@blamejs/exceptd-skills 0.12.27 → 0.12.29
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/AGENTS.md +4 -1
- package/CHANGELOG.md +54 -0
- package/bin/exceptd.js +30 -20
- package/data/_indexes/_meta.json +26 -23
- package/data/_indexes/activity-feed.json +32 -11
- package/data/_indexes/catalog-summaries.json +3 -3
- package/data/_indexes/chains.json +965 -35
- package/data/_indexes/currency.json +68 -41
- package/data/_indexes/frequency.json +428 -124
- package/data/_indexes/handoff-dag.json +70 -19
- package/data/_indexes/jurisdiction-map.json +37 -12
- package/data/_indexes/section-offsets.json +282 -0
- package/data/_indexes/stale-content.json +3 -3
- package/data/_indexes/summary-cards.json +198 -0
- package/data/_indexes/token-budget.json +168 -3
- package/data/_indexes/trigger-table.json +190 -0
- package/data/_indexes/xref.json +145 -2
- package/data/atlas-ttps.json +61 -111
- package/data/attack-techniques.json +104 -19
- package/data/cve-catalog.json +101 -45
- package/data/cwe-catalog.json +149 -94
- package/data/d3fend-catalog.json +199 -53
- package/data/framework-control-gaps.json +1679 -89
- package/data/playbooks/cloud-iam-incident.json +1351 -0
- package/data/playbooks/crypto-codebase.json +1 -1
- package/data/playbooks/idp-incident.json +1259 -0
- package/data/playbooks/ransomware.json +1407 -0
- package/data/rfc-references.json +58 -59
- package/lib/exit-codes.js +2 -0
- package/lib/playbook-runner.js +25 -1
- package/manifest-snapshot.json +220 -3
- package/manifest-snapshot.sha256 +1 -1
- package/manifest.json +287 -45
- package/package.json +3 -2
- package/sbom.cdx.json +1854 -11
- package/scripts/backfill-theater-test.js +806 -0
- package/scripts/refresh-reverse-refs.js +171 -0
- package/scripts/refresh-sbom.js +155 -8
- package/skills/cloud-iam-incident/skill.md +419 -0
- package/skills/idp-incident-response/skill.md +352 -0
- package/skills/ransomware-response/skill.md +374 -0
|
@@ -36,7 +36,17 @@
|
|
|
36
36
|
"AML.T0018",
|
|
37
37
|
"AML.T0020"
|
|
38
38
|
],
|
|
39
|
-
"attack_refs": []
|
|
39
|
+
"attack_refs": [],
|
|
40
|
+
"theater_test": {
|
|
41
|
+
"claim": "We monitor our AI providers for security and treat model updates like any other vendor change.",
|
|
42
|
+
"test": "Pull the change-control register for the last 4 quarters; filter for entries where the affected asset is an externally hosted LLM, embedding model, or AI provider API. Count how many record (a) the model version pinned at the time, (b) a behavioural regression suite executed against the new version, and (c) the provider changelog reviewed with sign-off. Theater verdict if fewer than 90% of provider-side model updates produced an in-scope change-control entry, or if any sampled entry lacks a regression-suite artifact.",
|
|
43
|
+
"evidence_required": [
|
|
44
|
+
"change-control register CSV export filtered to AI/ML assets",
|
|
45
|
+
"behavioural regression test results bundle keyed to provider model versions",
|
|
46
|
+
"provider changelog review log with reviewer identity + timestamp"
|
|
47
|
+
],
|
|
48
|
+
"verdict_when_failed": "compliance-theater"
|
|
49
|
+
}
|
|
40
50
|
},
|
|
41
51
|
"ALL-MCP-TOOL-TRUST": {
|
|
42
52
|
"framework": "ALL",
|
|
@@ -60,7 +70,17 @@
|
|
|
60
70
|
],
|
|
61
71
|
"attack_refs": [
|
|
62
72
|
"T1195.001"
|
|
63
|
-
]
|
|
73
|
+
],
|
|
74
|
+
"theater_test": {
|
|
75
|
+
"claim": "Developer tooling is governed; AI plugins are no different from any other dev dependency.",
|
|
76
|
+
"test": "Scan every developer endpoint and CI runner for installed MCP server manifests (.claude/, .cursor/, .vscode/, ~/.codeium/, etc.). For each discovered MCP server, attempt to verify a publisher signature, locate it in an organisational allowlist, and trace its tool-grant prompt history. Theater verdict if any endpoint has an MCP server that is unsigned, absent from the allowlist, or has tool grants that bypassed user prompting.",
|
|
77
|
+
"evidence_required": [
|
|
78
|
+
"endpoint-scan output enumerating MCP server manifests with hashes",
|
|
79
|
+
"organisational MCP allowlist (or evidence one does not exist)",
|
|
80
|
+
"tool-grant audit log for one randomly selected developer over 30 days"
|
|
81
|
+
],
|
|
82
|
+
"verdict_when_failed": "compliance-theater"
|
|
83
|
+
}
|
|
64
84
|
},
|
|
65
85
|
"ALL-PROMPT-INJECTION-ACCESS-CONTROL": {
|
|
66
86
|
"framework": "ALL",
|
|
@@ -84,7 +104,17 @@
|
|
|
84
104
|
],
|
|
85
105
|
"attack_refs": [
|
|
86
106
|
"T1059"
|
|
87
|
-
]
|
|
107
|
+
],
|
|
108
|
+
"theater_test": {
|
|
109
|
+
"claim": "Our IAM controls cover all actions taken in our environment, including those by AI agents.",
|
|
110
|
+
"test": "Review the audit log for the past 30 days of any AI-agent service account. Sample 10 actions taken by the agent; for each, identify whether the action was the result of (a) an end-user request that the agent fulfilled within scope, or (b) content from a third-party data source (web page, document, RAG corpus) that influenced the action. Theater verdict if any sampled action originated from third-party content without per-action user re-authorization, or if the audit log does not preserve the prompt input chain for forensic reconstruction.",
|
|
111
|
+
"evidence_required": [
|
|
112
|
+
"AI agent service account audit log 30d",
|
|
113
|
+
"prompt input chain (system prompt + user prompt + tool results) for sampled actions",
|
|
114
|
+
"policy text defining prompt-level scope for each agent role"
|
|
115
|
+
],
|
|
116
|
+
"verdict_when_failed": "compliance-theater"
|
|
117
|
+
}
|
|
88
118
|
},
|
|
89
119
|
"AU-Essential-8-App-Hardening": {
|
|
90
120
|
"framework": "ASD Essential Eight (AU)",
|
|
@@ -110,7 +140,17 @@
|
|
|
110
140
|
"attack_refs": [
|
|
111
141
|
"T1059",
|
|
112
142
|
"T1204"
|
|
113
|
-
]
|
|
143
|
+
],
|
|
144
|
+
"theater_test": {
|
|
145
|
+
"claim": "We hardened user applications per Essential Eight Maturity Level 2; browsers and Office are locked down.",
|
|
146
|
+
"test": "Take the operator's hardened-application list. Confirm whether it enumerates AI coding assistants (Copilot, Cursor, Claude Code, Windsurf), MCP servers, and AI-tool config files (.claude/settings.json, .cursor/mcp.json, .vscode/settings.json:chat.tools.autoApprove) as in-scope. Pick a developer endpoint at random; verify those config files are integrity-monitored with the same alerting profile as security-sensitive files. Theater verdict if AI assistants are absent from the hardened-application list or if a config-file modification on the sampled endpoint would not generate an integrity alert.",
|
|
147
|
+
"evidence_required": [
|
|
148
|
+
"hardened-application policy document with version date",
|
|
149
|
+
"FIM/HIDS configuration showing watch list",
|
|
150
|
+
"test-induced modification on a non-production endpoint to confirm alert fires"
|
|
151
|
+
],
|
|
152
|
+
"verdict_when_failed": "compliance-theater"
|
|
153
|
+
}
|
|
114
154
|
},
|
|
115
155
|
"AU-Essential-8-Backup": {
|
|
116
156
|
"framework": "ASD Essential Eight (AU)",
|
|
@@ -133,7 +173,17 @@
|
|
|
133
173
|
"AML.T0020",
|
|
134
174
|
"AML.T0048"
|
|
135
175
|
],
|
|
136
|
-
"attack_refs": []
|
|
176
|
+
"attack_refs": [],
|
|
177
|
+
"theater_test": {
|
|
178
|
+
"claim": "Daily backups with off-network retention satisfy Essential Eight Maturity Level 2 Strategy 8.",
|
|
179
|
+
"test": "From the latest backup catalogue, confirm presence of fine-tuned model weights, RAG corpora, and AI tool configuration files (.claude/settings.json, MCP server registry). Restore one RAG corpus to an isolated environment; per-document-hash compare to current production. Theater verdict if AI artefacts are absent from the catalogue, or if any document hash diverges from production without a documented authoring event explaining the divergence.",
|
|
180
|
+
"evidence_required": [
|
|
181
|
+
"backup catalogue manifest",
|
|
182
|
+
"test-restore log for one RAG corpus",
|
|
183
|
+
"per-document hash diff between restored and production corpus"
|
|
184
|
+
],
|
|
185
|
+
"verdict_when_failed": "compliance-theater"
|
|
186
|
+
}
|
|
137
187
|
},
|
|
138
188
|
"AU-Essential-8-MFA": {
|
|
139
189
|
"framework": "ASD Essential Eight (AU)",
|
|
@@ -155,7 +205,17 @@
|
|
|
155
205
|
"attack_refs": [
|
|
156
206
|
"T1078",
|
|
157
207
|
"T1556"
|
|
158
|
-
]
|
|
208
|
+
],
|
|
209
|
+
"theater_test": {
|
|
210
|
+
"claim": "MFA is enforced on all administrative identities per Essential Eight ML2 with phishing-resistant factors.",
|
|
211
|
+
"test": "Sample 10 admin identities; for each, confirm the registered authenticator class is FIDO2/WebAuthn-bound (not SMS, voice, or TOTP). Then enumerate AI-provider service credentials (OpenAI, Anthropic, HuggingFace API tokens) used by the same admin scope; check token age and rotation policy. Theater verdict if any sampled human admin uses SMS/voice, or if any AI-provider credential has no rotation policy or is older than 90 days.",
|
|
212
|
+
"evidence_required": [
|
|
213
|
+
"IdP authenticator export for sampled admins",
|
|
214
|
+
"AI-provider credential inventory with creation/rotation timestamps",
|
|
215
|
+
"documented credential rotation policy"
|
|
216
|
+
],
|
|
217
|
+
"verdict_when_failed": "compliance-theater"
|
|
218
|
+
}
|
|
159
219
|
},
|
|
160
220
|
"AU-Essential-8-Patch": {
|
|
161
221
|
"framework": "ASD Essential Eight (AU)",
|
|
@@ -178,7 +238,17 @@
|
|
|
178
238
|
"atlas_refs": [],
|
|
179
239
|
"attack_refs": [
|
|
180
240
|
"T1068"
|
|
181
|
-
]
|
|
241
|
+
],
|
|
242
|
+
"theater_test": {
|
|
243
|
+
"claim": "We patch operating systems within the Essential Eight ML3 48-hour window for critical exploits.",
|
|
244
|
+
"test": "Pull the last 5 CISA KEV listings affecting an OS in scope. For each, measure elapsed time from KEV listing date to deployed-on-fleet-percentage >=95%. For one host that cannot accept a reboot in the window, confirm a live-patching capability is provisioned and was used. Theater verdict if any sampled KEV listing exceeded 48h to 95% fleet coverage, or if any 'cannot reboot' host lacks a live-patching pathway.",
|
|
245
|
+
"evidence_required": [
|
|
246
|
+
"patch-deployment telemetry timestamped against KEV listing dates",
|
|
247
|
+
"live-patch agent inventory with last-applied-patch evidence",
|
|
248
|
+
"fleet coverage rollup per CVE"
|
|
249
|
+
],
|
|
250
|
+
"verdict_when_failed": "compliance-theater"
|
|
251
|
+
}
|
|
182
252
|
},
|
|
183
253
|
"CIS-Controls-v8-Control7": {
|
|
184
254
|
"framework": "CIS Controls v8",
|
|
@@ -200,7 +270,17 @@
|
|
|
200
270
|
"atlas_refs": [],
|
|
201
271
|
"attack_refs": [
|
|
202
272
|
"T1068"
|
|
203
|
-
]
|
|
273
|
+
],
|
|
274
|
+
"theater_test": {
|
|
275
|
+
"claim": "We meet CIS Control 7 IG3 by remediating critical vulnerabilities within one month.",
|
|
276
|
+
"test": "Pull the vulnerability register for the past 12 months. Filter for CVEs that appeared on CISA KEV with public PoC during the period. For each, measure (a) time from KEV listing to verified mitigation, and (b) whether the mitigation was a live patch, configuration change, or isolation. Theater verdict if any KEV+PoC entry exceeded 4h to verified mitigation or if 'monthly cadence' was applied to a KEV-listed CVE.",
|
|
277
|
+
"evidence_required": [
|
|
278
|
+
"vuln-management register CSV export with timestamped state transitions",
|
|
279
|
+
"KEV listing dates per CVE",
|
|
280
|
+
"mitigation evidence (patch deployment log, config change ticket, isolation network ACL)"
|
|
281
|
+
],
|
|
282
|
+
"verdict_when_failed": "compliance-theater"
|
|
283
|
+
}
|
|
204
284
|
},
|
|
205
285
|
"CMMC-2.0-Level-2": {
|
|
206
286
|
"framework": "CMMC 2.0 (Cybersecurity Maturity Model Certification) Level 2",
|
|
@@ -230,7 +310,17 @@
|
|
|
230
310
|
"T1195.001",
|
|
231
311
|
"T1071",
|
|
232
312
|
"T1059"
|
|
233
|
-
]
|
|
313
|
+
],
|
|
314
|
+
"theater_test": {
|
|
315
|
+
"claim": "We are CMMC Level 2 attested across all 110 NIST 800-171 controls; CUI is protected end-to-end.",
|
|
316
|
+
"test": "Walk the 3.4.1 (CM) asset inventory and check for AI assistants and MCP servers with CUI-adjacent access. Then inspect 3.13 system-and-communications protections to confirm AI-API egress is enumerated as a CUI exfiltration channel with monitoring. Theater verdict if AI assistants are absent from the asset inventory, or if AI-API egress at the CUI boundary has no monitoring rule, or if cross-walks to UK DEF STAN / AU DISP for joint programmes are missing.",
|
|
317
|
+
"evidence_required": [
|
|
318
|
+
"3.4.1 asset inventory export filtered to AI/ML and MCP entries",
|
|
319
|
+
"egress monitoring rule export for AI-API destinations",
|
|
320
|
+
"cross-walk document for joint programmes (if any)"
|
|
321
|
+
],
|
|
322
|
+
"verdict_when_failed": "compliance-theater"
|
|
323
|
+
}
|
|
234
324
|
},
|
|
235
325
|
"CWE-Top-25-2024-meta": {
|
|
236
326
|
"framework": "CWE Top 25 Most Dangerous Software Weaknesses (2024 list)",
|
|
@@ -256,7 +346,17 @@
|
|
|
256
346
|
],
|
|
257
347
|
"attack_refs": [
|
|
258
348
|
"T1059"
|
|
259
|
-
]
|
|
349
|
+
],
|
|
350
|
+
"theater_test": {
|
|
351
|
+
"claim": "Our SAST/DAST coverage maps to the CWE Top 25; we test for the most dangerous weaknesses.",
|
|
352
|
+
"test": "Pull the SAST/DAST rule pack and enumerate which CWE IDs each rule targets. Confirm rules exist for AI-specific CWE classes (CWE-1039 model integrity, CWE-1395 dependency on vulnerable third-party component, prompt-injection class CWEs). Run the rule pack against a known-vulnerable test fixture containing prompt-injection patterns. Theater verdict if AI-relevant CWE IDs are absent from the rule pack, or if the fixture run produces zero findings on the planted prompt-injection.",
|
|
353
|
+
"evidence_required": [
|
|
354
|
+
"SAST/DAST rule-to-CWE mapping export",
|
|
355
|
+
"test fixture with planted prompt-injection patterns",
|
|
356
|
+
"scan report against the fixture"
|
|
357
|
+
],
|
|
358
|
+
"verdict_when_failed": "compliance-theater"
|
|
359
|
+
}
|
|
260
360
|
},
|
|
261
361
|
"CycloneDX-v1.6-SBOM": {
|
|
262
362
|
"framework": "CycloneDX v1.6 (OWASP SBOM standard)",
|
|
@@ -282,7 +382,17 @@
|
|
|
282
382
|
],
|
|
283
383
|
"attack_refs": [
|
|
284
384
|
"T1195.001"
|
|
285
|
-
]
|
|
385
|
+
],
|
|
386
|
+
"theater_test": {
|
|
387
|
+
"claim": "We ship a CycloneDX 1.6 SBOM with every release; supply-chain transparency is satisfied.",
|
|
388
|
+
"test": "Pull the SBOM for the most recent release. Confirm presence of an `mlComponent` (or equivalent ML-BOM) section enumerating model + adapters + tokenizer. Check provenance fields (signature, supplier, training data source) for empty values. Confirm MCP servers in the build environment are reflected. Theater verdict if ML components are absent, or if more than 20% of components have an empty provenance field.",
|
|
389
|
+
"evidence_required": [
|
|
390
|
+
"latest CycloneDX 1.6 SBOM JSON",
|
|
391
|
+
"ML-BOM section specifically",
|
|
392
|
+
"MCP server manifest from build environment"
|
|
393
|
+
],
|
|
394
|
+
"verdict_when_failed": "compliance-theater"
|
|
395
|
+
}
|
|
286
396
|
},
|
|
287
397
|
"DORA-Art28": {
|
|
288
398
|
"framework": "EU DORA (Regulation 2022/2554)",
|
|
@@ -306,7 +416,17 @@
|
|
|
306
416
|
],
|
|
307
417
|
"attack_refs": [
|
|
308
418
|
"T1195.002"
|
|
309
|
-
]
|
|
419
|
+
],
|
|
420
|
+
"theater_test": {
|
|
421
|
+
"claim": "Our DORA Art. 28 ICT third-party register covers all critical or important function dependencies.",
|
|
422
|
+
"test": "From the Art. 28 register, sample 5 third-party ICT services consumed in CIF (critical or important function) flows. For each, verify presence of build-provenance metadata (SLSA producer identifier, workflow file hash, cache key surface). Check for monthly producer-side cache verification evidence. Theater verdict if any sampled CIF dependency lacks build-provenance metadata, or if cache verification has not run in the last 90 days.",
|
|
423
|
+
"evidence_required": [
|
|
424
|
+
"Art. 28 register export with provenance fields",
|
|
425
|
+
"monthly cache-verification job logs",
|
|
426
|
+
"SLSA attestations from sampled producers"
|
|
427
|
+
],
|
|
428
|
+
"verdict_when_failed": "compliance-theater"
|
|
429
|
+
}
|
|
310
430
|
},
|
|
311
431
|
"DORA-RTS-Subcontracting": {
|
|
312
432
|
"framework": "EU DORA (Regulation 2022/2554) — RTS on subcontracting of ICT services supporting critical or important functions",
|
|
@@ -331,7 +451,17 @@
|
|
|
331
451
|
"attack_refs": [
|
|
332
452
|
"T1195.001",
|
|
333
453
|
"T1195.002"
|
|
334
|
-
]
|
|
454
|
+
],
|
|
455
|
+
"theater_test": {
|
|
456
|
+
"claim": "Our DORA RTS subcontracting register lists every sub-processor for ICT services supporting CIF.",
|
|
457
|
+
"test": "Pull the subcontracting register. Confirm enumeration of AI sub-processors per ICT service line: model providers, embedding providers, vector stores, RAG corpus hosts, MCP server providers. Compute foundation-model concentration (% of CIF flows that share a single foundation model). Theater verdict if AI sub-processors are absent from any service line that consumes AI, or if foundation-model concentration is undocumented.",
|
|
458
|
+
"evidence_required": [
|
|
459
|
+
"subcontracting register export with AI sub-processor entries",
|
|
460
|
+
"foundation-model concentration analysis report",
|
|
461
|
+
"exit-strategy evidence per critical AI sub-processor"
|
|
462
|
+
],
|
|
463
|
+
"verdict_when_failed": "compliance-theater"
|
|
464
|
+
}
|
|
335
465
|
},
|
|
336
466
|
"DORA-ITS-TLPT": {
|
|
337
467
|
"framework": "EU DORA (Regulation 2022/2554) — ITS on threat-led penetration testing under Art. 26",
|
|
@@ -359,7 +489,17 @@
|
|
|
359
489
|
"attack_refs": [
|
|
360
490
|
"T1195.001",
|
|
361
491
|
"T1059"
|
|
362
|
-
]
|
|
492
|
+
],
|
|
493
|
+
"theater_test": {
|
|
494
|
+
"claim": "Our most recent threat-led penetration test under DORA Art. 26 covered the full CIF estate.",
|
|
495
|
+
"test": "Pull the TLPT scoping template and final report. Confirm AI/MCP assets are enumerated in scope. Verify the threat-intel inputs cite ATLAS TTPs and AI-discovered CVE classes. Confirm the TLPT team includes documented AI/MCP competency. Inspect the report for at least one finding originating from an AI/MCP attack path. Theater verdict if the scoping template excludes AI/MCP assets despite their presence in CIF flows, or if the team lacks documented AI competency.",
|
|
496
|
+
"evidence_required": [
|
|
497
|
+
"TLPT scoping template",
|
|
498
|
+
"TLPT final report with AI/MCP findings section",
|
|
499
|
+
"TLPT team CVs covering AI/MCP red-team experience"
|
|
500
|
+
],
|
|
501
|
+
"verdict_when_failed": "compliance-theater"
|
|
502
|
+
}
|
|
363
503
|
},
|
|
364
504
|
"DORA-RTS-Incident-Classification": {
|
|
365
505
|
"framework": "EU DORA (Regulation 2022/2554) — RTS on classification of major ICT-related incidents under Art. 18(3)",
|
|
@@ -385,7 +525,17 @@
|
|
|
385
525
|
],
|
|
386
526
|
"attack_refs": [
|
|
387
527
|
"T1059"
|
|
388
|
-
]
|
|
528
|
+
],
|
|
529
|
+
"theater_test": {
|
|
530
|
+
"claim": "Our incident-classification process implements the DORA RTS criteria for major ICT incidents.",
|
|
531
|
+
"test": "Pull the incident register for the last 12 months. For each major-classified incident, confirm presence of qualitative criteria evaluation. Then ask whether AI-incident classes (model invocations on injected intent, RAG corpus integrity loss, agent actions outside scope) would surface a major classification under the current criteria. Theater verdict if AI-class quantitative measures are absent, or if a synthetic AI-incident scenario evaluated against current criteria fails to trigger major classification when impact warrants it.",
|
|
532
|
+
"evidence_required": [
|
|
533
|
+
"incident register CSV with classification rationale per entry",
|
|
534
|
+
"RTS criteria mapping document",
|
|
535
|
+
"synthetic AI-incident classification dry-run record"
|
|
536
|
+
],
|
|
537
|
+
"verdict_when_failed": "compliance-theater"
|
|
538
|
+
}
|
|
389
539
|
},
|
|
390
540
|
"DORA-IA-CTPP-Oversight": {
|
|
391
541
|
"framework": "EU DORA (Regulation 2022/2554) — Implementing Acts for critical-third-party-provider (CTPP) oversight under Art. 31-44",
|
|
@@ -408,7 +558,17 @@
|
|
|
408
558
|
],
|
|
409
559
|
"attack_refs": [
|
|
410
560
|
"T1195.001"
|
|
411
|
-
]
|
|
561
|
+
],
|
|
562
|
+
"theater_test": {
|
|
563
|
+
"claim": "We track designated critical third-party providers (CTPPs) per DORA Art. 31-44.",
|
|
564
|
+
"test": "Pull the CTPP designation list. Confirm whether frontier-AI providers and MCP/agent-runtime providers consumed by the entity appear or have a documented evaluation against designation criteria. Check Lead Overseer audit deliverables for AI-specific artefacts (model cards, system cards, eval results, training data manifests). Theater verdict if AI providers consumed at scale are absent without an evaluation record, or if Lead Overseer artefacts lack AI-specific content.",
|
|
565
|
+
"evidence_required": [
|
|
566
|
+
"CTPP designation list with evaluation rationale",
|
|
567
|
+
"Lead Overseer engagement record with deliverable list",
|
|
568
|
+
"AI-provider concentration analysis"
|
|
569
|
+
],
|
|
570
|
+
"verdict_when_failed": "compliance-theater"
|
|
571
|
+
}
|
|
412
572
|
},
|
|
413
573
|
"EU-AI-Act-Art-15": {
|
|
414
574
|
"framework": "EU Artificial Intelligence Act (2024/1689)",
|
|
@@ -434,7 +594,17 @@
|
|
|
434
594
|
"AML.T0054",
|
|
435
595
|
"AML.T0057"
|
|
436
596
|
],
|
|
437
|
-
"attack_refs": []
|
|
597
|
+
"attack_refs": [],
|
|
598
|
+
"theater_test": {
|
|
599
|
+
"claim": "Our high-risk AI system meets the EU AI Act Art. 15 'appropriate level of cybersecurity'.",
|
|
600
|
+
"test": "Request the cybersecurity test pack. Confirm presence of (a) prompt-injection red-team results bound to OWASP LLM Top 10, (b) RAG-corpus integrity test results, (c) model-extraction-resistance assessment, (d) MCP/plugin trust verification log. Then check incident-reporting bridge to NIS2 + DORA. Theater verdict if any of (a)-(d) are absent or older than 12 months, or if the bridge to NIS2/DORA notification clocks is undocumented.",
|
|
601
|
+
"evidence_required": [
|
|
602
|
+
"adversarial test pack covering OWASP LLM Top 10",
|
|
603
|
+
"RAG corpus integrity test report",
|
|
604
|
+
"incident-reporting playbook with NIS2/DORA bridge"
|
|
605
|
+
],
|
|
606
|
+
"verdict_when_failed": "compliance-theater"
|
|
607
|
+
}
|
|
438
608
|
},
|
|
439
609
|
"EU-AI-Act-Art-53-GPAI": {
|
|
440
610
|
"framework": "EU Artificial Intelligence Act (2024/1689) — General-Purpose AI provider obligations",
|
|
@@ -456,7 +626,17 @@
|
|
|
456
626
|
"AML.T0018",
|
|
457
627
|
"AML.T0020"
|
|
458
628
|
],
|
|
459
|
-
"attack_refs": []
|
|
629
|
+
"attack_refs": [],
|
|
630
|
+
"theater_test": {
|
|
631
|
+
"claim": "We comply with EU AI Act Art. 53 GPAI provider obligations including training-data summary publication.",
|
|
632
|
+
"test": "Pull the published training-data summary. Confirm machine-readable corpus-level granularity sufficient for copyright audit (per-corpus identifier + size + collection method + opt-out evidence). Walk downstream-provider documentation; confirm signed bindings to a production model fingerprint. Theater verdict if the summary is prose-only without machine-readable structure, or if downstream docs reference an unsigned/floating model identity.",
|
|
633
|
+
"evidence_required": [
|
|
634
|
+
"machine-readable training-data summary file (YAML/JSON)",
|
|
635
|
+
"downstream documentation bundle with signed model fingerprint",
|
|
636
|
+
"per-corpus copyright-policy attestations"
|
|
637
|
+
],
|
|
638
|
+
"verdict_when_failed": "compliance-theater"
|
|
639
|
+
}
|
|
460
640
|
},
|
|
461
641
|
"EU-AI-Act-Art-55-Systemic": {
|
|
462
642
|
"framework": "EU Artificial Intelligence Act (2024/1689) — GPAI with systemic risk",
|
|
@@ -485,7 +665,17 @@
|
|
|
485
665
|
],
|
|
486
666
|
"attack_refs": [
|
|
487
667
|
"T1059"
|
|
488
|
-
]
|
|
668
|
+
],
|
|
669
|
+
"theater_test": {
|
|
670
|
+
"claim": "Our GPAI model with systemic risk meets the additional Art. 55 obligations.",
|
|
671
|
+
"test": "Pull the adversarial-evaluation report. Confirm coverage of OWASP LLM Top 10 + ATLAS TTPs + MCP-trust scenarios. Pull the energy report; confirm kWh-per-million-tokens and training compute under ISO/IEC TR 24028 framing. Cross-walk the incident-reporting clock with DORA Art. 19 timing. Theater verdict if the eval omits any of OWASP/ATLAS/MCP coverage, if energy reporting is qualitative only, or if the incident-clock cross-walk is missing.",
|
|
672
|
+
"evidence_required": [
|
|
673
|
+
"adversarial eval report with method per attack class",
|
|
674
|
+
"energy reporting per ISO/IEC TR 24028",
|
|
675
|
+
"incident-clock cross-walk to DORA"
|
|
676
|
+
],
|
|
677
|
+
"verdict_when_failed": "compliance-theater"
|
|
678
|
+
}
|
|
489
679
|
},
|
|
490
680
|
"EU-AI-Act-Annex-IX-Conformity": {
|
|
491
681
|
"framework": "EU Artificial Intelligence Act (2024/1689) — Annex IX conformity assessment",
|
|
@@ -506,7 +696,17 @@
|
|
|
506
696
|
"AML.T0010",
|
|
507
697
|
"AML.T0018"
|
|
508
698
|
],
|
|
509
|
-
"attack_refs": []
|
|
699
|
+
"attack_refs": [],
|
|
700
|
+
"theater_test": {
|
|
701
|
+
"claim": "Our high-risk AI system passed conformity assessment per Annex IX.",
|
|
702
|
+
"test": "If internal-control route was used: request the third-party sample audit (e.g. AI-Office annual sampling) outcome. If notified-body route: request the body's scope letter and confirm AI-specific competency. For both, confirm an operational definition of 'substantial modification' covers fine-tuning, RAG changes, and system-prompt changes — and that a recent change was assessed against it. Theater verdict if the sampling/notified-body record is absent, or if substantial-modification gating has never fired despite a known fine-tune or RAG change.",
|
|
703
|
+
"evidence_required": [
|
|
704
|
+
"internal-control attestation + sampling outcome OR notified-body scope letter",
|
|
705
|
+
"substantial-modification policy document",
|
|
706
|
+
"change log showing modifications assessed against the policy"
|
|
707
|
+
],
|
|
708
|
+
"verdict_when_failed": "compliance-theater"
|
|
709
|
+
}
|
|
510
710
|
},
|
|
511
711
|
"EU-AI-Act-GPAI-CoP": {
|
|
512
712
|
"framework": "EU Artificial Intelligence Act (2024/1689) — Code of Practice for GPAI",
|
|
@@ -528,7 +728,17 @@
|
|
|
528
728
|
"AML.T0018",
|
|
529
729
|
"AML.T0020"
|
|
530
730
|
],
|
|
531
|
-
"attack_refs": []
|
|
731
|
+
"attack_refs": [],
|
|
732
|
+
"theater_test": {
|
|
733
|
+
"claim": "We follow the GPAI Code of Practice as our presumed-compliance route for Art. 53/55.",
|
|
734
|
+
"test": "Confirm signatory status. Pull the AI Office's published enforcement-deference position for code-conformant signatories. For each evidentiary commitment in the Code, locate the artefact (training-data summary, eval report, downstream-distributor list, energy report) and confirm it is current. Theater verdict if signatory but any required Code artefact is missing or older than the Code's refresh cadence.",
|
|
735
|
+
"evidence_required": [
|
|
736
|
+
"Code-of-Practice signatory confirmation",
|
|
737
|
+
"evidentiary artefact bundle keyed to Code commitments",
|
|
738
|
+
"AI Office enforcement-deference reference"
|
|
739
|
+
],
|
|
740
|
+
"verdict_when_failed": "compliance-theater"
|
|
741
|
+
}
|
|
532
742
|
},
|
|
533
743
|
"EU-CRA-Art13": {
|
|
534
744
|
"framework": "EU Cyber Resilience Act (2024/2847)",
|
|
@@ -554,7 +764,17 @@
|
|
|
554
764
|
"attack_refs": [
|
|
555
765
|
"T1195.001",
|
|
556
766
|
"T1195.002"
|
|
557
|
-
]
|
|
767
|
+
],
|
|
768
|
+
"theater_test": {
|
|
769
|
+
"claim": "We satisfy EU CRA Art. 13 essential cybersecurity requirements with technical documentation on file.",
|
|
770
|
+
"test": "Request the canonical build-pipeline definition for the most recent release. Confirm publication alongside the release artifact (workflow file hash, runner attestation, secrets scope). Pick the release-being-installed at a downstream operator; verify its build pipeline matches the published definition by comparing producer-side hashes. Confirm the incident-notification clock starts from FIRST awareness (not from confirmed exploit). Theater verdict if pipeline definitions are unpublished, hashes diverge, or the clock policy starts later than first awareness.",
|
|
771
|
+
"evidence_required": [
|
|
772
|
+
"published build-pipeline definition with hashes",
|
|
773
|
+
"downstream-side hash verification log",
|
|
774
|
+
"incident-notification policy document"
|
|
775
|
+
],
|
|
776
|
+
"verdict_when_failed": "compliance-theater"
|
|
777
|
+
}
|
|
558
778
|
},
|
|
559
779
|
"FedRAMP-Rev5-Moderate": {
|
|
560
780
|
"framework": "FedRAMP Rev 5 Moderate",
|
|
@@ -581,7 +801,17 @@
|
|
|
581
801
|
"attack_refs": [
|
|
582
802
|
"T1071",
|
|
583
803
|
"T1059"
|
|
584
|
-
]
|
|
804
|
+
],
|
|
805
|
+
"theater_test": {
|
|
806
|
+
"claim": "All cloud services in our boundary are FedRAMP Moderate authorised; AI services are covered.",
|
|
807
|
+
"test": "Enumerate every AI/ML service consumed within the authorisation boundary. For each, locate either (a) a FedRAMP Moderate ATO letter, (b) a documented exception with risk acceptance signed by the AO, or (c) an equivalence path (StateRAMP, FedRAMP Tailored, etc.). Verify the SSP includes shared-responsibility language covering prompt data, output data, training opt-out, and retention. Theater verdict if any AI service is in use without one of (a)-(c), or if the SSP shared-responsibility matrix lacks AI-specific clauses.",
|
|
808
|
+
"evidence_required": [
|
|
809
|
+
"AI service inventory keyed to FedRAMP marketplace IDs",
|
|
810
|
+
"AO-signed risk acceptance for non-authorised AI services",
|
|
811
|
+
"SSP excerpts showing AI shared-responsibility language"
|
|
812
|
+
],
|
|
813
|
+
"verdict_when_failed": "compliance-theater"
|
|
814
|
+
}
|
|
585
815
|
},
|
|
586
816
|
"HIPAA-Security-Rule-164.312(a)(1)": {
|
|
587
817
|
"framework": "HIPAA Security Rule (45 CFR § 164.312)",
|
|
@@ -607,7 +837,17 @@
|
|
|
607
837
|
"attack_refs": [
|
|
608
838
|
"T1071",
|
|
609
839
|
"T1530"
|
|
610
|
-
]
|
|
840
|
+
],
|
|
841
|
+
"theater_test": {
|
|
842
|
+
"claim": "We meet HIPAA 164.312(a)(1) access controls; PHI is access-controlled with unique user IDs.",
|
|
843
|
+
"test": "Inventory AI providers in use; for each consuming PHI, locate a BAA covering prompt retention + training opt-out + breach notification within HIPAA timelines. Inspect prompt-flow telemetry for PHI; confirm DLP minimisation runs pre-egress. Confirm AI agent sessions have controls separate from human user controls. Theater verdict if any AI provider consuming PHI lacks a BAA, if DLP is absent on prompt egress, or if AI agent sessions inherit human controls without separation.",
|
|
844
|
+
"evidence_required": [
|
|
845
|
+
"AI-provider BAA bundle",
|
|
846
|
+
"DLP rule export for prompt egress",
|
|
847
|
+
"agent-session control configuration"
|
|
848
|
+
],
|
|
849
|
+
"verdict_when_failed": "compliance-theater"
|
|
850
|
+
}
|
|
611
851
|
},
|
|
612
852
|
"HIPAA-Security-Rule-2026-NPRM-164.308": {
|
|
613
853
|
"framework": "HIPAA Security Rule (45 CFR § 164.308) — 2026 Notice of Proposed Rulemaking",
|
|
@@ -633,7 +873,17 @@
|
|
|
633
873
|
"attack_refs": [
|
|
634
874
|
"T1071",
|
|
635
875
|
"T1530"
|
|
636
|
-
]
|
|
876
|
+
],
|
|
877
|
+
"theater_test": {
|
|
878
|
+
"claim": "Our administrative safeguards meet the HIPAA Security Rule including 2026 NPRM updates.",
|
|
879
|
+
"test": "Walk the technology-asset register; confirm AI assistants and model-API providers are enumerated as asset categories. Pull the network map; confirm AI-API egress routes are marked with BAA and training-opt-out attestation. Confirm the tabletop catalogue contains at least one AI-specific PHI loss scenario exercised in the past 12 months. Theater verdict if AI assets are absent, network-map AI routes lack attestations, or the tabletop catalogue has no AI scenario.",
|
|
880
|
+
"evidence_required": [
|
|
881
|
+
"technology-asset register with AI categories",
|
|
882
|
+
"network map with AI-API egress annotations",
|
|
883
|
+
"tabletop exercise catalogue with execution dates"
|
|
884
|
+
],
|
|
885
|
+
"verdict_when_failed": "compliance-theater"
|
|
886
|
+
}
|
|
637
887
|
},
|
|
638
888
|
"HIPAA-Security-Rule-2026-NPRM-164.310": {
|
|
639
889
|
"framework": "HIPAA Security Rule (45 CFR § 164.310) — 2026 Notice of Proposed Rulemaking",
|
|
@@ -658,7 +908,17 @@
|
|
|
658
908
|
],
|
|
659
909
|
"attack_refs": [
|
|
660
910
|
"T1071"
|
|
661
|
-
]
|
|
911
|
+
],
|
|
912
|
+
"theater_test": {
|
|
913
|
+
"claim": "Our physical safeguards meet HIPAA 164.310 including network-access logging in the 2026 NPRM.",
|
|
914
|
+
"test": "Sample developer endpoints with PHI exposure. Confirm AI-API session logging is captured under the network-access-logging mandate (timestamp, user, prompt hash, response hash, destination provider). Confirm media-disposal verification extends to AI training-data opt-out attestation per provider. Theater verdict if AI-API sessions are unlogged, or if any departed user retained AI provider credentials past their termination date.",
|
|
915
|
+
"evidence_required": [
|
|
916
|
+
"AI-API session log sample for sampled endpoints",
|
|
917
|
+
"training-data opt-out attestation per AI provider",
|
|
918
|
+
"departed-user credential-revocation evidence"
|
|
919
|
+
],
|
|
920
|
+
"verdict_when_failed": "compliance-theater"
|
|
921
|
+
}
|
|
662
922
|
},
|
|
663
923
|
"HIPAA-Security-Rule-2026-NPRM-164.312": {
|
|
664
924
|
"framework": "HIPAA Security Rule (45 CFR § 164.312) — 2026 Notice of Proposed Rulemaking",
|
|
@@ -688,7 +948,17 @@
|
|
|
688
948
|
"T1059",
|
|
689
949
|
"T1068",
|
|
690
950
|
"T1078"
|
|
691
|
-
]
|
|
951
|
+
],
|
|
952
|
+
"theater_test": {
|
|
953
|
+
"claim": "Our technical safeguards meet HIPAA 164.312 including the 2026 NPRM expansions.",
|
|
954
|
+
"test": "Pick 5 AI-agent flows that touch PHI. For each, confirm a per-action MFA-equivalent (delegated-authority attestation) is captured. Inspect storage of AI-provider artifacts (conversation history, embeddings, fine-tune sets) for encryption-at-rest. Confirm prompt-injection and RAG-poisoning detection rules exist as anti-malware-equivalents. Theater verdict if per-action attestations are absent, AI artifacts are stored unencrypted, or no prompt-injection/RAG-poisoning detection rules exist.",
|
|
955
|
+
"evidence_required": [
|
|
956
|
+
"delegated-authority attestation samples",
|
|
957
|
+
"encryption-at-rest configuration for AI artifacts",
|
|
958
|
+
"prompt-injection / RAG-poisoning detection rule export"
|
|
959
|
+
],
|
|
960
|
+
"verdict_when_failed": "compliance-theater"
|
|
961
|
+
}
|
|
692
962
|
},
|
|
693
963
|
"HIPAA-Security-Rule-2026-NPRM-164.314": {
|
|
694
964
|
"framework": "HIPAA Security Rule (45 CFR § 164.314) — 2026 Notice of Proposed Rulemaking",
|
|
@@ -713,7 +983,17 @@
|
|
|
713
983
|
],
|
|
714
984
|
"attack_refs": [
|
|
715
985
|
"T1195.001"
|
|
716
|
-
]
|
|
986
|
+
],
|
|
987
|
+
"theater_test": {
|
|
988
|
+
"claim": "Our BAAs satisfy HIPAA 164.314 organisational requirements including 2026 NPRM AI provisions.",
|
|
989
|
+
"test": "Pull the AI-provider BAA portfolio. Confirm each contract covers (a) prompt retention policy with explicit duration, (b) training opt-out with attestation evidence, (c) breach-notification timeline aligned with HIPAA, (d) sub-processor disclosure. Theater verdict if any AI provider's BAA is silent on prompt retention, training opt-out, or sub-processors, or if 'training opt-out' is contractual without an evidence path.",
|
|
990
|
+
"evidence_required": [
|
|
991
|
+
"AI-provider BAA portfolio with clause-by-clause checklist",
|
|
992
|
+
"training-opt-out attestation evidence per provider",
|
|
993
|
+
"sub-processor disclosure inventories"
|
|
994
|
+
],
|
|
995
|
+
"verdict_when_failed": "compliance-theater"
|
|
996
|
+
}
|
|
717
997
|
},
|
|
718
998
|
"HITRUST-CSF-v11.4-09.l": {
|
|
719
999
|
"framework": "HITRUST CSF v11.4",
|
|
@@ -739,7 +1019,17 @@
|
|
|
739
1019
|
],
|
|
740
1020
|
"attack_refs": [
|
|
741
1021
|
"T1195.001"
|
|
742
|
-
]
|
|
1022
|
+
],
|
|
1023
|
+
"theater_test": {
|
|
1024
|
+
"claim": "We meet HITRUST CSF 09.l outsourced services management for all third-party providers.",
|
|
1025
|
+
"test": "Pull the third-party register. Filter for AI providers; confirm AI vendors are inventoried separately from general SaaS. Spot-check 5 AI vendors for AI-specific contractual clauses (prompt retention, training opt-out, residency, model version pinning, prompt-breach notification). Search for self-signup AI usage on developer endpoints; confirm a policy prohibits it for in-scope data. Theater verdict if AI is bucketed inside generic SaaS, if any sampled AI vendor lacks AI-specific clauses, or if self-signup AI is in evidence on a developer endpoint that touches in-scope data.",
|
|
1026
|
+
"evidence_required": [
|
|
1027
|
+
"third-party register with AI subset",
|
|
1028
|
+
"AI-specific contract clause checklist per vendor",
|
|
1029
|
+
"endpoint scan for self-signup AI tools"
|
|
1030
|
+
],
|
|
1031
|
+
"verdict_when_failed": "compliance-theater"
|
|
1032
|
+
}
|
|
743
1033
|
},
|
|
744
1034
|
"IEC-62443-3-3": {
|
|
745
1035
|
"framework": "IEC 62443-3-3 (Industrial communication networks — security for IACS)",
|
|
@@ -767,7 +1057,17 @@
|
|
|
767
1057
|
"T0883",
|
|
768
1058
|
"T0855",
|
|
769
1059
|
"T1071"
|
|
770
|
-
]
|
|
1060
|
+
],
|
|
1061
|
+
"theater_test": {
|
|
1062
|
+
"claim": "Our IACS architecture meets IEC 62443-3-3 system security requirements.",
|
|
1063
|
+
"test": "Inspect the zone-and-conduit diagram. Confirm AI operator assistants and AI-API egress paths from the corporate-to-OT boundary are enumerated as conduits with documented security levels. Sample 3 OT operator workstations; confirm any installed AI assistants are inventoried and that prompt-injection-class threats appear in the threat model. Theater verdict if AI conduits are absent from the zone diagram, or if AI assistants on OT operator workstations are not threat-modelled.",
|
|
1064
|
+
"evidence_required": [
|
|
1065
|
+
"zone-and-conduit diagram with AI annotations",
|
|
1066
|
+
"OT operator workstation inventory",
|
|
1067
|
+
"threat-model document covering AI conduit threats"
|
|
1068
|
+
],
|
|
1069
|
+
"verdict_when_failed": "compliance-theater"
|
|
1070
|
+
}
|
|
771
1071
|
},
|
|
772
1072
|
"ISO-27001-2022-A.8.16": {
|
|
773
1073
|
"framework": "ISO/IEC 27001:2022",
|
|
@@ -789,7 +1089,17 @@
|
|
|
789
1089
|
],
|
|
790
1090
|
"attack_refs": [
|
|
791
1091
|
"T1071"
|
|
792
|
-
]
|
|
1092
|
+
],
|
|
1093
|
+
"theater_test": {
|
|
1094
|
+
"claim": "Our monitoring activities under ISO 27001:2022 A.8.16 cover all in-scope systems.",
|
|
1095
|
+
"test": "From the SIEM event-source inventory, confirm AI-API egress events, MCP server invocations, and AI-agent action audit logs are ingested. Sample one alert from each class in the past 30 days; confirm an analyst reviewed it. Theater verdict if any of those source classes are missing from the SIEM, or if no AI/MCP-related alert has been triaged in the past 90 days despite traffic being present.",
|
|
1096
|
+
"evidence_required": [
|
|
1097
|
+
"SIEM event-source inventory",
|
|
1098
|
+
"alert triage records for AI/MCP-class alerts",
|
|
1099
|
+
"telemetry volume report by source class"
|
|
1100
|
+
],
|
|
1101
|
+
"verdict_when_failed": "compliance-theater"
|
|
1102
|
+
}
|
|
793
1103
|
},
|
|
794
1104
|
"ISO-27001-2022-A.8.28": {
|
|
795
1105
|
"framework": "ISO/IEC 27001:2022",
|
|
@@ -812,7 +1122,17 @@
|
|
|
812
1122
|
"AML.T0051",
|
|
813
1123
|
"AML.T0054"
|
|
814
1124
|
],
|
|
815
|
-
"attack_refs": []
|
|
1125
|
+
"attack_refs": [],
|
|
1126
|
+
"theater_test": {
|
|
1127
|
+
"claim": "We follow secure coding practices per ISO 27001:2022 A.8.28.",
|
|
1128
|
+
"test": "Pull the secure-coding standard. Confirm it addresses AI-generated code (Copilot, Claude Code, Cursor diffs) with reviewer-attestation requirements and prompt-injection-class CWE coverage. Check git history for AI-coauthored commits; confirm the pre-merge review record is preserved. Theater verdict if the standard is silent on AI-generated code, or if AI-attributed commits lack a reviewer-attestation trail.",
|
|
1129
|
+
"evidence_required": [
|
|
1130
|
+
"secure-coding standard document with version date",
|
|
1131
|
+
"git history sample with AI-attribution analysis",
|
|
1132
|
+
"code-review records for AI-attributed diffs"
|
|
1133
|
+
],
|
|
1134
|
+
"verdict_when_failed": "compliance-theater"
|
|
1135
|
+
}
|
|
816
1136
|
},
|
|
817
1137
|
"ISO-27001-2022-A.8.30": {
|
|
818
1138
|
"framework": "ISO/IEC 27001:2022",
|
|
@@ -836,7 +1156,17 @@
|
|
|
836
1156
|
],
|
|
837
1157
|
"attack_refs": [
|
|
838
1158
|
"T1195.001"
|
|
839
|
-
]
|
|
1159
|
+
],
|
|
1160
|
+
"theater_test": {
|
|
1161
|
+
"claim": "Our outsourced development meets ISO 27001:2022 A.8.30 oversight requirements.",
|
|
1162
|
+
"test": "Pull the outsourced-dev contract bundle. Confirm clauses naming AI tool usage by the contractor (which AI assistants, which models, which prompt destinations) and reviewer attestation for AI-generated diffs. Sample one delivered build; confirm SBOM enumerates AI-build dependencies. Theater verdict if contracts are silent on contractor AI usage, or if delivered SBOMs omit AI build-environment components.",
|
|
1163
|
+
"evidence_required": [
|
|
1164
|
+
"outsourced-dev contract clause export",
|
|
1165
|
+
"delivered build SBOM",
|
|
1166
|
+
"contractor AI-usage attestation"
|
|
1167
|
+
],
|
|
1168
|
+
"verdict_when_failed": "compliance-theater"
|
|
1169
|
+
}
|
|
840
1170
|
},
|
|
841
1171
|
"ISO-27001-2022-A.8.8": {
|
|
842
1172
|
"framework": "ISO/IEC 27001:2022",
|
|
@@ -858,7 +1188,17 @@
|
|
|
858
1188
|
"atlas_refs": [],
|
|
859
1189
|
"attack_refs": [
|
|
860
1190
|
"T1068"
|
|
861
|
-
]
|
|
1191
|
+
],
|
|
1192
|
+
"theater_test": {
|
|
1193
|
+
"claim": "We manage technical vulnerabilities per ISO 27001:2022 A.8.8.",
|
|
1194
|
+
"test": "Pull the vuln-management procedure. Confirm a CISA-KEV-anchored response tier (4h to verified mitigation for KEV+PoC). Pull the past 12 months of KEV-listed CVEs in scope; measure time-to-mitigation. Theater verdict if the procedure has only a generic 'critical = 30 days' SLA, or if any KEV+PoC entry exceeded the documented tier.",
|
|
1195
|
+
"evidence_required": [
|
|
1196
|
+
"A.8.8 procedure document",
|
|
1197
|
+
"KEV-listed CVE list with mitigation timestamps",
|
|
1198
|
+
"live-patching capability evidence"
|
|
1199
|
+
],
|
|
1200
|
+
"verdict_when_failed": "compliance-theater"
|
|
1201
|
+
}
|
|
862
1202
|
},
|
|
863
1203
|
"ISO-IEC-23894-2023-clause-7": {
|
|
864
1204
|
"framework": "ISO/IEC 23894:2023 (AI Risk Management Guidance)",
|
|
@@ -884,7 +1224,17 @@
|
|
|
884
1224
|
],
|
|
885
1225
|
"attack_refs": [
|
|
886
1226
|
"T1059"
|
|
887
|
-
]
|
|
1227
|
+
],
|
|
1228
|
+
"theater_test": {
|
|
1229
|
+
"claim": "We perform AI risk assessment per ISO/IEC 23894:2023 clause 7.",
|
|
1230
|
+
"test": "Pull the most recent AI risk assessment. Confirm coverage of supply-chain risks (model provenance, MCP/plugin trust, training-data integrity), prompt-injection as a current threat, and operational AI-incident scenarios. Confirm the assessment is dated within the framework's review cadence. Theater verdict if supply-chain or prompt-injection risks are absent, or if the assessment has no documented owner who acted on findings.",
|
|
1231
|
+
"evidence_required": [
|
|
1232
|
+
"AI risk assessment document",
|
|
1233
|
+
"risk-treatment plan with action owner",
|
|
1234
|
+
"review-cadence schedule"
|
|
1235
|
+
],
|
|
1236
|
+
"verdict_when_failed": "compliance-theater"
|
|
1237
|
+
}
|
|
888
1238
|
},
|
|
889
1239
|
"ISO-IEC-42001-2023-clause-6.1.2": {
|
|
890
1240
|
"framework": "ISO/IEC 42001:2023 (AI Management System)",
|
|
@@ -912,7 +1262,17 @@
|
|
|
912
1262
|
"attack_refs": [
|
|
913
1263
|
"T1059",
|
|
914
1264
|
"T1071"
|
|
915
|
-
]
|
|
1265
|
+
],
|
|
1266
|
+
"theater_test": {
|
|
1267
|
+
"claim": "Our AI Management System satisfies ISO/IEC 42001:2023 clause 6.1.2 risk-treatment requirements.",
|
|
1268
|
+
"test": "Walk the AIMS risk-treatment register. Confirm prompt injection, MCP/agent trust, RAG-poisoning, and model-supply-chain compromise appear as named risks with treatment plans. Confirm owner + due-date + verification path for each. Theater verdict if any of those risk classes are absent, or if treatments have no verification path documented.",
|
|
1269
|
+
"evidence_required": [
|
|
1270
|
+
"AIMS risk-treatment register export",
|
|
1271
|
+
"risk-treatment plan with verification paths",
|
|
1272
|
+
"AIMS internal audit report"
|
|
1273
|
+
],
|
|
1274
|
+
"verdict_when_failed": "compliance-theater"
|
|
1275
|
+
}
|
|
916
1276
|
},
|
|
917
1277
|
"NERC-CIP-007-6-R4": {
|
|
918
1278
|
"framework": "NERC CIP-007-6 (BES Cyber System Security Management)",
|
|
@@ -940,7 +1300,17 @@
|
|
|
940
1300
|
"T0883",
|
|
941
1301
|
"T0855",
|
|
942
1302
|
"T1071"
|
|
943
|
-
]
|
|
1303
|
+
],
|
|
1304
|
+
"theater_test": {
|
|
1305
|
+
"claim": "We satisfy NERC CIP-007-6 R4 security event monitoring for our BES Cyber Systems.",
|
|
1306
|
+
"test": "Pull the R4 monitored-event source list. Confirm AI operator assistants are enumerated with explicit alerting on assistant-initiated operator commands. Confirm AI-API egress at the corporate-to-OT boundary is monitored. Confirm prompt-injection indicators are present as a distinct event class. Theater verdict if AI assistants are not monitored event sources, or if no NIS2 24h/72h alignment is documented for multinational operators.",
|
|
1307
|
+
"evidence_required": [
|
|
1308
|
+
"R4 event source inventory",
|
|
1309
|
+
"alerting rule export for AI-initiated commands",
|
|
1310
|
+
"NIS2 alignment document where applicable"
|
|
1311
|
+
],
|
|
1312
|
+
"verdict_when_failed": "compliance-theater"
|
|
1313
|
+
}
|
|
944
1314
|
},
|
|
945
1315
|
"NIS2-Art21-incident-handling": {
|
|
946
1316
|
"framework": "EU NIS2 Directive (2022/2555)",
|
|
@@ -968,7 +1338,17 @@
|
|
|
968
1338
|
"attack_refs": [
|
|
969
1339
|
"T1059",
|
|
970
1340
|
"T1567"
|
|
971
|
-
]
|
|
1341
|
+
],
|
|
1342
|
+
"theater_test": {
|
|
1343
|
+
"claim": "We can meet NIS2 Art. 21 incident handling obligations including the 24h early warning.",
|
|
1344
|
+
"test": "Run a tabletop with a synthetic significant-incident inject affecting an essential-service flow at T0. Stopwatch elapsed time to a Competent Authority early warning containing initial assessment, severity, and impact. Theater verdict if elapsed exceeds 24h, if no on-call is named to start the clock, or if the playbook has not been exercised in the past 12 months.",
|
|
1345
|
+
"evidence_required": [
|
|
1346
|
+
"tabletop execution log",
|
|
1347
|
+
"early-warning notification draft",
|
|
1348
|
+
"on-call rota and playbook ownership"
|
|
1349
|
+
],
|
|
1350
|
+
"verdict_when_failed": "compliance-theater"
|
|
1351
|
+
}
|
|
972
1352
|
},
|
|
973
1353
|
"NIS2-Art21-patch-management": {
|
|
974
1354
|
"framework": "EU NIS2 Directive",
|
|
@@ -990,7 +1370,17 @@
|
|
|
990
1370
|
"atlas_refs": [],
|
|
991
1371
|
"attack_refs": [
|
|
992
1372
|
"T1068"
|
|
993
|
-
]
|
|
1373
|
+
],
|
|
1374
|
+
"theater_test": {
|
|
1375
|
+
"claim": "Our patch-management posture meets NIS2 Art. 21(2)(e) for technical and organisational measures.",
|
|
1376
|
+
"test": "Pull the patch SLA document. Confirm a CISA-KEV-anchored tier (4h to verified mitigation for KEV+PoC). Cross-reference past 12 months of KEV-listed CVEs in scope; measure compliance. Confirm live-patching capability for hosts that cannot reboot in window. Theater verdict if the SLA collapses to 'critical = 30 days' across the board, or if any KEV+PoC entry breached the documented tier.",
|
|
1377
|
+
"evidence_required": [
|
|
1378
|
+
"patch SLA document",
|
|
1379
|
+
"KEV listing→mitigation telemetry",
|
|
1380
|
+
"live-patching agent inventory"
|
|
1381
|
+
],
|
|
1382
|
+
"verdict_when_failed": "compliance-theater"
|
|
1383
|
+
}
|
|
994
1384
|
},
|
|
995
1385
|
"NIST-800-115": {
|
|
996
1386
|
"framework": "NIST SP 800-115 (Technical Guide to Information Security Testing and Assessment)",
|
|
@@ -1021,7 +1411,17 @@
|
|
|
1021
1411
|
"T1059",
|
|
1022
1412
|
"T1071",
|
|
1023
1413
|
"T1195.001"
|
|
1024
|
-
]
|
|
1414
|
+
],
|
|
1415
|
+
"theater_test": {
|
|
1416
|
+
"claim": "Our pen-test methodology aligns with NIST SP 800-115 technical guidance.",
|
|
1417
|
+
"test": "Pull the most recent pen-test report. Confirm coverage of AI/MCP attack surfaces (prompt injection, MCP plugin trust, RAG corpus integrity, AI-API egress). Confirm the testing methodology document references AI-specific test classes and tooling. Theater verdict if AI/MCP testing is absent from the methodology, or if the pen-test report contains no AI-class findings despite AI being in production.",
|
|
1418
|
+
"evidence_required": [
|
|
1419
|
+
"pen-test methodology document",
|
|
1420
|
+
"most-recent pen-test report with AI/MCP test sections",
|
|
1421
|
+
"tester competency CV/credentials"
|
|
1422
|
+
],
|
|
1423
|
+
"verdict_when_failed": "compliance-theater"
|
|
1424
|
+
}
|
|
1025
1425
|
},
|
|
1026
1426
|
"NIST-800-218-SSDF": {
|
|
1027
1427
|
"framework": "NIST SP 800-218 (Secure Software Development Framework v1.1)",
|
|
@@ -1048,7 +1448,17 @@
|
|
|
1048
1448
|
],
|
|
1049
1449
|
"attack_refs": [
|
|
1050
1450
|
"T1195.001"
|
|
1051
|
-
]
|
|
1451
|
+
],
|
|
1452
|
+
"theater_test": {
|
|
1453
|
+
"claim": "We follow NIST SSDF practices for secure software development.",
|
|
1454
|
+
"test": "Pull the SSDF mapping document. Confirm AI-generated code provenance practices (per-block AI authorship attestation, reviewer identity, human approval before merge). Inspect git history; confirm AI-attributed commits have linked review records. Pull build-time SBOM; confirm AI build-tooling is enumerated. Theater verdict if AI authorship is unattributed, AI commits bypass review, or build-time SBOM omits AI tooling.",
|
|
1455
|
+
"evidence_required": [
|
|
1456
|
+
"SSDF mapping document",
|
|
1457
|
+
"AI-attribution policy + recent merge sample",
|
|
1458
|
+
"build-time SBOM"
|
|
1459
|
+
],
|
|
1460
|
+
"verdict_when_failed": "compliance-theater"
|
|
1461
|
+
}
|
|
1052
1462
|
},
|
|
1053
1463
|
"NIST-800-53-AC-2": {
|
|
1054
1464
|
"framework": "NIST SP 800-53 Rev 5",
|
|
@@ -1073,7 +1483,17 @@
|
|
|
1073
1483
|
],
|
|
1074
1484
|
"attack_refs": [
|
|
1075
1485
|
"T1059"
|
|
1076
|
-
]
|
|
1486
|
+
],
|
|
1487
|
+
"theater_test": {
|
|
1488
|
+
"claim": "Our account management satisfies NIST 800-53 AC-2 across all account types.",
|
|
1489
|
+
"test": "Inventory AI-agent service accounts. For each, confirm an authorization context defines (who initiated each invocation, what actions are in scope, what tools are authorised). Pull AC-2 audit log for one agent over 7 days; confirm prompt-level access decisions are reconstructable. Theater verdict if AI-agent accounts have no per-session authorisation context, or if AC-2 logs collapse to 'service account X did Y' without prompt-input chain.",
|
|
1490
|
+
"evidence_required": [
|
|
1491
|
+
"AI-agent service account inventory",
|
|
1492
|
+
"authorization-context policy document",
|
|
1493
|
+
"7-day audit log sample with prompt input chain"
|
|
1494
|
+
],
|
|
1495
|
+
"verdict_when_failed": "compliance-theater"
|
|
1496
|
+
}
|
|
1077
1497
|
},
|
|
1078
1498
|
"NIST-800-53-CM-7": {
|
|
1079
1499
|
"framework": "NIST SP 800-53 Rev 5",
|
|
@@ -1097,7 +1517,17 @@
|
|
|
1097
1517
|
],
|
|
1098
1518
|
"attack_refs": [
|
|
1099
1519
|
"T1195.001"
|
|
1100
|
-
]
|
|
1520
|
+
],
|
|
1521
|
+
"theater_test": {
|
|
1522
|
+
"claim": "We enforce least-functionality per NIST 800-53 CM-7 across all configuration items.",
|
|
1523
|
+
"test": "Sample 5 developer endpoints. Enumerate installed MCP servers + AI plugins; confirm each is on an organisational allowlist with documented business justification. Confirm tool-grant default is deny with explicit per-tool prompts. Theater verdict if any sampled endpoint runs an MCP server absent from the allowlist, or if any tool-grant defaults to allow without prompting.",
|
|
1524
|
+
"evidence_required": [
|
|
1525
|
+
"endpoint MCP/plugin inventory for sampled hosts",
|
|
1526
|
+
"organisational allowlist with justifications",
|
|
1527
|
+
"tool-grant default-policy export"
|
|
1528
|
+
],
|
|
1529
|
+
"verdict_when_failed": "compliance-theater"
|
|
1530
|
+
}
|
|
1101
1531
|
},
|
|
1102
1532
|
"NIST-800-53-SA-12": {
|
|
1103
1533
|
"framework": "NIST SP 800-53 Rev 5",
|
|
@@ -1121,7 +1551,17 @@
|
|
|
1121
1551
|
],
|
|
1122
1552
|
"attack_refs": [
|
|
1123
1553
|
"T1195.001"
|
|
1124
|
-
]
|
|
1554
|
+
],
|
|
1555
|
+
"theater_test": {
|
|
1556
|
+
"claim": "Our supply chain protection practices meet NIST 800-53 SA-12.",
|
|
1557
|
+
"test": "Pull the supplier-protection program. Confirm AI providers are enumerated with the same diligence as software suppliers (security questionnaire, SOC 2 review, contractual breach-notification). Confirm model and MCP-server provenance attestation is collected at consumption. Theater verdict if AI providers are exempt from supplier diligence, or if model artefacts are consumed without provenance attestation.",
|
|
1558
|
+
"evidence_required": [
|
|
1559
|
+
"supplier-protection program document",
|
|
1560
|
+
"AI-provider diligence record sample",
|
|
1561
|
+
"model-provenance attestations at consumption"
|
|
1562
|
+
],
|
|
1563
|
+
"verdict_when_failed": "compliance-theater"
|
|
1564
|
+
}
|
|
1125
1565
|
},
|
|
1126
1566
|
"NIST-800-53-SC-28": {
|
|
1127
1567
|
"framework": "NIST SP 800-53 Rev 5",
|
|
@@ -1143,7 +1583,17 @@
|
|
|
1143
1583
|
"atlas_refs": [],
|
|
1144
1584
|
"attack_refs": [
|
|
1145
1585
|
"T1068"
|
|
1146
|
-
]
|
|
1586
|
+
],
|
|
1587
|
+
"theater_test": {
|
|
1588
|
+
"claim": "Information at rest is protected per NIST 800-53 SC-28 with encryption.",
|
|
1589
|
+
"test": "Inventory AI-provider artefact storage (conversation history, embeddings, fine-tune sets, vector indices). Confirm encryption-at-rest with key management by an in-scope KMS. Spot-check 3 storage locations; confirm key access is logged. Theater verdict if any AI artefact storage is unencrypted, key management is provider-default with no in-scope KMS, or key access is unlogged.",
|
|
1590
|
+
"evidence_required": [
|
|
1591
|
+
"AI artefact storage inventory",
|
|
1592
|
+
"KMS key-policy export",
|
|
1593
|
+
"key access log sample"
|
|
1594
|
+
],
|
|
1595
|
+
"verdict_when_failed": "compliance-theater"
|
|
1596
|
+
}
|
|
1147
1597
|
},
|
|
1148
1598
|
"NIST-800-53-SC-7": {
|
|
1149
1599
|
"framework": "NIST SP 800-53 Rev 5",
|
|
@@ -1168,7 +1618,17 @@
|
|
|
1168
1618
|
"T1071",
|
|
1169
1619
|
"T1102",
|
|
1170
1620
|
"T1568"
|
|
1171
|
-
]
|
|
1621
|
+
],
|
|
1622
|
+
"theater_test": {
|
|
1623
|
+
"claim": "Boundary protection is enforced per NIST 800-53 SC-7 for the system boundary.",
|
|
1624
|
+
"test": "Inspect egress firewall rules for AI-API destinations (api.openai.com, api.anthropic.com, generativelanguage.googleapis.com, etc.). Confirm allowlist with documented business justification per destination. Confirm logging captures prompt hash + identity per egress. Theater verdict if AI destinations are reachable from any source without allowlist enforcement, or if egress logs lack identity binding.",
|
|
1625
|
+
"evidence_required": [
|
|
1626
|
+
"egress firewall rule export",
|
|
1627
|
+
"AI destination allowlist with justifications",
|
|
1628
|
+
"egress log sample with identity binding"
|
|
1629
|
+
],
|
|
1630
|
+
"verdict_when_failed": "compliance-theater"
|
|
1631
|
+
}
|
|
1172
1632
|
},
|
|
1173
1633
|
"NIST-800-53-SC-8": {
|
|
1174
1634
|
"framework": "NIST SP 800-53 Rev 5",
|
|
@@ -1189,7 +1649,17 @@
|
|
|
1189
1649
|
"atlas_refs": [],
|
|
1190
1650
|
"attack_refs": [
|
|
1191
1651
|
"T1068"
|
|
1192
|
-
]
|
|
1652
|
+
],
|
|
1653
|
+
"theater_test": {
|
|
1654
|
+
"claim": "Transmission confidentiality and integrity is protected per NIST 800-53 SC-8.",
|
|
1655
|
+
"test": "Confirm TLS 1.3 (or PQC-hybrid where deployed) on every AI-API destination, including any internal gateways. Inspect MCP server transport; confirm authentication and integrity (signed JWT or mTLS) on MCP traffic. Theater verdict if any AI-API egress allows TLS<1.2 or unauthenticated MCP transport.",
|
|
1656
|
+
"evidence_required": [
|
|
1657
|
+
"TLS configuration audit per destination",
|
|
1658
|
+
"MCP transport configuration",
|
|
1659
|
+
"PQC migration roadmap if claimed"
|
|
1660
|
+
],
|
|
1661
|
+
"verdict_when_failed": "compliance-theater"
|
|
1662
|
+
}
|
|
1193
1663
|
},
|
|
1194
1664
|
"NIST-800-53-SI-10": {
|
|
1195
1665
|
"framework": "NIST SP 800-53 Rev 5",
|
|
@@ -1215,7 +1685,17 @@
|
|
|
1215
1685
|
"attack_refs": [
|
|
1216
1686
|
"T1190",
|
|
1217
1687
|
"T1059"
|
|
1218
|
-
]
|
|
1688
|
+
],
|
|
1689
|
+
"theater_test": {
|
|
1690
|
+
"claim": "We validate information inputs per NIST 800-53 SI-10.",
|
|
1691
|
+
"test": "Inspect input-validation rules at AI prompt boundaries: system-prompt protection from third-party content, RAG-corpus content sanitisation, tool-output sanitisation before re-injection. Theater verdict if no input validation exists at any of those boundaries, or if SI-10 evidence cites only HTML/SQL escaping without prompt-injection treatment.",
|
|
1692
|
+
"evidence_required": [
|
|
1693
|
+
"input-validation policy at prompt boundaries",
|
|
1694
|
+
"RAG-corpus sanitisation rule export",
|
|
1695
|
+
"tool-output sanitisation logic"
|
|
1696
|
+
],
|
|
1697
|
+
"verdict_when_failed": "compliance-theater"
|
|
1698
|
+
}
|
|
1219
1699
|
},
|
|
1220
1700
|
"NIST-800-53-SI-12": {
|
|
1221
1701
|
"framework": "NIST SP 800-53 Rev 5",
|
|
@@ -1239,7 +1719,17 @@
|
|
|
1239
1719
|
],
|
|
1240
1720
|
"attack_refs": [
|
|
1241
1721
|
"T1059"
|
|
1242
|
-
]
|
|
1722
|
+
],
|
|
1723
|
+
"theater_test": {
|
|
1724
|
+
"claim": "Information handling and retention satisfies NIST 800-53 SI-12.",
|
|
1725
|
+
"test": "Pull the records-retention schedule. Confirm AI artefacts (prompts, outputs, embeddings, fine-tune sets) appear with explicit retention periods aligned to data-classification. Confirm provider-side retention is documented per AI provider with attestation. Theater verdict if AI artefacts are absent from the retention schedule, or if provider-side retention is undocumented.",
|
|
1726
|
+
"evidence_required": [
|
|
1727
|
+
"records-retention schedule with AI categories",
|
|
1728
|
+
"provider retention attestation per AI provider",
|
|
1729
|
+
"deletion verification log"
|
|
1730
|
+
],
|
|
1731
|
+
"verdict_when_failed": "compliance-theater"
|
|
1732
|
+
}
