@blamejs/exceptd-skills 0.12.13 → 0.12.15
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +150 -0
- package/bin/exceptd.js +147 -9
- package/data/_indexes/_meta.json +45 -45
- package/data/_indexes/activity-feed.json +4 -4
- package/data/_indexes/catalog-summaries.json +29 -29
- package/data/_indexes/chains.json +3238 -3210
- package/data/_indexes/frequency.json +3 -0
- package/data/_indexes/jurisdiction-map.json +5 -3
- package/data/_indexes/section-offsets.json +712 -685
- package/data/_indexes/theater-fingerprints.json +1 -1
- package/data/_indexes/token-budget.json +355 -340
- package/data/atlas-ttps.json +144 -129
- package/data/attack-techniques.json +319 -76
- package/data/cve-catalog.json +515 -475
- package/data/cwe-catalog.json +1081 -759
- package/data/exploit-availability.json +63 -15
- package/data/framework-control-gaps.json +867 -843
- package/data/rfc-references.json +276 -276
- package/keys/EXPECTED_FINGERPRINT +1 -0
- package/lib/auto-discovery.js +21 -4
- package/lib/cross-ref-api.js +39 -6
- package/lib/cve-curation.js +18 -5
- package/lib/lint-skills.js +6 -1
- package/lib/playbook-runner.js +742 -78
- package/lib/refresh-external.js +40 -22
- package/lib/refresh-network.js +193 -17
- package/lib/scoring.js +20 -7
- package/lib/source-ghsa.js +219 -37
- package/lib/source-osv.js +381 -122
- package/lib/validate-catalog-meta.js +64 -9
- package/lib/validate-cve-catalog.js +56 -18
- package/lib/validate-indexes.js +88 -37
- package/lib/verify.js +72 -0
- package/manifest-snapshot.json +1 -1
- package/manifest-snapshot.sha256 +1 -0
- package/manifest.json +73 -73
- package/orchestrator/dispatcher.js +21 -1
- package/orchestrator/event-bus.js +52 -8
- package/orchestrator/index.js +279 -20
- package/orchestrator/pipeline.js +63 -2
- package/orchestrator/scanner.js +32 -10
- package/orchestrator/scheduler.js +150 -17
- package/package.json +3 -1
- package/sbom.cdx.json +7 -7
- package/scripts/check-manifest-snapshot.js +32 -0
- package/scripts/check-sbom-currency.js +65 -3
- package/scripts/check-test-coverage.js +142 -19
- package/scripts/predeploy.js +83 -39
- package/scripts/refresh-manifest-snapshot.js +55 -4
- package/scripts/validate-vendor-online.js +169 -0
- package/scripts/verify-shipped-tarball.js +106 -3
- package/skills/ai-attack-surface/skill.md +18 -10
- package/skills/ai-c2-detection/skill.md +7 -2
- package/skills/ai-risk-management/skill.md +5 -4
- package/skills/api-security/skill.md +3 -3
- package/skills/attack-surface-pentest/skill.md +5 -5
- package/skills/cloud-security/skill.md +1 -1
- package/skills/compliance-theater/skill.md +8 -8
- package/skills/container-runtime-security/skill.md +1 -1
- package/skills/dlp-gap-analysis/skill.md +5 -1
- package/skills/email-security-anti-phishing/skill.md +1 -1
- package/skills/exploit-scoring/skill.md +18 -18
- package/skills/framework-gap-analysis/skill.md +6 -6
- package/skills/global-grc/skill.md +3 -2
- package/skills/identity-assurance/skill.md +2 -2
- package/skills/incident-response-playbook/skill.md +4 -4
- package/skills/kernel-lpe-triage/skill.md +21 -2
- package/skills/mcp-agent-trust/skill.md +17 -10
- package/skills/mlops-security/skill.md +2 -1
- package/skills/ot-ics-security/skill.md +1 -1
- package/skills/policy-exception-gen/skill.md +3 -3
- package/skills/pqc-first/skill.md +1 -1
- package/skills/rag-pipeline-security/skill.md +7 -3
- package/skills/researcher/skill.md +20 -3
- package/skills/sector-energy/skill.md +1 -1
- package/skills/sector-federal-government/skill.md +1 -1
- package/skills/sector-financial/skill.md +3 -3
- package/skills/sector-healthcare/skill.md +2 -2
- package/skills/security-maturity-tiers/skill.md +7 -7
- package/skills/skill-update-loop/skill.md +19 -3
- package/skills/supply-chain-integrity/skill.md +1 -1
- package/skills/threat-model-currency/skill.md +11 -11
- package/skills/threat-modeling-methodology/skill.md +3 -3
- package/skills/webapp-security/skill.md +1 -1
- package/skills/zeroday-gap-learn/skill.md +51 -7
- package/vendor/blamejs/_PROVENANCE.json +4 -1
- package/vendor/blamejs/worker-pool.js +38 -0
|
@@ -16,64 +16,65 @@
|
|
|
16
16
|
"note": "Per-entry last_verified governs decay. Skills depending on this catalog must check entry freshness before high-stakes use."
|
|
17
17
|
}
|
|
18
18
|
},
|
|
19
|
-
"
|
|
20
|
-
"framework": "
|
|
21
|
-
"control_id": "
|
|
22
|
-
"control_name": "
|
|
23
|
-
"designed_for": "
|
|
19
|
+
"ALL-AI-PIPELINE-INTEGRITY": {
|
|
20
|
+
"framework": "ALL",
|
|
21
|
+
"control_id": "UNIVERSAL-GAP-001",
|
|
22
|
+
"control_name": "AI Pipeline Integrity",
|
|
23
|
+
"designed_for": "N/A — no framework has this control",
|
|
24
24
|
"misses": [
|
|
25
|
-
"
|
|
26
|
-
"
|
|
27
|
-
"
|
|
28
|
-
"
|
|
25
|
+
"Model versioning and change control for externally managed LLMs",
|
|
26
|
+
"Behavioral regression testing after model updates",
|
|
27
|
+
"Training pipeline integrity and poisoning detection",
|
|
28
|
+
"Model fingerprinting for unauthorized change detection",
|
|
29
|
+
"Output monitoring for safety-relevant behavioral changes"
|
|
29
30
|
],
|
|
30
|
-
"real_requirement": "
|
|
31
|
+
"real_requirement": "AI pipeline integrity controls: (1) model version pinning where API supports it, (2) behavioral test suite with regression alerting, (3) provider changelog monitoring, (4) training pipeline SLSA-equivalent supply chain attestation for self-hosted models.",
|
|
31
32
|
"status": "open",
|
|
32
|
-
"opened_date": "2026-
|
|
33
|
-
"evidence_cves": [
|
|
34
|
-
|
|
35
|
-
"
|
|
33
|
+
"opened_date": "2026-01-01",
|
|
34
|
+
"evidence_cves": [],
|
|
35
|
+
"atlas_refs": [
|
|
36
|
+
"AML.T0018",
|
|
37
|
+
"AML.T0020"
|
|
36
38
|
],
|
|
37
|
-
"
|
|
38
|
-
"attack_refs": [
|
|
39
|
-
"T1068"
|
|
40
|
-
]
|
|
39
|
+
"attack_refs": []
|
|
41
40
|
},
|
|
42
|
-
"
|
|
43
|
-
"framework": "
|
|
44
|
-
"control_id": "
|
|
45
|
-
"control_name": "
|
|
46
|
-
"designed_for": "
|
|
41
|
+
"ALL-MCP-TOOL-TRUST": {
|
|
42
|
+
"framework": "ALL",
|
|
43
|
+
"control_id": "UNIVERSAL-GAP-002",
|
|
44
|
+
"control_name": "MCP/Agent Tool Trust Boundaries",
|
|
45
|
+
"designed_for": "N/A — no framework has this control",
|
|
47
46
|
"misses": [
|
|
48
|
-
"
|
|
49
|
-
"No
|
|
47
|
+
"No framework requires signed MCP server manifests",
|
|
48
|
+
"No framework requires AI client tool allowlisting",
|
|
49
|
+
"No framework requires authentication between AI clients and MCP servers",
|
|
50
|
+
"Developer-installed AI tool plugins are outside all vendor management control scopes"
|
|
50
51
|
],
|
|
51
|
-
"real_requirement": "
|
|
52
|
+
"real_requirement": "MCP trust controls: signed server manifests, explicit tool allowlists, bearer authentication, sandboxed server processes, organizational approved-registry for MCP servers.",
|
|
52
53
|
"status": "open",
|
|
53
54
|
"opened_date": "2026-04-01",
|
|
54
55
|
"evidence_cves": [
|
|
55
|
-
"CVE-2026-
|
|
56
|
-
|
|
56
|
+
"CVE-2026-30615"
|
|
57
|
+
],
|
|
58
|
+
"atlas_refs": [
|
|
59
|
+
"AML.T0010"
|
|
57
60
|
],
|
|
58
|
-
"atlas_refs": [],
|
|
59
61
|
"attack_refs": [
|
|
60
|
-
"
|
|
62
|
+
"T1195.001"
|
|
61
63
|
]
|
|
62
64
|
},
|
|
63
|
-
"
|
|
64
|
-
"framework": "
|
|
65
|
-
"control_id": "
|
|
66
|
-
"control_name": "
|
|
67
|
-
"designed_for": "
|
|
65
|
+
"ALL-PROMPT-INJECTION-ACCESS-CONTROL": {
|
|
66
|
+
"framework": "ALL",
|
|
67
|
+
"control_id": "UNIVERSAL-GAP-003",
|
|
68
|
+
"control_name": "Prompt Injection as Access Control Failure",
|
|
69
|
+
"designed_for": "N/A — no framework has this control",
|
|
68
70
|
"misses": [
|
|
69
|
-
"
|
|
70
|
-
"
|
|
71
|
-
"No
|
|
72
|
-
"Audit trails show the service account, not the adversary who injected the prompt"
|
|
71
|
+
"Prompt injection routes around all existing access control frameworks",
|
|
72
|
+
"The AI agent's service account takes the unauthorized action — audit logs show authorized activity",
|
|
73
|
+
"No framework has controls for prompt-level authorization distinct from account-level authorization"
|
|
73
74
|
],
|
|
74
|
-
"real_requirement": "
|
|
75
|
+
"real_requirement": "Prompt-level access control: each model invocation is constrained to an authorized action scope. Actions outside that scope require explicit user re-authorization. System prompt establishes authority hierarchy.",
|
|
75
76
|
"status": "open",
|
|
76
|
-
"opened_date": "2026-
|
|
77
|
+
"opened_date": "2026-01-01",
|
|
77
78
|
"evidence_cves": [
|
|
78
79
|
"CVE-2025-53773"
|
|
79
80
|
],
|
|
@@ -85,202 +86,171 @@
|
|
|
85
86
|
"T1059"
|
|
86
87
|
]
|
|
87
88
|
},
|
|
88
|
-
"
|
|
89
|
-
"framework": "
|
|
90
|
-
"control_id": "
|
|
91
|
-
"control_name": "
|
|
92
|
-
"designed_for": "
|
|
93
|
-
"misses": [
|
|
94
|
-
"PROMPTFLUX generates unique evasion code per execution by querying public LLMs — no signature exists because every sample is novel",
|
|
95
|
-
"AI-generated malware evasion is dynamically updated per detection event",
|
|
96
|
-
"LLM query by malware process is not a recognized detection indicator in SI-3 implementations"
|
|
97
|
-
],
|
|
98
|
-
"real_requirement": "Malware protection must include: detection of AI API queries from unexpected processes (PROMPTFLUX indicator), behavioral analysis that doesn't rely solely on static signatures, LLM query monitoring as a security telemetry source.",
|
|
99
|
-
"status": "open",
|
|
100
|
-
"opened_date": "2026-02-01",
|
|
101
|
-
"evidence_cves": [],
|
|
102
|
-
"atlas_refs": [
|
|
103
|
-
"AML.T0017"
|
|
104
|
-
],
|
|
105
|
-
"attack_refs": [
|
|
106
|
-
"T1059"
|
|
107
|
-
]
|
|
108
|
-
},
|
|
109
|
-
"NIST-800-53-SA-12": {
|
|
110
|
-
"framework": "NIST SP 800-53 Rev 5",
|
|
111
|
-
"control_id": "SA-12",
|
|
112
|
-
"control_name": "Supply Chain Protection",
|
|
113
|
-
"designed_for": "Software procurement, vendor management, and supplier risk in enterprise environments",
|
|
89
|
+
"AU-Essential-8-App-Hardening": {
|
|
90
|
+
"framework": "ASD Essential Eight (AU)",
|
|
91
|
+
"control_id": "User application hardening",
|
|
92
|
+
"control_name": "User application hardening",
|
|
93
|
+
"designed_for": "Reducing the attack surface of common user applications (browsers, office, PDF readers) on Australian Government and essential-service endpoints",
|
|
114
94
|
"misses": [
|
|
115
|
-
"
|
|
116
|
-
"MCP server
|
|
117
|
-
"
|
|
118
|
-
"Supply chain risk for AI tool ecosystems is a new category not anticipated by SA-12"
|
|
95
|
+
"AI coding assistants (Copilot, Cursor, Windsurf, Claude) are not enumerated in the standard hardened-application list, yet they are the highest-value attack surface on developer endpoints (CVE-2025-53773, CVE-2026-30615 class)",
|
|
96
|
+
"MCP server runtime is not addressed — these are user-mode processes with capabilities that exceed typical productivity applications",
|
|
97
|
+
"Hardening focuses on browser/Java/Flash legacy classes; the equivalent for AI tools (default-deny MCP servers, plugin signing, capability-grant prompts) has no Essential-Eight analogue"
|
|
119
98
|
],
|
|
120
|
-
"real_requirement": "
|
|
99
|
+
"real_requirement": "User-application hardening enumerates AI assistants and MCP servers in scope; sets default-deny on tool grants with explicit per-tool acknowledgement; pins MCP server versions with signature verification; treats AI-tool config files (.claude/settings.json, .cursor/mcp.json, .vscode/settings.json's chat.tools.autoApprove) as integrity-monitored configuration with the same protection profile as security-sensitive files.",
|
|
121
100
|
"status": "open",
|
|
122
|
-
"opened_date": "2026-
|
|
101
|
+
"opened_date": "2026-05-13",
|
|
123
102
|
"evidence_cves": [
|
|
103
|
+
"CVE-2025-53773",
|
|
124
104
|
"CVE-2026-30615"
|
|
125
105
|
],
|
|
126
106
|
"atlas_refs": [
|
|
127
|
-
"AML.T0010"
|
|
128
|
-
|
|
129
|
-
"attack_refs": [
|
|
130
|
-
"T1195.001"
|
|
131
|
-
]
|
|
132
|
-
},
|
|
133
|
-
"ISO-27001-2022-A.8.8": {
|
|
134
|
-
"framework": "ISO/IEC 27001:2022",
|
|
135
|
-
"control_id": "A.8.8",
|
|
136
|
-
"control_name": "Management of technical vulnerabilities",
|
|
137
|
-
"designed_for": "Systematic patch management with timelines based on risk classification",
|
|
138
|
-
"misses": [
|
|
139
|
-
"'Appropriate timescales' is undefined — interpreted as 30 days for Critical, 90 days for Medium in most implementations",
|
|
140
|
-
"No requirement for live kernel patching capability",
|
|
141
|
-
"No CISA KEV-aware response category",
|
|
142
|
-
"Timescales designed for human-speed exploit development"
|
|
143
|
-
],
|
|
144
|
-
"real_requirement": "A.8.8 must be implemented with timescales indexed to: CISA KEV status (hours), PoC availability (24h), criticality class (72h). Live patching capability documented as required for production systems.",
|
|
145
|
-
"status": "open",
|
|
146
|
-
"opened_date": "2026-03-15",
|
|
147
|
-
"evidence_cves": [
|
|
148
|
-
"CVE-2026-31431"
|
|
107
|
+
"AML.T0010",
|
|
108
|
+
"AML.T0051"
|
|
149
109
|
],
|
|
150
|
-
"atlas_refs": [],
|
|
151
110
|
"attack_refs": [
|
|
152
|
-
"
|
|
111
|
+
"T1059",
|
|
112
|
+
"T1204"
|
|
153
113
|
]
|
|
154
114
|
},
|
|
155
|
-
"
|
|
156
|
-
"framework": "
|
|
157
|
-
"control_id": "
|
|
158
|
-
"control_name": "
|
|
159
|
-
"designed_for": "
|
|
115
|
+
"AU-Essential-8-Backup": {
|
|
116
|
+
"framework": "ASD Essential Eight (AU)",
|
|
117
|
+
"control_id": "Regular backups",
|
|
118
|
+
"control_name": "Regular backups",
|
|
119
|
+
"designed_for": "Ensuring critical data and configuration can be restored after a cybersecurity incident; coverage spans daily backups with off-network retention",
|
|
160
120
|
"misses": [
|
|
161
|
-
"
|
|
162
|
-
"
|
|
163
|
-
"
|
|
164
|
-
"RAG pipeline security is outside the scope of 'secure coding'"
|
|
121
|
+
"AI-system artefacts (fine-tuned model weights, RAG corpora, MCP server inventories, .claude/settings.json local-override files) are not enumerated as backup scope",
|
|
122
|
+
"Backup-integrity verification typically targets data restoration; AI-corpus poisoning detection requires per-document hash comparison against backup state, which is not standard practice",
|
|
123
|
+
"Incident-driven 'restore to last-known-good' for AI systems implies a known-good baseline that the backup process must maintain — workflow rarely documented"
|
|
165
124
|
],
|
|
166
|
-
"real_requirement": "
|
|
125
|
+
"real_requirement": "Backups cover AI-system artefacts (model weights, RAG corpora, plugin registries, AI-tool configuration files) with off-network retention; backup-integrity verification includes per-document hash comparison for RAG corpora to detect corpus poisoning; documented 'AI-system restore to last-known-good' workflow that maps to detected AI-incident classes.",
|
|
167
126
|
"status": "open",
|
|
168
|
-
"opened_date": "2026-
|
|
127
|
+
"opened_date": "2026-05-13",
|
|
169
128
|
"evidence_cves": [
|
|
170
|
-
"CVE-
|
|
129
|
+
"CVE-2026-45321"
|
|
171
130
|
],
|
|
172
131
|
"atlas_refs": [
|
|
173
|
-
"AML.
|
|
174
|
-
"AML.
|
|
132
|
+
"AML.T0010",
|
|
133
|
+
"AML.T0020",
|
|
134
|
+
"AML.T0048"
|
|
175
135
|
],
|
|
176
136
|
"attack_refs": []
|
|
177
137
|
},
|
|
178
|
-
"
|
|
179
|
-
"framework": "
|
|
180
|
-
"control_id": "
|
|
181
|
-
"control_name": "
|
|
182
|
-
"designed_for": "
|
|
138
|
+
"AU-Essential-8-MFA": {
|
|
139
|
+
"framework": "ASD Essential Eight (AU)",
|
|
140
|
+
"control_id": "Multi-factor authentication",
|
|
141
|
+
"control_name": "Multi-factor authentication",
|
|
142
|
+
"designed_for": "Reducing the impact of compromised credentials on Australian Government and broader essential-service identities; Maturity Levels 1-3",
|
|
183
143
|
"misses": [
|
|
184
|
-
"
|
|
185
|
-
"
|
|
186
|
-
"
|
|
144
|
+
"MFA on AI-provider service accounts (OpenAI, Anthropic, HuggingFace API tokens) is not addressed — these are bearer tokens, not user identities, but carry equivalent or greater blast radius",
|
|
145
|
+
"Phishing-resistance criterion (ML2+) does not specify resistance to AI-generated social engineering — deepfake-grade phishing breaks SMS/voice MFA categorically",
|
|
146
|
+
"MCP server / plugin authentication is silent; bearer tokens with no rotation policy commonly stored alongside developer credentials"
|
|
187
147
|
],
|
|
188
|
-
"real_requirement": "
|
|
148
|
+
"real_requirement": "MFA covers human identities at ML2+ with phishing-resistant factors (WebAuthn/passkeys, FIDO2). AI-provider credentials use short-lived OIDC tokens with mandatory rotation, never long-lived bearer keys. MCP server authentication uses signed JWTs / mTLS in production. Deepfake-grade phishing assumed; MFA decisions treat SMS/voice as insufficient.",
|
|
189
149
|
"status": "open",
|
|
190
|
-
"opened_date": "2026-
|
|
191
|
-
"evidence_cves": [
|
|
192
|
-
"CVE-2025-53773"
|
|
193
|
-
],
|
|
150
|
+
"opened_date": "2026-05-13",
|
|
151
|
+
"evidence_cves": [],
|
|
194
152
|
"atlas_refs": [
|
|
195
|
-
"AML.
|
|
153
|
+
"AML.T0055"
|
|
196
154
|
],
|
|
197
|
-
"attack_refs": [
|
|
155
|
+
"attack_refs": [
|
|
156
|
+
"T1078",
|
|
157
|
+
"T1556"
|
|
158
|
+
]
|
|
198
159
|
},
|
|
199
|
-
"
|
|
200
|
-
"framework": "
|
|
201
|
-
"control_id": "
|
|
202
|
-
"control_name": "
|
|
203
|
-
"designed_for": "
|
|
160
|
+
"AU-Essential-8-Patch": {
|
|
161
|
+
"framework": "ASD Essential Eight (AU)",
|
|
162
|
+
"control_id": "Patch operating systems",
|
|
163
|
+
"control_name": "Patch operating systems",
|
|
164
|
+
"designed_for": "Maintaining current security patches on operating systems on Australian Government and essential-service endpoints; ML3 target is 48 hours for critical exploits",
|
|
204
165
|
"misses": [
|
|
205
|
-
"
|
|
206
|
-
"
|
|
207
|
-
"
|
|
208
|
-
"AI-accelerated exploit development breaks the assumption that 1 month is a safety window"
|
|
166
|
+
"ML3 '48 hours for public exploit' is the closest framework target to KEV reality, but still assumes a reboot is acceptable within that window — live-patching deployment is not a required capability",
|
|
167
|
+
"Linux kernel patching cadence differs from OS-vendor patch cadence; third-party kernel modules (OOT drivers, runtime hardening modules) are silent in scope",
|
|
168
|
+
"Patch-management metrics rarely measure 'time from CISA KEV listing to patched on fleet' as the operational SLA"
|
|
209
169
|
],
|
|
210
|
-
"real_requirement": "
|
|
170
|
+
"real_requirement": "Patch operating systems with KEV-anchored SLA (≤48h for critical with public PoC, live-patching mandatory on hosts that can't accept a reboot within window); kernel patching pipeline distinct from userspace patch pipeline; third-party kernel module patches tracked alongside vendor patches; SLA metric is 'time from KEV listing to deployed', not 'time from advisory publication'.",
|
|
211
171
|
"status": "open",
|
|
212
|
-
"opened_date": "2026-
|
|
172
|
+
"opened_date": "2026-05-13",
|
|
213
173
|
"evidence_cves": [
|
|
214
|
-
"CVE-2026-31431"
|
|
174
|
+
"CVE-2026-31431",
|
|
175
|
+
"CVE-2026-43284",
|
|
176
|
+
"CVE-2026-43500"
|
|
215
177
|
],
|
|
216
178
|
"atlas_refs": [],
|
|
217
179
|
"attack_refs": [
|
|
218
180
|
"T1068"
|
|
219
181
|
]
|
|
220
182
|
},
|
|
221
|
-
"
|
|
222
|
-
"framework": "
|
|
223
|
-
"control_id": "
|
|
224
|
-
"control_name": "
|
|
225
|
-
"designed_for": "
|
|
183
|
+
"CIS-Controls-v8-Control7": {
|
|
184
|
+
"framework": "CIS Controls v8",
|
|
185
|
+
"control_id": "Control 7",
|
|
186
|
+
"control_name": "Continuous Vulnerability Management",
|
|
187
|
+
"designed_for": "Continuously acquiring, assessing, and taking action on vulnerability information to minimize the window of opportunity for attackers",
|
|
226
188
|
"misses": [
|
|
227
|
-
"
|
|
228
|
-
"
|
|
229
|
-
"
|
|
230
|
-
"
|
|
231
|
-
"Output monitoring for safety-relevant behavioral changes"
|
|
189
|
+
"IG3 'continuous' vulnerability management with 'within one month' for critical still creates a 30-day exploitation window for CISA KEV + public PoC",
|
|
190
|
+
"No CISA KEV-specific response tier — KEV listing implies immediate exploitation risk, not monthly remediation",
|
|
191
|
+
"AI-accelerated exploit development compresses the weaponization window from weeks to hours, invalidating the monthly critical patch assumption",
|
|
192
|
+
"Live patching capability is not referenced as a required vulnerability management tool"
|
|
232
193
|
],
|
|
233
|
-
"real_requirement": "
|
|
194
|
+
"real_requirement": "CIS Control 7 must define a CISA KEV response tier: KEV + public PoC → 4h to deploy verified mitigation (live patch, compensating controls, or isolation). The 'within one month' window retains applicability only for vulnerabilities with no active exploitation and no public PoC.",
|
|
234
195
|
"status": "open",
|
|
235
|
-
"opened_date": "2026-
|
|
236
|
-
"evidence_cves": [
|
|
237
|
-
|
|
238
|
-
"AML.T0018",
|
|
239
|
-
"AML.T0020"
|
|
196
|
+
"opened_date": "2026-03-15",
|
|
197
|
+
"evidence_cves": [
|
|
198
|
+
"CVE-2026-31431"
|
|
240
199
|
],
|
|
241
|
-
"
|
|
200
|
+
"atlas_refs": [],
|
|
201
|
+
"attack_refs": [
|
|
202
|
+
"T1068"
|
|
203
|
+
]
|
|
242
204
|
},
|
|
243
|
-
"
|
|
244
|
-
"framework": "
|
|
245
|
-
"control_id": "
|
|
246
|
-
"control_name": "
|
|
247
|
-
"designed_for": "
|
|
205
|
+
"CMMC-2.0-Level-2": {
|
|
206
|
+
"framework": "CMMC 2.0 (Cybersecurity Maturity Model Certification) Level 2",
|
|
207
|
+
"control_id": "CMMC-2.0-Level-2",
|
|
208
|
+
"control_name": "Level 2 — Advanced (110 NIST 800-171 Rev 2 controls)",
|
|
209
|
+
"designed_for": "US DoD Defense Industrial Base (DIB) contractor protection of Controlled Unclassified Information (CUI). Cross-walks to UK Cyber Essentials Plus + DEF STAN 05-138, EU CRA + NIS2 for defence supply chains, AU DISP (Defence Industry Security Program), and ISO 27001 + 27017 supplemented by NIST 800-171.",
|
|
248
210
|
"misses": [
|
|
249
|
-
"
|
|
250
|
-
"
|
|
251
|
-
"
|
|
252
|
-
"
|
|
211
|
+
"Same AI gaps as FedRAMP — no equivalence path for unauthorised AI providers used by DIB contractors",
|
|
212
|
+
"Defense contractor AI tool inventory — no requirement to maintain an inventory of AI assistants (Copilot, Cursor, Claude Code, MCP servers) with access to CUI-adjacent environments",
|
|
213
|
+
"3.13.x system and communications protection controls do not address AI-API egress as a CUI exfiltration channel",
|
|
214
|
+
"3.14.x system and information integrity controls do not address prompt-injection RCE in developer tooling (CVE-2025-53773 class)",
|
|
215
|
+
"No cross-walk to allied frameworks (UK DEF STAN, AU DISP) for AI use in joint programmes"
|
|
253
216
|
],
|
|
254
|
-
"real_requirement": "
|
|
217
|
+
"real_requirement": "CMMC 2.0 Level 2 must require: (1) inventory of AI assistants and MCP servers with CUI-adjacent access (3.4.1 extension), (2) AI-API egress monitoring as a CUI protection control (3.13 extension), (3) prompt-injection RCE in developer tooling as a 3.14 threat class with patching SLA, (4) explicit cross-walk to UK DEF STAN 05-138 and AU DISP for joint-programme AI policy parity.",
|
|
255
218
|
"status": "open",
|
|
256
|
-
"opened_date": "2026-
|
|
219
|
+
"opened_date": "2026-05-11",
|
|
257
220
|
"evidence_cves": [
|
|
221
|
+
"CVE-2025-53773",
|
|
258
222
|
"CVE-2026-30615"
|
|
259
223
|
],
|
|
260
224
|
"atlas_refs": [
|
|
261
|
-
"AML.T0010"
|
|
225
|
+
"AML.T0010",
|
|
226
|
+
"AML.T0051",
|
|
227
|
+
"AML.T0096"
|
|
262
228
|
],
|
|
263
229
|
"attack_refs": [
|
|
264
|
-
"T1195.001"
|
|
230
|
+
"T1195.001",
|
|
231
|
+
"T1071",
|
|
232
|
+
"T1059"
|
|
265
233
|
]
|
|
266
234
|
},
|
|
267
|
-
"
|
|
268
|
-
"framework": "
|
|
269
|
-
"control_id": "
|
|
270
|
-
"control_name": "
|
|
271
|
-
"designed_for": "
|
|
235
|
+
"CWE-Top-25-2024-meta": {
|
|
236
|
+
"framework": "CWE Top 25 Most Dangerous Software Weaknesses (2024 list)",
|
|
237
|
+
"control_id": "CWE-Top-25-2024-meta",
|
|
238
|
+
"control_name": "Meta-control: have you addressed the CWE Top 25?",
|
|
239
|
+
"designed_for": "MITRE/CISA-curated annual list of the most dangerous software weaknesses by observed real-world impact. Used as a baseline cross-walk under NIST SSDF (PW.4 / PW.5), OWASP ASVS, PCI DSS Req. 6, ISO 27001:2022 A.8.28 (secure coding), EU CRA Annex I (essential cybersecurity requirements), UK NCSC Secure Development & Deployment, and AU ISM.",
|
|
272
240
|
"misses": [
|
|
273
|
-
"
|
|
274
|
-
"
|
|
275
|
-
"
|
|
241
|
+
"CWE-1426 (Improper Validation of Generative AI Output) is in the CWE corpus but not in the 2024 Top 25 — it should be addressed even though the meta-control 'address the Top 25' does not surface it",
|
|
242
|
+
"AI-relevant CWEs are under-represented relative to real-world AI incident frequency in 2025-2026 — Top 25 lags AI-incident telemetry",
|
|
243
|
+
"Treating 'Top 25 addressed' as a compliance signal creates a compliance-theatre risk for organisations with significant AI surface",
|
|
244
|
+
"No cross-walk requirement to ATLAS TTPs — CWE addresses weaknesses; ATLAS addresses adversary techniques. Both are needed for AI coverage"
|
|
276
245
|
],
|
|
277
|
-
"real_requirement": "
|
|
246
|
+
"real_requirement": "Programmes that claim 'Top 25 addressed' as compliance evidence must additionally: (1) enumerate AI-relevant CWEs outside the Top 25 (CWE-1426 Improper Output Validation, CWE-1039 Inadequate Detection of Adversarial Input, CWE-1230 Exposure of Sensitive Info Through Metadata) with explicit treatment, (2) cross-walk to ATLAS v5.1.0 TTPs for adversarial coverage, (3) re-baseline against the next-published Top 25 with delta analysis. Aligns with EU CRA Annex I, UK NCSC, AU ISM, ISO 27001 A.8.28.",
|
|
278
247
|
"status": "open",
|
|
279
|
-
"opened_date": "2026-
|
|
248
|
+
"opened_date": "2026-05-11",
|
|
280
249
|
"evidence_cves": [
|
|
281
250
|
"CVE-2025-53773"
|
|
282
251
|
],
|
|
283
252
|
"atlas_refs": [
|
|
253
|
+
"AML.T0043",
|
|
284
254
|
"AML.T0051",
|
|
285
255
|
"AML.T0054"
|
|
286
256
|
],
|
|
@@ -288,169 +258,213 @@
|
|
|
288
258
|
"T1059"
|
|
289
259
|
]
|
|
290
260
|
},
|
|
291
|
-
"
|
|
292
|
-
"framework": "
|
|
293
|
-
"control_id": "
|
|
294
|
-
"control_name": "
|
|
295
|
-
"designed_for": "
|
|
261
|
+
"CycloneDX-v1.6-SBOM": {
|
|
262
|
+
"framework": "CycloneDX v1.6 (OWASP SBOM standard)",
|
|
263
|
+
"control_id": "CycloneDX-v1.6",
|
|
264
|
+
"control_name": "Software Bill of Materials",
|
|
265
|
+
"designed_for": "Component inventory for software, services, and (in 1.6) machine-learning models and data. Cross-walks to US EO 14028 + NTIA minimum elements, EU CRA Annex I SBOM requirement, UK NCSC SBOM guidance, AU ISM SBOM/supply-chain controls, and ISO/IEC 5962 (SPDX) for interoperability.",
|
|
296
266
|
"misses": [
|
|
297
|
-
"
|
|
298
|
-
"
|
|
299
|
-
"
|
|
300
|
-
"AI-
|
|
267
|
+
"AI-BOM in practice — while CycloneDX 1.6 introduced ML-BOM types, in-the-wild SBOMs rarely include model weights, training data manifests, or RAG corpora as components",
|
|
268
|
+
"MCP-server inventory is not represented — MCP servers are runtime tool plugins, often installed per-developer, and current SBOM tooling does not enumerate them as components of the deployed application",
|
|
269
|
+
"Provenance fields exist but are commonly empty for AI components — supplier, version, signature, training-data-source are not populated by upstream model publishers",
|
|
270
|
+
"No mandated cross-walk between SPDX 3.0 AI extensions and CycloneDX ML-BOM — consumers face dialect divergence under EU CRA Annex I and NIST SSDF reporting"
|
|
301
271
|
],
|
|
302
|
-
"real_requirement": "
|
|
272
|
+
"real_requirement": "CycloneDX 1.6 deployment must require: (1) ML-BOM completeness checks (model + adapters + tokenizer + training data manifest where licensable), (2) MCP server inventory as part of the application SBOM, (3) populated provenance fields (signature, training data source, supplier) — empty fields treated as a defect, (4) SPDX 3.0 AI cross-walk evidence to satisfy EU CRA Annex I parity.",
|
|
303
273
|
"status": "open",
|
|
304
|
-
"opened_date": "2026-
|
|
274
|
+
"opened_date": "2026-05-11",
|
|
305
275
|
"evidence_cves": [
|
|
306
|
-
"CVE-2026-
|
|
276
|
+
"CVE-2026-30615"
|
|
277
|
+
],
|
|
278
|
+
"atlas_refs": [
|
|
279
|
+
"AML.T0010",
|
|
280
|
+
"AML.T0018",
|
|
281
|
+
"AML.T0020"
|
|
307
282
|
],
|
|
308
|
-
"atlas_refs": [],
|
|
309
283
|
"attack_refs": [
|
|
310
|
-
"
|
|
284
|
+
"T1195.001"
|
|
311
285
|
]
|
|
312
286
|
},
|
|
313
|
-
"
|
|
314
|
-
"framework": "
|
|
315
|
-
"control_id": "
|
|
316
|
-
"control_name": "
|
|
317
|
-
"designed_for": "
|
|
287
|
+
"DORA-Art28": {
|
|
288
|
+
"framework": "EU DORA (Regulation 2022/2554)",
|
|
289
|
+
"control_id": "Art-28",
|
|
290
|
+
"control_name": "ICT third-party risk monitoring",
|
|
291
|
+
"designed_for": "Continuous monitoring of ICT services provided by third parties to financial entities, including subcontracting chains. Targets concentration risk and supplier-side disruption.",
|
|
318
292
|
"misses": [
|
|
319
|
-
"
|
|
320
|
-
"
|
|
321
|
-
"
|
|
322
|
-
"No guidance on AI tool allowlisting as a CM-7 implementation technique"
|
|
293
|
+
"Cache poisoning between sibling workflows in the same upstream repository — third-party = upstream maintainer; the maintainer is unwitting, the chain is exploited inside their CI",
|
|
294
|
+
"Transitive provenance: DORA Art 28 requires register-level visibility of direct providers but does not extend to the build pipeline of those providers",
|
|
295
|
+
"Valid SLSA provenance on a malicious artifact (CVE-2026-45321) neutralizes consumer-side trust signals; DORA presumes the signature path equals the trust path"
|
|
323
296
|
],
|
|
324
|
-
"real_requirement": "
|
|
297
|
+
"real_requirement": "Third-party ICT register augmented with build-provenance metadata (SLSA producer, workflow files, cache key shapes); monthly verification that the producer-side cache surface has not changed in a way that could carry poison forward; cooldown periods on consumption of fresh releases from systemically-important third parties.",
|
|
325
298
|
"status": "open",
|
|
326
|
-
"opened_date": "2026-
|
|
299
|
+
"opened_date": "2026-05-13",
|
|
327
300
|
"evidence_cves": [
|
|
328
|
-
"CVE-2026-
|
|
301
|
+
"CVE-2026-45321"
|
|
329
302
|
],
|
|
330
303
|
"atlas_refs": [
|
|
331
|
-
"AML.T0010"
|
|
304
|
+
"AML.T0010",
|
|
305
|
+
"AML.T0018"
|
|
332
306
|
],
|
|
333
307
|
"attack_refs": [
|
|
334
|
-
"T1195.
