US Cybersecurity Regulations: FISMA, HIPAA, CMMC, and More

The US cybersecurity regulatory landscape spans federal statutes, sector-specific rules, and defense procurement standards that impose distinct technical controls, audit requirements, and penalty structures on covered organizations. This page maps the major frameworks — FISMA, HIPAA, CMMC, PCI DSS, SOX, NERC CIP, and GLBA — describing their scope, enforcement mechanisms, structural requirements, and the tradeoffs organizations face when operating across multiple regimes simultaneously. The landscape is enforced by at least seven distinct federal agencies with overlapping jurisdictions across healthcare, defense, finance, energy, and critical infrastructure sectors.



Definition and Scope

US cybersecurity regulations are legally binding instruments — statutes, implementing rules, and contractual flow-down requirements — that prescribe minimum security practices for organizations handling defined categories of data or operating within designated sectors. Unlike voluntary information security frameworks such as the NIST Cybersecurity Framework (CSF), regulatory instruments carry enforcement authority: agencies can impose civil monetary penalties, suspend contracts, or refer cases for criminal prosecution when requirements are not met.

The regulatory perimeter is defined by covered entity status, data type, and sector affiliation rather than by organizational size. A 10-person healthcare practice that stores protected health information (PHI) is subject to the same HIPAA Security Rule technical safeguard requirements as a hospital system with 50,000 employees. Similarly, a defense contractor handling Controlled Unclassified Information (CUI) on a single federal contract falls under Cybersecurity Maturity Model Certification (CMMC) requirements regardless of company revenue.

The Federal Information Security Modernization Act (FISMA), codified at 44 U.S.C. §§ 3551–3558, governs federal agencies and their contractors across the entire executive branch. The Health Insurance Portability and Accountability Act of 1996 and its implementing rules at 45 CFR Parts 160 and 164 govern healthcare covered entities and business associates. CMMC 2.0, administered by the Department of Defense (DoD), applies to the defense industrial base — an estimated 300,000 contractor organizations as of the final rule published in the Federal Register in October 2024. The North American Electric Reliability Corporation's Critical Infrastructure Protection standards (NERC CIP) apply to bulk electric system owners and operators. The Gramm-Leach-Bliley Act (GLBA) covers financial institutions under FTC jurisdiction.


Core Mechanics or Structure

Each major regulatory framework operates through a common structural logic: scope triggers, control requirements, documentation obligations, and enforcement mechanisms.

FISMA requires federal agencies to implement security programs based on NIST SP 800-53, which contains 20 control families and over 1,000 individual controls and control enhancements in its Rev 5 release. Agencies categorize information systems using FIPS 199 into Low, Moderate, or High impact levels. Systems at each impact level must implement a baseline control set from NIST SP 800-53B. Annual reporting flows to the Office of Management and Budget (OMB) and is audited by Inspectors General under OMB Circular A-130.

HIPAA Security Rule (45 CFR §164.300–318) organizes controls into three categories: administrative safeguards (workforce training, risk analysis), physical safeguards (facility access controls, workstation security), and technical safeguards (access controls, audit controls, encryption standards, transmission security). The HIPAA Privacy Rule and Breach Notification Rule (45 CFR §§164.400–414) require covered entities to report breaches affecting 500 or more individuals to the HHS Office for Civil Rights (OCR) within 60 days of discovery (HHS Breach Notification Rule).

CMMC 2.0 establishes three maturity levels. Level 1 requires self-assessment against 17 practices drawn from NIST SP 800-171. Level 2 requires 110 practices aligned to NIST SP 800-171 Rev 2, with third-party assessment (C3PAO) required for contracts involving critical national security information. Level 3 adds practices from NIST SP 800-172 for programs designated as highest priority by DoD.

NERC CIP standards (CIP-002 through CIP-014) require bulk electric system asset owners to classify assets by impact level, implement electronic security perimeters, manage supply chain risk, and conduct 35-hour annual cybersecurity training for personnel with access to high-impact BES Cyber Systems (NERC CIP Standards).

PCI DSS v4.0, published by the PCI Security Standards Council in March 2022, contains 12 requirements organized around protecting cardholder data. It is technically a contractual standard enforced through payment card network agreements rather than a statute, but non-compliance can result in fines up to $100,000 per month imposed by card brands (Visa/Mastercard), per the PCI SSC framework documentation.


