@blamejs/exceptd-skills 0.9.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/AGENTS.md +232 -0
- package/ARCHITECTURE.md +267 -0
- package/CHANGELOG.md +616 -0
- package/CONTEXT.md +203 -0
- package/LICENSE +200 -0
- package/NOTICE +82 -0
- package/README.md +307 -0
- package/SECURITY.md +73 -0
- package/agents/README.md +81 -0
- package/agents/report-generator.md +156 -0
- package/agents/skill-updater.md +102 -0
- package/agents/source-validator.md +119 -0
- package/agents/threat-researcher.md +149 -0
- package/bin/exceptd.js +183 -0
- package/data/_indexes/_meta.json +88 -0
- package/data/_indexes/activity-feed.json +362 -0
- package/data/_indexes/catalog-summaries.json +229 -0
- package/data/_indexes/chains.json +7135 -0
- package/data/_indexes/currency.json +359 -0
- package/data/_indexes/did-ladders.json +451 -0
- package/data/_indexes/frequency.json +2072 -0
- package/data/_indexes/handoff-dag.json +476 -0
- package/data/_indexes/jurisdiction-clocks.json +967 -0
- package/data/_indexes/jurisdiction-map.json +536 -0
- package/data/_indexes/recipes.json +319 -0
- package/data/_indexes/section-offsets.json +3656 -0
- package/data/_indexes/stale-content.json +14 -0
- package/data/_indexes/summary-cards.json +1736 -0
- package/data/_indexes/theater-fingerprints.json +381 -0
- package/data/_indexes/token-budget.json +2137 -0
- package/data/_indexes/trigger-table.json +1374 -0
- package/data/_indexes/xref.json +818 -0
- package/data/atlas-ttps.json +282 -0
- package/data/cve-catalog.json +496 -0
- package/data/cwe-catalog.json +1017 -0
- package/data/d3fend-catalog.json +738 -0
- package/data/dlp-controls.json +1039 -0
- package/data/exploit-availability.json +67 -0
- package/data/framework-control-gaps.json +1255 -0
- package/data/global-frameworks.json +2913 -0
- package/data/rfc-references.json +324 -0
- package/data/zeroday-lessons.json +377 -0
- package/keys/public.pem +3 -0
- package/lib/framework-gap.js +328 -0
- package/lib/job-queue.js +195 -0
- package/lib/lint-skills.js +536 -0
- package/lib/prefetch.js +372 -0
- package/lib/refresh-external.js +713 -0
- package/lib/schemas/cve-catalog.schema.json +151 -0
- package/lib/schemas/manifest.schema.json +106 -0
- package/lib/schemas/skill-frontmatter.schema.json +113 -0
- package/lib/scoring.js +149 -0
- package/lib/sign.js +197 -0
- package/lib/ttp-mapper.js +80 -0
- package/lib/validate-catalog-meta.js +198 -0
- package/lib/validate-cve-catalog.js +213 -0
- package/lib/validate-indexes.js +83 -0
- package/lib/validate-package.js +162 -0
- package/lib/validate-vendor.js +85 -0
- package/lib/verify.js +216 -0
- package/lib/worker-pool.js +84 -0
- package/manifest-snapshot.json +1833 -0
- package/manifest.json +2108 -0
- package/orchestrator/README.md +124 -0
- package/orchestrator/dispatcher.js +140 -0
- package/orchestrator/event-bus.js +146 -0
- package/orchestrator/index.js +874 -0
- package/orchestrator/pipeline.js +201 -0
- package/orchestrator/scanner.js +327 -0
- package/orchestrator/scheduler.js +137 -0
- package/package.json +113 -0
- package/sbom.cdx.json +158 -0
- package/scripts/audit-cross-skill.js +261 -0
- package/scripts/audit-perf.js +160 -0
- package/scripts/bootstrap.js +205 -0
- package/scripts/build-indexes.js +721 -0
- package/scripts/builders/activity-feed.js +79 -0
- package/scripts/builders/catalog-summaries.js +67 -0
- package/scripts/builders/currency.js +109 -0
- package/scripts/builders/cwe-chains.js +105 -0
- package/scripts/builders/did-ladders.js +149 -0
- package/scripts/builders/frequency.js +89 -0
- package/scripts/builders/jurisdiction-clocks.js +126 -0
- package/scripts/builders/recipes.js +159 -0
- package/scripts/builders/section-offsets.js +162 -0
- package/scripts/builders/stale-content.js +171 -0
- package/scripts/builders/summary-cards.js +166 -0
- package/scripts/builders/theater-fingerprints.js +198 -0
- package/scripts/builders/token-budget.js +96 -0
- package/scripts/check-manifest-snapshot.js +217 -0
- package/scripts/predeploy.js +267 -0
- package/scripts/refresh-manifest-snapshot.js +57 -0
- package/scripts/refresh-sbom.js +222 -0
- package/skills/age-gates-child-safety/skill.md +456 -0
- package/skills/ai-attack-surface/skill.md +282 -0
- package/skills/ai-c2-detection/skill.md +440 -0
- package/skills/ai-risk-management/skill.md +311 -0
- package/skills/api-security/skill.md +287 -0
- package/skills/attack-surface-pentest/skill.md +381 -0
- package/skills/cloud-security/skill.md +384 -0
- package/skills/compliance-theater/skill.md +365 -0
- package/skills/container-runtime-security/skill.md +379 -0
- package/skills/coordinated-vuln-disclosure/skill.md +473 -0
- package/skills/defensive-countermeasure-mapping/skill.md +300 -0
- package/skills/dlp-gap-analysis/skill.md +337 -0
- package/skills/email-security-anti-phishing/skill.md +206 -0
- package/skills/exploit-scoring/skill.md +331 -0
- package/skills/framework-gap-analysis/skill.md +374 -0
- package/skills/fuzz-testing-strategy/skill.md +313 -0
- package/skills/global-grc/skill.md +564 -0
- package/skills/identity-assurance/skill.md +272 -0
- package/skills/incident-response-playbook/skill.md +546 -0
- package/skills/kernel-lpe-triage/skill.md +303 -0
- package/skills/mcp-agent-trust/skill.md +326 -0
- package/skills/mlops-security/skill.md +325 -0
- package/skills/ot-ics-security/skill.md +340 -0
- package/skills/policy-exception-gen/skill.md +437 -0
- package/skills/pqc-first/skill.md +546 -0
- package/skills/rag-pipeline-security/skill.md +294 -0
- package/skills/researcher/skill.md +310 -0
- package/skills/sector-energy/skill.md +409 -0
- package/skills/sector-federal-government/skill.md +302 -0
- package/skills/sector-financial/skill.md +398 -0
- package/skills/sector-healthcare/skill.md +373 -0
- package/skills/security-maturity-tiers/skill.md +464 -0
- package/skills/skill-update-loop/skill.md +463 -0
- package/skills/supply-chain-integrity/skill.md +318 -0
- package/skills/threat-model-currency/skill.md +404 -0
- package/skills/threat-modeling-methodology/skill.md +312 -0
- package/skills/webapp-security/skill.md +281 -0
- package/skills/zeroday-gap-learn/skill.md +350 -0
- package/vendor/blamejs/LICENSE +201 -0
- package/vendor/blamejs/README.md +54 -0
- package/vendor/blamejs/_PROVENANCE.json +54 -0
- package/vendor/blamejs/retry.js +335 -0
- package/vendor/blamejs/worker-pool.js +418 -0
|
@@ -0,0 +1,2913 @@
|
|
|
1
|
+
{
|
|
2
|
+
"_meta": {
|
|
3
|
+
"schema_version": "1.3.0",
|
|
4
|
+
"version": "1.3.0",
|
|
5
|
+
"last_updated": "2026-05-11",
|
|
6
|
+
"note": "Multi-jurisdiction framework registry. patch_sla in hours. notification_sla in hours. source field must be primary regulatory source. v1.3.0 expansion: NO, MX, AR, TR, TH, PH, US_CALIFORNIA top-level jurisdictions added; EU member-state sub-regulator blocks added for Germany (BSI), France (ANSSI), Spain (AEPD + AESIA), Italy (ACN + AgID); EU-level technical body ENISA added as cross-cutting reference. v1.2.0 expansion: IL, CH, HK, TW, ID, VN, US_NYDFS added; JP expanded with APPI/PPC, FISC, NISC, METI, Economic Security Promotion Act, AI Strategy Council guidance. v1.1.0 expansion: BR, CN, ZA, AE, SA, NZ, KR, CL added; IN and CA enriched with data-protection law entries (DPDPA, Quebec Law 25, PIPEDA).",
|
|
7
|
+
"tlp": "CLEAR",
|
|
8
|
+
"source_confidence": {
|
|
9
|
+
"scheme": "Admiralty (A-F + 1-6)",
|
|
10
|
+
"default": "A1",
|
|
11
|
+
"note": "B = usually reliable; 2 = probably true. Per-entry overrides via entry-level source_confidence field. Public-record catalogs (NVD, ATLAS, CWE, RFC, framework publishers) get A1 (completely reliable, confirmed). Project-curated catalogs (zeroday-lessons, exploit-availability) default to B2 with source citations."
|
|
12
|
+
},
|
|
13
|
+
"freshness_policy": {
|
|
14
|
+
"default_review_cadence_days": 90,
|
|
15
|
+
"stale_after_days": 180,
|
|
16
|
+
"rebuild_after_days": 365,
|
|
17
|
+
"note": "Per-entry last_verified governs decay. Skills depending on this catalog must check entry freshness before high-stakes use."
|
|
18
|
+
}
|
|
19
|
+
},
|
|
20
|
+
"EU": {
|
|
21
|
+
"jurisdiction": "European Union",
|
|
22
|
+
"frameworks": {
|
|
23
|
+
"GDPR": {
|
|
24
|
+
"full_name": "General Data Protection Regulation",
|
|
25
|
+
"authority": "European Data Protection Board (EDPB)",
|
|
26
|
+
"source": "https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32016R0679",
|
|
27
|
+
"effective_date": "2018-05-25",
|
|
28
|
+
"version": "2016/679",
|
|
29
|
+
"security_article": "Article 32 — Security of Processing",
|
|
30
|
+
"patch_sla": null,
|
|
31
|
+
"notification_sla": 72,
|
|
32
|
+
"notification_trigger": "Personal data breach affecting data subject rights",
|
|
33
|
+
"critical_controls": [
|
|
34
|
+
"Art. 32 — appropriate technical and organizational measures",
|
|
35
|
+
"Art. 33 — 72-hour breach notification to supervisory authority",
|
|
36
|
+
"Art. 34 — direct notification to affected individuals when high risk"
|
|
37
|
+
],
|
|
38
|
+
"framework_gaps": [
|
|
39
|
+
"Art. 32 'appropriate measures' is undefined — no technical specification",
|
|
40
|
+
"Patch management not explicitly required",
|
|
41
|
+
"AI/ML systems: no specific Art. 32 guidance for model security",
|
|
42
|
+
"Prompt injection is not a recognized Art. 32 risk category"
|
|
43
|
+
],
|
|
44
|
+
"ai_coverage": "GDPR applies to AI processing personal data; no specific AI security requirements beyond Art. 32",
|
|
45
|
+
"pqc_coverage": "No PQC requirement; encryption 'appropriate' is undefined",
|
|
46
|
+
"theater_risk": "medium — broad language allows checkbox compliance"
|
|
47
|
+
},
|
|
48
|
+
"NIS2": {
|
|
49
|
+
"full_name": "Network and Information Security Directive 2",
|
|
50
|
+
"authority": "ENISA + Member State NCAs",
|
|
51
|
+
"source": "https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32022L2555",
|
|
52
|
+
"effective_date": "2024-10-17",
|
|
53
|
+
"version": "2022/2555",
|
|
54
|
+
"security_article": "Article 21 — Cybersecurity Risk Management Measures",
|
|
55
|
+
"patch_sla": null,
|
|
56
|
+
"notification_sla": 24,
|
|
57
|
+
"notification_trigger": "Significant incident (substantial impact on service provision)",
|
|
58
|
+
"notification_stages": {
|
|
59
|
+
"early_warning": "24h — initial notification to NCA",
|
|
60
|
+
"incident_notification": "72h — significant incident report",
|
|
61
|
+
"final_report": "P+30 days — full post-incident report"
|
|
62
|
+
},
|
|
63
|
+
"critical_controls": [
|
|
64
|
+
"Art. 21(2)(a) — policies on risk analysis and information system security",
|
|
65
|
+
"Art. 21(2)(b) — incident handling",
|
|
66
|
+
"Art. 21(2)(e) — supply chain security",
|
|
67
|
+
"Art. 21(2)(h) — cryptography and encryption",
|
|
68
|
+
"Art. 21(2)(i) — human resources security and access control"
|
|
69
|
+
],
|
|
70
|
+
"framework_gaps": [
|
|
71
|
+
"Art. 21 patch SLA undefined — no required remediation timeline",
|
|
72
|
+
"Supply chain: MCP servers and AI tool plugins not contemplated",
|
|
73
|
+
"Cryptography: 'state of the art' acknowledged but no PQC deadline",
|
|
74
|
+
"AI systems: not explicitly scoped as NIS2 critical infrastructure in most implementations"
|
|
75
|
+
],
|
|
76
|
+
"ai_coverage": "AI systems may be in scope if classified as essential/important entity; no AI-specific security measures",
|
|
77
|
+
"pqc_coverage": "Art. 21(2)(h) — encryption required; 'state of the art' standard but no PQC deadline",
|
|
78
|
+
"theater_risk": "medium-high — requirements are substantive but patch SLA gap is critical"
|
|
79
|
+
},
|
|
80
|
+
"DORA": {
|
|
81
|
+
"full_name": "Digital Operational Resilience Act",
|
|
82
|
+
"authority": "ESAs (EBA, EIOPA, ESMA)",
|
|
83
|
+
"source": "https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32022R2554",
|
|
84
|
+
"effective_date": "2025-01-17",
|
|
85
|
+
"version": "2022/2554",
|
|
86
|
+
"sector": "Financial services",
|
|
87
|
+
"security_article": "Articles 9-14 — ICT Risk Management",
|
|
88
|
+
"patch_sla": null,
|
|
89
|
+
"notification_sla": 4,
|
|
90
|
+
"notification_trigger": "Major ICT-related incident (RTO/RPO breach, high financial impact, reputational damage)",
|
|
91
|
+
"critical_controls": [
|
|
92
|
+
"Art. 9 — ICT risk management framework",
|
|
93
|
+
"Art. 10 — identification of ICT assets and dependencies",
|
|
94
|
+
"Art. 11 — ICT business continuity",
|
|
95
|
+
"Art. 19 — major incident classification and reporting (4h initial, 24h intermediate, 30d final)",
|
|
96
|
+
"Art. 28-30 — ICT third-party risk (DORA extends to all ICT providers including cloud)"
|
|
97
|
+
],
|
|
98
|
+
"framework_gaps": [
|
|
99
|
+
"Patch SLA not specified — risk-based interpretation required",
|
|
100
|
+
"AI/ML systems in scope but no AI-specific controls",
|
|
101
|
+
"MCP servers: 'ICT third-party service providers' may apply but no specific guidance",
|
|
102
|
+
"PQC: not addressed; 'appropriate level of security' standard"
|
|
103
|
+
],
|
|
104
|
+
"ai_coverage": "AI systems providing ICT services to financial entities are in scope as ICT third-party service providers",
|
|
105
|
+
"pqc_coverage": "Implicit in Art. 9 risk management; no explicit requirement",
|
|
106
|
+
"theater_risk": "low-medium — DORA has strong third-party oversight; patching gap remains"
|
|
107
|
+
},
|
|
108
|
+
"EU_AI_ACT": {
|
|
109
|
+
"full_name": "EU Artificial Intelligence Act",
|
|
110
|
+
"authority": "EU AI Office + National Market Surveillance Authorities",
|
|
111
|
+
"source": "https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32024R1689",
|
|
112
|
+
"effective_date": "2024-08-01",
|
|
113
|
+
"full_application_date": "2026-08-01",
|
|
114
|
+
"version": "2024/1689",
|
|
115
|
+
"security_article": "Article 9 — Risk Management System (High-Risk AI)",
|
|
116
|
+
"critical_controls": [
|
|
117
|
+
"Art. 9 — mandatory risk management system for high-risk AI (ongoing, not one-time)",
|
|
118
|
+
"Art. 10 — data governance requirements for training/validation/testing data",
|
|
119
|
+
"Art. 12 — technical documentation and logging requirements",
|
|
120
|
+
"Art. 15 — accuracy, robustness, and cybersecurity requirements for high-risk AI",
|
|
121
|
+
"Art. 72 — GPAI model adversarial testing requirements"
|
|
122
|
+
],
|
|
123
|
+
"high_risk_categories": [
|
|
124
|
+
"Biometric identification",
|
|
125
|
+
"Critical infrastructure management",
|
|
126
|
+
"Employment/recruitment decisions",
|
|
127
|
+
"Education access decisions",
|
|
128
|
+
"Law enforcement applications",
|
|
129
|
+
"Migration/asylum/border control",
|
|
130
|
+
"Justice/democratic process"
|
|
131
|
+
],
|
|
132
|
+
"framework_gaps": [
|
|
133
|
+
"Art. 15 'cybersecurity' is undefined — no technical specification",
|
|
134
|
+
"Prompt injection not addressed in Art. 15 or implementing measures",
|
|
135
|
+
"Supply chain security for GPAI models: Art. 72 adversarial testing but no signing requirements",
|
|
136
|
+
"MCP servers/agent tools: not contemplated in implementing regulations"
|
|
137
|
+
],
|
|
138
|
+
"ai_coverage": "Specific AI security requirements for high-risk AI and GPAI models — most complete AI security framework globally",
|
|
139
|
+
"pqc_coverage": "Not addressed",
|
|
140
|
+
"theater_risk": "unknown — implementing measures still developing as of 2026-05"
|
|
141
|
+
},
|
|
142
|
+
"EU_CRA": {
|
|
143
|
+
"full_name": "EU Cyber Resilience Act",
|
|
144
|
+
"authority": "ENISA + National Market Surveillance Authorities",
|
|
145
|
+
"source": "https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32024R2847",
|
|
146
|
+
"effective_date": "2024-12-10",
|
|
147
|
+
"full_application_date": "2027-12-11",
|
|
148
|
+
"version": "2024/2847",
|
|
149
|
+
"sector": "Products with digital elements (hardware + software)",
|
|
150
|
+
"critical_controls": [
|
|
151
|
+
"Art. 13 — security by design and default obligations",
|
|
152
|
+
"Art. 14 — vulnerability handling obligations",
|
|
153
|
+
"Art. 16 — 24-hour notification for actively exploited vulnerabilities",
|
|
154
|
+
"Annex I — essential cybersecurity requirements (patch delivery, secure updates, secure defaults)"
|
|
155
|
+
],
|
|
156
|
+
"patch_sla": null,
|
|
157
|
+
"notification_sla": 24,
|
|
158
|
+
"notification_trigger": "Actively exploited vulnerability discovered in the product",
|
|
159
|
+
"framework_gaps": [
|
|
160
|
+
"Patch delivery SLA: product must support patching but no required timeline for customers",
|
|
161
|
+
"AI components in products: no AI-specific security requirements beyond general CRA",
|
|
162
|
+
"MCP servers as 'products with digital elements': legal status unclear under CRA"
|
|
163
|
+
],
|
|
164
|
+
"ai_coverage": "AI software products are subject to CRA; no AI-specific security requirements",
|
|
165
|
+
"pqc_coverage": "Not explicitly required; 'state of the art' standard",
|
|
166
|
+
"theater_risk": "medium — notification requirement is strong; customer-side patching gap remains"
|
|
167
|
+
}
|
|
168
|
+
}
|
|
169
|
+
},
|
|
170
|
+
"UK": {
|
|
171
|
+
"jurisdiction": "United Kingdom",
|
|
172
|
+
"frameworks": {
|
|
173
|
+
"CYBER_ESSENTIALS": {
|
|
174
|
+
"full_name": "Cyber Essentials",
|
|
175
|
+
"authority": "NCSC",
|
|
176
|
+
"source": "https://www.ncsc.gov.uk/cyberessentials/overview",
|
|
177
|
+
"effective_date": "2014-06-01",
|
|
178
|
+
"version": "Montpelier (2023)",
|
|
179
|
+
"patch_sla": 336,
|
|
180
|
+
"patch_sla_note": "14 days for critical patches (internet-facing). Better than NIST 30-day, worse than ASD 48h.",
|
|
181
|
+
"critical_controls": [
|
|
182
|
+
"Firewalls — boundary protection and device-level firewall",
|
|
183
|
+
"Secure Configuration — remove or disable unnecessary accounts and software",
|
|
184
|
+
"User Access Control — principle of least privilege",
|
|
185
|
+
"Malware Protection — anti-malware for all devices",
|
|
186
|
+
"Patch Management — 14-day critical patch SLA for internet-facing systems"
|
|
187
|
+
],
|
|
188
|
+
"framework_gaps": [
|
|
189
|
+
"14-day patch SLA still too long for CISA KEV + deterministic PoC class",
|
|
190
|
+
"No AI system security requirements",
|
|
191
|
+
"No MCP/agent trust requirements",
|
|
192
|
+
"No PQC requirements",
|
|
193
|
+
"No supply chain security beyond basic vendor controls"
|
|
194
|
+
],
|
|
195
|
+
"ai_coverage": "None",
|
|
196
|
+
"pqc_coverage": "None — NCSC PQC guidance is advisory, not Cyber Essentials requirement",
|
|
197
|
+
"theater_risk": "high — certification is binary pass/fail; 14-day SLA accepted as sufficient"
|
|
198
|
+
},
|
|
199
|
+
"NCSC_CAF": {
|
|
200
|
+
"full_name": "NCSC Cyber Assessment Framework",
|
|
201
|
+
"authority": "NCSC",
|
|
202
|
+
"source": "https://www.ncsc.gov.uk/collection/caf",
|
|
203
|
+
"effective_date": "2019-01-01",
|
|
204
|
+
"version": "3.2",
|
|
205
|
+
"sector": "Critical national infrastructure",
|
|
206
|
+
"patch_sla": null,
|
|
207
|
+
"notification_sla": null,
|
|
208
|
+
"critical_controls": [
|
|
209
|
+
"A1 — Governance — board-level cyber risk ownership",
|
|
210
|
+
"B3 — Identity and Access Control",
|
|
211
|
+
"B5 — Resilient Networks and Systems",
|
|
212
|
+
"B6 — Staff Awareness and Training",
|
|
213
|
+
"C1 — Security Monitoring",
|
|
214
|
+
"D1 — Response and Recovery"
|
|
215
|
+
],
|
|
216
|
+
"framework_gaps": [
|
|
217
|
+
"Patch SLA undefined — 'timely' interpretation only",
|
|
218
|
+
"AI systems: not addressed in CAF 3.2",
|
|
219
|
+
"MCP/agent trust: not addressed",
|
|
220
|
+
"PQC: NCSC recommends hybrid post-quantum but CAF does not require it"
|
|
221
|
+
],
|
|
222
|
+
"ai_coverage": "AI systems in CNI recommended to apply CAF; no AI-specific objectives",
|
|
223
|
+
"pqc_coverage": "NCSC has published PQC migration guidance but it is not CAF-required",
|
|
224
|
+
"theater_risk": "medium — outcome-based framework reduces checkbox risk but lacks AI specificity"
|
|
225
|
+
}
|
|
226
|
+
}
|
|
227
|
+
},
|
|
228
|
+
"AU": {
|
|
229
|
+
"jurisdiction": "Australia",
|
|
230
|
+
"frameworks": {
|
|
231
|
+
"ASD_ISM": {
|
|
232
|
+
"full_name": "Australian Signals Directorate Information Security Manual",
|
|
233
|
+
"authority": "Australian Signals Directorate (ASD)",
|
|
234
|
+
"source": "https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/ism",
|
|
235
|
+
"effective_date": "Monthly updates",
|
|
236
|
+
"version": "2026-03",
|
|
237
|
+
"patch_sla": 48,
|
|
238
|
+
"patch_sla_note": "ISM-1623: 48h for critical with existing exploit. Best non-CISA-aware SLA of any major framework.",
|
|
239
|
+
"critical_controls": [
|
|
240
|
+
"ISM-1623 — Critical patches with exploits: 48h remediation",
|
|
241
|
+
"ISM-1754 — Patches with existing exploit for extreme risk: emergency patching",
|
|
242
|
+
"ISM-1698 — Application control (allowlisting)",
|
|
243
|
+
"ISM-0974 — Multi-factor authentication",
|
|
244
|
+
"ISM-1585 — Privileged access workstations"
|
|
245
|
+
],
|
|
246
|
+
"framework_gaps": [
|
|
247
|
+
"ISM-1623 48h SLA still too long for CISA KEV + deterministic 732-byte PoC",
|
|
248
|
+
"Live kernel patching: not a required capability",
|
|
249
|
+
"AI/ML systems: no ISM controls specifically for AI security",
|
|
250
|
+
"MCP server trust: not addressed",
|
|
251
|
+
"PQC: under development; quantum computing risk guidance exists but no mandate"
|
|
252
|
+
],
|
|
253
|
+
"ai_coverage": "AI systems recommended to apply ISM; no AI-specific controls as of 2026-03",
|
|
254
|
+
"pqc_coverage": "ASD Quantum computing risks guidance published; ISM controls not yet updated with PQC mandate",
|
|
255
|
+
"theater_risk": "low — ISM is prescriptive and specific; 48h SLA is substantive"
|
|
256
|
+
},
|
|
257
|
+
"ESSENTIAL_8": {
|
|
258
|
+
"full_name": "ASD Essential Eight",
|
|
259
|
+
"authority": "Australian Signals Directorate (ASD)",
|
|
260
|
+
"source": "https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight",
|
|
261
|
+
"effective_date": "2017-06-01",
|
|
262
|
+
"version": "2023-11 (Maturity Level 3)",
|
|
263
|
+
"patch_sla": 48,
|
|
264
|
+
"patch_sla_note": "Maturity Level 3 — 48h for extreme risk. ML1 = 1 month, ML2 = 2 weeks, ML3 = 48h.",
|
|
265
|
+
"critical_controls": [
|
|
266
|
+
"Application Control — allowlisting approved applications",
|
|
267
|
+
"Patch Applications — 48h extreme risk, 2w high risk (ML3)",
|
|
268
|
+
"Configure Microsoft Office Macro Settings",
|
|
269
|
+
"User Application Hardening — browser security",
|
|
270
|
+
"Restrict Admin Privileges",
|
|
271
|
+
"Patch Operating Systems — 48h extreme risk (ML3)",
|
|
272
|
+
"Multi-factor Authentication",
|
|
273
|
+
"Regular Backups"
|
|
274
|
+
],
|
|
275
|
+
"framework_gaps": [
|
|
276
|
+
"E8 Maturity Level 3 48h SLA: still insufficient for CISA KEV + deterministic public PoC",
|
|
277
|
+
"AI/ML: not in Essential Eight",
|
|
278
|
+
"MCP/agent trust: not in Essential Eight",
|
|
279
|
+
"PQC: not in Essential Eight",
|
|
280
|
+
"Supply chain: not specifically addressed"
|
|
281
|
+
],
|
|
282
|
+
"ai_coverage": "None",
|
|
283
|
+
"pqc_coverage": "None",
|
|
284
|
+
"theater_risk": "medium — maturity levels create real progression; but AI/MCP gaps are total"
|
|
285
|
+
},
|
|
286
|
+
"APRA_CPS234": {
|
|
287
|
+
"full_name": "APRA Prudential Standard CPS 234 Information Security",
|
|
288
|
+
"authority": "Australian Prudential Regulation Authority (APRA)",
|
|
289
|
+
"source": "https://www.apra.gov.au/sites/default/files/cps_234_july_2019_for_public_release.pdf",
|
|
290
|
+
"effective_date": "2019-07-01",
|
|
291
|
+
"version": "2019",
|
|
292
|
+
"sector": "Financial services (ADIs, general insurers, life insurers, RSE licensees)",
|
|
293
|
+
"patch_sla": null,
|
|
294
|
+
"notification_sla": 72,
|
|
295
|
+
"notification_trigger": "Material information security incident",
|
|
296
|
+
"critical_controls": [
|
|
297
|
+
"Para 15 — Information asset classification",
|
|
298
|
+
"Para 16 — Controls implementation commensurate with criticality",
|
|
299
|
+
"Para 21 — Internal audit of information security capability",
|
|
300
|
+
"Para 23 — Third-party provider information security obligations",
|
|
301
|
+
"Para 26 — Notify APRA within 72h of material incident"
