Home · Synthesis

106 hand-authored syntheses

Each synthesis represents a single operational concern, resolved across every contributing framework. The strictest specification on each of five dimensions, with full source attribution.

Cryptographic controls, key management, and post-quantum readiness

16 contributing frameworks · cluster: cl-cryptography-mgmt

Cryptography across the organisation operates under: (1) an approved-algorithms and key-length policy; (2) hardware security module (HSM) custody for high-value keys including payment, signing, and customer…

Ransomware-resilient backup architecture

14 contributing frameworks · cluster: cl-backup

Backup of information, software, and systems shall be designed for ransomware resilience: multiple copies including at least one immutable (WORM / Object Lock) and at least one offline or air-gapped copy; encryption at…

Business continuity and ICT recovery readiness

14 contributing frameworks · cluster: cl-bcp-ict-readiness

ICT readiness for business continuity provides: (1) documented BCP and DR plans with explicit RTO (recovery time objective) and RPO (recovery point objective) per critical system; (2) DR site for critical systems with…

Secure configuration baselines and hardening discipline

14 contributing frameworks · cluster: cl-hardening

Secure configuration baselines shall be documented for each platform class — operating system, database, application server, web server, network device, cloud service. Configurations shall be assessed against the…

Processor / service provider contract requirements across jurisdictions

14 contributing frameworks · cluster: cl-us-state-privacy-service-provider-contracts

Contracts with service providers / processors handling personal information shall include the mandatory contractual terms required by the applicable jurisdictions: (1) purpose limitation — processing only for the…

Comprehensive asset inventory with classification and ownership

13 contributing frameworks · cluster: cl-asset-inventory

A current inventory of ALL asset types — hardware, software, network devices, data assets, services, third-party dependencies, cryptographic assets, and intangible IT assets — shall be maintained continuously through…

Privileged access management and access rights lifecycle

13 contributing frameworks · cluster: cl-access-rights

Access rights — particularly privileged access — operate under: least-privilege role-based design; segregation of duties (SoD) enforcement with conflict detection; joiner-mover-leaver (JML) workflow integrated with HR…

Authentication architecture and multi-factor authentication

12 contributing frameworks · cluster: cl-authentication

Authentication operates under: documented authentication policy with allowed methods and forbidden methods; multi-factor authentication (MFA) mandatory for all administrative, remote, customer-facing, and high-impact…

Data-at-rest protection — encryption, access, processor controls

12 contributing frameworks · cluster: cl-data-at-rest

Data at rest is protected through: (1) encryption at rest using FIPS 140-2 / industry-standard algorithms; (2) access restriction per classification and least-privilege (ISO A.8.3); (3) privileged access management for…

Anti-malware protection with EDR and email/web safeguards

11 contributing frameworks · cluster: cl-malware

Anti-malware protection operates layered: (1) endpoint anti-malware with EDR (behavioural detection beyond signatures) deployed on ALL endpoints — servers, workstations, mobile, gateways (SEBI PR.16); (2) daily…

PII principal rights — comprehensive ISO 27701-anchored programme

11 contributing frameworks · cluster: cl-pims-data-subject-rights-comprehensive

PII principal rights operate per ISO 27701 PIMS specifications: (1) determine information to provide to PII principals (A.1.3.1); (2) provide privacy notice at collection (A.1.3.2); (3) provide mechanism to object to…

Network segmentation with zero-trust principles

10 contributing frameworks · cluster: cl-network-segmentation

Network segmentation isolates critical systems from general corporate IT: (1) documented zones with controlled connections (SEBI PR.2); (2) zero-trust principles — no implicit trust between segments, identity-based…

GDPR data subject rights — Articles 12-22 operational implementation

10 contributing frameworks · cluster: cl-gdpr-data-subject-rights

GDPR data subject rights operate per Articles 12-22: (1) transparent information modalities (Art. 12); (2) information at direct collection (Art. 13); (3) information at indirect collection (Art. 14); (4) right of…

