@blamejs/exceptd-skills 0.9.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/AGENTS.md +232 -0
- package/ARCHITECTURE.md +267 -0
- package/CHANGELOG.md +616 -0
- package/CONTEXT.md +203 -0
- package/LICENSE +200 -0
- package/NOTICE +82 -0
- package/README.md +307 -0
- package/SECURITY.md +73 -0
- package/agents/README.md +81 -0
- package/agents/report-generator.md +156 -0
- package/agents/skill-updater.md +102 -0
- package/agents/source-validator.md +119 -0
- package/agents/threat-researcher.md +149 -0
- package/bin/exceptd.js +183 -0
- package/data/_indexes/_meta.json +88 -0
- package/data/_indexes/activity-feed.json +362 -0
- package/data/_indexes/catalog-summaries.json +229 -0
- package/data/_indexes/chains.json +7135 -0
- package/data/_indexes/currency.json +359 -0
- package/data/_indexes/did-ladders.json +451 -0
- package/data/_indexes/frequency.json +2072 -0
- package/data/_indexes/handoff-dag.json +476 -0
- package/data/_indexes/jurisdiction-clocks.json +967 -0
- package/data/_indexes/jurisdiction-map.json +536 -0
- package/data/_indexes/recipes.json +319 -0
- package/data/_indexes/section-offsets.json +3656 -0
- package/data/_indexes/stale-content.json +14 -0
- package/data/_indexes/summary-cards.json +1736 -0
- package/data/_indexes/theater-fingerprints.json +381 -0
- package/data/_indexes/token-budget.json +2137 -0
- package/data/_indexes/trigger-table.json +1374 -0
- package/data/_indexes/xref.json +818 -0
- package/data/atlas-ttps.json +282 -0
- package/data/cve-catalog.json +496 -0
- package/data/cwe-catalog.json +1017 -0
- package/data/d3fend-catalog.json +738 -0
- package/data/dlp-controls.json +1039 -0
- package/data/exploit-availability.json +67 -0
- package/data/framework-control-gaps.json +1255 -0
- package/data/global-frameworks.json +2913 -0
- package/data/rfc-references.json +324 -0
- package/data/zeroday-lessons.json +377 -0
- package/keys/public.pem +3 -0
- package/lib/framework-gap.js +328 -0
- package/lib/job-queue.js +195 -0
- package/lib/lint-skills.js +536 -0
- package/lib/prefetch.js +372 -0
- package/lib/refresh-external.js +713 -0
- package/lib/schemas/cve-catalog.schema.json +151 -0
- package/lib/schemas/manifest.schema.json +106 -0
- package/lib/schemas/skill-frontmatter.schema.json +113 -0
- package/lib/scoring.js +149 -0
- package/lib/sign.js +197 -0
- package/lib/ttp-mapper.js +80 -0
- package/lib/validate-catalog-meta.js +198 -0
- package/lib/validate-cve-catalog.js +213 -0
- package/lib/validate-indexes.js +83 -0
- package/lib/validate-package.js +162 -0
- package/lib/validate-vendor.js +85 -0
- package/lib/verify.js +216 -0
- package/lib/worker-pool.js +84 -0
- package/manifest-snapshot.json +1833 -0
- package/manifest.json +2108 -0
- package/orchestrator/README.md +124 -0
- package/orchestrator/dispatcher.js +140 -0
- package/orchestrator/event-bus.js +146 -0
- package/orchestrator/index.js +874 -0
- package/orchestrator/pipeline.js +201 -0
- package/orchestrator/scanner.js +327 -0
- package/orchestrator/scheduler.js +137 -0
- package/package.json +113 -0
- package/sbom.cdx.json +158 -0
- package/scripts/audit-cross-skill.js +261 -0
- package/scripts/audit-perf.js +160 -0
- package/scripts/bootstrap.js +205 -0
- package/scripts/build-indexes.js +721 -0
- package/scripts/builders/activity-feed.js +79 -0
- package/scripts/builders/catalog-summaries.js +67 -0
- package/scripts/builders/currency.js +109 -0
- package/scripts/builders/cwe-chains.js +105 -0
- package/scripts/builders/did-ladders.js +149 -0
- package/scripts/builders/frequency.js +89 -0
- package/scripts/builders/jurisdiction-clocks.js +126 -0
- package/scripts/builders/recipes.js +159 -0
- package/scripts/builders/section-offsets.js +162 -0
- package/scripts/builders/stale-content.js +171 -0
- package/scripts/builders/summary-cards.js +166 -0
- package/scripts/builders/theater-fingerprints.js +198 -0
- package/scripts/builders/token-budget.js +96 -0
- package/scripts/check-manifest-snapshot.js +217 -0
- package/scripts/predeploy.js +267 -0
- package/scripts/refresh-manifest-snapshot.js +57 -0
- package/scripts/refresh-sbom.js +222 -0
- package/skills/age-gates-child-safety/skill.md +456 -0
- package/skills/ai-attack-surface/skill.md +282 -0
- package/skills/ai-c2-detection/skill.md +440 -0
- package/skills/ai-risk-management/skill.md +311 -0
- package/skills/api-security/skill.md +287 -0
- package/skills/attack-surface-pentest/skill.md +381 -0
- package/skills/cloud-security/skill.md +384 -0
- package/skills/compliance-theater/skill.md +365 -0
- package/skills/container-runtime-security/skill.md +379 -0
- package/skills/coordinated-vuln-disclosure/skill.md +473 -0
- package/skills/defensive-countermeasure-mapping/skill.md +300 -0
- package/skills/dlp-gap-analysis/skill.md +337 -0
- package/skills/email-security-anti-phishing/skill.md +206 -0
- package/skills/exploit-scoring/skill.md +331 -0
- package/skills/framework-gap-analysis/skill.md +374 -0
- package/skills/fuzz-testing-strategy/skill.md +313 -0
- package/skills/global-grc/skill.md +564 -0
- package/skills/identity-assurance/skill.md +272 -0
- package/skills/incident-response-playbook/skill.md +546 -0
- package/skills/kernel-lpe-triage/skill.md +303 -0
- package/skills/mcp-agent-trust/skill.md +326 -0
- package/skills/mlops-security/skill.md +325 -0
- package/skills/ot-ics-security/skill.md +340 -0
- package/skills/policy-exception-gen/skill.md +437 -0
- package/skills/pqc-first/skill.md +546 -0
- package/skills/rag-pipeline-security/skill.md +294 -0
- package/skills/researcher/skill.md +310 -0
- package/skills/sector-energy/skill.md +409 -0
- package/skills/sector-federal-government/skill.md +302 -0
- package/skills/sector-financial/skill.md +398 -0
- package/skills/sector-healthcare/skill.md +373 -0
- package/skills/security-maturity-tiers/skill.md +464 -0
- package/skills/skill-update-loop/skill.md +463 -0
- package/skills/supply-chain-integrity/skill.md +318 -0
- package/skills/threat-model-currency/skill.md +404 -0
- package/skills/threat-modeling-methodology/skill.md +312 -0
- package/skills/webapp-security/skill.md +281 -0
- package/skills/zeroday-gap-learn/skill.md +350 -0
- package/vendor/blamejs/LICENSE +201 -0
- package/vendor/blamejs/README.md +54 -0
- package/vendor/blamejs/_PROVENANCE.json +54 -0
- package/vendor/blamejs/retry.js +335 -0
- package/vendor/blamejs/worker-pool.js +418 -0
|
@@ -0,0 +1,967 @@
|
|
|
1
|
+
{
|
|
2
|
+
"_meta": {
|
|
3
|
+
"schema_version": "1.0.0",
|
|
4
|
+
"note": "Normalized obligation matrix derived from data/global-frameworks.json. All times in hours. breach_notification.hours is null for jurisdictions that require notification only on a discretionary trigger.",
|
|
5
|
+
"jurisdiction_count": 29
|
|
6
|
+
},
|
|
7
|
+
"by_jurisdiction": {
|
|
8
|
+
"EU": {
|
|
9
|
+
"jurisdiction_name": "European Union",
|
|
10
|
+
"frameworks": {
|
|
11
|
+
"GDPR": {
|
|
12
|
+
"breach_notification": {
|
|
13
|
+
"hours": 72,
|
|
14
|
+
"trigger": "Personal data breach affecting data subject rights",
|
|
15
|
+
"stages": null,
|
|
16
|
+
"source": "https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32016R0679",
|
|
17
|
+
"authority": "European Data Protection Board (EDPB)"
|
|
18
|
+
},
|
|
19
|
+
"authority": "European Data Protection Board (EDPB)"
|
|
20
|
+
},
|
|
21
|
+
"NIS2": {
|
|
22
|
+
"breach_notification": {
|
|
23
|
+
"hours": 24,
|
|
24
|
+
"trigger": "Significant incident (substantial impact on service provision)",
|
|
25
|
+
"stages": {
|
|
26
|
+
"early_warning": "24h — initial notification to NCA",
|
|
27
|
+
"incident_notification": "72h — significant incident report",
|
|
28
|
+
"final_report": "P+30 days — full post-incident report"
|
|
29
|
+
},
|
|
30
|
+
"source": "https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32022L2555",
|
|
31
|
+
"authority": "ENISA + Member State NCAs"
|
|
32
|
+
},
|
|
33
|
+
"authority": "ENISA + Member State NCAs"
|
|
34
|
+
},
|
|
35
|
+
"DORA": {
|
|
36
|
+
"breach_notification": {
|
|
37
|
+
"hours": 4,
|
|
38
|
+
"trigger": "Major ICT-related incident (RTO/RPO breach, high financial impact, reputational damage)",
|
|
39
|
+
"stages": null,
|
|
40
|
+
"source": "https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32022R2554",
|
|
41
|
+
"authority": "ESAs (EBA, EIOPA, ESMA)"
|
|
42
|
+
},
|
|
43
|
+
"authority": "ESAs (EBA, EIOPA, ESMA)"
|
|
44
|
+
},
|
|
45
|
+
"EU_CRA": {
|
|
46
|
+
"breach_notification": {
|
|
47
|
+
"hours": 24,
|
|
48
|
+
"trigger": "Actively exploited vulnerability discovered in the product",
|
|
49
|
+
"stages": null,
|
|
50
|
+
"source": "https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32024R2847",
|
|
51
|
+
"authority": "ENISA + National Market Surveillance Authorities"
|
|
52
|
+
},
|
|
53
|
+
"authority": "ENISA + National Market Surveillance Authorities"
|
|
54
|
+
}
|
|
55
|
+
},
|
|
56
|
+
"fastest_breach_notification": {
|
|
57
|
+
"hours": 4,
|
|
58
|
+
"framework": "DORA"
|
|
59
|
+
},
|
|
60
|
+
"fastest_patch_sla": null
|
|
61
|
+
},
|
|
62
|
+
"UK": {
|
|
63
|
+
"jurisdiction_name": "United Kingdom",
|
|
64
|
+
"frameworks": {
|
|
65
|
+
"CYBER_ESSENTIALS": {
|
|
66
|
+
"patch_sla": {
|
|
67
|
+
"hours": 336,
|
|
68
|
+
"note": "14 days for critical patches (internet-facing). Better than NIST 30-day, worse than ASD 48h.",
|
|
69
|
+
"source": "https://www.ncsc.gov.uk/cyberessentials/overview",
|
|
70
|
+
"authority": "NCSC"
|
|
71
|
+
},
|
|
72
|
+
"authority": "NCSC"
|
|
73
|
+
}
|
|
74
|
+
},
|
|
75
|
+
"fastest_breach_notification": null,
|
|
76
|
+
"fastest_patch_sla": {
|
|
77
|
+
"hours": 336,
|
|
78
|
+
"framework": "CYBER_ESSENTIALS"
|
|
79
|
+
}
|
|
80
|
+
},
|
|
81
|
+
"AU": {
|
|
82
|
+
"jurisdiction_name": "Australia",
|
|
83
|
+
"frameworks": {
|
|
84
|
+
"ASD_ISM": {
|
|
85
|
+
"patch_sla": {
|
|
86
|
+
"hours": 48,
|
|
87
|
+
"note": "ISM-1623: 48h for critical with existing exploit. Best non-CISA-aware SLA of any major framework.",
|
|
88
|
+
"source": "https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/ism",
|
|
89
|
+
"authority": "Australian Signals Directorate (ASD)"
|
|
90
|
+
},
|
|
91
|
+
"authority": "Australian Signals Directorate (ASD)"
|
|
92
|
+
},
|
|
93
|
+
"ESSENTIAL_8": {
|
|
94
|
+
"patch_sla": {
|
|
95
|
+
"hours": 48,
|
|
96
|
+
"note": "Maturity Level 3 — 48h for extreme risk. ML1 = 1 month, ML2 = 2 weeks, ML3 = 48h.",
|
|
97
|
+
"source": "https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight",
|
|
98
|
+
"authority": "Australian Signals Directorate (ASD)"
|
|
99
|
+
},
|
|
100
|
+
"authority": "Australian Signals Directorate (ASD)"
|
|
101
|
+
},
|
|
102
|
+
"APRA_CPS234": {
|
|
103
|
+
"breach_notification": {
|
|
104
|
+
"hours": 72,
|
|
105
|
+
"trigger": "Material information security incident",
|
|
106
|
+
"stages": null,
|
|
107
|
+
"source": "https://www.apra.gov.au/sites/default/files/cps_234_july_2019_for_public_release.pdf",
|
|
108
|
+
"authority": "Australian Prudential Regulation Authority (APRA)"
|
|
109
|
+
},
|
|
110
|
+
"authority": "Australian Prudential Regulation Authority (APRA)"
|
|
111
|
+
}
|
|
112
|
+
},
|
|
113
|
+
"fastest_breach_notification": {
|
|
114
|
+
"hours": 72,
|
|
115
|
+
"framework": "APRA_CPS234"
|
|
116
|
+
},
|
|
117
|
+
"fastest_patch_sla": {
|
|
118
|
+
"hours": 48,
|
|
119
|
+
"framework": "ASD_ISM"
|
|
120
|
+
}
|
|
121
|
+
},
|
|
122
|
+
"SG": {
|
|
123
|
+
"jurisdiction_name": "Singapore",
|
|
124
|
+
"frameworks": {
|
|
125
|
+
"MAS_TRM": {
|
|
126
|
+
"breach_notification": {
|
|
127
|
+
"hours": 2,
|
|
128
|
+
"trigger": "Significant IT disruption (> 30min customer impact), security breach",
|
|
129
|
+
"stages": null,
|
|
130
|
+
"source": "https://www.mas.gov.sg/regulation/guidelines/technology-risk-management-guidelines",
|
|
131
|
+
"authority": "Monetary Authority of Singapore (MAS)"
|
|
132
|
+
},
|
|
133
|
+
"patch_sla": {
|
|
134
|
+
"hours": 720,
|
|
135
|
+
"note": "1 month for critical patches — same PCI problem. Risk-based timeline in practice.",
|
|
136
|
+
"source": "https://www.mas.gov.sg/regulation/guidelines/technology-risk-management-guidelines",
|
|
137
|
+
"authority": "Monetary Authority of Singapore (MAS)"
|
|
138
|
+
},
|
|
139
|
+
"authority": "Monetary Authority of Singapore (MAS)"
|
|
140
|
+
},
|
|
141
|
+
"CSA_CCOP": {
|
|
142
|
+
"breach_notification": {
|
|
143
|
+
"hours": 2,
|
|
144
|
+
"trigger": "Cybersecurity incident affecting CII",
|
|
145
|
+
"stages": null,
|
|
146
|
+
"source": "https://www.csa.gov.sg/our-programmes/critical-information-infrastructure-protection/cybersecurity-code-of-practice",
|
|
147
|
+
"authority": "Cyber Security Agency of Singapore (CSA)"
|
|
148
|
+
},
|
|
149
|
+
"authority": "Cyber Security Agency of Singapore (CSA)"
|
|
150
|
+
}
|
|
151
|
+
},
|
|
152
|
+
"fastest_breach_notification": {
|
|
153
|
+
"hours": 2,
|
|
154
|
+
"framework": "MAS_TRM"
|
|
155
|
+
},
|
|
156
|
+
"fastest_patch_sla": {
|
|
157
|
+
"hours": 720,
|
|
158
|
+
"framework": "MAS_TRM"
|
|
159
|
+
}
|
|
160
|
+
},
|
|
161
|
+
"JP": {
|
|
162
|
+
"jurisdiction_name": "Japan",
|
|
163
|
+
"frameworks": {
|
|
164
|
+
"APPI": {
|
|
165
|
+
"breach_notification": {
|
|
166
|
+
"hours": null,
|
|
167
|
+
"trigger": "Leak, loss, or damage of personal data likely to harm individual rights (specifically: special-care-required PI, breaches likely to cause financial damage, intentional acts, or >1,000 affected individuals)",
|
|
168
|
+
"stages": null,
|
|
169
|
+
"source": "https://www.ppc.go.jp/en/legal/",
|
|
170
|
+
"authority": "Personal Information Protection Commission (PPC, 個人情報保護委員会)"
|
|
171
|
+
},
|
|
172
|
+
"authority": "Personal Information Protection Commission (PPC, 個人情報保護委員会)"
|
|
173
|
+
}
|
|
174
|
+
},
|
|
175
|
+
"fastest_breach_notification": null,
|
|
176
|
+
"fastest_patch_sla": null
|
|
177
|
+
},
|
|
178
|
+
"IN": {
|
|
179
|
+
"jurisdiction_name": "India",
|
|
180
|
+
"frameworks": {
|
|
181
|
+
"CERT_IN": {
|
|
182
|
+
"breach_notification": {
|
|
183
|
+
"hours": 6,
|
|
184
|
+
"trigger": "Mandatory incident reporting categories (data breach, ransomware, website defacement, etc.)",
|
|
185
|
+
"stages": null,
|
|
186
|
+
"source": "https://www.cert-in.org.in/PDF/CERT-In_Directions_70B_28.04.2022.pdf",
|
|
187
|
+
"authority": "Computer Emergency Response Team — India (CERT-In)"
|
|
188
|
+
},
|
|
189
|
+
"authority": "Computer Emergency Response Team — India (CERT-In)"
|
|
190
|
+
},
|
|
191
|
+
"DPDPA": {
|
|
192
|
+
"breach_notification": {
|
|
193
|
+
"hours": 72,
|
|
194
|
+
"trigger": "Personal data breach affecting Data Principals",
|
|
195
|
+
"stages": null,
|
|
196
|
+
"source": "https://www.meity.gov.in/static/uploads/2024/06/2bf1f0e9f04e6fb4f8fef35e82c42aa5.pdf",
|
|
197
|
+
"authority": "Data Protection Board of India (DPBI)"
|
|
198
|
+
},
|
|
199
|
+
"authority": "Data Protection Board of India (DPBI)"
|
|
200
|
+
}
|
|
201
|
+
},
|
|
202
|
+
"fastest_breach_notification": {
|
|
203
|
+
"hours": 6,
|
|
204
|
+
"framework": "CERT_IN"
|
|
205
|
+
},
|
|
206
|
+
"fastest_patch_sla": null
|
|
207
|
+
},
|
|
208
|
+
"CA": {
|
|
209
|
+
"jurisdiction_name": "Canada",
|
|
210
|
+
"frameworks": {
|
|
211
|
+
"OSFI_B10": {
|
|
212
|
+
"breach_notification": {
|
|
213
|
+
"hours": 24,
|
|
214
|
+
"trigger": "Technology or cyber incident with material operational impact",
|
|
215
|
+
"stages": null,
|
|
216
|
+
"source": "https://www.osfi-bsif.gc.ca/en/guidance/guidance-library/third-party-risk-management-guideline",
|
|
217
|
+
"authority": "Office of the Superintendent of Financial Institutions (OSFI)"
|
|
218
|
+
},
|
|
219
|
+
"authority": "Office of the Superintendent of Financial Institutions (OSFI)"
|
|
220
|
+
},
|
|
221
|
+
"QC_LAW_25": {
|
|
222
|
+
"breach_notification": {
|
|
223
|
+
"hours": null,
|
|
224
|
+
"trigger": "Confidentiality incident presenting a 'risk of serious injury' must be reported to the CAI and affected individuals 'with diligence'",
|
|
225
|
+
"stages": null,
|
|
226
|
+
"source": "https://www.legisquebec.gouv.qc.ca/en/document/cs/p-39.1",
|
|
227
|
+
"authority": "Commission d'accès à l'information du Québec (CAI)"
|
|
228
|
+
},
|
|
229
|
+
"authority": "Commission d'accès à l'information du Québec (CAI)"
|
|
230
|
+
},
|
|
231
|
+
"PIPEDA": {
|
|
232
|
+
"breach_notification": {
|
|
233
|
+
"hours": null,
|
|
234
|
+
"trigger": "Breach of security safeguards involving personal information where it is reasonable to believe there is a 'real risk of significant harm'",
|
|
235
|
+
"stages": null,
|
|
236
|
+
"source": "https://laws-lois.justice.gc.ca/eng/acts/p-8.6/",
|
|
237
|
+
"authority": "Office of the Privacy Commissioner of Canada (OPC)"
|
|
238
|
+
},
|
|
239
|
+
"authority": "Office of the Privacy Commissioner of Canada (OPC)"
|
|
240
|
+
}
|
|
241
|
+
},
|
|
242
|
+
"fastest_breach_notification": {
|
|
243
|
+
"hours": 24,
|
|
244
|
+
"framework": "OSFI_B10"
|
|
245
|
+
},
|
|
246
|
+
"fastest_patch_sla": null
|
|
247
|
+
},
|
|
248
|
+
"BR": {
|
|
249
|
+
"jurisdiction_name": "Brazil",
|
|
250
|
+
"frameworks": {
|
|
251
|
+
"LGPD": {
|
|
252
|
+
"breach_notification": {
|
|
253
|
+
"hours": null,
|
|
254
|
+
"trigger": "Security incident that may cause relevant risk or damage to data subjects",
|
|
255
|
+
"stages": null,
|
|
256
|
+
"source": "https://www.planalto.gov.br/ccivil_03/_ato2015-2018/2018/lei/l13709.htm",
|
|
257
|
+
"authority": "Autoridade Nacional de Proteção de Dados (ANPD)"
|
|
258
|
+
},
|
|
259
|
+
"authority": "Autoridade Nacional de Proteção de Dados (ANPD)"
|
|
260
|
+
}
|
|
261
|
+
},
|
|
262
|
+
"fastest_breach_notification": null,
|
|
263
|
+
"fastest_patch_sla": null
|
|
264
|
+
},
|
|
265
|
+
"CN": {
|
|
266
|
+
"jurisdiction_name": "China",
|
|
267
|
+
"frameworks": {
|
|
268
|
+
"PIPL": {
|
|
269
|
+
"breach_notification": {
|
|
270
|
+
"hours": null,
|
|
271
|
+
"trigger": "Personal information leak, tampering, or loss",
|
|
272
|
+
"stages": null,
|
|
273
|
+
"source": "https://www.npc.gov.cn/npc/c30834/202108/a8c4e3672c74491a80b53a172bb753fe.shtml",
|
|
274
|
+
"authority": "Cyberspace Administration of China (CAC) — co-regulating with MIIT, MPS, SAMR"
|
|
275
|
+
},
|
|
276
|
+
"authority": "Cyberspace Administration of China (CAC) — co-regulating with MIIT, MPS, SAMR"
|
|
277
|
+
},
|
|
278
|
+
"DSL": {
|
|
279
|
+
"breach_notification": {
|
|
280
|
+
"hours": null,
|
|
281
|
+
"trigger": "Data security incident; immediate disposal + notification to competent authority",
|
|
282
|
+
"stages": null,
|
|
283
|
+
"source": "https://www.npc.gov.cn/npc/c30834/202106/7c9af12f51334a73b56d7938f99a788a.shtml",
|
|
284
|
+
"authority": "CAC, MPS, MSS — sectoral regulators with national security coordination"
|
|
285
|
+
},
|
|
286
|
+
"authority": "CAC, MPS, MSS — sectoral regulators with national security coordination"
|
|
287
|
+
}
|
|
288
|
+
},
|
|
289
|
+
"fastest_breach_notification": null,
|
|
290
|
+
"fastest_patch_sla": null
|
|
291
|
+
},
|
|
292
|
+
"ZA": {
|
|
293
|
+
"jurisdiction_name": "South Africa",
|
|
294
|
+
"frameworks": {
|
|
295
|
+
"POPIA": {
|
|
296
|
+
"breach_notification": {
|
|
297
|
+
"hours": null,
|
|
298
|
+
"trigger": "Compromise of personal information where reasonable grounds to believe the information has been accessed or acquired by unauthorised person",
|
|
299
|
+
"stages": null,
|
|
300
|
+
"source": "https://www.gov.za/sites/default/files/gcis_document/201409/3706726-11act4of2013popi.pdf",
|
|
301
|
+
"authority": "Information Regulator (South Africa)"
|
|
302
|
+
},
|
|
303
|
+
"authority": "Information Regulator (South Africa)"
|
|
304
|
+
}
|
|
305
|
+
},
|
|
306
|
+
"fastest_breach_notification": null,
|
|
307
|
+
"fastest_patch_sla": null
|
|
308
|
+
},
|
|
309
|
+
"AE": {
|
|
310
|
+
"jurisdiction_name": "United Arab Emirates",
|
|
311
|
+
"frameworks": {
|
|
312
|
+
"UAE_PDPL": {
|
|
313
|
+
"breach_notification": {
|
|
314
|
+
"hours": null,
|
|
315
|
+
"trigger": "Breach or violation of personal data that would prejudice privacy, confidentiality, or security of the data subject",
|
|
316
|
+
"stages": null,
|
|
317
|
+
"source": "https://u.ae/-/media/Documents-2022/Federal-Decree-Law-No-45-of-2021-Regarding-the-Protection-of-Personal-Data-Protection.ashx",
|
|
318
|
+
"authority": "UAE Data Office (Federal); TDRA coordinates digital sector; sectoral regulators apply in finance, health"
|
|
319
|
+
},
|
|
320
|
+
"authority": "UAE Data Office (Federal); TDRA coordinates digital sector; sectoral regulators apply in finance, health"
|
|
321
|
+
}
|
|
322
|
+
},
|
|
323
|
+
"fastest_breach_notification": null,
|
|
324
|
+
"fastest_patch_sla": null
|
|
325
|
+
},
|
|
326
|
+
"SA": {
|
|
327
|
+
"jurisdiction_name": "Saudi Arabia",
|
|
328
|
+
"frameworks": {
|
|
329
|
+
"KSA_PDPL": {
|
|
330
|
+
"breach_notification": {
|
|
331
|
+
"hours": 72,
|
|
332
|
+
"trigger": "Personal data breach that may cause damage to personal data or to the data subject",
|
|
333
|
+
"stages": null,
|
|
334
|
+
"source": "https://sdaia.gov.sa/en/SDAIA/about/Files/PersonalDataEnglishV2.pdf",
|
|
335
|
+
"authority": "Saudi Data and AI Authority (SDAIA)"
|
|
336
|
+
},
|
|
337
|
+
"authority": "Saudi Data and AI Authority (SDAIA)"
|
|
338
|
+
}
|
|
339
|
+
},
|
|
340
|
+
"fastest_breach_notification": {
|
|
341
|
+
"hours": 72,
|
|
342
|
+
"framework": "KSA_PDPL"
|
|
343
|
+
},
|
|
344
|
+
"fastest_patch_sla": null
|
|
345
|
+
},
|
|
346
|
+
"NZ": {
|
|
347
|
+
"jurisdiction_name": "New Zealand",
|
|
348
|
+
"frameworks": {
|
|
349
|
+
"PRIVACY_ACT_2020": {
|
|
350
|
+
"breach_notification": {
|
|
351
|
+
"hours": null,
|
|
352
|
+
"trigger": "Notifiable privacy breach: unauthorised access, disclosure, loss of personal information that has caused or is likely to cause serious harm",
|
|
353
|
+
"stages": null,
|
|
354
|
+
"source": "https://www.legislation.govt.nz/act/public/2020/0031/latest/LMS23223.html",
|
|
355
|
+
"authority": "Office of the Privacy Commissioner (OPC) — Te Mana Mātāpono Matatapu"
|
|
356
|
+
},
|
|
357
|
+
"authority": "Office of the Privacy Commissioner (OPC) — Te Mana Mātāpono Matatapu"
|
|
358
|
+
}
|
|
359
|
+
},
|
|
360
|
+
"fastest_breach_notification": null,
|
|
361
|
+
"fastest_patch_sla": null
|
|
362
|
+
},
|
|
363
|
+
"KR": {
|
|
364
|
+
"jurisdiction_name": "Korea (Republic of)",
|
|
365
|
+
"frameworks": {
|
|
366
|
+
"PIPA": {
|
|
367
|
+
"breach_notification": {
|
|
368
|
+
"hours": 72,
|
|
369
|
+
"trigger": "Personal information leakage",
|
|
370
|
+
"stages": null,
|
|
371
|
+
"source": "https://www.law.go.kr/LSW/eng/engLsSc.do?menuId=2§ion=lawNm&query=Personal+Information+Protection+Act",
|
|
372
|
+
"authority": "Personal Information Protection Commission (PIPC)"
|
|
373
|
+
},
|
|
374
|
+
"authority": "Personal Information Protection Commission (PIPC)"
|
|
375
|
+
}
|
|
376
|
+
},
|
|
377
|
+
"fastest_breach_notification": {
|
|
378
|
+
"hours": 72,
|
|
379
|
+
"framework": "PIPA"
|
|
380
|
+
},
|
|
381
|
+
"fastest_patch_sla": null
|
|
382
|
+
},
|
|
383
|
+
"CL": {
|
|
384
|
+
"jurisdiction_name": "Chile",
|
|
385
|
+
"frameworks": {
|
|
386
|
+
"CL_DPL": {
|
|
387
|
+
"breach_notification": {
|
|
388
|
+
"hours": 72,
|
|
389
|
+
"trigger": "Security breach affecting personal data with risk to data subject rights",
|
|
390
|
+
"stages": null,
|
|
391
|
+
"source": "https://www.bcn.cl/leychile/navegar?idNorma=141599",
|
|
392
|
+
"authority": "Agencia de Protección de Datos Personales (APDP) — established by Law 21,719; pre-existing oversight by SERNAC and Civil Registry"
|
|
393
|
+
},
|
|
394
|
+
"authority": "Agencia de Protección de Datos Personales (APDP) — established by Law 21,719; pre-existing oversight by SERNAC and Civil Registry"
|
|
395
|
+
}
|
|
396
|
+
},
|
|
397
|
+
"fastest_breach_notification": {
|
|
398
|
+
"hours": 72,
|
|
399
|
+
"framework": "CL_DPL"
|
|
400
|
+
},
|
|
401
|
+
"fastest_patch_sla": null
|
|
402
|
+
},
|
|
403
|
+
"IL": {
|
|
404
|
+
"jurisdiction_name": "Israel",
|
|
405
|
+
"frameworks": {
|
|
406
|
+
"PPL_5741_1981": {
|
|
407
|
+
"breach_notification": {
|
|
408
|
+
"hours": null,
|
|
409
|
+
"trigger": "Severe security incident affecting databases at medium or high security level (Regulation 11)",
|
|
410
|
+
"stages": null,
|
|
411
|
+
"source": "https://www.gov.il/en/departments/the_privacy_protection_authority",
|
|
412
|
+
"authority": "Privacy Protection Authority (PPA, רשות הגנת הפרטיות); transitioning to 'Public Authority for Privacy Protection' under Amendment 13 with expanded enforcement powers"
|
|
413
|
+
},
|
|
414
|
+
"authority": "Privacy Protection Authority (PPA, רשות הגנת הפרטיות); transitioning to 'Public Authority for Privacy Protection' under Amendment 13 with expanded enforcement powers"
|
|
415
|
+
}
|
|
416
|
+
},
|
|
417
|
+
"fastest_breach_notification": null,
|
|
418
|
+
"fastest_patch_sla": null
|
|
419
|
+
},
|
|
420
|
+
"CH": {
|
|
421
|
+
"jurisdiction_name": "Switzerland",
|
|
422
|
+
"frameworks": {
|
|
423
|
+
"REVFADP": {
|
|
424
|
+
"breach_notification": {
|
|
425
|
+
"hours": null,
|
|
426
|
+
"trigger": "Personal data breach likely to result in a high risk to data subjects' personality or fundamental rights (Art. 24 revFADP)",
|
|
427
|
+
"stages": null,
|
|
428
|
+
"source": "https://www.fedlex.admin.ch/eli/cc/2022/491/en",
|
|
429
|
+
"authority": "Federal Data Protection and Information Commissioner (FDPIC, EDÖB)"
|
|
430
|
+
},
|
|
431
|
+
"authority": "Federal Data Protection and Information Commissioner (FDPIC, EDÖB)"
|
|
432
|
+
},
|
|
433
|
+
"NCSC_CH": {
|
|
434
|
+
"breach_notification": {
|
|
435
|
+
"hours": 24,
|
|
436
|
+
"trigger": "Cyberattack on critical infrastructure operators (per Information Security Act Art. 74e, in force 2025-04-01)",
|
|
437
|
+
"stages": null,
|
|
438
|
+
"source": "https://www.ncsc.admin.ch/ncsc/en/home.html",
|
|
439
|
+
"authority": "Federal Office for Cybersecurity (BACS, formerly NCSC-CH; previously MELANI)"
|
|
440
|
+
},
|
|
441
|
+
"authority": "Federal Office for Cybersecurity (BACS, formerly NCSC-CH; previously MELANI)"
|
|
442
|
+
}
|
|
443
|
+
},
|
|
444
|
+
"fastest_breach_notification": {
|
|
445
|
+
"hours": 24,
|
|
446
|
+
"framework": "NCSC_CH"
|
|
447
|
+
},
|
|
448
|
+
"fastest_patch_sla": null
|
|
449
|
+
},
|
|
450
|
+
"HK": {
|
|
451
|
+
"jurisdiction_name": "Hong Kong SAR",
|
|
452
|
+
"frameworks": {
|
|
453
|
+
"PDPO": {
|
|
454
|
+
"breach_notification": {
|
|
455
|
+
"hours": null,
|
|
456
|
+
"trigger": "Voluntary breach notification to PCPD recommended for breaches involving sensitive data or significant harm potential",
|
|
457
|
+
"stages": null,
|
|
458
|
+
"source": "https://www.pcpd.org.hk/english/data_privacy_law/ordinance_at_a_Glance/ordinance.html",
|
|
459
|
+
"authority": "Office of the Privacy Commissioner for Personal Data (PCPD)"
|
|
460
|
+
},
|
|
461
|
+
"authority": "Office of the Privacy Commissioner for Personal Data (PCPD)"
|
|
462
|
+
},
|
|
463
|
+
"HKMA_CFI2": {
|
|
464
|
+
"breach_notification": {
|
|
465
|
+
"hours": null,
|
|
466
|
+
"trigger": "Significant IT control failures or cyber events affecting customer services or risk profile",
|
|
467
|
+
"stages": null,
|
|
468
|
+
"source": "https://www.hkma.gov.hk/eng/key-functions/banking/banking-regulatory-and-supervisory-regime/cybersecurity/",
|
|
469
|
+
"authority": "Hong Kong Monetary Authority (HKMA)"
|
|
470
|
+
},
|
|
471
|
+
"authority": "Hong Kong Monetary Authority (HKMA)"
|
|
472
|
+
}
|
|
473
|
+
},
|
|
474
|
+
"fastest_breach_notification": null,
|
|
475
|
+
"fastest_patch_sla": null
|
|
476
|
+
},
|
|
477
|
+
"TW": {
|
|
478
|
+
"jurisdiction_name": "Taiwan",
|
|
479
|
+
"frameworks": {
|
|
480
|
+
"PDPA_TW": {
|
|
481
|
+
"breach_notification": {
|
|
482
|
+
"hours": null,
|
|
483
|
+
"trigger": "Personal data theft, alteration, damage, loss, or leakage (Art. 12)",
|
|
484
|
+
"stages": null,
|
|
485
|
+
"source": "https://law.moj.gov.tw/ENG/LawClass/LawAll.aspx?pcode=I0050021",
|
|
486
|
+
"authority": "Personal Data Protection Commission (PDPC, 個人資料保護委員會) — established under 2023 amendment; previously sectoral regulators"
|
|
487
|
+
},
|
|
488
|
+
"authority": "Personal Data Protection Commission (PDPC, 個人資料保護委員會) — established under 2023 amendment; previously sectoral regulators"
|
|
489
|
+
},
|
|
490
|
+
"CYBER_SECURITY_MGMT_ACT": {
|
|
491
|
+
"breach_notification": {
|
|
492
|
+
"hours": 1,
|
|
493
|
+
"trigger": "Cyber incident affecting CIP critical information and communications systems",
|
|
494
|
+
"stages": null,
|
|
495
|
+
"source": "https://law.moj.gov.tw/ENG/LawClass/LawAll.aspx?pcode=A0030297",
|
|
496
|
+
"authority": "Ministry of Digital Affairs (MoDA, 數位發展部) — established 2022-08-27; previously National Information and Communication Security Taskforce. Operational arm: National Institute of Cyber Security (NICS, 國家資通安全研究院)"
|
|
497
|
+
},
|
|
498
|
+
"authority": "Ministry of Digital Affairs (MoDA, 數位發展部) — established 2022-08-27; previously National Information and Communication Security Taskforce. Operational arm: National Institute of Cyber Security (NICS, 國家資通安全研究院)"
|
|
499
|
+
}
|
|
500
|
+
},
|
|
501
|
+
"fastest_breach_notification": {
|
|
502
|
+
"hours": 1,
|
|
503
|
+
"framework": "CYBER_SECURITY_MGMT_ACT"
|
|
504
|
+
},
|
|
505
|
+
"fastest_patch_sla": null
|
|
506
|
+
},
|
|
507
|
+
"ID": {
|
|
508
|
+
"jurisdiction_name": "Indonesia",
|
|
509
|
+
"frameworks": {
|
|
510
|
+
"PDP_LAW": {
|
|
511
|
+
"breach_notification": {
|
|
512
|
+
"hours": 72,
|
|
513
|
+
"trigger": "Personal data protection failure causing data leakage, loss, or unauthorised processing (Art. 46)",
|
|
514
|
+
"stages": null,
|
|
515
|
+
"source": "https://peraturan.bpk.go.id/Details/229798/uu-no-27-tahun-2022",
|
|
516
|
+
"authority": "Personal Data Protection Agency (Lembaga Pelindungan Data Pribadi) — being established under Presidential Regulation pursuant to UU PDP Art. 58-60; interim oversight by Ministry of Communication and Informatics (Kominfo, now Komdigi)"
|
|
517
|
+
},
|
|
518
|
+
"authority": "Personal Data Protection Agency (Lembaga Pelindungan Data Pribadi) — being established under Presidential Regulation pursuant to UU PDP Art. 58-60; interim oversight by Ministry of Communication and Informatics (Kominfo, now Komdigi)"
|
|
519
|
+
},
|
|
520
|
+
"BI_CYBER_REG": {
|
|
521
|
+
"breach_notification": {
|
|
522
|
+
"hours": null,
|
|
523
|
+
"trigger": "Significant cyber incident affecting payment services or banking operations",
|
|
524
|
+
"stages": null,
|
|
525
|
+
"source": "https://www.bi.go.id/en/publikasi/peraturan/Pages/PBI_230621.aspx",
|
|
526
|
+
"authority": "Bank Indonesia (BI); Financial Services Authority (Otoritas Jasa Keuangan, OJK)"
|
|
527
|
+
},
|
|
528
|
+
"authority": "Bank Indonesia (BI); Financial Services Authority (Otoritas Jasa Keuangan, OJK)"
|
|
529
|
+
}
|
|
530
|
+
},
|
|
531
|
+
"fastest_breach_notification": {
|
|
532
|
+
"hours": 72,
|
|
533
|
+
"framework": "PDP_LAW"
|
|
534
|
+
},
|
|
535
|
+
"fastest_patch_sla": null
|
|
536
|
+
},
|
|
537
|
+
"VN": {
|
|
538
|
+
"jurisdiction_name": "Vietnam",
|
|
539
|
+
"frameworks": {
|
|
540
|
+
"PDPD": {
|
|
541
|
+
"breach_notification": {
|
|
542
|
+
"hours": 72,
|
|
543
|
+
"trigger": "Personal data breach causing risk to data subject rights and interests",
|
|
544
|
+
"stages": null,
|
|
545
|
+
"source": "https://thuvienphapluat.vn/van-ban/Cong-nghe-thong-tin/Nghi-dinh-13-2023-ND-CP-bao-ve-du-lieu-ca-nhan-465185.aspx",
|
|
546
|
+
"authority": "Ministry of Public Security (Bộ Công An) — Department of Cybersecurity and Hi-Tech Crime Prevention (A05)"
|
|
547
|
+
},
|
|
548
|
+
"authority": "Ministry of Public Security (Bộ Công An) — Department of Cybersecurity and Hi-Tech Crime Prevention (A05)"
|
|
549
|
+
}
|
|
550
|
+
},
|
|
551
|
+
"fastest_breach_notification": {
|
|
552
|
+
"hours": 72,
|
|
553
|
+
"framework": "PDPD"
|
|
554
|
+
},
|
|
555
|
+
"fastest_patch_sla": null
|
|
556
|
+
},
|
|
557
|
+
"US_NYDFS": {
|
|
558
|
+
"jurisdiction_name": "United States — New York State (sub-national, financial services)",
|
|
559
|
+
"frameworks": {
|
|
560
|
+
"NYDFS_PART_500": {
|
|
561
|
+
"breach_notification": {
|
|
562
|
+
"hours": 72,
|
|
563
|
+
"trigger": "Cybersecurity event that has a reasonable likelihood of materially harming any material part of the normal operations of the Covered Entity OR a Cybersecurity Event involving Nonpublic Information that requires notice to a government body, self-regulatory agency, or other supervisory body (§500.17(a))",
|
|
564
|
+
"stages": null,
|
|
565
|
+
"source": "https://www.dfs.ny.gov/industry_guidance/cybersecurity",
|
|
566
|
+
"authority": "New York State Department of Financial Services (DFS)"
|
|
567
|
+
},
|
|
568
|
+
"authority": "New York State Department of Financial Services (DFS)"
|
|
569
|
+
}
|
|
570
|
+
},
|
|
571
|
+
"fastest_breach_notification": {
|
|
572
|
+
"hours": 72,
|
|
573
|
+
"framework": "NYDFS_PART_500"
|
|
574
|
+
},
|
|
575
|
+
"fastest_patch_sla": null
|
|
576
|
+
},
|
|
577
|
+
"NO": {
|
|
578
|
+
"jurisdiction_name": "Norway",
|
|
579
|
+
"frameworks": {
|
|
580
|
+
"PERSONOPPLYSNINGSLOVEN": {
|
|
581
|
+
"breach_notification": {
|
|
582
|
+
"hours": 72,
|
|
583
|
+
"trigger": "Personal data breach affecting data subject rights (GDPR Art. 33 standard)",
|
|
584
|
+
"stages": null,
|
|
585
|
+
"source": "https://lovdata.no/dokument/NL/lov/2018-06-15-38",
|
|
586
|
+
"authority": "Datatilsynet (Norwegian Data Protection Authority)"
|
|
587
|
+
},
|
|
588
|
+
"authority": "Datatilsynet (Norwegian Data Protection Authority)"
|
|
589
|
+
},
|
|
590
|
+
"NSM_GRUNNPRINSIPPER": {
|
|
591
|
+
"patch_sla": {
|
|
592
|
+
"hours": 720,
|
|
593
|
+
"note": "NSM Grunnprinsipper 2.2.5 recommends 'as soon as possible' for known-exploited vulnerabilities; sector guidance and audit practice operationalise this as ~30 days for critical, with accelerated handling for actively exploited cases.",
|
|
594
|
+
"source": "https://nsm.no/regelverk-og-hjelp/rad-og-anbefalinger/grunnprinsipper-for-ikt-sikkerhet/",
|
|
595
|
+
"authority": "Nasjonal sikkerhetsmyndighet (NSM) — Norwegian National Security Authority"
|
|
596
|
+
},
|
|
597
|
+
"authority": "Nasjonal sikkerhetsmyndighet (NSM) — Norwegian National Security Authority"
|
|
598
|
+
},
|
|
599
|
+
"NIS2_NORWAY": {
|
|
600
|
+
"breach_notification": {
|
|
601
|
+
"hours": 24,
|
|
602
|
+
"trigger": "Significant incident at essential/important entity (NIS2 standard)",
|
|
603
|
+
"stages": null,
|
|
604
|
+
"source": "https://www.regjeringen.no/no/dokumenter/prop.-109-l-20232024/id3035898/",
|
|
605
|
+
"authority": "NSM as national CSIRT; Nkom (telecom), Finanstilsynet (finance), NVE (energy), Helsedirektoratet (health), and other sectoral authorities"
|
|
606
|
+
},
|
|
607
|
+
"authority": "NSM as national CSIRT; Nkom (telecom), Finanstilsynet (finance), NVE (energy), Helsedirektoratet (health), and other sectoral authorities"
|
|
608
|
+
}
|
|
609
|
+
},
|
|
610
|
+
"fastest_breach_notification": {
|
|
611
|
+
"hours": 24,
|
|
612
|
+
"framework": "NIS2_NORWAY"
|
|
613
|
+
},
|
|
614
|
+
"fastest_patch_sla": {
|
|
615
|
+
"hours": 720,
|
|
616
|
+
"framework": "NSM_GRUNNPRINSIPPER"
|
|
617
|
+
}
|
|
618
|
+
},
|
|
619
|
+
"MX": {
|
|
620
|
+
"jurisdiction_name": "Mexico",
|
|
621
|
+
"frameworks": {
|
|
622
|
+
"LFPDPPP": {
|
|
623
|
+
"breach_notification": {
|
|
624
|
+
"hours": null,
|
|
625
|
+
"trigger": "Security breach affecting rights of data subjects (Reglamento Art. 63)",
|
|
626
|
+
"stages": null,
|
|
627
|
+
"source": "https://www.diputados.gob.mx/LeyesBiblio/pdf/LFPDPPP.pdf",
|
|
628
|
+
"authority": "Until 2025: INAI (Instituto Nacional de Transparencia, Acceso a la Información y Protección de Datos Personales); reform in progress to transfer functions to a successor agency under the Secretaría Anticorrupción y Buen Gobierno (constitutional reform published 2024-12-20 dissolving INAI; transition law pending)"
|
|
629
|
+
},
|
|
630
|
+
"authority": "Until 2025: INAI (Instituto Nacional de Transparencia, Acceso a la Información y Protección de Datos Personales); reform in progress to transfer functions to a successor agency under the Secretaría Anticorrupción y Buen Gobierno (constitutional reform published 2024-12-20 dissolving INAI; transition law pending)"
|
|
631
|
+
},
|
|
632
|
+
"CONDUSEF_CNBV_CYBER": {
|
|
633
|
+
"breach_notification": {
|
|
634
|
+
"hours": 24,
|
|
635
|
+
"trigger": "Cyber incident affecting operations, services, or sensitive information",
|
|
636
|
+
"stages": null,
|
|
637
|
+
"source": "https://www.cnbv.gob.mx/Normatividad/Disposiciones%20de%20car%C3%A1cter%20general%20aplicables%20a%20las%20instituciones%20de%20cr%C3%A9dito.pdf",
|
|
638
|
+
"authority": "Comisión Nacional Bancaria y de Valores (CNBV); CONDUSEF for consumer protection in financial services; Banco de México for payment systems oversight"
|
|
639
|
+
},
|
|
640
|
+
"authority": "Comisión Nacional Bancaria y de Valores (CNBV); CONDUSEF for consumer protection in financial services; Banco de México for payment systems oversight"
|
|
641
|
+
}
|
|
642
|
+
},
|
|
643
|
+
"fastest_breach_notification": {
|
|
644
|
+
"hours": 24,
|
|
645
|
+
"framework": "CONDUSEF_CNBV_CYBER"
|
|
646
|
+
},
|
|
647
|
+
"fastest_patch_sla": null
|
|
648
|
+
},
|
|
649
|
+
"AR": {
|
|
650
|
+
"jurisdiction_name": "Argentina",
|
|
651
|
+
"frameworks": {
|
|
652
|
+
"LPDP": {
|
|
653
|
+
"breach_notification": {
|
|
654
|
+
"hours": null,
|
|
655
|
+
"trigger": "Security incident affecting personal data",
|
|
656
|
+
"stages": null,
|
|
657
|
+
"source": "http://servicios.infoleg.gob.ar/infolegInternet/anexos/60000-64999/64790/norma.htm",
|
|
658
|
+
"authority": "Agencia de Acceso a la Información Pública (AAIP) — Dirección Nacional de Protección de Datos Personales"
|
|
659
|
+
},
|
|
660
|
+
"authority": "Agencia de Acceso a la Información Pública (AAIP) — Dirección Nacional de Protección de Datos Personales"
|
|
661
|
+
},
|
|
662
|
+
"BCRA_CYBER": {
|
|
663
|
+
"breach_notification": {
|
|
664
|
+
"hours": 24,
|
|
665
|
+
