@blamejs/exceptd-skills 0.12.28 → 0.12.30
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/AGENTS.md +1 -1
- package/CHANGELOG.md +53 -0
- package/bin/exceptd.js +30 -20
- package/data/_indexes/_meta.json +9 -9
- package/data/_indexes/activity-feed.json +7 -7
- package/data/_indexes/chains.json +9 -9
- package/data/_indexes/currency.json +43 -43
- package/data/_indexes/stale-content.json +1 -1
- package/data/atlas-ttps.json +61 -111
- package/data/cve-catalog.json +136 -65
- package/data/cwe-catalog.json +151 -95
- package/data/d3fend-catalog.json +201 -54
- package/data/dlp-controls.json +2 -1
- package/data/framework-control-gaps.json +1214 -110
- package/data/playbooks/crypto-codebase.json +1 -1
- package/data/rfc-references.json +23 -67
- package/lib/exit-codes.js +2 -0
- package/lib/playbook-runner.js +25 -1
- package/manifest-snapshot.json +2 -2
- package/manifest-snapshot.sha256 +1 -1
- package/manifest.json +49 -48
- package/package.json +3 -2
- package/sbom.cdx.json +1853 -10
- package/scripts/backfill-theater-test.js +806 -0
- package/scripts/check-test-coverage.js +18 -4
- package/scripts/refresh-reverse-refs.js +171 -0
- package/scripts/refresh-sbom.js +155 -8
package/data/d3fend-catalog.json
CHANGED
|
@@ -28,7 +28,8 @@
|
|
|
28
28
|
"stale_after_days": 180,
|
|
29
29
|
"rebuild_after_days": 365,
|
|
30
30
|
"note": "Per-entry last_verified governs decay. Skills depending on this catalog must check entry freshness before high-stakes use."
|
|
31
|
-
}
|
|
31
|
+
},
|
|
32
|
+
"last_threat_review": "2026-05-15"
|
|
32
33
|
},
|
|
33
34
|
"D3-EAL": {
|
|
34
35
|
"id": "D3-EAL",
|
|
@@ -49,8 +50,13 @@
|
|
|
49
50
|
"Executable Script"
|
|
50
51
|
],
|
|
51
52
|
"skills_referencing": [
|
|
53
|
+
"attack-surface-pentest",
|
|
54
|
+
"defensive-countermeasure-mapping",
|
|
55
|
+
"dlp-gap-analysis",
|
|
56
|
+
"fuzz-testing-strategy",
|
|
52
57
|
"kernel-lpe-triage",
|
|
53
|
-
"mcp-agent-trust"
|
|
58
|
+
"mcp-agent-trust",
|
|
59
|
+
"supply-chain-integrity"
|
|
54
60
|
],
|
|
55
61
|
"implementation_examples": [
|
|
56
62
|
"AppLocker (Windows)",
|
|
@@ -89,8 +95,9 @@
|
|
|
89
95
|
"File Hash"
|
|
90
96
|
],
|
|
91
97
|
"skills_referencing": [
|
|
98
|
+
"defensive-countermeasure-mapping",
|
|
92
99
|
"mcp-agent-trust",
|
|
93
|
-
"
|
|
100
|
+
"supply-chain-integrity"
|
|
94
101
|
],
|
|
95
102
|
"implementation_examples": [
|
|
96
103
|
"WDAC hash rules",
|
|
@@ -124,6 +131,8 @@
|
|
|
124
131
|
"Process Segment"
|
|
125
132
|
],
|
|
126
133
|
"skills_referencing": [
|
|
134
|
+
"defensive-countermeasure-mapping",
|
|
135
|
+
"fuzz-testing-strategy",
|
|
127
136
|
"kernel-lpe-triage"
|
|
128
137
|
],
|
|
129
138
|
"implementation_examples": [
|
|
@@ -156,6 +165,7 @@
|
|
|
156
165
|
"Process Segment"
|
|
157
166
|
],
|
|
158
167
|
"skills_referencing": [
|
|
168
|
+
"defensive-countermeasure-mapping",
|
|
159
169
|
"kernel-lpe-triage"
|
|
160
170
|
],
|
|
161
171
|
"implementation_examples": [
|
|
@@ -188,8 +198,7 @@
|
|
|
188
198
|
"System Call"
|
|
189
199
|
],
|
|
190
200
|
"skills_referencing": [
|
|
191
|
-
"
|
|
192
|
-
"mcp-agent-trust"
|
|
201
|
+
"defensive-countermeasure-mapping"
|
|
193
202
|
],
|
|
194
203
|
"implementation_examples": [
|
|
195
204
|
"seccomp-bpf profiles (Docker default, gVisor)",
|
|
@@ -223,6 +232,7 @@
|
|
|
223
232
|
"Hardware Performance Counter"
|
|
224
233
|
],
|
|
225
234
|
"skills_referencing": [
|
|
235
|
+
"defensive-countermeasure-mapping",
|
|
226
236
|
"kernel-lpe-triage"
|
|
227
237
|
],
|
|
228
238
|
"implementation_examples": [
|
|
@@ -256,8 +266,8 @@
|
|
|
256
266
|
"Message"
|
|
257
267
|
],
|
|
258
268
|
"skills_referencing": [
|
|
259
|
-
"
|
|
260
|
-
"
|
|
269
|
+
"defensive-countermeasure-mapping",
|
|
270
|
+
"pqc-first"
|
|
261
271
|
],
|
|
262
272
|
"implementation_examples": [
|
|
263
273
|
"TLS 1.3 with hybrid X25519MLKEM768 key exchange (RFC 9794-class drafts)",
|
|
@@ -291,6 +301,7 @@
|
|
|
291
301
|
"Encrypted File"
|
|
292
302
|
],
|
|
293
303
|
"skills_referencing": [
|
|
304
|
+
"defensive-countermeasure-mapping",
|
|
294
305
|
"pqc-first"
|
|
295
306
|
],
|
|
296
307
|
"implementation_examples": [
|
|
@@ -326,8 +337,11 @@
|
|
|
326
337
|
"Authentication Service"
|
|
327
338
|
],
|
|
328
339
|
"skills_referencing": [
|
|
340
|
+
"cloud-iam-incident",
|
|
341
|
+
"defensive-countermeasure-mapping",
|
|
342
|
+
"idp-incident-response",
|
|
329
343
|
"mcp-agent-trust",
|
|
330
|
-
"
|
|
344
|
+
"supply-chain-integrity"
|
|
331
345
|
],
|
|
332
346
|
"implementation_examples": [
|
|
333
347
|
"mTLS for service-to-service auth",
|
|
@@ -362,6 +376,9 @@
|
|
|
362
376
|
"Authentication Service"
|
|
363
377
|
],
|
|
364
378
|
"skills_referencing": [
|
|
379
|
+
"cloud-iam-incident",
|
|
380
|
+
"defensive-countermeasure-mapping",
|
|
381
|
+
"idp-incident-response",
|
|
365
382
|
"mcp-agent-trust"
|
|
366
383
|
],
|
|
367
384
|
"implementation_examples": [
|
|
@@ -398,8 +415,8 @@
|
|
|
398
415
|
"Network Traffic"
|
|
399
416
|
],
|
|
400
417
|
"skills_referencing": [
|
|
401
|
-
"
|
|
402
|
-
"
|
|
418
|
+
"ai-c2-detection",
|
|
419
|
+
"defensive-countermeasure-mapping"
|
|
403
420
|
],
|
|
404
421
|
"implementation_examples": [
|
|
405
422
|
"Certificate Transparency log monitoring (Sigsum, CT Watch)",
|
|
@@ -435,8 +452,8 @@
|
|
|
435
452
|
"Network Traffic"
|
|
436
453
|
],
|
|
437
454
|
"skills_referencing": [
|
|
438
|
-
"
|
|
439
|
-
"
|
|
455
|
+
"ai-c2-detection",
|
|
456
|
+
"defensive-countermeasure-mapping"
|
|
440
457
|
],
|
|
441
458
|
"implementation_examples": [
|
|
442
459
|
"Newly Observed Domain (NOD) blocking",
|
|
@@ -471,7 +488,16 @@
|
|
|
471
488
|
"Network Flow"
|
|
472
489
|
],
|
|
473
490
|
"skills_referencing": [
|
|
474
|
-
"ai-
|
|
491
|
+
"ai-attack-surface",
|
|
492
|
+
"ai-c2-detection",
|
|
493
|
+
"attack-surface-pentest",
|
|
494
|
+
"cloud-iam-incident",
|
|
495
|
+
"defensive-countermeasure-mapping",
|
|
496
|
+
"dlp-gap-analysis",
|
|
497
|
+
"idp-incident-response",
|
|
498
|
+
"rag-pipeline-security",
|
|
499
|
+
"ransomware-response",
|
|
500
|
+
"sector-telecom"
|
|
475
501
|
],
|
|
476
502
|
"implementation_examples": [
|
|
477
503
|
"Zeek / Suricata flow analysis",
|
|
@@ -505,7 +531,10 @@
|
|
|
505
531
|
"Network Flow"
|
|
506
532
|
],
|
|
507
533
|
"skills_referencing": [
|
|
508
|
-
"ai-c2-detection"
|
|
534
|
+
"ai-c2-detection",
|
|
535
|
+
"defensive-countermeasure-mapping",
