@ansvar/eu-regulations-mcp 0.1.0 → 0.2.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (156) hide show
  1. package/LICENSE +190 -21
  2. package/README.md +125 -26
  3. package/data/seed/aifmd.json +432 -0
  4. package/data/seed/applicability/ai-act.json +87 -0
  5. package/data/seed/applicability/aifmd.json +74 -0
  6. package/data/seed/applicability/cbam.json +74 -0
  7. package/data/seed/applicability/cer.json +74 -0
  8. package/data/seed/applicability/cra.json +77 -0
  9. package/data/seed/applicability/csddd.json +74 -0
  10. package/data/seed/applicability/csrd.json +74 -0
  11. package/data/seed/applicability/cyber_solidarity.json +74 -0
  12. package/data/seed/applicability/cybersecurity-act.json +69 -0
  13. package/data/seed/applicability/data-act.json +71 -0
  14. package/data/seed/applicability/dga.json +74 -0
  15. package/data/seed/applicability/dma.json +77 -0
  16. package/data/seed/applicability/dsa.json +71 -0
  17. package/data/seed/applicability/eecc.json +74 -0
  18. package/data/seed/applicability/ehds.json +74 -0
  19. package/data/seed/applicability/eidas2.json +86 -0
  20. package/data/seed/applicability/eprivacy.json +74 -0
  21. package/data/seed/applicability/eu_taxonomy.json +74 -0
  22. package/data/seed/applicability/eucc.json +74 -0
  23. package/data/seed/applicability/eudr.json +74 -0
  24. package/data/seed/applicability/gpsr.json +74 -0
  25. package/data/seed/applicability/ivdr.json +74 -0
  26. package/data/seed/applicability/led.json +74 -0
  27. package/data/seed/applicability/machinery.json +74 -0
  28. package/data/seed/applicability/mdr.json +74 -0
  29. package/data/seed/applicability/mica.json +74 -0
  30. package/data/seed/applicability/mifid2.json +74 -0
  31. package/data/seed/applicability/mifir.json +74 -0
  32. package/data/seed/applicability/pld.json +74 -0
  33. package/data/seed/applicability/psd2.json +74 -0
  34. package/data/seed/applicability/red.json +74 -0
  35. package/data/seed/applicability/sfdr.json +74 -0
  36. package/data/seed/applicability/un-r155.json +68 -0
  37. package/data/seed/applicability/un-r156.json +68 -0
  38. package/data/seed/cbam.json +397 -0
  39. package/data/seed/cer.json +233 -0
  40. package/data/seed/csddd.json +205 -0
  41. package/data/seed/csrd.json +50 -0
  42. package/data/seed/cyber_solidarity.json +252 -0
  43. package/data/seed/data-act.json +517 -0
  44. package/data/seed/dga.json +342 -0
  45. package/data/seed/dma.json +499 -0
  46. package/data/seed/dsa.json +686 -0
  47. package/data/seed/eecc.json +981 -0
  48. package/data/seed/ehds.json +638 -0
  49. package/data/seed/eidas2.json +590 -0
  50. package/data/seed/eprivacy.json +115 -0
  51. package/data/seed/eu_taxonomy.json +285 -0
  52. package/data/seed/eucc.json +386 -0
  53. package/data/seed/eudr.json +401 -0
  54. package/data/seed/gpsr.json +462 -0
  55. package/data/seed/ivdr.json +1036 -0
  56. package/data/seed/led.json +480 -0
  57. package/data/seed/machinery.json +513 -0
  58. package/data/seed/mappings/iso27001-ai-act.json +114 -0
  59. package/data/seed/mappings/iso27001-aifmd.json +50 -0
  60. package/data/seed/mappings/iso27001-cbam.json +26 -0
  61. package/data/seed/mappings/iso27001-cer.json +74 -0
