NIST Cybersecurity Framework to SOC 2 Mapping

72 topic areas are covered by both frameworks. Controls are matched by shared topic tags. A control may appear in multiple topics.

113

NIST Cybersecurity Framework controls

72

shared topics

38

SOC 2 controls

NIST Cybersecurity Framework
SOC 2

governance

28 controls
gv-oc-1

The organizational mission is understood and informs cybersecurity risk management

gv-oc-2

Internal and external stakeholders are understood, and their needs and expectations regarding cybersecurity risk management are understood and considered

gv-oc-3

Legal, regulatory, and contractual requirements regarding cybersecurity, including privacy and civil liberties obligations, are understood and managed

gv-oc-4

Critical objectives, capabilities, and services that external stakeholders depend on or expect from the organization are understood and communicated

gv-oc-5

Outcomes, capabilities, and services that the organization depends on are understood and communicated

gv-ov-1

Cybersecurity risk management strategy outcomes are reviewed to inform and adjust strategy

gv-ov-2

The cybersecurity risk management strategy is reviewed and adjusted to ensure coverage of organizational requirements and risks

gv-ov-3

Organizational cybersecurity risk management performance is evaluated and reviewed for adjustments

gv-po-1

A cybersecurity risk management policy is established and enforced

gv-po-2

The cybersecurity policy is reviewed and updated to reflect changes in requirements, threats, and technology

gv-rm-1

Risk management objectives are established and agreed to by organizational stakeholders

gv-rm-2

Risk appetite and risk tolerance statements are established, communicated, and maintained

gv-rm-3

Cybersecurity risk management activities and outcomes are included in enterprise risk management processes

gv-rm-4

Strategic direction that describes appropriate risk response options is established and communicated

gv-rm-5

Lines of communication across the organization are established for cybersecurity risks, including risks from suppliers and other third parties

gv-rm-6

A standardized method for calculating, documenting, categorizing, and prioritizing cybersecurity risks is established and communicated

gv-rm-7

Strategic opportunities (positive risks) are characterized and included in organizational cybersecurity risk discussions

gv-rr-1

Organizational leadership is responsible and accountable for cybersecurity risk

gv-rr-2

Cybersecurity roles, responsibilities, and authorities are established and enforced

gv-rr-3

Adequate resources are allocated to cybersecurity commensurate with risk

gv-sc-1

A cybersecurity supply chain risk management program is established

gv-sc-2

Cybersecurity roles and responsibilities for suppliers and partners are established and coordinated

gv-sc-3

Supply chain risk management is integrated into enterprise risk management processes

id-ra-7

Changes and exceptions are managed, assessed for risk impact, and tracked

supply-chain

14 controls

risk-management

11 controls

monitoring

9 controls

access-control

7 controls

siem

6 controls

risk

6 controls

logging

5 controls

edr

5 controls

third-party

5 controls

compliance

5 controls

rto

5 controls

recovery

5 controls

tabletop

4 controls

remediation

4 controls

oversight

4 controls

risk-register

4 controls

accountability

4 controls

availability

4 controls

documentation

4 controls

triage

3 controls

scope

3 controls

insider-threat

3 controls

scanning

3 controls

patching

3 controls

cve

3 controls

policy

3 controls

communication

3 controls

offboarding

3 controls

classification

3 controls

risk-treatment

3 controls

mfa

3 controls

authentication

3 controls

data-center

3 controls

encryption

3 controls

gdpr

3 controls

resilience

3 controls

transparency

3 controls

containment

3 controls

alerts

2 controls

malware

2 controls

antivirus

2 controls

performance

2 controls

enforcement

2 controls

objectives

2 controls

reporting

2 controls

roles

2 controls

hr

2 controls

onboarding

2 controls

planning

2 controls

provisioning

2 controls

rbac

2 controls

access-review

2 controls

training

2 controls

tls

2 controls

rpo

2 controls

firewall

2 controls

redundancy

2 controls

capacity

2 controls

ci-cd

2 controls