Frameworks are the backbone of any defensible security program. Whether you're protecting a school district, a defense contractor, or a healthcare provider, understanding the right framework is the first step toward reducing risk.
A cybersecurity framework is a structured set of guidelines, best practices, and controls that organizations use to manage and reduce cybersecurity risk. Think of it as a blueprint for building, evaluating, and improving your security posture โ not a product you install, but a systematic approach to how you protect systems, data, and people.
Frameworks give you a common language to communicate about security across technical teams, leadership, auditors, and regulators. They turn the overwhelming question of "are we secure?" into a manageable set of concrete actions you can prioritize, implement, and measure.
Some frameworks are voluntary best-practice guides (like CIS Controls or NIST CSF), while others are regulatory requirements (like HIPAA) or contractual prerequisites (like CMMC for defense contracts). Many organizations adopt more than one โ and that's exactly where FrameworkMapper helps you see how controls overlap and where gaps exist.
Why Use a Cybersecurity Framework?
Implementing a framework is about shifting from reactive "firefighting" to proactive risk management. Even if no regulation requires it, frameworks provide tangible benefits to organizations of every size.
๐ฏ
Prioritize What Matters
Frameworks help you focus limited resources on the controls that reduce the most risk, instead of chasing every headline vulnerability.
๐
Demonstrate Due Diligence
Adoption of a recognized framework demonstrates to boards, insurers, partners, and parents that you take security seriously โ and have a defensible program.
๐
Meet Multiple Requirements
Many frameworks overlap. Implementing one often gives you a significant head start on meeting others, reducing duplicated effort through crosswalk mapping.
๐
Measure Progress Over Time
Frameworks provide benchmarks so you can track maturity, justify budget requests with data, and show year-over-year improvement.
Common Cybersecurity Frameworks
Each framework below is fully supported in our tool mapping and gap analysis engine. Click through to learn the purpose, audience, and use case for each.
The CIS Controls are a prioritized, prescriptive set of 18 top-level controls and 153 safeguards designed to mitigate the most common cyberattacks. Developed by a global community of practitioners, they are organized into three Implementation Groups (IGs) based on organizational size and risk profile โ making them uniquely accessible to organizations with limited resources.
IG1 represents "essential cyber hygiene" and is the recommended starting point for any organization. IG2 and IG3 build progressively for organizations handling sensitive data or facing advanced threats.
Best For
K-12 school districts
Small-to-mid local governments
Small businesses & churches
Organizations starting from scratch
Why It Stands Out
Most actionable framework available. Implementation Groups let you right-size controls to your resources. Directly maps to nearly every other major framework, making it an excellent foundation layer.
Adoption status: Voluntary, but increasingly referenced by cyber insurance carriers and state-level regulations as a baseline standard. The State of Nebraska references CIS Controls in its cybersecurity guidance for political subdivisions.
CSF
NIST Cybersecurity Framework (CSF v2.0)
National Institute of Standards and Technology (NIST)
All SectorsCritical InfrastructureVoluntaryRisk-Based Framework
The NIST CSF is the most widely adopted cybersecurity framework in the United States. Version 2.0 (released February 2024) expanded the original five core functions to six: Govern, Identify, Protect, Detect, Respond, and Recover. The new "Govern" function elevates cybersecurity governance and supply chain risk management to a top-level concern.
The CSF is intentionally high-level and outcome-focused. It tells you what to achieve rather than how to achieve it, making it applicable across industries and organization sizes. It's designed to be used alongside more prescriptive control sets like CIS Controls or NIST 800-53.
Best For
Organizations wanting a strategic risk framework
Boards and executives needing a communication tool
Critical infrastructure operators
Anyone needing a "Rosetta Stone" across standards
Why It Stands Out
Functions as a universal organizing structure. CSF Profiles allow you to compare your current state vs. target state. Extensive informative references link to other frameworks, making it the connective tissue of cybersecurity governance.
Adoption status: Voluntary for the private sector. Mandatory for U.S. federal agencies via Executive Order 13800. Frequently referenced in state-level cybersecurity legislation and cyber insurance questionnaires.
