Agile Alliance
Guidelines for integrating secure practices into agile development.
Explore standard
Security
Standards
Security Standards represent frameworks, regulations, and requirements recognized worldwide. They provide a foundation for consistent practices across industries and serve as a reference for aligning with international security expectations.
Agile Alliance
Guidelines for integrating secure practices into agile development.
Explore standard
OWASP ASVS
Standard for verifying web application security controls.
Explore standard
BIZEC-APP
Application security community project for secure coding references.
Explore standard
BSAFSS
BSA Framework for Software Security, promoting secure software practices.
Explore standard
BSIMM
Data-driven model observing real-world software security practices.
Explore standard
C2M2
Cybersecurity Maturity Model for the energy sector.
Explore standard
CAPEC™
Catalog of common attack patterns to understand adversary behavior.
Explore standard
CASA
Cloud application security assessments based on OWASP ASVS.
Explore standard
CCPA
California Consumer Privacy Act regulating personal data protection.
Explore standard
CERT-C
Secure coding standards for the C programming language.
Explore standard
CERT-J
Secure coding standards for the Java programming language.
Explore standard
CIS
Best security configuration benchmarks for systems and software.
Explore standard
CMMC
Cybersecurity Maturity Model Certification for U.S. DoD contractors.
Explore standard
CPRA
California Privacy Rights Act enhancing protections of the CCPA.
Explore standard
CWE™
Catalog of common weakness types for identifying software vulnerabilities.
Explore standard
CWE TOP 25
List of the most dangerous and impactful software weaknesses.
Explore standard
ePrivacy Directive
EU directive ensuring privacy in electronic communications.
Explore standard
FACTA
U.S. law requiring proper disposal of consumer information.
Explore standard
FCRA
U.S. law regulating fairness in credit reporting.
Explore standard
FedRAMP
U.S. federal program ensuring secure cloud services.
Explore standard
FERPA
U.S. law protecting the privacy of student education records.
Explore standard
FISMA
U.S. law mandating federal agencies to secure information systems.
Explore standard
GDPR
EU General Data Protection Regulation for personal data protection.
Explore standard
GLBA
U.S. law protecting customer data in financial institutions.
Explore standard
HIPAA
U.S. law safeguarding health information in healthcare entities.
Explore standard
HITRUST CSF
Common framework harmonizing healthcare security requirements.
Explore standard
ISA/IEC 62443
Standards for securing industrial control and automation systems.
Explore standard
ISO/IEC 27001
International standard for information security management systems.
Explore standard
ISO/IEC 27002
Best practices for implementing information security controls.
Explore standard
ISSAF
Information Systems Security Assessment Framework for security testing.
Explore standard
LGPD
Brazil’s General Data Protection Law for personal data.
Explore standard
MISRA-C
Guidelines for secure and reliable coding in C.
Explore standard
MITRE ATT&CK®
Knowledge base of adversary tactics and techniques.
Explore standard
MVSP
Minimum Viable Secure Product checklist for SaaS applications.
Explore standard
NERC CIP
Standards for protecting critical infrastructure in the energy sector.
Explore standard
NIST CSF
Cybersecurity framework for managing and reducing risk.
Explore standard
NIST 800-115
Guide to technical security testing and assessment.
Explore standard
NIST 800-171
Requirements for protecting controlled unclassified information.
Explore standard
NIST 800-53
Catalog of security and privacy controls for federal systems.
Explore standard
NIST 800-63B
Digital identity guidelines for authentication and access.
Explore standard
NIST SSDF
Secure Software Development Framework for building secure apps.
Explore standard
NYDFS
New York regulation requiring cybersecurity in financial services.
Explore standard
NY SHIELD Act
New York law enhancing personal data protection.
Explore standard
OWASP SAMM
Software Assurance Maturity Model for secure development.
Explore standard
OSSTMM3
Open methodology for security testing of operations and systems.
Explore standard
OWASP TOP 10
Most critical web application security risks.
Explore standard
OWASP API Security Top 10
Most critical security risks in APIs.
Explore standard
OWASP Top 10 for LLM Applications
Top security risks in LLM-powered apps.
Explore standard
OWASP-M TOP 10
Top security risks in mobile applications.
Explore standard
OWASP MASVS
Standard for verifying mobile application security controls.
Explore standard
OWASP Top 10 Privacy Risks
Most critical privacy risks in applications.
Explore standard
OWASP SCP
Secure Coding Practices checklist from OWASP.
Explore standard
PA-DSS
Payment Application Data Security Standard for software vendors.
Explore standard
PCI DSS
Payment Card Industry Data Security Standard for cardholder data.
Explore standard
PDPA
Personal Data Protection Act used in Singapore.
Explore standard
PDPO
Personal Data (Privacy) Ordinance of Hong Kong.
Explore standard
POPIA
South Africa’s Protection of Personal Information Act.
Explore standard
PTES
Penetration Testing Execution Standard methodology.
Explore standard
Resolution SB 2021 2126
Mexican resolution on cybersecurity compliance (Fluid Attacks).
Explore standard
SANS 25
List of the 25 most dangerous software errors.
Explore standard
SIG Core
Core Standardized Information Gathering framework for security.
Explore standard
SIG Lite
Lightweight version of SIG for streamlined security assessments.
Explore standard
SOC2®
Framework for managing customer data securely in service providers.
Explore standard
SWIFT CSCF
Security controls framework for SWIFT financial messaging systems.
Explore standard
WASC
Web Application Security Consortium threat classification.
Explore standard
WASSEC
Web Application Security Scanner Evaluation Criteria.
Explore standard