Exports · 5 min read

CIS, SOC 2 & ISO 27001 compliance mapping

Every Noxen finding maps to one or more controls in CIS Controls v8, SOC 2 Trust Services Criteria, and ISO 27001:2022 Annex A. Use the export as evidence supplement for an auditor — not as a certification claim.

Read this first

Noxen does not certify your fleet. The compliance mapping is a cross-reference: "this finding relates to these controls" — useful evidence that your vulnerability-management process is producing artefacts your auditor will recognise. Your auditor still drives the actual assessment, and many controls require evidence from sources Noxen doesn't see (HR processes, change management, encryption-at-rest configurations, etc.).

Enable the mapping

Settings → Compliance → Include mapping on exports. With the toggle on, every PDF / CSV / NDJSON export adds a compliance-references column or appendix; it's a no-op for formats that don't support extra columns (Slack/Discord webhooks).

What's mapped

CVE findings → CIS Controls v8

Exposed admin surfaces → CIS, SOC 2, ISO

Weak TLS → CIS, SOC 2, ISO

Missing security headers → mostly informational

These don't map cleanly to most compliance frameworks (CIS doesn't cover web-app headers; SOC 2 / ISO cite them indirectly under "secure configuration" controls). Noxen surfaces the relevant indirect cites where applicable but is honest that header gaps are usually a hygiene finding, not a compliance one.

CSV format

With compliance enabled, the CSV gains three columns:

cis_v8_controls,soc2_tsc_controls,iso_27001_2022_controls
"7.3, 7.4, 7.7","CC6.1, CC7.1","A.8.8, A.8.20"
"4.4, 12.6","CC6.1","A.8.20, A.8.21"

Comma-separated within each cell (RFC 4180 quoted), since one finding can map to multiple controls in the same framework. Pivot tables / SQL imports want a long-format split — easy to generate downstream.

PDF appendix

The PDF report adds a final appendix per host: a table of findings × controls. For an auditor this is the most useful view — it organises by control rather than by finding, so you can answer "what evidence do I have for ISO A.8.20?" with one lookup.

NDJSON enrichment

NDJSON exports add a compliance object to each finding event:

"compliance": {
  "cis_v8":  ["7.3", "7.4", "7.7"],
  "soc2":    ["CC6.1", "CC7.1"],
  "iso_27001_2022": ["A.8.8", "A.8.20"]
}

Useful for SIEM dashboards that group by control rather than severity ("Splunk: count CIS 7.3 findings by host over the last 30 days").

What's not covered

Frameworks that deal with physical security (CIS 1.x asset inventory of physical hardware), HR controls (SOC 2 CC1.x), board/governance items (SOC 2 CC2.x), or encryption-at-rest configurations (Noxen doesn't probe block-device encryption) aren't in Noxen's mapping. Those need separate evidence sources.