Control mapping for risk management
Control mapping for risk management
Throughout your journey, you learned about controls, and how to implement them to manage
risk and meet compliance obligations. In this reading, you’ll learn more about mapping controls,
and explore an example of a control map.
Getting started
As a security professional, you may have to create a control map. Control maps are
spreadsheets that identify, document, and evaluate the controls in place within an
organization. Control maps can look different depending on organizational and business needs.
To create a control map, build a spreadsheet that details your controls, and collects evidence
from your cloud environment that these controls are in place.
Your control mapping spreadsheets should include evidence of controls that your organization
has put in place across whole sets of control frameworks, standards, and regulations. Evidence
collection is the process of gathering and documenting data, records, and other compliance
processes to demonstrate adherence to rules, regulations, and standards. In the control map,
evidence is an explanation of the control that it is in place, and how this control meets the
requirement. For example, if a cybersecurity framework requires multi-factor authentication
(MFA), you’ll want to ensure that your organization uses security keys or other tools that meet
this requirement. Some ways to gather evidence include: consulting with your team, reviewing
existing control maps, reviewing security policies and procedures, testing and validation
reports, and risk assessments.
New regulations often require specific control mapping configurations. When a new regulation is
introduced, you can compare its control requirements to the controls that you already have
mapped. You can also make note of the differences between new and existing regulations, and
then add any missing controls to fill the gaps, or remove any mappings for obsolete controls.
For example, if a new regulation requires new passwords for staff every 30 days instead of
every 45 days, your security team would need to implement this control in order to meet the
1
new regulation and fill the gap. Then, you can update the control map explaining how this
requirement has been met by your team.
Pro tip: You don’t have to start from scratch! There are lots of free resources available. You can
start with the detailed controls from an existing control map like the NIST SP 800-53 to build
your control mapping sheet in Excel or Google Sheets. There are also helpful, no cost
resources that provide crosswalks between frameworks and regulations, including mappings
of NIST SP800-53 to ISO 27001 and NIST SP 800-53 to NIST 1.1 CSF.
Here are the steps to creating both a control map and map controls:
First, create a spreadsheet that includes security control titles, domain categories, and
descriptions to identify related controls. This graphic is an example of a spreadsheet that has
been set up to map controls. Remember, you can use resources like the NIST SP 800-53
control catalog to help you get started.
2
Conduct an asset inventory
Next, conduct an inventory of all cyber and virtual assets in your organization’s cloud
environment. The Google Cloud Asset Inventory can be a helpful tool for conducting an
inventory. You can input the inventory into a separate spreadsheet. You can also use this
inventory to determine the best controls to use to protect your assets and maintain
compliance.
3
you’ve identified the missing controls, you can address these gaps by suggesting additional
controls to your team. Once these controls have been implemented by your organization, you
can add the evidence to your control map to explain how the gap has been filled with
additional controls.
Key takeaways
Implementing controls to meet organizational and compliance needs can be a difficult task.
But, mapping controls saves you time and effort, and can help your organization maintain a
strong and compliant security posture.
After you’ve mapped your controls and identified any gaps, you can move on to choosing
specific controls or other solutions to close the gaps you’ve identified. This will help to reduce
risk and meet compliance obligations.