@blamejs/exceptd-skills 0.12.28 → 0.12.29
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/AGENTS.md +1 -1
- package/CHANGELOG.md +32 -0
- package/bin/exceptd.js +30 -20
- package/data/_indexes/_meta.json +8 -8
- package/data/_indexes/activity-feed.json +7 -7
- package/data/_indexes/chains.json +3 -3
- package/data/_indexes/currency.json +43 -43
- package/data/_indexes/stale-content.json +1 -1
- package/data/atlas-ttps.json +61 -111
- package/data/cve-catalog.json +101 -45
- package/data/cwe-catalog.json +149 -94
- package/data/d3fend-catalog.json +199 -53
- package/data/framework-control-gaps.json +1212 -109
- package/data/playbooks/crypto-codebase.json +1 -1
- package/data/rfc-references.json +21 -66
- package/lib/exit-codes.js +2 -0
- package/lib/playbook-runner.js +25 -1
- package/manifest-snapshot.json +2 -2
- package/manifest-snapshot.sha256 +1 -1
- package/manifest.json +49 -48
- package/package.json +3 -2
- package/sbom.cdx.json +1853 -10
- package/scripts/backfill-theater-test.js +806 -0
- package/scripts/refresh-reverse-refs.js +171 -0
- package/scripts/refresh-sbom.js +155 -8
|
@@ -36,7 +36,17 @@
|
|
|
36
36
|
"AML.T0018",
|
|
37
37
|
"AML.T0020"
|
|
38
38
|
],
|
|
39
|
-
"attack_refs": []
|
|
39
|
+
"attack_refs": [],
|
|
40
|
+
"theater_test": {
|
|
41
|
+
"claim": "We monitor our AI providers for security and treat model updates like any other vendor change.",
|
|
42
|
+
"test": "Pull the change-control register for the last 4 quarters; filter for entries where the affected asset is an externally hosted LLM, embedding model, or AI provider API. Count how many record (a) the model version pinned at the time, (b) a behavioural regression suite executed against the new version, and (c) the provider changelog reviewed with sign-off. Theater verdict if fewer than 90% of provider-side model updates produced an in-scope change-control entry, or if any sampled entry lacks a regression-suite artifact.",
|
|
43
|
+
"evidence_required": [
|
|
44
|
+
"change-control register CSV export filtered to AI/ML assets",
|
|
45
|
+
"behavioural regression test results bundle keyed to provider model versions",
|
|
46
|
+
"provider changelog review log with reviewer identity + timestamp"
|
|
47
|
+
],
|
|
48
|
+
"verdict_when_failed": "compliance-theater"
|
|
49
|
+
}
|
|
40
50
|
},
|
|
41
51
|
"ALL-MCP-TOOL-TRUST": {
|
|
42
52
|
"framework": "ALL",
|
|
@@ -60,7 +70,17 @@
|
|
|
60
70
|
],
|
|
61
71
|
"attack_refs": [
|
|
62
72
|
"T1195.001"
|
|
63
|
-
]
|
|
73
|
+
],
|
|
74
|
+
"theater_test": {
|
|
75
|
+
"claim": "Developer tooling is governed; AI plugins are no different from any other dev dependency.",
|
|
76
|
+
"test": "Scan every developer endpoint and CI runner for installed MCP server manifests (.claude/, .cursor/, .vscode/, ~/.codeium/, etc.). For each discovered MCP server, attempt to verify a publisher signature, locate it in an organisational allowlist, and trace its tool-grant prompt history. Theater verdict if any endpoint has an MCP server that is unsigned, absent from the allowlist, or has tool grants that bypassed user prompting.",
|
|
77
|
+
"evidence_required": [
|
|
78
|
+
"endpoint-scan output enumerating MCP server manifests with hashes",
|
|
79
|
+
"organisational MCP allowlist (or evidence one does not exist)",
|
|
80
|
+
"tool-grant audit log for one randomly selected developer over 30 days"
|
|
81
|
+
],
|
|
82
|
+
"verdict_when_failed": "compliance-theater"
|
|
83
|
+
}
|
|
64
84
|
},
|
|
65
85
|
"ALL-PROMPT-INJECTION-ACCESS-CONTROL": {
|
|
66
86
|
"framework": "ALL",
|
|
@@ -84,7 +104,17 @@
|
|
|
84
104
|
],
|
|
85
105
|
"attack_refs": [
|
|
86
106
|
"T1059"
|
|
87
|
-
]
|
|
107
|
+
],
|
|
108
|
+
"theater_test": {
|
|
109
|
+
"claim": "Our IAM controls cover all actions taken in our environment, including those by AI agents.",
|
|
110
|
+
"test": "Review the audit log for the past 30 days of any AI-agent service account. Sample 10 actions taken by the agent; for each, identify whether the action was the result of (a) an end-user request that the agent fulfilled within scope, or (b) content from a third-party data source (web page, document, RAG corpus) that influenced the action. Theater verdict if any sampled action originated from third-party content without per-action user re-authorization, or if the audit log does not preserve the prompt input chain for forensic reconstruction.",
|
|
111
|
+
"evidence_required": [
|
|
112
|
+
"AI agent service account audit log 30d",
|
|
113
|
+
"prompt input chain (system prompt + user prompt + tool results) for sampled actions",
|
|
114
|
+
"policy text defining prompt-level scope for each agent role"
|
|
115
|
+
],
|
|
116
|
+
"verdict_when_failed": "compliance-theater"
|
|
117
|
+
}
|
|
88
118
|
},
|
|
89
119
|
"AU-Essential-8-App-Hardening": {
|
|
90
120
|
"framework": "ASD Essential Eight (AU)",
|
|
@@ -110,7 +140,17 @@
|
|
|
110
140
|
"attack_refs": [
|
|
111
141
|
"T1059",
|
|
112
142
|
"T1204"
|
|
113
|
-
]
|
|
143
|
+
],
|
|
144
|
+
"theater_test": {
|
|
145
|
+
"claim": "We hardened user applications per Essential Eight Maturity Level 2; browsers and Office are locked down.",
|
|
146
|
+
"test": "Take the operator's hardened-application list. Confirm whether it enumerates AI coding assistants (Copilot, Cursor, Claude Code, Windsurf), MCP servers, and AI-tool config files (.claude/settings.json, .cursor/mcp.json, .vscode/settings.json:chat.tools.autoApprove) as in-scope. Pick a developer endpoint at random; verify those config files are integrity-monitored with the same alerting profile as security-sensitive files. Theater verdict if AI assistants are absent from the hardened-application list or if a config-file modification on the sampled endpoint would not generate an integrity alert.",
|
|
147
|
+
"evidence_required": [
|
|
148
|
+
"hardened-application policy document with version date",
|
|
149
|
+
"FIM/HIDS configuration showing watch list",
|
|
150
|
+
"test-induced modification on a non-production endpoint to confirm alert fires"
|
|
151
|
+
],
|
|
152
|
+
"verdict_when_failed": "compliance-theater"
|
|
153
|
+
}
|
|
114
154
|
},
|
|
115
155
|
"AU-Essential-8-Backup": {
|
|
116
156
|
"framework": "ASD Essential Eight (AU)",
|
|
@@ -133,7 +173,17 @@
|
|
|
133
173
|
"AML.T0020",
|
|
134
174
|
"AML.T0048"
|
|
135
175
|
],
|
|
136
|
-
"attack_refs": []
|
|
176
|
+
"attack_refs": [],
|
|
177
|
+
"theater_test": {
|
|
178
|
+
"claim": "Daily backups with off-network retention satisfy Essential Eight Maturity Level 2 Strategy 8.",
|
|
179
|
+
"test": "From the latest backup catalogue, confirm presence of fine-tuned model weights, RAG corpora, and AI tool configuration files (.claude/settings.json, MCP server registry). Restore one RAG corpus to an isolated environment; per-document-hash compare to current production. Theater verdict if AI artefacts are absent from the catalogue, or if any document hash diverges from production without a documented authoring event explaining the divergence.",
|
|
180
|
+
"evidence_required": [
|
|
181
|
+
"backup catalogue manifest",
|
|
182
|
+
"test-restore log for one RAG corpus",
|
|
183
|
+
"per-document hash diff between restored and production corpus"
|
|
184
|
+
],
|
|
185
|
+
"verdict_when_failed": "compliance-theater"
|
|
186
|
+
}
|
|
137
187
|
},
|
|
138
188
|
"AU-Essential-8-MFA": {
|
|
139
189
|
"framework": "ASD Essential Eight (AU)",
|
|
@@ -155,7 +205,17 @@
|
|
|
155
205
|
"attack_refs": [
|
|
156
206
|
"T1078",
|
|
157
207
|
"T1556"
|
|
158
|
-
]
|
|
208
|
+
],
|
|
209
|
+
"theater_test": {
|
|
210
|
+
"claim": "MFA is enforced on all administrative identities per Essential Eight ML2 with phishing-resistant factors.",
|
|
211
|
+
"test": "Sample 10 admin identities; for each, confirm the registered authenticator class is FIDO2/WebAuthn-bound (not SMS, voice, or TOTP). Then enumerate AI-provider service credentials (OpenAI, Anthropic, HuggingFace API tokens) used by the same admin scope; check token age and rotation policy. Theater verdict if any sampled human admin uses SMS/voice, or if any AI-provider credential has no rotation policy or is older than 90 days.",
|
|
212
|
+
"evidence_required": [
|
|
213
|
+
"IdP authenticator export for sampled admins",
|
|
214
|
+
"AI-provider credential inventory with creation/rotation timestamps",
|
|
215
|
+
"documented credential rotation policy"
|
|
216
|
+
],
|
|
217
|
+
"verdict_when_failed": "compliance-theater"
|
|
218
|
+
}
|
|
159
219
|
},
|
|
160
220
|
"AU-Essential-8-Patch": {
|
|
161
221
|
"framework": "ASD Essential Eight (AU)",
|
|
@@ -178,7 +238,17 @@
|
|
|
178
238
|
"atlas_refs": [],
|
|
179
239
|
"attack_refs": [
|
|
180
240
|
"T1068"
|
|
181
|
-
]
|
|
241
|
+
],
|
|
242
|
+
"theater_test": {
|
|
243
|
+
"claim": "We patch operating systems within the Essential Eight ML3 48-hour window for critical exploits.",
|
|
244
|
+
"test": "Pull the last 5 CISA KEV listings affecting an OS in scope. For each, measure elapsed time from KEV listing date to deployed-on-fleet-percentage >=95%. For one host that cannot accept a reboot in the window, confirm a live-patching capability is provisioned and was used. Theater verdict if any sampled KEV listing exceeded 48h to 95% fleet coverage, or if any 'cannot reboot' host lacks a live-patching pathway.",
|
|
245
|
+
"evidence_required": [
|
|
246
|
+
"patch-deployment telemetry timestamped against KEV listing dates",
|
|
247
|
+
"live-patch agent inventory with last-applied-patch evidence",
|
|
248
|
+
"fleet coverage rollup per CVE"
|
|
249
|
+
],
|
|
250
|
+
"verdict_when_failed": "compliance-theater"
|
|
251
|
+
}
|
|
182
252
|
},
|
|
183
253
|
"CIS-Controls-v8-Control7": {
|
|
184
254
|
"framework": "CIS Controls v8",
|
|
@@ -200,7 +270,17 @@
|
|
|
200
270
|
"atlas_refs": [],
|
|
201
271
|
"attack_refs": [
|
|
202
272
|
"T1068"
|
|
203
|
-
]
|
|
273
|
+
],
|
|
274
|
+
"theater_test": {
|
|
275
|
+
"claim": "We meet CIS Control 7 IG3 by remediating critical vulnerabilities within one month.",
|
|
276
|
+
"test": "Pull the vulnerability register for the past 12 months. Filter for CVEs that appeared on CISA KEV with public PoC during the period. For each, measure (a) time from KEV listing to verified mitigation, and (b) whether the mitigation was a live patch, configuration change, or isolation. Theater verdict if any KEV+PoC entry exceeded 4h to verified mitigation or if 'monthly cadence' was applied to a KEV-listed CVE.",
|
|
277
|
+
"evidence_required": [
|
|
278
|
+
"vuln-management register CSV export with timestamped state transitions",
|
|
279
|
+
"KEV listing dates per CVE",
|
|
280
|
+
"mitigation evidence (patch deployment log, config change ticket, isolation network ACL)"
|
|
281
|
+
],
|
|
282
|
+
"verdict_when_failed": "compliance-theater"
|
|
283
|
+
}
|
|
204
284
|
},
|
|
205
285
|
"CMMC-2.0-Level-2": {
|
|
206
286
|
"framework": "CMMC 2.0 (Cybersecurity Maturity Model Certification) Level 2",
|
|
@@ -230,7 +310,17 @@
|
|
|
230
310
|
"T1195.001",
|
|
231
311
|
"T1071",
|
|
232
312
|
"T1059"
|
|
233
|
-
]
|
|
313
|
+
],
|
|
314
|
+
"theater_test": {
|
|
315
|
+
"claim": "We are CMMC Level 2 attested across all 110 NIST 800-171 controls; CUI is protected end-to-end.",
|
|
316
|
+
"test": "Walk the 3.4.1 (CM) asset inventory and check for AI assistants and MCP servers with CUI-adjacent access. Then inspect 3.13 system-and-communications protections to confirm AI-API egress is enumerated as a CUI exfiltration channel with monitoring. Theater verdict if AI assistants are absent from the asset inventory, or if AI-API egress at the CUI boundary has no monitoring rule, or if cross-walks to UK DEF STAN / AU DISP for joint programmes are missing.",
|
|
317
|
+
"evidence_required": [
|
|
318
|
+
"3.4.1 asset inventory export filtered to AI/ML and MCP entries",
|
|
319
|
+
"egress monitoring rule export for AI-API destinations",
|
|
320
|
+
"cross-walk document for joint programmes (if any)"
|
|
321
|
+
],
|
|
322
|
+
"verdict_when_failed": "compliance-theater"
|
|
323
|
+
}
|
|
234
324
|
},
|
|
235
325
|
"CWE-Top-25-2024-meta": {
|
|
236
326
|
"framework": "CWE Top 25 Most Dangerous Software Weaknesses (2024 list)",
|
|
@@ -256,7 +346,17 @@
|
|
|
256
346
|
],
|
|
257
347
|
"attack_refs": [
|
|
258
348
|
"T1059"
|
|
259
|
-
]
|
|
349
|
+
],
|
|
350
|
+
"theater_test": {
|
|
351
|
+
"claim": "Our SAST/DAST coverage maps to the CWE Top 25; we test for the most dangerous weaknesses.",
|
|
352
|
+
"test": "Pull the SAST/DAST rule pack and enumerate which CWE IDs each rule targets. Confirm rules exist for AI-specific CWE classes (CWE-1039 model integrity, CWE-1395 dependency on vulnerable third-party component, prompt-injection class CWEs). Run the rule pack against a known-vulnerable test fixture containing prompt-injection patterns. Theater verdict if AI-relevant CWE IDs are absent from the rule pack, or if the fixture run produces zero findings on the planted prompt-injection.",
|
|
353
|
+
"evidence_required": [
|
|
354
|
+
"SAST/DAST rule-to-CWE mapping export",
|
|
355
|
+
"test fixture with planted prompt-injection patterns",
|
|
356
|
+
"scan report against the fixture"
|
|
357
|
+
],
|
|
358
|
+
"verdict_when_failed": "compliance-theater"
|
|
359
|
+
}
|
|
260
360
|
},
|
|
261
361
|
"CycloneDX-v1.6-SBOM": {
|
|
262
362
|
"framework": "CycloneDX v1.6 (OWASP SBOM standard)",
|
|
@@ -282,7 +382,17 @@
|
|
|
282
382
|
],
|
|
283
383
|
"attack_refs": [
|
|
284
384
|
"T1195.001"
|
|
285
|
-
]
|
|
385
|
+
],
|
|
386
|
+
"theater_test": {
|
|
387
|
+
"claim": "We ship a CycloneDX 1.6 SBOM with every release; supply-chain transparency is satisfied.",
|
|
388
|
+
"test": "Pull the SBOM for the most recent release. Confirm presence of an `mlComponent` (or equivalent ML-BOM) section enumerating model + adapters + tokenizer. Check provenance fields (signature, supplier, training data source) for empty values. Confirm MCP servers in the build environment are reflected. Theater verdict if ML components are absent, or if more than 20% of components have an empty provenance field.",
|
|
389
|
+
"evidence_required": [
|
|
390
|
+
"latest CycloneDX 1.6 SBOM JSON",
|
|
391
|
+
"ML-BOM section specifically",
|
|
392
|
+
"MCP server manifest from build environment"
|
|
393
|
+
],
|
|
394
|
+
"verdict_when_failed": "compliance-theater"
|
|
395
|
+
}
|
|
286
396
|
},
|
|
287
397
|
"DORA-Art28": {
|
|
288
398
|
"framework": "EU DORA (Regulation 2022/2554)",
|
|
@@ -306,7 +416,17 @@
|
|
|
306
416
|
],
|
|
307
417
|
"attack_refs": [
|
|
308
418
|
"T1195.002"
|
|
309
|
-
]
|
|
419
|
+
],
|
|
420
|
+
"theater_test": {
|
|
421
|
+
"claim": "Our DORA Art. 28 ICT third-party register covers all critical or important function dependencies.",
|
|
422
|
+
"test": "From the Art. 28 register, sample 5 third-party ICT services consumed in CIF (critical or important function) flows. For each, verify presence of build-provenance metadata (SLSA producer identifier, workflow file hash, cache key surface). Check for monthly producer-side cache verification evidence. Theater verdict if any sampled CIF dependency lacks build-provenance metadata, or if cache verification has not run in the last 90 days.",
|
|
423
|
+
"evidence_required": [
|
|
424
|
+
"Art. 28 register export with provenance fields",
|
|
425
|
+
"monthly cache-verification job logs",
|
|
426
|
+
"SLSA attestations from sampled producers"
|
|
427
|
+
],
|
|
428
|
+
"verdict_when_failed": "compliance-theater"
|
|
429
|
+
}
|
|
310
430
|
},
|
|
311
431
|
"DORA-RTS-Subcontracting": {
|
|
312
432
|
"framework": "EU DORA (Regulation 2022/2554) — RTS on subcontracting of ICT services supporting critical or important functions",
|
|
@@ -331,7 +451,17 @@
|
|
|
331
451
|
"attack_refs": [
|
|
332
452
|
"T1195.001",
|
|
333
453
|
"T1195.002"
|
|
334
|
-
]
|
|
454
|
+
],
|
|
455
|
+
"theater_test": {
|
|
456
|
+
"claim": "Our DORA RTS subcontracting register lists every sub-processor for ICT services supporting CIF.",
|
|
457
|
+
"test": "Pull the subcontracting register. Confirm enumeration of AI sub-processors per ICT service line: model providers, embedding providers, vector stores, RAG corpus hosts, MCP server providers. Compute foundation-model concentration (% of CIF flows that share a single foundation model). Theater verdict if AI sub-processors are absent from any service line that consumes AI, or if foundation-model concentration is undocumented.",
|
|
458
|
+
"evidence_required": [
|
|
459
|
+
"subcontracting register export with AI sub-processor entries",
|
|
460
|
+
"foundation-model concentration analysis report",
|
|
461
|
+
"exit-strategy evidence per critical AI sub-processor"
|
|
462
|
+
],
|
|
463
|
+
"verdict_when_failed": "compliance-theater"
|
|
464
|
+
}
|
|
335
465
|
},
|
|
336
466
|
"DORA-ITS-TLPT": {
|
|
337
467
|
"framework": "EU DORA (Regulation 2022/2554) — ITS on threat-led penetration testing under Art. 26",
|
|
@@ -359,7 +489,17 @@
|
|
|
359
489
|
"attack_refs": [
|
|
360
490
|
"T1195.001",
|
|
361
491
|
"T1059"
|
|
362
|
-
]
|
|
492
|
+
],
|
|
493
|
+
"theater_test": {
|
|
494
|
+
"claim": "Our most recent threat-led penetration test under DORA Art. 26 covered the full CIF estate.",
|
|
495
|
+
"test": "Pull the TLPT scoping template and final report. Confirm AI/MCP assets are enumerated in scope. Verify the threat-intel inputs cite ATLAS TTPs and AI-discovered CVE classes. Confirm the TLPT team includes documented AI/MCP competency. Inspect the report for at least one finding originating from an AI/MCP attack path. Theater verdict if the scoping template excludes AI/MCP assets despite their presence in CIF flows, or if the team lacks documented AI competency.",
|
|
496
|
+
"evidence_required": [
|
|
497
|
+
"TLPT scoping template",
|
|
498
|
+
"TLPT final report with AI/MCP findings section",
|
|
499
|
+
"TLPT team CVs covering AI/MCP red-team experience"
|
|
500
|
+
],
|
|
501
|
+
"verdict_when_failed": "compliance-theater"
|
|
502
|
+
}
|
|
363
503
|
},
|
|
364
504
|
"DORA-RTS-Incident-Classification": {
|
|
365
505
|
"framework": "EU DORA (Regulation 2022/2554) — RTS on classification of major ICT-related incidents under Art. 18(3)",
|
|
@@ -385,7 +525,17 @@
|
|
|
385
525
|
],
|
|
386
526
|
"attack_refs": [
|
|
387
527
|
"T1059"
|
|
388
|
-
]
|
|
528
|
+
],
|
|
529
|
+
"theater_test": {
|
|
530
|
+
"claim": "Our incident-classification process implements the DORA RTS criteria for major ICT incidents.",
|
|
531
|
+
"test": "Pull the incident register for the last 12 months. For each major-classified incident, confirm presence of qualitative criteria evaluation. Then ask whether AI-incident classes (model invocations on injected intent, RAG corpus integrity loss, agent actions outside scope) would surface a major classification under the current criteria. Theater verdict if AI-class quantitative measures are absent, or if a synthetic AI-incident scenario evaluated against current criteria fails to trigger major classification when impact warrants it.",
|
|
532
|
+
"evidence_required": [
|
|
533
|
+
"incident register CSV with classification rationale per entry",
|
|
534
|
+
"RTS criteria mapping document",
|
|
535
|
+
"synthetic AI-incident classification dry-run record"
|
|
536
|
+
],
|
|
537
|
+
"verdict_when_failed": "compliance-theater"
|
|
538
|
+
}
|
|
389
539
|
},
|
|
390
540
|
"DORA-IA-CTPP-Oversight": {
|
|
391
541
|
"framework": "EU DORA (Regulation 2022/2554) — Implementing Acts for critical-third-party-provider (CTPP) oversight under Art. 31-44",
|
|
@@ -408,7 +558,17 @@
|
|
|
408
558
|
],
|
|
409
559
|
"attack_refs": [
|
|
410
560
|
"T1195.001"
|
|
411
|
-
]
|
|
561
|
+
],
|
|
562
|
+
"theater_test": {
|
|
563
|
+
"claim": "We track designated critical third-party providers (CTPPs) per DORA Art. 31-44.",
|
|
564
|
+
"test": "Pull the CTPP designation list. Confirm whether frontier-AI providers and MCP/agent-runtime providers consumed by the entity appear or have a documented evaluation against designation criteria. Check Lead Overseer audit deliverables for AI-specific artefacts (model cards, system cards, eval results, training data manifests). Theater verdict if AI providers consumed at scale are absent without an evaluation record, or if Lead Overseer artefacts lack AI-specific content.",
|
|
565
|
+
"evidence_required": [
|
|
566
|
+
"CTPP designation list with evaluation rationale",
|
|
567
|
+
"Lead Overseer engagement record with deliverable list",
|
|
568
|
+
"AI-provider concentration analysis"
|
|
569
|
+
],
|
|
570
|
+
"verdict_when_failed": "compliance-theater"
|
|
571
|
+
}
|
|
412
572
|
},
|
|
413
573
|
"EU-AI-Act-Art-15": {
|
|
414
574
|
"framework": "EU Artificial Intelligence Act (2024/1689)",
|
|
@@ -434,7 +594,17 @@
|
|
|
434
594
|
"AML.T0054",
|
|
435
595
|
"AML.T0057"
|
|
436
596
|
],
|
|
437
|
-
"attack_refs": []
|
|
597
|
+
"attack_refs": [],
|
|
598
|
+
"theater_test": {
|
|
599
|
+
"claim": "Our high-risk AI system meets the EU AI Act Art. 15 'appropriate level of cybersecurity'.",
|
|
600
|
+
"test": "Request the cybersecurity test pack. Confirm presence of (a) prompt-injection red-team results bound to OWASP LLM Top 10, (b) RAG-corpus integrity test results, (c) model-extraction-resistance assessment, (d) MCP/plugin trust verification log. Then check incident-reporting bridge to NIS2 + DORA. Theater verdict if any of (a)-(d) are absent or older than 12 months, or if the bridge to NIS2/DORA notification clocks is undocumented.",
|
|
601
|
+
"evidence_required": [
|
|
602
|
+
"adversarial test pack covering OWASP LLM Top 10",
|
|
603
|
+
"RAG corpus integrity test report",
|
|
604
|
+
"incident-reporting playbook with NIS2/DORA bridge"
|
|
605
|
+
],
|
|
606
|
+
"verdict_when_failed": "compliance-theater"
|
|
607
|
+
}
|
|
438
608
|
},
|
|
439
609
|
"EU-AI-Act-Art-53-GPAI": {
|
|
440
610
|
"framework": "EU Artificial Intelligence Act (2024/1689) — General-Purpose AI provider obligations",
|
|
@@ -456,7 +626,17 @@
|
|
|
456
626
|
"AML.T0018",
|
|
457
627
|
"AML.T0020"
|
|
458
628
|
],
|
|
459
|
-
"attack_refs": []
|
|
629
|
+
"attack_refs": [],
|
|
630
|
+
"theater_test": {
|
|
631
|
+
"claim": "We comply with EU AI Act Art. 53 GPAI provider obligations including training-data summary publication.",
|
|
632
|
+
"test": "Pull the published training-data summary. Confirm machine-readable corpus-level granularity sufficient for copyright audit (per-corpus identifier + size + collection method + opt-out evidence). Walk downstream-provider documentation; confirm signed bindings to a production model fingerprint. Theater verdict if the summary is prose-only without machine-readable structure, or if downstream docs reference an unsigned/floating model identity.",
|
|
633
|
+
"evidence_required": [
|
|
634
|
+
"machine-readable training-data summary file (YAML/JSON)",
|
|
635
|
+
"downstream documentation bundle with signed model fingerprint",
|
|
636
|
+
"per-corpus copyright-policy attestations"
|
|
637
|
+
],
|
|
638
|
+
"verdict_when_failed": "compliance-theater"
|
|
639
|
+
}
|
|
460
640
|
},
|
|
461
641
|
"EU-AI-Act-Art-55-Systemic": {
|
|
462
642
|
"framework": "EU Artificial Intelligence Act (2024/1689) — GPAI with systemic risk",
|
|
@@ -485,7 +665,17 @@
|
|
|
485
665
|
],
|
|
486
666
|
"attack_refs": [
|
|
487
667
|
"T1059"
|
|
488
|
-
]
|
|
668
|
+
],
|
|
669
|
+
"theater_test": {
|
|
670
|
+
"claim": "Our GPAI model with systemic risk meets the additional Art. 55 obligations.",
|
|
671
|
+
"test": "Pull the adversarial-evaluation report. Confirm coverage of OWASP LLM Top 10 + ATLAS TTPs + MCP-trust scenarios. Pull the energy report; confirm kWh-per-million-tokens and training compute under ISO/IEC TR 24028 framing. Cross-walk the incident-reporting clock with DORA Art. 19 timing. Theater verdict if the eval omits any of OWASP/ATLAS/MCP coverage, if energy reporting is qualitative only, or if the incident-clock cross-walk is missing.",
|
|
672
|
+
"evidence_required": [
|
|
673
|
+
"adversarial eval report with method per attack class",
|
|
674
|
+
"energy reporting per ISO/IEC TR 24028",
|
|
675
|
+
"incident-clock cross-walk to DORA"
|
|
676
|
+
],
|
|
677
|
+
"verdict_when_failed": "compliance-theater"
|
|
678
|
+
}
|
|
489
679
|
},
|
|
490
680
|
"EU-AI-Act-Annex-IX-Conformity": {
|
|
491
681
|
"framework": "EU Artificial Intelligence Act (2024/1689) — Annex IX conformity assessment",
|
|
@@ -506,7 +696,17 @@
|
|
|
506
696
|
"AML.T0010",
|
|
507
697
|
"AML.T0018"
|
|
508
698
|
],
|
|
509
|
-
"attack_refs": []
|
|
699
|
+
"attack_refs": [],
|
|
700
|
+
"theater_test": {
|
|
701
|
+
"claim": "Our high-risk AI system passed conformity assessment per Annex IX.",
|
|
702
|
+
"test": "If internal-control route was used: request the third-party sample audit (e.g. AI-Office annual sampling) outcome. If notified-body route: request the body's scope letter and confirm AI-specific competency. For both, confirm an operational definition of 'substantial modification' covers fine-tuning, RAG changes, and system-prompt changes — and that a recent change was assessed against it. Theater verdict if the sampling/notified-body record is absent, or if substantial-modification gating has never fired despite a known fine-tune or RAG change.",
|
|
703
|
+
"evidence_required": [
|
|
704
|
+
"internal-control attestation + sampling outcome OR notified-body scope letter",
|
|
705
|
+
"substantial-modification policy document",
|
|
706
|
+
"change log showing modifications assessed against the policy"
|
|
707
|
+
],
|
|
708
|
+
"verdict_when_failed": "compliance-theater"
|
|
709
|
+
}
|
|
510
710
|
},
|
|
511
711
|
"EU-AI-Act-GPAI-CoP": {
|
|
512
712
|
"framework": "EU Artificial Intelligence Act (2024/1689) — Code of Practice for GPAI",
|
|
@@ -528,7 +728,17 @@
|
|
|
528
728
|
"AML.T0018",
|
|
529
729
|
"AML.T0020"
|
|
530
730
|
],
|
|
531
|
-
"attack_refs": []
|
|
731
|
+
"attack_refs": [],
|
|
732
|
+
"theater_test": {
|
|
733
|
+
"claim": "We follow the GPAI Code of Practice as our presumed-compliance route for Art. 53/55.",
|
|
734
|
+
"test": "Confirm signatory status. Pull the AI Office's published enforcement-deference position for code-conformant signatories. For each evidentiary commitment in the Code, locate the artefact (training-data summary, eval report, downstream-distributor list, energy report) and confirm it is current. Theater verdict if signatory but any required Code artefact is missing or older than the Code's refresh cadence.",
|
|
735
|
+
"evidence_required": [
|
|
736
|
+
"Code-of-Practice signatory confirmation",
|
|
737
|
+
"evidentiary artefact bundle keyed to Code commitments",
|
|
738
|
+
"AI Office enforcement-deference reference"
|
|
739
|
+
],
|
|
740
|
+
"verdict_when_failed": "compliance-theater"
|
|
741
|
+
}
|
|
532
742
|
},
|
|
533
743
|
"EU-CRA-Art13": {
|
|
534
744
|
"framework": "EU Cyber Resilience Act (2024/2847)",
|
|
@@ -554,7 +764,17 @@
|
|
|
554
764
|
"attack_refs": [
|
|
555
765
|
"T1195.001",
|
|
556
766
|
"T1195.002"
|
|
557
|
-
]
|
|
767
|
+
],
|
|
768
|
+
"theater_test": {
|
|
769
|
+
"claim": "We satisfy EU CRA Art. 13 essential cybersecurity requirements with technical documentation on file.",
|
|
770
|
+
"test": "Request the canonical build-pipeline definition for the most recent release. Confirm publication alongside the release artifact (workflow file hash, runner attestation, secrets scope). Pick the release-being-installed at a downstream operator; verify its build pipeline matches the published definition by comparing producer-side hashes. Confirm the incident-notification clock starts from FIRST awareness (not from confirmed exploit). Theater verdict if pipeline definitions are unpublished, hashes diverge, or the clock policy starts later than first awareness.",
|
|
771
|
+
"evidence_required": [
|
|
772
|
+
"published build-pipeline definition with hashes",
|
|
773
|
+
"downstream-side hash verification log",
|
|
774
|
+
"incident-notification policy document"
|
|
775
|
+
],
|
|
776
|
+
"verdict_when_failed": "compliance-theater"
|
|
777
|
+
}
|
|
558
778
|
},
|
|
559
779
|
"FedRAMP-Rev5-Moderate": {
|
|
560
780
|
"framework": "FedRAMP Rev 5 Moderate",
|
|
@@ -581,7 +801,17 @@
|
|
|
581
801
|
"attack_refs": [
|
|
582
802
|
"T1071",
|
|
583
803
|
"T1059"
|
|
584
|
-
]
|
|
804
|
+
],
|
|
805
|
+
"theater_test": {
|
|
806
|
+
"claim": "All cloud services in our boundary are FedRAMP Moderate authorised; AI services are covered.",
|
|
807
|
+
"test": "Enumerate every AI/ML service consumed within the authorisation boundary. For each, locate either (a) a FedRAMP Moderate ATO letter, (b) a documented exception with risk acceptance signed by the AO, or (c) an equivalence path (StateRAMP, FedRAMP Tailored, etc.). Verify the SSP includes shared-responsibility language covering prompt data, output data, training opt-out, and retention. Theater verdict if any AI service is in use without one of (a)-(c), or if the SSP shared-responsibility matrix lacks AI-specific clauses.",
|
|
808
|
+
"evidence_required": [
|
|
809
|
+
"AI service inventory keyed to FedRAMP marketplace IDs",
|
|
810
|
+
"AO-signed risk acceptance for non-authorised AI services",
|
|
811
|
+
"SSP excerpts showing AI shared-responsibility language"
|
|
812
|
+
],
|
|
813
|
+
"verdict_when_failed": "compliance-theater"
|
|
814
|
+
}
|
|
585
815
|
},
|
|
586
816
|
"HIPAA-Security-Rule-164.312(a)(1)": {
|
|
587
817
|
"framework": "HIPAA Security Rule (45 CFR § 164.312)",
|
|
@@ -607,7 +837,17 @@
|
|
|
607
837
|
"attack_refs": [
|
|
608
838
|
"T1071",
|
|
609
839
|
"T1530"
|
|
610
|
-
]
|
|
840
|
+
],
|
|
841
|
+
"theater_test": {
|
|
842
|
+
"claim": "We meet HIPAA 164.312(a)(1) access controls; PHI is access-controlled with unique user IDs.",
|
|
843
|
+
"test": "Inventory AI providers in use; for each consuming PHI, locate a BAA covering prompt retention + training opt-out + breach notification within HIPAA timelines. Inspect prompt-flow telemetry for PHI; confirm DLP minimisation runs pre-egress. Confirm AI agent sessions have controls separate from human user controls. Theater verdict if any AI provider consuming PHI lacks a BAA, if DLP is absent on prompt egress, or if AI agent sessions inherit human controls without separation.",
|
|
844
|
+
"evidence_required": [
|
|
845
|
+
"AI-provider BAA bundle",
|
|
846
|
+
"DLP rule export for prompt egress",
|
|
847
|
+
"agent-session control configuration"
|
|
848
|
+
],
|
|
849
|
+
"verdict_when_failed": "compliance-theater"
|
|
850
|
+
}
|
|
611
851
|
},
|
|
612
852
|
"HIPAA-Security-Rule-2026-NPRM-164.308": {
|
|
613
853
|
"framework": "HIPAA Security Rule (45 CFR § 164.308) — 2026 Notice of Proposed Rulemaking",
|
|
@@ -633,7 +873,17 @@
|
|
|
633
873
|
"attack_refs": [
|
|
634
874
|
"T1071",
|
|
635
875
|
"T1530"
|
|
636
|
-
]
|
|
876
|
+
],
|
|
877
|
+
"theater_test": {
|
|
878
|
+
"claim": "Our administrative safeguards meet the HIPAA Security Rule including 2026 NPRM updates.",
|
|
879
|
+
"test": "Walk the technology-asset register; confirm AI assistants and model-API providers are enumerated as asset categories. Pull the network map; confirm AI-API egress routes are marked with BAA and training-opt-out attestation. Confirm the tabletop catalogue contains at least one AI-specific PHI loss scenario exercised in the past 12 months. Theater verdict if AI assets are absent, network-map AI routes lack attestations, or the tabletop catalogue has no AI scenario.",
|
|
880
|
+
"evidence_required": [
|
|
881
|
+
"technology-asset register with AI categories",
|
|
882
|
+
"network map with AI-API egress annotations",
|
|
883
|
+
"tabletop exercise catalogue with execution dates"
|
|
884
|
+
],
|
|
885
|
+
"verdict_when_failed": "compliance-theater"
|
|
886
|
+
}
|
|
637
887
|
},
|
|
638
888
|
"HIPAA-Security-Rule-2026-NPRM-164.310": {
|
|
639
889
|
"framework": "HIPAA Security Rule (45 CFR § 164.310) — 2026 Notice of Proposed Rulemaking",
|
|
@@ -658,7 +908,17 @@
|
|
|
658
908
|
],
|
|
659
909
|
"attack_refs": [
|
|
660
910
|
"T1071"
|
|
661
|
-
]
|
|
911
|
+
],
|
|
912
|
+
"theater_test": {
|
|
913
|
+
"claim": "Our physical safeguards meet HIPAA 164.310 including network-access logging in the 2026 NPRM.",
|
|
914
|
+
"test": "Sample developer endpoints with PHI exposure. Confirm AI-API session logging is captured under the network-access-logging mandate (timestamp, user, prompt hash, response hash, destination provider). Confirm media-disposal verification extends to AI training-data opt-out attestation per provider. Theater verdict if AI-API sessions are unlogged, or if any departed user retained AI provider credentials past their termination date.",
|
|
915
|
+
"evidence_required": [
|
|
916
|
+
"AI-API session log sample for sampled endpoints",
|
|
917
|
+
"training-data opt-out attestation per AI provider",
|
|
918
|
+
"departed-user credential-revocation evidence"
|
|
919
|
+
],
|
|
920
|
+
"verdict_when_failed": "compliance-theater"
|
|
921
|
+
}
|
|
662
922
|
},
|
|
663
923
|
"HIPAA-Security-Rule-2026-NPRM-164.312": {
|
|
664
924
|
"framework": "HIPAA Security Rule (45 CFR § 164.312) — 2026 Notice of Proposed Rulemaking",
|
|
@@ -688,7 +948,17 @@
|
|
|
688
948
|
"T1059",
|
|
689
949
|
"T1068",
|
|
690
950
|
"T1078"
|
|
691
|
-
]
|
|
951
|
+
],
|
|
952
|
+
"theater_test": {
|
|
953
|
+
"claim": "Our technical safeguards meet HIPAA 164.312 including the 2026 NPRM expansions.",
|
|
954
|
+
"test": "Pick 5 AI-agent flows that touch PHI. For each, confirm a per-action MFA-equivalent (delegated-authority attestation) is captured. Inspect storage of AI-provider artifacts (conversation history, embeddings, fine-tune sets) for encryption-at-rest. Confirm prompt-injection and RAG-poisoning detection rules exist as anti-malware-equivalents. Theater verdict if per-action attestations are absent, AI artifacts are stored unencrypted, or no prompt-injection/RAG-poisoning detection rules exist.",
|
|
955
|
+
"evidence_required": [
|
|
956
|
+
"delegated-authority attestation samples",
|
|
957
|
+
"encryption-at-rest configuration for AI artifacts",
|
|
958
|
+
"prompt-injection / RAG-poisoning detection rule export"
|
|
959
|
+
],
|
|
960
|
+
"verdict_when_failed": "compliance-theater"
|
|
961
|
+
}
|
|
692
962
|
},
|
|
693
963
|
"HIPAA-Security-Rule-2026-NPRM-164.314": {
|
|
694
964
|
"framework": "HIPAA Security Rule (45 CFR § 164.314) — 2026 Notice of Proposed Rulemaking",
|
|
@@ -713,7 +983,17 @@
|
|
|
713
983
|
],
|
|
714
984
|
"attack_refs": [
|
|
715
985
|
"T1195.001"
|
|
716
|
-
]
|
|
986
|
+
],
|
|
987
|
+
"theater_test": {
|
|
988
|
+
"claim": "Our BAAs satisfy HIPAA 164.314 organisational requirements including 2026 NPRM AI provisions.",
|
|
989
|
+
"test": "Pull the AI-provider BAA portfolio. Confirm each contract covers (a) prompt retention policy with explicit duration, (b) training opt-out with attestation evidence, (c) breach-notification timeline aligned with HIPAA, (d) sub-processor disclosure. Theater verdict if any AI provider's BAA is silent on prompt retention, training opt-out, or sub-processors, or if 'training opt-out' is contractual without an evidence path.",
|
|
990
|
+
"evidence_required": [
|
|
991
|
+
"AI-provider BAA portfolio with clause-by-clause checklist",
|
|
992
|
+
"training-opt-out attestation evidence per provider",
|
|
993
|
+
"sub-processor disclosure inventories"
|
|
994
|
+
],
|
|
995
|
+
"verdict_when_failed": "compliance-theater"
|
|
996
|
+
}
|
|
717
997
|
},
|
|
718
998
|
"HITRUST-CSF-v11.4-09.l": {
|
|
719
999
|
"framework": "HITRUST CSF v11.4",
|
|
@@ -739,7 +1019,17 @@
|
|
|
739
1019
|
],
|
|
740
1020
|
"attack_refs": [
|
|
741
1021
|
"T1195.001"
|
|
742
|
-
]
|
|
1022
|
+
],
|
|
1023
|
+
"theater_test": {
|
|
1024
|
+
"claim": "We meet HITRUST CSF 09.l outsourced services management for all third-party providers.",
|
|
1025
|
+
"test": "Pull the third-party register. Filter for AI providers; confirm AI vendors are inventoried separately from general SaaS. Spot-check 5 AI vendors for AI-specific contractual clauses (prompt retention, training opt-out, residency, model version pinning, prompt-breach notification). Search for self-signup AI usage on developer endpoints; confirm a policy prohibits it for in-scope data. Theater verdict if AI is bucketed inside generic SaaS, if any sampled AI vendor lacks AI-specific clauses, or if self-signup AI is in evidence on a developer endpoint that touches in-scope data.",
|
|
1026
|
+
"evidence_required": [
|
|
1027
|
+
"third-party register with AI subset",
|
|
1028
|
+
"AI-specific contract clause checklist per vendor",
|
|
1029
|
+
"endpoint scan for self-signup AI tools"
|
|
1030
|
+
],
|
|
1031
|
+
"verdict_when_failed": "compliance-theater"
|
|
1032
|
+
}
|
|
743
1033
|
},
|
|
744
1034
|
"IEC-62443-3-3": {
|
|
745
1035
|
"framework": "IEC 62443-3-3 (Industrial communication networks — security for IACS)",
|
|
@@ -767,7 +1057,17 @@
|
|
|
767
1057
|
"T0883",
|
|
768
1058
|
"T0855",
|
|
769
1059
|
"T1071"
|
|
770
|
-
]
|
|
1060
|
+
],
|
|
1061
|
+
"theater_test": {
|
|
1062
|
+
"claim": "Our IACS architecture meets IEC 62443-3-3 system security requirements.",
|
|
1063
|
+
"test": "Inspect the zone-and-conduit diagram. Confirm AI operator assistants and AI-API egress paths from the corporate-to-OT boundary are enumerated as conduits with documented security levels. Sample 3 OT operator workstations; confirm any installed AI assistants are inventoried and that prompt-injection-class threats appear in the threat model. Theater verdict if AI conduits are absent from the zone diagram, or if AI assistants on OT operator workstations are not threat-modelled.",
|
|
1064
|
+
"evidence_required": [
|
|
1065
|
+
"zone-and-conduit diagram with AI annotations",
|
|
1066
|
+
"OT operator workstation inventory",
|
|
1067
|
+
"threat-model document covering AI conduit threats"
|
|
1068
|
+
],
|
|
1069
|
+
"verdict_when_failed": "compliance-theater"
|
|
1070
|
+
}
|
|
771
1071
|
},
|
|
772
1072
|
"ISO-27001-2022-A.8.16": {
|
|
773
1073
|
"framework": "ISO/IEC 27001:2022",
|
|
@@ -789,7 +1089,17 @@
|
|
|
789
1089
|
],
|
|
790
1090
|
"attack_refs": [
|
|
791
1091
|
"T1071"
|
|
792
|
-
]
|
|
1092
|
+
],
|
|
1093
|
+
"theater_test": {
|
|
1094
|
+
"claim": "Our monitoring activities under ISO 27001:2022 A.8.16 cover all in-scope systems.",
|
|
1095
|
+
"test": "From the SIEM event-source inventory, confirm AI-API egress events, MCP server invocations, and AI-agent action audit logs are ingested. Sample one alert from each class in the past 30 days; confirm an analyst reviewed it. Theater verdict if any of those source classes are missing from the SIEM, or if no AI/MCP-related alert has been triaged in the past 90 days despite traffic being present.",
|
|
1096
|
+
"evidence_required": [
|
|
1097
|
+
"SIEM event-source inventory",
|
|
1098
|
+
"alert triage records for AI/MCP-class alerts",
|
|
1099
|
+
"telemetry volume report by source class"
|
|
1100
|
+
],
|
|
1101
|
+
"verdict_when_failed": "compliance-theater"
|
|
1102
|
+
}
|
|
793
1103
|
},
|
|
794
1104
|
"ISO-27001-2022-A.8.28": {
|
|
795
1105
|
"framework": "ISO/IEC 27001:2022",
|
|
@@ -812,7 +1122,17 @@
|
|
|
812
1122
|
"AML.T0051",
|
|
813
1123
|
"AML.T0054"
|
|
814
1124
|
],
|
|
815
|
-
"attack_refs": []
|
|
1125
|
+
"attack_refs": [],
|
|
1126
|
+
"theater_test": {
|
|
1127
|
+
"claim": "We follow secure coding practices per ISO 27001:2022 A.8.28.",
|
|
1128
|
+
"test": "Pull the secure-coding standard. Confirm it addresses AI-generated code (Copilot, Claude Code, Cursor diffs) with reviewer-attestation requirements and prompt-injection-class CWE coverage. Check git history for AI-coauthored commits; confirm the pre-merge review record is preserved. Theater verdict if the standard is silent on AI-generated code, or if AI-attributed commits lack a reviewer-attestation trail.",
|
|
1129
|
+
"evidence_required": [
|
|
1130
|
+
"secure-coding standard document with version date",
|
|
1131
|
+
"git history sample with AI-attribution analysis",
|
|
1132
|
+
"code-review records for AI-attributed diffs"
|
|
1133
|
+
],
|
|
1134
|
+
"verdict_when_failed": "compliance-theater"
|
|
1135
|
+
}
|
|
816
1136
|
},
|
|
817
1137
|
"ISO-27001-2022-A.8.30": {
|
|
818
1138
|
"framework": "ISO/IEC 27001:2022",
|
|
@@ -836,7 +1156,17 @@
|
|
|
836
1156
|
],
|
|
837
1157
|
"attack_refs": [
|
|
838
1158
|
"T1195.001"
|
|
839
|
-
]
|
|
1159
|
+
],
|
|
1160
|
+
"theater_test": {
|
|
1161
|
+
"claim": "Our outsourced development meets ISO 27001:2022 A.8.30 oversight requirements.",
|
|
1162
|
+
"test": "Pull the outsourced-dev contract bundle. Confirm clauses naming AI tool usage by the contractor (which AI assistants, which models, which prompt destinations) and reviewer attestation for AI-generated diffs. Sample one delivered build; confirm SBOM enumerates AI-build dependencies. Theater verdict if contracts are silent on contractor AI usage, or if delivered SBOMs omit AI build-environment components.",
|
|
1163
|
+
"evidence_required": [
|
|
1164
|
+
"outsourced-dev contract clause export",
|
|
1165
|
+
"delivered build SBOM",
|
|
1166
|
+
"contractor AI-usage attestation"
|
|
1167
|
+
],
|
|
1168
|
+
"verdict_when_failed": "compliance-theater"
|
|
1169
|
+
}
|
|
840
1170
|
},
|
|
841
1171
|
"ISO-27001-2022-A.8.8": {
|
|
842
1172
|
"framework": "ISO/IEC 27001:2022",
|
|
@@ -858,7 +1188,17 @@
|
|
|
858
1188
|
"atlas_refs": [],
|
|
859
1189
|
"attack_refs": [
|
|
860
1190
|
"T1068"
|
|
861
|
-
]
|
|
1191
|
+
],
|
|
1192
|
+
"theater_test": {
|
|
1193
|
+
"claim": "We manage technical vulnerabilities per ISO 27001:2022 A.8.8.",
|
|
1194
|
+
"test": "Pull the vuln-management procedure. Confirm a CISA-KEV-anchored response tier (4h to verified mitigation for KEV+PoC). Pull the past 12 months of KEV-listed CVEs in scope; measure time-to-mitigation. Theater verdict if the procedure has only a generic 'critical = 30 days' SLA, or if any KEV+PoC entry exceeded the documented tier.",
|
|
1195
|
+
"evidence_required": [
|
|
1196
|
+
"A.8.8 procedure document",
|
|
1197
|
+
"KEV-listed CVE list with mitigation timestamps",
|
|
1198
|
+
"live-patching capability evidence"
|
|
1199
|
+
],
|
|
1200
|
+
"verdict_when_failed": "compliance-theater"
|
|
1201
|
+
}
|
|
862
1202
|
},
|
|
863
1203
|
"ISO-IEC-23894-2023-clause-7": {
|
|
864
1204
|
"framework": "ISO/IEC 23894:2023 (AI Risk Management Guidance)",
|
|
@@ -884,7 +1224,17 @@
|
|
|
884
1224
|
],
|
|
885
1225
|
"attack_refs": [
|
|
886
1226
|
"T1059"
|
|
887
|
-
]
|
|
1227
|
+
],
|
|
1228
|
+
"theater_test": {
|
|
1229
|
+
"claim": "We perform AI risk assessment per ISO/IEC 23894:2023 clause 7.",
|
|
1230
|
+
"test": "Pull the most recent AI risk assessment. Confirm coverage of supply-chain risks (model provenance, MCP/plugin trust, training-data integrity), prompt-injection as a current threat, and operational AI-incident scenarios. Confirm the assessment is dated within the framework's review cadence. Theater verdict if supply-chain or prompt-injection risks are absent, or if the assessment has no documented owner who acted on findings.",
|
|
1231
|
+
"evidence_required": [
|
|
1232
|
+
"AI risk assessment document",
|
|
1233
|
+
"risk-treatment plan with action owner",
|
|
1234
|
+
"review-cadence schedule"
|
|
1235
|
+
],
|
|
1236
|
+
"verdict_when_failed": "compliance-theater"
|
|
1237
|
+
}
|
|
888
1238
|
},
|
|
889
1239
|
"ISO-IEC-42001-2023-clause-6.1.2": {
|
|
890
1240
|
"framework": "ISO/IEC 42001:2023 (AI Management System)",
|
|
@@ -912,7 +1262,17 @@
|
|
|
912
1262
|
"attack_refs": [
|
|
913
1263
|
"T1059",
|
|
914
1264
|
"T1071"
|
|
915
|
-
]
|
|
1265
|
+
],
|
|
1266
|
+
"theater_test": {
|
|
1267
|
+
"claim": "Our AI Management System satisfies ISO/IEC 42001:2023 clause 6.1.2 risk-treatment requirements.",
|
|
1268
|
+
"test": "Walk the AIMS risk-treatment register. Confirm prompt injection, MCP/agent trust, RAG-poisoning, and model-supply-chain compromise appear as named risks with treatment plans. Confirm owner + due-date + verification path for each. Theater verdict if any of those risk classes are absent, or if treatments have no verification path documented.",
|
|
1269
|
+
"evidence_required": [
|
|
1270
|
+
"AIMS risk-treatment register export",
|
|
1271
|
+
"risk-treatment plan with verification paths",
|
|
1272
|
+
"AIMS internal audit report"
|
|
1273
|
+
],
|
|
1274
|
+
"verdict_when_failed": "compliance-theater"
|
|
1275
|
+
}
|
|
916
1276
|
},
|
|
917
1277
|
"NERC-CIP-007-6-R4": {
|
|
918
1278
|
"framework": "NERC CIP-007-6 (BES Cyber System Security Management)",
|
|
@@ -940,7 +1300,17 @@
|
|
|
940
1300
|
"T0883",
|
|
941
1301
|
"T0855",
|
|
942
1302
|
"T1071"
|
|
943
|
-
]
|
|
1303
|
+
],
|
|
1304
|
+
"theater_test": {
|
|
1305
|
+
"claim": "We satisfy NERC CIP-007-6 R4 security event monitoring for our BES Cyber Systems.",
|
|
1306
|
+
"test": "Pull the R4 monitored-event source list. Confirm AI operator assistants are enumerated with explicit alerting on assistant-initiated operator commands. Confirm AI-API egress at the corporate-to-OT boundary is monitored. Confirm prompt-injection indicators are present as a distinct event class. Theater verdict if AI assistants are not monitored event sources, or if no NIS2 24h/72h alignment is documented for multinational operators.",
|
|
1307
|
+
"evidence_required": [
|
|
1308
|
+
"R4 event source inventory",
|
|
1309
|
+
"alerting rule export for AI-initiated commands",
|
|
1310
|
+
"NIS2 alignment document where applicable"
|
|
1311
|
+
],
|
|
1312
|
+
"verdict_when_failed": "compliance-theater"
|
|
1313
|
+
}
|
|
944
1314
|
},
|
|
945
1315
|
"NIS2-Art21-incident-handling": {
|
|
946
1316
|
"framework": "EU NIS2 Directive (2022/2555)",
|
|
@@ -968,7 +1338,17 @@
|
|
|
968
1338
|
"attack_refs": [
|
|
969
1339
|
"T1059",
|
|
970
1340
|
"T1567"
|
|
971
|
-
]
|
|
1341
|
+
],
|
|
1342
|
+
"theater_test": {
|
|
1343
|
+
"claim": "We can meet NIS2 Art. 21 incident handling obligations including the 24h early warning.",
|
|
1344
|
+
"test": "Run a tabletop with a synthetic significant-incident inject affecting an essential-service flow at T0. Stopwatch elapsed time to a Competent Authority early warning containing initial assessment, severity, and impact. Theater verdict if elapsed exceeds 24h, if no on-call is named to start the clock, or if the playbook has not been exercised in the past 12 months.",
|
|
1345
|
+
"evidence_required": [
|
|
1346
|
+
"tabletop execution log",
|
|
1347
|
+
"early-warning notification draft",
|
|
1348
|
+
"on-call rota and playbook ownership"
|
|
1349
|
+
],
|
|
1350
|
+
"verdict_when_failed": "compliance-theater"
|
|
1351
|
+
}
|
|
972
1352
|
},
|
|
973
1353
|
"NIS2-Art21-patch-management": {
|
|
974
1354
|
"framework": "EU NIS2 Directive",
|
|
@@ -990,7 +1370,17 @@
|
|
|
990
1370
|
"atlas_refs": [],
|
|
991
1371
|
"attack_refs": [
|
|
992
1372
|
"T1068"
|
|
993
|
-
]
|
|
1373
|
+
],
|
|
1374
|
+
"theater_test": {
|
|
1375
|
+
"claim": "Our patch-management posture meets NIS2 Art. 21(2)(e) for technical and organisational measures.",
|
|
1376
|
+
"test": "Pull the patch SLA document. Confirm a CISA-KEV-anchored tier (4h to verified mitigation for KEV+PoC). Cross-reference past 12 months of KEV-listed CVEs in scope; measure compliance. Confirm live-patching capability for hosts that cannot reboot in window. Theater verdict if the SLA collapses to 'critical = 30 days' across the board, or if any KEV+PoC entry breached the documented tier.",
|
|
1377
|
+
"evidence_required": [
|
|
1378
|
+
"patch SLA document",
|
|
1379
|
+
"KEV listing→mitigation telemetry",
|
|
1380
|
+
"live-patching agent inventory"
|
|
1381
|
+
],
|
|
1382
|
+
"verdict_when_failed": "compliance-theater"
|
|
1383
|
+
}
|
|
994
1384
|
},
|
|
995
1385
|
"NIST-800-115": {
|
|
996
1386
|
"framework": "NIST SP 800-115 (Technical Guide to Information Security Testing and Assessment)",
|
|
@@ -1021,7 +1411,17 @@
|
|
|
1021
1411
|
"T1059",
|
|
1022
1412
|
"T1071",
|
|
1023
1413
|
"T1195.001"
|
|
1024
|
-
]
|
|
1414
|
+
],
|
|
1415
|
+
"theater_test": {
|
|
1416
|
+
"claim": "Our pen-test methodology aligns with NIST SP 800-115 technical guidance.",
|
|
1417
|
+
"test": "Pull the most recent pen-test report. Confirm coverage of AI/MCP attack surfaces (prompt injection, MCP plugin trust, RAG corpus integrity, AI-API egress). Confirm the testing methodology document references AI-specific test classes and tooling. Theater verdict if AI/MCP testing is absent from the methodology, or if the pen-test report contains no AI-class findings despite AI being in production.",
|
|
1418
|
+
"evidence_required": [
|
|
1419
|
+
"pen-test methodology document",
|
|
1420
|
+
"most-recent pen-test report with AI/MCP test sections",
|
|
1421
|
+
"tester competency CV/credentials"
|
|
1422
|
+
],
|
|
1423
|
+
"verdict_when_failed": "compliance-theater"
|
|
1424
|
+
}
|
|
1025
1425
|
},
|
|
1026
1426
|
"NIST-800-218-SSDF": {
|
|
1027
1427
|
"framework": "NIST SP 800-218 (Secure Software Development Framework v1.1)",
|
|
@@ -1048,7 +1448,17 @@
|
|
|
1048
1448
|
],
|
|
1049
1449
|
"attack_refs": [
|
|
1050
1450
|
"T1195.001"
|
|
1051
|
-
]
|
|
1451
|
+
],
|
|
1452
|
+
"theater_test": {
|
|
1453
|
+
"claim": "We follow NIST SSDF practices for secure software development.",
|
|
1454
|
+
"test": "Pull the SSDF mapping document. Confirm AI-generated code provenance practices (per-block AI authorship attestation, reviewer identity, human approval before merge). Inspect git history; confirm AI-attributed commits have linked review records. Pull build-time SBOM; confirm AI build-tooling is enumerated. Theater verdict if AI authorship is unattributed, AI commits bypass review, or build-time SBOM omits AI tooling.",
|
|
1455
|
+
"evidence_required": [
|
|
1456
|
+
"SSDF mapping document",
|
|
1457
|
+
"AI-attribution policy + recent merge sample",
|
|
1458
|
+
"build-time SBOM"
|
|
1459
|
+
],
|
|
1460
|
+
"verdict_when_failed": "compliance-theater"
|
|
1461
|
+
}
|
|
1052
1462
|
},
|
|
1053
1463
|
"NIST-800-53-AC-2": {
|
|
1054
1464
|
"framework": "NIST SP 800-53 Rev 5",
|
|
@@ -1073,7 +1483,17 @@
|
|
|
1073
1483
|
],
|
|
1074
1484
|
"attack_refs": [
|
|
1075
1485
|
"T1059"
|
|
1076
|
-
]
|
|
1486
|
+
],
|
|
1487
|
+
"theater_test": {
|
|
1488
|
+
"claim": "Our account management satisfies NIST 800-53 AC-2 across all account types.",
|
|
1489
|
+
"test": "Inventory AI-agent service accounts. For each, confirm an authorization context defines (who initiated each invocation, what actions are in scope, what tools are authorised). Pull AC-2 audit log for one agent over 7 days; confirm prompt-level access decisions are reconstructable. Theater verdict if AI-agent accounts have no per-session authorisation context, or if AC-2 logs collapse to 'service account X did Y' without prompt-input chain.",
|
|
1490
|
+
"evidence_required": [
|
|
1491
|
+
"AI-agent service account inventory",
|
|
1492
|
+
"authorization-context policy document",
|
|
1493
|
+
"7-day audit log sample with prompt input chain"
|
|
1494
|
+
],
|
|
1495
|
+
"verdict_when_failed": "compliance-theater"
|
|
1496
|
+
}
|
|
1077
1497
|
},
|
|
1078
1498
|
"NIST-800-53-CM-7": {
|
|
1079
1499
|
"framework": "NIST SP 800-53 Rev 5",
|
|
@@ -1097,7 +1517,17 @@
|
|
|
1097
1517
|
],
|
|
1098
1518
|
"attack_refs": [
|
|
1099
1519
|
"T1195.001"
|
|
1100
|
-
]
|
|
1520
|
+
],
|
|
1521
|
+
"theater_test": {
|
|
1522
|
+
"claim": "We enforce least-functionality per NIST 800-53 CM-7 across all configuration items.",
|
|
1523
|
+
"test": "Sample 5 developer endpoints. Enumerate installed MCP servers + AI plugins; confirm each is on an organisational allowlist with documented business justification. Confirm tool-grant default is deny with explicit per-tool prompts. Theater verdict if any sampled endpoint runs an MCP server absent from the allowlist, or if any tool-grant defaults to allow without prompting.",
|
|
1524
|
+
"evidence_required": [
|
|
1525
|
+
"endpoint MCP/plugin inventory for sampled hosts",
|
|
1526
|
+
"organisational allowlist with justifications",
|
|
1527
|
+
"tool-grant default-policy export"
|
|
1528
|
+
],
|
|
1529
|
+
"verdict_when_failed": "compliance-theater"
|
|
1530
|
+
}
|
|
1101
1531
|
},
|
|
1102
1532
|
"NIST-800-53-SA-12": {
|
|
1103
1533
|
"framework": "NIST SP 800-53 Rev 5",
|
|
@@ -1121,7 +1551,17 @@
|
|
|
1121
1551
|
],
|
|
1122
1552
|
"attack_refs": [
|
|
1123
1553
|
"T1195.001"
|
|
1124
|
-
]
|
|
1554
|
+
],
|
|
1555
|
+
"theater_test": {
|
|
1556
|
+
"claim": "Our supply chain protection practices meet NIST 800-53 SA-12.",
|
|
1557
|
+
"test": "Pull the supplier-protection program. Confirm AI providers are enumerated with the same diligence as software suppliers (security questionnaire, SOC 2 review, contractual breach-notification). Confirm model and MCP-server provenance attestation is collected at consumption. Theater verdict if AI providers are exempt from supplier diligence, or if model artefacts are consumed without provenance attestation.",
|
|
1558
|
+
"evidence_required": [
|
|
1559
|
+
"supplier-protection program document",
|
|
1560
|
+
"AI-provider diligence record sample",
|
|
1561
|
+
"model-provenance attestations at consumption"
|
|
1562
|
+
],
|
|
1563
|
+
"verdict_when_failed": "compliance-theater"
|
|
1564
|
+
}
|
|
1125
1565
|
},
|
|
1126
1566
|
"NIST-800-53-SC-28": {
|
|
1127
1567
|
"framework": "NIST SP 800-53 Rev 5",
|
|
@@ -1143,7 +1583,17 @@
|
|
|
1143
1583
|
"atlas_refs": [],
|
|
1144
1584
|
"attack_refs": [
|
|
1145
1585
|
"T1068"
|
|
1146
|
-
]
|
|
1586
|
+
],
|
|
1587
|
+
"theater_test": {
|
|
1588
|
+
"claim": "Information at rest is protected per NIST 800-53 SC-28 with encryption.",
|
|
1589
|
+
"test": "Inventory AI-provider artefact storage (conversation history, embeddings, fine-tune sets, vector indices). Confirm encryption-at-rest with key management by an in-scope KMS. Spot-check 3 storage locations; confirm key access is logged. Theater verdict if any AI artefact storage is unencrypted, key management is provider-default with no in-scope KMS, or key access is unlogged.",
|
|
1590
|
+
"evidence_required": [
|
|
1591
|
+
"AI artefact storage inventory",
|
|
1592
|
+
"KMS key-policy export",
|
|
1593
|
+
"key access log sample"
|
|
1594
|
+
],
|
|
1595
|
+
"verdict_when_failed": "compliance-theater"
|
|
1596
|
+
}
|
|
1147
1597
|
},
|
|
1148
1598
|
"NIST-800-53-SC-7": {
|
|
1149
1599
|
"framework": "NIST SP 800-53 Rev 5",
|
|
@@ -1168,7 +1618,17 @@
|
|
|
1168
1618
|
"T1071",
|
|
1169
1619
|
"T1102",
|
|
1170
1620
|
"T1568"
|
|
1171
|
-
]
|
|
1621
|
+
],
|
|
1622
|
+
"theater_test": {
|
|
1623
|
+
"claim": "Boundary protection is enforced per NIST 800-53 SC-7 for the system boundary.",
|
|
1624
|
+
"test": "Inspect egress firewall rules for AI-API destinations (api.openai.com, api.anthropic.com, generativelanguage.googleapis.com, etc.). Confirm allowlist with documented business justification per destination. Confirm logging captures prompt hash + identity per egress. Theater verdict if AI destinations are reachable from any source without allowlist enforcement, or if egress logs lack identity binding.",
|
|
1625
|
+
"evidence_required": [
|
|
1626
|
+
"egress firewall rule export",
|
|
1627
|
+
"AI destination allowlist with justifications",
|
|
1628
|
+
"egress log sample with identity binding"
|
|
1629
|
+
],
|
|
1630
|
+
"verdict_when_failed": "compliance-theater"
|
|
1631
|
+
}
|
|
1172
1632
|
},
|
|
1173
1633
|
"NIST-800-53-SC-8": {
|
|
1174
1634
|
"framework": "NIST SP 800-53 Rev 5",
|
|
@@ -1189,7 +1649,17 @@
|
|
|
1189
1649
|
"atlas_refs": [],
|
|
1190
1650
|
"attack_refs": [
|
|
1191
1651
|
"T1068"
|
|
1192
|
-
]
|
|
1652
|
+
],
|
|
1653
|
+
"theater_test": {
|
|
1654
|
+
"claim": "Transmission confidentiality and integrity is protected per NIST 800-53 SC-8.",
|
|
1655
|
+
"test": "Confirm TLS 1.3 (or PQC-hybrid where deployed) on every AI-API destination, including any internal gateways. Inspect MCP server transport; confirm authentication and integrity (signed JWT or mTLS) on MCP traffic. Theater verdict if any AI-API egress allows TLS<1.2 or unauthenticated MCP transport.",
|
|
1656
|
+
"evidence_required": [
|
|
1657
|
+
"TLS configuration audit per destination",
|
|
1658
|
+
"MCP transport configuration",
|
|
1659
|
+
"PQC migration roadmap if claimed"
|
|
1660
|
+
],
|
|
1661
|
+
"verdict_when_failed": "compliance-theater"
|
|
1662
|
+
}
|
|
1193
1663
|
},
|
|
1194
1664
|
"NIST-800-53-SI-10": {
|
|
1195
1665
|
"framework": "NIST SP 800-53 Rev 5",
|
|
@@ -1215,7 +1685,17 @@
|
|
|
1215
1685
|
"attack_refs": [
|
|
1216
1686
|
"T1190",
|
|
1217
1687
|
"T1059"
|
|
1218
|
-
]
|
|
1688
|
+
],
|
|
1689
|
+
"theater_test": {
|
|
1690
|
+
"claim": "We validate information inputs per NIST 800-53 SI-10.",
|
|
1691
|
+
"test": "Inspect input-validation rules at AI prompt boundaries: system-prompt protection from third-party content, RAG-corpus content sanitisation, tool-output sanitisation before re-injection. Theater verdict if no input validation exists at any of those boundaries, or if SI-10 evidence cites only HTML/SQL escaping without prompt-injection treatment.",
|
|
1692
|
+
"evidence_required": [
|
|
1693
|
+
"input-validation policy at prompt boundaries",
|
|
1694
|
+
"RAG-corpus sanitisation rule export",
|
|
1695
|
+
"tool-output sanitisation logic"
|
|
1696
|
+
],
|
|
1697
|
+
"verdict_when_failed": "compliance-theater"
|
|
1698
|
+
}
|
|
1219
1699
|
},
|
|
1220
1700
|
"NIST-800-53-SI-12": {
|
|
1221
1701
|
"framework": "NIST SP 800-53 Rev 5",
|
|
@@ -1239,7 +1719,17 @@
|
|
|
1239
1719
|
],
|
|
1240
1720
|
"attack_refs": [
|
|
1241
1721
|
"T1059"
|
|
1242
|
-
]
|
|
1722
|
+
],
|
|
1723
|
+
"theater_test": {
|
|
1724
|
+
"claim": "Information handling and retention satisfies NIST 800-53 SI-12.",
|
|
1725
|
+
"test": "Pull the records-retention schedule. Confirm AI artefacts (prompts, outputs, embeddings, fine-tune sets) appear with explicit retention periods aligned to data-classification. Confirm provider-side retention is documented per AI provider with attestation. Theater verdict if AI artefacts are absent from the retention schedule, or if provider-side retention is undocumented.",
|
|
1726
|
+
"evidence_required": [
|
|
1727
|
+
"records-retention schedule with AI categories",
|
|
1728
|
+
"provider retention attestation per AI provider",
|
|
1729
|
+
"deletion verification log"
|
|
1730
|
+
],
|
|
1731
|
+
"verdict_when_failed": "compliance-theater"
|
|
1732
|
+
}
|
|
1243
1733
|
},
|
|
1244
1734
|
"NIST-800-53-SI-2": {
|
|
1245
1735
|
"framework": "NIST SP 800-53 Rev 5",
|
|
@@ -1262,7 +1752,17 @@
|
|
|
1262
1752
|
"atlas_refs": [],
|
|
1263
1753
|
"attack_refs": [
|
|
1264
1754
|
"T1068"
|
|
1265
|
-
]
|
|
1755
|
+
],
|
|
1756
|
+
"theater_test": {
|
|
1757
|
+
"claim": "Flaw remediation is timely per NIST 800-53 SI-2.",
|
|
1758
|
+
"test": "Pull the flaw-remediation SLA. Confirm a KEV-anchored tier (≤4h for KEV+PoC). Pull the past 12 months of KEV listings affecting in-scope assets; measure deployment compliance. Confirm live-patching is provisioned for hosts that can't reboot in window. Theater verdict if the SLA does not have a KEV tier or if KEV compliance dropped below 95%.",
|
|
1759
|
+
"evidence_required": [
|
|
1760
|
+
"SI-2 SLA document",
|
|
1761
|
+
"KEV deployment timeline per CVE",
|
|
1762
|
+
"live-patching agent inventory"
|
|
1763
|
+
],
|
|
1764
|
+
"verdict_when_failed": "compliance-theater"
|
|
1765
|
+
}
|
|
1266
1766
|
},
|
|
1267
1767
|
"NIST-800-53-SI-3": {
|
|
1268
1768
|
"framework": "NIST SP 800-53 Rev 5",
|
|
@@ -1283,7 +1783,17 @@
|
|
|
1283
1783
|
],
|
|
1284
1784
|
"attack_refs": [
|
|
1285
1785
|
"T1059"
|
|
1286
|
-
]
|
|
1786
|
+
],
|
|
1787
|
+
"theater_test": {
|
|
1788
|
+
"claim": "Malicious code protection is in place per NIST 800-53 SI-3.",
|
|
1789
|
+
"test": "Confirm SI-3 controls cover prompt-injection (input-side malicious instructions delivered via third-party content) and RAG-poisoning (corpus-side malicious instructions). Confirm detection rules exist and have triggered at least once on synthetic test inputs. Theater verdict if SI-3 evidence cites only AV signatures without prompt-injection or RAG-poisoning treatment.",
|
|
1790
|
+
"evidence_required": [
|
|
1791
|
+
"SI-3 control description with AI extensions",
|
|
1792
|
+
"prompt-injection / RAG-poisoning detection rule export",
|
|
1793
|
+
"synthetic-input test results"
|
|
1794
|
+
],
|
|
1795
|
+
"verdict_when_failed": "compliance-theater"
|
|
1796
|
+
}
|
|
1287
1797
|
},
|
|
1288
1798
|
"NIST-800-63B-rev4": {
|
|
1289
1799
|
"framework": "NIST SP 800-63B Rev 4 (Digital Identity Guidelines — Authentication & Lifecycle Mgmt)",
|
|
@@ -1309,7 +1819,17 @@
|
|
|
1309
1819
|
"attack_refs": [
|
|
1310
1820
|
"T1078",
|
|
1311
1821
|
"T1059"
|
|
1312
|
-
]
|
|
1822
|
+
],
|
|
1823
|
+
"theater_test": {
|
|
1824
|
+
"claim": "Our digital-identity authentication satisfies NIST SP 800-63B Rev 4 at the targeted AAL.",
|
|
1825
|
+
"test": "Sample 10 admin identities; confirm registered authenticator class is FIDO2/WebAuthn-bound (phishing-resistant). Confirm session re-authentication on high-risk actions. Confirm service-account token lifecycles match the AAL claim (no long-lived bearer tokens for AAL3-claimed scopes). Theater verdict if any admin uses SMS/voice/TOTP for an AAL3-claimed scope, or if AAL3-claimed service accounts use static long-lived tokens.",
|
|
1826
|
+
"evidence_required": [
|
|
1827
|
+
"IdP authenticator export for sampled admins",
|
|
1828
|
+
"session-management policy document",
|
|
1829
|
+
"service-account token lifecycle export"
|
|
1830
|
+
],
|
|
1831
|
+
"verdict_when_failed": "compliance-theater"
|
|
1832
|
+
}
|
|
1313
1833
|
},
|
|
1314
1834
|
"NIST-800-82r3": {
|
|
1315
1835
|
"framework": "NIST SP 800-82 Rev 3 (Guide to OT Security)",
|
|
@@ -1337,7 +1857,17 @@
|
|
|
1337
1857
|
"T0883",
|
|
1338
1858
|
"T0855",
|
|
1339
1859
|
"T1071"
|
|
1340
|
-
]
|
|
1860
|
+
],
|
|
1861
|
+
"theater_test": {
|
|
1862
|
+
"claim": "Our OT environment is secured per NIST SP 800-82 Rev 3 guidance.",
|
|
1863
|
+
"test": "Confirm the OT asset inventory enumerates AI operator assistants, AI-API egress at the IT/OT boundary, and any MCP servers running on engineering workstations. Inspect monitoring rules for AI-prompted operator actions. Theater verdict if AI assets are absent from the OT inventory, or if no monitoring rule alerts on AI-initiated control-system commands.",
|
|
1864
|
+
"evidence_required": [
|
|
1865
|
+
"OT asset inventory with AI subset",
|
|
1866
|
+
"monitoring rule export for AI-prompted operator actions",
|
|
1867
|
+
"engineering workstation MCP-server scan"
|
|
1868
|
+
],
|
|
1869
|
+
"verdict_when_failed": "compliance-theater"
|
|
1870
|
+
}
|
|
1341
1871
|
},
|
|
1342
1872
|
"NIST-AI-RMF-MEASURE-2.5": {
|
|
1343
1873
|
"framework": "NIST AI RMF 1.0",
|
|
@@ -1362,7 +1892,17 @@
|
|
|
1362
1892
|
],
|
|
1363
1893
|
"attack_refs": [
|
|
1364
1894
|
"T1059"
|
|
1365
|
-
]
|
|
1895
|
+
],
|
|
1896
|
+
"theater_test": {
|
|
1897
|
+
"claim": "We map and measure AI risks per NIST AI RMF MEASURE 2.5 including continuous validity assessment.",
|
|
1898
|
+
"test": "Pull the AI risk-measurement plan. Confirm coverage of OWASP LLM Top 10 + ATLAS TTPs + MCP-trust scenarios with explicit measurement cadence. Confirm a metric exists for each category (e.g. prompt-injection success rate, RAG-poisoning detection rate). Inspect the metrics dashboard for actual measurement data within the past quarter. Theater verdict if metrics are defined but unpopulated, or if any of the OWASP/ATLAS/MCP categories has no measurement plan.",
|
|
1899
|
+
"evidence_required": [
|
|
1900
|
+
"AI risk-measurement plan",
|
|
1901
|
+
"metrics dashboard with current quarter data",
|
|
1902
|
+
"ATLAS/OWASP coverage matrix"
|
|
1903
|
+
],
|
|
1904
|
+
"verdict_when_failed": "compliance-theater"
|
|
1905
|
+
}
|
|
1366
1906
|
},
|
|
1367
1907
|
"OWASP-ASVS-v5.0-V14": {
|
|
1368
1908
|
"framework": "OWASP ASVS v5.0",
|
|
@@ -1387,7 +1927,17 @@
|
|
|
1387
1927
|
],
|
|
1388
1928
|
"attack_refs": [
|
|
1389
1929
|
"T1195.001"
|
|
1390
|
-
]
|
|
1930
|
+
],
|
|
1931
|
+
"theater_test": {
|
|
1932
|
+
"claim": "Our application meets OWASP ASVS v5.0 V14 configuration controls.",
|
|
1933
|
+
"test": "For any AI-mediated feature, confirm V14-equivalent controls cover prompt-isolation, output-sanitisation, and tool-grant defaults. Confirm SDK pinning and provider-version pinning where supported. Theater verdict if AI-feature configuration management is informal (no pinned versions, no documented prompt-isolation policy).",
|
|
1934
|
+
"evidence_required": [
|
|
1935
|
+
"AI-feature configuration policy",
|
|
1936
|
+
"SDK + provider version pinning manifest",
|
|
1937
|
+
"prompt-isolation design document"
|
|
1938
|
+
],
|
|
1939
|
+
"verdict_when_failed": "compliance-theater"
|
|
1940
|
+
}
|
|
1391
1941
|
},
|
|
1392
1942
|
"OWASP-LLM-Top-10-2025-LLM01": {
|
|
1393
1943
|
"framework": "OWASP Top 10 for LLM Applications 2025",
|
|
@@ -1414,7 +1964,17 @@
|
|
|
1414
1964
|
"attack_refs": [
|
|
1415
1965
|
"T1059",
|
|
1416
1966
|
"T1071"
|
|
1417
|
-
]
|
|
1967
|
+
],
|
|
1968
|
+
"theater_test": {
|
|
1969
|
+
"claim": "We mitigate prompt injection per OWASP LLM Top 10 LLM01.",
|
|
1970
|
+
"test": "Inspect SDK-level prompt logging; confirm identity binding per call (which user, which agent, which scope). Confirm AI-provider domains are network-allowlisted with business justification. Confirm anomaly detection runs on prompt shape/volume/timing with alerting. Inspect SOC tooling for ATLAS+ATT&CK dual-mapping on LLM01 findings. Theater verdict if prompt logging is absent, allowlists are wildcard, or LLM01 findings are not dual-mapped.",
|
|
1971
|
+
"evidence_required": [
|
|
1972
|
+
"SDK prompt-logging configuration",
|
|
1973
|
+
"AI-provider allowlist with justifications",
|
|
1974
|
+
"anomaly detection rule export with recent alerts"
|
|
1975
|
+
],
|
|
1976
|
+
"verdict_when_failed": "compliance-theater"
|
|
1977
|
+
}
|
|
1418
1978
|
},
|
|
1419
1979
|
"OWASP-LLM-Top-10-2025-LLM02": {
|
|
1420
1980
|
"framework": "OWASP Top 10 for LLM Applications 2025",
|
|
@@ -1439,7 +1999,17 @@
|
|
|
1439
1999
|
"attack_refs": [
|
|
1440
2000
|
"T1059",
|
|
1441
2001
|
"T1530"
|
|
1442
|
-
]
|
|
2002
|
+
],
|
|
2003
|
+
"theater_test": {
|
|
2004
|
+
"claim": "We mitigate insecure output handling per OWASP LLM Top 10 LLM02.",
|
|
2005
|
+
"test": "Inspect every code path that consumes LLM output and routes it to a downstream sink (HTML, SQL, shell, eval, tool dispatch). Confirm sink-specific encoding/escaping or schema validation. Theater verdict if any LLM output reaches a sensitive sink without validation.",
|
|
2006
|
+
"evidence_required": [
|
|
2007
|
+
"LLM-output sink inventory",
|
|
2008
|
+
"output-validation logic per sink",
|
|
2009
|
+
"test cases proving validation fires on malicious payloads"
|
|
2010
|
+
],
|
|
2011
|
+
"verdict_when_failed": "compliance-theater"
|
|
2012
|
+
}
|
|
1443
2013
|
},
|
|
1444
2014
|
"OWASP-LLM-Top-10-2025-LLM06": {
|
|
1445
2015
|
"framework": "OWASP Top 10 for LLM Applications 2025",
|
|
@@ -1467,7 +2037,17 @@
|
|
|
1467
2037
|
"attack_refs": [
|
|
1468
2038
|
"T1195.001",
|
|
1469
2039
|
"T1059"
|
|
1470
|
-
]
|
|
2040
|
+
],
|
|
2041
|
+
"theater_test": {
|
|
2042
|
+
"claim": "We mitigate sensitive information disclosure per OWASP LLM Top 10 LLM06.",
|
|
2043
|
+
"test": "Inspect prompt egress for DLP rules covering PII, credentials, source-code-with-comments, and customer-data identifiers. Run a synthetic prompt containing planted secrets; confirm DLP triggers before egress to the AI provider. Theater verdict if DLP is not on the egress path, or if the synthetic test does not trigger.",
|
|
2044
|
+
"evidence_required": [
|
|
2045
|
+
"DLP rule export for prompt egress",
|
|
2046
|
+
"synthetic prompt test result",
|
|
2047
|
+
"data classification policy"
|
|
2048
|
+
],
|
|
2049
|
+
"verdict_when_failed": "compliance-theater"
|
|
2050
|
+
}
|
|
1471
2051
|
},
|
|
1472
2052
|
"OWASP-LLM-Top-10-2025-LLM08": {
|
|
1473
2053
|
"framework": "OWASP Top 10 for LLM Applications 2025",
|
|
@@ -1493,7 +2073,17 @@
|
|
|
1493
2073
|
"attack_refs": [
|
|
1494
2074
|
"T1565",
|
|
1495
2075
|
"T1530"
|
|
1496
|
-
]
|
|
2076
|
+
],
|
|
2077
|
+
"theater_test": {
|
|
2078
|
+
"claim": "We mitigate excessive agency per OWASP LLM Top 10 LLM08.",
|
|
2079
|
+
"test": "Pick an AI agent in production. Enumerate the tools it can call. For each tool, confirm scope-of-action limits (read-only by default, write requires per-action attestation, destructive requires user confirmation). Theater verdict if any agent has wildcard write access or destructive actions without per-call confirmation.",
|
|
2080
|
+
"evidence_required": [
|
|
2081
|
+
"agent tool inventory with scope limits",
|
|
2082
|
+
"per-action attestation policy",
|
|
2083
|
+
"destructive-action confirmation flow evidence"
|
|
2084
|
+
],
|
|
2085
|
+
"verdict_when_failed": "compliance-theater"
|
|
2086
|
+
}
|
|
1497
2087
|
},
|
|
1498
2088
|
"OWASP-Pen-Testing-Guide-v5": {
|
|
1499
2089
|
"framework": "OWASP Web Security Testing Guide v5 (WSTG)",
|
|
@@ -1524,7 +2114,17 @@
|
|
|
1524
2114
|
"T1195.001",
|
|
1525
2115
|
"T1059",
|
|
1526
2116
|
"T1071"
|
|
1527
|
-
]
|
|
2117
|
+
],
|
|
2118
|
+
"theater_test": {
|
|
2119
|
+
"claim": "Our web app pen-tests follow OWASP WSTG v5 methodology.",
|
|
2120
|
+
"test": "Pull the most-recent pen-test report. Confirm test cases for AI-mediated features (prompt injection in chatbot widgets, AI-augmented input flows, agent-mediated workflows). Confirm tester used WSTG-aligned methodology with explicit AI-test extensions. Theater verdict if AI-mediated features are excluded from the pen-test scope.",
|
|
2121
|
+
"evidence_required": [
|
|
2122
|
+
"pen-test methodology document",
|
|
2123
|
+
"pen-test report covering AI-mediated features",
|
|
2124
|
+
"scope-of-engagement document"
|
|
2125
|
+
],
|
|
2126
|
+
"verdict_when_failed": "compliance-theater"
|
|
2127
|
+
}
|
|
1528
2128
|
},
|
|
1529
2129
|
"PCI-DSS-4.0-6.3.3": {
|
|
1530
2130
|
"framework": "PCI DSS 4.0",
|
|
@@ -1546,7 +2146,17 @@
|
|
|
1546
2146
|
"atlas_refs": [],
|
|
1547
2147
|
"attack_refs": [
|
|
1548
2148
|
"T1068"
|
|
1549
|
-
]
|
|
2149
|
+
],
|
|
2150
|
+
"theater_test": {
|
|
2151
|
+
"claim": "We address security vulnerabilities in custom and bespoke software per PCI DSS 6.3.3.",
|
|
2152
|
+
"test": "Confirm the SDLC includes prompt-injection-class CWE coverage in code review for AI-mediated features. Inspect change tickets for AI-feature changes; confirm reviewer attestation includes AI-class threat sign-off. Theater verdict if AI-mediated changes bypass the prompt-injection threat-review gate.",
|
|
2153
|
+
"evidence_required": [
|
|
2154
|
+
"SDLC document with AI-class CWE coverage",
|
|
2155
|
+
"AI-feature change tickets with reviewer attestation",
|
|
2156
|
+
"code review checklist"
|
|
2157
|
+
],
|
|
2158
|
+
"verdict_when_failed": "compliance-theater"
|
|
2159
|
+
}
|
|
1550
2160
|
},
|
|
1551
2161
|
"PCI-DSS-4.0.1-6.4.3": {
|
|
1552
2162
|
"framework": "PCI DSS 4.0.1 (effective 2025-03-31 — supersedes 4.0)",
|
|
@@ -1572,7 +2182,17 @@
|
|
|
1572
2182
|
"attack_refs": [
|
|
1573
2183
|
"T1059",
|
|
1574
2184
|
"T1195.001"
|
|
1575
|
-
]
|
|
2185
|
+
],
|
|
2186
|
+
"theater_test": {
|
|
2187
|
+
"claim": "We meet PCI DSS 4.0.1 6.4.3 inventory of payment-page scripts.",
|
|
2188
|
+
"test": "Pull the payment-page script inventory. Confirm completeness against a fresh DOM snapshot of the live payment page. Confirm authorisation attestation per script (who approved, when, why). Confirm SRI hashes are pinned per script. Theater verdict if the inventory diverges from the live DOM, or if any script lacks attestation/SRI pinning.",
|
|
2189
|
+
"evidence_required": [
|
|
2190
|
+
"payment-page script inventory",
|
|
2191
|
+
"live DOM snapshot per page",
|
|
2192
|
+
"SRI configuration export"
|
|
2193
|
+
],
|
|
2194
|
+
"verdict_when_failed": "compliance-theater"
|
|
2195
|
+
}
|
|
1576
2196
|
},
|
|
1577
2197
|
"PCI-DSS-4.0.1-11.6.1": {
|
|
1578
2198
|
"framework": "PCI DSS 4.0.1 (effective 2025-03-31)",
|
|
@@ -1594,7 +2214,17 @@
|
|
|
1594
2214
|
],
|
|
1595
2215
|
"attack_refs": [
|
|
1596
2216
|
"T1059"
|
|
1597
|
-
]
|
|
2217
|
+
],
|
|
2218
|
+
"theater_test": {
|
|
2219
|
+
"claim": "We perform tamper detection on payment pages per PCI DSS 4.0.1 11.6.1.",
|
|
2220
|
+
"test": "Confirm tamper-detection cadence is sub-hour, not weekly. Confirm baselines distinguish AI-driven dynamic content from injection. Confirm coverage extends to mobile-app SDKs, kiosks, and agent-mediated checkout. Confirm CSP report-uri + Reporting API correlation. Theater verdict if cadence is weekly, baselining cannot tell legitimate dynamic content from injection, or non-browser surfaces are uncovered.",
|
|
2221
|
+
"evidence_required": [
|
|
2222
|
+
"tamper-detection cadence configuration",
|
|
2223
|
+
"baseline document with AI-aware logic",
|
|
2224
|
+
"CSP report-uri correlation pipeline"
|
|
2225
|
+
],
|
|
2226
|
+
"verdict_when_failed": "compliance-theater"
|
|
2227
|
+
}
|
|
1598
2228
|
},
|
|
1599
2229
|
"PCI-DSS-4.0.1-12.3.3": {
|
|
1600
2230
|
"framework": "PCI DSS 4.0.1 (effective 2025-03-31)",
|
|
@@ -1612,7 +2242,17 @@
|
|
|
1612
2242
|
"opened_date": "2026-05-15",
|
|
1613
2243
|
"evidence_cves": [],
|
|
1614
2244
|
"atlas_refs": [],
|
|
1615
|
-
"attack_refs": []
|
|
2245
|
+
"attack_refs": [],
|
|
2246
|
+
"theater_test": {
|
|
2247
|
+
"claim": "Our cryptographic suite review meets PCI DSS 4.0.1 12.3.3 annual cadence.",
|
|
2248
|
+
"test": "Pull the cryptographic suite inventory and most-recent annual review. Confirm enumeration of in-use algorithms with deprecation status. Confirm a PQC-readiness assessment exists with migration roadmap for long-lived keys (TLS for >5y data, signing for code/SBOM). Theater verdict if PQC is absent from the review, or if deprecated algorithms remain in use without a documented exception.",
|
|
2249
|
+
"evidence_required": [
|
|
2250
|
+
"cryptographic suite inventory",
|
|
2251
|
+
"annual review document with date",
|
|
2252
|
+
"PQC migration roadmap"
|
|
2253
|
+
],
|
|
2254
|
+
"verdict_when_failed": "compliance-theater"
|
|
2255
|
+
}
|
|
1616
2256
|
},
|
|
1617
2257
|
"PCI-DSS-4.0.1-12.10.7": {
|
|
1618
2258
|
"framework": "PCI DSS 4.0.1 (effective 2025-03-31)",
|
|
@@ -1638,7 +2278,17 @@
|
|
|
1638
2278
|
"attack_refs": [
|
|
1639
2279
|
"T1071",
|
|
1640
2280
|
"T1530"
|
|
1641
|
-
]
|
|
2281
|
+
],
|
|
2282
|
+
"theater_test": {
|
|
2283
|
+
"claim": "Our incident response procedures address suspected ransomware per PCI DSS 4.0.1 12.10.7.",
|
|
2284
|
+
"test": "Pull the IR playbook for ransomware. Confirm pre-rehearsed sanctions-screening (OFAC SDN + EU 2014/833 + UK OFSI + AU DFAT + JP MOF) as a precondition to any payment posture. Confirm decryptor-availability lookup, immutability test on backup recovery path, and exfil-before-encrypt detection. Confirm 24h cyber-insurance carrier notification workflow is rehearsed end-to-end. Theater verdict if any of those is undocumented or not exercised in the past 12 months.",
|
|
2285
|
+
"evidence_required": [
|
|
2286
|
+
"ransomware IR playbook with sub-procedures",
|
|
2287
|
+
"tabletop exercise log within past 12 months",
|
|
2288
|
+
"carrier-notification workflow record"
|
|
2289
|
+
],
|
|
2290
|
+
"verdict_when_failed": "compliance-theater"
|
|
2291
|
+
}
|
|
1642
2292
|
},
|
|
1643
2293
|
"PSD2-RTS-SCA": {
|
|
1644
2294
|
"framework": "EU PSD2 Regulatory Technical Standards on Strong Customer Authentication (Commission Delegated Regulation (EU) 2018/389)",
|
|
@@ -1664,7 +2314,17 @@
|
|
|
1664
2314
|
"attack_refs": [
|
|
1665
2315
|
"T1078",
|
|
1666
2316
|
"T1059"
|
|
1667
|
-
]
|
|
2317
|
+
],
|
|
2318
|
+
"theater_test": {
|
|
2319
|
+
"claim": "Our payment authentication satisfies PSD2 RTS-SCA strong customer authentication requirements.",
|
|
2320
|
+
"test": "Inventory payment-initiation flows. For any AI-mediated initiation (agent-initiated transactions, copilot-drafted payments), confirm an explicit delegated-authority attestation per transaction class with scope (amount, counterparty, frequency). Confirm a distinct audit indicator marks AI-mediated transactions. Theater verdict if AI initiations inherit the human-user SCA evidence path without delegated-authority attestation.",
|
|
2321
|
+
"evidence_required": [
|
|
2322
|
+
"payment-initiation flow inventory",
|
|
2323
|
+
"delegated-authority policy document",
|
|
2324
|
+
"audit log sample with AI-mediated indicator"
|
|
2325
|
+
],
|
|
2326
|
+
"verdict_when_failed": "compliance-theater"
|
|
2327
|
+
}
|
|
1668
2328
|
},
|
|
1669
2329
|
"PTES-Pre-engagement": {
|
|
1670
2330
|
"framework": "Penetration Testing Execution Standard (PTES)",
|
|
@@ -1692,7 +2352,17 @@
|
|
|
1692
2352
|
"attack_refs": [
|
|
1693
2353
|
"T1195.001",
|
|
1694
2354
|
"T1071"
|
|
1695
|
-
]
|
|
2355
|
+
],
|
|
2356
|
+
"theater_test": {
|
|
2357
|
+
"claim": "Our pen-test scoping follows PTES pre-engagement methodology.",
|
|
2358
|
+
"test": "Pull the most-recent PTES scoping document. Confirm AI/MCP assets are enumerated, AI-class attack vectors are in-scope, and the rules-of-engagement permit prompt-injection and MCP-trust testing. Confirm tester competency on AI-class attacks. Theater verdict if AI/MCP is excluded from scope, or if rules-of-engagement prohibit AI-class testing without documented justification.",
|
|
2359
|
+
"evidence_required": [
|
|
2360
|
+
"PTES scoping document",
|
|
2361
|
+
"rules-of-engagement document",
|
|
2362
|
+
"tester competency CV"
|
|
2363
|
+
],
|
|
2364
|
+
"verdict_when_failed": "compliance-theater"
|
|
2365
|
+
}
|
|
1696
2366
|
},
|
|
1697
2367
|
"SLSA-v1.0-Build-L3": {
|
|
1698
2368
|
