11 Frameworks Supported

Compliance Frameworks

Understand what each compliance framework requires and browse the policy templates you need to achieve certification. PoliWriter generates documentation for all major frameworks.

SOC 2 Type II

SOC 2 Type II is the gold standard for demonstrating security controls to enterprise customers. It covers five Trust Services Criteria: Security, Availability, Processing Integrity, Confidentiality, and Privacy. Auditors evaluate your controls over a period of 6-12 months.

Best for

SaaS companies, cloud service providers, and any organization handling customer data

20 policies
Security

GDPR

The General Data Protection Regulation (GDPR) is the EU's comprehensive data protection law. It governs how organizations collect, process, store, and transfer personal data of EU residents. Non-compliance can result in fines of up to 4% of global annual revenue.

Best for

Any organization processing personal data of EU/EEA residents

3 policies
Privacy

HIPAA

HIPAA establishes national standards for protecting sensitive patient health information. It requires administrative, physical, and technical safeguards for Protected Health Information (PHI). The Security Rule, Privacy Rule, and Breach Notification Rule form its three key components.

Best for

Healthcare providers, health plans, healthcare clearinghouses, and their business associates

3 policies
Privacy

ISO 27001

ISO/IEC 27001 is the international standard for information security management systems (ISMS). It provides a systematic approach to managing sensitive information through risk assessment, security controls, and continuous improvement. Certification is recognized globally.

Best for

Organizations of any size seeking internationally recognized security certification

3 policies
Security

PCI DSS v4.0

PCI DSS v4.0 is the global security standard for organizations that store, process, or transmit payment cardholder data. It mandates 12 high-level requirements covering network security, cardholder data protection, vulnerability management, and more.

Best for

Merchants, payment processors, and any organization handling payment card data

12 policies
Security

CCPA/CPRA

The California Consumer Privacy Act (CCPA) and its amendment the CPRA give California consumers rights over their personal information. Businesses must honor requests to know, delete, correct, and opt out of the sale or sharing of personal data.

Best for

Businesses collecting personal data from California residents that meet certain thresholds

8 policies
Privacy

NIST CSF 2.0

The NIST Cybersecurity Framework 2.0 provides voluntary guidance for managing cybersecurity risk. It organizes practices into six functions: Govern, Identify, Protect, Detect, Respond, and Recover — giving organizations a flexible, risk-based approach to cybersecurity.

Best for

Organizations of any size or sector seeking a flexible cybersecurity risk management framework

10 policies
Security

SOC 2 Type I

SOC 2 Type I is a point-in-time assessment that evaluates whether your security controls are properly designed. It is the ideal starting point for organizations pursuing SOC 2 certification for the first time before progressing to the more rigorous Type II audit.

Best for

Startups and growing companies seeking their first SOC 2 certification

0 policies
Security

ISO 42001

ISO/IEC 42001 is the first international standard for Artificial Intelligence Management Systems (AIMS). It provides a framework for responsible AI development, deployment, and governance — covering risk management, transparency, human oversight, and continuous monitoring.

Best for

Organizations developing, deploying, or using AI systems that need to demonstrate responsible AI practices

0 policies
Security

NIS 2 Directive

The NIS 2 Directive (EU 2022/2555) is EU-wide cybersecurity legislation that requires essential and important entities to implement comprehensive risk management measures, supply chain security, and incident reporting within 24 hours of detection.

Best for

Essential and important entities operating in the EU across energy, transport, health, digital infrastructure, and more

0 policies
Security

NIST SP 800-53

NIST SP 800-53 provides a comprehensive catalog of security and privacy controls for federal information systems. Widely adopted by private sector organizations, it covers 20 control families from access control to system integrity.

Best for

Federal agencies, government contractors, and private organizations seeking comprehensive security controls

0 policies
Security

Framework Comparison

Understand which frameworks apply to your organization

FeatureSOC 2 Type IIGDPRHIPAAISO 27001PCI DSS v4.0CCPA/CPRANIST CSF 2.0SOC 2 Type IISO 42001NIS 2 DirectiveNIST SP 800-53
Focus AreaSecurity ControlsData PrivacyHealthcare DataSecurity Management
Geographic ScopeUS / GlobalEU / EEAUnited StatesInternational
Required Policies20333128100000
Certification TypeAudit ReportSelf-AssessmentSelf-AssessmentCertification
Typical Timeline3-12 months1-6 months3-12 months6-18 months

Ready to get compliant?

PoliWriter generates audit-ready documentation for all four frameworks. Answer questions about your infrastructure and get customized policies in hours.