Home/Compliance Framework Mapping
Compliance Ready

Compliance Framework Mapping

FixMyCert content mapped to industry standards and regulatory requirements. Find exactly what you need for your next audit.

How to Use This Page

1

Find your compliance framework below

2

Locate the specific requirement

3

Click linked FixMyCert content

4

Use as-is or customize for your environment

Enterprise customers: Your customizations inherit these mappings automatically.

What This Mapping Provides

This page maps FixMyCert guides and runbooks to specific controls as supporting evidence and implementation guidance. It does not represent full compliance coverage.

Scope: Cryptography, TLS, PKI, and certificate lifecycle portions of each framework only.

Your organization's internal policies, procedures, and approval workflows complete the compliance picture. FixMyCert provides the operational HOW - your policies define the WHAT and WHO.

The Two-Layer Model

LayerContainsProvided By
Your Enterprise LayerInternal policies, control IDs, owners, reviewers, approval datesYour organization
FixMyCert Base LayerOperational guides, runbooks, platform configurations, proceduresFixMyCert

Together = Audit-Ready

When an auditor asks "Show me how you manage certificate key compromise," you provide:

  1. Your Key Management Policy (defines the requirement)
  2. FixMyCert's Key Compromise Response Runbook (documents the procedure)
  3. Evidence of execution (incident tickets, change records)

PCI DSS 4.0

Payment Card Industry Data Security Standard

For organizations handling credit card data. Focus areas: encryption in transit, key management, certificate lifecycle.

Scope: Requirements 3.5-3.7 (key management) and 4.2 (transmission encryption) as they relate to TLS certificates and PKI operations.

4.2.1

Strong cryptography for PAN transmission

4.2.1.1

Trusted certificates for PAN transmission

4.2.1.2

Valid, unexpired certificates

4.2.2

PAN secured with strong cryptography

3.6.1

Key management procedures documented

3.7.1

Key generation procedures

3.7.2

Secure key distribution

3.7.5

Key retirement/replacement

3.7.6

Split knowledge for manual keys

3.7.7

Prevent unauthorized key substitution

12.3.3

Cryptographic cipher inventory

SOC 2 Type II

Trust Services Criteria

For service organizations. Focus areas: security controls, encryption, access management.

Scope: CC6.x (logical access via certificates, transmission security) and CC7.x/CC8.x (monitoring, incident response) as they relate to TLS and PKI.

CC6.1

Logical access security

CC6.6

Encryption of data in transit

CC6.7

Transmission security

CC7.1

Configuration management

A1.2

Recovery procedures

ISO 27001:2022

Information Security Management

International standard for information security. Annex A controls relevant to cryptography and PKI.

Scope: Annex A controls A.8.24 (cryptography), A.8.20/A.8.21 (network/web security), and A.8.9 (configuration) as they apply to certificates and TLS.

A.8.20

Networks security

A.8.21

Web services security

A.8.9

Configuration management

A.5.37

Documented operating procedures

NIST Cybersecurity Guidelines

U.S. Federal Standards

U.S. federal standards widely adopted in private sector.

Scope: Key management (SP 800-57), TLS configuration (SP 800-52), and algorithm transitions (SP 800-131A) as they apply to PKI operations.

NIST SP 800-57 (Key Management)

Part 1, §5.2

Cryptoperiods

Part 1, §5.3

Key states

Part 1, §6.1

Key generation

Part 1, §8.1

Key compromise

Part 1, §8.3

Key revocation

NIST SP 800-52 (TLS Guidelines)

§3.1

TLS version requirements

§3.2

Server certificate requirements

§3.3

Cipher suite requirements

§3.4

Extensions (SNI, OCSP)

NIST SP 800-131A (Transitioning Crypto)

Algorithm transitions

Deprecated algorithms

Key length requirements

Minimum key sizes

CIS Controls v8

Center for Internet Security

Prioritized security controls for cyber defense.

Scope: Controls related to encryption in transit, network infrastructure, and cryptographic resources.

3.10

Encrypt sensitive data in transit

3.11

Encrypt sensitive data at rest

12.1

Network infrastructure management

12.8

Establish and maintain dedicated compute resources

CA/Browser Forum Requirements

Baseline Requirements

Industry requirements for publicly-trusted certificates. Already tracked in our Compliance Hub.

Scope: Baseline Requirements for certificate validity, key requirements, validation methods, and revocation.

Certificate validity

Maximum validity periods

Key requirements

Minimum key sizes and algorithms

Domain validation

DCV methods

Certificate revocation

Revocation timelines

Certificate transparency

CT logging

CAA records

DNS CAA checking

FixMyCert Enterprise: Compliance Ready

Enterprise customers can:

  • Add internal control numbers to any content
  • Map to your specific audit requirements
  • Add approval signatures and review dates
  • Export documentation for auditor review
  • Track which procedures staff have acknowledged

Attach internal documentation to each mapping:

FieldPurposeExample
Internal Doc LinkYour policy/procedureKey Management Policy v2.3
Control IDYour numbering systemPKI-KM-01, CRYPTO-003
OwnerResponsible partyInfoSec Team
ReviewerApproval authorityCISO
Last ReviewAudit evidence2024-12-15
Next ReviewCompliance calendar2025-12-15
  • Clone runbooks per business unit while retaining mappings

Don't see your compliance framework?

We're adding mappings based on customer needs.

Currently planned:

  • HIPAA (healthcare)
  • FedRAMP (federal)
  • GDPR Article 32 (encryption requirements)

Frequently Asked Questions

Does using FixMyCert make me compliant?

No. FixMyCert provides implementation guidance and supporting evidence for the certificate and cryptography portions of compliance frameworks. Full compliance requires your organization's policies, procedures, and evidence of execution across ALL control areas.

What if my auditor asks for something not in the mapping?

These mappings cover PKI/TLS/certificate-related controls only. For controls outside this scope (physical security, HR policies, general access management), you'll need documentation from other sources.

Can I use FixMyCert content as my official policy?

FixMyCert guides document HOW to implement controls. Your policies should define WHAT controls exist, WHO is responsible, and WHEN reviews occur. We recommend using FixMyCert guides as procedural attachments to your policy documents.

How do I handle multiple CAs or platforms?

Enterprise customers can clone runbooks for different environments while maintaining the same compliance mappings. For example, separate Key Compromise Response procedures for your public CA vs. internal ADCS, both mapping to the same PCI/NIST/ISO controls.

Disclaimer: This mapping provides guidance for the cryptography, TLS, PKI, and certificate lifecycle portions of each framework. Your auditor has final authority on what satisfies requirements. FixMyCert content serves as supporting evidence and implementation guidance - it does not represent full compliance coverage or guarantee audit outcomes.