@ansvar/eu-regulations-mcp 0.1.0 → 0.2.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (156) hide show
  1. package/LICENSE +190 -21
  2. package/README.md +125 -26
  3. package/data/seed/aifmd.json +432 -0
  4. package/data/seed/applicability/ai-act.json +87 -0
  5. package/data/seed/applicability/aifmd.json +74 -0
  6. package/data/seed/applicability/cbam.json +74 -0
  7. package/data/seed/applicability/cer.json +74 -0
  8. package/data/seed/applicability/cra.json +77 -0
  9. package/data/seed/applicability/csddd.json +74 -0
  10. package/data/seed/applicability/csrd.json +74 -0
  11. package/data/seed/applicability/cyber_solidarity.json +74 -0
  12. package/data/seed/applicability/cybersecurity-act.json +69 -0
  13. package/data/seed/applicability/data-act.json +71 -0
  14. package/data/seed/applicability/dga.json +74 -0
  15. package/data/seed/applicability/dma.json +77 -0
  16. package/data/seed/applicability/dsa.json +71 -0
  17. package/data/seed/applicability/eecc.json +74 -0
  18. package/data/seed/applicability/ehds.json +74 -0
  19. package/data/seed/applicability/eidas2.json +86 -0
  20. package/data/seed/applicability/eprivacy.json +74 -0
  21. package/data/seed/applicability/eu_taxonomy.json +74 -0
  22. package/data/seed/applicability/eucc.json +74 -0
  23. package/data/seed/applicability/eudr.json +74 -0
  24. package/data/seed/applicability/gpsr.json +74 -0
  25. package/data/seed/applicability/ivdr.json +74 -0
  26. package/data/seed/applicability/led.json +74 -0
  27. package/data/seed/applicability/machinery.json +74 -0
  28. package/data/seed/applicability/mdr.json +74 -0
  29. package/data/seed/applicability/mica.json +74 -0
  30. package/data/seed/applicability/mifid2.json +74 -0
  31. package/data/seed/applicability/mifir.json +74 -0
  32. package/data/seed/applicability/pld.json +74 -0
  33. package/data/seed/applicability/psd2.json +74 -0
  34. package/data/seed/applicability/red.json +74 -0
  35. package/data/seed/applicability/sfdr.json +74 -0
  36. package/data/seed/applicability/un-r155.json +68 -0
  37. package/data/seed/applicability/un-r156.json +68 -0
  38. package/data/seed/cbam.json +397 -0
  39. package/data/seed/cer.json +233 -0
  40. package/data/seed/csddd.json +205 -0
  41. package/data/seed/csrd.json +50 -0
  42. package/data/seed/cyber_solidarity.json +252 -0
  43. package/data/seed/data-act.json +517 -0
  44. package/data/seed/dga.json +342 -0
  45. package/data/seed/dma.json +499 -0
  46. package/data/seed/dsa.json +686 -0
  47. package/data/seed/eecc.json +981 -0
  48. package/data/seed/ehds.json +638 -0
  49. package/data/seed/eidas2.json +590 -0
  50. package/data/seed/eprivacy.json +115 -0
  51. package/data/seed/eu_taxonomy.json +285 -0
  52. package/data/seed/eucc.json +386 -0
  53. package/data/seed/eudr.json +401 -0
  54. package/data/seed/gpsr.json +462 -0
  55. package/data/seed/ivdr.json +1036 -0
  56. package/data/seed/led.json +480 -0
  57. package/data/seed/machinery.json +513 -0
  58. package/data/seed/mappings/iso27001-ai-act.json +114 -0
  59. package/data/seed/mappings/iso27001-aifmd.json +50 -0
  60. package/data/seed/mappings/iso27001-cbam.json +26 -0
  61. package/data/seed/mappings/iso27001-cer.json +74 -0
  62. package/data/seed/mappings/iso27001-cra.json +130 -0
  63. package/data/seed/mappings/iso27001-csddd.json +50 -0
  64. package/data/seed/mappings/iso27001-csrd.json +26 -0
  65. package/data/seed/mappings/iso27001-cyber_solidarity.json +82 -0
  66. package/data/seed/mappings/iso27001-cybersecurity-act.json +90 -0
  67. package/data/seed/mappings/iso27001-data-act.json +66 -0
  68. package/data/seed/mappings/iso27001-dga.json +50 -0
  69. package/data/seed/mappings/iso27001-dma.json +50 -0
  70. package/data/seed/mappings/iso27001-dsa.json +58 -0
  71. package/data/seed/mappings/iso27001-eecc.json +74 -0
  72. package/data/seed/mappings/iso27001-ehds.json +90 -0
  73. package/data/seed/mappings/iso27001-eidas2.json +106 -0
  74. package/data/seed/mappings/iso27001-eprivacy.json +66 -0
  75. package/data/seed/mappings/iso27001-eu_taxonomy.json +34 -0
  76. package/data/seed/mappings/iso27001-eucc.json +66 -0
  77. package/data/seed/mappings/iso27001-eudr.json +34 -0
  78. package/data/seed/mappings/iso27001-gpsr.json +42 -0
  79. package/data/seed/mappings/iso27001-ivdr.json +66 -0
  80. package/data/seed/mappings/iso27001-led.json +74 -0
  81. package/data/seed/mappings/iso27001-machinery.json +50 -0
  82. package/data/seed/mappings/iso27001-mdr.json +82 -0
  83. package/data/seed/mappings/iso27001-mica.json +66 -0
  84. package/data/seed/mappings/iso27001-mifid2.json +66 -0
  85. package/data/seed/mappings/iso27001-mifir.json +42 -0
  86. package/data/seed/mappings/iso27001-pld.json +26 -0
  87. package/data/seed/mappings/iso27001-psd2.json +82 -0
  88. package/data/seed/mappings/iso27001-red.json +42 -0
  89. package/data/seed/mappings/iso27001-sfdr.json +50 -0
  90. package/data/seed/mappings/iso27001-un-r155.json +130 -0
  91. package/data/seed/mappings/iso27001-un-r156.json +106 -0
  92. package/data/seed/mappings/nist-csf-ai-act.json +138 -0
  93. package/data/seed/mappings/nist-csf-aifmd.json +58 -0
  94. package/data/seed/mappings/nist-csf-cbam.json +42 -0
  95. package/data/seed/mappings/nist-csf-cer.json +90 -0
  96. package/data/seed/mappings/nist-csf-cra.json +130 -0
  97. package/data/seed/mappings/nist-csf-csddd.json +50 -0
  98. package/data/seed/mappings/nist-csf-csrd.json +34 -0
  99. package/data/seed/mappings/nist-csf-cyber_solidarity.json +90 -0
  100. package/data/seed/mappings/nist-csf-cybersecurity-act.json +90 -0
  101. package/data/seed/mappings/nist-csf-data-act.json +50 -0
  102. package/data/seed/mappings/nist-csf-dga.json +58 -0
  103. package/data/seed/mappings/nist-csf-dma.json +42 -0
  104. package/data/seed/mappings/nist-csf-dora.json +210 -0
  105. package/data/seed/mappings/nist-csf-dsa.json +82 -0
  106. package/data/seed/mappings/nist-csf-eecc.json +90 -0
  107. package/data/seed/mappings/nist-csf-ehds.json +98 -0
  108. package/data/seed/mappings/nist-csf-eidas2.json +114 -0
  109. package/data/seed/mappings/nist-csf-eprivacy.json +58 -0
  110. package/data/seed/mappings/nist-csf-eu_taxonomy.json +34 -0
  111. package/data/seed/mappings/nist-csf-eucc.json +66 -0
  112. package/data/seed/mappings/nist-csf-eudr.json +58 -0
  113. package/data/seed/mappings/nist-csf-gdpr.json +178 -0
  114. package/data/seed/mappings/nist-csf-gpsr.json +58 -0
  115. package/data/seed/mappings/nist-csf-ivdr.json +66 -0
  116. package/data/seed/mappings/nist-csf-led.json +74 -0
  117. package/data/seed/mappings/nist-csf-machinery.json +58 -0
  118. package/data/seed/mappings/nist-csf-mdr.json +66 -0
  119. package/data/seed/mappings/nist-csf-mica.json +98 -0
  120. package/data/seed/mappings/nist-csf-mifid2.json +74 -0
  121. package/data/seed/mappings/nist-csf-mifir.json +50 -0
  122. package/data/seed/mappings/nist-csf-nis2.json +194 -0
  123. package/data/seed/mappings/nist-csf-pld.json +34 -0
  124. package/data/seed/mappings/nist-csf-psd2.json +98 -0
  125. package/data/seed/mappings/nist-csf-red.json +58 -0
  126. package/data/seed/mappings/nist-csf-sfdr.json +42 -0
  127. package/data/seed/mappings/nist-csf-un-r155.json +130 -0
  128. package/data/seed/mappings/nist-csf-un-r156.json +98 -0
  129. package/data/seed/mdr.json +1066 -0
  130. package/data/seed/mica.json +1003 -0
  131. package/data/seed/mifid2.json +906 -0
  132. package/data/seed/mifir.json +512 -0
  133. package/data/seed/pld.json +244 -0
  134. package/data/seed/psd2.json +827 -0
  135. package/data/seed/red.json +452 -0
  136. package/data/seed/sfdr.json +228 -0
  137. package/data/seed/un-r155.json +166 -0
  138. package/data/seed/un-r156.json +150 -0
  139. package/dist/http-server.d.ts +9 -0
  140. package/dist/http-server.d.ts.map +1 -0
  141. package/dist/http-server.js +342 -0
  142. package/dist/http-server.js.map +1 -0
  143. package/dist/index.js +4 -4
  144. package/dist/index.js.map +1 -1
  145. package/dist/tools/map.d.ts +1 -1
  146. package/dist/tools/map.d.ts.map +1 -1
  147. package/dist/tools/map.js +3 -3
  148. package/dist/tools/map.js.map +1 -1
  149. package/package.json +6 -2
  150. package/scripts/build-db.ts +20 -8
  151. package/scripts/check-updates.ts +141 -39
  152. package/scripts/ingest-eurlex.ts +9 -1
  153. package/scripts/ingest-unece.ts +368 -0
  154. package/src/http-server.ts +380 -0
  155. package/src/index.ts +4 -4
  156. package/src/tools/map.ts +4 -4
@@ -0,0 +1,66 @@
1
+ [
2
+ {
3
+ "control_id": "A.5.1",
4
+ "control_name": "Policies for information security",
5
+ "regulation": "DATA_ACT",
6
+ "articles": ["5", "8"],
7
+ "coverage": "partial",
8
+ "notes": "Art 5 data sharing policies, Art 8 technical protection measures for trade secrets"
9
+ },
10
+ {
11
+ "control_id": "A.5.10",
12
+ "control_name": "Acceptable use of information and other associated assets",
13
+ "regulation": "DATA_ACT",
14
+ "articles": ["4", "5", "6"],
15
+ "coverage": "full",
16
+ "notes": "Art 4-6 define acceptable use conditions for product data access and sharing"
17
+ },
18
+ {
19
+ "control_id": "A.5.12",
20
+ "control_name": "Classification of information",
21
+ "regulation": "DATA_ACT",
22
+ "articles": ["8"],
23
+ "coverage": "partial",
24
+ "notes": "Art 8 requires identification and protection of trade secrets in data sharing"
25
+ },
26
+ {
27
+ "control_id": "A.5.31",
28
+ "control_name": "Legal, statutory, regulatory and contractual requirements",
29
+ "regulation": "DATA_ACT",
30
+ "articles": ["1", "2", "3"],
31
+ "coverage": "full",
32
+ "notes": "Art 1-3 define scope and obligations for data holders and recipients"
33
+ },
34
+ {
35
+ "control_id": "A.5.33",
36
+ "control_name": "Protection of records",
37
+ "regulation": "DATA_ACT",
38
+ "articles": ["4", "31"],
39
+ "coverage": "partial",
40
+ "notes": "Art 4 product data retention, Art 31 international data access safeguards"
41
+ },
42
+ {
43
+ "control_id": "A.8.3",
44
+ "control_name": "Information access restriction",
45
+ "regulation": "DATA_ACT",
46
+ "articles": ["4", "5", "6"],
47
+ "coverage": "full",
48
+ "notes": "Art 4-6 define access rights and restrictions for product data"
49
+ },
50
+ {
51
+ "control_id": "A.8.10",
52
+ "control_name": "Information deletion",
53
+ "regulation": "DATA_ACT",
54
+ "articles": ["23"],
55
+ "coverage": "full",
56
+ "notes": "Art 23 requires data retrieval and deletion capabilities for cloud switching"
57
+ },
58
+ {
59
+ "control_id": "A.8.24",
60
+ "control_name": "Use of cryptography",
61
+ "regulation": "DATA_ACT",
62
+ "articles": ["8"],
63
+ "coverage": "partial",
64
+ "notes": "Art 8 technical measures to protect trade secrets may include encryption"
65
+ }
66
+ ]
@@ -0,0 +1,50 @@
1
+ [
2
+ {
3
+ "control_id": "A.5.1",
4
+ "control_name": "Policies for information security",
5
+ "regulation": "DGA",
6
+ "articles": ["5", "12"],
7
+ "coverage": "full",
8
+ "notes": "Security policies for data intermediation services"
9
+ },
10
+ {
11
+ "control_id": "A.5.31",
12
+ "control_name": "Legal, statutory, regulatory and contractual requirements",
13
+ "regulation": "DGA",
14
+ "articles": ["1", "2"],
15
+ "coverage": "full",
16
+ "notes": "Framework for data sharing and governance"
17
+ },
18
+ {
19
+ "control_id": "A.5.33",
20
+ "control_name": "Protection of records",
21
+ "regulation": "DGA",
22
+ "articles": ["5", "11"],
23
+ "coverage": "full",
24
+ "notes": "Data governance and cataloguing requirements"
25
+ },
26
+ {
27
+ "control_id": "A.5.34",
28
+ "control_name": "Privacy and protection of PII",
29
+ "regulation": "DGA",
30
+ "articles": ["5", "12"],
31
+ "coverage": "full",
32
+ "notes": "Personal data protection in data sharing"
33
+ },
34
+ {
35
+ "control_id": "A.8.3",
36
+ "control_name": "Information access restriction",
37
+ "regulation": "DGA",
38
+ "articles": ["5", "6"],
39
+ "coverage": "full",
40
+ "notes": "Access controls for protected data re-use"
41
+ },
42
+ {
43
+ "control_id": "A.8.11",
44
+ "control_name": "Data masking",
45
+ "regulation": "DGA",
46
+ "articles": ["5"],
47
+ "coverage": "full",
48
+ "notes": "Anonymization and pseudonymization for data sharing"
49
+ }
50
+ ]
@@ -0,0 +1,50 @@
1
+ [
2
+ {
3
+ "control_id": "A.5.1",
4
+ "control_name": "Policies for information security",
5
+ "regulation": "DMA",
6
+ "articles": ["5", "6"],
7
+ "coverage": "partial",
8
+ "notes": "Art 5-6 gatekeeper obligations include data handling policies"
9
+ },
10
+ {
11
+ "control_id": "A.5.31",
12
+ "control_name": "Legal, statutory, regulatory and contractual requirements",
13
+ "regulation": "DMA",
14
+ "articles": ["1", "2", "3"],
15
+ "coverage": "full",
16
+ "notes": "Art 1-3 define scope, gatekeeper designation, and core platform services"
17
+ },
18
+ {
19
+ "control_id": "A.5.35",
20
+ "control_name": "Independent review of information security",
21
+ "regulation": "DMA",
22
+ "articles": ["15"],
23
+ "coverage": "partial",
24
+ "notes": "Art 15 requires audited compliance reports for gatekeepers"
25
+ },
26
+ {
27
+ "control_id": "A.8.3",
28
+ "control_name": "Information access restriction",
29
+ "regulation": "DMA",
30
+ "articles": ["5", "6"],
31
+ "coverage": "full",
32
+ "notes": "Art 5-6 restrict gatekeepers from combining user data across services without consent"
33
+ },
34
+ {
35
+ "control_id": "A.8.10",
36
+ "control_name": "Information deletion",
37
+ "regulation": "DMA",
38
+ "articles": ["6"],
39
+ "coverage": "partial",
40
+ "notes": "Art 6 requires data portability enabling user data deletion"
41
+ },
42
+ {
43
+ "control_id": "A.8.11",
44
+ "control_name": "Data masking",
45
+ "regulation": "DMA",
46
+ "articles": ["6"],
47
+ "coverage": "partial",
48
+ "notes": "Art 6 requires anonymization of search ranking data shared with competitors"
49
+ }
50
+ ]
@@ -0,0 +1,58 @@
1
+ [
2
+ {
3
+ "control_id": "A.5.1",
4
+ "control_name": "Policies for information security",
5
+ "regulation": "DSA",
6
+ "articles": ["14", "34"],
7
+ "coverage": "partial",
8
+ "notes": "Art 14 T&C policies, Art 34 VLOP risk management policies"
9
+ },
10
+ {
11
+ "control_id": "A.5.2",
12
+ "control_name": "Information security roles and responsibilities",
13
+ "regulation": "DSA",
14
+ "articles": ["11", "41"],
15
+ "coverage": "full",
16
+ "notes": "Art 11 points of contact, Art 41 compliance officers for VLOPs"
17
+ },
18
+ {
19
+ "control_id": "A.5.31",
20
+ "control_name": "Legal, statutory, regulatory and contractual requirements",
21
+ "regulation": "DSA",
22
+ "articles": ["1", "2", "3"],
23
+ "coverage": "full",
24
+ "notes": "Art 1-3 define scope, liability exemptions, and territorial application"
25
+ },
26
+ {
27
+ "control_id": "A.5.35",
28
+ "control_name": "Independent review of information security",
29
+ "regulation": "DSA",
30
+ "articles": ["37"],
31
+ "coverage": "full",
32
+ "notes": "Art 37 requires independent audits for VLOPs at least annually"
33
+ },
34
+ {
35
+ "control_id": "A.6.8",
36
+ "control_name": "Information security event reporting",
37
+ "regulation": "DSA",
38
+ "articles": ["16", "18"],
39
+ "coverage": "full",
40
+ "notes": "Art 16 notice-and-action mechanism, Art 18 criminal offense reporting"
41
+ },
42
+ {
43
+ "control_id": "A.8.8",
44
+ "control_name": "Management of technical vulnerabilities",
45
+ "regulation": "DSA",
46
+ "articles": ["34", "35"],
47
+ "coverage": "partial",
48
+ "notes": "Art 34-35 VLOP risk assessment and mitigation including systemic risks"
49
+ },
50
+ {
51
+ "control_id": "A.8.16",
52
+ "control_name": "Monitoring activities",
53
+ "regulation": "DSA",
54
+ "articles": ["16", "34"],
55
+ "coverage": "full",
56
+ "notes": "Art 16 content monitoring for notices, Art 34 systemic risk monitoring"
57
+ }
58
+ ]
@@ -0,0 +1,74 @@
1
+ [
2
+ {
3
+ "control_id": "A.5.1",
4
+ "control_name": "Policies for information security",
5
+ "regulation": "EECC",
6
+ "articles": ["40", "41"],
7
+ "coverage": "full",
8
+ "notes": "Security policies required for electronic communications networks"
9
+ },
10
+ {
11
+ "control_id": "A.5.5",
12
+ "control_name": "Contact with authorities",
13
+ "regulation": "EECC",
14
+ "articles": ["5", "6", "40"],
15
+ "coverage": "full",
16
+ "notes": "Coordination with national regulatory authorities"
17
+ },
18
+ {
19
+ "control_id": "A.5.7",
20
+ "control_name": "Threat intelligence",
21
+ "regulation": "EECC",
22
+ "articles": ["40"],
23
+ "coverage": "partial",
24
+ "notes": "Security threat awareness for network operators"
25
+ },
26
+ {
27
+ "control_id": "A.5.24",
28
+ "control_name": "Information security incident management planning and preparation",
29
+ "regulation": "EECC",
30
+ "articles": ["40"],
31
+ "coverage": "full",
32
+ "notes": "Incident preparedness for network operators"
33
+ },
34
+ {
35
+ "control_id": "A.5.31",
36
+ "control_name": "Legal, statutory, regulatory and contractual requirements",
37
+ "regulation": "EECC",
38
+ "articles": ["1", "2"],
39
+ "coverage": "full",
40
+ "notes": "Comprehensive framework for electronic communications"
41
+ },
42
+ {
43
+ "control_id": "A.5.34",
44
+ "control_name": "Privacy and protection of PII",
45
+ "regulation": "EECC",
46
+ "articles": ["102", "103"],
47
+ "coverage": "full",
48
+ "notes": "Privacy protections for communications"
49
+ },
50
+ {
51
+ "control_id": "A.6.8",
52
+ "control_name": "Information security event reporting",
53
+ "regulation": "EECC",
54
+ "articles": ["40"],
55
+ "coverage": "full",
56
+ "notes": "Security incident reporting to authorities"
57
+ },
58
+ {
59
+ "control_id": "A.7.4",
60
+ "control_name": "Physical security monitoring",
61
+ "regulation": "EECC",
62
+ "articles": ["40"],
63
+ "coverage": "partial",
64
+ "notes": "Physical security of network infrastructure"
65
+ },
66
+ {
67
+ "control_id": "A.8.22",
68
+ "control_name": "Segregation of networks",
69
+ "regulation": "EECC",
70
+ "articles": ["40"],
71
+ "coverage": "partial",
72
+ "notes": "Network architecture security requirements"
73
+ }
74
+ ]
@@ -0,0 +1,90 @@
1
+ [
2
+ {
3
+ "control_id": "A.5.1",
4
+ "control_name": "Policies for information security",
5
+ "regulation": "EHDS",
6
+ "articles": ["57", "66", "73"],
7
+ "coverage": "full",
8
+ "notes": "Health data access bodies must establish security policies for data processing"
9
+ },
10
+ {
11
+ "control_id": "A.5.2",
12
+ "control_name": "Information security roles and responsibilities",
13
+ "regulation": "EHDS",
14
+ "articles": ["55", "57", "60", "61"],
15
+ "coverage": "full",
16
+ "notes": "Health data access bodies, data holders, and data users have defined responsibilities"
17
+ },
18
+ {
19
+ "control_id": "A.5.10",
20
+ "control_name": "Acceptable use of information and other associated assets",
21
+ "regulation": "EHDS",
22
+ "articles": ["53", "66"],
23
+ "coverage": "full",
24
+ "notes": "Strict rules on purposes for which health data can be processed for secondary use"
25
+ },
26
+ {
27
+ "control_id": "A.5.12",
28
+ "control_name": "Classification of information",
29
+ "regulation": "EHDS",
30
+ "articles": ["14", "51", "78"],
31
+ "coverage": "full",
32
+ "notes": "Health data categories defined with priority classifications and quality labels"
33
+ },
34
+ {
35
+ "control_id": "A.5.31",
36
+ "control_name": "Legal, statutory, regulatory and contractual requirements",
37
+ "regulation": "EHDS",
38
+ "articles": ["1", "2", "50"],
39
+ "coverage": "full",
40
+ "notes": "EHDS establishes comprehensive legal framework for health data"
41
+ },
42
+ {
43
+ "control_id": "A.5.33",
44
+ "control_name": "Protection of records",
45
+ "regulation": "EHDS",
46
+ "articles": ["7", "14", "77", "79"],
47
+ "coverage": "full",
48
+ "notes": "Dataset catalogues and EHR systems must maintain records"
49
+ },
50
+ {
51
+ "control_id": "A.5.34",
52
+ "control_name": "Privacy and protection of PII",
53
+ "regulation": "EHDS",
54
+ "articles": ["3", "4", "7", "8", "66", "71"],
55
+ "coverage": "full",
56
+ "notes": "Comprehensive rights including access, portability, restriction, and opt-out"
57
+ },
58
+ {
59
+ "control_id": "A.8.3",
60
+ "control_name": "Information access restriction",
61
+ "regulation": "EHDS",
62
+ "articles": ["67", "68", "73"],
63
+ "coverage": "full",
64
+ "notes": "Data permits and secure processing environments required"
65
+ },
66
+ {
67
+ "control_id": "A.8.10",
68
+ "control_name": "Information deletion",
69
+ "regulation": "EHDS",
70
+ "articles": ["8", "71"],
71
+ "coverage": "partial",
72
+ "notes": "Right to restrict access and opt-out from secondary use"
73
+ },
74
+ {
75
+ "control_id": "A.8.11",
76
+ "control_name": "Data masking",
77
+ "regulation": "EHDS",
78
+ "articles": ["66", "73"],
79
+ "coverage": "full",
80
+ "notes": "Data minimisation and secure processing with anonymization"
81
+ },
82
+ {
83
+ "control_id": "A.8.24",
84
+ "control_name": "Use of cryptography",
85
+ "regulation": "EHDS",
86
+ "articles": ["73"],
87
+ "coverage": "full",
88
+ "notes": "Secure processing environment requires encryption"
89
+ }
90
+ ]
@@ -0,0 +1,106 @@
1
+ [
2
+ {
3
+ "control_id": "A.5.1",
4
+ "control_name": "Policies for information security",
5
+ "regulation": "EIDAS2",
6
+ "articles": ["19", "24"],
7
+ "coverage": "full",
8
+ "notes": "Art 19 security requirements for trust services, Art 24 qualified trust service provider requirements"
9
+ },
10
+ {
11
+ "control_id": "A.5.2",
12
+ "control_name": "Information security roles and responsibilities",
13
+ "regulation": "EIDAS2",
14
+ "articles": ["17", "20"],
15
+ "coverage": "full",
16
+ "notes": "Art 17 supervisory body responsibilities, Art 20 trust service provider obligations"
17
+ },
18
+ {
19
+ "control_id": "A.5.15",
20
+ "control_name": "Access control",
21
+ "regulation": "EIDAS2",
22
+ "articles": ["6a", "6b"],
23
+ "coverage": "full",
24
+ "notes": "Art 6a-6b EUDI Wallet authentication and access control requirements"
25
+ },
26
+ {
27
+ "control_id": "A.5.31",
28
+ "control_name": "Legal, statutory, regulatory and contractual requirements",
29
+ "regulation": "EIDAS2",
30
+ "articles": ["1", "2", "3"],
31
+ "coverage": "full",
32
+ "notes": "Art 1-3 define scope, definitions, and legal framework for electronic identification and trust services"
33
+ },
34
+ {
35
+ "control_id": "A.5.34",
36
+ "control_name": "Privacy and protection of PII",
37
+ "regulation": "EIDAS2",
38
+ "articles": ["6a", "6c", "11a"],
39
+ "coverage": "full",
40
+ "notes": "Art 6a wallet privacy requirements, Art 6c user control over data, Art 11a unique identifier protection"
41
+ },
42
+ {
43
+ "control_id": "A.5.35",
44
