Frameworks · All six, one control matrix

SOC 2, ISO 27001, HIPAA, PCI-DSS, NIST CSF, GDPR — one control matrix, one cycle, one binder.

All tiers cover all six frameworks · What changes is cadence, entity count, and concierge level
SOC 2 ISO 27001 HIPAA PCI-DSS NIST CSF GDPR
Framework 01 · SOC 2 Trust Services Criteria

SOC 2 readiness — from initial Type I through ongoing Type II surveillance

SOC 2 attestations are issued by independent CPA firms against the AICPA Trust Services Criteria. Aegis AI™ does the readiness work: continuous control validation across the Security category by default, with Availability, Processing Integrity, Confidentiality, and Privacy added per your scoping decisions. Each control objective is mapped to a live evidence artifact from your AWS, Azure, Microsoft 365, Okta, or CrowdStrike telemetry, with a SHA-256 hash and a validation timestamp.

What Aegis AI produces for your SOC 2 engagement

How Aegis AI sits next to your CPA firm

We don’t conduct the attestation. Your CPA firm does. We sit on the readiness side of the audit firewall — assembling and continuously refreshing the artifact set so when your CPA opens fieldwork, they start validating instead of asking your team to author evidence on the fly. This is the difference between a six-week SOC 2 engagement and a twelve-week SOC 2 engagement.

Framework 02 · ISO/IEC 27001:2022 + 27002:2022

ISO 27001 readiness — Statement of Applicability through surveillance audit

ISO 27001 certification is issued by an accredited certification body (UKAS-, ANAB-, or equivalent-accredited) against the 2022 revision. Aegis AI™ supports the readiness path: ISMS scope authoring, Statement of Applicability (SoA) drafting against the 93 Annex A controls (themed into Organizational, People, Physical, and Technological), internal-audit evidence assembly, and management-review pack preparation. The work product carries forward to your initial certification audit and every surveillance cycle thereafter.

What Aegis AI produces for your ISO 27001 engagement

SOC 2 + ISO 27001 cross-mapping

For companies pursuing both, Aegis AI shows you which single remediation closes the most cross-framework gaps. Your evidence binder is rendered once and consumed by both your CPA firm and your certification body. You don’t pay to fix MFA enforcement, vendor risk, or access review three times.

Framework 03 · HIPAA Security Rule · 45 CFR 164

HIPAA readiness — Security Rule safeguards plus Breach Notification readiness

HIPAA compliance is enforced by HHS Office for Civil Rights and by State Attorneys General. There is no central HIPAA certification body — instead, covered entities and business associates must be able to produce evidence of compliance with the Security Rule’s administrative, physical, and technical safeguards during an OCR investigation, a state AG inquiry, or a downstream business associate audit. Aegis AI™ assembles that evidence continuously, so the request that arrives by certified mail doesn’t turn into a three-week scramble.

What Aegis AI produces for your HIPAA program

What Aegis AI doesn’t do

We are not your Privacy Officer of record. We are not your designated Security Official under 164.308(a)(2). Those are human roles inside your organization. We are the software that gives those humans an audit-ready evidence set so when OCR asks for proof, the answer is in writing the same day.

Framework 04 · PCI-DSS v4.0

PCI-DSS v4.0 readiness — SAQ-A through Level 1 service provider

PCI-DSS v4.0 is enforced by the PCI Security Standards Council via acquiring banks and brand programs (Visa, Mastercard, Amex, Discover, JCB). Validation methods range from self-assessment (SAQ-A through SAQ-D) through QSA-led Report on Compliance (RoC) for Level 1 merchants and service providers. Aegis AI™ assembles the evidence trail across all 12 PCI-DSS requirements, scoped to your Cardholder Data Environment (CDE).

What Aegis AI produces for your PCI engagement

QSA relationship

For Level 1 merchants and service providers, a QSA still produces the Report on Compliance. Aegis AI is the readiness tool you use to make the QSA’s job take six weeks instead of fourteen. We are not a QSA. We sit on the readiness side of the audit firewall, same as with SOC 2 and ISO 27001.

Framework 05 · NIST Cybersecurity Framework 2.0

NIST CSF 2.0 readiness — Govern through Recover, profile and tier authoring

NIST CSF 2.0 added the Govern function alongside Identify, Protect, Detect, Respond, and Recover. It is widely adopted as the lingua franca for cybersecurity risk by federal-adjacent contractors, regulated industries (energy, utilities, transportation), and any company whose customers, insurers, or board uses CSF as the shared reference. Aegis AI™ produces the CSF artifacts the security leader uses to brief executives and the artifacts the board uses to set risk appetite.

What Aegis AI produces for your NIST CSF program

Why a CSF profile matters even when you don’t have a CSF audit

Most companies don’t get audited against CSF directly — but their cyber insurer, their largest customers, and their board use CSF language as the shared reference. A current and target CSF profile is the artifact that translates “we’re investing in security” into a tier movement an executive can evaluate.

Framework 06 · GDPR / UK GDPR / EU Data Protection

GDPR readiness — Article 32 technical measures and Article 30 records

GDPR is enforced by supervisory authorities across the EU (and the UK ICO post-Brexit) with fines up to 4% of global annual turnover. The two operational pillars for any controller or processor are Article 32 (security of processing) and Article 30 (records of processing activities). Aegis AI™ produces and continuously refreshes both, plus the supporting documentation a supervisory authority expects to see when it opens an inquiry.

What Aegis AI produces for your GDPR program

What Aegis AI doesn’t do

We are not your Data Protection Officer of record. Where you require a DPO under Article 37, that is a designated human role inside your organization or a contracted external DPO. We are the software that gives your DPO an evidence set, a refreshed RoPA, and a documented set of technical measures so the supervisory-authority inquiry doesn’t turn into a 90-day evidence-collection sprint.