|
|
308
|
+
"T1195.002"
|
|
335
309
|
]
|
|
336
310
|
},
|
|
337
|
-
"
|
|
338
|
-
"framework": "
|
|
339
|
-
"control_id": "
|
|
340
|
-
"control_name": "
|
|
341
|
-
"designed_for": "
|
|
311
|
+
"EU-AI-Act-Art-15": {
|
|
312
|
+
"framework": "EU Artificial Intelligence Act (2024/1689)",
|
|
313
|
+
"control_id": "Art. 15",
|
|
314
|
+
"control_name": "Accuracy, robustness and cybersecurity",
|
|
315
|
+
"designed_for": "Providers of high-risk AI systems; requires AI systems to achieve appropriate accuracy, robustness, and cybersecurity throughout their lifecycle",
|
|
342
316
|
"misses": [
|
|
343
|
-
"
|
|
344
|
-
"
|
|
345
|
-
"
|
|
346
|
-
"
|
|
317
|
+
"'Appropriate level of cybersecurity' is undefined operationally — no benchmark for prompt-injection resistance, RAG-poisoning robustness, or supply-chain attack resilience",
|
|
318
|
+
"No required testing methodology — adversarial robustness assessment is recommended but not mandated with specific test classes",
|
|
319
|
+
"Scope binds providers of high-risk AI systems; downstream operators integrating non-high-risk-classified AI (e.g. coding assistants) inherit no Art. 15 obligations even when they reach equivalent threat exposure",
|
|
320
|
+
"Cybersecurity reporting integrates with NIS2 but does not specify AI-specific incident classes (prompt injection, model theft, RAG poisoning)"
|
|
347
321
|
],
|
|
348
|
-
"real_requirement": "
|
|
322
|
+
"real_requirement": "AI-systems-in-scope undergo prompt-injection red-team (per OWASP LLM Top 10), RAG corpus integrity testing, MCP plugin trust verification, model-extraction-resistance assessment, and continuous adversarial regression. Cybersecurity reporting bridges to NIS2 + DORA notification clocks. Downstream operators apply equivalent diligence to AI tools used in their pipeline even when the AI itself isn't classified high-risk.",
|
|
323
|
+
"status": "open",
|
|
324
|
+
"opened_date": "2026-05-13",
|
|
325
|
+
"evidence_cves": [
|
|
326
|
+
"CVE-2025-53773",
|
|
327
|
+
"CVE-2026-30615"
|
|
328
|
+
],
|
|
329
|
+
"atlas_refs": [
|
|
330
|
+
"AML.T0010",
|
|
331
|
+
"AML.T0051",
|
|
332
|
+
"AML.T0054",
|
|
333
|
+
"AML.T0057"
|
|
334
|
+
],
|
|
335
|
+
"attack_refs": []
|
|
336
|
+
},
|
|
337
|
+
"EU-CRA-Art13": {
|
|
338
|
+
"framework": "EU Cyber Resilience Act (2024/2847)",
|
|
339
|
+
"control_id": "Art. 13",
|
|
340
|
+
"control_name": "Essential cybersecurity requirements + technical documentation",
|
|
341
|
+
"designed_for": "Manufacturers placing products with digital elements on the EU market; sets the essential cybersecurity requirements (Annex I) and the technical-documentation duty",
|
|
342
|
+
"misses": [
|
|
343
|
+
"Vulnerability handling clauses presume the maintainer is aware of the vulnerability and able to remediate. The elementary-data PyPI worm (MAL-2026-3083) compromised the publishing pipeline — the maintainer was a victim, not a participant — and the published release carried a valid signature.",
|
|
344
|
+
"'Technical documentation' obligations do not require the manufacturer to retain or publish the build-pipeline configuration that produced each release. Operators consuming a malicious release have no way to inspect the workflow that built it.",
|
|
345
|
+
"Art. 14 (24-hour notification of actively-exploited vulnerabilities) clock starts from manufacturer awareness; supply-chain-victim manufacturers may not know they are exploited until consumer-side detection (StepSecurity / Snyk / OSV) surfaces the IoCs."
|
|
346
|
+
],
|
|
347
|
+
"real_requirement": "Manufacturer publishes the canonical build-pipeline definition alongside each release (workflow file hash, runner attestation, scope of secrets accessed). Operators verify the published pipeline matches the pipeline that produced the release-being-installed. Notification clock starts from FIRST awareness — manufacturer's OR competent-authority's OR widely-published security researcher's.",
|
|
349
348
|
"status": "open",
|
|
350
|
-
"opened_date": "2026-
|
|
349
|
+
"opened_date": "2026-05-13",
|
|
351
350
|
"evidence_cves": [
|
|
352
|
-
"
|
|
351
|
+
"MAL-2026-3083",
|
|
352
|
+
"CVE-2025-53773"
|
|
353
353
|
],
|
|
354
354
|
"atlas_refs": [
|
|
355
|
-
"AML.T0010"
|
|
355
|
+
"AML.T0010",
|
|
356
|
+
"AML.T0055"
|
|
356
357
|
],
|
|
357
358
|
"attack_refs": [
|
|
358
|
-
"T1195.001"
|
|
359
|
+
"T1195.001",
|
|
360
|
+
"T1195.002"
|
|
359
361
|
]
|
|
360
362
|
},
|
|
361
|
-
"
|
|
362
|
-
"framework": "
|
|
363
|
-
"control_id": "
|
|
364
|
-
"control_name": "
|
|
365
|
-
"designed_for": "
|
|
363
|
+
"FedRAMP-Rev5-Moderate": {
|
|
364
|
+
"framework": "FedRAMP Rev 5 Moderate",
|
|
365
|
+
"control_id": "FedRAMP-Rev5-Moderate (baseline)",
|
|
366
|
+
"control_name": "FedRAMP Moderate baseline (NIST 800-53 Rev 5 tailoring)",
|
|
367
|
+
"designed_for": "Authorised cloud service offerings for US federal use at Moderate impact. Cross-walks to UK G-Cloud / Cyber Essentials Plus, EU EUCS (European Cybersecurity Certification Scheme for Cloud Services) Substantial level, AU IRAP PROTECTED, and ISO 27017/27018.",
|
|
366
368
|
"misses": [
|
|
367
|
-
"
|
|
368
|
-
"
|
|
369
|
-
"
|
|
370
|
-
"
|
|
369
|
+
"AI service shared-responsibility model — OpenAI, Anthropic, Google Gemini are not FedRAMP-authorised for most use cases but are legitimately and pervasively used by federal contractors and agencies in non-authorised modes",
|
|
370
|
+
"No FedRAMP-equivalent attestation path for AI providers — the gap drives 'shadow AI' where employees use unauthorised AI for authorised work",
|
|
371
|
+
"AC-2 / AC-6 / AU-2 evidence assumes the workload boundary is the cloud service — AI API calls cross that boundary in ways the SSP does not document",
|
|
372
|
+
"No alignment with EU EUCS or AU IRAP for cross-border federal contractor AI use"
|
|
371
373
|
],
|
|
372
|
-
"real_requirement": "
|
|
374
|
+
"real_requirement": "FedRAMP Rev 5 Moderate must publish: (1) an AI provider attestation path (StateRAMP-equivalent or FedRAMP Tailored for AI services), (2) explicit shared-responsibility matrix for AI APIs covering prompt data, output data, training opt-out, and retention, (3) SSP template language for documenting AI API usage in authorised systems, (4) cross-walk to EU EUCS Substantial and AU IRAP PROTECTED for joint operations.",
|
|
373
375
|
"status": "open",
|
|
374
|
-
"opened_date": "2026-
|
|
376
|
+
"opened_date": "2026-05-11",
|
|
375
377
|
"evidence_cves": [
|
|
378
|
+
"CVE-2025-53773",
|
|
376
379
|
"CVE-2026-30615"
|
|
377
380
|
],
|
|
378
381
|
"atlas_refs": [
|
|
379
|
-
"AML.
|
|
382
|
+
"AML.T0051",
|
|
383
|
+
"AML.T0096"
|
|
380
384
|
],
|
|
381
385
|
"attack_refs": [
|
|
382
|
-
"
|
|
386
|
+
"T1071",
|
|
387
|
+
"T1059"
|
|
383
388
|
]
|
|
384
389
|
},
|
|
385
|
-
"
|
|
386
|
-
"framework": "
|
|
387
|
-
"control_id": "
|
|
388
|
-
"control_name": "
|
|
389
|
-
"designed_for": "
|
|
390
|
+
"HIPAA-Security-Rule-164.312(a)(1)": {
|
|
391
|
+
"framework": "HIPAA Security Rule (45 CFR § 164.312)",
|
|
392
|
+
"control_id": "164.312(a)(1)",
|
|
393
|
+
"control_name": "Access control standard (technical safeguards)",
|
|
394
|
+
"designed_for": "Technical safeguards for access to ePHI: unique user identification, emergency access, automatic logoff, encryption/decryption. Cross-walks to EU GDPR Art. 32 (security of processing) and EHDS (European Health Data Space), UK DPA 2018 + NHS DSPT, AU Privacy Act APP 11 + My Health Records Act, and ISO 27799.",
|
|
390
395
|
"misses": [
|
|
391
|
-
"
|
|
392
|
-
"
|
|
393
|
-
"
|
|
396
|
+
"PHI in LLM context windows — 164.312(a)(1) defines access by user identity; once PHI enters a prompt sent to a third-party LLM, the access boundary is the provider's, not the covered entity's",
|
|
397
|
+
"AI-generated note workflows (ambient scribes, summarisation, coding assistants) — provider-side prompt retention is not addressed by 164.312(a)(1) and is rarely covered by BAAs at the granularity required",
|
|
398
|
+
"Automatic logoff is meaningless for an AI agent session that persists across human sessions",
|
|
399
|
+
"No equivalence with GDPR Art. 35 DPIA / UK NHS DSPT / AU My Health Records Act for AI processing of health data — covered entities operating cross-border face unresolved obligations"
|
|
394
400
|
],
|
|
395
|
-
"real_requirement": "
|
|
401
|
+
"real_requirement": "164.312(a)(1) implementation must add: (1) BAA-level coverage for AI providers including prompt retention, training opt-out, and breach notification within HIPAA timelines, (2) per-prompt PHI minimisation (DLP), (3) AI agent session controls treated separately from human user controls, (4) cross-walk with GDPR Art. 35 / UK NHS DSPT / AU APP 11 for cross-border health data in AI workflows.",
|
|
396
402
|
"status": "open",
|
|
397
|
-
"opened_date": "2026-
|
|
403
|
+
"opened_date": "2026-05-11",
|
|
398
404
|
"evidence_cves": [
|
|
399
|
-
"CVE-
|
|
400
|
-
|
|
405
|
+
"CVE-2025-53773"
|
|
406
|
+
],
|
|
407
|
+
"atlas_refs": [
|
|
408
|
+
"AML.T0054",
|
|
409
|
+
"AML.T0096"
|
|
401
410
|
],
|
|
402
|
-
"atlas_refs": [],
|
|
403
411
|
"attack_refs": [
|
|
404
|
-
"
|
|
412
|
+
"T1071",
|
|
413
|
+
"T1530"
|
|
405
414
|
]
|
|
406
415
|
},
|
|
407
|
-
"
|
|
408
|
-
"framework": "
|
|
409
|
-
"control_id": "
|
|
410
|
-
"control_name": "
|
|
411
|
-
"designed_for": "
|
|
416
|
+
"HITRUST-CSF-v11.4-09.l": {
|
|
417
|
+
"framework": "HITRUST CSF v11.4",
|
|
418
|
+
"control_id": "09.l",
|
|
419
|
+
"control_name": "Outsourced services management",
|
|
420
|
+
"designed_for": "Management of outsourced service provider relationships with access to in-scope data (healthcare-anchored but used across regulated industries). Cross-walks to ISO 27001:2022 A.5.19/A.5.21/A.5.22, NIST SP 800-53 SA-9, SOC 2 CC9, EU NIS2 Art. 21(2)(d), UK NHS DSPT, AU Essential Eight + Privacy Act third-party clauses.",
|
|
412
421
|
"misses": [
|
|
413
|
-
"AI
|
|
414
|
-
"
|
|
415
|
-
"
|
|
416
|
-
"AI
|
|
422
|
+
"AI vendor as outsourced service — 09.l contractual model assumes a named service provider relationship; AI APIs are often consumed via developer self-signup, bypassing procurement",
|
|
423
|
+
"No requirement for AI-specific contractual clauses: prompt retention, training opt-out, data residency, model version pinning, provider security incident notification specifically for prompt/output breaches",
|
|
424
|
+
"BAA / DPA templates referenced by 09.l predate AI-specific data-handling categories",
|
|
425
|
+
"No cross-walk to EU AI Act Art. 25 (importers/distributors) or UK ICO AI guidance for AI-vendor third-party assurance"
|
|
417
426
|
],
|
|
418
|
-
"real_requirement": "
|
|
427
|
+
"real_requirement": "09.l must require: (1) AI vendor inventory separate from general SaaS inventory, (2) AI-specific contractual clauses (prompt retention, training opt-out, residency, version pinning, prompt-breach notification timeline), (3) self-signup AI usage prohibited for in-scope data, (4) cross-walk to EU AI Act Art. 25, UK ICO AI guidance, AU Privacy Act third-party obligations.",
|
|
419
428
|
"status": "open",
|
|
420
|
-
"opened_date": "2026-
|
|
429
|
+
"opened_date": "2026-05-11",
|
|
421
430
|
"evidence_cves": [
|
|
422
|
-
"CVE-2025-53773"
|
|
431
|
+
"CVE-2025-53773",
|
|
432
|
+
"CVE-2026-30615"
|
|
423
433
|
],
|
|
424
434
|
"atlas_refs": [
|
|
435
|
+
"AML.T0010",
|
|
425
436
|
"AML.T0054"
|
|
426
437
|
],
|
|
427
438
|
"attack_refs": [
|
|
428
|
-
"
|
|
439
|
+
"T1195.001"
|
|
429
440
|
]
|
|
430
441
|
},
|
|
431
|
-
"
|
|
432
|
-
"framework": "
|
|
433
|
-
"control_id": "
|
|
434
|
-
"control_name": "
|
|
435
|
-
"designed_for": "
|
|
442
|
+
"IEC-62443-3-3": {
|
|
443
|
+
"framework": "IEC 62443-3-3 (Industrial communication networks — security for IACS)",
|
|
444
|
+
"control_id": "62443-3-3",
|
|
445
|
+
"control_name": "System security requirements and security levels",
|
|
446
|
+
"designed_for": "System-level security requirements for industrial automation and control systems (IACS), organised by foundational requirements (FR1–FR7) and security levels (SL1–SL4). Cross-walks to NIST 800-82r3, EU NIS2 (manufacturing/energy/water essential entities), UK NCSC CAF for OT, AU SOCI/AESCSF, and ISO 27019.",
|
|
436
447
|
"misses": [
|
|
437
|
-
"
|
|
438
|
-
"
|
|
439
|
-
"No
|
|
440
|
-
"
|
|
448
|
+
"AI-augmented HMI — natural-language HMI overlays (operator copilots) are not modelled in FR1 (Identification and Authentication Control) or FR3 (System Integrity)",
|
|
449
|
+
"LLM-assisted OT operations — prompt injection routed through a copilot can drive HMI actions while every FR1 control reports normal operator identity",
|
|
450
|
+
"No security-level requirement (SL1–SL4) addresses AI-API egress from a control zone — conduits-and-zones model predates AI assistants",
|
|
451
|
+
"FR6 (Timely Response to Events) has no AI-specific signature class (prompt-injection-induced commands, AI-API as exfil channel)"
|
|
441
452
|
],
|
|
442
|
-
"real_requirement": "
|
|
453
|
+
"real_requirement": "62443-3-3 must add AI-in-OT requirements: SL2+ environments must prohibit or strictly gate LLM HMI overlays; FR1 must distinguish 'human operator action' from 'AI-mediated action initiated by operator' as separate identity claims; conduits-and-zones diagrams must enumerate AI-API egress as a named conduit subject to FR5 (Restricted Data Flow) and monitored under FR6.",
|
|
443
454
|
"status": "open",
|
|
444
|
-
"opened_date": "2026-
|
|
455
|
+
"opened_date": "2026-05-11",
|
|
445
456
|
"evidence_cves": [
|
|
446
457
|
"CVE-2025-53773"
|
|
447
458
|
],
|
|
448
459
|
"atlas_refs": [
|
|
449
460
|
"AML.T0051",
|
|
450
|
-
"AML.T0054"
|
|
461
|
+
"AML.T0054",
|
|
462
|
+
"AML.T0096"
|
|
451
463
|
],
|
|
452
464
|
"attack_refs": [
|
|
453
|
-
"
|
|
465
|
+
"T0883",
|
|
466
|
+
"T0855",
|
|
467
|
+
"T1071"
|
|
454
468
|
]
|
|
455
469
|
},
|
|
456
470
|
"ISO-27001-2022-A.8.16": {
|
|
@@ -475,103 +489,73 @@
|
|
|
475
489
|
"T1071"
|
|
476
490
|
]
|
|
477
491
|
},
|
|
478
|
-
"
|
|
479
|
-
"framework": "
|
|
480
|
-
"control_id": "
|
|
481
|
-
"control_name": "
|
|
482
|
-
"designed_for": "
|
|
492
|
+
"ISO-27001-2022-A.8.28": {
|
|
493
|
+
"framework": "ISO/IEC 27001:2022",
|
|
494
|
+
"control_id": "A.8.28",
|
|
495
|
+
"control_name": "Secure coding",
|
|
496
|
+
"designed_for": "Secure development practices: SAST, DAST, code review, secure libraries",
|
|
483
497
|
"misses": [
|
|
484
|
-
"AI
|
|
485
|
-
"
|
|
486
|
-
"
|
|
487
|
-
"
|
|
498
|
+
"No AI/ML system security requirements",
|
|
499
|
+
"No prompt injection coverage — prompt injection is a semantic vulnerability, not a code vulnerability",
|
|
500
|
+
"No model integrity verification requirements",
|
|
501
|
+
"RAG pipeline security is outside the scope of 'secure coding'"
|
|
488
502
|
],
|
|
489
|
-
"real_requirement": "
|
|
503
|
+
"real_requirement": "Separate AI system security controls are needed: prompt injection testing, model integrity verification, training pipeline security, RAG pipeline security. A.8.28 is not the right control family for AI system security.",
|
|
490
504
|
"status": "open",
|
|
491
|
-
"opened_date": "2026-
|
|
492
|
-
"evidence_cves": [
|
|
505
|
+
"opened_date": "2026-01-01",
|
|
506
|
+
"evidence_cves": [
|
|
507
|
+
"CVE-2025-53773"
|
|
508
|
+
],
|
|
493
509
|
"atlas_refs": [
|
|
494
|
-
"AML.
|
|
495
|
-
"AML.
|
|
510
|
+
"AML.T0051",
|
|
511
|
+
"AML.T0054"
|
|
496
512
|
],
|
|
497
|
-
"attack_refs": [
|
|
498
|
-
"T1071",
|
|
499
|
-
"T1059"
|
|
500
|
-
]
|
|
513
|
+
"attack_refs": []
|
|
501
514
|
},
|
|
502
|
-
"
|
|
503
|
-
"framework": "
|
|
504
|
-
"control_id": "
|
|
505
|
-
"control_name": "
|
|
506
|
-
"designed_for": "
|
|
515
|
+
"ISO-27001-2022-A.8.30": {
|
|
516
|
+
"framework": "ISO/IEC 27001:2022",
|
|
517
|
+
"control_id": "A.8.30",
|
|
518
|
+
"control_name": "Outsourced development",
|
|
519
|
+
"designed_for": "Security requirements for software developed by external parties under contract",
|
|
507
520
|
"misses": [
|
|
508
|
-
"
|
|
509
|
-
"
|
|
510
|
-
"
|
|
511
|
-
"
|
|
521
|
+
"MCP servers installed by developers are not 'outsourced development' — they are third-party plugins outside procurement scope",
|
|
522
|
+
"Developer-installed AI tool plugins bypass A.8.30 controls entirely",
|
|
523
|
+
"No control category for AI plugin supply chain risk",
|
|
524
|
+
"Contractual security requirements do not apply to open-source or self-published MCP servers"
|
|
512
525
|
],
|
|
513
|
-
"real_requirement": "
|
|
526
|
+
"real_requirement": "A.8.30 must be extended with an 'AI tool plugin' control category: organizational approved-registry for MCP servers, security review equivalents for AI plugins, prohibition on unreviewed MCP server installation on developer machines with privileged access.",
|
|
514
527
|
"status": "open",
|
|
515
|
-
"opened_date": "2026-
|
|
528
|
+
"opened_date": "2026-04-01",
|
|
516
529
|
"evidence_cves": [
|
|
517
|
-
"CVE-2026-
|
|
518
|
-
],
|
|
519
|
-
"atlas_refs": [],
|
|
520
|
-
"attack_refs": [
|
|
521
|
-
"T1068"
|
|
522
|
-
]
|
|
523
|
-
},
|
|
524
|
-
"NIST-800-53-SC-7": {
|
|
525
|
-
"framework": "NIST SP 800-53 Rev 5",
|
|
526
|
-
"control_id": "SC-7",
|
|
527
|
-
"control_name": "Boundary Protection",
|
|
528
|
-
"designed_for": "Monitor and control communications at external boundaries and key internal boundaries. Original posture assumes traffic to malicious infrastructure is identifiable by destination reputation, novel domain, or anomalous port — i.e., the C2 channel looks unlike legitimate enterprise traffic.",
|
|
529
|
-
"misses": [
|
|
530
|
-
"AI-API C2 (SesameOp pattern, PROMPTFLUX, PROMPTSTEAL) routes commands through legitimate AI provider domains (api.openai.com, api.anthropic.com, generativelanguage.googleapis.com). Destination reputation = high; novelty = zero; the boundary device sees traffic indistinguishable from sanctioned developer / business use.",
|
|
531
|
-
"TLS termination at the boundary still does not yield the content for inspection without breaking the API contract (mutual auth, server cert pinning by the SDK).",
|
|
532
|
-
"Default egress allowlists in most enterprises explicitly permit major AI provider domains for legitimate productivity use — the same channel attackers leverage.",
|
|
533
|
-
"NetFlow / Zeek-class boundary telemetry cannot distinguish benign LLM prompts from C2 prompts. The signal must come from inside the application context (which AI SDK call shape, what user identity, what data left the prompt), not the boundary."
