Skip to content
Frameworks

15+ frameworks. Mapped automatically.

Run any framework, run them in parallel. Cross-mapping is built in — answer once, prove everywhere.

SOC 2

AICPA 255 controls

The de facto trust standard for SaaS. Customers ask for it before they sign, auditors test it annually, and it's the gateway to selling enterprise.

  • IAM access reviews and SSO logs
  • Vulnerability scanner output (Nessus, Qualys, Tenable)
  • Cloud configuration snapshots (AWS Config, GCP, Azure)
  • Cross-mapped to ISO 27001, HIPAA, NIST CSF + 1 more
Best for: Any company storing or processing customer data — SaaS, fintech, services.
2017 TSC + 2022 Points of Focus Saas, Fintech, General

ISO 27001

ISO 93 controls

The international standard for information security management systems. Required for many enterprise deals — especially in Europe and APAC — and a strong signal of mature security operations.

  • ISMS documentation and policy versions
  • Statement of Applicability with control justifications
  • Risk treatment plans and residual risk records
  • Cross-mapped to SOC 2, HIPAA, GDPR + 1 more
Best for: Companies selling internationally, especially in regulated or large-enterprise B2B contexts.
2022 General, International

NIST CSF

NIST 185 controls

The most widely adopted cybersecurity framework in the United States. Voluntary but increasingly expected by regulators, partners, and insurance carriers.

  • Asset inventory with criticality ratings
  • Vulnerability scan output and remediation tickets
  • Identity and access management logs
  • Cross-mapped to CIS Controls, ISO 27001, SOC 2 + 1 more
Best for: Any organization wanting a defensible security baseline — especially those that touch critical infrastructure or sell to the federal government.
2.0 General, Critical Infra, Government

HIPAA

US Health & Human Services 107 controls

The federal law governing protected health information in the United States. Covered entities and business associates must implement administrative, physical, and technical safeguards — and can be fined per violation.

  • Workforce training completion records
  • Access reviews on systems handling PHI
  • Encryption status of data at rest and in transit
  • Cross-mapped to SOC 2, ISO 27001, NIST 800-66 + 1 more
Best for: Healthcare providers, payers, clearinghouses, and any vendor that touches PHI on their behalf.
Privacy + Security Rules Healthcare

PCI DSS

PCI Security Standards Council 262 controls

The mandatory security standard for any organization that stores, processes, or transmits cardholder data. PCI DSS v4 added 64 new requirements that go fully effective in 2025.

  • Network segmentation diagrams and validation tests
  • Vulnerability scan output (ASV and internal)
  • Penetration test reports with remediation status
  • Cross-mapped to SOC 2, ISO 27001, NIST CSF
Best for: Merchants, payment processors, service providers, and any platform handling cardholder data — regardless of transaction volume.
4.0.1 Payments, Ecommerce, Fintech

CMMC 2.0

US Department of Defense 110 controls

The certification framework defense contractors must meet to bid on DoD contracts. Level 2 requires third-party assessment; Level 3 requires DIBCAC assessment.

  • System Security Plan (SSP) with control implementation statements
  • Plan of Action and Milestones (POA&M) for any unmet controls
  • CUI inventory and handling procedures
  • Cross-mapped to NIST 800-171, NIST 800-172, NIST CSF
Best for: Defense industrial base contractors and subcontractors handling Federal Contract Information (FCI) or Controlled Unclassified Information (CUI).
2.0 (final rule 2024) Government, Defense, Manufacturing

FedRAMP

GSA / NIST 800-53 320 controls

The federal government's standardized program for cloud security authorization. Required to sell cloud services to most US federal agencies.

  • System Security Plan (SSP) sections aligned to NIST 800-53 Rev 5
  • Continuous monitoring (ConMon) deliverables
  • Vulnerability scan output (DHS-approved scanner outputs)
  • Cross-mapped to NIST 800-53 Rev 5, FISMA, NIST CSF + 1 more
Best for: Cloud service providers (CSPs) selling to the US federal government, including IaaS, PaaS, and SaaS vendors.
Rev 5 (Moderate baseline) Government, Saas Public Sector

GDPR

European Union 109 controls

The European Union's data-protection regulation. Applies to any organization processing the personal data of EU residents — regardless of where the organization is based. Fines up to 4% of global annual revenue.

  • Records of Processing Activities (RoPA) per Article 30
  • Data Subject Access Request (DSAR) handling logs
  • Lawful basis records and consent capture
  • Cross-mapped to ISO 27001, ISO 27701, SOC 2 + 1 more
Best for: Any company with EU customers, employees, or website visitors. Extraterritorial scope means you don't have to be in the EU to be subject to it.
Regulation (EU) 2016/679 General, International, Any Eu Data

SOX

US Securities & Exchange 105 controls

The IT general controls (ITGC) framework that public companies — and companies preparing to go public — must demonstrate to their external auditors annually under Sarbanes-Oxley.

  • Privileged access reviews on financial systems
  • Change management approvals for production deployments
  • Segregation of duties matrices
  • Cross-mapped to COSO, COBIT, NIST 800-53 + 1 more
Best for: Public companies, pre-IPO companies in audit, and any organization where management certifies the effectiveness of internal controls over financial reporting.
Sarbanes-Oxley Section 404 Public Companies, Pre Ipo

FFIEC IT

FFIEC 155 controls

The Federal Financial Institutions Examination Council's IT examination guidance. Examiners use it as the basis for IT exams of US banks, credit unions, and supervised entities.

