CSA IoT Controls — CSA IoT Security Controls Framework
The CSA IoT Security Controls Framework provides essential security controls to mitigate risks in IoT systems that include various connected devices, cloud services, and networks. It is designed to apply to a range of IoT systems, from handling low-value data to supporting critical services.
Related in Cybersecurity
CISA ZTMM V2 — CISA Zero Trust Maturity Model V2
The CISA Zero Trust Maturity Model V2 provides a structured roadmap for organizations implementing a zero trust architecture. It outlines five key pillars and associated maturity levels to guide strategies and execution.
- Issuer
- US Department of Homeland Security (DHS)
- Jurisdiction
- United States
- Version
- 2
- Updated
- Apr 2023
Guidelines on ICT and Security Risk Management
The EBA Guidelines establish requirements for credit institutions, investment firms, and payment service providers on mitigating and managing information and communication technology (ICT) risks. They aim to ensure a consistent and robust approach to ICT and security risk management across the EU financial sector.
- Issuer
- European Banking Authority (EBA)
- Jurisdiction
- European Union
- Version
- 2025 update
- Updated
- Jul 2025
C2M2 — Cybersecurity Capability Maturity Model
The Cybersecurity Capability Maturity Model (C2M2) is a tool developed by the U.S. Department of Energy to help organizations evaluate and enhance their cybersecurity capabilities. It focuses on both IT and OT environments, offering a structured framework of over 350 practices organized into 10 domains.
- Issuer
- U.S. Department of Energy
- Jurisdiction
- United States
- Version
- 2.1
- Updated
- Jun 2022