WAF++ WAF++
Back to WAF++ Homepage

Regulatory Mapping

This page gives compliance officers and auditors a direct overview: which WAF++ controls cover which regulatory requirements – cross-pillar, in a single view.

The mappings reflect the normative intent of the controls, but do not replace legal advice. A complete compliance statement always requires an organization-specific gap analysis.


GDPR – General Data Protection Regulation

GDPR-relevant controls are distributed across two pillars: Sovereign (technical and organizational measures, data transfers, deletion) and Cost (storage limitation, deletion obligations).

GDPR Article Requirement WAF++ Controls

Art. 5(1)(e)

Storage limitation – data must not be retained longer than necessary

COST-040 · COST-070

Art. 17

Right to erasure

SOV-050 · SOV-100 · COST-040

Art. 20

Right to data portability

SOV-100

Art. 28

Processor – contractual requirements

SOV-080 · SOV-100

Art. 30

Records of processing activities

SOV-010 · SOV-080

Art. 32

Technical and organizational measures

SOV-020 · SOV-030 · SOV-040 · SOV-050 · SOV-060 · SOV-070 · SOV-090

Art. 33

Notification of data breaches

SOV-070

Art. 44

General principles for data transfers

SOV-010 · SOV-020 · SOV-030 · SOV-040 · SOV-090

Art. 46

Transfers subject to appropriate safeguards

SOV-010 · SOV-020 · SOV-030 · SOV-080 · SOV-090 · SOV-100


BSI C5:2020

The BSI Cloud Computing Compliance Criteria Catalogue is fully covered by the Sovereign pillar.

BSI C5 Control Requirement area WAF++ Controls

OPS-04

Data management and data locality

SOV-010 · SOV-020 · SOV-030 · SOV-040 · SOV-080 · SOV-090

OPS-06

Service handover / exit management

SOV-100

INF-01

Geographic location of infrastructure

SOV-020

NET-01

Network security

SOV-090

LOG-01

Logging of security events

SOV-040 · SOV-070

LOG-02

Protection of log data

SOV-040

IAM-01

Identity and access management

SOV-060

IAM-03

Privileged access

SOV-060 · SOV-070

IAM-05

Review of access rights

SOV-060

CRY-01

Cryptographic methods

SOV-050

CRY-02

Key management

SOV-050

BCM-01

Business continuity management

SOV-030

BCM-02

Emergency planning and testing

SOV-070

SCA-01

Supply chain / subcontractors

SOV-080

SIM-01

Security incident management

SOV-010

SIM-02

Detection of security incidents

SOV-090

PRO-01

Portability and interoperability

SOV-100


EUCS – EU Cybersecurity Certification Scheme for Cloud Services (ENISA)

EUCS Control Requirement area WAF++ Controls

SOV-01 / SOV-02

Data sovereignty – geographic restrictions

SOV-020

SOV-03

Cryptographic data sovereignty

SOV-050

DSP-01

Data classification

SOV-010

DSP-04

Data backup and recovery

SOV-030

IAM-01

Access control policy

SOV-060

IAM-03

Privileged access

SOV-060 · SOV-070

IAM-04

Third-party access policy

SOV-010 · SOV-080

LOG-01

Logging

SOV-040 · SOV-070

IVS-09

Network security

SOV-040 · SOV-090

IVS-10

Egress control

SOV-090

BCR-01

Business continuity

SOV-030

CRY-01 / CRY-03

Encryption and key management

SOV-050

SCA-01

Subcontractors and supply chain

SOV-080

PRO-01 / PRO-02

Portability and reversibility

SOV-100


ISO 27001:2022

ISO Control Requirement area WAF++ Controls

A.5.3

Separation of duties

SOV-060

A.5.12

Classification of information

SOV-010

A.5.19

Information security in supplier relationships

SOV-080

A.5.20

Information security in supplier agreements

SOV-080 · SOV-100

A.5.21

Managing ICT supply chain

SOV-080

A.5.26

Response to information security incidents

SOV-070

A.5.29

Information security during disruption

SOV-020 · SOV-030

A.5.33

Protection of records

SOV-010

A.8.2

Privileged access rights

SOV-060

A.8.3

Restriction of access to information

SOV-060

A.8.10

Deletion of information

SOV-010 · SOV-020 · SOV-100

A.8.13

Information backup

SOV-030

A.8.15

Logging

SOV-040 · SOV-070

A.8.16

Monitoring activities

SOV-040 · SOV-070

A.8.20

Network security

SOV-090

A.8.21

Security of network services

SOV-090

A.8.22

Segregation of networks

SOV-090

A.8.24

Use of cryptography

SOV-050

A.8.25

Secure development lifecycle

SOV-050


GAIA-X

GAIA-X Requirement Area WAF++ Controls

Sovereign Cloud – Data location requirements

Geographic data locality

SOV-010 · SOV-020

Data Sovereignty – Location transparency

Transparency about data locations

SOV-020

Sovereign Cloud – Cryptographic self-determination

Key ownership with the user

SOV-050

Sovereign Cloud – Reversibility requirements

Provider switching and portability

SOV-100


SOC 2

SOC 2 Control Requirement area WAF++ Controls

CC6.3

Logical and physical access – Privilege access management

SOV-060

CC6.6

Logical access controls – Remote access

SOV-060

CC7.4

Security incident response and monitoring

SOV-070


SLSA – Supply-chain Levels for Software Artifacts

SLSA Level Requirement area WAF++ Controls

L2

Source and build integrity, provenance

SOV-080

L3

Build hardening, hermetic builds, verified provenance

SOV-080


FinOps Foundation

FinOps area Requirement WAF++ Controls

Inform Phase – Cost Allocation

Cost transparency and allocation to teams / workloads

COST-010

Inform Phase – Budget Visibility

Budgets visible and with alerting

COST-020

Optimize Phase – Rightsizing

Adjust resources to usage, detect idle

COST-030

Optimize Phase – Storage Lifecycle

Lifecycle rules for storage and retention

COST-040

Optimize Phase – Observability Costs

Limit logging retention, use tiering

COST-070

Optimize Phase – Rate Optimization

Reserved instances / savings plans for baseline workloads

COST-080

Optimize Phase – Network Costs

Control egress and data transfer costs

COST-090

Operate Phase – Tagging & Attribution

Tag enforcement as the basis for all cost allocation

COST-010

Operate Phase – Budget Management

Budget management and variance reporting

COST-020

Operate Phase – Architecture Governance

Document cost impacts in architectural decisions

COST-050

Operate Phase – Review Cadence

Regular FinOps reviews with defined participants

COST-060

Operate Phase – Cost Debt Governance

Register architectural cost debt and review quarterly

COST-100


Summary Matrix – Controls by Framework

The following matrix shows at a glance which controls touch which frameworks:

Control GDPR BSI C5 EUCS ISO 27001 GAIA-X SOC 2 FinOps

SOV-010 Data Residency

SOV-020 Region Pinning

SOV-030 Backup Location

SOV-040 Log Residency

SOV-050 Key Ownership

SOV-060 Privileged Access

SOV-070 Break-Glass

SOV-080 Dependencies

SOV-090 Egress Control

SOV-100 Exit Plan

COST-010 Tagging

COST-020 Budgets

COST-030 Rightsizing

COST-040 Retention

COST-050 ADR Cost Impact

COST-060 FinOps Cadence

COST-070 Log Cost Tiers

COST-080 Reserved Capacity

COST-090 Egress Costs

COST-100 Cost Debt Register


Further Reading