CMMC 2.0 (Level 2/3)
Cybersecurity Maturity Model Certification
Mandatory for DoD contractors handling CUI. Level 2 requires alignment with all 110 NIST 800-171 controls.
Learn moreCompliance & Frameworks
AdVran maintains compliance expertise across every major regulatory framework. We don't just help you pass audits—we operationalize compliance as a continuous part of your IT and security management.
Cybersecurity Maturity Model Certification
Mandatory for DoD contractors handling CUI. Level 2 requires alignment with all 110 NIST 800-171 controls.
Learn moreDefense Federal Acquisition Regulation Supplement
DoD contract clause requiring adequate security for covered defense information and cyber incident reporting within 72 hours.
Learn moreInternational Traffic in Arms Regulations
Export controls requiring strict data residency and US-person access restrictions for defense articles and services.
Learn moreProtecting Controlled Unclassified Information in Nonfederal Systems
The underlying technical requirement for protecting non-federal systems handling CUI—110 security controls across 14 families.
Learn moreDigital Operational Resilience Act
EU regulation establishing digital resilience standards for financial entities and their ICT service providers.
Learn moreFederal Financial Institutions Examination Council
Interagency guidance for IT examination of financial institutions covering information security, business continuity, and outsourcing.
Learn moreGramm-Leach-Bliley Act
Requires financial institutions to safeguard consumer data, provide transparency, and implement comprehensive information security programs.
Learn morePayment Card Industry Data Security Standard
Global standard for credit card data security; mandates automated log reviews, MFA, and strict network segmentation.
Learn moreSecurities and Exchange Commission / FINRA Rules
Focus on data retention, electronic communication archiving, and the WORM (Write Once, Read Many) storage requirements for broker-dealers.
Learn moreSarbanes-Oxley Act
Requires public companies to maintain internal controls over financial reporting, with IT controls playing a critical role in audit compliance.
Learn moreFDA Electronic Records and Electronic Signatures
FDA requirement for electronic records and signatures in clinical trials, R&D, and pharmaceutical manufacturing environments.
Learn moreHealth Insurance Portability and Accountability Act
The baseline for Protected Health Information (PHI) privacy and security in healthcare organizations.
Learn moreHealth Information Technology for Economic and Clinical Health Act
Mandates strict breach notifications, increases penalties for HIPAA non-compliance, and extends requirements to business associates.
Learn moreCriminal Justice Information Services Security Policy
Strict data security standards for organizations handling law enforcement and criminal justice information.
Learn moreFederal Risk and Authorization Management Program
Security authorizations for cloud service providers selling to federal and state government agencies.
Learn moreFederal Information Processing Standard 140-2
NIST standard specifying security requirements for cryptographic modules used to protect sensitive information.
Learn moreFederal Information Security Modernization Act
Federal framework requiring agencies and contractors to develop, document, and implement agency-wide information security programs.
Learn moreSecurity and Privacy Controls for Information Systems and Organizations
Comprehensive catalog of security and privacy controls for federal systems and organizations, the foundation for FedRAMP and FISMA.
Learn moreState Risk and Authorization Management Program
Security authorization framework for cloud service providers serving state and local government agencies.
Learn moreIndustrial Automation and Control Systems Security
The primary standard for securing Industrial Control Systems (ICS) and operational technology environments.
Learn moreNIST Cybersecurity Framework
Widely adopted security maturity framework organized around Identify, Protect, Detect, Respond, Recover, and Govern functions.
Learn moreTrusted Information Security Assessment Exchange
Automotive industry information security assessment based on ISO 27001, required by major OEMs for supply chain partners.
Learn moreUN Regulation on Cybersecurity and Software Updates
International regulation requiring automotive manufacturers to implement cybersecurity management systems for vehicle type approval.
Learn moreChildren's Internet Protection Act
Requires schools and libraries receiving E-Rate funding to implement internet safety policies and content filtering.
Learn moreChildren's Online Privacy Protection Act
Restricts data collection on minors under 13, critical for K-12 EdTech providers and school districts.
Learn moreFamily Educational Rights and Privacy Act
Protects the privacy of student educational records at institutions receiving federal funding.
Learn moreState Education Data Privacy Standards
State-specific data privacy regulations for educational institutions, varying by jurisdiction but generally extending FERPA protections.
Learn moreAmerican Petroleum Institute Cybersecurity Standards
Industry standards for cybersecurity in petroleum and natural gas operations, including API 1164 for pipeline SCADA security.
Learn moreNorth American Electric Reliability Corporation Critical Infrastructure Protection
Mandatory security standards for the North American bulk power system, enforced with significant financial penalties.
Learn moreTransportation Security Administration Pipeline Security Directives
Required cyber incident reporting and audit readiness for oil and gas pipeline operators.
Learn moreAmerican Bar Association Cybersecurity Guidelines
ABA formal opinions and guidelines on lawyers' ethical obligations regarding technology and data security.
Learn moreState Bar Association Ethics and Technology Rules
State-specific ethical obligations for attorneys regarding technology use, data security, and client information protection.
Learn moreCustomer Proprietary Network Information Rules
FCC rules protecting customer calling records, service usage data, and billing information held by telecommunications carriers.
Learn moreFederal Communications Commission Cybersecurity Requirements
FCC regulations requiring telecommunications providers to protect network infrastructure and customer data.
Learn moreGeneral Data Protection Regulation / California Consumer Privacy Act
Comprehensive data privacy laws for consumer protection, requiring data minimization, consent management, and breach notification.
Learn moreInformation Security Management Systems
Global standard for establishing, implementing, maintaining, and continually improving an information security management system (ISMS).
Learn moreSystem and Organization Controls 2
Independent audit proving operational and security excellence across trust service criteria: security, availability, processing integrity, confidentiality, and privacy.
Learn moreState Charitable Organization Data Protection Regulations
State-level regulations governing data protection and security requirements for charitable organizations and nonprofits.
Learn more