Your InfoSec Governance Operating System
Portal Login
Frameworks

Coverage across 64 frameworks and regulations.

Browse the frameworks Aurora maps to its control library. Each entry shows requirements, mapped controls, and evidence specs so you can scope work and ship proof faster.

64 published versions, catalog updated Dec 28, 2025.

Catalog

Find the standards your reviewers cite.

Search by name, jurisdiction, or publisher to see how Aurora maps coverage.

64 frameworks
Frameworks and standards
Baseline standards and assessment models mapped to Aurora controls.
17 total
Aurora Essentials (Baseline Control Set)
Framework
Aurora’s opinionated baseline of essential security, privacy, resilience, and SDLC controls. Intended to cover common requirements across major security/privacy frameworks and customer due diligence.
Reqs
29
Controls
89
Evidence
220
1 versionAurora
COBIT 2019 Framework: Governance and Management Objectives
Framework
Mapping of the COBIT 2019 Core Model governance and management objectives (EDM/APO/BAI/DSS/MEA) to Aurora controls.
Reqs
40
Controls
77
Evidence
170
1 versionISACA
CRI Profile (Cyber Risk Institute) --- Cyber Risk Institute Profile
Framework
The CRI Profile provides diagnostic statements aligned to the NIST Cybersecurity Framework (CSF) for financial services and other regulated organizations.
Reqs
318
Controls
84
Evidence
205
1 versionCyber Risk Institute
CSA Cloud Controls Matrix (CCM) v4.0.12
Framework
Cloud security control framework (CCM) with 17 domains and 197 control objectives.
Reqs
197
Controls
86
Evidence
217
1 versionCloud Security Alliance (CSA)
Custom Frameworks (template)
Framework
Template for authoring customer-defined or internal frameworks in Aurora. Replace the example requirements with your own statements, IDs, and mappings to Aurora controls.
Reqs
5
Controls
16
Evidence
39
1 versionAurora
FedRAMP Security Controls Baseline (High) - NIST SP 800-53 Rev. 5
Framework
FedRAMP High baseline security controls aligned to NIST SP 800-53 Rev. 5, sourced from the official FedRAMP Security Controls Baseline workbook. Includes NIST control statements and FedRAMP parameters/guidance where provided.
Reqs
410
Controls
62
Evidence
155
1 versionFedRAMP (U.S. General Services Administration)
FedRAMP Security Controls Baseline (Low) - NIST SP 800-53 Rev. 5
Framework
FedRAMP Low baseline security controls aligned to NIST SP 800-53 Rev. 5, sourced from the official FedRAMP Security Controls Baseline workbook. Includes NIST control statements and FedRAMP parameters/guidance where provided.
Reqs
156
Controls
62
Evidence
155
1 versionFedRAMP (U.S. General Services Administration)
FedRAMP Security Controls Baseline (Moderate) - NIST SP 800-53 Rev. 5
Framework
FedRAMP Moderate baseline security controls aligned to NIST SP 800-53 Rev. 5, sourced from the official FedRAMP Security Controls Baseline workbook. Includes NIST control statements and FedRAMP parameters/guidance where provided.
Reqs
323
Controls
62
Evidence
155
1 versionFedRAMP (U.S. General Services Administration)
FFIEC Cybersecurity Assessment Tool (CAT)
Framework
FFIEC Cybersecurity Assessment Tool (CAT), May 2017 edition. The FFIEC announced that the CAT would be sunset effective August 31, 2025; this mapping preserves the May 2017 requirements for reference and legacy assessment support.
Reqs
536
Controls
52
Evidence
124
1 version
FFIEC IT Examination Handbook – Information Security Booklet
Framework
FFIEC IT Examination Handbook (IT Handbook) – Information Security Booklet. Requirements are represented using the booklet's table of contents entries to ensure full topical coverage.
Reqs
77
Controls
40
Evidence
93
1 version
NAIC Insurance Data Security Model Law
Framework
Standard for insurance licensees to protect nonpublic information.
Reqs
4
Controls
4
Evidence
5
1 version1 jurisdiction
OWASP Minimum Viable Secure Product (MVSP)
Framework
An open-source baseline of minimum security requirements for software products and services, published by the MVSP project (CC0).
Reqs
25
Controls
53
Evidence
130
1 versionVendor Security Alliance / vendorsec (MVSP project) --- OWASP
SOX IT General Controls (ITGC)
Framework
Reqs
21
Controls
39
Evidence
97
1 versionAurora (derived from common SOX ITGC practice; aligned to SEC/PCAOB guidance)
StateRAMP / GovRAMP Baseline Controls for Authorization (Authorized Low & Moderate) --- StateRAMP Authorized Baseline Requirements (Aligned to NIST SP 800-53 Rev. 5)
Framework
Baseline security controls for GovRAMP/StateRAMP Authorization aligned to NIST SP 800-53 Rev. 5. Includes Authorized Low Impact (153 controls) and Authorized Moderate Impact (319 controls).
Reqs
472
Controls
77
Evidence
190
1 versionGovRAMP (formerly StateRAMP)
TISAX (VDA ISA 6.0.3)
Framework
Mapping of VDA Information Security Assessment (ISA) questionnaire v6.0.3 requirements (Information Security and Prototype Protection and Data Protection) used by the TISAX assessment scheme to Aurora controls.
Reqs
80
Controls
61
Evidence
159
1 versionENX Association / VDA
TX-RAMP (Texas Risk and Authorization Management Program) Control Baselines --- TX-RAMP 2.0 Control Baselines (Aligned to NIST SP 800-53 Rev. 5)
Framework
TX-RAMP Control Baselines v2.0 including Level 1 (117 controls) and Level 2 (223 controls) requirements.
Reqs
680
Controls
77
Evidence
190
1 versionTexas Department of Information Resources (DIR) --- Texas Department of Information Resources (TX-RAMP)
US Data Privacy (USDP) – Core Multi-State Bundle --- US Data Privacy (Core Multi-State Bundle)
Framework
Internal Aurora bundle of common requirements across major US state consumer privacy laws (VCDPA, Colorado CPA, CTDPA, and UCPA).
Reqs
14
Controls
30
Evidence
87
1 version1 jurisdictionAurora Command (internal bundle) --- Aurora (internal)
Regulations and industry requirements
Privacy, security, and operational requirements across industries and regions.
40 total
APPI (Japan) – Act on the Protection of Personal Information --- Japan Act on the Protection of Personal Information (APPI)
Regulation
Japan Act on the Protection of Personal Information, consolidated and amended through Act No. 37 of 2021.
Reqs
187
Controls
28
Evidence
81
1 version1 jurisdictionGovernment of Japan (Personal Information Protection Commission / Japanese Law Translation)
APRA CPS 234 – Information Security --- APRA Prudential Standard CPS 234 – Information Security
Regulation
APRA Prudential Standard CPS 234 (July 2019) – Information Security.
Reqs
36
Controls
42
Evidence
101
1 versionAustralian Prudential Regulation Authority (APRA)
Australia Privacy Act 1988 – Australian Privacy Principles (APPs) & Notifiable Data Breaches (NDB)
Regulation
Australian Privacy Principles (Schedule 1) and Notifiable Data Breaches scheme (Part IIIC) under the Privacy Act 1988 (Cth).
Reqs
33
Controls
37
Evidence
100
1 version1 jurisdictionCommonwealth of Australia (Federal Register of Legislation) --- Federal Register of Legislation (Commonwealth of Australia)
AWS Foundational Technical Review (FTR) Validation Checklist
Customer assessment
AWS Foundational Technical Review (FTR) validation checklist requirements for AWS Partners (as published in the APN Foundational checklists).
Reqs
232
Controls
47
Evidence
128
1 versionAmazon Web Services (AWS) - AWS Partner Network (APN)
Brazil LGPD (Lei Geral de Proteção de Dados Pessoais)
Regulation
Brazil General Data Protection Law (Lei Geral de Proteção de Dados Pessoais), Law No. 13,709/2018, as amended.
Reqs
80
Controls
28
Evidence
82
1 version1 jurisdictionPresidency of the Republic of Brazil
California Consumer Privacy Act (CCPA)
Regulation
California consumer privacy law establishing rights and obligations for businesses processing personal information.
Reqs
50
Controls
22
Evidence
52
1 versionState of California
California Privacy Rights Act (CPRA)
Regulation
California privacy law amendments expanding the CCPA, including sensitive personal information, correction rights, and the California Privacy Protection Agency.
Reqs
50
Controls
22
Evidence
52
1 versionState of California
Canada PIPEDA (Personal Information Protection and Electronic Documents Act)
Regulation
Canada Personal Information Protection and Electronic Documents Act (PIPEDA).
Reqs
130
Controls
23
Evidence
68
1 version1 jurisdictionGovernment of Canada
CSA Consensus Assessments Initiative Questionnaire (CAIQ) v4.0.3
Customer assessment
CAIQ v4.0.3 assessment questionnaire aligned to CSA CCM v4.0.12 control objectives.
Reqs
261
Controls
86
Evidence
217
1 versionCloud Security Alliance (CSA)
DORA (Digital Operational Resilience Act)
Regulation
EU Digital Operational Resilience Act establishing ICT risk management, incident reporting, testing, and ICT third-party risk requirements for financial entities.
Reqs
64
Controls
36
Evidence
84
1 versionEuropean Union
FBI CJIS Security Policy
Standard
Reqs
34
Controls
52
Evidence
119
1 versionFederal Bureau of Investigation (FBI) Criminal Justice Information Services (CJIS) Division
FDA 21 CFR Part 11 (Electronic Records; Electronic Signatures)
Regulation
Compliance mapping for FDA 21 CFR Part 11 (Electronic Records; Electronic Signatures).
Reqs
20
Controls
19
Evidence
45
1 version1 jurisdictionU.S. Food and Drug Administration (FDA) --- U.S. Food and Drug Administration / Office of the Federal Register
FedRAMP 20x (Phase 2 Pilot) Requirements, Recommendations, and KSIs
Regulation
FedRAMP 20x Phase 2 pilot requirements and recommendations for providers and assessors, including Key Security Indicators (KSIs) and supporting requirement modules (MAS, UCM, ADS, VDR, SCN, CCM, RSC, FSI, PVA, ICP).
Reqs
271
Controls
40
Evidence
97
1 versionFedRAMP Program Management Office (GSA)