"framework": "SLSA v1.0 (Supply-chain Levels for Software Artifacts) — Build Track",
|
|
@@ -1720,7 +2390,17 @@
|
|
|
1720
2390
|
"attack_refs": [
|
|
1721
2391
|
"T1195.001",
|
|
1722
2392
|
"T1195.002"
|
|
1723
|
-
]
|
|
2393
|
+
],
|
|
2394
|
+
"theater_test": {
|
|
2395
|
+
"claim": "Our build pipeline is SLSA Build L3 with non-falsifiable provenance signed by a hardened build platform.",
|
|
2396
|
+
"test": "Pull the SLSA provenance attestation for the most-recent release. Confirm the build platform is hosted/hardened, the attestation is signed, and the materials cover the full source-of-truth. Then confirm AI-authorship attestation (per-block provenance for AI-generated code with reviewer identity) is present. Confirm any model artefacts shipped have a Model Track equivalent attestation. Theater verdict if attestations exist but AI-authored diffs lack reviewer attestation, or if model artefacts ship at SLSA L0/L1 equivalent without explicit model-track attestation.",
|
|
2397
|
+
"evidence_required": [
|
|
2398
|
+
"SLSA provenance attestation for latest release",
|
|
2399
|
+
"AI-authorship attestation policy and recent merge sample",
|
|
2400
|
+
"model-track attestation if model artefacts shipped"
|
|
2401
|
+
],
|
|
2402
|
+
"verdict_when_failed": "compliance-theater"
|
|
2403
|
+
}
|
|
1724
2404
|
},
|
|
1725
2405
|
"SOC2-CC6-logical-access": {
|
|
1726
2406
|
"framework": "SOC 2 (AICPA Trust Services Criteria)",
|
|
@@ -1741,7 +2421,17 @@
|
|
|
1741
2421
|
"atlas_refs": [
|
|
1742
2422
|
"AML.T0051"
|
|
1743
2423
|
],
|
|
1744
|
-
"attack_refs": []
|
|
2424
|
+
"attack_refs": [],
|
|
2425
|
+
"theater_test": {
|
|
2426
|
+
"claim": "Our SOC 2 CC6 logical and physical access controls cover all in-scope systems.",
|
|
2427
|
+
"test": "Sample AI-agent invocation flows. Confirm authorisation-context evidence per invocation (scope, tools, data sensitivity). Confirm prompt logging captures sufficient detail for post-incident analysis (input chain, output, tool calls). Confirm anomaly detection alerts on AI-agent actions outside baseline. Theater verdict if AI-agent actions are not separately authorised, prompts are unlogged, or anomaly detection is absent.",
|
|
2428
|
+
"evidence_required": [
|
|
2429
|
+
"AI-agent authorisation-context policy",
|
|
2430
|
+
"prompt-logging configuration with retention",
|
|
2431
|
+
"anomaly-detection rule export"
|
|
2432
|
+
],
|
|
2433
|
+
"verdict_when_failed": "compliance-theater"
|
|
2434
|
+
}
|
|
1745
2435
|
},
|
|
1746
2436
|
"SOC2-CC7-anomaly-detection": {
|
|
1747
2437
|
"framework": "SOC 2 (AICPA Trust Services Criteria)",
|
|
@@ -1765,7 +2455,17 @@
|
|
|
1765
2455
|
"attack_refs": [
|
|
1766
2456
|
"T1071",
|
|
1767
2457
|
"T1059"
|
|
1768
|
-
]
|
|
2458
|
+
],
|
|
2459
|
+
"theater_test": {
|
|
2460
|
+
"claim": "Our SOC 2 CC7 system monitoring detects anomalous behaviour.",
|
|
2461
|
+
"test": "Inspect monitoring rules for AI-class anomalies (prompt injection patterns, RAG-corpus drift, agent action volume spikes, tool-call sequence deviations). Confirm at least one alert per class triggered in the past 90 days; confirm triage records exist. Theater verdict if AI-class anomaly rules are absent, or if no alerts triggered despite AI being in production for 90+ days.",
|
|
2462
|
+
"evidence_required": [
|
|
2463
|
+
"AI-class anomaly rule export",
|
|
2464
|
+
"alert-triage records past 90 days",
|
|
2465
|
+
"telemetry volume report"
|
|
2466
|
+
],
|
|
2467
|
+
"verdict_when_failed": "compliance-theater"
|
|
2468
|
+
}
|
|
1769
2469
|
},
|
|
1770
2470
|
"SOC2-CC9-vendor-management": {
|
|
1771
2471
|
"framework": "SOC 2 (AICPA Trust Services Criteria)",
|
|
@@ -1789,7 +2489,17 @@
|
|
|
1789
2489
|
],
|
|
1790
2490
|
"attack_refs": [
|
|
1791
2491
|
"T1195.001"
|
|
1792
|
-
]
|
|
2492
|
+
],
|
|
2493
|
+
"theater_test": {
|
|
2494
|
+
"claim": "Our SOC 2 CC9 vendor management covers all third parties with system access.",
|
|
2495
|
+
"test": "Pull the vendor register. Filter for AI providers; confirm AI-specific contractual clauses (prompt retention, training opt-out, residency, sub-processor disclosure, breach notification). Confirm self-signup AI usage by employees is policy-prohibited and detection is in place. Theater verdict if AI vendors have generic SaaS contracts without AI clauses, or if self-signup is undetected.",
|
|
2496
|
+
"evidence_required": [
|
|
2497
|
+
"vendor register AI subset",
|
|
2498
|
+
"AI-vendor contract clause checklist",
|
|
2499
|
+
"self-signup detection telemetry"
|
|
2500
|
+
],
|
|
2501
|
+
"verdict_when_failed": "compliance-theater"
|
|
2502
|
+
}
|
|
1793
2503
|
},
|
|
1794
2504
|
"SPDX-v3.0-SBOM": {
|
|
1795
2505
|
"framework": "SPDX v3.0 (ISO/IEC 5962-aligned SBOM standard)",
|
|
@@ -1815,7 +2525,17 @@
|
|
|
1815
2525
|
],
|
|
1816
2526
|
"attack_refs": [
|
|
1817
2527
|
"T1195.001"
|
|
1818
|
-
]
|
|
2528
|
+
],
|
|
2529
|
+
"theater_test": {
|
|
2530
|
+
"claim": "We publish SPDX 3.0 SBOMs and they include AI-BOM coverage per the AI profile.",
|
|
2531
|
+
"test": "Pull the SPDX 3.0 document for the most recent release. Confirm the `Build` profile and `AI` profile are both declared. Inspect AI-profile sections for populated `useSensitivePersonalInformation`, `safetyRiskAssessment`, `modelDataPreprocessing`, and training-data fields. Cross-walk SPDX AI-BOM identifiers against CycloneDX ML-BOM identifiers to confirm consistency. Theater verdict if the AI profile is declared but key fields are empty, or if SPDX↔CycloneDX cross-walk produces conflicting model identities.",
|
|
2532
|
+
"evidence_required": [
|
|
2533
|
+
"latest SPDX 3.0 document with profile declarations",
|
|
2534
|
+
"AI-profile field-population coverage report",
|
|
2535
|
+
"SPDX↔CycloneDX cross-walk mapping"
|
|
2536
|
+
],
|
|
2537
|
+
"verdict_when_failed": "compliance-theater"
|
|
2538
|
+
}
|
|
1819
2539
|
},
|
|
1820
2540
|
"SWIFT-CSCF-v2026-1.1": {
|
|
1821
2541
|
"framework": "SWIFT Customer Security Controls Framework v2026",
|
|
@@ -1842,7 +2562,17 @@
|
|
|
1842
2562
|
"attack_refs": [
|
|
1843
2563
|
"T1071",
|
|
1844
2564
|
"T1078"
|
|
1845
|
-
]
|
|
2565
|
+
],
|
|
2566
|
+
"theater_test": {
|
|
2567
|
+
"claim": "Our SWIFT secure zone is segregated and protected per CSCF v2026 1.1.",
|
|
2568
|
+
"test": "Inspect the secure-zone policy. Confirm explicit prohibition or strict gating of LLM assistants inside the secure zone. Confirm AI-API egress from administrative jump zones is enumerated as a named conduit with monitoring. Confirm AI-generated MT/MX message drafts are flagged as a distinct review class. Cross-walk to DORA Art. 28 register. Theater verdict if LLM assistants are silently permitted, AI-API egress is unmonitored, or no DORA cross-walk exists.",
|
|
2569
|
+
"evidence_required": [
|
|
2570
|
+
"secure-zone policy document",
|
|
2571
|
+
"AI-API egress monitoring configuration",
|
|
2572
|
+
"DORA Art. 28 cross-walk record"
|
|
2573
|
+
],
|
|
2574
|
+
"verdict_when_failed": "compliance-theater"
|
|
2575
|
+
}
|
|
1846
2576
|
},
|
|
1847
2577
|
"UK-CAF-A1": {
|
|
1848
2578
|
"framework": "UK NCSC Cyber Assessment Framework v3.2",
|
|
@@ -1863,7 +2593,17 @@
|
|
|
1863
2593
|
"atlas_refs": [
|
|
1864
2594
|
"AML.T0010"
|
|
1865
2595
|
],
|
|
1866
|
-
"attack_refs": []
|
|
2596
|
+
"attack_refs": [],
|
|
2597
|
+
"theater_test": {
|
|
2598
|
+
"claim": "Our governance satisfies UK CAF A1 with board-level cyber risk accountability.",
|
|
2599
|
+
"test": "Pull the board governance pack. Confirm an AI-systems-in-use inventory is reviewed at board cadence, an MCP/plugin trust register exists, and accountability for AI security outcomes maps to a named executive in the NIS2/CCRA scope. Theater verdict if AI is absent from board-pack contents, or if AI accountability is unassigned at executive level.",
|
|
2600
|
+
"evidence_required": [
|
|
2601
|
+
"board governance pack table-of-contents",
|
|
2602
|
+
"AI-systems inventory with board-review cadence",
|
|
2603
|
+
"executive accountability matrix"
|
|
2604
|
+
],
|
|
2605
|
+
"verdict_when_failed": "compliance-theater"
|
|
2606
|
+
}
|
|
1867
2607
|
},
|
|
1868
2608
|
"UK-CAF-B2": {
|
|
1869
2609
|
"framework": "UK NCSC Cyber Assessment Framework v3.2",
|
|
@@ -1888,7 +2628,17 @@
|
|
|
1888
2628
|
],
|
|
1889
2629
|
"attack_refs": [
|
|
1890
2630
|
"T1078"
|
|
1891
|
-
]
|
|
2631
|
+
],
|
|
2632
|
+
"theater_test": {
|
|
2633
|
+
"claim": "Our identity and access management satisfies UK CAF B2.",
|
|
2634
|
+
"test": "Inventory identities including AI-agent service accounts. Confirm authentication strength matches sensitivity (FIDO2 for admin, scope-limited tokens for agents). Confirm continuous verification, not just provisioning-time. Theater verdict if AI-agent accounts use long-lived bearer tokens for admin-equivalent scope, or if verification is provisioning-only.",
|
|
2635
|
+
"evidence_required": [
|
|
2636
|
+
"identity inventory including AI agents",
|
|
2637
|
+
"authentication-strength policy",
|
|
2638
|
+
"continuous-verification configuration"
|
|
2639
|
+
],
|
|
2640
|
+
"verdict_when_failed": "compliance-theater"
|
|
2641
|
+
}
|
|
1892
2642
|
},
|
|
1893
2643
|
"UK-CAF-C1": {
|
|
1894
2644
|
"framework": "UK NCSC Cyber Assessment Framework v3.2",
|
|
@@ -1914,7 +2664,17 @@
|
|
|
1914
2664
|
],
|
|
1915
2665
|
"attack_refs": [
|
|
1916
2666
|
"T1567"
|
|
1917
|
-
]
|
|
2667
|
+
],
|
|
2668
|
+
"theater_test": {
|
|
2669
|
+
"claim": "Our security monitoring satisfies UK CAF C1 across essential service flows.",
|
|
2670
|
+
"test": "Pull the monitoring coverage matrix. Confirm AI-API egress, MCP server invocations, and AI-agent action telemetry are ingested. Confirm alerting on AI-class anomalies has triaged alerts in the past 90 days. Theater verdict if any AI source class is unmonitored or if no AI-class alert has been triaged despite production AI activity.",
|
|
2671
|
+
"evidence_required": [
|
|
2672
|
+
"monitoring coverage matrix",
|
|
2673
|
+
"AI-source ingestion configuration",
|
|
2674
|
+
"alert-triage records past 90 days"
|
|
2675
|
+
],
|
|
2676
|
+
"verdict_when_failed": "compliance-theater"
|
|
2677
|
+
}
|
|
1918
2678
|
},
|
|
1919
2679
|
"UK-CAF-D1": {
|
|
1920
2680
|
"framework": "UK NCSC Cyber Assessment Framework v3.2",
|
|
@@ -1937,7 +2697,17 @@
|
|
|
1937
2697
|
"atlas_refs": [],
|
|
1938
2698
|
"attack_refs": [
|
|
1939
2699
|
"T1068"
|
|
1940
|
-
]
|
|
2700
|
+
],
|
|
2701
|
+
"theater_test": {
|
|
2702
|
+
"claim": "Our response and recovery planning satisfies UK CAF D1.",
|
|
2703
|
+
"test": "Pull the incident response plan. Confirm AI-incident scenarios (prompt-injection RCE, RAG-poisoning, agent-action-on-injected-intent, AI-API supply-chain compromise) are exercised in the past 12 months. Confirm the plan integrates with NIS2 24h notification timing. Theater verdict if AI scenarios are absent from the exercise catalogue, or if NIS2 timing is not integrated.",
|
|
2704
|
+
"evidence_required": [
|
|
2705
|
+
"incident response plan",
|
|
2706
|
+
"exercise catalogue with execution dates",
|
|
2707
|
+
"NIS2 timing integration document"
|
|
2708
|
+
],
|
|
2709
|
+
"verdict_when_failed": "compliance-theater"
|
|
2710
|
+
}
|
|
1941
2711
|
},
|
|
1942
2712
|
"VEX-CSAF-v2.1": {
|
|
1943
2713
|
"framework": "VEX via OASIS CSAF 2.1 (Common Security Advisory Framework)",
|
|
@@ -1963,7 +2733,17 @@
|
|
|
1963
2733
|
],
|
|
1964
2734
|
"attack_refs": [
|
|
1965
2735
|
"T1195.001"
|
|
1966
|
-
]
|
|
2736
|
+
],
|
|
2737
|
+
"theater_test": {
|
|
2738
|
+
"claim": "We publish VEX statements via OASIS CSAF 2.1 for our products.",
|
|
2739
|
+
"test": "Pull the published CSAF 2.1 documents. Confirm AI-component identifier scheme presence (model + version + adapters + tokenizer). Confirm at least one VEX statement covers an AI-class vulnerability (jailbreak, prompt injection, embedding inversion). Confirm chaining of base-model VEX statements to derived-model VEX statements where applicable. Theater verdict if AI components are absent from the identifier scheme, or if no AI-class VEX statements exist despite AI components shipping.",
|
|
2740
|
+
"evidence_required": [
|
|
2741
|
+
"CSAF 2.1 published documents",
|
|
2742
|
+
"AI-component identifier mapping",
|
|
2743
|
+
"VEX chain example for base→derived model"
|
|
2744
|
+
],
|
|
2745
|
+
"verdict_when_failed": "compliance-theater"
|
|
2746
|
+
}
|
|
1967
2747
|
},
|
|
1968
2748
|
"FCC-CPNI-4.1": {
|
|
1969
2749
|
"framework": "FCC-CPNI",
|
|
@@ -1987,7 +2767,17 @@
|
|
|
1987
2767
|
"T1078",
|
|
1988
2768
|
"T1098",
|
|
1989
2769
|
"T1199"
|
|
1990
|
-
]
|
|
2770
|
+
],
|
|
2771
|
+
"theater_test": {
|
|
2772
|
+
"claim": "Our annual CPNI certification satisfies FCC CPNI obligations.",
|
|
2773
|
+
"test": "Confirm quarterly LI-gateway activation auditing (Salt-Typhoon/PRC threat model). Confirm gNB firmware hash attestation and signaling-anomaly baselines per PLMN-pair. Pull the most recent CPNI certification; confirm those operational artefacts are referenced. Theater verdict if certification is annual-only without LI-gateway/firmware-hash/signaling artefacts.",
|
|
2774
|
+
"evidence_required": [
|
|
2775
|
+
"LI-gateway audit log",
|
|
2776
|
+
"gNB firmware hash telemetry",
|
|
2777
|
+
"signaling baseline document"
|
|
2778
|
+
],
|
|
2779
|
+
"verdict_when_failed": "compliance-theater"
|
|
2780
|
+
}
|
|
1991
2781
|
},
|
|
1992
2782
|
"FCC-Cyber-Incident-Notification-2024": {
|
|
1993
2783
|
"framework": "FCC",
|
|
@@ -2008,7 +2798,17 @@
|
|
|
2008
2798
|
"attack_refs": [
|
|
2009
2799
|
"T1199",
|
|
2010
2800
|
"T1078"
|
|
2011
|
-
]
|
|
2801
|
+
],
|
|
2802
|
+
"theater_test": {
|
|
2803
|
+
"claim": "We can meet the FCC 2024 cyber incident notification rule for telecom carriers.",
|
|
2804
|
+
"test": "Run a tabletop with a synthetic significant-incident inject affecting CPNI. Stopwatch elapsed time to a draft FCC notification. Confirm cross-walk to NIS2 24h / DORA 4h timing for multinational operators. Theater verdict if no on-call is named, the playbook hasn't been exercised in 12 months, or cross-walks are absent.",
|
|
2805
|
+
"evidence_required": [
|
|
2806
|
+
"tabletop execution log",
|
|
2807
|
+
"FCC notification draft",
|
|
2808
|
+
"cross-jurisdiction timing matrix"
|
|
2809
|
+
],
|
|
2810
|
+
"verdict_when_failed": "compliance-theater"
|
|
2811
|
+
}
|
|
2012
2812
|
},
|
|
2013
2813
|
"NIS2-Annex-I-Telecom": {
|
|
2014
2814
|
"framework": "NIS2",
|
|
@@ -2032,7 +2832,17 @@
|
|
|
2032
2832
|
"T1199",
|
|
2033
2833
|
"T1078",
|
|
2034
2834
|
"T1098"
|
|
2035
|
-
]
|
|
2835
|
+
],
|
|
2836
|
+
"theater_test": {
|
|
2837
|
+
"claim": "Our NIS2 Annex I telecom obligations are satisfied; signaling and LI-system risks are managed.",
|
|
2838
|
+
"test": "Confirm gNB firmware hash attestation pipeline runs continuously across the production fleet. Confirm signaling-anomaly baselines exist per PLMN-pair and that anomalies trigger SOC tickets. Confirm LI-gateway activation auditing runs at least quarterly. Theater verdict if any of those streams are absent, or if no signaling anomaly has been triaged in 90 days despite carrier-pair traffic.",
|
|
2839
|
+
"evidence_required": [
|
|
2840
|
+
"gNB firmware hash attestation telemetry",
|
|
2841
|
+
"signaling-anomaly baseline document and recent alerts",
|
|
2842
|
+
"LI-gateway activation audit log"
|
|
2843
|
+
],
|
|
2844
|
+
"verdict_when_failed": "compliance-theater"
|
|
2845
|
+
}
|
|
2036
2846
|
},
|
|
2037
2847
|
"DORA-Art-21-Telecom-ICT": {
|
|
2038
2848
|
"framework": "DORA",
|
|
@@ -2052,7 +2862,17 @@
|
|
|
2052
2862
|
"atlas_refs": [],
|
|
2053
2863
|
"attack_refs": [
|
|
2054
2864
|
"T1199"
|
|
2055
|
-
]
|
|
2865
|
+
],
|
|
2866
|
+
"theater_test": {
|
|
2867
|
+
"claim": "Our telecom ICT third-party arrangements satisfy DORA Art. 21.",
|
|
2868
|
+
"test": "Pull the Art. 21 ICT register; filter for telecom-class providers (carriers, MVNOs, SMS gateways, voice carriers). Confirm enumeration of LI-gateway access risk, signaling-protocol exposure (SS7/Diameter/HTTP/2 for 5G), and sub-carrier visibility into CIF flows. Theater verdict if telecom providers appear only as 'connectivity vendors' without carrier-class threat-model entries, or if no concentration analysis exists across telecom providers.",
|
|
2869
|
+
"evidence_required": [
|
|
2870
|
+
"Art. 21 ICT register telecom subset",
|
|
2871
|
+
"carrier-class threat-model document",
|
|
2872
|
+
"concentration analysis report"
|
|
2873
|
+
],
|
|
2874
|
+
"verdict_when_failed": "compliance-theater"
|
|
2875
|
+
}
|
|
2056
2876
|
},
|
|
2057
2877
|
"UK-CAF-B5": {
|
|
2058
2878
|
"framework": "UK-CAF",
|
|
@@ -2073,7 +2893,17 @@
|
|
|
2073
2893
|
"attack_refs": [
|
|
2074
2894
|
"T1199",
|
|
2075
2895
|
"T1078"
|
|
2076
|
-
]
|
|
2896
|
+
],
|
|
2897
|
+
"theater_test": {
|
|
2898
|
+
"claim": "Our resilient telecom networks satisfy UK CAF B5.",
|
|
2899
|
+
"test": "Confirm gNB firmware hash attestation is continuous, signaling-anomaly baselines exist per PLMN-pair, and LI-gateway access auditing is in place. Confirm sub-carrier visibility risks are documented. Theater verdict if any of those streams are missing or if no signaling anomaly has been triaged in 90 days despite carrier-pair traffic.",
|
|
2900
|
+
"evidence_required": [
|
|
2901
|
+
"gNB attestation telemetry",
|
|
2902
|
+
"signaling baseline document",
|
|
2903
|
+
"LI-gateway audit log"
|
|
2904
|
+
],
|
|
2905
|
+
"verdict_when_failed": "compliance-theater"
|
|
2906
|
+
}
|
|
2077
2907
|
},
|
|
2078
2908
|
"AU-ISM-1556": {
|
|
2079
2909
|
"framework": "au-ism",
|
|
@@ -2094,7 +2924,17 @@
|
|
|
2094
2924
|
"attack_refs": [
|
|
2095
2925
|
"T1078",
|
|
2096
2926
|
"T1098"
|
|
2097
|
-
]
|
|
2927
|
+
],
|
|
2928
|
+
"theater_test": {
|
|
2929
|
+
"claim": "Our telecom posture satisfies AU ISM control 1556 for signaling-protocol abuse.",
|
|
2930
|
+
"test": "Confirm signaling-anomaly baselines per PLMN-pair, gNB firmware hash attestation, and LI-gateway audit. Pull the past 90 days of signaling alerts; confirm triage records. Theater verdict if any of those streams is missing, or if signaling anomalies are unmonitored.",
|
|
2931
|
+
"evidence_required": [
|
|
2932
|
+
"signaling baseline document with PLMN-pair coverage",
|
|
2933
|
+
"gNB attestation telemetry",
|
|
2934
|
+
"alert-triage records"
|
|
2935
|
+
],
|
|
2936
|
+
"verdict_when_failed": "compliance-theater"
|
|
2937
|
+
}
|
|
2098
2938
|
},
|
|
2099
2939
|
"GSMA-NESAS-Deployment": {
|
|
2100
2940
|
"framework": "GSMA-NESAS",
|
|
@@ -2114,7 +2954,17 @@
|
|
|
2114
2954
|
"atlas_refs": [],
|
|
2115
2955
|
"attack_refs": [
|
|
2116
2956
|
"T1199"
|
|
2117
|
-
]
|
|
2957
|
+
],
|
|
2958
|
+
"theater_test": {
|
|
2959
|
+
"claim": "Our telecom equipment is GSMA NESAS-certified across the network.",
|
|
2960
|
+
"test": "Confirm NESAS product-time certification AND operator-attested-runtime gNB hash AND EMS/OSS NESAS-equivalent scheme. Confirm firmware-update cadence triggers recertification attestation. Theater verdict if certification is product-time-only without runtime-attestation, or if firmware updates bypass recertification.",
|
|
2961
|
+
"evidence_required": [
|
|
2962
|
+
"NESAS certification per product",
|
|
2963
|
+
"runtime-attestation telemetry",
|
|
2964
|
+
"firmware-update → recertification mapping"
|
|
2965
|
+
],
|
|
2966
|
+
"verdict_when_failed": "compliance-theater"
|
|
2967
|
+
}
|
|
2118
2968
|
},
|
|
2119
2969
|
"3GPP-TR-33.926": {
|
|
2120
2970
|
"framework": "3GPP",
|
|
@@ -2134,7 +2984,17 @@
|
|
|
2134
2984
|
"atlas_refs": [],
|
|
2135
2985
|
"attack_refs": [
|
|
2136
2986
|
"T1199"
|
|
2137
|
-
]
|
|
2987
|
+
],
|
|
2988
|
+
"theater_test": {
|
|
2989
|
+
"claim": "Our 5G gNB security posture aligns with 3GPP TR 33.926 threat-model assumptions.",
|
|
2990
|
+
"test": "Inspect deployment posture against TR 33.926 threats. Confirm runtime gNB integrity attestation and that LI-system compromise paths and signaling-protocol-abuse paths are addressed. Theater verdict if attestation is product-time-only or LI/signaling threats are not deployment-checklisted.",
|
|
2991
|
+
"evidence_required": [
|
|
2992
|
+
"TR 33.926 → deployment-posture mapping",
|
|
2993
|
+
"runtime gNB attestation telemetry",
|
|
2994
|
+
"LI/signaling threat-treatment document"
|
|
2995
|
+
],
|
|
2996
|
+
"verdict_when_failed": "compliance-theater"
|
|
2997
|
+
}
|
|
2138
2998
|
},
|
|
2139
2999
|
"ITU-T-X.805": {
|
|
2140
3000
|
"framework": "ITU-T",
|
|
@@ -2154,7 +3014,17 @@
|
|
|
2154
3014
|
"atlas_refs": [],
|
|
2155
3015
|
"attack_refs": [
|
|
2156
3016
|
"T1199"
|
|
2157
|
-
]
|
|
3017
|
+
],
|
|
3018
|
+
"theater_test": {
|
|
3019
|
+
"claim": "Our network security architecture follows ITU-T X.805 8-dimension framing.",
|
|
3020
|
+
"test": "Pull the X.805 architecture document. Confirm modern-threat-model annexes covering LI-system compromise, signaling-protocol abuse, and slice-isolation are present. Confirm a deployment-validation checklist exists and was executed in the past year. Theater verdict if annexes are absent or the deployment checklist has never been executed.",
|
|
3021
|
+
"evidence_required": [
|
|
3022
|
+
"X.805 architecture document with annexes",
|
|
3023
|
+
"deployment-validation checklist execution log",
|
|
3024
|
+
"slice-isolation test results"
|
|
3025
|
+
],
|
|
3026
|
+
"verdict_when_failed": "compliance-theater"
|
|
3027
|
+
}
|
|
2158
3028
|
},
|
|
2159
3029
|
"NIST-800-53-IA-5-Federated": {
|
|
2160
3030
|
"framework": "NIST 800-53 Rev.5",
|
|
@@ -2175,7 +3045,17 @@
|
|
|
2175
3045
|
"T1556.007",
|
|
2176
3046
|
"T1098.001",
|
|
2177
3047
|
"T1606.002"
|
|
2178
|
-
]
|
|
3048
|
+
],
|
|
3049
|
+
"theater_test": {
|
|
3050
|
+
"claim": "Our IA-5 authenticator management covers federated identity providers.",
|
|
3051
|
+
"test": "Inspect IdP control-plane: continuous attestation of token-signing certificate fingerprints, claim-transformation rule baseline with per-modification change-control attestation, management-API-token inventory with TTL + scope + source-IP enforcement. Theater verdict if attestation is snapshot-only (quarterly) rather than continuous, or if management-API tokens lack TTL/scope/source-IP enforcement.",
|
|
3052
|
+
"evidence_required": [
|
|
3053
|
+
"IdP token-signing fingerprint telemetry",
|
|
3054
|
+
"claim-transformation change log",
|
|
3055
|
+
"management-API token inventory"
|
|
3056
|
+
],
|
|
3057
|
+
"verdict_when_failed": "compliance-theater"
|
|
3058
|
+
}
|
|
2179
3059
|
},
|
|
2180
3060
|
"ISO-27001-2022-A.5.16-Federated": {
|
|
2181
3061
|
"framework": "ISO/IEC 27001:2022",
|
|
@@ -2195,7 +3075,17 @@
|
|
|
2195
3075
|
"attack_refs": [
|
|
2196
3076
|
"T1098.001",
|
|
2197
3077
|
"T1199"
|
|
2198
|
-
]
|
|
3078
|
+
],
|
|
3079
|
+
"theater_test": {
|
|
3080
|
+
"claim": "Our identity management satisfies ISO 27001:2022 A.5.16 across federated systems.",
|
|
3081
|
+
"test": "Confirm IdP-tenant lifecycle management: tenant-admin discovery, off-boarding alerts, dormant-tenant alerts, claim-transformation review cadence. Theater verdict if dormant tenants exist with no alerting, or if claim transformations have no review cadence.",
|
|
3082
|
+
"evidence_required": [
|
|
3083
|
+
"IdP tenant inventory",
|
|
3084
|
+
"off-boarding/dormant alerting configuration",
|
|
3085
|
+
"claim-transformation review cadence document"
|
|
3086
|
+
],
|
|
3087
|
+
"verdict_when_failed": "compliance-theater"
|
|
3088
|
+
}
|
|
2199
3089
|
},
|
|
2200
3090
|
"SOC2-CC6-OAuth-Consent": {
|
|
2201
3091
|
"framework": "SOC 2 (AICPA Trust Services Criteria)",
|
|
@@ -2214,7 +3104,17 @@
|
|
|
2214
3104
|
"atlas_refs": [],
|
|
2215
3105
|
"attack_refs": [
|
|
2216
3106
|
"T1098.001"
|
|
2217
|
-
]
|
|
3107
|
+
],
|
|
3108
|
+
"theater_test": {
|
|
3109
|
+
"claim": "Our SOC 2 CC6 covers OAuth consent grants in our SaaS estate.",
|
|
3110
|
+
"test": "Pull the OAuth consent-grant inventory across the IdP estate. Confirm continuous alerting on high-risk scope grants. Confirm per-grant business-purpose attestation. Confirm unverified-publisher grants are gated. Theater verdict if any of those is missing or if high-risk grants exist without attestation/justification.",
|
|
3111
|
+
"evidence_required": [
|
|
3112
|
+
"OAuth consent-grant inventory",
|
|
3113
|
+
"alerting rule for high-risk scope grants",
|
|
3114
|
+
"business-purpose attestation samples"
|
|
3115
|
+
],
|
|
3116
|
+
"verdict_when_failed": "compliance-theater"
|
|
3117
|
+
}
|
|
2218
3118
|
},
|
|
2219
3119
|
"UK-CAF-B2-IdP-Tenant": {
|
|
2220
3120
|
"framework": "UK NCSC CAF",
|
|
@@ -2235,7 +3135,17 @@
|
|
|
2235
3135
|
"T1098.001",
|
|
2236
3136
|
"T1556.007",
|
|
2237
3137
|
"T1199"
|
|
2238
|
-
]
|
|
3138
|
+
],
|
|
3139
|
+
"theater_test": {
|
|
3140
|
+
"claim": "Our IdP tenant access controls satisfy UK CAF B2.",
|
|
3141
|
+
"test": "Inspect IdP tenant management; confirm tenant-admin actions require step-up MFA, management-API tokens are scoped + TTL-bounded + source-IP-locked, and token-signing certificate rotation is alert-attested. Theater verdict if any tenant-admin path lacks step-up MFA, or if management-API tokens are unrotated/unscoped/unbounded.",
|
|
3142
|
+
"evidence_required": [
|
|
3143
|
+
"tenant-admin action flow with MFA evidence",
|
|
3144
|
+
"management-API token inventory with TTL/scope/source-IP",
|
|
3145
|
+
"token-signing rotation alert configuration"
|
|
3146
|
+
],
|
|
3147
|
+
"verdict_when_failed": "compliance-theater"
|
|
3148
|
+
}
|
|
2239
3149
|
},
|
|
2240
3150
|
"AU-ISM-1559-IdP": {
|
|
2241
3151
|
"framework": "AU ISM",
|
|
@@ -2255,7 +3165,17 @@
|
|
|
2255
3165
|
"attack_refs": [
|
|
2256
3166
|
"T1078.004",
|
|
2257
3167
|
"T1098.001"
|
|
2258
|
-
]
|
|
3168
|
+
],
|
|
3169
|
+
"theater_test": {
|
|
3170
|
+
"claim": "Our IdP posture satisfies AU ISM 1559 for identity provider security.",
|
|
3171
|
+
"test": "Confirm IdP token-signing certificate rotation alerting, claim-transformation change-control, management-API token TTL/scope/source-IP enforcement. Confirm the IdP is treated as critical-infrastructure-tier in the asset inventory. Theater verdict if IdP is in 'IT vendor' tier rather than critical-infrastructure tier.",
|
|
3172
|
+
"evidence_required": [
|
|
3173
|
+
"IdP control-plane monitoring rule export",
|
|
3174
|
+
"asset-tier classification record",
|
|
3175
|
+
"management-API token inventory"
|
|
3176
|
+
],
|
|
3177
|
+
"verdict_when_failed": "compliance-theater"
|
|
3178
|
+
}
|
|
2259
3179
|
},
|
|
2260
3180
|
"NIS2-Art-21-Federated-Identity": {
|
|
2261
3181
|
"framework": "EU NIS2 Directive",
|
|
@@ -2276,7 +3196,17 @@
|
|
|
2276
3196
|
"T1098.001",
|
|
2277
3197
|
"T1556.007",
|
|
2278
3198
|
"T1199"
|
|
2279
|
-
]
|
|
3199
|
+
],
|
|
3200
|
+
"theater_test": {
|
|
3201
|
+
"claim": "Our identity-provider risk management satisfies NIS2 Art. 21 for federated-identity dependencies.",
|
|
3202
|
+
"test": "From the supply-chain register, confirm each IdP (Okta, Entra ID, Auth0, Ping, Google Workspace) is listed as an essential-service dependency with concentration analysis. Inspect monitoring rules for token-signing certificate rotation, claim-transformation rule changes, and management-API token activity. Theater verdict if IdPs appear only as 'IT vendor' without dependency-class treatment, or if token-signing rotation events have no alerting rule.",
|
|
3203
|
+
"evidence_required": [
|
|
3204
|
+
"supply-chain register IdP subset",
|
|
3205
|
+
"IdP control-plane monitoring rule export",
|
|
3206
|
+
"IdP concentration analysis"
|
|
3207
|
+
],
|
|
3208
|
+
"verdict_when_failed": "compliance-theater"
|
|
3209
|
+
}
|
|
2280
3210
|
},
|
|
2281
3211
|
"DORA-Art-19-IdP-4h": {
|
|
2282
3212
|
"framework": "EU DORA",
|
|
@@ -2296,7 +3226,17 @@
|
|
|
2296
3226
|
"attack_refs": [
|
|
2297
3227
|
"T1098.001",
|
|
2298
3228
|
"T1556.007"
|
|
2299
|
-
]
|
|
3229
|
+
],
|
|
3230
|
+
"theater_test": {
|
|
3231
|
+
"claim": "We can meet the DORA Art. 19 4-hour major-ICT-incident notification clock for IdP compromise.",
|
|
3232
|
+
"test": "Run a tabletop: at T0 a SIEM alert fires for IdP token-signing certificate rotation by an unrecognised principal. Stopwatch the elapsed time from T0 to a draft notification ready for the Competent Authority covering scope, root cause hypothesis, impacted services, and recovery posture. Theater verdict if elapsed time exceeds 4h, or if the playbook does not name the on-call who initiates the clock, or if the tabletop has not been run in the last 12 months.",
|
|
3233
|
+
"evidence_required": [
|
|
3234
|
+
"tabletop execution log with stopwatch timestamps",
|
|
3235
|
+
"DORA notification draft produced under exercise",
|
|
3236
|
+
"on-call rota covering 24/7 IdP-incident response"
|
|
3237
|
+
],
|
|
3238
|
+
"verdict_when_failed": "compliance-theater"
|
|
3239
|
+
}
|
|
2300
3240
|
},
|
|
2301
3241
|
"OFAC-Sanctions-Threat-Actor-Negotiation": {
|
|
2302
3242
|
"framework": "US Treasury OFAC + EU sanctions overlay + UK OFSI",
|
|
@@ -2316,7 +3256,17 @@
|
|
|
2316
3256
|
"attack_refs": [
|
|
2317
3257
|
"T1486",
|
|
2318
3258
|
"T1078.004"
|
|
2319
|
-
]
|
|
3259
|
+
],
|
|
3260
|
+
"theater_test": {
|
|
3261
|
+
"claim": "Our sanctions compliance covers any threat-actor negotiation scenario.",
|
|
3262
|
+
"test": "Pull the IR playbook. Confirm pre-rehearsed sanctions screening (US OFAC SDN + EU 2014/833 + UK OFSI + AU DFAT + JP MOF) as a precondition to any negotiator engagement. Confirm counsel-signed attestation workflow with timestamp. Confirm an annual tabletop with a sanctions-match inject under time-pressure. Theater verdict if screening is not pre-rehearsed or if the tabletop has not been run.",
|
|
3263
|
+
"evidence_required": [
|
|
3264
|
+
"IR playbook with sanctions sub-procedure",
|
|
3265
|
+
"counsel-signed attestation template",
|
|
3266
|
+
"tabletop execution log"
|
|
3267
|
+
],
|
|
3268
|
+
"verdict_when_failed": "compliance-theater"
|
|
3269
|
+
}
|
|
2320
3270
|
},
|
|
2321
3271
|
"FedRAMP-IL5-IAM-Federated": {
|
|
2322
3272
|
"framework": "FedRAMP (US)",
|
|
@@ -2340,7 +3290,17 @@
|
|
|
2340
3290
|
"attack_refs": [
|
|
2341
3291
|
"T1078.004",
|
|
2342
3292
|
"T1098.001"
|
|
2343
|
-
]
|
|
3293
|
+
],
|
|
3294
|
+
"theater_test": {
|
|
3295
|
+
"claim": "Our FedRAMP IL5 IAM posture covers federated identity for high-impact authorisations.",
|
|
3296
|
+
"test": "Confirm IdP control-plane controls (token-signing rotation alerting, claim-transformation change-control, management-API TTL/scope/source-IP) at IL5 evidence-quality. Confirm cross-account assume-role with subject-claim specificity > wildcard. Theater verdict if controls exist at SP-quality without IL5 evidence-rigor, or if any cross-account chain has wildcard subject claims.",
|
|
3297
|
+
"evidence_required": [
|
|
3298
|
+
"IL5-quality IdP control evidence bundle",
|
|
3299
|
+
"cross-account assume-role policy export",
|
|
3300
|
+
"evidence retention per IL5 cadence"
|
|
3301
|
+
],
|
|
3302
|
+
"verdict_when_failed": "compliance-theater"
|
|
3303
|
+
}
|
|
2344
3304
|
},
|
|
2345
3305
|
"CISA-Snowflake-AA24-IdP-Cloud": {
|
|
2346
3306
|
