cancel
Showing results for 
Search instead for 
Did you mean: 
100% helpful (3/3)
GloriaHigley
Archer Employee
Archer Employee

archer-logo-RGB-300w.png

 

Looking for a specific Archer Exchange offering? The tables below provide a list of all available Archer Exchange offerings. Please note that videos, implementation guides and implementation packages require login access to the Archer Community.   

App-Packs   |   Tools & Utilities   |   Integrations   |   Content

new_darkblue_flipped_small.png Newly Added to the Archer Exchange      update_black_small.png Recently Updated

 App-Packs

App-Pack Name and Overview Video Demonstration Implementation Guide Installation Package
Archer Complaints Tracking  Video Implementation Guide Installation Package
Archer Conflict of Interest Management  Video Implementation Guide Installation Package
Archer Contract Clause Management  Video Implementation Guide Installation Package
Archer Discussion Forum  Video Implementation Guide Installation Package
Archer Documentation Request Tracking  Video Implementation Guide Installation Package
Archer Due Diligence Management Video Implementation Guide Installation Package
Archer Exam Management  Video Implementation Guide Installation Package
Archer Experts eDiscovery Management Implementation Guide Installation Package
Archer FFIEC-Aligned Cybersecurity Framework update_black_small.png Video Implementation Guide Installation Package
Archer Gift Registration Video Implementation Guide Installation Package
Archer IIC-Aligned IoT Security Maturity Assessment  Video Implementation Guide Installation Package
Archer IoT Project Readiness  Video Implementation Guide Installation Package
Archer Model Risk Management update_black_small.png Video Implementation Guide Installation Package
Archer NIST-Aligned Cybersecurity Framework 

Videos for Archer release 6.4 SP1 and 6.8

Implementation Guide available for Archer release 6.4 SP1 and 6.8 Installation Packages available for Archer release 6.4 SP1 and 6.8
Archer NIST-Aligned Privacy Framework  Video Implementation Guide Installation Package
Archer Product Security Development Assessment  Video Implementation Guide Installation Package
Archer Project Management 

 

Video Implementation Guide Installation Package
Archer Request & Response Tracker  Video Implementation Guide Installation Package
Archer Scripts Timesheet  Video Implementation Guide Installation Package
Archer Speak Up Video Implementation Guide available for Archer release 6.4 SP1 and 6.9 SP3 P2 Installation Packages available for Archer release 6.4 SP1 and 6.9 SP3 P2
Archer Strategic Planning Video Implementation Guide Installation Package
Archer Strategic Risk Management Video Implementation Guide Installation Package
Archer Support Requests  Video Implementation Guide Installation Package
Aujas Duplicate Findings Prevention Video Implementation Guide Installation Package
Bowmen Group Organisational Entities‌  Video Implementation Guide Installation Package
Crowe Pandemic Response App-Pack  Video Implementation Guide Installation Package
Evalto Inactive User Reporting  Video Implementation Guide Installation Package
HCL Regulatory Interactions Management  - Implementation Guide Installation Package
HCL IRAM2-Aligned Risk Assessment - Implementation Guide Installation Package
HCL Tax Risk Management - Implementation Guide Installation Package
Karta NERC Compliance Management  Video Implementation Guide Installation Package
NTT ISMS Control Assessment  Video Implementation Guide Installation Package
NTT ISMS Risk Assessment  Video Implementation Guide Installation Package
Templar Shield Anti-Money Laundering (AML) Rule Management  - Implementation Guide Installation Package
TUV Rheinland Opensky User Entitlement Review - Implementation Guide Installation Package

 

Tools & Utilities

Tool & Utility Name and Overview Video Demonstration Implementation Guide Installation Package
Archer Advanced Workflow Content Assistant update_black_small.png Video Implementation Guide

Installation Packages available for Archer release 6.4, 6.56.6 to 6.8 and 6.9 to 6.11+

Archer API Testing new_darkblue_flipped_small.png - Implementation Guide

Installation Package

Archer Authoritative Source Data Feed  - - Installation Package
Archer Data Feed Initiator  - Implementation Guide Installation Package
Archer Data Feed Monitor  - Implementation Guide Installation Package
Archer Experts / Archer Scripts Group Management -

Implementation Guide

Installation Package
Archer Experts Records Retention Video

Installation Guide

User Guide

Installation Package
Archer Experts Re*Porter Video Installation and User Guide Installation Package
Archer Multi-Record Publisher  - Implementation Guide Installation Package
Archer Scripts Data Driven Event Analysis Video Implementation Guide Installation Package
Archer Scripts User Status Indicator and Tooltip Video Implementation Guide Installation Package
Archer User Account Management new_darkblue_flipped_small.png - Implementation Guide Installation Package
Archer User Profile and Contact Synchronization  - Implementation Guide Installation Package
Bowmen Group Multicurrency - Overview Guide Implementation
CastleHill Software Estrelica.Core .NET Integration Library new_darkblue_flipped_small.png Video Installation Guide Installation Package
NTT Platform Monitoring and Operations  Video  Implementation Guide  Installation Package 

 

Integrations

Integration Name and Overview Impacted Use Case Implementation Guide Installation Package
1touch.io DLM Pro

Archer Data Governance

Archer Third Party Catalog

Archer Third Party Risk Management

Implementation Guide -
Allied Media Digital Testing and Controls Automation 

Archer IT Controls Assurance

Archer Issues Management

Implementation Guide -
Allied Media Michelle: AI Digital Agent

Archer Third Party Catalog

Archer Third Party Engagement

Implementation Guide -
Apparity EUCA Risk Discovery and Analysis

Archer Data Governance

Implementation Guide Installation Package
Auditmation™

Archer IT & Security Policy Program Management
Archer Policy Program Management
Archer IT Controls Assurance
Archer PCI Management
Archer Controls Assurance Program Management
Archer Assessments & Authorization

Implementation Guide Installation Package
AWS IAM Access Analyzer 

Archer Issues Management

Implementation Guide Installation Package
AWS Security Hub 

Archer Issues Management

Archer IT Controls Assurance

Implementation Guide Installation Package
Axonius Cybersecurity Asset Management 

Archer Audit Engagements & Workpapers
Archer Third Party Governance
Archer Business Continuity and Disaster Recovery Planning
Archer IT Controls Assurance
Archer IT Security Vulnerability Program
Archer IT Risk Management
Archer Cyber Incident & Breach Response
Archer PCI Management
Archer Information Security Management System (ISMS)
Archer Data Governance

Implementation Guide Installation Package
BigID Data Mapper Archer Data Governance  Implementation Guide Installation Package

BitSight Security Ratings update_black_small.png

Archer Third Party Catalog  Implementation Guide Installation Package
Bloomberg Law Archer Corporate Obligations Management  Implementation Guide Installation Package
Caveris  Archer IT Controls Assurance
Archer Controls Assurance Program Management
Archer Information Security Management System (ISMS)
Archer PCI Management
Archer IT Risk Management
Archer Data Governance
Archer Top-Down Assessment
Archer Assessment & Authorization
Implementation Guide
Centers for Medicare and Medicaid Services (CMS) Data Feed

Archer Corporate Obligations Management

Archer IT Regulatory Management

Implementation Guide Installation Package
Code of Federal Regulations (CFR) Data Feeds 

Archer Policy Program Management

Implementation Guide Installation Package
Cognitive View

Archer Policy Program Management

Implementation Guide
Compliance.ai 

Archer Corporate Obligations Management

Implementation Guide Installation Package
CyberArk Privileged Access Security  Archer Platform Configuration Guide CyberArk Marketplace
CyberSponse CyOPs  Archer Security Incident Management Implementation Guide -
Cymulate Breach & Attack Simulation  Archer Cyber Incident & Breach Response Implementation Guide Installation Package
Cysiv Command  Archer Cyber Incident & Breach Response Implementation Guide -
Demisto Enterprise Archer Security Incident Management Implementation Guide -
Digital Defense, Inc. Frontline Vulnerability Manager  Archer IT Security Vulnerabilities Program Implementation Guide Installation Package
Emergynt Instinct Engine Many Implementation Guide -
erwin EDGE Platform Many Implementation Guide -
Everbridge Archer Crisis Management Implementation Guide Installation Package
Federal Deposit Insurance Corporation (FDIC) Data Feed

Archer Corporate Obligations Management

Archer IT Regulatory Management

Implementation Guide Installation Package
Federal Trade Commission (FTC) Data Feed Archer Corporate Obligations Management Implementation Guide Installation Package
Financial Accounting Standards Board (FASB) Data Feed

Archer Corporate Obligations Management

Archer IT Regulatory Management

Implementation Guide Installation Package
Global-Regulation International Law Search Archer Corporate Obligations Management Implementation Guide Installation Package
GovTrack Data Feed Content

Archer Corporate Obligations Management

Archer IT Regulatory Management

Implementation Guide Installation Package
Gurucul  Archer Security Incident Management Implementation Guide Installation Package
KONEXUS 

Archer Business Continuity and IT Disaster Recovery Planning

 Archer Crisis Management

Implementation Guide

KONEXUS Connector Service Installation Package

 

Archer Business Resiliency Use Case Updates Installation Package

LexisNexis Regulatory Compliance 

Archer Policy Program Management

Archer Corporate Obligations Management

Implementation Guide

Installation Package

LexisNexis Regulatory Compliance - Enhanced Content 

Archer Policy Program Management

Implementation Guide

Installation Package

LogicHub  Archer Security Incident Management Implementation Guide -
Mendix Many Implementation Guide Installation Package
Microsoft® 365 OneDrive and SharePoint update_black_small.png Many Implementation Guide Installation Package
Monetary Authority of Singapore (MAS) Data Feed 

Archer Corporate Obligations Management

Archer IT Regulatory Management

Implementation Guide Installation Package
NIST National Vulnerability Database (NVD)  Archer IT Security Vulnerabilities Program Implementation Guide Installation Package
Office of the Comptroller of the Currency (OCC) Data Feed

 Archer Corporate Obligations Management

Archer IT Regulatory Management

Implementation Guide Installation Package
Palisades @ Risk  Archer Operational Risk Management Implementation Guide Installation Package
Panaseer Platform 

Archer IT Controls Assurance

Archer Key Indicator Management

Implementation Guide Installation Package
Panorays 

Archer Third Party Catalog

Implementation Guide Installation Package
Perceptive Control Solutions - Audit Prodigy Archer Audit Engagements & Workpapers Implementation Guide -
Qualys Asset Discovery  Many Implementation Guide Installation Package
Qualys Vulnerability Management  Archer IT Security Vulnerabilities Program Implementation Guide Installation Package
RapidRating Portfolio Health

 Archer Third Party Catalog

Archer Third Party Governance

Implementation Guide Installation Package
Recorded Future Third Party Risk 

Archer Third Party Catalog 

Implementation Guide Installation Package
Recorded Future Vulnerability Enrichment Feed Archer IT Security Vulnerabilities Program Implementation Guide Installation Package
Redis Archer Platform Documentation Downloads
Regology Regulatory Change Management  Archer Corporate Obligations Management Implementation Guide Installation Package
Reserve Bank of India (RBI) Data Feed

 Archer Corporate Obligations Management

 Archer IT Regulatory Management

Implementation Guide Installation Package
Risk Based Security VulnDB Archer IT Security Vulnerabilities Program Implementation Guide Installation Package
RiskLens 

Archer IT Risk Management

Archer Top-Down Risk Assessment

Archer Information Security Management System

 Archer Operational Risk Management

Implementation Guide Installation Package
RiskRecon Third Party Security Risk Monitoring 

Archer Third Party Catalog

Archer Third Party Engagement

Archer Issues Management

Implementation Guides available for 6.4 SP1 P1 and 6.7 Packages available for 6.4 SP1 P1 and 6.7
RiskRecon Own Enterprise Monitoring 

