Provides comprehensive security compliance framework reference mappings across NIST CSF, SOC 2, CIS Controls v8, ISO 27001, PCI DSS, and HIPAA. Use when someone needs to map security findings to frameworks, build incident response playbooks, understand CIS implementation groups, reference NIST CSF categories, or plan compliance remediation. Includes full NIST CSF subcategory listings, CIS Controls v8 with IG1-IG3 tiers, and incident response playbooks for P0-P3 severity levels.
Comprehensive reference for mapping security findings to compliance frameworks.
| # | Control | IG1 | IG2 | IG3 |
|---|---|---|---|---|
| 1 | Inventory and Control of Enterprise Assets | X | X | X |
| 2 | Inventory and Control of Software Assets | X | X | X |
| 3 | Data Protection | X | X | X |
| 4 | Secure Configuration | X | X | X |
| 5 | Account Management | X | X | X |
| 6 | Access Control Management | X | X | X |
| 7 | Continuous Vulnerability Management | X | X | |
| 8 | Audit Log Management | X | X | |
| 9 | Email and Web Browser Protections | X | X | |
| 10 | Malware Defenses | X | X | |
| 11 | Data Recovery | X | X | X |
| 12 | Network Infrastructure Management | X | X | |
| 13 | Network Monitoring and Defense | X | ||
| 14 | Security Awareness and Skills Training | X | X | X |
| 15 | Service Provider Management | X | X | |
| 16 | Application Software Security | X | ||
| 17 | Incident Response Management | X | X | |
| 18 | Penetration Testing | X |
Timeline: Respond within 15 minutes
Timeline: Respond within 1 hour
Timeline: Remediate within 48 hours
Timeline: Address in next maintenance window