Data Loss Prevention — multi-channel egress protection

9 contributing frameworks · cluster: cl-dlp

DLP operates across four channels: (1) endpoint DLP for sensitive data; (2) email DLP for outbound; (3) network DLP for egress; (4) cloud DLP for SaaS (SEBI PR.17). Email security additionally with SPF/DKIM/DMARC…

Secure disposal of equipment, media, and personal information

9 contributing frameworks · cluster: cl-secure-disposal

Secure disposal operates as: (1) equipment containing storage media verified for data removal or secure overwrite before disposal/re-use (ISO A.7.14); (2) separation of dev/test/prod environments prevents…

Data-in-transit protection and physical media handling

9 contributing frameworks · cluster: cl-data-in-transit

Data in transit is protected through: (1) confidentiality, integrity, and availability of data-in-transit (NIST PR.DS-02) — TLS 1.2+ minimum, TLS 1.3 preferred, with strong cipher suites; (2) backup data-in-transit…

Cyber resilience metrics — KPIs, KRIs, Board reporting cadence

9 contributing frameworks · cluster: cl-cyber-resilience-metrics

Cyber resilience metrics operate as: (1) comprehensive metrics programme reporting to Board IT Strategy Committee (RBI GV.6 for Maturity Level 4 banks); (2) defined metrics including detection MTTR, MTTD, vulnerability…

Consent management — capture, modify, withdraw across jurisdictions

9 contributing frameworks · cluster: cl-pims-consent-management

Consent management operates per multi-jurisdiction requirements: (1) ISO 27701 — determine when/how consent obtained, obtain and record consent, provide mechanisms to modify or withdraw (A.1.2.3 / A.1.2.4 / A.1.3.3);…

Children's privacy across US states — heightened protections

9 contributing frameworks · cluster: cl-us-state-privacy-children

Children's privacy operates per multi-state requirements: (1) CCPA — opt-in for sale/sharing for consumers under 16 (1798.120 implications); (2) CTDPA Public Act 24-148 — children-specific amendments effective 1 Oct…

PCI DSS PAN protection — storage minimisation, masking, encryption

8 contributing frameworks · cluster: cl-pan-protection

PAN (Primary Account Number) protection per PCI DSS v4.0.1: (1) storage limited to legitimate business need; SAD not retained after authorisation (PCI 3.1 + 3.3.1); (2) PAN masked when displayed — first six + last four…

PCI DSS v4.0.1 universal MFA expansion to all CDE access

8 contributing frameworks · cluster: cl-pci-mfa-expansion

PCI DSS v4.0.1 expanded MFA requirements: (1) MFA for all access into CDE (PCI 8.2); (2) MFA for ALL access into CDE — administrative AND non-administrative — regardless of access type (PCI 8.4.2, future-dated); (3)…

Board-level IT/IT Strategy Committee with documented charter

7 contributing frameworks · cluster: cl-board-it-committee

Board IT Committee operates as: (1) Board-level IT Strategy Committee with experienced directors advising on IT strategy, governance, oversight (RBI ITGRCA GV.1); (2) Board IT Committee with documented charter,…

AI data governance — provenance, preparation, external reporting

7 contributing frameworks · cluster: cl-ai-data-governance

AI data governance operates per ISO 42001 + DPDPA + emerging frameworks: (1) data provenance — tracking where each dataset came from and what has happened (creation, updates, transformations, validation, transfers,…

Data subject / Data Principal rights — operational rights mechanism

7 contributing frameworks · cluster: cl-data-subject-rights

Operational mechanism providing data subjects (DPDPA Data Principals, GDPR data subjects, ISO 27701 PII principals) with rights to access, correction, erasure, grievance redressal. DPDPA Section 11 grants summary of…

PIMS context — Clauses 4-5 management system context and leadership

7 contributing frameworks · cluster: cl-pims-context

PIMS context per ISO 27701 Clauses 4-5: determine external/internal issues, interested parties, scope, role determination (controller/processor/joint), leadership commitment, roles assignment. DPDPA grievance redressal…