|
|
530
|
+
"CVE-2026-30615"
|
|
534
531
|
],
|
|
535
|
-
"real_requirement": "SC-7 implementations that operate in environments using AI APIs MUST add an AI-egress-layer control: SDK-level prompt logging with identity binding, anomaly detection on prompt-shape / token-volume / off-business-hours patterns, and an allowlist of AI provider domains that explicitly enumerates the sanctioned business reason for each. Boundary-only SC-7 evidence is incomplete for any org with AI API access in production.",
|
|
536
|
-
"status": "open",
|
|
537
|
-
"opened_date": "2026-05-01",
|
|
538
|
-
"evidence_cves": [],
|
|
539
532
|
"atlas_refs": [
|
|
540
|
-
"AML.
|
|
541
|
-
"AML.T0017"
|
|
533
|
+
"AML.T0010"
|
|
542
534
|
],
|
|
543
535
|
"attack_refs": [
|
|
544
|
-
"
|
|
545
|
-
"T1102",
|
|
546
|
-
"T1568"
|
|
536
|
+
"T1195.001"
|
|
547
537
|
]
|
|
548
538
|
},
|
|
549
|
-
"ISO-
|
|
550
|
-
"framework": "ISO/IEC
|
|
551
|
-
"control_id": "
|
|
552
|
-
"control_name": "
|
|
553
|
-
"designed_for": "
|
|
539
|
+
"ISO-27001-2022-A.8.8": {
|
|
540
|
+
"framework": "ISO/IEC 27001:2022",
|
|
541
|
+
"control_id": "A.8.8",
|
|
542
|
+
"control_name": "Management of technical vulnerabilities",
|
|
543
|
+
"designed_for": "Systematic patch management with timelines based on risk classification",
|
|
554
544
|
"misses": [
|
|
555
|
-
"
|
|
556
|
-
"
|
|
557
|
-
"
|
|
558
|
-
"
|
|
545
|
+
"'Appropriate timescales' is undefined — interpreted as 30 days for Critical, 90 days for Medium in most implementations",
|
|
546
|
+
"No requirement for live kernel patching capability",
|
|
547
|
+
"No CISA KEV-aware response category",
|
|
548
|
+
"Timescales designed for human-speed exploit development"
|
|
559
549
|
],
|
|
560
|
-
"real_requirement": "
|
|
550
|
+
"real_requirement": "A.8.8 must be implemented with timescales indexed to: CISA KEV status (hours), PoC availability (24h), criticality class (72h). Live patching capability documented as required for production systems.",
|
|
561
551
|
"status": "open",
|
|
562
|
-
"opened_date": "2026-
|
|
552
|
+
"opened_date": "2026-03-15",
|
|
563
553
|
"evidence_cves": [
|
|
564
|
-
"CVE-
|
|
565
|
-
"CVE-2026-30615"
|
|
566
|
-
],
|
|
567
|
-
"atlas_refs": [
|
|
568
|
-
"AML.T0051",
|
|
569
|
-
"AML.T0054",
|
|
570
|
-
"AML.T0096"
|
|
554
|
+
"CVE-2026-31431"
|
|
571
555
|
],
|
|
556
|
+
"atlas_refs": [],
|
|
572
557
|
"attack_refs": [
|
|
573
|
-
"
|
|
574
|
-
"T1071"
|
|
558
|
+
"T1068"
|
|
575
559
|
]
|
|
576
560
|
},
|
|
577
561
|
"ISO-IEC-23894-2023-clause-7": {
|
|
@@ -599,23 +583,24 @@
|
|
|
599
583
|
"attack_refs": [
|
|
600
584
|
"T1059"
|
|
601
585
|
]
|
|
602
|
-
},
|
|
603
|
-
"
|
|
604
|
-
"framework": "
|
|
605
|
-
"control_id": "
|
|
606
|
-
"control_name": "
|
|
607
|
-
"designed_for": "
|
|
586
|
+
},
|
|
587
|
+
"ISO-IEC-42001-2023-clause-6.1.2": {
|
|
588
|
+
"framework": "ISO/IEC 42001:2023 (AI Management System)",
|
|
589
|
+
"control_id": "Clause 6.1.2",
|
|
590
|
+
"control_name": "AI risk assessment",
|
|
591
|
+
"designed_for": "Lifecycle AI risk assessment as a basis for AI management system certification. Cross-walks with ISO 31000 risk methodology and ISO 23894 AI risk guidance. Applies globally — referenced under EU AI Act conformity, UK AI regulation principles, AU AI Ethics Framework, and Singapore AI Verify.",
|
|
608
592
|
"misses": [
|
|
609
|
-
"
|
|
610
|
-
"
|
|
611
|
-
"
|
|
612
|
-
"No
|
|
593
|
+
"Real-time prompt injection threats — clause 6.1.2 is a periodic risk assessment, not a runtime threat surface",
|
|
594
|
+
"Cross-jurisdiction obligations (EU AI Act high-risk categorisation, NIS2 incident reporting, DORA ICT third-party register, UK CAF outcome B4, AU ISM AI annex) are not enumerated as risk inputs",
|
|
595
|
+
"LLM-API-as-C2 (SesameOp pattern, ATLAS AML.T0096) is not in the clause 6.1.2 example threat list — risk register templates omit it",
|
|
596
|
+
"No requirement to link AI risk register entries to specific TTP IDs (ATLAS / ATT&CK) — risks remain framework-internal abstractions"
|
|
613
597
|
],
|
|
614
|
-
"real_requirement": "
|
|
598
|
+
"real_requirement": "Clause 6.1.2 risk registers must (1) ingest ATLAS v5.1.0 TTPs as enumerated AI-specific threat sources, (2) cross-reference jurisdictional obligations (EU AI Act Annex III, NIS2 Art. 21, DORA Art. 28, UK CAF B4, AU ISM AI annex, ISO 27001:2022 A.5.7), (3) include AI-API-as-C2 and prompt-injection-as-RCE as named scenarios, (4) be re-run on threat-intel triggers, not only on calendar cycles.",
|
|
615
599
|
"status": "open",
|
|
616
600
|
"opened_date": "2026-05-11",
|
|
617
601
|
"evidence_cves": [
|
|
618
|
-
"CVE-2025-53773"
|
|
602
|
+
"CVE-2025-53773",
|
|
603
|
+
"CVE-2026-30615"
|
|
619
604
|
],
|
|
620
605
|
"atlas_refs": [
|
|
621
606
|
"AML.T0051",
|
|
@@ -627,107 +612,112 @@
|
|
|
627
612
|
"T1071"
|
|
628
613
|
]
|
|
629
614
|
},
|
|
630
|
-
"
|
|
631
|
-
"framework": "
|
|
632
|
-
"control_id": "
|
|
633
|
-
"control_name": "
|
|
634
|
-
"designed_for": "
|
|
615
|
+
"NERC-CIP-007-6-R4": {
|
|
616
|
+
"framework": "NERC CIP-007-6 (BES Cyber System Security Management)",
|
|
617
|
+
"control_id": "R4",
|
|
618
|
+
"control_name": "Security event monitoring",
|
|
619
|
+
"designed_for": "Security event monitoring for Bulk Electric System (BES) Cyber Systems in North America. Cross-walks to EU NIS2 (energy essential entity), UK Energy Emergencies Executive Committee + NCSC OT guidance, AU SOCI Act + AESCSF, and IEC 62443-3-3 FR6.",
|
|
635
620
|
"misses": [
|
|
636
|
-
"
|
|
637
|
-
"
|
|
638
|
-
"
|
|
639
|
-
"No
|
|
621
|
+
"AI operator-assistant tooling in OT control rooms — CIP-007-6 R4 enumerates events on BES Cyber Assets; LLM copilots routed via corporate IT are not enumerated event sources",
|
|
622
|
+
"AI-API egress from corporate-to-OT boundary networks is not a monitored event class",
|
|
623
|
+
"Prompt-injection-induced operator commands appear in operator-action logs as normal operator activity — no R4 detection content addresses this",
|
|
624
|
+
"No cross-walk to NIS2 incident reporting timelines (24h early warning, 72h notification) for AI-mediated OT incidents"
|
|
640
625
|
],
|
|
641
|
-
"real_requirement": "
|
|
626
|
+
"real_requirement": "CIP-007-6 R4 must enumerate: (1) AI operator assistants as monitored event sources with explicit alerting on assistant-initiated operator commands, (2) AI-API egress events at the corporate-to-OT boundary, (3) prompt-injection indicators as a distinct event class, (4) alignment of R4 monitoring outputs with NIS2 24h/72h reporting obligations for multinational operators.",
|
|
642
627
|
"status": "open",
|
|
643
628
|
"opened_date": "2026-05-11",
|
|
644
629
|
"evidence_cves": [
|
|
645
630
|
"CVE-2025-53773"
|
|
646
631
|
],
|
|
647
632
|
"atlas_refs": [
|
|
648
|
-
"AML.
|
|
633
|
+
"AML.T0051",
|
|
634
|
+
"AML.T0054",
|
|
635
|
+
"AML.T0096"
|
|
649
636
|
],
|
|
650
637
|
"attack_refs": [
|
|
651
|
-
"
|
|
652
|
-
"
|
|
638
|
+
"T0883",
|
|
639
|
+
"T0855",
|
|
640
|
+
"T1071"
|
|
653
641
|
]
|
|
654
642
|
},
|
|
655
|
-
"
|
|
656
|
-
"framework": "
|
|
657
|
-
"control_id": "
|
|
658
|
-
"control_name": "
|
|
659
|
-
"designed_for": "
|
|
643
|
+
"NIS2-Art21-incident-handling": {
|
|
644
|
+
"framework": "EU NIS2 Directive (2022/2555)",
|
|
645
|
+
"control_id": "Art. 21(2)(b)",
|
|
646
|
+
"control_name": "Incident handling",
|
|
647
|
+
"designed_for": "Essential and important entities operating in critical sectors across the EU; sets minimum cybersecurity risk-management measures including incident handling, business continuity, and supply chain security",
|
|
660
648
|
"misses": [
|
|
661
|
-
"
|
|
662
|
-
"No
|
|
663
|
-
"
|
|
664
|
-
"
|
|
649
|
+
"Incident-handling 24-hour early-warning + 72-hour notification clock starts from awareness, not from detection — gap covers AI-mediated incidents detected only after material harm",
|
|
650
|
+
"No explicit AI/ML incident category — prompt injection RCE, MCP supply-chain compromise, AI-API C2 not enumerated as in-scope incident classes",
|
|
651
|
+
"'State of the art' wording leaves the framework lag-permissive — operators can claim compliance without AI-specific incident playbooks",
|
|
652
|
+
"Cross-border supply-chain incidents (Shai-Hulud-class) span multiple competent authorities; coordination requirements are weakly specified"
|
|
665
653
|
],
|
|
666
|
-
"real_requirement": "
|
|
654
|
+
"real_requirement": "Incident-handling playbook enumerates AI-specific classes (LLM prompt injection RCE, MCP plugin compromise, AI-API C2 beaconing) with detection sources, evidence requirements, and the cross-jurisdiction notification matrix (NIS2 24h early-warning + 72h full report alongside DORA 4h + GDPR 72h). Continuity plans assume AI-assistant denial-of-service alongside classical IT outages.",
|
|
667
655
|
"status": "open",
|
|
668
|
-
"opened_date": "2026-05-
|
|
656
|
+
"opened_date": "2026-05-13",
|
|
669
657
|
"evidence_cves": [
|
|
658
|
+
"CVE-2025-53773",
|
|
670
659
|
"CVE-2026-30615",
|
|
671
|
-
"CVE-
|
|
660
|
+
"CVE-2026-45321"
|
|
672
661
|
],
|
|
673
662
|
"atlas_refs": [
|
|
674
|
-
"AML.
|
|
675
|
-
"AML.
|
|
676
|
-
"AML.T0051"
|
|
663
|
+
"AML.T0051",
|
|
664
|
+
"AML.T0096"
|
|
677
665
|
],
|
|
678
666
|
"attack_refs": [
|
|
679
|
-
"
|
|
680
|
-
"
|
|
667
|
+
"T1059",
|
|
668
|
+
"T1567"
|
|
681
669
|
]
|
|
682
670
|
},
|
|
683
|
-
"
|
|
684
|
-
"framework": "
|
|
685
|
-
"control_id": "
|
|
686
|
-
"control_name": "
|
|
687
|
-
"designed_for": "
|
|
671
|
+
"NIS2-Art21-patch-management": {
|
|
672
|
+
"framework": "EU NIS2 Directive",
|
|
673
|
+
"control_id": "Article 21(2)(e)",
|
|
674
|
+
"control_name": "Vulnerability handling and disclosure",
|
|
675
|
+
"designed_for": "General vulnerability management and disclosure processes for essential and important entities",
|
|
688
676
|
"misses": [
|
|
689
|
-
"
|
|
690
|
-
"
|
|
691
|
-
"No
|
|
692
|
-
"
|
|
693
|
-
"No mapping to global data-governance regimes (GDPR Art. 5(1)(f), AU APP 11, UK DPA 2018) for the embedding store as a sensitive-data location"
|
|
677
|
+
"No specific guidance on CISA KEV-class response timelines (hours, not days)",
|
|
678
|
+
"No requirement for live kernel patching capability in production environments",
|
|
679
|
+
"No definition of 'appropriate timeframe' for actively exploited vulnerabilities with public PoC",
|
|
680
|
+
"AI-accelerated exploit weaponization is not a consideration in the Article 21 controls"
|
|
694
681
|
],
|
|
695
|
-
"real_requirement": "
|
|
682
|
+
"real_requirement": "NIS2 Article 21 must be operationalized with CISA KEV-indexed SLAs: confirmed exploitation + public PoC = 4h to live-patch or isolate. 'Appropriate timeframe' requires explicit definition calibrated to exploit availability.",
|
|
696
683
|
"status": "open",
|
|
697
|
-
"opened_date": "2026-
|
|
698
|
-
"evidence_cves": [
|
|
699
|
-
|
|
700
|
-
"AML.T0018",
|
|
701
|
-
"AML.T0020",
|
|
702
|
-
"AML.T0043"
|
|
684
|
+
"opened_date": "2026-03-15",
|
|
685
|
+
"evidence_cves": [
|
|
686
|
+
"CVE-2026-31431"
|
|
703
687
|
],
|
|
688
|
+
"atlas_refs": [],
|
|
704
689
|
"attack_refs": [
|
|
705
|
-
"
|
|
706
|
-
"T1530"
|
|
690
|
+
"T1068"
|
|
707
691
|
]
|
|
708
692
|
},
|
|
709
|
-
"
|
|
710
|
-
"framework": "
|
|
711
|
-
"control_id": "
|
|
712
|
-
"control_name": "
|
|
713
|
-
"designed_for": "
|
|
693
|
+
"NIST-800-115": {
|
|
694
|
+
"framework": "NIST SP 800-115 (Technical Guide to Information Security Testing and Assessment)",
|
|
695
|
+
"control_id": "800-115",
|
|
696
|
+
"control_name": "Technical Guide to Information Security Testing and Assessment",
|
|
697
|
+
"designed_for": "Technical methodology for information security testing — review techniques, target identification, vulnerability validation, and reporting. Cross-walks to PCI DSS Req. 11.4, ISO 27001:2022 A.8.29, EU DORA Art. 24, UK NCSC CHECK / CREST, AU IRAP, OWASP WSTG, and PTES.",
|
|
714
698
|
"misses": [
|
|
715
|
-
"AI-API
|
|
716
|
-
"
|
|
717
|
-
"
|
|
718
|
-
"No
|
|
699
|
+
"AI-API testing techniques — 800-115 enumerates network, application, and wireless techniques; AI-API surface is not a named test class",
|
|
700
|
+
"Fuzz testing as compliance evidence — 800-115 references fuzzing as a technique but does not require it as evidence under any compliance regime (and prompt-fuzzing for AI APIs is absent)",
|
|
701
|
+
"No methodology for testing AI-API-as-C2, prompt-injection RCE in developer tooling, or MCP server trust",
|
|
702
|
+
"No cross-walk to EU AI Act Art. 15 (cybersecurity of high-risk AI systems) testing obligations"
|
|
719
703
|
],
|
|
720
|
-
"real_requirement": "
|
|
704
|
+
"real_requirement": "800-115 must add: (1) AI-API testing chapter with techniques for prompt injection, jailbreak, model-DoS, embedding inversion, AI-API-as-C2, (2) prompt-fuzzing methodology with evidence retention guidance, (3) MCP server test class, (4) explicit compliance cross-walk: under what regimes (PCI 11.4, DORA Art. 24, EU AI Act Art. 15, UK CHECK, AU IRAP) is which test class required.",
|
|
721
705
|
"status": "open",
|
|
722
706
|
"opened_date": "2026-05-11",
|
|
723
707
|
"evidence_cves": [
|
|
708
|
+
"CVE-2025-53773",
|
|
724
709
|
"CVE-2026-30615"
|
|
725
710
|
],
|
|
726
711
|
"atlas_refs": [
|
|
727
712
|
"AML.T0010",
|
|
728
|
-
"AML.
