@blamejs/exceptd-skills 0.12.24 → 0.12.26
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/AGENTS.md +12 -4
- package/CHANGELOG.md +127 -0
- package/data/_indexes/_meta.json +44 -43
- package/data/_indexes/activity-feed.json +54 -47
- package/data/_indexes/catalog-summaries.json +20 -20
- package/data/_indexes/chains.json +561 -6
- package/data/_indexes/currency.json +19 -10
- package/data/_indexes/frequency.json +207 -55
- package/data/_indexes/handoff-dag.json +4 -0
- package/data/_indexes/jurisdiction-clocks.json +2 -2
- package/data/_indexes/jurisdiction-map.json +25 -12
- package/data/_indexes/section-offsets.json +490 -396
- package/data/_indexes/stale-content.json +14 -2
- package/data/_indexes/summary-cards.json +57 -3
- package/data/_indexes/token-budget.json +129 -74
- package/data/_indexes/trigger-table.json +66 -0
- package/data/_indexes/xref.json +58 -8
- package/data/atlas-ttps.json +528 -19
- package/data/attack-techniques.json +198 -84
- package/data/cve-catalog.json +1309 -9
- package/data/exploit-availability.json +300 -10
- package/data/framework-control-gaps.json +557 -1
- package/data/global-frameworks.json +44 -19
- package/data/rfc-references.json +94 -1
- package/data/zeroday-lessons.json +475 -13
- package/lib/schemas/cve-catalog.schema.json +24 -3
- package/manifest-snapshot.json +68 -2
- package/manifest-snapshot.sha256 +1 -1
- package/manifest.json +145 -59
- package/package.json +1 -1
- package/sbom.cdx.json +7 -7
- package/skills/ai-attack-surface/skill.md +11 -2
- package/skills/ai-c2-detection/skill.md +3 -1
- package/skills/ai-risk-management/skill.md +3 -1
- package/skills/api-security/skill.md +4 -0
- package/skills/attack-surface-pentest/skill.md +1 -0
- package/skills/container-runtime-security/skill.md +3 -1
- package/skills/dlp-gap-analysis/skill.md +1 -1
- package/skills/exploit-scoring/skill.md +2 -2
- package/skills/incident-response-playbook/skill.md +1 -1
- package/skills/kernel-lpe-triage/skill.md +6 -1
- package/skills/mcp-agent-trust/skill.md +7 -2
- package/skills/mlops-security/skill.md +1 -1
- package/skills/rag-pipeline-security/skill.md +4 -2
- package/skills/sector-financial/skill.md +1 -1
- package/skills/sector-telecom/skill.md +259 -0
- package/skills/skill-update-loop/skill.md +1 -1
- package/skills/supply-chain-integrity/skill.md +3 -1
- package/skills/threat-model-currency/skill.md +1 -1
- package/skills/webapp-security/skill.md +2 -0
- package/skills/zeroday-gap-learn/skill.md +2 -2
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"_meta": {
|
|
3
3
|
"schema_version": "1.0.0",
|
|
4
|
-
"last_updated": "2026-05-
|
|
4
|
+
"last_updated": "2026-05-15",
|
|
5
5
|
"note": "status: open = gap still exists. status: closed = framework update closed the gap. Never delete entries — preserve gap history.",
|
|
6
6
|
"tlp": "CLEAR",
|
|
7
7
|
"source_confidence": {
|
|
@@ -308,6 +308,108 @@
|
|
|
308
308
|
"T1195.002"
|
|
309
309
|
]
|
|
310
310
|
},
|
|
311
|
+
"DORA-RTS-Subcontracting": {
|
|
312
|
+
"framework": "EU DORA (Regulation 2022/2554) — RTS on subcontracting of ICT services supporting critical or important functions",
|
|
313
|
+
"control_id": "RTS-Subcontracting-2024",
|
|
314
|
+
"control_name": "Regulatory Technical Standard on subcontracting (Commission Delegated Regulation supplementing Art. 30(5))",
|
|
315
|
+
"designed_for": "Mandates contractual + register-level visibility of the full subcontracting chain for ICT services supporting critical or important functions of financial entities. Active 2026-01-17 (Commission Delegated Regulation (EU) 2025/420). Cross-walks to ESMA/EBA/EIOPA joint guidelines on the register of information, EU NIS2 Art. 21(2)(d), UK PRA SS2/21, AU CPS 230.",
|
|
316
|
+
"misses": [
|
|
317
|
+
"AI-provider sub-processor chain — model APIs, embedding services, vector stores, fine-tune providers compose under a single user-facing endpoint with sub-processor visibility that the RTS register fields do not enumerate",
|
|
318
|
+
"MCP server distribution: an MCP server installed by a developer is a de-facto subcontractor for any ICT function the agent supports, with no contractual nexus the financial entity controls",
|
|
319
|
+
"Concentration risk fields capture cloud-provider concentration but not foundation-model concentration (3-4 frontier LLM providers underpin most production AI workflows in 2026)",
|
|
320
|
+
"Cross-border AI inference routing is not captured in the residency fields — model API calls regularly traverse multiple jurisdictions inside a single 'sub-processor' line item"
|
|
321
|
+
],
|
|
322
|
+
"real_requirement": "RTS subcontracting register must add: (1) AI sub-processor enumeration (model provider, embedding provider, vector store, RAG corpus host) per ICT service line, (2) MCP server inventory treated as a subcontractor class, (3) foundation-model concentration analysis alongside cloud-provider concentration, (4) per-call inference-routing residency for AI services, (5) explicit cross-walk to UK PRA SS2/21 + AU CPS 230 for cross-border AI sub-processor disclosure.",
|
|
323
|
+
"status": "open",
|
|
324
|
+
"opened_date": "2026-05-15",
|
|
325
|
+
"evidence_cves": [
|
|
326
|
+
"CVE-2026-30615"
|
|
327
|
+
],
|
|
328
|
+
"atlas_refs": [
|
|
329
|
+
"AML.T0010"
|
|
330
|
+
],
|
|
331
|
+
"attack_refs": [
|
|
332
|
+
"T1195.001",
|
|
333
|
+
"T1195.002"
|
|
334
|
+
]
|
|
335
|
+
},
|
|
336
|
+
"DORA-ITS-TLPT": {
|
|
337
|
+
"framework": "EU DORA (Regulation 2022/2554) — ITS on threat-led penetration testing under Art. 26",
|
|
338
|
+
"control_id": "ITS-TLPT-2026",
|
|
339
|
+
"control_name": "Implementing Technical Standard on Threat-Led Penetration Testing (TLPT) for significant financial entities",
|
|
340
|
+
"designed_for": "Operationalises Art. 26 TLPT obligations: scope, methodology, certifications for testers, intelligence-led red-team execution aligned with TIBER-EU. Active 2026-Q3. Cross-walks to UK CBEST, AU CORIE, NL TIBER-NL, ECB TIBER-EU framework, NIST SP 800-115.",
|
|
341
|
+
"misses": [
|
|
342
|
+
"AI/MCP asset classes not enumerated in the TLPT scoping template — model APIs, RAG pipelines, MCP servers, embedding stores, agent runtimes",
|
|
343
|
+
"Threat-intelligence inputs do not include AI-discovered zero-day classes (41% of 2025 zero-days were AI-discovered) or AI-augmented offensive TTPs",
|
|
344
|
+
"Provider-side authorisation language for adversarial prompt-injection testing against third-party AI providers is unaddressed — many AI providers' acceptable-use policies prohibit adversarial testing without separate negotiation",
|
|
345
|
+
