The SCF is the exclusive, trademarked Common Controls Framework™ (CCF™) — a Living Control Set that maps to 200+ laws, regulations, and frameworks using NIST IR 8477 STRM methodology. Understanding the difference between them is the foundation of effective GRC program design.
View All GRC Topics →The Three Categories
Each category creates different types of obligations, enforced by different authorities, with different consequences for non-compliance. The SCF categorizes all 200+ mapped compliance sources into exactly these three buckets.
A statute enacted by a legislative body — Congress, a state legislature, or a foreign parliament — that creates legally binding obligations for organizations within its jurisdiction. Non-compliance is a violation of the law itself.
Created by
Legislative body (Congress, Parliament, state legislature)
Enforced by
Courts, regulatory agencies, law enforcement
Penalties
Civil fines, criminal prosecution, private right of action
Mandatory?
Yes — for entities within jurisdiction
Examples
HIPAA, GLBA, SOX, GDPR, CCPA, TX SB 2610
A rule issued by a regulatory agency under authority granted by a law. Regulations fill in the operational specifics that laws leave to agencies — defining exactly what organizations must do to comply with the law’s intent.
Created by
Regulatory agency (DoD, HHS, NYDFS, SEC) under statutory authority
Enforced by
The issuing regulatory agency
Penalties
Regulatory fines, license revocation, contract termination, debarment
Mandatory?
Yes — for regulated entities in the agency’s scope
Examples
CMMC, DFARS 252.204-70XX, NY DFS Part 500, FedRAMP
A voluntary set of best-practice guidance developed by a standards body, industry group, or government agency — without statutory authority. Adoption is optional unless a contract or law specifically requires it.
Created by
NIST, ISO, CIS, ISACA, PCI SSC, AICPA, HITRUST
Enforced by
Not enforced — voluntary adoption unless contractually required
Penalties
None from the framework itself; contract or customer penalties may apply
Mandatory?
No — but may be required by contract or used as a “reasonable” standard
Examples
NIST CSF, ISO 27001, CIS Controls, SOC 2, HITRUST
Why the Distinction Matters
Organizations that treat voluntary frameworks as mandatory obligations waste resources. Organizations that treat mandatory laws as optional frameworks face regulatory fines, litigation, and criminal exposure. The SCF addresses this by classifying all 1,400+ controls using the MCR / DSR distinction — Minimum Compliance Requirements (legally mandated) vs Discretionary Security Requirements (voluntary best practice).
!
MCR gaps are legal liability. A gap in a Minimum Compliance Requirement is not a security recommendation — it is a violation of a binding legal obligation with associated penalties.
!
DSR gaps are risk decisions. A gap in a Discretionary Security Requirement is a business risk decision, not a legal violation. Organizations can accept DSR risk with appropriate documentation.
✓
Frameworks can become MCRs. A voluntary framework becomes mandatory when a law, regulation, or contract specifically requires it — e.g., NIST SP 800-171 is a framework, but DFARS and CMMC make it mandatory for DoD contractors.
✓
The SCF maps both. Every SCF control is tagged MCR or DSR, enabling organizations to instantly identify which gaps are legal mandates vs. risk management decisions.
Side-by-Side Comparison
The Crossover
The most important nuance in this topic: voluntary frameworks do not stay voluntary. They become de-facto or de-jure mandatory through three distinct mechanisms.
A regulation explicitly requires adoption of a framework. The framework itself has no legal authority — but the regulation does. Non-compliance carries regulatory penalties.
Example: NIST SP 800-171 is a voluntary NIST publication. But DFARS 252.204-7012 makes it mandatory for all DoD contractors handling CUI. CMMC Level 2 further mandates third-party assessment against it.
A customer or partner requires framework compliance as a condition of doing business. The framework remains voluntary under law — but the contract makes it mandatory.
Example: SOC 2 is a voluntary AICPA framework. But enterprise customers routinely require SOC 2 Type II reports as a condition of vendor onboarding — making it a de-facto requirement for B2B SaaS companies.
Courts treat widely-adopted frameworks as the definition of “reasonable” cybersecurity. Ignoring them creates liability — not for violating the framework, but for failing to meet the standard it defines.
Example: The FTC Act requires “reasonable” data security. The NIST CSF is widely treated as evidence of reasonableness by regulators — deviation without justification is a litigation risk even without a specific legal mandate.
How the SCF Handles All Three
The SCF CCF™ maps to 200+ laws, regulations, and frameworks using the NIST IR 8477 Set Theory Relationship Mapping (STRM) methodology. Every mapped source is classified as a law, regulation, or framework — and every SCF control is tagged with its MCR/DSR status based on which mandatory sources require it.
This means organizations using the SCF know — for every control — whether implementing it satisfies a legally mandatory obligation or represents voluntary best-practice investment. There is no ambiguity about what is required vs. what is recommended.
✓
All 200+ sources classified as law, regulation, or framework in the SCF LRF catalog
✓
Every control tagged MCR (mandatory) or DSR (discretionary) based on the organization’s applicable LRF profile
✓
STRM crosswalks show exactly which specific provisions of each law/regulation/framework map to each SCF control
✓
GRC platforms can import the SCF via CSV or NIST OSCAL JSON to automate MCR tracking
Download the free SCF to access all 1,400+ controls with MCR/DSR classifications, full LRF crosswalk mappings, and STRM-documented justifications for every mapping — for all 200+ laws, regulations, and frameworks.