Image without description
  • Jacco Meijer
  • |
  • Oct 7, 2025

ISO 27000, ISA 62443, NIS2, BIO, NIST CSF and NIST SP 800-53

How to align the steadily increasing number of cyber security frameworks, standards and regulations?

Combining ISO 27001 and NIST CSF

The post below on NIST CSF and ISO 27001 states that the standards have different purposes, but their goals align and the standards strengthen each other.

Image without description
  • Jacco Meijer
  • |
  • Jun 6, 2025

Combining ISO 27001 and NIST CSF

How to use ISO 27001 and NIST Cyber Security Framework together

The two are relatively easy to compare and both can be used independent of jurisdiction and country. For many specific countries however, alignment with local regulations is required. This adds extra complexity to the identification of compliancy gaps. When the scope is extended from IT to OT this complexity is extended even further.

When this post mentions standards, this includes frameworks and regulations.

The table below shows a practical example of the standards that commonly need alignment in the Netherlands. The 62443 family of standards is included as an example for Operational Technology (OT).

StandardDescription
ISO 27001 StandardRisk based Management System standard for establishing, implementing, maintaining, and continually improving Information Security.
ISO 27002 StandardSupporting standard on control implementation.
ISA/IEC 62443 StandardsA series of standards for industrial automation and control systems (IACS) cybersecurity.
NIST SP 800-53 StandardUS federal standard providing a comprehensive catalog of security and privacy controls.
NIST CSF 2.0 FrameworkVoluntary risk based outcome focused framework designed to help organizations manage and reduce cybersecurity risk.
NIS2 DirectiveBinding EU regulation that mandates cybersecurity requirements for essential and important entities.
GDPR RegulationEU regulation on data protection and privacy for all individuals within the EU and EEA.
BIO2 Framework/RegulationMandatory baseline framework aligning with ISO 27001/27002.

Challenges

Compliancy gaps

One of the major challenges is identifying compliancy gaps and assuring all legal obligations are met. Article 20 of the NIS2 Directive for example, mandates that management bodies (e.g. board members, executives) must approve and oversee the implementation of cybersecurity risk management measures.

Consider a company that is ISO 27001 certified. This company uses the Information Security Management System (ISMS) in line with the objective of the standard. Many of the standards that need alignment have similar objectives that intersect or are subsets of the ISMS defined objectives.

Besides the possible redundant work caused by overlapping standards, the overlap introduces the risk of compliancy gaps and possible contradicting requirements.

Mapping standards

Overlapping standards and compliancy gaps cause major challenges. One of the best solutions to manage these overlapping standards are consistent and reliable mappings between the standards. These mappings are often referred to as crosswalks.

The USA based NIST organization for example, publishes many crosswalks from and to their standards.

The table below shows some of the most common crosswalks that are available for the standards in this post.

FromToCrosswalk source
ISO 27001:2022ISA 62443-2-1:202462443-2-1 Annex A.4, Table A.7
ISO 27002:2013ISO 27002:2022ISO 27002 ANNEX B
ISO 27002:2022NIST CSF v1ISO 27002 ANNEX A - TAGS
NIST CSF v2.0NIST SP 800-53r5NIST CSF-pf-to-sp800-53r5-mappings.xlsx
NIST CSF v2.0ISA 62443-2-1:202462443-2-1 Annex A.4, Table A.9
NIST SP 800-53r5ISO 27001:2022NIST.sp.800-53r5-to-iso-27001-mapping-2022-OLIR-2023-10-12-UPDATED.xlsx
ISA 62443-2-1:2024ISO 27001:201362443-2-1 Annex A.4, Table A.8
ISA 62443-2-1:2024NIST CSF v162443-2-1 Annex A.4, Table A.10
NIS2ISO 27001:2022ENISA Technical Implementation Guidance Mapping table version 1.1

Crosswalk spreadsheet pitfalls

For many companies it is common practice to have a spreadsheet with crosswalks between the relevant standards. As the list of standards to comply with grows, so does the spreadsheet and a growing spreadsheet can easily lead to one of the following pitfalls:

  • mixing control objectives and control measures;
  • lack of canonical id's;
  • poor version management;
  • ignoring shared responsibility in cloud contexts;
  • neglecting bidirectional mappings.

Crosswalk reliability

The common pitfalls show the importance of reliable crosswalks. A good solution that ensures reliable crosswalks is the NIST IR 8477 standard. The standard is named "Developing Cybersecurity and Privacy Concept Mappings" and helps with understanding how one standard supports another and how to identify compliance gaps.

The standards achieves this by setting up an approach that is named 'Set Theory Relationship Mapping (STRM)'.

Set Theory Relationship Mapping

Definition: STRM is a relationship style derived from the branch of mathematics known as set theory. Each mapping done with this style includes both a rationale for the mapping and a relationship type.

STRM supports three options for the rationale and five relationship types for documenting the logical similarity of two concepts.

Rationale

  1. Syntactic: How similar is the wording?
  2. Semantic: How similar are the meanings of the two concepts?
  3. Functional: How similar are the results of executing the two concepts?

Relationship types

  1. Subset of
  2. Intersects with
  3. Equal
  4. Superset of
  5. No relationship

Relating the standards to risk

With the STRM approach consistent and reliable mappings can be setup between the standards. This ensures that compliancy gaps are identified and that legal obligations are met.

From here, the next challenge is to relate the objectives from all standards to the three components of risk: threats, vulnerabilities and assets.

Figure 1 from an earlier post on Enterprise Architecture models the components of risk in red and models an example of a control objective and a control measure. Both are in a group named 'Cyber security standards' which defines the the source.

Image without description
Figure 1. Cyber security risk and standards

Multiple standards generally contain multiple sets of control measures and objectives. The standards in this post for example have measures defined by ISO 27002, NIST SP 800-53r5 and ISA/IEC 62443 and all standards define control objectives.

To be able to relate the components of risk in a clean and a consistent manner, a consistent set of objectives that acts as a single source of truth is required. For ISO 27001 certified organizations an obvious choice is to use the ISMS objectives as a canonical set.

Using the control objectives from ISO 27002 as a canonical set adds more granularity to the set which makes it a better fit than the objectives of the ISMS itself. The best set covers all objectives of the ISMS and has a decent amount of granularity. ISO 27002 is often a good fit, as can be e.g. NIST SP 800-53.

Canonical control objectives

Figure 2 shows how a canonical control objective is added. This objective aggregates the objective from figure 1 and the control measure from figure 1 realizes the canonical objective. This example shows only one control, but multiple objectives are aggregated and multiple measures realize the objective.

To ensure consistency and to identify possible compliancy gaps, all aggregation and realization relationships are documented by STRM as outlined in NIST IR 8477.

Image without description
Figure 2. Cyber security risk and standards with a canonical control objective. Square brackets define the source.

Secure Controls Framework (SCF)

Choosing a canonical set that fits is a common challenge for many companies. This challenge resulted in an open source project called Secure Controls Framework.

The framework defines a canonical set of controls and maps the set to all major standards worldwide. The advantages are obvious. Having all the mappings readily available saves a lot of work.

The framework is a good example of how the security community worldwide works together. SCF is driven by a community of experts and published as an open source project.

SCF is available as a spreadsheet and all STRM mappings are available in PDF format. A small fee is required for the STRM mappings in spreadsheet format which is a minor investment considering the gain.

Besides the canonical set of controls, SCF contains a threat catalog and a risk catalog. It defines a set of control domains which are related to 'cybersecurity & data privacy by design' principles. Another set of principles is called 'data privacy management principles' which are mapped to specific privacy frameworks.

While maintaining the same high level structure as figure 1 and 2, figure 3 shows what parts are covered by SCF and how the specific SCF components relate. STRM mappings document all relationships between the canonical SCF control objective and the objectives and measures from individual standards.

Image without description
Figure 3. SCF with cyber security risk and standards. Square brackets define the source.

Other resources

The SCF solution is mentioned as an example GRC solution (Governance, Risk and Compliance). Many other solutions exist. Leading solutions like ServiceNow, Archer and MetricStream use proprietary schemas but align conceptually with OSCAL or SCF for interoperability.

OSCAL: Open Security Controls Assessment Language, a NIST initiative to modernize and automate the processes of security and compliance.

Use the AI prompt below as a starter for more information on this topic.

Prompt for Cyber security data schemas

List available data schemas that capture details from security frameworks

- framework examples:
  - iso27001
  - nist csf
- details to capture:
  - requirements
  - controls
  - assessments
  - mappings
- output a summary table with:
  - Purpose
  - Key Components
  - Format
  - Use Case
  - Open or Proprietary

Conclusion

A single canonical set of security controls can serve as a reliable source of truth amidst the growing complexity of cybersecurity standards and regulations.

Rather than treating standards as separate or competing frameworks, integrating them into one coherent control set simplifies compliancy, reduces duplication and improves manageability.

Anchoring a security program into a single, well-structured set of controls ensures consistent implementation, efficient audits and alignment with both international best practices and national regulations.

The post below on canonical controls explores in more depth how to use the SCF canonical control objectives with Enterprise Risk and Security Management (ERSM) in Archimate.


Other posts

Image without description
  • Jacco Meijer
  • |
  • Oct 14, 2025

Canonical controls with Enterprise Risk and Security Management

How to use the SCF canonical control objectives with ERSM in Archimate

Image without description
  • Jacco Meijer
  • |
  • Aug 15, 2025

Asset security

Information asset identification and classification from a security perspective

Image without description
  • Jacco Meijer
  • |
  • Aug 8, 2025

Data security

Data identification, data roles and data classification from a security perspective

Image without description
  • Jacco Meijer
  • |
  • Jul 25, 2025

Threat modeling, security frameworks and Enterprise Architecture

Combining ISO 27001, NIST CSF and threat modeling with Enterprise Architecture strengthens all elements

Image without description
  • Jacco Meijer
  • |
  • Jul 18, 2025

Threat modeling as part of a risk framework

Threat modeling in the context of ISO 27001 and NIST CSF

Image without description
  • Jacco Meijer
  • |
  • Jul 11, 2025

Cyber security risk frameworks

Managing cyber security risk with ISO 27001 and NIST CSF

Image without description
  • Jacco Meijer
  • |
  • Jun 27, 2025

NIST CSF Tiers for cyber security risk governance and management

NIST CSF 2.0 contains useful tiers for Capability Maturity Modeling in Enterprise Architecture