Archer IT Security Vulnerabilities Program

Archer Third Party Security Risk Monitoring

Implementation Guides available for Archer release 6.4 SP1 P1 and 6.7

Installation Packages available for Archer release 6.4 SP1 P1 and 6.7

RSA Identity Governance & Lifecycle User Provisioning - Application Guide Blueprint Repository
Scaleout StateServer Archer Platform User Guide -
Security Compass SD Elements Archer Bottom-Up Risk Assessment
Archer Issues Management
Archer IT Risk Management
Implementation Guide
SecurityScorecard  Archer Third Party Catalog Implementation Guide Installation Package
Securonix Snypr  Archer Security Incident Management Implementation Guide Installation Package
SirionLabs CLM  Archer Third Party Catalog Implementation Guide Installation Package
SOFTwarfare KillerAppz  Archer IT Security Vulnerabilities Program Implementation Guide -
Splunk Phantom  Archer Security Incident Management Implementation Guide -
Supply Wisdom  Archer Third Party Catalog Implementation Guide Installation Package
Swimlane  Archer Security Incident Management Implementation Guide -
Symantec Control Compliance Suite

Archer IT Controls Assurance

Archer IT & Security Policy Program Management

Implementation Guide Installation Package
Tableau Web Data Connector - - -
Tenable.sc Asset Discovery  Many Implementation Guide Installation Package
Tenable.sc Vulnerability Management  Archer IT Security Vulnerabilities Program Implementation Guide Installation Package
Thomson Reuters Regulatory Intelligence 

Archer Corporate Obligations Management

Implementation Guide Installation Package
ThreatConnect Archer Cyber Incident & Breach Response Implementation Guide -
ThreatQuotient ThreatQ Archer Cyber Incident & Breach Response Implementation Guide -
ThreatWatch  Archer IT Security Vulnerability Management Implementation Guide Installation Package
Unified Compliance Framework Common Controls Hub  Archer Policy Program Management Implementation Guide Installation Package
U.S. Computer Emergency Readiness Team (US-CERT) Data Feed

Archer Corporate Obligations Management

Archer IT Regulatory Management

Implementation Guide Installation Package
U.S. Department of Homeland Security (DHS) Data Feed

Archer Corporate Obligations Management

 Archer IT Regulatory Management

Implementation Guide Installation Package
U.S. Department of Health and Human Services (HHS) Data Feed

Archer Corporate Obligations Management

Archer IT Regulatory Management

Implementation Guide Installation Package
U.S. Department of the Treasury Specially Designated National and Blocked Persons List

Archer Third Party Catalog

Archer Third Party Engagement

Archer Issues Management

Implementation Guide Installation Package
Venminder Third Party Risk Management update_black_small.png

 Archer Third Party Catalog

Implementation Guide Installation Package
Veracode Platform Integration 

Archer IT Security Vulnerabilities Program

Implementation Guide Installation Package
Wolters Kluwer Regulatory Data Feed 

Archer Corporate Obligations Management

Archer IT Regulatory Management

Implementation Guide Installation Package

 

Content

Content Name and Overview

Content Package

Act on the Protection of Personal Information of Japan (2003) Authoritative Source

Content Package
American Institute of CPAs (AICPA) Privacy Maturity Model Authoritative Source  Content Package
Archer Control Assessment Questionnaire Content  Content Package
Archer Control Standards Library

Content Packages:

English

German

Spanish

Italian

Japanese

Portuguese

Russian

Simplified Chinese

French

Archer Financial Regulatory Assessment Questionnaire Content 

Content Package

Archer Fraud Assessment Questionnaire Content 

Content Package

Archer Policy Library

Content Packages:

English

German

Spanish

Italian

Japanese

Portuguese

Russian

Simplified Chinese

French

Archer Question Library

Content Packages

Archer Third Party Pandemic Preparedness Assessment 

Content Package

Australian Cloud Security Controls Matrix (March 2022) Authoritative Source update_black_small.png

Content Package

Australian Government Information Security Manual (ISM) Authoritative Source update_black_small.png

Content Package

Australian Government Protective Security Policy Framework (PSPF) Authoritative Source Content Package
Australian Privacy Act Authoritative Source Content Package
Australian Prudential Standard CPS 234 and Prudential Practice Guide CPG 234 on Information Security Authoritative Source 

