Back to Frameworks

WELL Building Standard v2 (International WELL Building Institute)

International (IWBI — 104 countries)
vv2 (2024)
7 domains
26 controls

The WELL Building Standard v2, administered by the International WELL Building Institute (IWBI), is the leading standard for buildings focused on human health and wellbeing. Over 46,000 WELL-registered and certified projects in 104 countries. WELL v2 covers 10 concepts: Air, Water, Nourishment, Light, Movement, Thermal Comfort, Sound, Materials, Mind, and Community. The standard includes requirements for smart building monitoring systems, data-driven indoor air quality management, and technology-enabled wellness programmes. WELL is often pursued alongside LEED for comprehensive green and healthy building certification.

Verified

Framework summaries on this platform are AI-assisted interpretations for educational and compliance planning purposes. They do not reproduce or replace the official standards. Refer to the authoritative source for the definitive text. Framework names and trademarks belong to their respective organisations.

Framework Domains (7)

Air

4 controls
Controls in the Air domain of WELL Building Standard v2 (International WELL Building Institute)4 controls
CodeTitle
A01Air Quality
A02Smoke-Free Environment
A03Ventilation Design
A05Enhanced Air Quality

Light

3 controls
Controls in the Light domain of WELL Building Standard v2 (International WELL Building Institute)3 controls
CodeTitle
L01Light Exposure and Education
L02Visual Lighting Design
L03Circadian Lighting Design

Mind and Community

4 controls
Controls in the Mind and Community domain of WELL Building Standard v2 (International WELL Building Institute)4 controls
CodeTitle
C01Health and Wellness Promotion
C03Community Engagement
M01Mental Health Promotion
M02Access to Nature

Movement

3 controls
Controls in the Movement domain of WELL Building Standard v2 (International WELL Building Institute)3 controls
CodeTitle
V01Active Buildings and Communities
V02Visual and Physical Ergonomics
V03Active Transportation

Nourishment

3 controls
Controls in the Nourishment domain of WELL Building Standard v2 (International WELL Building Institute)3 controls
CodeTitle
N01Fruits and Vegetables
N02Nutritional Transparency
N07Food Production

Thermal Comfort, Sound and Materials

4 controls
Controls in the Thermal Comfort, Sound and Materials domain of WELL Building Standard v2 (International WELL Building Institute)4 controls
CodeTitle
S01Sound Mapping
T01Thermal Performance
X01Material Restrictions
X02Material Transparency

Water

5 controls
Controls in the Water domain of WELL Building Standard v2 (International WELL Building Institute)5 controls
CodeTitle
W01Fundamental Water Quality
W02Water Contaminants
W03Legionella Control
Wat 01Water Consumption
Wat 02Water Monitoring

Maps to 164 other frameworks

26 total controls
CDP (formerly Carbon Disclosure Project)
3 source controls mapped|3 target controls covered
12%
Rhode Island Data Transparency and Privacy Protection Act (RIDTPPA)
3 source controls mapped|2 target controls covered
12%
CDP Corporate Questionnaire
3 source controls mapped|3 target controls covered
12%
Defence Security Principles Framework (DSPF)
3 source controls mapped|4 target controls covered
12%
Protective Security Policy Framework (PSPF) Release 2024
3 source controls mapped|4 target controls covered
12%
US EPA Safe Drinking Water Act (SDWA) — Cybersecurity Requirements
3 source controls mapped|4 target controls covered
12%
UK Security and Emergency Measures Direction (SEMD) — Water Industry
3 source controls mapped|5 target controls covered
12%
AASB S2 Climate-related Disclosures
2 source controls mapped|4 target controls covered
8%
NYDFS Cybersecurity Regulation (23 NYCRR Part 500)
2 source controls mapped|5 target controls covered
8%
TEFCA — Trusted Exchange Framework and Common Agreement
2 source controls mapped|4 target controls covered
8%
FDA Quality Management System Regulation (QMSR)
2 source controls mapped|4 target controls covered
8%
ILO Nursing Personnel Convention C149 (1977)
2 source controls mapped|3 target controls covered
8%
EU Anti-Money Laundering Directive (AMLD6 / Directive 2018/1673)
2 source controls mapped|3 target controls covered
8%
ISO 8000 — Data Quality
2 source controls mapped|3 target controls covered
8%
FATF Recommendation 16 — Virtual Asset Travel Rule
2 source controls mapped|3 target controls covered
8%
Privacy by Design (PbD) — Seven Foundational Principles
2 source controls mapped|3 target controls covered
8%
BS 65000:2014 — Guidance on Organizational Resilience
2 source controls mapped|4 target controls covered
8%
Security of Critical Infrastructure Act 2018 (SOCI)
2 source controls mapped|3 target controls covered
8%
UK Modern Slavery Act 2015
2 source controls mapped|1 target controls covered
8%
Philippines Cybercrime Prevention Act (RA 10175)
2 source controls mapped|1 target controls covered
8%
Canada's Anti-Spam Legislation (CASL)
2 source controls mapped|1 target controls covered
8%
Zambia Data Protection Act (2021)
2 source controls mapped|1 target controls covered
8%
UK Telecommunications (Security) Act 2021
2 source controls mapped|1 target controls covered
8%
Bank Secrecy Act / Anti-Money Laundering (BSA/AML)
2 source controls mapped|1 target controls covered
8%
BREEAM — Building Research Establishment Environmental Assessment Method
2 source controls mapped|2 target controls covered
8%
Aged Care Quality Standards (Australia)
1 source controls mapped|3 target controls covered
4%
IEC 60601-1 — Medical Electrical Equipment Safety
1 source controls mapped|1 target controls covered
4%
Washington My Health My Data Act (MHMD)
1 source controls mapped|1 target controls covered
4%
DFARS 252.204-7012 — Safeguarding Covered Defense Information
1 source controls mapped|1 target controls covered
4%
Connecticut Data Privacy Act (CTDPA)
1 source controls mapped|1 target controls covered
4%
Illinois Biometric Information Privacy Act (BIPA)
1 source controls mapped|1 target controls covered
4%
NAIC Insurance Data Security Model Law (MDL-668)
1 source controls mapped|1 target controls covered
4%
Modern Slavery Act 2018 (Australia)
1 source controls mapped|1 target controls covered
4%
ICH E6(R3) — Good Clinical Practice
1 source controls mapped|3 target controls covered
4%
Florida Digital Bill of Rights (SB 262)
1 source controls mapped|1 target controls covered
4%
GAMP 5 — Good Automated Manufacturing Practice
1 source controls mapped|1 target controls covered
4%
FAA Cybersecurity Framework for Aviation
1 source controls mapped|1 target controls covered
4%
Australian Energy Sector Cyber Security Framework (AESCSF)
1 source controls mapped|1 target controls covered
4%
US Gramm-Leach-Bliley Act (GLBA) — Higher Education Safeguards Rule
1 source controls mapped|6 target controls covered
4%
HIPAA Security Rule
1 source controls mapped|6 target controls covered
4%
EU European Health Data Space (EHDS)
1 source controls mapped|3 target controls covered
4%
ICH E6(R2) Good Clinical Practice — Data Integrity and Electronic Systems
1 source controls mapped|3 target controls covered
4%
PIC/S Guide to Good Manufacturing Practice for Medicinal Products
1 source controls mapped|1 target controls covered
4%
Australia My Health Records Act 2012
1 source controls mapped|3 target controls covered
4%
ISPE GAMP 5 — A Risk-Based Approach to Compliant GxP Computerised Systems
1 source controls mapped|1 target controls covered
4%
ICH Q10 — Pharmaceutical Quality System
1 source controls mapped|3 target controls covered
4%
EU Medical Devices Regulation (MDR 2017/745)
1 source controls mapped|3 target controls covered
4%
EU Clinical Trials Regulation (CTR 536/2014)
1 source controls mapped|3 target controls covered
4%
HITECH Act
1 source controls mapped|3 target controls covered
4%
WHO Global Strategy on Digital Health 2020-2025
1 source controls mapped|1 target controls covered
4%
MDS2 (Medical Device)
1 source controls mapped|3 target controls covered
4%
Colorado AI Act (SB 24-205)
1 source controls mapped|1 target controls covered
4%
UNESCO Recommendation on the Ethics of AI
1 source controls mapped|1 target controls covered
4%
Australia NHMRC National Statement on Ethical Conduct in Human Research
1 source controls mapped|1 target controls covered
4%
Wisconsin Data Privacy Act (SB 670)
1 source controls mapped|1 target controls covered
4%
Florida Digital Bill of Rights (FDBR)
1 source controls mapped|1 target controls covered
4%
DORA
1 source controls mapped|3 target controls covered
4%
CSA CCM v4
1 source controls mapped|3 target controls covered
4%
MTCS — Multi-Tier Cloud Security (Singapore)
1 source controls mapped|1 target controls covered
4%
ITIL 4
1 source controls mapped|1 target controls covered
4%
ISO 42001
1 source controls mapped|1 target controls covered
4%
IMO Maritime Cybersecurity Guidelines (MSC-FAL.1/Circ.3/Rev.2)
1 source controls mapped|1 target controls covered
4%
HKMA SPM
1 source controls mapped|3 target controls covered
4%
MAS TRM
1 source controls mapped|3 target controls covered
4%
HKMA Cyber Resilience Assessment Framework (C-RAF)
1 source controls mapped|1 target controls covered
4%
BCBS 239
1 source controls mapped|3 target controls covered
4%
GLBA
1 source controls mapped|3 target controls covered
4%
EBA Guidelines on ICT and Security Risk Management (EBA/GL/2019/04)
1 source controls mapped|1 target controls covered
4%
APRA CPS 234
1 source controls mapped|3 target controls covered
4%
FTC GLBA Safeguards Rule (16 CFR Part 314)
1 source controls mapped|1 target controls covered
4%
Nevada Gaming Control Board Cybersecurity Requirements
1 source controls mapped|1 target controls covered
4%
Lloyd's Minimum Standards — Cyber Security
1 source controls mapped|1 target controls covered
4%
FTC Safeguards Rule (16 CFR Part 314)
1 source controls mapped|2 target controls covered
4%
Singapore Government Instruction Manual on ICT&SS Management (IM8)
1 source controls mapped|3 target controls covered
4%
CISA ICS-CERT Advisories and Industrial Control Systems Security Guidelines
1 source controls mapped|1 target controls covered
4%
COBIT 2019
1 source controls mapped|1 target controls covered
4%
ASIS SPC.1-2009 — Organizational Resilience Standard
1 source controls mapped|3 target controls covered
4%
Notifiable Data Breaches Scheme (Australia)
1 source controls mapped|2 target controls covered
4%
EU Digital Markets Act
1 source controls mapped|2 target controls covered
4%
FTC Health Breach Notification Rule
1 source controls mapped|2 target controls covered
4%
UK Product Security and Telecommunications Infrastructure Act (PSTI)
1 source controls mapped|2 target controls covered
4%
EAR — Export Administration Regulations
1 source controls mapped|2 target controls covered
4%
European Accessibility Act (Directive (EU) 2019/882)
1 source controls mapped|2 target controls covered
4%
EU Deforestation-Free Products Regulation (EUDR)
1 source controls mapped|2 target controls covered
4%
US ITAR and EAR — Export Control and Data Security
1 source controls mapped|2 target controls covered
4%
US SEC Digital Assets and Crypto Regulatory Framework
1 source controls mapped|2 target controls covered
4%
Australia Consumer Data Right — Banking (CDR)
1 source controls mapped|2 target controls covered
4%
Australia eSafety Commissioner — Online Safety Expectations for Industry
1 source controls mapped|2 target controls covered
4%
Japan AI Guidelines
1 source controls mapped|1 target controls covered
4%
4%
TNFD Recommendations
1 source controls mapped|3 target controls covered
4%
IEC 62351 — Power Systems Communication Security
1 source controls mapped|2 target controls covered
4%
ISO 27001:2022
1 source controls mapped|1 target controls covered
4%
ISO/IEC 27031:2011
1 source controls mapped|2 target controls covered
4%
ISO/IEC 25012:2008 — Data Quality Model
1 source controls mapped|1 target controls covered
4%
ISO 20000-1
1 source controls mapped|1 target controls covered
4%
Digital Economy Partnership Agreement (DEPA)
1 source controls mapped|1 target controls covered
4%
EU Cyber Resilience Act
1 source controls mapped|3 target controls covered
4%
Bermuda Monetary Authority (BMA) Cyber Risk Management Code of Conduct
1 source controls mapped|1 target controls covered
4%
FFIEC Cybersecurity Assessment Tool (CAT)
1 source controls mapped|1 target controls covered
4%
FFIEC IT Examination Handbook
1 source controls mapped|3 target controls covered
4%
India CERT-In Cyber Security Directions 2022
1 source controls mapped|1 target controls covered
4%
EU Taxonomy Regulation (Regulation 2020/852)
1 source controls mapped|1 target controls covered
4%
EU Taxonomy Regulation
1 source controls mapped|2 target controls covered
4%
Australia AI Ethics Framework
1 source controls mapped|1 target controls covered
4%
IRM Enterprise Risk Management Framework (Institute of Risk Management)
1 source controls mapped|3 target controls covered
4%
ASIC Cyber Resilience Good Practices
1 source controls mapped|1 target controls covered
4%
Critical Infrastructure Risk Management Program (CIRMP) Rules 2023
1 source controls mapped|2 target controls covered
4%
CFTC System Safeguards (17 CFR 37, 38, 39, 49)
1 source controls mapped|3 target controls covered
4%
GLI-33 — Gaming Laboratories International Event Wagering Systems
1 source controls mapped|2 target controls covered
4%
EIOPA Guidelines on ICT Security and Governance (2020)
1 source controls mapped|2 target controls covered
4%
TISAX — Trusted Information Security Assessment Exchange
1 source controls mapped|2 target controls covered
4%
Telecommunications Sector Security Reforms (TSSR)
1 source controls mapped|2 target controls covered
4%
COSO Internal Control — Integrated Framework (2013)
1 source controls mapped|1 target controls covered
4%
ASEAN Data Management Framework
1 source controls mapped|1 target controls covered
4%
Voluntary Principles on Security and Human Rights (VPs)
1 source controls mapped|1 target controls covered
4%
US OFAC Sanctions Compliance Framework
1 source controls mapped|1 target controls covered
4%
EU AI Act
1 source controls mapped|1 target controls covered
4%
South Korea Cloud Security Assurance Program (CSAP)
1 source controls mapped|1 target controls covered
4%
IEEE 7000
1 source controls mapped|1 target controls covered
4%
ISO/IEC 27007:2020
1 source controls mapped|1 target controls covered
4%
ASD Strategies to Mitigate Cyber Security Incidents
1 source controls mapped|1 target controls covered
4%
Brazil AI Framework
1 source controls mapped|1 target controls covered
4%
China AI Regulations
1 source controls mapped|1 target controls covered
4%
ISO/IEC 38500:2024 — Governance of IT
1 source controls mapped|1 target controls covered
4%
AICPA SOC 1
1 source controls mapped|3 target controls covered
4%
AICPA SOC 3
1 source controls mapped|3 target controls covered
4%
South Africa Promotion of Access to Information Act (PAIA)
1 source controls mapped|1 target controls covered
4%
NIST Privacy Framework Version 1.0
1 source controls mapped|2 target controls covered
4%
ECB TIBER-EU Framework
1 source controls mapped|1 target controls covered
4%
NIST SP 800-82 Rev 3 — Guide to OT Security
1 source controls mapped|2 target controls covered
4%
UK Open Banking Standard
1 source controls mapped|2 target controls covered
4%
OECD AI Principles
1 source controls mapped|1 target controls covered
4%
SOC 2
1 source controls mapped|3 target controls covered
4%
SWIFT CSP
1 source controls mapped|3 target controls covered
4%
O-RAN Alliance Security Specifications (O-RAN.WG11)
1 source controls mapped|1 target controls covered
4%
Open Banking Security
1 source controls mapped|3 target controls covered
4%
OSFI B-13
1 source controls mapped|3 target controls covered
4%
SEC Climate Disclosure Rule
1 source controls mapped|1 target controls covered
4%
PCI PIN Security
1 source controls mapped|3 target controls covered
4%
ITU-T X.805 — Security Architecture for End-to-End Communications
1 source controls mapped|1 target controls covered
4%
SWIFT CSCF
1 source controls mapped|3 target controls covered
4%
PSD2 SCA
1 source controls mapped|3 target controls covered
4%
PCI SSF
1 source controls mapped|3 target controls covered
4%
UK FCA/PRA Operational Resilience Framework
1 source controls mapped|3 target controls covered
4%
SOC for Cybersecurity — Cybersecurity Risk Management Examination
1 source controls mapped|1 target controls covered
4%
SASB Standards (ISSB Integrated)
1 source controls mapped|1 target controls covered
4%
SASB Standards
1 source controls mapped|1 target controls covered
4%
PCI P2PE
1 source controls mapped|3 target controls covered
4%
ECB TIBER-EU
1 source controls mapped|3 target controls covered
4%
NIST Cybersecurity Framework 2.0
1 source controls mapped|3 target controls covered
4%
DAMA-DMBOK2 — Data Management Body of Knowledge (2nd Edition)
1 source controls mapped|1 target controls covered
4%
Right to Disconnect (Australia)
1 source controls mapped|1 target controls covered
4%
NIST Privacy Framework 1.0
1 source controls mapped|1 target controls covered
4%
Singapore AI Governance Framework
1 source controls mapped|1 target controls covered
4%
UK AI Regulation Framework
1 source controls mapped|1 target controls covered
4%
SSAE 18 — Attestation Standards (SOC Reporting)
1 source controls mapped|1 target controls covered
4%

Frequently Asked Questions

What is WELL Building Standard v2 (International WELL Building Institute)?

WELL Building Standard v2 (International WELL Building Institute) is a compliance framework from International (IWBI — 104 countries) with 7 domains and 26 controls. The WELL Building Standard v2, administered by the International WELL Building Institute (IWBI), is the leading standard for buildings focused on human health and wellbeing. Over 46,000 WELL-registered and certified projects in 104 countries. WELL v2 covers 10 concepts: Air, Water, Nourishment, Light, Movement, Thermal Comfort, Sound, Materials, Mind, and Community. The standard includes requirements for smart building monitoring systems, data-driven indoor air quality management, and technology-enabled wellness programmes. WELL is often pursued alongside LEED for comprehensive green and healthy building certification. It is used by organisations to establish and maintain compliance with industry standards and regulatory requirements.

How many controls does WELL Building Standard v2 (International WELL Building Institute) have?

WELL Building Standard v2 (International WELL Building Institute) has 26 controls organised across 7 domains. The largest domains are Water (5 controls), Air (4 controls), Mind and Community (4 controls). Each control defines specific requirements that organisations must implement to achieve compliance.

What frameworks does WELL Building Standard v2 (International WELL Building Institute) map to?

WELL Building Standard v2 (International WELL Building Institute) maps to 164 other compliance frameworks. The top mapping partners are CDP (formerly Carbon Disclosure Project) (12% coverage), Rhode Island Data Transparency and Privacy Protection Act (RIDTPPA) (12% coverage), CDP Corporate Questionnaire (12% coverage). Use our comparison tool to explore control-level mappings between frameworks.

How do I get started with WELL Building Standard v2 (International WELL Building Institute) compliance?

Start your WELL Building Standard v2 (International WELL Building Institute) compliance journey by running a self-assessment on our platform to identify your current compliance posture. Our AI advisory can answer specific questions about WELL Building Standard v2 (International WELL Building Institute) requirements, and cross-framework mapping helps you leverage existing controls from other frameworks you may already comply with. Create a free account to access all 26 controls and track your progress.

Start Your Compliance Journey

Create a free account to run self-assessments, get AI advisory, and track your compliance progress across 692 frameworks.

Get Started Free →

Free forever — no credit card required