Compliance Knowledge Base
Engineering-focused reference for the compliance frameworks, data protection regulations, and security standards that govern regulated industries.
Healthcare Regulation
Healthcare Interoperability
Healthcare Privacy Engineering
Healthcare Quality
Medical Device Regulation
Medical Device Standard
Privacy & Data Protection
GDPR
GDPR Article 25 — Privacy by Design and by Default
GDPR Article 35 — Data Protection Impact Assessment (DPIA)
Schrems II, Standard Contractual Clauses, and Cross-Border Data Transfers
EU-US Data Privacy Framework (2023)
ePrivacy Directive and Cookie Consent Requirements
GDPR Article 17 — Right to Erasure (Right to be Forgotten)
GDPR Article 20 — Right to Data Portability
PIPL (China Personal Information Protection Law)
India Digital Personal Data Protection Act 2023
GDPR Legitimate Interests (Article 6(1)(f))
GDPR Consent — Technical Requirements
GDPR Data Protection Officer (DPO)
GDPR Data Controller vs. Processor
Privacy Law
Virginia Consumer Data Protection Act (VCDPA)
Colorado Privacy Act (CPA)
Connecticut Data Privacy Act (CTDPA)
Texas Data Privacy and Security Act (TDPSA)
Washington My Health My Data Act (MHMDA)
Brazil LGPD (Lei Geral de Proteção de Dados) — Engineering Specifics
Singapore PDPA and Mandatory Breach Notification
Japan APPI (Act on the Protection of Personal Information) 2022 Amendments
Australia Privacy Act 2023–2024 Reform Proposals
ISO 27701 (Privacy Information Management — Extension to ISO 27001)
Consent Management Platforms (CMPs) and Technical Requirements
Data Minimization as an Engineering Principle (GDPR Art. 5)
Financial Services Regulation
Compliance Frameworks
SOC 2
ISO 22301 (Business Continuity Management)
ISO 31000 (Risk Management)
SOC 1 Type II (Internal Controls over Financial Reporting)
NIST Privacy Framework 1.0
NIST SP 800-63 (Digital Identity Guidelines) — IAL, AAL, FAL Levels
NIST SP 800-37 (Risk Management Framework for Information Systems)
Third-Party Risk Management (TPRM) Frameworks
Cloud Security
ISO 27017 (Cloud Security Controls)
ISO 27018 (Protection of PII in Public Clouds)
CSA STAR (Cloud Security Alliance Security, Trust, Assurance, and Risk)
Security by Design Principles and Implementation
Shift-Left Security in CI/CD Pipelines
CASB (Cloud Access Security Broker) in Regulated Cloud Environments
AI Governance
Government & Defense
FedRAMP
ITAR (International Traffic in Arms Regulations)
EAR (Export Administration Regulations)
DFARS (Defense Federal Acquisition Regulation Supplement)
NIST SP 800-171 (Protecting CUI in Non-Federal Systems)
CUI (Controlled Unclassified Information) Program
NIST SP 800-207 (Zero Trust Architecture)
DISA STIG (Security Technical Implementation Guides)
RMF and the ATO Process
FedRAMP High vs. Moderate and DoD IL4/IL5
Executive Order 14028 on Improving the Nation's Cybersecurity
SBOM (Software Bill of Materials)
NIST SP 800-218 (Secure Software Development Framework — SSDF)
Supply Chain Risk Management (SCRM) Frameworks
FAR Cybersecurity Clauses for Government Contractors
Section 889 of the NDAA (Huawei/ZTE Equipment Ban)
Energy & Infrastructure
API Engineering
Application Security
Architecture
Architecture Patterns
Event Sourcing as a Compliance Architecture Pattern
CQRS (Command Query Responsibility Segregation) for Audit Trails
Saga Pattern for Distributed Transaction Compliance
Domain-Driven Design (DDD) for Regulatory Boundaries
Hexagonal Architecture (Ports and Adapters) for Testable Compliance
Immutable Infrastructure for Auditability
Compliance
Compliance Engineering
Cybersecurity
Data Engineering
Data Governance
Data Security
DevOps & Pipeline Security
GitOps Security and Pipeline Integrity
Container Security (CIS Benchmarks, Runtime Security)
Kubernetes Security Standards and Hardening
OpenTelemetry and Observability-as-Code for Compliance
Service Mesh Security (Istio, Linkerd) in Regulated Environments
CNCF Cloud Native Security Whitepaper
Policy as Code (OPA, Sentinel) for Automated Compliance
Emerging Tech
Financial & Retail Compliance
Financial Regulation
Financial Regulatory
Healthcare Compliance
Healthcare Informatics
Healthcare Regulatory
IT Governance
IT Service Management
Information Security
Infrastructure Engineering
Network Security
Operational Resilience
Payment Security
Quality & Standards
Quality Engineering
Regulatory Compliance
Security
Security Architecture
Secrets Management (Vault, AWS Secrets Manager) Patterns
Encryption at Rest — Architecture Patterns for Regulated Data
Encryption in Transit — TLS 1.3 and Certificate Management
Key Management (KMS) Architecture for Regulated Systems
IAM (Identity and Access Management) Architecture
PAM (Privileged Access Management) for Regulated Environments
Audit Logging Architecture for Compliance Evidence
Security Engineering
Security Frameworks
Security Operations
Vulnerability Management Programs for Regulated Systems
Incident Response Planning and Mandatory Notification Timelines
Digital Forensics and Evidence Preservation for Regulatory Investigations
Log Management Architecture and Retention for Compliance
SIEM (Security Information and Event Management) for Compliance Monitoring
EDR/XDR Endpoint Detection in Regulated Environments
Patch Management Programs in Regulated Environments
Security Standards
Security Testing
Telecom Compliance
Need compliance engineering?