Field Notes · 02 · Frameworks

Frameworks aren't islands.

A single, well-implemented control can satisfy obligations across SOC 2, ISO 27001, HIPAA, PCI, and more — when your platform understands the connections.

4 min read · Frameworks

Consider a familiar control: multi-factor authentication is required for all administrative access to production systems. Implemented once, that single control contributes to obligations under at least nine recognized frameworks.

The same idea, different vocabularies

SOC 2 calls it CC6.1. ISO 27001 calls it A.5.17. HIPAA calls it §164.312(d). PCI DSS calls it Requirement 8.4. NIST 800-53 calls it IA-2(1). NIST CSF calls it PR.AC-7. CIS calls it Control 6.5. FedRAMP inherits it from 800-53. GDPR Article 32 implies it. The control is the same; only the labels differ.

The cost of treating frameworks as islands

Without a unified mapping, the typical pattern is to implement MFA for SOC 2, document evidence for SOC 2, and then re-document everything months later for ISO 27001. New evidence files, new approvers, new spreadsheets — for an identical control. Multiplied across hundreds of overlapping controls, this duplication consumes a meaningful share of every compliance team's calendar.

What unified mapping looks like in practice

ComplyAura ships with a control library that already encodes the cross-references between frameworks. Implementing a control once causes it to satisfy every framework requirement it applies to — automatically, and with the same evidence. When a new framework is added to your scope, the platform reports the coverage you already have before you begin any new work.

It's not novel logic. It's a careful, one-time investment in the mapping itself, so that every team using the platform inherits the benefit.


← Previous   All Field Notes   Next: Meet the seven →