  62. package/data/seed/mappings/iso27001-cra.json +130 -0
  63. package/data/seed/mappings/iso27001-csddd.json +50 -0
  64. package/data/seed/mappings/iso27001-csrd.json +26 -0
  65. package/data/seed/mappings/iso27001-cyber_solidarity.json +82 -0
  66. package/data/seed/mappings/iso27001-cybersecurity-act.json +90 -0
  67. package/data/seed/mappings/iso27001-data-act.json +66 -0
  68. package/data/seed/mappings/iso27001-dga.json +50 -0
  69. package/data/seed/mappings/iso27001-dma.json +50 -0
  70. package/data/seed/mappings/iso27001-dsa.json +58 -0
  71. package/data/seed/mappings/iso27001-eecc.json +74 -0
  72. package/data/seed/mappings/iso27001-ehds.json +90 -0
  73. package/data/seed/mappings/iso27001-eidas2.json +106 -0
  74. package/data/seed/mappings/iso27001-eprivacy.json +66 -0
  75. package/data/seed/mappings/iso27001-eu_taxonomy.json +34 -0
  76. package/data/seed/mappings/iso27001-eucc.json +66 -0
  77. package/data/seed/mappings/iso27001-eudr.json +34 -0
  78. package/data/seed/mappings/iso27001-gpsr.json +42 -0
  79. package/data/seed/mappings/iso27001-ivdr.json +66 -0
  80. package/data/seed/mappings/iso27001-led.json +74 -0
  81. package/data/seed/mappings/iso27001-machinery.json +50 -0
  82. package/data/seed/mappings/iso27001-mdr.json +82 -0
  83. package/data/seed/mappings/iso27001-mica.json +66 -0
  84. package/data/seed/mappings/iso27001-mifid2.json +66 -0
  85. package/data/seed/mappings/iso27001-mifir.json +42 -0
  86. package/data/seed/mappings/iso27001-pld.json +26 -0
  87. package/data/seed/mappings/iso27001-psd2.json +82 -0
  88. package/data/seed/mappings/iso27001-red.json +42 -0
  89. package/data/seed/mappings/iso27001-sfdr.json +50 -0
  90. package/data/seed/mappings/iso27001-un-r155.json +130 -0
  91. package/data/seed/mappings/iso27001-un-r156.json +106 -0
  92. package/data/seed/mappings/nist-csf-ai-act.json +138 -0
  93. package/data/seed/mappings/nist-csf-aifmd.json +58 -0
  94. package/data/seed/mappings/nist-csf-cbam.json +42 -0
  95. package/data/seed/mappings/nist-csf-cer.json +90 -0
  96. package/data/seed/mappings/nist-csf-cra.json +130 -0
  97. package/data/seed/mappings/nist-csf-csddd.json +50 -0
  98. package/data/seed/mappings/nist-csf-csrd.json +34 -0
  99. package/data/seed/mappings/nist-csf-cyber_solidarity.json +90 -0
  100. package/data/seed/mappings/nist-csf-cybersecurity-act.json +90 -0
  101. package/data/seed/mappings/nist-csf-data-act.json +50 -0
  102. package/data/seed/mappings/nist-csf-dga.json +58 -0
  103. package/data/seed/mappings/nist-csf-dma.json +42 -0
  104. package/data/seed/mappings/nist-csf-dora.json +210 -0
  105. package/data/seed/mappings/nist-csf-dsa.json +82 -0
  106. package/data/seed/mappings/nist-csf-eecc.json +90 -0
  107. package/data/seed/mappings/nist-csf-ehds.json +98 -0
  108. package/data/seed/mappings/nist-csf-eidas2.json +114 -0
  109. package/data/seed/mappings/nist-csf-eprivacy.json +58 -0
  110. package/data/seed/mappings/nist-csf-eu_taxonomy.json +34 -0
  111. package/data/seed/mappings/nist-csf-eucc.json +66 -0
  112. package/data/seed/mappings/nist-csf-eudr.json +58 -0
  113. package/data/seed/mappings/nist-csf-gdpr.json +178 -0
  114. package/data/seed/mappings/nist-csf-gpsr.json +58 -0
  115. package/data/seed/mappings/nist-csf-ivdr.json +66 -0
  116. package/data/seed/mappings/nist-csf-led.json +74 -0
  117. package/data/seed/mappings/nist-csf-machinery.json +58 -0
  118. package/data/seed/mappings/nist-csf-mdr.json +66 -0
  119. package/data/seed/mappings/nist-csf-mica.json +98 -0
  120. package/data/seed/mappings/nist-csf-mifid2.json +74 -0
  121. package/data/seed/mappings/nist-csf-mifir.json +50 -0
  122. package/data/seed/mappings/nist-csf-nis2.json +194 -0
  123. package/data/seed/mappings/nist-csf-pld.json +34 -0
  124. package/data/seed/mappings/nist-csf-psd2.json +98 -0
  125. package/data/seed/mappings/nist-csf-red.json +58 -0
  126. package/data/seed/mappings/nist-csf-sfdr.json +42 -0
  127. package/data/seed/mappings/nist-csf-un-r155.json +130 -0
  128. package/data/seed/mappings/nist-csf-un-r156.json +98 -0
  129. package/data/seed/mdr.json +1066 -0
  130. package/data/seed/mica.json +1003 -0
  131. package/data/seed/mifid2.json +906 -0
  132. package/data/seed/mifir.json +512 -0
  133. package/data/seed/pld.json +244 -0
  134. package/data/seed/psd2.json +827 -0
  135. package/data/seed/red.json +452 -0
  136. package/data/seed/sfdr.json +228 -0
  137. package/data/seed/un-r155.json +166 -0
  138. package/data/seed/un-r156.json +150 -0
  139. package/dist/http-server.d.ts +9 -0
  140. package/dist/http-server.d.ts.map +1 -0
  141. package/dist/http-server.js +342 -0
  142. package/dist/http-server.js.map +1 -0
  143. package/dist/index.js +4 -4
  144. package/dist/index.js.map +1 -1
  145. package/dist/tools/map.d.ts +1 -1
  146. package/dist/tools/map.d.ts.map +1 -1
  147. package/dist/tools/map.js +3 -3
  148. package/dist/tools/map.js.map +1 -1
  149. package/package.json +6 -2
  150. package/scripts/build-db.ts +20 -8
  151. package/scripts/check-updates.ts +141 -39
  152. package/scripts/ingest-eurlex.ts +9 -1
  153. package/scripts/ingest-unece.ts +368 -0
  154. package/src/http-server.ts +380 -0
  155. package/src/index.ts +4 -4
  156. package/src/tools/map.ts +4 -4
@@ -0,0 +1,130 @@
1
+ [
2
+ {
3
+ "control_id": "GV.OC-01",
4
+ "control_name": "Organizational context",
5
+ "regulation": "CRA",
6
+ "articles": ["1", "2", "3", "4"],
7
+ "coverage": "full",
8
+ "notes": "CRA Art 1-4 define scope for products with digital elements"
9
+ },
10
+ {
11
+ "control_id": "GV.RM-01",
12
+ "control_name": "Risk management objectives",
13
+ "regulation": "CRA",
14
+ "articles": ["10", "Annex I"],
15
+ "coverage": "full",
16
+ "notes": "Art 10 manufacturer obligations, Annex I requires documented risk assessment"
17
+ },
18
+ {
19
+ "control_id": "GV.RR-01",
20
+ "control_name": "Organizational roles and responsibilities",
21
+ "regulation": "CRA",
22
+ "articles": ["10", "18", "19", "20"],
23
+ "coverage": "full",
24
+ "notes": "Art 10 manufacturer, Art 18 importer, Art 19 distributor, Art 20 EU representative obligations"
25
+ },
26
+ {
27
+ "control_id": "GV.PO-01",
28
+ "control_name": "Cybersecurity policy",
29
+ "regulation": "CRA",
30
+ "articles": ["10", "11"],
31
+ "coverage": "full",
32
+ "notes": "Art 10 secure development policies, Art 11 vulnerability handling policies"
33
+ },
34
+ {
35
+ "control_id": "GV.SC-01",
36
