Skip to main content

compliance-mapping

Compliance Mapping (CIS, NIST 800-53, ISO 27001, SOC 2)

This page summarizes how NowConnect's security posture, controls, and operational guidance map to common frameworks. Responsibilities are shared: the platform provides controls; customers configure and operate them within their environment.

See also: Security Overview, Security Model, PKI Guidance, and Metrics/alerts in HA architecture.

Scope and responsibility model

AreaPlatform responsibilityCustomer responsibility
Software securityCode quality, dependency scanning, SBOM publication, release notesImage provenance validation, admission policies, patch rollout cadence
Transport securityTLS/WSS everywhere; optional mTLS at ingress; JWT validationIngress configuration, CA management, certificate issuance/rotation
Identity & accessJWT aud enforcement, agent_id reconciliation, optional PDPIdP configuration, token issuance/rotation, PDP policy management
Logging & monitoringStructured logs, metrics, recommended dashboards/alertsCentralized log retention/SIEM, alert routing/on-call
AvailabilityHA mesh, readiness, backpressure boundsTopology (single/HA/multi-region), Redis HA, capacity planning
Data protectionNo payload bytes logged; metadata onlyData classification and log retention policies

Framework mapping (selected controls)

Control areaCIS IG 1-3NIST 800-53ISO 27001 Annex ASOC 2 TSCImplementation notes
Transport encryptionIG1 3.11, IG2 3.12SC-8, SC-12, SC-13A.8.24CC6.7TLS for all tunnels; mTLS for /mesh; end-protocol TLS preserved
AuthenticationIG1 4.3IA-2, IA-5A.8.2, A.8.3CC6.1JWT on WS upgrade, aud=nowconnect, JWKS validation
AuthorizationIG2 4.5AC-2, AC-3A.8.2, A.8.9CC6.1Optional PDP on OPEN(connector); connector scopes
Secrets mgmtIG1 3.4IA-5, SC-12A.8.22CC6.1, CC6.8Tokens as files/secrets; CA/cert/key via secrets; rotation guidance
Logging & monitoringIG1 8.1, 8.2AU-2, AU-6, AU-12A.8.15CC7.2, CC7.3Structured logs, metrics, golden dashboards and alerts
Configuration mgmtIG1 4.4CM-2, CM-6A.8.9CC8.1Declarative config; HA mode flags; change notes in releases
Availability/ResilienceIG2 11.2CP-2, CP-10A.5.29, A.8.16A1.2HA mesh, readiness degrade behavior, DR guidance
Vulnerability mgmtIG1 7.1RA-5, SI-2A.5.23CC7.1SBOM; CVE triage; patch cadence recommendations
Incident responseIG2 17.1IR-4, IR-5A.5.24CC7.4IR swimlane and runbooks for token/cert compromise

Evidence artifacts

  • SBOM: recommended for internal builds; provide via your CI pipeline if required.
  • Release notes: include security fixes and dependency upgrades where applicable.
  • Architecture diagrams: trust boundaries and control points.
  • Runbooks: token and certificate rotation, ingress mTLS configuration.

IR scenarios and responsibilities (guidance)

DR/RTO/RPO checkpoints (guidance)

  • Define RTO/RPO objectives for Cloud Hub and Redis appropriate to your environment. Suggested starting points: RTO ≤ 15m (Cloud Hub), RPO 0 (stateless). Redis HA per your platform.
  • Validate failovers regularly: hub crash, mesh partition, Redis outage. Capture metrics and outcomes.

Note: This page provides implementation-aligned guidance, not a formal attestation. Map and validate controls within your organization’s GRC program.