Cybersecurity Regulations: Statute and Code Reference
This page provides a structured reference to the 17 regulatory citations tracked across Application Security Authority. All citations are extracted from page content and verified against primary sources.
Citation Summary
Category
Count
Federal Regulations (C.F.R.)
3
Named Federal Acts
13
Executive Orders
1
Total
17
Federal Regulations (C.F.R.)
Named Federal Acts
Citation
Jurisdiction
Century Cures Act
US
Computer Fraud and Abuse Act
US
Consolidated Appropriations Act
US
Consumer Privacy Act
US
FTC Act
US
False Claims Act
US
Federal Food, Drug, and Cosmetic Act
US
Jenkins, GitHub Act
US
Leach-Bliley Act
US
Online Privacy Protection Act
US
The EU Cyber Resilience Act
US
The Health Information Technology for Economic and Clinical Health Act
US
The Health Insurance Portability and Accountability Act
US
Executive Orders
Pages with Regulatory Citations
Recent Regulatory Changes
Monitoring Sources
Citations on this site are monitored against the following regulatory data sources:
Ashrae (last checked: 2026-03-09)
Congress (last checked: 2026-03-09)
Ecfr (last checked: 2026-03-09)
Federal Register (last checked: 2026-02-28)
Nfpa (last checked: 2026-03-09)
Openstates (last checked: 2026-03-09)
Citation data last extracted: 2026-03-08
Explore This Site
Topics (56)
Browse topics…
Application Security Fundamentals
Secure Software Development Lifecycle (SSDLC)
OWASP Top Ten Vulnerabilities Explained
Web Application Security Testing
Mobile Application Security
API Security Best Practices
Static Application Security Testing (SAST)
Dynamic Application Security Testing (DAST)
Interactive Application Security Testing (IAST)
Software Composition Analysis (SCA)
DevSecOps Practices and Implementation
Threat Modeling for Applications
Application Penetration Testing
Secure Code Review Methodology
Injection Attack Prevention
Cross-Site Scripting (XSS): Detection and Prevention
Cross-Site Request Forgery (CSRF) Defense
Authentication and Authorization Security
OAuth and OpenID Connect Security
JSON Web Token (JWT) Security
Application Security in CI/CD Pipelines
Container and Kubernetes Application Security
Serverless Application Security
Cloud-Native Application Security
Microservices Security Architecture
Third-Party and Open Source Software Risk
Application Security Posture Management (ASPM)
Runtime Application Self-Protection (RASP)
Web Application Firewall (WAF) Selection and Use
Input Validation and Output Encoding
Session Management Security
Cryptography in Application Security
Secrets Management for Applications
Business Logic Vulnerability Testing
Broken Access Control: Risks and Remediation
Security Misconfiguration Prevention
Supply Chain Security for Software
Software Bill of Materials (SBOM) in AppSec
NIST Secure Software Development Framework (SSDF)
PCI DSS Application Security Requirements
HIPAA Application Security Compliance
Application Security Certifications and Credentials
Building an Enterprise Application Security Program
Application Security Metrics and KPIs
Vulnerability Disclosure and Bug Bounty Programs
Application Security Tools Comparison
Application Security Vendor Directory
Application Security Glossary
Application Security Careers and Roles
Application Security Training and Resources
GraphQL Security Risks and Controls
Insecure Deserialization Vulnerabilities
XML Security Vulnerabilities (XXE, XPath Injection)
Clickjacking Defense and UI Redressing
Security Headers for Web Applications
Application Security Incident Response
Tools & Calculators
Password Strength Calculator