Cybersecurity Regulations: Statute and Code Reference
This page provides a structured reference to the 26 regulatory citations tracked across Penetration Testing Authority. All citations are extracted from page content and verified against primary sources.
Citation Summary
Category
Count
Federal Statutes (U.S. Code)
3
Federal Regulations (C.F.R.)
8
Named Federal Acts
14
Public Laws
1
Total
26
Federal Statutes (U.S. Code)
Federal Regulations (C.F.R.)
Named Federal Acts
Citation
Jurisdiction
American Recovery and Reinvestment Act of 2009
US
Comprehensive Computer Data Access and Fraud Act
US
Computer Fraud and Abuse Act
US
Electronic Communications Privacy Act
US
Federal Information Security Modernization Act
US
Federal Information Security Modernization Act of 2014
US
HITECH Act
US
Health Insurance Portability and Accountability Act
US
Leach-Bliley Act
US
SHIELD Act
US
The Computer Fraud and Abuse Act
US
The Health Insurance Portability and Accountability Act
US
Water Infrastructure Act
US
Windows Act
US
Public Laws
Pages with Regulatory Citations
Monitoring Sources
Citations on this site are monitored against the following regulatory data sources:
Ashrae (last checked: 2026-03-09)
Congress (last checked: 2026-03-09)
Ecfr (last checked: 2026-03-09)
Federal Register (last checked: 2026-02-28)
Nfpa (last checked: 2026-03-09)
Openstates (last checked: 2026-03-09)
Citation data last extracted: 2026-03-08
Explore This Site
Topics (59)
Browse topics…
What Is Penetration Testing?
Penetration Testing vs. Vulnerability Assessment
Types of Penetration Testing Explained
Black Box, White Box, and Gray Box Testing
Web Application Penetration Testing
Mobile Application Penetration Testing
Cloud Penetration Testing
API Penetration Testing
Wireless Network Penetration Testing
Social Engineering Penetration Testing
Physical Penetration Testing
Red Team Operations
Purple Team Testing
IoT Penetration Testing
SCADA and ICS Penetration Testing
Penetration Testing Methodology
PTES: Penetration Testing Execution Standard
OWASP Testing Guide for Penetration Testers
NIST Guidelines for Penetration Testing
Phases of a Penetration Test
Reconnaissance in Penetration Testing
Exploitation Techniques in Penetration Testing
Post-Exploitation Techniques
Lateral Movement Techniques
Privilege Escalation Techniques
Penetration Testing Reporting Standards
Rules of Engagement in Penetration Testing
Defining Scope of Work for Penetration Tests
Penetration Testing Tools Reference
Kali Linux for Penetration Testing
Metasploit Framework Overview
Burp Suite for Web Application Testing
Nmap in Penetration Testing
Penetration Testing Certifications
OSCP Certification Overview
CEH vs. OSCP vs. GPEN: Comparing Certifications
Penetration Tester Career Path
How to Become a Penetration Tester
Penetration Testing Salary in the US
Hiring a Penetration Testing Firm
Penetration Testing Contract Checklist
Cost of Penetration Testing
Penetration Testing Compliance Requirements
PCI DSS Penetration Testing Requirements
HIPAA Penetration Testing Requirements
SOC 2 Penetration Testing Requirements
FedRAMP Penetration Testing Requirements
Legal Considerations in Penetration Testing
The CFAA and Penetration Testing
Penetration Testing Authorization Agreements
Bug Bounty Programs vs. Penetration Testing
Penetration Testing for Small Businesses
Penetration Testing for Healthcare Organizations
Penetration Testing for Financial Services
Penetration Testing for US Government Agencies
Penetration Testing for Critical Infrastructure
Continuous Penetration Testing
Automated vs. Manual Penetration Testing
Penetration Testing as a Service (PTaaS)
Tools & Calculators
Password Strength Calculator