@ansvar/eu-regulations-mcp 0.1.0 → 0.2.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +190 -21
- package/README.md +125 -26
- package/data/seed/aifmd.json +432 -0
- package/data/seed/applicability/ai-act.json +87 -0
- package/data/seed/applicability/aifmd.json +74 -0
- package/data/seed/applicability/cbam.json +74 -0
- package/data/seed/applicability/cer.json +74 -0
- package/data/seed/applicability/cra.json +77 -0
- package/data/seed/applicability/csddd.json +74 -0
- package/data/seed/applicability/csrd.json +74 -0
- package/data/seed/applicability/cyber_solidarity.json +74 -0
- package/data/seed/applicability/cybersecurity-act.json +69 -0
- package/data/seed/applicability/data-act.json +71 -0
- package/data/seed/applicability/dga.json +74 -0
- package/data/seed/applicability/dma.json +77 -0
- package/data/seed/applicability/dsa.json +71 -0
- package/data/seed/applicability/eecc.json +74 -0
- package/data/seed/applicability/ehds.json +74 -0
- package/data/seed/applicability/eidas2.json +86 -0
- package/data/seed/applicability/eprivacy.json +74 -0
- package/data/seed/applicability/eu_taxonomy.json +74 -0
- package/data/seed/applicability/eucc.json +74 -0
- package/data/seed/applicability/eudr.json +74 -0
- package/data/seed/applicability/gpsr.json +74 -0
- package/data/seed/applicability/ivdr.json +74 -0
- package/data/seed/applicability/led.json +74 -0
- package/data/seed/applicability/machinery.json +74 -0
- package/data/seed/applicability/mdr.json +74 -0
- package/data/seed/applicability/mica.json +74 -0
- package/data/seed/applicability/mifid2.json +74 -0
- package/data/seed/applicability/mifir.json +74 -0
- package/data/seed/applicability/pld.json +74 -0
- package/data/seed/applicability/psd2.json +74 -0
- package/data/seed/applicability/red.json +74 -0
- package/data/seed/applicability/sfdr.json +74 -0
- package/data/seed/applicability/un-r155.json +68 -0
- package/data/seed/applicability/un-r156.json +68 -0
- package/data/seed/cbam.json +397 -0
- package/data/seed/cer.json +233 -0
- package/data/seed/csddd.json +205 -0
- package/data/seed/csrd.json +50 -0
- package/data/seed/cyber_solidarity.json +252 -0
- package/data/seed/data-act.json +517 -0
- package/data/seed/dga.json +342 -0
- package/data/seed/dma.json +499 -0
- package/data/seed/dsa.json +686 -0
- package/data/seed/eecc.json +981 -0
- package/data/seed/ehds.json +638 -0
- package/data/seed/eidas2.json +590 -0
- package/data/seed/eprivacy.json +115 -0
- package/data/seed/eu_taxonomy.json +285 -0
- package/data/seed/eucc.json +386 -0
- package/data/seed/eudr.json +401 -0
- package/data/seed/gpsr.json +462 -0
- package/data/seed/ivdr.json +1036 -0
- package/data/seed/led.json +480 -0
- package/data/seed/machinery.json +513 -0
- package/data/seed/mappings/iso27001-ai-act.json +114 -0
- package/data/seed/mappings/iso27001-aifmd.json +50 -0
- package/data/seed/mappings/iso27001-cbam.json +26 -0
- package/data/seed/mappings/iso27001-cer.json +74 -0
- package/data/seed/mappings/iso27001-cra.json +130 -0
- package/data/seed/mappings/iso27001-csddd.json +50 -0
- package/data/seed/mappings/iso27001-csrd.json +26 -0
- package/data/seed/mappings/iso27001-cyber_solidarity.json +82 -0
- package/data/seed/mappings/iso27001-cybersecurity-act.json +90 -0
- package/data/seed/mappings/iso27001-data-act.json +66 -0
- package/data/seed/mappings/iso27001-dga.json +50 -0
- package/data/seed/mappings/iso27001-dma.json +50 -0
- package/data/seed/mappings/iso27001-dsa.json +58 -0
- package/data/seed/mappings/iso27001-eecc.json +74 -0
- package/data/seed/mappings/iso27001-ehds.json +90 -0
- package/data/seed/mappings/iso27001-eidas2.json +106 -0
- package/data/seed/mappings/iso27001-eprivacy.json +66 -0
- package/data/seed/mappings/iso27001-eu_taxonomy.json +34 -0
- package/data/seed/mappings/iso27001-eucc.json +66 -0
- package/data/seed/mappings/iso27001-eudr.json +34 -0
- package/data/seed/mappings/iso27001-gpsr.json +42 -0
- package/data/seed/mappings/iso27001-ivdr.json +66 -0
- package/data/seed/mappings/iso27001-led.json +74 -0
- package/data/seed/mappings/iso27001-machinery.json +50 -0
- package/data/seed/mappings/iso27001-mdr.json +82 -0
- package/data/seed/mappings/iso27001-mica.json +66 -0
- package/data/seed/mappings/iso27001-mifid2.json +66 -0
- package/data/seed/mappings/iso27001-mifir.json +42 -0
- package/data/seed/mappings/iso27001-pld.json +26 -0
- package/data/seed/mappings/iso27001-psd2.json +82 -0
- package/data/seed/mappings/iso27001-red.json +42 -0
- package/data/seed/mappings/iso27001-sfdr.json +50 -0
- package/data/seed/mappings/iso27001-un-r155.json +130 -0
- package/data/seed/mappings/iso27001-un-r156.json +106 -0
- package/data/seed/mappings/nist-csf-ai-act.json +138 -0
- package/data/seed/mappings/nist-csf-aifmd.json +58 -0
- package/data/seed/mappings/nist-csf-cbam.json +42 -0
- package/data/seed/mappings/nist-csf-cer.json +90 -0
- package/data/seed/mappings/nist-csf-cra.json +130 -0
- package/data/seed/mappings/nist-csf-csddd.json +50 -0
- package/data/seed/mappings/nist-csf-csrd.json +34 -0
- package/data/seed/mappings/nist-csf-cyber_solidarity.json +90 -0
- package/data/seed/mappings/nist-csf-cybersecurity-act.json +90 -0
- package/data/seed/mappings/nist-csf-data-act.json +50 -0
- package/data/seed/mappings/nist-csf-dga.json +58 -0
- package/data/seed/mappings/nist-csf-dma.json +42 -0
- package/data/seed/mappings/nist-csf-dora.json +210 -0
- package/data/seed/mappings/nist-csf-dsa.json +82 -0
- package/data/seed/mappings/nist-csf-eecc.json +90 -0
- package/data/seed/mappings/nist-csf-ehds.json +98 -0
- package/data/seed/mappings/nist-csf-eidas2.json +114 -0
- package/data/seed/mappings/nist-csf-eprivacy.json +58 -0
- package/data/seed/mappings/nist-csf-eu_taxonomy.json +34 -0
- package/data/seed/mappings/nist-csf-eucc.json +66 -0
- package/data/seed/mappings/nist-csf-eudr.json +58 -0
- package/data/seed/mappings/nist-csf-gdpr.json +178 -0
- package/data/seed/mappings/nist-csf-gpsr.json +58 -0
- package/data/seed/mappings/nist-csf-ivdr.json +66 -0
- package/data/seed/mappings/nist-csf-led.json +74 -0
- package/data/seed/mappings/nist-csf-machinery.json +58 -0
- package/data/seed/mappings/nist-csf-mdr.json +66 -0
- package/data/seed/mappings/nist-csf-mica.json +98 -0
- package/data/seed/mappings/nist-csf-mifid2.json +74 -0
- package/data/seed/mappings/nist-csf-mifir.json +50 -0
- package/data/seed/mappings/nist-csf-nis2.json +194 -0
- package/data/seed/mappings/nist-csf-pld.json +34 -0
- package/data/seed/mappings/nist-csf-psd2.json +98 -0
- package/data/seed/mappings/nist-csf-red.json +58 -0
- package/data/seed/mappings/nist-csf-sfdr.json +42 -0
- package/data/seed/mappings/nist-csf-un-r155.json +130 -0
- package/data/seed/mappings/nist-csf-un-r156.json +98 -0
- package/data/seed/mdr.json +1066 -0
- package/data/seed/mica.json +1003 -0
- package/data/seed/mifid2.json +906 -0
- package/data/seed/mifir.json +512 -0
- package/data/seed/pld.json +244 -0
- package/data/seed/psd2.json +827 -0
- package/data/seed/red.json +452 -0
- package/data/seed/sfdr.json +228 -0
- package/data/seed/un-r155.json +166 -0
- package/data/seed/un-r156.json +150 -0
- package/dist/http-server.d.ts +9 -0
- package/dist/http-server.d.ts.map +1 -0
- package/dist/http-server.js +342 -0
- package/dist/http-server.js.map +1 -0
- package/dist/index.js +4 -4
- package/dist/index.js.map +1 -1
- package/dist/tools/map.d.ts +1 -1
- package/dist/tools/map.d.ts.map +1 -1
- package/dist/tools/map.js +3 -3
- package/dist/tools/map.js.map +1 -1
- package/package.json +6 -2
- package/scripts/build-db.ts +20 -8
- package/scripts/check-updates.ts +141 -39
- package/scripts/ingest-eurlex.ts +9 -1
- package/scripts/ingest-unece.ts +368 -0
- package/src/http-server.ts +380 -0
- package/src/index.ts +4 -4
- package/src/tools/map.ts +4 -4
|
@@ -0,0 +1,210 @@
|
|
|
1
|
+
[
|
|
2
|
+
{
|
|
3
|
+
"control_id": "GV.OC-01",
|
|
4
|
+
"control_name": "Organizational context",
|
|
5
|
+
"regulation": "DORA",
|
|
6
|
+
"articles": ["1", "2"],
|
|
7
|
+
"coverage": "full",
|
|
8
|
+
"notes": "DORA Art 1-2 define scope for financial entities and ICT third-party providers"
|
|
9
|
+
},
|
|
10
|
+
{
|
|
11
|