CPS 234 Content Package

CPG 234 Content Package

Axelos IT Infrastructure Library (ITIL) Authoritative Source  Content Package
BACEN 2025 Authoritative Source  Content Package
Bank Secrecy Act Authoritative Source Content Package
Baseline Security Recommendations for IOT Authoritative Source  Content Package
BIS Basel II Authoritative Source

Content Package

BIS Basel Core Principles for Effective Banking Supervision Authoritative Source

Content Package 

BIS Basel Principles for Operational Resilience Authoritative Source 

Content Package 

Brazil LGPD General Law for the Protection of Personal Data Authoritative Source  Content Package

California Consumer Privacy Act (CCPA) Regulation Authoritative Source  

Note: Please refer to the U.S. State Privacy Laws page for the California Consumer Privacy Act (CCPA) Authoritative Source. This page only contains Authoritative Source content for the CCPA regulation. 

Content Package

 

 

Canadian Anti-Spam Legislation (CASL) Authoritative Source

Content Package

Canadian Office of the Superintendent of Financial Institutions (OSFI) Authoritative Source 

Content Package
Center for Internet Security (CIS) - Critical Security Controls Authoritative Source  Requires CIS license validation. Please contact support.
Centers for Medicare and Medicaid Services Authoritative Source - Prescription Drug Benefit Manual (100-18)  Content Package 

Centers for Medicare and Medicaid Services Authoritative Source - Managed Care Manual (100-16) update_black_small.png

Content Package

Centers for Medicare and Medicaid Services Authoritative Source - Information Security (IS) Acceptable Risk Safeguards (ARS) (100-25) 

Content Package

Centers for Medicare and Medicaid Services Authoritative Source - Electronic Health Record (EHR) Meaningful Use  

Content Package

Chemical Facility Anti-Terrorism Standards Authoritative Source

Content Package
CISA Cyber Essentials Authoritative Sourcenew_darkblue_flipped_small.png Content Package
Clinger-Cohen Act Authoritative Source  Content Package
Cloud Security Alliance Cloud Controls Matrix Authoritative Source  Content Package
Cloud Security Alliance Cloud Controls Matrix - Consensus Assessments Initiative Questionnaire (CAIQ)  Content Package
CNSS Instruction No. 1253 Authoritative Source  Content Package
COGRIS Turkish Insurance Law Authoritative Source  Content Package
COGRIS Turkish Regulation on Banks' Information Systems and Electronic Banking Services Authoritative Source  Content Package 
Comisión Nacional Bancaria y de Valores de México Chapter X Authoritative Source  Content
Package
Criminal Justice Information Services Security Policy Authoritative Source  Content
Package
CTPAT Minimum Security Criteria for U.S. Exporters Authoritative Source new_darkblue_flipped_small.png
Content
Package
Cyber Risk Institute (CRI) Cybersecurity Profile (formerly FSSCC Cybersecurity Profile) Authoritative Source Content Package 
Cyber Essentials Plus Authoritative Source update_black_small.png Content Package
Cybersecurity Maturity Model Certification Framework (CMMC) Authoritative Source update_black_small.png

Authoritative Source Content Package

Controls Content Package

 

