The SCF organizes 1,400+ controls into 33 logically structured domains — every aspect of cybersecurity and data privacy covered in a single, unified taxonomy. Each domain contains numbered principles so that GOV-03 means the same thing to every organization using the SCF, worldwide.
Search by name, code, or keyword. Filter by category. Click any card to expand its full description, related keywords, and example controls.
Execute a documented, risk-based program that supports business objectiveswhile encompassing appropriate cybersecurity & data protection principles thataddresses applicable statutory, regulatory and contractual obligations
Ensure trustworthy and resilient Artificial Intelligence (AI) and autonomoustechnologies to achieve a beneficial impact by informing, advising or simplifyingtasks, while minimizing emergent properties or unintended consequences.
Manage all technology assets from purchase through disposition, both physicaland virtual, to ensure secured use, regardless of the asset?s location.
Maintain a resilient capability to sustain business-critical functions whilesuccessfully responding to and recovering from incidents throughwell-documented and exercised processes
Govern the current and future capacities and performance of technology assets.
Manage change in a sustainable and ongoing manner that involves activeparticipation from both technology and business stakeholders to ensure that onlyauthorized changes occur.
Govern cloud instances as an extension of on-premise technologies with equal orgreater security protections than the organization?s own internal cybersecurity &data privacy controls.
Oversee the execution of cybersecurity & data privacy controls to ensureappropriate evidence required due care and due diligence exists to meetcompliance with applicable statutory, regulatory and contractual obligations.
Enforce secure configurations according to vendor-recommended andindustry-recognized secure practices that enforce the concepts of ?least privilege?and ?least functionality?for all systems, applications and services.
Maintain situational awareness of security-related events through the centralizedcollection and analysis of event logs from systems, applications and services.
Utilize appropriate cryptographic solutions and industry-recognized keymanagement practices to protect the confidentiality and integrity ofsensitive/regulated data both at rest and in transit.
Enforce a standardized data classification methodology to objectively determinethe sensitivity and criticality of all data and technology assets so that properhandling and disposal requirements can be followed.
Provide additional scrutiny to reduce the risks associated with embedded technology,based on the potential damages posed from malicious use of the technology.
Harden endpoint devices to protect against reasonable threats to those devices and thedata those devices store, transmit and process.
Execute sound hiring practices and ongoing personnel management to cultivate acybersecurity & data privacy-minded workforce.
Enforce the concept of ?least privilege?consistently across all systems, applications andservices for individual, group and service accounts through a documented andstandardized Identity and Access Management (IAM) capability.
Maintain a viable incident response capability that trains personnel on how to recognizeand report suspicious activities so that trained incident responders can take the appropriatesteps to handle incidents, in accordance with a documented Incident Response Plan (IRP).
Execute an impartial assessment process to validate the existence and functionality ofappropriate cybersecurity & data privacy controls, prior to a system, application or servicebeing used in a production environment.
Proactively maintain technology assets, according to current vendor recommendations forconfigurations and updates, including those supported or hosted by third-parties.
Implement measures to restrict mobile device connectivity with critical infrastructure andsensitive/regulated data that limit the attack surface and potential data exposure frommobile device usage.
Architect and implement a secure and resilient defense-in-depth methodology that enforcesthe concept of ?least functionality?through restricting network access to systems,applications and services.
Protect physical environments through layers of physical security and environmentalcontrols that work together to protect both physical and digital assets from theft anddamage.
Align data privacy practices with industry-recognized data privacy principles to implementappropriate administrative, technical and physical controls to protect regulated personaldata throughout the lifecycle of systems, applications and services.
Operationalize a viable strategy to achieve cybersecurity & data privacy objectives thatestablishes cybersecurity as a key stakeholder within project management practices toensure the delivery of resilient and secure solutions.
Proactively identify, assess, prioritize and remediate risk through alignment withindustry-recognized risk management principles to ensure risk decisions adhere tothe organization's risk threshold.
Utilize industry-recognized secure engineering and architecture principles to deliversecure and resilient systems, applications and services.
Execute the delivery of cybersecurity & data privacy operations to provide qualityservices and secure systems, applications and services that meet the organization'sbusiness needs.
Foster a cybersecurity & data privacy-minded workforce through ongoing usereducation about evolving threats, compliance obligations and secure workplacepractices.
Develop and/or acquire systems, applications and services according to a SecureSoftware Development Framework (SSDF) to reduce the potential impact ofundetected or unaddressed vulnerabilities and design flaws.
Execute Supply Chain Risk Management (SCRM) practices so that only trustworthythird-parties are used for products and/or service delivery.
Proactively identify and assess technology-related threats, to both assets andbusiness processes, to determine the applicable risk and necessary corrective action
Leverage industry-recognized Attack Surface Management (ASM) practices tostrengthen the security and resilience systems, applications and services againstevolving and sophisticated attack vectors.
Ensure the security and resilience of Internet-facing technologies through secureconfiguration management practices and monitoring for anomalous activity
The SCF's naming convention is a core feature of the Common Controls Framework™. Every control is identified by a three-letter domain code plus a sequential number — enabling universal, inter-organizational control language that removes ambiguity.
Inter-organizational standardization: GOV-03 means the same thing to your organization as it does to any other SCF user — a vendor, assessor, regulator, or partner. That shared language is uniquely valuable.
Living Control Set (LCS): Domain codes and control numbers are stable even as controls are updated — making version management across GRC tools predictable and reliable.
See every law, regulation, and framework mapped into the SCF — from NIST CSF to GDPR to PCI DSS.
How NIST IR 8477 STRM methodology makes SCF control mappings mathematically transparent and defensible.
Get the full SCF with all 33 domains, 1,400+ controls, and 200+ framework mappings — free forever.
Download the complete SCF and start building your unified cybersecurity control program today.