Data Security Directory: Purpose and Scope

The datasecurityauthority.com directory organizes publicly available information about data security service providers, compliance frameworks, technical control standards, and regulatory bodies operating within the United States. This page defines the scope of the directory, the criteria governing entry inclusion, the geographic boundaries of coverage, and how the directory's structure supports different types of professional research. These definitions establish where this directory is authoritative and where its scope ends.


What is included

The directory encompasses four primary categories of data security service and framework content:

  1. Regulatory compliance services — Organizations and practitioners providing services tied to named federal and sector-specific statutes, including the Health Insurance Portability and Accountability Act (HIPAA, 45 CFR Part 164), the Gramm-Leach-Bliley Act (GLBA, 15 U.S.C. § 6801), the Federal Information Security Modernization Act (FISMA, 44 U.S.C. § 3551), and state-level frameworks such as the California Consumer Privacy Act (CCPA, Cal. Civ. Code § 1798.100).

  2. Technical control implementation — Service categories covering encryption, access control architecture, data loss prevention (DLP), endpoint protection, and security information and event management (SIEM), aligned to published control catalogs including NIST SP 800-53 and the ISO/IEC 27001 standard maintained by the International Organization for Standardization.

  3. Assessment and audit services — Penetration testing, vulnerability assessment, third-party risk assessment, and security auditing practices, including those operating under frameworks such as the Payment Card Industry Data Security Standard (PCI DSS), administered by the PCI Security Standards Council.

  4. Incident response and forensics — Practitioners and firms specializing in breach containment, digital forensics, and post-incident analysis, a category distinct from real-time threat intelligence operations.

The directory does not reproduce live threat feeds, CVE timelines, or active incident advisories. Those functions are maintained by sources including the CISA Known Exploited Vulnerabilities Catalog and the NIST National Vulnerability Database. Vendor product rankings, commercial software ratings, and jurisdiction-specific legal interpretations also fall outside the directory's scope.

A key structural distinction governs how listings are classified: regulatory compliance obligations and technical control frameworks overlap operationally but are treated as separate entry categories. An organization managing HIPAA exposure under 45 CFR Part 164 operates within a compliance obligation with defined enforcement authority at the Department of Health and Human Services Office for Civil Rights. An organization deploying AES-256 encryption on database storage is applying a technical control drawn from a standards framework. Both categories are covered by the Data Security Listings index, but the classification boundaries are maintained separately to support accurate navigation.


How entries are determined

Inclusion in the directory is governed by documented public criteria, not by commercial relationship or editorial preference. The following standards apply:

  1. Verifiable professional standing — Practitioners and firms must hold recognized credentials or operate under licensure where applicable. Relevant credential bodies include (ISC)², which administers the Certified Information Systems Security Professional (CISSP) credential, ISACA, which administers the Certified Information Security Manager (CISM) and Certified in Risk and Information Systems Control (CRISC) designations, and the EC-Council, which administers the Certified Ethical Hacker (CEH) program.

  2. Alignment to named regulatory or framework scope — Entries must be documentably tied to at least one named statute, federal standard, or recognized framework. Generic claims of "data protection" or "cyber services" without framework specificity do not meet the threshold.

  3. Geographic operational scope — Entries must operate within or serve clients within the United States. Firms operating exclusively under non-US regulatory regimes (e.g., solely under the EU General Data Protection Regulation without US client operations) are outside scope.

  4. No active enforcement action — Entries are not included where the listed entity is subject to a documented, unresolved enforcement action by a named federal regulator such as the Federal Trade Commission, the HHS Office for Civil Rights, or the Securities and Exchange Commission.

The How to Use This Data Security Resource page provides additional detail on navigating listing classifications once inclusion criteria are met.


Geographic coverage

The directory operates at national scope within the United States. Federal regulatory architecture forms the primary structural anchor. The Cybersecurity and Infrastructure Security Agency (CISA), established under the Department of Homeland Security in 2018, serves as the lead federal entity for critical infrastructure cyber defense (cisa.gov). NIST, operating under the Department of Commerce, publishes the technical control catalogs and risk management frameworks — including the NIST Cybersecurity Framework (CSF) and the NIST Risk Management Framework (RMF) — that govern federal agency programs and are widely adopted by private-sector entities.

State-level variation is acknowledged within the directory but not adjudicated. All 50 states have enacted data breach notification statutes, with trigger thresholds, notification timelines, and exemptions varying by jurisdiction (National Conference of State Legislatures). The directory names applicable state statutes where relevant to listing categories but does not interpret their application to specific fact patterns — that function requires licensed legal counsel.

Sector-specific regulatory bodies with geographic authority over data security practice include the HHS Office for Civil Rights (healthcare), the Federal Financial Institutions Examination Council (FFIEC) for banking and financial institutions, and the Federal Trade Commission for consumer-facing commercial entities under Section 5 of the FTC Act (15 U.S.C. § 45).


How to use this resource

The directory is organized by functional domain rather than audience type. Practitioners, legal and compliance professionals, procurement teams, and researchers can locate entries by regulatory exposure, service category, or framework alignment without following a predetermined reading sequence.

Three primary entry points structure navigation:

  1. Regulatory exposure — Readers responding to a specific compliance obligation (HIPAA, GLBA, CCPA, FISMA, PCI DSS) should locate entries filtered by the relevant statute or regulatory body. Each major federal framework has a corresponding classification within the Data Security Listings index.

  2. Service category — Readers seeking a specific type of practitioner or firm — penetration testing, incident response, SIEM implementation, third-party risk management — should navigate by the technical control or service classification rather than by regulatory label, as service categories frequently span multiple compliance frameworks.

  3. Credential or standard verification — Researchers confirming whether a listed practitioner holds a named credential or operates under a recognized standard should reference the credential body directly: (ISC)² at isc2.org, ISACA at isaca.org, or the PCI Security Standards Council at pcisecuritystandards.org.

The Data Security Directory: Purpose and Scope page defines the boundaries described above. Readers using directory content to inform procurement decisions, compliance determinations, or legal strategy must supplement this reference with advice from licensed professionals holding relevant jurisdictional authority.

Explore This Site

Regulations & Safety Regulatory References
Topics (36)
Tools & Calculators Password Strength Calculator