|
|
1243
1733
|
},
|
|
1244
1734
|
"NIST-800-53-SI-2": {
|
|
1245
1735
|
"framework": "NIST SP 800-53 Rev 5",
|
|
@@ -1262,7 +1752,17 @@
|
|
|
1262
1752
|
"atlas_refs": [],
|
|
1263
1753
|
"attack_refs": [
|
|
1264
1754
|
"T1068"
|
|
1265
|
-
]
|
|
1755
|
+
],
|
|
1756
|
+
"theater_test": {
|
|
1757
|
+
"claim": "Flaw remediation is timely per NIST 800-53 SI-2.",
|
|
1758
|
+
"test": "Pull the flaw-remediation SLA. Confirm a KEV-anchored tier (≤4h for KEV+PoC). Pull the past 12 months of KEV listings affecting in-scope assets; measure deployment compliance. Confirm live-patching is provisioned for hosts that can't reboot in window. Theater verdict if the SLA does not have a KEV tier or if KEV compliance dropped below 95%.",
|
|
1759
|
+
"evidence_required": [
|
|
1760
|
+
"SI-2 SLA document",
|
|
1761
|
+
"KEV deployment timeline per CVE",
|
|
1762
|
+
"live-patching agent inventory"
|
|
1763
|
+
],
|
|
1764
|
+
"verdict_when_failed": "compliance-theater"
|
|
1765
|
+
}
|
|
1266
1766
|
},
|
|
1267
1767
|
"NIST-800-53-SI-3": {
|
|
1268
1768
|
"framework": "NIST SP 800-53 Rev 5",
|
|
@@ -1283,7 +1783,17 @@
|
|
|
1283
1783
|
],
|
|
1284
1784
|
"attack_refs": [
|
|
1285
1785
|
"T1059"
|
|
1286
|
-
]
|
|
1786
|
+
],
|
|
1787
|
+
"theater_test": {
|
|
1788
|
+
"claim": "Malicious code protection is in place per NIST 800-53 SI-3.",
|
|
1789
|
+
"test": "Confirm SI-3 controls cover prompt-injection (input-side malicious instructions delivered via third-party content) and RAG-poisoning (corpus-side malicious instructions). Confirm detection rules exist and have triggered at least once on synthetic test inputs. Theater verdict if SI-3 evidence cites only AV signatures without prompt-injection or RAG-poisoning treatment.",
|
|
1790
|
+
"evidence_required": [
|
|
1791
|
+
"SI-3 control description with AI extensions",
|
|
1792
|
+
"prompt-injection / RAG-poisoning detection rule export",
|
|
1793
|
+
"synthetic-input test results"
|
|
1794
|
+
],
|
|
1795
|
+
"verdict_when_failed": "compliance-theater"
|
|
1796
|
+
}
|
|
1287
1797
|
},
|
|
1288
1798
|
"NIST-800-63B-rev4": {
|
|
1289
1799
|
"framework": "NIST SP 800-63B Rev 4 (Digital Identity Guidelines — Authentication & Lifecycle Mgmt)",
|
|
@@ -1309,7 +1819,17 @@
|
|
|
1309
1819
|
"attack_refs": [
|
|
1310
1820
|
"T1078",
|
|
1311
1821
|
"T1059"
|
|
1312
|
-
]
|
|
1822
|
+
],
|
|
1823
|
+
"theater_test": {
|
|
1824
|
+
"claim": "Our digital-identity authentication satisfies NIST SP 800-63B Rev 4 at the targeted AAL.",
|
|
1825
|
+
"test": "Sample 10 admin identities; confirm registered authenticator class is FIDO2/WebAuthn-bound (phishing-resistant). Confirm session re-authentication on high-risk actions. Confirm service-account token lifecycles match the AAL claim (no long-lived bearer tokens for AAL3-claimed scopes). Theater verdict if any admin uses SMS/voice/TOTP for an AAL3-claimed scope, or if AAL3-claimed service accounts use static long-lived tokens.",
|
|
1826
|
+
"evidence_required": [
|
|
1827
|
+
"IdP authenticator export for sampled admins",
|
|
1828
|
+
"session-management policy document",
|
|
1829
|
+
"service-account token lifecycle export"
|
|
1830
|
+
],
|
|
1831
|
+
"verdict_when_failed": "compliance-theater"
|
|
1832
|
+
}
|
|
1313
1833
|
},
|
|
1314
1834
|
"NIST-800-82r3": {
|
|
1315
1835
|
"framework": "NIST SP 800-82 Rev 3 (Guide to OT Security)",
|
|
@@ -1337,7 +1857,17 @@
|
|
|
1337
1857
|
"T0883",
|
|
1338
1858
|
"T0855",
|
|
1339
1859
|
"T1071"
|
|
1340
|
-
]
|
|
1860
|
+
],
|
|
1861
|
+
"theater_test": {
|
|
1862
|
+
"claim": "Our OT environment is secured per NIST SP 800-82 Rev 3 guidance.",
|
|
1863
|
+
"test": "Confirm the OT asset inventory enumerates AI operator assistants, AI-API egress at the IT/OT boundary, and any MCP servers running on engineering workstations. Inspect monitoring rules for AI-prompted operator actions. Theater verdict if AI assets are absent from the OT inventory, or if no monitoring rule alerts on AI-initiated control-system commands.",
|
|
1864
|
+
"evidence_required": [
|
|
1865
|
+
"OT asset inventory with AI subset",
|
|
1866
|
+
"monitoring rule export for AI-prompted operator actions",
|
|
1867
|
+
"engineering workstation MCP-server scan"
|
|
1868
|
+
],
|
|
1869
|
+
"verdict_when_failed": "compliance-theater"
|
|
1870
|
+
}
|
|
1341
1871
|
},
|
|
1342
1872
|
"NIST-AI-RMF-MEASURE-2.5": {
|
|
1343
1873
|
"framework": "NIST AI RMF 1.0",
|
|
@@ -1362,7 +1892,17 @@
|
|
|
1362
1892
|
],
|
|
1363
1893
|
"attack_refs": [
|
|
1364
1894
|
"T1059"
|
|
1365
|
-
]
|
|
1895
|
+
],
|
|
1896
|
+
"theater_test": {
|
|
1897
|
+
"claim": "We map and measure AI risks per NIST AI RMF MEASURE 2.5 including continuous validity assessment.",
|
|
1898
|
+
"test": "Pull the AI risk-measurement plan. Confirm coverage of OWASP LLM Top 10 + ATLAS TTPs + MCP-trust scenarios with explicit measurement cadence. Confirm a metric exists for each category (e.g. prompt-injection success rate, RAG-poisoning detection rate). Inspect the metrics dashboard for actual measurement data within the past quarter. Theater verdict if metrics are defined but unpopulated, or if any of the OWASP/ATLAS/MCP categories has no measurement plan.",
|
|
1899
|
+
"evidence_required": [
|
|
1900
|
+
"AI risk-measurement plan",
|
|
1901
|
+
"metrics dashboard with current quarter data",
|
|
1902
|
+
"ATLAS/OWASP coverage matrix"
|
|
1903
|
+
],
|
|
1904
|
+
"verdict_when_failed": "compliance-theater"
|
|
1905
|
+
}
|
|
1366
1906
|
},
|
|
1367
1907
|
"OWASP-ASVS-v5.0-V14": {
|
|
1368
1908
|
"framework": "OWASP ASVS v5.0",
|
|
@@ -1387,7 +1927,17 @@
|
|
|
1387
1927
|
],
|
|
1388
1928
|
"attack_refs": [
|
|
1389
1929
|
"T1195.001"
|
|
1390
|
-
]
|
|
1930
|
+
],
|
|
1931
|
+
"theater_test": {
|
|
1932
|
+
"claim": "Our application meets OWASP ASVS v5.0 V14 configuration controls.",
|
|
1933
|
+
"test": "For any AI-mediated feature, confirm V14-equivalent controls cover prompt-isolation, output-sanitisation, and tool-grant defaults. Confirm SDK pinning and provider-version pinning where supported. Theater verdict if AI-feature configuration management is informal (no pinned versions, no documented prompt-isolation policy).",
|
|
1934
|
+
"evidence_required": [
|
|
1935
|
+
"AI-feature configuration policy",
|
|
1936
|
+
"SDK + provider version pinning manifest",
|
|
1937
|
+
"prompt-isolation design document"
|
|
1938
|
+
],
|
|
1939
|
+
"verdict_when_failed": "compliance-theater"
|
|
1940
|
+
}
|
|
1391
1941
|
},
|
|
1392
1942
|
"OWASP-LLM-Top-10-2025-LLM01": {
|
|
1393
1943
|
"framework": "OWASP Top 10 for LLM Applications 2025",
|
|
@@ -1414,7 +1964,17 @@
|
|
|
1414
1964
|
"attack_refs": [
|
|
1415
1965
|
"T1059",
|
|
1416
1966
|
"T1071"
|
|
1417
|
-
]
|
|
1967
|
+
],
|
|
1968
|
+
"theater_test": {
|
|
1969
|
+
"claim": "We mitigate prompt injection per OWASP LLM Top 10 LLM01.",
|
|
1970
|
+
"test": "Inspect SDK-level prompt logging; confirm identity binding per call (which user, which agent, which scope). Confirm AI-provider domains are network-allowlisted with business justification. Confirm anomaly detection runs on prompt shape/volume/timing with alerting. Inspect SOC tooling for ATLAS+ATT&CK dual-mapping on LLM01 findings. Theater verdict if prompt logging is absent, allowlists are wildcard, or LLM01 findings are not dual-mapped.",
|
|
1971
|
+
"evidence_required": [
|
|
1972
|
+
"SDK prompt-logging configuration",
|
|
1973
|
+
"AI-provider allowlist with justifications",
|
|
1974
|
+
"anomaly detection rule export with recent alerts"
|
|
1975
|
+
],
|
|
1976
|
+
"verdict_when_failed": "compliance-theater"
|
|
1977
|
+
}
|
|
1418
1978
|
},
|
|
1419
1979
|
"OWASP-LLM-Top-10-2025-LLM02": {
|
|
1420
1980
|
"framework": "OWASP Top 10 for LLM Applications 2025",
|
|
@@ -1439,7 +1999,17 @@
|
|
|
1439
1999
|
"attack_refs": [
|
|
1440
2000
|
"T1059",
|
|
1441
2001
|
"T1530"
|
|
1442
|
-
]
|
|
2002
|
+
],
|
|
2003
|
+
"theater_test": {
|
|
2004
|
+
"claim": "We mitigate insecure output handling per OWASP LLM Top 10 LLM02.",
|
|
2005
|
+
"test": "Inspect every code path that consumes LLM output and routes it to a downstream sink (HTML, SQL, shell, eval, tool dispatch). Confirm sink-specific encoding/escaping or schema validation. Theater verdict if any LLM output reaches a sensitive sink without validation.",
|
|
2006
|
+
"evidence_required": [
|
|
2007
|
+
"LLM-output sink inventory",
|
|
2008
|
+
"output-validation logic per sink",
|
|
2009
|
+
"test cases proving validation fires on malicious payloads"
|
|
2010
|
+
],
|
|
2011
|
+
"verdict_when_failed": "compliance-theater"
|
|
2012
|
+
}
|
|
1443
2013
|
},
|
|
1444
2014
|
"OWASP-LLM-Top-10-2025-LLM06": {
|
|
1445
2015
|
"framework": "OWASP Top 10 for LLM Applications 2025",
|
|
@@ -1467,7 +2037,17 @@
|
|
|
1467
2037
|
"attack_refs": [
|
|
1468
2038
|
"T1195.001",
|
|
1469
2039
|
"T1059"
|
|
1470
|
-
]
|
|
2040
|
+
],
|
|
2041
|
+
"theater_test": {
|
|
2042
|
+
"claim": "We mitigate sensitive information disclosure per OWASP LLM Top 10 LLM06.",
|
|
2043
|
+
"test": "Inspect prompt egress for DLP rules covering PII, credentials, source-code-with-comments, and customer-data identifiers. Run a synthetic prompt containing planted secrets; confirm DLP triggers before egress to the AI provider. Theater verdict if DLP is not on the egress path, or if the synthetic test does not trigger.",
|
|
2044
|
+
"evidence_required": [
|
|
2045
|
+
"DLP rule export for prompt egress",
|
|
2046
|
+
"synthetic prompt test result",
|
|
2047
|
+
"data classification policy"
|
|
2048
|
+
],
|
|
2049
|
+
"verdict_when_failed": "compliance-theater"
|
|
2050
|
+
}
|
|
1471
2051
|
},
|
|
1472
2052
|
"OWASP-LLM-Top-10-2025-LLM08": {
|
|
1473
2053
|
"framework": "OWASP Top 10 for LLM Applications 2025",
|
|
@@ -1493,7 +2073,17 @@
|
|
|
1493
2073
|
"attack_refs": [
|
|
1494
2074
|
"T1565",
|
|
1495
2075
|
"T1530"
|
|
1496
|
-
]
|
|
2076
|
+
],
|
|
2077
|
+
"theater_test": {
|
|
2078
|
+
"claim": "We mitigate excessive agency per OWASP LLM Top 10 LLM08.",
|
|
2079
|
+
"test": "Pick an AI agent in production. Enumerate the tools it can call. For each tool, confirm scope-of-action limits (read-only by default, write requires per-action attestation, destructive requires user confirmation). Theater verdict if any agent has wildcard write access or destructive actions without per-call confirmation.",
|
|
2080
|
+
"evidence_required": [
|
|
2081
|
+
"agent tool inventory with scope limits",
|
|
2082
|
+
"per-action attestation policy",
|
|
2083
|
+
"destructive-action confirmation flow evidence"
|
|
2084
|
+
],
|
|
2085
|
+
"verdict_when_failed": "compliance-theater"
|
|
2086
|
+
}
|
|
1497
2087
|
},
|
|
1498
2088
|
"OWASP-Pen-Testing-Guide-v5": {
|
|
1499
2089
|
"framework": "OWASP Web Security Testing Guide v5 (WSTG)",
|
|
@@ -1524,7 +2114,17 @@
|
|
|
1524
2114
|
"T1195.001",
|
|
1525
2115
|
"T1059",
|
|
1526
2116
|
"T1071"
|
|
1527
|
-
]
|
|
2117
|
+
],
|
|
2118
|
+
"theater_test": {
|
|
2119
|
+
"claim": "Our web app pen-tests follow OWASP WSTG v5 methodology.",
|
|
2120
|
+
"test": "Pull the most-recent pen-test report. Confirm test cases for AI-mediated features (prompt injection in chatbot widgets, AI-augmented input flows, agent-mediated workflows). Confirm tester used WSTG-aligned methodology with explicit AI-test extensions. Theater verdict if AI-mediated features are excluded from the pen-test scope.",
|
|
2121
|
+
"evidence_required": [
|
|
2122
|
+
"pen-test methodology document",
|
|
2123
|
+
"pen-test report covering AI-mediated features",
|
|
2124
|
+
"scope-of-engagement document"
|
|
2125
|
+
],
|
|
2126
|
+
"verdict_when_failed": "compliance-theater"
|
|
2127
|
+
}
|
|
1528
2128
|
},
|
|
1529
2129
|
"PCI-DSS-4.0-6.3.3": {
|
|
1530
2130
|
"framework": "PCI DSS 4.0",
|
|
@@ -1546,7 +2146,17 @@
|
|
|
1546
2146
|
"atlas_refs": [],
|
|
1547
2147
|
"attack_refs": [
|
|
1548
2148
|
"T1068"
|
|
1549
|
-
]
|
|
2149
|
+
],
|
|
2150
|
+
"theater_test": {
|
|
2151
|
+
"claim": "We address security vulnerabilities in custom and bespoke software per PCI DSS 6.3.3.",
|
|
2152
|
+
"test": "Confirm the SDLC includes prompt-injection-class CWE coverage in code review for AI-mediated features. Inspect change tickets for AI-feature changes; confirm reviewer attestation includes AI-class threat sign-off. Theater verdict if AI-mediated changes bypass the prompt-injection threat-review gate.",
|
|
2153
|
+
"evidence_required": [
|
|
2154
|
+
"SDLC document with AI-class CWE coverage",
|
|
2155
|
+
"AI-feature change tickets with reviewer attestation",
|
|
2156
|
+
"code review checklist"
|
|
2157
|
+
],
|
|
2158
|
+
"verdict_when_failed": "compliance-theater"
|
|
2159
|
+
}
|
|
1550
2160
|
},
|
|
1551
2161
|
"PCI-DSS-4.0.1-6.4.3": {
|
|
1552
2162
|
"framework": "PCI DSS 4.0.1 (effective 2025-03-31 — supersedes 4.0)",
|
|
@@ -1572,7 +2182,17 @@
|
|
|
1572
2182
|
"attack_refs": [
|
|
1573
2183
|
"T1059",
|
|
1574
2184
|
"T1195.001"
|
|
1575
|
-
]
|
|
2185
|
+
],
|
|
2186
|
+
"theater_test": {
|
|
2187
|
+
"claim": "We meet PCI DSS 4.0.1 6.4.3 inventory of payment-page scripts.",
|
|
2188
|
+
"test": "Pull the payment-page script inventory. Confirm completeness against a fresh DOM snapshot of the live payment page. Confirm authorisation attestation per script (who approved, when, why). Confirm SRI hashes are pinned per script. Theater verdict if the inventory diverges from the live DOM, or if any script lacks attestation/SRI pinning.",
|
|
2189
|
+
"evidence_required": [
|
|
2190
|
+
"payment-page script inventory",
|
|
2191
|
+
"live DOM snapshot per page",
|
|
2192
|
+
"SRI configuration export"
|
|
2193
|
+
],
|
|
2194
|
+
"verdict_when_failed": "compliance-theater"
|
|
2195
|
+
}
|
|
1576
2196
|
},
|
|
1577
2197
|
"PCI-DSS-4.0.1-11.6.1": {
|
|
1578
2198
|
"framework": "PCI DSS 4.0.1 (effective 2025-03-31)",
|
|
@@ -1594,7 +2214,17 @@
|
|
|
1594
2214
|
],
|
|
1595
2215
|
"attack_refs": [
|
|
1596
2216
|
"T1059"
|
|
1597
|
-
]
|
|
2217
|
+
],
|
|
2218
|
+
"theater_test": {
|
|
2219
|
+
"claim": "We perform tamper detection on payment pages per PCI DSS 4.0.1 11.6.1.",
|
|
2220
|
+
"test": "Confirm tamper-detection cadence is sub-hour, not weekly. Confirm baselines distinguish AI-driven dynamic content from injection. Confirm coverage extends to mobile-app SDKs, kiosks, and agent-mediated checkout. Confirm CSP report-uri + Reporting API correlation. Theater verdict if cadence is weekly, baselining cannot tell legitimate dynamic content from injection, or non-browser surfaces are uncovered.",
|
|
2221
|
+
"evidence_required": [
|
|
2222
|
+
"tamper-detection cadence configuration",
|
|
2223
|
+
"baseline document with AI-aware logic",
|
|
2224
|
+
"CSP report-uri correlation pipeline"
|
|
2225
|
+
],
|
|
2226
|
+
"verdict_when_failed": "compliance-theater"
|
|
2227
|
+
}
|
|
1598
2228
|
},
|
|
1599
2229
|
"PCI-DSS-4.0.1-12.3.3": {
|
|
1600
2230
|
"framework": "PCI DSS 4.0.1 (effective 2025-03-31)",
|
|
@@ -1612,7 +2242,17 @@
|
|
|
1612
2242
|
"opened_date": "2026-05-15",
|
|
1613
2243
|
"evidence_cves": [],
|
|
1614
2244
|
"atlas_refs": [],
|
|
1615
|
-
"attack_refs": []
|
|
2245
|
+
"attack_refs": [],
|
|
2246
|
+
"theater_test": {
|
|
2247
|
+
"claim": "Our cryptographic suite review meets PCI DSS 4.0.1 12.3.3 annual cadence.",
|
|
2248
|
+
"test": "Pull the cryptographic suite inventory and most-recent annual review. Confirm enumeration of in-use algorithms with deprecation status. Confirm a PQC-readiness assessment exists with migration roadmap for long-lived keys (TLS for >5y data, signing for code/SBOM). Theater verdict if PQC is absent from the review, or if deprecated algorithms remain in use without a documented exception.",
|
|
2249
|
+
"evidence_required": [
|
|
2250
|
+
"cryptographic suite inventory",
|
|
2251
|
+
"annual review document with date",
|
|
2252
|
+
"PQC migration roadmap"
|
|
2253
|
+
],
|
|
2254
|
+
"verdict_when_failed": "compliance-theater"
|
|
2255
|
+
}
|
|
1616
2256
|
},
|
|
1617
2257
|
"PCI-DSS-4.0.1-12.10.7": {
|
|
1618
2258
|
"framework": "PCI DSS 4.0.1 (effective 2025-03-31)",
|
|
@@ -1638,7 +2278,17 @@
|
|
|
1638
2278
|
"attack_refs": [
|
|
1639
2279
|
"T1071",
|
|
1640
2280
|
"T1530"
|
|
1641
|
-
]
|
|
2281
|
+
],
|
|
2282
|
+
"theater_test": {
|
|
2283
|
+
"claim": "Our incident response procedures address suspected ransomware per PCI DSS 4.0.1 12.10.7.",
|
|
2284
|
+
"test": "Pull the IR playbook for ransomware. Confirm pre-rehearsed sanctions-screening (OFAC SDN + EU 2014/833 + UK OFSI + AU DFAT + JP MOF) as a precondition to any payment posture. Confirm decryptor-availability lookup, immutability test on backup recovery path, and exfil-before-encrypt detection. Confirm 24h cyber-insurance carrier notification workflow is rehearsed end-to-end. Theater verdict if any of those is undocumented or not exercised in the past 12 months.",
|
|
2285
|
+
"evidence_required": [
|
|
2286
|
+
"ransomware IR playbook with sub-procedures",
|
|
2287
|
+
"tabletop exercise log within past 12 months",
|
|
2288
|
+
"carrier-notification workflow record"
|
|
2289
|
+
],
|
|
2290
|
+
"verdict_when_failed": "compliance-theater"
|
|
2291
|
+
}
|
|
1642
2292
|
},
|
|
1643
2293
|
"PSD2-RTS-SCA": {
|
|
1644
2294
|
"framework": "EU PSD2 Regulatory Technical Standards on Strong Customer Authentication (Commission Delegated Regulation (EU) 2018/389)",
|
|
@@ -1664,7 +2314,17 @@
|
|
|
1664
2314
|
"attack_refs": [
|
|
1665
2315
|
"T1078",
|
|
1666
2316
|
"T1059"
|
|
1667
|
-
]
|
|
2317
|
+
],
|
|
2318
|
+
"theater_test": {
|
|
2319
|
+
"claim": "Our payment authentication satisfies PSD2 RTS-SCA strong customer authentication requirements.",
|
|
2320
|
+
"test": "Inventory payment-initiation flows. For any AI-mediated initiation (agent-initiated transactions, copilot-drafted payments), confirm an explicit delegated-authority attestation per transaction class with scope (amount, counterparty, frequency). Confirm a distinct audit indicator marks AI-mediated transactions. Theater verdict if AI initiations inherit the human-user SCA evidence path without delegated-authority attestation.",
|
|
2321
|
+
"evidence_required": [
|
|
2322
|
+
"payment-initiation flow inventory",
|
|
2323
|
+
"delegated-authority policy document",
|
|
2324
|
+
"audit log sample with AI-mediated indicator"
|
|
2325
|
+
],
|
|
2326
|
+
"verdict_when_failed": "compliance-theater"
|
|
2327
|
+
}
|
|
1668
2328
|
},
|
|
1669
2329
|
"PTES-Pre-engagement": {
|
|
1670
2330
|
"framework": "Penetration Testing Execution Standard (PTES)",
|
|
@@ -1692,7 +2352,17 @@
|
|
|
1692
2352
|
"attack_refs": [
|
|
1693
2353
|
"T1195.001",
|
|
1694
2354
|
"T1071"
|
|
1695
|
-
]
|
|
2355
|
+
],
|
|
2356
|
+
"theater_test": {
|
|
2357
|
+
"claim": "Our pen-test scoping follows PTES pre-engagement methodology.",
|
|
2358
|
+
"test": "Pull the most-recent PTES scoping document. Confirm AI/MCP assets are enumerated, AI-class attack vectors are in-scope, and the rules-of-engagement permit prompt-injection and MCP-trust testing. Confirm tester competency on AI-class attacks. Theater verdict if AI/MCP is excluded from scope, or if rules-of-engagement prohibit AI-class testing without documented justification.",
|
|
2359
|
+
"evidence_required": [
|
|
2360
|
+
"PTES scoping document",
|
|
2361
|
+
"rules-of-engagement document",
|
|
2362
|
+
"tester competency CV"
|
|
2363
|
+
],
|
|
2364
|
+
"verdict_when_failed": "compliance-theater"
|
|
2365
|
+
}
|
|
1696
2366
|
},
|
|
1697
2367
|
"SLSA-v1.0-Build-L3": {
|
|
1698
2368
|
"framework": "SLSA v1.0 (Supply-chain Levels for Software Artifacts) — Build Track",
|
|
@@ -1720,7 +2390,17 @@
|
|
|
1720
2390
|
"attack_refs": [
|
|
1721
2391
|
"T1195.001",
|
|
1722
2392
|
"T1195.002"
|
|
1723
|
-
]
|
|
2393
|
+
],
|
|
2394
|
+
"theater_test": {
|
|
2395
|
+
"claim": "Our build pipeline is SLSA Build L3 with non-falsifiable provenance signed by a hardened build platform.",
|
|
2396
|
+
"test": "Pull the SLSA provenance attestation for the most-recent release. Confirm the build platform is hosted/hardened, the attestation is signed, and the materials cover the full source-of-truth. Then confirm AI-authorship attestation (per-block provenance for AI-generated code with reviewer identity) is present. Confirm any model artefacts shipped have a Model Track equivalent attestation. Theater verdict if attestations exist but AI-authored diffs lack reviewer attestation, or if model artefacts ship at SLSA L0/L1 equivalent without explicit model-track attestation.",
|
|
2397
|
+
"evidence_required": [
|
|
2398
|
+
"SLSA provenance attestation for latest release",
|
|
2399
|
+
"AI-authorship attestation policy and recent merge sample",
|
|
2400
|
+
"model-track attestation if model artefacts shipped"
|
|
2401
|
+
],
|
|
2402
|
+
"verdict_when_failed": "compliance-theater"
|
|
2403
|
+
}
|
|
1724
2404
|
},
|
|
1725
2405
|
"SOC2-CC6-logical-access": {
|
|
1726
2406
|
"framework": "SOC 2 (AICPA Trust Services Criteria)",
|
|
@@ -1741,7 +2421,17 @@
|
|
|
1741
2421
|
"atlas_refs": [
|
|
1742
2422
|
"AML.T0051"
|
|
1743
2423
|
],
|
|
1744
|
-
"attack_refs": []
|
|
2424
|
+
"attack_refs": [],
|
|
2425
|
+
"theater_test": {
|
|
2426
|
+
"claim": "Our SOC 2 CC6 logical and physical access controls cover all in-scope systems.",
|
|
2427
|
+
"test": "Sample AI-agent invocation flows. Confirm authorisation-context evidence per invocation (scope, tools, data sensitivity). Confirm prompt logging captures sufficient detail for post-incident analysis (input chain, output, tool calls). Confirm anomaly detection alerts on AI-agent actions outside baseline. Theater verdict if AI-agent actions are not separately authorised, prompts are unlogged, or anomaly detection is absent.",
|
|
2428
|
+
"evidence_required": [
|
|
2429
|
+
"AI-agent authorisation-context policy",
|
|
2430
|
+
"prompt-logging configuration with retention",
|
|
2431
|
+
"anomaly-detection rule export"
|
|
2432
|
+
],
|
|
2433
|
+
"verdict_when_failed": "compliance-theater"
|
|
2434
|
+
}
|
|
1745
2435
|
},
|
|
1746
2436
|
"SOC2-CC7-anomaly-detection": {
|
|
1747
2437
|
"framework": "SOC 2 (AICPA Trust Services Criteria)",
|
|
@@ -1765,7 +2455,17 @@
|
|
|
1765
2455
|
"attack_refs": [
|
|
1766
2456
|
"T1071",
|
|
1767
2457
|
"T1059"
|
|
1768
|
-
]
|
|
2458
|
+
],
|
|
2459
|
+
"theater_test": {
|
|
2460
|
+
"claim": "Our SOC 2 CC7 system monitoring detects anomalous behaviour.",
|
|
2461
|
+
"test": "Inspect monitoring rules for AI-class anomalies (prompt injection patterns, RAG-corpus drift, agent action volume spikes, tool-call sequence deviations). Confirm at least one alert per class triggered in the past 90 days; confirm triage records exist. Theater verdict if AI-class anomaly rules are absent, or if no alerts triggered despite AI being in production for 90+ days.",
|
|
2462
|
+
"evidence_required": [
|
|
2463
|
+
"AI-class anomaly rule export",
|
|
2464
|
+
"alert-triage records past 90 days",
|
|
2465
|
+
"telemetry volume report"
|
|
2466
|
+
],
|
|
2467
|
+
"verdict_when_failed": "compliance-theater"
|
|
2468
|
+
}
|
|
1769
2469
|
},
|
|
1770
2470
|
"SOC2-CC9-vendor-management": {
|
|
1771
2471
|
"framework": "SOC 2 (AICPA Trust Services Criteria)",
|
|
@@ -1789,7 +2489,17 @@
|
|
|
1789
2489
|
],
|
|
1790
2490
|
"attack_refs": [
|
|
1791
2491
|
"T1195.001"
|
|
1792
|
-
]
|
|
2492
|
+
],
|
|
2493
|
+
"theater_test": {
|
|
2494
|
+
"claim": "Our SOC 2 CC9 vendor management covers all third parties with system access.",
|
|
2495
|
+
"test": "Pull the vendor register. Filter for AI providers; confirm AI-specific contractual clauses (prompt retention, training opt-out, residency, sub-processor disclosure, breach notification). Confirm self-signup AI usage by employees is policy-prohibited and detection is in place. Theater verdict if AI vendors have generic SaaS contracts without AI clauses, or if self-signup is undetected.",
|
|
2496
|
+
"evidence_required": [
|
|
2497
|
+
"vendor register AI subset",
|
|
2498
|
+
"AI-vendor contract clause checklist",
|
|
2499
|
+
"self-signup detection telemetry"
|
|
2500
|
+
],
|
|
2501
|
+
"verdict_when_failed": "compliance-theater"
|
|
2502
|
+
}
|
|
1793
2503
|
},
|
|
1794
2504
|
"SPDX-v3.0-SBOM": {
|
|
1795
2505
|
"framework": "SPDX v3.0 (ISO/IEC 5962-aligned SBOM standard)",
|
|
@@ -1815,7 +2525,17 @@
|
|
|
1815
2525
|
],
|
|
1816
2526
|
"attack_refs": [
|
|
1817
2527
|
"T1195.001"
|
|
1818
|
-
]
|
|
2528
|
+
],
|
|
2529
|
+
"theater_test": {
|
|
2530
|
+
"claim": "We publish SPDX 3.0 SBOMs and they include AI-BOM coverage per the AI profile.",
|
|
2531
|
+
"test": "Pull the SPDX 3.0 document for the most recent release. Confirm the `Build` profile and `AI` profile are both declared. Inspect AI-profile sections for populated `useSensitivePersonalInformation`, `safetyRiskAssessment`, `modelDataPreprocessing`, and training-data fields. Cross-walk SPDX AI-BOM identifiers against CycloneDX ML-BOM identifiers to confirm consistency. Theater verdict if the AI profile is declared but key fields are empty, or if SPDX↔CycloneDX cross-walk produces conflicting model identities.",
|
|
2532
|
+
"evidence_required": [
|
|
2533
|
+
"latest SPDX 3.0 document with profile declarations",
|
|
2534
|
+
"AI-profile field-population coverage report",
|
|
2535
|
+
"SPDX↔CycloneDX cross-walk mapping"
|
|
2536
|
+
],
|
|
2537
|
+
"verdict_when_failed": "compliance-theater"
|
|
2538
|
+
}
|
|
1819
2539
|
},
|
|
1820
2540
|
"SWIFT-CSCF-v2026-1.1": {
|
|
1821
2541
|
"framework": "SWIFT Customer Security Controls Framework v2026",
|
|
@@ -1842,7 +2562,17 @@
|
|
|
1842
2562
|
"attack_refs": [
|
|
1843
2563
|
"T1071",
|
|
1844
2564
|
"T1078"
|
|
1845
|
-
]
|
|
2565
|
+
],
|
|
2566
|
+
"theater_test": {
|
|
2567
|
+
"claim": "Our SWIFT secure zone is segregated and protected per CSCF v2026 1.1.",
|
|
2568
|
+
"test": "Inspect the secure-zone policy. Confirm explicit prohibition or strict gating of LLM assistants inside the secure zone. Confirm AI-API egress from administrative jump zones is enumerated as a named conduit with monitoring. Confirm AI-generated MT/MX message drafts are flagged as a distinct review class. Cross-walk to DORA Art. 28 register. Theater verdict if LLM assistants are silently permitted, AI-API egress is unmonitored, or no DORA cross-walk exists.",
|
|
2569
|
+
"evidence_required": [
|
|
2570
|
+
"secure-zone policy document",
|
|
2571
|
+
"AI-API egress monitoring configuration",
|
|
2572
|
+
"DORA Art. 28 cross-walk record"
|
|
2573
|
+
],
|
|
2574
|
+
"verdict_when_failed": "compliance-theater"
|
|
2575
|
+
}
|
|
1846
2576
|
},
|
|
1847
2577
|
"UK-CAF-A1": {
|
|
1848
2578
|
"framework": "UK NCSC Cyber Assessment Framework v3.2",
|
|
@@ -1863,7 +2593,17 @@
|
|
|
1863
2593
|
"atlas_refs": [
|
|
1864
2594
|
"AML.T0010"
|
|
1865
2595
|
],
|
|
1866
|
-
"attack_refs": []
|
|
2596
|
+
"attack_refs": [],
|
|
2597
|
+
"theater_test": {
|
|
2598
|
+
"claim": "Our governance satisfies UK CAF A1 with board-level cyber risk accountability.",
|
|
2599
|
+
"test": "Pull the board governance pack. Confirm an AI-systems-in-use inventory is reviewed at board cadence, an MCP/plugin trust register exists, and accountability for AI security outcomes maps to a named executive in the NIS2/CCRA scope. Theater verdict if AI is absent from board-pack contents, or if AI accountability is unassigned at executive level.",
|
|
2600
|
+
"evidence_required": [
|
|
2601
|
+
"board governance pack table-of-contents",
|
|
2602
|
+
"AI-systems inventory with board-review cadence",
|
|
2603
|
+
"executive accountability matrix"
|
|
2604
|
+
],
|
|
2605
|
+
"verdict_when_failed": "compliance-theater"
|
|
2606
|
+
}
|
|
1867
2607
|
},
|
|
1868
2608
|
"UK-CAF-B2": {
|
|
1869
2609
|
"framework": "UK NCSC Cyber Assessment Framework v3.2",
|
|
@@ -1888,7 +2628,17 @@
|
|
|
1888
2628
|
],
|
|
1889
2629
|
"attack_refs": [
|
|
1890
2630
|
"T1078"
|
|
1891
|
-
]
|
|
2631
|
+
],
|
|
2632
|
+
"theater_test": {
|
|
2633
|
+
"claim": "Our identity and access management satisfies UK CAF B2.",
|
|
2634
|
+
"test": "Inventory identities including AI-agent service accounts. Confirm authentication strength matches sensitivity (FIDO2 for admin, scope-limited tokens for agents). Confirm continuous verification, not just provisioning-time. Theater verdict if AI-agent accounts use long-lived bearer tokens for admin-equivalent scope, or if verification is provisioning-only.",
|
|
2635
|
+
"evidence_required": [
|
|
2636
|
+
"identity inventory including AI agents",
|
|
2637
|
+
"authentication-strength policy",
|
|
2638
|
+
"continuous-verification configuration"
|
|
2639
|
+
],
|
|
2640
|
+
"verdict_when_failed": "compliance-theater"
|
|
2641
|
+
}
|
|
1892
2642
|
},
|
|
1893
2643
|
"UK-CAF-C1": {
|
|
1894
2644
|
"framework": "UK NCSC Cyber Assessment Framework v3.2",
|
|
@@ -1914,7 +2664,17 @@
|
|
|
1914
2664
|
],
|
|
1915
2665
|
"attack_refs": [
|
|
1916
2666
|
"T1567"
|
|
1917
|
-
]
|
|
2667
|
+
],
|
|
2668
|
+
"theater_test": {
|
|
2669
|
+
"claim": "Our security monitoring satisfies UK CAF C1 across essential service flows.",
|
|
2670
|
+
"test": "Pull the monitoring coverage matrix. Confirm AI-API egress, MCP server invocations, and AI-agent action telemetry are ingested. Confirm alerting on AI-class anomalies has triaged alerts in the past 90 days. Theater verdict if any AI source class is unmonitored or if no AI-class alert has been triaged despite production AI activity.",
|
|
2671
|
+
"evidence_required": [
|
|
2672
|
+
"monitoring coverage matrix",
|
|
2673
|
+
"AI-source ingestion configuration",
|
|
2674
|
+
"alert-triage records past 90 days"
|
|
2675
|
+
],
|
|
2676
|
+
"verdict_when_failed": "compliance-theater"
|
|
2677
|
+
}
|
|
1918
2678
|
},
|
|
1919
2679
|
"UK-CAF-D1": {
|
|
1920
2680
|
"framework": "UK NCSC Cyber Assessment Framework v3.2",
|
|
@@ -1937,7 +2697,17 @@
|
|
|
1937
2697
|
"atlas_refs": [],
|
|
1938
2698
|
"attack_refs": [
|
|
1939
2699
|
"T1068"
|
|
1940
|
-
]
|
|
2700
|
+
],
|
|
2701
|
+
"theater_test": {
|
|
2702
|
+
"claim": "Our response and recovery planning satisfies UK CAF D1.",
|
|
2703
|
+
"test": "Pull the incident response plan. Confirm AI-incident scenarios (prompt-injection RCE, RAG-poisoning, agent-action-on-injected-intent, AI-API supply-chain compromise) are exercised in the past 12 months. Confirm the plan integrates with NIS2 24h notification timing. Theater verdict if AI scenarios are absent from the exercise catalogue, or if NIS2 timing is not integrated.",
|
|
2704
|
+
"evidence_required": [
|
|
2705
|
+
"incident response plan",
|
|
2706
|
+
"exercise catalogue with execution dates",
|
|
2707
|
+
"NIS2 timing integration document"
|
|
2708
|
+
],
|
|
2709
|
+
"verdict_when_failed": "compliance-theater"
|
|
2710
|
+
}
|
|
1941
2711
|
},
|
|
1942
2712
|
"VEX-CSAF-v2.1": {
|
|
1943
2713
|
"framework": "VEX via OASIS CSAF 2.1 (Common Security Advisory Framework)",
|
|
@@ -1963,7 +2733,17 @@
|
|
|
1963
2733
|
],
|
|
1964
2734
|
"attack_refs": [
|
|
1965
2735
|
"T1195.001"
|
|
1966
|
-
]
|
|
2736
|
+
],
|
|
2737
|
+
"theater_test": {
|
|
2738
|
+
"claim": "We publish VEX statements via OASIS CSAF 2.1 for our products.",
|
|
2739
|
+
"test": "Pull the published CSAF 2.1 documents. Confirm AI-component identifier scheme presence (model + version + adapters + tokenizer). Confirm at least one VEX statement covers an AI-class vulnerability (jailbreak, prompt injection, embedding inversion). Confirm chaining of base-model VEX statements to derived-model VEX statements where applicable. Theater verdict if AI components are absent from the identifier scheme, or if no AI-class VEX statements exist despite AI components shipping.",
|
|
2740
|
+
"evidence_required": [
|
|
2741
|
+
"CSAF 2.1 published documents",
|
|
2742
|
+
"AI-component identifier mapping",
|
|
2743
|
+
"VEX chain example for base→derived model"
|
|
2744
|
+
],
|
|
2745
|
+
"verdict_when_failed": "compliance-theater"
|
|
2746
|
+
}
|
|
1967
2747
|
},
|
|
1968
2748
|
"FCC-CPNI-4.1": {
|
|
1969
2749
|
"framework": "FCC-CPNI",
|
|
@@ -1980,8 +2760,24 @@
|
|
|
1980
2760
|
"status": "open",
|
|
1981
2761
|
"opened_date": "2026-05-15",
|
|
1982
2762
|
"evidence_cves": [],
|
|
1983
|
-
"atlas_refs": [
|
|
1984
|
-
|
|
2763
|
+
"atlas_refs": [
|
|
2764
|
+
"AML.T0040"
|
|
2765
|
+
],
|
|
2766
|
+
"attack_refs": [
|
|
2767
|
+
"T1078",
|
|
2768
|
+
"T1098",
|
|
2769
|
+
"T1199"
|
|
2770
|
+
],
|
|
2771
|
+
"theater_test": {
|
|
2772
|
+
"claim": "Our annual CPNI certification satisfies FCC CPNI obligations.",
|
|
2773
|
+
"test": "Confirm quarterly LI-gateway activation auditing (Salt-Typhoon/PRC threat model). Confirm gNB firmware hash attestation and signaling-anomaly baselines per PLMN-pair. Pull the most recent CPNI certification; confirm those operational artefacts are referenced. Theater verdict if certification is annual-only without LI-gateway/firmware-hash/signaling artefacts.",
|
|
2774
|
+
"evidence_required": [
|
|
2775
|
+
"LI-gateway audit log",
|
|
2776
|
+
"gNB firmware hash telemetry",
|
|
2777
|
+
"signaling baseline document"
|
|
2778
|
+
],
|
|
2779
|
+
"verdict_when_failed": "compliance-theater"
|
|
2780
|
+
}
|
|
1985
2781
|
},
|
|
1986
2782
|
"FCC-Cyber-Incident-Notification-2024": {
|
|
1987
2783
|
"framework": "FCC",
|
|
@@ -1999,7 +2795,20 @@
|
|
|
1999
2795
|
"opened_date": "2026-05-15",
|
|
2000
2796
|
"evidence_cves": [],
|
|
2001
2797
|
"atlas_refs": [],
|
|
2002
|
-
"attack_refs": [
|
|
2798
|
+
"attack_refs": [
|
|
2799
|
+
"T1199",
|
|
2800
|
+
"T1078"
|
|
2801
|
+
],
|
|
2802
|
+
"theater_test": {
|
|
2803
|
+
"claim": "We can meet the FCC 2024 cyber incident notification rule for telecom carriers.",
|
|
2804
|
+
"test": "Run a tabletop with a synthetic significant-incident inject affecting CPNI. Stopwatch elapsed time to a draft FCC notification. Confirm cross-walk to NIS2 24h / DORA 4h timing for multinational operators. Theater verdict if no on-call is named, the playbook hasn't been exercised in 12 months, or cross-walks are absent.",
|
|
2805
|
+
"evidence_required": [
|
|
2806
|
+
"tabletop execution log",
|
|
2807
|
+
"FCC notification draft",
|
|
2808
|
+
"cross-jurisdiction timing matrix"
|
|
2809
|
+
],
|
|
2810
|
+
"verdict_when_failed": "compliance-theater"
|
|
2811
|
+
}
|
|
2003
2812
|
},
|
|
2004
2813
|
"NIS2-Annex-I-Telecom": {
|
|
2005
2814
|
"framework": "NIS2",
|
|
@@ -2016,8 +2825,24 @@
|
|
|
2016
2825
|
"status": "open",
|
|
2017
2826
|
"opened_date": "2026-05-15",
|
|
2018
2827
|
"evidence_cves": [],
|
|
2019
|
-
"atlas_refs": [
|
|
2020
|
-
|
|
2828
|
+
"atlas_refs": [
|
|
2829
|
+
"AML.T0040"
|
|
2830
|
+
],
|
|
2831
|
+
"attack_refs": [
|
|
2832
|
+
"T1199",
|
|
2833
|
+
"T1078",
|
|
2834
|
+
"T1098"
|
|
2835
|
+
],
|
|
2836
|
+
"theater_test": {
|
|
2837
|
+
"claim": "Our NIS2 Annex I telecom obligations are satisfied; signaling and LI-system risks are managed.",
|
|
2838
|
+
"test": "Confirm gNB firmware hash attestation pipeline runs continuously across the production fleet. Confirm signaling-anomaly baselines exist per PLMN-pair and that anomalies trigger SOC tickets. Confirm LI-gateway activation auditing runs at least quarterly. Theater verdict if any of those streams are absent, or if no signaling anomaly has been triaged in 90 days despite carrier-pair traffic.",
|
|
2839
|
+
"evidence_required": [
|
|
2840
|
+
"gNB firmware hash attestation telemetry",
|
|
2841
|
+
"signaling-anomaly baseline document and recent alerts",
|
|
2842
|
+
"LI-gateway activation audit log"
|
|
2843
|
+
],
|
|
2844
|
+
"verdict_when_failed": "compliance-theater"
|
|
2845
|
+
}
|
|
2021
2846
|
},
|
|
2022
2847
|
"DORA-Art-21-Telecom-ICT": {
|
|
2023
2848
|
"framework": "DORA",
|
|
@@ -2035,7 +2860,19 @@
|
|
|
2035
2860
|
"opened_date": "2026-05-15",
|
|
2036
2861
|
"evidence_cves": [],
|
|
2037
2862
|
"atlas_refs": [],
|
|
2038
|
-
"attack_refs": [
|
|
2863
|
+
"attack_refs": [
|
|
2864
|
+
"T1199"
|
|
2865
|
+
],
|
|
2866
|
+
"theater_test": {
|
|
2867
|
+
"claim": "Our telecom ICT third-party arrangements satisfy DORA Art. 21.",
|
|
2868
|
+
"test": "Pull the Art. 21 ICT register; filter for telecom-class providers (carriers, MVNOs, SMS gateways, voice carriers). Confirm enumeration of LI-gateway access risk, signaling-protocol exposure (SS7/Diameter/HTTP/2 for 5G), and sub-carrier visibility into CIF flows. Theater verdict if telecom providers appear only as 'connectivity vendors' without carrier-class threat-model entries, or if no concentration analysis exists across telecom providers.",
|
|
2869
|
+
"evidence_required": [
|
|
2870
|
+
"Art. 21 ICT register telecom subset",
|
|
2871
|
+
"carrier-class threat-model document",
|
|
2872
|
+
"concentration analysis report"
|
|
2873
|
+
],
|
|
2874
|
+
"verdict_when_failed": "compliance-theater"
|
|
2875
|
+
}
|
|
2039
2876
|
},
|
|
2040
2877
|
"UK-CAF-B5": {
|
|
2041
2878
|
"framework": "UK-CAF",
|
|
@@ -2053,7 +2890,20 @@
|
|
|
2053
2890
|
"opened_date": "2026-05-15",
|
|
2054
2891
|
"evidence_cves": [],
|
|
2055
2892
|
"atlas_refs": [],
|
|
2056
|
-
"attack_refs": [
|
|
2893
|
+
"attack_refs": [
|
|
2894
|
+
"T1199",
|
|
2895
|
+
"T1078"
|
|
2896
|
+
],
|
|
2897
|
+
"theater_test": {
|
|
2898
|
+
"claim": "Our resilient telecom networks satisfy UK CAF B5.",
|
|
2899
|
+
"test": "Confirm gNB firmware hash attestation is continuous, signaling-anomaly baselines exist per PLMN-pair, and LI-gateway access auditing is in place. Confirm sub-carrier visibility risks are documented. Theater verdict if any of those streams are missing or if no signaling anomaly has been triaged in 90 days despite carrier-pair traffic.",
|
|
2900
|
+
"evidence_required": [
|
|
2901
|
+
"gNB attestation telemetry",
|
|
2902
|
+
"signaling baseline document",
|
|
2903
|
+
"LI-gateway audit log"
|
|
2904
|
+
],
|
|
2905
|
+
"verdict_when_failed": "compliance-theater"
|
|
2906
|
+
}
|
|
2057
2907
|
},
|
|
2058
2908
|
"AU-ISM-1556": {
|
|
2059
2909
|
"framework": "au-ism",
|
|
@@ -2071,7 +2921,20 @@
|
|
|
2071
2921
|
"opened_date": "2026-05-15",
|
|
2072
2922
|
"evidence_cves": [],
|
|
2073
2923
|
"atlas_refs": [],
|
|
2074
|
-
"attack_refs": [
|
|
2924
|
+
"attack_refs": [
|
|
2925
|
+
"T1078",
|
|
2926
|
+
"T1098"
|
|
2927
|
+
],
|
|
2928
|
+
"theater_test": {
|
|
2929
|
+
"claim": "Our telecom posture satisfies AU ISM control 1556 for signaling-protocol abuse.",
|
|
2930
|
+
"test": "Confirm signaling-anomaly baselines per PLMN-pair, gNB firmware hash attestation, and LI-gateway audit. Pull the past 90 days of signaling alerts; confirm triage records. Theater verdict if any of those streams is missing, or if signaling anomalies are unmonitored.",
|
|
2931
|
+
"evidence_required": [
|
|
2932
|
+
"signaling baseline document with PLMN-pair coverage",
|
|
2933
|
+
"gNB attestation telemetry",
|
|
2934
|
+
"alert-triage records"
|
|
2935
|
+
],
|
|
2936
|
+
"verdict_when_failed": "compliance-theater"
|
|
2937
|
+
}
|
|
2075
2938
|
},
|
|
2076
2939
|
"GSMA-NESAS-Deployment": {
|
|
2077
2940
|
"framework": "GSMA-NESAS",
|
|
@@ -2089,7 +2952,19 @@
|
|
|
2089
2952
|
"opened_date": "2026-05-15",
|
|
2090
2953
|
"evidence_cves": [],
|
|
2091
2954
|
"atlas_refs": [],
|
|
2092
|
-
"attack_refs": [
|
|
2955
|
+
"attack_refs": [
|
|
2956
|
+
"T1199"
|
|
2957
|
+
],
|
|
2958
|
+
"theater_test": {
|
|
2959
|
+
"claim": "Our telecom equipment is GSMA NESAS-certified across the network.",
|
|
2960
|
+
