Emphasizes the importance of service providers securely handling and safeguarding user data to uphold trust and transparency.
Aims to protect credit card data by implementing robust controls designed to prevent fraud and unauthorized transactions.
Defines the requirements for establishing, implementing, maintaining, and continuously improving an information security management system (ISMS).
The Digital Operational Resilience Act strengthens the ability of EU financial entities to withstand and respond to ICT-related incidents.
Offers a structured approach to managing sensitive company information, ensuring its confidentiality, integrity, and availability.
An EU directive aimed at strengthening the security of network and information systems across member states.
Offers a structured framework for managing and mitigating cybersecurity risks through a set of guidelines and best practices.
An updated framework offering guidelines for managing and mitigating cybersecurity risks, featuring enhanced capabilities and improvements for better security management.
The Cloud Security Alliance's cloud assurance program, offering multiple certification levels to verify and validate the security practices of cloud service providers.
Establishes standards for a quality management system (QMS) to ensure the consistent delivery of high-quality products and services.
Defines standards for organizations to establish, implement, maintain, and continuously improve a service management system (SMS).
Mandates financial institutions to implement comprehensive cybersecurity programs to safeguard customer information and ensure data protection.
The Monetary Authority of Singapore's Technology Risk Management guidelines for financial institutions operating in Singapore, aimed at mitigating technology-related risks and enhancing operational resilience.
Establishes security requirements for safeguarding sensitive information in specific sectors, as mandated by the Dubai government.
The Reserve Bank of India's Cyber Security Framework mandates banks to adopt security measures to defend against cyber threats and ensure the resilience of their IT systems.
Offers guidelines for implementing information security controls specifically tailored to the provision and use of cloud services.
Baseline cybersecurity controls required for financial institutions in Saudi Arabia.
The Trusted Information Security Assessment Exchange standard for ensuring information security within the automotive industry.
The European Union’s regulation is designed to protect the data privacy and rights of EU citizens, influencing how organizations globally manage and process personal data.
Defines requirements for a Privacy Information Management System (PIMS) to manage personal data, applicable to both data controllers and data processors.
Requires healthcare providers and their partners to protect patient health information, ensuring its confidentiality and integrity.
California’s consumer privacy law that grants residents specific rights over their personal information and imposes obligations on businesses that collect, process, or share such data.
Personal Information Protection and Electronic Documents Act regulates how personal information is regulated and used in Canada.
The Personal Data Protection Act regulates the collection, use, and disclosure of personal data in Singapore to ensure privacy and protection.
Offers detailed guidelines and best practices for federal agencies to safeguard their information systems and control sensitive data.
Defines security requirements for safeguarding Controlled Unclassified Information (CUI) in non-federal systems and organizations, ensuring its confidentiality and protection.
Offers a comprehensive catalog of security and privacy controls for federal information systems and organizations, aimed at enhancing their security and privacy posture.
Emphasizes the protection of financial data and the enforcement of privacy standards within the banking sector.
The Data Protection and Privacy Act mandates the protection and responsible handling of personal data in India, ensuring individuals' privacy rights are upheld.
Use Auditious to create custom frameworks to meet your unique compliance requirements.