Mapping Security Posture to Compliance Frameworks
How TrustCyber maps your Microsoft 365 security findings to NIST CSF, CIS Controls v8, ISO 27001, SOC 2, and FTC Safeguards compliance frameworks.
TrustCyber automatically maps every security finding to one or more compliance framework controls. This allows you to demonstrate compliance coverage to auditors, identify gaps in your control environment, and prioritize remediation based on regulatory requirements.
Supported Frameworks
| Framework | Version | Applicable To |
|---|---|---|
| NIST Cybersecurity Framework | CSF 2.0 | All organizations |
| CIS Controls | v8 | All organizations |
| ISO/IEC 27001 | 2022 | Organizations seeking ISO certification |
| SOC 2 | 2017 Trust Services Criteria | SaaS and service organizations |
| FTC Safeguards Rule | 2023 Amendment | Financial institutions and auto dealers |
| HIPAA Security Rule | 45 CFR Part 164 | Healthcare organizations and business associates |
How Mapping Works
Each TrustCyber finding is tagged with one or more framework control identifiers. For example, a finding of 'MFA not enforced for admin accounts' is mapped to NIST CSF PR.AC-7, CIS Control 6.3, ISO 27001 A.9.4.2, and SOC 2 CC6.1. This mapping is maintained by TrustCyber's security research team and updated quarterly as frameworks are revised.
Using the Framework Mapping Page
- Navigate to Framework Mapping from the left sidebar.
- Select a framework from the filter chips at the top of the page.
- The table shows all findings mapped to that framework, grouped by control.
- Click any finding to see the full finding detail, including remediation guidance.
- Use the Export button to download a CSV of findings mapped to a specific framework for use in audit documentation.
Compliance Score Calculation
Your Compliance Score is calculated as the percentage of framework controls that are fully or partially satisfied by your current security configuration. A control is considered satisfied if all findings mapped to that control have a status of Resolved or Accepted Risk. A control is partially satisfied if some but not all findings are resolved.
Exporting for Auditors
TrustCyber can generate a framework-specific compliance report for use in audit submissions. From the Reports page, select Framework Compliance Report and choose the framework you are being audited against. The report includes a control-by-control breakdown of your compliance status, evidence of control implementation, and a list of open findings that represent control gaps.