This table shows the 25 compliance areas where CMMC 2.0 and ISO 27001 controls overlap. When you mark a control as implemented in either framework, Venvera automatically propagates the status to the equivalent control in the other.

Compliance AreaCMMC 2.0ISO 27001
Access Control PolicyAC.L2-3.1.1, AC.L2-3.1.2A.5.15, A.8.3
Least PrivilegeAC.L2-3.1.5, AC.L2-3.1.6A.8.2
Remote AccessAC.L2-3.1.12, AC.L2-3.1.14A.8.20, A.6.7
Wireless AccessAC.L2-3.1.16, AC.L2-3.1.17A.8.20, A.8.21
Session ControlsAC.L2-3.1.10, AC.L2-3.1.11A.8.5
Authentication & MFAIA.L2-3.5.3, IA.L2-3.5.4A.5.17, A.8.5
Identifier ManagementIA.L2-3.5.1, IA.L2-3.5.2A.5.16
Security Awareness & TrainingAT.L2-3.2.1, AT.L2-3.2.2A.6.3
Insider Threat AwarenessAT.L2-3.2.3A.6.3, A.6.6
Audit LoggingAU.L2-3.3.1, AU.L2-3.3.2A.8.15
Audit Review & ReportingAU.L2-3.3.5, AU.L2-3.3.6A.8.15, A.8.16
Configuration ManagementCM.L2-3.4.1, CM.L2-3.4.2A.8.9
Change ControlCM.L2-3.4.3, CM.L2-3.4.4A.8.32
Incident ResponseIR.L2-3.6.1, IR.L2-3.6.2A.5.24, A.5.25, A.5.26
Incident ReportingIR.L2-3.6.3A.5.24, A.5.27
Maintenance ControlsMA.L2-3.7.1, MA.L2-3.7.2A.7.13, A.8.9
Media ProtectionMP.L2-3.8.1, MP.L2-3.8.2A.7.10, A.8.10
Media SanitizationMP.L2-3.8.3A.7.10, A.8.10
Physical ProtectionPE.L2-3.10.1, PE.L2-3.10.2A.7.1, A.7.2
Personnel SecurityPS.L2-3.9.1, PS.L2-3.9.2A.6.1, A.6.5
Risk AssessmentRA.L2-3.11.1, RA.L2-3.11.2A.5.7
Vulnerability ManagementRA.L2-3.11.2, RA.L2-3.11.3A.8.8
Security AssessmentCA.L2-3.12.1, CA.L2-3.12.3A.5.35
Boundary ProtectionSC.L2-3.13.1, SC.L2-3.13.5A.8.20, A.8.22
EncryptionSC.L2-3.13.8, SC.L2-3.13.11A.8.24
ℹ️
For details on how propagation works, thresholds, and the auto-mapped badge, see the Cross-Framework Control Propagation overview article.