"TLPT-tester certifications do not yet include AI/MCP-specific competencies (prompt injection, RAG poisoning, agent escape)"
|
|
346
|
+
],
|
|
347
|
+
"real_requirement": "ITS-TLPT must add: (1) AI/MCP asset enumeration in the scoping template, (2) AI-augmented threat intelligence inputs (ATLAS TTPs, AI-discovered CVE classes), (3) standard authorisation clauses for adversarial testing against third-party AI providers, (4) AI/MCP competency requirements for TLPT-tester certifications, (5) cross-walk to TIBER-EU + UK CBEST + AU CORIE updated scope language.",
|
|
348
|
+
"status": "open",
|
|
349
|
+
"opened_date": "2026-05-15",
|
|
350
|
+
"evidence_cves": [
|
|
351
|
+
"CVE-2025-53773",
|
|
352
|
+
"CVE-2026-30615"
|
|
353
|
+
],
|
|
354
|
+
"atlas_refs": [
|
|
355
|
+
"AML.T0010",
|
|
356
|
+
"AML.T0051",
|
|
357
|
+
"AML.T0054"
|
|
358
|
+
],
|
|
359
|
+
"attack_refs": [
|
|
360
|
+
"T1195.001",
|
|
361
|
+
"T1059"
|
|
362
|
+
]
|
|
363
|
+
},
|
|
364
|
+
"DORA-RTS-Incident-Classification": {
|
|
365
|
+
"framework": "EU DORA (Regulation 2022/2554) — RTS on classification of major ICT-related incidents under Art. 18(3)",
|
|
366
|
+
"control_id": "RTS-Incident-Classification-2024",
|
|
367
|
+
"control_name": "RTS specifying classification criteria for major ICT-related incidents and significant cyber threats (Commission Delegated Regulation (EU) 2024/1772)",
|
|
368
|
+
"designed_for": "Defines the quantitative + qualitative thresholds that promote an ICT incident to 'major' status, triggering the 4h / 24h / 30d notification cascade. Cross-walks to NIS2 Art. 23 incident classification, UK FCA SUP 15.3 operational incident reporting, AU APRA CPS 234, US OCC heightened standards.",
|
|
369
|
+
"misses": [
|
|
370
|
+
"AI-specific incident classes (prompt injection, RAG poisoning, model theft, deepfake-mediated BEC) are not enumerated in the qualitative criteria — operators classify them under generic 'data integrity' / 'service degradation' fields, losing AI-specific severity signal",
|
|
371
|
+
"Quantitative thresholds (clients affected, transactions impacted, recovery duration) presume a transactional ICT service. AI-augmented decision incidents (an LLM emitting incorrect risk advice for hours before detection) don't fit the transaction-count threshold",
|
|
372
|
+
"Reputational impact criteria don't address AI-related public-trust events (model outputting harmful content via prompt injection) with the granularity required",
|
|
373
|
+
"Significant-cyber-threat criteria do not yet contemplate ATLAS-class adversary signal as a trigger for proactive notification"
|
|
374
|
+
],
|
|
375
|
+
"real_requirement": "RTS classification must add: (1) AI-incident class enumeration in the qualitative criteria, (2) AI-specific quantitative measures (model invocations affected, agent actions taken on injected intent, RAG corpus integrity loss), (3) ATLAS-class adversary indicators as significant-cyber-threat triggers, (4) cross-walk to NIS2 Art. 23 + UK FCA SUP 15.3 + AU CPS 234 with AI-class fields.",
|
|
376
|
+
"status": "open",
|
|
377
|
+
"opened_date": "2026-05-15",
|
|
378
|
+
"evidence_cves": [
|
|
379
|
+
"CVE-2025-53773"
|
|
380
|
+
],
|
|
381
|
+
"atlas_refs": [
|
|
382
|
+
"AML.T0051",
|
|
383
|
+
"AML.T0054",
|
|
384
|
+
"AML.T0057"
|
|
385
|
+
],
|
|
386
|
+
"attack_refs": [
|
|
387
|
+
"T1059"
|
|
388
|
+
]
|
|
389
|
+
},
|
|
390
|
+
"DORA-IA-CTPP-Oversight": {
|
|
391
|
+
"framework": "EU DORA (Regulation 2022/2554) — Implementing Acts for critical-third-party-provider (CTPP) oversight under Art. 31-44",
|
|
392
|
+
"control_id": "IA-CTPP-Oversight-2026",
|
|
393
|
+
"control_name": "Implementing acts designating critical ICT third-party service providers and operationalising the Lead Overseer regime",
|
|
394
|
+
"designed_for": "Establishes the criteria, designation procedure, and Lead Overseer (LO) powers for CTPPs supplying financial entities. First designations expected H2 2026 across hyperscale cloud, network, and core-banking providers. Cross-walks to UK FSMA s.312 critical-third-party regime, AU APRA CPS 230 material service providers, US Treasury TLAC for systemic cloud providers.",
|
|
395
|
+
"misses": [
|
|
396
|
+
"Frontier-AI providers (OpenAI, Anthropic, Google DeepMind, xAI) are functionally critical to many financial entities' workflows but are not on the H2 2026 designation candidate list — their ICT-service taxonomy doesn't map cleanly to the CTPP criteria (concentration, substitutability, criticality of functions supported)",
|
|
397
|
+
"MCP server / agent-runtime providers as CTPPs: no contemplated route to designation despite being in the trust path of every AI-augmented financial workflow",
|
|
398
|
+
"Lead Overseer audit access fields presume conventional cloud audit conventions (SOC2 reports, attestation letters) — frontier-AI providers' model-card / system-card / evaluation-report artifacts have no equivalent treatment",
|
|
399
|
+
"Cross-border LO coordination with UK FCA + AU APRA does not yet cover AI-provider concentration risk"
|
|
400
|
+
],
|
|
401
|
+
"real_requirement": "CTPP oversight implementing acts must add: (1) frontier-AI provider designation criteria distinct from cloud-provider criteria, (2) MCP/agent-runtime provider class with route to designation when reaching concentration thresholds, (3) Lead Overseer audit framework that includes model cards, system cards, evaluation reports, training-data manifests, (4) UK FCA / AU APRA + EU DORA joint AI-provider oversight protocol.",
|
|
402
|
+
"status": "open",
|
|
403
|
+
"opened_date": "2026-05-15",
|
|
404
|
+
"evidence_cves": [],
|
|
405
|
+
"atlas_refs": [
|
|
406
|
+
"AML.T0010",
|
|
407
|
+
"AML.T0018"
|
|
408
|
+
],
|
|
409
|
+
"attack_refs": [
|
|
410
|
+
"T1195.001"
|
|
411
|
+
]
|
|
412
|
+
},
|
|
311
413
|
"EU-AI-Act-Art-15": {
|
|
312
414
|
"framework": "EU Artificial Intelligence Act (2024/1689)",
|
|
313
415
|
"control_id": "Art. 15",
|
|
@@ -334,6 +436,100 @@
|
|
|
334
436
|
],
|
|
335
437
|
"attack_refs": []
|
|
336
438
|
},
|
|
439
|
+
"EU-AI-Act-Art-53-GPAI": {
|
|
440
|
+
"framework": "EU Artificial Intelligence Act (2024/1689) — General-Purpose AI provider obligations",
|
|
441
|
+
"control_id": "Art. 53",
|
|
442
|
+
"control_name": "Obligations for providers of general-purpose AI (GPAI) models",
|
|
443
|
+
"designed_for": "Providers of general-purpose AI models placed on the EU market. Active 2026-08-02. Requires technical documentation, downstream-provider information package, copyright-policy disclosure, and a summary of training content. Cross-walks to UK AISI voluntary commitments, US NIST AI RMF GPAI profile, OECD AI Principles GPAI annex, ISO/IEC 42001:2023.",