|
|
536
|
+
"dlp-gap-analysis",
|
|
537
|
+
"sector-telecom"
|
|
509
538
|
],
|
|
510
539
|
"implementation_examples": [
|
|
511
540
|
"Service mesh allow-policies (Istio AuthorizationPolicy, Linkerd)",
|
|
@@ -541,7 +570,12 @@
|
|
|
541
570
|
],
|
|
542
571
|
"skills_referencing": [
|
|
543
572
|
"ai-c2-detection",
|
|
544
|
-
"
|
|
573
|
+
"attack-surface-pentest",
|
|
574
|
+
"defensive-countermeasure-mapping",
|
|
575
|
+
"dlp-gap-analysis",
|
|
576
|
+
"mcp-agent-trust",
|
|
577
|
+
"rag-pipeline-security",
|
|
578
|
+
"ransomware-response"
|
|
545
579
|
],
|
|
546
580
|
"implementation_examples": [
|
|
547
581
|
"AI-API request body inspection at egress proxy (CloudFlare AI Gateway, LiteLLM proxy)",
|
|
@@ -577,7 +611,15 @@
|
|
|
577
611
|
],
|
|
578
612
|
"skills_referencing": [
|
|
579
613
|
"ai-attack-surface",
|
|
580
|
-
"
|
|
614
|
+
"ai-c2-detection",
|
|
615
|
+
"cloud-iam-incident",
|
|
616
|
+
"defensive-countermeasure-mapping",
|
|
617
|
+
"dlp-gap-analysis",
|
|
618
|
+
"fuzz-testing-strategy",
|
|
619
|
+
"idp-incident-response",
|
|
620
|
+
"rag-pipeline-security",
|
|
621
|
+
"ransomware-response",
|
|
622
|
+
"sector-telecom"
|
|
581
623
|
],
|
|
582
624
|
"implementation_examples": [
|
|
583
625
|
"LLM output classifier for safety-bypass content (Llama Guard, Granite Guardian)",
|
|
@@ -611,7 +653,8 @@
|
|
|
611
653
|
"Process Tree"
|
|
612
654
|
],
|
|
613
655
|
"skills_referencing": [
|
|
614
|
-
"
|
|
656
|
+
"defensive-countermeasure-mapping",
|
|
657
|
+
"ransomware-response"
|
|
615
658
|
],
|
|
616
659
|
"implementation_examples": [
|
|
617
660
|
"EDR with process-network correlation (CrowdStrike, SentinelOne, Defender for Endpoint)",
|
|
@@ -645,8 +688,7 @@
|
|
|
645
688
|
"File Access"
|
|
646
689
|
],
|
|
647
690
|
"skills_referencing": [
|
|
648
|
-
"
|
|
649
|
-
"mcp-agent-trust"
|
|
691
|
+
"defensive-countermeasure-mapping"
|
|
650
692
|
],
|
|
651
693
|
"implementation_examples": [
|
|
652
694
|
"auditd FIM with behavioral rules",
|
|
@@ -681,7 +723,8 @@
|
|
|
681
723
|
],
|
|
682
724
|
"skills_referencing": [
|
|
683
725
|
"ai-c2-detection",
|
|
684
|
-
"
|
|
726
|
+
"defensive-countermeasure-mapping",
|
|
727
|
+
"sector-telecom"
|
|
685
728
|
],
|
|
686
729
|
"implementation_examples": [
|
|
687
730
|
"VPC egress allowlists with no default internet route",
|
|
@@ -717,8 +760,7 @@
|
|
|
717
760
|
"Process Tree"
|
|
718
761
|
],
|
|
719
762
|
"skills_referencing": [
|
|
720
|
-
"
|
|
721
|
-
"mcp-agent-trust"
|
|
763
|
+
"defensive-countermeasure-mapping"
|
|
722
764
|
],
|
|
723
765
|
"implementation_examples": [
|
|
724
766
|
"Sysmon process-creation events with parent-child Sigma rules",
|
|
@@ -741,16 +783,30 @@
|
|
|
741
783
|
"tactic": "Evict",
|
|
742
784
|
"subtactic": "Credential Eviction",
|
|
743
785
|
"description": "Forcibly invalidating cached or active authentication artifacts (tokens, session IDs, cached Kerberos tickets, browser SSO cookies) so that a compromised credential cannot be reused after detection. Distinct from credential rotation in that it acts on the live session state, not just the stored material.",
|
|
744
|
-
"counters_attack_techniques": [
|
|
745
|
-
|
|
746
|
-
|
