Skip to content

Compliance Mapping Visualizer

Compliance teams face a persistent challenge: mapping controls across multiple frameworks without losing fidelity or creating gaps. Organizations subject to SOC 2 audits often discover their NIST CSF implementation already satisfies 60-70% of the requirements — but only if the mapping is done correctly.

This interactive tool provides a unified crosswalk across four major frameworks — NIST CSF 2.0, CIS Controls v8, ISO 27001:2022, and SOC 2 Type II — covering 30+ control mappings across eight critical security domains. Use it to identify coverage gaps, plan audit evidence collection, and eliminate redundant compliance work.

How to Use This Tool

  1. Select frameworks you need to comply with using the toggle buttons
  2. Filter by domain to focus on specific control families
  3. Click any cell in the matrix to view detailed mapping information
  4. Check implemented controls to run a gap analysis across all frameworks
  5. Export your crosswalk report for audit documentation

4
Frameworks
32
Control Mappings
8
Security Domains
128
Cross-References
Domain Control Area NIST CSF 2.0 CIS Controls v8 ISO 27001:2022 SOC 2 Type II Coverage

Check the controls your organization has implemented, then view coverage across all frameworks.

Generate a formatted compliance crosswalk report based on your selected frameworks and filters.


Framework Summaries

NIST Cybersecurity Framework (CSF) 2.0

The NIST CSF 2.0, released in February 2024, is the most significant update to the framework since its original 2014 release. Key changes include the addition of a sixth function — Govern — elevating cybersecurity governance to a top-level concern alongside Identify, Protect, Detect, Respond, and Recover.

Core Functions:

Function Code Focus Area
Govern GV Cybersecurity risk management strategy, expectations, and policy
Identify ID Asset management, risk assessment, supply chain risk management
Protect PR Access control, awareness training, data security, platform security
Detect DE Continuous monitoring, adverse event analysis
Respond RS Incident management, analysis, mitigation, reporting
Recover RC Recovery planning and execution

Key CSF 2.0 Changes:

  • Governance Function (GV): New top-level function making governance a peer of operational security functions
  • Supply Chain Risk Management: Expanded from a subcategory to a major category under Govern
  • Applicability: Broadened beyond critical infrastructure to all organizations regardless of size or sector
  • Implementation Examples: New informative references with practical implementation guidance
  • Community Profiles: Templates for sector-specific and use-case-specific implementations

Nexus Coverage

For hands-on NIST CSF implementation, see Chapter 10: Governance, Risk & Compliance Engineering and the GRC Architecture Pattern.

CIS Controls v8

The CIS Controls v8 (May 2021) restructured the controls from 20 to 18 control groups organized by security function rather than by implementation complexity. Controls are further broken into 153 safeguards with three Implementation Groups (IGs) providing a prioritized on-ramp.

Implementation Groups:

Group Target Safeguards Description
IG1 Small orgs, limited IT 56 Essential cyber hygiene — the minimum standard
IG2 Mid-size orgs, IT teams 74 (additional) Expanded controls for orgs managing enterprise IT
IG3 Large orgs, security teams 23 (additional) Advanced controls including penetration testing and incident response

Control Groups (v8):

  1. Inventory and Control of Enterprise Assets
  2. Inventory and Control of Software Assets
  3. Data Protection
  4. Secure Configuration of Enterprise Assets and Software
  5. Account Management
  6. Access Control Management
  7. Continuous Vulnerability Management
  8. Audit Log Management
  9. Email and Web Browser Protections
  10. Malware Defenses
  11. Data Recovery
  12. Network Infrastructure Management
  13. Network Monitoring and Defense
  14. Security Awareness and Skills Training
  15. Service Provider Management
  16. Application Software Security
  17. Incident Response Management
  18. Penetration Testing

Nexus Coverage

For CIS Benchmark implementation, see Chapter 15: Hardening & Configuration Management and the Detection Query Library.

ISO 27001:2022

ISO/IEC 27001:2022 is the international standard for Information Security Management Systems (ISMS). The 2022 revision restructured controls from 14 domains into 4 themes with 93 controls (down from 114 in 2013, with 11 new controls added).

Control Themes:

Theme Controls Focus
Organizational (A.5) 37 Policies, roles, responsibilities, threat intelligence, cloud security
People (A.6) 8 Screening, terms, awareness, remote working, reporting
Physical (A.7) 14 Perimeters, entry, offices, monitoring, utilities, media
Technological (A.8) 34 Endpoints, access, authentication, malware, backup, logging, development

New Controls in 2022:

  • A.5.7 — Threat intelligence
  • A.5.23 — Information security for cloud services
  • A.5.30 — ICT readiness for business continuity
  • A.7.4 — Physical security monitoring
  • A.8.9 — Configuration management
  • A.8.10 — Information deletion
  • A.8.11 — Data masking
  • A.8.12 — Data leakage prevention
  • A.8.16 — Monitoring activities
  • A.8.23 — Web filtering
  • A.8.28 — Secure coding

Nexus Coverage

For ISO 27001 implementation guidance, see Chapter 10: Governance, Risk & Compliance Engineering and the Controls Catalog.

SOC 2 Type II

SOC 2 Type II is an audit framework developed by the AICPA based on the Trust Services Criteria (TSC). Unlike a point-in-time assessment (Type I), Type II evaluates whether controls operated effectively over a period (typically 6-12 months).

Trust Services Criteria:

Criterion Code Description
Security CC Protection against unauthorized access (mandatory for all SOC 2 reports)
Availability A Systems are available for operation as committed
Processing Integrity PI System processing is complete, valid, accurate, and timely
Confidentiality C Information designated as confidential is protected
Privacy P Personal information is collected, used, retained, and disclosed appropriately

Common Control Categories (CC Series):

  • CC1: Control Environment (tone at the top, governance)
  • CC2: Communication and Information (internal/external)
  • CC3: Risk Assessment (identification and analysis)
  • CC4: Monitoring Activities (ongoing and separate evaluations)
  • CC5: Control Activities (policies and procedures)
  • CC6: Logical and Physical Access Controls
  • CC7: System Operations (detection and monitoring)
  • CC8: Change Management
  • CC9: Risk Mitigation

Nexus Coverage

For SOC 2 audit preparation, see Chapter 10: Governance, Risk & Compliance Engineering and the Maturity Model.


Mapping Methodology

How Framework Crosswalks Are Built

Compliance mapping is not a simple one-to-one exercise. Frameworks differ in abstraction level, scope, and intent. A single NIST CSF subcategory may map to multiple CIS safeguards, and an ISO 27001 control may partially overlap with several SOC 2 criteria.

Mapping Principles Used in This Tool:

  1. Intent-Based Matching: Controls are mapped based on their security objective, not their exact wording. A control requiring "access reviews" in one framework maps to controls addressing the same security outcome in others.

  2. Coverage Classification:

    • Full Coverage — The mapped control addresses the same security objective with equivalent rigor
    • Partial Coverage — The mapped control addresses part of the objective or requires additional controls to achieve equivalence
    • Gap — No corresponding control exists in the target framework for this security objective
  3. Granularity Normalization: Frameworks operate at different levels of granularity. NIST CSF subcategories are high-level outcomes; CIS safeguards are specific technical actions. Mappings bridge these levels by identifying the most appropriate match.

  4. Validation Sources: Mappings are validated against published references including NIST SP 800-53 Rev 5, the CIS Controls Mapping to NIST CSF, and ISO 27001 Annex SL alignment documentation.

Mapping Limitations

Important Caveats

  • Framework mappings are approximations, not exact equivalences
  • A mapped control in one framework does not automatically satisfy requirements in another
  • Auditors interpret controls in the context of your specific environment
  • Always validate mappings with your compliance team and external auditors
  • This tool uses synthetic educational data — verify mappings against official framework publications

Building Your Own Crosswalk

Step 1: Identify Your Primary Framework Start with the framework that has the most regulatory or contractual weight for your organization.

Step 2: Map to Secondary Frameworks For each control in your primary framework, identify corresponding controls in secondary frameworks using intent-based matching.

Step 3: Classify Coverage Document whether each mapping provides full, partial, or no coverage. Partial mappings require gap analysis.

Step 4: Address Gaps For each gap, determine whether additional controls are needed or whether existing controls can be extended.

