tatersecurity.com Open App

Frameworks & Standards

Map your compliance controls to NIST 800-53, ISO 27001, SOC 2, PCI-DSS, HIPAA, CIS Benchmarks, DISA STIGs, and MITRE ATT&CK. Build custom frameworks and track cross-standard mapping.

TATER Frameworks page showing framework list with compliance scores and control mappings

Supported Frameworks

TATER supports the following compliance frameworks and standards out of the box:

FrameworkDescriptionControl Count
CIS Microsoft 365Center for Internet Security M365 Foundations Benchmark200+
CISA SCuBASecure Cloud Business Applications baselines for M365150+
DISA STIGsDefense Information Systems Agency Security Technical Implementation Guides100+
NIST 800-53Security and Privacy Controls for Information SystemsCross-mapped
ISO 27001Information Security Management Systems (Annex A controls)Cross-mapped
SOC 2Trust Services Criteria (Security, Availability, Processing Integrity, Confidentiality, Privacy)Cross-mapped
PCI-DSSPayment Card Industry Data Security StandardCross-mapped
HIPAAHealth Insurance Portability and Accountability ActCross-mapped
MITRE ATT&CKAdversarial Tactics, Techniques, and Common KnowledgeCross-mapped
Direct vs. Cross-Mapped

CIS, CISA SCuBA, and DISA STIGs are directly evaluated by TATER's scan engine. Other frameworks (NIST, ISO, SOC 2, PCI-DSS, HIPAA) are cross-mapped, meaning their compliance posture is derived from the results of directly-evaluated controls.

Standards Detail View

Click any standard from the Frameworks page to open the Standards Detail view, which provides a deep dive into compliance against that specific standard:

TATER Controls page showing unified control view with framework mappings

Section-Level Mapping

Each standard is broken into sections (e.g., NIST 800-53 control families like AC, AU, IA). For each section, the detail view shows:

  • Section title and description
  • Number of controls mapped to that section
  • Compliance percentage (pass rate within the section)
  • List of individual controls with their current status

AI-Powered Narratives

TATER generates narrative summaries for each standard section describing your compliance posture in plain language. These narratives are stored per-organization using the Comments API with targetType: 'standard-narrative'.

  • Narratives explain what the section covers and how your organization meets (or does not meet) the requirements
  • Narratives can be edited manually to add organization-specific context
  • Updated automatically when scan results change, with manual edits preserved

Cross-Standard Mapping

Controls often satisfy requirements across multiple standards. The cross-mapping view shows:

  • Which controls from your primary framework (e.g., CIS) map to controls in secondary frameworks (e.g., NIST, ISO)
  • Coverage gaps where a secondary framework has requirements not covered by existing controls
  • Overlap analysis showing how many controls serve double or triple duty across frameworks

MITRE ATT&CK Mapping

Controls are mapped to MITRE ATT&CK techniques to provide visibility into defensive coverage against known adversary behaviors:

  • Tactic groups: Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Exfiltration, Command and Control, Impact
  • Technique badges: Each mapped control displays its associated ATT&CK technique ID (e.g., T1078, T1110)
  • Coverage heatmap: Visual representation of which techniques have passing controls vs. gaps
  • Gap analysis: Identify techniques with no passing controls, indicating defensive blind spots

Risk Scoring

Each control is assigned a weighted risk score based on its severity, framework importance, and environmental context:

  • Base score: Derived from the control's severity level (Critical, High, Medium, Low)
  • Framework weight: Controls mapped to more frameworks receive higher risk weights
  • Environmental factor: Adjusted based on your organization's specific risk profile and primary applications
  • Aggregate risk: The total risk score across all failing controls is displayed on the dashboard

SLA Tracking

SLA tracking monitors remediation timelines for failing controls based on their severity:

SeverityDefault SLAWarning Threshold
Critical24 hours12 hours before deadline
High7 days48 hours before deadline
Medium30 days7 days before deadline
Low90 days14 days before deadline

SLA deadlines can be customized per organization in Organization Settings. The dashboard SLA summary widget shows within-SLA, warning, and breached counts.

Custom Frameworks

Build your own compliance frameworks tailored to your organization's specific requirements:

Building a Custom Framework

  1. Navigate to the Custom Frameworks page in the GRC section
  2. Click New Framework to open the framework builder
  3. Define framework metadata: name, description, version, authority
  4. Add domains by dragging and dropping or creating new ones
  5. Define controls within each domain, including threshold definitions for the V2 evaluation engine
  6. Map custom controls to existing standard frameworks (CIS, NIST, ISO) for cross-reference

Import & Export

Custom frameworks can be shared across organizations via JSON export/import:

  • Export: Download the framework definition as a JSON file for distribution
  • Import: Upload a JSON framework file to add it to your organization
  • MSP distribution: Managed Service Providers can create standardized frameworks and distribute them to all client organizations

Vulnerability Frameworks

TATER treats vulnerability data as a separate framework category. The Framework Category Filter on the Controls page allows toggling between:

  • All Categories: Shows both compliance and vulnerability controls
  • Compliance: Traditional compliance controls (CIS, NIST, ISO, etc.)
  • Vulnerability: Vulnerability-derived controls (MDE-VULN, CISA-KEV)

Vulnerability frameworks use the VULN-MGMT authority and isVuln: true flag to distinguish them from compliance frameworks.

Two-Tier Visibility

Frameworks, standards, and controls follow a two-tier visibility model:

  • Default items (isDefault=true): Visible to every organization, editable only by SuperAdmin
  • Organization items (organizationId set): Visible only to that organization, editable by OrgAdmin+ or SuperAdmin
  • GET queries return the union of both default and org-specific items
  • Org-specific items with matching IDs override default items