Secure Controls Framework
↓ Download SCF
GRC Fundamentals ▼
SCF Certified ▼
Organization-Level SCF Certifications
SCF Conformity Assessment Program (CAP)SCF Assessment Guides
SCF Training & Individual-Level Certifications
SCF PractitionerSCF ArchitectSCF Assessor
FAQAboutSwag
Start Here

What Is The Secure Controls Framework?

The Secure Controls Framework™ (SCF) makes compliance a natural byproduct of secure practices. It is the world's most comprehensive, free cybersecurity and data privacy metaframework — and the exclusive Common Controls Framework™ (CCF). With 1,400+ controls across 33 domains and mappings to 200+ laws, regulations, and frameworks, the SCF is the single source of truth for building a secure, compliant, and resilient organization.

33
Domains
1,400+
Controls
200+
Laws & Frameworks
FREE
Creative Commons
The Short Answer

A Metaframework That Unifies Everything

The SCF focuses on internal controls — the cybersecurity and privacy-related policies, standards, procedures, technologies, and processes designed to provide reasonable assurance that business objectives will be achieved and undesired events will be prevented, detected, and corrected.

In simple terms, the SCF is a metaframework — a “framework of frameworks” — that distills 200+ cybersecurity and data privacy laws, regulations, and frameworks into a single unified control catalog. Instead of maintaining separate control sets for HIPAA, SOC 2, ISO 27001, NIST CSF, and PCI DSS, organizations use one SCF control set that satisfies all of them simultaneously.

Common Controls Framework™ (CCF): The SCF holds exclusive trademark rights to the Common Controls Framework™. The domains commoncontrolsframework.com and common-controls-framework.com both redirect to the SCF. This distinction is unique among all cybersecurity frameworks.

A Blueprint for Your Program

Building Your Cybersecurity & Data Privacy Program

The SCF can be viewed as a long-term tool — not only to help with compliance-related efforts, but to ensure security and privacy principles are properly designed, implemented, and maintained.

The SCF helps implement a holistic approach to protecting the Confidentiality, Integrity, Availability, and Safety (CIAS) of your data, systems, applications, and processes. The approach looks at the following spheres of influence to identify applicable controls:

  • Statutory obligations — laws that apply to your organization
  • Regulatory obligations — agency regulations and enforcement frameworks
  • Contractual obligations — customer and partner security requirements
  • Industry-recognized best practices — voluntary frameworks like CIS, NIST CSF, ISO 27001

It is best to visualize the SCF as a buffet of 1,400+ cybersecurity and privacy controls. Once you know your applicable requirements, you select the controls that are right-sized for your organization — since every organization has unique needs.

SCFControlsContractualRegulatoryStatutoryBest Practices

The SCF sits at the center of all applicable obligations

Scope & Limitations

What The SCF Is — And Is Not

Understanding what the SCF does and does not do is essential to using it effectively. There's no sales pitch — the SCF is free. But it's not a magic bullet either.

✓ The SCF Is

  • A comprehensive catalog of 1,400+ cybersecurity & privacy controls
  • A metaframework — the Common Controls Framework™ (CCF) — exclusively trademarked
  • A Living Control Set (LCS) — continuously updated as laws and frameworks evolve
  • A “Rosetta Stone” for normalizing control language across organizations
  • Free to use under Creative Commons licensing — no cost, no registration required
  • Expert-derived content from volunteer cybersecurity specialists worldwide
  • Importable as .CSV or NIST OSCAL JSON into any GRC platform
  • Built with transparent NIST IR 8477 STRM mapping methodology
  • Includes built-in risk catalog, threat catalog, and capability maturity criteria

✗ The SCF Is Not

  • A substitute for performing compliance due diligence specific to your organization
  • A complete documentation solution (policies, standards, and procedures are still required)
  • Infallible — mappings are expert-derived assessments, not legally certified opinions
  • A technology solution — it governs requirements, not implementations
  • A guaranteed path to certification for any specific standard
  • Designed for organizations with only 1–2 simple compliance requirements
  • A replacement for qualified security professionals and legal counsel
  • A one-size-fits-all template — it requires tailoring to your organizational context

For organizations with 3 or more compliance requirements (e.g., NIST CSF + ISO 27001 + HIPAA + SOC 2 + PCI DSS), the SCF is an extraordinarily efficient solution — one well-worded control addresses multiple requirements simultaneously, since the same password requirement appears in dozens of laws and frameworks.