Step 5: Document Evidence Map each control to the specific evidence artifacts that demonstrate implementation. Evidence often satisfies multiple frameworks simultaneously.


Audit Preparation Best Practices

Before the Audit

  • [ ] Evidence Collection (T-90 days): Begin gathering evidence artifacts at least 90 days before the audit period ends. Automated evidence collection tools reduce last-minute scrambling.

  • [ ] Control Owner Interviews (T-60 days): Interview each control owner to verify controls are operating as designed. Document any compensating controls or exceptions.

  • [ ] Self-Assessment (T-45 days): Conduct an internal audit using the same criteria as the external auditor. Remediate findings before the audit.

  • [ ] Evidence Organization (T-30 days): Organize evidence in a shared repository mapped to control IDs. Auditors spend less time (and charge less) when evidence is well-organized.

  • [ ] Readiness Meeting (T-14 days): Meet with the audit team to review scope, timeline, and evidence delivery expectations.

During the Audit

  • Single Point of Contact: Designate one person to coordinate evidence requests and auditor access
  • Response SLAs: Commit to responding to evidence requests within 24-48 hours
  • Documentation: Document every auditor request, response, and follow-up
  • Escalation Path: Define clear escalation for findings that require management input

Common Audit Pitfalls

Pitfall Impact Prevention
Incomplete evidence Finding or qualification Automated evidence collection
Missing access reviews Access control finding Quarterly automated reviews
Outdated policies Governance finding Annual policy review calendar
No incident response test IR preparedness finding Annual tabletop exercises
Shared credentials Access control finding PAM implementation
Missing encryption Data protection finding Encryption-by-default policies
No vendor assessments TPRM finding Annual vendor review program
Incomplete asset inventory Asset management finding Automated discovery tools

Multi-Framework Audit Efficiency

Organizations subject to multiple frameworks can achieve significant efficiency by:

  1. Unified Control Framework: Map all required frameworks to a single internal control set. Test once, report to many.

  2. Common Evidence Repository: Store evidence artifacts once with tags for which frameworks they satisfy.

  3. Integrated Audit Calendar: Coordinate audit timelines so that evidence collected for one audit supports others.

  4. Continuous Compliance Monitoring: Replace annual point-in-time assessments with continuous monitoring dashboards that provide real-time compliance status.


Cross-References

This compliance mapping visualizer connects to several other Nexus SecOps resources:

Resource Relevance
Chapter 10: GRC Engineering Deep dive into governance, risk, and compliance frameworks
Chapter 5: Detection Engineering at Scale Building detection capabilities that map to compliance controls
Chapter 20: Cloud Attack & Defense Playbook Cloud-specific controls and compliance considerations
Controls Catalog Full catalog of 300+ security controls
Maturity Model Assessing organizational security maturity
ATT&CK Gap Analysis Mapping detection capabilities to MITRE ATT&CK
Detection Query Library KQL/SPL queries that implement detection controls
Threat Model Canvas Interactive threat modeling tool

Certification Preparation

Mastering compliance frameworks is essential for several leading security certifications. If you are preparing for certification exams, these frameworks feature prominently in the following:

Recommended Certifications

CISSP — Certified Information Systems Security Professional
The CISSP covers compliance and governance extensively in Domain 1 (Security and Risk Management). NIST CSF, ISO 27001, and SOC 2 are frequently tested topics.
Prepare for CISSP →

CISM — Certified Information Security Manager
CISM focuses on information security governance and risk management. The exam tests your ability to align security programs with business objectives using frameworks like NIST CSF and ISO 27001.
Prepare for CISM →

CRISC — Certified in Risk and Information Systems Control
CRISC is specifically designed for IT risk management professionals. The exam covers risk identification, assessment, response, and monitoring — directly aligned with the mapping methodology used in this tool.
Prepare for CRISC →

CCSP — Certified Cloud Security Professional
The CCSP covers cloud compliance and governance, including CSA CCM, ISO 27017, and SOC 2 considerations for cloud environments.
Prepare for CCSP →

Affiliate links support the continued development of Nexus SecOps. See our affiliate disclosure.


Nexus SecOps — Compliance Mapping Visualizer
All data is synthetic and for educational purposes only. Verify mappings against official framework publications.
nexus-secops.pages.dev