This table shows the 24 compliance areas where ISO 27001 and NIS2 controls overlap. When you mark a control as implemented in either framework, Venvera automatically propagates the status to the equivalent control in the other.
| Compliance Area | ISO 27001 | NIS2 |
|---|---|---|
| Encryption | A.8.24 | nis2-cr-01 |
| Key Management | A.8.24 | nis2-cr-02 |
| Access Control | A.5.15 | nis2-hr-02 |
| Identity Management | A.5.16 | nis2-hr-02 |
| Authentication & MFA | A.5.17, A.8.5 | nis2-mf-01 |
| Access Rights Review | A.5.18 | nis2-hr-04 |
| Privileged Access Management | A.8.2 | nis2-hr-04 |
| Network Security | A.8.20, A.8.21, A.8.22 | nis2-ch-01 |
| Vulnerability Management | A.8.8 | nis2-ss-02 |
| Logging & Monitoring | A.8.15, A.8.16 | nis2-ea-02 |
| Incident Management | A.5.24, A.5.25, A.5.26 | nis2-ih-01 |
| Post-Incident Review | A.5.27 | nis2-ih-04 |
| Business Continuity | A.5.29, A.5.30 | nis2-bc-01 |
| Backup & Restoration | A.8.13 | nis2-bc-02 |
| Third-Party Risk Management | A.5.19, A.5.20 | nis2-sc-01 |
| Supplier Due Diligence | A.5.21 | nis2-sc-02 |
| Supplier Contracts | A.5.20 | nis2-sc-03 |
| Supplier Monitoring | A.5.22 | nis2-sc-04 |
| Risk Assessment | A.5.7 | nis2-ra-02, nis2-ra-03 |
| Information Security Policy | A.5.1 | nis2-ra-01 |
| Security Awareness & Training | A.6.3 | nis2-ch-02 |
| Change Management | A.8.32 | nis2-ss-04 |
| Secure Development | A.8.25, A.8.28 | nis2-ss-03 |
| Security Testing | A.5.35 | nis2-ea-01 |
For details on how propagation works, thresholds, and the auto-mapped badge, see the Cross-Framework Control Propagation overview article.