This table shows the 24 compliance areas where ISO 27001 and SOC 2 controls overlap. When you mark a control as implemented in either framework, Venvera automatically propagates the status to the equivalent control in the other.
| Compliance Area | ISO 27001 | SOC 2 |
|---|---|---|
| Encryption | A.8.24 | CC6.1, CC6.7 |
| Access Control | A.5.15 | CC6.1 |
| Identity Management | A.5.16 | CC6.2 |
| Authentication & MFA | A.5.17, A.8.5 | CC6.1, CC6.3 |
| Access Rights Review | A.5.18 | CC6.2, CC6.3 |
| Privileged Access Management | A.8.2 | CC6.3 |
| Network Security | A.8.20, A.8.21, A.8.22 | CC6.6 |
| Vulnerability Management | A.8.8 | CC7.1 |
| Logging & Monitoring | A.8.15, A.8.16 | CC7.1, CC7.2 |
| Incident Management | A.5.24, A.5.25, A.5.26 | CC7.3, CC7.4 |
| Business Continuity | A.5.29, A.5.30 | A1.1, A1.2 |
| Backup & Restoration | A.8.13 | A1.2 |
| Third-Party Risk Management | A.5.19, A.5.20 | CC9.2 |
| Supplier Due Diligence | A.5.21 | CC9.2 |
| Risk Assessment | A.5.7 | CC3.2 |
| Information Security Policy | A.5.1 | CC1.1 |
| Security Awareness & Training | A.6.3 | CC1.4 |
| Data Classification | A.5.12, A.8.10, A.8.12 | CC6.5, C1.1 |
| Change Management | A.8.32 | CC8.1 |
| Secure Development | A.8.25, A.8.28 | CC8.1 |
| Security Testing | A.5.35 | CC4.1 |
| Record Keeping | A.8.15 | CC7.2 |
| Configuration Management | A.8.9 | CC6.1 |
| Malware Protection | A.8.7 | CC6.8 |
For details on how propagation works, thresholds, and the auto-mapped badge, see the Cross-Framework Control Propagation overview article.