Common Controls Framework™ (CCF™)
The SCF is the exclusive, trademarked Common Controls Framework™ (CCF™) — a Living Control Set with 33 domains, 1,400+ controls, and mappings to 200+ laws, regulations & frameworks. The SCF's Evidence Request List (ERL) links every control to specific audit evidence — closing the loop between GRC practices and verifiable assurance.
Cybersecurity Assurance
The measurable output of a GRC program is cybersecurity assurance — The National Institute of Standards and Technology (NIST) defines assurance as, "grounds for justified confidence that a [security or privacy] claim has been or will be achieved." Assurance is a measure of confidence..
Too often, GRC programs are judged by the policies they write, the audits they pass, or the certifications they achieve. But the true output is organizational resilience and legal defensibility: the ability to demonstrate — to regulators, auditors, customers, and the board — that cybersecurity controls are identified, implemented, operating, and monitored.
The SCF Common Controls Framework™ closes the gap between GRC intent and demonstrable assurance by providing a unified control catalog that maps every control to applicable evidence artifacts, audit criteria, and framework mappings simultaneously.
Assurance = Due Diligence + Due Care
Due diligence is the documentation of what the organization is required to do and what it has decided to do. Due care is the evidence that it is actually doing it. Both are required for full cybersecurity assurance. Neither alone is sufficient.
Core Outputs
Both are required. One without the other leaves dangerous gaps in legal defensibility, audit readiness, and genuine cybersecurity program maturity.
Documentation of Obligations & Intent
Due diligence is the GRC function's planning and documentation output — evidence that the organization has identified its obligations, understood them, and made explicit decisions about how to address them. ✓ Compliance obligation register (MCR + DSR) ✓ Policies and standards documents ✓ Risk assessments and risk register entries ✓ RASCI / ownership assignments ✓ Board and executive awareness briefings ✓ Framework gap analyses ✓ Third-party contract provisions (TPRM) ✓ Decisions to accept, transfer, or mitigate risk
Evidence That Controls Are Operating
Due care is the GRC program's execution and operations output — evidence that the organization is actually running the controls it said it would, generating artifacts that prove ongoing compliance and security. ✓ SOP execution logs and records ✓ Configuration baselines and change records ✓ Security training completion records ✓ Vulnerability scan results and remediation tracking ✓ Access review certifications ✓ Incident response records ✓ Audit findings and remediation evidence ✓ Evidence Request List (ERL) artifacts
Why Organizations Fail at Assurance
Most GRC failures result from an imbalance: excellent due diligence (great policies on paper) with poor due care (controls not actually operating), or accidental due care (controls running but no documentation of why or how). The SCF's Evidence Request List (ERL) directly addresses this by pre-mapping every SCF control to the specific evidence artifacts that demonstrate due care — closing the policy-to-practice gap.
Assurance
When done right, assurance should address three key areas of stakeholder concern: security, compliance and resilience. The degree of assurance a stakeholder gains from a third-party cybersecurity certification is limited by the scope of the assessed controls and the level of rigor used to perform the assessment.
Are the appropriate controls in place to protect the system, initiative or organization from reasonable risks and threats? Security assurance means demonstrating that controls are not just documented but are actually operating to mitigate identified threats. → Controls are identified and scoped to actual risks → Implementation is verified, not assumed → Ongoing monitoring detects control degradation → Threat landscape changes trigger control reassessment
Do we have reasonable evidence of due diligence and due care to demonstrate compliance with applicable laws, regulations and contractual obligations? Compliance assurance requires documented proof that obligations are understood and actively met. → Applicable laws, regulations and frameworks are mapped → Due diligence documentation exists for all obligations → Due care evidence proves controls are operating → The ERL pre-maps required evidence per control
Are we capable of withstanding and recovering from reasonable cybersecurity incidents? Resilience assurance demonstrates that the organization can maintain critical functions through disruption and restore normal operations within acceptable timeframes. → Business continuity and disaster recovery plans exist → Incident response procedures are tested regularly → Recovery time objectives are defined and achievable → Resilience controls are integrated across all domains
SCF Evidence Framework
The SCF's Evidence Request List (ERL) is a critical GRC output tool that pre-maps every control in the Common Controls Framework™ to the specific evidence artifacts an auditor, regulator, or assessor would request to verify due care.
Rather than discovering what evidence is needed during an audit (and scrambling to produce it), organizations using the SCF ERL know in advance exactly what artifacts must exist to satisfy each control. This transforms GRC from a reactive audit response to a proactive assurance program. ✓ Pre-mapped to all 1,400+ SCF controls ✓ Organized by control domain for efficient evidence collection ✓ Cross-referenced to framework mappings (HIPAA, PCI, NIST, ISO, etc.) ✓ Supports both internal audit and third-party assessment ✓ Available as part of the free CCF™ download
Explore the ERL →Governance Output
A critical governance output is the clear assignment of control ownership. The RASCI model ensures every control has a defined Responsible, Accountable, Supportive, Consulted, and Informed party — eliminating accountability gaps.
Why RASCI Is a Critical GRC Output
Without documented RASCI assignments, cybersecurity controls operate in an accountability vacuum. When an incident occurs or an auditor asks "who owns this control?", the inability to provide a clear, documented answer is itself a governance failure — and a signal to regulators that the program lacks operational rigor. The SCF control catalog includes RASCI guidance for all 33 domains.
Assurance Audiences
01
Require due diligence documentation (policies) and due care evidence (SOP artifacts, logs, reports) to verify compliance with applicable laws and regulations. The ERL pre-maps all required evidence.
02
Requires risk-contextualized reporting: which controls are implemented, which gaps remain, what the residual risk is, and how the program is maturing against benchmarks like the SCR-CMM.
03
Third-party risk management programs require evidence of your security controls. SCF TPRM questionnaire templates and ERL artifacts make customer assessments efficient and audit-friendly.
04
In litigation and data breach scenarios, due diligence and due care documentation is the difference between an affirmative defense and liability. The SCF’s comprehensive control catalog and ERL support legal defensibility.
05
The SCF is used by leading GRC platforms worldwide. Importable as .csv or NIST OSCAL JSON, the CCF™ integrates directly into tool-driven GRC workflows — automating evidence collection and control tracking.
06
Cyber insurance underwriters increasingly require evidence of a functioning GRC program. Organizations with documented MCR + DSR frameworks and ERL-backed evidence demonstrate lower risk profiles.
Download the complete Common Controls Framework™ including all 1,400+ controls, the Evidence Request List (ERL), and NIST OSCAL JSON export. Build a GRC program that produces genuine, auditable assurance — at no cost.
Creative Commons Attribution-NoDerivatives 4.0 International (CC BY-ND 4.0)