+ "control_name": "Supply chain risk management program",
37
+ "regulation": "CRA",
38
+ "articles": ["13", "18", "19"],
39
+ "coverage": "full",
40
+ "notes": "Art 13 SBOM requirements, Art 18-19 supply chain verification"
41
+ },
42
+ {
43
+ "control_id": "ID.AM-02",
44
+ "control_name": "Software platforms and applications inventories",
45
+ "regulation": "CRA",
46
+ "articles": ["13"],
47
+ "coverage": "full",
48
+ "notes": "Art 13 requires SBOM (Software Bill of Materials)"
49
+ },
50
+ {
51
+ "control_id": "ID.RA-01",
52
+ "control_name": "Vulnerabilities in assets are identified",
53
+ "regulation": "CRA",
54
+ "articles": ["10", "11", "Annex I"],
55
+ "coverage": "full",
56
+ "notes": "Art 10-11 vulnerability handling, Annex I Part II vulnerability requirements"
57
+ },
58
+ {
59
+ "control_id": "ID.RA-03",
60
+ "control_name": "Internal and external threats are identified",
61
+ "regulation": "CRA",
62
+ "articles": ["Annex I"],
63
+ "coverage": "full",
64
+ "notes": "Annex I requires threat modeling in product design"
65
+ },
66
+ {
67
+ "control_id": "ID.RA-05",
68
+ "control_name": "Risk responses are identified",
69
+ "regulation": "CRA",
70
+ "articles": ["10", "Annex I"],
71
+ "coverage": "full",
72
+ "notes": "Art 10 and Annex I require documented risk mitigation"
73
+ },
74
+ {
75
+ "control_id": "PR.DS-01",
76
+ "control_name": "Data-at-rest is protected",
77
+ "regulation": "CRA",
78
+ "articles": ["Annex I"],
79
+ "coverage": "full",
80
+ "notes": "Annex I Part I requires data confidentiality protection"
81
+ },
82
+ {
83
+ "control_id": "PR.DS-02",
84
+ "control_name": "Data-in-transit is protected",
85
+ "regulation": "CRA",
86
+ "articles": ["Annex I"],
87
+ "coverage": "full",
88
+ "notes": "Annex I Part I requires secure communication mechanisms"
89
+ },
90
+ {
91
+ "control_id": "PR.PS-01",
92
+ "control_name": "Configuration management practices established",
93
+ "regulation": "CRA",
94
+ "articles": ["10", "Annex I"],
95
+ "coverage": "full",
96
+ "notes": "Annex I Part I requires secure default configuration"
97
+ },
98
+ {
99
+ "control_id": "PR.PS-02",
100
+ "control_name": "Software is maintained and updated",
101
+ "regulation": "CRA",
102
+ "articles": ["10", "11"],
103
+ "coverage": "full",
104
+ "notes": "Art 10-11 require 5-year security update support"
105
+ },
106
+ {
107
+ "control_id": "DE.AE-02",
108
+ "control_name": "Potentially adverse events are analyzed",
109
+ "regulation": "CRA",
110
+ "articles": ["10", "11"],
111
+ "coverage": "full",
112
+ "notes": "Art 10-11 require vulnerability assessment and analysis"
113
+ },
114
+ {
115
+ "control_id": "RS.MA-01",
116
+ "control_name": "Incident response plan is executed",
117
+ "regulation": "CRA",
118
+ "articles": ["14"],
119
+ "coverage": "full",
120
+ "notes": "Art 14 requires notification of exploited vulnerabilities within 24h"
121
+ },
122
+ {
123
+ "control_id": "RS.CO-03",
124
+ "control_name": "Information is shared with designated external parties",
125
+ "regulation": "CRA",
126
+ "articles": ["14"],
127
+ "coverage": "full",
128
+ "notes": "Art 14 requires notification to ENISA and national CSIRTs"
129
+ }
130
+ ]
@@ -0,0 +1,50 @@
1
+ [
2
+ {
3
+ "control_id": "GV.OC-01",
4