800‑53
NIST SP 800-53 (Rev. 5)
National Institute of Standards and Technology (NIST)
Federal GovernmentContractors & GranteesRegulatoryComprehensive Control Catalog
NIST SP 800-53 is the most comprehensive catalog of security and privacy controls available, containing over 1,000 controls across 20 control families. It is the authoritative source used by the federal government to protect information systems under FISMA (Federal Information Security Modernization Act) and is the technical backbone of the NIST Risk Management Framework (RMF).
While exhaustive, 800-53 is not intended to be implemented in its entirety by any single organization. Controls are selected based on system categorization (Low, Moderate, or High impact via FIPS 199) and tailored to the organization's specific risk environment.
Best For
Federal agencies and their contractors
Organizations processing federal data
Entities under FISMA or FedRAMP requirements
Advanced security programs seeking depth
Why It Stands Out
The deepest and most granular control catalog available. Serves as the parent source for NIST 800-171 (which selects a subset of 800-53 controls). Provides both security and privacy controls in a single unified catalog.
Adoption status: Mandatory for U.S. federal information systems. Required for FedRAMP authorization. Serves as the control source for NIST 800-171 and CMMC compliance.
800‑171
NIST SP 800-171 (Rev. 2 / Rev. 3)
National Institute of Standards and Technology (NIST)
NIST SP 800-171 defines the security requirements for protecting Controlled Unclassified Information (CUI) in non-federal systems and organizations. If you're a defense contractor, subcontractor, university, or any organization handling CUI, this standard applies to you โ typically as a flow-down clause in your federal contract (via DFARS 252.204-7012).
The standard contains 110 security requirements (Rev. 2) across 14 families, derived from the Moderate baseline of NIST 800-53. Rev. 3 realigns with 800-53 Rev. 5 and is expected to be referenced in future CMMC rulemaking.
Best For
Defense Industrial Base (DIB) contractors
Subcontractors in DoD supply chains
Universities with DoD research grants
Anyone handling CUI
Why It Stands Out
The foundation for CMMC Level 2 certification. Requires a System Security Plan (SSP) and Plan of Action and Milestones (POA&M). Self-assessment scoring methodology (SPRS) is used to report compliance posture to DoD.
Adoption status: Contractually mandatory for organizations handling CUI under DoD contracts (DFARS 7012). Required for CMMC Level 2 certification. Non-compliance can result in loss of contract eligibility.
CMMC
Cybersecurity Maturity Model Certification (CMMC 2.0)
U.S. Department of Defense (DoD)
Defense ContractorsDoD Supply ChainRegulatoryMaturity/Certification Model
CMMC 2.0 is the DoD's verification mechanism that ensures defense contractors actually implement the cybersecurity requirements they've been self-attesting to for years. It adds a third-party assessment layer on top of existing NIST 800-171 requirements.
CMMC has three levels: Level 1 (17 practices โ basic safeguarding of Federal Contract Information), Level 2 (110 practices โ aligned with NIST 800-171, requires C3PAO assessment), and Level 3 (110+ practices โ aligned with a subset of NIST 800-172, assessed by DIBCAC). The final rule (32 CFR Part 170) was published in October 2024, with phased rollout beginning in 2025.
Best For
Any company seeking DoD contracts
DIB primes and subcontractors
IT managed service providers for DIB
External service providers in scope
Why It Stands Out
First DoD program requiring third-party cybersecurity certification as a condition of contract award. Shifts from "trust but don't verify" to "verify then trust." A CMMC certification will become a go/no-go requirement for contract eligibility.
Adoption status: Mandatory for DoD contracts once fully implemented. Phased rollout is underway โ CMMC requirements will appear in new solicitations starting in 2025. Preparing now is critical.
HIPAA
HIPAA Security Rule
U.S. Department of Health and Human Services (HHS)
The HIPAA Security Rule establishes national standards for protecting electronic Protected Health Information (ePHI). It applies to covered entities (healthcare providers, health plans, clearinghouses) and their business associates โ including any technology vendor, cloud provider, or managed service provider that creates, receives, maintains, or transmits ePHI.
The Security Rule defines safeguards across three categories: Administrative (policies, training, risk analysis), Physical (facility access, workstation security), and Technical (access control, encryption, audit logging). Safeguards are classified as "Required" or "Addressable" โ but "addressable" does not mean optional. It means you must implement the safeguard or document why an equivalent alternative is appropriate.
