Security & Governance Frameworks
Comprehensive guide to security and governance frameworks including ISO 27001, SOC 2, NIST CSF, CMMC, NIS2, DORA, and more. Learn which framework fits your organization's security posture and compliance requirements.
SOC 2
SOC 2: The Complete Guide to Compliance
SOC 2 is the leading security compliance framework for SaaS companies selling to US enterprises. This guide covers Type I vs Type II, trust service criteria, costs, and the audit process.
Learn moreISO 27001
ISO 27001: The Complete Guide to Certification
ISO 27001 is the international gold standard for information security management. This guide covers everything from scoping to certification, with real costs, timelines, and practical implementation advice.
Learn moreNIST CSF
NIST Cybersecurity Framework (CSF): Complete Guide
The NIST Cybersecurity Framework provides a flexible, risk-based approach to managing cybersecurity risk. Learn how CSF 2.0 helps organizations of all sizes improve their security posture.
Learn moreCMMC
CMMC: Cybersecurity Maturity Model Certification Guide
CMMC 2.0 is the DoD's framework for verifying cybersecurity practices among defense contractors. Learn about the three certification levels and how to prepare for assessment.
Learn moreCIS Controls
CIS Critical Security Controls: Implementation Guide
CIS Critical Security Controls provide a prioritized set of 18 cybersecurity best practices. Learn how to implement CIS Controls v8.1 based on your organization's size and resources.
Learn moreCOBIT
COBIT 2019: IT Governance Framework Guide
COBIT 2019 is a leading IT governance framework that aligns IT with business objectives. Learn how its 40 governance and management objectives improve enterprise IT performance.
Learn moreCOSO
COSO Internal Control Framework: Complete Guide
COSO Internal Control - Integrated Framework is the standard for designing and evaluating internal controls, especially for SOX compliance. Learn its five components and 17 principles.
Learn moreCyber Essentials
Cyber Essentials: UK Government Cybersecurity Certification
Cyber Essentials is the UK government-backed certification covering five essential cybersecurity controls. Learn about basic and Plus certification levels and their requirements.
Learn moreDORA
DORA: Digital Operational Resilience Act Guide
DORA establishes ICT risk management and resilience requirements for EU financial entities. Learn how to comply with this regulation covering testing, incidents, and third-party risk.
Learn moreEssential Eight
Essential Eight: Australian Cybersecurity Maturity Model
The Essential Eight is Australia's prioritized cybersecurity mitigation strategies from ASD. Learn how to implement these eight controls across four maturity levels.
Learn moreIRAP
IRAP: Australian Government Security Assessment Guide
IRAP is Australia's framework for assessing ICT systems handling government data. Learn how IRAP assessments work and what cloud providers need to serve Australian government clients.
Learn moreISO 22301
ISO 22301: Business Continuity Management Guide
ISO 22301 is the international standard for business continuity management systems. Learn how to build organizational resilience through structured continuity planning and testing.
Learn moreISO 27002
ISO 27002: Guide to Information Security Controls
ISO 27002 provides detailed implementation guidance for the 93 information security controls referenced by ISO 27001. Learn how to use it as your control selection and implementation companion.
Learn moreISO 27017
ISO 27017: Cloud Security Controls Guide
ISO 27017 provides cloud-specific security controls and implementation guidance for cloud service providers and customers. Learn how it extends ISO 27001 for cloud environments.
Learn moreISO 27018
ISO 27018: Protecting Personal Data in the Cloud
ISO 27018 sets controls for protecting personally identifiable information in public cloud services. Learn how it helps cloud providers demonstrate PII protection compliance.
Learn moreISO 27701
ISO 27701: Privacy Information Management System Guide
ISO 27701 extends ISO 27001 with a privacy information management system (PIMS). Learn how it helps organizations demonstrate GDPR compliance and manage personal data responsibly.
Learn moreISO 31000
ISO 31000: Risk Management Framework Guide
ISO 31000 provides universal risk management principles and guidelines applicable to any organization. Learn how to implement a structured approach to identifying and treating risks.
Learn moreNIS2
NIS2 Directive: EU Cybersecurity Regulation Guide
NIS2 is the EU directive expanding cybersecurity obligations to more sectors and introducing stricter incident reporting. Learn who it affects and what compliance requires.
Learn moreNIST 800-171
NIST SP 800-171: Protecting Controlled Unclassified Information
NIST SP 800-171 defines 110 security requirements for protecting CUI in nonfederal systems. Essential reading for any organization handling controlled unclassified information.
Learn moreNIST 800-53
NIST SP 800-53: Security and Privacy Controls Guide
NIST SP 800-53 Rev 5 defines over 1,000 security and privacy controls for federal systems and organizations. Learn how to navigate control baselines and implement effectively.
Learn moreSOC 1
SOC 1: Guide to Financial Reporting Controls
SOC 1 (SSAE 18) examines controls at service organizations relevant to financial reporting. Learn when you need a SOC 1 report versus SOC 2 and what the audit involves.
Learn moreSOC 3
SOC 3: Public Trust Services Report Guide
SOC 3 is the publicly shareable version of SOC 2, providing a general-use trust services report. Learn when SOC 3 adds value and how it differs from SOC 2.
Learn more