@ansvar/eu-regulations-mcp 0.1.0 → 0.2.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (156) hide show
  1. package/LICENSE +190 -21
  2. package/README.md +159 -26
  3. package/data/seed/aifmd.json +432 -0
  4. package/data/seed/applicability/ai-act.json +87 -0
  5. package/data/seed/applicability/aifmd.json +74 -0
  6. package/data/seed/applicability/cbam.json +74 -0
  7. package/data/seed/applicability/cer.json +74 -0
  8. package/data/seed/applicability/cra.json +77 -0
  9. package/data/seed/applicability/csddd.json +74 -0
  10. package/data/seed/applicability/csrd.json +74 -0
  11. package/data/seed/applicability/cyber_solidarity.json +74 -0
  12. package/data/seed/applicability/cybersecurity-act.json +69 -0
  13. package/data/seed/applicability/data-act.json +71 -0
  14. package/data/seed/applicability/dga.json +74 -0
  15. package/data/seed/applicability/dma.json +77 -0
  16. package/data/seed/applicability/dsa.json +71 -0
  17. package/data/seed/applicability/eecc.json +74 -0
  18. package/data/seed/applicability/ehds.json +74 -0
  19. package/data/seed/applicability/eidas2.json +86 -0
  20. package/data/seed/applicability/eprivacy.json +74 -0
  21. package/data/seed/applicability/eu_taxonomy.json +74 -0
  22. package/data/seed/applicability/eucc.json +74 -0
  23. package/data/seed/applicability/eudr.json +74 -0
  24. package/data/seed/applicability/gpsr.json +74 -0
  25. package/data/seed/applicability/ivdr.json +74 -0
  26. package/data/seed/applicability/led.json +74 -0
  27. package/data/seed/applicability/machinery.json +74 -0
  28. package/data/seed/applicability/mdr.json +74 -0
  29. package/data/seed/applicability/mica.json +74 -0
  30. package/data/seed/applicability/mifid2.json +74 -0
  31. package/data/seed/applicability/mifir.json +74 -0
  32. package/data/seed/applicability/pld.json +74 -0
  33. package/data/seed/applicability/psd2.json +74 -0
  34. package/data/seed/applicability/red.json +74 -0
  35. package/data/seed/applicability/sfdr.json +74 -0
  36. package/data/seed/applicability/un-r155.json +68 -0
  37. package/data/seed/applicability/un-r156.json +68 -0
  38. package/data/seed/cbam.json +397 -0
  39. package/data/seed/cer.json +233 -0
  40. package/data/seed/csddd.json +205 -0
  41. package/data/seed/csrd.json +50 -0
  42. package/data/seed/cyber_solidarity.json +252 -0
  43. package/data/seed/data-act.json +517 -0
  44. package/data/seed/dga.json +342 -0
  45. package/data/seed/dma.json +499 -0
  46. package/data/seed/dsa.json +686 -0
  47. package/data/seed/eecc.json +981 -0
  48. package/data/seed/ehds.json +638 -0
  49. package/data/seed/eidas2.json +590 -0
  50. package/data/seed/eprivacy.json +115 -0
  51. package/data/seed/eu_taxonomy.json +285 -0
  52. package/data/seed/eucc.json +386 -0
  53. package/data/seed/eudr.json +401 -0
  54. package/data/seed/gpsr.json +462 -0
  55. package/data/seed/ivdr.json +1036 -0
  56. package/data/seed/led.json +480 -0
  57. package/data/seed/machinery.json +513 -0
  58. package/data/seed/mappings/iso27001-ai-act.json +114 -0
  59. package/data/seed/mappings/iso27001-aifmd.json +50 -0
  60. package/data/seed/mappings/iso27001-cbam.json +26 -0
  61. package/data/seed/mappings/iso27001-cer.json +74 -0
  62. package/data/seed/mappings/iso27001-cra.json +130 -0
  63. package/data/seed/mappings/iso27001-csddd.json +50 -0
  64. package/data/seed/mappings/iso27001-csrd.json +26 -0
  65. package/data/seed/mappings/iso27001-cyber_solidarity.json +82 -0
  66. package/data/seed/mappings/iso27001-cybersecurity-act.json +90 -0
  67. package/data/seed/mappings/iso27001-data-act.json +66 -0
  68. package/data/seed/mappings/iso27001-dga.json +50 -0
  69. package/data/seed/mappings/iso27001-dma.json +50 -0
