Obsidian Ridge

Frameworks

The frameworks we help clients meet

These are the frameworks and baseline requirements we work against most often in practice. The goal is not to drown you in control language. It is to turn real requirements into a workable plan, clear evidence, and a cleaner path to audit, insurance, or customer review.

Reference guide

Which framework are you trying to align with?

Each section below covers what the framework actually expects, the controls that matter first, and which Obsidian Ridge service tiers usually close those gaps most cleanly.

FrameworkCyber Insurance BaselineCommon controls carriers look for before they will quote broadly or renew comfortably.

Cyber insurance is not one codified framework. In practice, carriers commonly look for a short list of controls that materially reduce claim frequency and severity: strong MFA coverage, monitored endpoint protection, email security, backups, incident readiness, and employee awareness.

The 5-7 controls that matter most

MFA on email, admin, and remote access

Most underwriting conversations now start with whether high-risk systems are protected with multi-factor authentication, especially email, admin accounts, VPNs, and remote access tools.

ProtectedManagedEnterprise custom

Endpoint detection with response capability

Legacy antivirus alone is usually not enough. Carriers increasingly expect EDR or MDR coverage that can detect and contain malicious activity quickly.

EssentialsProtectedManaged

Security awareness and phishing resilience

Because a large share of claims still begin in the inbox, recurring phishing simulations and short training modules are now part of the baseline conversation.

EssentialsProtectedManaged

Offline or immutable backups with restore confidence

Backups need to be separated enough from production to survive ransomware and tested often enough that recovery is not theoretical.

ProtectedManagedEnterprise custom

Written incident response and escalation plan

Carriers want to see that an organization knows who makes decisions, who gets called, and how containment and communications will work under pressure.

ProtectedManagedEnterprise custom

Patch and external exposure discipline

Boundary devices, internet-facing services, and known exploitable vulnerabilities continue to show up in claims data, so exposure management matters.

EssentialsProtectedManaged

Canonical sources

FrameworkSOC 2 Type IIControls and evidence built around the AICPA Trust Services Criteria, operated over time.

SOC 2 Type II is an attestation against the AICPA Trust Services Criteria. In practice, that means documented controls around security and related trust principles, plus evidence that those controls actually operated over a review period rather than existing only on paper.

The 5-7 controls that matter most

Risk assessment and governance

You need a repeatable way to identify risks, assign accountability, and show leadership oversight of the control environment.

ProtectedManagedEnterprise custom

Access control and MFA

Logical access needs to be restricted, reviewed, and supported by stronger authentication for privileged and high-impact systems.

ProtectedManagedEnterprise custom

Change management

Material system changes should be authorized, tested, and traceable so the control environment remains stable as the business moves.

ManagedEnterprise custom

Logging, monitoring, and incident handling

SOC 2 examiners typically expect evidence that security events are monitored, investigated, and escalated in a defined way.

CC7.2: Met via Managed tier SIEM
ProtectedManagedEnterprise custom

Vendor and third-party oversight

If vendors touch systems or data, there needs to be a process for evaluating them and managing the residual risk.

ManagedEnterprise custom

Policy evidence and operational proof

Policies matter, but Type II readiness also depends on screenshots, tickets, reviews, logs, and approvals that prove the controls operated over time.

ManagedEnterprise custom

Canonical sources

FrameworkHIPAA Security RuleAdministrative, physical, and technical safeguards for ePHI under HHS guidance and regulation.

The HIPAA Security Rule requires covered entities and business associates to protect electronic protected health information with administrative, physical, and technical safeguards. The goal is not box-checking alone; it is protecting confidentiality, integrity, and availability of ePHI in real operating environments.

The 5-7 controls that matter most

Risk analysis and risk management

HHS guidance starts with an accurate and thorough assessment of risks and vulnerabilities to ePHI, followed by measures that reduce them to a reasonable and appropriate level.

ProtectedManagedEnterprise custom

Assigned security responsibility

Someone needs to own the program, policies, and follow-through rather than leaving HIPAA security as a vague shared responsibility.

ProtectedManagedEnterprise custom

Access control and workforce permissions

Users should have access aligned to role, and access to ePHI should be authorized, reviewed, and removed when no longer needed.

ProtectedManagedEnterprise custom

Device, workstation, and media safeguards

HIPAA expects practical protection for devices, workstations, removable media, and the spaces where ePHI is handled.

ProtectedManagedEnterprise custom

Incident procedures and contingency planning

Organizations need security incident procedures plus backup, disaster recovery, and emergency mode operations that support care continuity.

ProtectedManagedEnterprise custom

Canonical sources

FrameworkPCI-DSS v4.0Payment-card security requirements for protecting account data and validating that protection.

PCI DSS provides a baseline of technical and operational requirements designed to protect account data. Version 4.x keeps the familiar control structure but pushes organizations toward continuous security, broader MFA coverage, and risk-based validation rather than one-time checkbox activity.

The 5-7 controls that matter most

Scope the cardholder data environment correctly

The first hard problem in PCI is often scope. You need to know where account data lives, where it flows, and which systems can impact that environment.

ProtectedManagedEnterprise custom

Network security controls and segmentation

PCI continues to require strong control over network paths into and within the cardholder data environment.

ManagedEnterprise custom

Secure configuration and vulnerability management

Systems handling or affecting card data need hardened builds, timely patching, and disciplined remediation of known weaknesses.