|
786
|
+
"counters_attack_techniques": [
|
|
787
|
+
"T1078",
|
|
788
|
+
"T1550",
|
|
789
|
+
"T1539",
|
|
790
|
+
"AML.T0055"
|
|
791
|
+
],
|
|
792
|
+
"digital_artifacts_addressed": [
|
|
793
|
+
"Authentication Session",
|
|
794
|
+
"Access Token",
|
|
795
|
+
"Browser Session",
|
|
796
|
+
"Kerberos Ticket"
|
|
797
|
+
],
|
|
798
|
+
"skills_referencing": [],
|
|
747
799
|
"implementation_examples": [
|
|
748
800
|
"OAuth refresh-token revocation on detected credential compromise",
|
|
749
801
|
"klist purge + ticket-granting-service revocation on suspicious Kerberos use",
|
|
750
802
|
"Browser-side single-sign-on cookie invalidation pushed via IDP signal",
|
|
751
803
|
"Service-account JWT issuer kid-rotation followed by global verifier refresh"
|
|
752
804
|
],
|
|
753
|
-
"framework_controls_partially_mapped": [
|
|
805
|
+
"framework_controls_partially_mapped": [
|
|
806
|
+
"NIST-800-53-IA-5(1)",
|
|
807
|
+
"NIST-800-53-AC-12",
|
|
808
|
+
"ISO-27001-2022-A.5.18"
|
|
809
|
+
],
|
|
754
810
|
"ai_pipeline_applicability": "Applies to AI assistant identities (MCP server tokens, model-provider API keys). For ephemeral AI agents the cache invalidation is per-invocation; for long-lived AI sessions (assistant subscriptions), provider must expose a revoke API the operator can call.",
|
|
755
811
|
"lag_notes": "AC-12 (session termination) speaks to user sessions; service-to-service token invalidation under credential compromise is rarely audited. Operationalization gap: most orgs lack the integration to actively invalidate on detection.",
|
|
756
812
|
"last_verified": "2026-05-13"
|
|
@@ -761,16 +817,30 @@
|
|
|
761
817
|
"tactic": "Detect",
|
|
762
818
|
"subtactic": "Credential Activity Analysis",
|
|
763
819
|
"description": "Recording and analyzing every access to credential stores (cloud secret managers, password vaults, KMS, environment-variable reads on privileged processes) to detect anomalous read patterns indicating credential theft or misuse.",
|
|
764
|
-
"counters_attack_techniques": [
|
|
765
|
-
|
|
766
|
-
|
|
820
|
+
"counters_attack_techniques": [
|
|
821
|
+
"T1555",
|
|
822
|
+
"T1552",
|
|
823
|
+
"T1078",
|
|
824
|
+
"AML.T0055"
|
|
825
|
+
],
|
|
826
|
+
"digital_artifacts_addressed": [
|
|
827
|
+
"Credential Store Access Log",
|
|
828
|
+
"Process Environment Variable Access"
|
|
829
|
+
],
|
|
830
|
+
"skills_referencing": [
|
|
831
|
+
"cloud-iam-incident"
|
|
832
|
+
],
|
|
767
833
|
"implementation_examples": [
|
|
768
834
|
"AWS Secrets Manager + CloudTrail GetSecretValue audit with anomaly baseline per principal",
|
|
769
835
|
"HashiCorp Vault audit log forwarded to SIEM with per-policy read-rate alerting",
|
|
770
836
|
"Linux audit on /proc/<pid>/environ reads outside the owning process",
|
|
771
837
|
"GitHub Actions secret-access audit + repository-event correlation"
|
|
772
838
|
],
|
|
773
|
-
"framework_controls_partially_mapped": [
|
|
839
|
+
"framework_controls_partially_mapped": [
|
|
840
|
+
"NIST-800-53-AU-2",
|
|
841
|
+
"NIST-800-53-AU-12",
|
|
842
|
+
"ISO-27001-2022-A.8.15"
|
|
843
|
+
],
|
|
774
844
|
"ai_pipeline_applicability": "Applies wherever AI agents fetch credentials at runtime (MCP server bootstrap, fine-tuning job startup). Serverless equivalent: cloud-provider native secret-fetch audit (Secrets Manager VPC endpoint logs, GCP Secret Manager IAM audit logs).",
|
|
775
845
|
"lag_notes": "AU-2 prescribes audit event categories; framework controls do not require per-secret access baselining. Compliance audits accept 'logging is enabled' without requiring detection rules on read anomalies.",
|
|
776
846
|
"last_verified": "2026-05-13"
|
|
@@ -781,16 +851,29 @@
|
|
|
781
851
|
"tactic": "Harden",
|
|
782
852
|
"subtactic": "Credential Hardening",
|
|
783
853
|
"description": "Increasing the cryptographic and operational strength of credentials at rest and in transit — memory-hard password hashing, hardware-backed key storage, short credential lifetime, mandatory MFA on high-impact identities.",
|
|
784
|
-
"counters_attack_techniques": [
|
|
785
|
-
|
|
786
|
-
|
|
854
|
+
"counters_attack_techniques": [
|
|
855
|
+
"T1110",
|
|
856
|
+
"T1555",
|
|
857
|
+
"T1552"
|
|
858
|
+
],
|
|
859
|
+
"digital_artifacts_addressed": [
|
|
860
|
+
"Password Hash",
|
|
861
|
+
"Private Key",
|
|
862
|
+
"API Token",
|
|
863
|
+
"Session Token"
|
|
864
|
+
],
|
|
865
|
+
"skills_referencing": [],
|
|
787
866
|
"implementation_examples": [
|
|
788
867
|
"Argon2id password hashing with tuned m/t/p",
|
|
789
868
|
"TPM/HSM-backed private keys (Windows Hello for Business, Apple Secure Enclave, AWS CloudHSM)",
|
|
790
869
|
"Short-lived OIDC tokens with mandatory refresh-token rotation",
|
|
791
870
|
"WebAuthn/passkey adoption replacing password authentication"
|
|
792
871
|
],
|
|
793
|
-
"framework_controls_partially_mapped": [
|
|
872
|
+
"framework_controls_partially_mapped": [
|
|
873
|
+
"NIST-800-53-IA-5",
|
|
874
|
+
"NIST-800-53-SC-12",
|
|
875
|
+
"NIST-SP-800-63B"
|
|
876
|
+
],
|
|
794
877
|
"ai_pipeline_applicability": "Applies to credentials issued to AI agents — model-provider keys should be short-lived and rotated; MCP server tokens should use mTLS or signed JWTs rather than long-lived bearer secrets.",
|
|
795
878
|
"lag_notes": "IA-5 covers authenticator strength categorically; framework audit rarely samples the actual KDF in use. SP 800-63B's 2022 iteration-count update (PBKDF2 ≥ 600,000) lags in many compliance attestations citing the 2017 numbers.",
|
|
796
879
|
"last_verified": "2026-05-13"
|
|
@@ -801,9 +884,19 @@
|
|
|
801
884
|
"tactic": "Isolate",
|
|
802
885
|
"subtactic": "Execution Isolation",
|
|
803
886
|
"description": "Constraining a process so that even successful exploitation cannot reach resources outside the isolation boundary — containers with read-only rootfs, sandboxed renderers, seccomp-restricted syscall sets, namespace-isolated workers, gVisor / Firecracker microVMs.",
|
|
804
|
-
"counters_attack_techniques": [
|
|
805
|
-
|
|
806
|
-
|
|
887
|
+
"counters_attack_techniques": [
|
|
888
|
+
"T1611",
|
|
889
|
+
"T1068",
|
|
890
|
+
"T1055",
|
|
891
|
+
"T1106"
|
|
892
|
+
],
|
|
893
|
+
"digital_artifacts_addressed": [
|
|
894
|
+
"Process",
|
|
895
|
+
"Container",
|
|
896
|
+
"Sandbox",
|
|
897
|
+
"Namespace"
|
|
898
|
+
],
|
|
899
|
+
"skills_referencing": [],
|
|
807
900
|
"implementation_examples": [