"test": "Confirm NESAS product-time certification AND operator-attested-runtime gNB hash AND EMS/OSS NESAS-equivalent scheme. Confirm firmware-update cadence triggers recertification attestation. Theater verdict if certification is product-time-only without runtime-attestation, or if firmware updates bypass recertification.",
|
|
2961
|
+
"evidence_required": [
|
|
2962
|
+
"NESAS certification per product",
|
|
2963
|
+
"runtime-attestation telemetry",
|
|
2964
|
+
"firmware-update → recertification mapping"
|
|
2965
|
+
],
|
|
2966
|
+
"verdict_when_failed": "compliance-theater"
|
|
2967
|
+
}
|
|
2093
2968
|
},
|
|
2094
2969
|
"3GPP-TR-33.926": {
|
|
2095
2970
|
"framework": "3GPP",
|
|
@@ -2107,7 +2982,19 @@
|
|
|
2107
2982
|
"opened_date": "2026-05-15",
|
|
2108
2983
|
"evidence_cves": [],
|
|
2109
2984
|
"atlas_refs": [],
|
|
2110
|
-
"attack_refs": [
|
|
2985
|
+
"attack_refs": [
|
|
2986
|
+
"T1199"
|
|
2987
|
+
],
|
|
2988
|
+
"theater_test": {
|
|
2989
|
+
"claim": "Our 5G gNB security posture aligns with 3GPP TR 33.926 threat-model assumptions.",
|
|
2990
|
+
"test": "Inspect deployment posture against TR 33.926 threats. Confirm runtime gNB integrity attestation and that LI-system compromise paths and signaling-protocol-abuse paths are addressed. Theater verdict if attestation is product-time-only or LI/signaling threats are not deployment-checklisted.",
|
|
2991
|
+
"evidence_required": [
|
|
2992
|
+
"TR 33.926 → deployment-posture mapping",
|
|
2993
|
+
"runtime gNB attestation telemetry",
|
|
2994
|
+
"LI/signaling threat-treatment document"
|
|
2995
|
+
],
|
|
2996
|
+
"verdict_when_failed": "compliance-theater"
|
|
2997
|
+
}
|
|
2111
2998
|
},
|
|
2112
2999
|
"ITU-T-X.805": {
|
|
2113
3000
|
"framework": "ITU-T",
|
|
@@ -2125,6 +3012,709 @@
|
|
|
2125
3012
|
"opened_date": "2026-05-15",
|
|
2126
3013
|
"evidence_cves": [],
|
|
2127
3014
|
"atlas_refs": [],
|
|
2128
|
-
"attack_refs": [
|
|
3015
|
+
"attack_refs": [
|
|
3016
|
+
"T1199"
|
|
3017
|
+
],
|
|
3018
|
+
"theater_test": {
|
|
3019
|
+
"claim": "Our network security architecture follows ITU-T X.805 8-dimension framing.",
|
|
3020
|
+
"test": "Pull the X.805 architecture document. Confirm modern-threat-model annexes covering LI-system compromise, signaling-protocol abuse, and slice-isolation are present. Confirm a deployment-validation checklist exists and was executed in the past year. Theater verdict if annexes are absent or the deployment checklist has never been executed.",
|
|
3021
|
+
"evidence_required": [
|
|
3022
|
+
"X.805 architecture document with annexes",
|
|
3023
|
+
"deployment-validation checklist execution log",
|
|
3024
|
+
"slice-isolation test results"
|
|
3025
|
+
],
|
|
3026
|
+
"verdict_when_failed": "compliance-theater"
|
|
3027
|
+
}
|
|
3028
|
+
},
|
|
3029
|
+
"NIST-800-53-IA-5-Federated": {
|
|
3030
|
+
"framework": "NIST 800-53 Rev.5",
|
|
3031
|
+
"control_id": "IA-5 (federated)",
|
|
3032
|
+
"control_name": "Authenticator Management — federated-trust extension",
|
|
3033
|
+
"designed_for": "IA-5 governs authenticator issuance, distribution, storage, revocation, and replacement at the system layer.",
|
|
3034
|
+
"misses": [
|
|
3035
|
+
"Federated-trust modification at the IdP control plane (token-signing certificate rotation, claim-transformation rule changes, OIDC discovery-document tampering) is outside the IA-5 evidence path",
|
|
3036
|
+
"IA-5 evidence is satisfied by a quarterly authenticator inventory snapshot; an attacker who modifies the federation in week 5 produces eight weeks of compliant audit trail before the next snapshot",
|
|
3037
|
+
"Management-API tokens that bypass the human-MFA gate (Okta API tokens, Entra app secrets, Auth0 management API tokens) are not enumerated as IA-5 authenticators by most implementations"
|
|
3038
|
+
],
|
|
3039
|
+
"real_requirement": "Extend IA-5 to the IdP control plane: continuous attestation of token-signing certificate fingerprints + claim-transformation rule baseline + per-modification change-control attestation + management-API-token inventory with TTL + scope + source-IP enforcement.",
|
|
3040
|
+
"status": "open",
|
|
3041
|
+
"opened_date": "2026-05-15",
|
|
3042
|
+
"evidence_cves": [],
|
|
3043
|
+
"atlas_refs": [],
|
|
3044
|
+
"attack_refs": [
|
|
3045
|
+
"T1556.007",
|
|
3046
|
+
"T1098.001",
|
|
3047
|
+
"T1606.002"
|
|
3048
|
+
],
|
|
3049
|
+
"theater_test": {
|
|
3050
|
+
"claim": "Our IA-5 authenticator management covers federated identity providers.",
|
|
3051
|
+
"test": "Inspect IdP control-plane: continuous attestation of token-signing certificate fingerprints, claim-transformation rule baseline with per-modification change-control attestation, management-API-token inventory with TTL + scope + source-IP enforcement. Theater verdict if attestation is snapshot-only (quarterly) rather than continuous, or if management-API tokens lack TTL/scope/source-IP enforcement.",
|
|
3052
|
+
"evidence_required": [
|
|
3053
|
+
"IdP token-signing fingerprint telemetry",
|
|
3054
|
+
"claim-transformation change log",
|
|
3055
|
+
"management-API token inventory"
|
|
3056
|
+
],
|
|
3057
|
+
"verdict_when_failed": "compliance-theater"
|
|
3058
|
+
}
|
|
3059
|
+
},
|
|
3060
|
+
"ISO-27001-2022-A.5.16-Federated": {
|
|
3061
|
+
"framework": "ISO/IEC 27001:2022",
|
|
3062
|
+
"control_id": "A.5.16 + A.5.17",
|
|
3063
|
+
"control_name": "Identity Management + Authentication Information — federated-state extension",
|
|
3064
|
+
"designed_for": "A.5.16 governs identity lifecycle (provisioning, modification, deprovisioning); A.5.17 governs the protection of authentication information.",
|
|
3065
|
+
"misses": [
|
|
3066
|
+
"Both controls cover static identity state — was the account provisioned, was MFA enrolled, was the password rotated",
|
|
3067
|
+
"Federated-state transitions (OAuth consent grants, cross-tenant access settings, federated-trust modification) are not enumerated as a distinct control class",
|
|
3068
|
+
"An ISO 27001:2022 audit can pass with zero evidence on the federated state of the IdP tenant"
|
|
3069
|
+
],
|
|
3070
|
+
"real_requirement": "Add a control-objective footnote requiring inventory of OAuth consent grants + federated-trust configuration + cross-tenant access settings, with documented change-control for each modification and continuous alerting on high-risk grants.",
|
|
3071
|
+
"status": "open",
|
|
3072
|
+
"opened_date": "2026-05-15",
|
|
3073
|
+
"evidence_cves": [],
|
|
3074
|
+
"atlas_refs": [],
|
|
3075
|
+
"attack_refs": [
|
|
3076
|
+
"T1098.001",
|
|
3077
|
+
"T1199"
|
|
3078
|
+
],
|
|
3079
|
+
"theater_test": {
|
|
3080
|
+
"claim": "Our identity management satisfies ISO 27001:2022 A.5.16 across federated systems.",
|
|
3081
|
+
"test": "Confirm IdP-tenant lifecycle management: tenant-admin discovery, off-boarding alerts, dormant-tenant alerts, claim-transformation review cadence. Theater verdict if dormant tenants exist with no alerting, or if claim transformations have no review cadence.",
|
|
3082
|
+
"evidence_required": [
|
|
3083
|
+
"IdP tenant inventory",
|
|
3084
|
+
"off-boarding/dormant alerting configuration",
|
|
3085
|
+
"claim-transformation review cadence document"
|
|
3086
|
+
],
|
|
3087
|
+
"verdict_when_failed": "compliance-theater"
|
|
3088
|
+
}
|
|
3089
|
+
},
|
|
3090
|
+
"SOC2-CC6-OAuth-Consent": {
|
|
3091
|
+
"framework": "SOC 2 (AICPA Trust Services Criteria)",
|
|
3092
|
+
"control_id": "CC6 (OAuth consent)",
|
|
3093
|
+
"control_name": "Logical and Physical Access Controls — OAuth consent extension",
|
|
3094
|
+
"designed_for": "CC6 covers authentication, authorization, and access controls for human users and service accounts. It treats the authenticated session as the access boundary.",
|
|
3095
|
+
"misses": [
|
|
3096
|
+
"OAuth consent grants federate scope outside the authenticated-session boundary; the consenting user authenticated correctly and the third-party app's onward calls are authorized by the grant",
|
|
3097
|
+
"CC6 audit evidence shows nothing anomalous when a tenant-wide OAuth grant is harvested by an attacker — the Midnight Blizzard January 2024 pattern",
|
|
3098
|
+
"No control for OAuth-app publisher verification, cross-tenant consent inventory, or scope-vs-business-purpose attestation"
|
|
3099
|
+
],
|
|
3100
|
+
"real_requirement": "Add a CC6 sub-criterion requiring evidence of OAuth consent-grant inventory + continuous alerting on high-risk scope grants + per-grant business-purpose attestation + unverified-publisher gating.",
|
|
3101
|
+
"status": "open",
|
|
3102
|
+
"opened_date": "2026-05-15",
|
|
3103
|
+
"evidence_cves": [],
|
|
3104
|
+
"atlas_refs": [],
|
|
3105
|
+
"attack_refs": [
|
|
3106
|
+
"T1098.001"
|
|
3107
|
+
],
|
|
3108
|
+
"theater_test": {
|
|
3109
|
+
"claim": "Our SOC 2 CC6 covers OAuth consent grants in our SaaS estate.",
|
|
3110
|
+
"test": "Pull the OAuth consent-grant inventory across the IdP estate. Confirm continuous alerting on high-risk scope grants. Confirm per-grant business-purpose attestation. Confirm unverified-publisher grants are gated. Theater verdict if any of those is missing or if high-risk grants exist without attestation/justification.",
|
|
3111
|
+
"evidence_required": [
|
|
3112
|
+
"OAuth consent-grant inventory",
|
|
3113
|
+
"alerting rule for high-risk scope grants",
|
|
3114
|
+
"business-purpose attestation samples"
|
|
3115
|
+
],
|
|
3116
|
+
"verdict_when_failed": "compliance-theater"
|
|
3117
|
+
}
|
|
3118
|
+
},
|
|
3119
|
+
"UK-CAF-B2-IdP-Tenant": {
|
|
3120
|
+
"framework": "UK NCSC CAF",
|
|
3121
|
+
"control_id": "B2.b",
|
|
3122
|
+
"control_name": "Identity and Access Control — IdP-tenant control-plane extension",
|
|
3123
|
+
"designed_for": "NCSC CAF Principle B2 (Identity and Access Control), outcome B2.b — effectively managing identity and access for the essential function.",
|
|
3124
|
+
"misses": [
|
|
3125
|
+
"B2.b is outcome-based against the IdP tenant's published authentication outcomes",
|
|
3126
|
+
"The IdP-tenant control plane (who modified the tenant configuration itself) is outside the outcome's typical evidence surface",
|
|
3127
|
+
"A compromised tenant continues to produce compliant B2.b outcomes until the attacker abandons stealth"
|
|
3128
|
+
],
|
|
3129
|
+
"real_requirement": "Extend B2.b outcome assessment to the IdP-tenant control plane: federated-trust integrity, consent-grant inventory, privileged-role-assignment audit, management-API-token inventory, break-glass authentication alerting.",
|
|
3130
|
+
"status": "open",
|
|
3131
|
+
"opened_date": "2026-05-15",
|
|
3132
|
+
"evidence_cves": [],
|
|
3133
|
+
"atlas_refs": [],
|
|
3134
|
+
"attack_refs": [
|
|
3135
|
+
"T1098.001",
|
|
3136
|
+
"T1556.007",
|
|
3137
|
+
"T1199"
|
|
3138
|
+
],
|
|
3139
|
+
"theater_test": {
|
|
3140
|
+
"claim": "Our IdP tenant access controls satisfy UK CAF B2.",
|
|
3141
|
+
"test": "Inspect IdP tenant management; confirm tenant-admin actions require step-up MFA, management-API tokens are scoped + TTL-bounded + source-IP-locked, and token-signing certificate rotation is alert-attested. Theater verdict if any tenant-admin path lacks step-up MFA, or if management-API tokens are unrotated/unscoped/unbounded.",
|
|
3142
|
+
"evidence_required": [
|
|
3143
|
+
"tenant-admin action flow with MFA evidence",
|
|
3144
|
+
"management-API token inventory with TTL/scope/source-IP",
|
|
3145
|
+
"token-signing rotation alert configuration"
|
|
3146
|
+
],
|
|
3147
|
+
"verdict_when_failed": "compliance-theater"
|
|
3148
|
+
}
|
|
3149
|
+
},
|
|
3150
|
+
"AU-ISM-1559-IdP": {
|
|
3151
|
+
"framework": "AU ISM",
|
|
3152
|
+
"control_id": "ISM-1559",
|
|
3153
|
+
"control_name": "Privileged Account Credential Management — IdP-tenant control-plane extension",
|
|
3154
|
+
"designed_for": "ISM-1559 covers privileged-account credential management — storage, rotation, monitoring of privileged credentials.",
|
|
3155
|
+
"misses": [
|
|
3156
|
+
"ISM-1559 reaches privileged credentials at the system layer (admin password vault, server-side admin accounts)",
|
|
3157
|
+
"IdP-tenant control-plane operations (modifying federated trust, granting tenant-wide application permissions, rotating the token-signing certificate) are outside the ISM-1559 evidence path",
|
|
3158
|
+
"The IdP tenant is the privileged-credential source-of-truth for every downstream system; ISM-1559 audits the downstream systems and treats the IdP tenant as oracle"
|
|
3159
|
+
],
|
|
3160
|
+
"real_requirement": "Extend ISM-1559 scope to the IdP tenant's own control plane: management-API-token inventory, consent-grant inventory, federated-trust integrity, with continuous alerting and quarterly attestation.",
|
|
3161
|
+
"status": "open",
|
|
3162
|
+
"opened_date": "2026-05-15",
|
|
3163
|
+
"evidence_cves": [],
|
|
3164
|
+
"atlas_refs": [],
|
|
3165
|
+
"attack_refs": [
|
|
3166
|
+
"T1078.004",
|
|
3167
|
+
"T1098.001"
|
|
3168
|
+
],
|
|
3169
|
+
"theater_test": {
|
|
3170
|
+
"claim": "Our IdP posture satisfies AU ISM 1559 for identity provider security.",
|
|
3171
|
+
"test": "Confirm IdP token-signing certificate rotation alerting, claim-transformation change-control, management-API token TTL/scope/source-IP enforcement. Confirm the IdP is treated as critical-infrastructure-tier in the asset inventory. Theater verdict if IdP is in 'IT vendor' tier rather than critical-infrastructure tier.",
|
|
3172
|
+
"evidence_required": [
|
|
3173
|
+
"IdP control-plane monitoring rule export",
|
|
3174
|
+
"asset-tier classification record",
|
|
3175
|
+
"management-API token inventory"
|
|
3176
|
+
],
|
|
3177
|
+
"verdict_when_failed": "compliance-theater"
|
|
3178
|
+
}
|
|
3179
|
+
},
|
|
3180
|
+
"NIS2-Art-21-Federated-Identity": {
|
|
3181
|
+
"framework": "EU NIS2 Directive",
|
|
3182
|
+
"control_id": "Art.21(2)(j)",
|
|
3183
|
+
"control_name": "Cryptography + Access Control — federated-identity extension",
|
|
3184
|
+
"designed_for": "Art.21(2)(j) names cryptography and access-control measures (including MFA) as required risk-management measures for essential and important entities.",
|
|
3185
|
+
"misses": [
|
|
3186
|
+
"The supporting implementing acts and ENISA reference frameworks do not enumerate federated-identity control-plane operations (consent grants, federated-trust modification, cross-tenant access settings)",
|
|
3187
|
+
"IdP-provider tenants serving essential entities are in scope but the evidence model lags",
|
|
3188
|
+
"Art.23 24-hour clock fires on IdP incidents at essential entities but the tenant-operator-to-essential-entity notification chain is undefined for IdP-class incidents"
|
|
3189
|
+
],
|
|
3190
|
+
"real_requirement": "Extend implementing-act guidance to enumerate federated-identity control-plane indicators (consent abuse, federation modification, cross-tenant compromise) as Art.23-triggering events with a defined notification chain from IdP provider to essential entity to competent authority.",
|
|
3191
|
+
"status": "open",
|
|
3192
|
+
"opened_date": "2026-05-15",
|
|
3193
|
+
"evidence_cves": [],
|
|
3194
|
+
"atlas_refs": [],
|
|
3195
|
+
"attack_refs": [
|
|
3196
|
+
"T1098.001",
|
|
3197
|
+
"T1556.007",
|
|
3198
|
+
"T1199"
|
|
3199
|
+
],
|
|
3200
|
+
"theater_test": {
|
|
3201
|
+
"claim": "Our identity-provider risk management satisfies NIS2 Art. 21 for federated-identity dependencies.",
|
|
3202
|
+
"test": "From the supply-chain register, confirm each IdP (Okta, Entra ID, Auth0, Ping, Google Workspace) is listed as an essential-service dependency with concentration analysis. Inspect monitoring rules for token-signing certificate rotation, claim-transformation rule changes, and management-API token activity. Theater verdict if IdPs appear only as 'IT vendor' without dependency-class treatment, or if token-signing rotation events have no alerting rule.",
|
|
3203
|
+
"evidence_required": [
|
|
3204
|
+
"supply-chain register IdP subset",
|
|
3205
|
+
"IdP control-plane monitoring rule export",
|
|
3206
|
+
"IdP concentration analysis"
|
|
3207
|
+
],
|
|
3208
|
+
"verdict_when_failed": "compliance-theater"
|
|
3209
|
+
}
|
|
3210
|
+
},
|
|
3211
|
+
"DORA-Art-19-IdP-4h": {
|
|
3212
|
+
"framework": "EU DORA",
|
|
3213
|
+
"control_id": "Art.19 (4h IdP)",
|
|
3214
|
+
"control_name": "Major-ICT-related-incident notification — IdP-specific 4-hour clock",
|
|
3215
|
+
"designed_for": "DORA Art.19 — initial notification within 4 hours of classification of a major ICT-related incident, intermediate report within 72 hours, final report within one month.",
|
|
3216
|
+
"misses": [
|
|
3217
|
+
"Art.19 does not specify IdP-tenant compromise as a distinct incident class",
|
|
3218
|
+
"Financial entities relying on a CSP-hosted IdP frequently classify IdP incidents under Art.28 ICT-third-party-provider concentration risk and miss the Art.19 4-hour clock entirely",
|
|
3219
|
+
"The IdP is the single highest-blast-radius critical ICT third-party but the framework treats it as fungible"
|
|
3220
|
+
],
|
|
3221
|
+
"real_requirement": "Add IdP-tenant compromise as a named incident class under Art.19 with the 4-hour clock binding from detect-confirmed timestamp, independent of concentration-risk classification under Art.28.",
|
|
3222
|
+
"status": "open",
|
|
3223
|
+
"opened_date": "2026-05-15",
|
|
3224
|
+
"evidence_cves": [],
|
|
3225
|
+
"atlas_refs": [],
|
|
3226
|
+
"attack_refs": [
|
|
3227
|
+
"T1098.001",
|
|
3228
|
+
"T1556.007"
|
|
3229
|
+
],
|
|
3230
|
+
"theater_test": {
|
|
3231
|
+
"claim": "We can meet the DORA Art. 19 4-hour major-ICT-incident notification clock for IdP compromise.",
|
|
3232
|
+
"test": "Run a tabletop: at T0 a SIEM alert fires for IdP token-signing certificate rotation by an unrecognised principal. Stopwatch the elapsed time from T0 to a draft notification ready for the Competent Authority covering scope, root cause hypothesis, impacted services, and recovery posture. Theater verdict if elapsed time exceeds 4h, or if the playbook does not name the on-call who initiates the clock, or if the tabletop has not been run in the last 12 months.",
|
|
3233
|
+
"evidence_required": [
|
|
3234
|
+
"tabletop execution log with stopwatch timestamps",
|
|
3235
|
+
"DORA notification draft produced under exercise",
|
|
3236
|
+
"on-call rota covering 24/7 IdP-incident response"
|
|
3237
|
+
],
|
|
3238
|
+
"verdict_when_failed": "compliance-theater"
|
|
3239
|
+
}
|
|
3240
|
+
},
|
|
3241
|
+
"OFAC-Sanctions-Threat-Actor-Negotiation": {
|
|
3242
|
+
"framework": "US Treasury OFAC + EU sanctions overlay + UK OFSI",
|
|
3243
|
+
"control_id": "OFAC Sanctions — Cyber-Related Designations",
|
|
3244
|
+
"control_name": "Sanctions screening on ransomware-payment / threat-actor negotiation",
|
|
3245
|
+
"designed_for": "OFAC Cyber-Related Sanctions program (Executive Order 13694 + 13757) prohibits transactions with designated cyber-actors; EU sanctions (Council Regulation 269/2014 + cyber-specific designations) and UK OFSI mirror the regime.",
|
|
3246
|
+
"misses": [
|
|
3247
|
+
"IdP-incident-response that escalates to ransomware deployment (Scattered Spider 2023-2026 pattern) faces immediate ransom-payment-vs-sanctions screening decision under time pressure",
|
|
3248
|
+
"OFAC 2020/2021 advisories warn of secondary sanctions liability for facilitators (IR firms, insurers, negotiators); decision authority is frequently undocumented pre-incident",
|
|
3249
|
+
"Threat-actor-attribution-to-designated-entity is rarely deterministic during an active incident; the sanctions decision must operate under uncertainty"
|
|
3250
|
+
],
|
|
3251
|
+
"real_requirement": "Pre-incident: document ransom-payment decision authority (legal + board sign-off); pre-stage OFAC + EU + UK sanctions screening procedure with named decision-maker; pre-stage facilitator-liability waiver language for IR firm + insurer + negotiator engagement. During incident: every decision logged with attribution evidence + sanctions screening outcome + named approver.",
|
|
3252
|
+
"status": "open",
|
|
3253
|
+
"opened_date": "2026-05-15",
|
|
3254
|
+
"evidence_cves": [],
|
|
3255
|
+
"atlas_refs": [],
|
|
3256
|
+
"attack_refs": [
|
|
3257
|
+
"T1486",
|
|
3258
|
+
"T1078.004"
|
|
3259
|
+
],
|
|
3260
|
+
"theater_test": {
|
|
3261
|
+
"claim": "Our sanctions compliance covers any threat-actor negotiation scenario.",
|
|
3262
|
+
"test": "Pull the IR playbook. Confirm pre-rehearsed sanctions screening (US OFAC SDN + EU 2014/833 + UK OFSI + AU DFAT + JP MOF) as a precondition to any negotiator engagement. Confirm counsel-signed attestation workflow with timestamp. Confirm an annual tabletop with a sanctions-match inject under time-pressure. Theater verdict if screening is not pre-rehearsed or if the tabletop has not been run.",
|
|
3263
|
+
"evidence_required": [
|
|
3264
|
+
"IR playbook with sanctions sub-procedure",
|
|
3265
|
+
"counsel-signed attestation template",
|
|
3266
|
+
"tabletop execution log"
|
|
3267
|
+
],
|
|
3268
|
+
"verdict_when_failed": "compliance-theater"
|
|
3269
|
+
}
|
|
3270
|
+
},
|
|
3271
|
+
"FedRAMP-IL5-IAM-Federated": {
|
|
3272
|
+
"framework": "FedRAMP (US)",
|
|
3273
|
+
"control_id": "IL5 baseline (AC-2 / AC-3 / AC-6 / IA-2 / IA-5)",
|
|
3274
|
+
"control_name": "FedRAMP Impact-Level 5 baseline IAM controls",
|
|
3275
|
+
"designed_for": "US-Government Impact-Level 5 cloud workloads with single-cloud-tenant deployments",
|
|
3276
|
+
"misses": [
|
|
3277
|
+
"Cross-IL trust patterns (IL5 workload assuming role into IL6 sovereign tenant)",
|
|
3278
|
+
"Federated-trust hygiene with non-FedRAMP IdPs (Okta, Azure AD commercial, third-party SAML providers)",
|
|
3279
|
+
"IL6 sovereign-cloud audience-claim constraints not enumerated in baseline",
|
|
3280
|
+
"IL5-to-commercial-cloud cross-account assume-role chain monitoring",
|
|
3281
|
+
"AI-workload managed-identity token-binding requirements in IL5 baseline"
|
|
3282
|
+
],
|
|
3283
|
+
"real_requirement": "FedRAMP IL5-Federated extension explicitly enumerating cross-IL trust-policy requirements: (1) audience constraints pinned to sovereign-cloud STS endpoints, (2) subject-claim specificity with branch/tag constraints on OIDC federation, (3) cross-account assume-role graph monitoring over rolling 24h windows, (4) managed-identity token TTL ceilings (<= 1h non-CAE, <= 24h with Continuous Access Evaluation), (5) IL6 sovereign-cloud trust patterns enumerated separately.",
|
|
3284
|
+
"status": "open",
|
|
3285
|
+
"opened_date": "2026-05-15",
|
|
3286
|
+
"evidence_cves": [],
|
|
3287
|
+
"atlas_refs": [
|
|
3288
|
+
"AML.T0051"
|
|
3289
|
+
],
|
|
3290
|
+
"attack_refs": [
|
|
3291
|
+
"T1078.004",
|
|
3292
|
+
"T1098.001"
|
|
3293
|
+
],
|
|
3294
|
+
"theater_test": {
|
|
3295
|
+
"claim": "Our FedRAMP IL5 IAM posture covers federated identity for high-impact authorisations.",
|
|
3296
|
+
"test": "Confirm IdP control-plane controls (token-signing rotation alerting, claim-transformation change-control, management-API TTL/scope/source-IP) at IL5 evidence-quality. Confirm cross-account assume-role with subject-claim specificity > wildcard. Theater verdict if controls exist at SP-quality without IL5 evidence-rigor, or if any cross-account chain has wildcard subject claims.",
|
|
3297
|
+
"evidence_required": [
|
|
3298
|
+
"IL5-quality IdP control evidence bundle",
|
|
3299
|
+
"cross-account assume-role policy export",
|
|
3300
|
+
"evidence retention per IL5 cadence"
|
|
3301
|
+
],
|
|
3302
|
+
"verdict_when_failed": "compliance-theater"
|
|
3303
|
+
}
|
|
3304
|
+
},
|
|
3305
|
+
"CISA-Snowflake-AA24-IdP-Cloud": {
|
|
3306
|
+
"framework": "CISA (US) - Cross-framework advisory",
|
|
3307
|
+
"control_id": "AA24-174A",
|
|
3308
|
+
"control_name": "CISA Snowflake breach advisory - IdP-to-cloud chained-compromise",
|
|
3309
|
+
"designed_for": "CISA-published advisory documenting the Snowflake customer-credential compromise class (June 2024)",
|
|
3310
|
+
"misses": [
|
|
3311
|
+
"No framework currently enumerates cross-system credential-reuse as a distinct control class",
|
|
3312
|
+
"Federated IdP downstream-consumer inventory is not a required attestation in any framework",
|
|
3313
|
+
"Compromise via stolen Okta / Azure AD / Google Workspace credentials reaching both SaaS (Snowflake) and cloud-IAM (AWS / Azure / GCP) is invisible to per-system access reviews",
|
|
3314
|
+
"Infostealer-sourced session tokens are not enumerated as a credential class in ISO A.5.18 access-rights review",
|
|
3315
|
+
"No required control for periodic cross-system credential-reuse mapping across federated IdPs and their downstream consumers"
|
|
3316
|
+
],
|
|
3317
|
+
"real_requirement": "Extension to ISO/IEC 27001:2022 A.5.18, SOC 2 CC6.1, NIST 800-53 AC-2: every federated trust must enumerate downstream-consumer systems with continuous attestation. Cross-system credential-reuse mapping refreshed quarterly. Infostealer-sourced credential detection (commercial threat intel feeds) integrated with IdP audit log. Reference cases: AT&T, Ticketmaster, Santander, Advance Auto Parts, Neiman Marcus, LendingTree, Pure Storage (June 2024).",
|
|
3318
|
+
"status": "open",
|
|
3319
|
+
"opened_date": "2026-05-15",
|
|
3320
|
+
"evidence_cves": [],
|
|
3321
|
+
"atlas_refs": [
|
|
3322
|
+
"AML.T0051"
|
|
3323
|
+
],
|
|
3324
|
+
"attack_refs": [
|
|
3325
|
+
"T1078",
|
|
3326
|
+
"T1078.004"
|
|
3327
|
+
],
|
|
3328
|
+
"theater_test": {
|
|
3329
|
+
"claim": "We have remediated against the AA24 Snowflake-class advisory pattern (IdP/cloud credential abuse).",
|
|
3330
|
+
"test": "For SaaS data platforms (Snowflake, Databricks, BigQuery, Redshift), confirm SSO-required posture (no local user/password fallback), MFA on every login, and network policies restricting access to known IPs. Pull the user inventory; confirm zero local-auth users and zero MFA exemptions. Theater verdict if any local-auth user persists, MFA exemption exists, or network policies are absent.",
|
|
3331
|
+
"evidence_required": [
|
|
3332
|
+
"data-platform user inventory with auth method",
|
|
3333
|
+
"MFA exemption list",
|
|
3334
|
+
"network policy configuration"
|
|
3335
|
+
],
|
|
3336
|
+
"verdict_when_failed": "compliance-theater"
|
|
3337
|
+
}
|
|
3338
|
+
},
|
|
3339
|
+
"NIST-800-53-AC-2-Cross-Account": {
|
|
3340
|
+
"framework": "NIST 800-53 Rev 5",
|
|
3341
|
+
"control_id": "AC-2",
|
|
3342
|
+
"control_name": "Account Management",
|
|
3343
|
+
"designed_for": "Establish, activate, modify, review, disable, and remove information-system accounts",
|
|
3344
|
+
"misses": [
|
|
3345
|
+
"Cross-account assume-role chains across cloud-provider account boundaries - each link is a valid AC-2-compliant action; the compromise is the chain",
|
|
3346
|
+
"No concept of chain-of-assumptions monitoring over rolling time windows",
|
|
3347
|
+
"External-id enforcement on cross-account trust policies is not enumerated as a sub-control",
|
|
3348
|
+
"Federated-trust subject-claim specificity not enumerated",
|
|
3349
|
+
"Audit cadence (periodic account review) is mismatched to cloud-compromise timeline (hours-to-days)"
|
|
3350
|
+
],
|
|
3351
|
+
"real_requirement": "AC-2 extension with chain-of-assumptions sub-control: continuous monitoring of cross-account / cross-project / cross-management-group role-assumption graphs over rolling 24h windows; external-id mandatory on every cross-account trust; federated-trust subject-claim specificity attested per role; alerting on any chain traversing >= 2 account boundaries with a common source principal within 24h. Anticipated in NIST 800-53 Rev 6 (2027).",
|
|
3352
|
+
"status": "open",
|
|
3353
|
+
"opened_date": "2026-05-15",
|
|
3354
|
+
"evidence_cves": [],
|
|
3355
|
+
"atlas_refs": [
|
|
3356
|
+
"AML.T0051"
|
|
3357
|
+
],
|
|
3358
|
+
"attack_refs": [
|
|
3359
|
+
"T1078.004",
|
|
3360
|
+
"T1098.001"
|
|
3361
|
+
],
|
|
3362
|
+
"theater_test": {
|
|
3363
|
+
"claim": "Our cross-account access management satisfies NIST 800-53 AC-2.",
|
|
3364
|
+
"test": "Sample 10 cross-account assume-role chains. For each, confirm subject-claim specificity (no wildcard principal), session-policy scoping, and external-ID where third-party assume-role. Inspect monitoring rules for assume-role chain depth and unusual chain shapes. Theater verdict if any sampled chain has wildcard subject claims or external-ID is missing in third-party scenarios.",
|
|
3365
|
+
"evidence_required": [
|
|
3366
|
+
"cross-account assume-role policy sample",
|
|
3367
|
+
"monitoring rule for chain depth",
|
|
3368
|
+
"external-ID enforcement evidence"
|
|
3369
|
+
],
|
|
3370
|
+
"verdict_when_failed": "compliance-theater"
|
|
3371
|
+
}
|
|
3372
|
+
},
|
|
3373
|
+
"ISO-27017-Cloud-IAM": {
|
|
3374
|
+
"framework": "ISO/IEC 27017:2015",
|
|
3375
|
+
"control_id": "A.9.2.1 (cloud extension) / Annex A cloud-services controls",
|
|
3376
|
+
"control_name": "ISO/IEC 27017 cloud-services security extension to ISO/IEC 27001",
|
|
3377
|
+
"designed_for": "Code of practice for information-security controls for cloud-services use, extending ISO/IEC 27001:2013/2022",
|
|
3378
|
+
"misses": [
|
|
3379
|
+
"Managed-identity token replay against the cloud instance-metadata API not enumerated",
|
|
3380
|
+
"IMDS-version hardening (v1 to v2 transition; hop-limit enforcement; token TTL) not in scope",
|
|
3381
|
+
"Cloud-IAM cross-account assume-role chain monitoring not enumerated",
|
|
3382
|
+
"Federated trust (SAML / OIDC / Workload Identity Federation) hygiene controls not specified",
|
|
3383
|
+
"Bearer-token TTL ceilings for non-human cloud principals not required"
|
|
3384
|
+
],
|
|
3385
|
+
"real_requirement": "ISO/IEC 27017:2027 (anticipated) cloud-IAM hardening: (1) managed-identity token-binding to instance identity where the CSP supports it, (2) IMDS v2-required attestation with hop-limit and token TTL ceilings, (3) cross-account assume-role chain monitoring, (4) federated-trust subject-claim specificity, (5) bearer-token TTL ceilings <= 1h non-CAE / <= 24h with Continuous Access Evaluation.",
|
|
3386
|
+
"status": "open",
|
|
3387
|
+
"opened_date": "2026-05-15",
|
|
3388
|
+
"evidence_cves": [],
|
|
3389
|
+
"atlas_refs": [],
|
|
3390
|
+
"attack_refs": [
|
|
3391
|
+
"T1552.005",
|
|
3392
|
+
"T1078.004"
|
|
3393
|
+
],
|
|
3394
|
+
"theater_test": {
|
|
3395
|
+
"claim": "Our cloud-IAM posture is hardened per ISO/IEC 27017:2015 cloud-services controls.",
|
|
3396
|
+
"test": "Inspect cloud-IAM configuration: managed identities token-bound to instance identity (where supported); IMDSv2 required with hop-limit and short token TTL; bearer-token TTLs ≤1h non-CAE / ≤24h with Continuous Access Evaluation. Spot-check 10 cross-account assume-role chains and confirm subject-claim specificity > 'wildcard'. Theater verdict if IMDSv1 is in use anywhere, if bearer TTLs exceed the ceilings, or if any sampled cross-account chain has wildcard subject claims.",
|
|
3397
|
+
"evidence_required": [
|
|
3398
|
+
"cloud-IAM configuration export per CSP",
|
|
3399
|
+
"IMDSv2 enforcement audit",
|
|
3400
|
+
"assume-role policy document sample"
|
|
3401
|
+
],
|
|
3402
|
+
"verdict_when_failed": "compliance-theater"
|
|
3403
|
+
}
|
|
3404
|
+
},
|
|
3405
|
+
"SOC2-CC6-Access-Key-Leak-Public-Repo": {
|
|
3406
|
+
"framework": "AICPA SOC 2 Trust Services Criteria",
|
|
3407
|
+
"control_id": "CC6.1",
|
|
3408
|
+
"control_name": "Logical Access Controls",
|
|
3409
|
+
"designed_for": "Restrict logical access to data and system resources via authentication and authorization mechanisms",
|
|
3410
|
+
"misses": [
|
|
3411
|
+
"Access keys leaked to public code repositories produce fully-authenticated sessions that satisfy CC6.1 evidence",
|
|
3412
|
+
"The leak point (public repository) is outside CC6 scope",
|
|
3413
|
+
"Scraper-bot exploitation timeline (~5 minutes from commit to exploitation) is faster than any CC6 detection cadence",
|
|
3414
|
+
"CC6.1 audit evidence is satisfied by IAM policy review; says nothing about credential exposure on public-code-search surfaces",
|
|
3415
|
+
"Post-rotation provider audit-log review for misuse-window is not required by CC6.1"
|
|
3416
|
+
],
|
|
3417
|
+
"real_requirement": "CC6 sub-criterion requiring continuous monitoring of credential exposure on public-code-search surfaces (GitHub, GitLab, Bitbucket public, npm, PyPI, Docker Hub). Real-time alerting on CreateAccessKey events outside IaC apply windows. Provider audit-log review for misuse-window evidence on every rotation event. Reference: 2024-2025 AWS-key-in-public-repo crypto-mining campaign data (scraper bots monetize within ~5 minutes of public exposure).",
|
|
3418
|
+
"status": "open",
|
|
3419
|
+
"opened_date": "2026-05-15",
|
|
3420
|
+
"evidence_cves": [],
|
|
3421
|
+
"atlas_refs": [],
|
|
3422
|
+
"attack_refs": [
|
|
3423
|
+
"T1078.004",
|
|
3424
|
+
"T1552.005"
|
|
3425
|
+
],
|
|
3426
|
+
"theater_test": {
|
|
3427
|
+
"claim": "Our SOC 2 CC6 covers credential leakage detection across public repositories.",
|
|
3428
|
+
"test": "Confirm continuous secret-scanning across public repos and developer-affiliated personal repos. Confirm leaked-credential auto-revocation (≤5 minutes) integrated with the IdP/CSP. Pull the past 12 months of credential leaks; measure time-from-leak-to-revocation. Theater verdict if scanning is not continuous, auto-revocation is absent, or any leak exceeded 5 minutes to revocation.",
|
|
3429
|
+
"evidence_required": [
|
|
3430
|
+
"secret-scanning configuration",
|
|
3431
|
+
"auto-revocation pipeline architecture",
|
|
3432
|
+
"leak-to-revocation timing per incident"
|
|
3433
|
+
],
|
|
3434
|
+
"verdict_when_failed": "compliance-theater"
|
|
3435
|
+
}
|
|
3436
|
+
},
|
|
3437
|
+
"AWS-Security-Hub-Coverage-Gap": {
|
|
3438
|
+
"framework": "AWS Security Hub Foundational Security Best Practices (also GCP SCC, Azure Defender for Cloud)",
|
|
3439
|
+
"control_id": "Foundational Security Best Practices / equivalent posture-baseline control set",
|
|
3440
|
+
"control_name": "CSP-native posture-tool baseline (cross-provider gap class)",
|
|
3441
|
+
"designed_for": "Configuration-drift detection across CSP-managed resources mapped to baseline standards (CIS / PCI-DSS / NIST 800-53)",
|
|
3442
|
+
"misses": [
|
|
3443
|
+
"Posture tools are coverage-based, not breach-detection - they flag configuration drift, not behavioural compromise",
|
|
3444
|
+
"Cross-account assume-role chain anomalies are not enumerated as findings",
|
|
3445
|
+
"Federated-trust wildcard subject-claim posture not enumerated",
|
|
3446
|
+
"IMDSv1 access events (vs IMDSv1 enablement) not surfaced",
|
|
3447
|
+
"Billing anomalies (crypto-mining signal) outside posture scope entirely",
|
|
3448
|
+
"Audit-log disablement detection is a separate paid feature (GuardDuty / Defender for Cloud), not in baseline posture"
|
|
3449
|
+
],
|
|
3450
|
+
"real_requirement": "SOC 2 CC7.2 sub-criterion requiring that monitoring coverage be measured against a behavioural-indicator inventory (e.g. the cloud-iam-incident playbook detect.indicators), not against posture-tool deployment. NIST 800-53 SI-4 extension requiring behavioural CloudTrail / audit-log analytics over rolling 24h windows. Combined posture + behavioural-analytics deployment with documented coverage mapping.",
|
|
3451
|
+
"status": "open",
|
|
3452
|
+
"opened_date": "2026-05-15",
|
|
3453
|
+
"evidence_cves": [],
|
|
3454
|
+
"atlas_refs": [],
|
|
3455
|
+
"attack_refs": [
|
|
3456
|
+
"T1078.004",
|
|
3457
|
+
"T1098.001",
|
|
3458
|
+
"T1562.008"
|
|
3459
|
+
],
|
|
3460
|
+
"theater_test": {
|
|
3461
|
+
"claim": "Our cloud posture is monitored end-to-end by AWS Security Hub (or equivalent CSP-native posture tool).",
|
|
3462
|
+
"test": "Pull the past 90 days of Security Hub findings. Cross-reference against IR ticket-tracker. Theater verdict if more than 5 findings closed without remediation evidence (suppression rules only). Then run the project's `cloud-iam-incident` playbook detect-indicator inventory against CloudTrail; theater verdict if Security Hub did not surface indicators that the behavioural inventory does (posture-tool deployment ≠ behavioural coverage).",
|
|
3463
|
+
"evidence_required": [
|
|
3464
|
+
"Security Hub findings export 90 days",
|
|
3465
|
+
"IR ticket-tracker correlation",
|
|
3466
|
+
"cloud-iam-incident detect-indicator → CloudTrail behavioural-rule mapping"
|
|
3467
|
+
],
|
|
3468
|
+
"verdict_when_failed": "compliance-theater"
|
|
3469
|
+
}
|
|
3470
|
+
},
|
|
3471
|
+
"UK-CAF-B2-Cloud-IAM": {
|
|
3472
|
+
"framework": "UK NCSC CAF (Cyber Assessment Framework) v3.x",
|
|
3473
|
+
"control_id": "B2",
|
|
3474
|
+
"control_name": "Identity and Access Control",
|
|
3475
|
+
"designed_for": "NCSC CAF outcome that access to networks and information systems supporting the essential function is appropriately controlled",
|
|
3476
|
+
"misses": [
|
|
3477
|
+
"Cloud-IAM-specific trust-policy hygiene not enumerated in B2 contributing outcomes",
|
|
3478
|
+
"Cross-account assume-role chain monitoring is not a required B2 evidence",
|
|
3479
|
+
"Federated trust (SAML / OIDC / Workload Identity Federation) hygiene not specified",
|
|
3480
|
+
"Managed-identity token TTL ceilings not enumerated",
|
|
3481
|
+
"IMDS hardening not in scope of B2"
|
|
3482
|
+
],
|
|
3483
|
+
"real_requirement": "UK CAF v4 contributing-outcomes refresh enumerating cloud-IAM-specific trust-policy hygiene: (1) non-wildcard federated subject claims, (2) audience-pinned audience constraints, (3) external-id mandatory on cross-account trusts, (4) bearer-token TTL ceilings on non-human principals, (5) cross-account assume-role graph monitoring over rolling 24h windows.",
|
|
3484
|
+
"status": "open",
|
|
3485
|
+
"opened_date": "2026-05-15",
|
|
3486
|
+
"evidence_cves": [],
|
|
3487
|
+
"atlas_refs": [],
|
|
3488
|
+
"attack_refs": [
|
|
3489
|
+
"T1078.004",
|
|
3490
|
+
"T1098.001"
|
|
3491
|
+
],
|
|
3492
|
+
"theater_test": {
|
|
3493
|
+
"claim": "Our cloud-IAM posture satisfies UK CAF B2 across CSPs.",
|
|
3494
|
+
"test": "Pull cloud-IAM configuration: managed-identity binding to instance identity, IMDSv2 required with short token TTL, bearer-token TTL ≤1h non-CAE / ≤24h with CAE, cross-account assume-role with subject-claim specificity. Theater verdict if IMDSv1 is in use, TTLs exceed ceilings, or cross-account claims are wildcard.",
|
|
3495
|
+
"evidence_required": [
|
|
3496
|
+
"cloud-IAM configuration export per CSP",
|
|
3497
|
+
"IMDSv2 enforcement audit",
|
|
3498
|
+
"cross-account assume-role policy export"
|
|
3499
|
+
],
|
|
3500
|
+
"verdict_when_failed": "compliance-theater"
|
|
3501
|
+
}
|
|
3502
|
+
},
|
|
3503
|
+
"AU-ISM-1546-Cloud-Service-Account": {
|
|
3504
|
+
"framework": "ACSC ISM (Australian Government Information Security Manual)",
|
|
3505
|
+
"control_id": "ISM-1546",
|
|
3506
|
+
"control_name": "Multi-factor authentication for privileged users and remote access",
|
|
3507
|
+
"designed_for": "MFA for AU-government privileged users and remote-access scenarios",
|
|
3508
|
+
"misses": [
|
|
3509
|
+
"Cloud service-account access keys are bearer credentials that bypass human MFA entirely",
|
|
3510
|
+
"IAM-role assume-role chains initiated by service principals never cross the human-MFA gate",
|
|
3511
|
+
"Managed-identity tokens (Azure managed identity, AWS instance profile, GCP service-account default) are scoped to non-human principals",
|
|
3512
|
+
"OIDC federation tokens for CI (GitHub Actions / GitLab / CircleCI) bypass human-MFA - MFA was evaluated at the IdP, not at the cloud",
