Back to Frameworks

GHG Protocol

International
v2015
5 domains
28 controls

The Greenhouse Gas Protocol Corporate Accounting and Reporting Standard (Revised Edition 2004/2015) and Corporate Value Chain (Scope 3) Accounting and Reporting Standard (2011). Published by the World Resources Institute (WRI) and the World Business Council for Sustainable Development (WBCSD). The most widely used international accounting tool for government and business to understand, quantify, and manage greenhouse gas emissions.

Verified

Framework summaries on this platform are AI-assisted interpretations for educational and compliance planning purposes. They do not reproduce or replace the official standards. Refer to the authoritative source for the definitive text. Framework names and trademarks belong to their respective organisations.

Framework Domains (5)

Reporting Principles

5 controls

Five core principles for GHG accounting and reporting

Controls in the Reporting Principles domain of GHG Protocol5 controls
CodeTitle
GHG-PRIN-1Relevance
GHG-PRIN-2Completeness
GHG-PRIN-3Consistency
GHG-PRIN-4Transparency
GHG-PRIN-5Accuracy

Scope 1: Direct Emissions

4 controls

GHG emissions from sources owned or controlled by the company

Controls in the Scope 1: Direct Emissions domain of GHG Protocol4 controls
CodeTitle
GHG-S1-1Stationary Combustion
GHG-S1-2Mobile Combustion
GHG-S1-3Process Emissions
GHG-S1-4Fugitive Emissions

Scope 2: Indirect Energy Emissions

4 controls

GHG emissions from purchased energy consumed by the company

Controls in the Scope 2: Indirect Energy Emissions domain of GHG Protocol4 controls
CodeTitle
GHG-S2-1Purchased Electricity
GHG-S2-2Purchased Steam
GHG-S2-3Purchased Heating
GHG-S2-4Purchased Cooling

Scope 3: Downstream Categories

7 controls

Value chain emissions - downstream categories 9-15

Controls in the Scope 3: Downstream Categories domain of GHG Protocol7 controls
CodeTitle
GHG-S3-10Processing of Sold Products
GHG-S3-11Use of Sold Products
GHG-S3-12End-of-Life Treatment of Sold Products
GHG-S3-13Downstream Leased Assets
GHG-S3-14Franchises
GHG-S3-15Investments
GHG-S3-9Downstream Transportation and Distribution

Scope 3: Upstream Categories

8 controls

Value chain emissions - upstream categories 1-8

Controls in the Scope 3: Upstream Categories domain of GHG Protocol8 controls
CodeTitle
GHG-S3-1Purchased Goods and Services
GHG-S3-2Capital Goods
GHG-S3-3Fuel- and Energy-Related Activities (Not in Scope 1 or 2)
GHG-S3-4Upstream Transportation and Distribution
GHG-S3-5Waste Generated in Operations
GHG-S3-6Business Travel
GHG-S3-7Employee Commuting
GHG-S3-8Upstream Leased Assets

Maps to 184 other frameworks

28 total controls
EU Taxonomy Regulation (Regulation 2020/852)
4 source controls mapped|3 target controls covered
14%
EU Taxonomy Regulation
4 source controls mapped|3 target controls covered
14%
EU SFDR (Sustainable Finance Disclosure Regulation)
4 source controls mapped|4 target controls covered
14%
CDP Corporate Questionnaire
3 source controls mapped|3 target controls covered
11%
Science Based Targets initiative (SBTi) Corporate Standard
3 source controls mapped|3 target controls covered
11%
CDP (formerly Carbon Disclosure Project)
3 source controls mapped|3 target controls covered
11%
Science Based Targets Initiative (SBTi) — Net-Zero Standard
3 source controls mapped|3 target controls covered
11%
BREEAM — Building Research Establishment Environmental Assessment Method
3 source controls mapped|3 target controls covered
11%
IEC 60601-1 — Medical Electrical Equipment Safety
3 source controls mapped|1 target controls covered
11%
NIST AI 600-1 Generative AI Profile
3 source controls mapped|2 target controls covered
11%
ISO 26000:2010
3 source controls mapped|2 target controls covered
11%
ISO 14064 — Greenhouse Gas Accounting and Verification (Parts 1-3)
3 source controls mapped|3 target controls covered
11%
NIST AI Risk Management Framework (AI RMF 1.0)
3 source controls mapped|1 target controls covered
11%
ITU Radio Regulations and Space Security Standards
3 source controls mapped|1 target controls covered
11%
ICMM Mining Principles (2024 Update)
3 source controls mapped|1 target controls covered
11%
SASB Standards (ISSB Integrated)
3 source controls mapped|1 target controls covered
11%
SASB Standards
3 source controls mapped|1 target controls covered
11%
IEC 62351 — Power Systems Communication Security
2 source controls mapped|2 target controls covered
7%
US Gramm-Leach-Bliley Act (GLBA) — Higher Education Safeguards Rule
2 source controls mapped|3 target controls covered
7%
FATF 40 Recommendations
2 source controls mapped|4 target controls covered
7%
FTC Safeguards Rule (16 CFR Part 314)
2 source controls mapped|4 target controls covered
7%
FTC GLBA Safeguards Rule (16 CFR Part 314)
2 source controls mapped|4 target controls covered
7%
OWASP Top 10:2025
1 source controls mapped|1 target controls covered
4%
Spain ENS
1 source controls mapped|3 target controls covered
4%
CSA STAR (Security, Trust, Assurance, and Risk)
1 source controls mapped|1 target controls covered
4%
DoD Zero Trust Reference Architecture
1 source controls mapped|3 target controls covered
4%
OWASP DevSecOps Maturity Model (DSOMM)
1 source controls mapped|1 target controls covered
4%
ICH E6(R3) — Good Clinical Practice
1 source controls mapped|1 target controls covered
4%
EU Cyber Resilience Act
1 source controls mapped|1 target controls covered
4%
FISMA
1 source controls mapped|3 target controls covered
4%
Australian Energy Sector Cyber Security Framework (AESCSF)
1 source controls mapped|1 target controls covered
4%
FFIEC Cybersecurity Assessment Tool (CAT)
1 source controls mapped|1 target controls covered
4%
CSA CCM v4
1 source controls mapped|3 target controls covered
4%
CAIQ (CSA)
1 source controls mapped|1 target controls covered
4%
Belgium CyberFundamentals
1 source controls mapped|3 target controls covered
4%
HL7 FHIR Security Framework
1 source controls mapped|3 target controls covered
4%
BSIMM
1 source controls mapped|1 target controls covered
4%
ANSSI Cybersecurity Framework
1 source controls mapped|3 target controls covered
4%
BSI IT-Grundschutz
1 source controls mapped|3 target controls covered
4%
Ghana Cybersecurity Act
1 source controls mapped|3 target controls covered
4%
CISA Zero Trust Maturity Model
1 source controls mapped|3 target controls covered
4%
Canada Artificial Intelligence and Data Act (AIDA)
1 source controls mapped|1 target controls covered
4%
FedRAMP Rev 5
1 source controls mapped|3 target controls covered
4%
CMMC 2.0
1 source controls mapped|3 target controls covered
4%
OWASP ASVS
1 source controls mapped|1 target controls covered
4%
NIST SP 800-171A Rev 3 — Assessing CUI Security Requirements
1 source controls mapped|1 target controls covered
4%
NYDFS Cybersecurity Regulation (23 NYCRR Part 500)
1 source controls mapped|3 target controls covered
4%
HIPAA Security Rule
1 source controls mapped|2 target controls covered
4%
ETSI EN 303 645
1 source controls mapped|1 target controls covered
4%
ISO/IEC 27011:2024
1 source controls mapped|1 target controls covered
4%
EU GMP Annex 11 — Computerised Systems
1 source controls mapped|1 target controls covered
4%
C5 (Germany)
1 source controls mapped|1 target controls covered
4%
NIST SP 800-171A — Assessing CUI Security Requirements
1 source controls mapped|3 target controls covered
4%
FDA 21 CFR Part 11
1 source controls mapped|1 target controls covered
4%
Azure Security Benchmark
1 source controls mapped|1 target controls covered
4%
California IoT Security Law
1 source controls mapped|1 target controls covered
4%
UK Defence Standard 05-138 — Cyber Security for Defence Suppliers
1 source controls mapped|1 target controls covered
4%
MITRE D3FEND
1 source controls mapped|1 target controls covered
