Lab 15: Compliance Frameworks
Time: 50 minutes | Level: Architect | Docker: docker run -it --rm zchencow/innozverse-cybersec:latest bash
Objectives
Understand ISO 27001, SOC 2 Type II, NIST CSF 2.0, PCI DSS v4.0, CIS Controls v8
Map controls across frameworks to identify overlap
Conduct a compliance gap analysis
Build a Python compliance gap analyser
Step 1: Framework Overview
ISO 27001:2022
ISO/IEC
ISMS; risk-based
Global enterprises
SOC 2 Type II
AICPA
Cloud/SaaS service providers
US services
NIST CSF 2.0
NIST
Cybersecurity risk management
US critical infra
PCI DSS v4.0
PCI SSC
Payment card data
Cardholder data handling
CIS Controls v8
CIS
Prioritised security actions
All organisations
Step 2: ISO 27001:2022 — ISMS Controls
ISO 27001 Annex A control domains (2022 version):
A.5
Organisational controls
37 controls (policies, supply chain, IR)
A.6
People controls
8 controls (screening, training, remote work)
A.7
Physical controls
14 controls (physical security, clean desk)
A.8
Technological controls
34 controls (access, crypto, secure development)
New controls in 2022 version:
A.5.7: Threat intelligence
A.5.23: Cloud services security
A.8.8: Management of technical vulnerabilities
A.8.16: Monitoring activities
A.8.28: Secure coding
ISMS lifecycle (PDCA cycle):
Step 3: SOC 2 Type II — Trust Services Criteria
Five Trust Services Categories:
Security
CC (Common Criteria)
Logical/physical access, monitoring
Availability
A
System availability per SLAs
Processing Integrity
PI
Complete, accurate, timely processing
Confidentiality
C
Protect confidential information
Privacy
P
Personal information collection/use
Critical Common Criteria:
CC6.1
Logical access controls (authentication, MFA)
CC6.2
Access provisioning/deprovisioning
CC6.3
Role-based access; minimum necessary
CC7.1
Vulnerability management
CC7.2
Intrusion detection/monitoring
CC7.3
Incident response procedures
CC8.1
Change management
CC9.2
Vendor risk management
Type I vs Type II:
Type I: Point-in-time — controls exist and are suitably designed
Type II: Period of time (min 6 months) — controls operated effectively
Step 4: NIST CSF 2.0 Functions
Six functions (CSF 2.0 added "Govern"):
NIST CSF 2.0 Tiers:
Tier 1 – Partial: Ad-hoc, risk not formalised
Tier 2 – Risk Informed: Risk aware but not organisation-wide
Tier 3 – Repeatable: Organisation-wide, formal policies
Tier 4 – Adaptive: Adaptive, lessons learned, threat-informed
Step 5: PCI DSS v4.0 Requirements
12 PCI DSS Requirements:
1
Install and maintain network security controls
2
Apply secure configurations to all system components
3
Protect stored account data
4
Protect cardholder data in transit with strong cryptography
5
Protect all systems and networks from malicious software
6
Develop and maintain secure systems and software
7
Restrict access to system components by business need-to-know
8
Identify users and authenticate access to system components
9
Restrict physical access to cardholder data
10
Log and monitor all access to system components
11
Test security of systems and networks regularly
12
Support information security with organisational policies
Key PCI DSS v4.0 changes:
Requirement 6.3.3: All software protected from known vulnerabilities
Requirement 8.4.2: MFA required for ALL access into CDE (not just remote)
Requirement 11.6.1: Detect unauthorised changes to payment pages
Customised approach: flexibility to meet intent rather than prescribed method
Step 6: Compliance Gap Analyser
📸 Verified Output:
Step 7: CIS Controls v8
18 CIS Controls with Implementation Groups:
1
Inventory of Enterprise Assets
✅
✅
✅
2
Inventory of Software Assets
✅
✅
✅
3
Data Protection
✅
✅
✅
4
Secure Configuration
✅
✅
✅
5
Account Management
✅
✅
✅
6
Access Control Management
✅
✅
✅
7
Continuous Vulnerability Management
✅
✅
8
Audit Log Management
✅
✅
9
Email and Web Browser Protections
✅
✅
✅
10
Malware Defences
✅
✅
✅
11
Data Recovery
✅
✅
✅
12
Network Infrastructure Management
✅
✅
13
Network Monitoring and Defence
✅
✅
14
Security Awareness & Skills Training
✅
✅
✅
17
Incident Response Management
✅
✅
18
Penetration Testing
✅
IG1 = essential cyber hygiene (all organisations) IG2 = for organisations handling sensitive data IG3 = advanced organisations, full security programme
Step 8: Capstone — Multi-Framework Compliance Programme
Scenario: FinTech startup needing ISO 27001, SOC 2 Type II, and PCI DSS simultaneously
Summary
ISO 27001
Risk-based ISMS; 93 Annex A controls
Third-party cert body
SOC 2 Type II
Trust Services Criteria; operating effectiveness
CPA firm attestation
NIST CSF 2.0
6 functions; tiered maturity; voluntary
Self-assessed
PCI DSS v4.0
12 requirements; MFA for all CDE access
QSA / SAQ
CIS Controls v8
18 controls; IG1/2/3 implementation groups
Self-assessed
Cross-mapping
Integrate frameworks to avoid control duplication
Unified programme
Last updated