+ "control_name": "Independent review of information security",
45
+ "regulation": "EIDAS2",
46
+ "articles": ["17", "20", "21"],
47
+ "coverage": "full",
48
+ "notes": "Art 17 supervisory audits, Art 20-21 conformity assessment for trust service providers"
49
+ },
50
+ {
51
+ "control_id": "A.6.8",
52
+ "control_name": "Information security event reporting",
53
+ "regulation": "EIDAS2",
54
+ "articles": ["19"],
55
+ "coverage": "full",
56
+ "notes": "Art 19(2) requires notification of security breaches within 24 hours to supervisory body"
57
+ },
58
+ {
59
+ "control_id": "A.8.2",
60
+ "control_name": "Privileged access rights",
61
+ "regulation": "EIDAS2",
62
+ "articles": ["24"],
63
+ "coverage": "partial",
64
+ "notes": "Art 24 qualified trust service provider must implement access controls"
65
+ },
66
+ {
67
+ "control_id": "A.8.5",
68
+ "control_name": "Secure authentication",
69
+ "regulation": "EIDAS2",
70
+ "articles": ["6a", "8", "29"],
71
+ "coverage": "full",
72
+ "notes": "Art 6a wallet authentication, Art 8 assurance levels, Art 29 qualified electronic signature requirements"
73
+ },
74
+ {
75
+ "control_id": "A.8.7",
76
+ "control_name": "Protection against malware",
77
+ "regulation": "EIDAS2",
78
+ "articles": ["6a", "19"],
79
+ "coverage": "partial",
80
+ "notes": "Art 6a wallet security requirements, Art 19 security measures for trust services"
81
+ },
82
+ {
83
+ "control_id": "A.8.24",
84
+ "control_name": "Use of cryptography",
85
+ "regulation": "EIDAS2",
86
+ "articles": ["26", "29", "32", "38"],
87
+ "coverage": "full",
88
+ "notes": "Art 26 advanced electronic signatures, Art 29 qualified signatures, Art 32 qualified seals, Art 38 qualified timestamps"
89
+ },
90
+ {
91
+ "control_id": "A.8.25",
92
+ "control_name": "Secure development life cycle",
93
+ "regulation": "EIDAS2",
94
+ "articles": ["6a", "24"],
95
+ "coverage": "partial",
96
+ "notes": "Art 6a wallet certification requirements, Art 24 trust service provider security measures"
97
+ },
98
+ {
99
+ "control_id": "A.8.29",
100
+ "control_name": "Security testing in development and acceptance",
101
+ "regulation": "EIDAS2",
102
+ "articles": ["6a", "20", "21"],
103
+ "coverage": "full",
104
+ "notes": "Art 6a wallet certification, Art 20-21 conformity assessment for trust services"
105
+ }
106
+ ]
@@ -0,0 +1,66 @@
1
+ [
2
+ {
3
+ "control_id": "A.5.1",
4
+ "control_name": "Policies for information security",
5
+ "regulation": "EPRIVACY",
6
+ "articles": ["4", "14"],
7
+ "coverage": "full",
8
+ "notes": "Policies required for security of electronic communications"
9
+ },
10
+ {
11
+ "control_id": "A.5.31",
12
+ "control_name": "Legal, statutory, regulatory and contractual requirements",
13
+ "regulation": "EPRIVACY",
14
+ "articles": ["1", "3"],
15
+ "coverage": "full",
16
+ "notes": "Establishes privacy requirements for electronic communications"
17
+ },
18
+ {
19
+ "control_id": "A.5.33",
20
+ "control_name": "Protection of records",
21
+ "regulation": "EPRIVACY",
22
+ "articles": ["6", "9"],
23
+ "coverage": "full",
24
+ "notes": "Traffic data and location data retention rules"
25
+ },
26
+ {
27
+ "control_id": "A.5.34",
28
+ "control_name": "Privacy and protection of PII",
29
+ "regulation": "EPRIVACY",
30
+ "articles": ["5", "6", "9", "13"],
31
+ "coverage": "full",
32
+ "notes": "Core privacy protections for electronic communications"
33
+ },
34
+ {
35
+ "control_id": "A.6.8",
36
+ "control_name": "Information security event reporting",
37
+ "regulation": "EPRIVACY",
38
+ "articles": ["4"],
39
+ "coverage": "full",
40
+ "notes": "Breach notification requirements for communications providers"
41
+ },
42
+ {
43
+ "control_id": "A.8.3",
44
+ "control_name": "Information access restriction",
45
+ "regulation": "EPRIVACY",
46
+ "articles": ["5"],
47
+ "coverage": "full",
48
+ "notes": "Confidentiality of communications and prohibition of interception"
49
+ },
50
+ {
51
+ "control_id": "A.8.10",
52
+ "control_name": "Information deletion",
53
+ "regulation": "EPRIVACY",
54
+ "articles": ["6"],
55
+ "coverage": "full",
56
+ "notes": "Traffic data erasure requirements"
57
+ },
58
+ {
59
+ "control_id": "A.8.24",
60
+ "control_name": "Use of cryptography",
61
+ "regulation": "EPRIVACY",
62
+ "articles": ["4"],
63
+ "coverage": "partial",
64
+ "notes": "Security measures including encryption for communications"
65
+ }
66
+ ]
@@ -0,0 +1,34 @@
1
+ [
2
+ {
3
+ "control_id": "A.5.1",
4
+ "control_name": "Policies for information security",
5
+ "regulation": "EU_TAXONOMY",
6
+ "articles": ["1", "8"],
7
+ "coverage": "partial",
8
+ "notes": "Framework requires policies for sustainability reporting"
9
+ },
10
+ {
11
+ "control_id": "A.5.12",
12
+ "control_name": "Classification of information",
13
+ "regulation": "EU_TAXONOMY",
14
+ "articles": ["3", "10", "11", "12", "13", "14", "15"],
15
+ "coverage": "full",
16
+ "notes": "Classification criteria for environmentally sustainable activities"
17
+ },
18
+ {
19
+ "control_id": "A.5.31",
20
+ "control_name": "Legal, statutory, regulatory and contractual requirements",
21
+ "regulation": "EU_TAXONOMY",
22
+ "articles": ["1", "2", "8"],
23
+ "coverage": "full",
24
+ "notes": "Establishes legal framework for sustainable finance classification"
25
+ },
26
+ {
27
+ "control_id": "A.5.33",
28
+ "control_name": "Protection of records",
29
+ "regulation": "EU_TAXONOMY",
30
+ "articles": ["8"],
31
+ "coverage": "full",
32
+ "notes": "Disclosure requirements for Taxonomy-aligned activities"
33
+ }
34
+ ]
@@ -0,0 +1,66 @@
1
+ [
2
+ {
3
+ "control_id": "A.5.1",
4
+ "control_name": "Policies for information security",
5
+ "regulation": "EUCC",
6
+ "articles": ["1", "3"],
7
+ "coverage": "full",
8
+ "notes": "EUCC establishes cybersecurity certification policies"
9
+ },
10
+ {
11
+ "control_id": "A.5.31",
12
+ "control_name": "Legal, statutory, regulatory and contractual requirements",
13
+ "regulation": "EUCC",
14
+ "articles": ["1", "2"],
15
+ "coverage": "full",
16
+ "notes": "EU-wide certification scheme requirements"
17
+ },
18
+ {
19
+ "control_id": "A.5.36",
20
+ "control_name": "Conformance with policies, rules and standards for information security",
21
+ "regulation": "EUCC",
22
+ "articles": ["4", "5", "6", "7"],
23
+ "coverage": "full",
24
+ "notes": "Common Criteria evaluation and assurance levels"
25
+ },
26
+ {
27
+ "control_id": "A.8.9",
28
+ "control_name": "Configuration management",
29
+ "regulation": "EUCC",
30
+ "articles": ["8", "9"],
31
+ "coverage": "full",
32
+ "notes": "Configuration management in evaluation process"
33
+ },
34
+ {
35
+ "control_id": "A.8.24",
36
+ "control_name": "Use of cryptography",
37
+ "regulation": "EUCC",
38
+ "articles": ["6"],
39
+ "coverage": "full",
40
+ "notes": "Cryptographic controls evaluated under Common Criteria"
41
+ },
42
+ {
43
+ "control_id": "A.8.25",
44
+ "control_name": "Secure development life cycle",
45
+ "regulation": "EUCC",
46
+ "articles": ["6", "8"],
47
+ "coverage": "full",
48
+ "notes": "Development security evaluated in certification"
49
+ },
50
+ {
51
+ "control_id": "A.8.28",
52
+ "control_name": "Secure coding",
53
+ "regulation": "EUCC",
54
+ "articles": ["6"],
55
+ "coverage": "full",
56
+ "notes": "Code security evaluated under Common Criteria"
57
+ },
58
+ {
59
+ "control_id": "A.8.29",
60
+ "control_name": "Security testing in development and acceptance",
61
+ "regulation": "EUCC",
62
+ "articles": ["4", "5", "6"],
63
+ "coverage": "full",
64
+ "notes": "Comprehensive security testing in evaluation"
65
+ }
66
+ ]