4%
Cyber Essentials Plus
1 source controls mapped|3 target controls covered
4%
GLOBALG.A.P. Integrated Farm Assurance (IFA) Standard v6
1 source controls mapped|1 target controls covered
4%
AWS Well-Architected Security Pillar
1 source controls mapped|1 target controls covered
4%
3GPP Security
1 source controls mapped|1 target controls covered
4%
ISO 27017
1 source controls mapped|1 target controls covered
4%
NIST SP 800-183
1 source controls mapped|1 target controls covered
4%
ISO/SAE 21434
1 source controls mapped|1 target controls covered
4%
Canada ITSG-33 — IT Security Risk Management
1 source controls mapped|2 target controls covered
4%
New Zealand Information Security Manual (NZISM)
1 source controls mapped|2 target controls covered
4%
MARS-E — Minimum Acceptable Risk Standards for Exchanges
1 source controls mapped|2 target controls covered
4%
South Korea Cloud Security Assurance Program (CSAP)
1 source controls mapped|2 target controls covered
4%
NRC 10 CFR 73.54 — Nuclear Facility Cybersecurity
1 source controls mapped|2 target controls covered
4%
ISO 27001:2022
1 source controls mapped|1 target controls covered
4%
NIST SP 800-150
1 source controls mapped|1 target controls covered
4%
NIST SP 800-53 Rev 5
1 source controls mapped|3 target controls covered
4%
DISA Security Technical Implementation Guides (STIGs)
1 source controls mapped|3 target controls covered
4%
UK PSTI Act
1 source controls mapped|1 target controls covered
4%
NIST SP 800-190
1 source controls mapped|1 target controls covered
4%
NIST SP 800-66
1 source controls mapped|1 target controls covered
4%
OWASP MASVS
1 source controls mapped|1 target controls covered
4%
ASD Information Security Manual (ISM)
1 source controls mapped|3 target controls covered
4%
NIST SP 800-181
1 source controls mapped|1 target controls covered
4%
ISO/IEC 25012:2008 — Data Quality Model
1 source controls mapped|1 target controls covered
4%
OWASP SAMM
1 source controls mapped|1 target controls covered
4%
NIST SP 800-115
1 source controls mapped|1 target controls covered
4%
NIST SP 800-172
1 source controls mapped|3 target controls covered
4%
TEFCA — Trusted Exchange Framework and Common Agreement
1 source controls mapped|1 target controls covered
4%
NIST SP 800-161
1 source controls mapped|1 target controls covered
4%
NIST SP 800-145
1 source controls mapped|1 target controls covered
4%
ISO 27002:2022
1 source controls mapped|1 target controls covered
4%
NIST SP 800-53A
1 source controls mapped|3 target controls covered
4%
ISMAP (Japan)
1 source controls mapped|1 target controls covered
4%
UNECE WP.29 R156
1 source controls mapped|1 target controls covered
4%
NIST SP 800-92
1 source controls mapped|1 target controls covered
4%
NIST SP 800-171
1 source controls mapped|3 target controls covered
4%
NIST SP 800-61
1 source controls mapped|1 target controls covered
4%
NIST SP 800-88
1 source controls mapped|1 target controls covered
4%
CISA Secure by Design Principles
1 source controls mapped|1 target controls covered
4%
UNECE WP.29 R155
1 source controls mapped|1 target controls covered
4%
PIC/S Guide to Good Manufacturing Practice for Medicinal Products
1 source controls mapped|1 target controls covered
4%
Saudi NCA ECC
1 source controls mapped|3 target controls covered
4%
UK Gambling Commission — Cyber Resilience Requirements
1 source controls mapped|1 target controls covered
4%
CFTC System Safeguards (17 CFR 37, 38, 39, 49)
1 source controls mapped|1 target controls covered
4%
GLI-33 — Gaming Laboratories International Event Wagering Systems
1 source controls mapped|1 target controls covered
4%
EIOPA Guidelines on ICT Security and Governance (2020)
1 source controls mapped|1 target controls covered
4%
TISAX — Trusted Information Security Assessment Exchange
1 source controls mapped|3 target controls covered
4%
Telecommunications Sector Security Reforms (TSSR)
1 source controls mapped|1 target controls covered
4%
Defence Security Principles Framework (DSPF)
1 source controls mapped|1 target controls covered
4%
Protective Security Policy Framework (PSPF) Release 2024
1 source controls mapped|1 target controls covered
4%
NIST Privacy Framework 1.0
1 source controls mapped|1 target controls covered
4%
NIST SP 800-144
1 source controls mapped|1 target controls covered
4%
NAIC Insurance Data Security Model Law (MDL-668)
1 source controls mapped|1 target controls covered
4%
MTCS (Singapore)
1 source controls mapped|1 target controls covered
4%
MARS-E
1 source controls mapped|1 target controls covered
4%
Sigstore — Software Artifact Signing and Verification
1 source controls mapped|1 target controls covered
4%
NIST SP 800-123
1 source controls mapped|1 target controls covered
4%
NIST SP 800-187
1 source controls mapped|1 target controls covered
4%
MDS2 (Medical Device)
1 source controls mapped|1 target controls covered
4%
SLSA
1 source controls mapped|1 target controls covered
4%
ISO 27018
1 source controls mapped|1 target controls covered
4%
SWIFT Customer Security Programme (CSP)
1 source controls mapped|1 target controls covered
4%
ASIC Cyber Resilience Good Practices
1 source controls mapped|1 target controls covered