FERPA (Family Educational Rights and Privacy Act) Regulations --- FERPA (34 CFR Part 99) – Family Educational Rights and Privacy
Regulation
Compliance mapping for FERPA (Family Educational Rights and Privacy Act) Regulations.
Reqs
34
Controls
20
Evidence
57
1 version1 jurisdictionU.S. Department of Education / Office of the Federal Register
General Data Protection Regulation (GDPR)
Regulation
EU regulation governing personal data processing and privacy rights.
Reqs
99
Controls
41
Evidence
104
1 versionEuropean Parliament and Council of the European Union
GLBA Safeguards Rule (16 CFR Part 314)
Regulation
FTC Standards for Safeguarding Customer Information
Reqs
4
Controls
5
Evidence
7
1 version1 jurisdiction
HIPAA Privacy, Security, and Breach Notification Rules
Regulation
Compliance mapping for HIPAA Privacy, Security, and Breach Notification Rules.
Reqs
41
Controls
44
Evidence
112
1 versionU.S. Department of Health and Human Services (HHS)
IEC 62443 – Industrial automation and control systems security (Foundational Requirements) --- IEC 62443 (Foundational Requirements mapping)
Standard
High-level mapping of the IEC 62443 Foundational Requirements (FRs) to Aurora controls. This provides an OT/ICS-aligned control coverage view across the seven FR categories: Identification & Authentication Control (IAC), Use Control (UC), System Integrity (SI), Data Confidentiality (DC), Restricted Data Flow (RDF), Timely Response to Events (TRE), and Resource Availability (RA).
Reqs
14
Controls
29
Evidence
70
1 versionIEC
India DPDP – Digital Personal Data Protection Act, 2023
Regulation
Reqs
44
Controls
18
Evidence
55
1 versionGovernment of India (Ministry of Electronics and Information Technology / Gazette of India)
ISO 13485:2016 – Medical devices – Quality management systems – Requirements for regulatory purposes
Standard
Quality Management System (QMS) requirements for organizations involved in the lifecycle of medical devices.
Reqs
80
Controls
33
Evidence
83
1 version1 jurisdictionInternational Organization for Standardization (ISO)
ISO 22301:2019 – Security and resilience – Business continuity management systems (BCMS)
Standard
International standard specifying requirements for planning, establishing, implementing, operating, monitoring, reviewing, maintaining, and improving a documented management system to protect against, reduce the likelihood of, prepare for, respond to, and recover from disruptive incidents.
Reqs
32
Controls
23
Evidence
58
1 versionISO
ISO 22301:2019 and Amendment 1:2024 Business Continuity Management System (BCMS)
Standard
Mapping of ISO 22301:2019 BCMS requirements (clauses 4–10, including sub-clauses) to Aurora controls. Framework metadata references ISO 22301:2019 and its Amendment 1:2024 (climate action changes).
Reqs
52
Controls
25
Evidence
63
1 version1 jurisdictionISO
ISO 9001:2015 and Amd 1:2024 – Quality management systems – Requirements --- ISO 9001:2015 Quality management systems – Requirements (Amendment 1:2024)
Standard
Quality Management System (QMS) requirements for organizations.
Reqs
61
Controls
26
Evidence
61
1 version1 jurisdictionInternational Organization for Standardization (ISO)
ISO/IEC 20000-1:2018 Service management system requirements (Amendment 1:2024)
Standard
Service management system (SMS) requirements for planning, establishing, implementing, operating, monitoring, reviewing, maintaining and improving service management.
Reqs
68
Controls
46
Evidence
118
1 version1 jurisdictionISO/IEC --- International Organization for Standardization (ISO) / International Electrotechnical Commission (IEC)
ISO/IEC 27001:2013 – Information security management systems (ISMS)
Standard
International standard specifying requirements for establishing, implementing, maintaining, and continually improving an information security management system (ISMS), including Annex A reference controls.
Reqs
148
Controls
92
Evidence
215
1 version1 jurisdictionISO/IEC
ISO/IEC 27017:2015 – Code of practice for information security controls for cloud services
Standard
Mapping of ISO/IEC 27017:2015 cloud-specific controls (Annex A extended control set) to Aurora controls.
Reqs
7
Controls
15
Evidence
41
1 version1 jurisdictionISO/IEC
ISO/IEC 27018:2025 – Protection of PII in public clouds acting as PII processors
Standard
Mapping of ISO/IEC 27018:2025 Annex A (public cloud PII processor extended control set for PII protection) to Aurora controls.
Reqs
25
Controls
31
Evidence
86
1 version1 jurisdictionISO/IEC
ISO/IEC 27031:2025 – ICT readiness for business continuity
Standard
Reqs
13
Controls
16
Evidence
44
1 versionISO/IEC
ISO/IEC 27034 – Application security (series)
Standard
Reqs
7
Controls
16
Evidence
36
1 versionISO/IEC
ISO/IEC 27701:2025 – Privacy information management systems (PIMS)
Standard
