MSPs are no longer just “the computer janitors”. They are the primary custodians of their clients’ digital survival. In 2026, the shift from putting out security fires to getting to increasing resilience is table stakes.  

But here’s the problem: most MSPs still approach cybersecurity reactively, addressing threats as they emerge rather than building a repeatable system to manage risk over time. That’s where security frameworks come in. 

Following a security framework like NIST CSF 2.0, CIS Critical Security Controls or ISO 27001 isn’t about checking boxes. It’s all about building a repeatable and iterative engine for risk management that ties back into security measures being “revenue protectors” rather than cost centers. 

From “insurance policy” to “competitive edge” 

Historically, MSPs sold security as an “extra” or a necessary evil. Forward-looking MSPs treat security frameworks as a language of trust. When you align with a recognized framework, you aren’t just selling a solution. You are selling a validated methodology that helps your clients qualify for cyber insurance, meet regulatory demands and limit the risks to their business. After all, a lot of really smart people got together to build these frameworks to do just that. 

The old way was a quarterly or monthly scan with a thick report you could use to “wow” the client. The forward-thinking way is continuous risk realization. With ephemeral cloud assets and AI-driven threats constantly changing the risk picture, an MSP must help clients realize that risk is fluid. A framework provides the repeatable steps needed to see where the business’s crown jewels are and how they are exposed in real-time. 

Translating security into business language 

A framework also helps translate technical jargon into business outcomes. Instead of telling a CEO, “We blocked 1,000 ports,” you say, “We have reduced our alignment gap with the NIST ‘Protect’ function by 15%, lowering our estimated financial exposure by $200k.”  

At the end of the day, business decisions makers don’t care about the tech. They care about alignment to business outcomes. That’s the shift a framework makes possible, and it’s what separates MSPs who are seen as vendors from those recognized as true partners.

How a security framework actually works 

While the vision sells the value, the technical execution keeps the lights on. Here’s how a framework guides the work in practice. 

Step 1: Asset discovery and gap identification 

You cannot protect what you don’t know exists. Before anything else, you need to identify which risks exist despite current controls in place. 

  • Implementation: Use automated discovery tools to map every endpoint, SaaS application and API. 
  • The framework factor: Frameworks provide the “category” tags (identity, application development, disaster recovery) to ensure your gap scans are comprehensive and categorized by criticality. 

Pro tip: CVE scores are great, but they don’t always reflect real-world risk to your specific business environment. 

Step 2: Risk treatment 

Once a risk is identified, the technical team must decide to remediate, mitigate, transfer or accept it. Treating risk is no longer just about patching, but about scalable, measurable risk treatment and limiting liability. By following a framework, MSPs can lead clients towards solutions like a zero-trust architecture, where risk is mitigated by the very design of the network rather than just the strength of the endpoint protection. 

 Key technical considerations include: 

  • Technical controls: Implementing MFA (multi-factor authentication) or EDR (endpoint detection and response) isn’t just a “good idea”. It is a specific technical control mapped to a framework’s “Protect” function.  
  • Automation: Using scripts, robotic processes or RMM (remote monitoring and management) tools to push configurations and measure for configuration drift. This ensures that the treatment is consistent across the fleet and remain in place over time. 

Step 3: Audit and monitoring 

The technical review ensures that the controls are actually working. 

  • SIEM/Log management: Centralizing logs allows for the technical review of anomalies as well as provides visibility into new potential risks. 
  • Reporting: Frameworks provide the KPIs. For example, the Mean Time to Detect (MTTD) and Mean Time to Remediate (MTTR) are the technical metrics that prove the framework’s efficacy and track improvement over time. 

Why this matters for your MSP 

For an MSP, the security framework is your basis for how you create standard operating procedures. Without it, every client is a “bespoke” snowflake, which is impossible to scale and a nightmare to secure. With it, you create a scalable, defensible and highly profitable security practice based on tried-and-true methodologies. 

A framework doesn’t tell you which tool to buy. It tells you (and by extension your client) why you need it and how to measure its success. For the modern MSP, that is the difference between being seen as a vendor and being a trusted partner in their success. 

Looking to put these principles into practice?  

A security framework is only as useful as your ability to use it. We‘re putting the finishing touches on a new guide to CIS Controls, with everything MSPs need to get started. Check back here soon to get the guide. 

Written by Roddy Bergeron Technical Fellow, Cybersecurity @ Sherweb

Roddy Bergeron's career has taken various paths including government auditing, nonprofit work, public/private partnerships with the State of Louisiana, helping build an MSP by building their managed service, managed security, vCISO and compliance programs, and now as the Cybersecurity Technical Fellow with Sherweb. Roddy has obtained many certifications over the years including his MCSE, CCNA:Security, CEH, CCSP, CISSP and CSAP. Our MSP community is extremely important to Roddy and he loves giving back to the community that has helped him out so much over the years. Roddy hopes to continue to help other MSPs succeed and raise the cybersecurity tide for our industry.