|
|
713
|
+
"AML.T0043",
|
|
714
|
+
"AML.T0051",
|
|
715
|
+
"AML.T0054",
|
|
716
|
+
"AML.T0096"
|
|
729
717
|
],
|
|
730
718
|
"attack_refs": [
|
|
719
|
+
"T1059",
|
|
720
|
+
"T1071",
|
|
731
721
|
"T1195.001"
|
|
732
722
|
]
|
|
733
723
|
},
|
|
@@ -758,209 +748,279 @@
|
|
|
758
748
|
"T1195.001"
|
|
759
749
|
]
|
|
760
750
|
},
|
|
761
|
-
"NIST-800-
|
|
762
|
-
"framework": "NIST SP 800-
|
|
763
|
-
"control_id": "
|
|
764
|
-
"control_name": "
|
|
765
|
-
"designed_for": "
|
|
751
|
+
"NIST-800-53-AC-2": {
|
|
752
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
753
|
+
"control_id": "AC-2",
|
|
754
|
+
"control_name": "Account Management",
|
|
755
|
+
"designed_for": "Human user accounts, service accounts, machine identities in traditional IAM systems",
|
|
766
756
|
"misses": [
|
|
767
|
-
"AI
|
|
768
|
-
"
|
|
769
|
-
"
|
|
770
|
-
"
|
|
757
|
+
"AI agent identity: AI agents act with service account credentials but decisions are made by the model, not the account holder",
|
|
758
|
+
"Prompt injection as access control bypass: injected instructions cause AI to take actions using its authorized service account — the access is authorized from AC-2's perspective",
|
|
759
|
+
"No mechanism for session-level or invocation-level authorization for AI agent actions",
|
|
760
|
+
"Audit trails show the service account, not the adversary who injected the prompt"
|
|
771
761
|
],
|
|
772
|
-
"real_requirement": "
|
|
762
|
+
"real_requirement": "Agent identity controls: each AI agent invocation requires an authorization context (who initiated it, what actions are permitted for this session, what tools are authorized). Prompt-level access control separate from account-level access control.",
|
|
773
763
|
"status": "open",
|
|
774
|
-
"opened_date": "2026-
|
|
764
|
+
"opened_date": "2026-03-01",
|
|
775
765
|
"evidence_cves": [
|
|
776
766
|
"CVE-2025-53773"
|
|
777
767
|
],
|
|
778
768
|
"atlas_refs": [
|
|
779
|
-
"AML.T0051",
|
|
780
|
-
"AML.T0054"
|
|
781
|
-
|
|
769
|
+
"AML.T0051",
|
|
770
|
+
"AML.T0054"
|
|
771
|
+
],
|
|
772
|
+
"attack_refs": [
|
|
773
|
+
"T1059"
|
|
774
|
+
]
|
|
775
|
+
},
|
|
776
|
+
"NIST-800-53-CM-7": {
|
|
777
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
778
|
+
"control_id": "CM-7",
|
|
779
|
+
"control_name": "Least Functionality",
|
|
780
|
+
"designed_for": "Restricting software, ports, protocols, and services to only those required for business functions",
|
|
781
|
+
"misses": [
|
|
782
|
+
"AI tool plugin authorization is not contemplated — MCP servers are not 'services' in the CM-7 sense",
|
|
783
|
+
"No mechanism for authorizing individual MCP server tool capabilities vs. blocking entire servers",
|
|
784
|
+
"Developer-installed AI plugins operate outside CM-7 enforcement scope in most implementations",
|
|
785
|
+
"No guidance on AI tool allowlisting as a CM-7 implementation technique"
|
|
786
|
+
],
|
|
787
|
+
"real_requirement": "CM-7 scope must extend to AI tool plugins. AI client tool allowlists are a CM-7 implementation: only approved MCP servers and tools may be invoked. Default deny for unapproved AI tool capabilities.",
|
|
788
|
+
"status": "open",
|
|
789
|
+
"opened_date": "2026-04-01",
|
|
790
|
+
"evidence_cves": [
|
|
791
|
+
"CVE-2026-30615"
|
|
792
|
+
],
|
|
793
|
+
"atlas_refs": [
|
|
794
|
+
"AML.T0010"
|
|
795
|
+
],
|
|
796
|
+
"attack_refs": [
|
|
797
|
+
"T1195.001"
|
|
798
|
+
]
|
|
799
|
+
},
|
|
800
|
+
"NIST-800-53-SA-12": {
|
|
801
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
802
|
+
"control_id": "SA-12",
|
|
803
|
+
"control_name": "Supply Chain Protection",
|
|
804
|
+
"designed_for": "Software procurement, vendor management, and supplier risk in enterprise environments",
|
|
805
|
+
"misses": [
|
|
806
|
+
"MCP server supply chain: developer-installed AI tool plugins are not covered by enterprise procurement controls",
|
|
807
|
+
"MCP server packages execute code on behalf of AI models — higher risk than traditional npm packages",
|
|
808
|
+
"No control for unsigned MCP server manifests or tool allowlisting",
|
|
809
|
+
"Supply chain risk for AI tool ecosystems is a new category not anticipated by SA-12"
|
|
810
|
+
],
|
|
811
|
+
"real_requirement": "SA-12 scope must include AI tool plugins (MCP servers, VS Code extensions with AI capability). MCP servers require: signed manifests, tool allowlisting, organizational approved-registry, vendor review equivalent to critical third-party software.",
|
|
812
|
+
"status": "open",
|
|
813
|
+
"opened_date": "2026-04-01",
|
|
814
|
+
"evidence_cves": [
|
|
815
|
+
"CVE-2026-30615"
|
|
816
|
+
],
|
|
817
|
+
"atlas_refs": [
|
|
818
|
+
"AML.T0010"
|
|
819
|
+
],
|
|
820
|
+
"attack_refs": [
|
|
821
|
+
"T1195.001"
|
|
822
|
+
]
|
|
823
|
+
},
|
|
824
|
+
"NIST-800-53-SC-28": {
|
|
825
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
826
|
+
"control_id": "SC-28",
|
|
827
|
+
"control_name": "Protection of Information at Rest",
|
|
828
|
+
"designed_for": "Cryptographic protection of data at rest using standard encryption mechanisms",
|
|
829
|
+
"misses": [
|
|
830
|
+
"Dirty Frag (CVE-2026-43284) exploits the IPsec kernel implementation — IPsec-based SC-28 compliance is not a compensating control when IPsec is the attack surface",
|
|
831
|
+
"SC-28 controls via kernel cryptographic subsystems are invalidated when those subsystems have unpatched LPE vulnerabilities",
|
|
832
|
+
"No requirement to note in SC-28 evidence when kernel CVEs affect the cryptographic implementation"
|
|
833
|
+
],
|
|
834
|
+
"real_requirement": "SC-28 compliance evidence must flag when kernel CVEs affect the cryptographic subsystem being used for compliance. IPsec-based or kernel-crypto-based SC-28 controls cannot be claimed as compensating controls for CVEs that exploit those subsystems.",
|
|
835
|
+
"status": "open",
|
|
836
|
+
"opened_date": "2026-04-01",
|
|
837
|
+
"evidence_cves": [
|
|
838
|
+
"CVE-2026-43284",
|
|
839
|
+
"CVE-2026-43500"
|
|
840
|
+
],
|
|
841
|
+
"atlas_refs": [],
|
|
842
|
+
"attack_refs": [
|
|
843
|
+
"T1068"
|
|
844
|
+
]
|
|
845
|
+
},
|
|
846
|
+
"NIST-800-53-SC-7": {
|
|
847
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
848
|
+
"control_id": "SC-7",
|
|
849
|
+
"control_name": "Boundary Protection",
|
|
850
|
+
"designed_for": "Monitor and control communications at external boundaries and key internal boundaries. Original posture assumes traffic to malicious infrastructure is identifiable by destination reputation, novel domain, or anomalous port — i.e., the C2 channel looks unlike legitimate enterprise traffic.",
|
|
851
|
+
"misses": [
|
|
852
|
+
"AI-API C2 (SesameOp pattern, PROMPTFLUX, PROMPTSTEAL) routes commands through legitimate AI provider domains (api.openai.com, api.anthropic.com, generativelanguage.googleapis.com). Destination reputation = high; novelty = zero; the boundary device sees traffic indistinguishable from sanctioned developer / business use.",
|
|
853
|
+
"TLS termination at the boundary still does not yield the content for inspection without breaking the API contract (mutual auth, server cert pinning by the SDK).",
|
|
854
|
+
"Default egress allowlists in most enterprises explicitly permit major AI provider domains for legitimate productivity use — the same channel attackers leverage.",
|
|
855
|
+
"NetFlow / Zeek-class boundary telemetry cannot distinguish benign LLM prompts from C2 prompts. The signal must come from inside the application context (which AI SDK call shape, what user identity, what data left the prompt), not the boundary."
|
|
856
|
+
],
|
|
857
|
+
"real_requirement": "SC-7 implementations that operate in environments using AI APIs MUST add an AI-egress-layer control: SDK-level prompt logging with identity binding, anomaly detection on prompt-shape / token-volume / off-business-hours patterns, and an allowlist of AI provider domains that explicitly enumerates the sanctioned business reason for each. Boundary-only SC-7 evidence is incomplete for any org with AI API access in production.",
|
|
858
|
+
"status": "open",
|
|
859
|
+
"opened_date": "2026-05-01",
|
|
860
|
+
"evidence_cves": [],
|
|
861
|
+
"atlas_refs": [
|
|
862
|
+
"AML.T0096",
|
|
863
|
+
"AML.T0017"
|
|
782
864
|
],
|
|
783
865
|
"attack_refs": [
|
|
784
|
-
"
|
|
785
|
-
"
|
|
786
|
-
"
|
|
866
|
+
"T1071",
|
|
867
|
+
"T1102",
|
|
868
|
+
"T1568"
|
|
787
869
|
]
|
|
788
870
|
},
|
|
789
|
-
"NIST-800-
|
|
790
|
-
"framework": "NIST SP 800-
|
|
791
|
-
"control_id": "
|
|
792
|
-
"control_name": "
|
|
793
|
-
"designed_for": "
|
|
871
|
+
"NIST-800-53-SC-8": {
|
|
872
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
873
|
+
"control_id": "SC-8",
|
|
874
|
+
"control_name": "Transmission Confidentiality and Integrity",
|
|
875
|
+
"designed_for": "Cryptographic protection of data in transit via standard protocols (TLS, IPsec, etc.)",
|
|
794
876
|
"misses": [
|
|
795
|
-
"
|
|
796
|
-
"
|
|
797
|
-
"Ephemeral session keys for AI workflows — the assumption that authenticator binding is long-lived breaks for per-invocation agent runs",
|
|
798
|
-
"No equivalence with eIDAS 2.0 'electronic attestation of attributes' for agent capability tokens — cross-jurisdiction interop gap"
|
|
877
|
+
"Dirty Frag (CVE-2026-43284) exploits the IPsec implementation itself — IPsec-based SC-8 compliance is not a compensating control when IPsec is the attack surface",
|
|
878
|
+
"No requirement for cryptographic subsystem integrity monitoring"
|
|
799
879
|
],
|
|
800
|
-
"real_requirement": "
|
|
880
|
+
"real_requirement": "SC-8 compliance evidence must note when kernel CVEs affecting the cryptographic subsystem are unpatched. IPsec-based controls cannot be claimed as compensating controls for CVEs affecting the IPsec kernel implementation.",
|
|
801
881
|
"status": "open",
|
|
802
|
-
"opened_date": "2026-
|
|
882
|
+
"opened_date": "2026-04-01",
|
|
803
883
|
"evidence_cves": [
|
|
804
|
-
"CVE-
|
|
805
|
-
|
|
806
|
-
"atlas_refs": [
|
|
807
|
-
"AML.T0051",
|
|
808
|
-
"AML.T0054"
|
|
884
|
+
"CVE-2026-43284",
|
|
885
|
+
"CVE-2026-43500"
|
|
809
886
|
],
|
|
887
|
+
"atlas_refs": [],
|
|
810
888
|
"attack_refs": [
|
|
811
|
-
"
|
|
812
|
-
"T1059"
|
|
889
|
+
"T1068"
|
|
813
890
|
]
|
|
814
891
|
},
|
|
815
|
-
"
|
|
816
|
-
"framework": "
|
|
817
|
-
"control_id": "
|
|
818
|
-
"control_name": "
|
|
819
|
-
"designed_for": "
|
|
892
|
+
"NIST-800-53-SI-10": {
|
|
893
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
894
|
+
"control_id": "SI-10",
|
|
895
|
+
"control_name": "Information Input Validation",
|
|
896
|
+
"designed_for": "Validating untrusted input at system boundaries before consumption by downstream code paths",
|
|
820
897
|
"misses": [
|
|
821
|
-
"
|
|
822
|
-
"
|
|
823
|
-
"
|
|
824
|
-
"
|
|
898
|
+
"Treats 'input validation' as a single layer at the trust boundary. Modern injection classes (SQL, argument, command, prompt) live INSIDE the trust boundary — the input is already 'validated' as authentic but the consumer concatenates it into a syntax the original validator did not anticipate (SQL query, kubectl argv, shell command).",
|
|
899
|
+
"Does not distinguish argv-array vs string-form invocation. CVE-2026-39884 (mcp-server-kubernetes argument injection) and the broader CWE-88 class are invisible to a SI-10-compliant codebase that 'validates' the user-input string for length and character class.",
|
|
900
|
+
"Does not address parameterised-query vs string-concat distinction. CVE-2026-42208 (LiteLLM SQLi on CISA KEV) is the cardinal recent example — input was validated, then concatenated into SQL during error-handling, which the validator did not gate.",
|
|
901
|
+
"Auditing for SI-10 typically samples function boundaries; the argument-injection / SQL-injection / prompt-injection failure modes all occur inside the boundary."
|
|
825
902
|
],
|
|
826
|
-
"real_requirement": "
|
|
903
|
+
"real_requirement": "Per-injection-class structural controls in addition to boundary validation. Parameterised queries enforced at the ORM/driver level (CWE-89). Argv-array form for spawned subprocesses (CWE-88). Tool-arg / function-call sanitisation in MCP / AI-agent surfaces (CWE-94). Lint rules flagging string-concat into SQL, exec, or AI-tool arguments. SI-10 compliance attestation augmented with a per-class checklist that names the specific structural control.",
|
|
827
904
|
"status": "open",
|
|
828
|
-
"opened_date": "2026-05-
|
|
905
|
+
"opened_date": "2026-05-13",
|
|
829
906
|
"evidence_cves": [
|
|
830
|
-
"CVE-
|
|
907
|
+
"CVE-2026-42208",
|
|
908
|
+
"CVE-2026-39884"
|
|
831
909
|
],
|
|
832
910
|
"atlas_refs": [
|
|
833
|
-
"AML.
|
|
834
|
-
"AML.T0054",
|
|
835
|
-
"AML.T0096"
|
|
911
|
+
"AML.T0053"
|
|
836
912
|
],
|
|
837
913
|
"attack_refs": [
|
|
838
|
-
"
|
|
839
|
-
"
|
|
840
|
-
"T1071"
|
|
914
|
+
"T1190",
|
|
915
|
+
"T1059"
|
|
841
916
|
]
|
|
842
917
|
},
|
|
843
|
-
"
|
|
844
|
-
"framework": "
|
|
845
|
-
"control_id": "
|
|
846
|
-
"control_name": "
|
|
847
|
-
"designed_for": "
|
|
918
|
+
"NIST-800-53-SI-12": {
|
|
919
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
920
|
+
"control_id": "SI-12",
|
|
921
|
+
"control_name": "Information Management and Retention",
|
|
922
|
+
"designed_for": "Managing and retaining information in accordance with applicable laws, directives, regulations, and policies",
|
|
848
923
|
"misses": [
|
|
849
|
-
"AI
|
|
850
|
-
"
|
|
851
|
-
"
|
|
852
|
-
"
|
|
924
|
+
"AI-generated outputs in RAG pipelines lack retention and integrity controls",
|
|
925
|
+
"Prompt logs required for AI action audit trails are not addressed by SI-12 retention policies",
|
|
926
|
+
"Model inference outputs that influence security-relevant decisions have no documented retention requirements",
|
|
927
|
+
"AI training data provenance and retention is outside SI-12 scope"
|
|
853
928
|
],
|
|
854
|
-
"real_requirement": "
|
|
929
|
+
"real_requirement": "SI-12 must be extended to include AI system data: prompt logs (security-relevant AI actions must be retained for incident investigation), model version history, inference output logs for security-sensitive decisions, training data provenance records.",
|
|
855
930
|
"status": "open",
|
|
856
|
-
"opened_date": "2026-
|
|
931
|
+
"opened_date": "2026-03-01",
|
|
857
932
|
"evidence_cves": [
|
|
858
|
-
"CVE-2025-53773"
|
|
859
|
-
"CVE-2026-30615"
|
|
933
|
+
"CVE-2025-53773"
|
|
860
934
|
],
|
|
861
935
|
"atlas_refs": [
|
|
862
|
-
"AML.
|
|
863
|
-
"AML.T0096"
|
|
936
|
+
"AML.T0054"
|
|
864
937
|
],
|
|
865
938
|
"attack_refs": [
|
|
866
|
-
"T1071",
|
|
867
939
|
"T1059"
|
|
868
940
|
]
|
|
869
941
|
},
|
|
870
|
-
"
|
|
871
|
-
"framework": "
|
|
872
|
-
"control_id": "
|
|
873
|
-
"control_name": "
|
|
874
|
-
"designed_for": "
|
|
942
|
+
"NIST-800-53-SI-2": {
|
|
943
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
944
|
+
"control_id": "SI-2",
|
|
945
|
+
"control_name": "Flaw Remediation",
|
|
946
|
+
"designed_for": "Network-centric environments with human-speed exploit development. Original 2013 context; Rev 5 2020. Assumes organizationally-defined time periods are a meaningful security window.",
|
|
875
947
|
"misses": [
|
|
876
|
-
"
|
|
877
|
-
"
|
|
878
|
-
"
|
|
879
|
-
"
|
|
880
|
-
"No cross-walk to allied frameworks (UK DEF STAN, AU DISP) for AI use in joint programmes"
|
|
948
|
+
"Deterministic LPEs with no race condition — 'timely' is not operationalized for instant-root exploits",
|
|
949
|
+
"CISA KEV class: confirmed exploitation requires incident-speed response, not patch-cycle response",
|
|
950
|
+
"AI-assisted weaponization compressing time-to-reliable-exploit from weeks to hours",
|
|
951
|
+
"Live kernel patching as a required capability for systems that cannot tolerate reboots"
|
|
881
952
|
],
|
|
882
|
-
"real_requirement": "
|
|
953
|
+
"real_requirement": "Tiered SLA: CISA KEV + public PoC = 4h to live-patch or isolate. Public PoC (no KEV) = 24h. Critical (no public PoC) = 72h. High = 7 days. Live patching capability required for production systems that cannot reboot.",
|
|
883
954
|
"status": "open",
|
|
884
|
-
"opened_date": "2026-
|
|
955
|
+
"opened_date": "2026-03-15",
|
|
885
956
|
"evidence_cves": [
|
|
886
|
-
"CVE-
|
|
887
|
-
"CVE-2026-
|
|
888
|
-
],
|
|
889
|
-
"atlas_refs": [
|
|
890
|
-
"AML.T0010",
|
|
891
|
-
"AML.T0051",
|
|
892
|
-
"AML.T0096"
|
|
957
|
+
"CVE-2026-31431",
|
|
958
|
+
"CVE-2026-43284"
|
|
893
959
|
],
|
|
960
|
+
"atlas_refs": [],
|
|
894
961
|
"attack_refs": [
|
|
895
|
-
"
|
|
896
|
-
"T1071",
|
|
897
|
-
"T1059"
|
|
962
|
+
"T1068"
|
|
898
963
|
]
|
|
899
964
|
},
|
|
900
|
-
"
|
|
901
|
-
"framework": "
|
|
902
|
-
"control_id": "
|
|
903
|
-
"control_name": "
|
|
904
|
-
"designed_for": "
|
|
965
|
+
"NIST-800-53-SI-3": {
|
|
966
|
+
"framework": "NIST SP 800-53 Rev 5",
|
|
967
|
+
"control_id": "SI-3",
|
|
968
|
+
"control_name": "Malicious Code Protection",
|
|
969
|
+
"designed_for": "Signature-based and behavioral malware detection for known malware families",
|
|
905
970
|
"misses": [
|
|
906
|
-
"
|
|
907
|
-
"AI-generated
|
|
908
|
-
"
|
|
909
|
-
"No equivalence with GDPR Art. 35 DPIA / UK NHS DSPT / AU My Health Records Act for AI processing of health data — covered entities operating cross-border face unresolved obligations"
|
|
971
|
+
"PROMPTFLUX generates unique evasion code per execution by querying public LLMs — no signature exists because every sample is novel",
|
|
972
|
+
"AI-generated malware evasion is dynamically updated per detection event",
|
|
973
|
+
"LLM query by malware process is not a recognized detection indicator in SI-3 implementations"
|
|
910
974
|
],
|
|
911
|
-
"real_requirement": "
|
|
975
|
+
"real_requirement": "Malware protection must include: detection of AI API queries from unexpected processes (PROMPTFLUX indicator), behavioral analysis that doesn't rely solely on static signatures, LLM query monitoring as a security telemetry source.",
|
|
912
976
|
"status": "open",
|
|
913
|
-
"opened_date": "2026-
|
|
914
|
-
"evidence_cves": [
|
|
915
|
-
"CVE-2025-53773"
|
|
916
|
-
],
|
|
977
|
+
"opened_date": "2026-02-01",
|
|
978
|
+
"evidence_cves": [],
|
|
917
979
|
"atlas_refs": [
|
|
918
|
-
"AML.