+
"control_id": "GV.RM-01",
|
|
12
|
+
"control_name": "Risk management objectives",
|
|
13
|
+
"regulation": "DORA",
|
|
14
|
+
"articles": ["5", "6", "9"],
|
|
15
|
+
"coverage": "full",
|
|
16
|
+
"notes": "Art 5-6 governance, Art 9 ICT risk management framework requirements"
|
|
17
|
+
},
|
|
18
|
+
{
|
|
19
|
+
"control_id": "GV.RR-01",
|
|
20
|
+
"control_name": "Organizational roles and responsibilities",
|
|
21
|
+
"regulation": "DORA",
|
|
22
|
+
"articles": ["5", "6"],
|
|
23
|
+
"coverage": "full",
|
|
24
|
+
"notes": "Art 5 governance and organisation, Art 6 management body responsibilities"
|
|
25
|
+
},
|
|
26
|
+
{
|
|
27
|
+
"control_id": "GV.PO-01",
|
|
28
|
+
"control_name": "Cybersecurity policy",
|
|
29
|
+
"regulation": "DORA",
|
|
30
|
+
"articles": ["9", "10"],
|
|
31
|
+
"coverage": "full",
|
|
32
|
+
"notes": "Art 9-10 require documented ICT risk management policies"
|
|
33
|
+
},
|
|
34
|
+
{
|
|
35
|
+
"control_id": "GV.OV-01",
|
|
36
|
+
"control_name": "Cybersecurity risk management oversight",
|
|
37
|
+
"regulation": "DORA",
|
|
38
|
+
"articles": ["5", "6"],
|
|
39
|
+
"coverage": "full",
|
|
40
|
+
"notes": "Art 5-6 require management body oversight of ICT risk"
|
|
41
|
+
},
|
|
42
|
+
{
|
|
43
|
+
"control_id": "GV.SC-01",
|
|
44
|
+
"control_name": "Supply chain risk management program",
|
|
45
|
+
"regulation": "DORA",
|
|
46
|
+
"articles": ["28", "29", "30", "31"],
|
|
47
|
+
"coverage": "full",
|
|
48
|
+
"notes": "Chapter V comprehensive ICT third-party risk management"
|
|
49
|
+
},
|
|
50
|
+
{
|
|
51
|
+
"control_id": "ID.AM-01",
|
|
52
|
+
"control_name": "Inventories of assets",
|
|
53
|
+
"regulation": "DORA",
|
|
54
|
+
"articles": ["8"],
|
|
55
|
+
"coverage": "full",
|
|
56
|
+
"notes": "Art 8 requires identification and documentation of ICT assets"
|
|
57
|
+
},
|
|
58
|
+
{
|
|
59
|
+
"control_id": "ID.AM-02",
|
|
60
|
+
"control_name": "Software platforms and applications inventories",
|
|
61
|
+
"regulation": "DORA",
|
|
62
|
+
"articles": ["8"],
|
|
63
|
+
"coverage": "full",
|
|
64
|
+
"notes": "Art 8 requires inventory of all ICT systems and applications"
|
|
65
|
+
},
|
|
66
|
+
{
|
|
67
|
+
"control_id": "ID.RA-01",
|
|
68
|
+
"control_name": "Vulnerabilities in assets are identified",
|
|
69
|
+
"regulation": "DORA",
|
|
70
|
+
"articles": ["9", "24", "25"],
|
|
71
|
+
"coverage": "full",
|
|
72
|
+
"notes": "Art 9 vulnerability management, Art 24-25 digital resilience testing"
|
|
73
|
+
},
|
|
74
|
+
{
|
|
75
|
+
"control_id": "ID.RA-03",
|
|
76
|
+
"control_name": "Internal and external threats are identified",
|
|
77
|
+
"regulation": "DORA",
|
|
78
|
+
"articles": ["9", "10"],
|
|
79
|
+
"coverage": "full",
|
|
80
|
+
"notes": "Art 9-10 require threat identification in risk management"
|
|
81
|
+
},
|
|
82
|
+
{
|
|
83
|
+
"control_id": "ID.RA-05",
|
|
84
|
+
"control_name": "Risk responses are identified",
|
|
85
|
+
"regulation": "DORA",
|
|
86
|
+
"articles": ["9", "10"],
|
|
87
|
+
"coverage": "full",
|
|
88
|
+
"notes": "Art 9-10 require risk mitigation strategies"
|
|
89
|
+
},
|
|
90
|
+
{
|
|
91
|
+
"control_id": "PR.AA-01",
|
|
92
|
+
"control_name": "Identities and credentials for authorized users",
|
|
93
|
+
"regulation": "DORA",
|
|
94
|
+
"articles": ["9"],
|
|
95
|
+
"coverage": "full",
|
|
96
|
+
"notes": "Art 9(4)(c) requires access rights management"
|
|
97
|
+
},
|
|
98
|
+
{
|
|
99
|
+
"control_id": "PR.AA-03",
|
|
100
|
+
"control_name": "Users and services are authenticated",
|
|
101
|
+
"regulation": "DORA",
|
|
102
|
+
"articles": ["9"],
|
|
103
|
+
"coverage": "full",
|
|
104
|
+
"notes": "Art 9(4)(c) covers authentication mechanisms"
|
|
105
|
+
},
|
|
106
|
+
{
|
|
107
|
+
"control_id": "PR.AA-05",
|
|
108
|
+
"control_name": "Access permissions and authorizations are managed",
|
|
109
|
+
"regulation": "DORA",
|
|
110
|
+
"articles": ["9"],
|
|
111
|
+
"coverage": "full",
|
|
112
|
+
"notes": "Art 9(4)(c) requires access rights management"
|
|
113
|
+
},
|
|
114
|
+
{
|
|
115
|
+
"control_id": "PR.AT-01",
|
|
116
|
+