  70. package/data/seed/mappings/iso27001-dsa.json +58 -0
  71. package/data/seed/mappings/iso27001-eecc.json +74 -0
  72. package/data/seed/mappings/iso27001-ehds.json +90 -0
  73. package/data/seed/mappings/iso27001-eidas2.json +106 -0
  74. package/data/seed/mappings/iso27001-eprivacy.json +66 -0
  75. package/data/seed/mappings/iso27001-eu_taxonomy.json +34 -0
  76. package/data/seed/mappings/iso27001-eucc.json +66 -0
  77. package/data/seed/mappings/iso27001-eudr.json +34 -0
  78. package/data/seed/mappings/iso27001-gpsr.json +42 -0
  79. package/data/seed/mappings/iso27001-ivdr.json +66 -0
  80. package/data/seed/mappings/iso27001-led.json +74 -0
  81. package/data/seed/mappings/iso27001-machinery.json +50 -0
  82. package/data/seed/mappings/iso27001-mdr.json +82 -0
  83. package/data/seed/mappings/iso27001-mica.json +66 -0
  84. package/data/seed/mappings/iso27001-mifid2.json +66 -0
  85. package/data/seed/mappings/iso27001-mifir.json +42 -0
  86. package/data/seed/mappings/iso27001-pld.json +26 -0
  87. package/data/seed/mappings/iso27001-psd2.json +82 -0
  88. package/data/seed/mappings/iso27001-red.json +42 -0
  89. package/data/seed/mappings/iso27001-sfdr.json +50 -0
  90. package/data/seed/mappings/iso27001-un-r155.json +130 -0
  91. package/data/seed/mappings/iso27001-un-r156.json +106 -0
  92. package/data/seed/mappings/nist-csf-ai-act.json +138 -0
  93. package/data/seed/mappings/nist-csf-aifmd.json +58 -0
  94. package/data/seed/mappings/nist-csf-cbam.json +42 -0
  95. package/data/seed/mappings/nist-csf-cer.json +90 -0
  96. package/data/seed/mappings/nist-csf-cra.json +130 -0
  97. package/data/seed/mappings/nist-csf-csddd.json +50 -0
  98. package/data/seed/mappings/nist-csf-csrd.json +34 -0
  99. package/data/seed/mappings/nist-csf-cyber_solidarity.json +90 -0
  100. package/data/seed/mappings/nist-csf-cybersecurity-act.json +90 -0
  101. package/data/seed/mappings/nist-csf-data-act.json +50 -0
  102. package/data/seed/mappings/nist-csf-dga.json +58 -0
  103. package/data/seed/mappings/nist-csf-dma.json +42 -0
  104. package/data/seed/mappings/nist-csf-dora.json +210 -0
  105. package/data/seed/mappings/nist-csf-dsa.json +82 -0
  106. package/data/seed/mappings/nist-csf-eecc.json +90 -0
  107. package/data/seed/mappings/nist-csf-ehds.json +98 -0
  108. package/data/seed/mappings/nist-csf-eidas2.json +114 -0
  109. package/data/seed/mappings/nist-csf-eprivacy.json +58 -0
  110. package/data/seed/mappings/nist-csf-eu_taxonomy.json +34 -0
  111. package/data/seed/mappings/nist-csf-eucc.json +66 -0
  112. package/data/seed/mappings/nist-csf-eudr.json +58 -0
  113. package/data/seed/mappings/nist-csf-gdpr.json +178 -0
  114. package/data/seed/mappings/nist-csf-gpsr.json +58 -0
  115. package/data/seed/mappings/nist-csf-ivdr.json +66 -0
  116. package/data/seed/mappings/nist-csf-led.json +74 -0
  117. package/data/seed/mappings/nist-csf-machinery.json +58 -0
  118. package/data/seed/mappings/nist-csf-mdr.json +66 -0
  119. package/data/seed/mappings/nist-csf-mica.json +98 -0
  120. package/data/seed/mappings/nist-csf-mifid2.json +74 -0
  121. package/data/seed/mappings/nist-csf-mifir.json +50 -0
  122. package/data/seed/mappings/nist-csf-nis2.json +194 -0
  123. package/data/seed/mappings/nist-csf-pld.json +34 -0
  124. package/data/seed/mappings/nist-csf-psd2.json +98 -0
  125. package/data/seed/mappings/nist-csf-red.json +58 -0
  126. package/data/seed/mappings/nist-csf-sfdr.json +42 -0
  127. package/data/seed/mappings/nist-csf-un-r155.json +130 -0
  128. package/data/seed/mappings/nist-csf-un-r156.json +98 -0
  129. package/data/seed/mdr.json +1066 -0
  130. package/data/seed/mica.json +1003 -0
  131. package/data/seed/mifid2.json +906 -0
  132. package/data/seed/mifir.json +512 -0
  133. package/data/seed/pld.json +244 -0
  134. package/data/seed/psd2.json +827 -0
  135. package/data/seed/red.json +452 -0
  136. package/data/seed/sfdr.json +228 -0
  137. package/data/seed/un-r155.json +166 -0
  138. package/data/seed/un-r156.json +150 -0
  139. package/dist/http-server.d.ts +9 -0
  140. package/dist/http-server.d.ts.map +1 -0
  141. package/dist/http-server.js +342 -0
  142. package/dist/http-server.js.map +1 -0
  143. package/dist/index.js +4 -4
  144. package/dist/index.js.map +1 -1
  145. package/dist/tools/map.d.ts +1 -1
  146. package/dist/tools/map.d.ts.map +1 -1
  147. package/dist/tools/map.js +3 -3
  148. package/dist/tools/map.js.map +1 -1
  149. package/package.json +8 -3
  150. package/scripts/build-db.ts +20 -8
  151. package/scripts/check-updates.ts +141 -39
  152. package/scripts/ingest-eurlex.ts +9 -1
  153. package/scripts/ingest-unece.ts +368 -0
  154. package/src/http-server.ts +380 -0
  155. package/src/index.ts +4 -4
  156. package/src/tools/map.ts +4 -4
@@ -0,0 +1,42 @@
1
+ [
2
+ {
3
+ "control_id": "A.5.1",
4
+ "control_name": "Policies for information security",
5
+ "regulation": "RED",
6
+ "articles": ["3", "10"],
7
+ "coverage": "partial",
8
+ "notes": "Security requirements for radio equipment"
9
+ },
10
+ {
11
+ "control_id": "A.5.31",
12
+ "control_name": "Legal, statutory, regulatory and contractual requirements",
13
+ "regulation": "RED",
14
+ "articles": ["1", "2"],
15
+ "coverage": "full",
16
+ "notes": "Framework for radio equipment market access"
17
+ },
18
+ {
19
+ "control_id": "A.5.33",
20
+ "control_name": "Protection of records",
21
+ "regulation": "RED",
22
+ "articles": ["10", "11", "12"],
23
+ "coverage": "full",
24
+ "notes": "Technical documentation and conformity records"
25
+ },
26
+ {
27
+ "control_id": "A.8.24",
28
+ "control_name": "Use of cryptography",
29
+ "regulation": "RED",
30
+ "articles": ["3"],
31
+ "coverage": "partial",
32
+ "notes": "Security requirements including encryption for connected devices"
33
+ },
34
+ {
35
+ "control_id": "A.8.28",
36
+ "control_name": "Secure coding",
37
+ "regulation": "RED",
38
+ "articles": ["3"],
39
+ "coverage": "partial",
40
+ "notes": "Software security for radio equipment"
41
+ }
42
+ ]
@@ -0,0 +1,50 @@
1
+ [
2
+ {
3
+ "control_id": "A.5.1",
4
+ "control_name": "Policies for information security",
5
+ "regulation": "SFDR",
6
+ "articles": ["3", "4"],
7
+ "coverage": "partial",
8
+ "notes": "Policies on integration of sustainability risks in investment decisions"
9
+ },
10
+ {
11
+ "control_id": "A.5.10",
12
+ "control_name": "Acceptable use of information and other associated assets",
13
+ "regulation": "SFDR",
14
+ "articles": ["4", "7"],
15
+ "coverage": "partial",
16
+ "notes": "Rules on use of sustainability information for disclosure"
17
+ },
18
+ {
19
+ "control_id": "A.5.12",
20
+ "control_name": "Classification of information",
21
+ "regulation": "SFDR",
22
+ "articles": ["8", "9"],
23
+ "coverage": "full",
24
+ "notes": "Financial products classified by sustainability characteristics"
25
+ },
26
+ {
27
+ "control_id": "A.5.31",
28
+ "control_name": "Legal, statutory, regulatory and contractual requirements",
29
+ "regulation": "SFDR",
30
+ "articles": ["1", "2"],
31
+ "coverage": "full",
32
+ "notes": "Establishes disclosure requirements for financial services sector"
33
+ },
34
+ {
35
+ "control_id": "A.5.33",
36
+ "control_name": "Protection of records",
37
+ "regulation": "SFDR",
38
+ "articles": ["10", "11"],
39
+ "coverage": "partial",
40
+ "notes": "Website disclosures and periodic reporting requirements"
41
+ },
42
+ {
43
+ "control_id": "A.5.34",
44
+ "control_name": "Privacy and protection of PII",
45
+ "regulation": "SFDR",
46
+ "articles": ["1"],
47
+ "coverage": "partial",
48
+ "notes": "SFDR complements GDPR requirements"
49
+ }
50
+ ]
@@ -0,0 +1,130 @@
1
+ [
2
+ {
3
+ "control_id": "A.5.1",
4
+ "control_name": "Policies for information security",
5
+ "regulation": "UN_R155",
6
+ "articles": ["7"],
7
+ "coverage": "full",
8
+ "notes": "Section 7 requires Cyber Security Management System (CSMS) with documented policies"
9
+ },
10
+ {
11
+ "control_id": "A.5.2",
12
+ "control_name": "Information security roles and responsibilities",
13
+ "regulation": "UN_R155",
14
+ "articles": ["7"],
15
+ "coverage": "full",
16
+ "notes": "Section 7.2.2.2 requires defined organizational roles for cybersecurity"
17
+ },
18
+ {
19
+ "control_id": "A.5.8",
20
+ "control_name": "Information security in project management",
21
+ "regulation": "UN_R155",
22
+ "articles": ["7", "Annex 5"],
23
+ "coverage": "full",
24
+ "notes": "Section 7 CSMS covers vehicle development lifecycle, Annex 5 lists threats to mitigate"
25
+ },
26
+ {
27
+ "control_id": "A.5.19",
28
+ "control_name": "Information security in supplier relationships",
29
+ "regulation": "UN_R155",
30
+ "articles": ["7"],
31
+ "coverage": "full",
32
+ "notes": "Section 7.2.2.3 requires managing cybersecurity risks from suppliers and service providers"
33
+ },
34
+ {
35
+ "control_id": "A.5.20",
36
+ "control_name": "Addressing information security within supplier agreements",
37
+ "regulation": "UN_R155",
38
+ "articles": ["7"],
39
+ "coverage": "full",
40
+ "notes": "Section 7.2.2.3 requires supplier contracts to address cybersecurity requirements"
41
+ },
42
+ {
43
+ "control_id": "A.5.29",
44
+ "control_name": "Information security during disruption",
45
+ "regulation": "UN_R155",
46
+ "articles": ["7", "Annex 5"],
47
+ "coverage": "partial",
48
+ "notes": "Annex 5 includes availability threats; CSMS must address operational continuity"
49
+ },
50
+ {
51
+ "control_id": "A.5.31",
52
+ "control_name": "Legal, statutory, regulatory and contractual requirements",
53
+ "regulation": "UN_R155",
54
+ "articles": ["1", "5"],
55
+ "coverage": "full",
56
+ "notes": "Section 1 scope, Section 5 type approval requirements for vehicle cybersecurity"
57
+ },
58
+ {
59
+ "control_id": "A.6.3",
60
+ "control_name": "Information security awareness, education and training",
61
+ "regulation": "UN_R155",
62
+ "articles": ["7"],
63
+ "coverage": "partial",
64
+ "notes": "Section 7.2.2.2 implies competent personnel for CSMS implementation"
65
+ },
66
+ {
67
+ "control_id": "A.6.8",
68
+ "control_name": "Information security event reporting",
69
+ "regulation": "UN_R155",
70
+ "articles": ["7"],
71
+ "coverage": "full",
72
+ "notes": "Section 7.2.2.4 requires monitoring, detecting and responding to cyber attacks"
73
+ },
74
+ {
75
+ "control_id": "A.8.8",
76
+ "control_name": "Management of technical vulnerabilities",
77
+ "regulation": "UN_R155",
78
+ "articles": ["7", "Annex 5"],
79
+ "coverage": "full",
80
+ "notes": "Section 7.2.2.5 requires identification and remediation of vulnerabilities"
81
+ },
82
+ {
83
+ "control_id": "A.8.9",
84
+ "control_name": "Configuration management",
85
+ "regulation": "UN_R155",
86
+ "articles": ["7"],
87
+ "coverage": "partial",
88
+ "notes": "Section 7 CSMS includes secure configuration management for vehicle systems"
89
+ },
90
+ {
91
+ "control_id": "A.8.16",
92
+ "control_name": "Monitoring activities",
93
+ "regulation": "UN_R155",
94
+ "articles": ["7"],
95
+ "coverage": "full",
96
+ "notes": "Section 7.2.2.4 requires monitoring and detection of cyber threats"
97
+ },
98
+ {
99
+ "control_id": "A.8.24",
100
+ "control_name": "Use of cryptography",
101
+ "regulation": "UN_R155",
102