|
|
302
|
+
],
|
|
303
|
+
"framework_gaps": [
|
|
304
|
+
"Patch SLA: undefined — 'appropriate controls' standard",
|
|
305
|
+
"AI systems: no CPS 234 guidance for ML model security",
|
|
306
|
+
"MCP/agent trust: not addressed",
|
|
307
|
+
"PQC: not addressed"
|
|
308
|
+
],
|
|
309
|
+
"ai_coverage": "AI systems subject to CPS 234 as information assets; no AI-specific requirements",
|
|
310
|
+
"pqc_coverage": "Not addressed; crypto standards reference only",
|
|
311
|
+
"theater_risk": "medium — third-party obligations are strong; technical specificity low"
|
|
312
|
+
}
|
|
313
|
+
}
|
|
314
|
+
},
|
|
315
|
+
"SG": {
|
|
316
|
+
"jurisdiction": "Singapore",
|
|
317
|
+
"frameworks": {
|
|
318
|
+
"MAS_TRM": {
|
|
319
|
+
"full_name": "MAS Technology Risk Management Guidelines",
|
|
320
|
+
"authority": "Monetary Authority of Singapore (MAS)",
|
|
321
|
+
"source": "https://www.mas.gov.sg/regulation/guidelines/technology-risk-management-guidelines",
|
|
322
|
+
"effective_date": "2021-01-18",
|
|
323
|
+
"version": "2021",
|
|
324
|
+
"sector": "Financial institutions regulated by MAS",
|
|
325
|
+
"patch_sla": 720,
|
|
326
|
+
"patch_sla_note": "1 month for critical patches — same PCI problem. Risk-based timeline in practice.",
|
|
327
|
+
"notification_sla": 2,
|
|
328
|
+
"notification_trigger": "Significant IT disruption (> 30min customer impact), security breach",
|
|
329
|
+
"notification_notes": "2-hour notification to MAS is fastest mandatory notification globally (tied with CSA CCoP)",
|
|
330
|
+
"critical_controls": [
|
|
331
|
+
"Sec 11.2 — System patch management (1-month critical SLA)",
|
|
332
|
+
"Sec 13 — Cyber incident management (2-hour notification)",
|
|
333
|
+
"Sec 12.2 — Cryptography management",
|
|
334
|
+
"Sec 9.1 — Third-party risk management"
|
|
335
|
+
],
|
|
336
|
+
"framework_gaps": [
|
|
337
|
+
"1-month critical patch SLA: exploitation acceptance window for KEV + deterministic PoC",
|
|
338
|
+
"AI/ML: Sec 7 discusses AI governance but no AI security controls",
|
|
339
|
+
"MCP/agent trust: not addressed",
|
|
340
|
+
"PQC: not required; cryptography guidance is algorithm-agnostic"
|
|
341
|
+
],
|
|
342
|
+
"ai_coverage": "MAS has published AI governance principles; TRM 2021 does not include AI-specific security controls",
|
|
343
|
+
"pqc_coverage": "Not required; MAS Cryptography Advisory 2020 references NIST recommendations",
|
|
344
|
+
"theater_risk": "high for patching — 1-month SLA is the critical gap"
|
|
345
|
+
},
|
|
346
|
+
"CSA_CCOP": {
|
|
347
|
+
"full_name": "Cybersecurity Code of Practice for Critical Information Infrastructure",
|
|
348
|
+
"authority": "Cyber Security Agency of Singapore (CSA)",
|
|
349
|
+
"source": "https://www.csa.gov.sg/our-programmes/critical-information-infrastructure-protection/cybersecurity-code-of-practice",
|
|
350
|
+
"effective_date": "2022-01-01",
|
|
351
|
+
"version": "2022",
|
|
352
|
+
"sector": "Critical information infrastructure (CII) operators",
|
|
353
|
+
"patch_sla": null,
|
|
354
|
+
"notification_sla": 2,
|
|
355
|
+
"notification_trigger": "Cybersecurity incident affecting CII",
|
|
356
|
+
"critical_controls": [
|
|
357
|
+
"Section 5 — Asset management and classification",
|
|
358
|
+
"Section 7 — Vulnerability and patch management",
|
|
359
|
+
"Section 10 — Incident management (2-hour notification)"
|
|
360
|
+
],
|
|
361
|
+
"framework_gaps": [
|
|
362
|
+
"Patch SLA in Section 7 is risk-based, not time-bound for critical classes",
|
|
363
|
+
"AI/ML systems: not addressed",
|
|
364
|
+
"MCP/agent trust: not addressed"
|
|
365
|
+
],
|
|
366
|
+
"ai_coverage": "None",
|
|
367
|
+
"pqc_coverage": "None",
|
|
368
|
+
"theater_risk": "medium — outcome-oriented; 2h notification is genuinely fast"
|
|
369
|
+
}
|
|
370
|
+
}
|
|
371
|
+
},
|
|
372
|
+
"JP": {
|
|
373
|
+
"jurisdiction": "Japan",
|
|
374
|
+
"frameworks": {
|
|
375
|
+
"APPI": {
|
|
376
|
+
"full_name": "Act on the Protection of Personal Information (APPI, Act No. 57 of 2003)",
|
|
377
|
+
"authority": "Personal Information Protection Commission (PPC, 個人情報保護委員会)",
|
|
378
|
+
"source": "https://www.ppc.go.jp/en/legal/",
|
|
379
|
+
"effective_date": "2005-04-01",
|
|
380
|
+
"last_major_amendment": "2022-04-01",
|
|
381
|
+
"version": "Amended Act effective 2022-04-01 (further partial amendments in force 2023-04-01 for public-sector integration)",
|
|
382
|
+
"security_article": "Art. 23 — Security Control Action (安全管理措置); PPC Guidelines (General Rules) Chapter 3-4",
|
|
383
|
+
"patch_sla": null,
|
|
384
|
+
"notification_sla": null,
|
|
385
|
+
"notification_trigger": "Leak, loss, or damage of personal data likely to harm individual rights (specifically: special-care-required PI, breaches likely to cause financial damage, intentional acts, or >1,000 affected individuals)",
|
|
386
|
+
"notification_notes": "PPC Rules Art. 7: 'preliminary report' promptly (sokuhō, ~3-5 days in practice) and 'final report' within 30 days (60 days for intentional acts). Affected individuals to be notified without delay. This is statutory since 2022-04-01 amendment — prior regime was guideline-only.",
|
|
387
|
+
"critical_controls": [
|
|
388
|
+
"Art. 23 — Security control action: organisational, human, physical, and technical safeguards (4-pillar model per PPC Guidelines)",
|
|
389
|
+
"Art. 26 — Mandatory breach notification to PPC and affected individuals (post-2022 amendment)",
|
|
390
|
+
"Art. 28 — Cross-border transfer: opt-in consent + adequacy + supplementary measures (PPC Rules require pre-transfer information to data subject on recipient-country law)",
|
|
391
|
+
"Art. 16-2 — Restrictions on improper use of personal information (added 2022)",
|
|
392
|
+
"Art. 39 — Penalties: up to JPY 100M for legal entities (raised from JPY 500K in 2022 amendment)"
|
|
393
|
+
],
|
|
394
|
+
"framework_gaps": [
|
|
395
|
+
"Patch SLA: undefined — Art. 23 'necessary and appropriate' standard, no technical specification",
|
|
396
|
+
"Notification SLA: 'promptly' is undefined in days/hours — PPC practice ~3-5 days for preliminary report",
|
|
397
|
+
"AI systems: APPI applies to AI processing personal data; no AI-specific security controls",
|
|
398
|
+
"Prompt injection / MCP servers: not contemplated in PPC Guidelines",
|
|
399
|
+
"PQC: not addressed; cryptography is at controller's discretion"
|
|
400
|
+
],
|
|
401
|
+
"cross_reference_gdpr": {
|
|
402
|
+
"overlaps": [
|
|
403
|
+
"Japan-EU mutual adequacy decision (2019-01-23, renewed 2023) recognises APPI as providing essentially equivalent protection — only major non-EEA adequacy alongside UK and Korea",
|
|
404
|
+
"2022 amendment added breach notification, extraterritoriality, and stricter cross-border transfer rules, narrowing the GDPR delta"
|
|
405
|
+
],
|
|
406
|
+
"divergences": [
|
|
407
|
+
"Notification timeline 'promptly' (~3-5 days preliminary, 30-60 days final) is slower and less prescriptive than GDPR 72h",
|
|
408
|
+
"No equivalent of GDPR Art. 22 automated-decision-making right",
|
|
409
|
+
"Penalties capped at JPY 100M (~USD 670K) vs GDPR EUR 20M / 4% turnover — orders of magnitude lower",
|
|
410
|
+
"Special-care-required personal information categories are narrower than GDPR Art. 9 special categories (e.g., trade-union membership not enumerated)"
|
|
411
|
+
]
|
|
412
|
+
},
|
|
413
|
+
"ai_coverage": "APPI applies to AI training data and inference where personal information is processed; no AI-specific security controls",
|
|
414
|
+
"pqc_coverage": "Not addressed; CRYPTREC publishes recommended cipher list referenced by guidelines, no PQC mandate",
|
|
415
|
+
"theater_risk": "medium-high — 'necessary and appropriate' allows wide interpretation; PPC enforcement is improving post-2022 but penalty ceiling limits deterrence"
|
|
416
|
+
},
|
|
417
|
+
"METI_CYBERSECURITY": {
|
|
418
|
+
"full_name": "METI Cybersecurity Management Guidelines for Business Leadership",
|
|
419
|
+
"authority": "Ministry of Economy, Trade and Industry (METI)",
|
|
420
|
+
"source": "https://www.meti.go.jp/policy/netsecurity/mng_guide.html",
|
|
421
|
+
"effective_date": "2015-12-28",
|
|
422
|
+
"version": "3.0 (2023-03)",
|
|
423
|
+
"patch_sla": null,
|
|
424
|
+
"notification_sla": null,
|
|
425
|
+
"critical_controls": [
|
|
426
|
+
"Principle 5 — Identifying and understanding cyber risks",
|
|
427
|
+
"Principle 7 — Implementing countermeasures commensurate with risk",
|
|
428
|
+
"Principle 9 — Preparing for cyberattacks by continuously updating countermeasures",
|
|
429
|
+
"Principle 10 — Business continuity in the event of cyberattacks",
|
|
430
|
+
"Principle 12 — Ensuring security of business partners and supply chains"
|
|
431
|
+
],
|
|
432
|
+
"framework_gaps": [
|
|
433
|
+
"Patch SLA: undefined — risk management principle only",
|
|
434
|
+
"AI/ML: METI Guidelines 3.0 reference AI Governance Guidelines but include no AI-specific cyber controls",
|
|
435
|
+
"MCP/agent trust: not addressed",
|
|
436
|
+
"PQC: METI references CRYPTREC roadmap but no mandate"
|
|
437
|
+
],
|
|
438
|
+
"ai_coverage": "Companion document: METI/MIC 'AI Guidelines for Business v1.0' (2024-04) — non-binding; Cybersecurity Management Guidelines do not include AI-specific controls",
|
|
439
|
+
"pqc_coverage": "NICT and CRYPTREC have published PQC recommendations; METI guidelines do not mandate",
|
|
440
|
+
"theater_risk": "high — principle-based framework allows broad interpretation"
|
|
441
|
+
},
|
|
442
|
+
"FISC_GUIDELINES": {
|
|
443
|
+
"full_name": "FISC Security Guidelines on Computer Systems for Banking and Related Financial Institutions",
|
|
444
|
+
"authority": "Center for Financial Industry Information Systems (FISC, 金融情報システムセンター); JFSA references as de facto standard",
|
|
445
|
+
"source": "https://www.fisc.or.jp/publication/guideline/",
|
|
446
|
+
"effective_date": "1985 (initial); continuously updated",
|
|
447
|
+
"version": "v9 series (v9 Supplement Revised, 2024 update; v9.x as of 2026-05)",
|
|
448
|
+
"sector": "Banking and related financial institutions (de facto for FSA-supervised entities)",
|
|
449
|
+
"patch_sla": null,
|
|
450
|
+
"notification_sla": null,
|
|
451
|
+
"critical_controls": [
|
|
452
|
+
"Tech-1 to Tech-200+ — Technical safeguards (network segmentation, encryption, access control)",
|
|
453
|
+
"Ope-series — Operational controls (incident response, change management, patch management)",
|
|
454
|
+
"Org-series — Governance, third-party management, cloud risk",
|
|
455
|
+
"Cloud Computing supplement — JFSA-aligned cloud risk requirements",
|
|
456
|
+
"Contingency planning standards aligned with BOJ inspections"
|
|
457
|
+
],
|
|
458
|
+
"framework_gaps": [
|
|
459
|
+
"Patch SLA: not numerically pinned — risk-based, similar to MAS TRM in spirit but less prescriptive",
|
|
460
|
+
"AI/ML: v9 update added cloud and outsourcing guidance; AI-specific controls remain minimal",
|
|
461
|
+
"MCP/agent trust: not addressed",
|
|
462
|
+
"PQC: CRYPTREC referenced; no transition deadline"
|
|
463
|
+
],
|
|
464
|
+
"ai_coverage": "FISC v9 series references AI risk under outsourcing/third-party management; no AI-specific cyber controls",
|
|
465
|
+
"pqc_coverage": "Algorithm choices defer to CRYPTREC list; no PQC mandate",
|
|
466
|
+
"theater_risk": "low-medium — FISC is highly prescriptive technically; major gap is patch SLA and AI"
|
|
467
|
+
},
|
|
468
|
+
"NISC_CRITICAL_INFRA": {
|
|
469
|
+
"full_name": "Cybersecurity Policy for Critical Infrastructure Protection (4th Edition, NISC)",
|
|
470
|
+
"authority": "National center of Incident readiness and Strategy for Cybersecurity (NISC, 内閣サイバーセキュリティセンター)",
|
|
471
|
+
"source": "https://www.nisc.go.jp/eng/index.html",
|
|
472
|
+
"effective_date": "2022-06-17 (4th Edition); update cycle ongoing under Cybersecurity Strategy 2024-2027",
|
|
473
|
+
"version": "4th Edition (2022); aligned with Cybersecurity Strategy Cabinet Decision 2021-09-28",
|
|
474
|
+
"sector": "15 designated critical infrastructure sectors (finance, telecom, electricity, gas, water, railway, aviation, government services, medical, etc.)",
|
|
475
|
+
"patch_sla": null,
|
|
476
|
+
"notification_sla": null,
|
|
477
|
+
"critical_controls": [
|
|
478
|
+
"Risk management governance at executive level",
|
|
479
|
+
"Information sharing via sector-specific ISACs and NISC's CEPTOAR scheme",
|
|
480
|
+
"Incident response coordination via NISC and sectoral regulators",
|
|
481
|
+
"Supply chain risk management aligned with Economic Security Promotion Act"
|
|
482
|
+
],
|
|
483
|
+
"framework_gaps": [
|
|
484
|
+
"Notification SLA: not numerically pinned — discretionary sectoral reporting",
|
|
485
|
+
"AI in CI: 4th Edition does not specifically address AI as a CI dependency or attack surface",
|
|
486
|
+
"PQC: under Cybersecurity Strategy 2024 roadmap; no mandate"
|
|
487
|
+
],
|
|
488
|
+
"ai_coverage": "Not specifically addressed in 4th Edition; AI Strategy Council guidance handled separately",
|
|
489
|
+
"pqc_coverage": "Strategy-level acknowledgement; no operational mandate",
|
|
490
|
+
"theater_risk": "medium — outcome-oriented; depends on sectoral regulator translation"
|
|
491
|
+
},
|
|
492
|
+
"ECONOMIC_SECURITY_PROMOTION_ACT": {
|
|
493
|
+
"full_name": "Act on the Promotion of Ensuring National Security through Integrated Economic Measures (Economic Security Promotion Act, Act No. 43 of 2022)",
|
|
494
|
+
"authority": "Cabinet Office; Ministry of Internal Affairs and Communications (MIC), METI, MLIT and other sectoral ministers per designated sector",
|
|
495
|
+
"source": "https://www.cao.go.jp/keizai_anzen_hosho/",
|
|
496
|
+
"effective_date": "2022-05-18 (promulgation); pillars phased 2023-2024",
|
|
497
|
+
"version": "Act No. 43 of 2022",
|
|
498
|
+
"sector": "14 designated critical infrastructure sectors with pre-screening of 'specified critical equipment' procurement",
|
|
499
|
+
"critical_controls": [
|
|
500
|
+
"Pillar 1 — Supply chain resilience for specified critical materials (semiconductors, batteries, rare earths, pharmaceuticals)",
|
|
501
|
+
"Pillar 2 — Pre-installation review of specified critical infrastructure equipment (in force 2024-05-17)",
|
|
502
|
+
"Pillar 3 — Government-funded R&D for sensitive technologies",
|
|
503
|
+
"Pillar 4 — Patent non-disclosure for security-sensitive inventions"
|
|
504
|
+
],
|
|
505
|
+
"framework_gaps": [
|
|
506
|
+
"Patch SLA: not the focus; Act is structural rather than operational",
|
|
507
|
+
"Pre-installation review covers hardware/firmware supply chain but does not cover MCP-style software supply chain or AI model provenance",
|
|
508
|
+
"AI components: not enumerated as 'specified critical equipment' as of 2026-05"
|
|
509
|
+
],
|
|
510
|
+
"ai_coverage": "AI/ML systems may be in scope under sectoral designation; not directly enumerated",
|
|
511
|
+
"pqc_coverage": "Not addressed",
|
|
512
|
+
"theater_risk": "low — pre-installation review is a substantive procurement gate; scope gap in software supply chain remains"
|
|
513
|
+
},
|
|
514
|
+
"AI_STRATEGY_COUNCIL": {
|
|
515
|
+
"full_name": "Human-Centric AI Society Principles + AI Guidelines for Business v1.0 + Hiroshima AI Process",
|
|
516
|
+
"authority": "Cabinet Office AI Strategy Council (AI戦略会議); METI and MIC as joint AI Guidelines for Business publishers",
|
|
517
|
+
"source": "https://www.cas.go.jp/jp/seisaku/jinkouchinou/index.html",
|
|
518
|
+
"effective_date": "2019-03 (Society Principles); 2024-04 (AI Guidelines for Business v1.0); 2023-10 (Hiroshima AI Process G7 Code of Conduct)",
|
|
519
|
+
"version": "AI Guidelines for Business v1.0 (2024-04); Hiroshima AI Process Code of Conduct (2023-10)",
|
|
520
|
+
"critical_controls": [
|
|
521
|
+
"Human-Centric AI Society Principle 5 — Security: AI systems should be safe and secure throughout their lifecycle (non-binding)",
|
|
522
|
+
"AI Guidelines for Business — common guiding principles for developers, providers, and users including incident response and red-teaming for advanced foundation models",
|
|
523
|
+
"Hiroshima AI Process Code of Conduct — voluntary commitments by frontier model developers"
|
|
524
|
+
],
|
|
525
|
+
"framework_gaps": [
|
|
526
|
+
"Entire regime is non-binding — no statutory AI law as of 2026-05; LDP/Cabinet discussions on a Japanese AI Act ongoing",
|
|
527
|
+
"No mandatory adversarial testing equivalent to EU AI Act Art. 72",
|
|
528
|
+
"Prompt injection / MCP server risks: acknowledged in Guidelines, not mandated",
|
|
529
|
+
"No notification or patch SLAs"
|
|
530
|
+
],
|
|
531
|
+
"ai_coverage": "Voluntary AI governance; high-level principles only — Japan's deliberate 'soft law first' posture contrasts with EU AI Act hard-law approach",
|
|
532
|
+
"pqc_coverage": "Not addressed in AI guidelines",
|
|
533
|
+
"theater_risk": "high — voluntary regime depends on industry self-application"
|
|
534
|
+
}
|
|
535
|
+
}
|
|
536
|
+
},
|
|
537
|
+
"IN": {
|
|
538
|
+
"jurisdiction": "India",
|
|
539
|
+
"frameworks": {
|
|
540
|
+
"CERT_IN": {
|
|
541
|
+
"full_name": "CERT-In Information Security Directions",
|
|
542
|
+
"authority": "Computer Emergency Response Team — India (CERT-In)",
|
|
543
|
+
"source": "https://www.cert-in.org.in/PDF/CERT-In_Directions_70B_28.04.2022.pdf",
|
|
544
|
+
"effective_date": "2022-06-27",
|
|
545
|
+
"version": "2022 Directions (Section 70B)",
|
|
546
|
+
"patch_sla": null,
|
|
547
|
+
"notification_sla": 6,
|
|
548
|
+
"notification_trigger": "Mandatory incident reporting categories (data breach, ransomware, website defacement, etc.)",
|
|
549
|
+
"notification_notes": "6-hour notification is the shortest mandatory window globally (faster than SG's 2h for specific categories)",
|
|
550
|
+
"critical_controls": [
|
|
551
|
+
"Mandatory 6-hour incident reporting for defined categories",
|
|
552
|
+
"Log retention: 180 days minimum (system, network, application logs)",
|
|
553
|
+
"Time synchronization to NTP servers traceable to NPL",
|
|
554
|
+
"Virtual asset service providers: mandatory KYC + transaction records"
|
|
555
|
+
],
|
|
556
|
+
"framework_gaps": [
|
|
557
|
+
"Patch management: not addressed — only incident reporting requirements",
|
|
558
|
+
"AI/ML security: not addressed",
|
|
559
|
+
"MCP/agent trust: not addressed",
|
|
560
|
+
"PQC: not addressed",
|
|
561
|
+
"Security controls beyond logging and notification: absent"
|
|
562
|
+
],
|
|
563
|
+
"ai_coverage": "None — CERT-In directions focus on incident reporting, not preventive controls",
|
|
564
|
+
"pqc_coverage": "None",
|
|
565
|
+
"theater_risk": "high — directions are narrow (reporting + logging); no substantive security controls"
|
|
566
|
+
},
|
|
567
|
+
"DPDPA": {
|
|
568
|
+
"full_name": "Digital Personal Data Protection Act, 2023",
|
|
569
|
+
"authority": "Data Protection Board of India (DPBI)",
|
|
570
|
+
"source": "https://www.meity.gov.in/static/uploads/2024/06/2bf1f0e9f04e6fb4f8fef35e82c42aa5.pdf",
|
|
571
|
+
"effective_date": "2023-08-11",
|
|
572
|
+
"full_application_date": "2025-01-01",
|
|
573
|
+
"version": "Act No. 22 of 2023",
|
|
574
|
+
"security_article": "Section 8(5) — Reasonable security safeguards",
|
|
575
|
+
"patch_sla": null,
|
|
576
|
+
"notification_sla": 72,
|
|
577
|
+
"notification_trigger": "Personal data breach affecting Data Principals",
|
|
578
|
+
"notification_notes": "DPDPA Section 8(6) requires breach notification to both the Data Protection Board and each affected Data Principal; Draft DPDP Rules 2025 specify timelines and a 72h initial window with extended detailed reporting.",
|
|
579
|
+
"critical_controls": [
|
|
580
|
+
"Sec. 4 — Lawful processing on consent or legitimate use basis",
|
|
581
|
+
"Sec. 6 — Consent must be free, specific, informed, unconditional, unambiguous",
|
|
582
|
+
"Sec. 8(4) — Data Fiduciary accountability for processors",
|
|
583
|
+
"Sec. 8(5) — Reasonable security safeguards to prevent personal data breach",
|
|
584
|
+
"Sec. 8(6) — Breach notification to Board and affected Data Principals",
|
|
585
|
+
"Sec. 9 — Processing of children's data: verifiable parental consent + no tracking/behavioural monitoring",
|
|
586
|
+
"Sec. 10 — Significant Data Fiduciary additional duties (DPO, audit, DPIA)",
|
|
587
|
+
"Sec. 16 — Cross-border transfers permitted except to countries specifically restricted by Central Government (negative list model — diverges from GDPR adequacy)"
|
|
588
|
+
],
|
|
589
|
+
"framework_gaps": [
|
|
590
|
+
"Sec. 8(5) 'reasonable security safeguards' is undefined — DPDP Rules 2025 reference encryption, access control, monitoring but no specific algorithm/SLA",
|
|
591
|
+
"Patch SLA: not addressed",
|
|
592
|
+
"AI/ML model security: not addressed; no automated decision-making rights equivalent to GDPR Art. 22",
|
|
593
|
+
"Negative-list cross-border model gives Central Government discretionary restriction power but no equivalent of GDPR Chapter V adequacy/SCC framework",
|
|
594
|
+
"Prompt injection / MCP / agent trust: not addressed",
|
|
595
|
+
"PQC: not addressed"
|
|
596
|
+
],
|
|
597
|
+
"cross_reference_gdpr": {
|
|
598
|
+
"overlaps": [
|
|
599
|
+
"Lawful basis + consent (DPDPA Sec. 6 ~ GDPR Art. 6/7)",
|
|
600
|
+
"Data Principal rights to access, correction, erasure (DPDPA Sec. 11-13 ~ GDPR Art. 15-17)",
|
|
601
|
+
"Breach notification duty (DPDPA Sec. 8(6) ~ GDPR Art. 33)",
|
|
602
|
+
"Children's data protections (DPDPA Sec. 9 ~ GDPR Art. 8)"
|
|
603
|
+
],
|
|
604
|
+
"divergences": [
|
|
605
|
+
"No 'legitimate interests' lawful basis (DPDPA limits to consent + statutorily-defined 'legitimate uses')",
|
|
606
|
+
"No data localisation default, but Sec. 16 negative-list mechanism replaces GDPR adequacy framework",
|
|
607
|
+
"No right to data portability",
|
|
608
|
+
"No right to object to automated decision-making (no DPDPA equivalent of GDPR Art. 22)",
|
|
609
|
+
"Penalties up to ₹250 crore per instance (~USD 30M) — fixed cap, not turnover-based as in GDPR",
|
|
610
|
+
"No statutory DPIA requirement except for Significant Data Fiduciaries"
|
|
611
|
+
]
|
|
612
|
+
},
|
|
613
|
+
"ai_coverage": "None — DPDPA does not contemplate AI-specific risks or automated decision rights",
|
|
614
|
+
"pqc_coverage": "None",
|
|
615
|
+
"theater_risk": "high — 'reasonable security safeguards' is undefined and rules-level guidance is still consolidating"
|
|
616
|
+
}
|
|
617
|
+
}
|
|
618
|
+
},
|
|
619
|
+
"CA": {
|
|
620
|
+
"jurisdiction": "Canada",
|
|
621
|
+
"frameworks": {
|
|
622
|
+
"OSFI_B10": {
|
|
623
|
+
"full_name": "OSFI Guideline B-10: Third-Party Risk Management",
|
|
624
|
+
"authority": "Office of the Superintendent of Financial Institutions (OSFI)",
|
|
625
|
+
"source": "https://www.osfi-bsif.gc.ca/en/guidance/guidance-library/third-party-risk-management-guideline",
|
|
626
|
+
"effective_date": "2023-05-01",
|
|
627
|
+
"version": "2023",
|
|
628
|
+
"sector": "Federally regulated financial institutions",
|
|
629
|
+
"patch_sla": null,
|
|
630
|
+
"notification_sla": 24,
|
|
631
|
+
"notification_trigger": "Technology or cyber incident with material operational impact",
|
|
632
|
+
"critical_controls": [
|
|
633
|
+
"Principle 1 — Board-level accountability for third-party risk",
|
|
634
|
+
"Principle 3 — Risk assessment before entering arrangements",
|
|
635
|
+
"Principle 5 — Contract requirements (security, audit rights, incident notification)",
|
|
636
|
+
"Technology incident reporting — 24h to OSFI for significant incidents"
|
|
637
|
+
],
|
|
638
|
+
"framework_gaps": [
|
|
639
|
+
"B-10 is third-party focused; own-system security controls not specified",
|
|
640
|
+
"Patch SLA: not addressed",
|
|
641
|
+
"AI/ML: OSFI has published AI model risk guidance (SR 11-7 equivalent) — security controls absent",
|
|
642
|
+
"MCP/agent trust: third-party AI tool plugins would be in scope as 'arrangements' under B-10",
|
|
643
|
+
"PQC: not addressed"
|
|
644
|
+
],
|
|
645
|
+
"ai_coverage": "OSFI expects FRFIs to manage AI model risk under existing guidelines; no B-10 AI-specific security controls",
|
|
646
|
+
"pqc_coverage": "Not addressed",
|
|
647
|
+
"theater_risk": "medium — third-party scope is real but own-system gaps remain"
|
|
648
|
+
},
|
|
649
|
+
"QC_LAW_25": {
|
|
650
|
+
"full_name": "Quebec Law 25 — An Act to modernize legislative provisions as regards the protection of personal information",
|
|
651
|
+
"authority": "Commission d'accès à l'information du Québec (CAI)",
|
|
652
|
+
"source": "https://www.legisquebec.gouv.qc.ca/en/document/cs/p-39.1",
|
|
653
|
+
"effective_date": "2023-09-22",
|
|
654
|
+
"full_application_date": "2024-09-22",
|
|
655
|
+
"version": "Chapter 25 of the Statutes of Québec 2021 (Bill 64)",
|
|
656
|
+
"sector": "All organisations holding personal information of Québec residents",
|
|
657
|
+
"patch_sla": null,
|
|
658
|
+
"notification_sla": null,
|
|
659
|
+
"notification_trigger": "Confidentiality incident presenting a 'risk of serious injury' must be reported to the CAI and affected individuals 'with diligence'",
|
|
660
|
+
"notification_notes": "Law 25 does not set a numeric hour SLA; CAI guidance interprets 'with diligence' as promptly after confirmation of risk of serious injury — typically days, not weeks. Incident register is mandatory regardless of severity.",
|
|
661
|
+
"critical_controls": [
|
|
662
|
+
"Sec. 3.1 — Mandatory Chief Privacy Officer (Person in Charge of Protection of Personal Information)",
|
|
663
|
+
"Sec. 3.3 — Privacy Impact Assessments required before any IT project involving personal information or cross-border transfer",
|
|
664
|
+
"Sec. 8.1 — Privacy by default for technological products and services with privacy settings",
|
|
665
|
+
"Sec. 17 — Cross-border transfers require adequacy assessment of the destination jurisdiction's legal framework",
|
|
666
|
+
"Sec. 28 — Right to data portability (in force 2024-09-22)",
|
|
667
|
+
"Sec. 63.5 — Mandatory confidentiality incident register and reporting to CAI when risk of serious injury",
|
|
668
|
+
"Sec. 65 — Administrative monetary penalties up to CAD 10M or 2% of worldwide turnover; penal up to CAD 25M or 4%"
|
|
669
|
+
],
|
|
670
|
+
"framework_gaps": [
|
|
671
|
+
"Patch SLA: not addressed; 'security measures appropriate to the sensitivity' standard",
|
|
672
|
+
"AI/ML systems: Sec. 12.1 grants right to be informed of automated decision-making and to request human review — no AI security controls",
|
|
673
|
+
"Prompt injection / MCP / agent trust: not addressed",
|
|
674
|
+
"PQC: not addressed; encryption strength only required to be 'reasonable in the circumstances'",
|
|
675
|
+
"Cross-border adequacy assessment is organisation-self-conducted — no public adequacy list"
|
|
676
|
+
],
|
|
677
|
+
"ai_coverage": "Sec. 12.1 automated decision transparency + human review right — procedural, not security-substantive",
|
|
678
|
+
"pqc_coverage": "Not addressed",
|
|
679
|
+
"theater_risk": "medium — penalties are real but 'with diligence' notification standard and self-assessed cross-border adequacy invite latitude"
|
|
680
|
+
},
|
|
681
|
+
"PIPEDA": {
|
|
682
|
+
"full_name": "Personal Information Protection and Electronic Documents Act",
|
|
683
|
+
"authority": "Office of the Privacy Commissioner of Canada (OPC)",
|
|
684
|
+
"source": "https://laws-lois.justice.gc.ca/eng/acts/p-8.6/",
|
|
685
|
+
"effective_date": "2001-01-01",
|
|
686
|
+
"version": "S.C. 2000, c. 5, consolidated; mandatory breach reporting in force 2018-11-01 via PIPEDA Breach of Security Safeguards Regulations",
|
|
687
|
+
"sector": "Private-sector organisations engaged in commercial activity outside Quebec (Quebec organisations covered by Law 25; Alberta + BC have substantially similar provincial PIPA statutes)",
|
|
688
|
+
"patch_sla": null,
|
|
689
|
+
"notification_sla": null,
|
|
690
|
+
"notification_trigger": "Breach of security safeguards involving personal information where it is reasonable to believe there is a 'real risk of significant harm'",
|
|
691
|
+
"notification_notes": "PIPEDA requires notification to OPC and affected individuals 'as soon as feasible' after determining real risk of significant harm — no fixed hour SLA. Breach records must be kept for 24 months.",
|
|
692
|
+
"critical_controls": [
|
|
693
|
+
"Principle 7 (Safeguards) — Schedule 1 cl. 4.7: physical, organisational, technological safeguards appropriate to sensitivity",
|
|
694
|
+
"Sec. 10.1 — Mandatory breach reporting to OPC for breaches posing real risk of significant harm",
|
|
695
|
+
"Sec. 10.1(3) — Mandatory notification to affected individuals",
|
|
696
|
+
"Sec. 10.3 — Mandatory breach record retention (24 months)",
|
|
697
|
+
"Sec. 5(3) — Purposes for collection, use, disclosure limited to those a reasonable person would consider appropriate"
|
|
698
|
+
],
|
|
699
|
+
"framework_gaps": [
|
|
700
|
+
"Sec. 10.1 timing: 'as soon as feasible' — no hour-bound SLA",
|
|
701
|
+
"Patch management: not addressed",
|
|
702
|
+
"AI/ML systems: PIPEDA does not address automated decision-making (Bill C-27 / AIDA stalled as of 2026-05)",
|
|
703
|
+
"MCP/agent trust: not addressed",
|
|
704
|
+
"PQC: not addressed",
|
|
705
|
+
"Penalty ceiling (CAD 100,000 per offence) is materially low vs Law 25 and GDPR"
|
|
706
|
+
],
|
|
707
|
+
"ai_coverage": "None at federal level; AIDA (Bill C-27) has not received Royal Assent as of 2026-05",
|
|
708
|
+
"pqc_coverage": "Not addressed; OPC has issued advisory guidance on cryptography but no mandate",
|
|
709
|
+
"theater_risk": "high — soft notification timing, low penalty ceiling, no AI controls, no technical specification of safeguards"
|
|
710
|
+
}
|
|
711
|
+
}
|
|
712
|
+
},
|
|
713
|
+
"BR": {
|
|
714
|
+
"jurisdiction": "Brazil",
|
|
715
|
+
"frameworks": {
|
|
716
|
+
"LGPD": {
|
|
717
|
+
"full_name": "Lei Geral de Proteção de Dados (Law No. 13,709/2018)",
|
|
718
|
+
"authority": "Autoridade Nacional de Proteção de Dados (ANPD)",
|
|
719
|
+
"source": "https://www.planalto.gov.br/ccivil_03/_ato2015-2018/2018/lei/l13709.htm",
|
|
720
|
+
"effective_date": "2020-08-01",
|
|
721
|
+
"enforcement_date": "2021-08-01",
|
|
722
|
+
"version": "Lei nº 13.709/2018 as amended by Lei nº 13.853/2019",
|
|
723
|
+
"security_article": "Art. 46 — Security measures for personal data processing",
|
|
724
|
+
"patch_sla": null,
|
|
725
|
+
"notification_sla": null,
|
|
726
|
+
"notification_trigger": "Security incident that may cause relevant risk or damage to data subjects",
|
|
727
|
+
"notification_notes": "Art. 48 requires controller to notify ANPD and data subjects in 'reasonable time' as defined by ANPD. ANPD Resolution CD/ANPD No. 15/2024 sets a 3-business-day (~72h) communication window for incidents presenting relevant risk or damage.",
|
|
728
|
+
"critical_controls": [
|
|
729
|
+
"Art. 6 — Ten processing principles incl. security, prevention, accountability",
|
|
730
|
+
"Art. 7 — Lawful basis for processing (10 enumerated bases — broader than GDPR's 6)",
|
|
731
|
+
"Art. 37 — Data processing records (RoPA equivalent) for controllers and processors",
|
|
732
|
+
"Art. 38 — Data Protection Impact Report (RIPD) on ANPD request",
|
|
733
|
+
"Art. 41 — Mandatory DPO (Encarregado) for controllers (limited exemptions per ANPD Resolution 2/2022)",
|
|
734
|
+
"Art. 46 — Technical and administrative security measures protecting data from unauthorized access and incidents",
|
|
735
|
+
"Art. 48 — Breach notification to ANPD and data subjects",
|
|
736
|
+
"Art. 50 — Good practices and governance programs",
|
|
737
|
+
"Art. 52 — Sanctions: up to 2% of Brazilian revenue per infraction capped at BRL 50M (per ANPD enforcement)"
|
|
738
|
+
],
|
|
739
|
+
"framework_gaps": [
|
|
740
|
+
"Art. 46 'technical and administrative measures' is undefined — ANPD has issued only orientation guides, not binding technical baselines",
|
|
741
|
+
"Patch SLA: not addressed",
|
|
742
|
+
"AI/ML: LGPD Art. 20 grants right to review automated decisions; ANPD pending sectoral AI regulation (PL 2338/2023 not yet enacted as of 2026-05)",
|
|
743
|
+
"Prompt injection / MCP / agent trust: not addressed",
|
|
744
|
+
"PQC: not addressed; ANPD cryptography guidance is non-binding"
|
|
745
|
+
],
|
|
746
|
+
"cross_reference_gdpr": {
|
|
747
|
+
"overlaps": [
|
|
748
|
+
"Lawful bases for processing largely mirror GDPR Art. 6",
|
|
749
|
+
"Data subject rights (access, correction, deletion, portability) mirror GDPR Art. 15-20",
|
|
750
|
+
"Breach notification duty (LGPD Art. 48 ~ GDPR Art. 33)",
|
|
751
|
+
"DPO designation (LGPD Art. 41 ~ GDPR Art. 37-39)",
|
|
752
|
+
"Cross-border transfer regime (LGPD Art. 33 ~ GDPR Chapter V)"
|
|
753
|
+
],
|
|
754
|
+
"divergences": [
|
|
755
|
+
"Ten lawful bases (LGPD) vs six (GDPR) — LGPD adds 'credit protection', 'health protection', 'regular exercise of rights'",
|
|
756
|
+
"No equivalent of GDPR Art. 22 absolute right to non-automated decisions (LGPD Art. 20 is a right to review, not opt-out)",
|
|
757
|
+
"Notification timing is 'reasonable time' (ANPD CD/ANPD 15/2024 ~ 3 business days) vs GDPR fixed 72h",
|
|
758
|
+
"Sanctions capped at 2% / BRL 50M per infraction vs GDPR 4% / EUR 20M global turnover",
|
|
759
|
+
"ANPD adequacy framework still under construction — Brazil itself was added to GDPR adequacy candidate list but no inbound adequacy decisions yet"
|
|
760
|
+
]
|
|
761
|
+
},
|
|
762
|
+
"ai_coverage": "Art. 20 right to review of automated decisions; substantive AI security controls absent",
|
|
763
|
+
"pqc_coverage": "Not addressed",
|
|
764
|
+
"theater_risk": "medium — ANPD enforcement is increasing but technical specificity remains low"
|
|
765
|
+
}
|
|
766
|
+
}
|
|
767
|
+
},
|
|
768
|
+
"CN": {
|
|
769
|
+
"jurisdiction": "China",
|
|
770
|
+
"frameworks": {
|
|
771
|
+
"PIPL": {
|
|
772
|
+
"full_name": "Personal Information Protection Law of the People's Republic of China",
|
|
773
|
+
"authority": "Cyberspace Administration of China (CAC) — co-regulating with MIIT, MPS, SAMR",
|
|
774
|
+
"source": "https://www.npc.gov.cn/npc/c30834/202108/a8c4e3672c74491a80b53a172bb753fe.shtml",
|
|
775
|
+
"effective_date": "2021-11-01",
|
|
776
|
+
"version": "Adopted 2021-08-20",
|
|
777
|
+
"security_article": "Art. 51 — Personal information processor security obligations",
|
|
778
|
+
"patch_sla": null,
|
|
779
|
+
"notification_sla": null,
|
|
780
|
+
"notification_trigger": "Personal information leak, tampering, or loss",
|
|
781
|
+
"notification_notes": "Art. 57: notify regulators and individuals 'immediately' (立即) upon discovering or suspecting an incident. CAC practice expects notification within 24-72h depending on severity tier; no fixed hour SLA in statute.",
|
|
782
|
+
"critical_controls": [
|
|
783
|
+
"Art. 5-9 — Processing principles (lawfulness, necessity, proportionality, openness, accuracy)",
|
|
784
|
+
"Art. 13 — Lawful bases: consent, contract, legal duty, public health emergency, news reporting, public-interest processing, statutory permission",
|
|
785
|
+
"Art. 28 — Sensitive personal information requires separate consent + necessity assessment",
|
|
786
|
+
"Art. 51 — Security obligations: internal management, classification, encryption/de-identification, access control, training, incident response",
|
|
787
|
+
"Art. 55-56 — Personal Information Protection Impact Assessment (PIPIA) required for sensitive PI, automated decision-making, cross-border, processor engagement",
|
|
788
|
+
"Art. 57 — Breach notification to authorities and individuals",
|
|
789
|
+
"Art. 58 — Large platform obligations: external supervisory body, platform rules, public social responsibility reporting"
|
|
790
|
+
],
|
|
791
|
+
"framework_gaps": [
|
|
792
|
+
"Art. 51 security measures are principle-level — implementing GB/T standards (e.g., GB/T 35273-2020 PI Security Specification, GB/T 39335-2020 PIPIA) provide detail but compliance to GB/T standards is not directly mandated by PIPL itself",
|
|
793
|
+
"Patch SLA: not in PIPL; MLPS 2.0 (Multi-Level Protection Scheme, GB/T 22239-2019) imposes patching at Level 3+ but does not state hours",
|
|
794
|
+
"AI/ML: Art. 24 governs automated decision transparency + opt-out for marketing; Interim Measures for Generative AI Services (2023-08-15, CAC) impose additional obligations on public-facing generative AI",
|
|
795
|
+
"Prompt injection: not explicitly addressed; AI-specific obligations in the 2023 Generative AI Measures focus on content compliance, not adversarial robustness",
|
|
796
|
+
"PQC: not addressed in PIPL; OSCCA/SCA promotes domestic SM2/SM3/SM4 algorithms"
|
|
797
|
+
],
|
|
798
|
+
"ai_coverage": "PIPL Art. 24 + 2023 Generative AI Interim Measures + 2024 Network Security Technical Requirements for Generative AI Services (TC260-003)",
|
|
799
|
+
"pqc_coverage": "Not addressed in PIPL; separate quantum cryptography initiatives under MIIT",
|
|
800
|
+
"theater_risk": "medium-high — substantive obligations exist but enforcement priorities are politically directed"
|
|
801
|
+
},
|
|
802
|
+
"DSL": {
|
|
803
|
+
"full_name": "Data Security Law of the People's Republic of China",
|
|
804
|
+
"authority": "CAC, MPS, MSS — sectoral regulators with national security coordination",
|
|
805
|
+
"source": "https://www.npc.gov.cn/npc/c30834/202106/7c9af12f51334a73b56d7938f99a788a.shtml",
|
|
806
|
+
"effective_date": "2021-09-01",
|
|
807
|
+
"version": "Adopted 2021-06-10",
|
|
808
|
+
"patch_sla": null,
|
|
809
|
+
"notification_sla": null,
|
|
810
|
+
"notification_trigger": "Data security incident; immediate disposal + notification to competent authority",
|
|
811
|
+
"critical_controls": [
|
|
812
|
+
"Art. 21 — Data classification and graded protection system (general / important / core data)",
|
|
813
|
+
"Art. 27 — Data processing risk monitoring and incident response",
|
|
814
|
+
"Art. 29 — Risk assessment and reporting for important data processors",
|
|
815
|
+
"Art. 30 — Periodic risk assessment reports to competent authorities for important data",
|
|
816
|
+
"Art. 31 — Cross-border transfer of important data subject to security assessment",
|
|
817
|
+
"Art. 36 — Data localization and government data export controls",
|
|
818
|
+
"Art. 45 — Sanctions up to RMB 10M + business suspension for core data violations"
|
|
819
|
+
],
|
|
820
|
+
"framework_gaps": [
|
|
821
|
+
"Definition of 'important data' is sector-specific and still being catalogued — TC260 and sectoral regulators publish industry-specific catalogues (e.g., 2024 automotive important data list)",
|
|
822
|
+
"Cross-border 'security assessment' under DSL + PIPL is the principal compliance burden; see CN_CROSS_BORDER",
|
|
823
|
+
"AI training data classification under DSL is unclear when sourced from public web scraping",
|
|
824
|
+
"Patch SLA: not in DSL; MLPS 2.0 separately"
|
|
825
|
+
],
|
|
826
|
+
"ai_coverage": "AI training corpora and model weights may qualify as 'important data' depending on sector — case-by-case determination",
|
|
827
|
+
"pqc_coverage": "Not addressed",
|
|
828
|
+
"theater_risk": "low-medium — sanctions are concrete; theater risk arises in 'important data' classification gaming"
|
|
829
|
+
},
|
|
830
|
+
"CSL": {
|
|
831
|
+
"full_name": "Cybersecurity Law of the People's Republic of China",
|
|
832
|
+
"authority": "CAC, MIIT, MPS",
|
|
833
|
+
"source": "https://www.npc.gov.cn/npc/c30834/201611/270b43e8b35e4f7ea98502b6f0e26f8a.shtml",
|
|
834
|
+
"effective_date": "2017-06-01",
|
|
835
|
+
"version": "Adopted 2016-11-07",
|
|
836
|
+
"patch_sla": null,
|
|
837
|
+
"notification_sla": null,
|
|
838
|
+
"critical_controls": [
|
|
839
|
+
"Art. 21 — Multi-Level Protection Scheme (MLPS) tiered cybersecurity obligations",
|
|
840
|
+
"Art. 25 — Incident response plans and immediate remediation duty",
|
|
841
|
+
"Art. 31 — Critical Information Infrastructure (CII) special protections",
|
|
842
|
+
"Art. 37 — CII operator data localization and cross-border security assessment",
|
|
843
|
+
"Art. 38 — Annual cybersecurity risk assessment for CII",
|
|
844
|
+
"Art. 41-44 — Personal information collection and use (now largely superseded by PIPL)"
|
|
845
|
+
],
|
|
846
|
+
"framework_gaps": [
|
|
847
|
+
"MLPS 2.0 (GB/T 22239-2019) provides technical baselines but patch SLA is risk-based",
|
|
848
|
+
"AI-specific controls absent — handled by sectoral CAC measures",
|
|
849
|
+
"MCP/agent trust: not addressed",
|
|
850
|
+
"PQC: not addressed; OSCCA mandates SM-series algorithms for certain sensitive contexts"
|
|
851
|
+
],
|
|
852
|
+
"ai_coverage": "None directly; CAC sectoral measures govern AI services",
|
|
853
|
+
"pqc_coverage": "Not addressed; commercial cryptography administration under separate OSCCA regime",
|
|
854
|
+
"theater_risk": "medium — MLPS provides concrete baselines but graded self-attestation invites theater at lower levels"
|
|
855
|
+
},
|
|
856
|
+
"CN_CROSS_BORDER": {
|
|
857
|
+
"full_name": "Cross-border data transfer regime (PIPL + DSL + CAC Measures)",
|
|
858
|
+
"authority": "Cyberspace Administration of China (CAC)",
|
|
859
|
+
"source": "https://www.cac.gov.cn/2023-02/24/c_1678884830036813.htm",
|
|
860
|
+
"effective_date": "2022-09-01",
|
|
861
|
+
"version": "CAC Security Assessment Measures (2022); CAC Standard Contract Measures (2023-06-01); Regulations on Promoting and Standardizing Cross-Border Data Flows (2024-03-22)",
|
|
862
|
+
"sector": "Any entity transferring personal information or important data from mainland China abroad",
|
|
863
|
+
"patch_sla": null,
|
|
864
|
+
"notification_sla": null,
|
|
865
|
+
"critical_controls": [
|
|
866
|
+
"CAC Security Assessment — required for: CII operators, important data exporters, processors of PI of >1M individuals, exporters of PI of >100K individuals or sensitive PI of >10K individuals cumulatively since 1 Jan of prior year",
|
|
867
|
+
"CAC Standard Contract (China SCC) — alternative path below assessment thresholds; filed with provincial CAC",
|
|
868
|
+
"PI Protection Certification — third path under TC260-PG-20222A standard",
|
|
869
|
+
"2024 Cross-Border Data Flow Regulations carve out exemptions: necessary for contract performance, HR, low-volume non-sensitive transfers under 100K individuals",
|
|
870
|
+
"Free Trade Zone negative-list mechanism — pilot zones publish negative lists; transfers off the list exempt"
|
|
871
|
+
],
|
|
872
|
+
"framework_gaps": [
|
|
873
|
+
"Differentiator vs GDPR: there is no adequacy concept — every outbound transfer requires one of three positive mechanisms regardless of destination",
|
|
874
|
+
"Important data outbound transfers always require Security Assessment (no SCC alternative)",
|
|
875
|
+
"Assessment review timeline officially 45 working days but in practice 3-6 months",
|
|
876
|
+
"Re-assessment required every 2 years or upon material change",
|
|
877
|
+
"AI training data exports involving PI of Chinese subjects fall within the regime regardless of where the model is trained"
|
|
878
|
+
],
|
|
879
|
+
"ai_coverage": "AI model training data containing Chinese PI is subject to one of the three mechanisms; outbound model weights derived from important data also captured",
|
|
880
|
+
"pqc_coverage": "Not addressed",
|
|
881
|
+
"theater_risk": "low — mechanism is procedural and binding; theater risk is misclassification of data sensitivity to avoid the higher mechanism"
|
|
882
|
+
}
|
|
883
|
+
}
|
|
884
|
+
},
|
|
885
|
+
"ZA": {
|
|
886
|
+
"jurisdiction": "South Africa",
|
|
887
|
+
"frameworks": {
|
|
888
|
+
"POPIA": {
|
|
889
|
+
"full_name": "Protection of Personal Information Act, 2013",
|
|
890
|
+
"authority": "Information Regulator (South Africa)",
|
|
891
|
+
"source": "https://www.gov.za/sites/default/files/gcis_document/201409/3706726-11act4of2013popi.pdf",
|
|
892
|
+
"effective_date": "2020-07-01",
|
|
893
|
+
"full_enforcement_date": "2021-07-01",
|
|
894
|
+
"version": "Act No. 4 of 2013",
|
|
895
|
+
"security_article": "Sec. 19 — Security safeguards (Condition 7)",
|
|
896
|
+
"patch_sla": null,
|
|
897
|
+
"notification_sla": null,
|
|
898
|
+
"notification_trigger": "Compromise of personal information where reasonable grounds to believe the information has been accessed or acquired by unauthorised person",
|
|
899
|
+
"notification_notes": "Sec. 22 requires notification to the Information Regulator and data subject 'as soon as reasonably possible' after discovery; the Regulator's eServices portal is the official channel. No fixed hour SLA in statute; Regulator practice indicates within 72h where feasible.",
|
|
900
|
+
"critical_controls": [
|
|
901
|
+
"Condition 1 (Sec. 8) — Accountability of the responsible party",
|
|
902
|
+
"Condition 2 (Sec. 9-12) — Processing limitation: lawfulness, minimality, consent/justification",
|
|
903
|
+
"Condition 7 (Sec. 19) — Security safeguards: identify risks, establish controls, regularly verify, update",
|
|
904
|
+
"Condition 7 (Sec. 20-21) — Operator (processor) obligations and written contract",
|
|
905
|
+
"Sec. 22 — Notification of security compromises",
|
|
906
|
+
"Sec. 57 — Prior authorisation by Regulator for certain processing (e.g., unique identifiers, criminal behaviour, credit reporting, cross-border transfer of children's data)",
|
|
907
|
+
"Sec. 72 — Transborder information flow restrictions: recipient must be subject to law/binding rules providing adequate protection, or data subject consents, or transfer necessary"
|
|
908
|
+
],
|
|
909
|
+
"framework_gaps": [
|
|
910
|
+
"Sec. 19 'reasonable technical and organisational measures' is undefined — Regulator has issued guidance notes but no binding technical baseline",
|
|
911
|
+
"Patch SLA: not addressed",
|
|
912
|
+
"AI/ML systems: Sec. 71 covers automated decision-making (limited prohibition unless safeguards exist); no AI security requirements",
|
|
913
|
+
"Prompt injection / MCP / agent trust: not addressed",
|
|
914
|
+
"PQC: not addressed",
|
|
915
|
+
"Penalty: administrative fines up to ZAR 10M; criminal up to 10 years imprisonment — penalty ceiling is low by international comparison"
|
|
916
|
+
],
|
|
917
|
+
"ai_coverage": "Sec. 71 automated decision-making protections (procedural); no AI security controls",
|
|
918
|
+
"pqc_coverage": "Not addressed",
|
|
919
|
+
"theater_risk": "high — 'reasonable measures' is undefined and Regulator enforcement capacity is constrained"
|
|
920
|
+
}
|
|
921
|
+
}
|
|
922
|
+
},
|
|
923
|
+
"AE": {
|
|
924
|
+
"jurisdiction": "United Arab Emirates",
|
|
925
|
+
"frameworks": {
|
|
926
|
+
"UAE_PDPL": {
|
|
927
|
+
"full_name": "Federal Decree-Law No. 45 of 2021 Regarding the Protection of Personal Data",
|
|
928
|
+
"authority": "UAE Data Office (Federal); TDRA coordinates digital sector; sectoral regulators apply in finance, health",
|
|
929
|
+
"source": "https://u.ae/-/media/Documents-2022/Federal-Decree-Law-No-45-of-2021-Regarding-the-Protection-of-Personal-Data-Protection.ashx",
|
|
930
|
+
"effective_date": "2022-01-02",
|
|
931
|
+
"enforcement_date": "Pending Executive Regulations (delayed; Data Office consultations 2024-2025; expected operationalisation through 2026)",
|
|
932
|
+
"version": "Federal Decree-Law No. 45/2021",
|
|
933
|
+
"security_article": "Art. 20 — Security of personal data",
|
|
934
|
+
"patch_sla": null,
|
|
935
|
+
"notification_sla": null,
|
|
936
|
+
"notification_trigger": "Breach or violation of personal data that would prejudice privacy, confidentiality, or security of the data subject",
|
|
937
|
+
"notification_notes": "Art. 9 requires controller to notify the Data Office and affected data subject upon discovery; Executive Regulations expected to set specific hour SLA. As of 2026-05, enforcement timing varies and is generally not yet litigated at federal level.",
|
|
938
|
+
"critical_controls": [
|
|
939
|
+
"Art. 5 — Lawful processing on consent or one of enumerated bases",
|
|
940
|
+
"Art. 7-8 — Controller obligations including records of processing",
|
|
941
|
+
"Art. 9 — Personal data breach notification",
|
|
942
|
+
"Art. 10 — Mandatory DPO for sensitive data processors and high-risk processing",
|
|
943
|
+
"Art. 11 — Data Protection Impact Assessment for high-risk processing",
|
|
944
|
+
"Art. 20 — Technical and organisational measures appropriate to risk",
|
|
945
|
+
"Art. 22-23 — Cross-border transfer: adequacy decision by Data Office, otherwise appropriate safeguards or explicit consent"
|
|
946
|
+
],
|
|
947
|
+
"framework_gaps": [
|
|
948
|
+
"Executive Regulations operationalising most provisions are still pending as of 2026-05 — enforcement window and specific technical measures undefined",
|
|
949
|
+
"Coexistence with sectoral and free-zone regimes (DIFC DP Law 2020, ADGM Data Protection Regulations 2021, DHA, CBUAE, SCA) creates fragmented compliance surface",
|
|
950
|
+
"AI/ML: no AI-specific controls; UAE Charter for the Development and Use of AI 2024 is policy, not statute",
|
|
951
|
+
"Patch SLA: not addressed",
|
|
952
|
+
"PQC: not addressed; TDRA Information Assurance Regulation covers cryptography but not PQC migration"
|
|
953
|
+
],
|
|
954
|
+
"free_zone_overlay": {
|
|
955
|
+
"DIFC": "DIFC Data Protection Law DIFC Law No. 5 of 2020 — GDPR-aligned, applies in DIFC free zone",
|
|
956
|
+
"ADGM": "ADGM Data Protection Regulations 2021 — GDPR-aligned, applies in ADGM free zone",
|
|
957
|
+
"note": "Entities operating across federal mainland and a financial free zone are subject to the free-zone law in that zone and the federal PDPL elsewhere"
|
|
958
|
+
},
|
|
959
|
+
"ai_coverage": "Not addressed in PDPL; sector guidance via UAE AI Office",
|
|
960
|
+
"pqc_coverage": "Not addressed",
|
|
961
|
+
"theater_risk": "high — Executive Regulations delay creates de facto non-enforcement of detailed obligations on mainland; free-zone regimes are stricter"
|
|
962
|
+
}
|
|
963
|
+
}
|
|
964
|
+
},
|
|
965
|
+
"SA": {
|
|
966
|
+
"jurisdiction": "Saudi Arabia",
|
|
967
|
+
"frameworks": {
|
|
968
|
+
"KSA_PDPL": {
|
|
969
|
+
"full_name": "Personal Data Protection Law (Royal Decree M/19 of 9/2/1443H)",
|
|
970
|
+
"authority": "Saudi Data and AI Authority (SDAIA)",
|
|
971
|
+
"source": "https://sdaia.gov.sa/en/SDAIA/about/Files/PersonalDataEnglishV2.pdf",
|
|
972
|
+
"effective_date": "2023-09-14",
|
|
973
|
+
"enforcement_date": "2024-09-14",
|
|
974
|
+
"version": "Royal Decree M/19 as amended by Royal Decree M/148 of 5/9/1444H (2023-03-27); Implementing Regulations effective 2023-09-14",
|
|
975
|
+
"security_article": "Art. 19 — Necessary organisational, technical, administrative measures",
|
|
976
|
+
"patch_sla": null,
|
|
977
|
+
"notification_sla": 72,
|
|
978
|
+
"notification_trigger": "Personal data breach that may cause damage to personal data or to the data subject",
|
|
979
|
+
"notification_notes": "Implementing Regulations Art. 24: notify SDAIA within 72 hours of becoming aware; notify data subject without undue delay where likely to cause serious damage.",
|
|
980
|
+
"critical_controls": [
|
|
981
|
+
"Art. 5-6 — Lawful bases for processing (consent default; enumerated exceptions narrower than GDPR)",
|
|
982
|
+
"Art. 12 — Privacy notice obligations",
|
|
983
|
+
"Art. 17 — Designation of Personal Data Protection Officer where processing involves regular and systematic monitoring or sensitive data",
|
|
984
|
+
"Art. 19 — Security measures proportionate to nature and sensitivity of data",
|
|
985
|
+
"Art. 20-22 — Processor obligations and contractual requirements",
|
|
986
|
+
"Art. 23 — Data Protection Impact Assessment",
|
|
987
|
+
"Art. 29 — Cross-border transfer: required for state or vital data-subject interest; SDAIA assessment of recipient country protection level; standard contracts and binding corporate rules as alternative paths",
|
|
988
|
+
"Art. 35 — Sanctions: fines up to SAR 5M (doubled on repeat), criminal penalties for unlawful disclosure of sensitive data up to 2 years"
|
|
989
|
+
],
|
|
990
|
+
"framework_gaps": [
|
|
991
|
+
"Art. 19 'necessary measures' is benchmarked to SDAIA Implementing Regulations and NCA Essential Cybersecurity Controls (ECC-1:2018) — the latter provides concrete baselines but PDPL itself does not pin them",
|
|
992
|
+
"Cross-border transfer regime requires SDAIA assessment + Personal Data subject's consent unless data necessary to perform contract or implement international treaty obligations — stricter than GDPR adequacy",
|
|
993
|
+
"AI/ML: AI Ethics Principles published by SDAIA 2023 are non-binding; PDPL does not address automated decision-making rights specifically",
|
|
994
|
+
"Patch SLA: not addressed (NCA ECC controls cover patching at framework level)",
|
|
995
|
+
"PQC: not addressed",
|
|
996
|
+
"Sensitive data definition includes 'racial origin, religious belief, criminal data, biometric data, genetic data, credit data, health data, location data' — broader than GDPR special categories"
|
|
997
|
+
],
|
|
998
|
+
"ai_coverage": "Not addressed in PDPL; SDAIA AI Ethics Principles + Generative AI Guidelines (2023) are non-binding",
|
|
999
|
+
"pqc_coverage": "Not addressed",
|
|
1000
|
+
"theater_risk": "medium — SDAIA enforcement began Sep 2024 with grace period for existing operators; specific technical measures still maturing via SDAIA guidance"
|
|
1001
|
+
}
|
|
1002
|
+
}
|
|
1003
|
+
},
|
|
1004
|
+
"NZ": {
|
|
1005
|
+
"jurisdiction": "New Zealand",
|
|
1006
|
+
"frameworks": {
|
|
1007
|
+
"PRIVACY_ACT_2020": {
|
|
1008
|
+
"full_name": "Privacy Act 2020",
|
|
1009
|
+
"authority": "Office of the Privacy Commissioner (OPC) — Te Mana Mātāpono Matatapu",
|
|
1010
|
+
"source": "https://www.legislation.govt.nz/act/public/2020/0031/latest/LMS23223.html",
|
|
1011
|
+
"effective_date": "2020-12-01",
|
|
1012
|
+
"version": "Public Act 2020 No 31",
|
|
1013
|
+
"security_article": "IPP 5 — Storage and security of personal information",
|
|
1014
|
+
"patch_sla": null,
|
|
1015
|
+
"notification_sla": null,
|
|
1016
|
+
"notification_trigger": "Notifiable privacy breach: unauthorised access, disclosure, loss of personal information that has caused or is likely to cause serious harm",
|
|
1017
|
+
"notification_notes": "Part 6 (Sec. 112-119) requires notification to the Privacy Commissioner and affected individuals 'as soon as practicable' after the agency becomes aware. OPC interprets 'as soon as practicable' as within 72 hours; statute does not pin an hour value.",
|
|
1018
|
+
"critical_controls": [
|
|
1019
|
+
"IPP 1-4 — Collection principles (purpose, source, manner)",
|
|
1020
|
+
"IPP 5 — Storage and security: reasonable safeguards against loss, unauthorised access, use, modification, disclosure",
|
|
1021
|
+
"IPP 6-7 — Access and correction rights",
|
|
1022
|
+
"IPP 8 — Accuracy",
|
|
1023
|
+
"IPP 9-10 — Retention and use limitations",
|
|
1024
|
+
"IPP 11 — Disclosure limitations",
|
|
1025
|
+
"IPP 12 — Cross-border disclosure: recipient must be subject to comparable safeguards (e.g., binding scheme, contractual safeguards, prescribed country)",
|
|
1026
|
+
"Sec. 22 — Compliance notices issued by Commissioner",
|
|
1027
|
+
"Part 6 — Notifiable Privacy Breach scheme (Sec. 112-119)"
|
|
1028
|
+
],
|
|
1029
|
+
"framework_gaps": [
|
|
1030
|
+
"IPP 5 'reasonable safeguards' is undefined — OPC publishes guidance but no binding technical baseline",
|
|
1031
|
+
"Patch SLA: not addressed",
|
|
1032
|
+
"AI/ML: Privacy Act does not address automated decision rights; OPC has issued 2023 guidance on generative AI but it is non-binding",
|
|
1033
|
+
"MCP/agent trust: not addressed",
|
|
1034
|
+
"PQC: not addressed",
|
|
1035
|
+
"Penalty ceiling is materially low: NZD 10,000 for individuals breaching access requests, NZD 350K class action precedent maximum to date — no statutory turnover-percentage cap"
|
|
1036
|
+
],
|
|
1037
|
+
"ai_coverage": "Not addressed; OPC Generative AI Guidance 2023 non-binding",
|
|
1038
|
+
"pqc_coverage": "Not addressed",
|
|
1039
|
+
"theater_risk": "high — low penalty ceiling and undefined safeguards standard reduce deterrent effect"
|
|
1040
|
+
}
|
|
1041
|
+
}
|
|
1042
|
+
},
|
|
1043
|
+
"KR": {
|
|
1044
|
+
"jurisdiction": "Korea (Republic of)",
|
|
1045
|
+
"frameworks": {
|
|
1046
|
+
"PIPA": {
|
|
1047
|
+
"full_name": "Personal Information Protection Act",
|
|
1048
|
+
"authority": "Personal Information Protection Commission (PIPC)",
|
|
1049
|
+
"source": "https://www.law.go.kr/LSW/eng/engLsSc.do?menuId=2§ion=lawNm&query=Personal+Information+Protection+Act",
|
|
1050
|
+
"effective_date": "2011-09-30",
|
|
1051
|
+
"version": "Act No. 19234 (2023-03-14 amendment, effective 2023-09-15) — consolidates online/offline regime, expands data portability, automated decision rights",
|
|
1052
|
+
"security_article": "Art. 29 — Duty of safety measures",
|
|
1053
|
+
"patch_sla": null,
|
|
1054
|
+
"notification_sla": 72,
|
|
1055
|
+
"notification_trigger": "Personal information leakage",
|
|
1056
|
+
"notification_notes": "Art. 34: notify affected data subjects without delay and report to PIPC or KISA within 72 hours of becoming aware (Enforcement Decree Art. 39). For >=1,000 affected subjects, additional public notice via the controller's website for >=7 days.",
|
|
1057
|
+
"critical_controls": [
|
|
1058
|
+
"Art. 15-22 — Lawful processing and consent requirements (separate consent for distinct purposes; opt-in default)",
|
|
1059
|
+
"Art. 23 — Sensitive information requires separate consent and necessity",
|
|
1060
|
+
"Art. 24 — Unique identifier (resident registration number) special restrictions",
|
|
1061
|
+
"Art. 28-2 to 28-7 — Pseudonymised data regime: scientific research, statistics, public-interest archiving permitted without consent under safeguards",
|
|
1062
|
+
"Art. 29 — Safety measures: physical, technical, administrative — see PIPC Standards for Safety Measures Notification 2023-9",
|
|
1063
|
+
"Art. 34 — Breach notification to data subjects and PIPC/KISA within 72h",
|
|
1064
|
+
"Art. 37-2 — Right to refuse automated decision-making and request human intervention (effective 2024-03-15 per 2023 amendment)",
|
|
1065
|
+
"Art. 28-8 to 28-11 — Cross-border transfers: consent default; alternative paths via certification, adequacy decision, contract with recipient",
|
|
1066
|
+
"Art. 75 — Administrative fines up to 3% of total turnover (raised from prior penalty surcharge of revenue from violation in 2023 amendment)"
|
|
1067
|
+
],
|
|
1068
|
+
"framework_gaps": [
|
|
1069
|
+
"Art. 29 safety measures pinned to PIPC Notification 2023-9 — specific (encryption, access logs, screen lock, vulnerability scans) but no patch SLA",
|
|
1070
|
+
"Art. 37-2 automated decision rights apply to fully automated decisions producing legal or similarly significant effects — does not address adversarial robustness or prompt injection",
|
|
1071
|
+
"MCP/agent trust: not addressed",
|
|
1072
|
+
"PQC: not addressed; KISA cryptography guidance promotes ARIA, SEED, HIGHT alongside international algorithms; PQC migration roadmap published 2024 but non-mandatory",
|
|
1073
|
+
"Resident registration number (RRN) special regime creates re-identification risk surface not fully addressed by Art. 29"
|
|
1074
|
+
],
|
|
1075
|
+
"ai_coverage": "Art. 37-2 automated decision rights (procedural); AI Basic Act (인공지능기본법, passed 2024-12, enforcement 2026-01-22) imposes additional obligations on high-impact AI but is separate from PIPA",
|
|
1076
|
+
"pqc_coverage": "Not addressed in PIPA",
|
|
1077
|
+
"theater_risk": "low-medium — PIPC enforcement is active with significant fines (e.g., 2023-2024 actions against major platforms); turnover-based penalty raises deterrent"
|
|
1078
|
+
}
|
|
1079
|
+
}
|
|
1080
|
+
},
|
|
1081
|
+
"CL": {
|
|
1082
|
+
"jurisdiction": "Chile",
|
|
1083
|
+
"frameworks": {
|
|
1084
|
+
"CL_DPL": {
|
|
1085
|
+
"full_name": "Law No. 19,628 on Protection of Private Life (as amended by Law No. 21,719 of 2024)",
|
|
1086
|
+
"authority": "Agencia de Protección de Datos Personales (APDP) — established by Law 21,719; pre-existing oversight by SERNAC and Civil Registry",
|
|
1087
|
+
"source": "https://www.bcn.cl/leychile/navegar?idNorma=141599",
|
|
1088
|
+
"effective_date": "1999-10-28",
|
|
1089
|
+
"amendment_date": "2024-12-13",
|
|
1090
|
+
"amendment_enforcement_date": "2026-12-01",
|
|
1091
|
+
"version": "Law No. 19,628 as amended by Law No. 21,719 (2024)",
|
|
1092
|
+
"security_article": "Art. 14-quinquies (post-2024 amendment) — Duty of security",
|
|
1093
|
+
"patch_sla": null,
|
|
1094
|
+
"notification_sla": 72,
|
|
1095
|
+
"notification_trigger": "Security breach affecting personal data with risk to data subject rights",
|
|
1096
|
+
"notification_notes": "Law 21,719 amendment Art. 14-octies aligns with GDPR Art. 33: notify APDP within 72 hours of awareness; notify data subjects without undue delay where high risk to rights and freedoms.",
|
|
1097
|
+
"critical_controls": [
|
|
1098
|
+
"Art. 4 — Lawful basis: consent default + enumerated exceptions (legitimate interests now included post-2024)",
|
|
1099
|
+
"Art. 9 — Data subject rights: access, rectification, deletion, opposition, portability, automated-decision review (added 2024)",
|
|
1100
|
+
"Art. 14-bis to 14-decies (post-2024) — Controller and processor obligations modelled on GDPR",
|
|
1101
|
+
"Art. 14-quinquies — Security duty: technical and organisational measures proportionate to risk",
|
|
1102
|
+
"Art. 14-octies — Breach notification",
|
|
1103
|
+
"Art. 16-bis — Cross-border transfer: adequacy or appropriate safeguards (SCCs, BCRs, certifications) post-2024",
|
|
1104
|
+
"Art. 22 onwards — APDP enforcement, sanctions up to 4% of annual sales (capped at UTA 20,000 ~ USD 16M) per infraction"
|
|
1105
|
+
],
|
|
1106
|
+
"framework_gaps": [
|
|
1107
|
+
"Pre-2024 Law 19,628 had minimal substantive obligations and no dedicated regulator — Law 21,719 substantially closes the gap with a 2-year vacatio legis to 2026-12-01",
|
|
1108
|
+
"Until 2026-12-01 enforcement date, organisations operating in Chile face a transitional regime with limited regulator capacity",
|
|
1109
|
+
"AI/ML: Law 21,719 introduces automated-decision review right; no AI security controls",
|
|
1110
|
+
"Patch SLA: not addressed",
|
|
1111
|
+
"PQC: not addressed"
|
|
1112
|
+
],
|
|
1113
|
+
"cross_reference_gdpr": {
|
|
1114
|
+
"overlaps": [
|
|
1115
|
+
"Law 21,719 explicitly modelled on GDPR — lawful bases, data subject rights, controller/processor split, DPIA, DPO, cross-border safeguards, 72h notification all aligned",
|
|
1116
|
+
"Penalty cap at 4% of annual sales mirrors GDPR Art. 83(5) structure"
|
|
1117
|
+
],
|
|
1118
|
+
"divergences": [
|
|
1119
|
+
"Penalty cap denominated in UTA (Annual Tax Unit) at ~USD 16M ceiling — lower than GDPR EUR 20M",
|
|
1120
|
+
"Transition period to 2026-12-01 creates a window where pre-amendment Law 19,628 remains the operative regime",
|
|
1121
|
+
"Sensitive data definition includes 'socioeconomic data' — broader than GDPR special categories",
|
|
1122
|
+
"No equivalent of GDPR EDPB single-regulator consistency mechanism"
|
|
1123
|
+
]
|
|
1124
|
+
},
|
|
1125
|
+
"ai_coverage": "Automated decision-making review right under amended Art. 9 (procedural); no AI security controls",
|
|
1126
|
+
"pqc_coverage": "Not addressed",
|
|
1127
|
+
"theater_risk": "high during transition (2024-12 to 2026-12) — until APDP is staffed and enforcement starts, paper-only compliance is the default"
|
|
1128
|
+
}
|
|
1129
|
+
}
|
|
1130
|
+
},
|
|
1131
|
+
"IL": {
|
|
1132
|
+
"jurisdiction": "Israel",
|
|
1133
|
+
"frameworks": {
|
|
1134
|
+
"PPL_5741_1981": {
|
|
1135
|
+
"full_name": "Privacy Protection Law 5741-1981 (as amended by Amendment 13, 2024) + Privacy Protection Regulations (Data Security) 5777-2017",
|
|
1136
|
+
"authority": "Privacy Protection Authority (PPA, רשות הגנת הפרטיות); transitioning to 'Public Authority for Privacy Protection' under Amendment 13 with expanded enforcement powers",
|
|
1137
|
+
"source": "https://www.gov.il/en/departments/the_privacy_protection_authority",
|
|
1138
|
+
"effective_date": "1981-03-11 (original PPL); 2018-05-08 (Data Security Regulations); Amendment 13 enacted 2024-08-05, in force 2025-08-14",
|
|
1139
|
+
"version": "PPL 5741-1981 as amended through Amendment 13 (2024); Data Security Regulations 5777-2017",
|
|
1140
|
+
"security_article": "Data Security Regulations 5777-2017 — graduated obligations by database security level (basic, medium, high)",
|
|
1141
|
+
"patch_sla": null,
|
|
1142
|
+
"notification_sla": null,
|
|
1143
|
+
"notification_trigger": "Severe security incident affecting databases at medium or high security level (Regulation 11)",
|
|
1144
|
+
"notification_notes": "Regulation 11 of Data Security Regulations 5777-2017: notify PPA 'immediately' upon awareness of severe incident; PPA may direct controller to notify data subjects. Amendment 13 (in force 2025-08) introduces administrative fines up to NIS 3.2M and brings notification timelines closer to GDPR practice.",
|
|
1145
|
+
"critical_controls": [
|
|
1146
|
+
"Data Security Regulations Reg. 4 — Database security definition document (mandatory written security policy)",
|
|
1147
|
+
"Reg. 5 — Risk mapping and inventory",
|
|
1148
|
+
"Reg. 8 — Access control with documented authorisation procedures",
|
|
1149
|
+
"Reg. 9 — Audit logging with retention obligations",
|
|
1150
|
+
"Reg. 11 — Severe security incident notification and quarterly review by board",
|
|
1151
|
+
"Reg. 15 — Penetration testing at least every 18 months for high-level databases",
|
|
1152
|
+
"Reg. 16 — Annual security audit for medium and high level databases",
|
|
1153
|
+
"Amendment 13 — Administrative fines up to NIS 3.2M; criminal liability for officers"
|
|
1154
|
+
],
|
|
1155
|
+
"framework_gaps": [
|
|
1156
|
+
"Patch SLA: not explicitly required — embedded in Reg. 5 risk mapping",
|
|
1157
|
+
"Notification SLA: 'immediately' is undefined; PPA practice as of 2026-05 trends toward 72h",
|
|
1158
|
+
"AI/ML: PPL applies to AI processing personal data; no AI-specific security regulations",
|
|
1159
|
+
"Sectoral overlay required: Banking sector subject to Banking Supervision Department Directive 361 with stricter cyber-resilience obligations"
|
|
1160
|
+
],
|
|
1161
|
+
"cross_reference_gdpr": {
|
|
1162
|
+
"overlaps": [
|
|
1163
|
+
"Israel holds EU adequacy (2011, reaffirmed under GDPR review 2024) — one of the longest-standing non-EEA adequacy regimes",
|
|
1164
|
+
"Amendment 13 narrows the GDPR delta by adding administrative fines, controller/processor distinction, and DPO requirements for high-volume processors"
|
|
1165
|
+
],
|
|
1166
|
+
"divergences": [
|
|
1167
|
+
"Tiered database security levels (basic/medium/high) under 5777-2017 is unique — GDPR uses risk-based 'appropriate measures' without prescriptive tiers",
|
|
1168
|
+
"Database registration requirement persists (Section 8 PPL) — abandoned by GDPR",
|
|
1169
|
+
"Penalty ceiling at NIS 3.2M (~USD 870K) is well below GDPR 4% turnover"
|
|
1170
|
+
]
|
|
1171
|
+
},
|
|
1172
|
+
"ai_coverage": "PPL applies; no AI-specific security controls under privacy law",
|
|
1173
|
+
"pqc_coverage": "Not addressed",
|
|
1174
|
+
"theater_risk": "medium — Data Security Regulations are technically prescriptive, but pre-Amendment 13 enforcement was light; 2025-2026 ramp underway"
|
|
1175
|
+
},
|
|
1176
|
+
"INCD_METHODOLOGY": {
|
|
1177
|
+
"full_name": "INCD Cyber Defense Methodology for Organizations + INCD Cyber Defense for AI Systems Guidance (2024)",
|
|
1178
|
+
"authority": "Israel National Cyber Directorate (INCD, מערך הסייבר הלאומי), Prime Minister's Office",
|
|
1179
|
+
"source": "https://www.gov.il/en/departments/israel_national_cyber_directorate",
|
|
1180
|
+
"effective_date": "2019-09 (Methodology v2.0); 2021-04 (v2.1 with supply chain expansion); 2024 (Cyber Defense for AI Systems guidance)",
|
|
1181
|
+
"version": "Cyber Defense Methodology v2.1 (2021); Cyber Defense for AI Systems v1.0 (2024)",
|
|
1182
|
+
"sector": "Voluntary for private sector; mandatory for designated essential service providers via INCD directives",
|
|
1183
|
+
"patch_sla": null,
|
|
1184
|
+
"notification_sla": null,
|
|
1185
|
+
"critical_controls": [
|
|
1186
|
+
"Methodology Domain A — Governance and risk management",
|
|
1187
|
+
"Domain B — Protection (asset management, access control, network defence, patching)",
|
|
1188
|
+
"Domain C — Detection and response (24/7 SOC for higher tiers, INCD threat intel sharing)",
|
|
1189
|
+
"Domain D — Resilience (BCP, drills, incident learning)",
|
|
1190
|
+
"Cyber Defense for AI Systems (2024) — adversarial ML threat modelling, prompt injection guidance, training-data integrity, model supply chain"
|
|
1191
|
+
],
|
|
1192
|
+
"framework_gaps": [
|
|
1193
|
+
"Methodology v2.1 (2021) predates GenAI threat landscape — 2024 AI guidance fills the gap but is non-binding",
|
|
1194
|
+
"Patch SLA: tier-dependent; no universal timeline",
|
|
1195
|
+
"MCP/agent trust: addressed conceptually in 2024 AI guidance, not enumerated"
|
|
1196
|
+
],
|
|
1197
|
+
"ai_coverage": "INCD 'Cyber Defense for AI Systems' (2024) is one of the earliest national-level AI-cyber guidance documents — addresses adversarial inputs, model theft, training data poisoning, supply chain. Non-binding but referenced by sectoral regulators.",
|
|
1198
|
+
"pqc_coverage": "INCD published PQC migration roadmap 2023; not yet mandatory",
|
|
1199
|
+
"theater_risk": "low — INCD has high technical credibility globally; gap is voluntariness for non-essential sectors"
|
|
1200
|
+
},
|
|
1201
|
+
"BOI_DIRECTIVE_361": {
|
|
1202
|
+
"full_name": "Bank of Israel Banking Supervision Department, Proper Conduct of Banking Business Directive 361 — Cyber Defense Management",
|
|
1203
|
+
"authority": "Bank of Israel — Banking Supervision Department",
|
|
1204
|
+
"source": "https://www.boi.org.il/en/banking-supervision/proper-conduct-of-banking-business-directives/",
|
|
1205
|
+
"effective_date": "2015-03-16 (initial); revised 2020-10 and 2024",
|
|
1206
|
+
"version": "Directive 361 (2024 revision)",
|
|
1207
|
+
"sector": "Banks and credit-card companies under Bank of Israel supervision",
|
|
1208
|
+
"patch_sla": null,
|
|
1209
|
+
"notification_sla": null,
|
|
1210
|
+
"critical_controls": [
|
|
1211
|
+
"Section 4 — Board and senior management cyber defense oversight",
|
|
1212
|
+
"Section 6 — Cyber defense framework aligned with INCD Methodology",
|
|
1213
|
+
"Section 10 — Third-party cyber risk management (extends to cloud and fintech)",
|
|
1214
|
+
"Section 12 — Incident reporting to BoI Supervision",
|
|
1215
|
+
"Section 14 — Cyber resilience testing including red-teaming"
|
|
1216
|
+
],
|
|
1217
|
+
"framework_gaps": [
|
|
1218
|
+
"Patch SLA: not numerically specified — risk-based",
|
|
1219
|
+
"AI/ML: not directly addressed; cross-references general INCD AI guidance",
|
|
1220
|
+
"MCP/agent trust: not contemplated"
|
|
1221
|
+
],
|
|
1222
|
+
"ai_coverage": "Cross-references INCD AI guidance; no Directive 361-specific AI controls",
|
|
1223
|
+
"pqc_coverage": "Not addressed",
|
|
1224
|
+
"theater_risk": "low — Directive 361 plus INCD methodology overlay produces one of the strictest banking cyber regimes globally"
|
|
1225
|
+
}
|
|
1226
|
+
}
|
|
1227
|
+
},
|
|
1228
|
+
"CH": {
|
|
1229
|
+
"jurisdiction": "Switzerland",
|
|
1230
|
+
"frameworks": {
|
|
1231
|
+
"REVFADP": {
|
|
1232
|
+
"full_name": "Federal Act on Data Protection (revFADP / nFADP / nDSG)",
|
|
1233
|
+
"authority": "Federal Data Protection and Information Commissioner (FDPIC, EDÖB)",
|
|
1234
|
+
"source": "https://www.fedlex.admin.ch/eli/cc/2022/491/en",
|
|
1235
|
+
"effective_date": "2023-09-01 (revised Act in force, replacing 1992 FADP)",
|
|
1236
|
+
"version": "SR 235.1 (revFADP); Data Protection Ordinance SR 235.11 (DPO)",
|
|
1237
|
+
"security_article": "Art. 8 revFADP — Data security; Art. 1-6 DPO — minimum technical and organisational measures",
|
|
1238
|
+
"patch_sla": null,
|
|
1239
|
+
"notification_sla": null,
|
|
1240
|
+
"notification_trigger": "Personal data breach likely to result in a high risk to data subjects' personality or fundamental rights (Art. 24 revFADP)",
|
|
1241
|
+
"notification_notes": "Art. 24 revFADP: notification to FDPIC 'as soon as possible' (so rasch als möglich) — deliberately non-numeric, in contrast to GDPR 72h. FDPIC guidance practice trends toward 72h but stays explicitly flexible.",
|
|
1242
|
+
"critical_controls": [
|
|
1243
|
+
"Art. 7 revFADP — Privacy by design and by default",
|
|
1244
|
+
"Art. 8 — Data security: technical and organisational measures appropriate to risk",
|
|
1245
|
+
"Art. 22 — DPIA mandatory for high-risk processing",
|
|
1246
|
+
"Art. 24 — Breach notification to FDPIC",
|
|
1247
|
+
"Art. 26 — Cross-border transfer: adequacy + SCCs + BCRs + supplementary safeguards (post-Schrems II aligned)",
|
|
1248
|
+
"DPO Art. 1-6 — Minimum technical measures (pseudonymisation, encryption, integrity, confidentiality, resilience, restoration)"
|
|
1249
|
+
],
|
|
1250
|
+
"framework_gaps": [
|
|
1251
|
+
"Notification SLA: 'as soon as possible' undefined — slower regulatory clarity than GDPR 72h",
|
|
1252
|
+
"AI/ML: revFADP applies to AI processing personal data; FDPIC AI Guidance 2023-11 clarifies applicability but adds no new security controls",
|
|
1253
|
+
"Penalty regime is criminal-only (up to CHF 250,000 against responsible individuals) — no administrative GDPR-style fines against entities",
|
|
1254
|
+
"PQC: not addressed; cryptography 'appropriate to risk'"
|
|
1255
|
+
],
|
|
1256
|
+
"cross_reference_gdpr": {
|
|
1257
|
+
"overlaps": [
|
|
1258
|
+
"Switzerland holds EU adequacy (1992; renewed under GDPR review 2024) — revFADP modelled on GDPR including DPO requirements, DPIA, breach notification, cross-border transfer regime",
|
|
1259
|
+
"FDPIC accepted EU SCCs (2021/914) for transfers from Switzerland with limited adaptations"
|
|
1260
|
+
],
|
|
1261
|
+
"divergences": [
|
|
1262
|
+
"Penalties imposed on individuals (executives, DPOs), not entities — max CHF 250K vs GDPR EUR 20M / 4% turnover",
|
|
1263
|
+
"Notification timing 'as soon as possible' is intentionally flexible; no equivalent of GDPR Art. 33(1) 72h",
|
|
1264
|
+
"Scope includes data of legal persons (until 2023-09 revision removed natural-persons-only restriction was added — Switzerland uniquely retained legal-person data protection until 2023)",
|
|
1265
|
+
"FDPIC has investigation but not direct fining power — sanctions require criminal proceedings"
|
|
1266
|
+
]
|
|
1267
|
+
},
|
|
1268
|
+
"ai_coverage": "FDPIC AI Guidance 2023-11 confirms revFADP applies to AI processing personal data; no AI Act equivalent. Federal Council 2023-11 decision: prefer sector-specific adaptation over horizontal AI law",
|
|
1269
|
+
"pqc_coverage": "Not addressed in revFADP; National Cyber Strategy 2023 references PQC migration",
|
|
1270
|
+
"theater_risk": "medium — modernised Act but enforcement model (criminal, individual) is structurally weak vs GDPR administrative regime"
|
|
1271
|
+
},
|
|
1272
|
+
"FINMA_CIRC_2023_01": {
|
|
1273
|
+
"full_name": "FINMA Circular 2023/01 'Operational Risks and Resilience – Banks'",
|
|
1274
|
+
"authority": "Swiss Financial Market Supervisory Authority (FINMA)",
|
|
1275
|
+
"source": "https://www.finma.ch/en/documentation/circulars/",
|
|
1276
|
+
"effective_date": "2024-01-01",
|
|
1277
|
+
"version": "Circ. 2023/01 (replaces Circ. 2008/21)",
|
|
1278
|
+
"sector": "Banks and securities firms under FINMA supervision; companion guidance for insurers (FINMA Circ. 2008/21 Insurers)",
|
|
1279
|
+
"patch_sla": null,
|
|
1280
|
+
"notification_sla": null,
|
|
1281
|
+
"critical_controls": [
|
|
1282
|
+
"Margin nos. 22-29 — ICT and cyber risk management",
|
|
1283
|
+
"Margin nos. 30-39 — Critical data management (data classification, retention, integrity)",
|
|
1284
|
+
"Margin nos. 40-49 — Cyber risk: threat-led penetration testing, incident response, recovery",
|
|
1285
|
+
"Margin nos. 50-59 — Operational resilience: critical functions identification, tolerance levels, scenario testing",
|
|
1286
|
+
"Reference to FINMA Guidance 05/2020 — cyber incident reporting via FINMA EHP within 24 hours of detection for severe incidents"
|
|
1287
|
+
],
|
|
1288
|
+
"framework_gaps": [
|
|
1289
|
+
"Patch SLA: not numerically specified — risk-based",
|
|
1290
|
+
"AI/ML: Circ. 2023/01 does not include AI-specific cyber controls; FINMA Guidance 08/2024 on Governance and Risk Management of AI is separate, non-prescriptive on cyber",
|
|
1291
|
+
"MCP/agent trust: not contemplated"
|
|
1292
|
+
],
|
|
1293
|
+
"ai_coverage": "FINMA Guidance 08/2024 'Governance and risk management of AI'; Circ. 2023/01 cyber controls not AI-tuned",
|
|
1294
|
+
"pqc_coverage": "Not mandated; FINMA monitoring per National Cyber Strategy",
|
|
1295
|
+
"theater_risk": "low — TLPT (threat-led penetration testing) and operational resilience tolerance levels are substantive"
|
|
1296
|
+
},
|
|
1297
|
+
"NCSC_CH": {
|
|
1298
|
+
"full_name": "National Cyber Security Centre Switzerland (NCSC) — Minimum Standard for IT Security (MELANI/NCSC Minimum Standard)",
|
|
1299
|
+
"authority": "Federal Office for Cybersecurity (BACS, formerly NCSC-CH; previously MELANI)",
|
|
1300
|
+
"source": "https://www.ncsc.admin.ch/ncsc/en/home.html",
|
|
1301
|
+
"effective_date": "2018-08 (initial Minimum Standard); 2023 transferred to new Federal Office for Cybersecurity (BACS) per Information Security Act",
|
|
1302
|
+
"version": "Minimum Standard 2018 (NIST CSF-based); Information Security Act in force 2024-01-01",
|
|
1303
|
+
"sector": "Voluntary baseline for private sector; mandatory reporting for critical infrastructure under Information Security Act",
|
|
1304
|
+
"patch_sla": null,
|
|
1305
|
+
"notification_sla": 24,
|
|
1306
|
+
"notification_trigger": "Cyberattack on critical infrastructure operators (per Information Security Act Art. 74e, in force 2025-04-01)",
|
|
1307
|
+
"notification_notes": "Information Security Act (ISG) added mandatory cyberattack notification to NCSC for CI operators — 24 hours from awareness (Art. 74e). First Swiss numeric cyber notification SLA.",
|
|
1308
|
+
"critical_controls": [
|
|
1309
|
+
"Minimum Standard — adoption of NIST CSF Identify/Protect/Detect/Respond/Recover with Swiss-specific maturity targets",
|
|
1310
|
+
"Information Security Act (ISG) — federal information security baseline plus CI cyber notification regime",
|
|
1311
|
+
"BACS — operational coordination, GovCERT.ch incident response"
|
|
1312
|
+
],
|
|
1313
|
+
"framework_gaps": [
|
|
1314
|
+
"Minimum Standard remains voluntary outside CI",
|
|
1315
|
+
"AI/ML: not addressed in Minimum Standard 2018; BACS to issue updated guidance under ISG mandate",
|
|
1316
|
+
"PQC: BACS roadmap published 2024; no mandate"
|
|
1317
|
+
],
|
|
1318
|
+
"ai_coverage": "Not addressed in Minimum Standard; ongoing BACS work",
|
|
1319
|
+
"pqc_coverage": "Roadmap only",
|
|
1320
|
+
"theater_risk": "medium — voluntary baseline for non-CI; CI notification regime is substantive but new (2025)"
|
|
1321
|
+
}
|
|
1322
|
+
}
|
|
1323
|
+
},
|
|
1324
|
+
"HK": {
|
|
1325
|
+
"jurisdiction": "Hong Kong SAR",
|
|
1326
|
+
"jurisdiction_note": "Special Administrative Region of the People's Republic of China; distinct legal regime under 'one country, two systems'. Mainland China PIPL does not apply directly; cross-border data transfers to mainland are governed by separate Standard Contract for Cross-boundary Flow of Personal Information (GBA Standard Contract, in force 2023-12 for Greater Bay Area pilot).",
|
|
1327
|
+
"frameworks": {
|
|
1328
|
+
"PDPO": {
|
|
1329
|
+
"full_name": "Personal Data (Privacy) Ordinance, Cap. 486 (PDPO)",
|
|
1330
|
+
"authority": "Office of the Privacy Commissioner for Personal Data (PCPD)",
|
|
1331
|
+
"source": "https://www.pcpd.org.hk/english/data_privacy_law/ordinance_at_a_Glance/ordinance.html",
|
|
1332
|
+
"effective_date": "1996-12-20 (original); major amendment 2012-10-01 (direct marketing); 2021-10-08 (anti-doxxing amendments creating criminal offences)",
|
|
1333
|
+
"version": "Cap. 486 as amended through 2021-10",
|
|
1334
|
+
"security_article": "Data Protection Principle 4 (DPP4) — Security of Personal Data; PCPD Guidance Note on Data Security Measures 2022",
|
|
1335
|
+
"patch_sla": null,
|
|
1336
|
+
"notification_sla": null,
|
|
1337
|
+
"notification_trigger": "Voluntary breach notification to PCPD recommended for breaches involving sensitive data or significant harm potential",
|
|
1338
|
+
"notification_notes": "PDPO does not mandate breach notification as of 2026-05 — voluntary regime per PCPD 'Guidance on Data Breach Handling and Data Breach Notifications'. A statutory notification regime is in the LegCo legislative pipeline but not enacted. This is a major divergence from regional peers (Mainland PIPL, Singapore PDPA, Korea PIPA).",
|
|
1339
|
+
"critical_controls": [
|
|
1340
|
+
"DPP1 — Purpose and collection",
|
|
1341
|
+
"DPP2 — Accuracy and retention",
|
|
1342
|
+
"DPP3 — Use limitation",
|
|
1343
|
+
"DPP4 — Security: 'practicable steps' to protect personal data — non-prescriptive",
|
|
1344
|
+
"DPP5 — Openness",
|
|
1345
|
+
"DPP6 — Data access and correction rights",
|
|
1346
|
+
"Section 64 — Criminal offence: doxxing (2021 amendment) — up to 5 years imprisonment and HKD 1M fine"
|
|
1347
|
+
],
|
|
1348
|
+
"framework_gaps": [
|
|
1349
|
+
"PDPO predates GDPR by ~22 years and was last substantively modernised in 2012 (excluding 2021 doxxing-specific amendments) — significant gaps vs international baseline",
|
|
1350
|
+
"No mandatory breach notification, no DPIA requirement, no statutory DPO requirement, no GDPR-style penalties",
|
|
1351
|
+
"Penalty regime: maximum HKD 50K (~USD 6.4K) for first DPP contravention — orders of magnitude below GDPR",
|
|
1352
|
+
"Cross-border transfer: Section 33 of PDPO has been enacted since 1996 but never brought into force — no statutory transfer restriction exists",
|
|
1353
|
+
"AI/ML: PCPD published 'Guidance on the Ethical Development and Use of Artificial Intelligence' (2021) and 'Artificial Intelligence: Model Personal Data Protection Framework' (2024) — both voluntary",
|
|
1354
|
+
"PQC: not addressed"
|
|
1355
|
+
],
|
|
1356
|
+
"cross_reference_gdpr": {
|
|
1357
|
+
"overlaps": [
|
|
1358
|
+
"Six DPPs broadly correspond to GDPR principles (lawfulness, accuracy, retention, purpose limitation, transparency, data subject rights)"
|
|
1359
|
+
],
|
|
1360
|
+
"divergences": [
|
|
1361
|
+
"PDPO is principles-based and less prescriptive than GDPR; predates GDPR by 23 years and lacks modern updates",
|
|
1362
|
+
"No mandatory breach notification (vs GDPR Art. 33 72h)",
|
|
1363
|
+
"No administrative fines — enforcement is via PCPD enforcement notices then prosecution under PDPO; penalties cap at HKD 50K-1M",
|
|
1364
|
+
"No DPIA, no DPO, no data portability right",
|
|
1365
|
+
"Section 33 cross-border transfer restriction never in force — Hong Kong has no statutory restriction on outbound personal data transfers"
|
|
1366
|
+
]
|
|
1367
|
+
},
|
|
1368
|
+
"ai_coverage": "PCPD AI Model Framework 2024 — voluntary guidance; no statutory AI controls",
|
|
1369
|
+
"pqc_coverage": "Not addressed",
|
|
1370
|
+
"theater_risk": "high — DPP4 'practicable steps' allows broad interpretation; HKD 50K penalty cap eliminates deterrence for major controllers"
|
|
1371
|
+
},
|
|
1372
|
+
"HKMA_CFI2": {
|
|
1373
|
+
"full_name": "HKMA Cybersecurity Fortification Initiative 2.0 (CFI 2.0) + Supervisory Policy Manual TM-G-1 'General Principles for Technology Risk Management'",
|
|
1374
|
+
"authority": "Hong Kong Monetary Authority (HKMA)",
|
|
1375
|
+
"source": "https://www.hkma.gov.hk/eng/key-functions/banking/banking-regulatory-and-supervisory-regime/cybersecurity/",
|
|
1376
|
+
"effective_date": "CFI 2.0 launched 2020-11; ongoing rollout. TM-G-1 last revised 2003 with regular Circulars overlay.",
|
|
1377
|
+
"version": "CFI 2.0 (2020); TM-G-1 v3 (2003 with Circular overlay through 2024)",
|
|
1378
|
+
"sector": "Authorized Institutions (banks, restricted licence banks, deposit-taking companies) under HKMA supervision",
|
|
1379
|
+
"patch_sla": null,
|
|
1380
|
+
"notification_sla": null,
|
|
1381
|
+
"notification_trigger": "Significant IT control failures or cyber events affecting customer services or risk profile",
|
|
1382
|
+
"notification_notes": "HKMA Circular 'Reporting of Operational Incidents' — report 'as soon as practicable' typically interpreted as within 24 hours for significant events; no statutory hour-pinned SLA",
|
|
1383
|
+
"critical_controls": [
|
|
1384
|
+
"CFI 2.0 Cyber Resilience Assessment Framework (C-RAF 2.0) — three-tier risk-based maturity assessment",
|
|
1385
|
+
"CFI 2.0 Intelligence-led Cyber Attack Simulation (iCAST) — red-team testing for higher-inherent-risk AIs",
|
|
1386
|
+
"CFI 2.0 Professional Development Programme (PDP) — workforce certification",
|
|
1387
|
+
"TM-G-1 Annex on cloud computing (2022 update)",
|
|
1388
|
+
"Circular 'Use of AI for Cybersecurity' (2023) and 'Generative AI Risk Management' (2024)"
|
|
1389
|
+
],
|
|
1390
|
+
"framework_gaps": [
|
|
1391
|
+
"Patch SLA: not numerically pinned",
|
|
1392
|
+
"AI/ML: GenAI Risk Management Circular 2024 addresses governance and model risk; cyber-specific controls for AI systems remain high-level",
|
|
1393
|
+
"MCP/agent trust: not yet contemplated in HKMA guidance",
|
|
1394
|
+
"PQC: HKMA published roadmap 2024; no mandate"
|
|
1395
|
+
],
|
|
1396
|
+
"ai_coverage": "HKMA GenAI Circular 2024 — model governance, output review, third-party AI vendor risk; no AI-specific cyber TTP catalogue",
|
|
1397
|
+
"pqc_coverage": "Industry consultation underway",
|
|
1398
|
+
"theater_risk": "low-medium — C-RAF 2.0 and iCAST are substantive and tier-calibrated; gap is in AI cyber specifics"
|
|
1399
|
+
}
|
|
1400
|
+
}
|
|
1401
|
+
},
|
|
1402
|
+
"TW": {
|
|
1403
|
+
"jurisdiction": "Taiwan",
|
|
1404
|
+
"jurisdiction_note": "Taiwan's regime is administered independently of mainland PRC; mainland PIPL/CSL/DSL do not apply. Sectoral posture reflects Taiwan's role as semiconductor supply-chain critical infrastructure, with substantial divergence from PRC mainland data laws.",
|
|
1405
|
+
"frameworks": {
|
|
1406
|
+
"PDPA_TW": {
|
|
1407
|
+
"full_name": "Personal Data Protection Act (個人資料保護法, PDPA)",
|
|
1408
|
+
"authority": "Personal Data Protection Commission (PDPC, 個人資料保護委員會) — established under 2023 amendment; previously sectoral regulators",
|
|
1409
|
+
"source": "https://law.moj.gov.tw/ENG/LawClass/LawAll.aspx?pcode=I0050021",
|
|
1410
|
+
"effective_date": "1995-08-11 (original Computer-Processed Personal Data Protection Law); 2010-05-26 (current PDPA enacted); 2012-10-01 (effective); amendments 2023-05-31 (independent regulator established)",
|
|
1411
|
+
"version": "PDPA as amended through 2023-05-31",
|
|
1412
|
+
"security_article": "Art. 27 — Government and non-government agencies must take appropriate security measures",
|
|
1413
|
+
"patch_sla": null,
|
|
1414
|
+
"notification_sla": null,
|
|
1415
|
+
"notification_trigger": "Personal data theft, alteration, damage, loss, or leakage (Art. 12)",
|
|
1416
|
+
"notification_notes": "Art. 12 PDPA: notify data subjects 'after investigating the facts' — no statutory hour SLA. PDPC 2024 enforcement guidance recommends preliminary notification within 72 hours of confirmed breach.",
|
|
1417
|
+
"critical_controls": [
|
|
1418
|
+
"Art. 8-9 — Notice obligations at collection",
|
|
1419
|
+
"Art. 12 — Breach notification to data subjects",
|
|
1420
|
+
"Art. 18-19 — Cross-border transfer requires destination jurisdiction to provide adequate protection; sectoral regulators may impose specific restrictions (e.g., FSC for financial)",
|
|
1421
|
+
"Art. 27 — Security measures: 'appropriate' and 'necessary' technical and organisational measures",
|
|
1422
|
+
"Art. 41-50 — Sanctions: up to NTD 15M for serious violations, criminal liability for unlawful processing",
|
|
1423
|
+
"Sectoral implementing rules: FSC, NCC (telecom), Ministry of Health and Welfare each issue sub-regulations"
|
|
1424
|
+
],
|
|
1425
|
+
"framework_gaps": [
|
|
1426
|
+
"Notification SLA: 'after investigating the facts' allows controller-controlled timeline",
|
|
1427
|
+
"AI/ML: PDPA applies to AI processing personal data; no AI-specific controls",
|
|
1428
|
+
"Cross-border transfers: Art. 21 government-restriction mechanism rarely invoked except by FSC for financial-sector transfers",
|
|
1429
|
+
"PQC: not addressed",
|
|
1430
|
+
"Independent regulator (PDPC) only operational from 2024 — early enforcement years"
|
|
1431
|
+
],
|
|
1432
|
+
"cross_reference_gdpr": {
|
|
1433
|
+
"overlaps": [
|
|
1434
|
+
"PDPA structure broadly aligns with GDPR principles (notice, consent or lawful basis, data subject rights, cross-border restrictions)"
|
|
1435
|
+
],
|
|
1436
|
+
"divergences": [
|
|
1437
|
+
"No DPO requirement, no DPIA requirement, no privacy-by-design statutory mandate",
|
|
1438
|
+
"Notification timing is controller-discretionary",
|
|
1439
|
+
"Penalties cap at NTD 15M (~USD 470K) per violation — well below GDPR",
|
|
1440
|
+
"No EU adequacy decision as of 2026-05 — Taiwan's adequacy review by EDPB ongoing"
|
|
1441
|
+
]
|
|
1442
|
+
},
|
|
1443
|
+
"ai_coverage": "PDPA applies; Ministry of Digital Affairs draft AI Basic Law 2024 (legislative pipeline, not enacted)",
|
|
1444
|
+
"pqc_coverage": "Not addressed in PDPA; National Institute of Cyber Security pilot underway",
|
|
1445
|
+
"theater_risk": "medium-high during PDPC ramp-up (2024-2026); penalty ceiling limits deterrence"
|
|
1446
|
+
},
|
|
1447
|
+
"CYBER_SECURITY_MGMT_ACT": {
|
|
1448
|
+
"full_name": "Cyber Security Management Act (資通安全管理法, CSMA)",
|
|
1449
|
+
"authority": "Ministry of Digital Affairs (MoDA, 數位發展部) — established 2022-08-27; previously National Information and Communication Security Taskforce. Operational arm: National Institute of Cyber Security (NICS, 國家資通安全研究院)",
|
|
1450
|
+
"source": "https://law.moj.gov.tw/ENG/LawClass/LawAll.aspx?pcode=A0030297",
|
|
1451
|
+
"effective_date": "2019-01-01",
|
|
1452
|
+
"version": "CSMA 2018 (in force 2019-01-01); Enforcement Rules 2018",
|
|
1453
|
+
"sector": "Government agencies, public-controlled entities, and designated Critical Infrastructure Providers (CIPs) across 8 sectors: energy, water, telecom, transport, banking and finance, emergency services, hospitals, high-tech parks",
|
|
1454
|
+
"patch_sla": null,
|
|
1455
|
+
"notification_sla": 1,
|
|
1456
|
+
"notification_trigger": "Cyber incident affecting CIP critical information and communications systems",
|
|
1457
|
+
"notification_notes": "Cyber Security Management Act Enforcement Rules: notify supervising authority of cyber incidents within 1 hour for highest-tier (Level 3-4) incidents at CIPs — one of the fastest mandatory cyber notification SLAs globally. Lower-tier incidents have graduated timelines.",
|
|
1458
|
+
"critical_controls": [
|
|
1459
|
+
"Art. 10-11 — CIPs must establish, maintain, and improve cyber defense plans aligned with NICS technical specifications",
|
|
1460
|
+
"Art. 14 — Incident notification with graduated SLAs (1h for Level 3-4, longer for Levels 1-2)",
|
|
1461
|
+
"Art. 16-17 — Information sharing via N-CERT and sectoral ISACs",
|
|
1462
|
+
"Enforcement Rules — supply chain restrictions including prohibited country-of-origin equipment lists (effectively restricting PRC-origin ICT components for government and CIP)"
|
|
1463
|
+
],
|
|
1464
|
+
"framework_gaps": [
|
|
1465
|
+
"Patch SLA: not numerically specified — risk-based per NICS technical standards",
|
|
1466
|
+
"Private sector outside CIP designation: not covered",
|
|
1467
|
+
"AI/ML systems in CIPs: NICS published 'Generative AI Cyber Risk Guidance' 2024 — non-binding for non-CIP",
|
|
1468
|
+
"MCP/agent trust: emerging NICS guidance; not in primary law"
|
|
1469
|
+
],
|
|
1470
|
+
"ai_coverage": "NICS GenAI Cyber Risk Guidance 2024 covers government and CIP usage; non-binding for private sector",
|
|
1471
|
+
"pqc_coverage": "NICS PQC migration pilots underway in government sector",
|
|
1472
|
+
"theater_risk": "low for CIPs — 1-hour notification SLA is among the strictest globally; gap is private-sector coverage outside CIP designation"
|
|
1473
|
+
}
|
|
1474
|
+
}
|
|
1475
|
+
},
|
|
1476
|
+
"ID": {
|
|
1477
|
+
"jurisdiction": "Indonesia",
|
|
1478
|
+
"frameworks": {
|
|
1479
|
+
"PDP_LAW": {
|
|
1480
|
+
"full_name": "Law No. 27 of 2022 on Personal Data Protection (Undang-Undang Pelindungan Data Pribadi, UU PDP)",
|
|
1481
|
+
"authority": "Personal Data Protection Agency (Lembaga Pelindungan Data Pribadi) — being established under Presidential Regulation pursuant to UU PDP Art. 58-60; interim oversight by Ministry of Communication and Informatics (Kominfo, now Komdigi)",
|
|
1482
|
+
"source": "https://peraturan.bpk.go.id/Details/229798/uu-no-27-tahun-2022",
|
|
1483
|
+
"effective_date": "2022-10-17 (promulgation); transition period to 2024-10-17 (full enforcement)",
|
|
1484
|
+
"version": "UU No. 27/2022; implementing Government Regulation in legislative pipeline",
|
|
1485
|
+
"security_article": "Art. 35 — Controller obligation to protect personal data and ensure security including encryption",
|
|
1486
|
+
"patch_sla": null,
|
|
1487
|
+
"notification_sla": 72,
|
|
1488
|
+
"notification_trigger": "Personal data protection failure causing data leakage, loss, or unauthorised processing (Art. 46)",
|
|
1489
|
+
"notification_notes": "UU PDP Art. 46: notify the Personal Data Protection Agency and affected data subjects in writing within 3x24 hours (72h) of becoming aware of the failure. Aligned with GDPR Art. 33 timing.",
|
|
1490
|
+
"critical_controls": [
|
|
1491
|
+
"Art. 16 — Lawful basis (consent or 5 other enumerated bases)",
|
|
1492
|
+
"Art. 35 — Security obligation: technical, organisational, and operational measures",
|
|
1493
|
+
"Art. 36 — Confidentiality obligation",
|
|
1494
|
+
"Art. 39 — Cross-border transfer: adequacy + binding agreement + consent",
|
|
1495
|
+
"Art. 46 — Breach notification within 72h",
|
|
1496
|
+
"Art. 53 — Penalties: administrative fines up to 2% of annual revenue per violation; criminal penalties up to 6 years imprisonment for unlawful processing of sensitive data"
|
|
1497
|
+
],
|
|
1498
|
+
"framework_gaps": [
|
|
1499
|
+
"Patch SLA: not addressed",
|
|
1500
|
+
"Implementing Government Regulation (Peraturan Pemerintah) not yet finalised as of 2026-05 — operational specifics await secondary legislation",
|
|
1501
|
+
"Personal Data Protection Agency not yet operational — interim Kominfo/Komdigi oversight limits enforcement",
|
|
1502
|
+
"AI/ML: UU PDP applies; no AI-specific controls; separate Komdigi GenAI Circular 2024 is non-binding",
|
|
1503
|
+
"PQC: not addressed"
|
|
1504
|
+
],
|
|
1505
|
+
"cross_reference_gdpr": {
|
|
1506
|
+
"overlaps": [
|
|
1507
|
+
"UU PDP structurally modelled on GDPR: lawful bases, controller/processor distinction, DPO requirement (Art. 53), DPIA (Art. 34), data subject rights, cross-border restrictions, 72h notification",
|
|
1508
|
+
"Penalty ceiling at 2% of annual revenue references GDPR 4% structure (lower ceiling)"
|
|
1509
|
+
],
|
|
1510
|
+
"divergences": [
|
|
1511
|
+
"Penalty cap 2% of annual revenue vs GDPR 4%",
|
|
1512
|
+
"Mandatory criminal penalties for unlawful processing of sensitive data (up to 6 years) — more punitive than GDPR which is administrative only",
|
|
1513
|
+
"No equivalent of GDPR EDPB consistency mechanism",
|
|
1514
|
+
"Personal Data Protection Agency model still being established — enforcement maturity lags formal legal alignment"
|
|
1515
|
+
]
|
|
1516
|
+
},
|
|
1517
|
+
"ai_coverage": "UU PDP applies to AI processing personal data; Komdigi Circular SE 9/2023 on AI Ethics is non-binding",
|
|
1518
|
+
"pqc_coverage": "Not addressed",
|
|
1519
|
+
"theater_risk": "high during 2024-2026 transition — formal alignment with GDPR exceeds enforcement capacity"
|
|
1520
|
+
},
|
|
1521
|
+
"BSSN_CYBER": {
|
|
1522
|
+
"full_name": "BSSN Technical Standards and ISO 27001 Implementation Guidance for Electronic System Operators (ESOs)",
|
|
1523
|
+
"authority": "National Cyber and Crypto Agency (Badan Siber dan Sandi Negara, BSSN)",
|
|
1524
|
+
"source": "https://bssn.go.id/",
|
|
1525
|
+
"effective_date": "BSSN Regulation 8/2020 (electronic system security standards); BSSN Regulation 4/2021 (sectoral CSIRT)",
|
|
1526
|
+
"version": "BSSN Reg. 8/2020; BSSN Reg. 4/2021",
|
|
1527
|
+
"sector": "Electronic System Operators (Penyelenggara Sistem Elektronik, PSE) including private platforms operating in Indonesia; Critical Information Infrastructure sectors via sub-regulations",
|
|
1528
|
+
"patch_sla": null,
|
|
1529
|
+
"notification_sla": null,
|
|
1530
|
+
"critical_controls": [
|
|
1531
|
+
"ISO/IEC 27001 implementation required for higher-risk PSEs",
|
|
1532
|
+
"Sectoral CSIRT participation under BSSN coordination",
|
|
1533
|
+
"Cryptography algorithm restrictions for government use (BSSN-approved list)",
|
|
1534
|
+
"Coordination with Bank Indonesia for financial sector and OJK for capital markets"
|
|
1535
|
+
],
|
|
1536
|
+
"framework_gaps": [
|
|
1537
|
+
"Patch SLA: not specified",
|
|
1538
|
+
"Notification SLA: sectoral, not BSSN-pinned",
|
|
1539
|
+
"AI/ML cyber controls: emerging — BSSN draft AI Cyber Resilience Guidance 2024 consultation",
|
|
1540
|
+
"Coordination overlap with Komdigi UU PDP regime creates dual-regulator complexity"
|
|
1541
|
+
],
|
|
1542
|
+
"ai_coverage": "BSSN draft guidance under consultation",
|
|
1543
|
+
"pqc_coverage": "BSSN ongoing assessment; crypto-localisation policy (use of BSSN-approved algorithms for government) overlaps PQC roadmap",
|
|
1544
|
+
"theater_risk": "medium — ISO 27001 baseline is enforceable; sectoral fragmentation creates coverage gaps"
|
|
1545
|
+
},
|
|
1546
|
+
"BI_CYBER_REG": {
|
|
1547
|
+
"full_name": "Bank Indonesia Regulation No. 23/6/PBI/2021 on Payment Service Providers + OJK Regulation 11/POJK.03/2022 on Cyber Resilience for Commercial Banks",
|
|
1548
|
+
"authority": "Bank Indonesia (BI); Financial Services Authority (Otoritas Jasa Keuangan, OJK)",
|
|
1549
|
+
"source": "https://www.bi.go.id/en/publikasi/peraturan/Pages/PBI_230621.aspx",
|
|
1550
|
+
"effective_date": "BI Reg. 23/6 in force 2021-07-01; OJK POJK 11/2022 in force 2022-07-01",
|
|
1551
|
+
"version": "PBI No. 23/6/PBI/2021; POJK No. 11/POJK.03/2022",
|
|
1552
|
+
"sector": "Payment service providers (BI); commercial banks (OJK); each regulator has parallel cyber resilience requirements",
|
|
1553
|
+
"patch_sla": null,
|
|
1554
|
+
"notification_sla": null,
|
|
1555
|
+
"notification_trigger": "Significant cyber incident affecting payment services or banking operations",
|
|
1556
|
+
"notification_notes": "POJK 11/2022 requires reporting to OJK 'as soon as possible' typically interpreted as within 24 hours for major incidents",
|
|
1557
|
+
"critical_controls": [
|
|
1558
|
+
"POJK 11/2022 Articles on governance, risk management, security testing, incident response",
|
|
1559
|
+
"PBI 23/6 Articles on payment system reliability and security including TLPT for payment institutions",
|
|
1560
|
+
"Coordination with BSSN for sectoral CSIRT"
|
|
1561
|
+
],
|
|
1562
|
+
"framework_gaps": [
|
|
1563
|
+
"Patch SLA: not numerically specified",
|
|
1564
|
+
"AI/ML and GenAI: not specifically addressed in primary regulations",
|
|
1565
|
+
"PQC: not addressed"
|
|
1566
|
+
],
|
|
1567
|
+
"ai_coverage": "Not directly addressed; OJK separate AI/ML guidance in development",
|
|
1568
|
+
"pqc_coverage": "Not addressed",
|
|
1569
|
+
"theater_risk": "medium — sector-specific regimes are substantive; cross-regulator coordination gaps"
|
|
1570
|
+
}
|
|
1571
|
+
}
|
|
1572
|
+
},
|
|
1573
|
+
"VN": {
|
|
1574
|
+
"jurisdiction": "Vietnam",
|
|
1575
|
+
"frameworks": {
|
|
1576
|
+
"PDPD": {
|
|
1577
|
+
"full_name": "Decree No. 13/2023/ND-CP on Personal Data Protection (Personal Data Protection Decree, PDPD)",
|
|
1578
|
+
"authority": "Ministry of Public Security (Bộ Công An) — Department of Cybersecurity and Hi-Tech Crime Prevention (A05)",
|
|
1579
|
+
"source": "https://thuvienphapluat.vn/van-ban/Cong-nghe-thong-tin/Nghi-dinh-13-2023-ND-CP-bao-ve-du-lieu-ca-nhan-465185.aspx",
|
|
1580
|
+
"effective_date": "2023-07-01",
|
|
1581
|
+
"version": "Decree 13/2023/ND-CP — first comprehensive personal data protection framework; draft Personal Data Protection Law in legislative pipeline (expected 2026)",
|
|
1582
|
+
"security_article": "Art. 27 — Measures for protecting personal data",
|
|
1583
|
+
"patch_sla": null,
|
|
1584
|
+
"notification_sla": 72,
|
|
1585
|
+
"notification_trigger": "Personal data breach causing risk to data subject rights and interests",
|
|
1586
|
+
"notification_notes": "Decree 13 Art. 23: notify Ministry of Public Security within 72 hours of becoming aware of a breach. Notification to data subjects also required for high-risk breaches.",
|
|
1587
|
+
"critical_controls": [
|
|
1588
|
+
"Art. 11 — Consent as primary lawful basis (narrower than GDPR)",
|
|
1589
|
+
"Art. 23 — Breach notification (72h to MoPS)",
|
|
1590
|
+
"Art. 25 — Mandatory Impact Assessment for personal data processing filed with A05 before processing commences",
|
|
1591
|
+
"Art. 25 — Mandatory Impact Assessment for cross-border data transfer filed with A05",
|
|
1592
|
+
"Art. 27 — Security measures: encryption, access control, secure deletion, processor agreements",
|
|
1593
|
+
"Penalties: Decree 13 cross-references administrative penalties under Decree 15/2020/ND-CP and criminal liability under Penal Code"
|
|
1594
|
+
],
|
|
1595
|
+
"framework_gaps": [
|
|
1596
|
+
"Patch SLA: not specified",
|
|
1597
|
+
"Mandatory impact assessment filing with MoPS creates de facto state-visibility into processing activities — significant divergence from GDPR DPIA (internal record)",
|
|
1598
|
+
"AI/ML: not specifically addressed; covered by general personal data rules",
|
|
1599
|
+
"Penalty regime spread across multiple decrees — uncertain ceiling",
|
|
1600
|
+
"Draft PDP Law (2024-2025 consultation) expected to consolidate and add administrative fines"
|
|
1601
|
+
],
|
|
1602
|
+
"cross_reference_gdpr": {
|
|
1603
|
+
"overlaps": [
|
|
1604
|
+
"72-hour notification timing aligned with GDPR Art. 33",
|
|
1605
|
+
"Concept of impact assessment (Art. 25) parallels GDPR DPIA"
|
|
1606
|
+
],
|
|
1607
|
+
"divergences": [
|
|
1608
|
+
"Mandatory pre-processing impact assessment filing with Ministry of Public Security — state-visibility model, no GDPR equivalent",
|
|
1609
|
+
"Consent-default model is narrower than GDPR 6 lawful bases",
|
|
1610
|
+
"Penalty regime is decentralised across multiple decrees vs GDPR Art. 83 unified structure",
|
|
1611
|
+
"Cross-border transfer impact assessment required for any outbound transfer — far stricter than GDPR Chapter V"
|
|
1612
|
+
]
|
|
1613
|
+
},
|
|
1614
|
+
"ai_coverage": "Not specifically addressed in PDPD; subject to MoPS oversight under cybersecurity framework",
|
|
1615
|
+
"pqc_coverage": "Not addressed",
|
|
1616
|
+
"theater_risk": "medium — pre-processing filings produce real visibility for MoPS but private-sector compliance maturity is uneven"
|
|
1617
|
+
},
|
|
1618
|
+
"CYBERSECURITY_LAW": {
|
|
1619
|
+
"full_name": "Law on Cybersecurity 2018 (Luật An ninh mạng) + Decree 53/2022/ND-CP on guidelines for implementation",
|
|
1620
|
+
"authority": "Ministry of Public Security (A05); Ministry of Information and Communications (MIC) for technical standards",
|
|
1621
|
+
"source": "https://english.luatvietnam.vn/cyber-security-law-2018-no-242018qh14-of-the-national-assembly-159039-Doc1.html",
|
|
1622
|
+
"effective_date": "2019-01-01 (Cybersecurity Law); 2022-10-01 (Decree 53/2022 — data localisation obligations)",
|
|
1623
|
+
"version": "Law 24/2018/QH14; Decree 53/2022/ND-CP",
|
|
1624
|
+
"critical_controls": [
|
|
1625
|
+
"Art. 26 of Law — Foreign enterprises providing services in cyberspace in Vietnam must store user data in Vietnam and establish a local representative office or branch",
|
|
1626
|
+
"Decree 53 Art. 26 — Data localisation: personal data of Vietnamese users, data generated in Vietnam, user behaviour data, relationship data must be stored locally for designated services (telecom, e-commerce, OTT, social, gaming, banking)",
|
|
1627
|
+
"Decree 53 — 24-month grace period for compliance; MoPS may issue specific localisation orders after risk assessment",
|
|
1628
|
+
"Art. 17-18 of Law — Critical information system protection (8-tier classification)",
|
|
1629
|
+
"Cyber incident response coordination by VNCERT (under MIC) and A05 (under MoPS)"
|
|
1630
|
+
],
|
|
1631
|
+
"framework_gaps": [
|
|
1632
|
+
"Notification SLA: incident reporting timelines vary by sector and Critical Information System tier",
|
|
1633
|
+
"AI/ML cyber controls: not specifically addressed",
|
|
1634
|
+
"Overlap with PDPD creates dual-regulator complexity for personal data + cybersecurity"
|
|
1635
|
+
],
|
|
1636
|
+
"ai_coverage": "Not specifically addressed",
|
|
1637
|
+
"pqc_coverage": "Not addressed",
|
|
1638
|
+
"theater_risk": "medium-high — data localisation is enforceable in principle; selective MoPS enforcement to date"
|
|
1639
|
+
}
|
|
1640
|
+
}
|
|
1641
|
+
},
|
|
1642
|
+
"US_NYDFS": {
|
|
1643
|
+
"jurisdiction": "United States — New York State (sub-national, financial services)",
|
|
1644
|
+
"jurisdiction_note": "US sub-national but functionally a global financial-cyber baseline. Every entity holding a New York banking, insurance, or financial services licence — including non-US institutions — must comply, making Part 500 a de facto global standard for financial cyber posture. Distinct from US federal frameworks (NIST, CISA) covered under GLOBAL.",
|
|
1645
|
+
"frameworks": {
|
|
1646
|
+
"NYDFS_PART_500": {
|
|
1647
|
+
"full_name": "23 NYCRR Part 500 — Cybersecurity Requirements for Financial Services Companies",
|
|
1648
|
+
"authority": "New York State Department of Financial Services (DFS)",
|
|
1649
|
+
"source": "https://www.dfs.ny.gov/industry_guidance/cybersecurity",
|
|
1650
|
+
"effective_date": "2017-03-01 (original); Second Amendment adopted 2023-11-01 with phased compliance dates through 2025-11-01",
|
|
1651
|
+
"version": "Part 500 as amended 2023-11-01 (Second Amendment)",
|
|
1652
|
+
"sector": "Covered Entities: any individual or non-governmental entity operating under a DFS-issued licence, registration, charter, certificate, permit, accreditation, or similar authorisation — including foreign banks with NY branches, foreign insurers, money service businesses, virtual currency businesses (BitLicense), and mortgage entities",
|
|
1653
|
+
"patch_sla": null,
|
|
1654
|
+
"notification_sla": 72,
|
|
1655
|
+
"notification_trigger": "Cybersecurity event that has a reasonable likelihood of materially harming any material part of the normal operations of the Covered Entity OR a Cybersecurity Event involving Nonpublic Information that requires notice to a government body, self-regulatory agency, or other supervisory body (§500.17(a))",
|
|
1656
|
+
"notification_notes": "Section 500.17(a): notify DFS within 72 hours. Section 500.17(c) (Second Amendment): notify DFS within 24 hours of any ransom or extortion payment, with detailed follow-up explanation within 30 days. Section 500.17(b): annual written notice of compliance (CISO certification) due by April 15 each year — failure to file is itself a violation.",
|
|
1657
|
+
"critical_controls": [
|
|
1658
|
+
"§500.2 — Cybersecurity Program: risk-based program with required functions",
|
|
1659
|
+
"§500.3 — Cybersecurity Policy: written, approved by senior governing body annually",
|
|
1660
|
+
"§500.4 — CISO designation; CISO report to senior governing body at least annually (Second Amendment expanded to material risks, exceptions, test results)",
|
|
1661
|
+
"§500.5 — Vulnerability management: annual penetration testing + bi-annual vulnerability assessments (Second Amendment added automated scans + manual reviews)",
|
|
1662
|
+
"§500.7 — Access privileges with periodic review; privileged access tightly restricted (Second Amendment)",
|
|
1663
|
+
"§500.9 — Risk Assessment: at least annually; foundation for the Cybersecurity Program",
|
|
1664
|
+
"§500.11 — Third Party Service Provider Security Policy",
|
|
1665
|
+
"§500.12 — Multi-Factor Authentication for all individuals accessing any information system (Second Amendment expanded to all remote and privileged access, no exceptions for senior officers)",
|
|
1666
|
+
"§500.13 — Asset management with documented end-of-life policy (Second Amendment new requirement)",
|
|
1667
|
+
"§500.14 — Cybersecurity awareness training including social engineering",
|
|
1668
|
+
"§500.15 — Encryption of Nonpublic Information in transit and at rest",
|
|
1669
|
+
"§500.16 — Incident Response Plan plus Business Continuity and Disaster Recovery plans (Second Amendment added BCDR/exercises)",
|
|
1670
|
+
"§500.17(a) — 72h DFS notification",
|
|
1671
|
+
"§500.17(c) — 24h ransom payment notification",
|
|
1672
|
+
"§500.17(b) — Annual CISO compliance certification (signed by CISO + highest-ranking executive)",
|
|
1673
|
+
"§500.19 — Class A Companies (large entities by employees + revenue thresholds): heightened requirements including independent audit, privileged access management tools, password vaults, EDR + SIEM"
|
|
1674
|
+
],
|
|
1675
|
+
"framework_gaps": [
|
|
1676
|
+
"Patch SLA: not numerically specified — risk-based vulnerability management programme",
|
|
1677
|
+
"AI/ML: 2024-10 DFS Industry Letter 'Cybersecurity Risks Arising from Artificial Intelligence' is interpretive guidance under Part 500; no AI-specific Part 500 amendment yet",
|
|
1678
|
+
"MCP/agent trust: not contemplated in Part 500",
|
|
1679
|
+
"PQC: not addressed — encryption requirement is algorithm-agnostic"
|
|
1680
|
+
],
|
|
1681
|
+
"ai_coverage": "DFS Industry Letter 2024-10 'Cybersecurity Risks Arising from Artificial Intelligence' — interpretive guidance applying Part 500 requirements to AI-driven attacks (deepfakes, AI-enabled social engineering, AI-enhanced reconnaissance) and Covered Entity AI use; expands MFA, training, third-party, and risk assessment obligations to AI context",
|
|
1682
|
+
"pqc_coverage": "Not addressed",
|
|
1683
|
+
"theater_risk": "low — Part 500 has prescriptive technical requirements and the §500.17(b) annual CISO certification creates personal accountability; gap is in AI specificity",
|
|
1684
|
+
"global_influence_note": "Part 500 set the template for: NAIC Insurance Data Security Model Law (adopted by 25+ US states); FTC Safeguards Rule (2021 amendments); SEC Cybersecurity Risk Management Rules (2023); NYDFS-aligned amendments to NIST 800-53 references in financial sector. Foreign-headquartered banks with NY branches (e.g., UBS, Deutsche Bank, HSBC, Mizuho) apply Part 500 globally as the binding minimum."
|
|
1685
|
+
}
|
|
1686
|
+
}
|
|
1687
|
+
},
|
|
1688
|
+
"GLOBAL": {
|
|
1689
|
+
"jurisdiction": "International / Multi-Jurisdiction",
|
|
1690
|
+
"frameworks": {
|
|
1691
|
+
"ISO_27001_2022": {
|
|
1692
|
+
"full_name": "ISO/IEC 27001:2022 Information Security Management Systems",
|
|
1693
|
+
"authority": "ISO/IEC JTC 1/SC 27",
|
|
1694
|
+
"source": "https://www.iso.org/standard/27001",
|
|
1695
|
+
"effective_date": "2022-10-25",
|
|
1696
|
+
"version": "ISO/IEC 27001:2022",
|
|
1697
|
+
"patch_sla": null,
|
|
1698
|
+
"notification_sla": null,
|
|
1699
|
+
"critical_controls": [
|
|
1700
|
+
"A.8.8 — Management of technical vulnerabilities (patch management)",
|
|
1701
|
+
"A.8.28 — Secure coding",
|
|
1702
|
+
"A.8.30 — Outsourced development",
|
|
1703
|
+
"A.8.34 — Protection of information systems during audit testing",
|
|
1704
|
+
"A.6.8 — Information security event reporting"
|
|
1705
|
+
],
|
|
1706
|
+
"framework_gaps": [
|
|
1707
|
+
"A.8.8 'appropriate timescales' undefined — typically 30-day critical, which is exploitation acceptance",
|
|
1708
|
+
"A.8.28 secure coding does not address prompt injection (semantic vulnerability, not code vulnerability)",
|
|
1709
|
+
"A.8.30 outsourced development does not cover MCP server supply chain",
|
|
1710
|
+
"No AI system security annex — ISO 42001 (AI management) published separately, not yet integrated",
|
|
1711
|
+
"No PQC requirement — 'appropriate cryptography' standard (A.8.24) allows classical-only",
|
|
1712
|
+
"No live kernel patching requirement"
|
|
1713
|
+
],
|
|
1714
|
+
"ai_coverage": "ISO 42001:2023 (AI management systems) is the companion standard; not integrated into 27001 certification",
|
|
1715
|
+
"pqc_coverage": "A.8.24 (use of cryptography) requires policy but does not mandate algorithm evolution",
|
|
1716
|
+
"theater_risk": "medium-high — certification is achievable with theater in A.8.8 patch SLA"
|
|
1717
|
+
},
|
|
1718
|
+
"CSA_CCM_V4": {
|
|
1719
|
+
"full_name": "CSA Cloud Controls Matrix v4.0",
|
|
1720
|
+
"authority": "Cloud Security Alliance",
|
|
1721
|
+
"source": "https://cloudsecurityalliance.org/research/cloud-controls-matrix",
|
|
1722
|
+
"effective_date": "2021-09-01",
|
|
1723
|
+
"version": "4.0",
|
|
1724
|
+
"critical_controls": [
|
|
1725
|
+
"TVM-02 — Vulnerability Management (identification and prioritization)",
|
|
1726
|
+
"TVM-03 — Patch Management",
|
|
1727
|
+
"AIS-01 through AIS-06 — Application and Interface Security",
|
|
1728
|
+
"SEF-06 — Incident Reporting (24h notification target)",
|
|
1729
|
+
"STA-09 — Third Party Security",
|
|
1730
|
+
"CEK-01 through CEK-21 — Cryptography, Encryption and Key Management"
|
|
1731
|
+
],
|
|
1732
|
+
"framework_gaps": [
|
|
1733
|
+
"TVM-03 patch SLA: cloud-specific but undefined timeline for customer-side OS patching",
|
|
1734
|
+
"AIS controls: no AI/ML security controls in CCM v4.0",
|
|
1735
|
+
"STA-09 third-party: MCP servers and AI tool plugins not in cloud third-party scope",
|
|
1736
|
+
"CEK controls: comprehensive but no PQC requirement — algorithm agnostic",
|
|
1737
|
+
"Prompt injection: not addressed"
|
|
1738
|
+
],
|
|
1739
|
+
"ai_coverage": "CSA has published AI Safety Initiative; CCM v4.0 does not include AI-specific controls",
|
|
1740
|
+
"pqc_coverage": "CEK controls are algorithm-agnostic; no PQC mandate",
|
|
1741
|
+
"theater_risk": "medium — CCM is specific to cloud; gaps in AI and patching SLA"
|
|
1742
|
+
},
|
|
1743
|
+
"CIS_V8": {
|
|
1744
|
+
"full_name": "CIS Controls v8",
|
|
1745
|
+
"authority": "Center for Internet Security",
|
|
1746
|
+
"source": "https://www.cisecurity.org/controls/v8",
|
|
1747
|
+
"effective_date": "2021-05-18",
|
|
1748
|
+
"version": "8.0",
|
|
1749
|
+
"patch_sla": 336,
|
|
1750
|
+
"patch_sla_note": "CIS Control 7.3: 14 days for critical OS patches on enterprise assets. Same as Cyber Essentials — better than NIST, worse than ASD.",
|
|
1751
|
+
"critical_controls": [
|
|
1752
|
+
"CIS 1 — Inventory and Control of Enterprise Assets",
|
|
1753
|
+
"CIS 2 — Inventory and Control of Software Assets",
|
|
1754
|
+
"CIS 4 — Secure Configuration of Enterprise Assets",
|
|
1755
|
+
"CIS 7 — Continuous Vulnerability Management (7.3 = 14-day critical SLA)",
|
|
1756
|
+
"CIS 12 — Network Infrastructure Management",
|
|
1757
|
+
"CIS 13 — Network Monitoring and Defense"
|
|
1758
|
+
],
|
|
1759
|
+
"framework_gaps": [
|
|
1760
|
+
"CIS 7.3 14-day SLA: insufficient for CISA KEV + deterministic public PoC",
|
|
1761
|
+
"AI/ML: no CIS controls for AI system security",
|
|
1762
|
+
"MCP/agent trust: not addressed",
|
|
1763
|
+
"PQC: CIS 10 (Malware Defenses) does not contemplate quantum threat to current crypto",
|
|
1764
|
+
"Prompt injection: not addressed",
|
|
1765
|
+
"Live kernel patching: not addressed as a required capability"
|
|
1766
|
+
],
|
|
1767
|
+
"ai_coverage": "None in CIS v8",
|
|
1768
|
+
"pqc_coverage": "None in CIS v8",
|
|
1769
|
+
"theater_risk": "medium — Implementation Groups (IG1/2/3) provide maturity pathway; SLA gap is the main issue"
|
|
1770
|
+
}
|
|
1771
|
+
}
|
|
1772
|
+
},
|
|
1773
|
+
"NO": {
|
|
1774
|
+
"jurisdiction": "Norway",
|
|
1775
|
+
"jurisdiction_note": "EEA member, not EU member. Norway implements EU acts via EEA Joint Committee decisions; GDPR and NIS2 apply via national implementing statutes rather than direct effect. Aligns broadly with the EU baseline; deviations are flagged below.",
|
|
1776
|
+
"frameworks": {
|
|
1777
|
+
"PERSONOPPLYSNINGSLOVEN": {
|
|
1778
|
+
"full_name": "Personopplysningsloven (Personal Data Act) — implementing GDPR via the EEA",
|
|
1779
|
+
"authority": "Datatilsynet (Norwegian Data Protection Authority)",
|
|
1780
|
+
"source": "https://lovdata.no/dokument/NL/lov/2018-06-15-38",
|
|
1781
|
+
"effective_date": "2018-07-20",
|
|
1782
|
+
"version": "LOV-2018-06-15-38 (transposes Regulation (EU) 2016/679 via EEA Joint Committee Decision No 154/2018)",
|
|
1783
|
+
"security_article": "GDPR Art. 32 (incorporated by reference) + sectoral Norwegian rules",
|
|
1784
|
+
"patch_sla": null,
|
|
1785
|
+
"notification_sla": 72,
|
|
1786
|
+
"notification_trigger": "Personal data breach affecting data subject rights (GDPR Art. 33 standard)",
|
|
1787
|
+
"critical_controls": [
|
|
1788
|
+
"GDPR Art. 32 — appropriate technical and organisational measures (incorporated)",
|
|
1789
|
+
"GDPR Art. 33 — 72-hour breach notification to Datatilsynet",
|
|
1790
|
+
"Sectoral overlays: Helseregisterloven (health registries), Politiregisterloven (police data), Ekomloven (electronic communications)"
|
|
1791
|
+
],
|
|
1792
|
+
"framework_gaps": [
|
|
1793
|
+
"Same Art. 32 ambiguity as EU GDPR baseline — no technical specification",
|
|
1794
|
+
"AI/ML: no Norway-specific statute as of 2026-05; EU AI Act will apply via EEA once incorporated (EEA Joint Committee process pending)",
|
|
1795
|
+
"PQC: not addressed in Personopplysningsloven; NSM cryptographic recommendations are separate"
|
|
1796
|
+
],
|
|
1797
|
+
"ai_coverage": "EU AI Act incorporation into EEA is pending as of 2026-05; Datatilsynet has published AI guidance under GDPR for automated decision-making and profiling",
|
|
1798
|
+
"pqc_coverage": "Not addressed at statute level; see NSM_GRUNNPRINSIPPER below",
|
|
1799
|
+
"theater_risk": "low-medium — Datatilsynet is an active enforcer; SLA gap is the EU baseline gap"
|
|
1800
|
+
},
|
|
1801
|
+
"NSM_GRUNNPRINSIPPER": {
|
|
1802
|
+
"full_name": "NSM Grunnprinsipper for IKT-sikkerhet (NSM Basic Principles for ICT Security) v2.1",
|
|
1803
|
+
"authority": "Nasjonal sikkerhetsmyndighet (NSM) — Norwegian National Security Authority",
|
|
1804
|
+
"source": "https://nsm.no/regelverk-og-hjelp/rad-og-anbefalinger/grunnprinsipper-for-ikt-sikkerhet/",
|
|
1805
|
+
"effective_date": "2020-04-01",
|
|
1806
|
+
"version": "v2.1 (2023)",
|
|
1807
|
+
"sector": "Cross-sector; mandatory for entities subject to Sikkerhetsloven (Security Act 2018); strongly recommended baseline for public sector",
|
|
1808
|
+
"patch_sla": 720,
|
|
1809
|
+
"patch_sla_note": "NSM Grunnprinsipper 2.2.5 recommends 'as soon as possible' for known-exploited vulnerabilities; sector guidance and audit practice operationalise this as ~30 days for critical, with accelerated handling for actively exploited cases.",
|
|
1810
|
+
"critical_controls": [
|
|
1811
|
+
"Identify (1.x) — asset and dependency inventory",
|
|
1812
|
+
"Protect (2.x) — secure configuration, patch management (2.2.5), access control, cryptography (2.5)",
|
|
1813
|
+
"Detect (3.x) — security monitoring and detection",
|
|
1814
|
+
"Respond and Recover (4.x) — incident handling and continuity",
|
|
1815
|
+
"Sikkerhetsloven §§4-5 to 4-7 — mandatory security measures for entities handling classified or critical-function information"
|
|
1816
|
+
],
|
|
1817
|
+
"framework_gaps": [
|
|
1818
|
+
"Grunnprinsipper is guidance, not statute, except where pulled in by Sikkerhetsloven scope",
|
|
1819
|
+
"AI/ML: NSM Threat Assessment 2025 names AI as accelerant; Grunnprinsipper has no AI-specific control yet",
|
|
1820
|
+
"MCP/agent trust: not contemplated",
|
|
1821
|
+
"PQC: NSM published PQC migration guidance in 2024 recommending hybrid schemes for classified systems; no statutory deadline"
|
|
1822
|
+
],
|
|
1823
|
+
"ai_coverage": "Threat-level awareness in NSM annual assessments; no specific Grunnprinsipper control",
|
|
1824
|
+
"pqc_coverage": "NSM PQC migration guidance (2024) — hybrid recommended for high-sensitivity systems; aligned with BSI and ANSSI direction",
|
|
1825
|
+
"theater_risk": "medium — Grunnprinsipper is comprehensive but compliance is largely self-attested outside Sikkerhetsloven scope",
|
|
1826
|
+
"cross_reference_baseline": "Aligned with ISO/IEC 27001:2022, NIST CSF 2.0, and the EU NIS2 Art. 21 control families; Norway-specific overlay for national-security context"
|
|
1827
|
+
},
|
|
1828
|
+
"NIS2_NORWAY": {
|
|
1829
|
+
"full_name": "Digitalsikkerhetsloven (Digital Security Act) — Norwegian transposition of NIS2",
|
|
1830
|
+
"authority": "NSM as national CSIRT; Nkom (telecom), Finanstilsynet (finance), NVE (energy), Helsedirektoratet (health), and other sectoral authorities",
|
|
1831
|
+
"source": "https://www.regjeringen.no/no/dokumenter/prop.-109-l-20232024/id3035898/",
|
|
1832
|
+
"effective_date": "Anticipated EEA-implementation effective in 2026; Prop. 109 L (2023-2024) submitted to Storting; NIS2 incorporated into the EEA Agreement subject to Joint Committee adoption",
|
|
1833
|
+
"version": "Prop. 109 L (2023-2024) — Digitalsikkerhetsloven (in legislative process as of 2026-05)",
|
|
1834
|
+
"notification_sla": 24,
|
|
1835
|
+
"notification_trigger": "Significant incident at essential/important entity (NIS2 standard)",
|
|
1836
|
+
"critical_controls": [
|
|
1837
|
+
"NIS2 Art. 21 risk management measures (incorporated)",
|
|
1838
|
+
"Art. 23 — 24h early warning / 72h notification / final report timing",
|
|
1839
|
+
"Sectoral overlays: Finanstilsynet's IKT-forskrift for finance, NVE's beredskapsforskrift for energy"
|
|
1840
|
+
],
|
|
1841
|
+
"framework_gaps": [
|
|
1842
|
+
"Legislative delay relative to EU 2024-10-17 deadline — EEA Joint Committee process",
|
|
1843
|
+
"Same Art. 21 patch-SLA undefined gap as EU NIS2",
|
|
1844
|
+
"OT/ICS coverage: NVE beredskapsforskrift §6 covers Norwegian energy OT, but cross-sector OT guidance is fragmented across NSM, DSB and sectoral regulators"
|
|
1845
|
+
],
|
|
1846
|
+
"ai_coverage": "Same as EU NIS2 — no AI-specific measures",
|
|
1847
|
+
"pqc_coverage": "Same as EU NIS2 — 'state of the art' without PQC deadline",
|
|
1848
|
+
"theater_risk": "medium — substantive once enacted; transition window creates current ambiguity"
|
|
1849
|
+
},
|
|
1850
|
+
"FINANSTILSYNET_IKT": {
|
|
1851
|
+
"full_name": "Forskrift om bruk av informasjons- og kommunikasjonsteknologi (IKT-forskriften)",
|
|
1852
|
+
"authority": "Finanstilsynet (Norwegian Financial Supervisory Authority)",
|
|
1853
|
+
"source": "https://lovdata.no/dokument/SF/forskrift/2003-05-21-630",
|
|
1854
|
+
"effective_date": "2003-07-01",
|
|
1855
|
+
"version": "FOR-2003-05-21-630 (current consolidated text; DORA-aligned amendments expected as DORA enters EEA)",
|
|
1856
|
+
"sector": "Finance — banks, insurers, payment service providers, investment firms",
|
|
1857
|
+
"critical_controls": [
|
|
1858
|
+
"§3 — ICT strategy and governance",
|
|
1859
|
+
"§4-5 — Risk analysis and incident management",
|
|
1860
|
+
"§7-8 — Operations management, change control, backup",
|
|
1861
|
+
"§9 — Outsourcing oversight (alignment path for DORA Art. 28-30)"
|
|
1862
|
+
],
|
|
1863
|
+
"framework_gaps": [
|
|
1864
|
+
"Pre-DORA framework — Finanstilsynet circulars expand on incident reporting in practice; DORA EEA incorporation will supersede in financial scope",
|
|
1865
|
+
"AI/ML: not specifically addressed; Finanstilsynet 2024 letter on AI in finance is supervisory expectation, not statute"
|
|
1866
|
+
],
|
|
1867
|
+
"ai_coverage": "Finanstilsynet supervisory expectations letter on AI use in financial institutions (2024) — interpretive only",
|
|
1868
|
+
"pqc_coverage": "Not addressed",
|
|
1869
|
+
"theater_risk": "low — Finanstilsynet conducts on-site ICT inspections"
|
|
1870
|
+
}
|
|
1871
|
+
}
|
|
1872
|
+
},
|
|
1873
|
+
"MX": {
|
|
1874
|
+
"jurisdiction": "Mexico",
|
|
1875
|
+
"frameworks": {
|
|
1876
|
+
"LFPDPPP": {
|
|
1877
|
+
"full_name": "Ley Federal de Protección de Datos Personales en Posesión de los Particulares (Federal Law on Protection of Personal Data in Possession of Private Parties)",
|
|
1878
|
+
"authority": "Until 2025: INAI (Instituto Nacional de Transparencia, Acceso a la Información y Protección de Datos Personales); reform in progress to transfer functions to a successor agency under the Secretaría Anticorrupción y Buen Gobierno (constitutional reform published 2024-12-20 dissolving INAI; transition law pending)",
|
|
1879
|
+
"source": "https://www.diputados.gob.mx/LeyesBiblio/pdf/LFPDPPP.pdf",
|
|
1880
|
+
"effective_date": "2010-07-06",
|
|
1881
|
+
"version": "DOF 05-07-2010 (Reglamento DOF 21-12-2011)",
|
|
1882
|
+
"security_article": "Art. 19 — Security measures",
|
|
1883
|
+
"patch_sla": null,
|
|
1884
|
+
"notification_sla": null,
|
|
1885
|
+
"notification_trigger": "Security breach affecting rights of data subjects (Reglamento Art. 63)",
|
|
1886
|
+
"notification_notes": "Reglamento Art. 64: notify data subjects 'without delay' (sin dilación). No statutory hour SLA. Practice after 2024 INAI guidance trended toward 72h alignment with international norms; successor-agency rulemaking will set the new floor.",
|
|
1887
|
+
"critical_controls": [
|
|
1888
|
+
"Art. 6 — Principles: legality, consent, information, quality, purpose, fidelity, proportionality, accountability",
|
|
1889
|
+
"Art. 19 — Administrative, technical and physical security measures appropriate to risk",
|
|
1890
|
+
"Reglamento Arts. 57-66 — Detailed security obligations including risk analysis, vulnerability management, breach handling",
|
|
1891
|
+
"INAI Recommendations on Security of Personal Data (2018 update) — non-binding but used in enforcement"
|
|
1892
|
+
],
|
|
1893
|
+
"framework_gaps": [
|
|
1894
|
+
"INAI dissolution (constitutional reform 2024-12-20) creates institutional discontinuity — enforcement priorities and timelines uncertain through transition",
|
|
1895
|
+
"Art. 19 'appropriate' measures undefined at statute level",
|
|
1896
|
+
"AI/ML: not addressed in LFPDPPP; pending Iniciativa de Ley Federal para Regular la Inteligencia Artificial under congressional discussion",
|
|
1897
|
+
"Patch SLA: not specified",
|
|
1898
|
+
"PQC: not addressed",
|
|
1899
|
+
"Cross-border transfers: Art. 36 requires consent or enumerated exception, weaker than GDPR adequacy/SCC structure"
|
|
1900
|
+
],
|
|
1901
|
+
"ai_coverage": "Not in LFPDPPP; INAI 2023 'Guía para el Tratamiento de Datos Personales en la Inteligencia Artificial' is non-binding",
|
|
1902
|
+
"pqc_coverage": "Not addressed",
|
|
1903
|
+
"theater_risk": "high during 2025-2026 transition — institutional successor and rulemaking pace uncertain",
|
|
1904
|
+
"cross_reference_baseline": "Article 19 'appropriate measures' standard mirrors GDPR Art. 32 ambiguity; LFPDPPP predates GDPR but Reglamento Arts. 57-66 introduce GDPR-comparable risk methodology. Diverges sharply from EU on cross-border transfer mechanism (consent-default vs adequacy/SCC)."
|
|
1905
|
+
},
|
|
1906
|
+
"LGPDPPSO": {
|
|
1907
|
+
"full_name": "Ley General de Protección de Datos Personales en Posesión de Sujetos Obligados (General Law on Protection of Personal Data in Possession of Obligated Parties)",
|
|
1908
|
+
"authority": "INAI / successor federal authority; state-level data protection authorities for state and municipal obligated parties",
|
|
1909
|
+
"source": "https://www.diputados.gob.mx/LeyesBiblio/pdf/LGPDPPSO.pdf",
|
|
1910
|
+
"effective_date": "2017-01-27",
|
|
1911
|
+
"version": "DOF 26-01-2017",
|
|
1912
|
+
"sector": "Public sector — federal, state, municipal entities and entities exercising public authority",
|
|
1913
|
+
"critical_controls": [
|
|
1914
|
+
"Title III — Principles, duties and rights",
|
|
1915
|
+
"Arts. 31-39 — Security measures, breach notification, security incident response",
|
|
1916
|
+
"Title VII — Inter-agency data transfers within Mexican public sector",
|
|
1917
|
+
"Title IX — National System of Transparency, Access to Information and Personal Data Protection"
|
|
1918
|
+
],
|
|
1919
|
+
"framework_gaps": [
|
|
1920
|
+
"Same constitutional reform uncertainty as LFPDPPP — INAI dissolution affects both public and private regimes",
|
|
1921
|
+
"Coordination between federal and 32 state-level data protection authorities is uneven; enforcement varies by state",
|
|
1922
|
+
"AI/ML in public-sector deployments (e.g., predictive policing pilots in CDMX, Jalisco): no statute-level controls"
|
|
1923
|
+
],
|
|
1924
|
+
"ai_coverage": "Not in LGPDPPSO; ad-hoc state and federal AI policies (e.g., CDMX Estrategia de IA)",
|
|
1925
|
+
"pqc_coverage": "Not addressed",
|
|
1926
|
+
"theater_risk": "high — fragmented public-sector compliance with limited enforcement resources outside federal level"
|
|
1927
|
+
},
|
|
1928
|
+
"CONDUSEF_CNBV_CYBER": {
|
|
1929
|
+
"full_name": "CNBV Disposiciones de Carácter General Aplicables a las Instituciones de Crédito — Annex 71 (Cyber Resilience) + CUB updates",
|
|
1930
|
+
"authority": "Comisión Nacional Bancaria y de Valores (CNBV); CONDUSEF for consumer protection in financial services; Banco de México for payment systems oversight",
|
|
1931
|
+
"source": "https://www.cnbv.gob.mx/Normatividad/Disposiciones%20de%20car%C3%A1cter%20general%20aplicables%20a%20las%20instituciones%20de%20cr%C3%A9dito.pdf",
|
|
1932
|
+
"effective_date": "Annex 71 effective in stages from 2021; cyber resilience requirements consolidated through 2024 reforms",
|
|
1933
|
+
"sector": "Banking, broker-dealers and other CNBV-regulated entities",
|
|
1934
|
+
"notification_sla": 24,
|
|
1935
|
+
"notification_trigger": "Cyber incident affecting operations, services, or sensitive information",
|
|
1936
|
+
"critical_controls": [
|
|
1937
|
+
"Annex 71 — Cyber Resilience Programme: governance, threat intelligence, incident response, third-party risk, continuous monitoring",
|
|
1938
|
+
"Cybersecurity certification of internal officers (CISO equivalent designation)",
|
|
1939
|
+
"Annual cyber-resilience attestation to CNBV",
|
|
1940
|
+
"Coordination with Banxico for incidents affecting SPEI (interbank payment system)"
|
|
1941
|
+
],
|
|
1942
|
+
"framework_gaps": [
|
|
1943
|
+
"Cybersecurity rules apply to regulated financial entities only — fintechs under Ley Fintech follow a related but separate regime",
|
|
1944
|
+
"AI/ML in credit scoring and AML: addressed by sectoral supervisory letters, not by Annex 71 specifically",
|
|
1945
|
+
"PQC: not addressed"
|
|
1946
|
+
],
|
|
1947
|
+
"ai_coverage": "Sectoral CNBV supervisory expectations; no statute-level AI rule",
|
|
1948
|
+
"pqc_coverage": "Not addressed",
|
|
1949
|
+
"theater_risk": "low-medium — CNBV inspections are substantive; SPEI incidents trigger Banxico oversight in parallel"
|
|
1950
|
+
}
|
|
1951
|
+
}
|
|
1952
|
+
},
|
|
1953
|
+
"AR": {
|
|
1954
|
+
"jurisdiction": "Argentina",
|
|
1955
|
+
"frameworks": {
|
|
1956
|
+
"LPDP": {
|
|
1957
|
+
"full_name": "Ley de Protección de los Datos Personales (Personal Data Protection Act) Law 25.326",
|
|
1958
|
+
"authority": "Agencia de Acceso a la Información Pública (AAIP) — Dirección Nacional de Protección de Datos Personales",
|
|
1959
|
+
"source": "http://servicios.infoleg.gob.ar/infolegInternet/anexos/60000-64999/64790/norma.htm",
|
|
1960
|
+
"effective_date": "2000-11-02",
|
|
1961
|
+
"version": "Law 25.326 (2000); modernised by Decree 480/2024 (2024-05-30) aligning with GDPR transfer mechanisms; AAIP Resolution 240/2022 sets technical security measures",
|
|
1962
|
+
"adequacy_status": "Argentina holds an EU adequacy decision under Decision 2003/490/EC; renewal under GDPR Art. 45 is the basis for Decree 480/2024 modernisation work",
|
|
1963
|
+
"security_article": "Art. 9 — Data security",
|
|
1964
|
+
"patch_sla": null,
|
|
1965
|
+
"notification_sla": null,
|
|
1966
|
+
"notification_trigger": "Security incident affecting personal data",
|
|
1967
|
+
"notification_notes": "AAIP Resolution 47/2018 and successor Resolution 240/2022 establish reporting expectations; Resolution 240/2022 Art. 4 references reporting incidents 'within 72 hours of knowledge' as recommended practice for medium/high-risk databases. No hard statutory hour SLA in Law 25.326.",
|
|
1968
|
+
"critical_controls": [
|
|
1969
|
+
"Art. 9 — security and confidentiality of data",
|
|
1970
|
+
"Art. 11-12 — Consent and information requirements",
|
|
1971
|
+
"Art. 16-17 — Rights of access, rectification, deletion",
|
|
1972
|
+
"AAIP Resolution 240/2022 — three-tier risk classification (basic, medium, critical) with corresponding technical measures",
|
|
1973
|
+
"Cross-border transfers: Art. 12 requires adequate destination or specified exception; Decree 480/2024 introduces SCC-style mechanisms"
|
|
1974
|
+
],
|
|
1975
|
+
"framework_gaps": [
|
|
1976
|
+
"Underlying Law 25.326 is 25+ years old; modernisation Bill (Proyecto de Ley de Protección de Datos Personales) tabled multiple times since 2018 has not been enacted as of 2026-05",
|
|
1977
|
+
"Decree 480/2024 is executive-level and addresses transfers but cannot rewrite the statutory penalty regime",
|
|
1978
|
+
"AI/ML: not addressed; Disposición 2/2023 of AAIP is non-binding guidance on AI",
|
|
1979
|
+
"Patch SLA: not addressed",
|
|
1980
|
+
"PQC: not addressed",
|
|
1981
|
+
"Enforcement penalties low relative to GDPR — historical fines capped at ARS amounts that erode with inflation"
|
|
1982
|
+
],
|
|
1983
|
+
"ai_coverage": "Disposición AAIP 2/2023 non-binding guidance",
|
|
1984
|
+
"pqc_coverage": "Not addressed",
|
|
1985
|
+
"theater_risk": "medium-high — adequacy maintenance pressure drives Decree-level fixes but penalty erosion undermines deterrence",
|
|
1986
|
+
"cross_reference_baseline": "Law 25.326 was modelled on Spain's 1999 LOPD which itself reflected Directive 95/46/EC. EU adequacy maintains a structural bridge to GDPR. Decree 480/2024 explicitly mirrors GDPR Chapter V transfer architecture (SCCs, adequacy, derogations)."
|
|
1987
|
+
},
|
|
1988
|
+
"BCRA_CYBER": {
|
|
1989
|
+
"full_name": "BCRA Comunicación 'A' 7724 and successor — Cyber Risk Management Requirements for Financial Entities",
|
|
1990
|
+
"authority": "Banco Central de la República Argentina (BCRA) — Superintendencia de Entidades Financieras y Cambiarias",
|
|
1991
|
+
"source": "https://www.bcra.gob.ar/Pdfs/comytexord/A7724.pdf",
|
|
1992
|
+
"effective_date": "2023-04-12",
|
|
1993
|
+
"version": "Comunicación 'A' 7724 (consolidates earlier 'A' 7266 series)",
|
|
1994
|
+
"sector": "Banking and exchange entities supervised by BCRA",
|
|
1995
|
+
"notification_sla": 24,
|
|
1996
|
+
"notification_trigger": "Cyber incident with significant impact on operations, customers or sensitive information",
|
|
1997
|
+
"critical_controls": [
|
|
1998
|
+
"Cyber risk governance with board-level oversight",
|
|
1999
|
+
"Identification, protection, detection, response and recovery functions aligned with NIST CSF",
|
|
2000
|
+
"Third-party cyber risk management",
|
|
2001
|
+
"Mandatory cyber incident notification to BCRA within 24 hours of identification",
|
|
2002
|
+
"Annual cyber resilience self-assessment"
|
|
2003
|
+
],
|
|
2004
|
+
"framework_gaps": [
|
|
2005
|
+
"Patch SLA: not numerically pinned",
|
|
2006
|
+
"AI/ML: not specifically addressed",
|
|
2007
|
+
"OT-style requirements limited to ATM/POS networks; broader OT not in scope"
|
|
2008
|
+
],
|
|
2009
|
+
"ai_coverage": "Not addressed",
|
|
2010
|
+
"pqc_coverage": "Not addressed",
|
|
2011
|
+
"theater_risk": "low-medium — BCRA inspections are substantive; smaller entities show maturity gaps"
|
|
2012
|
+
}
|
|
2013
|
+
}
|
|
2014
|
+
},
|
|
2015
|
+
"TR": {
|
|
2016
|
+
"jurisdiction": "Türkiye",
|
|
2017
|
+
"jurisdiction_note": "NATO member with national-level cyber posture coordinated via USOM. KVKK has been the personal-data baseline since 2016 and is undergoing a multi-year GDPR-alignment programme.",
|
|
2018
|
+
"frameworks": {
|
|
2019
|
+
"KVKK": {
|
|
2020
|
+
"full_name": "Kişisel Verilerin Korunması Kanunu (Law on the Protection of Personal Data) No. 6698",
|
|
2021
|
+
"authority": "Kişisel Verileri Koruma Kurumu (KVKK Authority / KVKK)",
|
|
2022
|
+
"source": "https://www.kvkk.gov.tr/Icerik/6649/Personal-Data-Protection-Law",
|
|
2023
|
+
"effective_date": "2016-04-07",
|
|
2024
|
+
"version": "Law No. 6698 (2016); substantively amended by Law No. 7499 (Official Gazette 2024-03-12) effective 2024-06-01, aligning cross-border transfer rules with GDPR-style adequacy / SCC / BCR / explicit consent framework",
|
|
2025
|
+
"security_article": "Art. 12 — Obligations regarding data security",
|
|
2026
|
+
"patch_sla": null,
|
|
2027
|
+
"notification_sla": 72,
|
|
2028
|
+
"notification_trigger": "Personal data breach (data being acquired by unauthorised parties)",
|
|
2029
|
+
"notification_notes": "Art. 12(5): 'as soon as possible' to the Board; KVKK Board Decision 2019/10 operationalises this as 72 hours from awareness, retained after the 2024 amendments.",
|
|
2030
|
+
"critical_controls": [
|
|
2031
|
+
"Art. 4 — Principles (lawfulness, accuracy, purpose limitation, data minimisation, storage limitation)",
|
|
2032
|
+
"Art. 5-6 — Lawful basis for general and special-category data",
|
|
2033
|
+
"Art. 9 (as amended 2024) — Cross-border transfers: adequacy decision by KVKK, SCC-equivalent contracts, binding corporate rules, or specified derogations; previous explicit-consent-default replaced",
|
|
2034
|
+
"Art. 12 — Security measures and breach notification",
|
|
2035
|
+
"Art. 16 — VERBİS — controllers' registry obligation"
|
|
2036
|
+
],
|
|
2037
|
+
"framework_gaps": [
|
|
2038
|
+
"Art. 12 'every kind of technical and administrative measure' undefined at statute level; Board decisions operationalise",
|
|
2039
|
+
"AI/ML: KVKK 2021 'Recommendations on Artificial Intelligence' are non-binding; no statute-level AI control",
|
|
2040
|
+
"Patch SLA: not specified",
|
|
2041
|
+
"PQC: not addressed",
|
|
2042
|
+
"Pre-2024 Art. 9 created mass non-compliance — newly created mechanisms still maturing operationally as of 2026-05"
|
|
2043
|
+
],
|
|
2044
|
+
"ai_coverage": "KVKK 2021 AI Recommendations + Sectoral guidance (banking, health) — non-binding",
|
|
2045
|
+
"pqc_coverage": "Not addressed; TÜBİTAK BİLGEM PQC research is preparatory",
|
|
2046
|
+
"theater_risk": "medium — Board has active enforcement record; cross-border transfer transition risk during 2024-2026",
|
|
2047
|
+
"cross_reference_baseline": "Pre-2024 KVKK diverged sharply from GDPR on cross-border transfers (explicit-consent default). Law 7499 (2024) realigns Art. 9 with GDPR Chapter V mechanisms. Notification SLA (72h) matches GDPR Art. 33."
|
|
2048
|
+
},
|
|
2049
|
+
"BDDK_CYBER": {
|
|
2050
|
+
"full_name": "BDDK Information Systems and Electronic Banking Regulation",
|
|
2051
|
+
"authority": "Bankacılık Düzenleme ve Denetleme Kurumu (BDDK) — Banking Regulation and Supervision Agency",
|
|
2052
|
+
"source": "https://www.bddk.org.tr/Mevzuat/DokumanGetir/1102",
|
|
2053
|
+
"effective_date": "2020-03-15",
|
|
2054
|
+
"version": "Regulation on Banks' Information Systems and Electronic Banking Services (Official Gazette 2020-03-15)",
|
|
2055
|
+
"sector": "Banking",
|
|
2056
|
+
"critical_controls": [
|
|
2057
|
+
"Art. 24-30 — Information security management programme",
|
|
2058
|
+
"Art. 32 — Penetration testing requirements (at least annual; following major changes)",
|
|
2059
|
+
"Art. 41 — Cyber incident management and reporting to BDDK",
|
|
2060
|
+
"Art. 22 — Outsourcing and third-party information system risk",
|
|
2061
|
+
"TR.SOME (national CERT) coordination for incidents with sectoral impact"
|
|
2062
|
+
],
|
|
2063
|
+
"framework_gaps": [
|
|
2064
|
+
"Patch SLA: not numerically specified",
|
|
2065
|
+
"AI/ML: not specifically addressed",
|
|
2066
|
+
"PQC: not addressed"
|
|
2067
|
+
],
|
|
2068
|
+
"ai_coverage": "Not specifically addressed",
|
|
2069
|
+
"pqc_coverage": "Not addressed",
|
|
2070
|
+
"theater_risk": "low-medium — BDDK conducts on-site IT examinations"
|
|
2071
|
+
},
|
|
2072
|
+
"USOM_NATIONAL": {
|
|
2073
|
+
"full_name": "USOM — Ulusal Siber Olaylara Müdahale Merkezi (National Computer Emergency Response Centre) Directives",
|
|
2074
|
+
"authority": "USOM (under BTK, Bilgi Teknolojileri ve İletişim Kurumu)",
|
|
2075
|
+
"source": "https://www.usom.gov.tr/",
|
|
2076
|
+
"effective_date": "USOM established 2013; coordination role formalised via Presidential Decree No. 48 (2019)",
|
|
2077
|
+
"sector": "Cross-sector — critical infrastructure SOMEs (Siber Olaylara Müdahale Ekibi) report to USOM",
|
|
2078
|
+
"critical_controls": [
|
|
2079
|
+
"Mandatory SOME formation for critical infrastructure operators in defined sectors (energy, water, transport, electronic communications, banking, finance, critical public services)",
|
|
2080
|
+
"Cyber threat intelligence sharing via USOM bulletins",
|
|
2081
|
+
"Coordination with NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE)"
|
|
2082
|
+
],
|
|
2083
|
+
"framework_gaps": [
|
|
2084
|
+
"No single comprehensive cyber-incident statute equivalent to NIS2 as of 2026-05; draft Cybersecurity Law has been in discussion",
|
|
2085
|
+
"Notification thresholds vary by sector and SOME maturity",
|
|
2086
|
+
"AI/ML cyber incident scope unclear"
|
|
2087
|
+
],
|
|
2088
|
+
"ai_coverage": "Not specifically addressed",
|
|
2089
|
+
"pqc_coverage": "Not addressed",
|
|
2090
|
+
"theater_risk": "medium — SOME maturity varies sharply across sectors"
|
|
2091
|
+
}
|
|
2092
|
+
}
|
|
2093
|
+
},
|
|
2094
|
+
"TH": {
|
|
2095
|
+
"jurisdiction": "Thailand",
|
|
2096
|
+
"frameworks": {
|
|
2097
|
+
"PDPA_TH": {
|
|
2098
|
+
"full_name": "Personal Data Protection Act B.E. 2562 (2019)",
|
|
2099
|
+
"authority": "Personal Data Protection Committee (PDPC) — Office of the PDPC (PDPC Office)",
|
|
2100
|
+
"source": "https://www.pdpc.or.th/en/laws-and-regulations/",
|
|
2101
|
+
"effective_date": "2019-05-27 (partial); 2022-06-01 (full enforcement)",
|
|
2102
|
+
"version": "B.E. 2562 (2019), full enforcement effective 2022-06-01 after two postponements",
|
|
2103
|
+
"security_article": "Sec. 37(1) — Security measures for personal data",
|
|
2104
|
+
"patch_sla": null,
|
|
2105
|
+
"notification_sla": 72,
|
|
2106
|
+
"notification_trigger": "Personal data breach that risks the rights and freedoms of persons",
|
|
2107
|
+
"notification_notes": "Sec. 37(4): notification to PDPC within 72 hours of becoming aware where there is risk to rights and freedoms; data subject notification where high risk.",
|
|
2108
|
+
"critical_controls": [
|
|
2109
|
+
"Sec. 19-21 — Lawful basis for processing including consent default",
|
|
2110
|
+
"Sec. 23 — Information to be provided to data subjects",
|
|
2111
|
+
"Sec. 26 — Special-category data restrictions",
|
|
2112
|
+
"Sec. 28-29 — Cross-border transfer requirements (adequacy or appropriate safeguards)",
|
|
2113
|
+
"Sec. 37 — Controller security and breach-notification obligations",
|
|
2114
|
+
"Sec. 41-42 — Data Protection Officer mandatory for specified controllers/processors"
|
|
2115
|
+
],
|
|
2116
|
+
"framework_gaps": [
|
|
2117
|
+
"Sec. 37(1) 'appropriate security measures' operationalised by PDPC Notification on Security Measures (2022) — minimum baseline only",
|
|
2118
|
+
"AI/ML: not addressed in PDPA; draft Royal Decree on AI under MDES consultation as of 2026-05",
|
|
2119
|
+
"Patch SLA: not specified",
|
|
2120
|
+
"PQC: not addressed",
|
|
2121
|
+
"Cross-border transfer regime: PDPC has not yet finalised adequacy list; certification and BCR-style mechanisms still maturing"
|
|
2122
|
+
],
|
|
2123
|
+
"ai_coverage": "Not in PDPA; ETDA AI Governance Guideline (2022) non-binding",
|
|
2124
|
+
"pqc_coverage": "Not addressed",
|
|
2125
|
+
"theater_risk": "medium-high — full enforcement only since 2022; PDPC capacity and case law still developing",
|
|
2126
|
+
"cross_reference_baseline": "PDPA Thailand is structurally GDPR-aligned (consent default, DPO obligation, 72h notification, DPIA-equivalent). Diverges on cross-border transfers (no adequacy list yet) and lower penalty caps than GDPR."