|
|
444
|
+
"misses": [
|
|
445
|
+
"Training-data summary granularity — the prescribed 'sufficiently detailed' standard is operationally undefined; providers can satisfy with sector-level descriptors that defeat copyright/audit traceability",
|
|
446
|
+
"Downstream-provider information package contemplates documentation handoff but not runtime telemetry — a downstream provider integrating a GPAI cannot verify the production model is the documented model",
|
|
447
|
+
"Copyright-policy disclosure does not require attestation against specific corpora (text, image, code) — operators face Art. 53 compliance without resolving the upstream rightsholder question",
|
|
448
|
+
"No technical mechanism prescribed for the training-content summary to be machine-verifiable (no SLSA-equivalent, no signed manifest)"
|
|
449
|
+
],
|
|
450
|
+
"real_requirement": "Art. 53 implementation must add: (1) machine-readable training-data-summary schema with corpus-level granularity sufficient for copyright audit, (2) signed downstream-provider documentation bound to the production model fingerprint, (3) per-corpus copyright-policy attestation distinct from generic policy disclosure, (4) cross-walk to ISO/IEC 42001 audit evidence + NIST AI RMF GPAI profile.",
|
|
451
|
+
"status": "open",
|
|
452
|
+
"opened_date": "2026-05-15",
|
|
453
|
+
"evidence_cves": [],
|
|
454
|
+
"atlas_refs": [
|
|
455
|
+
"AML.T0010",
|
|
456
|
+
"AML.T0018",
|
|
457
|
+
"AML.T0020"
|
|
458
|
+
],
|
|
459
|
+
"attack_refs": []
|
|
460
|
+
},
|
|
461
|
+
"EU-AI-Act-Art-55-Systemic": {
|
|
462
|
+
"framework": "EU Artificial Intelligence Act (2024/1689) — GPAI with systemic risk",
|
|
463
|
+
"control_id": "Art. 55",
|
|
464
|
+
"control_name": "Additional obligations for providers of GPAI models with systemic risk",
|
|
465
|
+
"designed_for": "Providers of GPAI models presumed to have systemic risk (cumulative training compute ≥ 10^25 FLOPs benchmark; AI Office may designate other models). Active 2026-08-02. Requires model evaluation including adversarial testing, systemic-risk assessment + mitigation, serious-incident reporting to AI Office + national authorities, and energy/cybersecurity protection at the model layer. Cross-walks to UK AISI safety evaluations, US AISI consortium, NIST AI RMF systemic-risk profile.",
|
|
466
|
+
"misses": [
|
|
467
|
+
"Adversarial-evaluation methodology is not prescribed — providers self-define the red-team scope, leaving prompt-injection coverage, agentic-task exploitation, RAG-poisoning resistance, and MCP-trust scenarios at provider discretion",
|
|
468
|
+
"Energy-consumption reporting cadence + units of measurement are not standardised — comparison across providers is operationally impossible",
|
|
469
|
+
"Serious-incident reporting clock (15-day initial / report-without-undue-delay) does not align with DORA's 4h or NIS2's 24h — financial-entity operators using a systemic GPAI face conflicting clocks",
|
|
470
|
+
"Cybersecurity protection at the model layer (weights, fine-tune adapters, system prompts) has no concrete control catalogue — Art. 55(1)(d) is the most operationally underspecified obligation in the Act"
|
|
471
|
+
],
|
|
472
|
+
"real_requirement": "Art. 55 operationalisation must add: (1) prescribed adversarial-evaluation methodology covering OWASP LLM Top 10 + ATLAS TTPs + MCP-trust scenarios, (2) standardised energy reporting (kWh per million tokens, training compute under ISO/IEC TR 24028), (3) reconciled incident-reporting clocks with DORA Art. 19 + NIS2 Art. 23, (4) explicit control catalogue for model-layer cybersecurity (weights provenance, system-prompt integrity, fine-tune access control).",
|
|
473
|
+
"status": "open",
|
|
474
|
+
"opened_date": "2026-05-15",
|
|
475
|
+
"evidence_cves": [
|
|
476
|
+
"CVE-2025-53773",
|
|
477
|
+
"CVE-2026-30615"
|
|
478
|
+
],
|
|
479
|
+
"atlas_refs": [
|
|
480
|
+
"AML.T0010",
|
|
481
|
+
"AML.T0018",
|
|
482
|
+
"AML.T0020",
|
|
483
|
+
"AML.T0051",
|
|
484
|
+
"AML.T0054"
|
|
485
|
+
],
|
|
486
|
+
"attack_refs": [
|
|
487
|
+
"T1059"
|
|
488
|
+
]
|
|
489
|
+
},
|
|
490
|
+
"EU-AI-Act-Annex-IX-Conformity": {
|
|
491
|
+
"framework": "EU Artificial Intelligence Act (2024/1689) — Annex IX conformity assessment",
|
|
492
|
+
"control_id": "Annex IX",
|
|
493
|
+
"control_name": "Conformity assessment based on internal control or notified body assessment for high-risk AI systems",
|
|
494
|
+
"designed_for": "Sets the conformity-assessment route for high-risk AI systems (Art. 43). Internal control (Annex VI) suffices for most providers; notified-body assessment (Annex VII) applies to specific Annex III categories. Active 2026-08-02 for high-risk obligations. Cross-walks to EU CRA Annex VIII conformity, EU MDR clinical-AI conformity, UK MHRA AI-as-a-Medical-Device, AU TGA Software-as-Medical-Device.",
|
|
495
|
+
"misses": [
|
|
496
|
+
"Internal-control conformity assessment is self-attestation — there is no third-party verification of Art. 9 risk management, Art. 10 data governance, Art. 15 cybersecurity claims for most high-risk AI",
|
|
497
|
+
"Notified-body capacity is constrained — the small number of designated notified bodies (under 30 across the Union as of 2026-Q2) creates assessment-queue risk that operators cannot mitigate",
|
|
498
|
+
"Conformity reassessment after substantial modification is undefined operationally — fine-tuning, retrieval-augmentation, or system-prompt change triggers conformity-renewal uncertainty",
|
|
499
|
+
"No cross-walk between Annex IX and EU CRA Annex VIII for products that are both AI systems and products-with-digital-elements — dual-track conformity creates duplicate audit + drift risk"
|
|
500
|
+
],
|
|
501
|
+
"real_requirement": "Annex IX implementation must add: (1) third-party sample audit of internal-control attestations (e.g. risk-based annual sampling by AI Office), (2) notified-body scope expansion + capacity guarantees, (3) operational definition of 'substantial modification' for fine-tuning / RAG / system-prompt changes, (4) joint Annex IX + CRA Annex VIII conformity track for dual-status products.",
|
|
502
|
+
"status": "open",
|
|
503
|
+
"opened_date": "2026-05-15",
|
|
504
|
+
"evidence_cves": [],
|
|
505
|
+
"atlas_refs": [
|
|
506
|
+
"AML.T0010",
|
|
507
|
+
"AML.T0018"
|
|
508
|
+
],
|
|
509
|
+
"attack_refs": []
|
|
510
|
+
},
|
|
511
|
+
"EU-AI-Act-GPAI-CoP": {
|
|
512
|
+
"framework": "EU Artificial Intelligence Act (2024/1689) — Code of Practice for GPAI",
|
|
513
|
+
"control_id": "GPAI-CoP-2026",
|
|
514
|
+
"control_name": "Code of Practice for general-purpose AI (signed 2026-02; presumed-compliance route for Art. 53 + 55)",
