jan-karel.com
Home / Security Measures / Reference & Architecture / Compliance Mapping Matrix

Compliance Mapping Matrix

Compliance Mapping Matrix

Compliance Mapping Matrix

From Overview to Action

A reference chapter only has value when teams can directly use it to plan, design and deliver.

For Compliance Mapping Matrix it is about demonstrability: translating standards into ownership, planning and verification.

This keeps this chapter from being theory, and instead makes it a usable compass for consistent execution.

Immediate measures (15 minutes)

Why this matters

The core of Compliance Mapping Matrix is risk reduction in practice. Technical context supports the measure selection, but implementation and assurance are central.

Matrix: Chapters x Frameworks

Web Security

# Chapter NIS2 ISO 27001 CIS v8 GDPR BIO
Web 01 SQL Injection Prevention Art. 21.2e A.8.26, A.8.28 CIS 16 Art. 32.1b BIO 14.2.1
Web 02 XSS Prevention Art. 21.2e A.8.26, A.8.28 CIS 16 Art. 32.1b BIO 14.2.1
Web 03 Command Injection Prevention Art. 21.2e A.8.26, A.8.28 CIS 16 Art. 32.1b BIO 14.2.1
Web 04 Path Traversal Prevention Art. 21.2e A.8.26, A.8.28 CIS 16 Art. 32.1b BIO 14.2.1
Web 05 SSTI Prevention Art. 21.2e A.8.26, A.8.28 CIS 16 Art. 32.1b BIO 14.2.1
Web 06 XXE Prevention Art. 21.2e A.8.9, A.8.26 CIS 4, 16 Art. 32.1b BIO 14.2.1
Web 07 SSRF Prevention Art. 21.2e A.8.22, A.8.26 CIS 12, 16 Art. 25.2 BIO 13.1.3, 14.2.1
Web 08 Deserialization Prevention Art. 21.2e A.8.26, A.8.28 CIS 16 Art. 32.1b BIO 14.2.1
Web 09 Client-side Security Art. 21.2e A.8.26 CIS 9, 16 Art. 32.1b BIO 14.1.2
Web 10 Authentication Hardening Art. 21.2i, 21.2j A.5.17, A.8.3, A.8.5 CIS 5, 6 Art. 32.1b BIO 9.4.1, 9.4.2
Web 11 Security Headers Art. 21.2e A.8.26 CIS 9, 16 Art. 32.1b BIO 14.1.2
Web 12 Input-Output Validation Art. 21.2e A.8.26, A.8.28 CIS 16 Art. 25.1, 32.1b BIO 14.2.1
Web 13 TLS Configuration Art. 21.2h A.8.24 CIS 3 Art. 32.1a BIO 10.1.1
Web 14 API Security Art. 21.2e, 21.2i A.8.3, A.8.26 CIS 6, 16 Art. 25.2, 32.1b BIO 9.4.1, 14.1.2
Web 15 File Upload Hardening Art. 21.2e A.8.26 CIS 16 Art. 32.1b BIO 14.2.1
Web 16 OAuth & OpenID Connect Art. 21.2i, 21.2j A.5.16, A.8.5 CIS 5, 6 Art. 32.1b BIO 9.4.1

