@ansvar/eu-regulations-mcp 0.1.0 → 0.2.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +190 -21
- package/README.md +125 -26
- package/data/seed/aifmd.json +432 -0
- package/data/seed/applicability/ai-act.json +87 -0
- package/data/seed/applicability/aifmd.json +74 -0
- package/data/seed/applicability/cbam.json +74 -0
- package/data/seed/applicability/cer.json +74 -0
- package/data/seed/applicability/cra.json +77 -0
- package/data/seed/applicability/csddd.json +74 -0
- package/data/seed/applicability/csrd.json +74 -0
- package/data/seed/applicability/cyber_solidarity.json +74 -0
- package/data/seed/applicability/cybersecurity-act.json +69 -0
- package/data/seed/applicability/data-act.json +71 -0
- package/data/seed/applicability/dga.json +74 -0
- package/data/seed/applicability/dma.json +77 -0
- package/data/seed/applicability/dsa.json +71 -0
- package/data/seed/applicability/eecc.json +74 -0
- package/data/seed/applicability/ehds.json +74 -0
- package/data/seed/applicability/eidas2.json +86 -0
- package/data/seed/applicability/eprivacy.json +74 -0
- package/data/seed/applicability/eu_taxonomy.json +74 -0
- package/data/seed/applicability/eucc.json +74 -0
- package/data/seed/applicability/eudr.json +74 -0
- package/data/seed/applicability/gpsr.json +74 -0
- package/data/seed/applicability/ivdr.json +74 -0
- package/data/seed/applicability/led.json +74 -0
- package/data/seed/applicability/machinery.json +74 -0
- package/data/seed/applicability/mdr.json +74 -0
- package/data/seed/applicability/mica.json +74 -0
- package/data/seed/applicability/mifid2.json +74 -0
- package/data/seed/applicability/mifir.json +74 -0
- package/data/seed/applicability/pld.json +74 -0
- package/data/seed/applicability/psd2.json +74 -0
- package/data/seed/applicability/red.json +74 -0
- package/data/seed/applicability/sfdr.json +74 -0
- package/data/seed/applicability/un-r155.json +68 -0
- package/data/seed/applicability/un-r156.json +68 -0
- package/data/seed/cbam.json +397 -0
- package/data/seed/cer.json +233 -0
- package/data/seed/csddd.json +205 -0
- package/data/seed/csrd.json +50 -0
- package/data/seed/cyber_solidarity.json +252 -0
- package/data/seed/data-act.json +517 -0
- package/data/seed/dga.json +342 -0
- package/data/seed/dma.json +499 -0
- package/data/seed/dsa.json +686 -0
- package/data/seed/eecc.json +981 -0
- package/data/seed/ehds.json +638 -0
- package/data/seed/eidas2.json +590 -0
- package/data/seed/eprivacy.json +115 -0
- package/data/seed/eu_taxonomy.json +285 -0
- package/data/seed/eucc.json +386 -0
- package/data/seed/eudr.json +401 -0
- package/data/seed/gpsr.json +462 -0
- package/data/seed/ivdr.json +1036 -0
- package/data/seed/led.json +480 -0
- package/data/seed/machinery.json +513 -0
- package/data/seed/mappings/iso27001-ai-act.json +114 -0
- package/data/seed/mappings/iso27001-aifmd.json +50 -0
- package/data/seed/mappings/iso27001-cbam.json +26 -0
- package/data/seed/mappings/iso27001-cer.json +74 -0
- package/data/seed/mappings/iso27001-cra.json +130 -0
- package/data/seed/mappings/iso27001-csddd.json +50 -0
- package/data/seed/mappings/iso27001-csrd.json +26 -0
- package/data/seed/mappings/iso27001-cyber_solidarity.json +82 -0
- package/data/seed/mappings/iso27001-cybersecurity-act.json +90 -0
- package/data/seed/mappings/iso27001-data-act.json +66 -0
- package/data/seed/mappings/iso27001-dga.json +50 -0
- package/data/seed/mappings/iso27001-dma.json +50 -0
- package/data/seed/mappings/iso27001-dsa.json +58 -0
- package/data/seed/mappings/iso27001-eecc.json +74 -0
- package/data/seed/mappings/iso27001-ehds.json +90 -0
- package/data/seed/mappings/iso27001-eidas2.json +106 -0
- package/data/seed/mappings/iso27001-eprivacy.json +66 -0
- package/data/seed/mappings/iso27001-eu_taxonomy.json +34 -0
- package/data/seed/mappings/iso27001-eucc.json +66 -0
- package/data/seed/mappings/iso27001-eudr.json +34 -0
- package/data/seed/mappings/iso27001-gpsr.json +42 -0
- package/data/seed/mappings/iso27001-ivdr.json +66 -0
- package/data/seed/mappings/iso27001-led.json +74 -0
- package/data/seed/mappings/iso27001-machinery.json +50 -0
- package/data/seed/mappings/iso27001-mdr.json +82 -0
- package/data/seed/mappings/iso27001-mica.json +66 -0
- package/data/seed/mappings/iso27001-mifid2.json +66 -0
- package/data/seed/mappings/iso27001-mifir.json +42 -0
- package/data/seed/mappings/iso27001-pld.json +26 -0
- package/data/seed/mappings/iso27001-psd2.json +82 -0
- package/data/seed/mappings/iso27001-red.json +42 -0
- package/data/seed/mappings/iso27001-sfdr.json +50 -0
- package/data/seed/mappings/iso27001-un-r155.json +130 -0
- package/data/seed/mappings/iso27001-un-r156.json +106 -0
- package/data/seed/mappings/nist-csf-ai-act.json +138 -0
- package/data/seed/mappings/nist-csf-aifmd.json +58 -0
- package/data/seed/mappings/nist-csf-cbam.json +42 -0
- package/data/seed/mappings/nist-csf-cer.json +90 -0
- package/data/seed/mappings/nist-csf-cra.json +130 -0
- package/data/seed/mappings/nist-csf-csddd.json +50 -0
- package/data/seed/mappings/nist-csf-csrd.json +34 -0
- package/data/seed/mappings/nist-csf-cyber_solidarity.json +90 -0
- package/data/seed/mappings/nist-csf-cybersecurity-act.json +90 -0
- package/data/seed/mappings/nist-csf-data-act.json +50 -0
- package/data/seed/mappings/nist-csf-dga.json +58 -0
- package/data/seed/mappings/nist-csf-dma.json +42 -0
- package/data/seed/mappings/nist-csf-dora.json +210 -0
- package/data/seed/mappings/nist-csf-dsa.json +82 -0
- package/data/seed/mappings/nist-csf-eecc.json +90 -0
- package/data/seed/mappings/nist-csf-ehds.json +98 -0
- package/data/seed/mappings/nist-csf-eidas2.json +114 -0
- package/data/seed/mappings/nist-csf-eprivacy.json +58 -0
- package/data/seed/mappings/nist-csf-eu_taxonomy.json +34 -0
- package/data/seed/mappings/nist-csf-eucc.json +66 -0
- package/data/seed/mappings/nist-csf-eudr.json +58 -0
- package/data/seed/mappings/nist-csf-gdpr.json +178 -0
- package/data/seed/mappings/nist-csf-gpsr.json +58 -0
- package/data/seed/mappings/nist-csf-ivdr.json +66 -0
- package/data/seed/mappings/nist-csf-led.json +74 -0
- package/data/seed/mappings/nist-csf-machinery.json +58 -0
- package/data/seed/mappings/nist-csf-mdr.json +66 -0
- package/data/seed/mappings/nist-csf-mica.json +98 -0
- package/data/seed/mappings/nist-csf-mifid2.json +74 -0
- package/data/seed/mappings/nist-csf-mifir.json +50 -0
- package/data/seed/mappings/nist-csf-nis2.json +194 -0
- package/data/seed/mappings/nist-csf-pld.json +34 -0
- package/data/seed/mappings/nist-csf-psd2.json +98 -0
- package/data/seed/mappings/nist-csf-red.json +58 -0
- package/data/seed/mappings/nist-csf-sfdr.json +42 -0
- package/data/seed/mappings/nist-csf-un-r155.json +130 -0
- package/data/seed/mappings/nist-csf-un-r156.json +98 -0
- package/data/seed/mdr.json +1066 -0
- package/data/seed/mica.json +1003 -0
- package/data/seed/mifid2.json +906 -0
- package/data/seed/mifir.json +512 -0
- package/data/seed/pld.json +244 -0
- package/data/seed/psd2.json +827 -0
- package/data/seed/red.json +452 -0
- package/data/seed/sfdr.json +228 -0
- package/data/seed/un-r155.json +166 -0
- package/data/seed/un-r156.json +150 -0
- package/dist/http-server.d.ts +9 -0
- package/dist/http-server.d.ts.map +1 -0
- package/dist/http-server.js +342 -0
- package/dist/http-server.js.map +1 -0
- package/dist/index.js +4 -4
- package/dist/index.js.map +1 -1
- package/dist/tools/map.d.ts +1 -1
- package/dist/tools/map.d.ts.map +1 -1
- package/dist/tools/map.js +3 -3
- package/dist/tools/map.js.map +1 -1
- package/package.json +6 -2
- package/scripts/build-db.ts +20 -8
- package/scripts/check-updates.ts +141 -39
- package/scripts/ingest-eurlex.ts +9 -1
- package/scripts/ingest-unece.ts +368 -0
- package/src/http-server.ts +380 -0
- package/src/index.ts +4 -4
- package/src/tools/map.ts +4 -4
|
@@ -0,0 +1,98 @@
|
|
|
1
|
+
[
|
|
2
|
+
{
|
|
3
|
+
"control_id": "GV.OC-01",
|
|
4
|
+
"control_name": "Organizational context",
|
|
5
|
+
"regulation": "MICA",
|
|
6
|
+
"articles": ["1", "2", "3"],
|
|
7
|
+
"coverage": "full",
|
|
8
|
+
"notes": "Markets in crypto-assets regulatory context"
|
|
9
|
+
},
|
|
10
|
+
{
|
|
11
|
+
"control_id": "GV.RM-01",
|
|
12
|
+
"control_name": "Risk management objectives",
|
|
13
|
+
"regulation": "MICA",
|
|
14
|
+
"articles": ["64", "65"],
|
|
15
|
+
"coverage": "full",
|
|
16
|
+
"notes": "Risk management for crypto-asset service providers"
|
|
17
|
+
},
|
|
18
|
+
{
|
|
19
|
+
"control_id": "GV.RR-01",
|
|
20
|
+
"control_name": "Organizational roles and responsibilities",
|
|
21
|
+
"regulation": "MICA",
|
|
22
|
+
"articles": ["59", "60"],
|
|
23
|
+
"coverage": "full",
|
|
24
|
+
"notes": "CASP governance and responsibilities"
|
|
25
|
+
},
|
|
26
|
+
{
|
|
27
|
+
"control_id": "GV.PO-01",
|
|
28
|
+
"control_name": "Cybersecurity policy",
|
|
29
|
+
"regulation": "MICA",
|
|
30
|
+
"articles": ["64", "65"],
|
|
31
|
+
"coverage": "full",
|
|
32
|
+
"notes": "ICT security policies for CASPs"
|
|
33
|
+
},
|
|
34
|
+
{
|
|
35
|
+
"control_id": "GV.SC-01",
|
|
36
|
+
"control_name": "Supply chain risk management program",
|
|
37
|
+
"regulation": "MICA",
|
|
38
|
+
"articles": ["64"],
|
|
39
|
+
"coverage": "full",
|
|
40
|
+
"notes": "Third-party service provider management"
|
|
41
|
+
},
|
|
42
|
+
{
|
|
43
|
+
"control_id": "ID.RA-01",
|
|
44
|
+
"control_name": "Vulnerabilities in assets are identified",
|
|
45
|
+
"regulation": "MICA",
|
|
46
|
+
"articles": ["64"],
|
|
47
|
+
"coverage": "full",
|
|
48
|
+
"notes": "ICT system vulnerability assessment"
|
|
49
|
+
},
|
|
50
|
+
{
|
|
51
|
+
"control_id": "PR.AA-01",
|
|
52
|
+
"control_name": "Identities and credentials for authorized users",
|
|
53
|
+
"regulation": "MICA",
|
|
54
|
+
"articles": ["64", "70"],
|
|
55
|
+
"coverage": "full",
|
|
56
|
+
"notes": "Access controls for crypto-asset custody"
|
|
57
|
+
},
|
|
58
|
+
{
|
|
59
|
+
"control_id": "PR.DS-01",
|
|
60
|
+
"control_name": "Data-at-rest is protected",
|
|
61
|
+
"regulation": "MICA",
|
|
62
|
+
"articles": ["64", "70"],
|
|
63
|
+
"coverage": "full",
|
|
64
|
+
"notes": "Crypto-asset safeguarding"
|
|
65
|
+
},
|
|
66
|
+
{
|
|
67
|
+
"control_id": "PR.DS-02",
|
|
68
|
+
"control_name": "Data-in-transit is protected",
|
|
69
|
+
"regulation": "MICA",
|
|
70
|
+
"articles": ["64"],
|
|
71
|
+
"coverage": "full",
|
|
72
|
+
"notes": "Secure transmission protocols"
|
|
73
|
+
},
|
|
74
|
+
{
|
|
75
|
+
"control_id": "DE.CM-01",
|
|
76
|
+
"control_name": "Networks and network services are monitored",
|
|
77
|
+
"regulation": "MICA",
|
|
78
|
+
"articles": ["64"],
|
|
79
|
+
"coverage": "full",
|
|
80
|
+
"notes": "ICT system monitoring requirements"
|
|
81
|
+
},
|
|
82
|
+
{
|
|
83
|
+
"control_id": "RS.CO-03",
|
|
84
|
+
"control_name": "Information is shared with designated external parties",
|
|
85
|
+
"regulation": "MICA",
|
|
86
|
+
"articles": ["64"],
|
|
87
|
+
"coverage": "full",
|
|
88
|
+
"notes": "ICT incident reporting"
|
|
89
|
+
},
|
|
90
|
+
{
|
|
91
|
+
"control_id": "RC.RP-01",
|
|
92
|
+
"control_name": "Recovery plan is executed",
|
|
93
|
+
"regulation": "MICA",
|
|
94
|
+
"articles": ["64"],
|
|
95
|
+
"coverage": "full",
|
|
96
|
+
"notes": "Business continuity and disaster recovery"
|
|
97
|
+
}
|
|
98
|
+
]
|
|
@@ -0,0 +1,74 @@
|
|
|
1
|
+
[
|
|
2
|
+
{
|
|
3
|
+
"control_id": "GV.OC-01",
|
|
4
|
+
"control_name": "Organizational context",
|
|
5
|
+
"regulation": "MIFID2",
|
|
6
|
+
"articles": ["1", "2", "3"],
|
|
7
|
+
"coverage": "full",
|
|
8
|
+
"notes": "Investment services regulatory context"
|
|
9
|
+
},
|
|
10
|
+
{
|
|
11
|
+
"control_id": "GV.RM-01",
|
|
12
|
+
"control_name": "Risk management objectives",
|
|
13
|
+
"regulation": "MIFID2",
|
|
14
|
+
"articles": ["16", "17"],
|
|
15
|
+
"coverage": "full",
|
|
16
|
+
"notes": "Organizational and risk management requirements"
|
|
17
|
+
},
|
|
18
|
+
{
|
|
19
|
+
"control_id": "GV.RR-01",
|
|
20
|
+
"control_name": "Organizational roles and responsibilities",
|
|
21
|
+
"regulation": "MIFID2",
|
|
22
|
+
"articles": ["9", "16"],
|
|
23
|
+
"coverage": "full",
|
|
24
|
+
"notes": "Management body and compliance responsibilities"
|
|
25
|
+
},
|
|
26
|
+
{
|
|
27
|
+
"control_id": "GV.PO-01",
|
|
28
|
+
"control_name": "Cybersecurity policy",
|
|
29
|
+
"regulation": "MIFID2",
|
|
30
|
+
"articles": ["16", "17"],
|
|
31
|
+
"coverage": "full",
|
|
32
|
+
"notes": "IT systems and security policies"
|
|
33
|
+
},
|
|
34
|
+
{
|
|
35
|
+
"control_id": "GV.SC-01",
|
|
36
|
+
"control_name": "Supply chain risk management program",
|
|
37
|
+
"regulation": "MIFID2",
|
|
38
|
+
"articles": ["16"],
|
|
39
|
+
"coverage": "full",
|
|
40
|
+
"notes": "Outsourcing arrangements requirements"
|
|
41
|
+
},
|
|
42
|
+
{
|
|
43
|
+
"control_id": "ID.AM-01",
|
|
44
|
+
"control_name": "Inventories of assets",
|
|
45
|
+
"regulation": "MIFID2",
|
|
46
|
+
"articles": ["16", "25"],
|
|
47
|
+
"coverage": "partial",
|
|
48
|
+
"notes": "Client asset safeguarding requirements"
|
|
49
|
+
},
|
|
50
|
+
{
|
|
51
|
+
"control_id": "PR.DS-01",
|
|
52
|
+
"control_name": "Data-at-rest is protected",
|
|
53
|
+
"regulation": "MIFID2",
|
|
54
|
+
"articles": ["16", "66"],
|
|
55
|
+
"coverage": "full",
|
|
56
|
+
"notes": "Transaction record protection"
|
|
57
|
+
},
|
|
58
|
+
{
|
|
59
|
+
"control_id": "PR.IR-01",
|
|
60
|
+
"control_name": "Incident response plan exists",
|
|
61
|
+
"regulation": "MIFID2",
|
|
62
|
+
"articles": ["16", "17"],
|
|
63
|
+
"coverage": "full",
|
|
64
|
+
"notes": "Business continuity arrangements"
|
|
65
|
+
},
|
|
66
|
+
{
|
|
67
|
+
"control_id": "RC.RP-01",
|
|
68
|
+
"control_name": "Recovery plan is executed",
|
|
69
|
+
"regulation": "MIFID2",
|
|
70
|
+
"articles": ["16", "17"],
|
|
71
|
+
"coverage": "full",
|
|
72
|
+
"notes": "Business continuity and disaster recovery"
|
|
73
|
+
}
|
|
74
|
+
]
|
|
@@ -0,0 +1,50 @@
|
|
|
1
|
+
[
|
|
2
|
+
{
|
|
3
|
+
"control_id": "GV.OC-01",
|
|
4
|
+
"control_name": "Organizational context",
|
|
5
|
+
"regulation": "MIFIR",
|
|
6
|
+
"articles": ["1", "2"],
|
|
7
|
+
"coverage": "full",
|
|
8
|
+
"notes": "Markets in financial instruments context"
|
|
9
|
+
},
|
|
10
|
+
{
|
|
11
|
+
"control_id": "GV.RR-01",
|
|
12
|
+
"control_name": "Organizational roles and responsibilities",
|
|
13
|
+
"regulation": "MIFIR",
|
|
14
|
+
"articles": ["22", "23", "24"],
|
|
15
|
+
"coverage": "full",
|
|
16
|
+
"notes": "Trading venue and competent authority responsibilities"
|
|
17
|
+
},
|
|
18
|
+
{
|
|
19
|
+
"control_id": "ID.AM-01",
|
|
20
|
+
"control_name": "Inventories of assets",
|
|
21
|
+
"regulation": "MIFIR",
|
|
22
|
+
"articles": ["25", "26", "27"],
|
|
23
|
+
"coverage": "full",
|
|
24
|
+
"notes": "Transaction reporting and record keeping"
|
|
25
|
+
},
|
|
26
|
+
{
|
|
27
|
+
"control_id": "PR.DS-01",
|
|
28
|
+
"control_name": "Data-at-rest is protected",
|
|
29
|
+
"regulation": "MIFIR",
|
|
30
|
+
"articles": ["25", "26"],
|
|
31
|
+
"coverage": "full",
|
|
32
|
+
"notes": "Transaction data protection requirements"
|
|
33
|
+
},
|
|
34
|
+
{
|
|
35
|
+
"control_id": "PR.DS-02",
|
|
36
|
+
"control_name": "Data-in-transit is protected",
|
|
37
|
+
"regulation": "MIFIR",
|
|
38
|
+
"articles": ["26"],
|
|
39
|
+
"coverage": "full",
|
|
40
|
+
"notes": "Secure transaction reporting transmission"
|
|
41
|
+
},
|
|
42
|
+
{
|
|
43
|
+
"control_id": "RS.CO-03",
|
|
44
|
+
"control_name": "Information is shared with designated external parties",
|
|
45
|
+
"regulation": "MIFIR",
|
|
46
|
+
"articles": ["26", "27"],
|
|
47
|
+
"coverage": "full",
|
|
48
|
+
"notes": "Reporting to competent authorities"
|
|
49
|
+
}
|
|
50
|
+
]
|
|
@@ -0,0 +1,194 @@
|
|
|
1
|
+
[
|
|
2
|
+
{
|
|
3
|
+
"control_id": "GV.OC-01",
|
|
4
|
+
"control_name": "Organizational context",
|
|
5
|
+
"regulation": "NIS2",
|
|
6
|
+
"articles": ["1", "2", "3"],
|
|
7
|
+
"coverage": "full",
|
|
8
|
+
"notes": "NIS2 Art 1-3 define scope and essential/important entity context"
|
|
9
|
+
},
|
|
10
|
+
{
|
|
11
|
+
"control_id": "GV.RM-01",
|
|
12
|
+
"control_name": "Risk management objectives",
|
|
13
|
+
"regulation": "NIS2",
|
|
14
|
+
"articles": ["20", "21"],
|
|
15
|
+
"coverage": "full",
|
|
16
|
+
"notes": "Art 20 governance, Art 21 risk-based cybersecurity measures"
|
|
17
|
+
},
|
|
18
|
+
{
|
|
19
|
+
"control_id": "GV.RR-01",
|
|
20
|
+
"control_name": "Organizational roles and responsibilities",
|
|
21
|
+
"regulation": "NIS2",
|
|
22
|
+
"articles": ["20"],
|
|
23
|
+
"coverage": "full",
|
|
24
|
+
"notes": "Art 20 requires management body approval and accountability"
|
|
25
|
+
},
|
|
26
|
+
{
|
|
27
|
+
"control_id": "GV.PO-01",
|
|
28
|
+
"control_name": "Cybersecurity policy",
|
|
29
|
+
"regulation": "NIS2",
|
|
30
|
+
"articles": ["21"],
|
|
31
|
+
"coverage": "full",
|
|
32
|
+
"notes": "Art 21(2)(a) explicitly requires policies on risks and information security"
|
|
33
|
+
},
|
|
34
|
+
{
|
|
35
|
+
"control_id": "GV.SC-01",
|
|
36
|
+
"control_name": "Supply chain risk management program",
|
|
37
|
+
"regulation": "NIS2",
|
|
38
|
+
"articles": ["21"],
|
|
39
|
+
"coverage": "full",
|
|
40
|
+
"notes": "Art 21(2)(d) explicitly requires supply chain security measures"
|
|
41
|
+
},
|
|
42
|
+
{
|
|
43
|
+
"control_id": "ID.AM-01",
|
|
44
|
+
"control_name": "Inventories of assets",
|
|
45
|
+
"regulation": "NIS2",
|
|
46
|
+
"articles": ["21"],
|
|
47
|
+
"coverage": "partial",
|
|
48
|
+
"notes": "Art 21 risk management implies asset inventory"
|
|
49
|
+
},
|
|
50
|
+
{
|
|
51
|
+
"control_id": "ID.RA-01",
|
|
52
|
+
"control_name": "Vulnerabilities in assets are identified",
|
|
53
|
+
"regulation": "NIS2",
|
|
54
|
+
"articles": ["21"],
|
|
55
|
+
"coverage": "full",
|
|
56
|
+
"notes": "Art 21(2)(e) explicitly requires vulnerability handling and disclosure"
|
|
57
|
+
},
|
|
58
|
+
{
|
|
59
|
+
"control_id": "ID.RA-03",
|
|
60
|
+
"control_name": "Internal and external threats are identified",
|
|
61
|
+
"regulation": "NIS2",
|
|
62
|
+
"articles": ["21"],
|
|
63
|
+
"coverage": "full",
|
|
64
|
+
"notes": "Art 21(2)(a) requires policies on risk analysis and information security"
|
|
65
|
+
},
|
|
66
|
+
{
|
|
67
|
+
"control_id": "ID.RA-05",
|
|
68
|
+
"control_name": "Risk responses are identified",
|
|
69
|
+
"regulation": "NIS2",
|
|
70
|
+
"articles": ["21"],
|
|
71
|
+
"coverage": "full",
|
|
72
|
+
"notes": "Art 21(2) enumerates specific risk management measures"
|
|
73
|
+
},
|
|
74
|
+
{
|
|
75
|
+
"control_id": "PR.AA-01",
|
|
76
|
+
"control_name": "Identities and credentials for authorized users",
|
|
77
|
+
"regulation": "NIS2",
|
|
78
|
+
"articles": ["21"],
|
|
79
|
+
"coverage": "full",
|
|
80
|
+
"notes": "Art 21(2)(i) requires access control policies"
|
|
81
|
+
},
|
|
82
|
+
{
|
|
83
|
+
"control_id": "PR.AA-03",
|
|
84
|
+
"control_name": "Users and services are authenticated",
|
|
85
|
+
"regulation": "NIS2",
|
|
86
|
+
"articles": ["21"],
|
|
87
|
+
"coverage": "full",
|
|
88
|
+
"notes": "Art 21(2)(j) explicitly requires multi-factor or continuous authentication"
|
|
89
|
+
},
|
|
90
|
+
{
|
|
91
|
+
"control_id": "PR.AA-05",
|
|
92
|
+
"control_name": "Access permissions and authorizations are managed",
|
|
93
|
+
"regulation": "NIS2",
|
|
94
|
+
"articles": ["21"],
|
|
95
|
+
"coverage": "full",
|
|
96
|
+
"notes": "Art 21(2)(i) requires access control policies"
|
|
97
|
+
},
|
|
98
|
+
{
|
|
99
|
+
"control_id": "PR.AT-01",
|
|
100
|
+
"control_name": "Awareness and training provided",
|
|
101
|
+
"regulation": "NIS2",
|
|
102
|
+
"articles": ["20", "21"],
|
|
103
|
+
"coverage": "full",
|
|
104
|
+
"notes": "Art 20(2) requires management body training, Art 21(2)(g) basic cyber hygiene practices"
|
|
105
|
+
},
|
|
106
|
+
{
|
|
107
|
+
"control_id": "PR.DS-01",
|
|
108
|
+
"control_name": "Data-at-rest is protected",
|
|
109
|
+
"regulation": "NIS2",
|
|
110
|
+
"articles": ["21"],
|
|
111
|
+
"coverage": "full",
|
|
112
|
+
"notes": "Art 21(2)(h) explicitly requires encryption"
|
|
113
|
+
},
|
|
114
|
+
{
|
|
115
|
+
"control_id": "PR.DS-02",
|
|
116
|
+
"control_name": "Data-in-transit is protected",
|
|
117
|
+
"regulation": "NIS2",
|
|
118
|
+
"articles": ["21"],
|
|
119
|
+
"coverage": "full",
|
|
120
|
+
"notes": "Art 21(2)(h) requires cryptography and encryption policies"
|
|
121
|
+
},
|
|
122
|
+
{
|
|
123
|
+
"control_id": "PR.PS-01",
|
|
124
|
+
"control_name": "Configuration management practices established",
|
|
125
|
+
"regulation": "NIS2",
|
|
126
|
+
"articles": ["21"],
|
|
127
|
+
"coverage": "partial",
|
|
128
|
+
"notes": "Art 21(2) implies secure configuration as part of risk measures"
|
|
129
|
+
},
|
|
130
|
+
{
|
|
131
|
+
"control_id": "PR.IR-01",
|
|
132
|
+
"control_name": "Incident response plan exists",
|
|
133
|
+
"regulation": "NIS2",
|
|
134
|
+
"articles": ["21"],
|
|
135
|
+
"coverage": "full",
|
|
136
|
+
"notes": "Art 21(2)(b) explicitly requires incident handling"
|
|
137
|
+
},
|
|
138
|
+
{
|
|
139
|
+
"control_id": "DE.CM-01",
|
|
140
|
+
"control_name": "Networks and network services are monitored",
|
|
141
|
+
"regulation": "NIS2",
|
|
142
|
+
"articles": ["21"],
|
|
143
|
+
"coverage": "full",
|
|
144
|
+
"notes": "Art 21(2) requires security monitoring capabilities"
|
|
145
|
+
},
|
|
146
|
+
{
|
|
147
|
+
"control_id": "DE.AE-02",
|
|
148
|
+
"control_name": "Potentially adverse events are analyzed",
|
|
149
|
+
"regulation": "NIS2",
|
|
150
|
+
"articles": ["21", "23"],
|
|
151
|
+
"coverage": "full",
|
|
152
|
+
"notes": "Art 21(2)(b) incident handling, Art 23 incident analysis for notification"
|
|
153
|
+
},
|
|
154
|
+
{
|
|
155
|
+
"control_id": "RS.MA-01",
|
|
156
|
+
"control_name": "Incident response plan is executed",
|
|
157
|
+
"regulation": "NIS2",
|
|
158
|
+
"articles": ["21", "23"],
|
|
159
|
+
"coverage": "full",
|
|
160
|
+
"notes": "Art 21(2)(b) incident handling, Art 23 incident notification process"
|
|
161
|
+
},
|
|
162
|
+
{
|
|
163
|
+
"control_id": "RS.CO-02",
|
|
164
|
+
"control_name": "Incidents are reported internally",
|
|
165
|
+
"regulation": "NIS2",
|
|
166
|
+
"articles": ["23"],
|
|
167
|
+
"coverage": "full",
|
|
168
|
+
"notes": "Art 23 requires internal awareness for 24h early warning"
|
|
169
|
+
},
|
|
170
|
+
{
|
|
171
|
+
"control_id": "RS.CO-03",
|
|
172
|
+
"control_name": "Information is shared with designated external parties",
|
|
173
|
+
"regulation": "NIS2",
|
|
174
|
+
"articles": ["23", "24"],
|
|
175
|
+
"coverage": "full",
|
|
176
|
+
"notes": "Art 23 notification to CSIRTs, Art 24 voluntary information sharing"
|
|
177
|
+
},
|
|
178
|
+
{
|
|
179
|
+
"control_id": "RC.RP-01",
|
|
180
|
+
"control_name": "Recovery plan is executed",
|
|
181
|
+
"regulation": "NIS2",
|
|
182
|
+
"articles": ["21"],
|
|
183
|
+
"coverage": "full",
|
|
184
|
+
"notes": "Art 21(2)(c) business continuity, backup management, disaster recovery"
|
|
185
|
+
},
|
|
186
|
+
{
|
|
187
|
+
"control_id": "RC.CO-03",
|
|
188
|
+
"control_name": "Recovery activities are communicated",
|
|
189
|
+
"regulation": "NIS2",
|
|
190
|
+
"articles": ["21", "23"],
|
|
191
|
+
"coverage": "full",
|
|
192
|
+
"notes": "Art 21(2)(c) crisis management, Art 23 final report on incident resolution"
|
|
193
|
+
}
|
|
194
|
+
]
|
|
@@ -0,0 +1,34 @@
|
|
|
1
|
+
[
|
|
2
|
+
{
|
|
3
|
+
"control_id": "GV.OC-01",
|
|
4
|
+
"control_name": "Organizational context",
|
|
5
|
+
"regulation": "PLD",
|
|
6
|
+
"articles": ["1", "2", "3"],
|
|
7
|
+
"coverage": "full",
|
|
8
|
+
"notes": "Product liability regulatory context"
|
|
9
|
+
},
|
|
10
|
+
{
|
|
11
|
+
"control_id": "GV.RR-01",
|
|
12
|
+
"control_name": "Organizational roles and responsibilities",
|
|
13
|
+
"regulation": "PLD",
|
|
14
|
+
"articles": ["7", "8", "9"],
|
|
15
|
+
"coverage": "full",
|
|
16
|
+
"notes": "Manufacturer and importer liability"
|
|
17
|
+
},
|
|
18
|
+
{
|
|
19
|
+
"control_id": "ID.AM-01",
|
|
20
|
+
"control_name": "Inventories of assets",
|
|
21
|
+
"regulation": "PLD",
|
|
22
|
+
"articles": ["4", "6"],
|
|
23
|
+
"coverage": "partial",
|
|
24
|
+
"notes": "Product documentation for liability purposes"
|
|
25
|
+
},
|
|
26
|
+
{
|
|
27
|
+
"control_id": "RS.CO-03",
|
|
28
|
+
"control_name": "Information is shared with designated external parties",
|
|
29
|
+
"regulation": "PLD",
|
|
30
|
+
"articles": ["8", "9"],
|
|
31
|
+
"coverage": "partial",
|
|
32
|
+
"notes": "Defect disclosure and information sharing"
|
|
33
|
+
}
|
|
34
|
+
]
|
|
@@ -0,0 +1,98 @@
|
|
|
1
|
+
[
|
|
2
|
+
{
|
|
3
|
+
"control_id": "GV.OC-01",
|
|
4
|
+
"control_name": "Organizational context",
|
|
5
|
+
"regulation": "PSD2",
|
|
6
|
+
"articles": ["1", "2", "3"],
|
|
7
|
+
"coverage": "full",
|
|
8
|
+
"notes": "Payment services regulatory context"
|
|
9
|
+
},
|
|
10
|
+
{
|
|
11
|
+
"control_id": "GV.RM-01",
|
|
12
|
+
"control_name": "Risk management objectives",
|
|
13
|
+
"regulation": "PSD2",
|
|
14
|
+
"articles": ["95", "97"],
|
|
15
|
+
"coverage": "full",
|
|
16
|
+
"notes": "Operational and security risk management"
|
|
17
|
+
},
|
|
18
|
+
{
|
|
19
|
+
"control_id": "GV.RR-01",
|
|
20
|
+
"control_name": "Organizational roles and responsibilities",
|
|
21
|
+
"regulation": "PSD2",
|
|
22
|
+
"articles": ["5", "11"],
|
|
23
|
+
"coverage": "full",
|
|
24
|
+
"notes": "Payment institution governance requirements"
|
|
25
|
+
},
|
|
26
|
+
{
|
|
27
|
+
"control_id": "GV.PO-01",
|
|
28
|
+
"control_name": "Cybersecurity policy",
|
|
29
|
+
"regulation": "PSD2",
|
|
30
|
+
"articles": ["95"],
|
|
31
|
+
"coverage": "full",
|
|
32
|
+
"notes": "Security policies for payment services"
|
|
33
|
+
},
|
|
34
|
+
{
|
|
35
|
+
"control_id": "GV.SC-01",
|
|
36
|
+
"control_name": "Supply chain risk management program",
|
|
37
|
+
"regulation": "PSD2",
|
|
38
|
+
"articles": ["19"],
|
|
39
|
+
"coverage": "full",
|
|
40
|
+
"notes": "Outsourcing of operational functions"
|
|
41
|
+
},
|
|
42
|
+
{
|
|
43
|
+
"control_id": "PR.AA-01",
|
|
44
|
+
"control_name": "Identities and credentials for authorized users",
|
|
45
|
+
"regulation": "PSD2",
|
|
46
|
+
"articles": ["97"],
|
|
47
|
+
"coverage": "full",
|
|
48
|
+
"notes": "Strong customer authentication requirements"
|
|
49
|
+
},
|
|
50
|
+
{
|
|
51
|
+
"control_id": "PR.AA-03",
|
|
52
|
+
"control_name": "Users and services are authenticated",
|
|
53
|
+
"regulation": "PSD2",
|
|
54
|
+
"articles": ["97", "98"],
|
|
55
|
+
"coverage": "full",
|
|
56
|
+
"notes": "Multi-factor authentication for payments"
|
|
57
|
+
},
|
|
58
|
+
{
|
|
59
|
+
"control_id": "PR.DS-01",
|
|
60
|
+
"control_name": "Data-at-rest is protected",
|
|
61
|
+
"regulation": "PSD2",
|
|
62
|
+
"articles": ["95", "97"],
|
|
63
|
+
"coverage": "full",
|
|
64
|
+
"notes": "Payment data protection requirements"
|
|
65
|
+
},
|
|
66
|
+
{
|
|
67
|
+
"control_id": "PR.DS-02",
|
|
68
|
+
"control_name": "Data-in-transit is protected",
|
|
69
|
+
"regulation": "PSD2",
|
|
70
|
+
"articles": ["95", "97", "98"],
|
|
71
|
+
"coverage": "full",
|
|
72
|
+
"notes": "Secure communication channels"
|
|
73
|
+
},
|
|
74
|
+
{
|
|
75
|
+
"control_id": "DE.CM-01",
|
|
76
|
+
"control_name": "Networks and network services are monitored",
|
|
77
|
+
"regulation": "PSD2",
|
|
78
|
+
"articles": ["95"],
|
|
79
|
+
"coverage": "full",
|
|
80
|
+
"notes": "Transaction monitoring requirements"
|
|
81
|
+
},
|
|
82
|
+
{
|
|
83
|
+
"control_id": "RS.CO-03",
|
|
84
|
+
"control_name": "Information is shared with designated external parties",
|
|
85
|
+
"regulation": "PSD2",
|
|
86
|
+
"articles": ["96"],
|
|
87
|
+
"coverage": "full",
|
|
88
|
+
"notes": "Major incident reporting to competent authorities"
|
|
89
|
+
},
|
|
90
|
+
{
|
|
91
|
+
"control_id": "RC.RP-01",
|
|
92
|
+
"control_name": "Recovery plan is executed",
|
|
93
|
+
"regulation": "PSD2",
|
|
94
|
+
"articles": ["95"],
|
|
95
|
+
"coverage": "full",
|
|
96
|
+
"notes": "Business continuity for payment services"
|
|
97
|
+
}
|
|
98
|
+
]
|
|
@@ -0,0 +1,58 @@
|
|
|
1
|
+
[
|
|
2
|
+
{
|
|
3
|
+
"control_id": "GV.OC-01",
|
|
4
|
+
"control_name": "Organizational context",
|
|
5
|
+
"regulation": "RED",
|
|
6
|
+
"articles": ["1", "2", "3"],
|
|
7
|
+
"coverage": "full",
|
|
8
|
+
"notes": "Radio equipment regulatory context"
|
|
9
|
+
},
|
|
10
|
+
{
|
|
11
|
+
"control_id": "GV.RM-01",
|
|
12
|
+
"control_name": "Risk management objectives",
|
|
13
|
+
"regulation": "RED",
|
|
14
|
+
"articles": ["3"],
|
|
15
|
+
"coverage": "full",
|
|
16
|
+
"notes": "Essential requirements for radio equipment"
|
|
17
|
+
},
|
|
18
|
+
{
|
|
19
|
+
"control_id": "GV.RR-01",
|
|
20
|
+
"control_name": "Organizational roles and responsibilities",
|
|
21
|
+
"regulation": "RED",
|
|
22
|
+
"articles": ["10", "11", "12", "13"],
|
|
23
|
+
"coverage": "full",
|
|
24
|
+
"notes": "Economic operator obligations"
|
|
25
|
+
},
|
|
26
|
+
{
|
|
27
|
+
"control_id": "GV.SC-01",
|
|
28
|
+
"control_name": "Supply chain risk management program",
|
|
29
|
+
"regulation": "RED",
|
|
30
|
+
"articles": ["10", "11", "12"],
|
|
31
|
+
"coverage": "full",
|
|
32
|
+
"notes": "Supply chain requirements for radio equipment"
|
|
33
|
+
},
|
|
34
|
+
{
|
|
35
|
+
"control_id": "PR.DS-01",
|
|
36
|
+
"control_name": "Data-at-rest is protected",
|
|
37
|
+
"regulation": "RED",
|
|
38
|
+
"articles": ["3"],
|
|
39
|
+
"coverage": "partial",
|
|
40
|
+
"notes": "Privacy safeguards in radio equipment"
|
|
41
|
+
},
|
|
42
|
+
{
|
|
43
|
+
"control_id": "PR.DS-02",
|
|
44
|
+
"control_name": "Data-in-transit is protected",
|
|
45
|
+
"regulation": "RED",
|
|
46
|
+
"articles": ["3"],
|
|
47
|
+
"coverage": "partial",
|
|
48
|
+
"notes": "Network protection for radio communications"
|
|
49
|
+
},
|
|
50
|
+
{
|
|
51
|
+
"control_id": "RS.CO-03",
|
|
52
|
+
"control_name": "Information is shared with designated external parties",
|
|
53
|
+
"regulation": "RED",
|
|
54
|
+
"articles": ["40", "41"],
|
|
55
|
+
"coverage": "full",
|
|
56
|
+
"notes": "Non-compliance reporting to authorities"
|
|
57
|
+
}
|
|
58
|
+
]
|
|
@@ -0,0 +1,42 @@
|
|
|
1
|
+
[
|
|
2
|
+
{
|
|
3
|
+
"control_id": "GV.OC-01",
|
|
4
|
+
"control_name": "Organizational context",
|
|
5
|
+
"regulation": "SFDR",
|
|
6
|
+
"articles": ["1", "2"],
|
|
7
|
+
"coverage": "full",
|
|
8
|
+
"notes": "Sustainability disclosure requirements context"
|
|
9
|
+
},
|
|
10
|
+
{
|
|
11
|
+
"control_id": "GV.RR-01",
|
|
12
|
+
"control_name": "Organizational roles and responsibilities",
|
|
13
|
+
"regulation": "SFDR",
|
|
14
|
+
"articles": ["3", "4"],
|
|
15
|
+
"coverage": "full",
|
|
16
|
+
"notes": "Financial market participant responsibilities"
|
|
17
|
+
},
|
|
18
|
+
{
|
|
19
|
+
"control_id": "GV.PO-01",
|
|
20
|
+
"control_name": "Cybersecurity policy",
|
|
21
|
+
"regulation": "SFDR",
|
|
22
|
+
"articles": ["4", "5"],
|
|
23
|
+
"coverage": "partial",
|
|
24
|
+
"notes": "Policies integrating sustainability risks"
|
|
25
|
+
},
|
|
26
|
+
{
|
|
27
|
+
"control_id": "ID.AM-01",
|
|
28
|
+
"control_name": "Inventories of assets",
|
|
29
|
+
"regulation": "SFDR",
|
|
30
|
+
"articles": ["7", "8", "9"],
|
|
31
|
+
"coverage": "partial",
|
|
32
|
+
"notes": "Financial product sustainability data inventories"
|
|
33
|
+
},
|
|
34
|
+
{
|
|
35
|
+
"control_id": "PR.DS-01",
|
|
36
|
+
"control_name": "Data-at-rest is protected",
|
|
37
|
+
"regulation": "SFDR",
|
|
38
|
+
"articles": ["12", "13"],
|
|
39
|
+
"coverage": "partial",
|
|
40
|
+
"notes": "Protection of sustainability disclosure data"
|
|
41
|
+
}
|
|
42
|
+
]
|