California IoT Security Law
California IoT security law (SB-327)
Framework summaries on this platform are AI-assisted interpretations for educational and compliance planning purposes. They do not reproduce or replace the official standards. Refer to the authoritative source for the definitive text. Framework names and trademarks belong to their respective organisations.
Framework Domains (6)
California IoT Security Law: Access Control
Logical and physical access controls (California IoT Security Law)
| Code | Title |
|---|---|
| CA-IOT-11 | Access control policy and enforcement |
| CA-IOT-12 | User access management and provisioning |
| CA-IOT-13 | Authentication and password management |
| CA-IOT-14 | Privileged access management |
| CA-IOT-15 | Access review and recertification |
California IoT Security Law: Asset Management
Information asset management (California IoT Security Law)
| Code | Title |
|---|---|
| CA-IOT-06 | Asset inventory and ownership |
| CA-IOT-07 | Acceptable use of assets |
| CA-IOT-08 | Information classification and labeling |
| CA-IOT-09 | Asset handling procedures |
| CA-IOT-10 | Media management and disposal |
California IoT Security Law: Communications Security
Network and communications security (California IoT Security Law)
| Code | Title |
|---|---|
| CA-IOT-27 | Network security management |
| CA-IOT-28 | Network service security |
| CA-IOT-29 | Segregation in networks |
| CA-IOT-30 | Information transfer policies |
| CA-IOT-31 | Secure messaging |
California IoT Security Law: Cryptography
Cryptographic controls (California IoT Security Law)
| Code | Title |
|---|---|
| CA-IOT-16 | Cryptographic policy and key management |
| CA-IOT-17 | Encryption of data at rest |
| CA-IOT-18 | Encryption of data in transit |
| CA-IOT-19 | Certificate management |
| CA-IOT-20 | Key lifecycle management |
California IoT Security Law: Information Security Policies
Organizational information security policies (California IoT Security Law)
| Code | Title |
|---|---|
| CA-IOT-01 | Information security policy framework |
| CA-IOT-02 | Management direction and commitment |
| CA-IOT-03 | Policy review and update procedures |
| CA-IOT-04 | Roles and responsibilities definition |
| CA-IOT-05 | Contact with authorities and special interest groups |
California IoT Security Law: Operations Security
Secure operations and monitoring (California IoT Security Law)
| Code | Title |
|---|---|
| CA-IOT-21 | Operational procedures and responsibilities |
| CA-IOT-22 | Protection from malware |
| CA-IOT-23 | Backup and recovery procedures |
| CA-IOT-24 | Logging and monitoring |
| CA-IOT-25 | Technical vulnerability management |
| CA-IOT-26 | Audit considerations |
Maps to 588 other frameworks
Frequently Asked Questions
What is California IoT Security Law?
California IoT Security Law is a compliance framework from United States - California with 6 domains and 31 controls. California IoT security law (SB-327) It is used by organisations to establish and maintain compliance with industry standards and regulatory requirements.
How many controls does California IoT Security Law have?
California IoT Security Law has 31 controls organised across 6 domains. The largest domains are California IoT Security Law: Operations Security (6 controls), California IoT Security Law: Access Control (5 controls), California IoT Security Law: Asset Management (5 controls). Each control defines specific requirements that organisations must implement to achieve compliance.
What frameworks does California IoT Security Law map to?
California IoT Security Law maps to 588 other compliance frameworks. The top mapping partners are OWASP ASVS (55% coverage), BSIMM (55% coverage), 3GPP Security (55% coverage). Use our comparison tool to explore control-level mappings between frameworks.
How do I get started with California IoT Security Law compliance?
Start your California IoT Security Law compliance journey by running a self-assessment on our platform to identify your current compliance posture. Our AI advisory can answer specific questions about California IoT Security Law requirements, and cross-framework mapping helps you leverage existing controls from other frameworks you may already comply with. Create a free account to access all 31 controls and track your progress.
Start Your Compliance Journey
Create a free account to run self-assessments, get AI advisory, and track your compliance progress across 692 frameworks.
Get Started Free →Free forever — no credit card required