Skip to content
🚧 Early alpha — building the foundation. See the roadmap →

Institutional landscape

Updated

Every ontology evolution problem has a human side. Frameworks don’t update themselves — institutions create them, other institutions map between them, regulators mandate them, and your team consumes them. Understanding these actors and their relationships is essential for making architectural decisions about how Crosswalker handles the ontology lifecycle.


Seven types of actors participate in the ontology ecosystem. Each has different incentives, timelines, and capabilities.

Standard bodies
Create and publish frameworks
NIST, ISO, MITRE, W3C, OASIS
Industry groups
Create domain-specific frameworks
CRI, FS-ISAC, OWASP, PCI SSC, HITRUST
Regulators
Mandate which frameworks to use
SEC, FFIEC, NYDFS, EU NIS2, HIPAA/HHS
Mapping organizations
Create and maintain crosswalks between frameworks
NIST OLIR, SCF, Center for Threat-Informed Defense
GRC vendors
Implement frameworks in software
ServiceNow, Archer, Drata, Vanta, CISO Assistant
Your organization
Adopts frameworks, maps evidence, proves compliance
GRC team, security team, IT, engineering
Auditors
Verify framework adoption and evidence
Big 4, internal audit, examiners, assessors

Terminology note: These entity types are defined in the terminology page. In other domains: standard bodies = standards development organizations (SDOs), industry groups = trade associations, mapping organizations = ontology alignment services. Mapping organizations that maintain mappings from many frameworks to a single canonical intermediate (like SCF with its ~1,300 controls, UCF’s ~10,000 Common Controls, or the DESM project) are also known as synthetic spine or hub-and-spoke mapping services — an architectural pattern where N frameworks each map once to a central pivot instead of authoring O(N²) direct pairwise crosswalks. Whether Crosswalker should adopt, inherit, or reject a synthetic spine architecture is the subject of Challenge 06 and the 04-10 foundation synthesis.

Drag nodes to explore relationships. Hover to highlight connections.


These entities interact through six relationship types. Each creates a different kind of dependency — and a different kind of staleness risk.

RelationshipFrom → ToWhat it meansStaleness risk
PublishesStandard body → FrameworkCreates and versions the ontologyLow (they control the schedule)
MandatesRegulator → Framework adoption”You must comply with this”High (mandate may reference specific version)
Maps/crosswalksMapping org → Framework↔Framework”These controls correspond”Very high (neither framework owner controls this)
ImplementsGRC vendor → Framework-in-software”Our tool supports this framework”Medium (vendor may lag behind updates)
AdoptsYour org → Framework”We comply with this”Medium (your evidence links to a snapshot)
VerifiesAuditor → Your compliance evidence”Prove it”Low (point-in-time assessment)

Every compliance assertion follows this chain — and any link can break:

Standard body
publishes
Framework
mandated by
Regulator
requires
Your org
maps evidence via
Crosswalk
verified by
Auditor

When NIST updates 800-53, the “publishes” link changes. But the “crosswalk” link (maintained by OLIR or SCF) may NOT update. And the “mandates” link (from your regulator) may still reference the OLD version. Your evidence links break not because YOU did anything wrong, but because the chain upstream shifted.


Each entity type produces and consumes different artifacts:

ArtifactProduced byConsumed byFormatEvolution pattern
FrameworkStandard body, Industry groupEveryoneExcel, CSV, PDF, OSCAL, STIXVaries by publisher
CrosswalkMapping org, Standard bodyYour org, GRC vendorsExcel, SSSOM, JSONOften stale
RegulationRegulatorYour org, AuditorsLegal text, PDFInfrequent but binding
EvidenceYour orgAuditorsPolicies, configs, screenshots, logsContinuous
AssessmentAuditorYour org, RegulatorReport, PDF, OSCALPoint-in-time
ConfigGRC vendor, CommunityYour orgJSON, YAML, proprietaryVendor-dependent

Crosswalker operates on frameworks (importing), crosswalks (linking), and evidence (the user’s notes). The other artifacts are context that informs handling strategy.


Bank adopting CRI Profile
Board / FS-ISACmandates →CRI Profile v2.0maps to →NIST CSF 2.0maps to →FFIEC CAT

The bank must prove compliance across ALL THREE simultaneously. Each has different examiners. Evidence for one control must trace through crosswalks to satisfy all three frameworks. When CRI updates, the CSF crosswalk may not update at the same time.

SaaS company with multiple compliance needs
Customersrequire →SOC 2+ →ISO 27001implemented via →CIS Controls

Different customers require different certifications. The company maps operational controls (CIS) to audit frameworks (SOC 2, ISO). Crosswalks between these are community-maintained — no single authority owns them.

Defense contractor meeting CMMC
DoD / DFARSmandates →NIST 800-171derived from →NIST 800-53implemented via →DISA STIGs

The mandate flows from regulation (DFARS) through control frameworks (800-171, 800-53) to technical implementation (STIGs). Each layer has different maintainers and update cycles. STIG updates happen independently of 800-53 updates.

Every scenario shares the same structure:

  1. A mandate (regulatory, contractual, or internal) requires framework adoption
  2. The framework crosswalks to other frameworks the org also uses
  3. Evidence must trace through crosswalks to satisfy multiple requirements
  4. Each link in the chain has a different maintainer with a different update cycle
  5. When any link updates, downstream links may break without notification

This is what Crosswalker’s Maintain phase addresses — tracking which links are stale and which evidence needs re-validation.


The same institutional patterns exist beyond cybersecurity:

DomainStandard bodyFrameworkMapping orgRegulator
Cyber/GRCNIST, MITRECSF, ATT&CK, 800-53OLIR, SCFSEC, FFIEC
HealthcareWHO, AMAICD-10, SNOMED CTUMLSHHS, FDA
FinancialFASB, IASBGAAP, IFRS, XBRLNone (direct regulation)SEC, PCAOB
ScientificGene Ontology ConsortiumGene OntologyOBO FoundryNone (peer review)
Web/DataW3C, IETFRDF, SKOS, Schema.orgLOV, BioPortalNone

The EvolutionPattern taxonomy is designed to work across all these domains — not just cybersecurity.


The institutional landscape determines:

  1. What EvolutionPattern fields mattercrosswalk_maintenance captures who maintains mappings; release_cadence captures how often the publisher updates
  2. What metadata to track — which entity published the framework, when, and who maintains the crosswalks you’re using
  3. What staleness detection to build — different entity types fail differently (publishers update on their schedule; mapping orgs may go silent)
  4. What the community registry should capture — not just framework configs, but institutional context (who publishes, who maps, who mandates)