Documentation Index
Fetch the complete documentation index at: https://docs.matproof.com/llms.txt
Use this file to discover all available pages before exploring further.
Frameworks
This page covers how frameworks work in Matproof: how to add one, how cross-framework control mapping reduces duplicate work, and where to find the dedicated guide for each framework.What’s supported
Matproof ships 16 frameworks ready to adopt:| Framework | Region / Domain |
|---|---|
| DORA | EU financial services |
| NIS2 | EU cybersecurity |
| GDPR | EU data protection |
| BaFin MaRisk | German banking risk management |
| ISO 27001 | Information security management (ISMS) |
| ISO 42001 | AI management systems |
| ISO 9001 | Quality management |
| SOC 2 | Trust services criteria |
| HIPAA | US healthcare data |
| PCI DSS | Payment card security |
| NEN 7510 | Dutch healthcare |
| NIST CSF | NIST Cybersecurity Framework |
| NIST 800-53 | US federal control catalog |
| EU AI Act | EU AI governance |
| Cyber Resilience Act | EU product security |
| CSRD | EU sustainability reporting |
Adding a framework
Open Settings → Frameworks
From the sidebar, go to Settings → Frameworks. You see all currently active frameworks plus an Add framework button.
Pick from the catalog
Browse the catalog of 16 built-in frameworks plus any custom frameworks your organization has built. Click Add on the one you want.
Set the scope (some frameworks only)
A few frameworks ask for additional scope before activation:
- NIST 800-53 — pick the baseline (LOW / MODERATE / HIGH or full catalog)
- PCI DSS — pick your merchant level
- CSRD — pick the reporting year(s) you’re preparing for
- Custom frameworks — pick which version of the framework to adopt
Run gap assessment
Matproof scans your existing evidence, policies, and risks against the new framework’s controls and produces a gap report. Controls already covered by overlapping frameworks are auto-marked compliant; the rest become open work.
Cross-framework control mapping
The single biggest reason Matproof exists: a control implemented once should satisfy every framework that requires it. Concrete example:Viewing framework status
Every active framework has its own dashboard at/[orgId]/frameworks/[frameworkInstanceId]:
- Compliance score — percentage of controls with sufficient unexpired evidence
- Controls by status — implemented / in-progress / not started / not applicable
- Findings — open gaps and non-conformities (see Findings)
- Upcoming evidence expirations — evidence falling out of date in the next 90 days
- Recent activity — control updates, evidence uploads, policy changes
- Versioning — when the framework’s underlying standard updates, you can migrate to the new version while keeping evidence history
Removing or deactivating a framework
You can deactivate a framework if your organization no longer needs it (e.g. you sunset a SOC 2 audit because you switched to ISO 27001). Deactivation:- Hides the framework from the dashboard and reports
- Preserves all controls, evidence, and history (you can reactivate later)
- Does not delete shared evidence — controls reused by other active frameworks keep their evidence
Audit export
Before an audit, export the framework’s complete evidence package:- Open the framework dashboard
- Click Export → Evidence Package
- Choose format: ZIP (recommended for auditors), PDF (executive summary), CSV (control list only)
- The ZIP contains: control list with statuses, all linked evidence, policy versions, risk register entries, vendor entries, and findings — folder-organized to match the framework’s chapter structure
Custom Frameworks
Build your own frameworks for transpositions or industry standards
Controls
The shared layer beneath every framework
Findings
Track gaps across every framework in one view
Evidence Collection
Automate evidence from your existing tools