  • Cybersecurity Assessment Tool (CAT) responses with maturity progression
  • Wire and ACH controls and segregation of duties
  • Vendor management documentation per FIL-44-2008
  • Cross-mapped to FFIEC CAT, NIST CSF, PCI DSS + 1 more
Best for: FDIC-, OCC-, NCUA-, and state-chartered financial institutions subject to FFIEC IT examinations.
Architecture, Infrastructure & Operations + CAT Banking, Credit Unions, Financial Services

CIS Controls

Center for Internet Security 153 controls

The pragmatic, prioritized cybersecurity controls developed by a global community of practitioners. Implementation Group tiers (IG1, IG2, IG3) let smaller organizations start where they are.

  • Asset inventory (hardware and software)
  • Vulnerability scan and patching cadence
  • Account and access management logs
  • Cross-mapped to NIST CSF, ISO 27001, PCI DSS + 1 more
Best for: Any organization wanting a defensible technical baseline. Often used alongside NIST CSF for tactical depth.
v8.1 General, Any Size

CSA AI CM

Cloud Security Alliance 243 controls

The Cloud Security Alliance's structured controls catalog for AI systems — covering data, model, governance, and deployment dimensions. The most prescriptive AI controls framework available.

  • Training data classification and provenance
  • Model evaluation and red-team results
  • Prompt-injection and jailbreak testing logs
  • Cross-mapped to NIST AI RMF, ISO 42001, SOC 2 + 1 more
Best for: Cloud-native AI providers and AI-using SaaS vendors selling to enterprise customers that include AI in their procurement security questionnaires.
1.0 Ai Developers, Cloud Saas, Ai Deployers

NIST AI RMF

NIST 105 controls

The voluntary framework for AI risk management — covering governance, risk identification, mitigation, and continuous evaluation. Increasingly cited by regulators and required by enterprise AI buyers.

  • Model cards and system cards
  • Training data lineage and provenance records
  • Bias testing and fairness evaluation results
  • Cross-mapped to CSA AI CM, ISO 42001, EU AI Act + 1 more
Best for: Companies developing or deploying AI systems — particularly those selling AI to enterprises or operating in regulated industries.
1.0 + Generative AI Profile Ai Developers, Ai Deployers, General

NIST 800-30

NIST 122 controls

The NIST guide for conducting risk assessments. The reference methodology for nearly every regulatory and audit context that asks for a 'documented risk assessment.'

  • Threat sources catalog with capability ratings
  • Vulnerability inventory with severity
  • Likelihood × impact assessments per asset
  • Cross-mapped to NIST CSF, ISO 27001, HIPAA + 1 more
Best for: Any organization that needs to demonstrate a defensible risk assessment methodology — common requests come from HIPAA, FedRAMP, ISO 27001, and SOC 2 auditors.
Rev 1 General, Government, Regulated

SEC Cyber

US Securities & Exchange Commission 12 controls

The SEC's cybersecurity disclosure rule requires public companies to disclose material cybersecurity incidents on Form 8-K within four business days, and to describe their cybersecurity risk management and governance in 10-K filings.

  • Materiality assessments for cybersecurity incidents
  • Incident timeline reconstruction with forensic linkage
  • Form 8-K Item 1.05 disclosure drafts
  • Cross-mapped to NIST CSF, ISO 27001, SOX
Best for: All US public companies and foreign private issuers filing with the SEC.
Final rule (effective 2024) Public Companies, Pre Ipo

GLBA Safeguards

US Banking Coming soon

Administrative, technical, and physical safeguards for non-public personal information under the FTC Safeguards Rule. Vendor oversight, incident notification (30-day clock), and qualified-individual designation.

  • 16 CFR Part 314 controls
  • Vendor oversight workflow
  • 30-day incident notification
  • Qualified-individual attestation
Best for: Banks, credit unions, and other financial institutions covered by Title V of GLBA.
16 CFR Part 314 Banking, Financial Services

BSA / AML

US Banking Coming soon

Bank Secrecy Act and Anti-Money-Laundering controls — CIP, ongoing CDD, SAR/CTR workflows, sanctions screening, and Section 314(a) / 314(b) information sharing.

  • Customer Identification Program (CIP)
  • SAR / CTR workflows
  • Sanctions screening
  • 314(a) / 314(b) sharing
Best for: Banks, MSBs, broker-dealers, and other BSA-covered financial institutions.
FinCEN 31 CFR Chapter X Banking, Financial Services

HIPAA BAA Registry

US Health Coming soon

Dedicated HIPAA Business Associate Agreement registry — counterparty inventory, BAA expiry tracking, downstream subcontractor flow-down, and breach-notification readiness.

  • BAA inventory + expiry tracking
  • Subcontractor flow-down
  • Breach notification readiness
  • Counterparty risk scoring
Best for: Covered entities and business associates with significant BAA inventories.
HIPAA Privacy & Security Rules Healthcare

Don't see your framework?

Build a custom assessment in minutes — define your domains, weights, and questions. Talarity handles the rest.