"framework": "CISA (US) - Cross-framework advisory",
|
|
@@ -2364,7 +3324,17 @@
|
|
|
2364
3324
|
"attack_refs": [
|
|
2365
3325
|
"T1078",
|
|
2366
3326
|
"T1078.004"
|
|
2367
|
-
]
|
|
3327
|
+
],
|
|
3328
|
+
"theater_test": {
|
|
3329
|
+
"claim": "We have remediated against the AA24 Snowflake-class advisory pattern (IdP/cloud credential abuse).",
|
|
3330
|
+
"test": "For SaaS data platforms (Snowflake, Databricks, BigQuery, Redshift), confirm SSO-required posture (no local user/password fallback), MFA on every login, and network policies restricting access to known IPs. Pull the user inventory; confirm zero local-auth users and zero MFA exemptions. Theater verdict if any local-auth user persists, MFA exemption exists, or network policies are absent.",
|
|
3331
|
+
"evidence_required": [
|
|
3332
|
+
"data-platform user inventory with auth method",
|
|
3333
|
+
"MFA exemption list",
|
|
3334
|
+
"network policy configuration"
|
|
3335
|
+
],
|
|
3336
|
+
"verdict_when_failed": "compliance-theater"
|
|
3337
|
+
}
|
|
2368
3338
|
},
|
|
2369
3339
|
"NIST-800-53-AC-2-Cross-Account": {
|
|
2370
3340
|
"framework": "NIST 800-53 Rev 5",
|
|
@@ -2388,7 +3358,17 @@
|
|
|
2388
3358
|
"attack_refs": [
|
|
2389
3359
|
"T1078.004",
|
|
2390
3360
|
"T1098.001"
|
|
2391
|
-
]
|
|
3361
|
+
],
|
|
3362
|
+
"theater_test": {
|
|
3363
|
+
"claim": "Our cross-account access management satisfies NIST 800-53 AC-2.",
|
|
3364
|
+
"test": "Sample 10 cross-account assume-role chains. For each, confirm subject-claim specificity (no wildcard principal), session-policy scoping, and external-ID where third-party assume-role. Inspect monitoring rules for assume-role chain depth and unusual chain shapes. Theater verdict if any sampled chain has wildcard subject claims or external-ID is missing in third-party scenarios.",
|
|
3365
|
+
"evidence_required": [
|
|
3366
|
+
"cross-account assume-role policy sample",
|
|
3367
|
+
"monitoring rule for chain depth",
|
|
3368
|
+
"external-ID enforcement evidence"
|
|
3369
|
+
],
|
|
3370
|
+
"verdict_when_failed": "compliance-theater"
|
|
3371
|
+
}
|
|
2392
3372
|
},
|
|
2393
3373
|
"ISO-27017-Cloud-IAM": {
|
|
2394
3374
|
"framework": "ISO/IEC 27017:2015",
|
|
@@ -2410,7 +3390,17 @@
|
|
|
2410
3390
|
"attack_refs": [
|
|
2411
3391
|
"T1552.005",
|
|
2412
3392
|
"T1078.004"
|
|
2413
|
-
]
|
|
3393
|
+
],
|
|
3394
|
+
"theater_test": {
|
|
3395
|
+
"claim": "Our cloud-IAM posture is hardened per ISO/IEC 27017:2015 cloud-services controls.",
|
|
3396
|
+
"test": "Inspect cloud-IAM configuration: managed identities token-bound to instance identity (where supported); IMDSv2 required with hop-limit and short token TTL; bearer-token TTLs ≤1h non-CAE / ≤24h with Continuous Access Evaluation. Spot-check 10 cross-account assume-role chains and confirm subject-claim specificity > 'wildcard'. Theater verdict if IMDSv1 is in use anywhere, if bearer TTLs exceed the ceilings, or if any sampled cross-account chain has wildcard subject claims.",
|
|
3397
|
+
"evidence_required": [
|
|
3398
|
+
"cloud-IAM configuration export per CSP",
|
|
3399
|
+
"IMDSv2 enforcement audit",
|
|
3400
|
+
"assume-role policy document sample"
|
|
3401
|
+
],
|
|
3402
|
+
"verdict_when_failed": "compliance-theater"
|
|
3403
|
+
}
|
|
2414
3404
|
},
|
|
2415
3405
|
"SOC2-CC6-Access-Key-Leak-Public-Repo": {
|
|
2416
3406
|
"framework": "AICPA SOC 2 Trust Services Criteria",
|
|
@@ -2432,7 +3422,17 @@
|
|
|
2432
3422
|
"attack_refs": [
|
|
2433
3423
|
"T1078.004",
|
|
2434
3424
|
"T1552.005"
|
|
2435
|
-
]
|
|
3425
|
+
],
|
|
3426
|
+
"theater_test": {
|
|
3427
|
+
"claim": "Our SOC 2 CC6 covers credential leakage detection across public repositories.",
|
|
3428
|
+
"test": "Confirm continuous secret-scanning across public repos and developer-affiliated personal repos. Confirm leaked-credential auto-revocation (≤5 minutes) integrated with the IdP/CSP. Pull the past 12 months of credential leaks; measure time-from-leak-to-revocation. Theater verdict if scanning is not continuous, auto-revocation is absent, or any leak exceeded 5 minutes to revocation.",
|
|
3429
|
+
"evidence_required": [
|
|
3430
|
+
"secret-scanning configuration",
|
|
3431
|
+
"auto-revocation pipeline architecture",
|
|
3432
|
+
"leak-to-revocation timing per incident"
|
|
3433
|
+
],
|
|
3434
|
+
"verdict_when_failed": "compliance-theater"
|
|
3435
|
+
}
|
|
2436
3436
|
},
|
|
2437
3437
|
"AWS-Security-Hub-Coverage-Gap": {
|
|
2438
3438
|
"framework": "AWS Security Hub Foundational Security Best Practices (also GCP SCC, Azure Defender for Cloud)",
|
|
@@ -2456,7 +3456,17 @@
|
|
|
2456
3456
|
"T1078.004",
|
|
2457
3457
|
"T1098.001",
|
|
2458
3458
|
"T1562.008"
|
|
2459
|
-
]
|
|
3459
|
+
],
|
|
3460
|
+
"theater_test": {
|
|
3461
|
+
"claim": "Our cloud posture is monitored end-to-end by AWS Security Hub (or equivalent CSP-native posture tool).",
|
|
3462
|
+
"test": "Pull the past 90 days of Security Hub findings. Cross-reference against IR ticket-tracker. Theater verdict if more than 5 findings closed without remediation evidence (suppression rules only). Then run the project's `cloud-iam-incident` playbook detect-indicator inventory against CloudTrail; theater verdict if Security Hub did not surface indicators that the behavioural inventory does (posture-tool deployment ≠ behavioural coverage).",
|
|
3463
|
+
"evidence_required": [
|
|
3464
|
+
"Security Hub findings export 90 days",
|
|
3465
|
+
"IR ticket-tracker correlation",
|
|
3466
|
+
"cloud-iam-incident detect-indicator → CloudTrail behavioural-rule mapping"
|
|
3467
|
+
],
|
|
3468
|
+
"verdict_when_failed": "compliance-theater"
|
|
3469
|
+
}
|
|
2460
3470
|
},
|
|
2461
3471
|
"UK-CAF-B2-Cloud-IAM": {
|
|
2462
3472
|
"framework": "UK NCSC CAF (Cyber Assessment Framework) v3.x",
|
|
@@ -2478,7 +3488,17 @@
|
|
|
2478
3488
|
"attack_refs": [
|
|
2479
3489
|
"T1078.004",
|
|
2480
3490
|
"T1098.001"
|
|
2481
|
-
]
|
|
3491
|
+
],
|
|
3492
|
+
"theater_test": {
|
|
3493
|
+
"claim": "Our cloud-IAM posture satisfies UK CAF B2 across CSPs.",
|
|
3494
|
+
"test": "Pull cloud-IAM configuration: managed-identity binding to instance identity, IMDSv2 required with short token TTL, bearer-token TTL ≤1h non-CAE / ≤24h with CAE, cross-account assume-role with subject-claim specificity. Theater verdict if IMDSv1 is in use, TTLs exceed ceilings, or cross-account claims are wildcard.",
|
|
3495
|
+
"evidence_required": [
|
|
3496
|
+
"cloud-IAM configuration export per CSP",
|
|
3497
|
+
"IMDSv2 enforcement audit",
|
|
3498
|
+
"cross-account assume-role policy export"
|
|
3499
|
+
],
|
|
3500
|
+
"verdict_when_failed": "compliance-theater"
|
|
3501
|
+
}
|
|
2482
3502
|
},
|
|
2483
3503
|
"AU-ISM-1546-Cloud-Service-Account": {
|
|
2484
3504
|
"framework": "ACSC ISM (Australian Government Information Security Manual)",
|
|
@@ -2500,7 +3520,17 @@
|
|
|
2500
3520
|
"attack_refs": [
|
|
2501
3521
|
"T1078.004",
|
|
2502
3522
|
"T1552.005"
|
|
2503
|
-
]
|
|
3523
|
+
],
|
|
3524
|
+
"theater_test": {
|
|
3525
|
+
"claim": "Our cloud service-account posture satisfies AU ISM 1546.",
|
|
3526
|
+
"test": "Inventory cloud service accounts. Confirm short-lived OIDC tokens (workload identity federation) are used in preference to static keys; for any remaining static keys, confirm rotation policy ≤90 days and source-IP allowlisting. Theater verdict if static keys exist without rotation/IP-allowlisting, or if workload identity federation is available but not adopted.",
|
|
3527
|
+
"evidence_required": [
|
|
3528
|
+
"cloud service-account inventory by auth method",
|
|
3529
|
+
"rotation policy document",
|
|
3530
|
+
"source-IP allowlist configuration"
|
|
3531
|
+
],
|
|
3532
|
+
"verdict_when_failed": "compliance-theater"
|
|
3533
|
+
}
|
|
2504
3534
|
},
|
|
2505
3535
|
"OFAC-SDN-Payment-Block": {
|
|
2506
3536
|
"framework": "ALL",
|
|
@@ -2518,7 +3548,19 @@
|
|
|
2518
3548
|
"opened_date": "2026-05-15",
|
|
2519
3549
|
"evidence_cves": [],
|
|
2520
3550
|
"atlas_refs": [],
|
|
2521
|
-
"attack_refs": [
|
|
3551
|
+
"attack_refs": [
|
|
3552
|
+
"T1486"
|
|
3553
|
+
],
|
|
3554
|
+
"theater_test": {
|
|
3555
|
+
"claim": "Our incident response covers OFAC sanctions screening before any ransomware payment.",
|
|
3556
|
+
"test": "Run a tabletop where the inject is a ransomware demand from an attribution-likely-sanctioned actor. Stopwatch the workflow: attribution-evidence package assembled → cross-jurisdiction lookup (OFAC SDN + EU 2014/833 + UK OFSI + AU DFAT + JP MOF) → counsel-signed attestation → pay/restore decision. Theater verdict if any cross-jurisdiction list is missing, counsel-signed attestation is unrehearsed, or the tabletop has not been exercised in the past 12 months.",
|
|
3557
|
+
"evidence_required": [
|
|
3558
|
+
"sanctions-screening sub-procedure document",
|
|
3559
|
+
"tabletop execution log with decision artefacts",
|
|
3560
|
+
"counsel-signed attestation template"
|
|
3561
|
+
],
|
|
3562
|
+
"verdict_when_failed": "compliance-theater"
|
|
3563
|
+
}
|
|
2522
3564
|
},
|
|
2523
3565
|
"Insurance-Carrier-24h-Notification": {
|
|
2524
3566
|
"framework": "ALL",
|
|
@@ -2537,7 +3579,19 @@
|
|
|
2537
3579
|
"opened_date": "2026-05-15",
|
|
2538
3580
|
"evidence_cves": [],
|
|
2539
3581
|
"atlas_refs": [],
|
|
2540
|
-
"attack_refs": [
|
|
3582
|
+
"attack_refs": [
|
|
3583
|
+
"T1486"
|
|
3584
|
+
],
|
|
3585
|
+
"theater_test": {
|
|
3586
|
+
"claim": "We can meet the 24h cyber insurance carrier notification clock with pre-approval workflow rehearsed.",
|
|
3587
|
+
"test": "Run a tabletop with carrier-notification as an inject. Stopwatch from T0 to (a) loss-notice form submitted via carrier-reachable channel, (b) broker after-hours contact engaged, (c) on-panel IR firm engagement attestation, (d) pre-approval workflow exercised end-to-end. Theater verdict if any sub-step is unrehearsed, the IR firm is off the carrier panel, or the broker after-hours channel is undocumented.",
|
|
3588
|
+
"evidence_required": [
|
|
3589
|
+
"tabletop execution log with stopwatch timestamps",
|
|
3590
|
+
"carrier panel + retained IR firm attestation",
|
|
3591
|
+
"broker after-hours contact + loss-notice form"
|
|
3592
|
+
],
|
|
3593
|
+
"verdict_when_failed": "compliance-theater"
|
|
3594
|
+
}
|
|
2541
3595
|
},
|
|
2542
3596
|
"EU-Sanctions-Reg-2014-833-Cyber": {
|
|
2543
3597
|
"framework": "EU",
|
|
@@ -2555,7 +3609,19 @@
|
|
|
2555
3609
|
"opened_date": "2026-05-15",
|
|
2556
3610
|
"evidence_cves": [],
|
|
2557
3611
|
"atlas_refs": [],
|
|
2558
|
-
"attack_refs": [
|
|
3612
|
+
"attack_refs": [
|
|
3613
|
+
"T1486"
|
|
3614
|
+
],
|
|
3615
|
+
"theater_test": {
|
|
3616
|
+
"claim": "Our incident response includes EU Regulation 2014/833 cyber sanctions screening.",
|
|
3617
|
+
"test": "Confirm IR playbook integrates EU Reg 2014/833 lookup as a precondition to ransomware payment posture, alongside OFAC + UK + AU + JP. Confirm counsel-signature workflow includes EU jurisdiction-specific counsel where the entity has EU exposure. Theater verdict if EU 2014/833 lookup is absent from the IR playbook, or if EU-jurisdiction counsel is not pre-identified.",
|
|
3618
|
+
"evidence_required": [
|
|
3619
|
+
"IR playbook with EU 2014/833 sub-procedure",
|
|
3620
|
+
"EU-jurisdiction counsel pre-identification record",
|
|
3621
|
+
"tabletop execution log covering EU sanctions inject"
|
|
3622
|
+
],
|
|
3623
|
+
"verdict_when_failed": "compliance-theater"
|
|
3624
|
+
}
|
|
2559
3625
|
},
|
|
2560
3626
|
"Immutable-Backup-Recovery": {
|
|
2561
3627
|
"framework": "ALL",
|
|
@@ -2574,7 +3640,19 @@
|
|
|
2574
3640
|
"opened_date": "2026-05-15",
|
|
2575
3641
|
"evidence_cves": [],
|
|
2576
3642
|
"atlas_refs": [],
|
|
2577
|
-
"attack_refs": [
|
|
3643
|
+
"attack_refs": [
|
|
3644
|
+
"T1486"
|
|
3645
|
+
],
|
|
3646
|
+
"theater_test": {
|
|
3647
|
+
"claim": "Our backups are immutable and survive a production-admin-credential adversary.",
|
|
3648
|
+
"test": "Annual exercise: take a copy of a production-admin credential to a test environment with replica immutable backups. Attempt deletion via every API the production admin can invoke. Theater verdict if any deletion succeeds without a separate immutability-admin credential, or if 'immutable' resolves to versioning/write-protect/governance-retention that admin can override. Also confirm storage-side compliance-lock (S3 Object Lock compliance-retention, Azure immutable blob with legal hold, Veeam Hardened Repository) is in use.",
|
|
3649
|
+
"evidence_required": [
|
|
3650
|
+
"immutability adversary-test execution log",
|
|
3651
|
+
"storage-side compliance-lock configuration",
|
|
3652
|
+
"admin-separation policy document"
|
|
3653
|
+
],
|
|
3654
|
+
"verdict_when_failed": "compliance-theater"
|
|
3655
|
+
}
|
|
2578
3656
|
},
|
|
2579
3657
|
"Decryptor-Availability-Pre-Decision": {
|
|
2580
3658
|
"framework": "ALL",
|
|
@@ -2593,7 +3671,19 @@
|
|
|
2593
3671
|
"opened_date": "2026-05-15",
|
|
2594
3672
|
"evidence_cves": [],
|
|
2595
3673
|
"atlas_refs": [],
|
|
2596
|
-
"attack_refs": [
|
|
3674
|
+
"attack_refs": [
|
|
3675
|
+
"T1486"
|
|
3676
|
+
],
|
|
3677
|
+
"theater_test": {
|
|
3678
|
+
"claim": "Our ransomware response checks decryptor availability before any pay/restore decision.",
|
|
3679
|
+
"test": "Run a tabletop. Inject a ransomware family fingerprint (e.g. LockBit 3.0, BlackCat, Akira). Confirm IR playbook executes a curated decryptor catalogue lookup (No More Ransom + Emsisoft + Kaspersky NoMoreCry + Bitdefender + Avast + law-enforcement releases) and records the result with timestamp before the pay/restore decision. Confirm decryptor known-failure-mode review (e.g. ~35% partial-decryption rate per Coveware) is documented as decision input. Theater verdict if catalogue lookup is absent, failure-mode review is missing, or quarterly catalogue refresh is undocumented.",
|
|
3680
|
+
"evidence_required": [
|
|
3681
|
+
"IR playbook decryptor sub-procedure",
|
|
3682
|
+
"tabletop execution log",
|
|
3683
|
+
"quarterly catalogue refresh evidence"
|
|
3684
|
+
],
|
|
3685
|
+
"verdict_when_failed": "compliance-theater"
|
|
3686
|
+
}
|
|
2597
3687
|
},
|
|
2598
3688
|
"PHI-Exfil-Before-Encrypt-Breach-Class": {
|
|
2599
3689
|
"framework": "ALL",
|
|
@@ -2612,6 +3702,19 @@
|
|
|
2612
3702
|
"opened_date": "2026-05-15",
|
|
2613
3703
|
"evidence_cves": [],
|
|
2614
3704
|
"atlas_refs": [],
|
|
2615
|
-
"attack_refs": [
|
|
3705
|
+
"attack_refs": [
|
|
3706
|
+
"T1486",
|
|
3707
|
+
"T1567"
|
|
3708
|
+
],
|
|
3709
|
+
"theater_test": {
|
|
3710
|
+
"claim": "Our HIPAA incident response treats exfil-before-encrypt as a parallel breach class.",
|
|
3711
|
+
"test": "Pull the IR playbook. Confirm exfil-before-encrypt detection (24-72h egress profile preceding encryption event) is integrated. Confirm exfil-scope determination is a parallel obligation independent of encryption-recovery status. Confirm HIPAA 164.402 breach risk assessment auto-triggers on exfil event. Confirm GDPR Art.33/34 + state breach laws + UK GDPR + AU NDB parallel-clock matrix is framework-mandated output. Confirm tabletop exercise injected an exfil-before-encrypt scenario in past 12 months. Theater verdict if any of those is absent.",
|
|
3712
|
+
"evidence_required": [
|
|
3713
|
+
"IR playbook with exfil-before-encrypt sub-procedure",
|
|
3714
|
+
"parallel-clock matrix document",
|
|
3715
|
+
"tabletop execution log within past 12 months"
|
|
3716
|
+
],
|
|
3717
|
+
"verdict_when_failed": "compliance-theater"
|
|
3718
|
+
}
|
|
2616
3719
|
}
|
|
2617
3720
|
}
|