NIST Cybersecurity Framework to SOC 2 Mapping
72 topic areas are covered by both frameworks. Controls are matched by shared topic tags. A control may appear in multiple topics.
113
NIST Cybersecurity Framework controls
72
shared topics
38
SOC 2 controls
governance
28 controlsThe organizational mission is understood and informs cybersecurity risk management
Internal and external stakeholders are understood, and their needs and expectations regarding cybersecurity risk management are understood and considered
Legal, regulatory, and contractual requirements regarding cybersecurity, including privacy and civil liberties obligations, are understood and managed
Critical objectives, capabilities, and services that external stakeholders depend on or expect from the organization are understood and communicated
Outcomes, capabilities, and services that the organization depends on are understood and communicated
Cybersecurity risk management strategy outcomes are reviewed to inform and adjust strategy
The cybersecurity risk management strategy is reviewed and adjusted to ensure coverage of organizational requirements and risks
Organizational cybersecurity risk management performance is evaluated and reviewed for adjustments
A cybersecurity risk management policy is established and enforced
The cybersecurity policy is reviewed and updated to reflect changes in requirements, threats, and technology
Risk management objectives are established and agreed to by organizational stakeholders
Risk appetite and risk tolerance statements are established, communicated, and maintained
Cybersecurity risk management activities and outcomes are included in enterprise risk management processes
Strategic direction that describes appropriate risk response options is established and communicated
Lines of communication across the organization are established for cybersecurity risks, including risks from suppliers and other third parties
A standardized method for calculating, documenting, categorizing, and prioritizing cybersecurity risks is established and communicated
Strategic opportunities (positive risks) are characterized and included in organizational cybersecurity risk discussions
Organizational leadership is responsible and accountable for cybersecurity risk
Cybersecurity roles, responsibilities, and authorities are established and enforced
Adequate resources are allocated to cybersecurity commensurate with risk
A cybersecurity supply chain risk management program is established
Cybersecurity roles and responsibilities for suppliers and partners are established and coordinated
Supply chain risk management is integrated into enterprise risk management processes
Changes and exceptions are managed, assessed for risk impact, and tracked
incident-response
16 controlsThe estimated impact and scope of adverse events are understood
Information on adverse events is provided to authorized staff and tools
Incidents are declared when adverse events meet the defined criteria
Cybersecurity roles and responsibilities for suppliers and partners are established and coordinated
Relevant suppliers are included in incident planning, response, and recovery activities
Incident response plans and cybersecurity plans are established, maintained, and improved
Recovery activities and progress in restoring operational capabilities are communicated to designated internal and external stakeholders
Public updates on the incident and ongoing recovery are shared using approved methods and messaging
The integrity of restored assets is verified, the asset is deemed secure, and normal operating status is confirmed
Forensics are performed
Execute the incident response plan in coordination with relevant third parties
Incidents are contained
Incidents are eradicated
supply-chain
14 controlsExternal service provider activities and services are monitored to detect potentially adverse events
A cybersecurity supply chain risk management program is established
Supply chain risk management plans include provisions for activities after a supplier relationship ends
Cybersecurity roles and responsibilities for suppliers and partners are established and coordinated
Supply chain risk management is integrated into enterprise risk management processes
Suppliers are known and prioritized by criticality
Cybersecurity requirements are integrated into contracts with suppliers
Due diligence is performed before entering into supplier relationships
Risks from suppliers are assessed, monitored, and responded to throughout the relationship
Relevant suppliers are included in incident planning, response, and recovery activities
Supply chain security practices are monitored throughout the technology product and service life cycle
Critical suppliers are assessed prior to acquisition
The authenticity and integrity of hardware and software are assessed prior to acquisition and use
risk-management
11 controlsThe cybersecurity risk management strategy is reviewed and adjusted to ensure coverage of organizational requirements and risks
Risk management objectives are established and agreed to by organizational stakeholders
Risk appetite and risk tolerance statements are established, communicated, and maintained
Cybersecurity risk management activities and outcomes are included in enterprise risk management processes
Strategic direction that describes appropriate risk response options is established and communicated
Lines of communication across the organization are established for cybersecurity risks, including risks from suppliers and other third parties
A standardized method for calculating, documenting, categorizing, and prioritizing cybersecurity risks is established and communicated
Strategic opportunities (positive risks) are characterized and included in organizational cybersecurity risk discussions
Supply chain risk management is integrated into enterprise risk management processes
Changes and exceptions are managed, assessed for risk impact, and tracked
monitoring
9 controlsNetworks and network services are monitored to detect adverse events
Monitoring for unauthorized personnel, connections, devices, and software is performed
Computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events
Log records are generated and made available for continuous monitoring
Capacity is managed to ensure system availability
Relevant security information is obtained and used
Security controls are evaluated on an ongoing basis
Control deficiencies are identified, evaluated, and communicated
Anomalies and security events are detected and monitored
access-control
7 controlssiem
6 controlsInformation is correlated from multiple sources
Alert thresholds are established
Networks and network services are monitored to detect adverse events
Computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events
Log records are generated and made available for continuous monitoring
risk
6 controlslogging
5 controlsedr
5 controlsthird-party
5 controlsExternal service provider activities and services are monitored to detect potentially adverse events
Outcomes, capabilities, and services that the organization depends on are understood and communicated
Lines of communication across the organization are established for cybersecurity risks, including risks from suppliers and other third parties
Inventories of services provided by suppliers are maintained
compliance
5 controlsInternal and external stakeholders are understood, and their needs and expectations regarding cybersecurity risk management are understood and considered
Legal, regulatory, and contractual requirements regarding cybersecurity, including privacy and civil liberties obligations, are understood and managed
A cybersecurity risk management policy is established and enforced
The cybersecurity policy is reviewed and updated to reflect changes in requirements, threats, and technology
rto
5 controlsBackups of data are created, protected, maintained, and tested
Mechanisms are implemented to achieve resilience requirements in normal and adverse situations
Select, scope, prioritize, and perform recovery actions
Re-establish critical mission functions and cybersecurity services
recovery
5 controlsExecute the recovery plan once the incident response process initiates recovery
The integrity of restored assets is verified, the asset is deemed secure, and normal operating status is confirmed
The end of incident recovery is declared based on criteria, and incident-related documentation is completed
tabletop
4 controlsremediation
4 controlsoversight
4 controlsCybersecurity risk management strategy outcomes are reviewed to inform and adjust strategy
The cybersecurity risk management strategy is reviewed and adjusted to ensure coverage of organizational requirements and risks
Organizational cybersecurity risk management performance is evaluated and reviewed for adjustments
risk-register
4 controlsA standardized method for calculating, documenting, categorizing, and prioritizing cybersecurity risks is established and communicated
Potential impacts and likelihoods of threats exploiting vulnerabilities are identified and recorded
Risk information is used to understand inherent risk and prioritize responses