@blamejs/exceptd-skills 0.12.26 → 0.12.28
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/AGENTS.md +3 -0
- package/CHANGELOG.md +60 -0
- package/bin/exceptd.js +73 -1
- package/data/_indexes/_meta.json +22 -19
- package/data/_indexes/activity-feed.json +26 -5
- package/data/_indexes/catalog-summaries.json +3 -3
- package/data/_indexes/chains.json +994 -64
- package/data/_indexes/currency.json +28 -1
- package/data/_indexes/frequency.json +428 -124
- package/data/_indexes/handoff-dag.json +70 -19
- package/data/_indexes/jurisdiction-map.json +37 -12
- package/data/_indexes/section-offsets.json +282 -0
- package/data/_indexes/stale-content.json +2 -2
- package/data/_indexes/summary-cards.json +198 -0
- package/data/_indexes/token-budget.json +168 -3
- package/data/_indexes/trigger-table.json +190 -0
- package/data/_indexes/xref.json +145 -2
- package/data/attack-techniques.json +104 -19
- package/data/framework-control-gaps.json +498 -11
- package/data/playbooks/cloud-iam-incident.json +1351 -0
- package/data/playbooks/idp-incident.json +1259 -0
- package/data/playbooks/ransomware.json +1407 -0
- package/data/rfc-references.json +44 -0
- package/lib/flag-suggest.js +4 -0
- package/lib/playbook-runner.js +117 -10
- package/manifest-snapshot.json +227 -3
- package/manifest-snapshot.sha256 +1 -1
- package/manifest.json +282 -41
- package/package.json +1 -1
- package/sbom.cdx.json +7 -7
- package/skills/cloud-iam-incident/skill.md +419 -0
- package/skills/idp-incident-response/skill.md +352 -0
- package/skills/ransomware-response/skill.md +374 -0
|
@@ -1980,8 +1980,14 @@
|
|
|
1980
1980
|
"status": "open",
|
|
1981
1981
|
"opened_date": "2026-05-15",
|
|
1982
1982
|
"evidence_cves": [],
|
|
1983
|
-
"atlas_refs": [
|
|
1984
|
-
|
|
1983
|
+
"atlas_refs": [
|
|
1984
|
+
"AML.T0040"
|
|
1985
|
+
],
|
|
1986
|
+
"attack_refs": [
|
|
1987
|
+
"T1078",
|
|
1988
|
+
"T1098",
|
|
1989
|
+
"T1199"
|
|
1990
|
+
]
|
|
1985
1991
|
},
|
|
1986
1992
|
"FCC-Cyber-Incident-Notification-2024": {
|
|
1987
1993
|
"framework": "FCC",
|
|
@@ -1999,7 +2005,10 @@
|
|
|
1999
2005
|
"opened_date": "2026-05-15",
|
|
2000
2006
|
"evidence_cves": [],
|
|
2001
2007
|
"atlas_refs": [],
|
|
2002
|
-
"attack_refs": [
|
|
2008
|
+
"attack_refs": [
|
|
2009
|
+
"T1199",
|
|
2010
|
+
"T1078"
|
|
2011
|
+
]
|
|
2003
2012
|
},
|
|
2004
2013
|
"NIS2-Annex-I-Telecom": {
|
|
2005
2014
|
"framework": "NIS2",
|
|
@@ -2016,8 +2025,14 @@
|
|
|
2016
2025
|
"status": "open",
|
|
2017
2026
|
"opened_date": "2026-05-15",
|
|
2018
2027
|
"evidence_cves": [],
|
|
2019
|
-
"atlas_refs": [
|
|
2020
|
-
|
|
2028
|
+
"atlas_refs": [
|
|
2029
|
+
"AML.T0040"
|
|
2030
|
+
],
|
|
2031
|
+
"attack_refs": [
|
|
2032
|
+
"T1199",
|
|
2033
|
+
"T1078",
|
|
2034
|
+
"T1098"
|
|
2035
|
+
]
|
|
2021
2036
|
},
|
|
2022
2037
|
"DORA-Art-21-Telecom-ICT": {
|
|
2023
2038
|
"framework": "DORA",
|
|
@@ -2035,7 +2050,9 @@
|
|
|
2035
2050
|
"opened_date": "2026-05-15",
|
|
2036
2051
|
"evidence_cves": [],
|
|
2037
2052
|
"atlas_refs": [],
|
|
2038
|
-
"attack_refs": [
|
|
2053
|
+
"attack_refs": [
|
|
2054
|
+
"T1199"
|
|
2055
|
+
]
|
|
2039
2056
|
},
|
|
2040
2057
|
"UK-CAF-B5": {
|
|
2041
2058
|
"framework": "UK-CAF",
|
|
@@ -2053,7 +2070,10 @@
|
|
|
2053
2070
|
"opened_date": "2026-05-15",
|
|
2054
2071
|
"evidence_cves": [],
|
|
2055
2072
|
"atlas_refs": [],
|
|
2056
|
-
"attack_refs": [
|
|
2073
|
+
"attack_refs": [
|
|
2074
|
+
"T1199",
|
|
2075
|
+
"T1078"
|
|
2076
|
+
]
|
|
2057
2077
|
},
|
|
2058
2078
|
"AU-ISM-1556": {
|
|
2059
2079
|
"framework": "au-ism",
|
|
@@ -2071,7 +2091,10 @@
|
|
|
2071
2091
|
"opened_date": "2026-05-15",
|
|
2072
2092
|
"evidence_cves": [],
|
|
2073
2093
|
"atlas_refs": [],
|
|
2074
|
-
"attack_refs": [
|
|
2094
|
+
"attack_refs": [
|
|
2095
|
+
"T1078",
|
|
2096
|
+
"T1098"
|
|
2097
|
+
]
|
|
2075
2098
|
},
|
|
2076
2099
|
"GSMA-NESAS-Deployment": {
|
|
2077
2100
|
"framework": "GSMA-NESAS",
|
|
@@ -2089,7 +2112,9 @@
|
|
|
2089
2112
|
"opened_date": "2026-05-15",
|
|
2090
2113
|
"evidence_cves": [],
|
|
2091
2114
|
"atlas_refs": [],
|
|
2092
|
-
"attack_refs": [
|
|
2115
|
+
"attack_refs": [
|
|
2116
|
+
"T1199"
|
|
2117
|
+
]
|
|
2093
2118
|
},
|
|
2094
2119
|
"3GPP-TR-33.926": {
|
|
2095
2120
|
"framework": "3GPP",
|
|
@@ -2107,7 +2132,9 @@
|
|
|
2107
2132
|
"opened_date": "2026-05-15",
|
|
2108
2133
|
"evidence_cves": [],
|
|
2109
2134
|
"atlas_refs": [],
|
|
2110
|
-
"attack_refs": [
|
|
2135
|
+
"attack_refs": [
|
|
2136
|
+
"T1199"
|
|
2137
|
+
]
|
|
2111
2138
|
},
|
|
2112
2139
|
"ITU-T-X.805": {
|
|
2113
2140
|
"framework": "ITU-T",
|
|
@@ -2125,6 +2152,466 @@
|
|
|
2125
2152
|
"opened_date": "2026-05-15",
|
|
2126
2153
|
"evidence_cves": [],
|
|
2127
2154
|
"atlas_refs": [],
|
|
2128
|
-
"attack_refs": [
|
|
2155
|
+
"attack_refs": [
|
|
2156
|
+
"T1199"
|
|
2157
|
+
]
|
|
2158
|
+
},
|
|
2159
|
+
"NIST-800-53-IA-5-Federated": {
|
|
2160
|
+
"framework": "NIST 800-53 Rev.5",
|
|
2161
|
+
"control_id": "IA-5 (federated)",
|
|
2162
|
+
"control_name": "Authenticator Management — federated-trust extension",
|
|
2163
|
+
"designed_for": "IA-5 governs authenticator issuance, distribution, storage, revocation, and replacement at the system layer.",
|
|
2164
|
+
"misses": [
|
|
2165
|
+
