Controls library · 7 frameworks · 10 control domains
Every product we sell is mapped to NIST 800-53, ISO 27001, SOC 2, NIS2, CMMC, and CIS Controls v8. Use this library to justify hardware purchases against your audit requirements or build a compliant stack from scratch.
Supported frameworks
Browse controls by framework, or scroll down to see the full cross-framework mapping.
NIST SP 800-53 Rev 5
Security and privacy controls for federal information systems. Baseline for FedRAMP, DoD, and regulated US industries. The most granular US control catalog.
Federal agencies, defense contractors, FedRAMP ISVs
View 10 controlsNIST Cybersecurity Framework 2.0
Voluntary risk management framework widely adopted by US enterprises. Updated in 2024 to add a Govern function and expand supply chain guidance.
All US organizations, increasingly global
View 10 controlsISO/IEC 27001:2022
International standard for information security management systems. Globally recognized certification. 2022 revision reorganized Annex A controls around four themes.
Global enterprises, EU market, APAC, financial services
View 10 controlsSOC 2 (AICPA Trust Services Criteria)
AICPA audit standard for service organizations. Enterprise buyers increasingly require SOC 2 Type II. Five Trust Services Criteria: Security, Availability, Processing Integrity, Confidentiality, Privacy.
SaaS providers, cloud services, B2B service organizations
View 10 controlsEU NIS2 Directive (2022/2555)
EU mandatory cybersecurity directive for essential and important entities. Effective October 2024. Covers endpoint security, supply chain, incident response, and management accountability.
EU-operating organizations in energy, transport, health, finance, digital infrastructure
View 10 controlsCybersecurity Maturity Model Certification 2.0
DoD certification required for all prime and sub-contractors handling CUI. Level 2 maps to NIST 800-171. Hardware controls are a key differentiator in assessments.
US defense industrial base, DoD prime and sub-contractors
View 10 controlsCIS Critical Security Controls v8
Prioritized set of cybersecurity best practices. Three implementation groups mapped to organization size. Widely used as a practical baseline independent of regulatory requirement.
All organizations, security teams, SMBs
View 10 controlsCross-framework control mapping
One security concern, mapped across every framework we support.
Each row is a security domain our hardware addresses. Columns show the equivalent control ID in each framework. Use this to satisfy multiple audit requirements with a single hardware purchase.
Control domain details
What each domain covers and which products satisfy it.
Phishing-resistant MFA using hardware security keys. Software TOTP and SMS are explicitly excluded from "phishing-resistant" in NIST 800-63B and most modern framework guidance.
Products that satisfy this control:
Hardware-bound key generation and storage. Private keys generated and stored inside a certified secure element (EAL 6+) and are non-exportable by design.
Products that satisfy this control:
Hardened mobile OS with per-app sensor controls, verified boot, and no background telemetry. Satisfies mobile device management and bring-your-own-device security requirements.
Products that satisfy this control:
Measured boot chain verified on every power-on. Any firmware modification — supply chain implant, evil-maid attack, or malicious update — fails attestation before the OS loads.
Products that satisfy this control:
VM-level compartmentalization means a compromise of one domain (e.g. browser) cannot reach another (e.g. keys, vault). No other consumer laptop provides this by default.
Products that satisfy this control:
Stateful firewall with IPS at the network perimeter. All inbound/outbound traffic inspected with Suricata rule sets. VPN gateway replaces consumer VPN dependency.
Products that satisfy this control:
Hardware-encrypted storage and self-hosted file servers replace cloud storage with hardware you control. Encryption keys never leave your environment.
Products that satisfy this control:
Open-source firmware is publicly auditable and reproducibly built. EU jurisdiction hardware is not subject to US National Security Letters. Directly addresses hardware supply chain risk in CMMC and NIS2.
Rated safes and vaults protect physical assets, documents, and hardware backups. UL-certified fire and burglary ratings provide auditable physical security controls.
Products that satisfy this control:
Verified boot ensures the TLS stack is unmodified before communication. VPN gateway encrypts all remote access traffic. Hardware-backed keys prevent interception even if endpoints are observed.
Products that satisfy this control: