Compliance / Control Mapping

Cross-Framework Control Mapping

See how controls align across different compliance frameworks

ISO 27001 ↔ GDPR Mappings
A.5.1
Policies for information security
Article 32
Security of processing
A.8.1
User endpoint devices
Article 25
Data protection by design and by default
A.5.10
Acceptable use of information
Article 5(1)(f)
Integrity and confidentiality
ISO 27001 ↔ SOC 2 Mappings
A.5.1
Policies for information security
CC1.1
Control environment
A.8.9
Configuration management
CC8.1
Change management