|
|
515
|
+
"designed_for": "Voluntary code (drafted by AI Office working groups) that, when followed, provides a presumption of compliance with Art. 53 + 55 until harmonised standards are published. Signed by major GPAI providers 2026-02. Cross-walks to ISO/IEC 42001:2023 (companion standard), UK AISI voluntary commitments, US NIST AI RMF GPAI profile.",
|
|
516
|
+
"misses": [
|
|
517
|
+
"Voluntary-code legal status: non-signatories must demonstrate Art. 53 / 55 compliance through alternative means with no defined evidentiary standard",
|
|
518
|
+
"Code does not bind the AI Office on enforcement discretion — a signatory operator following the Code can still face investigation if the AI Office considers the Code itself insufficient for a specific case",
|
|
519
|
+
"Cross-jurisdiction recognition: UK + US AI safety institutes have not formally cross-recognised the Code, so an operator producing the same documentation for AI Office + UK AISI + US AISI faces format-divergence overhead",
|
|
520
|
+
"Code sunsets when harmonised standards under Art. 40 are published — operators investing in Code-conformant tooling face a re-implementation cliff at the standards-publication date"
|
|
521
|
+
],
|
|
522
|
+
"real_requirement": "GPAI Code-of-Practice path must add: (1) defined evidentiary equivalence for non-signatory compliance, (2) AI-Office commitment on enforcement deference for code-conformant signatories, (3) joint AI Office + UK AISI + US AISI common-format recognition, (4) transition plan when Art. 40 harmonised standards supersede the Code.",
|
|
523
|
+
"status": "open",
|
|
524
|
+
"opened_date": "2026-05-15",
|
|
525
|
+
"evidence_cves": [],
|
|
526
|
+
"atlas_refs": [
|
|
527
|
+
"AML.T0010",
|
|
528
|
+
"AML.T0018",
|
|
529
|
+
"AML.T0020"
|
|
530
|
+
],
|
|
531
|
+
"attack_refs": []
|
|
532
|
+
},
|
|
337
533
|
"EU-CRA-Art13": {
|
|
338
534
|
"framework": "EU Cyber Resilience Act (2024/2847)",
|
|
339
535
|
"control_id": "Art. 13",
|
|
@@ -413,6 +609,112 @@
|
|
|
413
609
|
"T1530"
|
|
414
610
|
]
|
|
415
611
|
},
|
|
612
|
+
"HIPAA-Security-Rule-2026-NPRM-164.308": {
|
|
613
|
+
"framework": "HIPAA Security Rule (45 CFR § 164.308) — 2026 Notice of Proposed Rulemaking",
|
|
614
|
+
"control_id": "164.308-NPRM",
|
|
615
|
+
"control_name": "Proposed expansion of administrative safeguards (2026 NPRM, expected final rule Q3 2026)",
|
|
616
|
+
"designed_for": "Administrative safeguards: security management process, workforce training, contingency planning, evaluation. NPRM (HHS-OCR-0945-AA82, published 2024-12-27) proposes expansions: mandatory written security plan reviewed at least annually, mandatory technology asset inventory, mandatory network map, mandatory documented contingency / incident-response procedure with tabletop exercises, mandatory authentication-related risk analysis. Cross-walks to NIST 800-66r2, ISO 27799, EU GDPR Art. 32.",
|
|
617
|
+
"misses": [
|
|
618
|
+
"AI assistants in healthcare workflows (ambient scribes, coding assistants, decision support) are not enumerated in the proposed technology-asset-inventory categories — operators will inventory EHRs + workstations but not the AI providers handling PHI",
|
|
619
|
+
"Network map requirement is silent on AI-API egress paths — a complete network map under the NPRM can still omit the model-provider endpoints that PHI flows to",
|
|
620
|
+
"Tabletop-exercise scope does not require AI-specific incident scenarios (prompt injection extracting PHI, RAG poisoning corrupting clinical recommendations)",
|
|
621
|
+
"Workforce-training mandate does not specifically require training on AI-handling of PHI; covered entities can satisfy with generic security training"
|
|
622
|
+
],
|
|
623
|
+
"real_requirement": "164.308 NPRM implementation must add: (1) AI assistants + model-API providers as enumerated technology-asset categories, (2) network-map requirement extended to AI-API egress including BAA / training-opt-out attestation per route, (3) tabletop-exercise catalogue covering AI-specific PHI loss scenarios, (4) workforce training module specific to AI handling of PHI. Note: final rule still pending — track HHS-OCR publication date Q3 2026.",
|
|
624
|
+
"status": "open",
|
|
625
|
+
"opened_date": "2026-05-15",
|
|
626
|
+
"evidence_cves": [
|
|
627
|
+
"CVE-2025-53773"
|
|
628
|
+
],
|
|
629
|
+
"atlas_refs": [
|
|
630
|
+
"AML.T0054",
|
|
631
|
+
"AML.T0096"
|
|
632
|
+
],
|
|
633
|
+
"attack_refs": [
|
|
634
|
+
"T1071",
|
|
635
|
+
"T1530"
|
|
636
|
+
]
|
|
637
|
+
},
|
|
638
|
+
"HIPAA-Security-Rule-2026-NPRM-164.310": {
|
|
639
|
+
"framework": "HIPAA Security Rule (45 CFR § 164.310) — 2026 Notice of Proposed Rulemaking",
|
|
640
|
+
"control_id": "164.310-NPRM",
|
|
641
|
+
"control_name": "Proposed expansion of physical safeguards including network-access logging (2026 NPRM)",
|
|
642
|
+
"designed_for": "Physical safeguards: facility access controls, workstation security, device + media controls. NPRM proposes a network-access logging mandate for all systems handling ePHI plus deployed-asset inventory + media-disposal verification. Cross-walks to NIST 800-66r2, AU My Health Records Act, UK NHS DSPT.",
|
|
643
|
+
"misses": [
|
|
644
|
+
"Network-access logging mandate is silent on AI-API session logs — a covered entity satisfying the rule with EHR audit logs can still have unrecorded PHI flowing to AI providers",
|
|
645
|
+
"Workstation security expansion does not address developer endpoints with AI coding assistants installed (which may ingest PHI through ambient inclusion)",
|
|
646
|
+
"Media-disposal verification does not contemplate AI training-data residency — PHI shared with an AI provider for in-context inference may persist in their training-eligibility set absent explicit opt-out",
|
|
647
|
+
"Deployed-asset inventory does not require MCP-server enumeration on developer / clinician endpoints"
|
|
648
|
+
],
|
|
649
|
+
"real_requirement": "164.310 NPRM implementation must add: (1) AI-API session logging treated as in-scope under the network-access-logging mandate, (2) developer-endpoint workstation security extended to AI assistants with PHI exposure, (3) media-disposal verification extended to AI training-data opt-out attestation, (4) MCP-server enumeration in the deployed-asset inventory. Final rule pending.",
|
|
650
|
+
"status": "open",
|
|
651
|
+
"opened_date": "2026-05-15",
|
|
652
|
+
"evidence_cves": [
|
|
653
|
+
"CVE-2026-30615"
|
|
654
|
+
],
|
|
655
|
+
"atlas_refs": [
|
|
656
|
+
"AML.T0010",
|
|
657
|
+
"AML.T0054"
|
|
658
|
+
],
|
|
659
|
+
"attack_refs": [
|
|
660
|
+
"T1071"
|