Mapping of ISO/IEC 27701:2025 PIMS requirements and Annex B implementation guidance for PII controllers and processors to Aurora controls.
Reqs
124
Controls
54
Evidence
150
1 version1 jurisdictionISO/IEC
ISO/IEC 42001:2023 Artificial intelligence – Management system
Standard
AI management system requirements (clauses 4–10) and Annex A reference control objectives and controls for responsible AI governance.
Reqs
98
Controls
52
Evidence
138
1 version1 jurisdictionISO/IEC --- International Organization for Standardization (ISO) / International Electrotechnical Commission (IEC)
ISO/SAE 21434:2021 – Road vehicles – Cybersecurity engineering
Standard
ISO/SAE 21434:2021 cybersecurity engineering mapping built around the standard's defined work products (WP-XX-YY), which represent the primary evidence artifacts produced across cybersecurity management, product development, and post-development/operations phases. Each work product is mapped to the most relevant Aurora control(s) for implementation and evidence collection.
Reqs
53
Controls
43
Evidence
104
1 versionISO/SAE
NAIC Insurance Data Security Model Law (668)
Regulation
A practical mapping of Aurora controls to the NAIC Insurance Data Security Model Law (668) baseline used in the Aurora portal. Controls are mapped to canonical AURORA.* controls so evidence and status can be tracked once and reused across many frameworks.
Reqs
17
Controls
40
Evidence
94
1 version1 jurisdiction
NIS 2 Directive
Regulation
EU Directive on measures for a high common level of cybersecurity across the Union (NIS2), including risk-management measures and incident reporting obligations for essential and important entities.
Reqs
49
Controls
39
Evidence
92
1 versionEuropean Union
OWASP Application Security Verification Standard (ASVS)
Standard
Mapping of OWASP ASVS v5.0.0 verification requirements to Aurora controls.
Reqs
345
Controls
28
Evidence
60
1 version1 jurisdictionOWASP Foundation
PCI DSS 4.0
Standard
Payment Card Industry Data Security Standard
Reqs
3
Controls
3
Evidence
5
1 version
PIPL (China) – Personal Information Protection Law --- China Personal Information Protection Law (PIPL)
Regulation
Personal Information Protection Law of the People's Republic of China.
Reqs
74
Controls
35
Evidence
102
1 version1 jurisdictionStanding Committee of the National People’s Congress (NPC)
SEC Regulation S-P (Privacy of Consumer Financial Information)
Regulation
Compliance mapping for SEC Regulation S-P (Privacy of Consumer Financial Information).
Reqs
20
Controls
19
Evidence
53
1 versionU.S. Securities and Exchange Commission (SEC)
Singapore Personal Data Protection Act (PDPA)
Regulation
Reqs
14
Controls
23
Evidence
69
1 versionSingapore Attorney-General’s Chambers (Singapore Statutes Online) / Personal Data Protection Commission (PDPC)
South Africa POPIA (Protection of Personal Information Act)
Regulation
South Africa Protection of Personal Information Act 4 of 2013 (POPIA).
Reqs
116
Controls
27
Evidence
80
1 version1 jurisdictionRepublic of South Africa
US state overlays
State-level requirements and overlays, including insurance cybersecurity laws.
7 total
Alaska Insurance Data Security Act
Regulation
AS 21.36.010 - Standards for safeguarding customer information.
Reqs
2
Controls
2
Evidence
7
1 version1 jurisdiction
Colorado Privacy Act (CPA) --- CPA – Colorado Privacy Act (C.R.S. Title 6, Article 1, Part 13)
Regulation
Colorado consumer privacy law establishing controller/processor obligations and consumer rights.
Reqs
17
Controls
29
Evidence
80
1 version1 jurisdictionState of Colorado --- Colorado General Assembly / Office of Legislative Legal Services
Connecticut Data Privacy Act (CTDPA) --- CTDPA – Connecticut Data Privacy Act (Conn. Gen. Stat. Chapter 743jj)
Regulation
Connecticut consumer privacy law establishing controller/processor obligations and consumer rights.
Reqs
19
Controls
27
Evidence
74
1 version1 jurisdictionState of Connecticut --- Connecticut General Assembly
NYDFS 23 NYCRR 500
Regulation
Cybersecurity Requirements for Financial Services Companies
Reqs
4
Controls
4
Evidence
5
1 version1 jurisdiction
South Carolina Insurance Data Security Act
Regulation
SC Code Section 38-99-10 et seq.
Reqs
2
Controls
2
Evidence
1
1 version1 jurisdiction
Utah Consumer Privacy Act (UCPA) --- UCPA – Utah Consumer Privacy Act (Utah Code Title 13, Chapter 61)
Regulation
Utah consumer privacy law establishing controller/processor obligations and consumer rights.
Reqs
18
Controls
18
Evidence
53
1 version1 jurisdictionState of Utah --- Utah State Legislature
Virginia Consumer Data Protection Act (VCDPA) --- VCDPA – Virginia Consumer Data Protection Act (Va. Code Ann. Title 59.1, Chapter 53)
Regulation
Virginia consumer privacy law establishing controller/processor obligations and consumer rights.
Reqs
13
Controls
26
Evidence
70
1 version1 jurisdictionCommonwealth of Virginia --- Virginia General Assembly

