Identify the appropriate software solution for your DORA compliance needs. DORA aims to strengthen the digital operational resilience of the EU financial sector by targeting 21 types of entities. Key requirements include robust ICT risk management, incident reporting, resilience testing (TLPT for some), and third-party risk management, with an information register. DORA also establishes oversight for critical ICT service providers (CTPP).
Find the right software for your HIPAA compliance needs by comparing software capabilities, covered requirements, compliance impact, and the level of evidence the software supports. The HIPAA (Health Insurance Portability and Accountability Act of 1996) is a U.S. law that mandates national standards for protecting sensitive patient health information, known as protected health information (PHI).
Select the best software solution for your NERC CIP compliance. Compare software capabilities, covered requirements, compliance impact, and evaluate the effectiveness of the evidence provided by the software. NERC CIP (North American Electric Reliability Corporation Critical Infrastructure Protection) is a set of cybersecurity standards designed to protect the critical infrastructure of the North American electric grid.
Choose the appropriate software solution for your PCI DSS compliance. Evaluate software capabilities, covered requirements, compliance impact, and evaluate the effectiveness of the evidence provided by the software. PCI DSS (Payment Card Industry Data Security Standard) specifies technical and operational requirements established to protect cardholder data, in-scope data includes the sensitive authentication data and the primary account number (PAN).
Select the appropriate software solution for MITRE ATT&CK mitigations by comparing software capabilities and covered mitigations supported by the software. MITRE ATT&CK is a comprehensive cybersecurity knowledge base of adversary tactics and techniques, based on real-world observations.
Find the right software solution for NIST CSF guidance by comparing software capabilities and covered guidance supported by the software. The NIST Cybersecurity Framework (CSF) 2.0 is a voluntary guidance document intended to assist organizations in managing and mitigating cybersecurity risks. The framework is specifically designed to help organizations, including critical infrastructure sectors, identify, protect, detect, respond to, and recover from cyber threats and incidents.
Select the appropriate software solution for NIST SP 800-53 (LOW) control baseline by comparing software capabilities and covered controls supported by the software. The NIST SP 800-53 (LOW: Low-Impact Systems) is a comprehensive cybersecurity framework that provides guidelines and controls for federal information systems and organizations. While it is not specifically focused on critical infrastructure, it serves as a valuable resource for enhancing cybersecurity practices in critical infrastructure sectors.
Choose the appropriate software solution for NIST SSDF practices by comparing software capabilities and covered practices supported by the software. The NIST SSDF (Secure Software Development Framework) is a cybersecurity framework developed by the NIST to help organizations secure their software development processes. The framework provides guidelines and best practices to integrate security into every phase of the software development life cycle (SDLC), from design to deployment and maintenance.
Evaluate your software’s capabilities that support PCI DSS compliance
Assess your software’s features that help organizations achieve NERC CIP compliance
Review your software’s features that align with NIST CSF best practices
Evaluate your software’s features that help organizations meet NIST SSDF practices
Assess your software’s features supporting ISO/IEC 27001 compliance
Evaluate your software’s features that help organizations meet HIPAA compliance
Strategy and Risk consulting services assist critical infrastructure organizations in identifying, assessing, and mitigating potential risks through a structured approach. This enables businesses to align cybersecurity with their objectives while safeguarding assets and reputation
Cybersecurity consulting services for OT known as Operational Technology (OT), focuses on safeguarding Industrial Control Systems (ICS) that oversee critical industrial processes. These systems, including SCADA, DCS, PLCs, HMIs, and sensors, are essential in various sectors, from power generation to manufacturing and transportation
Stay up to date with the latest cybersecurity regulations, standards, frameworks, and industry best practices.
Receive updates and practical insights on the implementation of cybersecurity regulations, standards, requirements, frameworks, and best practices.
Reports and research on emerging cybersecurity frameworks, guidelines, regulations, and industry best practices to provide a comprehensive understanding of the evolving cybersecurity landscape.
Learn how organizations improve compliance with cybersecurity regulations, standards, frameworks, and best practices through our services.
Access white papers on cybersecurity regulations, standards, requirements, frameworks, and best practices.
The NIST Cybersecurity Framework (CSF) is a voluntary guidance document intended to assist organizations in managing and mitigating cybersecurity risks. The CSF provides a common taxonomy and language for understanding, assessing, prioritizing, and communicating cybersecurity risks, as well as links to additional guidance, such as existing standards, guidelines, and best practices for managing those risks.
Through our Software Compliance Testing service for NIST CSF, we assess and test vendors’ software solutions to ensure they support NIST CSF guidance. After a thorough evaluation, we feature these solutions on our website.


Compliance Testing for NIST CSF relies on credible, objective testing controls based on the intent of NIST CSF guidance. This approach incorporates insights from consultants’ perspective, and various specialists, including affected software vendors, developers, users, and industry groups, to align with organizational needs. NIST CSF compliance testing controls cover the following software controls categories:
PR.PS-06: Secure software development practices are integrated, and their performance is monitored throughout the software development life cycle. This subcategory under the Protect function emphasizes incorporating security practices throughout the software development lifecycle, aligning with DevOps principles.
GV.SC-09: Supply chain security practices are integrated into cybersecurity and enterprise risk management programs, and their performance is monitored throughout the technology product and service life cycle. This subcategory highlights the importance of considering supply chain security, which is crucial in a DevOps environment relying on various third-party tools and services.
ID.IM-02: Improvements are identified from security tests and exercises, including those done in coordination with suppliers and relevant third parties. This encourages incorporating security testing within the development process, a key aspect of DevOps security.
ID.AM: The entire category of Asset Management under the Identify function focuses on identifying and managing assets.
ID.AM-01, ID.AM-02, ID.AM-04: These subcategories explicitly mention maintaining inventories for hardware, software, services, and systems, including those provided by suppliers.
ID.AM-08: This subcategory emphasizes managing systems, hardware, software, services, and data throughout their lifecycles, crucial for a comprehensive asset inventory.
PR.AT: The Awareness and Training category under the Protect function addresses this directly.
PR.AT-01 and PR.AT-02: These subcategories highlight providing awareness and training to all personnel and those in specialized roles to ensure they are aware of cybersecurity risks and possess the necessary knowledge and skills.
PR.DS-11: Backups of data are created, protected, maintained, and tested. This subcategory emphasizes the importance of data backups and their protection.
RC.RP: The entire Incident Recovery Plan Execution category under the Recover function focuses on restoring operations after an incident.
RC.RP-03: This specifically mentions verifying the integrity of backups before using them for restoration.
GV.OC-03: Legal, regulatory, and contractual requirements regarding cybersecurity — including privacy and civil liberties obligations — are understood and managed. This addresses the need to understand and comply with relevant regulations.
GV.OV: The Oversight category focuses on reviewing cybersecurity risk management activities and using the results to make improvements, which is essential for audit and compliance.
PR.DS: This category under the Protect function focuses on managing data securely to ensure confidentiality, integrity, and availability.
PR.DS-01, PR.DS-02, PR.DS-10: These subcategories detail protecting data at rest, in transit, and in use, covering a wide range of data security scenarios.
PR.PS: The Platform Security category under the Protect function addresses securing hardware and software components.
PR.AA-06: This subcategory emphasizes managing and monitoring physical access to assets, a critical aspect of endpoint protection.
PR.PS-01, PR.PS-02, PR.PS-03: These subcategories emphasize managing configurations, maintaining software and hardware, and ensuring secure disposal, all crucial for endpoint protection.
PR.AA: This entire category focuses on managing access to physical and logical assets and ensuring that access is granted based on authorized identities and privileges.
PR.AA-01, PR.AA-02, PR.AA-03, PR.AA-04, PR.AA-05: These subcategories detail managing identities, authenticating users and devices, managing access permissions, and enforcing the principle of least privilege.
RS: The entire Respond function focuses on taking appropriate action regarding detected cybersecurity incidents.
RS.MA, RS.AN, RS.CO, RS.MI: These categories cover various aspects of incident response, from management and analysis to reporting, communication, and mitigation.
DE.CM: This category focuses on continuously monitoring assets for anomalies and indicators of compromise, a core aspect of threat detection.
PR.PS-04: This subcategory specifically mentions generating and making log records available for
continuous monitoring.
DE.AE: The Adverse Event Analysis category deals with analyzing collected data to identify and understand potential cybersecurity incidents.
PR.IR-01: Networks and environments are protected from unauthorized logical access and usage. This specifically addresses securing networks from unauthorized access.
ID.AM-03: Maintaining representations of authorized network communication and data flows can contribute to understanding and securing network activities.
ID.RA-01: Vulnerabilities in assets are identified, validated, and recorded. This is a fundamental activity in vulnerability management.
ID.RA-06: Choosing, prioritizing, and planning risk responses based on identified vulnerabilities are important parts of managing an organization’s security posture.
ID.RA: The entire Risk Assessment category focuses on understanding the organization’s cybersecurity risks.
GV.RM: The Risk Management Strategy category addresses establishing priorities, risk tolerance, and strategies for managing risk.
While the term “Software Bill Of Materials” (SBOM) is not explicitly mentioned, some subcategories relate to the concept:
ID.AM-02: Maintaining inventories of software, services, and systems can be seen as a step towards having an SBOM.
GV.SC-04 and GV.SC-07: Knowing and assessing suppliers and their products, particularly for software components, aligns with the principles of SBOM.
While not explicitly mentioned, some subcategories support the principles of Zero Trust:
PR.AA-03: Authenticating users, services, and hardware aligns with the principle of “never trust, always verify.”
PR.AA-05: Enforcing the principle of least privilege and separation of duties are core aspects of a Zero Trust approach.

Compliance Labs has developed the compliance continuous testing process as a fundamental aspect of the NIST CSF compliance testing controls. The continuous evaluation process will monitor new cybersecurity regulations and standards compliance requirements or frameworks best practices and update testing criteria to drive software compliance effectiveness and quality over the long term.

