Skip to main content

Compliance Center Overview

Updated today

The Swif.ai Compliance Center is your centralized workspace for managing device security, enforcing policies, and tracking compliance across frameworks like NIS2, NIST, SOC 2, ISO 27001, HIPAA, and CIS.

It provides real-time visibility into your organization’s compliance posture while automating the enforcement of critical security controls across all managed devices.


What is the Compliance Center?

The Compliance Center brings together:

  • Device security controls

  • Compliance frameworks

  • Real-time monitoring

  • Automated enforcement

…into a single, unified dashboard.

Instead of manually tracking compliance requirements, Swif continuously evaluates your devices and ensures they meet security standardsβ€”helping you stay audit-ready at all times.


Frameworks Snapshot

The Frameworks Snapshot widget gives you an instant overview of your compliance status across multiple frameworks.

You can track:

  • Overall completion % per framework

  • Current status (On Track / At Risk)

  • Number of issues detected

Supported frameworks include:

  • NIS2

  • NIST 800-53

  • SOC 2

  • ISO/IEC 27001

  • HIPAA

  • CIS Benchmarks (Level 1 & Level 2)

This allows IT and security teams to quickly understand where they stand and prioritize remediation.


Compliance Controls

Compliance is enforced through device-level controls, each mapped to one or more frameworks.

Key Control Categories

Swif organizes controls into logical groups such as:

πŸ” Access & Authentication

  • ACC-1 – Unique user accounts

  • AUTH-1 – Strong authentication (password + MFA)

  • LOGIN-1 – Login window configuration

πŸ”’ Data Protection

  • ENC-1 – Full-disk encryption

  • USB-1 – Removable media restrictions

πŸ›‘οΈ Endpoint Security

  • MAL-1 – Anti-malware enforcement

  • PATCH-1 – OS updates and patching

πŸ“¦ Device Management

  • INV-1 – Device inventory and enrollment

βš™οΈ Advanced CIS-Based Controls

Additional controls aligned with CIS benchmarks include:

  • AAC-1 / SAC-1 – Account & system access controls

  • BSC-1 / MSC-1 – Baseline system configurations

  • FDC-1 – Firewall configuration

  • LSC-1 – Logging and system monitoring

  • DRC-1 – Data recovery and backup controls

  • SCC-1 / TSC-1 / SSC-1 – System and service protections

  • ICC-1 / CCC-1 – Configuration consistency and change control

  • HCD-1 – Hardening configurations (e.g., disabling risky macOS features)

Each control includes:

  • Description of the requirement

  • Enforcement mechanism (policy/script)

  • Compliance mappings (e.g., NIST, CIS, ISO)

  • Status (Completed, Not Started, Incomplete)

Here’s an updated section you can append into your existing article (or replace the β€œAdvanced CIS-Based Controls” section). It’s structured to match your Help Center style and clearly introduces all the new CIS Level 1 & Level 2 controls.


CIS Benchmark Controls (Level 1 & Level 2)

Swif.ai supports CIS Benchmarks (Level 1 and Level 2) to help organizations enforce secure device configurations aligned with industry best practices.

These controls focus on system hardening, access restrictions, logging, and attack surface reduction across macOS devices.


πŸ”Ή System Configuration & Hardening

  • MSI-1 – Menu bar system indicators (Wi-Fi, Bluetooth visibility)

  • SIP-1 – System Integrity Protection enforcement

  • PEC-1 – Power and energy security settings (disable network wake features)

  • HCD-1 – Disable hot corners that bypass session lock

  • FDC-1 – File system protections (file extensions visibility, home folder security)

  • CCC-1 – Configuration and certificate controls

  • SCC-1 – Secure system configuration (sudo timeout, privilege restrictions)

  • TSC-1 – Time synchronization for audit consistency

These controls ensure devices are hardened against misconfiguration and local bypass techniques.