|
|
808
901
|
"Read-only container rootfs + tmpfs for ephemeral state",
|
|
809
902
|
"seccomp-bpf default-deny syscall profiles per workload",
|
|
@@ -811,7 +904,11 @@
|
|
|
811
904
|
"Firecracker microVMs for multi-tenant SaaS execution",
|
|
812
905
|
"Linux user namespaces dropping CAP_SYS_ADMIN at process start"
|
|
813
906
|
],
|
|
814
|
-
"framework_controls_partially_mapped": [
|
|
907
|
+
"framework_controls_partially_mapped": [
|
|
908
|
+
"NIST-800-53-SC-39",
|
|
909
|
+
"NIST-800-53-AC-4",
|
|
910
|
+
"ISO-27001-2022-A.8.22"
|
|
911
|
+
],
|
|
815
912
|
"ai_pipeline_applicability": "Critical for AI agent execution: untrusted-code-execution tools (interpreter, code-runner MCP servers) must run in a microVM or gVisor sandbox, not in the host AI's process. Serverless platforms provide this implicitly (Lambda firecracker, Cloud Run gVisor).",
|
|
816
913
|
"lag_notes": "SC-39 covers process isolation conceptually; framework controls do not specify required isolation primitives. 'Containers' alone do not satisfy isolation without read-only rootfs + seccomp + capability dropping — controls rarely audit which container hardening is actually enforced.",
|
|
817
914
|
"last_verified": "2026-05-13"
|
|
@@ -822,16 +919,29 @@
|
|
|
822
919
|
"tactic": "Detect",
|
|
823
920
|
"subtactic": "File Analysis",
|
|
824
921
|
"description": "Inspecting file contents against rule sets (YARA, Sigma, custom regex, ML classifier) to detect malicious patterns, embedded secrets, or unauthorized content classes at rest or at egress.",
|
|
825
|
-
"counters_attack_techniques": [
|
|
826
|
-
|
|
827
|
-
|
|
922
|
+
"counters_attack_techniques": [
|
|
923
|
+
"T1552.001",
|
|
924
|
+
"T1552.004",
|
|
925
|
+
"T1567",
|
|
926
|
+
"AML.T0055"
|
|
927
|
+
],
|
|
928
|
+
"digital_artifacts_addressed": [
|
|
929
|
+
"File Content",
|
|
930
|
+
"Source Code",
|
|
931
|
+
"Configuration File"
|
|
932
|
+
],
|
|
933
|
+
"skills_referencing": [],
|
|
828
934
|
"implementation_examples": [
|
|
829
935
|
"gitleaks / trufflehog pre-commit and CI-time secret scanning",
|
|
830
936
|
"YARA rules on uploaded files at SaaS file-upload boundaries",
|
|
831
937
|
"DLP content-classification on outbound email + cloud-storage uploads",
|
|
832
938
|
"AI prompt-content classification before egress to public LLM endpoints"
|
|
833
939
|
],
|
|
834
|
-
"framework_controls_partially_mapped": [
|
|
940
|
+
"framework_controls_partially_mapped": [
|
|
941
|
+
"NIST-800-53-SI-3",
|
|
942
|
+
"NIST-800-53-SI-4",
|
|
943
|
+
"ISO-27001-2022-A.8.12"
|
|
944
|
+
],
|
|
835
945
|
"ai_pipeline_applicability": "Critical for AI exfil prevention: prompt content rules block sending sensitive data to public AI endpoints; retrieval-corpus content rules block injection of attacker-controlled documents. For RAG: per-document content classification at ingest.",
|
|
836
946
|
"lag_notes": "SI-3 / SI-4 cover monitoring categorically; rule-set freshness and tuning are operational concerns rarely audited. DLP frameworks lag in covering AI prompts as an egress channel.",
|
|
837
947
|
"last_verified": "2026-05-13"
|
|
@@ -842,9 +952,18 @@
|
|
|
842
952
|
"tactic": "Isolate",
|
|
843
953
|
