Regional & National Security Frameworks
Guide to regional and national security frameworks including K-ISMS, ISM, IT-Grundschutz, and government security certifications. Understand jurisdiction-specific requirements for cybersecurity compliance.
CSA STAR
CSA STAR: Cloud Security Trust and Assurance Guide
CSA STAR is the global cloud security assurance programme with three certification levels. This guide covers self-assessment, certification, attestation, and how STAR differentiates cloud providers.
Learn moreG-Cloud
G-Cloud: UK Government Cloud Procurement Framework
G-Cloud is the UK government's digital marketplace for cloud services. This guide covers how to list services, compliance requirements, the procurement process, and tips for winning public sector contracts.
Learn moreISC2
ISC2 Cybersecurity Certifications Guide
ISC2 certifications including CISSP are the most recognized cybersecurity professional credentials globally. This guide covers certification paths, exam requirements, costs, and career value.
Learn moreISM
ISM: Australian Government Information Security Manual
The ISM is the Australian government's comprehensive information security manual. This guide covers the Essential Eight, security classification, system accreditation, and compliance for government contractors.
Learn moreIT-Grundschutz
IT-Grundschutz: Germany BSI Baseline Security Guide
IT-Grundschutz is Germany's comprehensive methodology for baseline IT security. This guide covers the BSI standards, the Grundschutz Compendium, certification process, and comparison with standard ISO 27001.
Learn moreK-ISMS
K-ISMS: South Korea Information Security Management System
K-ISMS is South Korea's mandatory information security certification for major internet service providers and data processors. This guide covers ISMS-P requirements, certification, and compliance obligations.
Learn morePSN CoCo
PSN CoCo: UK Public Services Network Code of Connection
The PSN Code of Connection is required for UK organizations connecting to the Public Services Network. This guide covers compliance requirements, IT Health Checks, and the annual submission process.
Learn moreCyber Trust Mark
US Cyber Trust Mark: IoT Security Labeling Guide
The US Cyber Trust Mark is a voluntary IoT security labeling program. This guide covers certification requirements, testing process, eligible product categories, and how the label builds consumer trust.
Learn more