This website uses cookies. By clicking OK, you consent to the use of cookies. Click Here to learn more about how we use cookies.
OK
  • RSA.com
  • Products
    • Archer®
      • Archer®
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Knowledge Base
      • Archer® Exchange
      • Training
      • Upcoming Events
      • Videos
    • RSA® Fraud & Risk Intelligence Suite
      • RSA® Fraud & Risk Intelligence Suite
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Web Threat Detection
      • Upcoming Events
      • Videos
    • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Cloud
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Events
      • Ideas
      • Knowledge Base
      • Training
      • Upcoming Patch Content
      • Videos
    • RSA® Adaptive Authentication Mobile SDK
      • RSA® Adaptive Authentication Mobile SDK
      • Advisories
      • Events
      • Ideas
      • Knowledge Base
      • Request Access
      • Training
    • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Events
      • Ideas
      • Knowledge Base
      • Training
      • Videos
    • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Events
      • Ideas
      • Knowledge Base
      • Training
      • Videos
    • RSA® Adaptive Authentication for eCommerce
      • RSA® Adaptive Authentication for eCommerce
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Ideas
      • Knowledge Base
      • Training
      • Videos
    • RSA® FraudAction Services
      • RSA® FraudAction Services
      • Advisories
      • Discussions
      • Documentation
      • Ideas
      • Videos
    • RSA® Web Threat Detection
      • RSA® Web Threat Detection
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Knowledge Base
      • Videos
    • RSA NetWitness® Platform
      • RSA NetWitness® Platform
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Integrations
      • Knowledge Base
      • Training
      • Upcoming Events
      • Videos
    • RSA NetWitness® Detect AI
      • RSA NetWitness® Detect AI
      • Documentation
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
    • RSA NetWitness® Investigator
      • RSA NetWitness® Investigator
      • Documentation
      • Download the Client
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
    • RSA NetWitness® Orchestrator
      • RSA NetWitness® Orchestrator
      • Overview
      • Documentation
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
    • RSA SecurID® Suite
      • RSA SecurID® Suite
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Knowledge Base
      • Ideas
      • Integrations
      • Training
      • Videos
    • RSA® Identity Governance & Lifecycle
      • RSA® Identity Governance & Lifecycle
      • Advisories
      • Blog
      • Community Exchange
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Knowledge Base
      • Training
      • Upcoming Events
      • Videos
    • RSA SecurID® Access
      • RSA SecurID® Access
      • Advisories
      • Blog
      • Discussions
      • Documentation
      • Downloads
      • Ideas
      • Integrations
      • Knowledge Base
      • Training
      • Upcoming Events
      • Videos
    • Other RSA® Products
      • Other RSA® Products
      • RSA® Access Manager
      • RSA® Data Loss Prevention
      • RSA® Digital Certificate Solutions
      • RSA enVision®
      • RSA® Federated Identity Manager
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
      •  
  • Resources
    • Advisories
      • Product Advisories on RSA Link
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Hosted
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Product Advisories
    • Blogs
      • Blogs on RSA Link
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication for eCommerce
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Blogs on RSA Link
    • Discussion Forums
      • Discussion Forums
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Discussion Forums on RSA Link
    • Documentation
      • Product Documentation
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Mobile SDK
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Documentation on RSA Link
    • Downloads
      • Product Downloads
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Downloads on RSA Link
    • Ideas
      • Idea Exchange
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Mobile SDK
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication for eCommerce
      • RSA® FraudAction Services
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Documentation on RSA Link
    • Knowledge Base
      • Knowledge Base
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication Mobile SDK
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication for eCommerce
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Knowledge Base Pages on RSA Link
    • Upcoming Events on RSA Link
      • Upcoming Events
    • Videos
      • Videos on RSA Link
      • Archer®
      • RSA® Adaptive Authentication Cloud
      • RSA® Adaptive Authentication On-Premise
      • RSA® Adaptive Authentication On-Premise (Cassandra)
      • RSA® Adaptive Authentication for eCommerce
      • RSA® Identity Governance & Lifecycle
      • RSA NetWitness® Platform
      • RSA SecurID® Access
      • RSA® Web Threat Detection
      • All Videos on RSA Link
  • Support
    • RSA Link Support
      • RSA Link Support
      • News & Announcements
      • Getting Started
      • Support Forum
      • Support Knowledge Base
      • Ideas & Suggestions
    • RSA Product Support
      • RSA Product Support
      • General Security Advisories and Statements
      • Product Life Cycle
      • Support Information
      •  
      •  
      •  
      •  
      •  
  • RSA Ready
  • RSA University
    • Certification Program
      • Certification Program
    • Course Catalogs
      • Course Catalogs
      • Archer®
      • RSA NetWitness® Platform
      • RSA SecurID® Suite
    • On-Demand Subscriptions
      • On-Demand Subscriptions
      • Archer®
      • RSA NetWitness® Platform
      • RSA SecurID® Suite
    • Product Training
      • Product Training
      • Archer®
      • RSA® Fraud & Risk Intelligence Suite
      • RSA® Identity Governance & Lifecycle
      • RSA NeWitness® Platform
      • RSA SecurID® Access
    • Student Resources
      • Student Resources
      • Access On-Demand Learning
      • Access Virtual Labs
      • Contact RSA University
      • Enrollments & Transcripts
      • Frequently Asked Questions
      • Getting Started
      • Learning Modalities
      • Payments & Cancellations
      • Private Training
      • Training Center Locations
      • Training Credits
      • YouTube Channel
    • Upcoming Events
      • Upcoming Events
      • Full Calendar
      • Conferences
      • Live Classroom Training
      • Live Virtual Classroom Training
      • Webinars
Sign In Register Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
Announcements

Visit the Known Issues dashboard if you are experiencing issues on RSA Link

View Dashboard

Archer® Exchange Documentation

Browse the official Archer Exchange documentation for helpful tutorials, step-by-step instructions, and other valuable resources.
  • RSA Link
  • :
  • Products
  • :
  • Archer
  • :
  • Archer Exchange
  • :
  • Documentation
  • :
  • Archer Exchange Offering List
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Archer Exchange Offering List

archer-logo-RGB-300w.png

 

Looking for a specific Archer Exchange offering? The tables below provide a list of all available Archer Exchange offerings. Please note that videos, implementation guides and implementation packages require login access to the Archer Community. 

 

App-Packs   |   Tools & Utilities   |   Integrations   |   Content

new_red_flipped_small.png  Newly Added to the Archer Exchange         update_black_small.png  Recently Updated

App-Packs

App-Pack Name and OverviewVideo DemonstrationImplementation GuideInstallation Package
Archer Scripts Timesheet VideoImplementation Guide Installation Package
Aujas Duplicate Findings PreventionVideoImplementation GuideInstallation Package
Bowmen Group Organisational Entities‌  Video Link : 34728‌Implementation Guide‌Installation Package‌
ComplyTec NERC Compliance Management Video Implementation GuideInstallation Package
Crowe Pandemic Response App-Pack VideoImplementation GuideInstallation Package
Evalto Inactive User Reporting update_black_small.pngVideoImplementation GuideInstallation Package
HCL Regulatory Interactions Management -Implementation GuideInstallation Package
HCL IRAM2-Aligned Risk Assessment-Implementation GuideInstallation Package
HCL Tax Risk Management-Implementation GuideInstallation Package
NTT ISMS Control Assessment VideoImplementation GuideInstallation Package
NTT ISMS Risk Assessment VideoImplementation GuideInstallation Package
Archer Complaints Tracking  VideoImplementation GuideInstallation Package
Archer Conflict of Interest Management  VideoImplementation GuideInstallation Package
Archer Contract Clause ManagementVideoImplementation GuideInstallation Package
Archer Discussion Forum new_red_flipped_small.pngVideoImplementation GuideInstallation Package
Archer Documentation Request TrackingVideoImplementation GuideInstallation Package
Archer Due Diligence ManagementVideoImplementation GuideInstallation Package
Archer Exam Management VideoImplementation GuideInstallation Package
Archer FFIEC-Aligned Cybersecurity FrameworkVideoImplementation GuideInstallation Package
Archer Gift RegistrationVideoImplementation GuideInstallation Package
Archer IIC-Aligned IoT Security Maturity Assessment VideoImplementation GuideInstallation Package
Archer IoT Project Readiness VideoImplementation GuideInstallation Package
Archer Model Risk ManagementVideoImplementation GuideInstallation Package
Archer NIST-Aligned Cybersecurity Framework VideoImplementation Guide available for Archer release 6.4 SP1 and 6.8Installation Packages available for Archer release 6.4 SP1 and 6.8
Archer NIST-Aligned Privacy Framework VideoImplementation GuideInstallation Package
Archer Product Security Development Assessment VideoImplementation Guide Installation Package
Archer Project Management update_black_small.pngVideoImplementation GuideInstallation Package
Archer Request & Response Tracker VideoImplementation GuideInstallation Package
Archer Speak UpVideoImplementation GuideInstallation Package
Archer Strategic PlanningVideoImplementation GuideInstallation Package
Archer Strategic Risk ManagementVideoImplementation GuideInstallation Package
Archer Support RequestsVideoImplementation GuideInstallation Package
Templar Shield Anti-Money Laundering (AML) Rule Management new_red_flipped_small.png-Implementation GuideInstallation Package
TUV Rheinland Opensky User Entitlement Review-Implementation GuideInstallation Package

