Quick Reference
NIST CSF = voluntary framework with 5 functions (Identify, Protect, Detect, Respond, Recover). ISO 27001 = international standard for an Information Security Management System (ISMS) — you can get certified. SOC 2 = third-party audit of a service org's controls (Type 1 = design at a point in time; Type 2 = operating effectiveness over time). CMMC = US DoD contractor requirement with tiered levels. CIS Controls = 18 prioritized best-practice controls with Implementation Groups. Frameworks guide what to do; regulations legally mandate it.

Frameworks vs. Regulations — Know the Difference

This distinction trips up many Security+ candidates. A framework is a structured set of guidelines and best practices that organizations voluntarily adopt to improve their security posture. A regulation (or law) is a legal requirement that mandates specific controls, with penalties for non-compliance.

TypeExampleMandatory?Who Enforces?
FrameworkNIST CSF, ISO 27001, CIS ControlsNo (unless contractually required)No government enforcer — industry or client pressure
Regulation / LawHIPAA, GDPR, PCI-DSS, SOXYes — legally requiredGovernment agencies, regulators, card brands
HybridCMMC, FedRAMPYes — for specific contractsUS DoD, US federal agencies

An organization can use NIST CSF to structure its security program without any legal obligation to do so. But HIPAA compliance is required by US law for covered healthcare entities — there's no opting out. CMMC sits in a middle category: it's not universal law, but it's a contractual requirement to work with the US Department of Defense.

NIST Cybersecurity Framework (CSF)

The NIST CSF was originally published in 2014 in response to a Presidential Executive Order and updated to version 2.0 in 2024. It provides a common language for managing and communicating cybersecurity risk. While originally aimed at critical infrastructure, it's now used across all sectors and is the most referenced framework on the Security+ exam.

The CSF is organized around five core functions. Think of them as the lifecycle of how an organization manages a cyber risk:

🔍
Identify
Asset management, risk assessment, governance — know what you have and what threatens it
🛡️
Protect
Access control, training, data security, maintenance — implement safeguards
📡
Detect
Anomaly detection, continuous monitoring, security event monitoring
🚨
Respond
Incident response planning, communications, analysis, mitigation
🔄
Recover
Recovery planning, improvements, communications after an incident
📝 Exam Tip — NIST CSF Function Order

Remember the sequence: Identify → Protect → Detect → Respond → Recover. A common exam trap is to put "Detect" before "Protect" or to confuse "Respond" with "Recover." Respond = actions taken during/immediately after an incident. Recover = getting systems back to normal operation and learning from the event.

NIST CSF version 2.0 added a sixth function — Govern — which sits above all five and covers organizational cybersecurity strategy, roles, policies, and oversight. CSF 2.0 also expanded its applicability beyond critical infrastructure and added supply chain risk management guidance. The exam currently focuses on the five original functions, but be aware version 2.0 exists.

ISO 27001

ISO 27001 is the international standard for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS). Published by the International Organization for Standardization (ISO), it's a certifiable standard — an organization can hire an accredited third-party auditor and receive official ISO 27001 certification, demonstrating to customers and partners that their ISMS meets the standard.

ConceptWhat It Means
ISMSInformation Security Management System — the overall framework of policies, procedures, and controls for managing information security risk
Annex AISO 27001's reference set of 93 controls organized into 4 themes: Organizational, People, Physical, and Technological
CertificationThird-party audit confirms compliance — organizations can become officially "ISO 27001 certified"
ISO 27002Companion document that provides implementation guidance for the Annex A controls
Risk-basedOrganizations define their own risk appetite and select controls appropriate to their specific context

The key thing to know about ISO 27001 for the exam: it's a management system standard, not a technical checklist. It focuses on establishing the right processes, policies, and oversight — and then continuously improving them. This makes it different from NIST CSF, which provides a more tactical framework of functions and categories.

SOC 2

SOC 2 (System and Organization Controls 2) is a third-party audit standard developed by the American Institute of CPAs (AICPA). It's specifically designed for service organizations — companies that store, process, or transmit customer data on behalf of other businesses (think cloud providers, SaaS companies, managed service providers).

SOC 2 audits assess controls against five Trust Service Criteria (TSC): Security (required), Availability, Processing Integrity, Confidentiality, and Privacy. The Security criterion is always included; organizations choose which additional criteria are relevant.

⚠️ Type 1 vs Type 2 — Exam Favorite

SOC 2 Type 1: Auditor assesses whether controls are designed appropriately at a specific point in time. Think: "do these controls look good on paper today?"

SOC 2 Type 2: Auditor assesses whether controls are operating effectively over a period of time (typically 6–12 months). Think: "did these controls actually work consistently?" Type 2 is more rigorous and more meaningful to customers.

SOC 2 reports are commonly requested by enterprise customers as part of vendor due diligence. When a company asks a SaaS vendor for their SOC 2 report, they want evidence of security controls — particularly a Type 2 report, which shows the controls actually worked over time rather than just being in place on audit day.