+ "articles": ["7", "Annex 5"],
103
+ "coverage": "full",
104
+ "notes": "Annex 5 Part A.3.1 lists cryptographic controls as mitigations for threats"
105
+ },
106
+ {
107
+ "control_id": "A.8.25",
108
+ "control_name": "Secure development life cycle",
109
+ "regulation": "UN_R155",
110
+ "articles": ["7"],
111
+ "coverage": "full",
112
+ "notes": "Section 7.2.2.2 requires cybersecurity in vehicle type development process"
113
+ },
114
+ {
115
+ "control_id": "A.8.26",
116
+ "control_name": "Application security requirements",
117
+ "regulation": "UN_R155",
118
+ "articles": ["7", "Annex 5"],
119
+ "coverage": "full",
120
+ "notes": "Annex 5 defines security requirements for vehicle software and communications"
121
+ },
122
+ {
123
+ "control_id": "A.8.29",
124
+ "control_name": "Security testing in development and acceptance",
125
+ "regulation": "UN_R155",
126
+ "articles": ["7"],
127
+ "coverage": "full",
128
+ "notes": "Section 7.2.2.2 requires testing and validation of cybersecurity measures"
129
+ }
130
+ ]
@@ -0,0 +1,106 @@
1
+ [
2
+ {
3
+ "control_id": "A.5.1",
4
+ "control_name": "Policies for information security",
5
+ "regulation": "UN_R156",
6
+ "articles": ["7"],
7
+ "coverage": "full",
8
+ "notes": "Section 7 requires Software Update Management System (SUMS) with documented policies"
9
+ },
10
+ {
11
+ "control_id": "A.5.2",
12
+ "control_name": "Information security roles and responsibilities",
13
+ "regulation": "UN_R156",
14
+ "articles": ["7"],
15
+ "coverage": "full",
16
+ "notes": "Section 7.1.2 requires defined organizational processes for software update management"
17
+ },
18
+ {
19
+ "control_id": "A.5.8",
20
+ "control_name": "Information security in project management",
21
+ "regulation": "UN_R156",
22
+ "articles": ["7"],
23
+ "coverage": "full",
24
+ "notes": "Section 7 SUMS covers software update lifecycle including OTA updates"
25
+ },
26
+ {
27
+ "control_id": "A.5.19",
28
+ "control_name": "Information security in supplier relationships",
29
+ "regulation": "UN_R156",
30
+ "articles": ["7"],
31
+ "coverage": "partial",
32
+ "notes": "Section 7 implies supplier management for software components affecting vehicle type"
33
+ },
34
+ {
35
+ "control_id": "A.5.31",
36
+ "control_name": "Legal, statutory, regulatory and contractual requirements",
37
+ "regulation": "UN_R156",
38
+ "articles": ["1", "5"],
39
+ "coverage": "full",
40
+ "notes": "Section 1 scope, Section 5 type approval requirements for software updates"
41
+ },
42
+ {
43
+ "control_id": "A.6.8",
44
+ "control_name": "Information security event reporting",
45
+ "regulation": "UN_R156",
46
+ "articles": ["7"],
47
+ "coverage": "partial",
48
+ "notes": "Section 7.1.3 requires documentation of software update processes including failures"
49
+ },
50
+ {
51
+ "control_id": "A.8.8",
52
+ "control_name": "Management of technical vulnerabilities",
53
+ "regulation": "UN_R156",
54
+ "articles": ["7"],
55
+ "coverage": "full",
56
+ "notes": "Section 7 SUMS addresses security-relevant software updates and patches"
57
+ },
58
+ {
59
+ "control_id": "A.8.9",
60
+ "control_name": "Configuration management",
61
+ "regulation": "UN_R156",
62
+ "articles": ["7"],
63
+ "coverage": "full",
64
+ "notes": "Section 7.1.2 requires RXSWIN (Rx Software Identification Number) for version tracking"
65
+ },
66
+ {
67
+ "control_id": "A.8.15",
68
+ "control_name": "Logging",
69
+ "regulation": "UN_R156",
70
+ "articles": ["7"],
71
+ "coverage": "partial",
72
+ "notes": "Section 7 requires documentation and traceability of software updates"
73
+ },
74
+ {
75
+ "control_id": "A.8.24",
76
+ "control_name": "Use of cryptography",
77
+ "regulation": "UN_R156",
78
+ "articles": ["7"],
79
+ "coverage": "full",
80
+ "notes": "Section 7.2 requires integrity verification of software updates using cryptographic mechanisms"
81
+ },
82
+ {
83
+ "control_id": "A.8.25",
84
+ "control_name": "Secure development life cycle",
85
+ "regulation": "UN_R156",
86
+ "articles": ["7"],
87
+ "coverage": "full",
88
+ "notes": "Section 7 integrates SUMS into vehicle development and maintenance lifecycle"
89
+ },
90
+ {
91
+ "control_id": "A.8.29",
92
+ "control_name": "Security testing in development and acceptance",
93
+ "regulation": "UN_R156",
94
+ "articles": ["7"],
95
+ "coverage": "full",
96
+ "notes": "Section 7.2 requires testing and validation before software updates are released"
97
+ },
98
+ {
99
+ "control_id": "A.8.32",
100
+ "control_name": "Change management",
101
+ "regulation": "UN_R156",
102
+ "articles": ["7", "8"],
103
+ "coverage": "full",
104
+ "notes": "Section 7 SUMS manages software changes, Section 8 covers vehicle type modifications"
105
+ }
106
+ ]
@@ -0,0 +1,138 @@
1
+ [
2
+ {
3
+ "control_id": "GV.OC-01",
4
+ "control_name": "Organizational context",
5
+ "regulation": "AI_ACT",
6
+ "articles": ["1", "2", "5", "6"],
7
+ "coverage": "full",
8
+ "notes": "Art 1-2 scope, Art 5 prohibited practices, Art 6 high-risk classification"
9
+ },
10
+ {
11
+ "control_id": "GV.RM-01",
12
+ "control_name": "Risk management objectives",
13
+ "regulation": "AI_ACT",
14
+ "articles": ["9"],
15
+ "coverage": "full",
16
+ "notes": "Art 9 comprehensive risk management system for high-risk AI"
17
+ },
18
+ {
19
+ "control_id": "GV.RR-01",
20
+ "control_name": "Organizational roles and responsibilities",
21
+ "regulation": "AI_ACT",
22
+ "articles": ["16", "26", "27"],
23
+ "coverage": "full",
24
+ "notes": "Art 16 provider, Art 26 deployer, Art 27 fundamental rights obligations"
25
+ },
26
+ {
27
+ "control_id": "GV.PO-01",
28
+ "control_name": "Cybersecurity policy",
29
+ "regulation": "AI_ACT",
30
+ "articles": ["9", "15", "17"],
31
+ "coverage": "full",
32
+ "notes": "Art 9 risk management, Art 15 robustness, Art 17 quality management"
33
+ },
34
+ {
35
+ "control_id": "GV.OV-01",
36
+ "control_name": "Cybersecurity risk management oversight",
37
+ "regulation": "AI_ACT",
38
+ "articles": ["72"],
39
+ "coverage": "full",
40
+ "notes": "Art 72 post-market monitoring obligations"
41
+ },
42
+ {
43
+ "control_id": "ID.AM-01",
44
+ "control_name": "Inventories of assets",
45
+ "regulation": "AI_ACT",
46
+ "articles": ["18", "71"],
47
+ "coverage": "full",
48
+ "notes": "Art 18 technical documentation, Art 71 EU AI database registration"
49
+ },
50
+ {
51
+ "control_id": "ID.RA-01",
52
+ "control_name": "Vulnerabilities in assets are identified",
53
+ "regulation": "AI_ACT",
54
+ "articles": ["9", "15"],
55
+ "coverage": "full",
56
+ "notes": "Art 9 risk identification, Art 15 robustness requirements"
57
+ },
58
+ {
59
+ "control_id": "ID.RA-03",
60
+ "control_name": "Internal and external threats are identified",
61
+ "regulation": "AI_ACT",
62
+ "articles": ["9", "15"],
63
+ "coverage": "full",
64
+ "notes": "Art 9 threat assessment in risk management, Art 15 adversarial robustness"
65
+ },
66
+ {
67
+ "control_id": "ID.RA-05",
68
+ "control_name": "Risk responses are identified",
69
+ "regulation": "AI_ACT",
70
+ "articles": ["9"],
71
+ "coverage": "full",
72
+ "notes": "Art 9 requires risk mitigation measures throughout lifecycle"
73
+ },
74
+ {
75
+ "control_id": "PR.AA-05",
76
+ "control_name": "Access permissions and authorizations are managed",
77
+ "regulation": "AI_ACT",
78
+ "articles": ["14"],
79
+ "coverage": "full",
80
+ "notes": "Art 14 human oversight includes access controls"
81
+ },
82
+ {
83
+ "control_id": "PR.AT-01",
84
+ "control_name": "Awareness and training provided",
85
+ "regulation": "AI_ACT",
86
+ "articles": ["4", "14"],
87
+ "coverage": "full",
88
+ "notes": "Art 4 AI literacy requirements, Art 14 trained human oversight"
89
+ },
90
+ {
91
+ "control_id": "PR.DS-01",
92
+ "control_name": "Data-at-rest is protected",
93
+ "regulation": "AI_ACT",
94
+ "articles": ["10"],
95
+ "coverage": "partial",
96
+ "notes": "Art 10 data governance includes data protection measures"
97
+ },
98
+ {
99
+ "control_id": "PR.DS-10",
100
+ "control_name": "Data is disposed of properly",
101
+ "regulation": "AI_ACT",
102
+ "articles": ["10"],
103
+ "coverage": "partial",
104
+ "notes": "Art 10 data governance includes retention policies"
105
+ },
106
+ {
107
+ "control_id": "DE.CM-01",
108
+ "control_name": "Networks and network services are monitored",
109
+ "regulation": "AI_ACT",
110
+ "articles": ["12", "72"],
111
+ "coverage": "full",
112
+ "notes": "Art 12 automatic logging, Art 72 post-market monitoring"
113
+ },
114
+ {
115
+ "control_id": "DE.AE-02",
116
+ "control_name": "Potentially adverse events are analyzed",
117
+ "regulation": "AI_ACT",
118
+ "articles": ["12", "72"],
119
+ "coverage": "full",
120
+ "notes": "Art 12 logging for analysis, Art 72 incident analysis"
121
+ },
122
+ {
123
+ "control_id": "RS.MA-01",
124
+ "control_name": "Incident response plan is executed",
125
+ "regulation": "AI_ACT",
126
+ "articles": ["73"],
127
+ "coverage": "full",
128
+ "notes": "Art 73 serious incident reporting requirements"
129
+ },
130
+ {
131
+ "control_id": "RS.CO-03",
132
+ "control_name": "Information is shared with designated external parties",
133
+ "regulation": "AI_ACT",
134
+ "articles": ["73"],
135
+ "coverage": "full",
136
+ "notes": "Art 73 requires reporting to market surveillance authorities"
137
+ }
138
+ ]
@@ -0,0 +1,58 @@
1
+ [
2
+ {
3
+ "control_id": "GV.OC-01",
4
+ "control_name": "Organizational context",
5
+ "regulation": "AIFMD",
6
+ "articles": ["1", "2", "3", "4"],
7
+ "coverage": "full",
8
+ "notes": "Alternative investment fund management context"
9
+ },
10
+ {
11
+ "control_id": "GV.RM-01",
12
+ "control_name": "Risk management objectives",
13
+ "regulation": "AIFMD",
14
+ "articles": ["15", "16"],
15
+ "coverage": "full",
16
+ "notes": "Risk management requirements for AIFMs"
17
+ },
18
+ {
19
+ "control_id": "GV.RR-01",
20
+ "control_name": "Organizational roles and responsibilities",
21
+ "regulation": "AIFMD",
22
+ "articles": ["18", "19", "20"],
23
+ "coverage": "full",
24
+ "notes": "AIFM organizational requirements"
25
+ },
26
+ {
27
+ "control_id": "GV.SC-01",
28
+ "control_name": "Supply chain risk management program",
29
+ "regulation": "AIFMD",
30
+ "articles": ["20"],
31
+ "coverage": "full",
32
+ "notes": "Delegation arrangements and oversight"
33
+ },
34
+ {
35
+ "control_id": "ID.AM-01",
36
+ "control_name": "Inventories of assets",
37
+ "regulation": "AIFMD",
38
+ "articles": ["21"],
39
+ "coverage": "full",
40
+ "notes": "Depositary asset safekeeping"
41
+ },
42
+ {
43
+ "control_id": "PR.DS-01",
44
+ "control_name": "Data-at-rest is protected",
45
+ "regulation": "AIFMD",
46
+ "articles": ["22", "24"],
47
+ "coverage": "partial",
48
+ "notes": "Record keeping and reporting data protection"
49
+ },
50
+ {
51
+ "control_id": "RS.CO-03",
52
+ "control_name": "Information is shared with designated external parties",
53
+ "regulation": "AIFMD",
54
+ "articles": ["24", "25"],
55
+ "coverage": "full",
56
+ "notes": "Reporting to competent authorities"
57
+ }
58
+ ]
@@ -0,0 +1,42 @@
1
+ [
2
+ {
3
+ "control_id": "GV.OC-01",
4
+ "control_name": "Organizational context",
5
+ "regulation": "CBAM",
6
+ "articles": ["1", "2"],
7
+ "coverage": "full",
8
+ "notes": "Carbon border adjustment mechanism context"