"Federated-trust modification at the IdP control plane (token-signing certificate rotation, claim-transformation rule changes, OIDC discovery-document tampering) is outside the IA-5 evidence path",
|
|
2166
|
+
"IA-5 evidence is satisfied by a quarterly authenticator inventory snapshot; an attacker who modifies the federation in week 5 produces eight weeks of compliant audit trail before the next snapshot",
|
|
2167
|
+
"Management-API tokens that bypass the human-MFA gate (Okta API tokens, Entra app secrets, Auth0 management API tokens) are not enumerated as IA-5 authenticators by most implementations"
|
|
2168
|
+
],
|
|
2169
|
+
"real_requirement": "Extend IA-5 to the IdP control plane: continuous attestation of token-signing certificate fingerprints + claim-transformation rule baseline + per-modification change-control attestation + management-API-token inventory with TTL + scope + source-IP enforcement.",
|
|
2170
|
+
"status": "open",
|
|
2171
|
+
"opened_date": "2026-05-15",
|
|
2172
|
+
"evidence_cves": [],
|
|
2173
|
+
"atlas_refs": [],
|
|
2174
|
+
"attack_refs": [
|
|
2175
|
+
"T1556.007",
|
|
2176
|
+
"T1098.001",
|
|
2177
|
+
"T1606.002"
|
|
2178
|
+
]
|
|
2179
|
+
},
|
|
2180
|
+
"ISO-27001-2022-A.5.16-Federated": {
|
|
2181
|
+
"framework": "ISO/IEC 27001:2022",
|
|
2182
|
+
"control_id": "A.5.16 + A.5.17",
|
|
2183
|
+
"control_name": "Identity Management + Authentication Information — federated-state extension",
|
|
2184
|
+
"designed_for": "A.5.16 governs identity lifecycle (provisioning, modification, deprovisioning); A.5.17 governs the protection of authentication information.",
|
|
2185
|
+
"misses": [
|
|
2186
|
+
"Both controls cover static identity state — was the account provisioned, was MFA enrolled, was the password rotated",
|
|
2187
|
+
"Federated-state transitions (OAuth consent grants, cross-tenant access settings, federated-trust modification) are not enumerated as a distinct control class",
|
|
2188
|
+
"An ISO 27001:2022 audit can pass with zero evidence on the federated state of the IdP tenant"
|
|
2189
|
+
],
|
|
2190
|
+
"real_requirement": "Add a control-objective footnote requiring inventory of OAuth consent grants + federated-trust configuration + cross-tenant access settings, with documented change-control for each modification and continuous alerting on high-risk grants.",
|
|
2191
|
+
"status": "open",
|
|
2192
|
+
"opened_date": "2026-05-15",
|
|
2193
|
+
"evidence_cves": [],
|
|
2194
|
+
"atlas_refs": [],
|
|
2195
|
+
"attack_refs": [
|
|
2196
|
+
"T1098.001",
|
|
2197
|
+
"T1199"
|
|
2198
|
+
]
|
|
2199
|
+
},
|
|
2200
|
+
"SOC2-CC6-OAuth-Consent": {
|
|
2201
|
+
"framework": "SOC 2 (AICPA Trust Services Criteria)",
|
|
2202
|
+
"control_id": "CC6 (OAuth consent)",
|
|
2203
|
+
"control_name": "Logical and Physical Access Controls — OAuth consent extension",
|
|
2204
|
+
"designed_for": "CC6 covers authentication, authorization, and access controls for human users and service accounts. It treats the authenticated session as the access boundary.",
|
|
2205
|
+
"misses": [
|
|
2206
|
+
"OAuth consent grants federate scope outside the authenticated-session boundary; the consenting user authenticated correctly and the third-party app's onward calls are authorized by the grant",
|
|
2207
|
+
"CC6 audit evidence shows nothing anomalous when a tenant-wide OAuth grant is harvested by an attacker — the Midnight Blizzard January 2024 pattern",
|
|
2208
|
+
"No control for OAuth-app publisher verification, cross-tenant consent inventory, or scope-vs-business-purpose attestation"
|
|
2209
|
+
],
|
|
2210
|
+
"real_requirement": "Add a CC6 sub-criterion requiring evidence of OAuth consent-grant inventory + continuous alerting on high-risk scope grants + per-grant business-purpose attestation + unverified-publisher gating.",
|
|
2211
|
+
"status": "open",
|
|
2212
|
+
"opened_date": "2026-05-15",
|
|
2213
|
+
"evidence_cves": [],
|
|
2214
|
+
"atlas_refs": [],
|
|
2215
|
+
"attack_refs": [
|
|
2216
|
+
"T1098.001"
|
|
2217
|
+
]
|
|
2218
|
+
},
|
|
2219
|
+
"UK-CAF-B2-IdP-Tenant": {
|
|
2220
|
+
"framework": "UK NCSC CAF",
|
|
2221
|
+
"control_id": "B2.b",
|
|
2222
|
+
"control_name": "Identity and Access Control — IdP-tenant control-plane extension",
|
|
2223
|
+
"designed_for": "NCSC CAF Principle B2 (Identity and Access Control), outcome B2.b — effectively managing identity and access for the essential function.",
|
|
2224
|
+
"misses": [
|
|
2225
|
+
"B2.b is outcome-based against the IdP tenant's published authentication outcomes",
|
|
2226
|
+
"The IdP-tenant control plane (who modified the tenant configuration itself) is outside the outcome's typical evidence surface",
|
|
2227
|
+
"A compromised tenant continues to produce compliant B2.b outcomes until the attacker abandons stealth"
|
|
2228
|
+
],
|
|
2229
|
+
"real_requirement": "Extend B2.b outcome assessment to the IdP-tenant control plane: federated-trust integrity, consent-grant inventory, privileged-role-assignment audit, management-API-token inventory, break-glass authentication alerting.",
|
|
2230
|
+
"status": "open",
|
|
2231
|
+
"opened_date": "2026-05-15",
|
|
2232
|
+
"evidence_cves": [],
|
|
2233
|
+
"atlas_refs": [],
|
|
2234
|
+
"attack_refs": [
|
|
2235
|
+
"T1098.001",
|
|
2236
|
+
"T1556.007",
|
|
2237
|
+
"T1199"
|
|
2238
|
+
]
|
|
2239
|
+
},
|
|
2240
|
+
"AU-ISM-1559-IdP": {
|
|
2241
|
+
"framework": "AU ISM",
|
|
2242
|
+
"control_id": "ISM-1559",
|
|
2243
|
+
"control_name": "Privileged Account Credential Management — IdP-tenant control-plane extension",
|
|
2244
|
+
"designed_for": "ISM-1559 covers privileged-account credential management — storage, rotation, monitoring of privileged credentials.",
|
|
2245
|
+
"misses": [
|
|
2246
|
+
"ISM-1559 reaches privileged credentials at the system layer (admin password vault, server-side admin accounts)",
|
|
2247
|
+
"IdP-tenant control-plane operations (modifying federated trust, granting tenant-wide application permissions, rotating the token-signing certificate) are outside the ISM-1559 evidence path",
|
|
2248
|
+
"The IdP tenant is the privileged-credential source-of-truth for every downstream system; ISM-1559 audits the downstream systems and treats the IdP tenant as oracle"
|
|
2249
|
+
],
|
|
2250
|
+
"real_requirement": "Extend ISM-1559 scope to the IdP tenant's own control plane: management-API-token inventory, consent-grant inventory, federated-trust integrity, with continuous alerting and quarterly attestation.",
|
|
2251
|
+
"status": "open",
|
|
2252
|
+
"opened_date": "2026-05-15",
|
|
2253
|
+
"evidence_cves": [],
|
|
2254
|
+
"atlas_refs": [],
|
|
2255
|
+
"attack_refs": [
|
|
2256
|
+
"T1078.004",
|
|
2257
|
+
"T1098.001"
|
|
2258
|
+
]
|
|
2259
|
+
},
|
|
2260
|
+
"NIS2-Art-21-Federated-Identity": {
|
|
2261
|
+
"framework": "EU NIS2 Directive",
|
|
2262
|
+
"control_id": "Art.21(2)(j)",
|
|
2263
|
+
"control_name": "Cryptography + Access Control — federated-identity extension",
|
|
2264
|
+
"designed_for": "Art.21(2)(j) names cryptography and access-control measures (including MFA) as required risk-management measures for essential and important entities.",
|
|
2265
|
+
"misses": [
|
|
2266
|
+
"The supporting implementing acts and ENISA reference frameworks do not enumerate federated-identity control-plane operations (consent grants, federated-trust modification, cross-tenant access settings)",
|
|
2267
|
+
"IdP-provider tenants serving essential entities are in scope but the evidence model lags",
|
|
2268
|
+
"Art.23 24-hour clock fires on IdP incidents at essential entities but the tenant-operator-to-essential-entity notification chain is undefined for IdP-class incidents"
|
|
2269
|
+
],
|
|
2270
|
+
"real_requirement": "Extend implementing-act guidance to enumerate federated-identity control-plane indicators (consent abuse, federation modification, cross-tenant compromise) as Art.23-triggering events with a defined notification chain from IdP provider to essential entity to competent authority.",
|
|
2271
|
+
"status": "open",
|
|
2272
|
+
"opened_date": "2026-05-15",
|
|
2273
|
+
"evidence_cves": [],
|
|
2274
|
+
"atlas_refs": [],
|
|
2275
|
+
"attack_refs": [
|
|
2276
|
+
"T1098.001",
|
|
2277
|
+
"T1556.007",
|
|
2278
|
+
"T1199"
|
|
2279
|
+
]
|
|
2280
|
+
},
|
|
2281
|
+
"DORA-Art-19-IdP-4h": {
|
|
2282
|
+
"framework": "EU DORA",
|
|
2283
|
+
"control_id": "Art.19 (4h IdP)",
|
|
2284
|
+
"control_name": "Major-ICT-related-incident notification — IdP-specific 4-hour clock",
|
|
2285
|
+
"designed_for": "DORA Art.19 — initial notification within 4 hours of classification of a major ICT-related incident, intermediate report within 72 hours, final report within one month.",
|
|
2286
|
+
"misses": [
|
|
2287
|
+
"Art.19 does not specify IdP-tenant compromise as a distinct incident class",
|
|
2288
|
+
"Financial entities relying on a CSP-hosted IdP frequently classify IdP incidents under Art.28 ICT-third-party-provider concentration risk and miss the Art.19 4-hour clock entirely",
|
|
2289
|
+
"The IdP is the single highest-blast-radius critical ICT third-party but the framework treats it as fungible"
|
|
2290
|
+
],
|
|
2291
|
+
"real_requirement": "Add IdP-tenant compromise as a named incident class under Art.19 with the 4-hour clock binding from detect-confirmed timestamp, independent of concentration-risk classification under Art.28.",
|
|
2292
|
+
"status": "open",
|
|
2293
|
+
"opened_date": "2026-05-15",
|
|
2294
|
+
"evidence_cves": [],
|
|
2295
|
+
"atlas_refs": [],
|
|
2296
|
+
"attack_refs": [
|
|
2297
|
+
"T1098.001",
|
|
2298
|
+
"T1556.007"
|
|
2299
|
+
]
|
|
2300
|
+
},
|
|
2301
|
+
"OFAC-Sanctions-Threat-Actor-Negotiation": {
|
|
2302
|
+
"framework": "US Treasury OFAC + EU sanctions overlay + UK OFSI",
|
|
2303
|
+
"control_id": "OFAC Sanctions — Cyber-Related Designations",
|
|
2304
|
+
"control_name": "Sanctions screening on ransomware-payment / threat-actor negotiation",
|
|
2305
|
+
"designed_for": "OFAC Cyber-Related Sanctions program (Executive Order 13694 + 13757) prohibits transactions with designated cyber-actors; EU sanctions (Council Regulation 269/2014 + cyber-specific designations) and UK OFSI mirror the regime.",
|
|
2306
|
+
"misses": [
|
|
2307
|
+
"IdP-incident-response that escalates to ransomware deployment (Scattered Spider 2023-2026 pattern) faces immediate ransom-payment-vs-sanctions screening decision under time pressure",
|
|
2308
|
+
"OFAC 2020/2021 advisories warn of secondary sanctions liability for facilitators (IR firms, insurers, negotiators); decision authority is frequently undocumented pre-incident",
|
|
2309
|
+
"Threat-actor-attribution-to-designated-entity is rarely deterministic during an active incident; the sanctions decision must operate under uncertainty"
|
|
2310
|
+
],
|
|
2311
|
+
"real_requirement": "Pre-incident: document ransom-payment decision authority (legal + board sign-off); pre-stage OFAC + EU + UK sanctions screening procedure with named decision-maker; pre-stage facilitator-liability waiver language for IR firm + insurer + negotiator engagement. During incident: every decision logged with attribution evidence + sanctions screening outcome + named approver.",
|
|
2312
|
+
"status": "open",
|
|
2313
|
+
"opened_date": "2026-05-15",
|
|
2314
|
+
"evidence_cves": [],
|
|
2315
|
+
"atlas_refs": [],
|
|
2316
|
+
"attack_refs": [
|
|
2317
|
+
"T1486",
|
|
2318
|
+
"T1078.004"
|
|
2319
|
+
]
|
|
2320
|
+
},
|
|
2321
|
+
"FedRAMP-IL5-IAM-Federated": {
|
|
2322
|
+
"framework": "FedRAMP (US)",
|
|
2323
|
+
"control_id": "IL5 baseline (AC-2 / AC-3 / AC-6 / IA-2 / IA-5)",
|
|
2324
|
+
"control_name": "FedRAMP Impact-Level 5 baseline IAM controls",
|
|
2325
|
+
"designed_for": "US-Government Impact-Level 5 cloud workloads with single-cloud-tenant deployments",
|
|
2326
|
+
"misses": [
|
|
2327
|
+
"Cross-IL trust patterns (IL5 workload assuming role into IL6 sovereign tenant)",
|
|
2328
|
+
"Federated-trust hygiene with non-FedRAMP IdPs (Okta, Azure AD commercial, third-party SAML providers)",
|
|
2329
|
+
"IL6 sovereign-cloud audience-claim constraints not enumerated in baseline",
|
|
2330
|
+
"IL5-to-commercial-cloud cross-account assume-role chain monitoring",
|
|
2331
|
+
"AI-workload managed-identity token-binding requirements in IL5 baseline"
|
|
2332
|
+
],
|
|
2333
|
+
"real_requirement": "FedRAMP IL5-Federated extension explicitly enumerating cross-IL trust-policy requirements: (1) audience constraints pinned to sovereign-cloud STS endpoints, (2) subject-claim specificity with branch/tag constraints on OIDC federation, (3) cross-account assume-role graph monitoring over rolling 24h windows, (4) managed-identity token TTL ceilings (<= 1h non-CAE, <= 24h with Continuous Access Evaluation), (5) IL6 sovereign-cloud trust patterns enumerated separately.",
|
|
2334
|
+
"status": "open",
|
|
2335
|
+
"opened_date": "2026-05-15",
|
|
2336
|
+
"evidence_cves": [],
|
|
2337
|
+
"atlas_refs": [
|
|
2338
|
+
"AML.T0051"
|
|
2339
|
+
],
|
|
2340
|
+
"attack_refs": [
|
|
2341
|
+
"T1078.004",
|
|
2342
|
+
"T1098.001"
|
|
2343
|
+
]
|
|
2344
|
+
},
|
|
2345
|
+
"CISA-Snowflake-AA24-IdP-Cloud": {
|
|
2346
|
+
"framework": "CISA (US) - Cross-framework advisory",
|
|
2347
|
+
"control_id": "AA24-174A",
|
|
2348
|
+
"control_name": "CISA Snowflake breach advisory - IdP-to-cloud chained-compromise",
|
|
2349
|
+
"designed_for": "CISA-published advisory documenting the Snowflake customer-credential compromise class (June 2024)",
|
|
2350
|
+
"misses": [
|
|
2351
|
+
"No framework currently enumerates cross-system credential-reuse as a distinct control class",
|
|
2352
|
+
"Federated IdP downstream-consumer inventory is not a required attestation in any framework",
|
|
2353
|
+
"Compromise via stolen Okta / Azure AD / Google Workspace credentials reaching both SaaS (Snowflake) and cloud-IAM (AWS / Azure / GCP) is invisible to per-system access reviews",
|
|
2354
|
+
"Infostealer-sourced session tokens are not enumerated as a credential class in ISO A.5.18 access-rights review",
|
|
2355
|
+
"No required control for periodic cross-system credential-reuse mapping across federated IdPs and their downstream consumers"
|
|
2356
|
+
],
|
|
2357
|
+
"real_requirement": "Extension to ISO/IEC 27001:2022 A.5.18, SOC 2 CC6.1, NIST 800-53 AC-2: every federated trust must enumerate downstream-consumer systems with continuous attestation. Cross-system credential-reuse mapping refreshed quarterly. Infostealer-sourced credential detection (commercial threat intel feeds) integrated with IdP audit log. Reference cases: AT&T, Ticketmaster, Santander, Advance Auto Parts, Neiman Marcus, LendingTree, Pure Storage (June 2024).",
|
|
2358
|
+
"status": "open",
|
|
2359
|
+
"opened_date": "2026-05-15",
|
|
2360
|
+
"evidence_cves": [],
|
|
2361
|
+
"atlas_refs": [
|
|
2362
|
+
"AML.T0051"
|
|
2363
|
+
],
|
|
2364
|
+
"attack_refs": [
|
|
2365
|
+
"T1078",
|
|
2366
|
+
"T1078.004"
|
|
2367
|
+
]
|
|
2368
|
+
},
|
|
2369
|
+
"NIST-800-53-AC-2-Cross-Account": {
|
|
2370
|
+
"framework": "NIST 800-53 Rev 5",
|
|
2371
|
+
"control_id": "AC-2",
|
|
2372
|
+
"control_name": "Account Management",
|
|
2373
|
+
"designed_for": "Establish, activate, modify, review, disable, and remove information-system accounts",
|
|
2374
|
+
"misses": [
|
|
2375
|
+
"Cross-account assume-role chains across cloud-provider account boundaries - each link is a valid AC-2-compliant action; the compromise is the chain",
|
|
2376
|
+
"No concept of chain-of-assumptions monitoring over rolling time windows",
|
|
2377
|
+
"External-id enforcement on cross-account trust policies is not enumerated as a sub-control",
|
|
2378
|
+
"Federated-trust subject-claim specificity not enumerated",
|
|
2379
|
+
"Audit cadence (periodic account review) is mismatched to cloud-compromise timeline (hours-to-days)"
|
|
2380
|
+
],
|
|
2381
|
+
"real_requirement": "AC-2 extension with chain-of-assumptions sub-control: continuous monitoring of cross-account / cross-project / cross-management-group role-assumption graphs over rolling 24h windows; external-id mandatory on every cross-account trust; federated-trust subject-claim specificity attested per role; alerting on any chain traversing >= 2 account boundaries with a common source principal within 24h. Anticipated in NIST 800-53 Rev 6 (2027).",
|
|
2382
|
+
"status": "open",
|
|
2383
|
+
"opened_date": "2026-05-15",
|
|
2384
|
+
"evidence_cves": [],
|
|
2385
|
+
"atlas_refs": [
|
|
2386
|
+
"AML.T0051"
|
|
2387
|
+
],
|
|
2388
|
+
"attack_refs": [
|
|
2389
|
+
"T1078.004",
|
|
2390
|
+
"T1098.001"
|
|
2391
|
+
]
|
|
2392
|
+
},
|
|
2393
|
+
"ISO-27017-Cloud-IAM": {
|
|
2394
|
+
"framework": "ISO/IEC 27017:2015",
|
|
2395
|
+
"control_id": "A.9.2.1 (cloud extension) / Annex A cloud-services controls",
|
|
2396
|
+
"control_name": "ISO/IEC 27017 cloud-services security extension to ISO/IEC 27001",
|
|
2397
|
+
"designed_for": "Code of practice for information-security controls for cloud-services use, extending ISO/IEC 27001:2013/2022",
|
|
2398
|
+
"misses": [
|
|
2399
|
+
"Managed-identity token replay against the cloud instance-metadata API not enumerated",
|
|
2400
|
+
"IMDS-version hardening (v1 to v2 transition; hop-limit enforcement; token TTL) not in scope",
|
|
2401
|
+
"Cloud-IAM cross-account assume-role chain monitoring not enumerated",
|
|
2402
|
+
"Federated trust (SAML / OIDC / Workload Identity Federation) hygiene controls not specified",
|
|
2403
|
+
"Bearer-token TTL ceilings for non-human cloud principals not required"
|
|
2404
|
+
],
|
|
2405
|
+
"real_requirement": "ISO/IEC 27017:2027 (anticipated) cloud-IAM hardening: (1) managed-identity token-binding to instance identity where the CSP supports it, (2) IMDS v2-required attestation with hop-limit and token TTL ceilings, (3) cross-account assume-role chain monitoring, (4) federated-trust subject-claim specificity, (5) bearer-token TTL ceilings <= 1h non-CAE / <= 24h with Continuous Access Evaluation.",
|
|
2406
|
+
"status": "open",
|
|
2407
|
+
"opened_date": "2026-05-15",
|
|
2408
|
+
"evidence_cves": [],
|
|
2409
|
+
"atlas_refs": [],
|
|
2410
|
+
"attack_refs": [
|
|
2411
|
+
"T1552.005",
|
|
2412
|
+
"T1078.004"
|
|
2413
|
+
]
|
|
2414
|
+
},
|
|
2415
|
+
"SOC2-CC6-Access-Key-Leak-Public-Repo": {
|
|
2416
|
+
"framework": "AICPA SOC 2 Trust Services Criteria",
|
|
2417
|
+
"control_id": "CC6.1",
|
|
2418
|
+
"control_name": "Logical Access Controls",
|
|
2419
|
+
"designed_for": "Restrict logical access to data and system resources via authentication and authorization mechanisms",
|
|
2420
|
+
"misses": [
|
|
2421
|
+
"Access keys leaked to public code repositories produce fully-authenticated sessions that satisfy CC6.1 evidence",
|
|
2422
|
+
"The leak point (public repository) is outside CC6 scope",
|
|
2423
|
+
"Scraper-bot exploitation timeline (~5 minutes from commit to exploitation) is faster than any CC6 detection cadence",
|
|
2424
|
+
"CC6.1 audit evidence is satisfied by IAM policy review; says nothing about credential exposure on public-code-search surfaces",
|
|
2425
|
+
"Post-rotation provider audit-log review for misuse-window is not required by CC6.1"
|
|
2426
|
+
],
|
|
2427
|
+
"real_requirement": "CC6 sub-criterion requiring continuous monitoring of credential exposure on public-code-search surfaces (GitHub, GitLab, Bitbucket public, npm, PyPI, Docker Hub). Real-time alerting on CreateAccessKey events outside IaC apply windows. Provider audit-log review for misuse-window evidence on every rotation event. Reference: 2024-2025 AWS-key-in-public-repo crypto-mining campaign data (scraper bots monetize within ~5 minutes of public exposure).",
|
|
2428
|
+
"status": "open",
|
|
2429
|
+
"opened_date": "2026-05-15",
|
|
2430
|
+
"evidence_cves": [],
|
|
2431
|
+
"atlas_refs": [],
|
|
2432
|
+
"attack_refs": [
|
|
2433
|
+
"T1078.004",
|
|
2434
|
+
"T1552.005"
|
|
2435
|
+
]
|
|
2436
|
+
},
|
|
2437
|
+
"AWS-Security-Hub-Coverage-Gap": {
|
|
2438
|
+
"framework": "AWS Security Hub Foundational Security Best Practices (also GCP SCC, Azure Defender for Cloud)",
|
|
2439
|
+
"control_id": "Foundational Security Best Practices / equivalent posture-baseline control set",
|
|
2440
|
+
"control_name": "CSP-native posture-tool baseline (cross-provider gap class)",
|
|
2441
|
+
"designed_for": "Configuration-drift detection across CSP-managed resources mapped to baseline standards (CIS / PCI-DSS / NIST 800-53)",
|
|
2442
|
+
"misses": [
|
|
2443
|
+
"Posture tools are coverage-based, not breach-detection - they flag configuration drift, not behavioural compromise",
|
|
2444
|
+
"Cross-account assume-role chain anomalies are not enumerated as findings",
|
|
2445
|
+
"Federated-trust wildcard subject-claim posture not enumerated",
|
|
2446
|
+
"IMDSv1 access events (vs IMDSv1 enablement) not surfaced",
|
|
2447
|
+
"Billing anomalies (crypto-mining signal) outside posture scope entirely",
|
|
2448
|
+
"Audit-log disablement detection is a separate paid feature (GuardDuty / Defender for Cloud), not in baseline posture"
|
|
2449
|
+
],
|
|
2450
|
+