Best For
Hospitals, clinics, and medical practices
Health insurance companies
Healthcare IT vendors & SaaS providers
Any business associate handling ePHI
Why It Stands Out
One of the oldest federal cybersecurity regulations (enacted 1996, Security Rule effective 2005). Enforcement has real teeth โ HHS OCR issues fines ranging from $100 to $2M+ per violation category. A Notice of Proposed Rulemaking in 2024 signals significant updates ahead.
Adoption status: Mandatory under federal law for covered entities and business associates. Enforced by HHS Office for Civil Rights (OCR). State attorneys general can also bring enforcement actions.
ISO
ISO/IEC 27001:2022
International Organization for Standardization (ISO) / International Electrotechnical Commission (IEC)
Global / InternationalEnterprise & SaaSVoluntary (Certification)Management System Standard
ISO 27001 is the international gold standard for Information Security Management Systems (ISMS). Rather than prescribing specific technical controls, it defines the requirements for establishing, implementing, maintaining, and continually improving a systematic approach to managing information security risk.
Annex A of the 2022 revision contains 93 controls (down from 114 in the 2013 version) organized into four themes: Organizational, People, Physical, and Technological. Organizations select controls through a formal risk assessment process and document their applicability in a Statement of Applicability (SoA). Certification is granted by accredited third-party audit bodies.
Best For
Companies with international customers or partners
SaaS and technology companies
Organizations pursuing formal certification
Enterprises building mature security programs
Why It Stands Out
Globally recognized โ the "ISO 27001 Certified" badge carries significant weight in sales cycles and vendor assessments. Focuses on management system discipline, not just technical controls, ensuring security is embedded in business processes.
Adoption status: Voluntary, but increasingly required by enterprise customers, partners, and regulators in certain jurisdictions (e.g., EU NIS2 Directive references ISO 27001). Often a de facto requirement for B2B SaaS companies.
SOC 2
SOC 2 (Trust Services Criteria)
American Institute of Certified Public Accountants (AICPA)
SOC 2 is an attestation framework โ not a certification โ performed by licensed CPA firms. It evaluates a service organization's controls relevant to five Trust Services Criteria: Security (required), Availability, Processing Integrity, Confidentiality, and Privacy. Organizations choose which criteria are in scope based on their services and customer commitments.
A Type I report assesses control design at a point in time. A Type II report evaluates both design and operating effectiveness over a period (typically 6โ12 months) and is considered significantly more valuable. SOC 2 reports are restricted-use documents shared under NDA with customers and prospects.
Best For
SaaS companies and cloud service providers
Managed service providers (MSPs/MSSPs)
Data centers and hosting providers
Any organization processing data for others
Why It Stands Out
The most commonly requested vendor assurance report in B2B sales cycles. Unlike ISO 27001, it provides a detailed auditor opinion on control effectiveness โ not just a pass/fail certification. Type II reports offer customers evidence-based confidence.
Adoption status: Voluntary, but effectively required by enterprise customers during vendor due diligence. Lack of a SOC 2 report is often a dealbreaker in B2B sales. Many organizations pursue SOC 2 alongside ISO 27001.
Side-by-Side Comparison
A quick-reference view of how these frameworks differ in scope, obligation, and audience.
