Compliance Guides: Step-by-Step Implementation
Step-by-step guides to help you understand, implement, and maintain compliance with major frameworks. Written by experts with 25+ years of experience across ISO, NIST, SOC, GDPR, and hundreds more.
23 guides across 10 categories
ISO & Standards
How to Implement ISO 27001:2022 from Scratch
IntermediateA practical walkthrough for organisations beginning their ISO 27001:2022 journey. This guide covers scoping, risk assessment, control selection, and the path to certification audit, giving compliance teams a clear roadmap from day one.
ISO 9001:2015 Quality Management System: Implementation Guide
IntermediateThis guide walks compliance and quality teams through the implementation of an ISO 9001:2015 Quality Management System. It covers the process approach, documentation requirements, internal auditing, and strategies for continual improvement.
ISO 22301 Business Continuity: Getting Started
IntermediateA starter guide for building a Business Continuity Management System aligned with ISO 22301. Covers Business Impact Analysis, recovery strategy development, and the importance of regular testing and exercising.
ISO 42001 AI Management System: What You Need to Know
AdvancedISO 42001 is the first international standard for AI Management Systems. This guide explains its structure, core requirements, alignment with the EU AI Act, and how organisations can pursue certification to demonstrate responsible AI governance.
Cybersecurity
NIST Cybersecurity Framework 2.0: Adoption Guide
IntermediateThe NIST Cybersecurity Framework 2.0 introduces the Govern function and expanded guidance for all organisations. This guide covers what changed from version 1.1, how to build Current and Target Profiles, and a practical adoption roadmap.
CIS Controls v8: Prioritised Security Implementation
BeginnerThe CIS Controls v8 provide a prioritised set of cybersecurity actions organised into Implementation Groups. This guide explains how to assess your organisation's group, select appropriate controls, and build a phased implementation plan.
Essential Eight Maturity Model: Australian Cyber Strategy
BeginnerThe Australian Signals Directorate's Essential Eight strategies provide a baseline of cyber defence for Australian organisations. This guide covers all eight strategies, the maturity model levels, and practical steps to achieve compliance.
NIST 800-53 Rev 5: Federal Security Controls Guide
AdvancedNIST SP 800-53 Revision 5 provides a comprehensive catalog of security and privacy controls for federal information systems. This guide explains control families, baselines, the tailoring process, and alignment with FISMA compliance requirements.
Audit & Assurance
SOC 2 Type II Audit: Preparation Checklist
IntermediatePreparing for a SOC 2 Type II audit requires careful planning, robust evidence collection, and a thorough readiness assessment. This guide provides a structured checklist covering Trust Services Criteria, evidence requirements, and the differences between Type I and Type II reports.
Internal Audit Programme: Building from the Ground Up
IntermediateA well-structured internal audit programme is essential for maintaining management system compliance and driving improvement. This guide covers audit planning, auditor competence requirements, handling nonconformities, and implementing effective corrective actions.
Privacy
GDPR Compliance: A Practical Implementation Guide
IntermediateThe General Data Protection Regulation remains one of the most consequential privacy laws globally. This guide provides practical implementation steps covering lawful bases for processing, data subject rights, Data Protection Impact Assessments, and breach notification procedures.
CCPA/CPRA Consumer Privacy: Compliance Roadmap
IntermediateCalifornia's consumer privacy laws, the CCPA and its amendment the CPRA, create significant obligations for businesses handling California residents' personal information. This guide covers consumer rights, opt-out requirements, data inventory, and service provider contract requirements.
Privacy Impact Assessment: Step-by-Step Template
BeginnerA Privacy Impact Assessment (PIA) helps organisations identify and mitigate privacy risks before they materialise. This beginner-friendly guide provides a step-by-step template for conducting PIAs, including risk identification, mitigation planning, and documentation best practices.
Governance & Risk
Enterprise Risk Management: COSO ERM Framework Guide
AdvancedThe COSO Enterprise Risk Management framework integrates risk management with strategy and performance. This guide covers risk appetite, strategy integration, building a risk-aware culture, and the role of board oversight in effective ERM implementation.
GRC Programme: Integrating Governance, Risk and Compliance
AdvancedMany organisations manage governance, risk, and compliance in silos, creating inefficiency and blind spots. This guide explains how to build an integrated GRC programme that unifies policy management, control frameworks, and reporting into a cohesive system.
Third-Party Risk Management: Vendor Assessment Guide
IntermediateThird-party relationships introduce risks that organisations cannot ignore. This guide covers due diligence processes, vendor questionnaire design, ongoing monitoring strategies, and contractual controls that protect your organisation throughout the vendor lifecycle.
Financial Services
PCI DSS 4.0: What's Changed and How to Prepare
IntermediatePCI DSS 4.0 introduces the Customised Approach, stronger authentication requirements, and expanded e-commerce protections. This guide covers the major changes from version 3.2.1, the transition timeline, and practical preparation steps for merchants and service providers.
APRA CPS 230 Operational Risk: Australian Financial Services
AdvancedAPRA CPS 230 sets new expectations for operational risk management in Australian financial services. This guide covers the standard's requirements for operational resilience, critical operations identification, service provider management, and testing obligations.
AI & Emerging
EU AI Act: Compliance Guide for AI System Providers
AdvancedThe EU AI Act is the world's first comprehensive AI regulation, establishing a risk-based framework for AI systems in the European Union. This guide covers risk classification, obligations for high-risk AI, prohibited practices, and the conformity assessment process for providers.
NIST AI Risk Management Framework: Implementation Guide
IntermediateThe NIST AI Risk Management Framework provides a voluntary, flexible approach to managing AI risks. This guide covers the framework's structure, the Govern function, trustworthy AI characteristics, and practical approaches to addressing bias and fairness in AI systems.
Need a Guide for a Specific Framework?
We cover 692 compliance frameworks on our platform. If you need implementation guidance for a framework not listed here, our AI-powered compliance assistant can help you get started.
Frequently Asked Questions
What are compliance guides?
Compliance guides are step-by-step implementation instructions for specific compliance frameworks. Each guide covers the full journey from initial scoping through implementation to audit preparation, written by practitioners with 25+ years of hands-on experience.
Are the guides free?
Yes. All guides on this site are free to read. They are written to help compliance teams understand and implement frameworks without needing to hire external consultants. For deeper tooling, our compliance platform provides interactive framework mapping.
What frameworks do your guides cover?
Our guides cover ISO 27001, ISO 9001, ISO 22301, ISO 42001, NIST CSF, NIST 800-53, SOC 2, GDPR, CCPA/CPRA, HIPAA, PCI DSS, CIS Controls, Essential Eight, COSO ERM, and more. New guides are added regularly based on demand.
How are guides different from blog posts?
Guides provide structured, step-by-step implementation instructions for a specific framework or process. Blog posts provide analysis of trends, regulatory updates, and strategic insights. Guides tell you how; blog posts tell you why it matters.