Skip to main content

Compliance Frameworks

CALMGuard maps CALM architecture controls to four compliance frameworks relevant to financial services technology. This page describes each framework, its relevance, and how CALMGuard implements the mapping.

Supported Frameworks

SOX — Sarbanes-Oxley Act

Relevance: Any publicly traded company or company with publicly traded debt must comply with SOX. For technology teams, SOX primarily impacts systems that process, store, or transmit financial data.

Key sections for technology:

SectionTitleTechnology Relevance
302Corporate ResponsibilityExecutive sign-off on financial reporting systems
404Internal Control AssessmentIT general controls, change management, access controls
802Document DestructionData retention for 7+ years
906Corporate ResponsibilityCriminal penalties for false certifications

CALMGuard SOX mapping looks for:

  • Database nodes with data retention controls
  • Access control relationships (LDAP nodes)
  • Audit logging in service-to-database connections
  • Change management controls on critical financial services

PCI-DSS — Payment Card Industry Data Security Standard

Relevance: Any system that processes, stores, or transmits cardholder data (credit/debit card numbers, CVVs, PINs) must comply with PCI-DSS v4.0.

12 Core Requirements:

ReqTitleCALM Mapping
1-2Network Security ControlsNetwork nodes, firewall relationships
3-4Protect Cardholder DataDatabase nodes with encryption controls
5-6Vulnerability ManagementService nodes with security controls
7-8Access ControlLDAP nodes, actor-to-system relationships
9Physical Securitydeployed-in relationships (datacenter nodes)
10Logging and MonitoringService controls referencing logging requirements
11Security TestingPipeline controls (test relationships)
12Information Security PolicyTop-level document controls

CALMGuard PCI-DSS mapping looks for:

  • data-asset nodes with cardholder data classifications
  • Connections using HTTPS or mTLS protocols (unencrypted HTTP is a finding)
  • Database nodes missing encryption controls
  • Missing logging controls on payment service nodes

NIST-CSF — NIST Cybersecurity Framework

Relevance: While voluntary in the US, NIST CSF 2.0 is the de facto standard for cybersecurity programs at financial institutions, often required by regulators (OCC, FDIC) and in contracts.

6 Core Functions (CSF 2.0):

FunctionSubcategoriesCALM Mapping
GOVERNRoles, policies, supply chainActor nodes, ecosystem boundaries
IDENTIFYAsset management, risk assessmentAll node types and their controls
PROTECTAccess control, data securityLDAP nodes, protocol choices
DETECTMonitoring, anomaly detectionService controls for logging/monitoring
RESPONDIncident managementControls referencing incident response
RECOVERRecovery planningBackup/DR controls on database nodes

CALMGuard NIST-CSF mapping looks for:

  • Nodes without any controls (unmanaged assets)
  • Missing monitoring controls on internet-facing services
  • Missing backup controls on databases
  • No identity management (LDAP) in architectures with external actors

FINOS CCC — Common Cloud Controls

Relevance: FINOS CCC is an open-source framework specifically designed for financial services cloud adoption. It maps cloud security controls to regulatory requirements, making it particularly relevant for cloud-native architectures.

Control Domains:

DomainDescriptionCALM Mapping
IdentityIAM, MFA, privilege accessActor and LDAP node controls
DataEncryption at rest/transitDatabase and data-asset nodes
ResilienceHA, DR, failoverdeployed-in relationships
LoggingAudit trails, SIEMService controls
VulnerabilityScanning, patchingService nodes
ChangeCI/CD, deployment controlsPipeline relationships

CALMGuard CCC mapping looks for:

  • Cloud ecosystem nodes missing IAM controls
  • Data assets without encryption-at-rest controls
  • Single-zone deployments (deployed-in pointing to single network)
  • Missing SIEM/logging controls

Control Mapping Methodology

How CALM Controls Map to Frameworks

CALMGuard's Compliance Mapper agent reads each node's and relationship's controls object and matches them against framework requirements using a combination of:

  1. URL pattern matching: requirement-url values are matched against known framework requirement URLs (e.g., pcissc.org → PCI-DSS)

  2. Description analysis: LLM semantic matching of control descriptions against framework requirements

  3. Gap detection: Nodes expected to have certain controls (based on node-type and data classification) but missing them are flagged as gaps

Scoring Algorithm

The Risk Scorer agent aggregates Phase 1 results into a 0-100 score:

Base score = 100

For each framework:
framework_weight = 1 / num_selected_frameworks

For each finding:
deduction = severity_weight * framework_weight
where severity_weight:
critical = 25
high = 10
medium = 5
low = 2
info = 0

final_score = max(0, base_score - sum(deductions))

The per-framework breakdown score uses the same algorithm applied to that framework's findings only.

Adding Custom Frameworks

To add a new compliance framework:

  1. Create skills/my-framework-compliance.md with framework requirements in Markdown
  2. Add the framework to src/lib/compliance/frameworks.ts:
    export const FRAMEWORKS = [
    // ... existing frameworks
    { value: 'MY-FRAMEWORK', label: 'My Framework' },
    ] as const;
  3. Add the skill reference to relevant agent YAML configurations
  4. The Compliance Mapper agent will automatically include the new framework