity Model

Provides the scoring standard for CDPAS Phase 5 assessments. Every control is scored on the 1–5 CMM scale. CDPAS findings always include a CMM score, making results comparable across organizations and over time.

Learn About SCR-CMM →
Learn About SCR-CMM →

SCR-RMM Risk Management Model

Provides the risk context for CDPAS findings. CDPAS Phase 6 uses RMM risk scores to prioritize findings by residual risk — ensuring remediation plans address the highest-risk gaps first, not just the most numerous.

Learn About SCR-RMM →
Learn About SCR-RMM →

SCF Control Catalog

The 1,400+ control catalog is the assessment object — every control is a potential assessment point. CDPAS uses the MCR/DSR classification and proposed risk weighting from the catalog to scope and prioritize assessment activity.

Download SCF →
Download SCF →

SCF-CAP Conformity Assessment

CDPAS Type 2 (Third-Party Assessment) is the methodology used in the SCF Conformity Assessment Program (SCF-CAP). Organizations pursuing SCF-CAP certification must undergo a CDPAS Type 2 assessment by an accredited SCF assessor.

Learn About SCF-CAP →
Learn About SCF-CAP →
Intended Audiences

Who Uses CDPAS?

CDPAS is designed for the full spectrum of cybersecurity assessment stakeholders — from internal teams conducting self-assessments to accredited third-party assessors performing formal audits.

CISOs & Security Teams

Use CDPAS Type 1 (self-assessment) to establish baseline maturity, identify gaps, prioritize remediation, and prepare for external audits. CDPAS provides the structured methodology that turns the SCF spreadsheet into a formal internal assessment.

GRC Practitioners

Use CDPAS to structure compliance assessments across multiple regulatory frameworks simultaneously. Map regulator requirements to SCF controls once, collect evidence once, satisfy multiple auditors — eliminating redundant evidence collection across overlapping frameworks.

External Auditors & Assessors

Use CDPAS as the standard methodology for third-party cybersecurity and privacy assessments. Delivers consistent, comparable results across clients. Accredited SCF assessors use CDPAS for SCF-CAP conformity assessments.

Procurement & Vendor Risk Teams

Use CDPAS Type 4 (vendor assessment) to standardize third-party risk evaluation. Replace ad-hoc vendor questionnaires with a structured, CMM-scored methodology that produces comparable ratings across the entire vendor portfolio.

Regulators & Examiners

CDPAS provides a recognized, publicly available assessment methodology that regulated entities can use to self-assess and prepare for regulatory examinations. Regulators benefit from examined organizations having a common, structured evidence package format.

Privacy Officers

CDPAS covers both cybersecurity and data protection — applying the same evidence-based assessment methodology to privacy controls (SCF PRI domain) that is applied to all other security domains, unifying the cyber/privacy assessment under one methodology.

Intended Audiences

Who Uses CDPAS?

CDPAS is designed for the full spectrum of cybersecurity assessment stakeholders — from internal teams conducting self-assessments to accredited third-party assessors performing formal audits.

CISOs & Security Teams

Use CDPAS Type 1 (self-assessment) to establish baseline maturity, identify gaps, prioritize remediation, and prepare for external audits. CDPAS provides the structured methodology that turns the SCF spreadsheet into a formal internal assessment.

GRC Practitioners

Use CDPAS to structure compliance assessments across multiple regulatory frameworks simultaneously. Map regulator requirements to SCF controls once, collect evidence once, satisfy multiple auditors — eliminating redundant evidence collection across overlapping frameworks.

External Auditors & Assessors

Use CDPAS as the standard methodology for third-party cybersecurity and privacy assessments. Delivers consistent, comparable results across clients. Accredited SCF assessors use CDPAS for SCF-CAP conformity assessments.

Procurement & Vendor Risk Teams

Use CDPAS Type 4 (vendor assessment) to standardize third-party risk evaluation. Replace ad-hoc vendor questionnaires with a structured, CMM-scored methodology that produces comparable ratings across the entire vendor portfolio.

Regulators & Examiners

CDPAS provides a recognized, publicly available assessment methodology that regulated entities can use to self-assess and prepare for regulatory examinations. Regulators benefit from examined organizations having a common, structured evidence package format.

Privacy Officers

CDPAS covers both cybersecurity and data protection — applying the same evidence-based assessment methodology to privacy controls (SCF PRI domain) that is applied to all other security domains, unifying the cyber/privacy assessment under one methodology.

CDPAS operates within a continuous improvement cycle

Plan-Do-Check-Act (PDCA)

CDPAS assessments are not one-time events — they operate within a continuous PDCA improvement cycle, with each assessment cycle informing the next remediation plan.

Assessment Lifecycle
Continuous Improvement

PLAN

Define assessment scope using USG. Select assessment type (self, third-party, regulatory, vendor). Identify in-scope SCF controls. Build the evidence request package using the ERL. Schedule assessment activities and notify stakeholders.

Assessment Lifecycle
Continuous Improvement

DO

Collect and validate evidence against the ERL. Conduct control assessments using CDPAS Phase 5 methodology. Score each control using SCR-CMM criteria. Document all findings in the structured CDPAS finding format.

Assessment Lifecycle
Continuous Improvement

CHECK

Aggregate control scores to domain and program level. Review findings for accuracy and completeness. Validate scores against evidence. Produce the assessment report. Compare results to prior assessment cycles to measure improvement.

Assessment Lifecycle
Continuous Improvement

ACT

Develop remediation plans prioritized by MCR/DSR classification and risk weighting. Assign owners and timelines. Track remediation progress. Schedule the next CDPAS assessment cycle to validate that gaps have been closed.

Assessment Lifecycle

Plan-Do-Check-Act (PDCA)

CDPAS assessments are not one-time events — they operate within a continuous PDCA improvement cycle, with each assessment cycle informing the next remediation plan.

Assessment Lifecycle
Continuous Improvement

PLAN

Define assessment scope using USG. Select assessment type (self, third-party, regulatory, vendor). Identify in-scope SCF controls. Build the evidence request package using the ERL. Schedule assessment activities and notify stakeholders.

Assessment Lifecycle
Continuous Improvement

DO

Collect and validate evidence against the ERL. Conduct control assessments using CDPAS Phase 5 methodology. Score each control using SCR-CMM criteria. Document all findings in the structured CDPAS finding format.

Assessment Lifecycle
Continuous Improvement

CHECK

Aggregate control scores to domain and program level. Review findings for accuracy and completeness. Validate scores against evidence. Produce the assessment report. Compare results to prior assessment cycles to measure improvement.

Assessment Lifecycle
Continuous Improvement

ACT

Develop remediation plans prioritized by MCR/DSR classification and risk weighting. Assign owners and timelines. Track remediation progress. Schedule the next CDPAS assessment cycle to validate that gaps have been closed.

Download CDPAS — Free

Download the CDPAS today! One download to obtain a cohesive, consistent set of standards to govern cybersecurity and data protection related Third Party Assessment, Attestation and Certification Services (3PAAC Services).

⬇ Download the CDPASExplore Additional SCF Content

Licensed under Creative Commons Attribution 4.0. Volunteer-driven by the SCF Council. No registration required.

Creative Commons — No Cost — No Registration Required

Download the CDPAS for Free

CDPAS is included in the SCF download — integrated with the Evidence Request List (ERL), Unified Scoping Guide (USG), and SCR-CMM maturity criteria. One download, complete assessment ecosystem.

⬇ Download the CDPAS
Evidence Request List
Unified Scoping Guide

Licensed under Creative Commons Attribution 4.0. Volunteer-driven by the SCF Council. No registration required.