Skip to main content
Controls are the foundation of your compliance program in SecurAtlas. This page explains how the unified control library is organized, what each control status means, how severity and maturity affect your risk score, and how controls connect to compliance frameworks.

The unified control library

SecurAtlas provides a library of 64 security controls drawn from the baseline deployment profile. Every organization works from the same library regardless of which compliance frameworks you have selected. This unified model means you implement a control once and it can satisfy requirements across multiple frameworks simultaneously — no duplication, no conflicting guidance. Controls are grouped into categories that reflect the major domains of a security program:
  • Access Control — identity, authentication, authorization, and privilege management
  • Incident Response — detection, escalation, and recovery procedures
  • Data Protection — encryption, data classification, and handling requirements
  • Asset Management — inventory, lifecycle, and configuration of systems and devices
  • Additional categories covering areas such as vulnerability management, business continuity, and third-party risk
Each control has a unique control_key (for example, AC-1), a descriptive title, and a category assignment.

Control statuses

Every control has one of four statuses:
StatusMeaning
not_startedYou have not begun implementing this control
in_progressImplementation is underway but not yet complete
implementedThe control is fully in place
not_applicableThe control does not apply to your organization
Controls marked not_applicable are excluded from your score calculation. All other statuses contribute to your overall posture, with implemented controls receiving the most favorable weighting.

Severity scale

Each control has a severity rating from 1 to 5, indicating how critical it is to your security program:
SeverityDescription
1Low impact — supplementary or best-practice control
2Minor impact — useful but not foundational
3Moderate impact — meaningful contribution to posture
4High impact — significant protection against common threats
5Required — foundational control; must be implemented
Severity 5 controls are required controls. Marking them as implemented is not enough — they receive no credit toward your compliance score until supporting evidence has been uploaded and validated. Self-attestation alone is insufficient for required controls.

Maturity scale

Each control has a maturity rating from 1 to 5 that reflects how consistently and thoroughly the control is implemented:
Maturity levelDescription
1Initial — ad hoc, undocumented
2Developing — some documentation or process exists
3Defined — documented and consistently followed
4Managed — measured, monitored, and reviewed
5Optimizing — continuously improved and formally tested
Higher maturity amplifies a control’s contribution to your risk score. A control at maturity level 1 contributes far less than the same control at maturity level 4 or 5, even if both are marked implemented. SecurAtlas also calculates an effective maturity for each control. This is a computed value that adjusts the stated maturity downward when evidence quality is low. If your evidence does not strongly support the claimed implementation level, the effective maturity — and the corresponding score contribution — will be reduced.

Framework mappings

Each control in the library maps to one or more requirements across the compliance frameworks you have activated. A single control can satisfy requirements from ISO 27001, SOC 2, NIST CSF, and other frameworks at the same time. When you implement a control and attach evidence, all aligned framework requirements benefit from that work automatically. For more on how frameworks use these mappings, see Compliance Frameworks.