Cyber Security for Defence Suppliers Authoritative Source

Content Package

European Banking Authority (EBA) Guidelines on ICT and Security Risk Management Authoritative Source  Content Package
European Banking Authority (EBA) Guidelines on Outsourcing Arrangements Authoritative Source  Content Package
European Commission Digital Operational Resilience Act (DORA) Authoritative Source  Content Package
European Commission Ethics Guidelines for Trustworthy Artificial Intelligence Authoritative Source  Content Package
European Commission Regulation (EU) 2019/2088 Authoritative Source Content  Content Package
European Data Protection Board (EDPB) Recommendations 01/2020  Content Package
ETSI EN 303 645 Cyber Security for Consumer Internet of Things Authoritative Source Content Package
European Union General Data Protection Regulation (GDPR) Authoritative Source  Content Package
European Union Markets in Financial Instruments Directive (MIFID 2: Directive 2014/65/EU) Authoritative Source Content Package
European Union Privacy Directives Authoritative Source  Content Package
European Union Regulatory Technical Standards for Authentication Authoritative Source  Content Package
Fair Credit Reporting Act (FCRA) Authoritative Source Content  Content Package
F.A.A. Aircraft Situation Display to Industry (ASDI) Authoritative Source  Content Package
FCA PS21/3 Building Operational Resilience Authoritative Source Content Package
F.D.A. CFR Part 21 Authoritative Source  Content Package
Federal Financial Institutions Examination Council (FFIEC) Authentication and Access to Financial Institution Services and Systems Authoritative Source Content Package
Federal Financial Institutions Examination Council (FFIEC) Booklets Authoritative Source  Content Package

Financial Industry Regulatory Authority (FINRA) Rule Sets Authoritative Source 

Content Package
France Federal Data Protection Act Authoritative Source  Content Package
F.T.C. CAN-SPAM Act of 2003 Authoritative Source  Content Package
F.T.C. Red Flags Rule Authoritative Source  Content Package
Germany Federal Data Protection Act Authoritative Source  Content Package
G.S.A. FedRAMP Revision 4 Authoritative Source  Content Package
Health Insurance Portability and Accountability Act (HIPAA) Authoritative Source   Content Package
HITRUST CSF Authoritative Source 

Requires HITRUST license validation. Please contact support.

Hong Kong Monetary Authority (HKMA) Supervisory Policy Manual TM-G-1  Content Package
Hong Kong Monetary Authority (HKMA) E-banking Regulation Authoritative Source  Content Package
Hong Kong Monetary Authority (HKMA) Principles of Artificial Intelligence Content Package
Industrial Internet Consortium (IIC) IoT SMM Framework Authoritative Source  Content Package
Institute of Internal Auditors (IIA) Audit Control Assessment Questionnaire Content  Content Package
Institute of Internal Auditors (IIA) Standards  Content Package
Institution of Engineering and Technology (IET) Cyber Security and Safety Code of Practice Authoritative Source  Content Package
ISACA COBIT Authoritative Source 

COBIT 5 Content Package

 

COBIT 2019 Content Package

ISO/IEC 27001 and 27002 Standard Authoritative Sourceupdate_black_small.png

Requires ISO/IEC license validation. Please contact support.
Microsoft Software Development Lifecycle Authoritative Source  Content Package
Monetary Authority of Singapore (BCM) Authoritative Source  Content Package
Monetary Authority of Singapore (TRMG) Authoritative Source update_black_small.png Content Package
National Industrial Security Program Operating Manual (NISPOM) Authoritative Source  Content Package
National Institute of Standards and Technology Cybersecurity Framework Guidelines Authoritative Source  Content Package
National Institute of Standards and Technology Privacy Framework Authoritative Source  Content Package
National Institute of Standards and Technology Guidelines (FIPS 140-2) Authoritative Source Content  Content Package
National Institute of Standards and Technology Guidelines (FIPS 140-3) Authoritative Source Content Content Package
National Institute of Standards and Technology Guidelines (SP 800-37 Rev 2) Authoritative Source Content  Content Package
National Institute of Standards and Technology (SP 800-39) Guidelines Authoritative Source  Content Package
National Institute of Standards and Technology (SP 800-53 R4) Guidelines Authoritative Source Content Package
National Institute of Standards and Technology (SP 800-53 R5) Guidelines Authoritative Source update_black_small.png
Content Package
National Institute of Standards and Technology (SP 800-82 R2) Guidelines Authoritative Source  Content Package
National Institute of Standards and Technology (SP 800-171) Guidelines Authoritative Source  Content Package
National Institute of Standards and Technology (SP 800-172) Guidelines Authoritative Source Content Package
New York State Cybersecurity Requirements for Financial Services Companies Authoritative Source (formerly U.S. State Laws) Content Package
New Zealand Privacy Act 2020 Authoritative Source  Content Package
North American Electric Reliability Corporation (NERC) Standards Authoritative Source 