 

Tools & Utilities

Tool & Utility Name and OverviewVideo DemonstrationImplementation GuideInstallation Package
Archer Experts / Archer Scripts Group Management-

Implementation Guide

Installation Package
Archer Experts Records RetentionVideo

Installation Guide

User Guide

Installation Package
Archer Experts Re*PorterVideoInstallation and User GuideInstallation Package
Archer Scripts Data Driven Event AnalysisVideoImplementation GuideInstallation Package
Archer Scripts User Status Indicator and TooltipVideo Implementation GuideInstallation Package
Bowmen Group Multicurrency-Overview GuideImplementation
NTT Platform Monitoring and Operations  Video Link : 34766  Implementation Guide Installation Package 
Archer Advanced Workflow Content Assistant  VideoImplementation Guide

Installation Packages available for Archer release 6.4, 6.5, 6.6 to 6.8 and 6.9+

See overview for additional release versions.

Archer Authoritative Source Data Feed --Installation Package
Archer Data Feed Initiator new_red_flipped_small.png-Implementation Guide Installation Package
Archer Data Feed Monitor -Implementation GuideInstallation Package
Archer Multi-Record Publisher -Implementation GuideInstallation Package
Archer User Profile and Contact Synchronization update_black_small.png-Implementation GuideInstallation Package

 

Integrations

Integration Name and OverviewImpacted Use CaseImplementation GuideInstallation Package
1touch.io DLM Pro

Archer Data Governance

Archer Third Party Catalog

Archer Third Party Risk Management

Implementation Guide-
Allied Media Digital Testing and Controls Automation 

Archer IT Controls Assurance

Archer Issues Management

Implementation Guide-
Allied Media Michelle: AI Digital Agent

Archer Third Party Catalog

Archer Third Party Engagement

Implementation Guide-
Apparity EUCA Risk Discovery and Analysis

Archer Data Governance

Implementation GuideInstallation Package
AWS IAM Access Analyzer update_black_small.png

Archer Issues Management

Implementation Guide Installation Package
AWS Security Hub update_black_small.png

Archer Issues Management

Archer IT Controls Assurance

Implementation GuideInstallation Package
Axonius Cybersecurity Asset Management update_black_small.png

Archer Audit Engagements & Workpapers
Archer Third Party Governance
Archer Business Continuity and Disaster Recovery Planning
Archer IT Controls Assurance
Archer IT Security Vulnerability Program
Archer IT Risk Management
Archer Cyber Incident & Breach Response
Archer PCI Management
Archer Information Security Management System (ISMS)
Archer Data Governance

Implementation GuideInstallation Package
BigID Data MapperArcher Data Governance Implementation GuideInstallation Package
BitSight Security RatingsArcher Third Party Catalog Implementation GuideInstallation Package
Bloomberg LawArcher Corporate Obligations Management Implementation GuideInstallation Package
Centers for Medicare and Medicaid Services (CMS) Data Feed

Archer Corporate Obligations Management

Archer IT Regulatory Management

Implementation GuideInstallation Package
Compliance.ai 

Archer Corporate Obligations Management

Implementation GuideInstallation Package
CyberArk Privileged Access Security  Archer PlatformConfiguration GuideCyberArk Marketplace
CyberSponse CyOPs Archer Security Incident ManagementImplementation Guide-
Cymulate Breach & Attack Simulation  Archer Cyber Incident & Breach ResponseImplementation GuideInstallation Package
Cysiv Command Archer Cyber Incident & Breach ResponseImplementation Guide-
Demisto EnterpriseArcher Security Incident ManagementImplementation Guide-
Digital Defense, Inc. Frontline Vulnerability Manager Archer IT Security Vulnerabilities ProgramImplementation GuideInstallation Package
Emergynt Instinct EngineManyImplementation Guide-
erwin EDGE PlatformManyImplementation Guide-
EverbridgeArcher Crisis ManagementImplementation GuideInstallation Package
Federal Deposit Insurance Corporation (FDIC) Data Feed

Archer Corporate Obligations Management

Archer IT Regulatory Management

Implementation GuideInstallation Package
Federal Trade Commission (FTC) Data FeedArcher Corporate Obligations ManagementImplementation GuideInstallation Package
Financial Accounting Standards Board (FASB) Data Feed

Archer Corporate Obligations Management

Archer IT Regulatory Management

Implementation GuideInstallation Package
Global-Regulation International Law SearchArcher Corporate Obligations ManagementImplementation GuideInstallation Package
GovTrack Data Feed Content

Archer Corporate Obligations Management

Archer IT Regulatory Management

Implementation GuideInstallation Package
Gurucul Archer Security Incident ManagementImplementation GuideInstallation Package
KONEXUS  

Archer Business Continuity and IT Disaster Recovery Planning

 Archer Crisis Management

Implementation Guide

KONEXUS Connector Service Installation Package

 

Archer Business Resiliency Use Case Updates Installation Package

LexisNexis Regulatory Compliance  update_black_small.png

Archer Policy Program Management

Archer Corporate Obligations Management

Implementation Guide

Installation Package

LexisNexis Regulatory Compliance - Enhanced Content new_red_flipped_small.png

Archer Policy Program Management

Implementation Guide

Installation Package

LogicHub Archer Security Incident ManagementImplementation Guide-
MendixManyImplementation GuideInstallation Package
Monetary Authority of Singapore (MAS) Data Feed 

Archer Corporate Obligations Management

Archer IT Regulatory Management

Implementation GuideInstallation Package
NIST National Vulnerability Database (NVD)  Archer IT Security Vulnerabilities ProgramImplementation GuideInstallation Package
Office of the Comptroller of the Currency (OCC) Data Feed

 Archer Corporate Obligations Management

Archer IT Regulatory Management

Implementation GuideInstallation Package
Palisades @ Risk Archer Operational Risk ManagementImplementation GuideInstallation Package
Panaseer Platform 

Archer IT Controls Assurance

Archer Key Indicator Management

Implementation Guide Installation Package
Panorays 

Archer Third Party Catalog

Implementation GuideInstallation Package
Perceptive Control Solutions - Audit ProdigyArcher Audit Engagements & WorkpapersImplementation Guide-
Qualys Asset Discovery update_black_small.pngManyImplementation GuideInstallation Package
Qualys Vulnerability Management update_black_small.pngArcher IT Security Vulnerabilities ProgramImplementation GuideInstallation Package
RapidRating Portfolio Health

 Archer Third Party Catalog

Archer Third Party Governance

Implementation GuideInstallation Package
Recorded Future Third Party Risk 

Archer Third Party Catalog 

Implementation GuideInstallation Package
Recorded Future Vulnerability Enrichment FeedArcher IT Security Vulnerabilities ProgramImplementation GuideInstallation Package
RedisArcher PlatformDocumentationDownloads
Regology Regulatory Change Management new_red_flipped_small.pngArcher Corporate Obligations ManagementImplementation GuideInstallation Package
Reserve Bank of India (RBI) Data Feed