Network & AD Hardening

# Chapter NIS2 ISO 27001 CIS v8 GDPR BIO
Network 01 Preventing Initial Access Art. 21.2a, 21.2g, 21.2j A.8.5, A.8.7 CIS 9, 14 Art. 32.1b BIO 9.4.2, 12.2.1
Network 02 Detection & Stopping Evasion Art. 21.2b, 21.2f A.8.7, A.8.15, A.8.16 CIS 8, 10, 13 Art. 32.1d BIO 12.2.1, 12.4.1
Network 03 Preventing Privilege Escalation Art. 21.2a, 21.2i A.8.2, A.8.18 CIS 5, 6 Art. 32.1b BIO 9.2.3
Network 04 Active Directory Hardening Art. 21.2i A.5.15, A.5.16, A.8.2, A.8.3 CIS 1, 5, 6 Art. 32.1b BIO 9.2.3, 9.4.1
Network 05 Kerberos Hardening Art. 21.2h, 21.2i A.8.5, A.8.24 CIS 3, 5 Art. 32.1a BIO 10.1.1
Network 06 Stopping Lateral Movement Art. 21.2a A.8.20, A.8.22 CIS 12, 13 Art. 32.1b BIO 13.1.1, 13.1.3
Network 07 Credential Protection Art. 21.2h A.5.17, A.8.24 CIS 3 Art. 32.1a BIO 10.1.1, 10.1.2
Network 08 ADCS Hardening Art. 21.2h A.8.24 CIS 3 Art. 32.1a BIO 10.1.1, 10.1.2
Network 09 Detecting Persistence Art. 21.2b, 21.2c A.8.13, A.8.15, A.8.16 CIS 8, 11 Art. 32.1c BIO 12.4.1, 16.1.2
Network 10 Preventing Tunneling Art. 21.2a A.8.20, A.8.23 CIS 12, 13 Art. 32.1b BIO 13.1.1
Network 11 Linux Hardening Art. 21.2e A.8.1, A.8.9 CIS 4 Art. 32.1b BIO 12.6.1
Network 12 Windows Hardening Art. 21.2e A.8.1, A.8.7, A.8.9, A.8.19 CIS 2, 4, 10 Art. 32.1b BIO 12.2.1, 12.6.1
Network 13 Email & DNS Hardening Art. 21.2a A.8.21 CIS 9 Art. 32.1b BIO 13.1.1
Network 14 MSSQL Hardening Art. 21.2e A.8.9, A.8.26 CIS 4, 16 Art. 32.1b BIO 14.1.2
Network 15 Network Segmentation & Firewall Art. 21.2a A.8.20, A.8.22 CIS 12, 13 Art. 32.1b BIO 6.1.1, 13.1.3

Cloud Hardening

# Chapter NIS2 ISO 27001 CIS v8 GDPR BIO
Cloud 01 Preventing Cloud Reconnaissance Art. 21.2a A.5.23, A.8.8 CIS 1, 15 Art. 32.1b BIO 12.6.1
Cloud 02 AWS Hardening Art. 21.2d, 21.2i A.5.23, A.8.2 CIS 5, 6, 15 Art. 32.1b BIO 9.2.3
Cloud 03 Azure / Entra ID Hardening Art. 21.2d, 21.2i A.5.23, A.8.2, A.8.5 CIS 5, 6, 15 Art. 32.1b BIO 9.2.3
Cloud 04 GCP Hardening Art. 21.2d, 21.2i A.5.23, A.8.2 CIS 5, 6, 15 Art. 32.1b BIO 9.2.3
Cloud 05 Container Hardening Art. 21.2e A.5.23, A.8.9, A.8.19 CIS 2, 4 Art. 32.1b BIO 12.6.1
Cloud 06 CI/CD Pipeline Hardening Art. 21.2d, 21.2e A.5.23, A.8.4, A.8.25 CIS 15, 16 Art. 32.1b BIO 14.2.1
Cloud 07 Serverless Hardening Art. 21.2e A.5.23, A.8.6, A.8.26 CIS 16 Art. 32.1b BIO 14.1.2
Cloud 08 Stopping Cloud Lateral Movement Art. 21.2a A.5.23, A.8.12, A.8.22 CIS 12, 13 Art. 32.1b BIO 13.1.3
Cloud 09 Preventing Cloud Persistence Art. 21.2b, 21.2c A.5.23, A.8.13, A.8.15 CIS 8, 11 Art. 32.1c BIO 12.4.1
Cloud 10 Cloud Detection & Logging Art. 21.2b, 21.2f A.5.23, A.8.15, A.8.16 CIS 8, 13 Art. 32.1d, 33 BIO 12.4.1, 16.1.2
Cloud 11 Kubernetes Hardening Art. 21.2e A.5.23, A.8.9, A.8.19 CIS 2, 4 Art. 32.1b BIO 12.6.1
Cloud 12 Infrastructure as Code Security Art. 21.2d, 21.2e A.5.23, A.8.9, A.8.25, A.8.32 CIS 4, 16 Art. 32.1b BIO 14.2.1
Cloud 13 Secrets Management Art. 21.2h A.5.23, A.8.24 CIS 3 Art. 32.1a BIO 10.1.1

Reference Pages

# Reference Page NIS2 ISO 27001 CIS v8 GDPR BIO
Ref 01 Attack-Defense Mapping Art. 21.2a, 21.2f A.5.7, A.8.8 CIS 7, 18 Art. 35 BIO 12.6.1
Ref 02 Implementation Priorities Art. 21.2a A.8.8, A.8.27 CIS 7 Art. 35 BIO 12.6.1, 14.2.5
Ref 03 Incident Response Art. 21.2b, Art. 23 A.5.24-A.5.28 CIS 17 Art. 33, 34 BIO 16.1.2
Ref 04 Compliance & Governance Art. 21 (full) A.5 (organizational) CIS 1-18 Art. 5, 25, 32 BIO (full)
Ref 05 Hardening Checklists Art. 21.2e, 21.2f A.8.9 CIS 4 Art. 32.1b BIO 12.6.1, 18.2.3
Ref 06 Compliance Mapping Matrix Art. 21 (full) A.5/A.8 mapping CIS 1-18 mapping Art. 5, 25, 32 mapping BIO mapping
Ref 07 Secret Management and API Key Rotation Art. 21.2h, 21.2b A.8.24, A.5.24-A.5.28 CIS 3, 17 Art. 32.1a, 33 BIO 10.1.1, 16.1.2

Quick Reference per Framework

NIS2 Articles

NIS2 Obligation Relevant Chapters
Art. 21.2a – Risk management measures Network 01, 03, 06, 10, 15, Cloud 01, 08, Ref 01, Ref 02
Art. 21.2b – Incident handling Network 02, 09, Cloud 09, 10, Ref 03, Ref 07
Art. 21.2c – Business continuity Network 09, Cloud 09, 10
Art. 21.2d – Supply chain security Cloud 02, 03, 04, 06, 12
Art. 21.2e – Security in acquisition/development Web 01, Web 02, Web 03, Web 04, Web 05, Web 06, Web 07, Web 08, Web 09, Web 10, Web 11, Web 12, Web 13, Web 14, Web 15, Web 16, Network 11, 12, 14, Cloud 05, 06, 07, 11, 12, Ref 05
Art. 21.2f – Effectiveness assessment Network 02, Cloud 10, Ref 01, Ref 05
Art. 21.2g – Cyber hygiene and training Network 01, 07, Web 10
Art. 21.2h – Cryptography policy Web 13, Network 05, 07, 08, Cloud 13, Ref 07
Art. 21.2i – Access management Web 10, 14, 16, Network 03, 04, Cloud 02, 03, 04
Art. 21.2j – Multi-factor authentication Web 10, 16, Network 01, Cloud 02, 03, 04
Art. 23 – Incident notification (24/72 hours) Ref 03

