COMPLIANCE

Every framework, one platform

Map your security controls to 15+ regulatory and industry frameworks simultaneously. Achieve continuous compliance with automated evidence collection and real-time dashboards.

General SecurityBest Practices

CIS v8.1

CIS Controls v8.1

The Center for Internet Security Controls provide a prioritized set of actions that collectively form a defense-in-depth approach to mitigate the most common attacks against systems and networks.

FinancialPayment Security

PCI-DSS 4.0

PCI-DSS 4.0

The Payment Card Industry Data Security Standard ensures that all companies that accept, process, store, or transmit credit card information maintain a secure environment.

InternationalISMS

ISO 27001

ISO/IEC 27001:2022

The international standard for information security management systems (ISMS), providing a systematic approach to managing sensitive company information.

US GovernmentRisk Management

NIST CSF 2.0

NIST Cybersecurity Framework 2.0

The NIST Cybersecurity Framework provides a comprehensive taxonomy of outcomes for managing cybersecurity risk, organized around six core functions.

AuditTrust Services

SOC 2

SOC 2 Type II

SOC 2 is an auditing procedure developed by the AICPA that ensures service providers securely manage data to protect the interests of the organization and the privacy of its clients.

HealthcarePrivacy

HIPAA

HIPAA Security Rule

The Health Insurance Portability and Accountability Act establishes national standards to protect sensitive patient health information from being disclosed without consent.

EUData Privacy

GDPR

General Data Protection Regulation

The EU regulation on data protection and privacy for all individuals within the European Union and the European Economic Area, governing the export of personal data.

FinancialCorporate Governance

SOX

Sarbanes-Oxley Act

SOX mandates specific IT controls and reporting requirements to protect shareholders and the public from accounting errors and fraudulent practices.

US DefenseSupply Chain

CMMC

Cybersecurity Maturity Model Certification

CMMC is the DoD framework requiring defense contractors to implement cybersecurity standards and practices to protect controlled unclassified information (CUI).

US GovernmentCloud Security

FedRAMP

Federal Risk and Authorization Management Program

FedRAMP provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services used by US federal agencies.

EUFinancialOperational Resilience

DORA

Digital Operational Resilience Act

The EU regulation ensuring financial entities can withstand, respond to, and recover from all types of ICT-related disruptions and threats.

EUCritical Infrastructure

NIS2

Network and Information Security Directive 2

The updated EU directive establishing a high common level of cybersecurity across the EU, expanding scope to more sectors and introducing stricter requirements.

GovernanceIT Management

COBIT

COBIT 2019

COBIT is ISACA's framework for the governance and management of enterprise IT, providing a comprehensive set of controls and best practices for aligning IT with business objectives.

USData Privacy

CCPA

California Consumer Privacy Act

The CCPA grants California consumers rights over their personal information and imposes data protection obligations on businesses that collect, sell, or share consumer data.

Cloud SecurityPosture Management

CSPM

Cloud Security Posture Management

CSPM encompasses the practices and tooling for continuous monitoring of cloud infrastructure to identify misconfigurations, compliance violations, and security risks across cloud environments.

Simplify compliance across every framework

See how Furix AI automates compliance mapping, evidence collection, and audit reporting for your organization.