+ "control_name": "Organizational context",
5
+ "regulation": "CSDDD",
6
+ "articles": ["1", "2", "3"],
7
+ "coverage": "full",
8
+ "notes": "Corporate due diligence regulatory context"
9
+ },
10
+ {
11
+ "control_id": "GV.RM-01",
12
+ "control_name": "Risk management objectives",
13
+ "regulation": "CSDDD",
14
+ "articles": ["7", "8"],
15
+ "coverage": "full",
16
+ "notes": "Due diligence risk management"
17
+ },
18
+ {
19
+ "control_id": "GV.RR-01",
20
+ "control_name": "Organizational roles and responsibilities",
21
+ "regulation": "CSDDD",
22
+ "articles": ["5", "6"],
23
+ "coverage": "full",
24
+ "notes": "Due diligence responsibilities"
25
+ },
26
+ {
27
+ "control_id": "GV.SC-01",
28
+ "control_name": "Supply chain risk management program",
29
+ "regulation": "CSDDD",
30
+ "articles": ["6", "7", "8"],
31
+ "coverage": "full",
32
+ "notes": "Value chain due diligence requirements"
33
+ },
34
+ {
35
+ "control_id": "ID.AM-01",
36
+ "control_name": "Inventories of assets",
37
+ "regulation": "CSDDD",
38
+ "articles": ["6", "11"],
39
+ "coverage": "partial",
40
+ "notes": "Supply chain mapping and documentation"
41
+ },
42
+ {
43
+ "control_id": "RS.CO-03",
44
+ "control_name": "Information is shared with designated external parties",
45
+ "regulation": "CSDDD",
46
+ "articles": ["14", "15"],
47
+ "coverage": "full",
48
+ "notes": "Grievance mechanism and reporting"
49
+ }
50
+ ]
@@ -0,0 +1,34 @@
1
+ [
2
+ {
3
+ "control_id": "GV.OC-01",
4
+ "control_name": "Organizational context",
5
+ "regulation": "CSRD",
6
+ "articles": ["1"],
7
+ "coverage": "full",
8
+ "notes": "Corporate sustainability reporting context"
9
+ },
10
+ {
11
+ "control_id": "GV.RR-01",
12
+ "control_name": "Organizational roles and responsibilities",
13
+ "regulation": "CSRD",
14
+ "articles": ["1"],
15
+ "coverage": "full",
16
+ "notes": "Management responsibility for sustainability reporting"
17
+ },
18
+ {
19
+ "control_id": "ID.AM-01",
20
+ "control_name": "Inventories of assets",
21
+ "regulation": "CSRD",
22
+ "articles": ["1"],
23
+ "coverage": "partial",
24
+ "notes": "Sustainability data collection and management"
25
+ },
26
+ {
27
+ "control_id": "PR.DS-01",
28
+ "control_name": "Data-at-rest is protected",
29
+ "regulation": "CSRD",
30
+ "articles": ["1"],
31
+ "coverage": "partial",
32
+ "notes": "Sustainability data integrity"
33
+ }
34
+ ]
@@ -0,0 +1,90 @@
1
+ [
2
+ {
3
+ "control_id": "GV.OC-01",
4
+ "control_name": "Organizational context",
5
+ "regulation": "CYBER_SOLIDARITY",
6
+ "articles": ["1", "2"],
7
+ "coverage": "full",
8
+ "notes": "Cyber solidarity framework and SOC infrastructure context"
9
+ },
10
+ {
11
+ "control_id": "GV.RM-01",
12
+ "control_name": "Risk management objectives",
13
+ "regulation": "CYBER_SOLIDARITY",
14
+ "articles": ["3", "4"],
15
+ "coverage": "full",
16
+ "notes": "European Cybersecurity Shield risk management"
17
+ },
18
+ {
19
+ "control_id": "GV.RR-01",
20
+ "control_name": "Organizational roles and responsibilities",
21
+ "regulation": "CYBER_SOLIDARITY",
22
+ "articles": ["5", "6"],
23
+ "coverage": "full",
24
+ "notes": "National and cross-border SOC responsibilities"
25
+ },
26
+ {
27
+ "control_id": "GV.SC-01",
28
+ "control_name": "Supply chain risk management program",