|
661
|
+
]
|
|
662
|
+
},
|
|
663
|
+
"HIPAA-Security-Rule-2026-NPRM-164.312": {
|
|
664
|
+
"framework": "HIPAA Security Rule (45 CFR § 164.312) — 2026 Notice of Proposed Rulemaking",
|
|
665
|
+
"control_id": "164.312-NPRM",
|
|
666
|
+
"control_name": "Proposed technical safeguards: MFA on PHI access, encryption at rest, anti-malware, vulnerability scan + patch schedule (2026 NPRM)",
|
|
667
|
+
"designed_for": "Technical safeguards: access control, audit, integrity, transmission security. NPRM proposes mandatory MFA on all PHI access, mandatory encryption of ePHI at rest, mandatory anti-malware on ePHI-handling systems, mandatory vulnerability scanning every 6 months + patch schedule (critical patches within reasonable time per asset criticality). Cross-walks to NIST 800-66r2, NIST 800-53 SI-2, EU GDPR Art. 32, AU APP 11.",
|
|
668
|
+
"misses": [
|
|
669
|
+
"MFA mandate is silent on AI-agent session authentication — an agent acting on a clinician's behalf can satisfy the MFA gate once and then perform unbounded subsequent PHI access without re-authentication",
|
|
670
|
+
"Encryption-at-rest mandate does not address PHI residing in AI-provider conversation history, vector embeddings, or fine-tune-eligible corpora",
|
|
671
|
+
"Anti-malware mandate is undefined for AI-augmented systems — prompt-injection-driven malicious actions are not 'malware' in the signature-matching sense but produce equivalent harm",
|
|
672
|
+
"Vulnerability-scan cadence (6 months) is exploitation-acceptance for AI-discovered zero-days (41% of 2025 zero-days were AI-discovered, average disclosure-to-PoC under 30 days); patch-schedule language is risk-based without CISA-KEV-class tiering"
|
|
673
|
+
],
|
|
674
|
+
"real_requirement": "164.312 NPRM implementation must add: (1) per-action MFA-equivalent for AI-agent PHI access (delegated-authority attestation), (2) encryption-at-rest extended to AI-provider artifacts (conversation history, embeddings, fine-tune sets), (3) prompt-injection + RAG-poisoning detection as anti-malware-equivalent for AI-augmented systems, (4) CISA-KEV-class patch tier (< 72h) layered over the 6-month scan cadence. Final rule pending.",
|
|
675
|
+
"status": "open",
|
|
676
|
+
"opened_date": "2026-05-15",
|
|
677
|
+
"evidence_cves": [
|
|
678
|
+
"CVE-2025-53773",
|
|
679
|
+
"CVE-2026-30615",
|
|
680
|
+
"CVE-2026-31431"
|
|
681
|
+
],
|
|
682
|
+
"atlas_refs": [
|
|
683
|
+
"AML.T0010",
|
|
684
|
+
"AML.T0051",
|
|
685
|
+
"AML.T0054"
|
|
686
|
+
],
|
|
687
|
+
"attack_refs": [
|
|
688
|
+
"T1059",
|
|
689
|
+
"T1068",
|
|
690
|
+
"T1078"
|
|
691
|
+
]
|
|
692
|
+
},
|
|
693
|
+
"HIPAA-Security-Rule-2026-NPRM-164.314": {
|
|
694
|
+
"framework": "HIPAA Security Rule (45 CFR § 164.314) — 2026 Notice of Proposed Rulemaking",
|
|
695
|
+
"control_id": "164.314-NPRM",
|
|
696
|
+
"control_name": "Proposed updates to BAA contract requirements (2026 NPRM)",
|
|
697
|
+
"designed_for": "Organizational requirements: business associate agreements (BAAs), requirements for group health plans. NPRM proposes expanded BAA language: annual workforce-training attestation by business associate, breach-notification clock alignment with HIPAA Breach Notification Rule (60-day outer limit), explicit sub-business-associate flow-down, written technical-safeguards attestation by business associate. Cross-walks to NIST 800-66r2, EU GDPR Art. 28 processor agreements, AU APP 11 third-party clauses.",
|
|
698
|
+
"misses": [
|
|
699
|
+
"Sub-business-associate flow-down does not specifically address AI sub-processor chains — an AI provider integrating embedding / vector / fine-tune sub-services produces a deeper subprocessor chain than the BAA template anticipates",
|
|
700
|
+
"Technical-safeguards attestation does not require AI-specific clauses: prompt retention policy, training-opt-out attestation, model-version pinning, AI-incident notification timeline distinct from generic breach notification",
|
|
701
|
+
"Annual training attestation does not contemplate AI-specific PHI handling training for business-associate workforce",
|
|
702
|
+
"60-day breach-notification clock does not align with prompt-leakage detection latency — PHI leaked through prompt-injection may not be detected within the BAA notification window"
|
|
703
|
+
],
|
|
704
|
+
"real_requirement": "164.314 NPRM implementation must add: (1) AI-sub-processor explicit flow-down template, (2) AI-specific BAA clauses (prompt retention, training opt-out, model version pinning, AI-incident reporting timeline), (3) AI-handling training requirement for business-associate workforce, (4) accelerated notification clock for AI-mediated PHI loss class. Final rule pending.",
|
|
705
|
+
"status": "open",
|
|
706
|
+
"opened_date": "2026-05-15",
|
|
707
|
+
"evidence_cves": [
|
|
708
|
+
"CVE-2025-53773"
|
|
709
|
+
],
|
|
710
|
+
"atlas_refs": [
|
|
711
|
+
"AML.T0010",
|
|
712
|
+
"AML.T0054"
|
|
713
|
+
],
|
|
714
|
+
"attack_refs": [
|
|
715
|
+
"T1195.001"
|
|
716
|
+
]
|
|
717
|
+
},
|
|
416
718
|
"HITRUST-CSF-v11.4-09.l": {
|
|
417
719
|
"framework": "HITRUST CSF v11.4",
|
|
418
720
|
"control_id": "09.l",
|
|
@@ -1246,6 +1548,98 @@
|
|
|
1246
1548
|
"T1068"
|
|
1247
1549
|
]
|
|
1248
1550
|
},
|
|
1551
|
+
"PCI-DSS-4.0.1-6.4.3": {
|
|
1552
|
+
"framework": "PCI DSS 4.0.1 (effective 2025-03-31 — supersedes 4.0)",
|
|
1553
|
+
"control_id": "6.4.3",
|
|
1554
|
+
"control_name": "Payment-page scripts are managed: script inventory + integrity check + authorisation",
|
|
1555
|
+
"designed_for": "All payment-page scripts (including those served from third-parties) loaded in the consumer browser must be authorised, integrity-monitored, and inventoried. 4.0.1 retained the 4.0 requirement but tightened the script-management language and made the requirement non-best-practice (mandatory for v4.0.1 compliance from 2025-03-31). Cross-walks to OWASP ASVS V14 client-side controls, EU PSD2 SCA-RTS Art. 18 client-side fraud monitoring, UK FCA SCA-RTS.",
|
|
1556
|
+
"misses": [
|
|
1557
|
+
"AI-generated payment-page widgets / chat-commerce embeds — Subresource Integrity (SRI) requires a static hash, but AI-generated dynamic scripts produce per-session content that defeats fixed-hash integrity checking",
|
|
1558
|
+
"Agent-mediated checkout (an AI agent fetching the payment page on behalf of the customer) is silent in the script-management language — the inventory contemplates browser-loaded scripts not agent-fetched ones",
|
|
1559
|
+
"MCP-server-injected helper scripts in developer environments can poison test-mode payment pages without surfacing in production script inventory",
|
|
1560
|
+
