@ansvar/eu-regulations-mcp 0.1.0 → 0.2.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +190 -21
- package/README.md +159 -26
- package/data/seed/aifmd.json +432 -0
- package/data/seed/applicability/ai-act.json +87 -0
- package/data/seed/applicability/aifmd.json +74 -0
- package/data/seed/applicability/cbam.json +74 -0
- package/data/seed/applicability/cer.json +74 -0
- package/data/seed/applicability/cra.json +77 -0
- package/data/seed/applicability/csddd.json +74 -0
- package/data/seed/applicability/csrd.json +74 -0
- package/data/seed/applicability/cyber_solidarity.json +74 -0
- package/data/seed/applicability/cybersecurity-act.json +69 -0
- package/data/seed/applicability/data-act.json +71 -0
- package/data/seed/applicability/dga.json +74 -0
- package/data/seed/applicability/dma.json +77 -0
- package/data/seed/applicability/dsa.json +71 -0
- package/data/seed/applicability/eecc.json +74 -0
- package/data/seed/applicability/ehds.json +74 -0
- package/data/seed/applicability/eidas2.json +86 -0
- package/data/seed/applicability/eprivacy.json +74 -0
- package/data/seed/applicability/eu_taxonomy.json +74 -0
- package/data/seed/applicability/eucc.json +74 -0
- package/data/seed/applicability/eudr.json +74 -0
- package/data/seed/applicability/gpsr.json +74 -0
- package/data/seed/applicability/ivdr.json +74 -0
- package/data/seed/applicability/led.json +74 -0
- package/data/seed/applicability/machinery.json +74 -0
- package/data/seed/applicability/mdr.json +74 -0
- package/data/seed/applicability/mica.json +74 -0
- package/data/seed/applicability/mifid2.json +74 -0
- package/data/seed/applicability/mifir.json +74 -0
- package/data/seed/applicability/pld.json +74 -0
- package/data/seed/applicability/psd2.json +74 -0
- package/data/seed/applicability/red.json +74 -0
- package/data/seed/applicability/sfdr.json +74 -0
- package/data/seed/applicability/un-r155.json +68 -0
- package/data/seed/applicability/un-r156.json +68 -0
- package/data/seed/cbam.json +397 -0
- package/data/seed/cer.json +233 -0
- package/data/seed/csddd.json +205 -0
- package/data/seed/csrd.json +50 -0
- package/data/seed/cyber_solidarity.json +252 -0
- package/data/seed/data-act.json +517 -0
- package/data/seed/dga.json +342 -0
- package/data/seed/dma.json +499 -0
- package/data/seed/dsa.json +686 -0
- package/data/seed/eecc.json +981 -0
- package/data/seed/ehds.json +638 -0
- package/data/seed/eidas2.json +590 -0
- package/data/seed/eprivacy.json +115 -0
- package/data/seed/eu_taxonomy.json +285 -0
- package/data/seed/eucc.json +386 -0
- package/data/seed/eudr.json +401 -0
- package/data/seed/gpsr.json +462 -0
- package/data/seed/ivdr.json +1036 -0
- package/data/seed/led.json +480 -0
- package/data/seed/machinery.json +513 -0
- package/data/seed/mappings/iso27001-ai-act.json +114 -0
- package/data/seed/mappings/iso27001-aifmd.json +50 -0
- package/data/seed/mappings/iso27001-cbam.json +26 -0
- package/data/seed/mappings/iso27001-cer.json +74 -0
- package/data/seed/mappings/iso27001-cra.json +130 -0
- package/data/seed/mappings/iso27001-csddd.json +50 -0
- package/data/seed/mappings/iso27001-csrd.json +26 -0
- package/data/seed/mappings/iso27001-cyber_solidarity.json +82 -0
- package/data/seed/mappings/iso27001-cybersecurity-act.json +90 -0
- package/data/seed/mappings/iso27001-data-act.json +66 -0
- package/data/seed/mappings/iso27001-dga.json +50 -0
- package/data/seed/mappings/iso27001-dma.json +50 -0
- package/data/seed/mappings/iso27001-dsa.json +58 -0
- package/data/seed/mappings/iso27001-eecc.json +74 -0
- package/data/seed/mappings/iso27001-ehds.json +90 -0
- package/data/seed/mappings/iso27001-eidas2.json +106 -0
- package/data/seed/mappings/iso27001-eprivacy.json +66 -0
- package/data/seed/mappings/iso27001-eu_taxonomy.json +34 -0
- package/data/seed/mappings/iso27001-eucc.json +66 -0
- package/data/seed/mappings/iso27001-eudr.json +34 -0
- package/data/seed/mappings/iso27001-gpsr.json +42 -0
- package/data/seed/mappings/iso27001-ivdr.json +66 -0
- package/data/seed/mappings/iso27001-led.json +74 -0
- package/data/seed/mappings/iso27001-machinery.json +50 -0
- package/data/seed/mappings/iso27001-mdr.json +82 -0
- package/data/seed/mappings/iso27001-mica.json +66 -0
- package/data/seed/mappings/iso27001-mifid2.json +66 -0
- package/data/seed/mappings/iso27001-mifir.json +42 -0
- package/data/seed/mappings/iso27001-pld.json +26 -0
- package/data/seed/mappings/iso27001-psd2.json +82 -0
- package/data/seed/mappings/iso27001-red.json +42 -0
- package/data/seed/mappings/iso27001-sfdr.json +50 -0
- package/data/seed/mappings/iso27001-un-r155.json +130 -0
- package/data/seed/mappings/iso27001-un-r156.json +106 -0
- package/data/seed/mappings/nist-csf-ai-act.json +138 -0
- package/data/seed/mappings/nist-csf-aifmd.json +58 -0
- package/data/seed/mappings/nist-csf-cbam.json +42 -0
- package/data/seed/mappings/nist-csf-cer.json +90 -0
- package/data/seed/mappings/nist-csf-cra.json +130 -0
- package/data/seed/mappings/nist-csf-csddd.json +50 -0
- package/data/seed/mappings/nist-csf-csrd.json +34 -0
- package/data/seed/mappings/nist-csf-cyber_solidarity.json +90 -0
- package/data/seed/mappings/nist-csf-cybersecurity-act.json +90 -0
- package/data/seed/mappings/nist-csf-data-act.json +50 -0
- package/data/seed/mappings/nist-csf-dga.json +58 -0
- package/data/seed/mappings/nist-csf-dma.json +42 -0
- package/data/seed/mappings/nist-csf-dora.json +210 -0
- package/data/seed/mappings/nist-csf-dsa.json +82 -0
- package/data/seed/mappings/nist-csf-eecc.json +90 -0
- package/data/seed/mappings/nist-csf-ehds.json +98 -0
- package/data/seed/mappings/nist-csf-eidas2.json +114 -0
- package/data/seed/mappings/nist-csf-eprivacy.json +58 -0
- package/data/seed/mappings/nist-csf-eu_taxonomy.json +34 -0
- package/data/seed/mappings/nist-csf-eucc.json +66 -0
- package/data/seed/mappings/nist-csf-eudr.json +58 -0
- package/data/seed/mappings/nist-csf-gdpr.json +178 -0
- package/data/seed/mappings/nist-csf-gpsr.json +58 -0
- package/data/seed/mappings/nist-csf-ivdr.json +66 -0
- package/data/seed/mappings/nist-csf-led.json +74 -0
- package/data/seed/mappings/nist-csf-machinery.json +58 -0
- package/data/seed/mappings/nist-csf-mdr.json +66 -0
- package/data/seed/mappings/nist-csf-mica.json +98 -0
- package/data/seed/mappings/nist-csf-mifid2.json +74 -0
- package/data/seed/mappings/nist-csf-mifir.json +50 -0
- package/data/seed/mappings/nist-csf-nis2.json +194 -0
- package/data/seed/mappings/nist-csf-pld.json +34 -0
- package/data/seed/mappings/nist-csf-psd2.json +98 -0
- package/data/seed/mappings/nist-csf-red.json +58 -0
- package/data/seed/mappings/nist-csf-sfdr.json +42 -0
- package/data/seed/mappings/nist-csf-un-r155.json +130 -0
- package/data/seed/mappings/nist-csf-un-r156.json +98 -0
- package/data/seed/mdr.json +1066 -0
- package/data/seed/mica.json +1003 -0
- package/data/seed/mifid2.json +906 -0
- package/data/seed/mifir.json +512 -0
- package/data/seed/pld.json +244 -0
- package/data/seed/psd2.json +827 -0
- package/data/seed/red.json +452 -0
- package/data/seed/sfdr.json +228 -0
- package/data/seed/un-r155.json +166 -0
- package/data/seed/un-r156.json +150 -0
- package/dist/http-server.d.ts +9 -0
- package/dist/http-server.d.ts.map +1 -0
- package/dist/http-server.js +342 -0
- package/dist/http-server.js.map +1 -0
- package/dist/index.js +4 -4
- package/dist/index.js.map +1 -1
- package/dist/tools/map.d.ts +1 -1
- package/dist/tools/map.d.ts.map +1 -1
- package/dist/tools/map.js +3 -3
- package/dist/tools/map.js.map +1 -1
- package/package.json +8 -3
- package/scripts/build-db.ts +20 -8
- package/scripts/check-updates.ts +141 -39
- package/scripts/ingest-eurlex.ts +9 -1
- package/scripts/ingest-unece.ts +368 -0
- package/src/http-server.ts +380 -0
- package/src/index.ts +4 -4
- package/src/tools/map.ts +4 -4
|
@@ -0,0 +1,34 @@
|
|
|
1
|
+
[
|
|
2
|
+
{
|
|
3
|
+
"control_id": "A.5.19",
|
|
4
|
+
"control_name": "Information security in supplier relationships",
|
|
5
|
+
"regulation": "EUDR",
|
|
6
|
+
"articles": ["8", "9", "10"],
|
|
7
|
+
"coverage": "full",
|
|
8
|
+
"notes": "Supply chain due diligence for deforestation-free products"
|
|
9
|
+
},
|
|
10
|
+
{
|
|
11
|
+
"control_id": "A.5.31",
|
|
12
|
+
"control_name": "Legal, statutory, regulatory and contractual requirements",
|
|
13
|
+
"regulation": "EUDR",
|
|
14
|
+
"articles": ["1", "2"],
|
|
15
|
+
"coverage": "full",
|
|
16
|
+
"notes": "Deforestation-free supply chain requirements"
|
|
17
|
+
},
|
|
18
|
+
{
|
|
19
|
+
"control_id": "A.5.33",
|
|
20
|
+
"control_name": "Protection of records",
|
|
21
|
+
"regulation": "EUDR",
|
|
22
|
+
"articles": ["9", "12"],
|
|
23
|
+
"coverage": "full",
|
|
24
|
+
"notes": "Due diligence statements and traceability records"
|
|
25
|
+
},
|
|
26
|
+
{
|
|
27
|
+
"control_id": "A.8.12",
|
|
28
|
+
"control_name": "Data leakage prevention",
|
|
29
|
+
"regulation": "EUDR",
|
|
30
|
+
"articles": ["9"],
|
|
31
|
+
"coverage": "partial",
|
|
32
|
+
"notes": "Protection of supply chain traceability data"
|
|
33
|
+
}
|
|
34
|
+
]
|
|
@@ -0,0 +1,42 @@
|
|
|
1
|
+
[
|
|
2
|
+
{
|
|
3
|
+
"control_id": "A.5.1",
|
|
4
|
+
"control_name": "Policies for information security",
|
|
5
|
+
"regulation": "GPSR",
|
|
6
|
+
"articles": ["9", "10"],
|
|
7
|
+
"coverage": "partial",
|
|
8
|
+
"notes": "Product safety management policies"
|
|
9
|
+
},
|
|
10
|
+
{
|
|
11
|
+
"control_id": "A.5.31",
|
|
12
|
+
"control_name": "Legal, statutory, regulatory and contractual requirements",
|
|
13
|
+
"regulation": "GPSR",
|
|
14
|
+
"articles": ["1", "2"],
|
|
15
|
+
"coverage": "full",
|
|
16
|
+
"notes": "General product safety requirements"
|
|
17
|
+
},
|
|
18
|
+
{
|
|
19
|
+
"control_id": "A.5.33",
|
|
20
|
+
"control_name": "Protection of records",
|
|
21
|
+
"regulation": "GPSR",
|
|
22
|
+
"articles": ["9", "10", "11", "12"],
|
|
23
|
+
"coverage": "full",
|
|
24
|
+
"notes": "Technical documentation and traceability"
|
|
25
|
+
},
|
|
26
|
+
{
|
|
27
|
+
"control_id": "A.6.8",
|
|
28
|
+
"control_name": "Information security event reporting",
|
|
29
|
+
"regulation": "GPSR",
|
|
30
|
+
"articles": ["20", "21"],
|
|
31
|
+
"coverage": "full",
|
|
32
|
+
"notes": "Product safety incident notification"
|
|
33
|
+
},
|
|
34
|
+
{
|
|
35
|
+
"control_id": "A.8.28",
|
|
36
|
+
"control_name": "Secure coding",
|
|
37
|
+
"regulation": "GPSR",
|
|
38
|
+
"articles": ["6", "7"],
|
|
39
|
+
"coverage": "partial",
|
|
40
|
+
"notes": "Safety requirements for connected products"
|
|
41
|
+
}
|
|
42
|
+
]
|
|
@@ -0,0 +1,66 @@
|
|
|
1
|
+
[
|
|
2
|
+
{
|
|
3
|
+
"control_id": "A.5.1",
|
|
4
|
+
"control_name": "Policies for information security",
|
|
5
|
+
"regulation": "IVDR",
|
|
6
|
+
"articles": ["10", "23"],
|
|
7
|
+
"coverage": "full",
|
|
8
|
+
"notes": "Quality management system and cybersecurity requirements"
|
|
9
|
+
},
|
|
10
|
+
{
|
|
11
|
+
"control_id": "A.5.8",
|
|
12
|
+
"control_name": "Information security in project management",
|
|
13
|
+
"regulation": "IVDR",
|
|
14
|
+
"articles": ["10", "56"],
|
|
15
|
+
"coverage": "full",
|
|
16
|
+
"notes": "Security in IVD device design and development"
|
|
17
|
+
},
|
|
18
|
+
{
|
|
19
|
+
"control_id": "A.5.31",
|
|
20
|
+
"control_name": "Legal, statutory, regulatory and contractual requirements",
|
|
21
|
+
"regulation": "IVDR",
|
|
22
|
+
"articles": ["1", "2"],
|
|
23
|
+
"coverage": "full",
|
|
24
|
+
"notes": "Regulatory framework for in vitro diagnostic devices"
|
|
25
|
+
},
|
|
26
|
+
{
|
|
27
|
+
"control_id": "A.5.33",
|
|
28
|
+
"control_name": "Protection of records",
|
|
29
|
+
"regulation": "IVDR",
|
|
30
|
+
"articles": ["10", "24"],
|
|
31
|
+
"coverage": "full",
|
|
32
|
+
"notes": "Technical documentation and UDI-DI requirements"
|
|
33
|
+
},
|
|
34
|
+
{
|
|
35
|
+
"control_id": "A.6.8",
|
|
36
|
+
"control_name": "Information security event reporting",
|
|
37
|
+
"regulation": "IVDR",
|
|
38
|
+
"articles": ["82", "83", "84"],
|
|
39
|
+
"coverage": "full",
|
|
40
|
+
"notes": "Vigilance reporting for serious incidents"
|
|
41
|
+
},
|
|
42
|
+
{
|
|
43
|
+
"control_id": "A.8.9",
|
|
44
|
+
"control_name": "Configuration management",
|
|
45
|
+
"regulation": "IVDR",
|
|
46
|
+
"articles": ["10"],
|
|
47
|
+
"coverage": "full",
|
|
48
|
+
"notes": "Device configuration and software version control"
|
|
49
|
+
},
|
|
50
|
+
{
|
|
51
|
+
"control_id": "A.8.24",
|
|
52
|
+
"control_name": "Use of cryptography",
|
|
53
|
+
"regulation": "IVDR",
|
|
54
|
+
"articles": ["10"],
|
|
55
|
+
"coverage": "partial",
|
|
56
|
+
"notes": "Security measures for connected IVD devices"
|
|
57
|
+
},
|
|
58
|
+
{
|
|
59
|
+
"control_id": "A.8.28",
|
|
60
|
+
"control_name": "Secure coding",
|
|
61
|
+
"regulation": "IVDR",
|
|
62
|
+
"articles": ["10"],
|
|
63
|
+
"coverage": "full",
|
|
64
|
+
"notes": "Software requirements in general safety and performance"
|
|
65
|
+
}
|
|
66
|
+
]
|
|
@@ -0,0 +1,74 @@
|
|
|
1
|
+
[
|
|
2
|
+
{
|
|
3
|
+
"control_id": "A.5.1",
|
|
4
|
+
"control_name": "Policies for information security",
|
|
5
|
+
"regulation": "LED",
|
|
6
|
+
"articles": ["19", "29"],
|
|
7
|
+
"coverage": "full",
|
|
8
|
+
"notes": "Security policies required for law enforcement data processing"
|
|
9
|
+
},
|
|
10
|
+
{
|
|
11
|
+
"control_id": "A.5.2",
|
|
12
|
+
"control_name": "Information security roles and responsibilities",
|
|
13
|
+
"regulation": "LED",
|
|
14
|
+
"articles": ["32", "33", "34"],
|
|
15
|
+
"coverage": "full",
|
|
16
|
+
"notes": "Data protection officer designation and controller responsibilities"
|
|
17
|
+
},
|
|
18
|
+
{
|
|
19
|
+
"control_id": "A.5.31",
|
|
20
|
+
"control_name": "Legal, statutory, regulatory and contractual requirements",
|
|
21
|
+
"regulation": "LED",
|
|
22
|
+
"articles": ["1", "2", "3"],
|
|
23
|
+
"coverage": "full",
|
|
24
|
+
"notes": "Legal framework for law enforcement data processing"
|
|
25
|
+
},
|
|
26
|
+
{
|
|
27
|
+
"control_id": "A.5.33",
|
|
28
|
+
"control_name": "Protection of records",
|
|
29
|
+
"regulation": "LED",
|
|
30
|
+
"articles": ["24", "25"],
|
|
31
|
+
"coverage": "full",
|
|
32
|
+
"notes": "Logging and record-keeping requirements"
|
|
33
|
+
},
|
|
34
|
+
{
|
|
35
|
+
"control_id": "A.5.34",
|
|
36
|
+
"control_name": "Privacy and protection of PII",
|
|
37
|
+
"regulation": "LED",
|
|
38
|
+
"articles": ["4", "8", "9", "13", "14", "15", "16"],
|
|
39
|
+
"coverage": "full",
|
|
40
|
+
"notes": "Data subject rights and data protection principles"
|
|
41
|
+
},
|
|
42
|
+
{
|
|
43
|
+
"control_id": "A.6.8",
|
|
44
|
+
"control_name": "Information security event reporting",
|
|
45
|
+
"regulation": "LED",
|
|
46
|
+
"articles": ["30", "31"],
|
|
47
|
+
"coverage": "full",
|
|
48
|
+
"notes": "Personal data breach notification to supervisory authority"
|
|
49
|
+
},
|
|
50
|
+
{
|
|
51
|
+
"control_id": "A.8.3",
|
|
52
|
+
"control_name": "Information access restriction",
|
|
53
|
+
"regulation": "LED",
|
|
54
|
+
"articles": ["19", "29"],
|
|
55
|
+
"coverage": "full",
|
|
56
|
+
"notes": "Access controls for law enforcement data"
|
|
57
|
+
},
|
|
58
|
+
{
|
|
59
|
+
"control_id": "A.8.10",
|
|
60
|
+
"control_name": "Information deletion",
|
|
61
|
+
"regulation": "LED",
|
|
62
|
+
"articles": ["5", "16"],
|
|
63
|
+
"coverage": "full",
|
|
64
|
+
"notes": "Data minimization and right to erasure"
|
|
65
|
+
},
|
|
66
|
+
{
|
|
67
|
+
"control_id": "A.8.11",
|
|
68
|
+
"control_name": "Data masking",
|
|
69
|
+
"regulation": "LED",
|
|
70
|
+
"articles": ["4", "19"],
|
|
71
|
+
"coverage": "partial",
|
|
72
|
+
"notes": "Distinction between data subjects and pseudonymization"
|
|
73
|
+
}
|
|
74
|
+
]
|
|
@@ -0,0 +1,50 @@
|
|
|
1
|
+
[
|
|
2
|
+
{
|
|
3
|
+
"control_id": "A.5.1",
|
|
4
|
+
"control_name": "Policies for information security",
|
|
5
|
+
"regulation": "MACHINERY",
|
|
6
|
+
"articles": ["10", "18"],
|
|
7
|
+
"coverage": "partial",
|
|
8
|
+
"notes": "Security policies for machinery with digital components"
|
|
9
|
+
},
|
|
10
|
+
{
|
|
11
|
+
"control_id": "A.5.31",
|
|
12
|
+
"control_name": "Legal, statutory, regulatory and contractual requirements",
|
|
13
|
+
"regulation": "MACHINERY",
|
|
14
|
+
"articles": ["1", "2"],
|
|
15
|
+
"coverage": "full",
|
|
16
|
+
"notes": "Health and safety requirements for machinery"
|
|
17
|
+
},
|
|
18
|
+
{
|
|
19
|
+
"control_id": "A.5.33",
|
|
20
|
+
"control_name": "Protection of records",
|
|
21
|
+
"regulation": "MACHINERY",
|
|
22
|
+
"articles": ["10", "11", "12"],
|
|
23
|
+
"coverage": "full",
|
|
24
|
+
"notes": "Technical documentation requirements"
|
|
25
|
+
},
|
|
26
|
+
{
|
|
27
|
+
"control_id": "A.8.9",
|
|
28
|
+
"control_name": "Configuration management",
|
|
29
|
+
"regulation": "MACHINERY",
|
|
30
|
+
"articles": ["18"],
|
|
31
|
+
"coverage": "partial",
|
|
32
|
+
"notes": "Software configuration for safety functions"
|
|
33
|
+
},
|
|
34
|
+
{
|
|
35
|
+
"control_id": "A.8.24",
|
|
36
|
+
"control_name": "Use of cryptography",
|
|
37
|
+
"regulation": "MACHINERY",
|
|
38
|
+
"articles": ["18"],
|
|
39
|
+
"coverage": "partial",
|
|
40
|
+
"notes": "Security for connected machinery"
|
|
41
|
+
},
|
|
42
|
+
{
|
|
43
|
+
"control_id": "A.8.28",
|
|
44
|
+
"control_name": "Secure coding",
|
|
45
|
+
"regulation": "MACHINERY",
|
|
46
|
+
"articles": ["18"],
|
|
47
|
+
"coverage": "full",
|
|
48
|
+
"notes": "Software safety requirements including cybersecurity"
|
|
49
|
+
}
|
|
50
|
+
]
|
|
@@ -0,0 +1,82 @@
|
|
|
1
|
+
[
|
|
2
|
+
{
|
|
3
|
+
"control_id": "A.5.1",
|
|
4
|
+
"control_name": "Policies for information security",
|
|
5
|
+
"regulation": "MDR",
|
|
6
|
+
"articles": ["10", "23"],
|
|
7
|
+
"coverage": "full",
|
|
8
|
+
"notes": "Quality management system and cybersecurity requirements"
|
|
9
|
+
},
|
|
10
|
+
{
|
|
11
|
+
"control_id": "A.5.8",
|
|
12
|
+
"control_name": "Information security in project management",
|
|
13
|
+
"regulation": "MDR",
|
|
14
|
+
"articles": ["10", "61"],
|
|
15
|
+
"coverage": "full",
|
|
16
|
+
"notes": "Security considerations in device design and development"
|
|
17
|
+
},
|
|
18
|
+
{
|
|
19
|
+
"control_id": "A.5.23",
|
|
20
|
+
"control_name": "Information security for use of cloud services",
|
|
21
|
+
"regulation": "MDR",
|
|
22
|
+
"articles": ["10"],
|
|
23
|
+
"coverage": "partial",
|
|
24
|
+
"notes": "Connected device security requirements"
|
|
25
|
+
},
|
|
26
|
+
{
|
|
27
|
+
"control_id": "A.5.31",
|
|
28
|
+
"control_name": "Legal, statutory, regulatory and contractual requirements",
|
|
29
|
+
"regulation": "MDR",
|
|
30
|
+
"articles": ["1", "2", "3"],
|
|
31
|
+
"coverage": "full",
|
|
32
|
+
"notes": "Comprehensive regulatory framework for medical devices"
|
|
33
|
+
},
|
|
34
|
+
{
|
|
35
|
+
"control_id": "A.5.33",
|
|
36
|
+
"control_name": "Protection of records",
|
|
37
|
+
"regulation": "MDR",
|
|
38
|
+
"articles": ["10", "87"],
|
|
39
|
+
"coverage": "full",
|
|
40
|
+
"notes": "Technical documentation and UDI requirements"
|
|
41
|
+
},
|
|
42
|
+
{
|
|
43
|
+
"control_id": "A.6.8",
|
|
44
|
+
"control_name": "Information security event reporting",
|
|
45
|
+
"regulation": "MDR",
|
|
46
|
+
"articles": ["87", "88", "89"],
|
|
47
|
+
"coverage": "full",
|
|
48
|
+
"notes": "Vigilance reporting for serious incidents"
|
|
49
|
+
},
|
|
50
|
+
{
|
|
51
|
+
"control_id": "A.8.9",
|
|
52
|
+
"control_name": "Configuration management",
|
|
53
|
+
"regulation": "MDR",
|
|
54
|
+
"articles": ["10"],
|
|
55
|
+
"coverage": "full",
|
|
56
|
+
"notes": "Device configuration and version control requirements"
|
|
57
|
+
},
|
|
58
|
+
{
|
|
59
|
+
"control_id": "A.8.24",
|
|
60
|
+
"control_name": "Use of cryptography",
|
|
61
|
+
"regulation": "MDR",
|
|
62
|
+
"articles": ["10"],
|
|
63
|
+
"coverage": "partial",
|
|
64
|
+
"notes": "Security measures for connected medical devices"
|
|
65
|
+
},
|
|
66
|
+
{
|
|
67
|
+
"control_id": "A.8.28",
|
|
68
|
+
"control_name": "Secure coding",
|
|
69
|
+
"regulation": "MDR",
|
|
70
|
+
"articles": ["10"],
|
|
71
|
+
"coverage": "full",
|
|
72
|
+
"notes": "Software safety and security requirements in Annex I"
|
|
73
|
+
},
|
|
74
|
+
{
|
|
75
|
+
"control_id": "A.8.31",
|
|
76
|
+
"control_name": "Separation of development, test and production environments",
|
|
77
|
+
"regulation": "MDR",
|
|
78
|
+
"articles": ["10"],
|
|
79
|
+
"coverage": "partial",
|
|
80
|
+
"notes": "Quality management includes development environment controls"
|
|
81
|
+
}
|
|
82
|
+
]
|
|
@@ -0,0 +1,66 @@
|
|
|
1
|
+
[
|
|
2
|
+
{
|
|
3
|
+
"control_id": "A.5.1",
|
|
4
|
+
"control_name": "Policies for information security",
|
|
5
|
+
"regulation": "MICA",
|
|
6
|
+
"articles": ["68", "75"],
|
|
7
|
+
"coverage": "full",
|
|
8
|
+
"notes": "ICT security policies for crypto-asset service providers"
|
|
9
|
+
},
|
|
10
|
+
{
|
|
11
|
+
"control_id": "A.5.2",
|
|
12
|
+
"control_name": "Information security roles and responsibilities",
|
|
13
|
+
"regulation": "MICA",
|
|
14
|
+
"articles": ["68", "75"],
|
|
15
|
+
"coverage": "full",
|
|
16
|
+
"notes": "Governance arrangements for CASPs"
|
|
17
|
+
},
|
|
18
|
+
{
|
|
19
|
+
"control_id": "A.5.7",
|
|
20
|
+
"control_name": "Threat intelligence",
|
|
21
|
+
"regulation": "MICA",
|
|
22
|
+
"articles": ["68"],
|
|
23
|
+
"coverage": "partial",
|
|
24
|
+
"notes": "Security monitoring requirements"
|
|
25
|
+
},
|
|
26
|
+
{
|
|
27
|
+
"control_id": "A.5.24",
|
|
28
|
+
"control_name": "Information security incident management planning and preparation",
|
|
29
|
+
"regulation": "MICA",
|
|
30
|
+
"articles": ["68"],
|
|
31
|
+
"coverage": "full",
|
|
32
|
+
"notes": "Business continuity and incident response"
|
|
33
|
+
},
|
|
34
|
+
{
|
|
35
|
+
"control_id": "A.5.31",
|
|
36
|
+
"control_name": "Legal, statutory, regulatory and contractual requirements",
|
|
37
|
+
"regulation": "MICA",
|
|
38
|
+
"articles": ["1", "2", "3"],
|
|
39
|
+
"coverage": "full",
|
|
40
|
+
"notes": "Comprehensive framework for crypto-asset markets"
|
|
41
|
+
},
|
|
42
|
+
{
|
|
43
|
+
"control_id": "A.5.33",
|
|
44
|
+
"control_name": "Protection of records",
|
|
45
|
+
"regulation": "MICA",
|
|
46
|
+
"articles": ["68", "75"],
|
|
47
|
+
"coverage": "full",
|
|
48
|
+
"notes": "Record keeping for crypto transactions"
|
|
49
|
+
},
|
|
50
|
+
{
|
|
51
|
+
"control_id": "A.8.3",
|
|
52
|
+
"control_name": "Information access restriction",
|
|
53
|
+
"regulation": "MICA",
|
|
54
|
+
"articles": ["68", "75"],
|
|
55
|
+
"coverage": "full",
|
|
56
|
+
"notes": "Access controls for crypto-asset custody"
|
|
57
|
+
},
|
|
58
|
+
{
|
|
59
|
+
"control_id": "A.8.24",
|
|
60
|
+
"control_name": "Use of cryptography",
|
|
61
|
+
"regulation": "MICA",
|
|
62
|
+
"articles": ["68"],
|
|
63
|
+
"coverage": "full",
|
|
64
|
+
"notes": "Cryptographic controls for digital assets"
|
|
65
|
+
}
|
|
66
|
+
]
|
|
@@ -0,0 +1,66 @@
|
|
|
1
|
+
[
|
|
2
|
+
{
|
|
3
|
+
"control_id": "A.5.1",
|
|
4
|
+
"control_name": "Policies for information security",
|
|
5
|
+
"regulation": "MIFID2",
|
|
6
|
+
"articles": ["16", "17"],
|
|
7
|
+
"coverage": "full",
|
|
8
|
+
"notes": "Organizational requirements and algorithmic trading controls"
|
|
9
|
+
},
|
|
10
|
+
{
|
|
11
|
+
"control_id": "A.5.2",
|
|
12
|
+
"control_name": "Information security roles and responsibilities",
|
|
13
|
+
"regulation": "MIFID2",
|
|
14
|
+
"articles": ["9", "16"],
|
|
15
|
+
"coverage": "full",
|
|
16
|
+
"notes": "Management body responsibilities and compliance function"
|
|
17
|
+
},
|
|
18
|
+
{
|
|
19
|
+
"control_id": "A.5.31",
|
|
20
|
+
"control_name": "Legal, statutory, regulatory and contractual requirements",
|
|
21
|
+
"regulation": "MIFID2",
|
|
22
|
+
"articles": ["1", "2"],
|
|
23
|
+
"coverage": "full",
|
|
24
|
+
"notes": "Comprehensive framework for investment services"
|
|
25
|
+
},
|
|
26
|
+
{
|
|
27
|
+
"control_id": "A.5.33",
|
|
28
|
+
"control_name": "Protection of records",
|
|
29
|
+
"regulation": "MIFID2",
|
|
30
|
+
"articles": ["16", "25"],
|
|
31
|
+
"coverage": "full",
|
|
32
|
+
"notes": "Record keeping and client information requirements"
|
|
33
|
+
},
|
|
34
|
+
{
|
|
35
|
+
"control_id": "A.5.34",
|
|
36
|
+
"control_name": "Privacy and protection of PII",
|
|
37
|
+
"regulation": "MIFID2",
|
|
38
|
+
"articles": ["16"],
|
|
39
|
+
"coverage": "partial",
|
|
40
|
+
"notes": "Client data protection requirements"
|
|
41
|
+
},
|
|
42
|
+
{
|
|
43
|
+
"control_id": "A.8.1",
|
|
44
|
+
"control_name": "User endpoint devices",
|
|
45
|
+
"regulation": "MIFID2",
|
|
46
|
+
"articles": ["17"],
|
|
47
|
+
"coverage": "partial",
|
|
48
|
+
"notes": "Controls for algorithmic trading systems"
|
|
49
|
+
},
|
|
50
|
+
{
|
|
51
|
+
"control_id": "A.8.4",
|
|
52
|
+
"control_name": "Access to source code",
|
|
53
|
+
"regulation": "MIFID2",
|
|
54
|
+
"articles": ["17"],
|
|
55
|
+
"coverage": "partial",
|
|
56
|
+
"notes": "Algorithm source code access controls"
|
|
57
|
+
},
|
|
58
|
+
{
|
|
59
|
+
"control_id": "A.8.6",
|
|
60
|
+
"control_name": "Capacity management",
|
|
61
|
+
"regulation": "MIFID2",
|
|
62
|
+
"articles": ["17", "48"],
|
|
63
|
+
"coverage": "full",
|
|
64
|
+
"notes": "System capacity and resilience requirements"
|
|
65
|
+
}
|
|
66
|
+
]
|
|
@@ -0,0 +1,42 @@
|
|
|
1
|
+
[
|
|
2
|
+
{
|
|
3
|
+
"control_id": "A.5.1",
|
|
4
|
+
"control_name": "Policies for information security",
|
|
5
|
+
"regulation": "MIFIR",
|
|
6
|
+
"articles": ["1", "2"],
|
|
7
|
+
"coverage": "partial",
|
|
8
|
+
"notes": "Framework for trading transparency and reporting"
|
|
9
|
+
},
|
|
10
|
+
{
|
|
11
|
+
"control_id": "A.5.31",
|
|
12
|
+
"control_name": "Legal, statutory, regulatory and contractual requirements",
|
|
13
|
+
"regulation": "MIFIR",
|
|
14
|
+
"articles": ["1", "2"],
|
|
15
|
+
"coverage": "full",
|
|
16
|
+
"notes": "Uniform requirements for trading venues"
|
|
17
|
+
},
|
|
18
|
+
{
|
|
19
|
+
"control_id": "A.5.33",
|
|
20
|
+
"control_name": "Protection of records",
|
|
21
|
+
"regulation": "MIFIR",
|
|
22
|
+
"articles": ["25", "26"],
|
|
23
|
+
"coverage": "full",
|
|
24
|
+
"notes": "Transaction reporting and record keeping"
|
|
25
|
+
},
|
|
26
|
+
{
|
|
27
|
+
"control_id": "A.8.12",
|
|
28
|
+
"control_name": "Data leakage prevention",
|
|
29
|
+
"regulation": "MIFIR",
|
|
30
|
+
"articles": ["1", "25"],
|
|
31
|
+
"coverage": "partial",
|
|
32
|
+
"notes": "Controls for trade data protection"
|
|
33
|
+
},
|
|
34
|
+
{
|
|
35
|
+
"control_id": "A.8.16",
|
|
36
|
+
"control_name": "Monitoring activities",
|
|
37
|
+
"regulation": "MIFIR",
|
|
38
|
+
"articles": ["25", "26"],
|
|
39
|
+
"coverage": "full",
|
|
40
|
+
"notes": "Transaction monitoring and reporting"
|
|
41
|
+
}
|
|
42
|
+
]
|
|
@@ -0,0 +1,26 @@
|
|
|
1
|
+
[
|
|
2
|
+
{
|
|
3
|
+
"control_id": "A.5.31",
|
|
4
|
+
"control_name": "Legal, statutory, regulatory and contractual requirements",
|
|
5
|
+
"regulation": "PLD",
|
|
6
|
+
"articles": ["1", "2", "3"],
|
|
7
|
+
"coverage": "full",
|
|
8
|
+
"notes": "Liability framework for defective products"
|
|
9
|
+
},
|
|
10
|
+
{
|
|
11
|
+
"control_id": "A.5.33",
|
|
12
|
+
"control_name": "Protection of records",
|
|
13
|
+
"regulation": "PLD",
|
|
14
|
+
"articles": ["9", "10"],
|
|
15
|
+
"coverage": "full",
|
|
16
|
+
"notes": "Evidence preservation for liability claims"
|
|
17
|
+
},
|
|
18
|
+
{
|
|
19
|
+
"control_id": "A.8.28",
|
|
20
|
+
"control_name": "Secure coding",
|
|
21
|
+
"regulation": "PLD",
|
|
22
|
+
"articles": ["2", "6"],
|
|
23
|
+
"coverage": "full",
|
|
24
|
+
"notes": "Software defects can establish product liability"
|
|
25
|
+
}
|
|
26
|
+
]
|
|
@@ -0,0 +1,82 @@
|
|
|
1
|
+
[
|
|
2
|
+
{
|
|
3
|
+
"control_id": "A.5.1",
|
|
4
|
+
"control_name": "Policies for information security",
|
|
5
|
+
"regulation": "PSD2",
|
|
6
|
+
"articles": ["5", "95"],
|
|
7
|
+
"coverage": "full",
|
|
8
|
+
"notes": "Security policies for payment service providers"
|
|
9
|
+
},
|
|
10
|
+
{
|
|
11
|
+
"control_id": "A.5.2",
|
|
12
|
+
"control_name": "Information security roles and responsibilities",
|
|
13
|
+
"regulation": "PSD2",
|
|
14
|
+
"articles": ["5", "11"],
|
|
15
|
+
"coverage": "full",
|
|
16
|
+
"notes": "Governance and internal control requirements"
|
|
17
|
+
},
|
|
18
|
+
{
|
|
19
|
+
"control_id": "A.5.24",
|
|
20
|
+
"control_name": "Information security incident management planning and preparation",
|
|
21
|
+
"regulation": "PSD2",
|
|
22
|
+
"articles": ["96"],
|
|
23
|
+
"coverage": "full",
|
|
24
|
+
"notes": "Incident reporting framework for PSPs"
|
|
25
|
+
},
|
|
26
|
+
{
|
|
27
|
+
"control_id": "A.5.31",
|
|
28
|
+
"control_name": "Legal, statutory, regulatory and contractual requirements",
|
|
29
|
+
"regulation": "PSD2",
|
|
30
|
+
"articles": ["1", "2"],
|
|
31
|
+
"coverage": "full",
|
|
32
|
+
"notes": "Authorization and operating requirements for PSPs"
|
|
33
|
+
},
|
|
34
|
+
{
|
|
35
|
+
"control_id": "A.5.33",
|
|
36
|
+
"control_name": "Protection of records",
|
|
37
|
+
"regulation": "PSD2",
|
|
38
|
+
"articles": ["5", "40"],
|
|
39
|
+
"coverage": "full",
|
|
40
|
+
"notes": "Record keeping and transparency requirements"
|
|
41
|
+
},
|
|
42
|
+
{
|
|
43
|
+
"control_id": "A.5.34",
|
|
44
|
+
"control_name": "Privacy and protection of PII",
|
|
45
|
+
"regulation": "PSD2",
|
|
46
|
+
"articles": ["94"],
|
|
47
|
+
"coverage": "full",
|
|
48
|
+
"notes": "Data protection requirements for payment data"
|
|
49
|
+
},
|
|
50
|
+
{
|
|
51
|
+
"control_id": "A.6.8",
|
|
52
|
+
"control_name": "Information security event reporting",
|
|
53
|
+
"regulation": "PSD2",
|
|
54
|
+
"articles": ["96"],
|
|
55
|
+
"coverage": "full",
|
|
56
|
+
"notes": "Major incident notification requirements"
|
|
57
|
+
},
|
|
58
|
+
{
|
|
59
|
+
"control_id": "A.8.3",
|
|
60
|
+
"control_name": "Information access restriction",
|
|
61
|
+
"regulation": "PSD2",
|
|
62
|
+
"articles": ["66", "67", "97"],
|
|
63
|
+
"coverage": "full",
|
|
64
|
+
"notes": "Strong customer authentication requirements"
|
|
65
|
+
},
|
|
66
|
+
{
|
|
67
|
+
"control_id": "A.8.5",
|
|
68
|
+
"control_name": "Secure authentication",
|
|
69
|
+
"regulation": "PSD2",
|
|
70
|
+
"articles": ["97", "98"],
|
|
71
|
+
"coverage": "full",
|
|
72
|
+
"notes": "SCA and secure communication requirements"
|
|
73
|
+
},
|
|
74
|
+
{
|
|
75
|
+
"control_id": "A.8.24",
|
|
76
|
+
"control_name": "Use of cryptography",
|
|
77
|
+
"regulation": "PSD2",
|
|
78
|
+
"articles": ["95", "97"],
|
|
79
|
+
"coverage": "full",
|
|
80
|
+
"notes": "Encryption requirements for payment transactions"
|
|
81
|
+
}
|
|
82
|
+
]
|