Our Philosophy

Built To Fix A Broken Industry

Cybersecurity is a protracted war on an asymmetric battlefield. As defenders, we have to work together — we all suffer when massive data breaches occur or when cyber attacks have physical impacts.

The SCF was created to help organizations do better with their cybersecurity practices. Hackers share attack methods freely. Why shouldn't defenders share defense methods? The SCF was built by volunteers who believe that better security practices benefit everyone.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

The SCF went live in 2018 and has grown to worldwide adoption — used by some of the largest corporations and governments globally. Its volunteers include auditors, engineers, architects, incident responders, consultants, and GRC specialists who donate their expertise because the security community wins when every organization has access to world-class controls guidance.

There is no financial incentive to push the SCF on anyone — it is completely free. The SCF Council exists purely because improving the security posture of organizations everywhere benefits society as a whole.

Our Philosophy

More Than Just A Control Set

Where the SCF sets itself apart from every other metaframework is the depth of supporting content included — all for free.

01

Capability Maturity Criteria

Each control includes maturity criteria via the SCR-CMM, defining what “right” looks like at each maturity level — from basic documentation through optimized, automated controls.

SCR-CMM
Maturity-Graded
02

Proposed Control Weighting

Not all controls carry equal risk weight. The SCF includes proposed control weightings to help prioritize remediation and resource allocation — critical in risk management decisions.

Risk-Weighted
Prioritization
03

Built-In Risk Catalog

Risks are mapped directly to SCF controls. The SCR-RMM describes how policies, standards, procedures, metrics, threats, and risks all connect through controls as the central nexus.

SCR-RMM
Risk-Informed
04

Built-In Threat Catalog

Threats are mapped to controls for threat-informed defense. Understanding which threats each control addresses helps right-size security investment based on your actual threat landscape.

Threat-Mapped
Threat Intel
05

Living Control Set (LCS)

The SCF is continuously updated as laws change, frameworks publish new versions, and emerging threats demand new controls. It evolves so your program stays current without heroic effort.

Always Current
LCS
06

GRC Platform Integration

Import the entire SCF into your GRC platform via .CSV or NIST OSCAL JSON. Natively supported by dozens of enterprise GRC tools globally. No proprietary lock-in.

.CSV
NIST Oscal json
Security, Compliance & Resilience Management System

SCRMS: Controls at the Center of Everything

The SCF uses the Security, Compliance & Resilience Management System (SCRMS) — a comprehensive implementation system that treats controls as the central nexus of cybersecurity and data privacy operations. Unlike traditional GRC which is often process-centric, the SCRMS is controls-centric. In the SCRMS, controls are viewed as the nexus — or central pivoting point — for an organization’s cybersecurity program. Not just policies and standards map to controls, but procedures, metrics, threats, and risks as well. This ties everything together into a cohesive, operationalizable framework that any CISO or GRC Director can implement.

Must Have

Minimum Compliance Requirements (MCR)

MCR defines the non-negotiable, mandatory requirements your organization must implement based on applicable laws, regulations, and contractual obligations. Failure to meet MCR creates legal exposure, regulatory sanctions, or contract breaches.

MCR is your compliance baseline: the floor below which you cannot go without accepting unacceptable risk or legal liability.

Mandatory
Statutory
regulatory
contractual
Nice To Have

Discretionary Security Requirements (DSR)

DSR defines additional security practices an organization chooses to implement based on risk appetite, business strategy, or industry best practices — beyond what is strictly mandated. These improve security posture without being legally required.

DSR is your security aspirational ceiling — the “nice to have” controls that harden your posture beyond the compliance floor.

voluntary
risk-based
best practice
Plan, Do, Check, Act

PDCA Approach to Cybersecurity & Data Protection

The SCF implements the PDCA (Plan-Do-Check-Act) cycle as the foundational approach to building and operating a cybersecurity program. Each phase maps directly to the SCRMS and the SCF control structure.

P

Plan

Define scope, applicable laws/regs/frameworks, and risk appetite. Identify MCR and DSR. Select applicable SCF controls. Build your Minimum Security Requirements (MSR) blueprint.

D

Do

Implement selected controls. Publish policies, standards, and procedures. Assign stakeholder accountability. Leverage the SCRMS as a “paint by numbers” implementation guide.

C

Check

Assess control effectiveness via the SCF Conformity Assessment Program (SCF-CAP). Measure maturity using the SCR-CMM. Monitor using built-in risk and threat catalogs.

A

Act

Remediate gaps from the Check phase. Update controls as laws change via the Living Control Set. Continuously improve. Prove compliance to regulators, auditors, insurers, and customers.

Design Philosophy

Cybersecurity & Privacy By Design

The SCF is built on the principle that security and privacy must be “baked in” — not bolted on. Two complementary design philosophies underpin the entire framework.

SbD

Security by Design (SbD)

Security by Design means security is addressed at the strategic, operational, and tactical levels — built into the design of systems, processes, and products from the start rather than applied as an afterthought. The SCF’s 33-domain structure enforces SbD by providing controls at every layer of the organization — from governance (GOV) through technical controls (NET, IAC, CRY) and operations (IRO, MON, VPM). Requirements originate from statutory law, regulatory agencies, contractual obligations, and industry best practices. The SCF distills all of these into a single, consistent security design language.

strategic
Operational
tactical
PbD

Privacy by Design (PbD)

Privacy by Design is the principle that privacy must be proactively embedded into the design of IT systems, business practices, and physical infrastructure — not added on, but built as a default. The SCF’s Privacy (PRI) domain contains 40+ controls aligned to GDPR, CCPA/CPRA, PIPEDA, and global privacy regulations, covering DSARs, PIAs, DPIAs, consent management, and more. The SCF treats cybersecurity and privacy as inseparable — both are necessary conditions of a mature, defensible program that can withstand external scrutiny. The SCF distills all of these into a single, consistent privacy design language.

gdpr
ccpa/cpra
dsar
dpia
Mapping Methodology

How The SCF Is Mapped

The SCF uses the NIST IR 8477 Set Theory Relationship Mapping (STRM) methodology — a transparent, mathematically rigorous approach to crosswalking cybersecurity frameworks.

Unlike frameworks that use subjective “close enough” mapping, the STRM methodology applies set theory concepts (subset, superset, intersection, equal) to define the precise relationship between any two controls in different frameworks.

  • Mappings are transparent and reproducible — not black-box guesswork
  • Relationships are directional — knowing if SCF fully satisfies a requirement (or only partially)
  • Gaps are clearly identified — no hidden coverage holes
  • Mappings can be validated, challenged, and updated by the community

The SCF is the only major cybersecurity metaframework that participates in the NIST OLIR (Online Informative Reference) program — providing machine-readable, NIST-registered control crosswalks.

STRM Relationship Types
Subset
SCF control is a subset of the requirement (partial coverage)
Superset
SCF control goes beyond the requirement (full + extra coverage)
Intersection
Partial overlap — both controls share common scope
=
Equal
Functionally equivalent — complete bidirectional satisfaction

The SCF participates in the NIST OLIR program — providing machine-readable, NIST-registered crosswalks that are publicly available and independently verifiable.

Ready To Simplify Your Compliance Program?

Download the SCF free and start building your unified cybersecurity control set today.