"Cross-walk to EU PSD2 SCA-RTS Art. 18 client-side fraud monitoring is not explicit — operators run two parallel monitoring programs without integration"
|
|
1561
|
+
],
|
|
1562
|
+
"real_requirement": "6.4.3 operationalisation must add: (1) dynamic-content integrity (CSP report-uri + runtime DOM-equivalent hashes for AI-generated payment widgets), (2) agent-mediated checkout treated as in-scope with delegated-authority attestation, (3) MCP-server allowlisting on developer endpoints that touch payment-page test environments, (4) integrated reporting with PSD2 SCA-RTS Art. 18 + UK FCA SCA-RTS.",
|
|
1563
|
+
"status": "open",
|
|
1564
|
+
"opened_date": "2026-05-15",
|
|
1565
|
+
"evidence_cves": [
|
|
1566
|
+
"CVE-2025-53773"
|
|
1567
|
+
],
|
|
1568
|
+
"atlas_refs": [
|
|
1569
|
+
"AML.T0010",
|
|
1570
|
+
"AML.T0051"
|
|
1571
|
+
],
|
|
1572
|
+
"attack_refs": [
|
|
1573
|
+
"T1059",
|
|
1574
|
+
"T1195.001"
|
|
1575
|
+
]
|
|
1576
|
+
},
|
|
1577
|
+
"PCI-DSS-4.0.1-11.6.1": {
|
|
1578
|
+
"framework": "PCI DSS 4.0.1 (effective 2025-03-31)",
|
|
1579
|
+
"control_id": "11.6.1",
|
|
1580
|
+
"control_name": "Change-and-tamper-detection mechanism on payment pages",
|
|
1581
|
+
"designed_for": "Mandatory runtime DOM-integrity monitoring on payment pages: alert on unauthorised modifications to HTTP headers / payment-page content; tamper-detection alerts at least weekly (or based on risk analysis). Cross-walks to OWASP ASVS V14, EU PSD2 SCA-RTS Art. 18.",
|
|
1582
|
+
"misses": [
|
|
1583
|
+
"Tamper-detection-weekly cadence is exploitation-acceptance for Magecart-class threats with public PoC; a Magecart compromise active 6 days before next scheduled scan has cleared millions of transactions",
|
|
1584
|
+
"AI-generated payment-page content (dynamic widgets, personalised messaging) creates baseline noise that suppresses tamper alerts unless the tooling distinguishes legitimate AI variation from malicious modification",
|
|
1585
|
+
"Detection mechanism scope is the consumer browser only — agent-mediated checkout, mobile-app-embedded payment SDKs, kiosk-mode terminals are out of the literal 11.6.1 scope despite being equivalent attack surface",
|
|
1586
|
+
"No required integration with CSP report-uri, no required Reporting API integration — operators run tamper detection alongside CSP reporting without correlated analysis"
|
|
1587
|
+
],
|
|
1588
|
+
"real_requirement": "11.6.1 implementation must add: (1) continuous (sub-hour) tamper detection for CDE-scoped payment pages, (2) AI-aware baselining that distinguishes legitimate dynamic content from injection, (3) extension to all payment-page-equivalent surfaces (mobile SDK, kiosk, agent-mediated), (4) mandatory CSP report-uri + Reporting API correlation.",
|
|
1589
|
+
"status": "open",
|
|
1590
|
+
"opened_date": "2026-05-15",
|
|
1591
|
+
"evidence_cves": [],
|
|
1592
|
+
"atlas_refs": [
|
|
1593
|
+
"AML.T0051"
|
|
1594
|
+
],
|
|
1595
|
+
"attack_refs": [
|
|
1596
|
+
"T1059"
|
|
1597
|
+
]
|
|
1598
|
+
},
|
|
1599
|
+
"PCI-DSS-4.0.1-12.3.3": {
|
|
1600
|
+
"framework": "PCI DSS 4.0.1 (effective 2025-03-31)",
|
|
1601
|
+
"control_id": "12.3.3",
|
|
1602
|
+
"control_name": "Cryptographic cipher suites and protocols inventory + annual review",
|
|
1603
|
+
"designed_for": "Every cipher suite and cryptographic protocol in use must be documented, inventoried with version, and reviewed at least once every 12 months. 4.0.1 retained 4.0 requirement and clarified that the inventory must cover all CDE-touching systems. Cross-walks to NIST SP 800-52r2, NIST SP 800-131A, EU ENISA cryptographic guidelines, UK NCSC cryptographic guidance, ISO/IEC 18033, NIST PQC migration roadmap (FIPS 203/204/205).",
|
|
1604
|
+
"misses": [
|
|
1605
|
+
"Annual cadence is incompatible with PQC migration timeline — NIST FIPS 203/204/205 finalisation (2024-08), CNSA 2.0 hard deadlines (2027-2030), and harvest-now-decrypt-later threat model require quarterly cipher-suite review",
|
|
1606
|
+
"Inventory scope does not explicitly include AI provider TLS termination cipher suites — PHI / cardholder data flowing to AI providers traverses cipher suites the inventory may not capture",
|
|
1607
|
+
"MCP server-to-client TLS configurations are not in the literal CDE perimeter and so are not inventoried, despite carrying delegated authority that can reach CDE systems",
|
|
1608
|
+
"No hybrid-PQC ecosystem readiness check — operators face a CNSA 2.0 (2027 federal, 2030 broader) cliff without a 4.0.1-mandated inventory of hybrid-PQC capability per cipher suite"
|
|
1609
|
+
],
|
|
1610
|
+
"real_requirement": "12.3.3 implementation must add: (1) quarterly cipher-suite + protocol review (annual is too slow given PQC migration), (2) inventory scope extended to AI-provider egress + MCP-server transports, (3) hybrid-PQC readiness column per cipher suite (X25519+ML-KEM, ECDSA+ML-DSA), (4) cross-walk to NIST PQC migration roadmap + CNSA 2.0 timelines.",
|
|
1611
|
+
"status": "open",
|
|
1612
|
+
"opened_date": "2026-05-15",
|
|
1613
|
+
"evidence_cves": [],
|
|
1614
|
+
"atlas_refs": [],
|
|
1615
|
+
"attack_refs": []
|
|
1616
|
+
},
|
|
1617
|
+
"PCI-DSS-4.0.1-12.10.7": {
|
|
1618
|
+
"framework": "PCI DSS 4.0.1 (effective 2025-03-31)",
|
|
1619
|
+
"control_id": "12.10.7",
|
|
1620
|
+
"control_name": "Incident response procedure for confirmed PAN exposure: escalation, regulator + brand notification, customer notification",
|
|
1621
|
+
"designed_for": "Defined incident-response procedure when PAN (Primary Account Number) is confirmed exposed, including escalation paths, regulator and card-brand notification, and customer-notification language. 4.0.1 retained 4.0 and tightened the escalation-procedure documentation. Cross-walks to EU PSD2 incident reporting, NIS2 Art. 23, UK FCA SUP 15.3, AU APRA CPS 234, NIST SP 800-61r3.",
|
|
1622
|
+
"misses": [
|
|
1623
|
+
"AI-mediated PAN exposure class (prompt injection extracting PAN from a banking copilot's context window; RAG corpus indexing PAN by error) is not in the response-procedure template — operators handle it as a generic exposure with sub-optimal containment",
|
|
1624
|
+
"Notification clock harmonisation: 12.10.7 references card-brand timelines that are not aligned with PSD2 / NIS2 / DORA financial-entity clocks; cross-jurisdiction operators face contradictory deadlines",
|
|
1625
|
+
"Escalation procedure does not require AI-incident sub-classification (model-extraction vs. prompt-injection vs. RAG-corruption) for forensic + remediation routing",
|
|
1626
|
+