Causal Relationships or Drivers

The proliferation of distinct regulatory frameworks follows identifiable structural causes rather than coordinated policy design.

Sector-specific legislative history produced independent statutory regimes before any unified federal cybersecurity policy existed. HIPAA passed in 1996; GLBA in 1999; FISMA (as the Federal Information Security Management Act) in 2002; NERC CIP standards were mandated by the Energy Policy Act of 2005. Each statute responded to sector-specific concerns — healthcare data portability, financial privacy, federal IT risk management, grid reliability — rather than to a common threat taxonomy.

Incident-driven regulatory expansion has consistently followed high-profile breaches. The HITECH Act of 2009 strengthened HIPAA enforcement and introduced breach notification requirements after large healthcare data exposures. Executive Order 14028 (May 2021) on Improving the Nation's Cybersecurity directed NIST to develop software supply chain security guidance (supply chain security) following the SolarWinds compromise. CMMC itself was formulated after DoD identified persistent adversarial exfiltration of CUI from contractor networks.

Contractor flow-down mechanisms extend regulatory reach beyond direct statutory subjects. Defense contractors flow CMMC requirements to subcontractors through DFARS clause 252.204-7021. HIPAA business associate agreements (BAAs) extend PHI obligations to cloud providers, billing services, and IT vendors. This creates a layered compliance obligation where a mid-tier contractor may simultaneously face CMMC Level 2 requirements, SOC 2 audit expectations from commercial customers, and state-level breach notification requirements.


Classification Boundaries

The boundaries between frameworks turn on four classification axes: sector affiliation, data type, organizational role, and contract vehicle.

Axis FISMA HIPAA CMMC NERC CIP PCI DSS GLBA
Primary trigger Federal agency/contractor PHI handler DoD contractor BES operator Cardholder data Financial institution
Governing body OMB/CISA/NIST HHS OCR DoD/DCSA NERC/FERC PCI SSC FTC/banking regulators
Assessment type ATO/FedRAMP Internal/OCR audit Self or C3PAO NERC audit QSA/SAQ Examiner/FTC
Data classification CUI/Federal info PHI CUI/CTI BES Cyber System CHD/SAD NPI

Organizations that cross sector boundaries — a hospital system that also operates a utility subsidiary and accepts credit card payments — may simultaneously be subject to HIPAA, NERC CIP, and PCI DSS, with no formal harmonization mechanism between the three enforcement bodies.

Identity and access management controls represent one of the highest-overlap areas: HIPAA §164.312(a)(1), NIST SP 800-53 AC control family, CMMC AC domain (17 practices at Level 1), and NERC CIP-007 each specify access control requirements using different terminology, scoping rules, and audit evidence standards.


Tradeoffs and Tensions

Prescriptive vs. risk-based compliance is the central structural tension across frameworks. NERC CIP and PCI DSS prescribe specific technical controls (e.g., 15-minute session timeout for interactive remote access under CIP-005-7; quarterly vulnerability scans under PCI DSS Requirement 11.3). FISMA/NIST SP 800-53 and CMMC adopt a risk-based model where control selection can be tailored to system categorization. Organizations often find prescriptive mandates easier to audit against but less responsive to actual threat environments — a tension documented in NIST IR 8170, which addresses the relationship between the Cybersecurity Framework and other standards.

Audit fatigue and duplicative evidence collection imposes measurable overhead on organizations subject to four or more frameworks. A defense contractor holding a DoD contract and processing healthcare payment data might simultaneously maintain CMMC assessment artifacts, HIPAA Security Rule documentation, PCI DSS evidence packages, and SOC 2 Type II reports — each requiring different control narratives, scoping boundaries, and assessor relationships.

Penalty asymmetry creates perverse incentives. HIPAA civil monetary penalties range from $100 to $50,000 per violation per calendar year, with an annual cap of $1.9 million per violation category, per HHS CMPs and Notices. NERC CIP penalties can reach $1 million per violation per day under 16 U.S.C. §824o(e). PCI DSS penalties are contractual rather than statutory, creating enforcement variability. This asymmetry means that identical technical failures carry vastly different financial consequences depending on which framework governs.