9
+ },
10
+ {
11
+ "control_id": "GV.RR-01",
12
+ "control_name": "Organizational roles and responsibilities",
13
+ "regulation": "CBAM",
14
+ "articles": ["5", "6", "7"],
15
+ "coverage": "full",
16
+ "notes": "Authorized CBAM declarant responsibilities"
17
+ },
18
+ {
19
+ "control_id": "ID.AM-01",
20
+ "control_name": "Inventories of assets",
21
+ "regulation": "CBAM",
22
+ "articles": ["7", "8", "9"],
23
+ "coverage": "full",
24
+ "notes": "CBAM declarations and embedded emissions data"
25
+ },
26
+ {
27
+ "control_id": "PR.DS-01",
28
+ "control_name": "Data-at-rest is protected",
29
+ "regulation": "CBAM",
30
+ "articles": ["10", "11"],
31
+ "coverage": "partial",
32
+ "notes": "Protection of emissions data and declarations"
33
+ },
34
+ {
35
+ "control_id": "RS.CO-03",
36
+ "control_name": "Information is shared with designated external parties",
37
+ "regulation": "CBAM",
38
+ "articles": ["33", "34"],
39
+ "coverage": "full",
40
+ "notes": "Reporting to competent authorities"
41
+ }
42
+ ]
@@ -0,0 +1,90 @@
1
+ [
2
+ {
3
+ "control_id": "GV.OC-01",
4
+ "control_name": "Organizational context",
5
+ "regulation": "CER",
6
+ "articles": ["1", "2"],
7
+ "coverage": "full",
8
+ "notes": "Critical entities resilience regulatory context"
9
+ },
10
+ {
11
+ "control_id": "GV.RM-01",
12
+ "control_name": "Risk management objectives",
13
+ "regulation": "CER",
14
+ "articles": ["12", "13"],
15
+ "coverage": "full",
16
+ "notes": "Risk assessment for critical entities"
17
+ },
18
+ {
19
+ "control_id": "GV.RR-01",
20
+ "control_name": "Organizational roles and responsibilities",
21
+ "regulation": "CER",
22
+ "articles": ["9", "13"],
23
+ "coverage": "full",
24
+ "notes": "Critical entity resilience responsibilities"
25
+ },
26
+ {
27
+ "control_id": "GV.PO-01",
28
+ "control_name": "Cybersecurity policy",
29
+ "regulation": "CER",
30
+ "articles": ["13", "14"],
31
+ "coverage": "full",
32
+ "notes": "Resilience policies for critical entities"
33
+ },
34
+ {
35
+ "control_id": "ID.RA-01",
36
+ "control_name": "Vulnerabilities in assets are identified",
37
+ "regulation": "CER",
38
+ "articles": ["12"],
39
+ "coverage": "full",
40
+ "notes": "National risk assessment requirements"
41
+ },
42
+ {
43
+ "control_id": "ID.RA-03",
44
+ "control_name": "Internal and external threats are identified",
45
+ "regulation": "CER",
46
+ "articles": ["12", "13"],
47
+ "coverage": "full",
48
+ "notes": "Threat identification for critical infrastructure"
49
+ },
50
+ {
51
+ "control_id": "PR.IR-01",
52
+ "control_name": "Incident response plan exists",
53
+ "regulation": "CER",
54
+ "articles": ["13", "14"],
55
+ "coverage": "full",
56
+ "notes": "Incident response and resilience measures"
57
+ },
58
+ {
59
+ "control_id": "DE.CM-01",
60
+ "control_name": "Networks and network services are monitored",
61
+ "regulation": "CER",
62
+ "articles": ["13"],
63
+ "coverage": "partial",
64
+ "notes": "Physical and technical monitoring measures"
65
+ },
66
+ {
67
+ "control_id": "RS.CO-02",
68
+ "control_name": "Incidents are reported internally",
69
+ "regulation": "CER",
70
+ "articles": ["15"],
71
+ "coverage": "full",
72
+ "notes": "Internal incident notification processes"
73
+ },
74
+ {
75
+ "control_id": "RS.CO-03",
76
+ "control_name": "Information is shared with designated external parties",
77
+ "regulation": "CER",
78
+ "articles": ["9", "15"],
79
+ "coverage": "full",
80
+ "notes": "Incident notification to competent authorities"
81
+ },
82
+ {
83
+ "control_id": "RC.RP-01",
84
+ "control_name": "Recovery plan is executed",
85
+ "regulation": "CER",
86
+ "articles": ["13"],
87
+ "coverage": "full",
88
+ "notes": "Business continuity for critical services"
89
+ }
90
+ ]