The SCRMS is the SCF’s holistic, technology-agnostic framework for designing, implementing, and maintaining secure, compliant, and resilient capabilities — covering an organization’s People, Processes, Technology, Data, and Facilities, regardless of how or where data is stored, processed, or transmitted.
9
SCRMS Principles
4
PDCA Phases
3
Core Components
PPTDF
Coverage Scope
The SCRMS is not a “one-size-fits-all” playbook. It is designed to be adopted and tailored to the unique size, resources, and risk circumstances of each organization.
The SCRMS expands upon and modernizes traditional Information Security Management System (ISMS) models, replacing siloed “management systems” with a single, unified operational framework that governs cybersecurity, data privacy, risk, and compliance together.
Without an overarching concept of operations for the broader GRC function, organizations find that their governance, risk, compliance, and privacy teams operate in silos — producing unclear roles, duplicated effort, and gaps in coverage. The SCRMS directly solves this.
The SCRMS is designed to be:
The SCRMS defines specific, actionable meaning for each of its three pillars — going beyond vague aspirations to concrete operational outcomes.
Being “secure” means the organization has implemented controls proportional to its risk profile across all five PPTDF dimensions. Security is not binary — it is a measurable, risk-based posture that evolves with threats and business context. This includes having defined policies, documented procedures, trained personnel, and verified technical controls that address the organization’s identified threats and vulnerabilities.
Being “compliant” means the organization has identified all applicable Minimum Compliance Requirements (MCR) from laws, regulations, and contractual obligations — and can demonstrate adherence through evidence. Compliance is not a checkbox exercise. It requires ongoing monitoring, documentation, and audit readiness across every applicable legal and regulatory jurisdiction where the organization operates.
Being “resilient” means the organization can absorb disruption, adapt to adverse events, and recover to normal operations within defined recovery time and point objectives (RTO/RPO). Resilience encompasses business continuity, disaster recovery, incident response readiness, and supply chain resilience — ensuring the organization survives and learns from adverse events.
The SCRMS is designed for any organization seeking to move beyond ad-hoc security practices to a structured, sustainable, and auditable cybersecurity program.
Establish a defensible, risk-based program with clear governance lines and measurable outcomes.
Replace fragmented compliance tracking with a unified, controls-centric approach to risk and compliance management.
Map all applicable laws, regulations, and frameworks to a common control set — reducing redundancy and audit fatigue.
Translate governance requirements into actionable technical controls mapped to actual systems, data, and processes.
The SCRMS is built on three interlocking components that together form a complete implementation system — from the control catalog through to day-to-day operational governance.
The SCF is the foundational control catalog — a comprehensive, open-source library of cybersecurity and data privacy controls covering all 33 domains. The SCF serves as the “what” — defining the specific controls an organization needs to implement.
Controls in the SCF are mapped to 261+ laws, regulations, and frameworks via Set Theory Relationship Mapping (STRM), enabling organizations to satisfy multiple compliance obligations through a single control implementation.
The SCRMS is the operational framework — defining “how” an organization builds and runs its cybersecurity program. It provides the governance model, principles, processes, and organizational accountability structures.
The SCRMS operationalizes the SCF control catalog through its nine principles and PDCA lifecycle, ensuring controls are not just selected but actually implemented, monitored, and continuously improved.
The SCRMS-PIG is a “how-to-GRC” playbook — a step-by-step guide for prioritizing and sequencing SCRMS implementation based on an organization’s risk profile, maturity level, and compliance obligations.
Rather than leaving organizations to figure out where to start, the PIG provides concrete, sequenced guidance for standing up each component of the SCRMS in a logical order that generates early wins while building toward a mature program.
The SCRMS is explicitly designed to address cybersecurity and data privacy holistically across all five dimensions of an organization — not just technology.
Most security frameworks focus primarily on technology controls. The SCRMS recognizes that security failures often originate in people (insider threats, training gaps), processes (undefined procedures, poor change management), and facilities (physical access, environmental controls) — not just technology.
Training, awareness, hiring, HR security, insider threat, access governance
Policies, standards, procedures, change management, incident handling
Systems, networks, endpoints, cloud, applications, tooling, configurations
Classification, handling, retention, privacy, encryption, data governance
Physical security, environmental controls, data center access, visitor management
The SCRMS treats controls as the central nexus of cybersecurity and data privacy operations. Unlike traditional GRC which is often process-centric, the SCRMS is controls-centric — enabling every organizational function to map to a common control language.
MCR defines the non-negotiable, mandatory requirements your organization must implement based on applicable laws, regulations, and contractual obligations. Failure to meet MCR creates legal exposure, regulatory sanctions, or contract breaches.
MCR is your compliance baseline — the floor below which you cannot go without accepting unacceptable legal liability. Every applicable law, regulation, and contractual requirement is analyzed to build your MCR.
DSR defines additional security practices an organization chooses to implement based on risk appetite, business strategy, or industry best practices — beyond what is strictly mandated. These improve security posture without being legally required.
DSR is your security aspirational ceiling — controls that harden your posture beyond the compliance floor, chosen based on threat intelligence, risk assessments, and strategic security goals.
The SCRMS uses the Plan-Do-Check-Act (PDCA) cycle as its foundational operational model — a logical way to design, build, operate, and improve a cybersecurity program over time.
Define scope, applicable laws/regs/frameworks, and risk appetite. Identify MCR and DSR. Select applicable SCF controls. Build your Minimum Security Requirements (MSR) blueprint.
Implement selected controls. Publish policies, standards, and procedures. Assign stakeholder accountability. Leverage the SCRMS as a “paint by numbers” implementation guide.
Assess control effectiveness via the SCF Conformity Assessment Program (SCF-CAP). Measure maturity using the SCR-CMM. Monitor using built-in risk and threat catalogs.
Remediate gaps from the Check phase. Update controls as laws change via the Living Control Set. Continuously improve. Prove compliance to regulators, auditors, insurers, and customers.
There are nine principles associated with the SCRMS. Together they form a complete operational methodology — from initial scoping through continuous program evolution.
Establishing context is both a due diligence and due care element of a cybersecurity program, since context changes with time. Considerations include: mission/vision/strategy; statutory, regulatory, and contractual requirements; fiscal constraints; organizational structure; applicable geographic-specific requirements; and internal and external stakeholder expectations.
A tailored set of cybersecurity and data protection controls must exist for a SCRMS implementation. This control set must be tailored to the organization’s unique requirements — a combination of Minimum Compliance Requirements (MCR) and Discretionary Security Requirements (DSR). This blend of “must have” and “nice to have” establishes the organization’s tailored control set.
The organization must define maturity expectations for its cybersecurity and data protection controls. From the SCRMS perspective, maturity expectations define entity-specific “what right looks like” for control implementation and ongoing operation. These maturity-based criteria apply across People, Processes, Technologies, Data, and Facilities (PPTDF) and directly support the organization’s security, compliance, and resilience goals.
Governance documentation is the written foundation of a cybersecurity program. This includes policies, standards, procedures, guidelines, and plans. Without published documentation, controls cannot be consistently applied, audited, or enforced. The SCF provides a direct mapping between controls and the governance documentation required to support them.
Every control must have an owner. Accountability structures ensure that cybersecurity responsibilities are clearly assigned to specific roles across the organization — not just the security team. This includes executives (risk ownership), managers (policy enforcement), and operational staff (procedure execution). Undefined accountability is one of the most common root causes of control failures.
Not all controls carry equal risk weight. Organizations with finite resources must prioritize implementation based on risk exposure, compliance criticality, and threat relevance. The SCRMS provides guidance for risk-based prioritization so that the most impactful controls are implemented first — ensuring early risk reduction even before a complete control set is in place.
Situational awareness is achieved through continuous monitoring, metrics collection, and periodic assessments. This principle covers logging, monitoring, alerting, and audit programs. Without situational awareness, organizations cannot detect incidents, measure control effectiveness, or demonstrate compliance. The SCRMS aligns this principle directly to the Check phase of the PDCA cycle.
Risk management is the engine of the SCRMS Act phase. It encompasses: identifying and treating current deficiencies, assessing emerging threats and vulnerabilities, making risk acceptance decisions, tracking remediation, and reporting risk status to stakeholders. The SCF’s risk management controls (GOV, RSK domains) provide the specific control requirements for building a functional risk management function.
The SCRMS is a living system. Cybersecurity threats, business contexts, and regulatory landscapes all change over time. Organizations must build continuous improvement into the SCRMS lifecycle — reviewing the program periodically, updating controls and governance documentation, reassessing risk, and incorporating lessons learned from incidents and audits into the next planning cycle.
Now that you understand how the SCRMS works, explore the core tools and resources you’ll need to implement it.
Get the full SCF spreadsheet — the control catalog, STRM mappings, and domain structure that powers the SCRMS.
Explore all 33 SCF domains and understand how the Universal Control Taxonomy organizes every control.
See all 261+ laws, regulations, and frameworks mapped in the SCF — your complete compliance coverage map.
Understand how Set Theory Relationship Mapping (NIST IR 8477) proves SCF controls satisfy LRF requirements.
The SCF and SCRMS are free and open-source. Download the full control catalog and begin building your tailored cybersecurity program.