How to Use This Data Security Resource

The datasecurityauthority.com directory covers the data security service sector across regulatory frameworks, professional practice categories, technical control standards, and compliance obligations applicable to US-based organizations. Pages are organized by functional domain, allowing practitioners, legal and compliance professionals, procurement teams, and researchers to locate authoritative reference material by topic. The scope spans federal and sector-specific regulatory requirements, recognized technical frameworks published by bodies including NIST and ISO, and the structured taxonomy of security controls governing data at rest, in transit, and in use. This page describes how the directory is structured, how content is verified, and how different professional audiences can navigate it effectively.


Feedback and updates

Content accuracy across this directory depends on continuous alignment with named, publicly accessible standards documents and regulatory instruments. The primary reference sources used for technical and regulatory grounding include:

  1. NIST (National Institute of Standards and Technology) — Cybersecurity Framework (CSF) 2.0 and the SP 800 publication series, hosted at csrc.nist.gov
  2. CISA (Cybersecurity and Infrastructure Security Agency) — advisories, the Known Exploited Vulnerabilities (KEV) catalog, and sector-specific guidance at cisa.gov
  3. HHS Office for Civil Rights — HIPAA Security Rule technical safeguard requirements under 45 CFR Part 164
  4. FTC (Federal Trade Commission) — Safeguards Rule provisions under 16 CFR Part 314, applicable to financial institutions and related entities
  5. NYDFS — Cybersecurity requirements for financial services companies under 23 NYCRR 500

Verification follows a three-stage process:

Corrections and additions that can be attributed to a named public source are handled through the contact page.


Purpose of this resource

Data Security Authority functions as a structured reference directory — not a tutorial platform, vendor comparison engine, or legal advisory service. The distinction is operational: the directory maps the service sector as it exists, including the regulatory bodies that govern it, the professional credential categories recognized within it, and the technical frameworks that practitioners apply.

The US data security landscape is governed by overlapping obligations from at least five major federal bodies — NIST, CISA, FTC, HHS, and the Department of Defense's CMMC program office — in addition to sector-specific and state-level instruments such as California's CCPA (Cal. Civ. Code § 1798.100) and the GLBA provisions administered by the FTC. This regulatory density creates a genuine classification problem: organizations and researchers who conflate compliance obligations with technical control standards, or who treat industry frameworks as having the same legal weight as statutory mandates, risk misallocating resources and mischaracterizing exposure.

The data-security-directory-purpose-and-scope page provides the full scope statement for the directory, including coverage decisions, exclusions, and the criteria used to classify entries. The directory's content taxonomy draws a consistent boundary between two categories:

Category Definition Examples
Regulatory compliance obligations Legally binding requirements established by statute, rule, or regulatory order HIPAA Security Rule, GLBA Safeguards Rule, CCPA, FISMA
Technical control frameworks Voluntary or contractually adopted standards describing how controls are structured and implemented NIST CSF 2.0, ISO/IEC 27001, CIS Controls v8

Both categories are covered across the data-security-listings section, but entry points and cross-references are structured to reflect that compliance obligations carry enforcement consequences while technical frameworks carry implementation specificity.


Intended users

The directory serves four distinct professional audiences, each of which engages with data security content through a different operational lens:

  1. Compliance and legal professionals — attorneys, privacy officers, and compliance managers working within HIPAA, GLBA, FISMA, or state privacy law obligations. This group typically needs precise regulatory citations, enforcement scope definitions, and clarity on which federal or state body holds jurisdiction over a given data category.

  2. Security practitioners and engineers — professionals implementing technical controls across identity and access management, encryption, endpoint protection, and network segmentation. This group references framework documents (NIST SP 800-53 Rev 5, CIS Controls v8) and needs classification precision around control families and safeguard types.

  3. Procurement and vendor management teams — professionals evaluating third-party data processors, managed security service providers (MSSPs), or SaaS vendors under supply chain risk requirements. This group references directory listings and framework-based assessment criteria, including FedRAMP authorization categories and SOC 2 Type II attestation standards.

  4. Policy researchers and institutional analysts — academics, think tank staff, and public sector analysts tracking the regulatory landscape, enforcement trends, and framework adoption. This group uses the directory as a structured entry point for sourcing regulatory instruments and named standards bodies.

No single page in the directory presupposes familiarity with another, but content across each domain assumes the reader has a baseline professional or research context for the topic. The directory does not provide introductory instruction on security concepts.


How to navigate

The directory is organized by functional domain rather than by audience type or regulatory jurisdiction. Pages within the data-security-listings section are grouped under the following structural categories:

  1. Regulatory frameworks — federal statutes and implementing regulations with named enforcement agencies
  2. Technical control standards — published frameworks and specification documents from recognized standards bodies
  3. Professional credential categories — recognized certifications and their issuing bodies (ISACA, ISC², CompTIA, SANS/GIAC)
  4. Service sector categories — structured classification of security service types, including managed detection and response (MDR), security operations center (SOC) services, penetration testing, and digital forensics
  5. Sector-specific compliance — coverage of vertical-specific obligations in healthcare, financial services, defense contracting, and critical infrastructure

Practitioners navigating a specific regulatory exposure should begin with the regulatory frameworks section, which maps major federal and state statutory instruments to their implementing rules and enforcement bodies. Organizations assessing technical control implementation should cross-reference the control standards section against their applicable compliance obligation — for example, mapping NIST SP 800-171 Rev 2 controls against CMMC Level 2 requirements for defense contractors handling Controlled Unclassified Information (CUI).

The directory does not rank, endorse, or recommend specific vendors, service providers, or products. Listings describe service categories, professional qualifications, and regulatory scope — not comparative assessments. For the full scope statement governing what is and is not included in the directory, the data-security-directory-purpose-and-scope page provides the authoritative reference.

Explore This Site

Regulations & Safety Regulatory References
Topics (36)
Tools & Calculators Password Strength Calculator