{"id":25906,"date":"2026-05-04T09:00:45","date_gmt":"2026-05-04T13:00:45","guid":{"rendered":"https:\/\/www.sherweb.com\/blog\/?p=25906"},"modified":"2026-05-04T09:39:47","modified_gmt":"2026-05-04T13:39:47","slug":"msp-security-framework-2026","status":"publish","type":"post","link":"https:\/\/www.sherweb.com\/blog\/security\/msp-security-framework-2026\/","title":{"rendered":"Why MSPs should use a security framework in 2026"},"content":{"rendered":"<p><span data-contrast=\"auto\">MSPs\u00a0are no longer just &#8220;the\u00a0computer janitors&#8221;.\u00a0They are the primary custodians of their clients&#8217; digital survival. <a href=\"https:\/\/www.sherweb.com\/blog\/security\/5-cybersecurity-trends-msps-2026\/\">In 2026<\/a>, the shift from\u00a0putting out security\u00a0fires\u00a0to getting\u00a0to increasing resilience is table stakes.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">But\u00a0here&#8217;s\u00a0the problem: most MSPs still approach cybersecurity reactively, addressing threats as they\u00a0emerge\u00a0rather than building a repeatable system to manage risk over time.\u00a0That&#8217;s\u00a0where security frameworks come in.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Following a security framework\u00a0like <a href=\"https:\/\/www.nist.gov\/cyberframework\">NIST CSF 2.0<\/a>, <a href=\"https:\/\/www.cisecurity.org\/controls\">CIS Critical Security Controls<\/a>\u00a0or <a href=\"https:\/\/www.iso.org\/standard\/27001\">ISO 27001<\/a>\u00a0isn&#8217;t\u00a0about checking boxes.\u00a0It\u2019s\u00a0all\u00a0about building a repeatable\u00a0and iterative\u00a0engine for risk management\u00a0that ties back into\u00a0security measures being \u201crevenue protectors\u201d\u00a0rather than cost centers.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">From &#8220;insurance\u00a0policy&#8221; to &#8220;competitive\u00a0edge&#8221;<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Historically, MSPs sold security as an &#8220;extra&#8221; or\u00a0a necessary evil. Forward-looking MSPs treat security frameworks as a language of trust. When you align with a\u00a0recognized\u00a0framework, you\u00a0aren&#8217;t\u00a0just selling a\u00a0solution.\u00a0You are selling a validated\u00a0methodology\u00a0that helps your clients qualify for cyber insurance, meet regulatory\u00a0demands\u00a0and\u00a0limit the risks to their business.\u00a0After all, a lot of really smart people got together to build these\u00a0frameworks to do just that.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The old way was a quarterly or monthly scan with a thick report you could use to \u201cwow\u201d the client. The forward-thinking way is continuous risk realization. With ephemeral cloud assets and AI-driven threats constantly changing the risk picture, an MSP must help clients realize that risk is fluid. A framework provides the repeatable steps needed to see where the business&#8217;s crown jewels are and how they are exposed in real-time.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><span data-contrast=\"none\">Translating security into business language<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">A framework also helps\u00a0translate technical jargon into business outcomes. Instead of telling a CEO, &#8220;We blocked 1,000 ports,&#8221; you say, &#8220;We have reduced our alignment gap with the NIST &#8216;Protect&#8217;\u00a0function\u00a0by 15%, lowering our estimated financial exposure by $200k.&#8221;\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">At the end of the day, business decisions makers don\u2019t care about the tech. They care about\u00a0alignment to business outcomes.\u00a0That&#8217;s\u00a0the shift a framework makes possible, and\u00a0it&#8217;s\u00a0what separates MSPs who are seen as vendors from those recognized as true partners.<\/span><\/p>\n<h2><span data-contrast=\"none\">How a security framework\u00a0actually works<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">While the vision sells the value, the technical execution keeps the lights on.\u00a0Here&#8217;s\u00a0how a framework guides the work in practice.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><span data-contrast=\"none\">Step 1: Asset discovery and gap identification<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">You cannot protect what you\u00a0don&#8217;t\u00a0know\u00a0exists. Before anything else,\u00a0you need to\u00a0identify\u00a0which risks exist despite current controls in place.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Implementation:<\/span><\/b><span data-contrast=\"auto\">\u00a0Use automated discovery tools to map every endpoint, SaaS\u00a0application\u00a0and API.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">The\u00a0framework\u00a0factor:<\/span><\/b><span data-contrast=\"auto\"> Frameworks provide the &#8220;category&#8221; tags (identity,\u00a0application development, disaster\u00a0recovery)\u00a0to ensure\u00a0your\u00a0gap\u00a0scans\u00a0are comprehensive and categorized by criticality.\u00a0<\/span><\/li>\n<\/ul>\n<p><strong>Pro tip<\/strong>:\u00a0CVE\u00a0scores\u00a0are great,\u00a0but\u00a0they\u00a0don\u2019t\u00a0always\u00a0reflect real-world risk to your\u00a0specific\u00a0business\u00a0environment.<span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><span data-contrast=\"none\">Step 2:\u00a0Risk\u00a0treatment<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Once a risk is\u00a0identified, the technical team must decide to\u00a0r<\/span><span data-contrast=\"auto\">emediate,\u00a0mitigate,\u00a0transfer\u00a0or\u00a0accept<\/span><span data-contrast=\"auto\">\u00a0it.\u00a0Treating risk is no longer\u00a0just about patching,\u00a0but\u00a0about\u00a0scalable, measurable\u00a0risk\u00a0treatment and limiting liability. By following a framework, MSPs can lead clients towards solutions like\u00a0a\u00a0zero-trust architecture, where risk is mitigated by the very design of the network rather than just the strength of the\u00a0endpoint protection.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">\u00a0Key technical considerations include:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Technical\u00a0controls:<\/span><\/b><span data-contrast=\"auto\">\u00a0Implementing MFA (multi-factor\u00a0authentication) or EDR (endpoint\u00a0detection and\u00a0response)\u00a0isn&#8217;t\u00a0just a &#8220;good idea&#8221;. It is a specific technical control mapped to a framework&#8217;s &#8220;Protect&#8221; function.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Automation:<\/span><\/b><span data-contrast=\"auto\">\u00a0Using scripts, robotic\u00a0processes\u00a0or RMM (remote\u00a0monitoring and\u00a0management) tools to push configurations\u00a0and\u00a0measure for\u00a0configuration drift.\u00a0This\u00a0ensures that the treatment is consistent across the fleet\u00a0and\u00a0remain\u00a0in place\u00a0over time.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<h3 aria-level=\"3\"><span data-contrast=\"none\">Step 3:\u00a0Audit\u00a0and\u00a0monitoring<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">The technical review\u00a0ensures\u00a0that\u00a0the controls are actually working.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">SIEM\/Log\u00a0management:<\/span><\/b><span data-contrast=\"auto\">\u00a0Centralizing logs allows for the technical review of anomalies\u00a0as well as provides visibility into\u00a0new\u00a0potential\u00a0risks.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-setsize=\"-1\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Reporting:<\/span><\/b><span data-contrast=\"auto\">\u00a0Frameworks provide the KPIs. For example, the Mean Time to Detect (MTTD) and Mean Time to Remediate (MTTR) are the technical metrics that prove the framework&#8217;s efficacy\u00a0and\u00a0track improvement\u00a0over time.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Why\u00a0this\u00a0matters for\u00a0your\u00a0MSP<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">For an MSP, the security framework is your basis for how you create standard operating procedures. Without it, every client is a &#8220;bespoke&#8221; snowflake, which is impossible to scale and a nightmare to secure. With it, you create a scalable, defensible and highly profitable security practice based on tried-and-true methodologies.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">A framework\u00a0doesn&#8217;t\u00a0tell you\u00a0<\/span><i><span data-contrast=\"auto\">which<\/span><\/i><span data-contrast=\"auto\">\u00a0tool to buy. It tells you\u00a0(and by extension your client)\u00a0<\/span><i><span data-contrast=\"auto\">why<\/span><\/i><span data-contrast=\"auto\">\u00a0you need it and\u00a0<\/span><i><span data-contrast=\"auto\">how<\/span><\/i><span data-contrast=\"auto\">\u00a0to measure its success. For the modern MSP, that is the difference between being\u00a0seen as a\u00a0vendor and being a\u00a0<a href=\"https:\/\/www.sherweb.com\/blog\/partner\/msp-partner-experience\/\">trusted\u00a0partner<\/a>\u00a0in their success.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Looking to put these principles into practice?\u00a0<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">A security framework is only as useful as your ability to use it. We\u2018re putting the finishing touches on a new guide to CIS Controls, with everything MSPs need to get started. Check back here soon to get the guide.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>MSPs\u00a0are no longer just &#8220;the\u00a0computer janitors&#8221;.\u00a0They are the primary custodians o","protected":false},"author":188,"featured_media":25907,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[753],"tags":[919,1139,1202],"class_list":["post-25906","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-cybersecurity","tag-msp-security-strategies","tag-security-frameworks"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>MSP security frameworks: Why they matter and how to use them | Sherweb<\/title>\n<meta name=\"description\" content=\"A security framework can help your MSP standardize risk management, win client trust and prove the value of your security practice. Learn how.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sherweb.com\/blog\/security\/msp-security-framework-2026\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MSP security frameworks: Why they matter and how to use them | Sherweb\" \/>\n<meta property=\"og:description\" content=\"A security framework can help your MSP standardize risk management, win client trust and prove the value of your security practice. Learn how.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sherweb.com\/blog\/security\/msp-security-framework-2026\/\" \/>\n<meta property=\"og:site_name\" content=\"Sherweb\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Sherweb\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-04T13:00:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-04T13:39:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/Hero_1200x480-7.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1800\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roddy Bergeron\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:site\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roddy Bergeron\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/msp-security-framework-2026\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/msp-security-framework-2026\\\/\"},\"author\":{\"name\":\"Roddy Bergeron\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/f6a0c8e1d541dbeb57fd3e025b325795\"},\"headline\":\"Why MSPs should use a security framework in 2026\",\"datePublished\":\"2026-05-04T13:00:45+00:00\",\"dateModified\":\"2026-05-04T13:39:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/msp-security-framework-2026\\\/\"},\"wordCount\":847,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/msp-security-framework-2026\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Hero_1200x480-7.jpg\",\"keywords\":[\"Cybersecurity\",\"MSP security strategies\",\"Security frameworks\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/msp-security-framework-2026\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/msp-security-framework-2026\\\/\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/msp-security-framework-2026\\\/\",\"name\":\"MSP security frameworks: Why they matter and how to use them | Sherweb\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/msp-security-framework-2026\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/msp-security-framework-2026\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Hero_1200x480-7.jpg\",\"datePublished\":\"2026-05-04T13:00:45+00:00\",\"dateModified\":\"2026-05-04T13:39:47+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/f6a0c8e1d541dbeb57fd3e025b325795\"},\"description\":\"A security framework can help your MSP standardize risk management, win client trust and prove the value of your security practice. Learn how.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/msp-security-framework-2026\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/msp-security-framework-2026\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/msp-security-framework-2026\\\/#primaryimage\",\"url\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Hero_1200x480-7.jpg\",\"contentUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Hero_1200x480-7.jpg\",\"width\":1800,\"height\":720,\"caption\":\"MSP security frameworks: why they matter and how to use them\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/msp-security-framework-2026\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Why MSPs should use a security framework in 2026\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\",\"name\":\"Sherweb\",\"description\":\"More than a cloud marketplace\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/f6a0c8e1d541dbeb57fd3e025b325795\",\"name\":\"Roddy Bergeron\",\"description\":\"Roddy Bergeron's career has taken various paths including government auditing, nonprofit work, public\\\/private partnerships with the State of Louisiana, helping build an MSP by building their managed service, managed security, vCISO and compliance programs, and now as the Cybersecurity Technical Fellow with Sherweb. Roddy has obtained many certifications over the years including his MCSE, CCNA:Security, CEH, CCSP, CISSP and CSAP. Our MSP community is extremely important to Roddy and he loves giving back to the community that has helped him out so much over the years. Roddy hopes to continue to help other MSPs succeed and raise the cybersecurity tide for our industry.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/roddy-bergeron-cissp-ccsp-csap-33432573\\\/\"],\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/author\\\/roddy-bergeron\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"MSP security frameworks: Why they matter and how to use them | Sherweb","description":"A security framework can help your MSP standardize risk management, win client trust and prove the value of your security practice. Learn how.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sherweb.com\/blog\/security\/msp-security-framework-2026\/","og_locale":"en_US","og_type":"article","og_title":"MSP security frameworks: Why they matter and how to use them | Sherweb","og_description":"A security framework can help your MSP standardize risk management, win client trust and prove the value of your security practice. Learn how.","og_url":"https:\/\/www.sherweb.com\/blog\/security\/msp-security-framework-2026\/","og_site_name":"Sherweb","article_publisher":"https:\/\/www.facebook.com\/Sherweb","article_published_time":"2026-05-04T13:00:45+00:00","article_modified_time":"2026-05-04T13:39:47+00:00","og_image":[{"width":1800,"height":720,"url":"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/Hero_1200x480-7.jpg","type":"image\/jpeg"}],"author":"Roddy Bergeron","twitter_card":"summary_large_image","twitter_creator":"@SherWeb","twitter_site":"@SherWeb","twitter_misc":{"Written by":"Roddy Bergeron","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sherweb.com\/blog\/security\/msp-security-framework-2026\/#article","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/msp-security-framework-2026\/"},"author":{"name":"Roddy Bergeron","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/f6a0c8e1d541dbeb57fd3e025b325795"},"headline":"Why MSPs should use a security framework in 2026","datePublished":"2026-05-04T13:00:45+00:00","dateModified":"2026-05-04T13:39:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/msp-security-framework-2026\/"},"wordCount":847,"commentCount":0,"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/msp-security-framework-2026\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/Hero_1200x480-7.jpg","keywords":["Cybersecurity","MSP security strategies","Security frameworks"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sherweb.com\/blog\/security\/msp-security-framework-2026\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sherweb.com\/blog\/security\/msp-security-framework-2026\/","url":"https:\/\/www.sherweb.com\/blog\/security\/msp-security-framework-2026\/","name":"MSP security frameworks: Why they matter and how to use them | Sherweb","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/msp-security-framework-2026\/#primaryimage"},"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/msp-security-framework-2026\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/Hero_1200x480-7.jpg","datePublished":"2026-05-04T13:00:45+00:00","dateModified":"2026-05-04T13:39:47+00:00","author":{"@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/f6a0c8e1d541dbeb57fd3e025b325795"},"description":"A security framework can help your MSP standardize risk management, win client trust and prove the value of your security practice. Learn how.","breadcrumb":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/msp-security-framework-2026\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sherweb.com\/blog\/security\/msp-security-framework-2026\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sherweb.com\/blog\/security\/msp-security-framework-2026\/#primaryimage","url":"\/blog\/wp-content\/uploads\/Hero_1200x480-7.jpg","contentUrl":"\/blog\/wp-content\/uploads\/Hero_1200x480-7.jpg","width":1800,"height":720,"caption":"MSP security frameworks: why they matter and how to use them"},{"@type":"BreadcrumbList","@id":"https:\/\/www.sherweb.com\/blog\/security\/msp-security-framework-2026\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sherweb.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.sherweb.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Why MSPs should use a security framework in 2026"}]},{"@type":"WebSite","@id":"https:\/\/www.sherweb.com\/blog\/#website","url":"https:\/\/www.sherweb.com\/blog\/","name":"Sherweb","description":"More than a cloud marketplace","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/f6a0c8e1d541dbeb57fd3e025b325795","name":"Roddy Bergeron","description":"Roddy Bergeron's career has taken various paths including government auditing, nonprofit work, public\/private partnerships with the State of Louisiana, helping build an MSP by building their managed service, managed security, vCISO and compliance programs, and now as the Cybersecurity Technical Fellow with Sherweb. Roddy has obtained many certifications over the years including his MCSE, CCNA:Security, CEH, CCSP, CISSP and CSAP. Our MSP community is extremely important to Roddy and he loves giving back to the community that has helped him out so much over the years. Roddy hopes to continue to help other MSPs succeed and raise the cybersecurity tide for our industry.","sameAs":["https:\/\/www.linkedin.com\/in\/roddy-bergeron-cissp-ccsp-csap-33432573\/"],"url":"https:\/\/www.sherweb.com\/blog\/author\/roddy-bergeron\/"}]}},"tag_names":["Cybersecurity","MSP security strategies","Security frameworks"],"_links":{"self":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/25906","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/users\/188"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/comments?post=25906"}],"version-history":[{"count":2,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/25906\/revisions"}],"predecessor-version":[{"id":25909,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/25906\/revisions\/25909"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media\/25907"}],"wp:attachment":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media?parent=25906"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/categories?post=25906"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/tags?post=25906"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}