Compliance Mapping Guide

Continuous Compliance Evidence from the Wire

WireTrace generates audit-ready compliance evidence automatically from observed network traffic. Asset inventories, communication flows, access control validation, encryption posture, and segmentation evidence are always current — replacing periodic manual assessments that go stale between audits. This guide maps WireTrace capabilities to specific control requirements across supported frameworks.

The WireTrace Approach to Compliance

Continuous, Not Periodic

Evidence is generated from live traffic observations every day — not collected manually once per audit cycle. Compliance posture is always current.

Evidence-Based, Not Self-Reported

Findings are derived from what is actually happening on the network. Asset inventories, encryption usage, and communication patterns are observed facts, not questionnaire responses.

Operationally Useful, Not Just Audit Artifacts

The same data that satisfies auditors also drives daily security operations: incident investigation, risk prioritization, and change monitoring.

IEC 62443 — Industrial Automation Security

IEC 62443 RequirementWireTrace EvidenceHow It Works
Zone & Conduit Model (3-2)Zone boundaries mapped from observed traffic. Cross-zone communications documented with protocol detail.Passive traffic analysis identifies which assets communicate across zone boundaries and over which protocols.
Asset Inventory (2-1, 3-2)Continuously updated inventory of every industrial asset: PLCs, RTUs, HMIs, gateways, engineering workstations.Multi-signal classification from protocol fingerprints, MAC OUI, DHCP hostnames, and behavioral patterns.
Access Control (3-3)Communication pattern evidence showing which devices access which systems over which protocols.Protocol-level inspection identifies who is communicating with controllers and what commands are being sent.
Network Monitoring (3-3, 4-2)Continuous monitoring of all industrial network communications with alerting on deviations.Behavioral baselines per device and per protocol. Deviations surfaced with full protocol context.
Security Assessment (2-1)Attack surface analysis: cleartext protocols, unprotected industrial communications, exposed services.Security Insights engine automatically identifies unsafe configurations from observed traffic.

NCA OTCC — Saudi OT Cybersecurity Controls

OTCC DomainWireTrace EvidenceHow It Works
OT Asset ManagementComplete OT asset inventory with vendor, model, firmware, and protocol details. Continuously updated.Passive discovery from observed industrial protocol communications.
OT Network SecurityNetwork segmentation evidence, cross-zone communication detection, unauthorized lateral movement alerts.Zone boundary monitoring from traffic analysis. Purdue level assignment per asset.
OT Monitoring & DetectionContinuous monitoring of all OT communications. Behavioral baseline deviations, unauthorized commands, anomalous patterns.Protocol-aware baselines detect changes in command patterns, polling frequencies, and communication peers.
OT Incident ManagementProtocol-level forensic evidence for incident investigation. Full communication history per asset.Historical records of all observed communications, commands, and connection changes.
wiretrace.io | sales@wiretrace.ioPage 1 of 2
Compliance Mapping Guide

NCA ECC — Essential Cybersecurity Controls

ECC DomainWireTrace EvidenceHow It Works
Asset Management (2-2)Comprehensive asset inventory across IT, OT, and IoT. Vendor, OS, firmware, and classification details.Passive protocol analysis identifies every communicating device without agents or scanning.
Network Security (2-7)Segmentation validation, communication flow documentation, unauthorized access detection.Cross-segment communication monitoring. Protocol-level access pattern evidence.
Continuous Monitoring (2-12)Real-time monitoring of network communications with alerting on deviations and threats.Behavioral baselines, IoC matching, and attack surface analysis from observed traffic.
Vulnerability Mgmt (2-3)CVE correlation with observed assets. Prioritized by real protocol exposure and active firmware.NVD, CISA KEV, EPSS matching against discovered assets and their observed software versions.

ISO 27001 — Information Security Management

ISO 27001 ControlWireTrace EvidenceHow It Works
A.8 Asset ManagementContinuously updated asset inventory. Classification by type, vendor, OS, firmware, network role.Multi-signal passive discovery and weighted classification from observed protocol behavior.
A.9 Access ControlCommunication pattern evidence. Which devices access which services over which protocols.Protocol-level access monitoring. Unauthorized communication peer detection.
A.10 CryptographyTLS certificate inventory: subject, issuer, validity, key strength. Self-signed and expired certificate detection.TLS handshake inspection extracts certificate fields from observed connections.
A.12 Operations SecurityChange monitoring: new devices, removed devices, new services, configuration changes.Continuous traffic analysis detects changes in network behavior and device communications.
A.13 CommunicationsNetwork segmentation evidence. Cleartext protocol detection. Encryption posture per connection.Protocol-aware inspection identifies unencrypted communications and cross-segment flows.

HIPAA — Healthcare Security Rule

HIPAA RequirementWireTrace EvidenceHow It Works
164.310 Physical (Device Inventory)Complete medical device inventory. Manufacturer, model, function, firmware, communication patterns.Proprietary medical protocol parsing identifies clinical devices by vendor and function.
164.312 Technical (Access Controls)Access pattern evidence showing which devices communicate with ePHI systems.Protocol-level monitoring of EMR, PACS, and clinical gateway communications.
164.312 Transmission SecurityEncryption posture per connection. Cleartext ePHI flow detection.TLS inspection and protocol analysis identify unencrypted clinical data transmissions.
164.312 Audit ControlsContinuous communication audit trail per medical device.Every observed communication logged with protocol detail, timestamp, and peer information.

Evidence Types Generated

Asset Inventories

Complete, continuously updated device inventories with vendor, model, OS, firmware, and network role.

Communication Flows

Protocol-level documentation of which devices communicate, over which protocols, with which commands.

Security Findings

Cleartext credentials, expired certificates, exposed interfaces, unprotected protocols identified from traffic.

From Periodic Audits to Continuous Evidence

WireTrace replaces manual compliance evidence collection with continuous, traffic-derived proof.   wiretrace.io  |  sales@wiretrace.io

wiretrace.io | sales@wiretrace.ioPage 2 of 2