|
|
3513
|
+
"SAML assertions held by SaaS integrations bypass cloud-IAM MFA"
|
|
3514
|
+
],
|
|
3515
|
+
"real_requirement": "ISM-1546 extension enumerating cloud non-human-principal credential hygiene: (1) bearer-token TTL ceilings (<= 1h non-CAE, <= 24h with Continuous Access Evaluation), (2) audience binding on every federated trust, (3) per-action audit logging on every non-human principal, (4) periodic rotation cadence with documented owner, (5) detection of token replay across source-IP boundaries.",
|
|
3516
|
+
"status": "open",
|
|
3517
|
+
"opened_date": "2026-05-15",
|
|
3518
|
+
"evidence_cves": [],
|
|
3519
|
+
"atlas_refs": [],
|
|
3520
|
+
"attack_refs": [
|
|
3521
|
+
"T1078.004",
|
|
3522
|
+
"T1552.005"
|
|
3523
|
+
],
|
|
3524
|
+
"theater_test": {
|
|
3525
|
+
"claim": "Our cloud service-account posture satisfies AU ISM 1546.",
|
|
3526
|
+
"test": "Inventory cloud service accounts. Confirm short-lived OIDC tokens (workload identity federation) are used in preference to static keys; for any remaining static keys, confirm rotation policy ≤90 days and source-IP allowlisting. Theater verdict if static keys exist without rotation/IP-allowlisting, or if workload identity federation is available but not adopted.",
|
|
3527
|
+
"evidence_required": [
|
|
3528
|
+
"cloud service-account inventory by auth method",
|
|
3529
|
+
"rotation policy document",
|
|
3530
|
+
"source-IP allowlist configuration"
|
|
3531
|
+
],
|
|
3532
|
+
"verdict_when_failed": "compliance-theater"
|
|
3533
|
+
}
|
|
3534
|
+
},
|
|
3535
|
+
"OFAC-SDN-Payment-Block": {
|
|
3536
|
+
"framework": "ALL",
|
|
3537
|
+
"control_id": "RANSOMWARE-GAP-001",
|
|
3538
|
+
"control_name": "OFAC SDN sanctions screening as blocking gate on ransomware payment posture",
|
|
3539
|
+
"designed_for": "N/A — sanctions compliance lives in Treasury / Finance regulatory tree (31 CFR 501, OFAC Ransomware Advisory 2021), not in NIST/ISO/SOC 2 incident-response controls. No security framework names the OFAC SDN list check as a control on the payment posture.",
|
|
3540
|
+
"misses": [
|
|
3541
|
+
"No security framework requires pre-rehearsed sanctions-screening workflow as a precondition to ransomware payment decision",
|
|
3542
|
+
"Cross-jurisdiction sanctions lists (EU Reg 2014/833, UK OFSI Consolidated List, AU DFAT, JP MOF Foreign Exchange and Foreign Trade Act) are not enumerated as parallel obligations in any IR framework",
|
|
3543
|
+
"Attribution-evidence package format for sanctions lookup (ransom note IoCs, leak-site URL, crypto-wallet, family fingerprint) is not standardized; counsel-signature workflow is not framework-mandated",
|
|
3544
|
+
"Payment to sanctioned threat actor is a federal-law violation in US (31 CFR 501) but auditors do not test the screening-workflow rehearsal record"
|
|
3545
|
+
],
|
|
3546
|
+
"real_requirement": "Ransomware-specific IR sub-control requiring: (a) pre-rehearsed sanctions-screening workflow with named legal counsel, (b) cross-jurisdiction lookup against US OFAC SDN + EU Reg 2014/833 + UK OFSI + AU DFAT + JP MOF, (c) attribution-evidence package format, (d) counsel-signed attestation with timestamp ordered before any negotiator engagement, (e) annual tabletop exercise that includes a sanctions-match inject under time-pressure.",
|
|
3547
|
+
"status": "open",
|
|
3548
|
+
"opened_date": "2026-05-15",
|
|
3549
|
+
"evidence_cves": [],
|
|
3550
|
+
"atlas_refs": [],
|
|
3551
|
+
"attack_refs": [
|
|
3552
|
+
"T1486"
|
|
3553
|
+
],
|
|
3554
|
+
"theater_test": {
|
|
3555
|
+
"claim": "Our incident response covers OFAC sanctions screening before any ransomware payment.",
|
|
3556
|
+
"test": "Run a tabletop where the inject is a ransomware demand from an attribution-likely-sanctioned actor. Stopwatch the workflow: attribution-evidence package assembled → cross-jurisdiction lookup (OFAC SDN + EU 2014/833 + UK OFSI + AU DFAT + JP MOF) → counsel-signed attestation → pay/restore decision. Theater verdict if any cross-jurisdiction list is missing, counsel-signed attestation is unrehearsed, or the tabletop has not been exercised in the past 12 months.",
|
|
3557
|
+
"evidence_required": [
|
|
3558
|
+
"sanctions-screening sub-procedure document",
|
|
3559
|
+
"tabletop execution log with decision artefacts",
|
|
3560
|
+
"counsel-signed attestation template"
|
|
3561
|
+
],
|
|
3562
|
+
"verdict_when_failed": "compliance-theater"
|
|
3563
|
+
}
|
|
3564
|
+
},
|
|
3565
|
+
"Insurance-Carrier-24h-Notification": {
|
|
3566
|
+
"framework": "ALL",
|
|
3567
|
+
"control_id": "RANSOMWARE-GAP-002",
|
|
3568
|
+
"control_name": "Cyber insurance carrier 24h notification with pre-approval workflow",
|
|
3569
|
+
"designed_for": "N/A — cyber-insurance carrier-policy interaction lives in contract law, not in security framework control text. No security framework names the carrier-notification clock or carrier-pre-approval requirements as a control.",
|
|
3570
|
+
"misses": [
|
|
3571
|
+
"Most cyber-insurance policies post-2021 require 24h initial notification; non-compliance is grounds for policy voiding — yet no security framework treats this as a control",
|
|
3572
|
+
"Carrier-pre-approval requirements for ransom payment, IR firm engagement, and restore-vs-pay decision are not enumerated by any framework",
|
|
3573
|
+
"Carrier panel of approved IR firms is not surfaced as a vendor-management control (SOC 2 CC9.2 covers vendor risk but not carrier-panel composition)",
|
|
3574
|
+
"Sanctions exclusion language in policies (exclusion of payment to OFAC-sanctioned actors) is not cross-walked to incident-response procedure",
|
|
3575
|
+
"Carrier denial post-incident is the dominant economic-exposure failure mode and is preventable, but no framework requires the rehearsal that prevents it"
|
|
3576
|
+
],
|
|
3577
|
+
"real_requirement": "Ransomware-specific IR sub-control + SOC 2 CC9.2 sub-criterion requiring: (a) cyber insurance policy clause-by-clause review with broker, (b) carrier panel of approved IR firms identified and retained IR firm verified on-panel, (c) pre-approval workflow rehearsed with broker not just present in policy text, (d) 24h notification clock workflow exercised end-to-end with loss-notice form + carrier-reachable channel + broker after-hours contact, (e) annual tabletop with carrier-notification as an exercise inject.",
|
|
3578
|
+
"status": "open",
|
|
3579
|
+
"opened_date": "2026-05-15",
|
|
3580
|
+
"evidence_cves": [],
|
|
3581
|
+
"atlas_refs": [],
|
|
3582
|
+
"attack_refs": [
|
|
3583
|
+
"T1486"
|
|
3584
|
+
],
|
|
3585
|
+
"theater_test": {
|
|
3586
|
+
"claim": "We can meet the 24h cyber insurance carrier notification clock with pre-approval workflow rehearsed.",
|
|
3587
|
+
"test": "Run a tabletop with carrier-notification as an inject. Stopwatch from T0 to (a) loss-notice form submitted via carrier-reachable channel, (b) broker after-hours contact engaged, (c) on-panel IR firm engagement attestation, (d) pre-approval workflow exercised end-to-end. Theater verdict if any sub-step is unrehearsed, the IR firm is off the carrier panel, or the broker after-hours channel is undocumented.",
|
|
3588
|
+
"evidence_required": [
|
|
3589
|
+
"tabletop execution log with stopwatch timestamps",
|
|
3590
|
+
"carrier panel + retained IR firm attestation",
|
|
3591
|
+
"broker after-hours contact + loss-notice form"
|
|
3592
|
+
],
|
|
3593
|
+
"verdict_when_failed": "compliance-theater"
|
|
3594
|
+
}
|
|
3595
|
+
},
|
|
3596
|
+
"EU-Sanctions-Reg-2014-833-Cyber": {
|
|
3597
|
+
"framework": "EU",
|
|
3598
|
+
"control_id": "RANSOMWARE-GAP-003",
|
|
3599
|
+
"control_name": "EU Council Regulation 2014/833 — Cyber Sanctions screening on ransomware payment posture",
|
|
3600
|
+
"designed_for": "Council Regulation (EU) 2014/833 — EU consolidated cyber sanctions framework. Establishes cyber-specific listings for autonomous EU sanctions against threat actors attributed to cyber attacks affecting EU member states.",
|
|
3601
|
+
"misses": [
|
|
3602
|
+
"Lives in EU sanctions regulatory tree, not in NIS2 Art.23 or DORA Art.19 control text; the cross-walk is the operator's responsibility",
|
|
3603
|
+
"NIS2 24h significant-incident notification and DORA 4h major-ICT-incident notification do not enumerate EU 2014/833 sanctions screening as a precondition to payment posture",
|
|
3604
|
+
"EU consolidated sanctions list lookup is not pre-integrated into IR playbook tooling at most enterprises",
|
|
3605
|
+
"EU-jurisdiction-specific counsel-signature requirements are not standardized"
|
|
3606
|
+
],
|
|
3607
|
+
"real_requirement": "NIS2 + DORA + national-level incident-response procedure extension requiring EU Reg 2014/833 cyber sanctions screening as a precondition to ransomware payment posture; counsel-signed attestation with timestamp; integration with parallel OFAC + UK + AU + JP lookups.",
|
|
3608
|
+
"status": "open",
|
|
3609
|
+
"opened_date": "2026-05-15",
|
|
3610
|
+
"evidence_cves": [],
|
|
3611
|
+
"atlas_refs": [],
|
|
3612
|
+
"attack_refs": [
|
|
3613
|
+
"T1486"
|
|
3614
|
+
],
|
|
3615
|
+
"theater_test": {
|
|
3616
|
+
"claim": "Our incident response includes EU Regulation 2014/833 cyber sanctions screening.",
|
|
3617
|
+
"test": "Confirm IR playbook integrates EU Reg 2014/833 lookup as a precondition to ransomware payment posture, alongside OFAC + UK + AU + JP. Confirm counsel-signature workflow includes EU jurisdiction-specific counsel where the entity has EU exposure. Theater verdict if EU 2014/833 lookup is absent from the IR playbook, or if EU-jurisdiction counsel is not pre-identified.",
|
|
3618
|
+
"evidence_required": [
|
|
3619
|
+
"IR playbook with EU 2014/833 sub-procedure",
|
|
3620
|
+
"EU-jurisdiction counsel pre-identification record",
|
|
3621
|
+
"tabletop execution log covering EU sanctions inject"
|
|
3622
|
+
],
|
|
3623
|
+
"verdict_when_failed": "compliance-theater"
|
|
3624
|
+
}
|
|
3625
|
+
},
|
|
3626
|
+
"Immutable-Backup-Recovery": {
|
|
3627
|
+
"framework": "ALL",
|
|
3628
|
+
"control_id": "RANSOMWARE-GAP-004",
|
|
3629
|
+
"control_name": "Immutable backup as distinct sub-property of backup control (vs replication / write-protect / off-network)",
|
|
3630
|
+
"designed_for": "N/A — security frameworks generally require 'backup' as a single control class without distinguishing immutability from replication. NIST CP-9, ISO A.8.13, AU E8 Strategy 8, SOC 2 A1.2 all name backup but treat it as a single property.",
|
|
3631
|
+
"misses": [
|
|
3632
|
+
"'Off-network' (AU E8 ML2 maturity gate) is not immutability — replication targets accessible via the same compromised admin credential as production fail the ransomware blast-radius test without failing E8 Backup compliance",
|
|
3633
|
+
"Storage-side compliance-lock (S3 Object Lock compliance-retention, Azure immutable blob with legal hold, Veeam Hardened Repository) vs governance-retention (admin-overrideable) is not distinguished in framework text",
|
|
3634
|
+
"Versioning and write-protect labels are routinely marketed as 'immutable' but are bypassable with admin credential — frameworks accept marketing-label evidence",
|
|
3635
|
+
"No framework requires a production-admin-credential adversary-simulation test of the immutability property",
|
|
3636
|
+
"Recovery-from-backup tabletop exercises are present (ISO 27031, AU E8 Backup ML3) but the exercises do not test immutability end-to-end"
|
|
3637
|
+
],
|
|
3638
|
+
"real_requirement": "Backup-control sub-property distinguishing: (a) immutable backup = compliance-lock storage policy with admin-separation and no root override, (b) replicated backup = off-site copy but admin-credential-deletable, (c) write-protected backup = storage-side enforcement but admin-policy-modifiable, (d) off-network backup = air-gapped retrieval but possibly mutable on retrieval. Annual end-to-end test using production-admin-credential adversary simulation to confirm the immutability property holds.",
|
|
3639
|
+
"status": "open",
|
|
3640
|
+
"opened_date": "2026-05-15",
|
|
3641
|
+
"evidence_cves": [],
|
|
3642
|
+
"atlas_refs": [],
|
|
3643
|
+
"attack_refs": [
|
|
3644
|
+
"T1486"
|
|
3645
|
+
],
|
|
3646
|
+
"theater_test": {
|
|
3647
|
+
"claim": "Our backups are immutable and survive a production-admin-credential adversary.",
|
|
3648
|
+
"test": "Annual exercise: take a copy of a production-admin credential to a test environment with replica immutable backups. Attempt deletion via every API the production admin can invoke. Theater verdict if any deletion succeeds without a separate immutability-admin credential, or if 'immutable' resolves to versioning/write-protect/governance-retention that admin can override. Also confirm storage-side compliance-lock (S3 Object Lock compliance-retention, Azure immutable blob with legal hold, Veeam Hardened Repository) is in use.",
|
|
3649
|
+
"evidence_required": [
|
|
3650
|
+
"immutability adversary-test execution log",
|
|
3651
|
+
"storage-side compliance-lock configuration",
|
|
3652
|
+
"admin-separation policy document"
|
|
3653
|
+
],
|
|
3654
|
+
"verdict_when_failed": "compliance-theater"
|
|
3655
|
+
}
|
|
3656
|
+
},
|
|
3657
|
+
"Decryptor-Availability-Pre-Decision": {
|
|
3658
|
+
"framework": "ALL",
|
|
3659
|
+
"control_id": "RANSOMWARE-GAP-005",
|
|
3660
|
+
"control_name": "Decryptor availability lookup as precondition to ransomware pay/restore decision",
|
|
3661
|
+
"designed_for": "N/A — no security framework requires decryptor availability lookup against No More Ransom Project or vendor-specific decryptor catalogs before payment decision. NIST IR-4, ISO A.5.26, SOC 2 CC7.4 incident-response controls are method-neutral.",
|
|
3662
|
+
"misses": [
|
|
3663
|
+
"No framework requires the pay/restore decision to be informed by a decryptor-availability lookup result",
|
|
3664
|
+
"No More Ransom Project Crypto Sheriff + Emsisoft + Kaspersky NoMoreCry + Bitdefender + Avast decryptor catalogs are not pre-integrated into IR playbook tooling at most enterprises",
|
|
3665
|
+
"Decryptor known-failure-mode documentation (Conti / LockBit / ALPHV partial-decryption rates from Coveware quarterly reports) is not surfaced as decision input",
|
|
3666
|
+
"Operation Cronos (Feb 2024) LockBit decryptor + similar law-enforcement decryptor drops are not auto-integrated into IR posture",
|
|
3667
|
+
"Decryptor reliability is treated as binary (works / doesn't work) when the operational reality is partial decryption with ~35% failure rate for paid victims (Coveware 2023-2026)"
|
|
3668
|
+
],
|
|
3669
|
+
"real_requirement": "Ransomware-specific IR sub-control requiring: (a) curated decryptor catalog integrated into IR playbook (No More Ransom + Emsisoft + Kaspersky NoMoreCry + Bitdefender + Avast + law-enforcement releases), (b) decryptor-availability lookup executed and recorded with timestamp before pay/restore decision, (c) decryptor known-failure-mode review as decision input, (d) periodic catalog refresh (quarterly) and integration with threat-intel feed.",
|
|
3670
|
+
"status": "open",
|
|
3671
|
+
"opened_date": "2026-05-15",
|
|
3672
|
+
"evidence_cves": [],
|
|
3673
|
+
"atlas_refs": [],
|
|
3674
|
+
"attack_refs": [
|
|
3675
|
+
"T1486"
|
|
3676
|
+
],
|
|
3677
|
+
"theater_test": {
|
|
3678
|
+
"claim": "Our ransomware response checks decryptor availability before any pay/restore decision.",
|
|
3679
|
+
"test": "Run a tabletop. Inject a ransomware family fingerprint (e.g. LockBit 3.0, BlackCat, Akira). Confirm IR playbook executes a curated decryptor catalogue lookup (No More Ransom + Emsisoft + Kaspersky NoMoreCry + Bitdefender + Avast + law-enforcement releases) and records the result with timestamp before the pay/restore decision. Confirm decryptor known-failure-mode review (e.g. ~35% partial-decryption rate per Coveware) is documented as decision input. Theater verdict if catalogue lookup is absent, failure-mode review is missing, or quarterly catalogue refresh is undocumented.",
|
|
3680
|
+
"evidence_required": [
|
|
3681
|
+
"IR playbook decryptor sub-procedure",
|
|
3682
|
+
"tabletop execution log",
|
|
3683
|
+
"quarterly catalogue refresh evidence"
|
|
3684
|
+
],
|
|
3685
|
+
"verdict_when_failed": "compliance-theater"
|
|
3686
|
+
}
|
|
3687
|
+
},
|
|
3688
|
+
"PHI-Exfil-Before-Encrypt-Breach-Class": {
|
|
3689
|
+
"framework": "ALL",
|
|
3690
|
+
"control_id": "RANSOMWARE-GAP-006",
|
|
3691
|
+
"control_name": "PHI / personal-data exfiltration before encryption as distinct breach class from the encryption event",
|
|
3692
|
+
"designed_for": "HIPAA Breach Notification Rule 45 CFR 164.400-414; GDPR Art.33/34; state breach laws (CCPA Sec.1798.82, NY SHIELD Act, etc.); AU NDB scheme; UK GDPR. These statutes trigger on the breach event regardless of encryption status.",
|
|
3693
|
+
"misses": [
|
|
3694
|
+
"HIPAA 164.308(a)(7) Contingency Plan rule is recovery-shaped; treats the encryption event as the trigger and does not naturally surface exfil-before-encrypt as a parallel obligation under 164.402",
|
|
3695
|
+
"GDPR Art.33/34 trigger on personal-data breach but the 72h clock interaction with ransomware encryption is not enumerated in security framework controls",
|
|
3696
|
+
"Coveware Q1 2026 reports >82% of named-ransomware incidents include exfiltration — the dominant pattern, yet frameworks treat ransomware as a single 'availability' incident class",
|
|
3697
|
+
"State breach laws (CCPA, NY SHIELD, MA 201 CMR 17, IL PIPA, etc.) trigger on exfiltration regardless of encryption recovery — the parallel state-AG notification matrix is not framework-mandated",
|
|
3698
|
+
"HIPAA Security Rule NPRM (late 2024 → final rule expected 2026) may close part of this gap; UK GDPR + AU NDB equivalents are not on similar revision schedule"
|
|
3699
|
+
],
|
|
3700
|
+
"real_requirement": "Ransomware-specific IR sub-control + HIPAA 164.308(a)(7) extension requiring: (a) exfil-before-encrypt detection (24-72h egress profile preceding encryption event) integrated into IR playbook, (b) exfil-scope determination as parallel obligation independent of encryption-recovery status, (c) HIPAA 164.402 breach risk assessment triggered on exfil event, (d) GDPR Art.33/34 + state breach law + UK GDPR + AU NDB parallel-clock matrix as framework-mandated output, (e) tabletop exercise inject covering exfil-before-encrypt scope determination under time-pressure.",
|
|
3701
|
+
"status": "open",
|
|
3702
|
+
"opened_date": "2026-05-15",
|
|
3703
|
+
"evidence_cves": [],
|
|
3704
|
+
"atlas_refs": [],
|
|
3705
|
+
"attack_refs": [
|
|
3706
|
+
"T1486",
|
|
3707
|
+
"T1567"
|
|
3708
|
+
],
|
|
3709
|
+
"theater_test": {
|
|
3710
|
+
"claim": "Our HIPAA incident response treats exfil-before-encrypt as a parallel breach class.",
|
|
3711
|
+
"test": "Pull the IR playbook. Confirm exfil-before-encrypt detection (24-72h egress profile preceding encryption event) is integrated. Confirm exfil-scope determination is a parallel obligation independent of encryption-recovery status. Confirm HIPAA 164.402 breach risk assessment auto-triggers on exfil event. Confirm GDPR Art.33/34 + state breach laws + UK GDPR + AU NDB parallel-clock matrix is framework-mandated output. Confirm tabletop exercise injected an exfil-before-encrypt scenario in past 12 months. Theater verdict if any of those is absent.",
|
|
3712
|
+
"evidence_required": [
|
|
3713
|
+
"IR playbook with exfil-before-encrypt sub-procedure",
|
|
3714
|
+
"parallel-clock matrix document",
|
|
3715
|
+
"tabletop execution log within past 12 months"
|
|
3716
|
+
],
|
|
3717
|
+
"verdict_when_failed": "compliance-theater"
|
|
3718
|
+
}
|
|
2129
3719
|
}
|
|
2130
3720
|
}
|