4%
TSA Pipeline Cybersecurity Directives
1 source controls mapped|1 target controls covered
4%
NIST SP 800-218
1 source controls mapped|1 target controls covered
4%
MITRE ATT&CK
1 source controls mapped|1 target controls covered
4%
HITECH Act
1 source controls mapped|1 target controls covered
4%
ISO 27799
1 source controls mapped|1 target controls covered
4%
O-RAN Alliance Security Specifications (O-RAN.WG11)
1 source controls mapped|1 target controls covered
4%
PCI DSS v4.0
1 source controls mapped|3 target controls covered
4%
ISO 27043
1 source controls mapped|1 target controls covered
4%
SSDF (NIST)
1 source controls mapped|1 target controls covered
4%
ISO 13485
1 source controls mapped|1 target controls covered
4%
NIST SP 800-63
1 source controls mapped|1 target controls covered
4%
OpenSSF Scorecard
1 source controls mapped|1 target controls covered
4%
SIG (Shared Assessments)
1 source controls mapped|1 target controls covered
4%
NIST SP 800-82 Rev 3 — Guide to OT Security
1 source controls mapped|1 target controls covered
4%
NIST SP 800-146
1 source controls mapped|1 target controls covered
4%
US Executive Order 14028 — Improving the Nation's Cybersecurity
1 source controls mapped|1 target controls covered
4%
NIST SP 800-160
1 source controls mapped|1 target controls covered
4%
NIST SP 800-207
1 source controls mapped|1 target controls covered
4%
PTES
1 source controls mapped|1 target controls covered
4%
NIST SP 800-128
1 source controls mapped|1 target controls covered
4%
South Korea ISMS-P
1 source controls mapped|1 target controls covered
4%
NIST SP 800-137
1 source controls mapped|1 target controls covered
4%
Basel III International Banking Framework
1 source controls mapped|3 target controls covered
4%
Digital Economy Partnership Agreement (DEPA)
1 source controls mapped|1 target controls covered
4%
UAE Virtual Asset Regulatory Authority (VARA) Regulations
1 source controls mapped|1 target controls covered
4%
Bank Secrecy Act / Anti-Money Laundering (BSA/AML)
1 source controls mapped|4 target controls covered
4%
4%
US EPA Safe Drinking Water Act (SDWA) — Cybersecurity Requirements
1 source controls mapped|1 target controls covered
4%
UK Modern Slavery Act 2015
1 source controls mapped|1 target controls covered
4%
Rhode Island Data Transparency and Privacy Protection Act (RIDTPPA)
1 source controls mapped|1 target controls covered
4%
Philippines Cybercrime Prevention Act (RA 10175)
1 source controls mapped|1 target controls covered
4%
Canada's Anti-Spam Legislation (CASL)
1 source controls mapped|1 target controls covered
4%
Zambia Data Protection Act (2021)
1 source controls mapped|1 target controls covered
4%
UK Telecommunications (Security) Act 2021
1 source controls mapped|1 target controls covered
4%
Modern Slavery Act 2018 (Australia)
1 source controls mapped|1 target controls covered
4%
AML/CTF Act 2006 (Australia)
1 source controls mapped|1 target controls covered
4%
EU Digital Markets Act
1 source controls mapped|1 target controls covered
4%
Nevada Gaming Control Board Cybersecurity Requirements
1 source controls mapped|1 target controls covered
4%
Lloyd's Minimum Standards — Cyber Security
1 source controls mapped|1 target controls covered
4%
India CERT-In Cyber Security Directions 2022
1 source controls mapped|1 target controls covered
4%
Colorado AI Act (SB 24-205)
1 source controls mapped|1 target controls covered
4%
APRA CPS 230 Operational Risk Management
1 source controls mapped|1 target controls covered
4%
EU PSD3 and Payment Services Regulation (Proposed)
1 source controls mapped|3 target controls covered
4%
IFRS 17 — Insurance Contracts
1 source controls mapped|1 target controls covered
4%
Florida Digital Bill of Rights (SB 262)
1 source controls mapped|1 target controls covered
4%
Nigeria Open Banking Regulatory Framework (CBN, 2023)
1 source controls mapped|1 target controls covered
4%
GRI Standards
1 source controls mapped|1 target controls covered
4%
NABERS — National Australian Built Environment Rating System
1 source controls mapped|3 target controls covered
4%
CSRD
1 source controls mapped|1 target controls covered
4%
Security of Critical Infrastructure Act 2018 (SOCI)
1 source controls mapped|1 target controls covered
4%
ISO 14001
1 source controls mapped|1 target controls covered
4%
LEED v4.1 — Green Building Rating System (US Green Building Council)
1 source controls mapped|2 target controls covered
4%
ISO 56002
1 source controls mapped|3 target controls covered
4%
ISO 41001:2018 — Facility Management Systems
1 source controls mapped|3 target controls covered
4%
ISO 39001:2012 — Road Traffic Safety Management
1 source controls mapped|3 target controls covered
4%
ISO 37002:2021 — Whistleblowing Management Systems
1 source controls mapped|3 target controls covered
4%
ISO 50001:2018 — Energy Management Systems
1 source controls mapped|3 target controls covered
4%
ISO 22313:2020 — Guidance on Business Continuity Management Systems
1 source controls mapped|3 target controls covered
4%
ISSB Standards
1 source controls mapped|1 target controls covered
4%
TCFD Recommendations
1 source controls mapped|1 target controls covered
4%

Frequently Asked Questions

What is GHG Protocol?

GHG Protocol is a compliance framework from International with 5 domains and 28 controls. The Greenhouse Gas Protocol Corporate Accounting and Reporting Standard (Revised Edition 2004/2015) and Corporate Value Chain (Scope 3) Accounting and Reporting Standard (2011). Published by the World Resources Institute (WRI) and the World Business Council for Sustainable Development (WBCSD). The most widely used international accounting tool for government and business to understand, quantify, and manage greenhouse gas emissions. It is used by organisations to establish and maintain compliance with industry standards and regulatory requirements.

How many controls does GHG Protocol have?

GHG Protocol has 28 controls organised across 5 domains. The largest domains are Scope 3: Upstream Categories (8 controls), Scope 3: Downstream Categories (7 controls), Reporting Principles (5 controls). Each control defines specific requirements that organisations must implement to achieve compliance.

What frameworks does GHG Protocol map to?

GHG Protocol maps to 184 other compliance frameworks. The top mapping partners are EU Taxonomy Regulation (Regulation 2020/852) (14% coverage), EU Taxonomy Regulation (14% coverage), EU SFDR (Sustainable Finance Disclosure Regulation) (14% coverage). Use our comparison tool to explore control-level mappings between frameworks.

How do I get started with GHG Protocol compliance?

Start your GHG Protocol compliance journey by running a self-assessment on our platform to identify your current compliance posture. Our AI advisory can answer specific questions about GHG Protocol requirements, and cross-framework mapping helps you leverage existing controls from other frameworks you may already comply with. Create a free account to access all 28 controls and track your progress.

Start Your Compliance Journey

Create a free account to run self-assessments, get AI advisory, and track your compliance progress across 692 frameworks.

Get Started Free →

Free forever — no credit card required