Log in
Frameworks

Frameworks Mapped to Your Controls

Add frameworks without duplicating evidence. Aurora Command maps external requirements to your internal controls so your program stays reusable as you grow.

68 frameworks • 68 published versions • Updated Dec 27, 2025

Catalog

Find the Framework You Need

Search by framework name or acronym.

68
frameworks

Baseline standards and assessment models mapped to Aurora Command controls.

Framework

Aurora Essentials (Baseline Control Set)

Aurora’s opinionated baseline of essential security, privacy, resilience, and SDLC controls. Intended to cover common requirements across major security/privacy frameworks and customer due diligence.

1versionAurora
Framework

CIS Controls v8

Practical mapping of CIS Controls v8 to Aurora controls. This template tracks the 18 CIS Controls at an implementation-ready level. It maps them to canonical Aurora controls so evidence can be collected once and reused across audits.

1versionCenter for Internet Security (CIS)
Framework

CMMC 2.0 Level 1 (Foundational)

High-level mapping of CMMC 2.0 Level 1 practices to Aurora controls. Designed for operational readiness with clear, implementable requirements. Mapped to canonical Aurora controls so evidence can be collected once and reused across frameworks.

1version1U.S. Department of Defense (CMMC)
Framework

COBIT 2019 Framework: Governance and Management Objectives

Mapping of the COBIT 2019 Core Model governance and management objectives (EDM/APO/BAI/DSS/MEA) to Aurora controls.

1versionISACA
Framework

CSA Cloud Controls Matrix (CCM) v4.0.12

Cloud security control framework (CCM) with 17 domains and 197 control objectives.

1versionCloud Security Alliance (CSA)
Framework

Custom Frameworks (template)

Template for authoring customer-defined or internal frameworks in Aurora. Replace the example requirements with your own statements, IDs, and mappings to Aurora controls.

1versionAurora
Framework

Cyber Risk Institute Profile (CRI)

The CRI Profile provides diagnostic statements aligned to the NIST Cybersecurity Framework (CSF) for financial services and other regulated organizations. CRI Profile v2.1 diagnostic statements mapped to Aurora controls.

1versionCyber Risk Institute
Framework

FedRAMP Security Controls Baseline (High) - NIST SP 800-53 Rev. 5

FedRAMP High baseline security controls aligned to NIST SP 800-53 Rev. 5, sourced from the official FedRAMP Security Controls Baseline workbook. Includes NIST control statements and FedRAMP parameters/guidance where provided.

1versionFedRAMP (U.S. General Services Administration)
Framework

FedRAMP Security Controls Baseline (Low) - NIST SP 800-53 Rev. 5

FedRAMP Low baseline security controls aligned to NIST SP 800-53 Rev. 5, sourced from the official FedRAMP Security Controls Baseline workbook. Includes NIST control statements and FedRAMP parameters/guidance where provided.

1versionFedRAMP (U.S. General Services Administration)
Framework

FedRAMP Security Controls Baseline (Moderate) - NIST SP 800-53 Rev. 5

FedRAMP Moderate baseline security controls aligned to NIST SP 800-53 Rev. 5, sourced from the official FedRAMP Security Controls Baseline workbook. Includes NIST control statements and FedRAMP parameters/guidance where provided.

1versionFedRAMP (U.S. General Services Administration)
Framework

FFIEC Cybersecurity Assessment Tool (CAT)

FFIEC Cybersecurity Assessment Tool (CAT), May 2017 edition. The FFIEC announced the CAT sunset effective August 31, 2025. This mapping preserves the May 2017 requirements for reference and legacy assessment support.

1versionFederal Financial Institutions Examination Council (FFIEC)
Framework

FFIEC IT Examination Handbook – Information Security Booklet

FFIEC IT Examination Handbook (IT Handbook) – Information Security Booklet. Requirements are represented using the booklet's table of contents entries to ensure full topical coverage.

1versionFederal Financial Institutions Examination Council (FFIEC)
Framework

NIST SP 800-171 (CUI)

High-level mapping of NIST SP 800-171 families to Aurora controls. This template helps operationalize major requirement families, from access control to incident response. It is designed for auditor-ready evidence.

1version1NIST
Framework

OWASP Minimum Viable Secure Product (MVSP)

Open-source baseline of minimum security requirements for software products and services (MVSP v3.0-20231109, CC0).

1versionOWASP / Vendor Security Alliance (MVSP project)
Framework

SOC 2

High-level mapping of the SOC 2 Trust Services Criteria to Aurora controls. This template is designed for operational readiness (security reviews, SOC 2 Type II programs, and continuous evidence). It focuses on what auditors expect to see in practice: governance, risk management, access controls, monitoring, change management, incident response, availability, and vendor oversight.

1version1AICPA (Trust Services Criteria)
Framework

SOX IT General Controls (ITGC)

1versionAurora (derived from common SOX ITGC practice; aligned to SEC/PCAOB guidance)
Framework

State Insurance Cybersecurity Regulation (Baseline)

High-level mapping of common requirements across US state insurance cybersecurity regulations (informed by the NAIC Insurance Data Security Model Law).

1version1NAIC / State Insurance Regulators
Framework

StateRAMP / GovRAMP Baseline Controls for Authorization (Authorized Low & Moderate) --- StateRAMP Authorized Baseline Requirements (Aligned to NIST SP 800-53 Rev. 5)

Baseline security controls for GovRAMP/StateRAMP Authorization aligned to NIST SP 800-53 Rev. 5. Includes Authorized Low Impact (153 controls) and Authorized Moderate Impact (319 controls).

1versionGovRAMP (formerly StateRAMP)
Framework

TISAX (VDA ISA 6.0.3)

Mapping of VDA Information Security Assessment (ISA) questionnaire v6.0.3 requirements (Information Security and Prototype Protection and Data Protection) used by the TISAX assessment scheme to Aurora controls.

1versionENX Association / VDA
Framework

TX-RAMP (Texas Risk and Authorization Management Program) Control Baselines --- TX-RAMP 2.0 Control Baselines (Aligned to NIST SP 800-53 Rev. 5)

TX-RAMP Control Baselines v2.0 including Level 1 (117 controls) and Level 2 (223 controls) requirements.

1versionTexas Department of Information Resources (DIR) --- Texas Department of Information Resources (TX-RAMP)
Framework

US Data Privacy (USDP) – Core Multi-State Bundle

Internal Aurora bundle of common requirements across major US state consumer privacy laws (VCDPA, Colorado CPA, CTDPA, and UCPA).

1version1Aurora

How It Works

How Framework Mapping Works

Choose frameworks, map requirements to controls, link evidence, keep it current, then share a controlled reviewer view when asked.

1

Choose the framework(s)

Pick the frameworks you care about for this review cycle.

2

Map requirements to controls

Map external requirements to your internal control library so evidence stays reusable.

3

Link evidence

Link each control to evidence and owners, and set freshness expectations.

4

Keep it current

Track cadence, approvals, and changes over time so work does not go stale.

5

Share when asked

Share a controlled reviewer view when you need to respond to an audit or review.

You get
  • Mapped requirements to controls
  • Linked evidence with ownership and freshness
  • Reviewable change history and approvals

Common Asks

The Requests That Show Up in Every Framework

Access Control and Identity Proof

What you can show

Evidence linked with source and timestamp

Governance Approvals and Version History

What you can show

Policy version and approval history

Incident Readiness

What you can show

Tabletop records, playbooks, and after-action items

Training Completion

What you can show

Assignment and completion history

Supplier and Vendor Risk

What you can show

Due diligence records with follow-ups and decisions

Freshness and Timing

What you can show

Freshness tracking and change history between cycles

FAQ

Framework Questions

Do you support multiple frameworks at once?
Yes, by plan. See plan limits.
Can we reuse mapping across reviews?
Yes. Mapping is designed to be reused and updated instead of rebuilt.
Does Aurora guarantee outcomes?
No. Aurora helps you run and document the work. It does not guarantee certification, audit outcomes, or reviewer decisions.
Next step
Want to Confirm Coverage for Your Frameworks?
Tell us what you're targeting. We'll show how mapping and evidence reuse works in Aurora.
No obligation. We respond within one business day. No compliance guarantees.