Framework Depth

Go deep in order, not wide by slogan.

OpenCompliance now treats framework depth as a machine-readable planning surface for real software startups. The public priority stack now starts with core assurance, then privacy and cloud extensions, then open baseline control frameworks, then operational and resilience standards, then AI governance and AI security, and finally the market-triggered regimes that matter only when the operating model or customer set changes. The stack also keeps roles separate: some items are laws, some are standards, some are accreditation and certification infrastructure, and some are public-sector market-entry programmes.

Core Order

1

ISO 27001

Still the strongest security-management baseline for customer diligence. OpenCompliance keeps ISO exact anchors honest by treating them as a blocker state until licensed review exists, while continuing private seed decomposition and public narrow-control promotion.

2

SOC 2

Still central for US buyer assurance. The current public corridor already exposes the technical overlap with ISO 27001, but exact criterion and point-of-focus publication remains explicitly blocked until licensed review exists. The point is better pre-audit semantics and evidence, not a synthetic SOC report or CPA opinion.

3

GDPR

Public exact anchors are feasible, which makes GDPR the first place where OpenCompliance can move from family proxies toward a broader reviewed article-level layer without licensing blockers.

4

IRAP

IRAP and the public ISM controls matter because the Australian market needs a public exact-anchor path and because hosted shared-responsibility assumptions can be made explicit rather than buried in prose. The value is better machine-readable reuse for agencies, vendors, and assessors, not pretending the public package replaces assessor judgment.

Role Boundaries Before Framework Depth

Law

Regimes like GDPR and the EU AI Act are not just control catalogs.

They carry role-based legal obligations, rights, accountability, and enforcement. OpenCompliance can formalise narrow technical or documentary corridors inside them, but it should never imply that the proof layer settles the full legal question.

Certification

Certification and accreditation remain separate institutions.

ISO-family work sits alongside certification bodies and accreditation structures; OpenCompliance does not replace them. The public repo stack should make their role clearer, not blur it into a generic "verified" label.

Assurance

SOC remains CPA examination territory.

The open corridor can narrow evidence and map overlap, but licensed CPA firms still perform the examination work and issue the opinion-bearing report. The public site should keep that boundary obvious.

Authorisation

Public-sector regimes need reusable machine-readable packages.

FedRAMP, IRAP, and similar programmes matter because agencies, CSPs, and assessors can reuse structured artifacts. They should be in the stack for that reason, not as prestige additions for every startup homepage.

Startup Baselines After The Core Four

Privacy

ISO privacy and cloud extensions

The next ISO-family layers that ordinary SaaS startups should care about are ISO/IEC 27701, ISO/IEC 27017, and ISO/IEC 27018. Together they cover privacy-management, cloud-specific security controls, and cloud privacy expectations that sit naturally on top of ISO 27001 and GDPR, even though exact clause publication still needs licensed review.

Baseline

Open cyber control frameworks

NIST CSF 2.0, Cyber Essentials, NCSC CAF 4.0, and NIST SP 800-53 Rev. 5.1 are the best openly reviewable baseline frameworks for startups that want to say something precise about security before the ISO-family exact-anchor problem is fully solved. These are especially useful because the source texts are public enough to review in the open.

Operations

Continuity, service, and quality

ISO 22301, ISO/IEC 20000-1, and ISO 9001 belong in the public repo stack because startups eventually need continuity, service-management, and process-quality evidence, not only point-in-time security claims. These are follow-on standards, not day-one proof targets.

Count

What the public stack now covers

The public machine-readable priority file now lists fifty-eight frameworks and regimes. Not all of them are equally urgent. The point is to make the order explicit so contributors can see what every startup should care about, what only matters after the company matures operationally, and what only becomes relevant when it enters a specific regulated market.

AI Priorities

Tier 1

Immediate AI standards

The current immediate AI wave remains the EU AI Act, UK ICO AI guidance, the UK AI Cyber Security Code of Practice, NIST AI RMF, NIST AI 600-1, NIST AI 100-4, ISO/IEC 5338, ISO/IEC 42001, and ISO/IEC 42005. That keeps one binding EU regime, one UK privacy-regulator lens, one UK AI security baseline, one mature NIST governance backbone, one GenAI profile, one provenance layer, and the most relevant ISO AI governance candidates in one visible stack. The AI Act piece is role-based by design: provider, deployer, transparency, human-oversight, and conformity obligations cannot be compressed into one model-evaluation score.

The public stack now also tracks the newer ISO AI standards around explainability, terminology, machine-learning system structure, governance, and certification-layer maturity: ISO/IEC TS 6254, ISO/IEC 22989, ISO/IEC 23053, ISO/IEC 38507, ISO/IEC 42006, and the draft-watch item ISO/IEC AWI 42003. Some of those are still inventory-only today. That is intentional. Zero-coverage is better than invisible backlog.