CIS Controls v8.1
Body
CIS
Obligation
Voluntary
Audience
All (esp. SMB, K-12, SLTT)
Controls
18 controls, 153 safeguards
Assessment
Self-assessment (CIS CSAT)
NIST CSF v2.0
Body
NIST
Obligation
Voluntary
Audience
All sectors
Controls
6 functions, 22 categories, 106 subcategories
Assessment
Self-assessment / profiles
NIST 800-53 Rev. 5
Body
NIST
Obligation
Mandatory
Audience
Federal agencies & contractors
Controls
20 families, 1,000+ controls
Assessment
Formal assessment (RMF A&A)
NIST 800-171 Rev. 2
Body
NIST
Obligation
Contractual
Audience
Non-federal orgs w/ CUI
Controls
14 families, 110 requirements
Assessment
Self or third-party (SPRS/CMMC)
CMMC 2.0
Body
DoD
Obligation
Contractual
Audience
Defense Industrial Base
Controls
L1: 17 / L2: 110 / L3: 110+
Assessment
Self (L1), C3PAO (L2), DIBCAC (L3)
HIPAA Security Rule
Body
HHS
Obligation
Federal Law
Audience
Healthcare & business associates
Controls
~54 safeguards (Req. + Addressable)
Assessment
Self + HHS OCR audits
ISO 27001:2022
Body
ISO/IEC
Obligation
Market-Driven
Audience
International / enterprise
Controls
93 Annex A controls
Assessment
Accredited certification body
SOC 2
Body
AICPA
Obligation
Market-Driven
Audience
Service organizations / SaaS
Controls
5 Trust Services Criteria
Assessment
CPA firm attestation (Type I/II)
Framework
Issuing Body
Obligation
Primary Audience
Controls / Requirements
Assessment Type
CIS Controls v8.1
CIS
Voluntary
All (esp. SMB, K-12, SLTT)
18 controls, 153 safeguards
Self-assessment (CIS CSAT)
NIST CSF v2.0
NIST
Voluntary
All sectors
6 functions, 22 categories, 106 subcategories
Self-assessment / profiles
NIST 800-53 Rev. 5
NIST
Mandatory (Federal)
Federal agencies & contractors
20 families, 1,000+ controls
Formal assessment (RMF A&A)
NIST 800-171 Rev. 2
NIST
Contractual
Non-federal orgs w/ CUI
14 families, 110 requirements
Self or third-party (SPRS/CMMC)
CMMC 2.0
DoD
Contractual
Defense Industrial Base
L1: 17 / L2: 110 / L3: 110+
Self (L1), C3PAO (L2), DIBCAC (L3)
HIPAA Security Rule
HHS
Federal Law
Healthcare & business associates
~54 safeguards (Req. + Addressable)
Self + HHS OCR audits
ISO 27001:2022
ISO/IEC
Market-Driven
International / enterprise
93 Annex A controls
Accredited certification body
SOC 2
AICPA
Market-Driven
Service organizations / SaaS
5 Trust Services Criteria
CPA firm attestation (Type I/II)
Not sure which frameworks apply to you?
Enter your NAICS industry code to see personalized framework recommendations.
Which Framework Is Right for You?
Start with your obligations, then layer in best practices. Find your compliance profile below.
๐ซ
Resource-Constrained Organizations
K-12 Education ยท SMB ยท Church / House of Worship ยท Nonprofit
Limited budget, lean IT staff, and no regulatory mandate โ but you still steward sensitive data and need a defensible program that cyber insurers will recognize.
→ CIS Controls (IG1) + NIST CSF for board reporting
๐๏ธ
State & Local Government
State Government ยท Local Government ยท Municipal Agencies
Constituent data obligations, state-level cybersecurity mandates, and federal grant requirements demand structure โ without federal-grade complexity.
→ CIS Controls (IG1-IG2) + NIST CSF + NIST 800-53 for grant compliance
๐ก๏ธ
Defense & Federal
Defense Industrial Base ยท Federal Government ยท Research Institutions (w/ CUI)
You handle CUI, need to win or retain DoD contracts, or operate under FISMA. CMMC certification is on the horizon and compliance is non-negotiable.
→ NIST 800-171 + CMMC 2.0 (Level 2) + NIST 800-53
๐ฅ
Healthcare & Regulated Data
Healthcare ยท Pharmaceuticals ยท Higher Education (w/ health centers)
HIPAA compliance isn't optional. You need to meet the Security Rule baseline and demonstrate a mature program beyond the regulatory minimum.
→ HIPAA Security Rule (required) + CIS Controls or NIST CSF as an overlay
Enterprise customers demand SOC 2 reports, international prospects expect ISO 27001, and regulators reference NIST CSF. Your security posture is a competitive differentiator.
→ NIST CSF v2 + CIS Controls + SOC 2 / ISO 27001 as market requires
You operate critical systems where a breach has physical consequences. Sector-specific directives (NERC CIP, TSA) layer on top of foundational frameworks.