29
+ "regulation": "CYBER_SOLIDARITY",
30
+ "articles": ["15", "16"],
31
+ "coverage": "full",
32
+ "notes": "Managed security services and supply chain"
33
+ },
34
+ {
35
+ "control_id": "ID.RA-01",
36
+ "control_name": "Vulnerabilities in assets are identified",
37
+ "regulation": "CYBER_SOLIDARITY",
38
+ "articles": ["12"],
39
+ "coverage": "full",
40
+ "notes": "Coordinated vulnerability testing"
41
+ },
42
+ {
43
+ "control_id": "ID.RA-03",
44
+ "control_name": "Internal and external threats are identified",
45
+ "regulation": "CYBER_SOLIDARITY",
46
+ "articles": ["4", "7"],
47
+ "coverage": "full",
48
+ "notes": "Threat detection and analysis capabilities"
49
+ },
50
+ {
51
+ "control_id": "DE.CM-01",
52
+ "control_name": "Networks and network services are monitored",
53
+ "regulation": "CYBER_SOLIDARITY",
54
+ "articles": ["4", "5", "6"],
55
+ "coverage": "full",
56
+ "notes": "SOC monitoring infrastructure"
57
+ },
58
+ {
59
+ "control_id": "DE.AE-02",
60
+ "control_name": "Potentially adverse events are analyzed",
61
+ "regulation": "CYBER_SOLIDARITY",
62
+ "articles": ["7", "8"],
63
+ "coverage": "full",
64
+ "notes": "Cyber threat analysis and correlation"
65
+ },
66
+ {
67
+ "control_id": "RS.MA-01",
68
+ "control_name": "Incident response plan is executed",
69
+ "regulation": "CYBER_SOLIDARITY",
70
+ "articles": ["10", "11"],
71
+ "coverage": "full",
72
+ "notes": "Cyber emergency mechanism response"
73
+ },
74
+ {
75
+ "control_id": "RS.CO-03",
76
+ "control_name": "Information is shared with designated external parties",
77
+ "regulation": "CYBER_SOLIDARITY",
78
+ "articles": ["7", "8", "9"],
79
+ "coverage": "full",
80
+ "notes": "Cross-border information sharing"
81
+ },
82
+ {
83
+ "control_id": "RC.RP-01",
84
+ "control_name": "Recovery plan is executed",
85
+ "regulation": "CYBER_SOLIDARITY",
86
+ "articles": ["13", "14"],
87
+ "coverage": "full",
88
+ "notes": "Mutual assistance and recovery support"
89
+ }
90
+ ]
@@ -0,0 +1,90 @@
1
+ [
2
+ {
3
+ "control_id": "GV.OC-01",
4
+ "control_name": "Organizational context",
5
+ "regulation": "CYBERSECURITY_ACT",
6
+ "articles": ["1", "2", "46"],
7
+ "coverage": "full",
8
+ "notes": "Art 1-2 scope, Art 46 EU cybersecurity certification framework"
9
+ },
10
+ {
11
+ "control_id": "GV.RM-01",
12
+ "control_name": "Risk management objectives",
13
+ "regulation": "CYBERSECURITY_ACT",
14
+ "articles": ["51", "52"],
15
+ "coverage": "full",
16
+ "notes": "Art 51 security objectives, Art 52 assurance levels (basic/substantial/high)"
17
+ },
18
+ {
19
+ "control_id": "GV.RR-01",
20
+ "control_name": "Organizational roles and responsibilities",
21
+ "regulation": "CYBERSECURITY_ACT",
22
+ "articles": ["4", "5", "6", "7"],
23
+ "coverage": "full",
24
+ "notes": "ENISA objectives and tasks define EU cybersecurity coordination"
25
+ },
26
+ {
27
+ "control_id": "GV.PO-01",
28
+ "control_name": "Cybersecurity policy",
29
+ "regulation": "CYBERSECURITY_ACT",
30
+ "articles": ["46", "47", "51"],
31
+ "coverage": "full",
32
+ "notes": "Art 46-47 certification requirements, Art 51 security objectives"
33
+ },
34
+ {
35
+ "control_id": "ID.RA-01",
36
+ "control_name": "Vulnerabilities in assets are identified",