How it works

Map requirements to controls, then export the reviewer deliverable.

  • Map requirements to Aurora controls and owners
  • Attach evidence with freshness context and provenance
  • Export packets, binders, and snapshots reviewers can verify

Common asks

The requests that show up in every framework

Access control and identity proof
Aurora exports: Evidence binder exports and citations
Governance approvals and version history
Aurora exports: Policy pack exports
Incident readiness
Aurora exports: Playbooks and tabletop outputs (tiered)
Training completion
Aurora exports: Training exports (tiered)
Supplier and vendor risk
Aurora exports: Due diligence pack exports (tiered)
Freshness and timing
Aurora exports: Timestamps and point-in-time snapshots

FAQ

Frameworks FAQ

Do we have to choose a framework to start using Aurora?
No. You can start from exports and evidence, then add frameworks as your buyers, insurers, or auditors require them.
Can we run multiple frameworks in one system?
Yes. Aurora is designed for reusable control mapping and evidence so you can expand without redoing work.
Does Aurora replace the auditor or certification body?
No. Aurora packages defensible proof and exports; the auditor or certification body performs the independent review.
Can we start with exports before automating evidence?
Yes. Start with manual uploads and mapping, then add integrations on your schedule.
How do we share proof with buyers during the process?
Use the Trust Center to share curated artifacts with tiered access rules and exportable access logs.
Next step
Want a proof pack tailored to your framework?
Tell us what reviewers asked for and your timeline. We will map the shortest path to export-ready proof.
Have a deadline? Tell us. We can prioritize export-ready proof.