|
|
919
|
-
"AML.T0096"
|
|
980
|
+
"AML.T0017"
|
|
920
981
|
],
|
|
921
982
|
"attack_refs": [
|
|
922
|
-
"
|
|
923
|
-
"T1530"
|
|
983
|
+
"T1059"
|
|
924
984
|
]
|
|
925
985
|
},
|
|
926
|
-
"
|
|
927
|
-
"framework": "
|
|
928
|
-
"control_id": "
|
|
929
|
-
"control_name": "
|
|
930
|
-
"designed_for": "
|
|
986
|
+
"NIST-800-63B-rev4": {
|
|
987
|
+
"framework": "NIST SP 800-63B Rev 4 (Digital Identity Guidelines — Authentication & Lifecycle Mgmt)",
|
|
988
|
+
"control_id": "800-63B-rev4",
|
|
989
|
+
"control_name": "Authentication and Lifecycle Management (AAL/IAL/FAL)",
|
|
990
|
+
"designed_for": "Authentication assurance levels for human subscribers and non-person entities (NPEs). Referenced by US Federal services, cross-walked by EU eIDAS 2.0 (assurance levels low/substantial/high), UK GPG 44/45, AU TDIF (Trusted Digital Identity Framework), and ISO/IEC 29115.",
|
|
931
991
|
"misses": [
|
|
932
|
-
"AI
|
|
933
|
-
"
|
|
934
|
-
"
|
|
935
|
-
"No
|
|
992
|
+
"AI agents as principals — 800-63B treats NPEs as long-lived service accounts; AI agents are short-lived, intent-driven, and act on behalf of a chain of humans/agents",
|
|
993
|
+
"Agent-to-agent authentication — no AAL-equivalent concept for one agent authenticating another with a derived authority scope",
|
|
994
|
+
"Ephemeral session keys for AI workflows — the assumption that authenticator binding is long-lived breaks for per-invocation agent runs",
|
|
995
|
+
"No equivalence with eIDAS 2.0 'electronic attestation of attributes' for agent capability tokens — cross-jurisdiction interop gap"
|
|
936
996
|
],
|
|
937
|
-
"real_requirement": "
|
|
997
|
+
"real_requirement": "800-63B Rev 4 must add an AAL-A (agent assurance level) construct: per-invocation authenticator binding, capability-scoped tokens (what this agent is permitted to do this run), agent-to-agent delegation chains with non-repudiation, and explicit cross-walk to eIDAS 2.0 attestations, UK GPG 45, AU TDIF, and ISO 29115 for cross-border agent identity.",
|
|
938
998
|
"status": "open",
|
|
939
999
|
"opened_date": "2026-05-11",
|
|
940
1000
|
"evidence_cves": [
|
|
941
|
-
"CVE-2025-53773"
|
|
942
|
-
"CVE-2026-30615"
|
|
1001
|
+
"CVE-2025-53773"
|
|
943
1002
|
],
|
|
944
1003
|
"atlas_refs": [
|
|
945
|
-
"AML.
|
|
1004
|
+
"AML.T0051",
|
|
946
1005
|
"AML.T0054"
|
|
947
1006
|
],
|
|
948
1007
|
"attack_refs": [
|
|
949
|
-
"
|
|
1008
|
+
"T1078",
|
|
1009
|
+
"T1059"
|
|
950
1010
|
]
|
|
951
1011
|
},
|
|
952
|
-
"
|
|
953
|
-
"framework": "
|
|
954
|
-
"control_id": "
|
|
955
|
-
"control_name": "
|
|
956
|
-
"designed_for": "Security
|
|
1012
|
+
"NIST-800-82r3": {
|
|
1013
|
+
"framework": "NIST SP 800-82 Rev 3 (Guide to OT Security)",
|
|
1014
|
+
"control_id": "800-82r3 (overall guidance)",
|
|
1015
|
+
"control_name": "Guide to Operational Technology (OT) Security",
|
|
1016
|
+
"designed_for": "Security guidance for ICS/SCADA/DCS/PLC environments. Cross-walks to IEC 62443, EU NIS2 (essential entities — energy, water, transport), UK NCSC OT guidance and CAF for OT, AU SOCI Act + AESCSF (Australian Energy Sector Cyber Security Framework), and ISO 27019.",
|
|
957
1017
|
"misses": [
|
|
958
|
-
"AI
|
|
959
|
-
"
|
|
960
|
-
"Prompt-injection-
|
|
961
|
-
"
|
|
1018
|
+
"AI-enabled OT operator assistants — LLM copilots in control rooms are not contemplated; the trust model assumes human operators, not human+LLM operators",
|
|
1019
|
+
"LLM-as-engineering-interface to ICS — natural-language operator tools that translate intent into PLC commands have no isolation requirement",
|
|
1020
|
+
"Prompt-injection-driven safety state change is not in the 800-82r3 threat catalogue",
|
|
1021
|
+
"AI-API egress from OT networks (for assistant features) violates the air-gap assumption that underpins many 800-82r3 zones-and-conduits diagrams"
|
|
962
1022
|
],
|
|
963
|
-
"real_requirement": "
|
|
1023
|
+
"real_requirement": "800-82r3 must add an AI-in-OT control class: (1) explicit prohibition or strict gating of LLM operator assistants in safety-critical zones, (2) prompt-injection threat-model entries for any natural-language operator interface, (3) treat AI-API egress from OT as a conduit requiring named approval and monitoring (NIS2 essential-entity reportable), (4) cross-walk to IEC 62443-3-3 SR 5.1 (network segmentation) for AI-API traffic.",
|
|
964
1024
|
"status": "open",
|
|
965
1025
|
"opened_date": "2026-05-11",
|
|
966
1026
|
"evidence_cves": [
|
|
@@ -977,20 +1037,20 @@
|
|
|
977
1037
|
"T1071"
|
|
978
1038
|
]
|
|
979
1039
|
},
|
|
980
|
-
"
|
|
981
|
-
"framework": "
|
|
982
|
-
"control_id": "
|
|
983
|
-
"control_name": "
|
|
984
|
-
"designed_for": "
|
|
1040
|
+
"NIST-AI-RMF-MEASURE-2.5": {
|
|
1041
|
+
"framework": "NIST AI RMF 1.0",
|
|
1042
|
+
"control_id": "MEASURE 2.5",
|
|
1043
|
+
"control_name": "AI system to human interaction evaluation",
|
|
1044
|
+
"designed_for": "Evaluating AI system outputs and behaviors in human-AI interaction contexts",
|
|
985
1045
|
"misses": [
|
|
986
|
-
"
|
|
987
|
-
"
|
|
988
|
-
"
|
|
989
|
-
"
|
|
1046
|
+
"MEASURE 2.5 measures human-AI interaction quality, not adversarial input resistance",
|
|
1047
|
+
"Does not require adversarial prompt injection testing as a measurement activity",
|
|
1048
|
+
"No methodology for measuring AI tool action authorization boundary compliance",
|
|
1049
|
+
"Human feedback evaluation does not capture adversarially-induced behavioral changes"
|
|
990
1050
|
],
|
|
991
|
-
"real_requirement": "
|
|
1051
|
+
"real_requirement": "MEASURE 2.5 must include adversarial evaluation: red-team testing for prompt injection, measurement of action boundary compliance (does the AI stay within authorized scope?), and behavioral regression testing after model updates.",
|
|
992
1052
|
"status": "open",
|
|
993
|
-
"opened_date": "2026-
|
|
1053
|
+
"opened_date": "2026-01-01",
|
|
994
1054
|
"evidence_cves": [
|
|
995
1055
|
"CVE-2025-53773"
|
|
996
1056
|
],
|
|
@@ -999,141 +1059,138 @@
|
|
|
999
1059
|
"AML.T0054"
|
|
1000
1060
|
],
|
|
1001
1061
|
"attack_refs": [
|
|
1002
|
-
"T1078",
|
|
1003
1062
|
"T1059"
|
|
1004
1063
|
]
|
|
1005
1064
|
},
|
|
1006
|
-
"
|
|
1007
|
-
"framework": "
|
|
1008
|
-
"control_id": "
|
|
1009
|
-
"control_name": "
|
|
1010
|
-
"designed_for": "
|
|
1065
|
+
"OWASP-ASVS-v5.0-V14": {
|
|
1066
|
+
"framework": "OWASP ASVS v5.0",
|
|
1067
|
+
"control_id": "V14",
|
|
1068
|
+
"control_name": "Configuration verification",
|
|
1069
|
+
"designed_for": "Application-level configuration audit: build config, dependencies, runtime hardening, secrets management. Used as the cross-walk baseline for ISO 27001 A.8.9 (configuration management), NIST 800-53 CM-6, SOC 2 CC7, PCI DSS 2.x, and AU ISM configuration controls.",
|
|
1011
1070
|
"misses": [
|
|
1012
|
-
"AI-
|
|
1013
|
-
"
|
|
1014
|
-
"
|
|
1015
|
-
"No
|
|
1071
|
+
"AI-API configuration — model selection, temperature, system prompt, safety setting, provider data-retention setting are not audited as security configuration items",
|
|
1072
|
+
"MCP server configuration — server registry source, signature verification policy, transport authentication mode are not in scope",
|
|
1073
|
+
"Agent tool allowlists — V14 has no concept of a per-AI-client tool allowlist as a configuration object subject to verification",
|
|
1074
|
+
"No requirement to version-control AI configuration alongside application code"
|
|
1016
1075
|
],
|
|
1017
|
-
"real_requirement": "
|
|
1076
|
+
"real_requirement": "V14 must add an AI configuration class: model + provider + system prompt + safety setting + data-retention setting under version control and review; MCP server registry source and signature policy verified; AI client tool allowlist treated as a security-relevant configuration object subject to change control and audit.",
|
|
1018
1077
|
"status": "open",
|
|
1019
1078
|
"opened_date": "2026-05-11",
|
|
1020
1079
|
"evidence_cves": [
|
|
1021
|
-
"CVE-
|
|
1080
|
+
"CVE-2026-30615"
|
|
1022
1081
|
],
|
|
1023
1082
|
"atlas_refs": [
|
|
1024
|
-
"AML.
|
|
1025
|
-
"AML.
|
|
1026
|
-
"AML.T0096"
|
|
1083
|
+
"AML.T0010",
|
|
1084
|
+
"AML.T0016"
|
|
1027
1085
|
],
|
|
1028
1086
|
"attack_refs": [
|
|
1029
|
-
"
|
|
1030
|
-
"T1078"
|
|
1087
|
+
"T1195.001"
|
|
1031
1088
|
]
|
|
1032
1089
|
},
|
|
1033
|
-
"
|
|
1034
|
-
"framework": "
|
|
1035
|
-
"control_id": "
|
|
1036
|
-
"control_name": "
|
|
1037
|
-
"designed_for": "
|
|
1090
|
+
"OWASP-LLM-Top-10-2025-LLM01": {
|
|
1091
|
+
"framework": "OWASP Top 10 for LLM Applications 2025",
|
|
1092
|
+
"control_id": "LLM01",
|
|
1093
|
+
"control_name": "Prompt Injection",
|
|
1094
|
+
"designed_for": "App-layer compliance baseline for LLM applications. Adopted globally as a reference set under EU AI Act technical documentation, UK NCSC AI guidance, AU ACSC AI security guidance, and ISO/IEC 27001:2022 A.8.28 secure coding extensions.",
|
|
1038
1095
|
"misses": [
|
|
1039
|
-
"AI-
|
|
1040
|
-
"
|
|
1041
|
-
"
|
|
1042
|
-
"No
|
|
1096
|
+
"AI-API as C2 channel — LLM01 frames prompt injection as application output integrity, not network egress posture (SesameOp / ATLAS AML.T0096 is out of scope)",
|
|
1097
|
+
"Legitimate-endpoint covert use — guidance assumes the malicious instruction is in the prompt, not that the LLM endpoint itself is the C2 destination",
|
|
1098
|
+
"Indirect prompt injection via PR descriptions / web pages / RAG corpora is named but mitigations are advisory, not testable controls",
|
|
1099
|
+
"No control mapping back to ATT&CK T1071 (Application Layer Protocol) or T1102 (Web Service) — LLM01 sits in an AI silo separated from network defence"
|
|
1043
1100
|
],
|
|
1044
|
-
"real_requirement": "
|
|
1101
|
+
"real_requirement": "LLM01 implementation must bind to network-egress controls: SDK-level prompt logging with identity binding, allowlisted AI provider domains with documented business justification, anomaly detection on prompt shape/volume/timing, and ATLAS+ATT&CK dual-mapping for every LLM01 finding so SOC tooling can correlate with non-AI telemetry.",
|
|
1045
1102
|
"status": "open",
|
|
1046
1103
|
"opened_date": "2026-05-11",
|
|
1047
1104
|
"evidence_cves": [
|
|
1048
|
-
"CVE-2025-53773"
|
|
1049
|
-
"CVE-2026-30615"
|
|
1105
|
+
"CVE-2025-53773"
|
|
1050
1106
|
],
|
|
1051
1107
|
"atlas_refs": [
|
|
1052
|
-
"AML.
|
|
1053
|
-
"AML.
|
|
1054
|
-
"AML.
|
|
1108
|
+
"AML.T0051",
|
|
1109
|
+
"AML.T0054",
|
|
1110
|
+
"AML.T0096"
|
|
1055
1111
|
],
|
|
1056
1112
|
"attack_refs": [
|
|
1057
|
-
"
|
|
1058
|
-
"
|
|
1113
|
+
"T1059",
|
|
1114
|
+
"T1071"
|
|
1059
1115
|
]
|
|
1060
1116
|
},
|
|
1061
|
-
"
|
|
1062
|
-
"framework": "
|
|
1063
|
-
"control_id": "
|
|
1064
|
-
"control_name": "
|
|
1065
|
-
"designed_for": "
|
|
1117
|
+
"OWASP-LLM-Top-10-2025-LLM02": {
|
|
1118
|
+
"framework": "OWASP Top 10 for LLM Applications 2025",
|
|
1119
|
+
"control_id": "LLM02",
|
|
1120
|
+
"control_name": "Sensitive Information Disclosure",
|
|
1121
|
+
"designed_for": "Preventing LLM applications from disclosing sensitive data via outputs, system prompts, or training data leakage. Cross-walks to GDPR Art. 32, UK DPA 2018 security principle, AU Privacy Act APP 11, HIPAA Security Rule, PCI DSS Req. 3, and ISO 27001:2022 A.5.34.",
|
|
1066
1122
|
"misses": [
|
|
1067
|
-
"
|
|
1068
|
-
"
|
|
1069
|
-
"
|
|
1070
|
-
"No
|
|
1123
|
+
"PHI / PII inside the model context window has no retention or minimisation requirement — LLM02 treats the prompt as ephemeral when providers retain it",
|
|
1124
|
+
"Prompt injection (LLM01) and sensitive disclosure (LLM02) are treated as separate findings — chained exfiltration via injected instructions is not a primary scenario",
|
|
1125
|
+
"Cross-tenant prompt cache leakage (provider-side) is not in scope — LLM02 stops at the application boundary",
|
|
1126
|
+
"No requirement for DPIA-equivalent assessment (EU AI Act, GDPR Art. 35, UK ICO AI guidance) when sensitive data enters prompts"
|
|
1071
1127
|
],
|
|
1072
|
-
"real_requirement": "
|
|
1128
|
+
"real_requirement": "LLM02 must require: prompt-level data minimisation (DLP before send), DPIA-equivalent assessment when sensitive categories enter prompts (GDPR / UK ICO / AU Privacy Act / HIPAA), explicit provider data-retention contractual terms, and chained-scenario testing combining LLM01 + LLM02 (injection-driven exfiltration).",
|
|
1073
1129
|
"status": "open",
|
|
1074
1130
|
"opened_date": "2026-05-11",
|
|
1075
1131
|
"evidence_cves": [
|
|
1076
|
-
"CVE-2025-53773"
|
|
1077
|
-
"CVE-2026-30615"
|
|
1132
|
+
"CVE-2025-53773"
|
|
1078
1133
|
],
|
|
1079
1134
|
"atlas_refs": [
|
|
1080
|
-
"AML.
|
|
1081
|
-
"AML.T0018"
|
|
1135
|
+
"AML.T0054"
|
|
1082
1136
|
],
|
|
1083
1137
|
"attack_refs": [
|
|
1084
|
-
"
|
|
1138
|
+
"T1059",
|
|
1139
|
+
"T1530"
|
|
1085
1140
|
]
|
|
1086
1141
|
},
|
|
1087
|
-
"
|
|
1088
|
-
"framework": "
|
|
1089
|
-
"control_id": "
|
|
1090
|
-
"control_name": "
|
|
1091
|
-
"designed_for": "
|
|
1142
|
+
"OWASP-LLM-Top-10-2025-LLM06": {
|
|
1143
|
+
"framework": "OWASP Top 10 for LLM Applications 2025",
|
|
1144
|
+
"control_id": "LLM06",
|
|
1145
|
+
"control_name": "Excessive Agency",
|
|
1146
|
+
"designed_for": "Limiting the autonomy granted to LLM agents — tool scope, action authority, and human-in-the-loop placement. Cross-walks to EU AI Act Art. 14 (human oversight), UK CAF outcome B4, AU AI Ethics Framework principle of human-centred values, NIST AI RMF GOVERN-1.5.",
|
|
1092
1147
|
"misses": [
|
|
1093
|
-
"
|
|
1094
|
-
"
|
|
1095
|
-
"
|
|
1096
|
-
"No
|
|
1148
|
+
"MCP/agent-trust class — LLM06 is application-internal; it does not address third-party tool plugins (MCP servers) that arrive via developer install rather than enterprise procurement",
|
|
1149
|
+
"No requirement for signed tool manifests or organisational tool allowlists — 'limit functionality' is advisory",
|
|
1150
|
+
"Agent-to-agent delegation (one LLM calling another with its own tools) is not modelled — the agency boundary is treated as a single hop",
|
|
1151
|
+
"No mapping to supply-chain controls (ISO 27001 A.8.30, NIST SA-12, SOC 2 CC9) — excessive agency via supply chain is a blind spot"
|
|
1097
1152
|
],
|
|
1098
|
-
"real_requirement": "
|
|
1153
|
+
"real_requirement": "LLM06 must require: signed MCP server manifests, organisational tool allowlists enforced at the AI client, per-invocation authorisation scopes (not per-account), and supply-chain governance for AI tool plugins equivalent to critical third-party software (ISO A.8.30 / SOC 2 CC9 / NIST SA-12 extended).",
|
|
1099
1154
|
"status": "open",
|
|
1100
1155
|
"opened_date": "2026-05-11",
|
|
1101
1156
|
"evidence_cves": [
|
|
1102
|
-
"CVE-2026-30615"
|
|
1157
|
+
"CVE-2026-30615",
|
|
1158
|
+
"CVE-2025-53773"
|
|
1103
1159
|
],
|
|
1104
1160
|
"atlas_refs": [
|
|
1105
1161
|
"AML.T0010",
|
|
1106
|
-
"AML.