37
+ "regulation": "CYBERSECURITY_ACT",
38
+ "articles": ["51", "54"],
39
+ "coverage": "full",
40
+ "notes": "Art 51(f) minimizing vulnerabilities, Art 54 vulnerability management"
41
+ },
42
+ {
43
+ "control_id": "ID.RA-05",
44
+ "control_name": "Risk responses are identified",
45
+ "regulation": "CYBERSECURITY_ACT",
46
+ "articles": ["51", "52"],
47
+ "coverage": "full",
48
+ "notes": "Art 51-52 security objectives and assurance requirements"
49
+ },
50
+ {
51
+ "control_id": "PR.DS-01",
52
+ "control_name": "Data-at-rest is protected",
53
+ "regulation": "CYBERSECURITY_ACT",
54
+ "articles": ["51"],
55
+ "coverage": "partial",
56
+ "notes": "Art 51(c-d) data confidentiality and integrity"
57
+ },
58
+ {
59
+ "control_id": "PR.DS-02",
60
+ "control_name": "Data-in-transit is protected",
61
+ "regulation": "CYBERSECURITY_ACT",
62
+ "articles": ["51"],
63
+ "coverage": "partial",
64
+ "notes": "Art 51(c-d) data confidentiality and integrity in transit"
65
+ },
66
+ {
67
+ "control_id": "PR.AT-01",
68
+ "control_name": "Awareness and training provided",
69
+ "regulation": "CYBERSECURITY_ACT",
70
+ "articles": ["10", "12"],
71
+ "coverage": "partial",
72
+ "notes": "Art 10 capacity building, Art 12 knowledge development"
73
+ },
74
+ {
75
+ "control_id": "DE.AE-02",
76
+ "control_name": "Potentially adverse events are analyzed",
77
+ "regulation": "CYBERSECURITY_ACT",
78
+ "articles": ["8", "22"],
79
+ "coverage": "partial",
80
+ "notes": "Art 8 operational cooperation, Art 22 coordination"
81
+ },
82
+ {
83
+ "control_id": "RS.CO-03",
84
+ "control_name": "Information is shared with designated external parties",
85
+ "regulation": "CYBERSECURITY_ACT",
86
+ "articles": ["8", "22"],
87
+ "coverage": "partial",
88
+ "notes": "Art 8 operational cooperation framework"
89
+ }
90
+ ]
@@ -0,0 +1,50 @@
1
+ [
2
+ {
3
+ "control_id": "GV.OC-01",
4
+ "control_name": "Organizational context",
5
+ "regulation": "DATA_ACT",
6
+ "articles": ["1", "2", "3"],
7
+ "coverage": "full",
8
+ "notes": "Art 1-3 define scope for data holders, users, and data sharing services"
9
+ },
10
+ {
11
+ "control_id": "GV.PO-01",
12
+ "control_name": "Cybersecurity policy",
13
+ "regulation": "DATA_ACT",
14
+ "articles": ["5", "8"],
15
+ "coverage": "partial",
16
+ "notes": "Art 5 data sharing conditions, Art 8 trade secret protection policies"
17
+ },
18
+ {
19
+ "control_id": "ID.AM-01",
20
+ "control_name": "Inventories of assets",
21
+ "regulation": "DATA_ACT",
22
+ "articles": ["3", "4"],
23
+ "coverage": "partial",
24
+ "notes": "Art 3-4 require knowledge of data generated by connected products"
25
+ },
26
+ {
27
+ "control_id": "PR.AA-05",
28
+ "control_name": "Access permissions and authorizations are managed",
29
+ "regulation": "DATA_ACT",
30
+ "articles": ["4", "5", "6"],
31
+ "coverage": "full",
32
+ "notes": "Art 4-6 define access rights to product data for users and third parties"
33
+ },
34
+ {
35
+ "control_id": "PR.DS-01",
36
+ "control_name": "Data-at-rest is protected",
37
+ "regulation": "DATA_ACT",
38
+ "articles": ["8"],
39
+ "coverage": "partial",
40
+ "notes": "Art 8 technical measures to protect trade secrets"
41
+ },
42
+ {
43
+ "control_id": "PR.DS-10",
44