"control_name": "Awareness and training provided",
|
|
117
|
+
"regulation": "DORA",
|
|
118
|
+
"articles": ["13"],
|
|
119
|
+
"coverage": "full",
|
|
120
|
+
"notes": "Art 13(6) requires ICT security awareness programmes"
|
|
121
|
+
},
|
|
122
|
+
{
|
|
123
|
+
"control_id": "PR.DS-01",
|
|
124
|
+
"control_name": "Data-at-rest is protected",
|
|
125
|
+
"regulation": "DORA",
|
|
126
|
+
"articles": ["9"],
|
|
127
|
+
"coverage": "full",
|
|
128
|
+
"notes": "Art 9(4)(d) covers data protection including encryption"
|
|
129
|
+
},
|
|
130
|
+
{
|
|
131
|
+
"control_id": "PR.DS-02",
|
|
132
|
+
"control_name": "Data-in-transit is protected",
|
|
133
|
+
"regulation": "DORA",
|
|
134
|
+
"articles": ["9"],
|
|
135
|
+
"coverage": "full",
|
|
136
|
+
"notes": "Art 9(4)(d) covers network security and data transmission"
|
|
137
|
+
},
|
|
138
|
+
{
|
|
139
|
+
"control_id": "PR.PS-01",
|
|
140
|
+
"control_name": "Configuration management practices established",
|
|
141
|
+
"regulation": "DORA",
|
|
142
|
+
"articles": ["9", "10"],
|
|
143
|
+
"coverage": "full",
|
|
144
|
+
"notes": "Art 9-10 require secure configuration of ICT systems"
|
|
145
|
+
},
|
|
146
|
+
{
|
|
147
|
+
"control_id": "PR.IR-01",
|
|
148
|
+
"control_name": "Incident response plan exists",
|
|
149
|
+
"regulation": "DORA",
|
|
150
|
+
"articles": ["17"],
|
|
151
|
+
"coverage": "full",
|
|
152
|
+
"notes": "Art 17 requires comprehensive ICT-related incident management process"
|
|
153
|
+
},
|
|
154
|
+
{
|
|
155
|
+
"control_id": "DE.CM-01",
|
|
156
|
+
"control_name": "Networks and network services are monitored",
|
|
157
|
+
"regulation": "DORA",
|
|
158
|
+
"articles": ["9", "10"],
|
|
159
|
+
"coverage": "full",
|
|
160
|
+
"notes": "Art 9-10 require continuous monitoring of ICT systems"
|
|
161
|
+
},
|
|
162
|
+
{
|
|
163
|
+
"control_id": "DE.AE-02",
|
|
164
|
+
"control_name": "Potentially adverse events are analyzed",
|
|
165
|
+
"regulation": "DORA",
|
|
166
|
+
"articles": ["17", "18"],
|
|
167
|
+
"coverage": "full",
|
|
168
|
+
"notes": "Art 17 incident detection, Art 18 incident classification"
|
|
169
|
+
},
|
|
170
|
+
{
|
|
171
|
+
"control_id": "RS.MA-01",
|
|
172
|
+
"control_name": "Incident response plan is executed",
|
|
173
|
+
"regulation": "DORA",
|
|
174
|
+
"articles": ["17", "18", "19"],
|
|
175
|
+
"coverage": "full",
|
|
176
|
+
"notes": "Art 17 incident management, Art 18-19 classification and reporting"
|
|
177
|
+
},
|
|
178
|
+
{
|
|
179
|
+
"control_id": "RS.CO-02",
|
|
180
|
+
"control_name": "Incidents are reported internally",
|
|
181
|
+
"regulation": "DORA",
|
|
182
|
+
"articles": ["17"],
|
|
183
|
+
"coverage": "full",
|
|
184
|
+
"notes": "Art 17 requires internal incident communication procedures"
|
|
185
|
+
},
|
|
186
|
+
{
|
|
187
|
+
"control_id": "RS.CO-03",
|
|
188
|
+
"control_name": "Information is shared with designated external parties",
|
|
189
|
+
"regulation": "DORA",
|
|
190
|
+
"articles": ["19", "20"],
|
|
191
|
+
"coverage": "full",
|
|
192
|
+
"notes": "Art 19 major incident reporting (4h, 72h, 1 month), Art 20 information sharing"
|
|
193
|
+
},
|
|
194
|
+
{
|
|
195
|
+
"control_id": "RC.RP-01",
|
|
196
|
+
"control_name": "Recovery plan is executed",
|
|
197
|
+
"regulation": "DORA",
|
|
198
|
+
"articles": ["11", "12"],
|
|
199
|
+
"coverage": "full",
|
|
200
|
+
"notes": "Art 11 response and recovery, Art 12 backup policies and restoration"
|
|
201
|
+
},
|
|
202
|
+
{
|
|
203
|
+
"control_id": "RC.CO-03",
|
|
204
|
+
"control_name": "Recovery activities are communicated",
|
|
205
|
+
"regulation": "DORA",
|
|
206
|
+
"articles": ["13", "19"],
|
|
207
|
+
"coverage": "full",
|
|
208
|
+
"notes": "Art 13 communication policies, Art 19 final incident report"
|
|
209
|
+
}
|
|
210
|
+
]
|
|
@@ -0,0 +1,82 @@
|
|
|
1
|
+
[
|
|
2
|
+
{
|
|
3
|
+
"control_id": "GV.OC-01",
|
|
4
|
+
"control_name": "Organizational context",
|
|
5
|
+
"regulation": "DSA",
|
|
6
|
+
"articles": ["1", "2", "3"],
|
|
7
|
+
"coverage": "full",
|
|
8
|
+
"notes": "Art 1-3 define scope for intermediary services in the EU"
|
|
9
|
+
},
|
|
10
|
+
{
|
|
11
|
+
"control_id": "GV.RM-01",
|
|
12
|
+
"control_name": "Risk management objectives",
|
|
13
|
+
"regulation": "DSA",
|
|
14
|
+
"articles": ["34", "35"],
|
|
15
|
+
"coverage": "full",
|
|
16
|
+
"notes": "Art 34-35 require VLOPs to identify, analyze, and mitigate systemic risks"
|
|
17
|
+
},
|
|
18
|
+
{
|
|
19
|
+
"control_id": "GV.RR-01",
|
|
20
|
+
"control_name": "Organizational roles and responsibilities",
|
|
21
|
+
"regulation": "DSA",
|
|
22
|
+
"articles": ["11", "41"],
|
|
23
|
+
"coverage": "full",
|
|
24
|
+
"notes": "Art 11 points of contact, Art 41 compliance officers for VLOPs"
|
|
25
|
+
},
|
|
26
|
+
{
|
|
27
|
+
"control_id": "GV.PO-01",
|
|
28
|
+
"control_name": "Cybersecurity policy",
|
|
29
|
+
"regulation": "DSA",
|
|
30
|
+
"articles": ["14", "34"],
|
|
31
|
+
"coverage": "full",
|
|
32
|
+
"notes": "Art 14 terms and conditions, Art 34 VLOP risk policies"
|
|
33
|
+
},
|
|
34
|
+
{
|
|
35
|
+
"control_id": "ID.RA-03",
|
|
36
|
+
"control_name": "Internal and external threats are identified",
|
|
37
|
+
"regulation": "DSA",
|
|
38
|
+
"articles": ["34"],
|
|
39
|
+
"coverage": "full",
|
|
40
|
+
"notes": "Art 34 requires VLOPs to identify systemic risks including manipulation"
|
|
41
|
+
},
|
|
42
|
+
{
|
|
43
|
+
"control_id": "ID.RA-05",
|
|
44
|
+
"control_name": "Risk responses are identified",
|
|
45
|
+
"regulation": "DSA",
|
|
46
|
+
"articles": ["35"],
|
|
47
|
+
"coverage": "full",
|
|
48
|
+
"notes": "Art 35 requires reasonable, proportionate mitigation measures"
|
|
49
|
+
},
|
|
50
|
+
{
|
|
51
|
+
"control_id": "DE.CM-01",
|
|
52
|
+
"control_name": "Networks and network services are monitored",
|
|
53
|
+
"regulation": "DSA",
|
|
54
|
+
"articles": ["16", "34"],
|
|
55
|
+
"coverage": "full",
|
|
56
|
+
"notes": "Art 16 notice mechanism monitoring, Art 34 systemic risk monitoring"
|
|
57
|
+
},
|
|
58
|
+
{
|
|
59
|
+
"control_id": "DE.AE-02",
|
|
60
|
+
"control_name": "Potentially adverse events are analyzed",
|
|
61
|
+
"regulation": "DSA",
|
|
62
|
+
"articles": ["16", "20"],
|
|
63
|
+
"coverage": "full",
|
|
64
|
+
"notes": "Art 16 notice assessment, Art 20 illegal content analysis"
|
|
65
|
+
},
|
|
66
|
+
{
|
|
67
|
+
"control_id": "RS.MA-01",
|
|
68
|
+
"control_name": "Incident response plan is executed",
|
|
69
|
+
"regulation": "DSA",
|
|
70
|
+
"articles": ["16", "17"],
|
|
71
|
+
"coverage": "full",
|
|
72
|
+
"notes": "Art 16-17 notice-and-action and statement of reasons procedures"
|
|
73
|
+
},
|
|
74
|
+
{
|
|
75
|
+
"control_id": "RS.CO-03",
|
|
76
|
+
"control_name": "Information is shared with designated external parties",
|
|
77
|
+
"regulation": "DSA",
|
|
78
|
+
"articles": ["18", "42"],
|
|
79
|
+
"coverage": "full",
|
|
80
|
+
"notes": "Art 18 criminal offense reporting, Art 42 data access for researchers"
|
|
81
|
+
}
|
|
82
|
+
]
|
|
@@ -0,0 +1,90 @@
|
|
|
1
|
+
[
|
|
2
|
+
{
|
|
3
|
+
"control_id": "GV.OC-01",
|
|
4
|
+
"control_name": "Organizational context",
|
|
5
|
+
"regulation": "EECC",
|
|
6
|
+
"articles": ["1", "2", "3"],
|
|
7
|
+
"coverage": "full",
|
|
8
|
+
"notes": "Electronic communications regulatory framework"
|
|
9
|
+
},
|
|
10
|
+
{
|
|
11
|
+
"control_id": "GV.RM-01",
|
|
12
|
+
"control_name": "Risk management objectives",
|
|
13
|
+
"regulation": "EECC",
|
|
14
|
+
"articles": ["40", "41"],
|
|
15
|
+
"coverage": "full",
|
|
16
|
+
"notes": "Security risk management for networks"
|
|
17
|
+
},
|
|
18
|
+
{
|
|
19
|
+
"control_id": "GV.RR-01",
|
|
20
|
+
"control_name": "Organizational roles and responsibilities",
|
|
21
|
+
"regulation": "EECC",
|
|
22
|
+
"articles": ["5", "6", "7"],
|
|
23
|
+
"coverage": "full",
|
|
24
|
+
"notes": "NRA and operator responsibilities"
|
|
25
|
+
},
|
|
26
|
+
{
|
|
27
|
+
"control_id": "GV.PO-01",
|
|
28
|
+
"control_name": "Cybersecurity policy",
|
|
29
|
+
"regulation": "EECC",
|
|
30
|
+
"articles": ["40"],
|
|
31
|
+
"coverage": "full",
|
|
32
|
+
"notes": "Security measures and policies"
|
|
33
|
+
},
|
|
34
|
+
{
|
|
35
|
+
"control_id": "ID.RA-01",
|
|
36
|
+
"control_name": "Vulnerabilities in assets are identified",
|
|
37
|
+
"regulation": "EECC",
|
|
38
|
+
"articles": ["40"],
|
|
39
|
+
"coverage": "full",
|
|
40
|
+
"notes": "Security risk assessment requirements"
|
|
41
|
+
},
|
|
42
|
+
{
|
|
43
|
+
"control_id": "PR.AA-01",
|
|
44
|
+
"control_name": "Identities and credentials for authorized users",
|
|
45
|
+
"regulation": "EECC",
|
|
46
|
+
"articles": ["40"],
|
|
47
|
+
"coverage": "full",
|
|
48
|
+
"notes": "Access control for network systems"
|
|
49
|
+
},
|
|
50
|
+
{
|
|
51
|
+
"control_id": "PR.DS-01",
|
|
52
|
+
"control_name": "Data-at-rest is protected",
|
|
53
|
+
"regulation": "EECC",
|
|
54
|
+
"articles": ["40", "126"],
|
|
55
|
+
"coverage": "full",
|
|
56
|
+
"notes": "Communications data protection"
|
|
57
|
+
},
|
|
58
|
+
{
|
|
59
|
+
"control_id": "PR.DS-02",
|
|
60
|
+
"control_name": "Data-in-transit is protected",
|
|
61
|
+
"regulation": "EECC",
|
|
62
|
+
"articles": ["40", "126"],
|
|
63
|
+
"coverage": "full",
|
|
64
|
+
"notes": "Network communications security"
|
|
65
|
+
},
|
|
66
|
+
{
|
|
67
|
+
"control_id": "DE.CM-01",
|
|
68
|
+
"control_name": "Networks and network services are monitored",
|
|
69
|
+
"regulation": "EECC",
|
|
70
|
+
"articles": ["40"],
|
|
71
|
+
"coverage": "full",
|
|
72
|
+
"notes": "Network monitoring requirements"
|
|
73
|
+
},
|
|
74
|
+
{
|
|
75
|
+
"control_id": "RS.CO-03",
|
|
76
|
+
"control_name": "Information is shared with designated external parties",
|
|
77
|
+
"regulation": "EECC",
|
|
78
|
+
"articles": ["40"],
|
|
79
|
+
"coverage": "full",
|
|
80
|
+
"notes": "Security incident notification to NRAs"
|
|
81
|
+
},
|
|
82
|
+
{
|
|
83
|
+
"control_id": "RC.RP-01",
|
|
84
|
+
"control_name": "Recovery plan is executed",
|
|
85
|
+
"regulation": "EECC",
|
|
86
|
+
"articles": ["40"],
|
|
87
|
+
"coverage": "full",
|
|
88
|
+
"notes": "Business continuity for communications"
|
|
89
|
+
}
|
|
90
|
+
]
|
|
@@ -0,0 +1,98 @@
|
|
|
1
|
+
[
|
|
2
|
+
{
|
|
3
|
+
"control_id": "GV.OC-01",
|
|
4
|
+
"control_name": "Organizational context",
|
|
5
|
+
"regulation": "EHDS",
|
|
6
|
+
"articles": ["1", "2", "50"],
|
|
7
|
+
"coverage": "full",
|
|
8
|
+
"notes": "EHDS defines scope, context, and applicability to health data holders"
|
|
9
|
+
},
|
|
10
|
+
{
|
|
11
|
+
"control_id": "GV.RM-01",
|
|
12
|
+
"control_name": "Risk management objectives",
|
|
13
|
+
"regulation": "EHDS",
|
|
14
|
+
"articles": ["55", "57"],
|
|
15
|
+
"coverage": "full",
|
|
16
|
+
"notes": "Health data access bodies responsible for risk management"
|
|
17
|
+
},
|
|
18
|
+
{
|
|
19
|
+
"control_id": "GV.RR-01",
|
|
20
|
+
"control_name": "Organizational roles and responsibilities",
|
|
21
|
+
"regulation": "EHDS",
|
|
22
|
+
"articles": ["55", "57", "60", "61"],
|
|
23
|
+
"coverage": "full",
|
|
24
|
+
"notes": "Health data access bodies, data holders, and data users responsibilities"
|
|
25
|
+
},
|
|
26
|
+
{
|
|
27
|
+
"control_id": "GV.PO-01",
|
|
28
|
+
"control_name": "Cybersecurity policy",
|
|
29
|
+
"regulation": "EHDS",
|
|
30
|
+
"articles": ["66", "73"],
|
|
31
|
+
"coverage": "full",
|
|
32
|
+
"notes": "Data minimisation and secure processing environment policies"
|
|
33
|
+
},
|
|
34
|
+
{
|
|
35
|
+
"control_id": "ID.AM-01",
|
|
36
|
+
"control_name": "Inventories of assets",
|
|
37
|
+
"regulation": "EHDS",
|
|
38
|
+
"articles": ["77", "78", "79"],
|
|
39
|
+
"coverage": "full",
|
|
40
|
+
"notes": "Dataset description, quality label, and EU dataset catalogue"
|
|
41
|
+
},
|
|
42
|
+
{
|
|
43
|
+
"control_id": "ID.RA-01",
|
|
44
|
+
"control_name": "Vulnerabilities in assets are identified",
|
|
45
|
+
"regulation": "EHDS",
|
|
46
|
+
"articles": ["73"],
|
|
47
|
+
"coverage": "partial",
|
|
48
|
+
"notes": "Secure processing environment security requirements"
|
|
49
|
+
},
|
|
50
|
+
{
|
|
51
|
+
"control_id": "PR.AA-01",
|
|
52
|
+
"control_name": "Identities and credentials for authorized users",
|
|
53
|
+
"regulation": "EHDS",
|
|
54
|
+
"articles": ["67", "68"],
|
|
55
|
+
"coverage": "full",
|
|
56
|
+
"notes": "Health data access applications and data permits"
|
|
57
|
+
},
|
|
58
|
+
{
|
|
59
|
+
"control_id": "PR.AA-05",
|
|
60
|
+
"control_name": "Access permissions and authorizations are managed",
|
|
61
|
+
"regulation": "EHDS",
|
|
62
|
+
"articles": ["67", "68", "72"],
|
|
63
|
+
"coverage": "full",
|
|
64
|
+
"notes": "Data permits and simplified access procedures"
|
|
65
|
+
},
|
|
66
|
+
{
|
|
67
|
+
"control_id": "PR.DS-01",
|
|
68
|
+
"control_name": "Data-at-rest is protected",
|
|
69
|
+
"regulation": "EHDS",
|
|
70
|
+
"articles": ["73", "86"],
|
|
71
|
+
"coverage": "full",
|
|
72
|
+
"notes": "Secure processing environment and storage requirements"
|
|
73
|
+
},
|
|
74
|
+
{
|
|
75
|
+
"control_id": "PR.DS-02",
|
|
76
|
+
"control_name": "Data-in-transit is protected",
|
|
77
|
+
"regulation": "EHDS",
|
|
78
|
+
"articles": ["73", "75"],
|
|
79
|
+
"coverage": "full",
|
|
80
|
+
"notes": "Secure processing and HealthData@EU cross-border infrastructure"
|
|
81
|
+
},
|
|
82
|
+
{
|
|
83
|
+
"control_id": "DE.CM-01",
|
|
84
|
+
"control_name": "Networks and network services are monitored",
|
|
85
|
+
"regulation": "EHDS",
|
|
86
|
+
"articles": ["73"],
|
|
87
|
+
"coverage": "partial",
|
|
88
|
+
"notes": "Secure processing environment monitoring"
|
|
89
|
+
},
|
|
90
|
+
{
|
|
91
|
+
"control_id": "RS.CO-03",
|
|
92
|
+
"control_name": "Information is shared with designated external parties",
|
|
93
|
+
"regulation": "EHDS",
|
|
94
|
+
"articles": ["59", "63"],
|
|
95
|
+
"coverage": "full",
|
|
96
|
+
"notes": "Reporting by health data access bodies and enforcement"
|
|
97
|
+
}
|
|
98
|
+
]
|
|
@@ -0,0 +1,114 @@
|
|
|
1
|
+
[
|
|
2
|
+
{
|
|
3
|
+
"control_id": "GV.OC-01",
|
|
4
|
+
"control_name": "Organizational context",
|
|
5
|
+
"regulation": "EIDAS2",
|
|
6
|
+
"articles": ["1", "2", "3"],
|
|
7
|
+
"coverage": "full",
|
|
8
|
+
"notes": "Art 1-3 scope for electronic identification and trust services"
|
|
9
|
+
},
|
|
10
|
+
{
|
|
11
|
+
"control_id": "GV.RM-01",
|
|
12
|
+
"control_name": "Risk management objectives",
|
|
13
|
+
"regulation": "EIDAS2",
|
|
14
|
+
"articles": ["19", "24"],
|
|
15
|
+
"coverage": "full",
|
|
16
|
+
"notes": "Art 19 security requirements, Art 24 qualified trust service requirements"
|
|
17
|
+
},
|
|
18
|
+
{
|
|
19
|
+
"control_id": "GV.RR-01",
|
|
20
|
+
"control_name": "Organizational roles and responsibilities",
|
|
21
|
+
"regulation": "EIDAS2",
|
|
22
|
+
"articles": ["17", "20"],
|
|
23
|
+
"coverage": "full",
|
|
24
|
+
"notes": "Art 17 supervisory body, Art 20 trust service provider obligations"
|
|
25
|
+
},
|
|
26
|
+
{
|
|
27
|
+
"control_id": "GV.PO-01",
|
|
28
|
+
"control_name": "Cybersecurity policy",
|
|
29
|
+
"regulation": "EIDAS2",
|
|
30
|
+
"articles": ["19", "24"],
|
|
31
|
+
"coverage": "full",
|
|
32
|
+
"notes": "Art 19 security policies, Art 24 qualified provider requirements"
|
|
33
|
+
},
|
|
34
|
+
{
|
|
35
|
+
"control_id": "ID.AM-01",
|
|
36
|
+
"control_name": "Inventories of assets",
|
|
37
|
+
"regulation": "EIDAS2",
|
|
38
|
+
"articles": ["22"],
|
|
39
|
+
"coverage": "partial",
|
|
40
|
+
"notes": "Art 22 trusted lists of qualified providers"
|
|
41
|
+
},
|
|
42
|
+
{
|
|
43
|
+
"control_id": "ID.RA-05",
|
|
44
|
+
"control_name": "Risk responses are identified",
|
|
45
|
+
"regulation": "EIDAS2",
|
|
46
|
+
"articles": ["19", "24"],
|
|
47
|
+
"coverage": "full",
|
|
48
|
+
"notes": "Art 19-24 security measures and risk management"
|
|
49
|
+
},
|
|
50
|
+
{
|
|
51
|
+
"control_id": "PR.AA-01",
|
|
52
|
+
"control_name": "Identities and credentials for authorized users",
|
|
53
|
+
"regulation": "EIDAS2",
|
|
54
|
+
"articles": ["6a", "6b", "8"],
|
|
55
|
+
"coverage": "full",
|
|
56
|
+
"notes": "Art 6a-6b EUDI Wallet, Art 8 assurance levels"
|
|
57
|
+
},
|
|
58
|
+
{
|
|
59
|
+
"control_id": "PR.AA-03",
|
|
60
|
+
"control_name": "Users and services are authenticated",
|
|
61
|
+
"regulation": "EIDAS2",
|
|
62
|
+
"articles": ["6a", "8", "29"],
|
|
63
|
+
"coverage": "full",
|
|
64
|
+
"notes": "Art 6a wallet authentication, Art 8 assurance, Art 29 qualified signatures"
|
|
65
|
+
},
|
|
66
|
+
{
|
|
67
|
+
"control_id": "PR.AA-05",
|
|
68
|
+
"control_name": "Access permissions and authorizations are managed",
|
|
69
|
+
"regulation": "EIDAS2",
|
|
70
|
+
"articles": ["6a", "6c"],
|
|
71
|
+
"coverage": "full",
|
|
72
|
+
"notes": "Art 6a-6c user control over identity and data sharing"
|
|
73
|
+
},
|
|
74
|
+
{
|
|
75
|
+
"control_id": "PR.DS-01",
|
|
76
|
+
"control_name": "Data-at-rest is protected",
|
|
77
|
+
"regulation": "EIDAS2",
|
|
78
|
+
"articles": ["19", "24"],
|
|
79
|
+
"coverage": "full",
|
|
80
|
+
"notes": "Art 19 security measures, Art 24 qualified provider security"
|
|
81
|
+
},
|
|
82
|
+
{
|
|
83
|
+
"control_id": "PR.DS-02",
|
|
84
|
+
"control_name": "Data-in-transit is protected",
|
|
85
|
+
"regulation": "EIDAS2",
|
|
86
|
+
"articles": ["19", "26", "29"],
|
|
87
|
+
"coverage": "full",
|
|
88
|
+
"notes": "Art 19 security, Art 26 advanced signatures, Art 29 qualified signatures"
|
|
89
|
+
},
|
|
90
|
+
{
|
|
91
|
+
"control_id": "DE.AE-02",
|
|
92
|
+
"control_name": "Potentially adverse events are analyzed",
|
|
93
|
+
"regulation": "EIDAS2",
|
|
94
|
+
"articles": ["19"],
|
|
95
|
+
"coverage": "full",
|
|
96
|
+
"notes": "Art 19(2) security breach assessment"
|
|
97
|
+
},
|
|
98
|
+
{
|
|
99
|
+
"control_id": "RS.MA-01",
|
|
100
|
+
"control_name": "Incident response plan is executed",
|
|
101
|
+
"regulation": "EIDAS2",
|
|
102
|
+
"articles": ["19"],
|
|
103
|
+
"coverage": "full",
|
|
104
|
+
"notes": "Art 19(2) breach notification within 24 hours"
|
|
105
|
+
},
|
|
106
|
+
{
|
|
107
|
+
"control_id": "RS.CO-03",
|
|
108
|
+
"control_name": "Information is shared with designated external parties",
|
|
109
|
+
"regulation": "EIDAS2",
|
|
110
|
+
"articles": ["19"],
|
|
111
|
+
"coverage": "full",
|
|
112
|
+
"notes": "Art 19(2) notification to supervisory body"
|
|
113
|
+
}
|
|
114
|
+
]
|
|
@@ -0,0 +1,58 @@
|
|
|
1
|
+
[
|
|
2
|
+
{
|
|
3
|
+
"control_id": "GV.OC-01",
|
|
4
|
+
"control_name": "Organizational context",
|
|
5
|
+
"regulation": "EPRIVACY",
|
|
6
|
+
"articles": ["1", "2", "3"],
|
|
7
|
+
"coverage": "full",
|
|
8
|
+
"notes": "Privacy in electronic communications context"
|
|
9
|
+
},
|
|
10
|
+
{
|
|
11
|
+
"control_id": "GV.PO-01",
|
|
12
|
+
"control_name": "Cybersecurity policy",
|
|
13
|
+
"regulation": "EPRIVACY",
|
|
14
|
+
"articles": ["4", "5"],
|
|
15
|
+
"coverage": "full",
|
|
16
|
+
"notes": "Security policies for communications services"
|
|
17
|
+
},
|
|
18
|
+
{
|
|
19
|
+
"control_id": "PR.AA-01",
|
|
20
|
+
"control_name": "Identities and credentials for authorized users",
|
|
21
|
+
"regulation": "EPRIVACY",
|
|
22
|
+
"articles": ["5"],
|
|
23
|
+
"coverage": "full",
|
|
24
|
+
"notes": "Confidentiality of communications access controls"
|
|
25
|
+
},
|
|
26
|
+
{
|
|
27
|
+
"control_id": "PR.DS-01",
|
|
28
|
+
"control_name": "Data-at-rest is protected",
|
|
29
|
+
"regulation": "EPRIVACY",
|
|
30
|
+
"articles": ["4", "5"],
|
|
31
|
+
"coverage": "full",
|
|
32
|
+
"notes": "Protection of stored communications data"
|
|
33
|
+
},
|
|
34
|
+
{
|
|
35
|
+
"control_id": "PR.DS-02",
|
|
36
|
+
"control_name": "Data-in-transit is protected",
|
|
37
|
+
"regulation": "EPRIVACY",
|
|
38
|
+
"articles": ["5"],
|
|
39
|
+
"coverage": "full",
|
|
40
|
+
"notes": "Confidentiality of communications in transit"
|
|
41
|
+
},
|
|
42
|
+
{
|
|
43
|
+
"control_id": "DE.CM-01",
|
|
44
|
+
"control_name": "Networks and network services are monitored",
|
|
45
|
+
"regulation": "EPRIVACY",
|
|
46
|
+
"articles": ["4"],
|
|
47
|
+
"coverage": "full",
|
|
48
|
+
"notes": "Security monitoring requirements"
|
|
49
|
+
},
|
|
50
|
+
{
|
|
51
|
+
"control_id": "RS.CO-03",
|
|
52
|
+
"control_name": "Information is shared with designated external parties",
|
|
53
|
+
"regulation": "EPRIVACY",
|
|
54
|
+
"articles": ["4"],
|
|
55
|
+
"coverage": "full",
|
|
56
|
+
"notes": "Security breach notification requirements"
|
|
57
|
+
}
|
|
58
|
+
]
|