Skip to content
🚧 Early alpha — building the foundation. See the roadmap →

Framework landscape

Updated
  • Authored by: NIST
  • Structure: Family > Control > Enhancement
  • Example: AC (Access Control) > AC-2 (Account Management) > AC-2(1)
  • Size: ~1000+ controls with enhancements
  • Format: Available as CSV, XLSX, OSCAL XML/JSON
  • Links: Related controls, assessment procedures
  • Authored by: NIST
  • Structure: Function > Category > Subcategory
  • Example: Protect (PR) > Identity Management (PR.AA) > PR.AA-01
  • Size: ~100 subcategories
  • Crosswalks: Maps to 800-53, CIS, ISO 27001
  • Authored by: CIS (Center for Internet Security)
  • Structure: Control > Safeguard > Implementation Group
  • Example: Control 1 > 1.1 (Establish asset inventory) > IG1
  • Size: 18 controls, 153 safeguards
  • Crosswalks: Maps to NIST CSF, 800-53
  • Authored by: MITRE
  • Structure: Tactic > Technique > Sub-technique
  • Example: Execution (TA0002) > T1059 (Command Scripting) > T1059.001 (PowerShell)
  • Size: ~200 techniques with sub-techniques
  • Related: D3FEND (defensive), ENGAGE (deception). Maintained crosswalks to NIST 800-53 via CTID.
  • Authored by: CRI (Cyber Risk Institute)
  • Structure: Function > Category > Subcategory > Diagnostic Statement
  • Size: Comprehensive financial sector framework
  • Crosswalks: NIST CSF, FFIEC, CISA CPG
FrameworkID PatternHierarchy depth
NIST 800-53AC-2, AC-2(1)3 (family/control/enhancement)
NIST CSFPR.AA-013 (function/category/subcategory)
CIS v81.1, 1.22-3 (control/safeguard/IG)
MITRE ATT&CKT1059, T1059.0012-3 (tactic/technique/sub)

Understanding these patterns informs column type detection and auto-mapping.

Frameworks change — see framework versioning for deep coverage and ontology evolution for the general problem.

FrameworkCurrent VersionLast Major ChangeMigration Docs
NIST CSF2.0Feb 2024 (added GOVERN function)Transition spreadsheet
NIST 800-53Rev 5 Update 1Sep 2020 (65 new controls, 2 new families)Comparison workbook
MITRE ATT&CKv16.xBiannual (Apr/Oct), sub-techniques Jul 2020Versions archive
CIS Controlsv8.1May 2021 (20→18 controls)Change log
CRI Profilev2.1Feb 2024 (added Extend function)v2.0 mapping
MITRE D3FENDOngoingContinuous ontology updatesD3FEND Resources

From an FS-ISAC Spring Summit 2024 session on adopting CRI Profile v2.0:

  • Scale: The CRI Profile is a massive spreadsheet with hundreds of diagnostic statements across multiple mapping sheets
  • Tooling gap: Organizations like Sallie Mae adopted CRI using tools like Axio, but many still rely on large Excel files
  • SaaS demand: Strong demand for SaaS solutions that can handle CRI’s complexity without manual spreadsheet management
  • CRI maps to NIST CSF, FFIEC CAT, CISA CPG, and other financial-sector standards
  • Organizations need to maintain continuous compliance across all mapped frameworks simultaneously
  • Evidence collection must link back to specific diagnostic statements — exactly what Crosswalker’s typed-link system is designed for
  • CRI provides a maturity model for assessing control implementation
  • GRC policy alignment requires mapping organizational policies to CRI framework categories
  • The assessment process is iterative — not a one-time mapping but ongoing evidence management

Application security risks — relevant for AppSec teams mapping to broader frameworks.

Detection and analytics framework building on MITRE ATT&CK.

Lockheed Martin’s attack lifecycle model — commonly referenced alongside ATT&CK.

Threat intelligence framework for analyzing cyber intrusions — complements ATT&CK’s technique focus.

See framework standards for complete links and resources.