• Home
  • Categories
  • Pricing
  • Submit
    Built with
    Ever Works
    Ever Works

    Connect with us

    Stay Updated

    Get the latest updates and exclusive content delivered to your inbox.

    Product

    • Categories
    • Pricing
    • Help

    Clients

    • Sign In
    • Register
    • Forgot password?

    Company

    • About Us
    • Admin
    • Sitemap

    Resources

    • Blog
    • Submit
    • API Documentation
    All product names, logos, and brands are the property of their respective owners. All company, product, and service names used in this repository, related repositories, and associated websites are for identification purposes only. The use of these names, logos, and brands does not imply endorsement, affiliation, or sponsorship. This directory may include content generated by artificial intelligence.
    Copyright © 2025 Ever. All rights reserved.·Terms of Service·Privacy Policy·Cookies
    Decorative pattern
    Decorative pattern
    1. Home
    2. Security
    3. Awesome Compliance

    Awesome Compliance

    A curated list of tools, frameworks, and resources for IT compliance, security standards, and regulatory requirements including ISO 27001, SOC 2, PCI DSS, HIPAA, and ESG, designed for compliance officers, risk managers, auditors, and cybersecurity professionals.

    Surveys

    Loading more......

    Information

    Websitegithub.com
    PublishedMar 22, 2026

    Categories

    1 Item
    Security

    Tags

    3 Items
    #compliance#security-standards#regulatory

    Similar Products

    6 result(s)

    Awesome GDPR

    Resources focused on protection of natural persons with regard to the processing of personal data and the free movement of such data. Comprehensive guide to GDPR compliance.

    Awesome Privacy Engineering

    A curated list of resources related to privacy engineering including tools like Fideslang and privacy-by-design frameworks. Supports GDPR, CCPA, LGPD compliance.

    Awesome CloudSec Labs

    Awesome free cloud native security learning labs including CTF challenges, self-hosted workshops, guided vulnerability labs, and cloud security research environments.

    Awesome Homomorphic Encryption

    A curated list of libraries, software, papers, and resources for Homomorphic Encryption (HE), enabling computation on encrypted data without decryption for privacy-preserving applications.

    Awesome Cloud Security

    Awesome curated list of cloud security resources including penetration testing tools for Cloud Security, mainly covering AWS, Azure, and Google Cloud Platform security assessment and hardening.

    Awesome Hacking Learning Path

    A comprehensive hacking learning path covering penetration testing, OSINT, Linux, networking, web application security, cryptography, exploitation, reverse engineering, forensics, CVEs, and CTF challenges, perfect for beginners and professionals mastering ethical hacking.

    Overview

    Awesome Compliance provides a comprehensive collection of tools, frameworks, and resources for managing IT compliance and meeting regulatory requirements. This resource helps compliance officers, risk managers, auditors, and cybersecurity professionals navigate the complex landscape of security standards and regulations.

    Features

    • Compliance Frameworks: ISO 27001, SOC 2, SOX, NIST, CIS
    • Industry Regulations: HIPAA, PCI DSS, GDPR, CCPA
    • Automation Tools: Compliance management platforms
    • Security Controls: Implementation guides and templates
    • Audit Preparation: Checklists and evidence collection
    • Policy Templates: Security and compliance policies
    • Risk Management: Risk assessment frameworks
    • ESG Compliance: Environmental, Social, and Governance

    Compliance Frameworks

    Information Security

    ISO 27001

    • Information Security Management System (ISMS)
    • Risk assessment methodology
    • Statement of Applicability (SoA)
    • Control implementation guides
    • Audit preparation resources

    SOC 2

    • Trust Services Criteria (TSC)
    • Type I and Type II reports
    • Control documentation
    • Vendor risk management
    • Continuous monitoring

    NIST Cybersecurity Framework

    • Identify, Protect, Detect, Respond, Recover
    • Risk Management Framework (RMF)
    • Special Publication 800 series
    • Control baselines

    CIS Controls

    • Critical Security Controls
    • Implementation Groups (IG1, IG2, IG3)
    • Safeguards and metrics
    • Compliance mapping

    Financial and Corporate

    SOX (Sarbanes-Oxley)

    • IT General Controls (ITGC)
    • Change management
    • Access controls
    • Audit trail requirements

    PCI DSS

    • Payment Card Industry Data Security Standard
    • Cardholder data protection
    • Network security requirements
    • Quarterly scanning
    • Annual audits

    Privacy and Data Protection

    GDPR

    • General Data Protection Regulation
    • Data protection by design
    • Privacy impact assessments
    • Data subject rights
    • Breach notification

    CCPA/CPRA

  • California Consumer Privacy Act
  • Consumer rights and opt-outs
  • Data inventory and mapping
  • Privacy policy requirements
  • HIPAA

    • Health Insurance Portability and Accountability Act
    • Protected Health Information (PHI)
    • Security Rule requirements
    • Privacy Rule compliance
    • Breach notification

    Emerging Standards

    ESG Compliance

    • Environmental reporting
    • Social responsibility
    • Governance frameworks
    • Sustainability metrics

    Compliance Automation Tools

    GRC Platforms

    • Vanta: Automated compliance for SOC 2, ISO 27001
    • Drata: Continuous compliance automation
    • Secureframe: Compliance and security automation
    • Tugboat Logic: GRC platform
    • OneTrust: Privacy and compliance management

    Security and Monitoring

    • Wazuh: Open-source security monitoring
    • OpenSCAP: Security Content Automation Protocol
    • Steampipe: Cloud compliance queries
    • CloudQuery: Cloud asset inventory

    Policy and Documentation

    • OSCAL: Open Security Controls Assessment Language
    • OpenControl: YAML-based compliance documentation
    • Compliance-as-Code: Infrastructure and policy as code

    Control Implementation

    Access Management

    • Identity and Access Management (IAM)
    • Role-Based Access Control (RBAC)
    • Multi-Factor Authentication (MFA)
    • Privileged Access Management (PAM)
    • Access reviews and recertification

    Security Monitoring

    • Security Information and Event Management (SIEM)
    • Intrusion Detection/Prevention (IDS/IPS)
    • Vulnerability management
    • Log aggregation and analysis
    • Incident response procedures

    Data Protection

    • Encryption at rest and in transit
    • Data loss prevention (DLP)
    • Backup and recovery
    • Data retention policies
    • Secure data disposal

    Audit and Assessment

    Evidence Collection

    • Automated evidence gathering
    • Screenshot and documentation tools
    • Policy acknowledgment tracking
    • Training completion records
    • Access logs and reviews

    Risk Assessment

    • Risk identification methodologies
    • Risk scoring and matrices
    • Treatment plans
    • Risk register maintenance

    Third-Party Risk

    • Vendor assessment questionnaires
    • Security questionnaire templates
    • Contract review checklists
    • Ongoing monitoring programs

    Best Practices

    • Implement continuous compliance monitoring
    • Automate evidence collection
    • Maintain a single source of truth for documentation
    • Regular employee training and awareness
    • Perform internal audits before external audits
    • Keep policies and procedures up to date
    • Map controls across multiple frameworks

    Pricing

    Free resource covering both open-source and commercial compliance tools.