Image without description
  • Jacco Meijer
  • |
  • Jun 20, 2025

Archimate risk assessment elements

A few simple specializations for working with risk assessments in Archimate

Image without description
  • Jacco Meijer
  • |
  • Jun 13, 2025

Security principles in Enterprise Architecture

Adding security principles to Enterprise Architecture for NIST CSF and ISO 27001

Image without description
  • Jacco Meijer
  • |
  • Jun 6, 2025

Combining ISO 27001 and NIST CSF

How to use ISO 27001 and NIST Cyber Security Framework together

Image without description
  • Jacco Meijer
  • |
  • May 1, 2025

CISSP certification and Enterprise Architecture

How do the CISSP certification domains relate to Enterprise Architecture and the ArchiMate layers?

Image without description
  • Jacco Meijer
  • |
  • Apr 23, 2025

Architect roles in the ArchiMate context

An ArchiMate model that maps architect roles to the ArchiMate framework layers.

Image without description
  • Jacco Meijer
  • |
  • Mar 18, 2025

Visualizing IT Architecture in three languages, UML, C4 and ArchiMate

What are the differences and what are these languages most used for?

Image without description
  • Jacco Meijer
  • |
  • Feb 18, 2025

OAuth 2.0 and OpenID Connect Sequence Diagrams

Technical specs can be hard to read. While still highly technical, the UML Sequence Diagrams provided in this blog are a lot easier to understand.

Image without description
  • Jacco Meijer
  • |
  • Jan 9, 2025

OWASP and CISSP

OWASP recommendations from the independent information security certification CISSP.

Image without description
  • Jacco Meijer
  • |
  • Mar 21, 2024

UI Library with MDX documentation

Using the simple Render JSX plugin for Esbuild this post shows how to setup a simple UI library.

Image without description
  • Jacco Meijer
  • |
  • Mar 20, 2024

Render JSX plugin for Esbuild

Transform Esbuild generated JSX bundles to HTML pages.

Image without description
  • Jacco Meijer
  • |
  • Mar 19, 2024

Esbuild as a static site generator for MDX

Static site generators gain popularity. This blog is about using Esbuild as a static site generator for MDX.

Image without description
  • Jacco Meijer
  • |
  • Mar 18, 2024

11ty and Github pages

Simplifying the Contentful-Gatsby-Netlfy trio.

Image without description
  • Jacco Meijer
  • |
  • Jun 30, 2022

NPM7 and @npmcli/arborist

@npmcli/arborist is a powerful library that handles the new NPM 7 workspaces. This blog is about a simple make tool that uses the library.

Image without description
  • Jacco Meijer
  • |
  • May 12, 2022

Comparing React app, Nextjs and Gatsby

A new React project starts with a React toolchain. Main tools in the chains are SSR, React server components and GraphQL.

Image without description
  • Jacco Meijer
  • |
  • May 10, 2022

Versioning strategy for NPM modules

It is important to be able to bump the version of a NPM package without side effects.

Image without description
  • Jacco Meijer
  • |
  • Apr 12, 2022

React component themes and CSS variables

Creating React components with flexible themes by using CSS variables.

Image without description
  • Jacco Meijer
  • |
  • Mar 21, 2022

Content modeling with variants

The efficiency of a variant field in a content model.

Image without description
  • Jacco Meijer
  • |
  • Mar 12, 2022

Documentation

Documenting a software project is challenging. Here's a few simple guidelines that help a team writing clear documentation.

Image without description
  • Jacco Meijer
  • |
  • Mar 11, 2022

Javascript history

In 1986 David Ungar and Randall B. Smith developed Self at Xerox PARC. Inspired by Java, Scheme and Self Brendan Eich created Javascript in 1995.

Image without description
  • Jacco Meijer
  • |
  • Mar 10, 2022

On Javascript transpilers, bundlers and modules

There's Javascript transpilers, modules, bundles and bundlers. This is a brief overview of all of these.

Image without description
  • Jacco Meijer
  • |
  • Feb 11, 2022

Agile Scrum

The Agile Scrum framework is flexible enough to be used in many different ways. Here's one way of working.

Image without description
  • Jacco Meijer
  • |
  • Jan 20, 2022

What happened to Wheelroom?

Founded in 2018. Started to fly in 2020 and abandoned in 2021. What happened?

Image without description
  • Jacco Meijer
  • |
  • Jan 19, 2022

Contentful, Netlify and Gatsby four years later

What did we learn from using Contentful for four years?

Image without description
  • Jacco Meijer
  • |
  • Jan 18, 2022

Typescript interface for React UI components

How to define an interface for React UI components that prevents breaking changes.

Image without description
  • Jacco Meijer
  • |
  • Jan 17, 2022

Naming React components

What's in a name? A clear naming strategy helps developers communicate. Most devs rather spend time writing component code than wasting time on a good component name.