Compliance Framework Mapping

Nucleus Verify maps security findings to industry-standard frameworks used by auditors and compliance teams across 11 regulatory and security standards.


Frameworks by Jurisdiction

Select a framework to jump to its detailed mapping below.

🌐 Global
🇪🇺 European Union
🇬🇧 United Kingdom
🇺🇸 United States
🏦 Global Financial

🌐 OWASP LLM Top 10 (2025)

The OWASP Top 10 for Large Language Model Applications is the industry-standard classification of security risks specific to LLM-powered systems. It provides a shared vocabulary for development teams, security auditors, and compliance officers to identify and communicate AI-specific vulnerabilities.

CategoryNameNucleus Coverage
LLM01Prompt InjectionDetected
LLM02Insecure Output HandlingDetected
LLM03Training Data PoisoningPartial
LLM04Model Denial of ServicePartial
LLM05Supply Chain VulnerabilitiesDetected
LLM06Sensitive Information DisclosureDetected
LLM07Insecure Plugin DesignDetected
LLM08Excessive AgencyPartial
LLM09OverrelianceStructural
LLM10Model TheftPartial
Disclaimer: OWASP coverage reflects structural code-pattern detection. Nucleus Verify does not execute or interact with live LLM endpoints. Categories marked "Partial" rely on static indicators that may not capture all runtime behaviours.

🌐 NIST AI RMF 1.0 (Global / US)

The NIST AI Risk Management Framework (AI RMF 1.0) provides organisations with a structured approach to managing AI-related risks throughout the AI lifecycle. It defines four core functions that together form a comprehensive risk management strategy for AI systems.

GOVERN

Establishes organisational policies, processes, and accountability structures for AI risk management across the enterprise.

Nucleus role: Provides verifiable, signed evidence of code verification that integrates into existing governance workflows. Certificates and proof packs create the audit trail governance frameworks require.

MAP

Identifies and categorises AI risks in context, including risks arising from third-party components and AI-generated outputs.

Nucleus role: Maps findings to CWE, OWASP, and compliance frameworks automatically. Every detected vulnerability is categorised by type, severity, and applicable regulatory context.

MEASURE

Quantifies and tracks identified AI risks using appropriate metrics, tools, and techniques for ongoing assessment.

Nucleus role: Produces quantified trust scores, severity distributions, and trend data across scans. Deterministic operators ensure repeatable, comparable measurements over time.

MANAGE

Prioritises and acts on identified risks through allocation of resources and implementation of mitigation strategies.

Nucleus role: Prioritises findings by severity and provides actionable remediation guidance. CI/CD integration enables risk management as a continuous process, not a one-time audit.

Disclaimer: Nucleus Verify supports the MAP and MEASURE functions through automated code analysis. GOVERN and MANAGE functions require organisational processes beyond the scope of any single tool.

🌐 ISO 27001:2022 (Global)

ISO/IEC 27001:2022 is the internationally recognised standard for information security management systems (ISMS). Annex A controls provide a comprehensive set of security measures that organisations implement to protect information assets. Nucleus Verify detects code-level patterns that map to the following Annex A controls.

Control / ArticleWhat Nucleus Detects
A.5.23Cloud and third-party security — detects vulnerable third-party dependencies and supply chain risks.
A.8.9Configuration management — detects Kubernetes secrets stored in ConfigMaps.
A.8.12Data leakage prevention — detects hardcoded secrets, credentials in environment files, and sensitive data in log output.
A.8.24Use of cryptography — detects weak or deprecated cryptographic algorithms and insecure random token generation.
A.8.25Secure development lifecycle — detects SQL injection, command injection, and cross-site scripting (XSS) vulnerabilities.
A.8.26Application security — detects authorisation mismatches, missing brute-force protection, insecure deserialization, SSRF, and path traversal.
A.8.27Secure system architecture — detects exposed internal IP addresses and debug mode left enabled.
A.8.28Secure coding — detects dynamic code execution via eval, exec, and compile injection.
A.8.29Security testing — detects CI/CD pipeline injection vulnerabilities.
Disclaimer: Nucleus Verify detects code-level patterns associated with these Annex A controls. ISO 27001 certification requires a full ISMS implementation, management review, and independent audit by an accredited certification body.

🇪🇺 DORA (EU — Digital Operational Resilience Act)

The Digital Operational Resilience Act (Regulation (EU) 2022/2554) sets uniform requirements for the security of network and information systems supporting the business processes of financial entities. It entered into application on 17 January 2025. Nucleus Verify maps code-level findings to the following DORA articles.

Control / ArticleWhat Nucleus Detects
Art. 9(2)(b)ICT security — detects hardcoded credentials, authorisation mismatches, and missing brute-force protection.
Art. 9(2)(c)ICT security — detects weak or deprecated cryptographic algorithms.
Art. 9(2)(d)ICT security — detects sensitive data in logs and exposed internal IP addresses.
Art. 9(4)(a)Secure development — detects SQL injection, command injection, XSS, code injection, and insecure deserialization.
Art. 25(1)Digital operational resilience testing — detects CI/CD pipeline injection vulnerabilities.
Art. 28(4)(b)ICT third-party risk — detects vulnerable dependencies and typosquatting in supply chain.
Art. 28(4)(c)ICT third-party risk — detects licence compliance violations in dependencies.
Disclaimer: Nucleus Verify identifies code-level patterns relevant to DORA technical requirements. Full DORA compliance requires organisational ICT risk management frameworks, incident reporting processes, and operational resilience testing that extend beyond static code analysis.

🇬🇧 FCA SS1/21 (UK — Financial Conduct Authority)

FCA Supervisory Statement SS1/21 sets expectations for operational resilience of UK-regulated financial services firms. Sections 7.4 through 7.8 address ICT and third-party risk management requirements. Nucleus Verify maps code-level findings to these expectations.

Control / ArticleWhat Nucleus Detects
SS1/21 §7.4ICT security — detects hardcoded credentials, authorisation mismatches, and weak cryptography.
SS1/21 §7.5Cyber resilience — detects missing rate limiting and brute-force protection on authentication endpoints.
SS1/21 §7.6Application security — detects injection vulnerabilities (SQL, command, XSS), debug mode, path traversal, and CI/CD pipeline risks.
SS1/21 §7.7Data security — detects sensitive data exposure in application logs.
SS1/21 §7.8Third-party risk — detects vulnerable third-party dependencies and supply chain risks.
Disclaimer: Nucleus Verify detects code-level patterns relevant to FCA operational resilience expectations. Full compliance with SS1/21 requires board-level governance, impact-tolerance setting, and ongoing scenario testing that extends beyond static code analysis.

🇪🇺 🇬🇧 PSD2 (EU + UK — Payment Services Directive 2)

The Revised Payment Services Directive (PSD2) and its Regulatory Technical Standards (RTS) on Strong Customer Authentication set security requirements for payment service providers. Nucleus Verify maps code-level findings to the following RTS articles relevant to secure software development.

Control / ArticleWhat Nucleus Detects
RTS Art. 3Strong customer authentication — detects weak cryptography, hardcoded credentials, and timing-attack vulnerabilities in authentication.
RTS Art. 4Authentication safeguards — detects missing brute-force protection and access control weaknesses.
RTS Art. 22(1)Security measures — detects injection vulnerabilities, XSS, insecure deserialization, and path traversal.
RTS Art. 22(3)Data security — detects payment data and credentials exposed in application logs.
RTS Art. 30Open Banking API security — detects server-side request forgery (SSRF) in API endpoints.
Disclaimer: Nucleus Verify detects code-level patterns relevant to PSD2 RTS security requirements. Full PSD2 compliance requires authorisation from national competent authorities, operational processes, and consumer-protection measures beyond static analysis.

🌐 SWIFT CSP (Customer Security Programme)

The SWIFT Customer Security Programme (CSP) and its Customer Security Control Framework (CSCF) define mandatory and advisory security controls for all institutions connected to the SWIFT network. Nucleus Verify detects code patterns relevant to the following CSCF controls.

Control / ArticleWhat Nucleus Detects
CSCF 1.1SWIFT environment protection — detects hardcoded credentials and exposed internal network addresses.
CSCF 2.2Security updates — detects vulnerable dependencies and supply chain integrity risks.
CSCF 4.1Password policy — detects weak cryptography, missing brute-force protection, and timing-attack vulnerabilities.
CSCF 6.1Malware protection — detects code execution vulnerabilities and insecure deserialization.
CSCF 7.1Vulnerability scanning — detects SQL injection, command injection, XSS, and path traversal vulnerabilities.
CSCF 7.3APenetration testing — detects CI/CD pipeline injection vulnerabilities.
Disclaimer: Nucleus Verify detects code-level patterns relevant to SWIFT CSCF controls. Full CSP compliance requires independent assessment, annual self-attestation, and operational controls that extend beyond static code analysis.

🇪🇺 GDPR (EU — General Data Protection Regulation)

The General Data Protection Regulation (Regulation (EU) 2016/679) governs the processing and protection of personal data. Nucleus Verify detects code-level patterns relevant to data-protection-by-design principles across key GDPR articles.

Enhanced Compliance Pack

Deep analysis available covering Article 5 (data processing principles), Article 17 (right to erasure), Article 20 (data portability), Article 25 (data protection by design), Article 32 (security of processing), and Article 35 (data protection impact assessment).

View Compliance Pack pricing →
Disclaimer: Nucleus Verify detects structural code patterns associated with GDPR technical requirements. GDPR compliance requires organisational measures, data-protection officers, lawful-basis assessments, and supervisory authority engagement beyond code analysis.

🇺🇸 HIPAA (US — Health Insurance Portability and Accountability Act)

HIPAA establishes national standards to protect individuals' electronic personal health information. The Security Rule (45 CFR Part 164) specifies safeguards that covered entities and business associates must implement. Nucleus Verify detects code-level patterns relevant to the technical safeguard requirements.

Enhanced Compliance Pack

Deep analysis available covering §164.312 technical safeguards — access controls, audit controls, integrity controls, person-or-entity authentication, and transmission security.

View Compliance Pack pricing →
Disclaimer: Nucleus Verify detects structural code patterns associated with HIPAA technical safeguards. HIPAA compliance requires administrative and physical safeguards, risk assessments, and business associate agreements beyond code analysis.

🏦 PCI-DSS (Payment Card Industry Data Security Standard)

PCI-DSS provides a baseline of technical and operational requirements designed to protect cardholder data. Version 4.0 introduces updated requirements for software security and modern development practices. Nucleus Verify detects code patterns relevant to the following requirements.

Enhanced Compliance Pack

Deep analysis available covering Requirement 3 (protect stored account data), Requirement 6 (develop and maintain secure systems), Requirement 8 (identify users and authenticate access), and Requirement 10 (log and monitor all access).

View Compliance Pack pricing →
Disclaimer: Nucleus Verify detects structural code patterns associated with PCI-DSS requirements. PCI-DSS compliance requires a Qualified Security Assessor (QSA) assessment, network segmentation, and operational controls beyond code analysis.

🏦 SOC 2 (Service Organization Control 2)

SOC 2, developed by the AICPA, defines criteria for managing customer data based on trust service principles: security, availability, processing integrity, confidentiality, and privacy. Nucleus Verify detects code-level patterns relevant to the common criteria and availability principle.

Enhanced Compliance Pack

Deep analysis available covering CC6 (logical and physical access controls), CC7 (system operations), CC8 (change management), CC9 (risk mitigation), and A1 (availability).

View Compliance Pack pricing →
Disclaimer: Nucleus Verify detects structural code patterns associated with SOC 2 trust service criteria. SOC 2 compliance requires an independent audit by a licensed CPA firm and organisational controls beyond code analysis.

Other Standards

In addition to the frameworks above, every Nucleus Verify finding includes a CWE reference (Common Weakness Enumeration), providing a standardised identifier that links directly to the MITRE CWE database. CWE references enable cross-mapping to virtually any compliance framework or internal security taxonomy your organisation uses.


Disclaimer
Structural pattern detection only. Nucleus Verify identifies structural code patterns associated with the frameworks listed on this page. This is not a formal compliance certification, attestation, or legal opinion. Compliance with any regulatory framework requires independent assessment by qualified professionals, organisational policies and procedures, and ongoing monitoring that extends beyond static code analysis. Nucleus Verify is a tool that supports compliance efforts — it does not replace them. Always consult qualified legal and compliance advisors for regulatory requirements specific to your jurisdiction and industry.
Nucleus Verify is built by Alter Menta Technologies Ltd, London.
Reg. 17036841.
For immediate questions: contact@altermenta.com