AI post-deployment monitoring and incident response

7 contributing frameworks · cluster: cl-ai-incident-and-postdeployment-monitoring

AI post-deployment monitoring operates per NIST AI RMF MANAGE-4.1 (capturing user/AI actor input, evaluating system performance, drift detection) + MANAGE-2.3 (procedures for previously-unknown risks) + MEASURE-2.7…

GDPR Article 35 DPIA + cross-jurisdiction high-risk assessment

7 contributing frameworks · cluster: cl-gdpr-dpia-art35

GDPR Article 35 DPIA for high-risk processing + Article 36 prior consultation. DPDPA Rule 13(2) annual SDF DPIA. CCPA Reg 7150 risk assessment. MODPA data protection assessment. EU AI Act Article 27 FRIA. The DPIA is…

Cloud data privacy lifecycle — CSA CCM v4 DSP control family

7 contributing frameworks · cluster: cl-ccm-v4-data-privacy-lifecycle

Cloud data privacy lifecycle per CSA CCM v4 DSP series: policy + data flow mapping + automated sensitive data discovery + classification + DLP. Layered with GDPR + DPDPA + ISO 27701 + MHMDA + MODPA. Integrated approach…

Forensic capability and evidence collection

6 contributing frameworks · cluster: cl-forensic-evidence-collection

Forensic capability — internal team OR CERT-In empanelled external vendor on retainer (SEBI RS.3 + RBI RS.3). Chain-of-custody preserved. ISO A.5.28 evidence collection procedure. SEBI CSCRF DE.3 log collection…

Event-to-incident categorisation and assessment

6 contributing frameworks · cluster: cl-event-assessment

Event assessment: ISO A.5.25 assess events and decide if categorised as incidents. ISO A.8.15 logs analysed. NIST CSF event analysis + supply chain risk integration. NIS2 incident reporting. NIST 800-53 IR-4 incident…

AI incident reporting — serious incidents to authorities

6 contributing frameworks · cluster: cl-ai-incident-reporting

AI incident reporting per EU AI Act Article 73 (serious incidents — 15 days general / 2 days fundamental-rights infringement / 10 days for fatality) + Article 52 GPAI systemic risk notification + DPDPA Section 8 breach…

India-specific AI risk classification reflecting societal context

6 contributing frameworks · cluster: cl-ai-india-risk-class

MeitY AIGG2025.4 India-specific AI risk classification reflecting societal harms in Indian context (caste, linguistic, religious diversity, demographic patterns). ISO 42001 A.6.1.2 responsible-development objectives.…

Zero Trust Architecture — never trust, always verify

6 contributing frameworks · cluster: cl-zero-trust-architecture

Zero Trust Architecture per RBI CSF PR.23 (Maturity Level 4) for sensitive access: payment systems, customer data, privileged operations. SEBI CSCRF PR.7 + RBI CSF PR.3 privileged access management with just-in-time,…

PCI DSS v4.0.1 customised approach with targeted risk analysis

6 contributing frameworks · cluster: cl-pci-customised-approach

PCI DSS v4.0.1 customised approach — PCI 3.5.1.1 (keyed hash with full PAN coverage) example. Customised approach allows entities to design their own controls meeting the objective via documented Targeted Risk Analysis…

Multi-factor authentication — universal MFA across access types

6 contributing frameworks · cluster: cl-multi-factor-authentication

MFA per CSA IAM-14 (cloud — all human, console, CLI, API), PCI 8.4.2 + 8.5.1 (universal CDE MFA, replay-resistant, non-bypassable, ≥2 categories), ISO 27001 A.5.16 + A.5.17 + A.8.5 identity and authentication…

Logical and physical access restriction — least privilege baseline

5 contributing frameworks · cluster: cl-access-restriction

Access restriction per ISO A.8.3 (information access restriction) + A.8.5 (secure authentication) + A.8.4 (source code access) + SOC 2 CC6.1 (logical and physical) + CC6.6 (communications channel boundary) + IRDAI…

