Cybersecurity Regulations: Statute and Code Reference
This page provides a structured reference to the 28 regulatory citations tracked across Server Security Authority. All citations are extracted from page content and verified against primary sources.
Citation Summary
Category
Count
Federal Statutes (U.S. Code)
6
Federal Regulations (C.F.R.)
2
Named Federal Acts
19
Executive Orders
1
Total
28
Federal Statutes (U.S. Code)
Federal Regulations (C.F.R.)
Named Federal Acts
Citation
Jurisdiction
Azure Act
US
Bank Secrecy Act
US
California Consumer Privacy Act
US
CloudTrail, Azure Act
US
Electronic Communications Privacy Act
US
Enterprise Act
US
Federal Information Security Modernization Act
US
Foundational Cybersecurity Act
US
Health Insurance Portability and Accountability Act
US
Implementing the Health Insurance Portability and Accountability Act
US
Leach-Bliley Act
US
Post-Incident Act
US
Recovery, and Post-Incident Act
US
SHIELD Act
US
Sarbanes-Oxley Act
US
Technical Approaches to Uncovering and Remediating Malicious Act
US
The Federal Information Security Modernization Act
US
The Health Insurance Portability and Accountability Act
US
Threat Act
US
Executive Orders
Pages with Regulatory Citations
Recent Regulatory Changes
Monitoring Sources
Citations on this site are monitored against the following regulatory data sources:
Ashrae (last checked: 2026-03-09)
Congress (last checked: 2026-03-09)
Ecfr (last checked: 2026-03-09)
Federal Register (last checked: 2026-02-28)
Nfpa (last checked: 2026-03-09)
Openstates (last checked: 2026-03-09)
Citation data last extracted: 2026-03-08
Explore This Site
Topics (51)
Browse topics…
Server Hardening Fundamentals
Linux Server Security Best Practices
Windows Server Security Best Practices
Web Server Security Configuration
Database Server Security
Server Patch Management
Server Vulnerability Scanning
Server Access Control and Privilege Management
Server Firewall Configuration
Server Intrusion Detection Systems
Server Log Monitoring and Analysis
Server Encryption: At Rest and In Transit
SSH Security Best Practices
Server Authentication Methods
Multi-Factor Authentication for Servers
Server Backup and Recovery Security
Cloud Server Security
Virtual Machine and Hypervisor Security
Container and Docker Server Security
Kubernetes Server Security
Server Network Segmentation
DMZ Architecture and Server Placement
Server Decommissioning and Data Disposal
Server Security Auditing and Compliance
NIST Guidelines for Server Security
CIS Benchmarks for Servers
Server Ransomware Prevention and Response
Server Malware Detection and Removal
Server DDoS and DoS Mitigation
Server-Side Request Forgery (SSRF) Prevention
Remote Desktop Protocol (RDP) Security
VPN Server Security
DNS Server Security
Mail Server Security
File Server Security
Server Certificate and PKI Management
TLS/SSL Configuration for Servers
Server Security Incident Response
Server Forensics and Post-Breach Analysis
Zero Trust Architecture for Servers
Server Security Monitoring Tools
SIEM Integration for Server Environments
Server Security for Small and Midsize Businesses
Server Security for Healthcare Organizations
Server Security for Financial Institutions
US Regulatory Requirements Affecting Server Security
Server Security Vendor Directory
Server Security Certifications and Training
Server Security Glossary
Common Server Attack Vectors
Server Security Risk Assessment
Tools & Calculators
Password Strength Calculator