Frameworks

Framework Mappings You Can Export

Aurora Command maps common frameworks to controls so you can reuse work across reviews. Export mapping snapshots and evidence bundles when an auditor or buyer asks for traceability.

68 frameworks • 68 published versions • Updated Dec 27, 2025

Catalog

Find the Framework You Need

Search by framework name or acronym.

68
frameworks

Baseline standards and assessment models mapped to Aurora Command controls.

Framework

Aurora Essentials (Baseline Control Set)

Aurora’s opinionated baseline of essential security, privacy, resilience, and SDLC controls. Intended to cover common requirements across major security/privacy frameworks and customer due diligence.

1versionAurora
Framework

CIS Controls v8

Practical mapping of CIS Controls v8 to Aurora controls. This template tracks the 18 CIS Controls at an implementation-ready level. It maps them to canonical Aurora controls so evidence can be collected once and reused across audits.

1versionCenter for Internet Security (CIS)
Framework

CMMC 2.0 Level 1 (Foundational)

High-level mapping of CMMC 2.0 Level 1 practices to Aurora controls. Designed for operational readiness with clear, implementable requirements. Mapped to canonical Aurora controls so evidence can be collected once and reused across frameworks.

1version1U.S. Department of Defense (CMMC)
Framework

COBIT 2019 Framework: Governance and Management Objectives

Mapping of the COBIT 2019 Core Model governance and management objectives (EDM/APO/BAI/DSS/MEA) to Aurora controls.

1versionISACA
Framework

CSA Cloud Controls Matrix (CCM) v4.0.12

Cloud security control framework (CCM) with 17 domains and 197 control objectives.

1versionCloud Security Alliance (CSA)
Framework

Custom Frameworks (template)

Template for authoring customer-defined or internal frameworks in Aurora. Replace the example requirements with your own statements, IDs, and mappings to Aurora controls.

1versionAurora
Framework

Cyber Risk Institute Profile (CRI)

The CRI Profile provides diagnostic statements aligned to the NIST Cybersecurity Framework (CSF) for financial services and other regulated organizations. CRI Profile v2.1 diagnostic statements mapped to Aurora controls.

1versionCyber Risk Institute
Framework

FedRAMP Security Controls Baseline (High) - NIST SP 800-53 Rev. 5

FedRAMP High baseline security controls aligned to NIST SP 800-53 Rev. 5, sourced from the official FedRAMP Security Controls Baseline workbook. Includes NIST control statements and FedRAMP parameters/guidance where provided.

1versionFedRAMP (U.S. General Services Administration)
Framework

FedRAMP Security Controls Baseline (Low) - NIST SP 800-53 Rev. 5

FedRAMP Low baseline security controls aligned to NIST SP 800-53 Rev. 5, sourced from the official FedRAMP Security Controls Baseline workbook. Includes NIST control statements and FedRAMP parameters/guidance where provided.

1versionFedRAMP (U.S. General Services Administration)
Framework

FedRAMP Security Controls Baseline (Moderate) - NIST SP 800-53 Rev. 5

FedRAMP Moderate baseline security controls aligned to NIST SP 800-53 Rev. 5, sourced from the official FedRAMP Security Controls Baseline workbook. Includes NIST control statements and FedRAMP parameters/guidance where provided.

1versionFedRAMP (U.S. General Services Administration)
Framework

FFIEC Cybersecurity Assessment Tool (CAT)

FFIEC Cybersecurity Assessment Tool (CAT), May 2017 edition. The FFIEC announced the CAT sunset effective August 31, 2025. This mapping preserves the May 2017 requirements for reference and legacy assessment support.

1versionFederal Financial Institutions Examination Council (FFIEC)
Framework

FFIEC IT Examination Handbook – Information Security Booklet

FFIEC IT Examination Handbook (IT Handbook) – Information Security Booklet. Requirements are represented using the booklet's table of contents entries to ensure full topical coverage.

1versionFederal Financial Institutions Examination Council (FFIEC)
Framework

NIST SP 800-171 (CUI)

High-level mapping of NIST SP 800-171 families to Aurora controls. This template helps operationalize major requirement families, from access control to incident response. It is designed for auditor-ready evidence.

1version1NIST
Framework

OWASP Minimum Viable Secure Product (MVSP)

Open-source baseline of minimum security requirements for software products and services (MVSP v3.0-20231109, CC0).

1versionOWASP / Vendor Security Alliance (MVSP project)
Framework

SOC 2

High-level mapping of the SOC 2 Trust Services Criteria to Aurora controls. This template is designed for operational readiness (security reviews, SOC 2 Type II programs, and continuous evidence). It focuses on what auditors expect to see in practice: governance, risk management, access controls, monitoring, change management, incident response, availability, and vendor oversight.

1version1AICPA (Trust Services Criteria)
Framework

SOX IT General Controls (ITGC)

1versionAurora (derived from common SOX ITGC practice; aligned to SEC/PCAOB guidance)
Framework

State Insurance Cybersecurity Regulation (Baseline)

High-level mapping of common requirements across US state insurance cybersecurity regulations (informed by the NAIC Insurance Data Security Model Law).

1version1NAIC / State Insurance Regulators
Framework

StateRAMP / GovRAMP Baseline Controls for Authorization (Authorized Low & Moderate) --- StateRAMP Authorized Baseline Requirements (Aligned to NIST SP 800-53 Rev. 5)

Baseline security controls for GovRAMP/StateRAMP Authorization aligned to NIST SP 800-53 Rev. 5. Includes Authorized Low Impact (153 controls) and Authorized Moderate Impact (319 controls).

1versionGovRAMP (formerly StateRAMP)
Framework

TISAX (VDA ISA 6.0.3)

Mapping of VDA Information Security Assessment (ISA) questionnaire v6.0.3 requirements (Information Security and Prototype Protection and Data Protection) used by the TISAX assessment scheme to Aurora controls.

1versionENX Association / VDA
Framework

TX-RAMP (Texas Risk and Authorization Management Program) Control Baselines --- TX-RAMP 2.0 Control Baselines (Aligned to NIST SP 800-53 Rev. 5)

TX-RAMP Control Baselines v2.0 including Level 1 (117 controls) and Level 2 (223 controls) requirements.

1versionTexas Department of Information Resources (DIR) --- Texas Department of Information Resources (TX-RAMP)
Framework

US Data Privacy (USDP) – Core Multi-State Bundle

Internal Aurora bundle of common requirements across major US state consumer privacy laws (VCDPA, Colorado CPA, CTDPA, and UCPA).

1version1Aurora

How It Works

How Framework Mapping Works

Pick frameworks, map requirements once, attach evidence, and export traceability on demand.

1

Pick the Frameworks You Need

Select the framework(s) you need for this review cycle.

2

Map Requirements to Controls

Map requirements to your controls once, then reuse mapping across reviews.

3

Attach Evidence and Policy References

Attach evidence and policy references with IDs and timestamps.

4

Export Mapping Snapshots and Evidence Bundles

Export a mapping snapshot and evidence bundle when reviewers ask for traceability.

Produces
  • Requirement-to-control mapping snapshot (PDF)
  • Coverage verdict report (where enabled)
  • Evidence bundle export (ZIP)

Common Asks

The Requests That Show Up in Every Framework

Access Control and Identity Proof

Aurora Exports

Evidence bundles and citations

Governance Approvals and Version History

Aurora Exports

Policy PDFs with approvals

Incident Readiness

Aurora Exports

Playbooks and tabletop outputs (tiered)

Training Completion

Aurora Exports

Training exports (tiered)

Supplier and Vendor Risk

Aurora Exports

Due diligence exports (tiered)

Freshness and Timing

Aurora Exports

Timestamps and point-in-time snapshots

FAQ

Framework Questions

Do you support multiple frameworks at once?
Yes, by plan. See plan limits.
Can we reuse mapping across reviews?
Yes. Mapping is designed to be reused and updated instead of rebuilt.
Do framework exports make us “compliant”?
No. Exports provide traceability and evidence organization. Your audit or assessment still follows its own criteria.
Next step
Want a Mapping Snapshot for Your Next Review?
Tell us which framework and which reviewer request you’re responding to. We’ll show the export format and what’s needed.
No obligation. We respond within one business day. We will show a sample reviewer-ready export.