"subtactic": "Execution Isolation",
|
|
844
954
|
"description": "Using kernel primitives (namespaces, cgroups, seccomp, capabilities, LSMs, eBPF) to enforce isolation boundaries between processes that share the same kernel. Distinct from D3-EI in that the isolation is enforced inside a shared kernel rather than across a hypervisor or microVM boundary.",
|
|
845
|
-
"counters_attack_techniques": [
|
|
846
|
-
|
|
847
|
-
|
|
955
|
+
"counters_attack_techniques": [
|
|
956
|
+
"T1055",
|
|
957
|
+
"T1068",
|
|
958
|
+
"T1611"
|
|
959
|
+
],
|
|
960
|
+
"digital_artifacts_addressed": [
|
|
961
|
+
"Process",
|
|
962
|
+
"Namespace",
|
|
963
|
+
"cgroup",
|
|
964
|
+
"LSM Profile"
|
|
965
|
+
],
|
|
966
|
+
"skills_referencing": [],
|
|
848
967
|
"implementation_examples": [
|
|
849
968
|
"SELinux / AppArmor confinement profiles per workload",
|
|
850
969
|
"Linux user namespaces + capability dropping (CAP_SYS_ADMIN removed)",
|
|
@@ -852,7 +971,10 @@
|
|
|
852
971
|
"eBPF LSM hooks for fine-grained policy enforcement",
|
|
853
972
|
"systemd hardening directives (ProtectSystem=strict, RestrictSUIDSGID, NoNewPrivileges)"
|
|
854
973
|
],
|
|
855
|
-
"framework_controls_partially_mapped": [
|
|
974
|
+
"framework_controls_partially_mapped": [
|
|
975
|
+
"NIST-800-53-SC-39",
|
|
976
|
+
"NIST-800-53-AC-6"
|
|
977
|
+
],
|
|
856
978
|
"ai_pipeline_applicability": "Less applicable on managed serverless (no kernel-tuning surface). Critical on self-managed hosts running MCP servers, AI build agents, training pipelines. Containerized AI runtimes still rely on kernel isolation primitives — a kernel LPE escapes the container.",
|
|
857
979
|
"lag_notes": "SC-39 process isolation is named but not parameterized; framework controls accept 'containers are used' as evidence without auditing the kernel-level confinement layer. KASLR + SMEP + SMAP + KPTI presence is implicit not explicit in any framework control.",
|
|
858
980
|
"last_verified": "2026-05-13"
|
|
@@ -863,16 +985,28 @@
|
|
|
863
985
|
"tactic": "Detect",
|
|
864
986
|
"subtactic": "Process Analysis",
|
|
865
987
|
"description": "Recording and analyzing system calls made by processes to detect malicious behavior — unusual syscall patterns, attempts to disable security mechanisms, kernel exploitation primitives (e.g. unshare(2), ptrace(2) on unrelated PIDs, bpf(2) on unprivileged contexts).",
|
|
866
|
-
"counters_attack_techniques": [
|
|
867
|
-
|
|
868
|
-
|
|
988
|
+
"counters_attack_techniques": [
|
|
989
|
+
"T1055",
|
|
990
|
+
"T1068",
|
|
991
|
+
"T1562",
|
|
992
|
+
"T1106"
|
|
993
|
+
],
|
|
994
|
+
"digital_artifacts_addressed": [
|
|
995
|
+
"System Call",
|
|
996
|
+
"Process Behavior"
|
|
997
|
+
],
|
|
998
|
+
"skills_referencing": [],
|
|
869
999
|
"implementation_examples": [
|
|
870
1000
|
"Linux auditd with syscall rules (ausearch -k privesc)",
|
|
871
1001
|
"Falco runtime rules on suspicious syscall sequences",
|
|
872
1002
|
"eBPF-based tools (tetragon, tracee) for kernel-level visibility",
|
|
873
1003
|
"Sysdig / inspector for container-syscall-anomaly detection"
|
|
874
1004
|
],
|
|
875
|
-
"framework_controls_partially_mapped": [
|
|
1005
|
+
"framework_controls_partially_mapped": [
|
|
