f you've been tasked with improving your organisation's security posture, you've probably encountered at least three or four different framework names in the first hour of research. NIST CSF. ISO 27001. CIS Controls. SOC 2. They all sound authoritative, they all claim to make you more secure, and none of them clearly explain why you'd pick one over another.
This guide cuts through that. We'll explain what each framework actually does, how they compare directly against each other, and — most importantly — how to figure out which one your organisation actually needs.
Quick Reference: The Four Frameworks at a Glance
| NIST CSF | ISO 27001 | CIS Controls | SOC 2 | |
|---|---|---|---|---|
| Type | Voluntary framework | Certifiable standard | Actionable controls list | Audit/reporting standard |
| Certification available? | No | Yes | No | Yes (Type I & Type II) |
| Primary focus | Risk management maturity | Information security management | Technical security controls | Customer-facing trust assurance |
| Mandatory anywhere? | US federal contractors | EU/UK enterprise procurement | Some US state requirements | B2B SaaS, cloud providers |
| Audit required? | No | Yes (third-party) | No | Yes (CPA firm) |
| Best for | Assessing & improving security posture | Demonstrating security to customers | IT teams needing tactical guidance | Proving security to enterprise clients |
NIST CSF
The NIST CSF organises cybersecurity activity into six core functions (CSF 2.0): Govern, Identify, Protect, Detect, Respond, and Recover. The critical thing to understand is that it doesn't tell you what controls to implement — it gives you a structure for thinking about risk and measuring maturity. Two organisations can both claim to follow NIST CSF but have completely different control sets.
This makes it excellent for internal risk assessment and board reporting, but it doesn't give you a certificate to show customers.
Good fit if: You're a US federal contractor, you want a maturity model to benchmark over time, or you need a common language for security discussions across the business.
ISO 27001
ISO 27001 is a certifiable standard for Information Security Management Systems. A third-party accredited certification body audits your ISMS and issues a certificate valid for three years. The current version is ISO 27001:2022, which has 93 Annex A controls.
It requires a formal risk assessment, a Statement of Applicability, internal audits, and management reviews. Typically takes 6-18 months for an SMB to achieve certification.
Good fit if: Enterprise customers are asking for it, you operate in the EU or UK, or you process sensitive customer data and need to demonstrate due diligence.
NIST CSF vs ISO 27001: Direct Comparison
| Dimension | NIST CSF | ISO 27001 |
|---|---|---|
| Certification | None | Third-party certificate |
| Prescriptiveness | Flexible, you define controls | Specific requirements + mandatory processes |
| Effort to implement | Low-medium | Medium-high |
| Cost | Low (no audit fees) | Higher (certification body + consultancy) |
| Recognition | Strong in US, growing globally | Strong globally, especially EU/UK |
| Good for showing customers | Limited — no certificate | Strong — internationally recognised |
The key question: do you need to prove your security to external parties, or improve it internally? If prove — ISO 27001. If improve — NIST CSF. Many organisations use NIST CSF as a gap assessment tool on the path to ISO 27001 certification.
CIS Controls
The CIS Controls (v8) are a numbered list of 18 specific security actions, organised into three implementation groups. IG1 (56 safeguards) covers basic cyber hygiene suitable for all organisations. Unlike NIST CSF or ISO 27001, these are prescriptive and technical — your IT team can pick them up and start implementing directly.
Good fit if: Your IT team needs specific actionable guidance, you're implementing security for the first time, or you want a prioritised checklist rather than a management framework.
NIST CSF vs CIS Controls
| Dimension | NIST CSF | CIS Controls |
|---|---|---|
| Focus | Strategic risk management | Tactical technical security |
| Audience | Leadership, security managers | IT teams, sysadmins |
| Prescriptiveness | Low — you define controls | High — specific numbered safeguards |
| Complexity | Higher (requires risk methodology) | Lower (follow the list) |
These two complement rather than compete. NIST CSF tells you what to think about; CIS Controls tells you what to do.
SOC 2
SOC 2 is fundamentally different — it's not a framework you implement, it's an audit report you commission from a licensed CPA firm. It audits your controls against five Trust Services Criteria: Security (mandatory), Availability, Processing Integrity, Confidentiality, and Privacy.
Type I confirms controls are designed appropriately at a point in time. Type II confirms they operated effectively over 6-12 months. Enterprise customers almost always want Type II.
Good fit if: You're a SaaS company selling to US enterprise customers, prospects are asking for it in procurement, or you want to reduce the volume of one-off security questionnaires.
SOC 2 vs ISO 27001
| Dimension | SOC 2 | ISO 27001 |
|---|---|---|
| Recognition | Strong in US, limited in EU | Strong in EU/UK, growing in US |
| Output | Audit report shared with customers | Publicly listed certificate |
| Cost | Higher (CPA firm fees) | Medium-high (certification body fees) |
| Time to achieve | 6-12 months (Type II) | 9-18 months |
For a UK-based company targeting UK and EU customers, ISO 27001 almost always makes more sense than SOC 2. If you're targeting both markets, ISO 27001 first gives you the broader foundation.
Which Framework Is Right for You?
UK SMB wanting to win enterprise contracts → ISO 27001. It's what UK procurement teams ask for.
SaaS company with US enterprise customers → SOC 2 Type II. Consider ISO 27001 alongside if you sell into EU.
IT manager needing to improve security practically → CIS Controls IG1 gives you a prioritised action list you can start this week.
Reporting security posture to a board → NIST CSF gives you a maturity model with language non-technical stakeholders understand.
MSP managing compliance for multiple clients → ISO 27001 as your baseline, mapped against Cyber Essentials for UK clients.
Meeting NIS2 or DORA requirements → ISO 27001 provides the strongest foundation.
Common Mistakes
Chasing the wrong certification for your market. A UK company pursuing SOC 2 will spend £30-50k on an audit most UK customers don't recognise.
Implementing everything at once. Pick one framework, do it properly, then layer others on top.
Confusing certification with actual security. You can get ISO 27001 certified with poorly secured systems if your paperwork is good. Use CIS Controls or NIST CSF to make sure underlying security is genuinely improving.
Ignoring ongoing costs. ISO 27001 and SOC 2 both require annual audits. Budget for them from day one.
Managing Multiple Frameworks
Once you're running compliance against more than one framework, the same controls appear across all of them — access management, vulnerability management, incident response. Done manually, you're evidencing the same control four times. Done with a GRC platform, you do it once.
SnapGRC pre-maps controls across 50+ frameworks, so when you document a control it automatically updates your compliance status across every relevant standard. For MSPs managing multiple clients, the multi-tenant architecture means each client has their own compliance programme without spreadsheet chaos.
See how SnapGRC handles multi-framework compliance →
SnapGRC is a compliance management platform built for SMBs and MSPs — ISO 27001, SOC 2, NIST CSF, CIS Controls, Cyber Essentials, GDPR, NIS2 and 40+ other frameworks, mapped automatically so you're not duplicating effort. Learn more →