Skip to content
🚧 Early alpha — building the foundation. See the roadmap →

Framework versioning

Updated

When you import a framework with Crosswalker, you create a snapshot. When that framework publishes a new version, your snapshot is stale. Your crosswalk links may point to renamed or removed controls. Your assessments reference outdated IDs. This page documents how each major framework handles versioning — so Crosswalker can eventually handle it too.

  • Added GOVERN as a sixth core function (previously governance was scattered across other functions)
  • Broadened scope beyond critical infrastructure to all organizations
  • Reorganized subcategories — some merged, split, or moved between functions
  • No content was removed — all CSF 1.1 meaning is preserved in 2.0
  • FFIEC CAT was retired (August 2025) rather than updated — tools built on it became obsolete
  • HITRUST created CSF 2.0 as an add-on certification — prior CSF 1.1 assessments don’t auto-transfer
  • Organizations needed to manually re-map their evidence to the new structure

NIST 800-53 Rev 4 → Rev 5 (September 2020)

Section titled “NIST 800-53 Rev 4 → Rev 5 (September 2020)”
  • 65 new base controls and 204 new control enhancements
  • Two entirely new control families: PT (PII Processing and Transparency) and SR (Supply Chain Risk Management)
  • 63 existing controls received 149 new enhancements
  • Priority system eliminated; baselines moved to separate document (SP 800-53B)
  • Rev 4 is officially withdrawn

MITRE ATT&CK — the gold standard Best Practice

Section titled “MITRE ATT&CK — the gold standard ”Best Practice

ATT&CK has the most mature versioning system of any cybersecurity framework:

  • Biannual releases (April and October) with major.minor versioning
  • Current: v16.1 (as of late 2025)
  • Every version gets an archived website
StateMeaningExample
ActiveCurrent, maintainedMost techniques
RevokedReplaced by another objectT1086 (PowerShell) → T1059.001
DeprecatedRetired, no replacementTechniques deemed too broad
Un-deprecatedBrought back after deprecationTechniques reconsidered based on community feedback

ATT&CK publishes changelogs in both human-readable and STIX 2.1 JSON format. The key mechanism: revoked-by relationships link old objects to their replacements, creating a followable deprecation chain. The mitreattack-python library can follow these chains programmatically — a pattern Crosswalker could adopt for automated migration detection.

The largest structural change: 266 techniques consolidated into 156 parent techniques with 272 sub-techniques. IDs changed to dot notation:

  • T1086 (PowerShell) → T1059.001 (Command and Scripting Interpreter: PowerShell)

MITRE preserved the pre-sub-technique version separately for backward compatibility and corrected ID errors based on community feedback.

  • Consolidated from 20 controls to 18
  • Reorganized by activity type rather than by who implements
  • New emphasis on cloud, mobile, and third-party risk
  • Implementation Groups (IG1/IG2/IG3) became the primary organizational layer
  • “Most expansive revision to date”
  • Expanded scope to enterprise technology, third-party risk, business continuity
  • Added new Extend function
  • Added subject tags and global regulatory mappings
  • v2.1 kept all v2.0 diagnostic statements unchanged

OSCAL uses SemVer (MAJOR.MINOR.PATCH) with a core guarantee: content created under a MAJOR version remains valid under all subsequent releases within that major version. Key mechanisms:

  • Every OSCAL document has a UUID that regenerates on every change
  • last-modified, version, and revision history fields are built-in
  • A metaschema framework generates XML, JSON, and YAML schemas simultaneously — migration between formats is easier because all derive from the same abstract definition
  • See also: SchemaVer as an alternative versioning model

CRI Profile v2.1: separating content from mappings

Section titled “CRI Profile v2.1: separating content from mappings”

An important pattern: CRI v2.1 kept diagnostic statements unchanged but moved crosswalk mappings to a separate workbook. This separation enables independent evolution — the core framework and its crosswalks can update on different timelines. A pattern Crosswalker should consider for its own config management.

The OLIR (Online Informative References) program is submission-based: the submitting organization is responsible for maintaining their mappings. There is no automatic mechanism to flag stale crosswalks when either side updates.

Implication: Crosswalks can become stale silently. If CSF updates but the CSF-to-800-53 crosswalk doesn’t, tools relying on it give incorrect results.

The Secure Controls Framework solves this by acting as a central hub: when a framework updates, only the SCF-to-that-framework mapping needs updating (see interlingua approach). This propagates the change to all 175+ mapped frameworks automatically.

WhatHow it breaksSeverity
Imported folder structureHierarchy may not match new versionMedium — old version still readable
Crosswalk linksMay point to renamed/removed controlsHigh — broken references
Assessment status”Compliant with CSF 1.1” ≠ “Compliant with CSF 2.0”High — compliance claims invalid
Tool configurationsHardcoded IDs, column names, regex patternsMedium — requires manual update
Reports and dashboardsQueries return stale or incomplete dataMedium — misleading results
GRC platform mappingsVendor must release updateVariable — depends on vendor timeline
ToolApproach
CISO AssistantLibrary versioning with incremental upgrade steps; OLIR-based mappings
SCFMeta-framework absorbs changes centrally using STRM methodology
ServiceNow/ArcherContent packs updated per vendor timeline; migration tools
ApptegaCommercial crosswalk updates as a service

There is no universal standard for framework changelogs. Each framework handles it differently:

FrameworkChangelog FormatMachine-Readable
MITRE ATT&CKSTIX JSON + human-readableYes
NIST 800-53Excel workbookPartially
NIST CSFExcel spreadsheetPartially
CIS ControlsPDF white paperNo
CRI ProfilePDF mapping documentNo

A future Crosswalker feature could ingest machine-readable changelogs (ATT&CK STIX, OSCAL diffs) to automate migration detection.