"Customer-notification language template does not address AI-mediated exposure (which differs from database-breach exposure operationally — the PAN was leaked to a third-party AI provider, not extracted by an adversary)"
|
|
1627
|
+
],
|
|
1628
|
+
"real_requirement": "12.10.7 implementation must add: (1) AI-mediated PAN-exposure scenarios in the response-procedure template, (2) notification-clock harmonisation table covering card-brand + PSD2 + NIS2 + DORA + UK FCA + AU CPS 234, (3) AI-incident sub-classification in escalation routing, (4) customer-notification language addressing third-party-AI-provider exposure distinct from adversary exfiltration.",
|
|
1629
|
+
"status": "open",
|
|
1630
|
+
"opened_date": "2026-05-15",
|
|
1631
|
+
"evidence_cves": [
|
|
1632
|
+
"CVE-2025-53773"
|
|
1633
|
+
],
|
|
1634
|
+
"atlas_refs": [
|
|
1635
|
+
"AML.T0054",
|
|
1636
|
+
"AML.T0096"
|
|
1637
|
+
],
|
|
1638
|
+
"attack_refs": [
|
|
1639
|
+
"T1071",
|
|
1640
|
+
"T1530"
|
|
1641
|
+
]
|
|
1642
|
+
},
|
|
1249
1643
|
"PSD2-RTS-SCA": {
|
|
1250
1644
|
"framework": "EU PSD2 Regulatory Technical Standards on Strong Customer Authentication (Commission Delegated Regulation (EU) 2018/389)",
|
|
1251
1645
|
"control_id": "RTS-SCA",
|
|
@@ -1570,5 +1964,167 @@
|
|
|
1570
1964
|
"attack_refs": [
|
|
1571
1965
|
"T1195.001"
|
|
1572
1966
|
]
|
|
1967
|
+
},
|
|
1968
|
+
"FCC-CPNI-4.1": {
|
|
1969
|
+
"framework": "FCC-CPNI",
|
|
1970
|
+
"control_id": "47-CFR-64.2009(e)",
|
|
1971
|
+
"control_name": "CPNI Annual Certification + Operational Compliance",
|
|
1972
|
+
"designed_for": "Annual certification by US telecom carriers that they have established operating procedures to comply with CPNI rules; covers customer-proprietary network info disclosure to law enforcement and third parties.",
|
|
1973
|
+
"misses": [
|
|
1974
|
+
"Lawful-intercept (LI) gateway compromise detection — CPNI rules predate Salt Typhoon-class adversary access to CALEA-mandated systems",
|
|
1975
|
+
"Anomalous LI activation requests from compromised admin accounts",
|
|
1976
|
+
"Cross-PLMN signaling spike detection (SS7 / Diameter / GTP)",
|
|
1977
|
+
"OEM firmware drift attestation on equipment that touches CPNI flows"
|
|
1978
|
+
],
|
|
1979
|
+
"real_requirement": "Annual CPNI certification PLUS quarterly LI-gateway activation audit (PRC / Salt-Typhoon-class threat model), gNB firmware hash attestation, signaling-anomaly baselines per PLMN-pair.",
|
|
1980
|
+
"status": "open",
|
|
1981
|
+
"opened_date": "2026-05-15",
|
|
1982
|
+
"evidence_cves": [],
|
|
1983
|
+
"atlas_refs": ["AML.T0040"],
|
|
1984
|
+
"attack_refs": ["T1078", "T1098", "T1199"]
|
|
1985
|
+
},
|
|
1986
|
+
"FCC-Cyber-Incident-Notification-2024": {
|
|
1987
|
+
"framework": "FCC",
|
|
1988
|
+
"control_id": "47-CFR-64.2011",
|
|
1989
|
+
"control_name": "FCC Cyber Incident Notification (4 business days)",
|
|
1990
|
+
"designed_for": "Notification rule requiring US telecom carriers to report PII or CPNI breaches within 4 business days of discovery (effective 2024-03-13).",
|
|
1991
|
+
"misses": [
|
|
1992
|
+
"No requirement to notify on lawful-intercept-system compromise that does not exfiltrate PII directly (e.g. Salt Typhoon access to LI feeds covering counter-intelligence targets)",
|
|
1993
|
+
"No requirement to notify on signaling-protocol intrusion (SS7 / Diameter abuse) absent PII loss",
|
|
1994
|
+
"4-business-day window is too slow for an ongoing nation-state campaign — peer regulators set tighter limits (NIS2 24h, DORA 4h)",
|
|
1995
|
+
"No structured-data feed for cross-carrier IOC sharing"
|
|
1996
|
+
],
|
|
1997
|
+
"real_requirement": "4-business-day window paired with 24-hour preliminary signal-flag for LI-system compromise + structured CISA / NSA / FBI IOC handoff format.",
|
|
1998
|
+
"status": "open",
|
|
1999
|
+
"opened_date": "2026-05-15",
|
|
2000
|
+
"evidence_cves": [],
|
|
2001
|
+
"atlas_refs": [],
|
|
2002
|
+
"attack_refs": ["T1199", "T1078"]
|
|
2003
|
+
},
|
|
2004
|
+
"NIS2-Annex-I-Telecom": {
|
|
2005
|
+
"framework": "NIS2",
|
|
2006
|
+
"control_id": "Annex-I-Telecommunications",
|
|
2007
|
+
"control_name": "NIS2 Annex I — telecommunications essential entities",
|
|
2008
|
+
"designed_for": "NIS2 Directive (EU) 2022/2555 Annex I classifies telecom providers as essential entities, mandating risk management measures + 24h incident notification + supply-chain due diligence.",
|
|
2009
|
+
"misses": [
|
|
2010
|
+
"No specific obligations on lawful-intercept-system access controls (national-security scope deferred to MS-level law)",
|
|
2011
|
+
"Supply-chain due diligence (Art. 21(2)(d)) does not name OEM-vendor-equipment firmware integrity attestation specifically",
|
|
2012
|
+
"AI-RAN security obligations absent — O-RAN deployments span the entity boundary in ways the NIS2 risk-management framework does not yet model",
|
|
2013
|
+
"24h notification clock starts at significant-incident-detection but signaling-protocol intrusion + slow-roll campaigns evade the trigger"
|
|
2014
|
+
],
|
|
2015
|
+
"real_requirement": "Annex I + explicit LI-gateway operator-attested firmware hash + AI-RAN model-tampering controls + cross-PLMN signaling baseline obligation.",
|
|
2016
|
+
"status": "open",
|
|
2017
|
+
"opened_date": "2026-05-15",
|
|
2018
|
+
"evidence_cves": [],
|
|
2019
|
+
"atlas_refs": ["AML.T0040"],
|
|
2020
|
+
"attack_refs": ["T1199", "T1078", "T1098"]
|
|
2021
|
+
},
|
|
2022
|
+
"DORA-Art-21-Telecom-ICT": {
|
|
2023
|
+
"framework": "DORA",
|
|
2024
|
+
"control_id": "Art-21-Telecom-ICT",
|
|
2025
|
+
"control_name": "DORA Art. 21 — ICT third-party risk (telecom-adjacent application)",
|
|
2026
|
+
"designed_for": "DORA Reg. (EU) 2022/2554 Art. 21 ICT third-party risk management; applies to financial entities consuming telecom-provided ICT services.",
|
|
2027
|
+
"misses": [
|
|
2028
|
+
"Telecom-to-financial trust boundary is asymmetric — DORA binds the financial entity but telecom providers (essential entities under NIS2) may not align reporting cadences",
|
|
2029
|
+
"Lawful-intercept access by the telecom upstream is not in DORA scope but creates a parallel data-exposure surface",
|
|
2030
|
+
"CTPP (critical third-party provider) oversight does not yet cover OEM equipment vendors transitively",
|
|
2031
|
+
"No bridge to 5G slice-isolation obligations for financial-sector dedicated network slices"
|
|
2032
|
+
],
|
|
2033
|
+
"real_requirement": "DORA Art. 21 + alignment with NIS2 telecom-essential-entity reporting + slice-isolation attestation for finance-dedicated 5G slices.",
|
|
2034
|
+
"status": "open",
|
|
2035
|
+
"opened_date": "2026-05-15",
|
|
2036
|
+
"evidence_cves": [],
|
|
2037
|
+
"atlas_refs": [],
|
|
2038
|
+
"attack_refs": ["T1199"]
