Skip to Content
AddonsTrust CenterFramework Builder

Framework Builder

Create and customize compliance frameworks tailored to your clients’ specific regulatory, contractual, or organizational requirements. The visual Framework Builder provides a drag-and-drop interface for defining controls, mapping them to Microsoft 365 settings, and organizing requirements into logical groups.

Note: While OpsPilot365 includes pre-built frameworks for SOC 2, HIPAA, CMMC, NIST 800-171, CIS Microsoft 365 Benchmarks, ISO 27001, and GDPR, the Framework Builder allows MSPs to create custom frameworks for industry-specific requirements, client contractual obligations, or internal security standards.

Framework Builder Overview

MetricValue
Built-in Frameworks7
Custom Frameworks4
Control Library Items320
Framework Versions12

Building a Custom Framework

  1. Define Framework Metadata — Set the framework name, description, version number, and applicable industry or use case. Tag the framework for easy discovery and assignment.
  2. Create Requirement Groups — Organize your framework into logical sections (Access Control, Data Protection, Monitoring, Incident Response). Groups can be nested up to three levels deep.
  3. Add Controls — Pull from the shared control library, clone controls from existing frameworks, or create new controls from scratch. Each control includes an ID, title, description, and assessment criteria.
  4. Map to Microsoft 365 Settings — Link each control to specific Microsoft 365 configuration settings. Mapped controls can be automatically assessed during compliance scans.
  5. Configure Assessment Rules — Define pass/fail criteria. Supported rule types: boolean, threshold, regex, and custom evaluation rules.
  6. Publish and Assign — Publish the framework and assign to specific tenants or tenant groups.

Control Library

CategoryControlsAuto-AssessableM365 Settings Mapped
Access Control4842 (88%)Conditional Access, MFA, PIM, RBAC
Data Protection3830 (79%)DLP, Sensitivity Labels, Encryption, Sharing
Audit and Logging2826 (93%)Unified Audit Log, Mailbox Audit, Retention
Device Management3532 (91%)Intune Compliance, BitLocker, Autopilot
Email Security3228 (88%)Anti-spam, Anti-phishing, Safe Links, DMARC
Threat Protection4236 (86%)Defender, ASR Rules, Alert Policies, Secure Score
Governance258 (32%)Policy documents, training records, procedures

Requirement Definition

  • Control Properties — Unique identifier, title, description, assessment type (automated/manual), severity weight, evidence requirements, remediation guidance, and cross-references.
  • Assessment Rules — Boolean checks, value comparisons, pattern matching (regex), list inclusion, and multi-condition logic (AND/OR).
  • Evidence Requirements — Required evidence types, collection frequency, and auto-collection capability.
  • Cross-Framework Mapping — Map custom controls to equivalent controls in built-in frameworks for cross-framework reporting.

Import from Spreadsheet

Note: Import framework definitions from CSV or Excel spreadsheets to quickly create custom frameworks from existing documentation.

ColumnRequiredDescriptionExample
control_idYesUnique identifierAC-1.1
titleYesControl titleEnforce MFA for All Users
descriptionYesDetailed descriptionAll user accounts must have MFA enabled…
groupYesRequirement groupAccess Control
severityNoSeverity weight (1-5)5
assessment_typeNoAutomated or manualautomated
m365_settingNoMicrosoft 365 setting to evaluateconditionalAccess.mfaRequired
cross_referenceNoRelated controls in other frameworksNIST:IA-2, CIS:5.2.1

Framework Versioning

  • Version History — Every change is tracked with version number, description, author, and timestamp.
  • Draft and Published States — Edit in draft mode without affecting active assessments. Publish when ready.
  • Version Rollback — Revert to a previous framework version if changes cause unintended assessment results.

Best Practices

  • Start by cloning the closest built-in framework and customizing rather than building from scratch
  • Map as many controls as possible to automated Microsoft 365 setting checks
  • Include cross-framework references so remediation actions address gaps in multiple frameworks
  • Use the spreadsheet import for large frameworks with hundreds of controls
  • Test custom frameworks against a development tenant before assigning to production
  • Publish updates as new versions rather than editing the published version directly

API Reference

  • GET /api/addons/trust-center/frameworks — List all frameworks
  • POST /api/addons/trust-center/frameworks — Create a new custom framework
  • GET /api/addons/trust-center/frameworks/:frameworkId/controls — List controls within a framework
  • POST /api/addons/trust-center/frameworks/:frameworkId/controls — Add a control to a framework
  • POST /api/addons/trust-center/frameworks/:frameworkId/publish — Publish a draft framework version
  • POST /api/addons/trust-center/frameworks/import — Import from CSV or Excel
  • GET /api/addons/trust-center/frameworks/:frameworkId/versions — List version history
  • GET /api/addons/trust-center/control-library — Browse the shared control library
Last updated on