Content Package

North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Authoritative Source 

Content Package

OSHA Guidance on Mitigating and Preventing the Spread of COVID-19 in the Workplace

Content Package

Payment Card Industry Data Security Standard (PCI DSS) Authoritative Source update_black_small.png PCI 3.2.1 Content Package

PCI 4.0
Content Package
Personal Information Protection and Electronic Documents Act (PIPEDA) Authoritative Source  Content Package
Prudential Regulation Authority Internal Capital Adequacy Assessment Process (ICAAP) Authoritative Source  Content Package
Prudential Regulation Authority Outsourcing and Third Party Risk Management Supervisory Statement (SS2/21) Authoritative Source Content Package
Reserve Bank of India (RBI) Authoritative Source   Content Package
Secure Controls Framework (SCF) Authoritative Source  Content Package
Singapore Cybersecurity Act Authoritative Source Content Package
Solvency II Authoritative Source  Content Package
Shared Assessments Standard Information Gathering Template (SIG) Question Library Content 

2020 Content Package

2021 Content Package

2022 Content Package

State of Nevada Gaming Control Board Authoritative Source   Content Package
U.K. Bribery Act Authoritative Source  Content Package
U.K. Data Protection Act Authoritative Source  Content Package
U.K. National Cyber Security Centre (NCSC) Cyber Assessment Framework Authoritative Source  Content Package
U.K. Network and Information Systems Regulations Authoritative Source  Content Package
U.S. Department of Defense Authoritative Source  Content Package
U.S. Department of Education Family Educational Rights and Privacy Act (FERPA) Authoritative Source  Content Package
U.S. Department of Health and Human Services (HHS) Technical Volumes: Cybersecurity Practices for Health Care Organizations Authoritative Source

Medium and Large Organizations Content Package

 

Small Organizations Content Package

U.S. Federal Information Security Management Act (FISMA) Authoritative Source  Content Package
U.S. Foreign Account Tax Compliance (FATCA) Authoritative Source  Content Package
U.S. Foreign Corrupt Practices Act (FCPA) Authoritative Source  Content Package
U.S. G.A.O. Federal Information System Controls Audit Manuals (FISCAM) Authoritative Source  Content Package
U.S. Gramm-Leach-Bliley Act (GLBA) Full Text Authoritative Source Content Package
U.S. Gramm-Leach-Bliley Act (GLBA) Authoritative Source  Content Package
U.S. HHS/CDC Business Pandemic Influenza Planning Checklist Questionnaire Library Content Content Package
U.S. HHS/CDC Business Pandemic Influenza Planning Checklist BC/DR Content Content Package
U.S. HiTech Act Authoritative Source  Content Package
U.S. International Traffic in Arms (ITAR) Authoritative Source   Content Package
U.S. Office of Management and Budget (OMB) Circular No. A-130 Appendix I Authoritative Source   Content Package
U.S. Office of Management and Budget (OMB) Appendix III to OMB Circular No. A-130 Authoritative Source Content Package
U.S. Sarbanes-Oxley Act Authoritative Source  Content Package
U.S. Sarbanes-Oxley Master Controls Authoritative Source  Content Package
U.S. Securities and Exchange Commission (SEC) Investment Advisers Act Authoritative Source Content Package
U.S. Securities and Exchange Commission (SEC) Investment Company Act Authoritative Source Content Package
U.S. State Breach Notification Laws Authoritative Source (formerly U.S. State Privacy Laws)  Content Package
U.S. State Data Security Laws Authoritative Source 

Companies and Insurers Content Package

 

Government Content Package

U.S. State Privacy Laws Authoritative Source 

Content Package

U.S. White House 25 Point Implementation Plan to Reform Federal Information Technology Management Authoritative Source  Content Package

 

new_red_flipped_small.png  Newly Added to the Archer Exchange         update_black_small.png  Recently Updated

If you have additional ideas for future Archer Exchange offerings, please submit them to Archer Ideas.

Was this article helpful? Yes No
Version history
Last update:
Friday
Updated by: