Cybersecurity Regulations: Statute and Code Reference
This page provides a structured reference to the 25 regulatory citations tracked across Cloud Security Authority. All citations are extracted from page content and verified against primary sources.
Citation Summary
Category
Count
Federal Statutes (U.S. Code)
1
Named Federal Acts
22
Executive Orders
1
Public Laws
1
Total
25
Federal Statutes (U.S. Code)
Named Federal Acts
Citation
Jurisdiction
Azure Act
US
California Consumer Privacy Act
US
CloudTrail, Azure Act
US
Data Read, Data Write, and Admin Act
US
FTC Act
US
FedRAMP Authorization Act
US
Federal Civil Penalties Inflation Adjustment Act
US
Federal Information Security Modernization Act
US
Federal Information Security Modernization Act of 2014
US
GitHub Act
US
HHS OCR Enforcement Act
US
Health Insurance Portability and Accountability Act
US
Health Insurance Portability and Accountability Act of 1996
US
Implementing the Health Insurance Portability and Accountability Act
US
Jenkins, GitHub Act
US
Leach-Bliley Act
US
Microsoft Act
US
National Defense Authorization Act
US
Post-Incident Act
US
Texas Privacy Protection Act
US
The FedRAMP Authorization Act
US
The Health Insurance Portability and Accountability Act
US
Executive Orders
Public Laws
Pages with Regulatory Citations
Recent Regulatory Changes
Monitoring Sources
Citations on this site are monitored against the following regulatory data sources:
Ashrae (last checked: 2026-03-09)
Congress (last checked: 2026-03-09)
Ecfr (last checked: 2026-03-09)
Federal Register (last checked: 2026-02-28)
Nfpa (last checked: 2026-03-09)
Openstates (last checked: 2026-03-09)
Citation data last extracted: 2026-03-08
Explore This Site
Topics (48)
Browse topics…
Cloud Security Fundamentals
Shared Responsibility Model in Cloud Security
Cloud Security Posture Management (CSPM)
Cloud Workload Protection Platforms (CWPP)
Cloud Access Security Broker (CASB)
Zero Trust Architecture for Cloud Environments
Cloud Identity and Access Management (IAM)
Cloud Data Encryption Standards and Practices
Cloud Network Security Controls
Cloud Security Compliance Frameworks
FedRAMP Requirements for Cloud Providers
SOC 2 Compliance for Cloud Services
Cloud Security Incident Response Planning
Cloud Vulnerability Management
Container Security Best Practices
Kubernetes Security Hardening
Serverless Architecture Security
Cloud API Security
DevSecOps in Cloud Environments
Cloud Threat Detection and Response
Cloud SIEM Solutions
Multi-Cloud Security Strategy
Hybrid Cloud Security Architecture
Cloud Data Loss Prevention (DLP)
Cloud Key Management Services
Cloud Privileged Access Management (PAM)
Infrastructure as Code (IaC) Security
Cloud Misconfiguration Risks and Remediation
Cloud Storage Security Controls
AWS Security Controls and Best Practices
Microsoft Azure Security Controls and Best Practices
Google Cloud Platform Security Controls
Cloud Penetration Testing Methodologies
Cloud Security Audit Processes
Cloud Ransomware Defense Strategies
Cloud Insider Threat Prevention
Cloud Supply Chain Security
Cloud Security Professional Certifications
Cloud Security Vendor Directory
Cloud Security Tools Comparison
NIST Cloud Security Guidelines
Cloud Security for Healthcare Organizations
Cloud Security for Financial Services
Cloud Security for US Government Agencies
Cloud Backup and Disaster Recovery Security
Cloud Security Maturity Model
Cloud Runtime Security Monitoring
Cloud Security Glossary of Terms
Tools & Calculators
Password Strength Calculator