Secure Controls Framework
↓ Download SCF
GRC Fundamentals ▼
SCF Certified ▼
Organization-Level SCF Certifications
SCF Conformity Assessment Program (CAP)SCF Assessment Guides
SCF Training & Individual-Level Certifications
SCF PractitionerSCF ArchitectSCF Assessor
FAQAboutSwag

GRC Fundamentals · Assurance · Due Diligence · Due Care

The Output of GRC Practices

Effective GRC programs produce measurable outputs: cybersecurity assurance backed by due diligence documentation and due care evidence. The Common Controls Framework™ (CCF™) provides the control catalog that makes this assurance auditable, defensible, and continuously verifiable.

Learn More About GRC

Common Controls Framework™ (CCF™)

The SCF is the exclusive, trademarked Common Controls Framework™ (CCF™) — a Living Control Set with 33 domains, 1,400+ controls, and mappings to 200+ laws, regulations & frameworks. The SCF's Evidence Request List (ERL) links every control to specific audit evidence — closing the loop between GRC practices and verifiable assurance.

Cybersecurity Assurance

What Does Effective GRC Actually Produce?

The measurable output of a GRC program is cybersecurity assurance — The National Institute of Standards and Technology (NIST) defines assurance  as, "grounds for justified confidence that a [security or privacy] claim has been or will be achieved." Assurance is a measure of confidence..

Too often, GRC programs are judged by the policies they write, the audits they pass, or the certifications they achieve. But the true output is organizational resilience and legal defensibility: the ability to demonstrate — to regulators, auditors, customers, and the board — that cybersecurity controls are identified, implemented, operating, and monitored.

The SCF Common Controls Framework™ closes the gap between GRC intent and demonstrable assurance by providing a unified control catalog that maps every control to applicable evidence artifacts, audit criteria, and framework mappings simultaneously.

Assurance = Due Diligence + Due Care

Due diligence is the documentation of what the organization is required to do and what it has decided to do. Due care is the evidence that it is actually doing it. Both are required for full cybersecurity assurance. Neither alone is sufficient.

Core Outputs

Due Diligence vs. Due Care — The Two Pillars of Assurance

Both are required. One without the other leaves dangerous gaps in legal defensibility, audit readiness, and genuine cybersecurity program maturity.

Due Diligence

Documentation of Obligations & Intent

Due diligence is the GRC function's planning and documentation output — evidence that the organization has identified its obligations, understood them, and made explicit decisions about how to address them. ✓ Compliance obligation register (MCR + DSR) ✓ Policies and standards documents ✓ Risk assessments and risk register entries ✓ RASCI / ownership assignments ✓ Board and executive awareness briefings ✓ Framework gap analyses ✓ Third-party contract provisions (TPRM) ✓ Decisions to accept, transfer, or mitigate risk

Due Care

Evidence That Controls Are Operating

Due care is the GRC program's execution and operations output — evidence that the organization is actually running the controls it said it would, generating artifacts that prove ongoing compliance and security. ✓ SOP execution logs and records ✓ Configuration baselines and change records ✓ Security training completion records ✓ Vulnerability scan results and remediation tracking ✓ Access review certifications ✓ Incident response records ✓ Audit findings and remediation evidence ✓ Evidence Request List (ERL) artifacts

Why Organizations Fail at Assurance

Most GRC failures result from an imbalance: excellent due diligence (great policies on paper) with poor due care (controls not actually operating), or accidental due care (controls running but no documentation of why or how). The SCF's Evidence Request List (ERL) directly addresses this by pre-mapping every SCF control to the specific evidence artifacts that demonstrate due care — closing the policy-to-practice gap.

Assurance

Assurance Is More Than Compliance

When done right, assurance should address three key areas of stakeholder concern: security, compliance and resilience. The degree of assurance a stakeholder gains from a third-party cybersecurity certification is limited by the scope of the assessed controls and the level of rigor used to perform the assessment.

Security

Are the appropriate controls in place to protect the system, initiative or organization from reasonable risks and threats? Security assurance means demonstrating that controls are not just documented but are actually operating to mitigate identified threats. → Controls are identified and scoped to actual risks → Implementation is verified, not assumed → Ongoing monitoring detects control degradation → Threat landscape changes trigger control reassessment

Compliance

Do we have reasonable evidence of due diligence and due care to demonstrate compliance with applicable laws, regulations and contractual obligations? Compliance assurance requires documented proof that obligations are understood and actively met. → Applicable laws, regulations and frameworks are mapped → Due diligence documentation exists for all obligations → Due care evidence proves controls are operating → The ERL pre-maps required evidence per control

Resilience

Are we capable of withstanding and recovering from reasonable cybersecurity incidents? Resilience assurance demonstrates that the organization can maintain critical functions through disruption and restore normal operations within acceptable timeframes. → Business continuity and disaster recovery plans exist → Incident response procedures are tested regularly → Recovery time objectives are defined and achievable → Resilience controls are integrated across all domains

SCF Evidence Framework

The Evidence Request List (ERL) — Making Assurance Auditable

The SCF's Evidence Request List (ERL) is a critical GRC output tool that pre-maps every control in the Common Controls Framework™ to the specific evidence artifacts an auditor, regulator, or assessor would request to verify due care.

Rather than discovering what evidence is needed during an audit (and scrambling to produce it), organizations using the SCF ERL know in advance exactly what artifacts must exist to satisfy each control. This transforms GRC from a reactive audit response to a proactive assurance program. ✓ Pre-mapped to all 1,400+ SCF controls ✓ Organized by control domain for efficient evidence collection ✓ Cross-referenced to framework mappings (HIPAA, PCI, NIST, ISO, etc.) ✓ Supports both internal audit and third-party assessment ✓ Available as part of the free CCF™ download

Explore the ERL →

Governance Output

RASCI — Assigning Control Ownership

A critical governance output is the clear assignment of control ownership. The RASCI model ensures every control has a defined Responsible, Accountable, Supportive, Consulted, and Informed party — eliminating accountability gaps.

R — Responsible: Does the work. Control operator — executes the SOP and generates due care evidence. A — Accountable: Owns the outcome. Control owner — ultimately responsible for control effectiveness and compliance. S — Supportive: Provides support. Assists Responsible party; often provides technical resources or tooling. C — Consulted: Provides input. Subject matter experts (legal, IT, privacy) consulted on control design. I — Informed: Kept in the loop. Executives, audit, board — informed of control status and risk posture.

Role

RASCI Meaning

GRC Responsibility

R — Responsible

Does the work

Control operator — executes the SOP and generates due care evidence

A — Accountable

Owns the outcome

Control owner — ultimately responsible for control effectiveness and compliance

S — Supportive

Provides support

Assists Responsible party; often provides technical resources or tooling

C — Consulted

Provides input

Subject matter experts (legal, IT, privacy) consulted on control design

I — Informed

Kept in the loop

Executives, audit, board — informed of control status and risk posture

Role

RASCI Meaning

GRC Responsibility

Why RASCI Is a Critical GRC Output

Without documented RASCI assignments, cybersecurity controls operate in an accountability vacuum. When an incident occurs or an auditor asks "who owns this control?", the inability to provide a clear, documented answer is itself a governance failure — and a signal to regulators that the program lacks operational rigor. The SCF control catalog includes RASCI guidance for all 33 domains.

Assurance Audiences

GRC Outputs Serve Multiple Audiences

01

Regulators & Auditors

Require due diligence documentation (policies) and due care evidence (SOP artifacts, logs, reports) to verify compliance with applicable laws and regulations. The ERL pre-maps all required evidence.

02

Board of Directors

Requires risk-contextualized reporting: which controls are implemented, which gaps remain, what the residual risk is, and how the program is maturing against benchmarks like the SCR-CMM.

03

Customers & Partners

Third-party risk management programs require evidence of your security controls. SCF TPRM questionnaire templates and ERL artifacts make customer assessments efficient and audit-friendly.

04

Legal Counsel

In litigation and data breach scenarios, due diligence and due care documentation is the difference between an affirmative defense and liability. The SCF’s comprehensive control catalog and ERL support legal defensibility.

05

GRC Platforms

The SCF is used by leading GRC platforms worldwide. Importable as .csv or NIST OSCAL JSON, the CCF™ integrates directly into tool-driven GRC workflows — automating evidence collection and control tracking.

06

Insurance Underwriters

Cyber insurance underwriters increasingly require evidence of a functioning GRC program. Organizations with documented MCR + DSR frameworks and ERL-backed evidence demonstrate lower risk profiles.

Start Producing Real GRC Assurance — Free

Download the complete Common Controls Framework™ including all 1,400+ controls, the Evidence Request List (ERL), and NIST OSCAL JSON export. Build a GRC program that produces genuine, auditable assurance — at no cost.

Go To The SCF Download PageLearn More About GRC

Creative Commons Attribution-NoDerivatives 4.0 International (CC BY-ND 4.0)