🔗 Security Framework Alignment
Understand how major cybersecurity frameworks relate to each other and map to the security domains covered on this platform. Essential for compliance, risk management, and interview preparation.
Major Frameworks
OWASP
Open Web Application Security ProjectIndustry-standard guidance for web and API security, including the OWASP Top 10, ASVS, and testing guides.
CVSS / CVE / KEV
Common Vulnerability Scoring System, CVE & KEVCVSS provides standardized vulnerability severity scoring (0-10). CVE (Common Vulnerabilities and Exposures) catalogs known vulnerabilities. KEV (Known Exploited Vulnerabilities) tracks actively exploited flaws.
CWE / SANS Top 25
CWE/SANS Top 25 Most Dangerous Software WeaknessesThe 25 most dangerous CWE (Common Weakness Enumeration) software weaknesses ranked by prevalence and impact. Maintained by MITRE, mapped to real-world CVEs in NVD — essential for secure coding and vulnerability prioritization.
MITRE ATT&CK
MITRE ATT&CK FrameworkKnowledge base of adversary tactics, techniques, and procedures (TTPs) for threat modeling and detection engineering.
CIS Controls
Center for Internet Security Critical Security ControlsA prioritized set of 18 cybersecurity best practices (v8) designed to mitigate the most common cyber attacks. Organized into Implementation Groups (IG1, IG2, IG3) for phased adoption.
CISA
Cybersecurity & Infrastructure Security AgencyU.S. federal agency providing cybersecurity guidance, vulnerability advisories, Known Exploited Vulnerabilities (KEV) catalog, and Shields Up initiatives for critical infrastructure.
FFIEC / Federal Banking
Federal Financial Institutions Examination CouncilU.S. interagency body (OCC, FDIC, Fed, NCUA, CFPB) that sets uniform IT examination standards for banks and credit unions. The FFIEC IT Handbook covers information security, business continuity, outsourcing, and cybersecurity assessment tools (CAT).
GDPR
General Data Protection Regulation (EU)EU regulation governing the collection, processing, and storage of personal data for EU residents. Applies extraterritorially to any organization handling EU personal data. Establishes data subject rights, breach notification requirements, and significant penalties for non-compliance.
GLBA
Gramm-Leach-Bliley Act (GLBA)U.S. federal law requiring financial institutions to explain how they share and protect customers' private information. The Safeguards Rule mandates a comprehensive information security program with administrative, technical, and physical safeguards.
ISO 27001/27002
ISO/IEC 27001 & 27002International standards for establishing, implementing, and maintaining an information security management system (ISMS).
NIST CSF
NIST Cybersecurity FrameworkA voluntary framework of standards, guidelines, and best practices for managing cybersecurity risk across five functions.
NIST SP 800
NIST Special Publication 800 SeriesComprehensive security controls and guidelines — SP 800-53, 800-171, 800-63 for federal and enterprise systems.
PCI-DSS
Payment Card Industry Data Security StandardA set of 12 requirements for organizations that handle credit card data. Mandates network security, data encryption, access control, vulnerability management, and regular testing to protect cardholder data environments (CDE).
SOX
Sarbanes-Oxley Act (SOX)U.S. federal law mandating strict financial reporting controls and IT governance for publicly traded companies. Section 404 requires management assessment of internal controls over financial reporting (ICFR), including IT general controls (ITGCs).
Framework × Topic Cross-Reference
This matrix shows which frameworks apply to each security domain. Use it to understand framework coverage and map your security program.
| Topic | OWASP | NIST CSF | NIST SP 800 | MITRE ATT&CK | ISO 27001 | CISA | CIS | CVSS/CVE | SANS | GDPR |
|---|---|---|---|---|---|---|---|---|---|---|
| 🤖 AI Sec | ✅ | ✅ | ✅ | ✅ | — | ✅ | ✅ | ✅ | ✅ | — |
| 🧠 AI/ML SecOps | — | ✅ | ✅ | ✅ | — | ✅ | ✅ | ✅ | ✅ | — |
| 🔌 API Sec | ✅ | ✅ | ✅ | — | — | ✅ | ✅ | ✅ | ✅ | — |
| 🛡️ AppSec | ✅ | ✅ | ✅ | — | — | ✅ | ✅ | ✅ | ✅ | — |
| ☁️ Cloud | — | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ |
| 🔐 Data Sec | — | ✅ | ✅ | — | ✅ | ✅ | ✅ | — | ✅ | ✅ |
| ⚙️ DevSecOps | ✅ | ✅ | ✅ | ✅ | — | ✅ | ✅ | ✅ | ✅ | — |
| 🔏 Crypto | — | ✅ | ✅ | — | ✅ | ✅ | ✅ | — | ✅ | — |
| 📋 GRC | — | ✅ | ✅ | — | ✅ | ✅ | ✅ | — | ✅ | ✅ |
| 🔑 IAM / IGA | ✅ | ✅ | ✅ | — | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ |
| 🎯 MITRE ATT&CK | — | ✅ | ✅ | ✅ | — | ✅ | ✅ | ✅ | ✅ | — |
| 🌐 Network | — | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | — |
| 🛡️ OWASP Top 10 | ✅ | ✅ | ✅ | ✅ | — | ✅ | ✅ | ✅ | ✅ | — |
| 🧪 SAST/DAST | ✅ | ✅ | ✅ | ✅ | — | ✅ | ✅ | ✅ | ✅ | — |
| 📈 SIEM/Logs | — | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | — |
| 📊 SOC | — | ✅ | ✅ | ✅ | — | ✅ | ✅ | ✅ | ✅ | — |
| 🔍 VulnMgmt | ✅ | ✅ | ✅ | ✅ | — | ✅ | ✅ | ✅ | ✅ | — |
| 🏰 ZTA | — | ✅ | ✅ | ✅ | — | ✅ | ✅ | ✅ | ✅ | — |
How to Use These Frameworks
🎯 Risk Assessment
Use NIST CSF's Identify function and ISO 27001's risk assessment process to catalog assets, threats, and vulnerabilities. Map to MITRE ATT&CK for threat-informed risk analysis.
🛡️ Control Implementation
Select controls from NIST SP 800-53 and ISO 27002 based on risk assessment results. Use OWASP guidelines for application-specific controls. Layer controls for defense-in-depth.
📊 Detection & Response
Map detection rules to MITRE ATT&CK techniques for coverage analysis. Use NIST CSF Detect and Respond functions. Measure detection coverage with ATT&CK Navigator.
📋 Compliance & Audit
Use ISO 27001 for ISMS certification. Map NIST SP 800-53 controls to regulatory requirements (HIPAA, PCI DSS, SOX). Generate compliance reports using framework mappings.
🎓 Interview Preparation
Demonstrate framework knowledge by explaining how they complement each other. Show practical application with real scenarios. Reference specific controls and techniques.
📈 Program Maturity
Use OWASP SAMM for AppSec maturity. Map program capabilities to NIST CSF tiers. Track ATT&CK coverage over time. Report maturity to leadership with framework-aligned metrics.
NIST CSF 2.0 Core Functions
| Function | Purpose | Key Categories |
|---|---|---|
| Govern (GV) | Establish cybersecurity strategy and governance context | Risk Management Strategy, Roles & Responsibilities, Policy |
| Identify (ID) | Understand organizational risk posture | Asset Management, Risk Assessment, Supply Chain Risk |
| Protect (PR) | Implement safeguards against threats | Identity Management, Data Security, Platform Security |
| Detect (DE) | Discover cybersecurity events | Continuous Monitoring, Adverse Event Analysis |
| Respond (RS) | Take action on detected incidents | Incident Management, Analysis, Mitigation, Reporting |
| Recover (RC) | Restore capabilities after incidents | Incident Recovery Plan Execution, Communication |