|
|
1107
|
-
"AML.
|
|
1162
|
+
"AML.T0016",
|
|
1163
|
+
"AML.T0051"
|
|
1108
1164
|
],
|
|
1109
1165
|
"attack_refs": [
|
|
1110
|
-
"T1195.001"
|
|
1166
|
+
"T1195.001",
|
|
1167
|
+
"T1059"
|
|
1111
1168
|
]
|
|
1112
1169
|
},
|
|
1113
|
-
"
|
|
1114
|
-
"framework": "
|
|
1115
|
-
"control_id": "
|
|
1116
|
-
"control_name": "
|
|
1117
|
-
"designed_for": "
|
|
1170
|
+
"OWASP-LLM-Top-10-2025-LLM08": {
|
|
1171
|
+
"framework": "OWASP Top 10 for LLM Applications 2025",
|
|
1172
|
+
"control_id": "LLM08",
|
|
1173
|
+
"control_name": "Vector and Embedding Weaknesses",
|
|
1174
|
+
"designed_for": "RAG-class issues: embedding poisoning, retrieval manipulation, embedding inversion, cross-tenant retrieval leakage. Cross-walks to ISO 27001:2022 A.8.28 secure coding, NIST AI RMF MAP-2.3, EU AI Act Art. 10 data governance, UK NCSC RAG guidance.",
|
|
1118
1175
|
"misses": [
|
|
1119
|
-
"
|
|
1120
|
-
"
|
|
1121
|
-
"No
|
|
1122
|
-
"Provenance
|
|
1176
|
+
"Indirect prompt injection via poisoned retrieval documents is named but no concrete test methodology is given",
|
|
1177
|
+
"Embedding inversion (recovering source text from embeddings) is treated as theoretical despite working PoCs against common embedding models",
|
|
1178
|
+
"No requirement for cross-tenant isolation testing of shared vector stores — multi-tenant SaaS RAG is a primary deployment pattern",
|
|
1179
|
+
"Provenance and integrity of corpus documents (signed sources, content-addressable storage) are not required",
|
|
1180
|
+
"No mapping to global data-governance regimes (GDPR Art. 5(1)(f), AU APP 11, UK DPA 2018) for the embedding store as a sensitive-data location"
|
|
1123
1181
|
],
|
|
1124
|
-
"real_requirement": "
|
|
1182
|
+
"real_requirement": "LLM08 must require: corpus document provenance and integrity (signed sources, content hashing), cross-tenant isolation testing for shared vector stores, embedding-inversion risk assessment for embeddings of sensitive data, retrieval-poisoning regression tests, and treatment of embedding stores as sensitive-data systems under applicable privacy regimes.",
|
|
1125
1183
|
"status": "open",
|
|
1126
1184
|
"opened_date": "2026-05-11",
|
|
1127
|
-
"evidence_cves": [
|
|
1128
|
-
"CVE-2026-30615"
|
|
1129
|
-
],
|
|
1185
|
+
"evidence_cves": [],
|
|
1130
1186
|
"atlas_refs": [
|
|
1131
|
-
"AML.T0010",
|
|
1132
1187
|
"AML.T0018",
|
|
1133
|
-
"AML.T0020"
|
|
1188
|
+
"AML.T0020",
|
|
1189
|
+
"AML.T0043"
|
|
1134
1190
|
],
|
|
1135
1191
|
"attack_refs": [
|
|
1136
|
-
"
|
|
1192
|
+
"T1565",
|
|
1193
|
+
"T1530"
|
|
1137
1194
|
]
|
|
1138
1195
|
},
|
|
1139
1196
|
"OWASP-Pen-Testing-Guide-v5": {
|
|
@@ -1167,6 +1224,54 @@
|
|
|
1167
1224
|
"T1071"
|
|
1168
1225
|
]
|
|
1169
1226
|
},
|
|
1227
|
+
"PCI-DSS-4.0-6.3.3": {
|
|
1228
|
+
"framework": "PCI DSS 4.0",
|
|
1229
|
+
"control_id": "6.3.3",
|
|
1230
|
+
"control_name": "All system components are protected from known vulnerabilities by installing applicable security patches/updates",
|
|
1231
|
+
"designed_for": "Critical patches within 1 month; other patches within 3 months. Designed for 2004-era exploit development timelines.",
|
|
1232
|
+
"misses": [
|
|
1233
|
+
"1-month critical patch window is an exploitation acceptance window for CISA KEV + public PoC",
|
|
1234
|
+
"No live-patch requirement for PCI-scoped systems",
|
|
1235
|
+
"No CISA KEV-specific response category",
|
|
1236
|
+
"AI-accelerated exploit development breaks the assumption that 1 month is a safety window"
|
|
1237
|
+
],
|
|
1238
|
+
"real_requirement": "PCI scoping must include a CISA KEV-specific response tier: < 72h remediation (live patch or documented compensating controls). 1-month window retains applicability only for vulnerabilities with no public PoC and no active exploitation.",
|
|
1239
|
+
"status": "open",
|
|
1240
|
+
"opened_date": "2026-03-15",
|
|
1241
|
+
"evidence_cves": [
|
|
1242
|
+
"CVE-2026-31431"
|
|
1243
|
+
],
|
|
1244
|
+
"atlas_refs": [],
|
|
1245
|
+
"attack_refs": [
|
|
1246
|
+
"T1068"
|
|
1247
|
+
]
|
|
1248
|
+
},
|
|
1249
|
+
"PSD2-RTS-SCA": {
|
|
1250
|
+
"framework": "EU PSD2 Regulatory Technical Standards on Strong Customer Authentication (Commission Delegated Regulation (EU) 2018/389)",
|
|
1251
|
+
"control_id": "RTS-SCA",
|
|
1252
|
+
"control_name": "Strong Customer Authentication and Common and Secure Communication",
|
|
1253
|
+
"designed_for": "Two-of-three-factor SCA for electronic payments and account access. Cross-walks to UK PSRs 2017 + FCA SCA-RTS (post-Brexit equivalent), AU CDR (Consumer Data Right) authentication, eIDAS 2.0 high-assurance authentication, and ISO 27001:2022 A.5.16 / A.8.5.",
|
|
1254
|
+
"misses": [
|
|
1255
|
+
"AI agent as transaction initiator on customer's behalf — RTS-SCA contemplates the customer or a payment initiation service provider (PISP), not an autonomous AI agent acting under delegated authority",
|
|
1256
|
+
"No SCA-equivalent mechanism for agent-to-bank transaction initiation with non-repudiation",
|
|
1257
|
+
"Prompt-injection-induced transactions via banking copilots present a fully SCA-compliant audit trail (the customer's authenticated session) — RTS-SCA is silent on injected intent",
|
|
1258
|
+
"No cross-walk to eIDAS 2.0 attestations for AI-agent transaction authority"
|
|
1259
|
+
],
|
|
1260
|
+
"real_requirement": "RTS-SCA (and UK FCA SCA-RTS, AU CDR) must define an agent-initiation construct: explicit delegated-authority attestation per agent transaction class, scope-limited authority tokens (amount, counterparty, frequency), and a distinct audit indicator for AI-mediated transactions so injected intent can be detected post-hoc. Aligns with eIDAS 2.0 electronic attestations.",
|
|
1261
|
+
"status": "open",
|
|
1262
|
+
"opened_date": "2026-05-11",
|
|
1263
|
+
"evidence_cves": [
|
|
1264
|
+
"CVE-2025-53773"
|
|
1265
|
+
],
|
|
1266
|
+
"atlas_refs": [
|
|
1267
|
+
"AML.T0051",
|
|
1268
|
+
"AML.T0054"
|
|
1269
|
+
],
|
|
1270
|
+
"attack_refs": [
|
|
1271
|
+
"T1078",
|
|
1272
|
+
"T1059"
|
|
1273
|
+
]
|
|
1274
|
+
},
|
|
1170
1275
|
"PTES-Pre-engagement": {
|
|
1171
1276
|
"framework": "Penetration Testing Execution Standard (PTES)",
|
|
1172
1277
|
"control_id": "PTES-Pre-engagement",
|
|
@@ -1195,18 +1300,18 @@
|
|
|
1195
1300
|
"T1071"
|
|
1196
1301
|
]
|
|
1197
1302
|
},
|
|
1198
|
-
"
|
|
1199
|
-
"framework": "
|
|
1200
|
-
"control_id": "
|
|
1201
|
-
"control_name": "
|
|
1202
|
-
"designed_for": "
|
|
1303
|
+
"SLSA-v1.0-Build-L3": {
|
|
1304
|
+
"framework": "SLSA v1.0 (Supply-chain Levels for Software Artifacts) — Build Track",
|
|
1305
|
+
"control_id": "Build L3",
|
|
1306
|
+
"control_name": "Hardened build platform with non-falsifiable provenance",
|
|
1307
|
+
"designed_for": "Build-platform-attested provenance for software artifacts: hosted, hardened, non-forgeable provenance signed by the build platform. Referenced under US EO 14028, cross-walked by EU CRA Annex I (essential cybersecurity requirements) and Cyber Resilience Act SBOM obligations, UK NCSC supply chain guidance, AU ISM supply chain, ISO/IEC 5230 (OpenChain), and in-toto attestations.",
|
|
1203
1308
|
"misses": [
|
|
1204
|
-
"AI-
|
|
1205
|
-
"
|
|
1206
|
-
"
|
|
1207
|
-
"No cross-walk to EU
|
|
1309
|
+
"AI-generated artifacts — code emitted by Copilot/Cursor/Codex/Claude Code is committed under the human developer's identity; the build platform attests the commit but not the AI origin of the diff",
|
|
1310
|
+
"Model weights provenance — model artifacts (weights, tokenizers, adapter LoRAs) are software but have no SLSA L3-equivalent build attestation; HuggingFace + Civitai distribution is closer to SLSA L0/L1",
|
|
1311
|
+
"Training data manifests have no provenance attestation track in SLSA v1.0",
|
|
1312
|
+
"No cross-walk to EU CRA Annex I requirement for SBOMs covering AI components, UK NCSC AI supply chain, AU ISM AI annex"
|
|
1208
1313
|
],
|
|
1209
|
-
"real_requirement": "
|
|
1314
|
+
"real_requirement": "SLSA must add: (1) AI-authorship attestation layer (per-block provenance for AI-generated code with reviewer identity), (2) a Model Track parallel to the Build Track with L0–L3 maturity for model weight provenance (build environment, training data manifest, fine-tune lineage, signature), (3) explicit SBOM/AI-BOM linkage to satisfy EU CRA, UK NCSC, AU ISM AI annex requirements.",
|
|
1210
1315
|
"status": "open",
|
|
1211
1316
|
"opened_date": "2026-05-11",
|
|
1212
1317
|
"evidence_cves": [
|
|
@@ -1214,97 +1319,136 @@
|
|
|
1214
1319
|
"CVE-2026-30615"
|
|
1215
1320
|
],
|
|
1216
1321
|
"atlas_refs": [
|
|
1217
|
-
"AML.T0010",
|
|
1218
|
-
"AML.
|
|
1219
|
-
"AML.
|
|
1220
|
-
|
|
1221
|
-
|
|
1322
|
+
"AML.T0010",
|
|
1323
|
+
"AML.T0018",
|
|
1324
|
+
"AML.T0020"
|
|
1325
|
+
],
|
|
1326
|
+
"attack_refs": [
|
|
1327
|
+
"T1195.001",
|
|
1328
|
+
"T1195.002"
|
|
1329
|
+
]
|
|
1330
|
+
},
|
|
1331
|
+
"SOC2-CC6-logical-access": {
|
|
1332
|
+
"framework": "SOC 2 (AICPA Trust Services Criteria)",
|
|
1333
|
+
"control_id": "CC6",
|
|
1334
|
+
"control_name": "Logical and Physical Access Controls",
|
|
1335
|
+
"designed_for": "Authentication, authorization, and access controls for human users and service accounts",
|
|
1336
|
+
"misses": [
|
|
1337
|
+
"Prompt injection bypasses logical access: the AI agent's service account is properly authorized; the injected instructions route around CC6 entirely",
|
|
1338
|
+
"Audit evidence for CC6 shows authorized service account activity — attacker identity is absent from all access logs",
|
|
1339
|
+
"No control for AI agent session-level authorization distinct from service account authorization"
|
|
1340
|
+
],
|
|
1341
|
+
"real_requirement": "CC6 requires supplementation with: AI agent invocation authorization (what is this specific model run permitted to do?), prompt logging for post-incident analysis, anomaly detection on AI agent actions.",
|
|
1342
|
+
"status": "open",
|
|
1343
|
+
"opened_date": "2026-03-01",
|
|
1344
|
+
"evidence_cves": [
|
|
1345
|
+
"CVE-2025-53773"
|
|
1346
|
+
],
|
|
1347
|
+
"atlas_refs": [
|
|
1348
|
+
"AML.T0051"
|
|
1349
|
+
],
|
|
1350
|
+
"attack_refs": []
|
|
1351
|
+
},
|
|
1352
|
+
"SOC2-CC7-anomaly-detection": {
|
|
1353
|
+
"framework": "SOC 2 (AICPA Trust Services Criteria)",
|
|
1354
|
+
"control_id": "CC7",
|
|
1355
|
+
"control_name": "System Operations — Threat and Vulnerability Management",
|
|
1356
|
+
"designed_for": "Detecting, preventing, and responding to threats and vulnerabilities affecting the system",
|
|
1357
|
+
"misses": [
|
|
1358
|
+
"AI API traffic as covert C2 (ATLAS AML.T0096) does not trigger CC7 anomaly detection — traffic pattern is identical to legitimate AI usage",
|
|
1359
|
+
"CC7 does not require monitoring for AI tool actions that exceed authorized scope",
|
|
1360
|
+
"PROMPTFLUX real-time evasion generation via AI API queries is not a CC7 threat category",
|
|
1361
|
+
"AI-generated code execution is not a recognized threat pattern in CC7 implementations"
|
|
1362
|
+
],
|
|
1363
|
+
"real_requirement": "CC7 anomaly detection must include AI-specific threat signatures: baseline expected AI API usage per system/process, alert on AI API queries from security-sensitive processes, monitor AI tool action logs for out-of-scope actions, include AI-as-C2 in threat model.",
|
|
1364
|
+
"status": "open",
|
|
1365
|
+
"opened_date": "2026-02-01",
|
|
1366
|
+
"evidence_cves": [],
|
|
1367
|
+
"atlas_refs": [
|
|
1368
|
+
"AML.T0096",
|
|
1369
|
+
"AML.T0017"
|
|
1222
1370
|
],
|
|
1223
1371
|
"attack_refs": [
|
|
1224
|
-
"T1059",
|
|
1225
1372
|
"T1071",
|
|
1226
|
-
"
|
|
1373
|
+
"T1059"
|
|
1227
1374
|
]
|
|
1228
1375
|
},
|
|
1229
|
-
"
|
|
1230
|
-
"framework": "
|
|
1231
|
-
"control_id": "
|
|
1232
|
-
"control_name": "
|
|
1233
|
-
"designed_for": "
|
|
1376
|
+
"SOC2-CC9-vendor-management": {
|
|
1377
|
+
"framework": "SOC 2 (AICPA Trust Services Criteria)",
|
|
1378
|
+
"control_id": "CC9",
|
|
1379
|
+
"control_name": "Risk Mitigation — Vendor and Business Partner Risk",
|
|
1380
|
+
"designed_for": "Assessing and managing risk from vendors and business partners with access to system data",
|
|
1234
1381
|
"misses": [
|
|
1235
|
-
"
|
|
1236
|
-
"
|
|
1237
|
-
"
|
|
1238
|
-
"
|
|
1382
|
+
"Developer-installed AI tool plugins are not vendors under CC9 — they are software installed by employees",
|
|
1383
|
+
"MCP servers execute code in developer environments but are outside vendor risk management scope",
|
|
1384
|
+
"No CC9 mechanism for AI plugin approval, monitoring, or revocation",
|
|
1385
|
+
"AI coding assistant plugins with tool-use capability represent a new risk category outside CC9's vendor model"
|
|
1239
1386
|
],
|
|
1240
|
-
"real_requirement": "
|
|
1387
|
+
"real_requirement": "CC9 must be extended to include AI tool plugins as a vendor risk category. MCP servers that access organizational systems require CC9-equivalent assessment: security review, approved-registry, monitoring, and revocation capability.",
|
|
1241
1388
|
"status": "open",
|
|
1242
|
-
"opened_date": "2026-
|
|
1389
|
+
"opened_date": "2026-04-01",
|
|
1243
1390
|
"evidence_cves": [
|
|
1244
|
-
"CVE-
|
|
1391
|
+
"CVE-2026-30615"
|
|
1245
1392
|
],
|
|
1246
1393
|
"atlas_refs": [
|
|
1247
|
-
"AML.
