Skip to content
🚧 Early alpha — building the foundation. See the roadmap →

Framework standards & tools

Updated

High-level cybersecurity outcomes organized as Function → Category → Subcategory. The foundational framework that most others map to.

Detailed security and privacy controls catalog. Family → Control → Enhancement structure with ~1000+ items.

OSCAL (Open Security Controls Assessment Language)

Section titled “OSCAL (Open Security Controls Assessment Language)”

Machine-readable format for security controls in JSON/XML. Enables automated compliance workflows.

NIST’s official framework crosswalk program — the authoritative source for how frameworks map to each other.

NIST CPRT (Cybersecurity and Privacy Reference Tool)

Section titled “NIST CPRT (Cybersecurity and Privacy Reference Tool)”

Interactive tool for browsing frameworks with cross-references.

“Mapping Relationships Between Documentary Standards, Regulations, Frameworks, and Guidelines” — the theoretical foundation for how NIST approaches framework crosswalking.

Community tool for searching risk management controls.

Adversary tactics and techniques. Tactic → Technique → Sub-technique.

Defensive countermeasures mapped to ATT&CK techniques.

Cyber denial and deception framework.

Response framework for incident handling.

MITRE Engenuity’s research center produces critical mapping resources:

18 controls with 153 safeguards, organized by Implementation Group (IG1/IG2/IG3).

The Cyber Risk Institute’s meta-framework for financial institutions. Maps to NIST CSF, FFIEC CAT, CISA CPG, and other standards.

  • CRI Profile
  • Function → Category → Subcategory → Diagnostic Statement structure

Open framework with Set Theory Relationship Mapping (STRM) — a mathematical approach to framework crosswalking.

Open-source GRC tool supporting 80+ frameworks with auto-mapping.

  • GitHub
  • Decoupling principle enables framework reuse
  • API-first architecture

Federal Financial Institutions Examination Council Cybersecurity Assessment Tool.

Mapping technical security configurations (STIGs, benchmarks) to control frameworks is a key workflow for security engineers:

SCAP (Security Content Automation Protocol)

Section titled “SCAP (Security Content Automation Protocol)”

Machine-readable format for expressing security configuration checklists: