@ansvar/eu-regulations-mcp 0.1.0 → 0.2.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +190 -21
- package/README.md +159 -26
- package/data/seed/aifmd.json +432 -0
- package/data/seed/applicability/ai-act.json +87 -0
- package/data/seed/applicability/aifmd.json +74 -0
- package/data/seed/applicability/cbam.json +74 -0
- package/data/seed/applicability/cer.json +74 -0
- package/data/seed/applicability/cra.json +77 -0
- package/data/seed/applicability/csddd.json +74 -0
- package/data/seed/applicability/csrd.json +74 -0
- package/data/seed/applicability/cyber_solidarity.json +74 -0
- package/data/seed/applicability/cybersecurity-act.json +69 -0
- package/data/seed/applicability/data-act.json +71 -0
- package/data/seed/applicability/dga.json +74 -0
- package/data/seed/applicability/dma.json +77 -0
- package/data/seed/applicability/dsa.json +71 -0
- package/data/seed/applicability/eecc.json +74 -0
- package/data/seed/applicability/ehds.json +74 -0
- package/data/seed/applicability/eidas2.json +86 -0
- package/data/seed/applicability/eprivacy.json +74 -0
- package/data/seed/applicability/eu_taxonomy.json +74 -0
- package/data/seed/applicability/eucc.json +74 -0
- package/data/seed/applicability/eudr.json +74 -0
- package/data/seed/applicability/gpsr.json +74 -0
- package/data/seed/applicability/ivdr.json +74 -0
- package/data/seed/applicability/led.json +74 -0
- package/data/seed/applicability/machinery.json +74 -0
- package/data/seed/applicability/mdr.json +74 -0
- package/data/seed/applicability/mica.json +74 -0
- package/data/seed/applicability/mifid2.json +74 -0
- package/data/seed/applicability/mifir.json +74 -0
- package/data/seed/applicability/pld.json +74 -0
- package/data/seed/applicability/psd2.json +74 -0
- package/data/seed/applicability/red.json +74 -0
- package/data/seed/applicability/sfdr.json +74 -0
- package/data/seed/applicability/un-r155.json +68 -0
- package/data/seed/applicability/un-r156.json +68 -0
- package/data/seed/cbam.json +397 -0
- package/data/seed/cer.json +233 -0
- package/data/seed/csddd.json +205 -0
- package/data/seed/csrd.json +50 -0
- package/data/seed/cyber_solidarity.json +252 -0
- package/data/seed/data-act.json +517 -0
- package/data/seed/dga.json +342 -0
- package/data/seed/dma.json +499 -0
- package/data/seed/dsa.json +686 -0
- package/data/seed/eecc.json +981 -0
- package/data/seed/ehds.json +638 -0
- package/data/seed/eidas2.json +590 -0
- package/data/seed/eprivacy.json +115 -0
- package/data/seed/eu_taxonomy.json +285 -0
- package/data/seed/eucc.json +386 -0
- package/data/seed/eudr.json +401 -0
- package/data/seed/gpsr.json +462 -0
- package/data/seed/ivdr.json +1036 -0
- package/data/seed/led.json +480 -0
- package/data/seed/machinery.json +513 -0
- package/data/seed/mappings/iso27001-ai-act.json +114 -0
- package/data/seed/mappings/iso27001-aifmd.json +50 -0
- package/data/seed/mappings/iso27001-cbam.json +26 -0
- package/data/seed/mappings/iso27001-cer.json +74 -0
- package/data/seed/mappings/iso27001-cra.json +130 -0
- package/data/seed/mappings/iso27001-csddd.json +50 -0
- package/data/seed/mappings/iso27001-csrd.json +26 -0
- package/data/seed/mappings/iso27001-cyber_solidarity.json +82 -0
- package/data/seed/mappings/iso27001-cybersecurity-act.json +90 -0
- package/data/seed/mappings/iso27001-data-act.json +66 -0
- package/data/seed/mappings/iso27001-dga.json +50 -0
- package/data/seed/mappings/iso27001-dma.json +50 -0
- package/data/seed/mappings/iso27001-dsa.json +58 -0
- package/data/seed/mappings/iso27001-eecc.json +74 -0
- package/data/seed/mappings/iso27001-ehds.json +90 -0
- package/data/seed/mappings/iso27001-eidas2.json +106 -0
- package/data/seed/mappings/iso27001-eprivacy.json +66 -0
- package/data/seed/mappings/iso27001-eu_taxonomy.json +34 -0
- package/data/seed/mappings/iso27001-eucc.json +66 -0
- package/data/seed/mappings/iso27001-eudr.json +34 -0
- package/data/seed/mappings/iso27001-gpsr.json +42 -0
- package/data/seed/mappings/iso27001-ivdr.json +66 -0
- package/data/seed/mappings/iso27001-led.json +74 -0
- package/data/seed/mappings/iso27001-machinery.json +50 -0
- package/data/seed/mappings/iso27001-mdr.json +82 -0
- package/data/seed/mappings/iso27001-mica.json +66 -0
- package/data/seed/mappings/iso27001-mifid2.json +66 -0
- package/data/seed/mappings/iso27001-mifir.json +42 -0
- package/data/seed/mappings/iso27001-pld.json +26 -0
- package/data/seed/mappings/iso27001-psd2.json +82 -0
- package/data/seed/mappings/iso27001-red.json +42 -0
- package/data/seed/mappings/iso27001-sfdr.json +50 -0
- package/data/seed/mappings/iso27001-un-r155.json +130 -0
- package/data/seed/mappings/iso27001-un-r156.json +106 -0
- package/data/seed/mappings/nist-csf-ai-act.json +138 -0
- package/data/seed/mappings/nist-csf-aifmd.json +58 -0
- package/data/seed/mappings/nist-csf-cbam.json +42 -0
- package/data/seed/mappings/nist-csf-cer.json +90 -0
- package/data/seed/mappings/nist-csf-cra.json +130 -0
- package/data/seed/mappings/nist-csf-csddd.json +50 -0
- package/data/seed/mappings/nist-csf-csrd.json +34 -0
- package/data/seed/mappings/nist-csf-cyber_solidarity.json +90 -0
- package/data/seed/mappings/nist-csf-cybersecurity-act.json +90 -0
- package/data/seed/mappings/nist-csf-data-act.json +50 -0
- package/data/seed/mappings/nist-csf-dga.json +58 -0
- package/data/seed/mappings/nist-csf-dma.json +42 -0
- package/data/seed/mappings/nist-csf-dora.json +210 -0
- package/data/seed/mappings/nist-csf-dsa.json +82 -0
- package/data/seed/mappings/nist-csf-eecc.json +90 -0
- package/data/seed/mappings/nist-csf-ehds.json +98 -0
- package/data/seed/mappings/nist-csf-eidas2.json +114 -0
- package/data/seed/mappings/nist-csf-eprivacy.json +58 -0
- package/data/seed/mappings/nist-csf-eu_taxonomy.json +34 -0
- package/data/seed/mappings/nist-csf-eucc.json +66 -0
- package/data/seed/mappings/nist-csf-eudr.json +58 -0
- package/data/seed/mappings/nist-csf-gdpr.json +178 -0
- package/data/seed/mappings/nist-csf-gpsr.json +58 -0
- package/data/seed/mappings/nist-csf-ivdr.json +66 -0
- package/data/seed/mappings/nist-csf-led.json +74 -0
- package/data/seed/mappings/nist-csf-machinery.json +58 -0
- package/data/seed/mappings/nist-csf-mdr.json +66 -0
- package/data/seed/mappings/nist-csf-mica.json +98 -0
- package/data/seed/mappings/nist-csf-mifid2.json +74 -0
- package/data/seed/mappings/nist-csf-mifir.json +50 -0
- package/data/seed/mappings/nist-csf-nis2.json +194 -0
- package/data/seed/mappings/nist-csf-pld.json +34 -0
- package/data/seed/mappings/nist-csf-psd2.json +98 -0
- package/data/seed/mappings/nist-csf-red.json +58 -0
- package/data/seed/mappings/nist-csf-sfdr.json +42 -0
- package/data/seed/mappings/nist-csf-un-r155.json +130 -0
- package/data/seed/mappings/nist-csf-un-r156.json +98 -0
- package/data/seed/mdr.json +1066 -0
- package/data/seed/mica.json +1003 -0
- package/data/seed/mifid2.json +906 -0
- package/data/seed/mifir.json +512 -0
- package/data/seed/pld.json +244 -0
- package/data/seed/psd2.json +827 -0
- package/data/seed/red.json +452 -0
- package/data/seed/sfdr.json +228 -0
- package/data/seed/un-r155.json +166 -0
- package/data/seed/un-r156.json +150 -0
- package/dist/http-server.d.ts +9 -0
- package/dist/http-server.d.ts.map +1 -0
- package/dist/http-server.js +342 -0
- package/dist/http-server.js.map +1 -0
- package/dist/index.js +4 -4
- package/dist/index.js.map +1 -1
- package/dist/tools/map.d.ts +1 -1
- package/dist/tools/map.d.ts.map +1 -1
- package/dist/tools/map.js +3 -3
- package/dist/tools/map.js.map +1 -1
- package/package.json +8 -3
- package/scripts/build-db.ts +20 -8
- package/scripts/check-updates.ts +141 -39
- package/scripts/ingest-eurlex.ts +9 -1
- package/scripts/ingest-unece.ts +368 -0
- package/src/http-server.ts +380 -0
- package/src/index.ts +4 -4
- package/src/tools/map.ts +4 -4
|
@@ -0,0 +1,114 @@
|
|
|
1
|
+
[
|
|
2
|
+
{
|
|
3
|
+
"control_id": "A.5.1",
|
|
4
|
+
"control_name": "Policies for information security",
|
|
5
|
+
"regulation": "AI_ACT",
|
|
6
|
+
"articles": ["9", "17"],
|
|
7
|
+
"coverage": "full",
|
|
8
|
+
"notes": "Art 9 risk management system, Art 17 quality management system for high-risk AI"
|
|
9
|
+
},
|
|
10
|
+
{
|
|
11
|
+
"control_id": "A.5.2",
|
|
12
|
+
"control_name": "Information security roles and responsibilities",
|
|
13
|
+
"regulation": "AI_ACT",
|
|
14
|
+
"articles": ["16", "26", "27"],
|
|
15
|
+
"coverage": "full",
|
|
16
|
+
"notes": "Art 16 provider obligations, Art 26 deployer obligations, Art 27 fundamental rights impact assessment"
|
|
17
|
+
},
|
|
18
|
+
{
|
|
19
|
+
"control_id": "A.5.8",
|
|
20
|
+
"control_name": "Information security in project management",
|
|
21
|
+
"regulation": "AI_ACT",
|
|
22
|
+
"articles": ["9", "10", "17"],
|
|
23
|
+
"coverage": "full",
|
|
24
|
+
"notes": "Art 9-10 risk management and data governance, Art 17 quality management throughout AI lifecycle"
|
|
25
|
+
},
|
|
26
|
+
{
|
|
27
|
+
"control_id": "A.5.31",
|
|
28
|
+
"control_name": "Legal, statutory, regulatory and contractual requirements",
|
|
29
|
+
"regulation": "AI_ACT",
|
|
30
|
+
"articles": ["1", "2", "5", "6"],
|
|
31
|
+
"coverage": "full",
|
|
32
|
+
"notes": "Art 1-2 scope, Art 5 prohibited practices, Art 6 high-risk AI classification"
|
|
33
|
+
},
|
|
34
|
+
{
|
|
35
|
+
"control_id": "A.5.33",
|
|
36
|
+
"control_name": "Protection of records",
|
|
37
|
+
"regulation": "AI_ACT",
|
|
38
|
+
"articles": ["12", "18", "19"],
|
|
39
|
+
"coverage": "full",
|
|
40
|
+
"notes": "Art 12 automatic logging, Art 18 technical documentation, Art 19 record keeping requirements"
|
|
41
|
+
},
|
|
42
|
+
{
|
|
43
|
+
"control_id": "A.5.34",
|
|
44
|
+
"control_name": "Privacy and protection of PII",
|
|
45
|
+
"regulation": "AI_ACT",
|
|
46
|
+
"articles": ["10", "15"],
|
|
47
|
+
"coverage": "full",
|
|
48
|
+
"notes": "Art 10 data governance including privacy requirements, Art 15 data minimisation for biometric AI"
|
|
49
|
+
},
|
|
50
|
+
{
|
|
51
|
+
"control_id": "A.6.3",
|
|
52
|
+
"control_name": "Information security awareness, education and training",
|
|
53
|
+
"regulation": "AI_ACT",
|
|
54
|
+
"articles": ["4", "14"],
|
|
55
|
+
"coverage": "full",
|
|
56
|
+
"notes": "Art 4 AI literacy requirements, Art 14 human oversight requires trained personnel"
|
|
57
|
+
},
|
|
58
|
+
{
|
|
59
|
+
"control_id": "A.6.8",
|
|
60
|
+
"control_name": "Information security event reporting",
|
|
61
|
+
"regulation": "AI_ACT",
|
|
62
|
+
"articles": ["73"],
|
|
63
|
+
"coverage": "full",
|
|
64
|
+
"notes": "Art 73 requires reporting of serious incidents and malfunctioning of high-risk AI systems"
|
|
65
|
+
},
|
|
66
|
+
{
|
|
67
|
+
"control_id": "A.8.2",
|
|
68
|
+
"control_name": "Privileged access rights",
|
|
69
|
+
"regulation": "AI_ACT",
|
|
70
|
+
"articles": ["14", "15"],
|
|
71
|
+
"coverage": "partial",
|
|
72
|
+
"notes": "Art 14-15 human oversight and access controls for AI system operation"
|
|
73
|
+
},
|
|
74
|
+
{
|
|
75
|
+
"control_id": "A.8.8",
|
|
76
|
+
"control_name": "Management of technical vulnerabilities",
|
|
77
|
+
"regulation": "AI_ACT",
|
|
78
|
+
"articles": ["9", "15"],
|
|
79
|
+
"coverage": "partial",
|
|
80
|
+
"notes": "Art 9 risk management includes security vulnerabilities, Art 15 robustness requirements"
|
|
81
|
+
},
|
|
82
|
+
{
|
|
83
|
+
"control_id": "A.8.10",
|
|
84
|
+
"control_name": "Information deletion",
|
|
85
|
+
"regulation": "AI_ACT",
|
|
86
|
+
"articles": ["10"],
|
|
87
|
+
"coverage": "partial",
|
|
88
|
+
"notes": "Art 10 data governance includes data retention and deletion policies"
|
|
89
|
+
},
|
|
90
|
+
{
|
|
91
|
+
"control_id": "A.8.16",
|
|
92
|
+
"control_name": "Monitoring activities",
|
|
93
|
+
"regulation": "AI_ACT",
|
|
94
|
+
"articles": ["12", "72"],
|
|
95
|
+
"coverage": "full",
|
|
96
|
+
"notes": "Art 12 automatic logging and monitoring, Art 72 post-market monitoring obligations"
|
|
97
|
+
},
|
|
98
|
+
{
|
|
99
|
+
"control_id": "A.8.25",
|
|
100
|
+
"control_name": "Secure development life cycle",
|
|
101
|
+
"regulation": "AI_ACT",
|
|
102
|
+
"articles": ["9", "10", "17"],
|
|
103
|
+
"coverage": "full",
|
|
104
|
+
"notes": "Art 9 risk management, Art 10 data governance, Art 17 quality management throughout lifecycle"
|
|
105
|
+
},
|
|
106
|
+
{
|
|
107
|
+
"control_id": "A.8.29",
|
|
108
|
+
"control_name": "Security testing in development and acceptance",
|
|
109
|
+
"regulation": "AI_ACT",
|
|
110
|
+
"articles": ["9", "15", "43"],
|
|
111
|
+
"coverage": "full",
|
|
112
|
+
"notes": "Art 9 testing under risk management, Art 15 accuracy and robustness testing, Art 43 conformity assessment"
|
|
113
|
+
}
|
|
114
|
+
]
|
|
@@ -0,0 +1,50 @@
|
|
|
1
|
+
[
|
|
2
|
+
{
|
|
3
|
+
"control_id": "A.5.1",
|
|
4
|
+
"control_name": "Policies for information security",
|
|
5
|
+
"regulation": "AIFMD",
|
|
6
|
+
"articles": ["12", "18"],
|
|
7
|
+
"coverage": "full",
|
|
8
|
+
"notes": "General operating conditions and risk management policies"
|
|
9
|
+
},
|
|
10
|
+
{
|
|
11
|
+
"control_id": "A.5.2",
|
|
12
|
+
"control_name": "Information security roles and responsibilities",
|
|
13
|
+
"regulation": "AIFMD",
|
|
14
|
+
"articles": ["8", "12"],
|
|
15
|
+
"coverage": "full",
|
|
16
|
+
"notes": "Management responsibilities and organizational requirements"
|
|
17
|
+
},
|
|
18
|
+
{
|
|
19
|
+
"control_id": "A.5.31",
|
|
20
|
+
"control_name": "Legal, statutory, regulatory and contractual requirements",
|
|
21
|
+
"regulation": "AIFMD",
|
|
22
|
+
"articles": ["1", "2", "3"],
|
|
23
|
+
"coverage": "full",
|
|
24
|
+
"notes": "Authorization and operating requirements for AIFMs"
|
|
25
|
+
},
|
|
26
|
+
{
|
|
27
|
+
"control_id": "A.5.33",
|
|
28
|
+
"control_name": "Protection of records",
|
|
29
|
+
"regulation": "AIFMD",
|
|
30
|
+
"articles": ["22", "23"],
|
|
31
|
+
"coverage": "full",
|
|
32
|
+
"notes": "Transparency and disclosure requirements"
|
|
33
|
+
},
|
|
34
|
+
{
|
|
35
|
+
"control_id": "A.5.34",
|
|
36
|
+
"control_name": "Privacy and protection of PII",
|
|
37
|
+
"regulation": "AIFMD",
|
|
38
|
+
"articles": ["12"],
|
|
39
|
+
"coverage": "partial",
|
|
40
|
+
"notes": "Investor information protection"
|
|
41
|
+
},
|
|
42
|
+
{
|
|
43
|
+
"control_id": "A.8.3",
|
|
44
|
+
"control_name": "Information access restriction",
|
|
45
|
+
"regulation": "AIFMD",
|
|
46
|
+
"articles": ["12", "21"],
|
|
47
|
+
"coverage": "partial",
|
|
48
|
+
"notes": "Access controls for fund assets and information"
|
|
49
|
+
}
|
|
50
|
+
]
|
|
@@ -0,0 +1,26 @@
|
|
|
1
|
+
[
|
|
2
|
+
{
|
|
3
|
+
"control_id": "A.5.31",
|
|
4
|
+
"control_name": "Legal, statutory, regulatory and contractual requirements",
|
|
5
|
+
"regulation": "CBAM",
|
|
6
|
+
"articles": ["1", "2"],
|
|
7
|
+
"coverage": "full",
|
|
8
|
+
"notes": "Carbon border adjustment mechanism requirements"
|
|
9
|
+
},
|
|
10
|
+
{
|
|
11
|
+
"control_id": "A.5.33",
|
|
12
|
+
"control_name": "Protection of records",
|
|
13
|
+
"regulation": "CBAM",
|
|
14
|
+
"articles": ["7", "8", "9"],
|
|
15
|
+
"coverage": "full",
|
|
16
|
+
"notes": "CBAM reporting and documentation requirements"
|
|
17
|
+
},
|
|
18
|
+
{
|
|
19
|
+
"control_id": "A.8.12",
|
|
20
|
+
"control_name": "Data leakage prevention",
|
|
21
|
+
"regulation": "CBAM",
|
|
22
|
+
"articles": ["10", "11"],
|
|
23
|
+
"coverage": "partial",
|
|
24
|
+
"notes": "Protection of emissions data and declarations"
|
|
25
|
+
}
|
|
26
|
+
]
|
|
@@ -0,0 +1,74 @@
|
|
|
1
|
+
[
|
|
2
|
+
{
|
|
3
|
+
"control_id": "A.5.1",
|
|
4
|
+
"control_name": "Policies for information security",
|
|
5
|
+
"regulation": "CER",
|
|
6
|
+
"articles": ["13", "14"],
|
|
7
|
+
"coverage": "full",
|
|
8
|
+
"notes": "Resilience policies for critical entities"
|
|
9
|
+
},
|
|
10
|
+
{
|
|
11
|
+
"control_id": "A.5.2",
|
|
12
|
+
"control_name": "Information security roles and responsibilities",
|
|
13
|
+
"regulation": "CER",
|
|
14
|
+
"articles": ["13"],
|
|
15
|
+
"coverage": "full",
|
|
16
|
+
"notes": "Critical entity resilience responsibilities"
|
|
17
|
+
},
|
|
18
|
+
{
|
|
19
|
+
"control_id": "A.5.5",
|
|
20
|
+
"control_name": "Contact with authorities",
|
|
21
|
+
"regulation": "CER",
|
|
22
|
+
"articles": ["9", "15"],
|
|
23
|
+
"coverage": "full",
|
|
24
|
+
"notes": "Cooperation with competent authorities"
|
|
25
|
+
},
|
|
26
|
+
{
|
|
27
|
+
"control_id": "A.5.24",
|
|
28
|
+
"control_name": "Information security incident management planning and preparation",
|
|
29
|
+
"regulation": "CER",
|
|
30
|
+
"articles": ["13", "14"],
|
|
31
|
+
"coverage": "full",
|
|
32
|
+
"notes": "Incident response and resilience measures"
|
|
33
|
+
},
|
|
34
|
+
{
|
|
35
|
+
"control_id": "A.5.29",
|
|
36
|
+
"control_name": "Information security during disruption",
|
|
37
|
+
"regulation": "CER",
|
|
38
|
+
"articles": ["13"],
|
|
39
|
+
"coverage": "full",
|
|
40
|
+
"notes": "Business continuity for critical services"
|
|
41
|
+
},
|
|
42
|
+
{
|
|
43
|
+
"control_id": "A.5.31",
|
|
44
|
+
"control_name": "Legal, statutory, regulatory and contractual requirements",
|
|
45
|
+
"regulation": "CER",
|
|
46
|
+
"articles": ["1", "2"],
|
|
47
|
+
"coverage": "full",
|
|
48
|
+
"notes": "Critical entity resilience requirements"
|
|
49
|
+
},
|
|
50
|
+
{
|
|
51
|
+
"control_id": "A.6.8",
|
|
52
|
+
"control_name": "Information security event reporting",
|
|
53
|
+
"regulation": "CER",
|
|
54
|
+
"articles": ["15"],
|
|
55
|
+
"coverage": "full",
|
|
56
|
+
"notes": "Incident notification to competent authorities"
|
|
57
|
+
},
|
|
58
|
+
{
|
|
59
|
+
"control_id": "A.7.1",
|
|
60
|
+
"control_name": "Physical security perimeters",
|
|
61
|
+
"regulation": "CER",
|
|
62
|
+
"articles": ["13"],
|
|
63
|
+
"coverage": "full",
|
|
64
|
+
"notes": "Physical resilience measures for critical infrastructure"
|
|
65
|
+
},
|
|
66
|
+
{
|
|
67
|
+
"control_id": "A.7.5",
|
|
68
|
+
"control_name": "Protecting against physical and environmental threats",
|
|
69
|
+
"regulation": "CER",
|
|
70
|
+
"articles": ["13"],
|
|
71
|
+
"coverage": "full",
|
|
72
|
+
"notes": "Protection against natural and man-made threats"
|
|
73
|
+
}
|
|
74
|
+
]
|
|
@@ -0,0 +1,130 @@
|
|
|
1
|
+
[
|
|
2
|
+
{
|
|
3
|
+
"control_id": "A.5.1",
|
|
4
|
+
"control_name": "Policies for information security",
|
|
5
|
+
"regulation": "CRA",
|
|
6
|
+
"articles": ["10", "11"],
|
|
7
|
+
"coverage": "full",
|
|
8
|
+
"notes": "Art 10-11 require manufacturers to have policies for secure development and vulnerability handling"
|
|
9
|
+
},
|
|
10
|
+
{
|
|
11
|
+
"control_id": "A.5.8",
|
|
12
|
+
"control_name": "Information security in project management",
|
|
13
|
+
"regulation": "CRA",
|
|
14
|
+
"articles": ["10", "13"],
|
|
15
|
+
"coverage": "full",
|
|
16
|
+
"notes": "Art 10 security throughout product lifecycle, Art 13 product documentation requirements"
|
|
17
|
+
},
|
|
18
|
+
{
|
|
19
|
+
"control_id": "A.5.19",
|
|
20
|
+
"control_name": "Information security in supplier relationships",
|
|
21
|
+
"regulation": "CRA",
|
|
22
|
+
"articles": ["13", "18", "19"],
|
|
23
|
+
"coverage": "full",
|
|
24
|
+
"notes": "Art 13 SBOM requirements, Art 18-19 importer and distributor obligations for supply chain security"
|
|
25
|
+
},
|
|
26
|
+
{
|
|
27
|
+
"control_id": "A.5.20",
|
|
28
|
+
"control_name": "Addressing information security within supplier agreements",
|
|
29
|
+
"regulation": "CRA",
|
|
30
|
+
"articles": ["13", "18"],
|
|
31
|
+
"coverage": "full",
|
|
32
|
+
"notes": "Art 13 technical documentation including component information, Art 18 importer verification duties"
|
|
33
|
+
},
|
|
34
|
+
{
|
|
35
|
+
"control_id": "A.5.31",
|
|
36
|
+
"control_name": "Legal, statutory, regulatory and contractual requirements",
|
|
37
|
+
"regulation": "CRA",
|
|
38
|
+
"articles": ["1", "2", "3", "4"],
|
|
39
|
+
"coverage": "full",
|
|
40
|
+
"notes": "Art 1-4 define scope, applicability, and CE marking requirements for digital products"
|
|
41
|
+
},
|
|
42
|
+
{
|
|
43
|
+
"control_id": "A.6.3",
|
|
44
|
+
"control_name": "Information security awareness, education and training",
|
|
45
|
+
"regulation": "CRA",
|
|
46
|
+
"articles": ["10"],
|
|
47
|
+
"coverage": "partial",
|
|
48
|
+
"notes": "Art 10(6) requires manufacturers to have competent personnel for cybersecurity"
|
|
49
|
+
},
|
|
50
|
+
{
|
|
51
|
+
"control_id": "A.6.8",
|
|
52
|
+
"control_name": "Information security event reporting",
|
|
53
|
+
"regulation": "CRA",
|
|
54
|
+
"articles": ["14"],
|
|
55
|
+
"coverage": "full",
|
|
56
|
+
"notes": "Art 14 requires notification of exploited vulnerabilities within 24 hours to ENISA and national CSIRTs"
|
|
57
|
+
},
|
|
58
|
+
{
|
|
59
|
+
"control_id": "A.8.8",
|
|
60
|
+
"control_name": "Management of technical vulnerabilities",
|
|
61
|
+
"regulation": "CRA",
|
|
62
|
+
"articles": ["10", "11", "Annex I"],
|
|
63
|
+
"coverage": "full",
|
|
64
|
+
"notes": "Art 10 vulnerability handling, Art 11 coordinated disclosure, Annex I Part II vulnerability requirements"
|
|
65
|
+
},
|
|
66
|
+
{
|
|
67
|
+
"control_id": "A.8.9",
|
|
68
|
+
"control_name": "Configuration management",
|
|
69
|
+
"regulation": "CRA",
|
|
70
|
+
"articles": ["10", "Annex I"],
|
|
71
|
+
"coverage": "full",
|
|
72
|
+
"notes": "Annex I Part I requires secure default configuration with no known vulnerabilities"
|
|
73
|
+
},
|
|
74
|
+
{
|
|
75
|
+
"control_id": "A.8.24",
|
|
76
|
+
"control_name": "Use of cryptography",
|
|
77
|
+
"regulation": "CRA",
|
|
78
|
+
"articles": ["Annex I"],
|
|
79
|
+
"coverage": "full",
|
|
80
|
+
"notes": "Annex I Part I requires protection of confidentiality, integrity with state-of-the-art cryptography"
|
|
81
|
+
},
|
|
82
|
+
{
|
|
83
|
+
"control_id": "A.8.25",
|
|
84
|
+
"control_name": "Secure development life cycle",
|
|
85
|
+
"regulation": "CRA",
|
|
86
|
+
"articles": ["10", "Annex I"],
|
|
87
|
+
"coverage": "full",
|
|
88
|
+
"notes": "Art 10 requires security throughout product lifecycle, Annex I mandates secure by design"
|
|
89
|
+
},
|
|
90
|
+
{
|
|
91
|
+
"control_id": "A.8.26",
|
|
92
|
+
"control_name": "Application security requirements",
|
|
93
|
+
"regulation": "CRA",
|
|
94
|
+
"articles": ["Annex I"],
|
|
95
|
+
"coverage": "full",
|
|
96
|
+
"notes": "Annex I Part I essential cybersecurity requirements: confidentiality, integrity, availability, authentication"
|
|
97
|
+
},
|
|
98
|
+
{
|
|
99
|
+
"control_id": "A.8.28",
|
|
100
|
+
"control_name": "Secure coding",
|
|
101
|
+
"regulation": "CRA",
|
|
102
|
+
"articles": ["10", "Annex I"],
|
|
103
|
+
"coverage": "full",
|
|
104
|
+
"notes": "Art 10 secure development, Annex I requires products delivered without known exploitable vulnerabilities"
|
|
105
|
+
},
|
|
106
|
+
{
|
|
107
|
+
"control_id": "A.8.29",
|
|
108
|
+
"control_name": "Security testing in development and acceptance",
|
|
109
|
+
"regulation": "CRA",
|
|
110
|
+
"articles": ["10", "24", "Annex I"],
|
|
111
|
+
"coverage": "full",
|
|
112
|
+
"notes": "Art 10 requires testing, Art 24 conformity assessment, Annex I requires documented risk assessment"
|
|
113
|
+
},
|
|
114
|
+
{
|
|
115
|
+
"control_id": "A.8.31",
|
|
116
|
+
"control_name": "Separation of development, test and production environments",
|
|
117
|
+
"regulation": "CRA",
|
|
118
|
+
"articles": ["10"],
|
|
119
|
+
"coverage": "partial",
|
|
120
|
+
"notes": "Art 10 implies separation through secure development process requirements"
|
|
121
|
+
},
|
|
122
|
+
{
|
|
123
|
+
"control_id": "A.8.32",
|
|
124
|
+
"control_name": "Change management",
|
|
125
|
+
"regulation": "CRA",
|
|
126
|
+
"articles": ["10", "11"],
|
|
127
|
+
"coverage": "full",
|
|
128
|
+
"notes": "Art 10 security updates, Art 11 requires 5-year support period for security patches"
|
|
129
|
+
}
|
|
130
|
+
]
|
|
@@ -0,0 +1,50 @@
|
|
|
1
|
+
[
|
|
2
|
+
{
|
|
3
|
+
"control_id": "A.5.1",
|
|
4
|
+
"control_name": "Policies for information security",
|
|
5
|
+
"regulation": "CSDDD",
|
|
6
|
+
"articles": ["5", "7"],
|
|
7
|
+
"coverage": "partial",
|
|
8
|
+
"notes": "Due diligence policies including data handling"
|
|
9
|
+
},
|
|
10
|
+
{
|
|
11
|
+
"control_id": "A.5.19",
|
|
12
|
+
"control_name": "Information security in supplier relationships",
|
|
13
|
+
"regulation": "CSDDD",
|
|
14
|
+
"articles": ["6", "7", "8"],
|
|
15
|
+
"coverage": "full",
|
|
16
|
+
"notes": "Supply chain due diligence requirements"
|
|
17
|
+
},
|
|
18
|
+
{
|
|
19
|
+
"control_id": "A.5.21",
|
|
20
|
+
"control_name": "Managing information security in the ICT supply chain",
|
|
21
|
+
"regulation": "CSDDD",
|
|
22
|
+
"articles": ["6", "7"],
|
|
23
|
+
"coverage": "partial",
|
|
24
|
+
"notes": "Value chain risk assessment"
|
|
25
|
+
},
|
|
26
|
+
{
|
|
27
|
+
"control_id": "A.5.31",
|
|
28
|
+
"control_name": "Legal, statutory, regulatory and contractual requirements",
|
|
29
|
+
"regulation": "CSDDD",
|
|
30
|
+
"articles": ["1", "2"],
|
|
31
|
+
"coverage": "full",
|
|
32
|
+
"notes": "Corporate due diligence obligations"
|
|
33
|
+
},
|
|
34
|
+
{
|
|
35
|
+
"control_id": "A.5.33",
|
|
36
|
+
"control_name": "Protection of records",
|
|
37
|
+
"regulation": "CSDDD",
|
|
38
|
+
"articles": ["11"],
|
|
39
|
+
"coverage": "full",
|
|
40
|
+
"notes": "Due diligence documentation requirements"
|
|
41
|
+
},
|
|
42
|
+
{
|
|
43
|
+
"control_id": "A.6.8",
|
|
44
|
+
"control_name": "Information security event reporting",
|
|
45
|
+
"regulation": "CSDDD",
|
|
46
|
+
"articles": ["14", "15"],
|
|
47
|
+
"coverage": "partial",
|
|
48
|
+
"notes": "Grievance mechanism and reporting"
|
|
49
|
+
}
|
|
50
|
+
]
|
|
@@ -0,0 +1,26 @@
|
|
|
1
|
+
[
|
|
2
|
+
{
|
|
3
|
+
"control_id": "A.5.1",
|
|
4
|
+
"control_name": "Policies for information security",
|
|
5
|
+
"regulation": "CSRD",
|
|
6
|
+
"articles": ["1"],
|
|
7
|
+
"coverage": "partial",
|
|
8
|
+
"notes": "Governance policies for sustainability reporting"
|
|
9
|
+
},
|
|
10
|
+
{
|
|
11
|
+
"control_id": "A.5.31",
|
|
12
|
+
"control_name": "Legal, statutory, regulatory and contractual requirements",
|
|
13
|
+
"regulation": "CSRD",
|
|
14
|
+
"articles": ["1"],
|
|
15
|
+
"coverage": "full",
|
|
16
|
+
"notes": "Sustainability reporting legal requirements"
|
|
17
|
+
},
|
|
18
|
+
{
|
|
19
|
+
"control_id": "A.5.33",
|
|
20
|
+
"control_name": "Protection of records",
|
|
21
|
+
"regulation": "CSRD",
|
|
22
|
+
"articles": ["1"],
|
|
23
|
+
"coverage": "full",
|
|
24
|
+
"notes": "Sustainability data record keeping"
|
|
25
|
+
}
|
|
26
|
+
]
|
|
@@ -0,0 +1,82 @@
|
|
|
1
|
+
[
|
|
2
|
+
{
|
|
3
|
+
"control_id": "A.5.1",
|
|
4
|
+
"control_name": "Policies for information security",
|
|
5
|
+
"regulation": "CYBER_SOLIDARITY",
|
|
6
|
+
"articles": ["1", "3"],
|
|
7
|
+
"coverage": "full",
|
|
8
|
+
"notes": "Establishes EU-wide cybersecurity policy framework"
|
|
9
|
+
},
|
|
10
|
+
{
|
|
11
|
+
"control_id": "A.5.2",
|
|
12
|
+
"control_name": "Information security roles and responsibilities",
|
|
13
|
+
"regulation": "CYBER_SOLIDARITY",
|
|
14
|
+
"articles": ["3", "4", "5"],
|
|
15
|
+
"coverage": "full",
|
|
16
|
+
"notes": "National and Cross-Border Cyber Hubs have defined responsibilities"
|
|
17
|
+
},
|
|
18
|
+
{
|
|
19
|
+
"control_id": "A.5.5",
|
|
20
|
+
"control_name": "Contact with authorities",
|
|
21
|
+
"regulation": "CYBER_SOLIDARITY",
|
|
22
|
+
"articles": ["3", "12"],
|
|
23
|
+
"coverage": "full",
|
|
24
|
+
"notes": "Framework for coordination with national authorities"
|
|
25
|
+
},
|
|
26
|
+
{
|
|
27
|
+
"control_id": "A.5.6",
|
|
28
|
+
"control_name": "Contact with special interest groups",
|
|
29
|
+
"regulation": "CYBER_SOLIDARITY",
|
|
30
|
+
"articles": ["12", "14"],
|
|
31
|
+
"coverage": "full",
|
|
32
|
+
"notes": "EU Cybersecurity Reserve includes private sector providers"
|
|
33
|
+
},
|
|
34
|
+
{
|
|
35
|
+
"control_id": "A.5.7",
|
|
36
|
+
"control_name": "Threat intelligence",
|
|
37
|
+
"regulation": "CYBER_SOLIDARITY",
|
|
38
|
+
"articles": ["3", "4", "5", "6"],
|
|
39
|
+
"coverage": "full",
|
|
40
|
+
"notes": "European Cybersecurity Alert System for threat detection"
|
|
41
|
+
},
|
|
42
|
+
{
|
|
43
|
+
"control_id": "A.5.24",
|
|
44
|
+
"control_name": "Information security incident management planning and preparation",
|
|
45
|
+
"regulation": "CYBER_SOLIDARITY",
|
|
46
|
+
"articles": ["9", "10", "11"],
|
|
47
|
+
"coverage": "full",
|
|
48
|
+
"notes": "Cybersecurity Emergency Mechanism for incident preparedness"
|
|
49
|
+
},
|
|
50
|
+
{
|
|
51
|
+
"control_id": "A.5.25",
|
|
52
|
+
"control_name": "Assessment and decision on information security events",
|
|
53
|
+
"regulation": "CYBER_SOLIDARITY",
|
|
54
|
+
"articles": ["6", "7", "8"],
|
|
55
|
+
"coverage": "full",
|
|
56
|
+
"notes": "Alert system for assessing cyber threats across EU"
|
|
57
|
+
},
|
|
58
|
+
{
|
|
59
|
+
"control_id": "A.5.26",
|
|
60
|
+
"control_name": "Response to information security incidents",
|
|
61
|
+
"regulation": "CYBER_SOLIDARITY",
|
|
62
|
+
"articles": ["12", "13", "14"],
|
|
63
|
+
"coverage": "full",
|
|
64
|
+
"notes": "EU Cybersecurity Reserve provides rapid incident response"
|
|
65
|
+
},
|
|
66
|
+
{
|
|
67
|
+
"control_id": "A.5.29",
|
|
68
|
+
"control_name": "Information security during disruption",
|
|
69
|
+
"regulation": "CYBER_SOLIDARITY",
|
|
70
|
+
"articles": ["9", "10"],
|
|
71
|
+
"coverage": "full",
|
|
72
|
+
"notes": "Cybersecurity Emergency Mechanism for significant incidents"
|
|
73
|
+
},
|
|
74
|
+
{
|
|
75
|
+
"control_id": "A.6.8",
|
|
76
|
+
"control_name": "Information security event reporting",
|
|
77
|
+
"regulation": "CYBER_SOLIDARITY",
|
|
78
|
+
"articles": ["6", "7"],
|
|
79
|
+
"coverage": "full",
|
|
80
|
+
"notes": "Cross-border information sharing through Cyber Hubs"
|
|
81
|
+
}
|
|
82
|
+
]
|
|
@@ -0,0 +1,90 @@
|
|
|
1
|
+
[
|
|
2
|
+
{
|
|
3
|
+
"control_id": "A.5.1",
|
|
4
|
+
"control_name": "Policies for information security",
|
|
5
|
+
"regulation": "CYBERSECURITY_ACT",
|
|
6
|
+
"articles": ["46", "47", "51"],
|
|
7
|
+
"coverage": "full",
|
|
8
|
+
"notes": "Art 46-47 certification requirements, Art 51 security objectives for certification schemes"
|
|
9
|
+
},
|
|
10
|
+
{
|
|
11
|
+
"control_id": "A.5.2",
|
|
12
|
+
"control_name": "Information security roles and responsibilities",
|
|
13
|
+
"regulation": "CYBERSECURITY_ACT",
|
|
14
|
+
"articles": ["4", "5", "6", "7"],
|
|
15
|
+
"coverage": "full",
|
|
16
|
+
"notes": "ENISA objectives and tasks (Art 4-7) define EU cybersecurity coordination roles"
|
|
17
|
+
},
|
|
18
|
+
{
|
|
19
|
+
"control_id": "A.5.31",
|
|
20
|
+
"control_name": "Legal, statutory, regulatory and contractual requirements",
|
|
21
|
+
"regulation": "CYBERSECURITY_ACT",
|
|
22
|
+
"articles": ["1", "2", "46"],
|
|
23
|
+
"coverage": "full",
|
|
24
|
+
"notes": "Art 1-2 scope, Art 46 EU cybersecurity certification framework"
|
|
25
|
+
},
|
|
26
|
+
{
|
|
27
|
+
"control_id": "A.5.35",
|
|
28
|
+
"control_name": "Independent review of information security",
|
|
29
|
+
"regulation": "CYBERSECURITY_ACT",
|
|
30
|
+
"articles": ["56", "58", "60"],
|
|
31
|
+
"coverage": "full",
|
|
32
|
+
"notes": "Art 56-60 conformity assessment bodies and third-party certification requirements"
|
|
33
|
+
},
|
|
34
|
+
{
|
|
35
|
+
"control_id": "A.5.36",
|
|
36
|
+
"control_name": "Compliance with policies, rules and standards for information security",
|
|
37
|
+
"regulation": "CYBERSECURITY_ACT",
|
|
38
|
+
"articles": ["51", "52", "54"],
|
|
39
|
+
"coverage": "full",
|
|
40
|
+
"notes": "Art 51 security objectives, Art 52 assurance levels (basic/substantial/high), Art 54 certification criteria"
|
|
41
|
+
},
|
|
42
|
+
{
|
|
43
|
+
"control_id": "A.6.3",
|
|
44
|
+
"control_name": "Information security awareness, education and training",
|
|
45
|
+
"regulation": "CYBERSECURITY_ACT",
|
|
46
|
+
"articles": ["10", "12"],
|
|
47
|
+
"coverage": "partial",
|
|
48
|
+
"notes": "Art 10 capacity building, Art 12 knowledge development and information"
|
|
49
|
+
},
|
|
50
|
+
{
|
|
51
|
+
"control_id": "A.6.8",
|
|
52
|
+
"control_name": "Information security event reporting",
|
|
53
|
+
"regulation": "CYBERSECURITY_ACT",
|
|
54
|
+
"articles": ["8", "22"],
|
|
55
|
+
"coverage": "partial",
|
|
56
|
+
"notes": "Art 8 operational cooperation, Art 22 EU Cybersecurity Certification Group coordinates incident response"
|
|
57
|
+
},
|
|
58
|
+
{
|
|
59
|
+
"control_id": "A.8.8",
|
|
60
|
+
"control_name": "Management of technical vulnerabilities",
|
|
61
|
+
"regulation": "CYBERSECURITY_ACT",
|
|
62
|
+
"articles": ["51", "54"],
|
|
63
|
+
"coverage": "full",
|
|
64
|
+
"notes": "Art 51(f) requires minimising known vulnerabilities, Art 54 specifies vulnerability management requirements"
|
|
65
|
+
},
|
|
66
|
+
{
|
|
67
|
+
"control_id": "A.8.24",
|
|
68
|
+
"control_name": "Use of cryptography",
|
|
69
|
+
"regulation": "CYBERSECURITY_ACT",
|
|
70
|
+
"articles": ["51"],
|
|
71
|
+
"coverage": "partial",
|
|
72
|
+
"notes": "Art 51(c-d) requires protection of data confidentiality and integrity through appropriate measures"
|
|
73
|
+
},
|
|
74
|
+
{
|
|
75
|
+
"control_id": "A.8.25",
|
|
76
|
+
"control_name": "Secure development life cycle",
|
|
77
|
+
"regulation": "CYBERSECURITY_ACT",
|
|
78
|
+
"articles": ["51", "52"],
|
|
79
|
+
"coverage": "partial",
|
|
80
|
+
"notes": "Art 51(a) security by design, Art 52 assurance levels define development rigor requirements"
|
|
81
|
+
},
|
|
82
|
+
{
|
|
83
|
+
"control_id": "A.8.29",
|
|
84
|
+
"control_name": "Security testing in development and acceptance",
|
|
85
|
+
"regulation": "CYBERSECURITY_ACT",
|
|
86
|
+
"articles": ["52", "56", "58"],
|
|
87
|
+
"coverage": "full",
|
|
88
|
+
"notes": "Art 52 assurance levels require testing, Art 56-58 conformity assessment procedures"
|
|
89
|
+
}
|
|
90
|
+
]
|