"real_requirement": "SOC 2 CC7.2 sub-criterion requiring that monitoring coverage be measured against a behavioural-indicator inventory (e.g. the cloud-iam-incident playbook detect.indicators), not against posture-tool deployment. NIST 800-53 SI-4 extension requiring behavioural CloudTrail / audit-log analytics over rolling 24h windows. Combined posture + behavioural-analytics deployment with documented coverage mapping.",
|
|
2451
|
+
"status": "open",
|
|
2452
|
+
"opened_date": "2026-05-15",
|
|
2453
|
+
"evidence_cves": [],
|
|
2454
|
+
"atlas_refs": [],
|
|
2455
|
+
"attack_refs": [
|
|
2456
|
+
"T1078.004",
|
|
2457
|
+
"T1098.001",
|
|
2458
|
+
"T1562.008"
|
|
2459
|
+
]
|
|
2460
|
+
},
|
|
2461
|
+
"UK-CAF-B2-Cloud-IAM": {
|
|
2462
|
+
"framework": "UK NCSC CAF (Cyber Assessment Framework) v3.x",
|
|
2463
|
+
"control_id": "B2",
|
|
2464
|
+
"control_name": "Identity and Access Control",
|
|
2465
|
+
"designed_for": "NCSC CAF outcome that access to networks and information systems supporting the essential function is appropriately controlled",
|
|
2466
|
+
"misses": [
|
|
2467
|
+
"Cloud-IAM-specific trust-policy hygiene not enumerated in B2 contributing outcomes",
|
|
2468
|
+
"Cross-account assume-role chain monitoring is not a required B2 evidence",
|
|
2469
|
+
"Federated trust (SAML / OIDC / Workload Identity Federation) hygiene not specified",
|
|
2470
|
+
"Managed-identity token TTL ceilings not enumerated",
|
|
2471
|
+
"IMDS hardening not in scope of B2"
|
|
2472
|
+
],
|
|
2473
|
+
"real_requirement": "UK CAF v4 contributing-outcomes refresh enumerating cloud-IAM-specific trust-policy hygiene: (1) non-wildcard federated subject claims, (2) audience-pinned audience constraints, (3) external-id mandatory on cross-account trusts, (4) bearer-token TTL ceilings on non-human principals, (5) cross-account assume-role graph monitoring over rolling 24h windows.",
|
|
2474
|
+
"status": "open",
|
|
2475
|
+
"opened_date": "2026-05-15",
|
|
2476
|
+
"evidence_cves": [],
|
|
2477
|
+
"atlas_refs": [],
|
|
2478
|
+
"attack_refs": [
|
|
2479
|
+
"T1078.004",
|
|
2480
|
+
"T1098.001"
|
|
2481
|
+
]
|
|
2482
|
+
},
|
|
2483
|
+
"AU-ISM-1546-Cloud-Service-Account": {
|
|
2484
|
+
"framework": "ACSC ISM (Australian Government Information Security Manual)",
|
|
2485
|
+
"control_id": "ISM-1546",
|
|
2486
|
+
"control_name": "Multi-factor authentication for privileged users and remote access",
|
|
2487
|
+
"designed_for": "MFA for AU-government privileged users and remote-access scenarios",
|
|
2488
|
+
"misses": [
|
|
2489
|
+
"Cloud service-account access keys are bearer credentials that bypass human MFA entirely",
|
|
2490
|
+
"IAM-role assume-role chains initiated by service principals never cross the human-MFA gate",
|
|
2491
|
+
"Managed-identity tokens (Azure managed identity, AWS instance profile, GCP service-account default) are scoped to non-human principals",
|
|
2492
|
+
"OIDC federation tokens for CI (GitHub Actions / GitLab / CircleCI) bypass human-MFA - MFA was evaluated at the IdP, not at the cloud",
|
|
2493
|
+
"SAML assertions held by SaaS integrations bypass cloud-IAM MFA"
|
|
2494
|
+
],
|
|
2495
|
+
"real_requirement": "ISM-1546 extension enumerating cloud non-human-principal credential hygiene: (1) bearer-token TTL ceilings (<= 1h non-CAE, <= 24h with Continuous Access Evaluation), (2) audience binding on every federated trust, (3) per-action audit logging on every non-human principal, (4) periodic rotation cadence with documented owner, (5) detection of token replay across source-IP boundaries.",
|
|
2496
|
+
"status": "open",
|
|
2497
|
+
"opened_date": "2026-05-15",
|
|
2498
|
+
"evidence_cves": [],
|
|
2499
|
+
"atlas_refs": [],
|
|
2500
|
+
"attack_refs": [
|
|
2501
|
+
"T1078.004",
|
|
2502
|
+
"T1552.005"
|
|
2503
|
+
]
|
|
2504
|
+
},
|
|
2505
|
+
"OFAC-SDN-Payment-Block": {
|
|
2506
|
+
"framework": "ALL",
|
|
2507
|
+
"control_id": "RANSOMWARE-GAP-001",
|
|
2508
|
+
"control_name": "OFAC SDN sanctions screening as blocking gate on ransomware payment posture",
|
|
2509
|
+
"designed_for": "N/A — sanctions compliance lives in Treasury / Finance regulatory tree (31 CFR 501, OFAC Ransomware Advisory 2021), not in NIST/ISO/SOC 2 incident-response controls. No security framework names the OFAC SDN list check as a control on the payment posture.",
|
|
2510
|
+
"misses": [
|
|
2511
|
+
"No security framework requires pre-rehearsed sanctions-screening workflow as a precondition to ransomware payment decision",
|
|
2512
|
+
"Cross-jurisdiction sanctions lists (EU Reg 2014/833, UK OFSI Consolidated List, AU DFAT, JP MOF Foreign Exchange and Foreign Trade Act) are not enumerated as parallel obligations in any IR framework",
|
|
2513
|
+
"Attribution-evidence package format for sanctions lookup (ransom note IoCs, leak-site URL, crypto-wallet, family fingerprint) is not standardized; counsel-signature workflow is not framework-mandated",
|
|
2514
|
+
"Payment to sanctioned threat actor is a federal-law violation in US (31 CFR 501) but auditors do not test the screening-workflow rehearsal record"
|
|
2515
|
+
],
|
|
2516
|
+
"real_requirement": "Ransomware-specific IR sub-control requiring: (a) pre-rehearsed sanctions-screening workflow with named legal counsel, (b) cross-jurisdiction lookup against US OFAC SDN + EU Reg 2014/833 + UK OFSI + AU DFAT + JP MOF, (c) attribution-evidence package format, (d) counsel-signed attestation with timestamp ordered before any negotiator engagement, (e) annual tabletop exercise that includes a sanctions-match inject under time-pressure.",