1006
|
+
"NIST-800-53-SI-4",
|
|
1007
|
+
"NIST-800-53-AU-2",
|
|
1008
|
+
"ISO-27001-2022-A.8.16"
|
|
1009
|
+
],
|
|
876
1010
|
"ai_pipeline_applicability": "Self-managed AI hosts: standard syscall monitoring applies. Serverless: equivalent is provider-side runtime telemetry (Lambda runtime API, GVisor sentry events). MCP server hosts especially: malicious MCP plugins often hit suspicious syscalls (ptrace, bpf, unshare).",
|
|
877
1011
|
"lag_notes": "SI-4 prescribes monitoring at the system level abstractly; specific syscall analytics (which calls, which thresholds, which response) are deployment-team choices that framework audits do not sample.",
|
|
878
1012
|
"last_verified": "2026-05-13"
|
|
@@ -883,16 +1017,29 @@
|
|
|
883
1017
|
"tactic": "Detect",
|
|
884
1018
|
"subtactic": "File Analysis",
|
|
885
1019
|
"description": "Monitoring critical system files (auth databases, audit configurations, init scripts, boot loaders, sudoers, SSH authorized_keys) for unauthorized modification — file integrity monitoring with cryptographic baselines and immutable-write enforcement.",
|
|
886
|
-
"counters_attack_techniques": [
|
|
887
|
-
|
|
888
|
-
|
|
1020
|
+
"counters_attack_techniques": [
|
|
1021
|
+
"T1543",
|
|
1022
|
+
"T1547",
|
|
1023
|
+
"T1098",
|
|
1024
|
+
"T1562.001"
|
|
1025
|
+
],
|
|
1026
|
+
"digital_artifacts_addressed": [
|
|
1027
|
+
"System File",
|
|
1028
|
+
"Configuration File",
|
|
1029
|
+
"File Hash"
|
|
1030
|
+
],
|
|
1031
|
+
"skills_referencing": [],
|
|
889
1032
|
"implementation_examples": [
|
|
890
1033
|
"AIDE / Tripwire / OSSEC file-integrity baselines on /etc, /usr/bin, /sbin",
|
|
891
1034
|
"Auditd watch rules on /etc/passwd, /etc/shadow, /etc/sudoers, ~/.ssh/authorized_keys",
|
|
892
1035
|
"Linux IMA-EVM measured boot extending into runtime FIM",
|
|
893
1036
|
"AWS Config rules monitoring IAM policy file analogs (managed-policy versions)"
|
|
894
1037
|
],
|
|
895
|
-
"framework_controls_partially_mapped": [
|
|
1038
|
+
"framework_controls_partially_mapped": [
|
|
1039
|
+
"NIST-800-53-SI-7",
|
|
1040
|
+
"NIST-800-53-AU-2",
|
|
1041
|
+
"ISO-27001-2022-A.8.13"
|
|
1042
|
+
],
|
|
896
1043
|
"ai_pipeline_applicability": "Self-managed AI hosts: standard FIM applies to MCP server configs, ~/.claude, ~/.cursor settings. Serverless: equivalent is image-immutability + read-only rootfs (modifications outside writable tmpfs are structurally impossible).",
|
|
897
1044
|
"lag_notes": "SI-7 covers software/firmware integrity; user-space configuration FIM is implicit not explicit. Framework audits accept 'FIM is deployed' without sampling whether the rule set covers AI-assistant config paths that have become high-value targets.",
|
|
898
1045
|
"last_verified": "2026-05-13"
|
package/data/dlp-controls.json
CHANGED
|
@@ -15,7 +15,8 @@
|
|
|
15
15
|
"stale_after_days": 180,
|
|
16
16
|
"rebuild_after_days": 365,
|
|
17
17
|
"note": "Per-entry last_verified governs decay. Skills depending on this catalog must check entry freshness before high-stakes use."
|
|
18
|
-
}
|
|
18
|
+
},
|
|
19
|
+
"last_threat_review": "2026-05-15"
|
|
19
20
|
},
|
|
20
21
|
"DLP-CHAN-EMAIL-OUT": {
|
|
21
22
|
"id": "DLP-CHAN-EMAIL-OUT",
|