ProtectedManagedEnterprise custom

Strong access control and MFA

PCI DSS v4.0 expanded MFA expectations, especially for access into the cardholder data environment and administrative pathways.

ProtectedManagedEnterprise custom

Security policy, training, and incident readiness

PCI is not purely technical. Roles, training, documented procedures, and response preparation all matter to a clean assessment.

EssentialsProtectedManaged

Canonical sources

FrameworkCMMC Level 2Defense-contractor cybersecurity requirements aligned to protecting CUI and validating implementation.

CMMC Level 2 is built around protection of controlled unclassified information in the defense industrial base. In practice, it means implementing the NIST SP 800-171 security requirements, maintaining evidence, and preparing for the right kind of assessment depending on the contract and rollout phase.

The 5-7 controls that matter most

Protect CUI and understand where it lives

CMMC readiness starts with identifying the systems, users, and vendors that process, store, or transmit controlled unclassified information.

ManagedEnterprise custom

Implement the NIST SP 800-171 requirement set

Level 2 aligns to the 110 security requirements in NIST SP 800-171 Rev. 2, so readiness work needs to be systematic and evidence-backed.

ManagedEnterprise custom

Control access and privilege carefully

Account lifecycle, least privilege, MFA, privileged access discipline, and boundary access all receive close attention.

ProtectedManagedEnterprise custom

Logging, incident response, and accountability

Organizations need to show they can detect events, respond in a defined way, and preserve evidence that controls are operating.

CMMC AU.L2: Met via Managed tier SIEM
ManagedEnterprise custom

Configuration, patching, and asset discipline

Secure baselines, vulnerability remediation, and configuration control are central to keeping the environment defensible and assessable.

ManagedEnterprise custom

Documentation and assessment readiness

Readiness is not just technical implementation. Policies, system boundaries, SSP/POA&M discipline, and assessment preparation matter.

ManagedEnterprise custom

Canonical sources

  • DoD CIO About CMMC

    The DoD CIO describes the program, protected information types, and assessment expectations across levels.

  • DoD CMMC 2.0 Model Overview

    The official model overview states that Level 2 focuses on protection of CUI and encompasses the 110 security requirements in NIST SP 800-171 Rev. 2.

  • DoD small business CMMC 2.0 resources

    The DoD business portal tracks current rollout details and links to the governing rules and implementation timeline.

FrameworkNIST Cybersecurity Framework 2.0A flexible risk-management framework organized around Govern, Identify, Protect, Detect, Respond, and Recover.

NIST CSF 2.0 is not a checklist or certification. It is a risk-management framework that helps organizations understand current posture, define target outcomes, and prioritize work across the six functions: Govern, Identify, Protect, Detect, Respond, and Recover.

The 5-7 controls that matter most

Govern cyber risk as a business issue

CSF 2.0 added Govern as a first-class function, which means leadership accountability, policy direction, and enterprise risk alignment are part of the model from the start.

ProtectedManagedEnterprise custom

Identify assets, systems, and dependencies

You cannot prioritize risk well without understanding what matters, what supports it, and where the important dependencies sit.

ProtectedManagedEnterprise custom

Protect identities, systems, and data

Controls such as MFA, endpoint protection, secure configuration, and awareness training live in this function.

EssentialsProtectedManaged

Detect events with enough visibility to act

Detection is about telemetry, monitoring, and review processes that surface real issues before they become business-ending incidents.

NIST CSF DE.CM: Met via Managed tier SIEM
EssentialsProtectedManaged

Respond with roles, playbooks, and communications

CSF expects organizations to know how they will contain, communicate, and make decisions when something breaks.

ProtectedManagedEnterprise custom

Recover and improve

Recovery planning, backup confidence, and post-incident learning are part of a credible CSF-aligned program.

ProtectedManagedEnterprise custom

Canonical sources

FrameworkISO 27001An information security management system built around risk management, evidence, and continual improvement.

ISO/IEC 27001:2022 defines the requirements for an information security management system. That means building a repeatable way to assess risk, implement controls, assign ownership, review performance, and improve over time rather than treating security as a pile of disconnected tools.

The 5-7 controls that matter most

Define and operate an ISMS

ISO 27001 is ultimately about the management system itself: scope, leadership commitment, policies, objectives, and review cycles.

ManagedEnterprise custom

Run a risk assessment and treatment process

Organizations need a disciplined way to identify risks, evaluate them, choose treatments, and document decisions.

ProtectedManagedEnterprise custom

Assign ownership and maintain evidence

Controls need accountable owners, operating records, and review artifacts so the ISMS is demonstrable rather than aspirational.

ManagedEnterprise custom

Control access, endpoints, and operational security

The management system still has to land in real technical controls: identity, endpoint security, logging, backup, and secure operations.

ProtectedManagedEnterprise custom

Manage suppliers and internal change

Vendors, cloud services, and internal changes all need to be governed as part of the control environment.

ManagedEnterprise custom

Review performance and improve continually

Internal audits, corrective actions, and management review are part of what make ISO 27001 a living system instead of a one-time project.

ManagedEnterprise custom

Canonical sources

Kfir Yair, founder of Obsidian Ridge

Founder

Framework guidance from real implementation work

"Frameworks are useful when they force better decisions, cleaner evidence, and less confusion. They are not useful when they become a pile of controls nobody can operate once the audit or questionnaire is over."

— Kfir, CISSP | Founder