|
|
2517
|
+
"status": "open",
|
|
2518
|
+
"opened_date": "2026-05-15",
|
|
2519
|
+
"evidence_cves": [],
|
|
2520
|
+
"atlas_refs": [],
|
|
2521
|
+
"attack_refs": ["T1486"]
|
|
2522
|
+
},
|
|
2523
|
+
"Insurance-Carrier-24h-Notification": {
|
|
2524
|
+
"framework": "ALL",
|
|
2525
|
+
"control_id": "RANSOMWARE-GAP-002",
|
|
2526
|
+
"control_name": "Cyber insurance carrier 24h notification with pre-approval workflow",
|
|
2527
|
+
"designed_for": "N/A — cyber-insurance carrier-policy interaction lives in contract law, not in security framework control text. No security framework names the carrier-notification clock or carrier-pre-approval requirements as a control.",
|
|
2528
|
+
"misses": [
|
|
2529
|
+
"Most cyber-insurance policies post-2021 require 24h initial notification; non-compliance is grounds for policy voiding — yet no security framework treats this as a control",
|
|
2530
|
+
"Carrier-pre-approval requirements for ransom payment, IR firm engagement, and restore-vs-pay decision are not enumerated by any framework",
|
|
2531
|
+
"Carrier panel of approved IR firms is not surfaced as a vendor-management control (SOC 2 CC9.2 covers vendor risk but not carrier-panel composition)",
|
|
2532
|
+
"Sanctions exclusion language in policies (exclusion of payment to OFAC-sanctioned actors) is not cross-walked to incident-response procedure",
|
|
2533
|
+
"Carrier denial post-incident is the dominant economic-exposure failure mode and is preventable, but no framework requires the rehearsal that prevents it"
|
|
2534
|
+
],
|
|
2535
|
+
"real_requirement": "Ransomware-specific IR sub-control + SOC 2 CC9.2 sub-criterion requiring: (a) cyber insurance policy clause-by-clause review with broker, (b) carrier panel of approved IR firms identified and retained IR firm verified on-panel, (c) pre-approval workflow rehearsed with broker not just present in policy text, (d) 24h notification clock workflow exercised end-to-end with loss-notice form + carrier-reachable channel + broker after-hours contact, (e) annual tabletop with carrier-notification as an exercise inject.",
|
|
2536
|
+
"status": "open",
|
|
2537
|
+
"opened_date": "2026-05-15",
|
|
2538
|
+
"evidence_cves": [],
|
|
2539
|
+
"atlas_refs": [],
|
|
2540
|
+
"attack_refs": ["T1486"]
|
|
2541
|
+
},
|
|
2542
|
+
"EU-Sanctions-Reg-2014-833-Cyber": {
|
|
2543
|
+
"framework": "EU",
|
|
2544
|
+
"control_id": "RANSOMWARE-GAP-003",
|
|
2545
|
+
"control_name": "EU Council Regulation 2014/833 — Cyber Sanctions screening on ransomware payment posture",
|
|
2546
|
+
"designed_for": "Council Regulation (EU) 2014/833 — EU consolidated cyber sanctions framework. Establishes cyber-specific listings for autonomous EU sanctions against threat actors attributed to cyber attacks affecting EU member states.",
|
|
2547
|
+
"misses": [
|
|
2548
|
+
"Lives in EU sanctions regulatory tree, not in NIS2 Art.23 or DORA Art.19 control text; the cross-walk is the operator's responsibility",
|
|
2549
|
+
"NIS2 24h significant-incident notification and DORA 4h major-ICT-incident notification do not enumerate EU 2014/833 sanctions screening as a precondition to payment posture",
|
|
2550
|
+
"EU consolidated sanctions list lookup is not pre-integrated into IR playbook tooling at most enterprises",
|
|
2551
|
+
"EU-jurisdiction-specific counsel-signature requirements are not standardized"
|
|
2552
|
+
],
|
|
2553
|
+
"real_requirement": "NIS2 + DORA + national-level incident-response procedure extension requiring EU Reg 2014/833 cyber sanctions screening as a precondition to ransomware payment posture; counsel-signed attestation with timestamp; integration with parallel OFAC + UK + AU + JP lookups.",
|
|
2554
|
+
"status": "open",
|
|
2555
|
+
"opened_date": "2026-05-15",
|
|
2556
|
+
"evidence_cves": [],
|
|
2557
|
+
"atlas_refs": [],
|
|
2558
|
+
"attack_refs": ["T1486"]
|
|
2559
|
+
},
|
|
2560
|
+
"Immutable-Backup-Recovery": {
|
|
2561
|
+
"framework": "ALL",
|
|
2562
|
+
"control_id": "RANSOMWARE-GAP-004",
|
|
2563
|
+
"control_name": "Immutable backup as distinct sub-property of backup control (vs replication / write-protect / off-network)",
|
|
2564
|
+
"designed_for": "N/A — security frameworks generally require 'backup' as a single control class without distinguishing immutability from replication. NIST CP-9, ISO A.8.13, AU E8 Strategy 8, SOC 2 A1.2 all name backup but treat it as a single property.",
|
|
2565
|
+
"misses": [
|
|
2566
|
+
"'Off-network' (AU E8 ML2 maturity gate) is not immutability — replication targets accessible via the same compromised admin credential as production fail the ransomware blast-radius test without failing E8 Backup compliance",
|
|
2567
|
+
"Storage-side compliance-lock (S3 Object Lock compliance-retention, Azure immutable blob with legal hold, Veeam Hardened Repository) vs governance-retention (admin-overrideable) is not distinguished in framework text",
|
|
2568
|
+
"Versioning and write-protect labels are routinely marketed as 'immutable' but are bypassable with admin credential — frameworks accept marketing-label evidence",
|
|
2569
|
+
"No framework requires a production-admin-credential adversary-simulation test of the immutability property",
