Skip to main content

Compliance Mapping Guide

See exactly which RansomLeak exercises satisfy requirements for SOC 2, ISO 27001, GDPR, HIPAA, NIS2, PCI DSS, and DORA. Map your training program to compliance controls.

Each table below links specific framework requirements to the courses and exercises that address them, so you can build a training plan that satisfies your auditors.

7
Frameworks
13
Courses
100+
Exercises
Audit-Ready
Reports

How Does RansomLeak Map to SOC 2 Requirements?

SOC 2 Trust Services Criteria require organizations to demonstrate security awareness across their workforce. RansomLeak exercises map directly to Common Criteria controls, giving auditors the evidence they need.

How Does RansomLeak Map to ISO 27001 Requirements?

ISO 27001 Annex A controls require documented security awareness programs. RansomLeak provides structured training content and completion tracking that satisfies these controls during certification audits.

How Does RansomLeak Map to GDPR Requirements?

GDPR Articles 39 and 47 require data protection training for employees who process personal data. RansomLeak offers a dedicated GDPR Compliance course with exercises that cover breach response, data subject rights, and privacy by design.

Requirement AreaRansomLeak CoursesExample Exercises
Art. 39 DPO Awareness TrainingGDPR ComplianceData Mapping and Records of Processing, Data Protection Impact Assessment
Art. 33 Breach NotificationGDPR Compliance, Incident ReportingData Breach Response, Tabletop Breach, General Incident Reporting
Art. 25 Privacy by DesignGDPR CompliancePrivacy by Design Review, Cookie Compliance
Art. 15-22 Data Subject RightsGDPR ComplianceLegitimate DSAR Processing, Fraudulent DSAR Detection
Art. 28 Processor ObligationsGDPR ComplianceThird-Party Data Processor Vetting
Art. 44-49 International TransfersGDPR ComplianceCross-Border Data Transfers
Art. 5 Data PrinciplesGDPR Compliance, Protecting Sensitive InformationData Retention, Data Classification Basics, PII Document Redaction

How Does RansomLeak Map to HIPAA Requirements?

HIPAA Security and Privacy Rules mandate workforce training on safeguarding protected health information. RansomLeak exercises address the specific administrative, physical, and technical safeguards outlined in 45 CFR Part 164.

How Does RansomLeak Map to NIS2 Requirements?

The NIS2 Directive requires essential and important entities across the EU to implement cybersecurity training and hygiene practices. Article 21 specifically mandates human resources security and awareness programs.

How Does RansomLeak Map to PCI DSS Requirements?

PCI DSS v4.0 Requirement 12.6 mandates a formal security awareness program for all personnel. RansomLeak training satisfies this requirement with documented completion records and threat-specific content updates.

How Does RansomLeak Map to DORA Requirements?

The Digital Operational Resilience Act (DORA) requires financial entities to implement ICT security awareness programs and test their operational resilience. RansomLeak delivers training that addresses Articles 13, 17, 25, and 28.

Why Do Compliance Audits Fail on Security Training?

The most common audit finding for security awareness training is not missing training, but missing evidence. Organizations run training programs but cannot prove which employees completed which exercises, when they completed them, or how those exercises map to specific framework controls. According to the Ponemon Institute's 2024 Cost of a Data Breach Report, organizations with structured training programs experienced breach costs 23% lower than those without.

Auditors want three things: proof that training covers the required control areas, timestamped completion records per employee, and evidence that training is refreshed regularly. Generic "annual security training" certificates rarely satisfy these requirements, especially under ISO 27001 and SOC 2 where specific control mappings are expected.

RansomLeak solves this by mapping every exercise to specific framework controls and generating exportable reports with per-employee completion data. Compliance teams can hand auditors a report that shows exactly which controls were covered and by whom.

Frequently Asked Questions

Common questions about compliance mapping and audit-ready training reports.

Which compliance frameworks does RansomLeak training cover?

RansomLeak training maps to seven major frameworks: SOC 2, ISO 27001, GDPR, HIPAA, NIS2, PCI DSS, and DORA. Each framework has specific requirement areas linked to relevant courses and exercises.

We update our mapping tables as frameworks release new versions or guidance documents. If your organization follows a framework not listed here, contact us to discuss custom mapping.

Can RansomLeak generate audit-ready compliance reports?

Yes. The platform exports compliance reports in PDF, CSV, and Excel formats that document training completion by employee, department, and framework requirement. Reports include timestamps, scores, and evidence of participation.

Auditors can verify that specific controls have been addressed through structured training records without manual data collection.

How often should compliance training be refreshed?

Most frameworks require at least annual training, but best practice is quarterly or monthly updates. SOC 2 and ISO 27001 auditors expect to see ongoing awareness activities, not just a single annual session.

RansomLeak ships new content monthly, so you can assign fresh exercises on a regular cadence without repeating the same material.

Does RansomLeak support SCORM for compliance LMS tracking?

Yes. Every exercise exports as a SCORM 1.2 or SCORM 2004 package that runs inside your existing LMS. Completion data, scores, and time spent flow directly into your LMS reporting system.

Visit our SCORM integration page for details on supported platforms and deployment steps.

Can training be customized for specific compliance requirements?

Yes. Our content team builds custom exercises tailored to your regulatory environment. Healthcare organizations can get HIPAA-specific scenarios. Financial institutions can focus on PCI DSS and DORA requirements.

Custom content follows the same interactive 3D format and integrates with the standard compliance reporting tools.

What evidence does RansomLeak provide for auditors?

RansomLeak generates detailed training records that include employee name, department, exercise completed, date, time spent, score, and the specific compliance control addressed. These records are exportable and retention policies keep historical data available for multi-year audits.

For organizations using SCORM, the LMS maintains its own independent audit trail alongside RansomLeak records.

Map Your Training to Compliance

Talk to our team about building a compliance-aligned training program, or explore the full exercise catalogue to see what is available.