|
|
1248
|
-
"AML.T0051",
|
|
1249
|
-
"AML.T0054"
|
|
1394
|
+
"AML.T0010"
|
|
1250
1395
|
],
|
|
1251
1396
|
"attack_refs": [
|
|
1252
|
-
"
|
|
1397
|
+
"T1195.001"
|
|
1253
1398
|
]
|
|
1254
1399
|
},
|
|
1255
|
-
"
|
|
1256
|
-
"framework": "
|
|
1257
|
-
"control_id": "
|
|
1258
|
-
"control_name": "
|
|
1259
|
-
"designed_for": "
|
|
1400
|
+
"SPDX-v3.0-SBOM": {
|
|
1401
|
+
"framework": "SPDX v3.0 (ISO/IEC 5962-aligned SBOM standard)",
|
|
1402
|
+
"control_id": "SPDX-v3.0",
|
|
1403
|
+
"control_name": "Software Package Data Exchange — SBOM",
|
|
1404
|
+
"designed_for": "Component, licence, security, and (in 3.0) AI/Dataset profile inventory. Referenced under US EO 14028, EU CRA Annex I SBOM obligation, UK NCSC SBOM guidance, AU ISM, and aligned to ISO/IEC 5962 for international cross-walk.",
|
|
1260
1405
|
"misses": [
|
|
1261
|
-
"
|
|
1262
|
-
"
|
|
1263
|
-
"
|
|
1264
|
-
"
|
|
1406
|
+
"Same gaps as CycloneDX 1.6 — AI Profile and Dataset Profile exist in SPDX 3.0 but are rarely populated by upstream model publishers; missing-by-default is the norm",
|
|
1407
|
+
"MCP server / AI tool plugin inventory is not modelled distinctly from generic packages",
|
|
1408
|
+
"No mandated cross-walk to CycloneDX 1.6 ML-BOM — consumers face dialect divergence",
|
|
1409
|
+
"Provenance fields for training datasets are often blocked by licensing opacity, with no SPDX requirement to declare opacity explicitly"
|
|
1265
1410
|
],
|
|
1266
|
-
"real_requirement": "
|
|
1411
|
+
"real_requirement": "SPDX 3.0 deployment must require: (1) AI Profile + Dataset Profile completeness checks, (2) explicit declaration when training dataset provenance is unavailable (opacity flag), (3) MCP server inventory as a named SPDX element type, (4) CycloneDX ML-BOM cross-walk evidence — maintained as a cross-walk peer rather than a substitute. Aligns with EU CRA Annex I and ISO/IEC 5962.",
|
|
1267
1412
|
"status": "open",
|
|
1268
|
-
"opened_date": "2026-05-
|
|
1413
|
+
"opened_date": "2026-05-11",
|
|
1269
1414
|
"evidence_cves": [
|
|
1270
|
-
"CVE-
|
|
1271
|
-
"CVE-2026-30615",
|
|
1272
|
-
"CVE-2026-45321"
|
|
1415
|
+
"CVE-2026-30615"
|
|
1273
1416
|
],
|
|
1274
1417
|
"atlas_refs": [
|
|
1275
|
-
"AML.
|
|
1276
|
-
"AML.
|
|
1418
|
+
"AML.T0010",
|
|
1419
|
+
"AML.T0018",
|
|
1420
|
+
"AML.T0020"
|
|
1277
1421
|
],
|
|
1278
1422
|
"attack_refs": [
|
|
1279
|
-
"
|
|
1280
|
-
"T1567"
|
|
1423
|
+
"T1195.001"
|
|
1281
1424
|
]
|
|
1282
1425
|
},
|
|
1283
|
-
"
|
|
1284
|
-
"framework": "
|
|
1285
|
-
"control_id": "
|
|
1286
|
-
"control_name": "
|
|
1287
|
-
"designed_for": "
|
|
1426
|
+
"SWIFT-CSCF-v2026-1.1": {
|
|
1427
|
+
"framework": "SWIFT Customer Security Controls Framework v2026",
|
|
1428
|
+
"control_id": "1.1",
|
|
1429
|
+
"control_name": "SWIFT Environment Protection",
|
|
1430
|
+
"designed_for": "Baseline security controls for SWIFT users — secure zone, segregation, hardening. Mandatory for all SWIFT-connected institutions globally; cross-walks to EU DORA Art. 28 (ICT third-party risk), UK PRA SS1/21 operational resilience, AU APRA CPS 234, and ISO 27001 A.8.22 (segregation of networks).",
|
|
1288
1431
|
"misses": [
|
|
1289
|
-
"
|
|
1290
|
-
"
|
|
1291
|
-
"
|
|
1292
|
-
"
|
|
1432
|
+
"AI-mediated transaction generation — natural-language operator tools that draft MT/MX messages are not in the CSCF v2026 1.1 secure-zone trust model",
|
|
1433
|
+
"LLM-assisted operations on the SWIFT secure zone — copilot-style assistants for operations / reconciliation / sanctions screening introduce an unmodelled trust boundary",
|
|
1434
|
+
"AI-API egress from the SWIFT secure zone (or its administrative jump zone) violates the segregation assumption underlying 1.1 but is not explicitly named as a prohibited conduit",
|
|
1435
|
+
"No cross-walk to DORA Art. 28 for AI as an ICT third-party service supporting critical or important functions"
|
|
1293
1436
|
],
|
|
1294
|
-
"real_requirement": "
|
|
1437
|
+
"real_requirement": "CSCF v2026 1.1 must add: (1) explicit prohibition or strict gating of LLM assistants inside the SWIFT secure zone, (2) named-conduit treatment for AI-API egress from administrative jump zones with monitoring, (3) AI-generated message drafts flagged as a distinct review class before release, (4) alignment with DORA Art. 28 register of AI ICT third-party providers supporting critical functions, plus UK PRA SS1/21 and AU APRA CPS 234.",
|
|
1295
1438
|
"status": "open",
|
|
1296
|
-
"opened_date": "2026-05-
|
|
1439
|
+
"opened_date": "2026-05-11",
|
|
1297
1440
|
"evidence_cves": [
|
|
1298
|
-
"CVE-2025-53773"
|
|
1299
|
-
"CVE-2026-30615"
|
|
1441
|
+
"CVE-2025-53773"
|
|
1300
1442
|
],
|
|
1301
1443
|
"atlas_refs": [
|
|
1302
|
-
"AML.T0010",
|
|
1303
1444
|
"AML.T0051",
|
|
1304
1445
|
"AML.T0054",
|
|
1305
|
-
"AML.
|
|
1446
|
+
"AML.T0096"
|
|
1306
1447
|
],
|
|
1307
|
-
"attack_refs": [
|
|
1448
|
+
"attack_refs": [
|
|
1449
|
+
"T1071",
|
|
1450
|
+
"T1078"
|
|
1451
|
+
]
|
|
1308
1452
|
},
|
|
1309
1453
|
"UK-CAF-A1": {
|
|
1310
1454
|
"framework": "UK NCSC Cyber Assessment Framework v3.2",
|
|
@@ -1401,150 +1545,30 @@
|
|
|
1401
1545
|
"T1068"
|
|
1402
1546
|
]
|
|
1403
1547
|
},
|
|
1404
|
-
"
|
|
1405
|
-
"framework": "
|
|
1406
|
-
"control_id": "
|
|
1407
|
-
"control_name": "
|
|
1408
|
-
"designed_for": "
|
|
1409
|
-
"misses": [
|
|
1410
|
-
"MFA on AI-provider service accounts (OpenAI, Anthropic, HuggingFace API tokens) is not addressed — these are bearer tokens, not user identities, but carry equivalent or greater blast radius",
|
|
1411
|
-
"Phishing-resistance criterion (ML2+) does not specify resistance to AI-generated social engineering — deepfake-grade phishing breaks SMS/voice MFA categorically",
|
|
1412
|
-
"MCP server / plugin authentication is silent; bearer tokens with no rotation policy commonly stored alongside developer credentials"
|
|
1413
|
-
],
|
|
1414
|
-
"real_requirement": "MFA covers human identities at ML2+ with phishing-resistant factors (WebAuthn/passkeys, FIDO2). AI-provider credentials use short-lived OIDC tokens with mandatory rotation, never long-lived bearer keys. MCP server authentication uses signed JWTs / mTLS in production. Deepfake-grade phishing assumed; MFA decisions treat SMS/voice as insufficient.",
|
|
1415
|
-
"status": "open",
|
|
1416
|
-
"opened_date": "2026-05-13",
|
|
1417
|
-
"evidence_cves": [],
|
|
1418
|
-
"atlas_refs": [
|
|
1419
|
-
"AML.T0055"
|
|
1420
|
-
],
|
|
1421
|
-
"attack_refs": [
|
|
1422
|
-
"T1078",
|
|
1423
|
-
"T1556"
|
|
1424
|
-
]
|
|
1425
|
-
},
|
|
1426
|
-
"AU-Essential-8-App-Hardening": {
|
|
1427
|
-
"framework": "ASD Essential Eight (AU)",
|
|
1428
|
-
"control_id": "User application hardening",
|
|
1429
|
-
"control_name": "User application hardening",
|
|
1430
|
-
"designed_for": "Reducing the attack surface of common user applications (browsers, office, PDF readers) on Australian Government and essential-service endpoints",
|
|
1548
|
+
"VEX-CSAF-v2.1": {
|
|
1549
|
+
"framework": "VEX via OASIS CSAF 2.1 (Common Security Advisory Framework)",
|
|
1550
|
+
"control_id": "CSAF-2.1-VEX",
|
|
1551
|
+
"control_name": "Vulnerability Exploitability eXchange profile",
|
|
1552
|
+
"designed_for": "Machine-readable supplier statements about vulnerability applicability: not_affected, affected, fixed, under_investigation. Referenced under US CISA SBOM/VEX guidance, EU CRA Annex I (vulnerability handling obligations), UK NCSC vulnerability disclosure, AU ISM patch management, ISO/IEC 29147 (vulnerability disclosure) and 30111 (vulnerability handling).",
|
|
1431
1553
|
"misses": [
|
|
1432
|
-
"AI
|
|
1433
|
-
"
|
|
1434
|
-
"
|
|
1554
|
+
"VEX for AI components — model weights, embedding models, RAG corpora, MCP servers are software but have no CVE-equivalent identifier scheme for which VEX statements would be issued",
|
|
1555
|
+
"Model-as-software supplier statements — when a fine-tuned model inherits a base model jailbreak, there is no VEX statement chain expressing 'this base-model issue is mitigated in this derived model'",
|
|
1556
|
+
"Prompt-injection regressions are not in the CVE namespace and therefore have no VEX expression",
|
|
1557
|
+
"No cross-walk to EU AI Act Art. 15 (cybersecurity of high-risk AI systems) — AI vulnerability disclosure obligations exist with no VEX-equivalent transport"
|
|
1435
1558
|
],
|
|
1436
|
-
"real_requirement": "
|
|
1559
|
+
"real_requirement": "CSAF 2.1 (or a successor profile) must add: (1) an AI-component identifier scheme (model + version + adapters + tokenizer), (2) AI-specific vulnerability classes (jailbreak class, prompt-injection vector, embedding inversion class) with VEX statements, (3) explicit chaining of base-model to derived-model VEX statements, (4) alignment with EU AI Act Art. 15 disclosure obligations, UK NCSC AI vulnerability disclosure, AU ISM AI annex.",
|
|
1437
1560
|
"status": "open",
|
|
1438
|
-
"opened_date": "2026-05-
|
|
1561
|
+
"opened_date": "2026-05-11",
|
|
1439
1562
|
"evidence_cves": [
|
|
1440
1563
|
"CVE-2025-53773",
|
|
1441
1564
|
"CVE-2026-30615"
|
|
1442
1565
|
],
|
|
1443
1566
|
"atlas_refs": [
|
|
1444
1567
|
"AML.T0010",
|
|
1445
|
-
"AML.
|
|
1446
|
-
],
|
|
1447
|
-
"attack_refs": [
|
|
1448
|
-
"T1059",
|
|
1449
|
-
"T1204"
|
|
1450
|
-
]
|
|
1451
|
-
},
|
|
1452
|
-
"AU-Essential-8-Patch": {
|
|
1453
|
-
"framework": "ASD Essential Eight (AU)",
|
|
1454
|
-
"control_id": "Patch operating systems",
|
|
1455
|
-
"control_name": "Patch operating systems",
|
|
1456
|
-
"designed_for": "Maintaining current security patches on operating systems on Australian Government and essential-service endpoints; ML3 target is 48 hours for critical exploits",
|
|
1457
|
-
"misses": [
|
|
1458
|
-
"ML3 '48 hours for public exploit' is the closest framework target to KEV reality, but still assumes a reboot is acceptable within that window — live-patching deployment is not a required capability",
|
|
1459
|
-
"Linux kernel patching cadence differs from OS-vendor patch cadence; third-party kernel modules (OOT drivers, runtime hardening modules) are silent in scope",
|
|
1460
|
-
"Patch-management metrics rarely measure 'time from CISA KEV listing to patched on fleet' as the operational SLA"
|
|
1461
|
-
],
|
|
1462
|
-
"real_requirement": "Patch operating systems with KEV-anchored SLA (≤48h for critical with public PoC, live-patching mandatory on hosts that can't accept a reboot within window); kernel patching pipeline distinct from userspace patch pipeline; third-party kernel module patches tracked alongside vendor patches; SLA metric is 'time from KEV listing to deployed', not 'time from advisory publication'.",
|
|
1463
|
-
"status": "open",
|
|
1464
|
-
"opened_date": "2026-05-13",
|
|
1465
|
-
"evidence_cves": [
|
|
1466
|
-
"CVE-2026-31431",
|
|
1467
|
-
"CVE-2026-43284",
|
|
1468
|
-
"CVE-2026-43500"
|
|
1469
|
-
],
|
|
1470
|
-
"atlas_refs": [],
|
|
1471
|
-
"attack_refs": [
|
|
1472
|
-
"T1068"
|
|
1473
|
-
]
|
|
1474
|
-
},
|
|
1475
|
-
"AU-Essential-8-Backup": {
|
|
1476
|
-
"framework": "ASD Essential Eight (AU)",
|
|
1477
|
-
"control_id": "Regular backups",
|
|
1478
|
-
"control_name": "Regular backups",
|
|
1479
|
-
"designed_for": "Ensuring critical data and configuration can be restored after a cybersecurity incident; coverage spans daily backups with off-network retention",
|
|
1480
|
-
"misses": [
|
|
1481
|
-
"AI-system artefacts (fine-tuned model weights, RAG corpora, MCP server inventories, .claude/settings.json local-override files) are not enumerated as backup scope",
|
|
1482
|
-
"Backup-integrity verification typically targets data restoration; AI-corpus poisoning detection requires per-document hash comparison against backup state, which is not standard practice",
|
|
1483
|
-
"Incident-driven 'restore to last-known-good' for AI systems implies a known-good baseline that the backup process must maintain — workflow rarely documented"
|
|
1484
|
-
],
|
|
1485
|
-
"real_requirement": "Backups cover AI-system artefacts (model weights, RAG corpora, plugin registries, AI-tool configuration files) with off-network retention; backup-integrity verification includes per-document hash comparison for RAG corpora to detect corpus poisoning; documented 'AI-system restore to last-known-good' workflow that maps to detected AI-incident classes.",
|
|
1486
|
-
"status": "open",
|
|
1487
|
-
"opened_date": "2026-05-13",
|
|
1488
|
-
"evidence_cves": [
|
|
1489
|
-
"CVE-2026-45321"
|
|
1490
|
-
],
|
|
1491
|
-
"atlas_refs": [
|
|
1492
|
-
"AML.T0010",
|
|
1493
|
-
"AML.T0020",
|
|
1494
|
-
"AML.T0048"
|
|
1495
|
-
],
|
|
1496
|
-
"attack_refs": []
|
|
1497
|
-
},
|
|
1498
|
-
"EU-CRA-Art13": {
|
|
1499
|
-
"framework": "EU Cyber Resilience Act (2024/2847)",
|
|
1500
|
-
"control_id": "Art. 13",
|
|
1501
|
-
"control_name": "Essential cybersecurity requirements + technical documentation",
|
|
1502
|
-
"designed_for": "Manufacturers placing products with digital elements on the EU market; sets the essential cybersecurity requirements (Annex I) and the technical-documentation duty",
|
|
1503
|
-
"misses": [
|
|
1504
|
-
"Vulnerability handling clauses presume the maintainer is aware of the vulnerability and able to remediate. The elementary-data PyPI worm (MAL-2026-3083) compromised the publishing pipeline — the maintainer was a victim, not a participant — and the published release carried a valid signature.",
|
|
1505
|
-
"'Technical documentation' obligations do not require the manufacturer to retain or publish the build-pipeline configuration that produced each release. Operators consuming a malicious release have no way to inspect the workflow that built it.",
|
|
1506
|
-
"Art. 14 (24-hour notification of actively-exploited vulnerabilities) clock starts from manufacturer awareness; supply-chain-victim manufacturers may not know they are exploited until consumer-side detection (StepSecurity / Snyk / OSV) surfaces the IoCs."
|
|
1507
|
-
],
|
|
1508
|
-
"real_requirement": "Manufacturer publishes the canonical build-pipeline definition alongside each release (workflow file hash, runner attestation, scope of secrets accessed). Operators verify the published pipeline matches the pipeline that produced the release-being-installed. Notification clock starts from FIRST awareness — manufacturer's OR competent-authority's OR widely-published security researcher's.",
|
|
1509
|
-
"status": "open",
|
|
1510
|
-
"opened_date": "2026-05-13",
|
|
1511
|
-
"evidence_cves": [
|
|
1512
|
-
"MAL-2026-3083",
|
|
1513
|
-
"CVE-2025-53773"
|
|
1514
|
-
],
|
|
1515
|
-
"atlas_refs": [
|
|
1516
|
-
"AML.T0010",
|
|
1517
|
-
"AML.T0055"
|
|
1518
|
-
],
|
|
1519
|
-
"attack_refs": [
|
|
1520
|
-
"T1195.001",
|
|
1521
|
-
"T1195.002"
|
|
1522
|
-
]
|
|
1523
|
-
},
|
|
1524
|
-
"NIST-800-53-SI-10": {
|
|
1525
|
-
"framework": "NIST SP 800-53 Rev 5",
|
|
1526
|
-
"control_id": "SI-10",
|
|
1527
|
-
"control_name": "Information Input Validation",
|
|
1528
|
-
"designed_for": "Validating untrusted input at system boundaries before consumption by downstream code paths",
|
|
1529
|
-
"misses": [
|
|
1530
|
-
"Treats 'input validation' as a single layer at the trust boundary. Modern injection classes (SQL, argument, command, prompt) live INSIDE the trust boundary — the input is already 'validated' as authentic but the consumer concatenates it into a syntax the original validator did not anticipate (SQL query, kubectl argv, shell command).",
|
|
1531
|
-
"Does not distinguish argv-array vs string-form invocation. CVE-2026-39884 (mcp-server-kubernetes argument injection) and the broader CWE-88 class are invisible to a SI-10-compliant codebase that 'validates' the user-input string for length and character class.",
|
|
1532
|
-
"Does not address parameterised-query vs string-concat distinction. CVE-2026-42208 (LiteLLM SQLi on CISA KEV) is the cardinal recent example — input was validated, then concatenated into SQL during error-handling, which the validator did not gate.",
|
|
1533
|
-
"Auditing for SI-10 typically samples function boundaries; the argument-injection / SQL-injection / prompt-injection failure modes all occur inside the boundary."
|
|
1534
|
-
],
|
|
1535
|
-
"real_requirement": "Per-injection-class structural controls in addition to boundary validation. Parameterised queries enforced at the ORM/driver level (CWE-89). Argv-array form for spawned subprocesses (CWE-88). Tool-arg / function-call sanitisation in MCP / AI-agent surfaces (CWE-94). Lint rules flagging string-concat into SQL, exec, or AI-tool arguments. SI-10 compliance attestation augmented with a per-class checklist that names the specific structural control.",
|
|
1536
|
-
"status": "open",
|
|
1537
|
-
"opened_date": "2026-05-13",
|
|
1538
|
-
"evidence_cves": [
|
|
1539
|
-
"CVE-2026-42208",
|
|
1540
|
-
"CVE-2026-39884"
|
|
1541
|
-
],
|
|
1542
|
-
"atlas_refs": [
|
|
1543
|
-
"AML.T0053"
|
|
1568
|
+
"AML.T0018"
|
|
1544
1569
|
],
|
|
1545
1570
|
"attack_refs": [
|
|
1546
|
-
"
|
|
1547
|
-
"T1059"
|
|
1571
|
+
"T1195.001"
|
|
1548
1572
|
]
|
|
1549
1573
|
}
|
|
1550
1574
|
}
|