"trigger": "Cyber incident with significant impact on operations, customers or sensitive information",
|
|
666
|
+
"stages": null,
|
|
667
|
+
"source": "https://www.bcra.gob.ar/Pdfs/comytexord/A7724.pdf",
|
|
668
|
+
"authority": "Banco Central de la República Argentina (BCRA) — Superintendencia de Entidades Financieras y Cambiarias"
|
|
669
|
+
},
|
|
670
|
+
"authority": "Banco Central de la República Argentina (BCRA) — Superintendencia de Entidades Financieras y Cambiarias"
|
|
671
|
+
}
|
|
672
|
+
},
|
|
673
|
+
"fastest_breach_notification": {
|
|
674
|
+
"hours": 24,
|
|
675
|
+
"framework": "BCRA_CYBER"
|
|
676
|
+
},
|
|
677
|
+
"fastest_patch_sla": null
|
|
678
|
+
},
|
|
679
|
+
"TR": {
|
|
680
|
+
"jurisdiction_name": "Türkiye",
|
|
681
|
+
"frameworks": {
|
|
682
|
+
"KVKK": {
|
|
683
|
+
"breach_notification": {
|
|
684
|
+
"hours": 72,
|
|
685
|
+
"trigger": "Personal data breach (data being acquired by unauthorised parties)",
|
|
686
|
+
"stages": null,
|
|
687
|
+
"source": "https://www.kvkk.gov.tr/Icerik/6649/Personal-Data-Protection-Law",
|
|
688
|
+
"authority": "Kişisel Verileri Koruma Kurumu (KVKK Authority / KVKK)"
|
|
689
|
+
},
|
|
690
|
+
"authority": "Kişisel Verileri Koruma Kurumu (KVKK Authority / KVKK)"
|
|
691
|
+
}
|
|
692
|
+
},
|
|
693
|
+
"fastest_breach_notification": {
|
|
694
|
+
"hours": 72,
|
|
695
|
+
"framework": "KVKK"
|
|
696
|
+
},
|
|
697
|
+
"fastest_patch_sla": null
|
|
698
|
+
},
|
|
699
|
+
"TH": {
|
|
700
|
+
"jurisdiction_name": "Thailand",
|
|
701
|
+
"frameworks": {
|
|
702
|
+
"PDPA_TH": {
|
|
703
|
+
"breach_notification": {
|
|
704
|
+
"hours": 72,
|
|
705
|
+
"trigger": "Personal data breach that risks the rights and freedoms of persons",
|
|
706
|
+
"stages": null,
|
|
707
|
+
"source": "https://www.pdpc.or.th/en/laws-and-regulations/",
|
|
708
|
+
"authority": "Personal Data Protection Committee (PDPC) — Office of the PDPC (PDPC Office)"
|
|
709
|
+
},
|
|
710
|
+
"authority": "Personal Data Protection Committee (PDPC) — Office of the PDPC (PDPC Office)"
|
|
711
|
+
},
|
|
712
|
+
"CSA_TH": {
|
|
713
|
+
"breach_notification": {
|
|
714
|
+
"hours": null,
|
|
715
|
+
"trigger": "Cyber threat affecting CII (graduated severity)",
|
|
716
|
+
"stages": null,
|
|
717
|
+
"source": "https://www.ncsa.or.th/laws.html",
|
|
718
|
+
"authority": "National Cyber Security Agency (NCSA) — สำนักงานคณะกรรมการการรักษาความมั่นคงปลอดภัยไซเบอร์แห่งชาติ"
|
|
719
|
+
},
|
|
720
|
+
"authority": "National Cyber Security Agency (NCSA) — สำนักงานคณะกรรมการการรักษาความมั่นคงปลอดภัยไซเบอร์แห่งชาติ"
|
|
721
|
+
}
|
|
722
|
+
},
|
|
723
|
+
"fastest_breach_notification": {
|
|
724
|
+
"hours": 72,
|
|
725
|
+
"framework": "PDPA_TH"
|
|
726
|
+
},
|
|
727
|
+
"fastest_patch_sla": null
|
|
728
|
+
},
|
|
729
|
+
"PH": {
|
|
730
|
+
"jurisdiction_name": "Philippines",
|
|
731
|
+
"frameworks": {
|
|
732
|
+
"DPA_2012": {
|
|
733
|
+
"breach_notification": {
|
|
734
|
+
"hours": 72,
|
|
735
|
+
"trigger": "Personal data breach where (a) sensitive personal information or information that may enable identity fraud are reasonably believed to have been acquired by an unauthorised person, and (b) it is likely to give rise to a real risk of serious harm",
|
|
736
|
+
"stages": null,
|
|
737
|
+
"source": "https://privacy.gov.ph/data-privacy-act/",
|
|
738
|
+
"authority": "National Privacy Commission (NPC)"
|
|
739
|
+
},
|
|
740
|
+
"authority": "National Privacy Commission (NPC)"
|
|
741
|
+
},
|
|
742
|
+
"BSP_CYBER": {
|
|
743
|
+
"breach_notification": {
|
|
744
|
+
"hours": 2,
|
|
745
|
+
"trigger": "Major cyber incident or significant disruption to banking operations",
|
|
746
|
+
"stages": null,
|
|
747
|
+
"source": "https://www.bsp.gov.ph/Pages/Regulations/MORB.aspx",
|
|
748
|
+
"authority": "Bangko Sentral ng Pilipinas (BSP)"
|
|
749
|
+
},
|
|
750
|
+
"authority": "Bangko Sentral ng Pilipinas (BSP)"
|
|
751
|
+
}
|
|
752
|
+
},
|
|
753
|
+
"fastest_breach_notification": {
|
|
754
|
+
"hours": 2,
|
|
755
|
+
"framework": "BSP_CYBER"
|
|
756
|
+
},
|
|
757
|
+
"fastest_patch_sla": null
|
|
758
|
+
},
|
|
759
|
+
"US_CALIFORNIA": {
|
|
760
|
+
"jurisdiction_name": "United States — California (sub-national, privacy + AI baseline)",
|
|
761
|
+
"frameworks": {
|
|
762
|
+
"CCPA_CPRA": {
|
|
763
|
+
"breach_notification": {
|
|
764
|
+
"hours": null,
|
|
765
|
+
"trigger": "California's separate breach-notification statute Cal. Civ. Code § 1798.82 applies to security breaches of personal information",
|
|
766
|
+
"stages": null,
|
|
767
|
+
"source": "https://oag.ca.gov/privacy/ccpa",
|
|
768
|
+
"authority": "California Privacy Protection Agency (CPPA) — primary; California Attorney General — concurrent enforcement"
|
|
769
|
+
},
|
|
770
|
+
"authority": "California Privacy Protection Agency (CPPA) — primary; California Attorney General — concurrent enforcement"
|
|
771
|
+
}
|
|
772
|
+
},
|
|
773
|
+
"fastest_breach_notification": null,
|
|
774
|
+
"fastest_patch_sla": null
|
|
775
|
+
}
|
|
776
|
+
},
|
|
777
|
+
"sorted_by_breach_notification_hours": [
|
|
778
|
+
{
|
|
779
|
+
"jurisdiction": "TW",
|
|
780
|
+
"framework": "CYBER_SECURITY_MGMT_ACT",
|
|
781
|
+
"hours": 1,
|
|
782
|
+
"trigger": "Cyber incident affecting CIP critical information and communications systems"
|
|
783
|
+
},
|
|
784
|
+
{
|
|
785
|
+
"jurisdiction": "SG",
|
|
786
|
+
"framework": "MAS_TRM",
|
|
787
|
+
"hours": 2,
|
|
788
|
+
"trigger": "Significant IT disruption (> 30min customer impact), security breach"
|
|
789
|
+
},
|
|
790
|
+
{
|
|
791
|
+
"jurisdiction": "SG",
|
|
792
|
+
"framework": "CSA_CCOP",
|
|
793
|
+
"hours": 2,
|
|
794
|
+
"trigger": "Cybersecurity incident affecting CII"
|
|
795
|
+
},
|
|
796
|
+
{
|
|
797
|
+
"jurisdiction": "PH",
|
|
798
|
+
"framework": "BSP_CYBER",
|
|
799
|
+
"hours": 2,
|
|
800
|
+
"trigger": "Major cyber incident or significant disruption to banking operations"
|
|
801
|
+
},
|
|
802
|
+
{
|
|
803
|
+
"jurisdiction": "EU",
|
|
804
|
+
"framework": "DORA",
|
|
805
|
+
"hours": 4,
|
|
806
|
+
"trigger": "Major ICT-related incident (RTO/RPO breach, high financial impact, reputational damage)"
|
|
807
|
+
},
|
|
808
|
+
{
|
|
809
|
+
"jurisdiction": "IN",
|
|
810
|
+
"framework": "CERT_IN",
|
|
811
|
+
"hours": 6,
|
|
812
|
+
"trigger": "Mandatory incident reporting categories (data breach, ransomware, website defacement, etc.)"
|
|
813
|
+
},
|
|
814
|
+
{
|
|
815
|
+
"jurisdiction": "EU",
|
|
816
|
+
"framework": "NIS2",
|
|
817
|
+
"hours": 24,
|
|
818
|
+
"trigger": "Significant incident (substantial impact on service provision)"
|
|
819
|
+
},
|
|
820
|
+
{
|
|
821
|
+
"jurisdiction": "EU",
|
|
822
|
+
"framework": "EU_CRA",
|
|
823
|
+
"hours": 24,
|
|
824
|
+
"trigger": "Actively exploited vulnerability discovered in the product"
|
|
825
|
+
},
|
|
826
|
+
{
|
|
827
|
+
"jurisdiction": "CA",
|
|
828
|
+
"framework": "OSFI_B10",
|
|
829
|
+
"hours": 24,
|
|
830
|
+
"trigger": "Technology or cyber incident with material operational impact"
|
|
831
|
+
},
|
|
832
|
+
{
|
|
833
|
+
"jurisdiction": "CH",
|
|
834
|
+
"framework": "NCSC_CH",
|
|
835
|
+
"hours": 24,
|
|
836
|
+
"trigger": "Cyberattack on critical infrastructure operators (per Information Security Act Art. 74e, in force 2025-04-01)"
|
|
837
|
+
},
|
|
838
|
+
{
|
|
839
|
+
"jurisdiction": "NO",
|
|
840
|
+
"framework": "NIS2_NORWAY",
|
|
841
|
+
"hours": 24,
|
|
842
|
+
"trigger": "Significant incident at essential/important entity (NIS2 standard)"
|
|
843
|
+
},
|
|
844
|
+
{
|
|
845
|
+
"jurisdiction": "MX",
|
|
846
|
+
"framework": "CONDUSEF_CNBV_CYBER",
|
|
847
|
+
"hours": 24,
|
|
848
|
+
"trigger": "Cyber incident affecting operations, services, or sensitive information"
|
|
849
|
+
},
|
|
850
|
+
{
|
|
851
|
+
"jurisdiction": "AR",
|
|
852
|
+
"framework": "BCRA_CYBER",
|
|
853
|
+
"hours": 24,
|
|
854
|
+
"trigger": "Cyber incident with significant impact on operations, customers or sensitive information"
|
|
855
|
+
},
|
|
856
|
+
{
|
|
857
|
+
"jurisdiction": "EU",
|
|
858
|
+
"framework": "GDPR",
|
|
859
|
+
"hours": 72,
|
|
860
|
+
"trigger": "Personal data breach affecting data subject rights"
|
|
861
|
+
},
|
|
862
|
+
{
|
|
863
|
+
"jurisdiction": "AU",
|
|
864
|
+
"framework": "APRA_CPS234",
|
|
865
|
+
"hours": 72,
|
|
866
|
+
"trigger": "Material information security incident"
|
|
867
|
+
},
|
|
868
|
+
{
|
|
869
|
+
"jurisdiction": "IN",
|
|
870
|
+
"framework": "DPDPA",
|
|
871
|
+
"hours": 72,
|
|
872
|
+
"trigger": "Personal data breach affecting Data Principals"
|
|
873
|
+
},
|
|
874
|
+
{
|
|
875
|
+
"jurisdiction": "SA",
|
|
876
|
+
"framework": "KSA_PDPL",
|
|
877
|
+
"hours": 72,
|
|
878
|
+
"trigger": "Personal data breach that may cause damage to personal data or to the data subject"
|
|
879
|
+
},
|
|
880
|
+
{
|
|
881
|
+
"jurisdiction": "KR",
|
|
882
|
+
"framework": "PIPA",
|
|
883
|
+
"hours": 72,
|
|
884
|
+
"trigger": "Personal information leakage"
|
|
885
|
+
},
|
|
886
|
+
{
|
|
887
|
+
"jurisdiction": "CL",
|
|
888
|
+
"framework": "CL_DPL",
|
|
889
|
+
"hours": 72,
|
|
890
|
+
"trigger": "Security breach affecting personal data with risk to data subject rights"
|
|
891
|
+
},
|
|
892
|
+
{
|
|
893
|
+
"jurisdiction": "ID",
|
|
894
|
+
"framework": "PDP_LAW",
|
|
895
|
+
"hours": 72,
|
|
896
|
+
"trigger": "Personal data protection failure causing data leakage, loss, or unauthorised processing (Art. 46)"
|
|
897
|
+
},
|
|
898
|
+
{
|
|
899
|
+
"jurisdiction": "VN",
|
|
900
|
+
"framework": "PDPD",
|
|
901
|
+
"hours": 72,
|
|
902
|
+
"trigger": "Personal data breach causing risk to data subject rights and interests"
|
|
903
|
+
},
|
|
904
|
+
{
|
|
905
|
+
"jurisdiction": "US_NYDFS",
|
|
906
|
+
"framework": "NYDFS_PART_500",
|
|
907
|
+
"hours": 72,
|
|
908
|
+
"trigger": "Cybersecurity event that has a reasonable likelihood of materially harming any material part of the normal operations of the Covered Entity OR a Cybersecurity Event involving Nonpublic Information that requires notice to a government body, self-regulatory agency, or other supervisory body (§500.17(a))"
|
|
909
|
+
},
|
|
910
|
+
{
|
|
911
|
+
"jurisdiction": "NO",
|
|
912
|
+
"framework": "PERSONOPPLYSNINGSLOVEN",
|
|
913
|
+
"hours": 72,
|
|
914
|
+
"trigger": "Personal data breach affecting data subject rights (GDPR Art. 33 standard)"
|
|
915
|
+
},
|
|
916
|
+
{
|
|
917
|
+
"jurisdiction": "TR",
|
|
918
|
+
"framework": "KVKK",
|
|
919
|
+
"hours": 72,
|
|
920
|
+
"trigger": "Personal data breach (data being acquired by unauthorised parties)"
|
|
921
|
+
},
|
|
922
|
+
{
|
|
923
|
+
"jurisdiction": "TH",
|
|
924
|
+
"framework": "PDPA_TH",
|
|
925
|
+
"hours": 72,
|
|
926
|
+
"trigger": "Personal data breach that risks the rights and freedoms of persons"
|
|
927
|
+
},
|
|
928
|
+
{
|
|
929
|
+
"jurisdiction": "PH",
|
|
930
|
+
"framework": "DPA_2012",
|
|
931
|
+
"hours": 72,
|
|
932
|
+
"trigger": "Personal data breach where (a) sensitive personal information or information that may enable identity fraud are reasonably believed to have been acquired by an unauthorised person, and (b) it is likely to give rise to a real risk of serious harm"
|
|
933
|
+
}
|
|
934
|
+
],
|
|
935
|
+
"sorted_by_patch_sla_hours": [
|
|
936
|
+
{
|
|
937
|
+
"jurisdiction": "AU",
|
|
938
|
+
"framework": "ASD_ISM",
|
|
939
|
+
"hours": 48,
|
|
940
|
+
"note": "ISM-1623: 48h for critical with existing exploit. Best non-CISA-aware SLA of any major framework."
|
|
941
|
+
},
|
|
942
|
+
{
|
|
943
|
+
"jurisdiction": "AU",
|
|
944
|
+
"framework": "ESSENTIAL_8",
|
|
945
|
+
"hours": 48,
|
|
946
|
+
"note": "Maturity Level 3 — 48h for extreme risk. ML1 = 1 month, ML2 = 2 weeks, ML3 = 48h."
|
|
947
|
+
},
|
|
948
|
+
{
|
|
949
|
+
"jurisdiction": "UK",
|
|
950
|
+
"framework": "CYBER_ESSENTIALS",
|
|
951
|
+
"hours": 336,
|
|
952
|
+
"note": "14 days for critical patches (internet-facing). Better than NIST 30-day, worse than ASD 48h."
|
|
953
|
+
},
|
|
954
|
+
{
|
|
955
|
+
"jurisdiction": "SG",
|
|
956
|
+
"framework": "MAS_TRM",
|
|
957
|
+
"hours": 720,
|
|
958
|
+
"note": "1 month for critical patches — same PCI problem. Risk-based timeline in practice."
|
|
959
|
+
},
|
|
960
|
+
{
|
|
961
|
+
"jurisdiction": "NO",
|
|
962
|
+
"framework": "NSM_GRUNNPRINSIPPER",
|
|
963
|
+
"hours": 720,
|
|
964
|
+
"note": "NSM Grunnprinsipper 2.2.5 recommends 'as soon as possible' for known-exploited vulnerabilities; sector guidance and audit practice operationalise this as ~30 days for critical, with accelerated handling for actively exploited cases."
|
|
965
|
+
}
|
|
966
|
+
]
|
|
967
|
+
}
|