πŸ”Ή Account & Access Controls

  • AAC-1 – Account security (disable guest account, root login restrictions)

  • ASC-1 – Application and system service restrictions (Siri, AirDrop, Handoff)

  • ICC-1 – Interface controls (limit system features like Spotlight or Game Center)

  • SAC-1 – Sharing and remote access controls (screen sharing, SMB, AirPlay)

  • LSC-1 – Lock screen configuration and session security

These controls reduce unauthorized access and enforce least privilege principles.


πŸ”Ή Network & Data Protection

  • CNC-1 – Cellular and network configuration controls

  • MAC-1 – Managed application data separation

  • AWC-1 – Apple Watch unlock restrictions

  • USB-1 – Removable media control (from core controls)

These policies help prevent data exfiltration and unauthorized device interactions.


πŸ”Ή Logging, Monitoring & Auditing

  • SSC-1 – Security services (audit logging, firewall logging, Gatekeeper)

  • ALC-1 – Advanced logging configuration and retention

  • MVC-1 – MDM enrollment verification (User Approved MDM)

These controls ensure auditability and support forensic investigations.


πŸ”Ή Backup, Recovery & Diagnostics

  • BSC-1 – Backup security (e.g., encrypted Time Machine backups)

  • DRC-1 – Diagnostic reporting controls

These controls protect sensitive data and reduce unintended data exposure.


πŸ”Ή Performance & Optimization Controls

  • CCD-1 – Content caching configuration

While not directly security-critical, these controls help reduce unnecessary services that may introduce risk.


πŸ” CIS Level 1 vs Level 2

  • CIS Level 1
    Designed for usability and security balance. Recommended for most organizations.

  • CIS Level 2
    More restrictive and security-focused. Intended for high-risk or regulated environments.

Swif.ai automatically maps controls to the appropriate level and allows you to track compliance across both.


How CIS Controls Work in Swif

Each CIS control:

  • Is mapped to CIS Level 1 and/or Level 2

  • Contributes to your Frameworks Snapshot score

  • Can be enforced via Swif policy templates

  • Is continuously monitored for compliance drift

This allows your team to:

  • Identify gaps instantly

  • Apply recommended policies with one click

  • Maintain continuous compliance without manual audits


Control Status & Lifecycle

Each control progresses through a lifecycle:

  • Not Started – Control not yet enforced

  • In Progress – Policy applied but not fully compliant

  • Completed – Fully enforced across devices

  • Incomplete – Devices are out of compliance

Swif continuously monitors device state and updates status in real time.


Smart Policy Enforcement

All controls are powered by Swif’s policy engine, which allows you to:

  • Automatically apply controls to device groups

  • Enforce configurations across Mac, Windows, and Linux

  • Remediate non-compliant devices instantly

  • Customize policies for your organization

This ensures consistent security posture without manual intervention.


Filtering & Organization

The Compliance Center includes powerful tools to manage controls:

  • Filter by framework, status, or category

  • Sort controls by priority or completion

  • Search for specific controls

  • Toggle between:

    • Organization Controls

    • Device Group Controls


Custom Controls

You can create your own compliance controls using:

This is useful for:

  • Internal security requirements

  • Industry-specific policies

  • Advanced configurations beyond standard frameworks


Continuous Compliance & Audit Readiness

Swif.ai ensures that compliance is not a one-time effort but an ongoing process:

  • Continuous monitoring of device posture

  • Automatic drift detection

  • Real-time reporting for audits

  • Integration with tools like Vanta, Drata, and Secureframe

This eliminates manual evidence collection and simplifies audits.


Why It Matters

Modern compliance is no longer just documentationβ€”it requires real enforcement at the device level.

Swif.ai bridges this gap by:

  • Enforcing controls directly on endpoints

  • Mapping controls to compliance frameworks

  • Providing real-time visibility into risk

  • Automating remediation

As a result, organizations can maintain a secure, compliant, and audit-ready environment with minimal overhead


Summary

The Compliance Center helps you:

  • βœ… Monitor compliance across frameworks

  • βœ… Enforce security policies automatically

  • βœ… Track device-level compliance in real time

  • βœ… Stay audit-ready without manual effort


Did this answer your question?