Skip to main content

Compliance Frameworks

Detailed information about the compliance frameworks supported by Securtea

frameworksCISNISTSOC 2ISO 27001

Compliance Frameworks

Securtea supports multiple industry-standard security frameworks. Each framework provides a structured approach to evaluating your Microsoft 365 security posture.

CIS Microsoft 365 Foundations Benchmark

Overview

The Center for Internet Security (CIS) Microsoft 365 Foundations Benchmark is a consensus-driven security configuration guide developed by security experts worldwide.

Themes

The CIS benchmark organizes controls into themes:

ThemeFocus Area
Account & AuthenticationIdentity protection, MFA, password policies
Application PermissionsOAuth apps, consent policies, API access
Data ManagementDLP policies, information protection
Email SecurityAnti-phishing, anti-malware, mail flow
AuditingLogging, monitoring, alerts

Control Examples

  • Enable MFA for all privileged accounts
  • Block legacy authentication protocols
  • Configure anti-phishing policies
  • Enable audit log search
  • Restrict external sharing

Version Support

Securtea aligns with the latest CIS benchmark version and updates controls as new versions are released.

NIST 800-53

Overview

NIST Special Publication 800-53 provides a catalog of security and privacy controls for federal information systems. It's widely adopted beyond government organizations.

Control Families

NIST 800-53 organizes controls into families:

FamilyCodeFocus
Access ControlACWho can access what
Audit & AccountabilityAULogging and monitoring
Configuration ManagementCMSystem configurations
Identification & AuthenticationIAIdentity verification
Incident ResponseIRSecurity incident handling
System ProtectionSCTechnical safeguards

M365 Mapping

Not all NIST controls apply to Microsoft 365. Securtea maps applicable controls:

  • AC-2: Account Management → M365 user lifecycle
  • AC-3: Access Enforcement → Conditional Access policies
  • AU-2: Audit Events → Unified audit log
  • IA-2: Identification → MFA configuration

Impact Levels

NIST defines three impact levels:

LevelRequirements
LowBasic security controls
ModerateEnhanced security controls
HighMaximum security controls

Securtea assesses against moderate baseline by default.

SOC 2

Overview

SOC 2 (Service Organization Control 2) is an auditing standard developed by AICPA for service providers storing customer data in the cloud.

Trust Services Criteria

SOC 2 evaluates five trust services criteria:

CriteriaFocus
SecurityProtection against unauthorized access
AvailabilitySystem uptime and accessibility
Processing IntegrityAccurate and authorized processing
ConfidentialityProtection of confidential information
PrivacyPersonal information handling

M365 Controls

Securtea maps M365 configurations to SOC 2 criteria:

Security (CC)

  • Conditional Access policies
  • MFA enforcement
  • Data Loss Prevention

Availability (A)

  • Service health monitoring
  • Backup configurations

Confidentiality (C)

  • Information protection labels
  • External sharing restrictions

Type I vs Type II

  • Type I: Point-in-time assessment (design effectiveness)
  • Type II: Period assessment (operating effectiveness)

Securtea supports Type I assessments. Type II requires additional audit evidence over time.

ISO 27001

Overview

ISO/IEC 27001 is an international standard for information security management systems (ISMS). It provides a framework for managing sensitive information.

Annex A Controls

ISO 27001:2022 Annex A contains 93 controls across four themes:

ThemeControl CountFocus
Organizational37Policies, roles, responsibilities
People8HR security, awareness
Physical14Facility security
Technological34Technical controls

M365 Mapping

Securtea focuses on technological controls applicable to M365:

  • A.5.15: Access control
  • A.5.17: Authentication information
  • A.8.2: Privileged access rights
  • A.8.5: Secure authentication
  • A.8.15: Logging
  • A.8.16: Monitoring activities

Certification Support

While Securtea doesn't provide ISO certification, assessment results support your certification efforts by:

  • Documenting technical control implementation
  • Providing evidence for auditors
  • Identifying gaps before certification audits

Framework Comparison

Coverage Overlap

Many controls overlap across frameworks:

Control AreaCISNISTSOC 2ISO
MFA
Audit Logging
Access Control
Data Protection
Incident Response-

Choosing a Framework

If You NeedConsider
Detailed M365 guidanceCIS
U.S. federal complianceNIST
Customer trust reportsSOC 2
International certificationISO 27001

Running Multiple Frameworks

You can assess against multiple frameworks simultaneously. Benefits include:

  • Efficiency: One data collection, multiple evaluations
  • Cross-mapping: See which controls satisfy multiple frameworks
  • Comprehensive coverage: No gaps between frameworks

Framework Updates

Version Management

Securtea maintains framework versions:

  • Current: Latest supported version
  • Legacy: Previous versions (limited support)
  • Preview: Upcoming versions for early adoption

Update Process

When frameworks release new versions:

  1. Securtea evaluates changes
  2. New controls are mapped to M365
  3. Version is released with release notes
  4. Historical comparisons remain available

Custom Frameworks

Enterprise customers can request custom framework support:

  • Industry-specific frameworks
  • Internal security standards
  • Regulatory requirements

Contact your account manager to discuss custom framework development.

What's Next?

Global Search

Search for pages, settings, and documentation