FedRAMP and CMMC interaction creates friction for cloud service providers. A CSP seeking to serve DoD customers at CMMC Level 2 must also achieve FedRAMP Moderate authorization under separate processes run by the General Services Administration (FedRAMP), with no formal reciprocity pathway that eliminates dual assessment burden as of the 2024 CMMC final rule.


Common Misconceptions

Misconception: HIPAA requires encryption of PHI at rest.
The HIPAA Security Rule at 45 CFR §164.312(a)(2)(iv) lists encryption as an "addressable" implementation specification, not a "required" one. An addressable specification must be implemented if reasonable and appropriate — but a covered entity can document an alternative equivalent measure instead. This does not mean encryption is optional in practice; OCR's enforcement history shows encryption failures consistently cited as aggravating factors in penalty calculations.

Misconception: FISMA compliance equals security.
FISMA establishes a documentation and audit process — authorization to operate (ATO) — not a guarantee of operational security posture. The Government Accountability Office (GAO) has repeatedly found that agencies with valid ATOs still exhibit significant control deficiencies when audited against actual technical configurations.

Misconception: CMMC applies only to prime contractors.
CMMC requirements flow to subcontractors through DFARS 252.204-7021 whenever a subcontractor handles CUI. A second-tier supplier providing software components to a prime may face Level 2 assessment requirements under the terms of its subcontract.

Misconception: PCI DSS compliance is a federal legal obligation.
PCI DSS is a contractual standard administered by a private industry body. No US federal statute mandates PCI DSS compliance directly. The legal obligation arises from payment card network agreements between merchants, acquirers, and card brands.

Misconception: SOX cybersecurity requirements only affect IT departments.
Sarbanes-Oxley Act Section 404 (15 U.S.C. §7262) requires management assessment of internal controls over financial reporting (ICFR). The SEC has clarified that cybersecurity controls supporting financial systems — access controls, change management, segregation of duties — fall within ICFR scope, making SOX a cybersecurity instrument with direct audit committee and CFO accountability.


Checklist or Steps

The following sequence describes the structural phases an organization moves through when establishing multi-framework compliance standing. This is a descriptive account of the process as it operates across the sector — not advisory guidance.

  1. Scope determination — Identify which frameworks apply based on sector affiliation, data types processed, federal contract vehicles held, and payment processing relationships. A single organization may trigger FISMA, HIPAA, CMMC, and PCI DSS simultaneously.

  2. Asset inventory and data flow mapping — Document all systems, networks, and data stores where regulated data resides or transits. NIST SP 800-171 and CMMC both require a System Security Plan (SSP) as a foundational artifact; HIPAA requires a documented risk analysis under 45 CFR §164.308(a)(1).

  3. Control gap assessment — Map existing security controls against each applicable framework's control set. CMMC practitioners use the DCSA Assessment Process Guide; HIPAA practitioners reference HHS's Security Risk Assessment Tool (SRA Tool).

  4. Remediation planning — Prioritize control gaps by framework penalty severity, exploitability, and implementation complexity. Organizations with vulnerability management programs typically integrate this into existing tracking systems.

  5. Documentation and evidence assembly — Produce required policy documents, SSPs, plans of action and milestones (POA&Ms), and audit logs. FISMA requires POA&Ms; CMMC requires them as a scored artifact in Level 2 assessments.

  6. Assessment and authorization — Submit to the appropriate third-party assessment mechanism: C3PAO for CMMC Level 2, Qualified Security Assessor (QSA) for PCI DSS, authorized FedRAMP 3PAO for cloud systems, or NERC regional entity audit for CIP.

  7. Continuous monitoring — Implement ongoing monitoring per NIST SP 800-137 for FISMA systems; maintain log management and SIEM capabilities to satisfy audit log requirements across HIPAA §164.312(b), CMMC AU domain, and CIP-007-6 R5.

  8. Annual review and reassessment cycles — FISMA agencies report annually to OMB; CMMC Level 2 assessments recur on a 3-year cycle; NERC CIP audits follow FERC-approved schedules; HIPAA requires periodic risk analysis updates without a fixed statutory interval.


Reference Table or Matrix

| Framework |

📜 10 regulatory citations referenced  ·  🔍 Monitored by ANA Regulatory Watch  ·  View update log

Explore This Site