Cross-Framework Mapping

CIS Controls v8vsNIS2 Directive Implementing Acts

See exactly how CIS Controls v8 controls map to NIS2 Directive Implementing Acts. Pre-computed mappings, identified gaps, and coverage analysis.

53
Controls Mapped
100
Gaps Found
16%
Coverage

According to the TheArtOfService Compliance Knowledge Graph:

CIS Controls v8 maps to NIS2 Directive Implementing Acts with 16% coverage across 24 directly mapped controls. Analysis of 153 CIS Controls v8 controls identifies 129 compliance gaps — primarily concentrated in Application Software Security.

Source: TheArtOfService Knowledge Graph | 153 controls analysed | 769 frameworks | 815K+ cross-framework mappings

Control Mappings

Showing 20 of 53 mapped controls across 8 domains. Sign up to explore all 815K+ mappings across 769 frameworks.

Inventory and Control of Enterprise Assets(4 mappings)

1.2Operating System Privileged Account Control2 targets
FEDRAMP-AC-1Access Control Policy and Procedures
FEDRAMP-AC-2Account Management
1.3Virtualisation Platform Protection2 targets
FEDRAMP-AC-1Access Control Policy and Procedures
FEDRAMP-AC-2Account Management

Data Protection(16 mappings)

3.1Physical Security
CTPAT-SCS-03Conveyance and Cargo Security
3.10Encrypt Sensitive Data in Transit6 targets
AEO-SC-3Premises Security
CTPAT-SCS-01Physical Security
ICS-AC-1Role-based access control
ICS-AC-4Physical access controls
NIS2-IA-11Access Control Policy
UKTSA-SC-04Third-Party Access Controls
3.11Encrypt Sensitive Data at Rest3 targets
NRF-4Supply Chain Risk Identification
WCO-SAFE-SCS-01Advance Electronic Information
WCO-SAFE-SCS-02Risk Management
3.2Establish and Maintain a Data Inventory
CTPAT-SCS-03Conveyance and Cargo Security
3.3Configure Data Access Control Lists2 targets
FEDRAMP-AC-1Access Control Policy and Procedures
FEDRAMP-AC-2Account Management
3.4Enforce Data Retention
CTPAT-SCS-03Conveyance and Cargo Security
3.5Securely Dispose of Data2 targets
AEO-SC-4Trading Partner Security
NRF-4Supply Chain Risk Identification

+33 more mappings

Plus AI-powered gap analysis, compliance advisory, PDF exports, and cross-mapping for all 769 frameworks.

Create Free Account →

Free forever — no credit card required

Stop Paying Consultants to Read Spreadsheets

AI-powered compliance intelligence across 769 frameworks — at a fraction of consulting costs.

$0/forever

Free

  • 769 framework browser
  • Cross-framework mappings (815K+)
  • 824 compliance assessments
  • 3 AI queries & searches per day
Get Started Free
Recommended
$49/month

Professional

  • Unlimited AI Compliance Advisory
  • Unlimited full-text search
  • Framework self-assessment
  • PDF, Excel & CSV exports
Start 7-Day Free Trial →

What are the key differences between CIS Controls v8 and NIS2 Directive Implementing Acts?

CIS Controls v8 has 153 controls across its framework, while NIS2 Directive Implementing Acts covers 76 controls. Direct mapping analysis identifies 24 overlapping controls (16% coverage). The frameworks diverge most significantly in Application Software Security, where 14 CIS Controls v8 controls have no direct NIS2 Directive Implementing Acts equivalent.

How many controls map between CIS Controls v8 and NIS2 Directive Implementing Acts?

Of 153 total CIS Controls v8 controls, 24 map directly to NIS2 Directive Implementing Acts controls — representing 16% coverage. The remaining 129 controls represent compliance gaps requiring additional documentation or compensating controls to satisfy both frameworks simultaneously.

What are the compliance gaps when mapping CIS Controls v8 to NIS2 Directive Implementing Acts?

129 CIS Controls v8 controls have no direct equivalent in NIS2 Directive Implementing Acts. The highest concentration of gaps is in Application Software Security with 14 unmapped controls. These gaps represent areas where additional controls, policies, or documentation must be created to achieve compliance with both frameworks.

Which control domains have the most gaps between CIS Controls v8 and NIS2 Directive Implementing Acts?

The domain with the highest gap count is Application Software Security (14 gaps). Export the full domain-by-domain gap breakdown via the Professional tier to generate a prioritised remediation roadmap.

This platform provides educational compliance tools, not legal, regulatory, or professional compliance advice. Cross-framework mappings are AI-assisted interpretations and do not reproduce or replace official standards. Framework names and trademarks belong to their respective owners. Consult qualified professionals for your specific compliance requirements. See our Terms of Service.