CMMC — Cybersecurity Maturity Model Certification

CMMC is a US Department of Defense framework that sets cybersecurity requirements for organizations in the Defense Industrial Base (DIB) — any company or contractor working with the DoD. Unlike NIST CSF, CMMC compliance is mandatory for DoD contracts.

1️⃣
Level 1 — Foundational
17 basic cybersecurity practices. Annual self-assessment. Covers Federal Contract Information (FCI). Based on FAR clause 52.204-21.
2️⃣
Level 2 — Advanced
110 practices aligned with NIST SP 800-171. Covers Controlled Unclassified Information (CUI). Most contracts require third-party certification (C3PAO) at this level.
3️⃣
Level 3 — Expert
Based on NIST SP 800-172. For the most sensitive DoD programs. Government-led assessment required. Focuses on advanced persistent threats.
💡 Key Terms

FCI = Federal Contract Information — information provided by or generated for the government under contract. CUI = Controlled Unclassified Information — sensitive government information that isn't classified but still needs protection. CMMC Level 2 is primarily about protecting CUI. C3PAO = CMMC Third Party Assessment Organization — accredited organizations that perform CMMC assessments.

CIS Controls

The Center for Internet Security (CIS) publishes the CIS Controls — currently version 8 — a prioritized set of 18 controls that represent the most effective defensive actions organizations can take. Unlike ISO 27001's risk-based selection approach, CIS Controls are ranked by impact: implementing the first few controls stops a large percentage of real-world attacks.

ControlsImplementation GroupTarget Organization
IG1 (Controls 1–6 emphasis)Basic Cyber HygieneSmall organizations with limited IT/security resources — the essential minimum
IG2 (IG1 + more)FoundationalMedium organizations with some dedicated IT staff — handles sensitive data
IG3 (IG1 + IG2 + more)OrganizationalLarge or mature organizations with dedicated security teams facing sophisticated threats

The top 6 CIS Controls — often called "basic cyber hygiene" — cover: inventory of enterprise assets, inventory of software assets, data protection, secure configuration of assets, account management, and access control management. Research from CIS suggests that fully implementing just these six controls can prevent the majority of common attacks.

Key Regulations to Know

These aren't frameworks — they're laws and regulatory requirements. The Security+ exam expects you to recognize each one and understand what it protects.

RegulationFull NameWhat It ProtectsWho It Applies To
HIPAAHealth Insurance Portability and Accountability ActProtected Health Information (PHI)US healthcare providers, insurers, and their business associates
GDPRGeneral Data Protection RegulationPersonal data of EU residentsAny organization that processes EU residents' data — regardless of where the org is based
PCI-DSSPayment Card Industry Data Security StandardCardholder dataAny entity that stores, processes, or transmits credit/debit card data
SOXSarbanes-Oxley ActFinancial reporting integrityUS publicly traded companies and their auditors
GLBAGramm-Leach-Bliley ActFinancial information of consumersUS financial institutions (banks, insurance companies)
FERPAFamily Educational Rights and Privacy ActStudent education recordsUS educational institutions receiving federal funding
📝 GDPR Specifics for the Exam

Data breach notification: GDPR requires notification to the supervisory authority within 72 hours of becoming aware of a breach. Right to be forgotten: individuals can request deletion of their personal data. Data Protection Officer (DPO): certain organizations must appoint a DPO. Data Processing Agreement (DPA): required when sharing data with third-party processors. GDPR applies to EU residents' data even if the processing company is in the US.

Exam Scenarios

A company wants to demonstrate to enterprise customers that its cloud platform's security controls have been operating effectively for the past year. What should it obtain?
SOC 2 Type 2 report. Type 2 covers a period of time and assesses whether controls operated effectively, not just whether they exist. Enterprise customers specifically ask for Type 2 because it's much stronger evidence of security maturity than Type 1 (which only shows design at a point in time).
An organization is in the "Respond" phase of the NIST CSF. An incident has been contained. What is the NEXT function they should move to?
Recover. The NIST CSF functions in order are Identify → Protect → Detect → Respond → Recover. After an incident has been responded to (contained, eradicated), the organization moves to recovery — restoring systems to normal operation, implementing improvements, and communicating with stakeholders.
A defense contractor handling Controlled Unclassified Information must comply with which framework as a condition of their DoD contract?
CMMC Level 2. CMMC Level 2 is specifically designed for organizations handling CUI. It aligns with NIST SP 800-171 (110 practices) and typically requires a third-party assessment from a C3PAO. CMMC compliance is a contractual requirement — not optional — for DoD work involving CUI.
A US hospital experiences a ransomware attack that encrypts patient health records. Which regulation determines the notification requirements?
HIPAA. HIPAA's Breach Notification Rule requires covered entities to notify affected individuals within 60 days of discovering a breach of unsecured PHI. If more than 500 residents of a state are affected, media notification is also required. The HHS Office for Civil Rights must also be notified — immediately for large breaches, or within 60 days for smaller ones.

Related Articles