CIS Controls Top 18

CIS Control Relevant Chapters
CIS 1 – Inventory of Enterprise Assets Network 04, Cloud 01
CIS 2 – Inventory of Software Assets Network 02, 12, Cloud 05, 11
CIS 3 – Data Protection Web 13, Network 05, 07, 08, Cloud 13, Ref 07
CIS 4 – Secure Configuration Network 11, 12, 14, Cloud 05, 06, 11, 12, Ref 05
CIS 5 – Account Management Web 10, 16, Network 03, 04, 05, Cloud 02, 03, 04
CIS 6 – Access Control Management Web 10, 14, 16, Network 03, 04, Cloud 02, 03, 04
CIS 7 – Continuous Vulnerability Management Network 03, Ref 01, Ref 02
CIS 8 – Audit Log Management Network 02, 09, Cloud 09, 10
CIS 9 – Email & Web Browser Protections Web 09, 11, Network 01, 13
CIS 10 – Malware Defenses Network 02, 12
CIS 11 – Data Recovery Network 09, Cloud 09
CIS 12 – Network Infrastructure Management Network 06, 10, 15, Cloud 08
CIS 13 – Network Monitoring and Defense Network 02, 10, 15, Cloud 08, 10
CIS 14 – Security Awareness Training Network 01
CIS 15 – Service Provider Management Cloud 01, 02, 03, 04, 06
CIS 16 – Application Software Security Web 01, Web 02, Web 03, Web 04, Web 05, Web 06, Web 07, Web 08, Web 09, Web 10, Web 11, Web 12, Web 13, Web 14, Web 15, Web 16, Cloud 06, 07, 12, Network 14
CIS 17 – Incident Response Ref 03, Ref 07
CIS 18 – Penetration Testing Ref 01

OWASP Top 10 (2021)

# OWASP Item Relevant Web Chapters Other Chapters
A01 Broken Access Control Web 10, 14, 16 Cloud 02, Cloud 03, Cloud 04
A02 Cryptographic Failures Web 13 Cloud 13, Network 07
A03 Injection Web 01, 02, 03, 05, 12 Network 14
A04 Insecure Design Web 12, 14, 15 Ref 02
A05 Security Misconfiguration Web 06, 11 Network 11, 12, Ref 05
A06 Vulnerable and Outdated Components Cloud 06, 12, Ref 02
A07 Identification and Authentication Failures Web 10, 16 Network 01, 05
A08 Software and Data Integrity Failures Web 08 Cloud 06, 12
A09 Security Logging and Monitoring Failures Cloud 10, Network 02
A10 Server-Side Request Forgery Web 07 Cloud 01

ISO 27001:2022 Technological Controls (A.8)

ISO Control Description Relevant Chapters
A.8.1 User endpoint devices Network 11, 12
A.8.2 Privileged access rights Network 03, 04, Cloud 02, 03, 04
A.8.3 Information access restriction Web 10, 14, Network 04
A.8.4 Access to source code Cloud 06, 12
A.8.5 Secure authentication Web 10, 16, Network 01, 05, Cloud 03
A.8.6 Capacity management Cloud 02, 03, 04, 07
A.8.7 Protection against malware Network 02, 12
A.8.8 Management of technical vulnerabilities Network 03, Ref 01, Ref 02
A.8.9 Configuration management Network 11, 12, 14, Cloud 05, 11, 12, Ref 05
A.8.10 Information deletion Cloud 13, Network 07
A.8.11 Data masking Web 12, 14, Cloud 13
A.8.12 Data leakage prevention Network 10, 15, Cloud 08
A.8.13 Information backup Network 09, Cloud 09
A.8.14 Redundancy Cloud 02, 03, 04, 11
A.8.15 Logging Network 02, 09, Cloud 09, 10
A.8.16 Monitoring Network 02, 09, Cloud 10
A.8.17 Clock synchronization Cloud 10, Network 02
A.8.18 Use of privileged utility programs Network 02, 03, 12
A.8.19 Installation of software on operational systems Network 02, 12, Cloud 05, 11
A.8.20 Network security Network 06, 10, 15
A.8.21 Security of network services Network 13, 15, Web 13
A.8.22 Segregation of networks Network 15, Cloud 08
A.8.23 Web filtering Network 10, 15
A.8.24 Use of cryptography Web 13, Network 05, 07, 08, Cloud 13, Ref 07
A.8.25 Secure development lifecycle Web 01, Web 02, Web 03, Web 04, Web 05, Web 06, Web 07, Web 08, Web 09, Web 10, Web 11, Web 12, Web 13, Web 14, Web 15, Web 16, Cloud 06, 12
A.8.26 Application security requirements Web 01, Web 02, Web 03, Web 04, Web 05, Web 06, Web 07, Web 08, Web 09, Web 10, Web 11, Web 12, Web 13, Web 14, Web 15, Web 16, Cloud 07, Network 14
A.8.27 Secure system architecture Network 15, Cloud 08, Ref 02
A.8.28 Secure coding Web 01, Web 02, Web 03, Web 04, Web 05, Web 06, Web 07, Web 08, 12
A.8.29 Security testing in development Cloud 06, Ref 01, Web 01, Web 02, Web 03, Web 04, Web 05, Web 06, Web 07, Web 08, Web 09, Web 10, Web 11, Web 12, Web 13, Web 14, Web 15, Web 16
A.8.30 Outsourced development Cloud 06, 12
A.8.31 Separation of environments Cloud 06, 02, 03, 04
A.8.32 Change management Cloud 06, 12
A.8.33 Test information Cloud 06, Web 14
A.8.34 Protection during audit tests Cloud 10, Ref 01