|
|
2039
|
+
},
|
|
2040
|
+
"UK-CAF-B5": {
|
|
2041
|
+
"framework": "UK-CAF",
|
|
2042
|
+
"control_id": "Principle-B5",
|
|
2043
|
+
"control_name": "Resilient networks and systems",
|
|
2044
|
+
"designed_for": "NCSC Cyber Assessment Framework Principle B5 — outcome-tested network resilience for essential service operators (incl. telecom under TSA 2021).",
|
|
2045
|
+
"misses": [
|
|
2046
|
+
"Signaling-protocol attack-surface (SS7 / Diameter / GTP) not in CAF B5 outcome tests",
|
|
2047
|
+
"gNB / DU / CU integrity attestation not modeled — CAF B5 expects network-availability resilience, not equipment-supply-chain attestation",
|
|
2048
|
+
"Lawful-intercept access path covered by separate IPA 2016 + TSA 2021 + Code of Practice — not CAF scope",
|
|
2049
|
+
"AI-RAN slice-isolation testing not in the CAF outcome catalog"
|
|
2050
|
+
],
|
|
2051
|
+
"real_requirement": "CAF B5 + signaling-anomaly detection + gNB firmware attestation outcome test + slice-isolation outcome test.",
|
|
2052
|
+
"status": "open",
|
|
2053
|
+
"opened_date": "2026-05-15",
|
|
2054
|
+
"evidence_cves": [],
|
|
2055
|
+
"atlas_refs": [],
|
|
2056
|
+
"attack_refs": ["T1199", "T1078"]
|
|
2057
|
+
},
|
|
2058
|
+
"AU-ISM-1556": {
|
|
2059
|
+
"framework": "au-ism",
|
|
2060
|
+
"control_id": "ISM-1556",
|
|
2061
|
+
"control_name": "Multi-factor authentication for privileged users (telecom NMS application)",
|
|
2062
|
+
"designed_for": "Australian Government ISM control ISM-1556 — phishing-resistant MFA for privileged users + remote access.",
|
|
2063
|
+
"misses": [
|
|
2064
|
+
"Telecom NMS service accounts (which hold gNB / EMS / OSS access) often bypass human MFA",
|
|
2065
|
+
"Service-account credential management policy is ISM-1559 (covered separately); ISM-1556 alone is insufficient for telecom OEM-vendor support tunnels",
|
|
2066
|
+
"Lawful-intercept gateway operator credentials specifically uncovered — these are not always classified as privileged in telecom RBAC models",
|
|
2067
|
+
"OEM remote-support inbound tunnels (Cisco TAC, Ericsson ENS) often pass credentials via shared mailbox — defeats MFA intent"
|
|
2068
|
+
],
|
|
2069
|
+
"real_requirement": "ISM-1556 + telecom-NMS service-account FIDO2 enforcement + LI-gateway-specific MFA + OEM remote-support-tunnel federated-MFA mandate.",
|
|
2070
|
+
"status": "open",
|
|
2071
|
+
"opened_date": "2026-05-15",
|
|
2072
|
+
"evidence_cves": [],
|
|
2073
|
+
"atlas_refs": [],
|
|
2074
|
+
"attack_refs": ["T1078", "T1098"]
|
|
2075
|
+
},
|
|
2076
|
+
"GSMA-NESAS-Deployment": {
|
|
2077
|
+
"framework": "GSMA-NESAS",
|
|
2078
|
+
"control_id": "NESAS-Deployment-Gap",
|
|
2079
|
+
"control_name": "NESAS at-deployment posture",
|
|
2080
|
+
"designed_for": "GSMA Network Equipment Security Assurance Scheme — product-time certification of telecom OEM equipment against 3GPP SCAS test cases (GSMA FS.13 / FS.14 / FS.15).",
|
|
2081
|
+
"misses": [
|
|
2082
|
+
"Certification is product-time (one snapshot, vendor-attested); deployment posture drifts as firmware / config evolves",
|
|
2083
|
+
"No post-deployment attested-runtime check — operator has no canonical way to confirm a running gNB matches the certified build",
|
|
2084
|
+
"Firmware update cadence is not tied to NESAS re-certification — vendor patches between certifications run uncertified",
|
|
2085
|
+
"NESAS scope excludes the EMS / OSS / NMS systems that operate the equipment, which is where Salt Typhoon-class campaigns gained access"
|
|
2086
|
+
],
|
|
2087
|
+
"real_requirement": "NESAS product-time certification PLUS operator-attested-runtime gNB hash + EMS / OSS NESAS-equivalent scheme + firmware-update-cadence-tied recertification.",
|
|
2088
|
+
"status": "open",
|
|
2089
|
+
"opened_date": "2026-05-15",
|
|
2090
|
+
"evidence_cves": [],
|
|
2091
|
+
"atlas_refs": [],
|
|
2092
|
+
"attack_refs": ["T1199"]
|
|
2093
|
+
},
|
|
2094
|
+
"3GPP-TR-33.926": {
|
|
2095
|
+
"framework": "3GPP",
|
|
2096
|
+
"control_id": "TR-33.926",
|
|
2097
|
+
"control_name": "3GPP Security Assurance Specification (gNB / eNB)",
|
|
2098
|
+
"designed_for": "3GPP TR 33.926 Security Assurance Specification — security test cases applied against the gNB / eNB product class, paired with the broader 5G security architecture in TS 33.501.",
|
|
2099
|
+
"misses": [
|
|
2100
|
+
"TR 33.926 covers the equipment itself; the AI-RAN / O-RAN deployment is outside scope (O-RAN SFG / WG11 handles separately)",
|
|
2101
|
+
"Test cases assume deterministic equipment behavior — adversary-modified firmware that passes TR 33.926 tests at submission time is undetected after the fact",
|
|
2102
|
+
"N6 / N9 interface isolation testing is in TS 33.501 not TR 33.926 — operators consume both, gap is at the join",
|
|
2103
|
+
"No bridge to ISM-1556-class operator-account hardening for the NMS that operates the certified equipment"
|
|
2104
|
+
],
|
|
2105
|
+
"real_requirement": "TR 33.926 + post-deployment hash-attestation + O-RAN security WG11 alignment + cross-spec join testing between TR 33.926 and TS 33.501.",
|
|
2106
|
+
"status": "open",
|
|
2107
|
+
"opened_date": "2026-05-15",
|
|
2108
|
+
"evidence_cves": [],
|
|
2109
|
+
"atlas_refs": [],
|
|
2110
|
+
"attack_refs": ["T1199"]
|
|
2111
|
+
},
|
|
2112
|
+
"ITU-T-X.805": {
|
|
2113
|
+
"framework": "ITU-T",
|
|
2114
|
+
"control_id": "X.805",
|
|
2115
|
+
"control_name": "ITU-T X.805 — 8-dimension security architecture for end-to-end communications",
|
|
2116
|
+
"designed_for": "ITU-T Recommendation X.805 (2003) — generic 8-dimension security architecture (access control, authentication, non-repudiation, data confidentiality, communication security, data integrity, availability, privacy) for telecom networks.",
|
|
2117
|
+
"misses": [
|
|
2118
|
+
"Specification predates 5G, O-RAN, AI-RAN, and CALEA / IPA-LI surface evolution; control language remains generic",
|
|
2119
|
+
"No mapping to modern threat models (Salt Typhoon, signaling-protocol abuse)",
|
|
2120
|
+
"Treated as reference architecture, not as a deployment-validation framework — operators rarely audit posture against X.805 dimensions directly",
|
|
2121
|
+
"No bridge to NESAS / 3GPP / NIS2 / FCC CPNI specific obligations"
|
|
2122
|
+
],
|
|
2123
|
+
"real_requirement": "X.805 8-dimension framing PLUS modern-threat-model annexes (LI-system compromise, signaling-protocol abuse, slice-isolation) + deployment-validation checklist.",
|
|
2124
|
+
"status": "open",
|
|
2125
|
+
"opened_date": "2026-05-15",
|
|
2126
|
+
"evidence_cves": [],
|
|
2127
|
+
"atlas_refs": [],
|
|
2128
|
+
"attack_refs": ["T1199"]
|
|
1573
2129
|
}
|
|
1574
2130
|
}
|