-
Notifications
You must be signed in to change notification settings - Fork 20
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature Request: Framework-Neutral Common Controls for Scalable Compliance Mapping #38
Comments
So this how I developed out my program at work in this fashion. |
Common ControlsCC_ID: "Unique CC ID"
Control_Domain: "CC Control Domain Families like asset management, change management, etc."
Control_Name: "A short control name to understand the intent of the control"
Control_Description: "Description of CC Control activity"
Control_Theme:
- people: "Controls related to individual people"
- process: "Controls related to processes"
- technology: "Controls related to technology"
Control_Type:
- Corrective: "Corrective controls are implemented to correct any issues identified in systems or processes."
- Detective: "Detective controls are designed to identify and detect anomalies, events, or potential incidents as they occur. "
- Preventive: "Preventive controls aim to stop security incidents from occurring in the first place. These controls are proactive and are implemented before an event can happen to reduce the likelihood of security breaches or other incidents. "
Policy_Standard: "A recommended policy/standard which drives the control requirements within the organization"
Test_of_Design: "Evaluates whether a control has been designed to meet its intended purpose and goals. It examines the control's architecture, structure, and documented policies and procedures to ensure they are adequate for mitigating identified risks."
Test_of_Operating_Effectiveness: "Evaluates how well the control is functioning in practice. This test moves beyond just evaluating the control's design and focuses on examining whether the control is operating as intended in the real-world environment. It checks if the control is actively and effectively mitigating risks and meeting its objectives."
Evidence_Artifacts: "References to the list of evidence to support Illustrative control requirements"
Mapping:
- SOC_2:
- CC6.6
- CC7.1
- ISO_27001_2022:
- A.8.16
- A.8.17 |
@austinsonger Yeah that's exactly what I'm trying to do at the moment, although my version looks different and doesn't cover everything yet. Here's an example of a policy (subject to change of course), let me know what you think. {
"id": "password_policy",
"slug": "password-policy",
"name": "Password Policy",
"description": "This policy outlines the requirements for passwords used by employees.",
"template": "<html>...</html>",
"usedBy": {
"soc2": {
"CC1": ["CC1.1", "CC1.2", "CC1.3"]
}
}
} Then I'm writing a seed file like you are, to write it all to tables and have it be easily extensible. Similar to how you're doing I'm using ids in the json files to link to each other. |
Core Entities & Their Relationships
1️⃣ Frameworks ⬌ Requirements (One-to-Many)
{ "framework": "SOC2", "requirements": ["CC6.1 - Access Control", "CC7.2 - Incident Response"] } 2️⃣ Requirements ⬌ Controls (Many-to-Many)
{ "requirement": "SOC2 CC6.1 - Access Control", "controls": ["Identity and Access Management", "Privileged Access Management"] } 3️⃣ Requirements ⬌ Policies & Procedures (Many-to-Many)
{
"requirement": "SOC2 CC6.1 - Access Control",
"policies": ["Access Control Policy", "Password Policy"],
"procedures": ["Access Request Approval Procedure", "Privileged Access Review"]
} 4️⃣ Controls ⬌ Policies (One-to-Many)
{ "control": "Identity and Access Management", "policies": ["Password Policy", "Multi-Factor Authentication Policy"] }
5️⃣ Policies ⬌ Procedures (One-to-Many)
{ "policy": "Password Policy", "procedures": ["Password Reset Procedure", "Password Expiry Process"] } 6️⃣ Controls ⬌ Risks (Many-to-Many)
{ "control": "Incident Response", "risks": ["Data Breach", "Ransomware Attack"] } Outlook
🔥 Summary of Relationships
|
Summary
To enhance scalability and efficiency in compliance management, we propose implementing a framework-neutral common control set that enables seamless mapping to multiple frameworks. This approach simplifies evidence artifact management and ensures that adding a new framework requires only a simple mapping to existing platform-wide common control IDs.
Problem Statement
Organizations managing multiple compliance frameworks often face inefficiencies due to duplicated efforts in control implementation, evidence collection, and audit readiness. When a new framework is introduced, teams must manually re-align their compliance programs, leading to increased complexity, operational overhead, and inconsistencies in control execution.
Proposed Solution
Implement a framework-neutral common control set, where each control is uniquely identified and mapped to multiple compliance frameworks.
This solution enables:
The text was updated successfully, but these errors were encountered: