HiringCoachAI

NIST CSF 2.0 mapping

Last reviewed 2026-05-18

Mapping of HiringCoachAI controls to NIST CSF 2.0 functions and categories. This is the framework we claim alignment to for HECVAT DOCU-04 and customer security reviews.

Govern (GV)

CategoryOur controlsEvidence
GV.OC: Organizational ContextDefined scope, product, hosting modeldeployment model
GV.RM: Risk Management StrategyRisk register in internal audit; risk tiers for vendorsvendor risk management
GV.RR: Roles, Responsibilities, and AuthoritiesSecurity Officer, Privacy Officer / data-protection contact, and Engineering Lead definedinformation security policy
GV.PO: PolicyFull policy set in docs/compliance/this directory
GV.OV: OversightQuarterly internal audit; annual policy reviewinternal audit program
GV.SC: Cybersecurity Supply ChainVendor-risk program; DPAs; sub-processor listvendor risk management, sub-processors, and the internal DPA register (available on request via [email protected])

Identify (ID)

CategoryOur controlsEvidence
ID.AM: Asset ManagementCode in git; Firebase/Vercel inventory; data mapdata map, architecture
ID.RA: Risk AssessmentThreat model (summary available on request via [email protected]); quarterly auditinternal audit program
ID.IM: ImprovementPost-incident action items; audit findings trackedincident response, internal audit program

Protect (PR)

CategoryOur controlsEvidence
PR.AA: Identity ManagementOAuth and email magic-link sign-in for customers, with opt-in application-level TOTP MFA available on the user's account Security tab. Current administrative accounts are required by policy to use Google Account MFA at the identity-provider layer and MFA on vendor consoles where supported. Authorization enforces administrator vs. non-administrator roles with user-scoped data access enforced by Firestore Security Rules.access control policy
PR.AT: Awareness & TrainingTraining program with role-specific modules; onboarding acknowledgments captured in the admin console; phishing simulations start when at least two sensitive-access recipients existsecurity awareness training (with linked module suite covering security, privacy and data handling, responsible AI, incident reporting, device and physical security, and accessibility)
PR.DS: Data SecurityTLS, at-rest encryption, field-level AES-GCM; DLP via classificationdata classification, data map
PR.PS: Platform SecurityFirestore rules default-deny; CSP; security headers; dependency scanningsecure development lifecycle, patch management
PR.IR: Technology Infrastructure ResilienceGoogle-managed platform durability, Firestore PITR, managed daily backups with 98-day retention, US multi-region backup/export bucket with versioning, soft delete, and a retention policy; restore drillsdisaster recovery plan, data retention policy

Detect (DE)

CategoryOur controlsEvidence
DE.CM: Continuous MonitoringSentry, enabled Vercel log drain to Sentry, status probes, selected Firestore audit logs, and hourly audit-log anomaly monitoring for selected authentication/admin eventsincident response, logging & retention
DE.AE: Adverse Event AnalysisSentry alerts, selected audit-log anomaly findings, and Sev 1/2 triage under the incident-response processincident response, logging & retention

Respond (RS)

CategoryOur controlsEvidence
RS.MA: Incident ManagementIR runbook; severity matrix; on-callincident response
RS.AN: Incident AnalysisPost-mortem template; 5-whysincident response
RS.CO: Incident Response ReportingBreach-notification procedurebreach notification
RS.MI: Incident MitigationContainment steps in IR runbookincident response

Recover (RC)

CategoryOur controlsEvidence
RC.RP: Incident Recovery Plan ExecutionDRP procedures; restore playbooksdisaster recovery plan, business continuity plan
RC.CO: Incident Recovery CommunicationsStatus page; customer comms templatesincident response

Change log

DateChange
2026-04-24Initial mapping
2026-05-07Updated training, privacy role, and monitoring current-state language.

← Back to the trust center

showUpgradeModal: false, modalType: migration, planName: