Cybersecurity Regulations: Statute and Code Reference
This page provides a structured reference to the 44 regulatory citations tracked across Identity Security Authority. All citations are extracted from page content and verified against primary sources.
Citation Summary
Category
Count
Federal Statutes (U.S. Code)
9
Federal Regulations (C.F.R.)
7
Named Federal Acts
25
Executive Orders
2
Named Act Unverified
1
Total
44
Federal Statutes (U.S. Code)
Federal Regulations (C.F.R.)
Named Federal Acts
Citation
Jurisdiction
California Consumer Privacy Act
US
Computer Fraud and Abuse Act
US
Cyber Incident Reporting for Critical Infrastructure Act
US
Detecting Post-Compromise Threat Act
US
Detecting and Preventing Act
US
Electronic Communications Privacy Act
US
Enterprise Act
US
FTC Act
US
FedRAMP Authorization Act
US
Federal Information Security Modernization Act
US
Federal Trade Commission Act
US
Hybrid Act
US
Illinois Biometric Information Privacy Act
US
Leach-Bliley Act
US
Microsoft Act
US
My Health MY Data Act
US
Post-Incident Act
US
Privacy Act of 1974
US
Sarbanes-Oxley Act
US
Sarbanes-Oxley Act of 2002
US
The Federal Information Security Modernization Act
US
The Health Insurance Portability and Accountability Act
US
Use of Biometric Identifier Act
US
Virginia CDPA, Colorado Privacy Act
US
Virginia Consumer Data Protection Act
US
Executive Orders
Named Act Unverified
Citation
Jurisdiction
Securing Act
—
Pages with Regulatory Citations
Recent Regulatory Changes
Monitoring Sources
Citations on this site are monitored against the following regulatory data sources:
Ashrae (last checked: 2026-03-09)
Congress (last checked: 2026-03-09)
Ecfr (last checked: 2026-03-09)
Federal Register (last checked: 2026-02-28)
Nfpa (last checked: 2026-03-09)
Openstates (last checked: 2026-03-09)
Citation data last extracted: 2026-03-08
Explore This Site
Topics (35)
Browse topics…
Identity Security Fundamentals
Identity and Access Management (IAM) Explained
Privileged Access Management (PAM): Concepts and Controls
Zero Trust Identity Model: Principles and Implementation
Multi-Factor Authentication (MFA): Methods and Best Practices
Single Sign-On (SSO): How It Works and Security Implications
Identity Governance and Administration (IGA) Overview
Identity Threat Detection and Response (ITDR)
Credential Theft and Account Takeover: Attack Vectors and Defenses
Phishing and Social Engineering Targeting Identity
Password Security and Enterprise Password Management
Passwordless Authentication: Technologies and Trade-offs
Federated Identity Management and Standards
OAuth 2.0 and OpenID Connect in Identity Security
SAML Protocol: Role in Enterprise Identity Security
Directory Services and Active Directory Security
Cloud Identity Security: Challenges and Controls
Securing Hybrid Identity Environments
Non-Human Identity Security: Service Accounts and Machine Identities
Identity Lifecycle Management: Provisioning to Deprovisioning
Role-Based Access Control (RBAC) and Least Privilege
Attribute-Based Access Control (ABAC) in Identity Systems
Identity Security for the Remote and Hybrid Workforce
Identity Security Compliance Requirements in the United States
NIST Frameworks Applied to Identity Security
Insider Threats and Identity-Based Risk
Notable US Identity Breach Case Studies
Identity Security Vendors and Tools: Market Reference
Identity Security Certifications and Professional Credentials
Decentralized Identity and Self-Sovereign Identity (SSI)
Biometric Authentication in Identity Security
Conducting an Identity Security Audit
Identity Risk Scoring and Behavioral Analytics
Identity-Focused Incident Response Procedures
Third-Party and Vendor Identity Risk Management
Tools & Calculators
Password Strength Calculator