For agentic AI in particular, the privacy side has to stay visible too: purpose limitation, lawful-basis drift, sensitive inference, rights handling, explainability, retention, and supply-chain roles are not secondary implementation details.

Tier 2

Regional and technical AI follow-ons

After that come ISO/IEC 5259-5, ISO/IEC TS 6254, ISO/IEC 23053, ISO/IEC 38507, Australia’s Voluntary AI Safety Standard, ETSI EN 304 223, ETSI TS 104 008, ISO/IEC 23894, NIST SP 800-218A, NIST AI 700-2, and the EU GPAI Code of Practice. These matter for AI data governance, explainability, engineering structure, governance, continuous conformity, evaluation, secure development, and regional expansion, but they sit behind the immediate AI wave for most startups.

Watch list

Emerging AI items

NIST AI 800-1, ISO/IEC AWI 25704, and ISO/IEC AWI 42003 still matter, but they remain behind the active implementation queue because they are draft or still too immature to justify deeper public mapping work right now. ISO/IEC 22989 also sits partly in this watch layer because it is foundational vocabulary rather than an immediate control framework.

Open rule

Public review before fake completeness

Public exact anchors should only be published where the source is actually open enough to review responsibly. That means GDPR, IRAP, NIST, NCSC, EU regulations, HHS, FedRAMP, and PCI material can move faster than ISO 27001, SOC 2, or the ISO-family extensions that still need licensed review.

Agentic AI Data Protection

Purpose

Autonomy needs explicit purpose boundaries

An agent that can initiate tasks can also drift into new processing purposes. OpenCompliance should make purpose-bounded tasks, lawful basis, and fresh review triggers visible rather than assuming the original prompt covers everything that follows.

Rights

Human rights handling should stay operational

Access, rectification, erasure, objection, and human intervention should remain possible even when the AI acts across tools or vendors. Rights cannot be an afterthought attached to a black-box agent run.

Explainability

Reconstruct the decision path

For significant outcomes, the package should support reconstructing inputs, tool calls, policy gates, approvals, and overrides. That is the minimum serious explainability story for agentic systems.

Supply Chain

Controllers, processors, and transfers do not disappear

Agentic systems multiply model, connector, and recipient boundaries. The public site should keep controller, processor, recipient, and cross-border transfer mapping explicit instead of flattening the AI stack into one label.

Triggered Market-Entry Regimes

Payments

PCI DSS

PCI DSS should be visible in the public repos because many startups eventually touch payment flows, third-party card environments, or ecommerce infrastructure. It is not universal, but once it applies it stops being optional.

Healthcare

HIPAA rules and HITRUST

The healthcare trigger stack is bigger than the HIPAA Security Rule alone. The first public-safe health-law wave now covers a narrow overlap for HIPAA Privacy and Breach Notification around business-associate safeguards, breach runbooks, and escalation paths. HITRUST remains visible as a proprietary follow-on rather than being quietly blurred into HIPAA.

Finance

GLBA and NYDFS

Fintech startups often hit GLBA Safeguards Rule and New York DFS cybersecurity obligations before they hit the largest public-sector authorization stacks. OpenCompliance now has a first exact-anchor-reviewed overlap for MFA, logging, encryption, vendor terms, incident response, and secure disposal instead of leaving the whole financial stack as invisible backlog.

Consumer privacy

CCPA/CPRA and COPPA

Consumer-facing products do not stop at GDPR. The first California privacy-law wave now covers rights handling, retention and deletion governance, and service-provider or contractor terms. COPPA stays visible as a separate children’s-privacy trigger rather than being flattened into general consumer privacy.

Education

FERPA

Edtech startups handling student records or selling directly into schools need an explicit education-records regime in the stack. FERPA should be visible as its own legal boundary, not treated as generic privacy paperwork.

Government

GovRAMP, CJIS, and FedRAMP

Government-facing startups rarely jump straight from ordinary SaaS into full federal cloud scope. State and local authorization programmes plus CJIS obligations can matter earlier, while FedRAMP remains the larger federal market-entry path. The public stack should make that ladder visible.

EU sector triggers

NIS2, DORA, and the CRA

NIS2, DORA, and the Cyber Resilience Act matter when a startup enters critical-sector, financial-sector, or product-with-digital-elements territory in Europe. They should be shown clearly as triggered regimes rather than pretending every startup needs them on day one.

Medtech

ISO 13485, ISO 14971, and IEC 62304

Medtech and software-as-medical-device teams need a different follow-on stack again: quality systems, medical-device risk management, and regulated software life-cycle discipline. Those standards are not day-one SaaS priorities, but they should be visible for regulated-product startups.