+ "control_name": "Data is disposed of properly",
45
+ "regulation": "DATA_ACT",
46
+ "articles": ["23"],
47
+ "coverage": "full",
48
+ "notes": "Art 23 cloud switching requires proper data retrieval and deletion"
49
+ }
50
+ ]
@@ -0,0 +1,58 @@
1
+ [
2
+ {
3
+ "control_id": "GV.OC-01",
4
+ "control_name": "Organizational context",
5
+ "regulation": "DGA",
6
+ "articles": ["1", "2"],
7
+ "coverage": "full",
8
+ "notes": "Data governance regulatory context"
9
+ },
10
+ {
11
+ "control_id": "GV.RR-01",
12
+ "control_name": "Organizational roles and responsibilities",
13
+ "regulation": "DGA",
14
+ "articles": ["10", "11", "12"],
15
+ "coverage": "full",
16
+ "notes": "Data intermediation services responsibilities"
17
+ },
18
+ {
19
+ "control_id": "GV.PO-01",
20
+ "control_name": "Cybersecurity policy",
21
+ "regulation": "DGA",
22
+ "articles": ["5", "12"],
23
+ "coverage": "full",
24
+ "notes": "Security policies for data intermediation services"
25
+ },
26
+ {
27
+ "control_id": "PR.AA-01",
28
+ "control_name": "Identities and credentials for authorized users",
29
+ "regulation": "DGA",
30
+ "articles": ["5", "6"],
31
+ "coverage": "full",
32
+ "notes": "Access controls for protected data re-use"
33
+ },
34
+ {
35
+ "control_id": "PR.AA-05",
36
+ "control_name": "Access permissions and authorizations are managed",
37
+ "regulation": "DGA",
38
+ "articles": ["5", "6"],
39
+ "coverage": "full",
40
+ "notes": "Data access authorization controls"
41
+ },
42
+ {
43
+ "control_id": "PR.DS-01",
44
+ "control_name": "Data-at-rest is protected",
45
+ "regulation": "DGA",
46
+ "articles": ["5", "11"],
47
+ "coverage": "full",
48
+ "notes": "Data governance and cataloguing requirements"
49
+ },
50
+ {
51
+ "control_id": "PR.DS-02",
52
+ "control_name": "Data-in-transit is protected",
53
+ "regulation": "DGA",
54
+ "articles": ["5", "12"],
55
+ "coverage": "full",
56
+ "notes": "Secure data transmission for sharing"
57
+ }
58
+ ]
@@ -0,0 +1,42 @@
1
+ [
2
+ {
3
+ "control_id": "GV.OC-01",
4
+ "control_name": "Organizational context",
5
+ "regulation": "DMA",
6
+ "articles": ["1", "2", "3"],
7
+ "coverage": "full",
8
+ "notes": "Art 1-3 define scope for gatekeepers and core platform services"
9
+ },
10
+ {
11
+ "control_id": "GV.PO-01",
12
+ "control_name": "Cybersecurity policy",
13
+ "regulation": "DMA",
14
+ "articles": ["5", "6"],
15
+ "coverage": "partial",
16
+ "notes": "Art 5-6 gatekeeper obligations include data handling requirements"
17
+ },
18
+ {
19
+ "control_id": "ID.AM-01",
20
+ "control_name": "Inventories of assets",
21
+ "regulation": "DMA",
22
+ "articles": ["15"],
23
+ "coverage": "partial",
24
+ "notes": "Art 15 compliance reports require documentation of services"
25
+ },
26
+ {
27
+ "control_id": "PR.AA-05",
28
+ "control_name": "Access permissions and authorizations are managed",
29
+ "regulation": "DMA",
30
+ "articles": ["5", "6"],
31
+ "coverage": "full",
32
+ "notes": "Art 5-6 restrict data combination and mandate user consent"
33
+ },
34
+ {
35
+ "control_id": "PR.DS-10",
36
+ "control_name": "Data is disposed of properly",
37
+ "regulation": "DMA",
38
+ "articles": ["6"],
39
+ "coverage": "partial",
40
+ "notes": "Art 6 data portability supports user-controlled deletion"
41
+ }
42
+ ]