CISO role — independence, authority, Board access

5 contributing frameworks · cluster: cl-ciso-role

CISO role per SEBI GV.3 (independence from operational IT, direct Board IT Committee access), RBI CSF (cyber security policy ownership), IRDAI (sector-specific), MeitY CSP, NCIIPC. The CISO is the operational anchor…

AI system impact assessment (AISIA / FRIA / DPIA convergence)

5 contributing frameworks · cluster: cl-ai-impact-assessment

AI impact assessment per ISO 42001 Clause 6 (AI risk assessment) + Clause 8 (operational planning) + EU AI Act Art 27 FRIA + DPDPA SDF DPIA + NIST AI RMF MAP + MeitY. Convergent artifact covering AI-specific risks…

Responsible AI use — operational guardrails

5 contributing frameworks · cluster: cl-ai-responsible-use

Responsible AI use per ISO 42001 A.9.2 (processes for responsible use) + A.9.3 (objectives) + DPDPA purpose limitation + accuracy + retention cap + MeitY + EU AI Act + NIST AI RMF MANAGE. Acceptable-use boundaries,…

SDF algorithmic due diligence and traffic-data localisation

5 contributing frameworks · cluster: cl-sdf-algorithmic

SDF algorithmic due diligence per DPDPA Rule 13(3): SDFs must verify technical measures including algorithmic software are not likely to pose risk to Section 8/9 obligations. Rule 13(4) — traffic-data localisation for…

Cloud shared responsibility — CSC/CSP RACI

5 contributing frameworks · cluster: cl-cloud-shared-responsibility

Cloud shared responsibility per CSA GRC-06 (governance responsibility model) + CSA HRS-05 (cloud awareness training) + CSA IAM-11 (CSC privileged access compliance) + ISO 27017 + SOC 2 CC1.2/CC1.3 (organisational…

AI principles — Seven Sutras + ISO 42001 + NIST + EU AI Act literacy

5 contributing frameworks · cluster: cl-ai-sutras-principles

Foundational AI principles: MeitY AIGG2025.3 Seven Sutras (Trust, Inclusion, Transparency, Accountability, Safety, Innovation, Sustainable Growth) + ISO 42001 A.2.2 AI policy + A.2.3 alignment with other policies +…

AI-generated content provenance — C2PA, watermarking, SGI

5 contributing frameworks · cluster: cl-ai-content-provenance

AI content provenance per MeitY AIGG2025.11 (C2PA-aligned provenance) + ITR2026.1 + ITR2026.3 (SGI identification and watermarking for significant intermediaries) + NIST GenAI Profile MS-6 (information integrity,…

PCI DSS e-skimming protection — payment page script integrity

5 contributing frameworks · cluster: cl-pci-eskimming

PCI DSS v4.0.1 6.4.3 e-skimming protection — manage payment page scripts, integrity-check, alert on unauthorised modification + 11.6.1 detection mechanism. CSA AIS-04 DAST + AIS-06 automated secure deployment + SOC 2…

AI governance lifecycle — GOVERN function and inventory

5 contributing frameworks · cluster: cl-ai-governance-lifecycle

AI governance lifecycle per NIST AI RMF GOVERN-1 (policies, processes, procedures across MAP/MEASURE/MANAGE) + GOVERN-1.1 (legal/regulatory) + GOVERN-1.4 (risk management process) + GOVERN-1.5 (ongoing monitoring) +…

GDPR accountability principle — Art 5(2) demonstrate compliance

5 contributing frameworks · cluster: cl-gdpr-accountability

GDPR accountability principle Art 5(2): controller responsible for AND able to demonstrate compliance with Article 5(1) principles. Art 24 appropriate measures + Art 25 data protection by design and by default + Art 30…

Cross-jurisdiction breach notification timelines

5 contributing frameworks · cluster: cl-breach-notification-timelines

Cross-jurisdiction breach notification timelines: GDPR 72h (Art 33) + DPDPA 72h detailed (Rule 7) + CERT-In 6h (Direction 70B) + RBI CIMS 6h + SEBI per CSCRF + IRDAI 24h + CCPA + NIS2. Multi-regulator simultaneous…