 Archer Corporate Obligations Management

 Archer IT Regulatory Management

Implementation GuideInstallation Package
Risk Based Security VulnDBArcher IT Security Vulnerabilities ProgramImplementation GuideInstallation Package
RiskLens update_black_small.png

Archer IT Risk Management

Archer Top-Down Risk Assessment

Archer Information Security Management System

 Archer Operational Risk Management

Implementation Guides available for RiskLens Gen2 Release 6.2 P3 and RiskLens Gen3 Release 6.8Installation Packages available for RiskLens Gen2 Release 6.2 P3 and RiskLens Gen3 Release 6.8
RiskRecon Third Party Security Risk Monitoring update_black_small.png

Archer Third Party Catalog

Archer Third Party Engagement

Archer Issues Management

Implementation Guides available for 6.4 SP1 P1 and 6.7Packages available for 6.4 SP1 P1 and 6.7
RiskRecon Own Enterprise Monitoring update_black_small.png

Archer IT Security Vulnerabilities Program

Archer Third Party Security Risk Monitoring

Implementation Guides available for Archer release 6.4 SP1 P1 and 6.7

Installation Packages available for Archer release 6.4 SP1 P1 and 6.7

RSA Identity Governance & Lifecycle User Provisioning-Application GuideBlueprint Repository
Scaleout StateServerArcher PlatformUser Guide-
SecurityScorecard Archer Third Party CatalogImplementation GuideInstallation Package
Securonix Snypr Archer Security Incident ManagementImplementation GuideInstallation Package
SirionLabs CLM Archer Third Party CatalogImplementation GuideInstallation Package
SOFTwarfare KillerAppz Archer IT Security Vulnerabilities ProgramImplementation Guide-
Splunk> Phantom Archer Security Incident ManagementImplementation Guide-
Supply Wisdom Archer Third Party CatalogImplementation GuideInstallation Package
Swimlane Archer Security Incident ManagementImplementation Guide-
Symantec Control Compliance Suite

Archer IT Controls Assurance

Archer IT & Security Policy Program Management

Implementation GuideInstallation Package
Tableau Web Data Connector-Implementation GuideInstallation Package
Tenable.sc Asset Discovery update_black_small.pngManyImplementation GuideInstallation Package
Tenable.sc Vulnerability Management update_black_small.pngArcher IT Security Vulnerabilities ProgramImplementation GuideInstallation Package
Thomson Reuters Regulatory Intelligence update_black_small.png

Archer Corporate Obligations Management

Implementation GuideInstallation Package
ThreatConnectArcher Cyber Incident & Breach ResponseImplementation Guide-
ThreatQuotient ThreatQArcher Cyber Incident & Breach ResponseImplementation Guide-
ThreatWatch update_black_small.pngArcher IT Security Vulnerability ManagementImplementation GuideInstallation Package
Unified Compliance Framework Common Controls Hub update_black_small.pngArcher Policy Program ManagementImplementation GuideInstallation Package
U.S. Computer Emergency Readiness Team (US-CERT) Data Feed

Archer Corporate Obligations Management

Archer IT Regulatory Management

Implementation GuideInstallation Package
U.S. Department of Homeland Security (DHS) Data Feed

Archer Corporate Obligations Management

 Archer IT Regulatory Management

Implementation GuideInstallation Package
U.S. Department of Health and Human Services (HHS) Data Feed

Archer Corporate Obligations Management

Archer IT Regulatory Management

Implementation GuideInstallation Package
U.S. Department of the Treasury Specially Designated National and Blocked Persons List

Archer Third Party Catalog

Archer Third Party Engagement

Archer Issues Management

Implementation GuideInstallation Package
U.S. Securities and Exchange Commission (SEC) Data Feed

Archer Corporate Obligations Management

Archer IT Regulatory Management

Implementation GuideInstallation Package
Venminder Third Party Risk Management

 Archer Third Party Catalog

Implementation GuideInstallation Package
Veracode Platform Integration 

Archer IT Security Vulnerabilities Program

Implementation GuideInstallation Package
Wolters Kluwer Regulatory Data Feed update_black_small.png

