Cross-Framework Control Mapping
See how controls align across different compliance frameworks
ISO 27001 ↔ GDPR Mappings
A.5.1
Policies for information security
→
Article 32
Security of processing
A.8.1
User endpoint devices
→
Article 25
Data protection by design and by default
A.5.10
Acceptable use of information
→
Article 5(1)(f)
Integrity and confidentiality
ISO 27001 ↔ SOC 2 Mappings
A.5.1
Policies for information security
→
CC1.1
Control environment
A.8.9
Configuration management
→
CC8.1
Change management