|
|
2570
|
+
"Recovery-from-backup tabletop exercises are present (ISO 27031, AU E8 Backup ML3) but the exercises do not test immutability end-to-end"
|
|
2571
|
+
],
|
|
2572
|
+
"real_requirement": "Backup-control sub-property distinguishing: (a) immutable backup = compliance-lock storage policy with admin-separation and no root override, (b) replicated backup = off-site copy but admin-credential-deletable, (c) write-protected backup = storage-side enforcement but admin-policy-modifiable, (d) off-network backup = air-gapped retrieval but possibly mutable on retrieval. Annual end-to-end test using production-admin-credential adversary simulation to confirm the immutability property holds.",
|
|
2573
|
+
"status": "open",
|
|
2574
|
+
"opened_date": "2026-05-15",
|
|
2575
|
+
"evidence_cves": [],
|
|
2576
|
+
"atlas_refs": [],
|
|
2577
|
+
"attack_refs": ["T1486"]
|
|
2578
|
+
},
|
|
2579
|
+
"Decryptor-Availability-Pre-Decision": {
|
|
2580
|
+
"framework": "ALL",
|
|
2581
|
+
"control_id": "RANSOMWARE-GAP-005",
|
|
2582
|
+
"control_name": "Decryptor availability lookup as precondition to ransomware pay/restore decision",
|
|
2583
|
+
"designed_for": "N/A — no security framework requires decryptor availability lookup against No More Ransom Project or vendor-specific decryptor catalogs before payment decision. NIST IR-4, ISO A.5.26, SOC 2 CC7.4 incident-response controls are method-neutral.",
|
|
2584
|
+
"misses": [
|
|
2585
|
+
"No framework requires the pay/restore decision to be informed by a decryptor-availability lookup result",
|
|
2586
|
+
"No More Ransom Project Crypto Sheriff + Emsisoft + Kaspersky NoMoreCry + Bitdefender + Avast decryptor catalogs are not pre-integrated into IR playbook tooling at most enterprises",
|
|
2587
|
+
"Decryptor known-failure-mode documentation (Conti / LockBit / ALPHV partial-decryption rates from Coveware quarterly reports) is not surfaced as decision input",
|
|
2588
|
+
"Operation Cronos (Feb 2024) LockBit decryptor + similar law-enforcement decryptor drops are not auto-integrated into IR posture",
|
|
2589
|
+
"Decryptor reliability is treated as binary (works / doesn't work) when the operational reality is partial decryption with ~35% failure rate for paid victims (Coveware 2023-2026)"
|
|
2590
|
+
],
|
|
2591
|
+
"real_requirement": "Ransomware-specific IR sub-control requiring: (a) curated decryptor catalog integrated into IR playbook (No More Ransom + Emsisoft + Kaspersky NoMoreCry + Bitdefender + Avast + law-enforcement releases), (b) decryptor-availability lookup executed and recorded with timestamp before pay/restore decision, (c) decryptor known-failure-mode review as decision input, (d) periodic catalog refresh (quarterly) and integration with threat-intel feed.",
|
|
2592
|
+
"status": "open",
|
|
2593
|
+
"opened_date": "2026-05-15",
|
|
2594
|
+
"evidence_cves": [],
|
|
2595
|
+
"atlas_refs": [],
|
|
2596
|
+
"attack_refs": ["T1486"]
|
|
2597
|
+
},
|
|
2598
|
+
"PHI-Exfil-Before-Encrypt-Breach-Class": {
|
|
2599
|
+
"framework": "ALL",
|
|
2600
|
+
"control_id": "RANSOMWARE-GAP-006",
|
|
2601
|
+
"control_name": "PHI / personal-data exfiltration before encryption as distinct breach class from the encryption event",
|
|
2602
|
+
"designed_for": "HIPAA Breach Notification Rule 45 CFR 164.400-414; GDPR Art.33/34; state breach laws (CCPA Sec.1798.82, NY SHIELD Act, etc.); AU NDB scheme; UK GDPR. These statutes trigger on the breach event regardless of encryption status.",
|
|
2603
|
+
"misses": [
|
|
2604
|
+
"HIPAA 164.308(a)(7) Contingency Plan rule is recovery-shaped; treats the encryption event as the trigger and does not naturally surface exfil-before-encrypt as a parallel obligation under 164.402",
|
|
2605
|
+
"GDPR Art.33/34 trigger on personal-data breach but the 72h clock interaction with ransomware encryption is not enumerated in security framework controls",
|
|
2606
|
+
"Coveware Q1 2026 reports >82% of named-ransomware incidents include exfiltration — the dominant pattern, yet frameworks treat ransomware as a single 'availability' incident class",
|
|
2607
|
+
"State breach laws (CCPA, NY SHIELD, MA 201 CMR 17, IL PIPA, etc.) trigger on exfiltration regardless of encryption recovery — the parallel state-AG notification matrix is not framework-mandated",
|
|
2608
|
+
"HIPAA Security Rule NPRM (late 2024 → final rule expected 2026) may close part of this gap; UK GDPR + AU NDB equivalents are not on similar revision schedule"
|
|
2609
|
+
],
|
|
2610
|
+
"real_requirement": "Ransomware-specific IR sub-control + HIPAA 164.308(a)(7) extension requiring: (a) exfil-before-encrypt detection (24-72h egress profile preceding encryption event) integrated into IR playbook, (b) exfil-scope determination as parallel obligation independent of encryption-recovery status, (c) HIPAA 164.402 breach risk assessment triggered on exfil event, (d) GDPR Art.33/34 + state breach law + UK GDPR + AU NDB parallel-clock matrix as framework-mandated output, (e) tabletop exercise inject covering exfil-before-encrypt scope determination under time-pressure.",
|
|
2611
|
+
"status": "open",
|
|
2612
|
+
"opened_date": "2026-05-15",
|
|
2613
|
+
"evidence_cves": [],
|
|
2614
|
+
"atlas_refs": [],
|
|
2615
|
+
"attack_refs": ["T1486", "T1567"]
|
|
2129
2616
|
}
|
|
2130
2617
|
}
|