Archer Corporate Obligations Management

Archer IT Regulatory Management

Implementation GuideInstallation Package
Wolters Kluwer NILS INsource 

Archer Corporate Obligations Management

Implementation GuideInstallation Package

 

Content

Content Name and OverviewContent Package
American Institute of CPAs (AICPA) Privacy Maturity Model Authoritative Source Content Package
Australian Government Information Security Manual (ISM) Authoritative Source 

Content Package

Australian Government Protective Security Policy Framework (PSPF) Authoritative SourceContent Package
Australian Privacy Act Authoritative SourceContent Package
Australian Prudential Standard CPS 234 and Prudential Practice Guide CPG 234 on Information Security... 

CPS 234 Content Package

CPG 234 Content Package

Axelos IT Infrastructure Library (ITIL) Authoritative Source Content Package
BACEN 2025 Authoritative Source Content Package
Bank Secrecy Act Authoritative SourceContent Package
Baseline Security Recommendations for IOT Authoritative Source Content Package
BIS Basel Committee on Banking Supervision Authoritative Source  update_black_small.png

Basel II Content Package

Basel Core Principles for Effective Banking Supervision Content Package 

Brazil LGPD General Law for the Protection of Personal Data Authoritative Source Content Package
California State Privacy Laws Authoritative Source Content update_black_small.png  

California Consumer Privacy Act Authoritative Source Content Package

 

California Consumer Privacy Act Regulation Authoritative Source Content Package

 

California Privacy Rights Act Authoritative Source Content Package

Canadian Anti-Spam Legislation (CASL) Authoritative Source

Content Package

Canadian Office of the Superintendent of Financial Institutions (OSFI) Authoritative Source 

Content Package
Center for Internet Security (CIS) - Critical Security Controls Authoritative Source Requires license validation. Please contact  The Center for Internet Security (CIS
Centers for Medicare and Medicaid Services Authoritative Source - Prescription Drug Benefit Manual (... Content Package 

Centers for Medicare and Medicaid Services Authoritative Source - Managed Care Manual (100-16)   

Content Package

Centers for Medicare and Medicaid Services Authoritative Source - Information Security (IS) Acceptab... 

Content Package

Centers for Medicare and Medicaid Services Authoritative Source - Electronic Health Record (EHR) Mea...   

Content Package

Chemical Facility Anti-Terrorism Standards Authoritative Source

Content Package
Clinger-Cohen Act Authoritative Source Content Package
Cloud Security Alliance Cloud Controls Matrix Authoritative Source Content Package
CNSS Instruction No. 1253 Authoritative Source Content Package
COGRIS Turkish Regulation on Banks' Information Systems and Electronic Banking Services Authoritativ... new_red_flipped_small.pngContent Package 
Comisión Nacional Bancaria y de Valores de México Chapter X Authoritative Source Content Package
Criminal Justice Information Services Security Policy Authoritative Source Content Package
Cyber Essentials PLUS Authoritative Source Content Package
Cybersecurity Maturity Model Certification Framework (CMMC) Authoritative Source Content Package
European Banking Authority (EBA) Guidelines on ICT and Security Risk Management Authoritative Source new_red_flipped_small.pngContent Package
European Banking Authority (EBA) Guidelines on Outsourcing Arrangements Authoritative Source new_red_flipped_small.pngContent Package
European Commission Ethics Guidelines for Trustworthy Artificial Intelligence Authoritative Source new_red_flipped_small.pngContent Package
European Union General Data Protection Regulation (GDPR) Authoritative Source  Content Package

European Union Markets in Financial Instruments Directive (MIFID 2: Directive 2014/65/EU) Authoritat...  

Content Package
European Union Privacy Directives Authoritative Source Content Package
European Union Regulatory Technical Standards for Authentication Authoritative Source Content Package
Fair Credit Reporting Act (FCRA) Authoritative Source Content Content Package
F.A.A. Aircraft Situation Display to Industry (ASDI) Authoritative Source Content Package
F.D.A. CFR Part 21 Authoritative Source Content Package
Federal Financial Institutions Examination Council (FFIEC) Booklets Authoritative Source Content Package
Financial Industry Regulatory Authority (FINRA) Rule Sets Authoritative SourceContent Package
Financial Services Sector Coordinating Council (FSSCC) Cybersecurity Profile Authoritative Source Content Package
France Federal Data Protection Act Authoritative Source Content Package
F.T.C. CAN-SPAM Act of 2003 Authoritative Source Content Package
F.T.C. Red Flags Rule Authoritative Source Content Package
Germany Federal Data Protection Act Authoritative Source Content Package
G.S.A. FedRAMP Revision 4 Authoritative Source Content Package
Health Insurance Portability and Accountability Act (HIPAA) Authoritative Source  Content Package
HITRUST CSF Authoritative Source 

Requires license validation. Please contact support.

Hong Kong Monetary Authority (HKMA) Supervisory Policy Manual TM-G-1 Content Package
Hong Kong Monetary Authority (HKMA) E-banking Regulation Authoritative Source Content Package
Hong Kong Monetary Authority (HKMA) Principles of Artificial IntelligenceContent Package
Industrial Internet Consortium (IIC) IoT SMM Framework Authoritative Source Content Package
Institute of Internal Auditors (IIA) Audit Control Assessment Questionnaire Content  Content Package
Institute of Internal Auditors (IIA) Standards Content Package
Institution of Engineering and Technology (IET) Cyber Security and Safety Code of Practice Authorita... new_red_flipped_small.pngContent Package
ISACA COBIT Authoritative Source  

COBIT 5 Content Package

 

COBIT 2019 Content Package

ISO/IEC 27001 Standard Authoritative Source Requires license validation. Please contact support.
Microsoft Software Development Lifecycle Authoritative Source Content Package
Monetary Authority of Singapore (BCM) Authoritative Source  Content Package
Monetary Authority of Singapore (TRMG) Authoritative Source  Content Package
National Industrial Security Program Operating Manual (NISPOM) Authoritative Source Content Package
National Institute of Standards and Technology Cybersecurity Framework Guidelines Authoritative Sour...Content Package
National Institute of Standards and Technology Privacy Framework Authoritative Source Content Package
National Institute of Standards and Technology Guidelines (SP 800-37 Rev 2) Authoritative Source Con... Content Package
National Institute of Standards and Technology (SP 800-39) Guidelines Authoritative Source Content Package
National Institute of Standards and Technology (SP 800-53 R4) Guidelines Authoritative SourceContent Package
National Institute of Standards and Technology (SP 800-53 R5) Guidelines Authoritative Source update_black_small.pngContent Package
National Institute of Standards and Technology (SP 800-82 R2) Guidelines Authoritative Source Content Package
National Institute of Standards and Technology (SP 800-171) Guidelines Authoritative Source Content Package
New York State Cybersecurity Requirements for Financial Services Companies Authoritative Source (formerly U.S. State Laws)Content Package
New Zealand Privacy Act Authoritative SourceContent Package
North American Electric Reliability Corporation (NERC) Standards Authoritative Source update_black_small.png

Content Package

North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Auth... update_black_small.png

Content Package

Payment Card Industry Data Security Standard (PCI DSS) Authoritative Source  Content Package
Personal Information Protection and Electronic Documents Act (PIPEDA) Authoritative Source Content Package
Prudential Regulation Authority Internal Capital Adequacy Assessment Process (ICAAP) Authoritative S... new_red_flipped_small.pngContent Package
Reserve Bank of India (RBI) Authoritative Source  Content Package
Archer Control Assessment Questionnaire Content  Content Package
Archer Control Standards Library  

Content Packages:

English

German

Spanish

Italian

Japanese

Portuguese

Russian

Simplified Chinese

French

Archer Financial Regulatory Assessment Questionnaire Content  

Content Package

Archer Fraud Assessment Questionnaire Content  

Content Package

Archer Policy Library 

Content Packages:

English

German

Spanish

Italian

Japanese

Portuguese

Russian

Simplified Chinese

French

Archer Question Library  

Content Packages

Archer Third Party Pandemic Preparedness Assessment 

Content Package

Secure Controls Framework (SCF) Authoritative Source Content Package
Singapore Cybersecurity Act Authoritative SourceContent Package
Solvency II Authoritative Source Content Package
Shared Assessments Standard Information Gathering Template (SIG) Question Library Content 

2019 Content Package

2020 Content Package
2021 Content Package

State of Nevada Gaming Control Board Authoritative Source  Content Package
U.K. Bribery Act Authoritative Source Content Package
U.K. Data Protection Act Authoritative Source Content Package
U.K. National Cyber Security Centre (NCSC) Cyber Assessment Framework Authoritative Source Content Package
U.K. Network and Information Systems Regulations Authoritative Source Content Package
U.S. Department of Defense Authoritative Source Content Package
U.S. Department of Education Family Educational Rights and Privacy Act (FERPA) Authoritative Source Content Package
U.S. Department of Health and Human Services (HHS) Technical Volumes: Cybersecurity Practices for He...

Medium and Large Organizations Content Package

 

Small Organizations Content Package

U.S. Federal Information Security Management Act (FISMA) Authoritative Source Content Package
U.S. Foreign Account Tax Compliance (FATCA) Authoritative Source  Content Package
U.S. Foreign Corrupt Practices Act (FCPA) Authoritative Source Content Package
U.S. G.A.O. Federal Information System Controls Audit Manuals (FISCAM) Authoritative Source Content Package
U.S. Gramm-Leach-Bliley Act (GLBA) Full Text Authoritative SourceContent Package
U.S. Gramm-Leach-Bliley Act (GLBA) Authoritative Source Content Package
U.S. HHS/CDC Business Pandemic Influenza Planning Checklist Questionnaire Library ContentContent Package
U.S. HHS/CDC Business Pandemic Influenza Planning Checklist BC/DR ContentContent Package
U.S. HiTech Act Authoritative Source Content Package
U.S. International Traffic in Arms (ITAR) Authoritative Source  Content Package
U.S. Office of Management and Budget (OMB) Circular No. A-130 Appendix I Authoritative Source  Content Package
U.S. Office of Management and Budget (OMB) Appendix III to OMB Circular No. A-130 Authoritative Sour...Content Package
U.S. Sarbanes-Oxley Act Authoritative Source Content Package
U.S. Sarbanes-Oxley Master Controls Authoritative Source Content Package
U.S. Securities and Exchange Commission (SEC) Investment Advisers Act Authoritative SourceContent Package
U.S. Securities and Exchange Commission (SEC) Investment Company Act Authoritative SourceContent Package
U.S. State Breach Notification Laws Authoritative Source (formerly U.S. State Privacy Laws) Content Package
U.S. State Data Security Laws Authoritative Source  

Companies and Insurers Content Package

 

Government Content Package

U.S. State Privacy Laws Authoritative Source 

Content Package

U.S. White House 25 Point Implementation Plan to Reform Federal Information Technology Management Au...Content Package

 

new_red_flipped_small.png  Newly Added to the Archer Exchange         update_black_small.png  Recently Updated

 

If you have additional ideas for future Archer Exchange offerings, please submit them to RSA Ideas.

Labels (1)
Labels:
  • App Packs

Tags (12)
  • Archer
  • Archer Exchange
  • exchange
  • Offering Overview
  • offerings
  • overview
  • RSA Archer
  • RSA Archer Exchange
  • RSA Archer Exchange App Pack
  • RSA Archer Suite
  • rsa exchange
  • toc
27 Likes
Was this article helpful? Yes No
Share
No ratings
Version history
Last update:
‎2018-08-04 08:49 PM
Updated by:
Frequent Contributor SusanReadMiller Frequent Contributor
Contributors
  • SusanReadMiller
    SusanReadMiller

Related Content

Article Dashboard
  • Article History
Powered by Khoros
  • Products
  • Resources
  • Solutions
  • RSA University
  • Support
  • RSA Labs
  • RSA Ready
  • About RSA Link
  • Terms & Conditions
  • Privacy Statement
  • Provide Feedback
© 2020 RSA Security LLC or its affiliates.
All rights reserved.