How to Use This Cybersecurity Resource
Cybersecurity compliance in the United States spans dozens of overlapping federal and state frameworks, from NIST Special Publication 800-53 to HIPAA Security Rule technical safeguards, and navigating that landscape without a clear map produces gaps rather than coverage. This page explains how the Cybersecurity Listings and surrounding reference content on this site are structured, what to examine first, and where the scope of this directory ends. Understanding the organization of materials here accelerates productive research and prevents misapplication of information across distinct regulatory contexts.
How to navigate
The site organizes cybersecurity reference content into discrete subject families rather than a single flat index. Each family addresses a specific compliance domain, control class, or threat category — so navigating by subject family is faster than browsing sequentially.
The primary entry point for organized listings is the Cybersecurity Listings section, which groups entries under recognizable framework labels (NIST CSF 2.0 functions, CIS Controls v8 categories, CMMC practice domains, and others). Within each group, entries carry classification markers indicating whether the underlying regulatory obligation derives from a federal statute (such as FISMA, administered by CISA and OMB), a sector-specific rule (such as the FTC Safeguards Rule under 16 CFR Part 314), or a voluntary standards framework.
Three navigation principles apply across all sections:
- Use framework labels as filters. A reader focused on healthcare data will find HIPAA Security Rule content under its own label, distinct from PCI DSS or SOC 2 entries, even when underlying controls overlap.
- Follow cross-references for shared controls. Access control requirements appear in NIST SP 800-53 AC-family controls, CIS Control 6, and ISO/IEC 27001 Annex A — this site cross-references those convergences rather than duplicating content.
- Check the classification boundary before citing. Mandatory federal controls carry different weight than voluntary best practices. That distinction is explicit in each entry header.
What to look for first
Before drilling into specific controls or vendor listings, identifying the applicable regulatory tier prevents research from proceeding down the wrong framework path. The Cybersecurity Topic Context page establishes those tier distinctions in detail, but the working decision tree is:
- Determine organizational type. Federal agencies operate under FISMA (44 U.S.C. § 3551 et seq.) and NIST guidelines. Private-sector entities in critical infrastructure sectors fall under sector-specific rules. General commercial entities face baseline FTC Act Section 5 unfair practices exposure plus state-level breach notification laws (49 states and the District of Columbia have enacted such laws, per the National Conference of State Legislatures).
- Identify data type. Protected health information triggers HIPAA. Cardholder data triggers PCI DSS v4.0. Controlled unclassified information in defense supply chains triggers CMMC 2.0 under 32 CFR Part 170.
- Locate the enforcing agency. CISA holds broad federal coordination authority under the Cybersecurity Enhancement Act of 2014. HHS OCR enforces HIPAA. The FTC enforces the Safeguards Rule. State attorneys general enforce breach notification statutes. Knowing the enforcer determines which published guidance carries authoritative weight.
Entries marked as deriving from a federal rule enforced by a named agency deserve priority review for any organization potentially within that agency's jurisdiction.
How information is organized
Reference entries follow a four-field structure applied consistently across all listings:
- Classification label — the framework or statute from which the requirement originates (e.g., NIST CSF 2.0 Govern function, HIPAA § 164.312)
- Control or topic summary — a plain-language description of what the requirement addresses, without legal interpretation
- Applicable entity scope — which organization types or sectors the requirement formally reaches
- Source pointer — a citation to the primary public document (published standard, CFR section, or agency guidance), not to secondary commentary
This structure reflects a contrast between two categories of content present throughout the directory:
Mandatory controls derive from statute or binding regulation and carry enforcement consequences. Examples include the HIPAA Security Rule's requirement for audit controls at 45 CFR § 164.312(b) or the FTC Safeguards Rule's requirement for multi-factor authentication under 16 CFR § 314.4(f)(2). The penalty ceiling for HIPAA violations reaches $1.9 million per violation category per calendar year (HHS civil monetary penalty adjustments, 45 CFR § 160.404).
Voluntary frameworks such as NIST CSF 2.0 and CIS Controls v8 carry no direct statutory penalty for non-adoption but inform regulatory expectations and litigation standards of care.
The Directory Purpose and Scope page provides the full rationale for how entries were selected and what publication standards govern inclusion.
Limitations and scope
This directory covers United States federal and state cybersecurity compliance frameworks. It does not cover EU frameworks (GDPR, NIS2 Directive) or sector-specific international standards (ISO/IEC 27001 appears only where it intersects with US regulatory expectations).
Four firm scope boundaries apply:
- No legal interpretation. Statutory text and regulatory sections are quoted or cited; they are not interpreted as applied to specific organizational facts.
- No vendor endorsement. Where vendor categories appear in listings, entries reflect publicly documented capability classifications, not performance assessments.
- No real-time threat intelligence. CISA's Known Exploited Vulnerabilities catalog (cisa.gov/known-exploited-vulnerabilities-catalog) and similar live feeds change faster than any static reference directory can match. Those sources should be consulted directly for active threat data.
- Framework version currency. NIST CSF 2.0 superseded CSF 1.1 in February 2024. PCI DSS v4.0 superseded v3.2.1. Entries in this directory specify the version to which they apply; readers should verify whether a newer revision has been published at the originating standards body before acting on specific control language.
Content across all sections is reference-grade educational material intended to support informed research, not to substitute for qualified legal, technical, or compliance professional guidance.