GDPR Articles

GDPR Article Subject Relevant Chapters
Art. 5.1f Integrity and confidentiality Web 13, Network 07, 15, Cloud 13
Art. 25.1 Privacy by design Web 12, 13, 14, Cloud 13
Art. 25.2 Privacy by default Web 07, 12, 14
Art. 28 Processor requirements Cloud 02, 03, 04, 06
Art. 32.1a Pseudonymization and encryption Web 13, Network 05, 07, 08, Cloud 13, Ref 07
Art. 32.1b Confidentiality, integrity, availability All chapters (technical security measures)
Art. 32.1c Recovery after incidents Network 09, Cloud 09, Ref 03
Art. 32.1d Regular assessment Network 02, Cloud 10, Ref 01, Ref 05
Art. 33 Data breach notification to supervisory authority Cloud 10, Ref 03, Ref 07
Art. 34 Data breach notification to data subjects Ref 03
Art. 35 DPIA Ref 01, Ref 02

Coverage Overview

The table below shows per framework how many of the required controls are addressed by the Securitymaatregelen.nl chapters.

Framework Total controls Addressed (technical) Not addressed (organizational/legal)
NIS2 Art. 21.2 10 obligations 10 (complete) Governance aspects out of scope
ISO 27001:2022 Annex A 93 controls 34 (A.8 complete) + 13 (A.5 selection) A.5 (partial), A.6, A.7
CIS Controls v8 18 controls 18 (complete) Implementation depth varies per IG
GDPR 11 relevant articles 9 technical Art. 6, 9 (legal basis)
BIO 18 key controls 18 (complete) BBN3 requirements partially out of scope

Summary

This matrix is a living document. When chapters are added to Securitymaatregelen.nl or when frameworks are updated, this mapping should be updated accordingly.

Use this matrix for:

  • Audit preparation – look up the framework in the column header and identify per row all relevant chapters that you need to be able to present as evidence. Print the relevant section and use it as a checklist.
  • Gap analysis – go through the rows and check whether each chapter is addressed in your security program. Empty cells in your organization are potential compliance gaps.
  • Prioritization – combine this mapping with Reference 02 (Implementation Priorities) to determine which compliance gaps should be closed first. Focus on controls that appear in multiple frameworks – those deliver the most compliance value per invested hour.
  • Management reporting – use the coverage table and the matrix to show at a glance which compliance frameworks are covered by which measures. Managers love tables. Give them tables.
  • Cross-framework analysis – look for patterns in the matrix. Chapters that appear in many columns (e.g. Web 10, Network 15, Cloud 13) are universal building blocks that address virtually every framework. Prioritize these.

Op de hoogte blijven?

Ontvang maandelijks cybersecurity-inzichten in je inbox.

← Reference & Architecture ← Home