Consumer / Data Subject / Data Principal rights response SLA

5 contributing frameworks · cluster: cl-consumer-rights-sla

Rights response SLA across jurisdictions: GDPR Art 12(3) one month (extendable by two for complex) + CCPA 1798.130 45 days + DPDPA Rule (forthcoming, expect 30-90 days) + VCDPA 45 days + CSA. SLA tracking, identity…

Encryption at rest — sensitive data and key management

5 contributing frameworks · cluster: cl-encryption-at-rest

Encryption at rest per PCI 3.5.1 PAN rendered unreadable + PCI 3.6.1 key management + CSA CEK-07 cloud data stores with CMK/BYOK + CSA CEK-10 FIPS 140-3 validated key generation + ISO A.8.24 cryptography rules + GDPR…

AI policy and AIMS leadership commitment

4 contributing frameworks · cluster: cl-ai-policy

AI policy per ISO 42001 Clauses 5 + 7 + A.2.4 (review) + EU AI Act Article 53 (GPAI obligations including technical documentation) + MeitY AIGG2025.14 (regulatory sandbox participation for high-risk and novel AI) +…

AI transparency — fairness, explainability, deep fake disclosure

4 contributing frameworks · cluster: cl-ai-transparency

AI transparency per ISO 42001 A.6.1.2 (responsible-development objectives — fairness, transparency, robustness, privacy, safety) + A.5.4 (impact on individuals/groups) + EU AI Act Article 8 + Article 50.4 (deep fake…

Personal data erasure — trigger-driven with propagation

4 contributing frameworks · cluster: cl-personal-data-erasure

Personal data erasure per DPDPA Section 6 + DPDP.6 (consent withdrawal / purpose expiry / specified retention end) + ISO A.8.11 masking + A.8.12 DLP + A.7.14 secure disposal + ISO 27701 + SOC 2 P4.3. Erasure must…

Data localisation — DPDPA SDF traffic data + sectoral requirements

4 contributing frameworks · cluster: cl-data-localisation

Data localisation per DPDPA Rule 13(4) SDF traffic-data localisation + RBI payment data localisation + CERT-In log retention in India + ISO 27018 PII transfer + RBI CSF cyber range. Sectoral localisation layered on top…

Cloud cryptographic key management — CMK/BYOK/HYOK

4 contributing frameworks · cluster: cl-cloud-key-management

Cloud key management per ISO A.8.24 + A.5.23 + ISO 27017 + SEBI cloud + DPDPA. CMK/BYOK/HYOK for cloud-stored sensitive data. Key custody segregation between cloud provider and customer.

PIMS cross-border PII transfers

4 contributing frameworks · cluster: cl-pims-cross-border-transfers

PIMS transfers per ISO 27701 A.1.5.1 + A.1.5.2 + A.2.5.1 + A.2.5.2 + DPDPA notice (DPDP.16) + GDPR + CSA. PIMS transfer controls layered with regulatory addenda.

GDPR Articles 44-49 international transfers

4 contributing frameworks · cluster: cl-gdpr-international-transfers

GDPR transfers Arts 44-49: general principle (44) + adequacy (45) + appropriate safeguards SCCs/BCRs (46) + BCRs intra-group (47) + derogations (49). Plus DPDPA + ISO 27701 + CSA. Post-Schrems II transfer impact…

AI roles and responsibilities across the lifecycle

3 contributing frameworks · cluster: cl-ai-roles

AI roles per ISO 42001 Clause 4 + A.4.6 (human resources) + A.3.2 (AI roles). Define accountable and responsible across AI lifecycle — developers, operators, deployers, oversight, risk management. EU AI Act + NIST AI…

AI lifecycle — policies, safety mindset, environmental impact

3 contributing frameworks · cluster: cl-ai-lifecycle

AI lifecycle per NIST AI RMF GOVERN-4.1 (critical-thinking + safety-first mindset) + GOVERN-2.1 (roles across lifecycle and actor types) + GenAI MG-1 (environmental impact) + EU AI Act + ISO 42001.

AI supplier management — third-party AI systems and components

3 contributing frameworks · cluster: cl-ai-supplier-management

AI supplier management per ISO 42001 A.3.2 + Clauses 5 + 9 + EU AI Act Art 99 penalty awareness + Art 9 risk management for HRAIS providers + NIST AI RMF. Supply chain AI risks — purchased models, third-party SaaS, API…

AI risk classification — EU AI Act high-risk + GPAI + NIST risks

3 contributing frameworks · cluster: cl-ai-risk-classification

AI risk classification per EU AI Act Art 6 high-risk + Art 7 Annex III dynamic amendments + Art 51 GPAI systemic risk + NIST AI RMF MEASURE-3 risk tracking + MEASURE-2.8 transparency/accountability + MeitY.

General-Purpose AI model provider obligations

3 contributing frameworks · cluster: cl-ai-gpai-obligations

GPAI obligations per EU AI Act Article 53 (technical documentation, downstream provider info, copyright/TDM, training data summary) + Article 54 (authorised representative for third-country providers) + Article 55…

AI conformity assessment, EU database registration, regulatory sandbox

3 contributing frameworks · cluster: cl-ai-conformity-assessment

AI conformity per EU AI Act Article 49 (EU database registration for HRAIS prior to market placement) + Article 57 (regulatory sandboxes — national competent authorities) + Article 62 (SME / mid-cap / start-up support)…

Data broker registration and obligations (US states)

3 contributing frameworks · cluster: cl-us-state-privacy-data-broker

Data broker registration per CCPA California Delete Act SB 362 (registration with CPPA + DROP one-stop deletion mechanism by Aug 2026) + Texas TDPSA broker provisions + Oregon OCPA data broker registration. Data…

Cloud supply chain transparency — STA control family

3 contributing frameworks · cluster: cl-ccm-v4-supply-chain-transparency

Cloud supply chain per CSA STA-01 (CSP transparency review — subprocessors, locations, certifications) + STA-02 (multi-tenant isolation verification) + STA-03 (third-party cloud security compliance) + STA-04 (audit…

EU AI Act prohibited practices + India AI capacity building

2 contributing frameworks · cluster: cl-ai-prohibited-practices

EU AI Act Article 5 prohibited practices (eight categories + Dec 2026 addition for nudifier/CSAM) + Article 2 jurisdictional scope + Article 10 data and data governance for HRAIS. Plus India MeitY AIGG2025.13 capacity…

Cloud cryptography and key management — CSA CEK control family

1 contributing frameworks · cluster: cl-ccm-v4-key-management-full

Cloud cryptography per CSA CEK-01 (policy) + CEK-02 (FIPS 140-2/3 key generation) + CEK-03 (purpose-specific keys) + CEK-04 (rotation schedules — DEKs ≤1 year, TLS ≤1 year/2 max) + CEK-05 (revocation and destruction).…

Cloud IAM complete — CSA IAM control family

1 contributing frameworks · cluster: cl-ccm-v4-iam-complete

Cloud IAM per CSA IAM-01 (least-privilege via RBAC, JIT elevation, named roles) + IAM-02 (privileged access — standing-zero policy, session recording) + IAM-03 (federation — Azure AD/Okta with SAML/OIDC, local accounts…

Cloud logging and monitoring — CSA LOG control family

1 contributing frameworks · cluster: cl-ccm-v4-logging-monitoring

Cloud logging per CSA LOG-01 (control plane + data plane + network + application logs) + LOG-02 (tamper-evident storage + retention per regulatory floor — 180 days CERT-In) + LOG-03 (continuous automated alerting +…

Cloud-accessed endpoint management — CSA UEM control family

1 contributing frameworks · cluster: cl-ccm-v4-endpoint-management

Endpoint management for cloud access per CSA UEM-01 (MDM/UEM enrolment + conditional access by posture) + UEM-02 (mobile device policy) + UEM-03 (remote access security — MFA + VPN/ZTNA) + UEM-04 (EDR for…