|
|
2127
|
+
},
|
|
2128
|
+
"CSA_TH": {
|
|
2129
|
+
"full_name": "Cybersecurity Act B.E. 2562 (2019)",
|
|
2130
|
+
"authority": "National Cyber Security Agency (NCSA) — สำนักงานคณะกรรมการการรักษาความมั่นคงปลอดภัยไซเบอร์แห่งชาติ",
|
|
2131
|
+
"source": "https://www.ncsa.or.th/laws.html",
|
|
2132
|
+
"effective_date": "2019-05-28",
|
|
2133
|
+
"version": "B.E. 2562 (2019) plus NCSA secondary regulations 2020-2024",
|
|
2134
|
+
"sector": "Critical Information Infrastructure (CII) — 8 sectors: national security, public service, banking and finance, ICT, transport and logistics, energy and utilities, public health, others designated",
|
|
2135
|
+
"notification_sla": null,
|
|
2136
|
+
"notification_trigger": "Cyber threat affecting CII (graduated severity)",
|
|
2137
|
+
"critical_controls": [
|
|
2138
|
+
"Sec. 13 — National Cybersecurity Committee oversight",
|
|
2139
|
+
"Sec. 49 — CII operator duties: risk assessment, vulnerability assessment, audit, incident reporting",
|
|
2140
|
+
"Sec. 56-60 — Cyber threat response powers (with judicial oversight requirements after 2019 controversy)",
|
|
2141
|
+
"NCSA Notification on CII Standards (2021) — three-tier maturity model"
|
|
2142
|
+
],
|
|
2143
|
+
"framework_gaps": [
|
|
2144
|
+
"Notification timelines defined by NCSA secondary regulation per severity tier — not uniformly 72h",
|
|
2145
|
+
"Overlap with PDPA where personal data is involved creates dual-regulator reporting",
|
|
2146
|
+
"AI/ML cyber risks: not specifically addressed",
|
|
2147
|
+
"Pre-emptive monitoring powers (Sec. 60) raised constitutional concerns; require court approval for higher tiers"
|
|
2148
|
+
],
|
|
2149
|
+
"ai_coverage": "Not specifically addressed",
|
|
2150
|
+
"pqc_coverage": "Not addressed",
|
|
2151
|
+
"theater_risk": "medium — CII designation list and tier mapping still evolving"
|
|
2152
|
+
},
|
|
2153
|
+
"BOT_IT_RISK": {
|
|
2154
|
+
"full_name": "Bank of Thailand Notification on IT Risk Management of Financial Institutions",
|
|
2155
|
+
"authority": "Bank of Thailand (BOT) — ธนาคารแห่งประเทศไทย",
|
|
2156
|
+
"source": "https://www.bot.or.th/en/our-roles/financial-institutions/fi-supervision/regulations.html",
|
|
2157
|
+
"effective_date": "Current version 2020 (FPG. 13/2563) with subsequent updates including the 2023 Digital Resilience Framework",
|
|
2158
|
+
"sector": "Commercial banks, finance companies, credit foncier, e-payment service providers",
|
|
2159
|
+
"critical_controls": [
|
|
2160
|
+
"IT governance and risk management framework",
|
|
2161
|
+
"Vulnerability management and penetration testing",
|
|
2162
|
+
"Cyber incident notification to BOT",
|
|
2163
|
+
"Third-party / cloud risk management",
|
|
2164
|
+
"Business continuity and disaster recovery testing"
|
|
2165
|
+
],
|
|
2166
|
+
"framework_gaps": [
|
|
2167
|
+
"Specific patch SLA not numerically pinned in the Notification",
|
|
2168
|
+
"Cloud-specific guidance via separate BOT Cloud Guidelines (2022)",
|
|
2169
|
+
"AI/ML: BOT 2023 guidance on responsible AI use in financial services — supervisory expectation, not regulation"
|
|
2170
|
+
],
|
|
2171
|
+
"ai_coverage": "BOT 2023 Responsible AI guidance — supervisory, not statutory",
|
|
2172
|
+
"pqc_coverage": "Not addressed",
|
|
2173
|
+
"theater_risk": "low — BOT on-site examinations are substantive"
|
|
2174
|
+
}
|
|
2175
|
+
}
|
|
2176
|
+
},
|
|
2177
|
+
"PH": {
|
|
2178
|
+
"jurisdiction": "Philippines",
|
|
2179
|
+
"jurisdiction_note": "BPO and IT-BPM sector makes the Philippines one of the world's largest processors of foreign personal data. Compliance posture is therefore export-critical, especially under GDPR / CCPA / APRA controller obligations toward Filipino processors.",
|
|
2180
|
+
"frameworks": {
|
|
2181
|
+
"DPA_2012": {
|
|
2182
|
+
"full_name": "Data Privacy Act of 2012 (Republic Act No. 10173)",
|
|
2183
|
+
"authority": "National Privacy Commission (NPC)",
|
|
2184
|
+
"source": "https://privacy.gov.ph/data-privacy-act/",
|
|
2185
|
+
"effective_date": "2012-09-08; Implementing Rules and Regulations effective 2016-09-09",
|
|
2186
|
+
"version": "RA 10173 (2012); IRR (2016); NPC Circular 16-03 Personal Data Breach Management; NPC Circular 2022-01 (Updated IRR amendments); NPC Circular 2023-04 Security of Personal Data in Government Agencies",
|
|
2187
|
+
"security_article": "Sec. 20 — Security of personal information",
|
|
2188
|
+
"patch_sla": null,
|
|
2189
|
+
"notification_sla": 72,
|
|
2190
|
+
"notification_trigger": "Personal data breach where (a) sensitive personal information or information that may enable identity fraud are reasonably believed to have been acquired by an unauthorised person, and (b) it is likely to give rise to a real risk of serious harm",
|
|
2191
|
+
"notification_notes": "NPC Circular 16-03 Sec. 17 / Updated NPC Circular 2022-01: 72 hours from knowledge of breach to NPC and affected data subjects, except in limited circumstances; mandatory regardless of size of breach where criteria are met.",
|
|
2192
|
+
"critical_controls": [
|
|
2193
|
+
"Sec. 11 — Principles of transparency, legitimate purpose, proportionality",
|
|
2194
|
+
"Sec. 12-13 — Lawful basis for personal and sensitive personal information",
|
|
2195
|
+
"Sec. 20 — Security measures: organisational, physical, technical",
|
|
2196
|
+
"Sec. 21 — Principle of accountability — controller accountable for processors",
|
|
2197
|
+
"IRR Rule VI — Security obligations including DPO mandatory designation, privacy impact assessment, breach reporting",
|
|
2198
|
+
"Penalties: RA 10173 Secs. 25-37 include imprisonment for unauthorised processing and disclosure"
|
|
2199
|
+
],
|
|
2200
|
+
"framework_gaps": [
|
|
2201
|
+
"Sec. 20 'reasonable and appropriate' measures undefined at statute; NPC Toolkit operationalises but is guidance",
|
|
2202
|
+
"AI/ML: NPC Advisory 2023-01 on AI-driven processing is non-binding",
|
|
2203
|
+
"Patch SLA: not specified",
|
|
2204
|
+
"PQC: not addressed",
|
|
2205
|
+
"BPO-specific data-handling overlay: controller agreements often impose stricter foreign-law obligations than DPA itself"
|
|
2206
|
+
],
|
|
2207
|
+
"ai_coverage": "NPC Advisory 2023-01 (AI processing) non-binding; DICT National AI Strategy Roadmap is policy, not statute",
|
|
2208
|
+
"pqc_coverage": "Not addressed",
|
|
2209
|
+
"theater_risk": "medium — NPC has active enforcement and breach-publication practice; BPO supply chain creates extraterritorial control gap visibility",
|
|
2210
|
+
"cross_reference_baseline": "DPA 2012 was modelled on the EU 1995 Directive and APEC Privacy Framework. Updated NPC Circular 2022-01 explicitly aligns breach mechanics with GDPR Art. 33-34. Diverges in penalty structure (criminal liability for individuals; civil fines less developed)."
|
|
2211
|
+
},
|
|
2212
|
+
"DICT_CYBER": {
|
|
2213
|
+
"full_name": "DICT National Cybersecurity Plan (NCSP) 2023-2028 and supporting issuances",
|
|
2214
|
+
"authority": "Department of Information and Communications Technology (DICT); National Cyber Security Inter-Agency Committee",
|
|
2215
|
+
"source": "https://dict.gov.ph/national-cybersecurity-plan-2023-2028/",
|
|
2216
|
+
"effective_date": "2023-09-25",
|
|
2217
|
+
"version": "NCSP 2023-2028",
|
|
2218
|
+
"sector": "Cross-sector; CII designated in coordination with sectoral regulators",
|
|
2219
|
+
"critical_controls": [
|
|
2220
|
+
"Establishment of Sectoral Computer Emergency Response Teams (Sec-CERTs)",
|
|
2221
|
+
"NCERT-PH for national incident coordination",
|
|
2222
|
+
"Cyber threat intelligence sharing programme",
|
|
2223
|
+
"Cybersecurity workforce development"
|
|
2224
|
+
],
|
|
2225
|
+
"framework_gaps": [
|
|
2226
|
+
"NCSP is policy; a comprehensive Cybersecurity Act bill has not been enacted as of 2026-05",
|
|
2227
|
+
"Patch SLA: not specified",
|
|
2228
|
+
"AI/ML cyber risk: addressed at policy level only",
|
|
2229
|
+
"Notification thresholds depend on sectoral regulators"
|
|
2230
|
+
],
|
|
2231
|
+
"ai_coverage": "Policy-level only",
|
|
2232
|
+
"pqc_coverage": "Not addressed",
|
|
2233
|
+
"theater_risk": "medium-high — absence of an overarching cybersecurity statute leaves enforcement fragmented across sectoral regulators"
|
|
2234
|
+
},
|
|
2235
|
+
"BSP_CYBER": {
|
|
2236
|
+
"full_name": "BSP Manual of Regulations for Banks (MORB) — IT Risk Management Framework",
|
|
2237
|
+
"authority": "Bangko Sentral ng Pilipinas (BSP)",
|
|
2238
|
+
"source": "https://www.bsp.gov.ph/Pages/Regulations/MORB.aspx",
|
|
2239
|
+
"effective_date": "BSP Circular 982 (2017) — Enhanced Guidelines on Information Security Management; updated through Circular 1140 (2022) and 1156 (2023) on operational resilience",
|
|
2240
|
+
"sector": "Banks and BSP-supervised financial institutions",
|
|
2241
|
+
"notification_sla": 2,
|
|
2242
|
+
"notification_trigger": "Major cyber incident or significant disruption to banking operations",
|
|
2243
|
+
"notification_notes": "BSP Circular 1019 (2018) / Memorandum M-2020-007: initial notification within 2 hours of discovery for major cyber events; follow-up reporting per incident classification.",
|
|
2244
|
+
"critical_controls": [
|
|
2245
|
+
"Information Security Management Framework with board-level oversight",
|
|
2246
|
+
"Cyber resilience testing including penetration tests and red-team exercises for D-SIBs",
|
|
2247
|
+
"Third-party / cloud risk management (Circular 1085, cloud guidelines)",
|
|
2248
|
+
"Customer protection requirements: Anti-Financial Account Scamming Act (RA 11765) liability allocation",
|
|
2249
|
+
"Sectoral incident reporting: BSP, AMLC for AML-related incidents, NPC for data breaches"
|
|
2250
|
+
],
|
|
2251
|
+
"framework_gaps": [
|
|
2252
|
+
"Patch SLA: not numerically pinned",
|
|
2253
|
+
"AI/ML: BSP 2024 Advisory on AI in financial services is supervisory expectation",
|
|
2254
|
+
"Triple-regulator overlap (BSP, NPC, AMLC) creates incident-classification complexity"
|
|
2255
|
+
],
|
|
2256
|
+
"ai_coverage": "BSP 2024 supervisory guidance — non-statutory",
|
|
2257
|
+
"pqc_coverage": "Not addressed",
|
|
2258
|
+
"theater_risk": "low — 2-hour SLA is among the world's fastest sector notifications; BSP examinations are substantive"
|
|
2259
|
+
}
|
|
2260
|
+
}
|
|
2261
|
+
},
|
|
2262
|
+
"US_CALIFORNIA": {
|
|
2263
|
+
"jurisdiction": "United States — California (sub-national, privacy + AI baseline)",
|
|
2264
|
+
"jurisdiction_note": "US sub-national but functionally the US privacy baseline. Coverage thresholds (CCPA/CPRA) bind any business serving California residents at scale, making compliance national in effect. Distinct from US_NYDFS (financial-sector cyber) and from federal NIST/FTC frameworks under GLOBAL.",
|
|
2265
|
+
"frameworks": {
|
|
2266
|
+
"CCPA_CPRA": {
|
|
2267
|
+
"full_name": "California Consumer Privacy Act (CCPA) as amended by the California Privacy Rights Act (CPRA)",
|
|
2268
|
+
"authority": "California Privacy Protection Agency (CPPA) — primary; California Attorney General — concurrent enforcement",
|
|
2269
|
+
"source": "https://oag.ca.gov/privacy/ccpa",
|
|
2270
|
+
"effective_date": "CCPA: 2020-01-01 (enforcement 2020-07-01); CPRA amendments: 2023-01-01 (enforcement 2023-07-01)",
|
|
2271
|
+
"version": "Cal. Civ. Code §§ 1798.100-1798.199.100; CPPA Regulations Title 11, Div. 6 (effective 2023-03-29) plus 2024-2025 rulemakings on automated decisionmaking technology (ADMT), cybersecurity audits, and risk assessments",
|
|
2272
|
+
"security_article": "Cal. Civ. Code § 1798.100(e) — reasonable security",
|
|
2273
|
+
"patch_sla": null,
|
|
2274
|
+
"notification_sla": null,
|
|
2275
|
+
"notification_trigger": "California's separate breach-notification statute Cal. Civ. Code § 1798.82 applies to security breaches of personal information",
|
|
2276
|
+
"notification_notes": "Cal. Civ. Code § 1798.82: notify affected California residents 'in the most expedient time possible and without unreasonable delay'; AG notification required where breach affects more than 500 California residents. No statutory hour SLA. CPRA private right of action under § 1798.150 for breaches caused by failure to implement reasonable security.",
|
|
2277
|
+
"critical_controls": [
|
|
2278
|
+
"§ 1798.100 — Notice at collection",
|
|
2279
|
+
"§ 1798.105 — Right to deletion",
|
|
2280
|
+
"§ 1798.106 — Right to correction (CPRA)",
|
|
2281
|
+
"§ 1798.110 — Right to know",
|
|
2282
|
+
"§ 1798.120 — Right to opt out of sale or sharing",
|
|
2283
|
+
"§ 1798.121 — Right to limit use of sensitive personal information (CPRA)",
|
|
2284
|
+
"§ 1798.135 — Universal opt-out signal compliance (Global Privacy Control as of CPPA Reg § 7025)",
|
|
2285
|
+
"§ 1798.150 — Private right of action for data breach caused by failure to maintain reasonable security",
|
|
2286
|
+
"§ 1798.185(a)(15)-(16) — CPPA mandate to issue ADMT, cybersecurity audit, and risk-assessment regulations"
|
|
2287
|
+
],
|
|
2288
|
+
"framework_gaps": [
|
|
2289
|
+
"'Reasonable security' is benchmarked by AG against CIS Controls (per 2016 AG Data Breach Report) but not statutorily pinned",
|
|
2290
|
+
"Pre-CPRA private right of action limited to breach of unencrypted/unredacted PI categories — semantic AI-attack vectors not contemplated",
|
|
2291
|
+
"Cross-border transfers: no GDPR-style mechanism; sectoral export controls only",
|
|
2292
|
+
"Patch SLA: not specified",
|
|
2293
|
+
"PQC: not addressed",
|
|
2294
|
+
"CPPA cybersecurity audit and risk assessment regulations were finalised in 2024-2025 rulemakings — implementation timelines staged through 2026-2027"
|
|
2295
|
+
],
|
|
2296
|
+
"ai_coverage": "CPPA ADMT regulations (finalised 2024-2025) require pre-use notices, opt-out rights, and access rights for automated decisionmaking technology; risk-assessment regulations require documented assessments before high-risk ADMT processing",
|
|
2297
|
+
"pqc_coverage": "Not addressed",
|
|
2298
|
+
"theater_risk": "medium — 'reasonable security' standard invites checkbox compliance; private right of action and CPPA audit regulation are the real deterrents",
|
|
2299
|
+
"cross_reference_baseline": "CCPA/CPRA was the first US comprehensive privacy statute and shaped 18+ US state privacy laws (Virginia, Colorado, Connecticut, Utah, Texas, etc.). CPRA's ADMT regulations are the US functional analogue to EU AI Act Art. 14 (human oversight) and Art. 13 (transparency) for non-high-risk AI."
|
|
2300
|
+
},
|
|
2301
|
+
"CAIA_AND_SB942": {
|
|
2302
|
+
"full_name": "California AI Transparency Act (SB 942, 2024) and adjacent AI-specific statutes",
|
|
2303
|
+
"authority": "California Attorney General; CPPA for overlapping ADMT scope",
|
|
2304
|
+
"source": "https://leginfo.legislature.ca.gov/faces/billNavClient.xhtml?bill_id=202320240SB942",
|
|
2305
|
+
"effective_date": "2026-01-01",
|
|
2306
|
+
"version": "SB 942 (chaptered 2024-09-19); related: SB 1001 (bot disclosure, 2018); AB 2013 (training-data transparency, 2024); SB 896 (state-use AI risk, 2024)",
|
|
2307
|
+
"critical_controls": [
|
|
2308
|
+
"SB 942 §§ 22757.1-22757.3 — Covered providers of generative AI systems with >1M monthly visitors must (a) offer a free AI-detection tool, (b) include latent disclosures in synthetic content, and (c) include manifest disclosures",
|
|
2309
|
+
"AB 2013 — Generative AI training-data documentation disclosure (effective 2026-01-01)",
|
|
2310
|
+
"SB 1001 — Bot disclosure for commercial transactions and political communications",
|
|
2311
|
+
"SB 896 — State agency AI risk assessment (Generative AI Accountability Act)"
|
|
2312
|
+
],
|
|
2313
|
+
"framework_gaps": [
|
|
2314
|
+
"SB 1047 (Safe and Secure Innovation for Frontier AI Models Act) vetoed 2024-09-29 — frontier model safety obligations remain unlegislated in California",
|
|
2315
|
+
"SB 53 (2025 proposal) reintroduces frontier model transparency obligations; status pending as of 2026-05",
|
|
2316
|
+
"SB 942 covers transparency only, not prompt-injection or model-tampering security",
|
|
2317
|
+
"AB 2013 training-data disclosure does not create a security baseline for the training pipeline itself"
|
|
2318
|
+
],
|
|
2319
|
+
"ai_coverage": "California has the most extensive US AI statutory regime as of 2026-05, focused on transparency and disclosure; frontier-model safety remains a gap pending SB 53 or successor",
|
|
2320
|
+
"pqc_coverage": "Not addressed",
|
|
2321
|
+
"theater_risk": "medium — transparency-only frame allows compliant deployment of systems that remain materially insecure against prompt injection and adversarial inputs",
|
|
2322
|
+
"cross_reference_baseline": "Functionally complements EU AI Act Art. 50 (transparency obligations for AI systems including synthetic content), but California has no high-risk-AI risk-management equivalent to EU AI Act Art. 9. UK has no equivalent statute. Australia's Voluntary AI Safety Standard (2024) is non-binding."
|
|
2323
|
+
},
|
|
2324
|
+
"CALOPPA": {
|
|
2325
|
+
"full_name": "California Online Privacy Protection Act (CalOPPA)",
|
|
2326
|
+
"authority": "California Attorney General",
|
|
2327
|
+
"source": "https://oag.ca.gov/privacy/online-privacy-protection-act",
|
|
2328
|
+
"effective_date": "2004-07-01; amended 2014 to require Do Not Track disclosures",
|
|
2329
|
+
"version": "Cal. Bus. & Prof. Code §§ 22575-22579",
|
|
2330
|
+
"critical_controls": [
|
|
2331
|
+
"§ 22575 — Conspicuously post privacy policy on websites and online services collecting personally identifiable information from California consumers",
|
|
2332
|
+
"§ 22575(b)(5) — Disclose how operator responds to Do Not Track signals",
|
|
2333
|
+
"§ 22577 — Definition of personally identifiable information"
|
|
2334
|
+
],
|
|
2335
|
+
"framework_gaps": [
|
|
2336
|
+
"Pre-CCPA framework largely superseded for CCPA-scope businesses",
|
|
2337
|
+
"No security obligations beyond disclosure",
|
|
2338
|
+
"AI/ML: not addressed",
|
|
2339
|
+
"Patch SLA: not addressed"
|
|
2340
|
+
],
|
|
2341
|
+
"ai_coverage": "Not addressed",
|
|
2342
|
+
"pqc_coverage": "Not addressed",
|
|
2343
|
+
"theater_risk": "high — disclosure-only; primarily relevant for entities below CCPA thresholds"
|
|
2344
|
+
}
|
|
2345
|
+
}
|
|
2346
|
+
},
|
|
2347
|
+
"EU_DE_BSI": {
|
|
2348
|
+
"jurisdiction": "EU member state sub-regulator — Germany",
|
|
2349
|
+
"jurisdiction_note": "Most technical EU national authority. BSI publications underpin large parts of EU NIS2 implementation, EU CRA conformity assessment, and the EU Cybersecurity Certification (EUCC) scheme. Read alongside the EU block, not as a replacement.",
|
|
2350
|
+
"frameworks": {
|
|
2351
|
+
"BSI": {
|
|
2352
|
+
"full_name": "Bundesamt für Sicherheit in der Informationstechnik — Federal Office for Information Security",
|
|
2353
|
+
"authority": "BSI (Federal-level cybersecurity authority within the Federal Ministry of the Interior)",
|
|
2354
|
+
"source": "https://www.bsi.bund.de/",
|
|
2355
|
+
"key_publications": [
|
|
2356
|
+
"BSI-Standard 200-1 — Information Security Management Systems (replaces BSI-Standard 100-1)",
|
|
2357
|
+
"BSI-Standard 200-2 — IT-Grundschutz Methodology",
|
|
2358
|
+
"BSI-Standard 200-3 — Risk Analysis based on IT-Grundschutz",
|
|
2359
|
+
"BSI-Standard 200-4 — Business Continuity Management (final version 2023)",
|
|
2360
|
+
"IT-Grundschutz Kompendium — annual baseline catalogue (Edition 2024 is current; 2025/2026 editions ship annually)",
|
|
2361
|
+
"TR-02102 (Technical Guideline) — Cryptographic Mechanisms: Recommendations and Key Lengths (current part 1 version 2024)",
|
|
2362
|
+
"BSI-Mindeststandards (Minimum Standards) per § 8 BSIG for federal administration including external cloud use, secure web browsers, logging and detection of cybersecurity attacks, and the Mindeststandard for use of External Cloud Services",
|
|
2363
|
+
"BSI TR-03145 — Secure CA Operation; TR-03116 — Cryptographic Requirements for Telematics Applications and electronic ID"
|
|
2364
|
+
],
|
|
2365
|
+
"fields": [
|
|
2366
|
+
"Information security management (IT-Grundschutz)",
|
|
2367
|
+
"Cryptographic guidance and approvals (TR-02102, BSI-approved schemes)",
|
|
2368
|
+
"Common Criteria evaluation (BSI is the German CC certification body)",
|
|
2369
|
+
"EUCC scheme operation under EU Implementing Regulation 2024/482",
|
|
2370
|
+
"KRITIS (critical infrastructure) supervision under BSIG § 8a / § 8b",
|
|
2371
|
+
"PQC migration guidance — joint with ANSSI and Dutch NLNCSA 'PQC Migration Handbook' 2024; BSI considers stateful hash-based signatures (XMSS/LMS) approved for current use and recommends hybrid schemes during transition"
|
|
2372
|
+
],
|
|
2373
|
+
"applies_to": "Federal administration (binding via § 8 BSIG); KRITIS operators (binding via BSIG § 8a); voluntary baseline for private sector and Länder administrations; foundational input to EU NIS2 implementation in Germany via BSIG and NIS2UmsuCG (NIS2 implementation law; in Bundestag process 2024-2026)",
|
|
2374
|
+
"framework_gaps": [
|
|
2375
|
+
"IT-Grundschutz is comprehensive but resource-intensive; SMEs often default to ISO 27001 with looser interpretation",
|
|
2376
|
+
"AI/ML: BSI has issued 'AI Cloud Service Compliance Criteria Catalogue (AIC4)' 2021 and updated guidance 2024 but binding rules await NIS2UmsuCG and EU AI Act implementation",
|
|
2377
|
+
"MCP/agent trust: BSI 2025 advisories on LLM application security recognise prompt injection as a class but do not yet provide a Grundschutz module",
|
|
2378
|
+
"Compliance theater: IT-Grundschutz certification of an information domain that excludes legacy systems is a known pattern"
|
|
2379
|
+
],
|
|
2380
|
+
"ai_coverage": "AIC4 (2021/2024 update) for AI in cloud — voluntary baseline; BSI 2024 LLM security advisories",
|
|
2381
|
+
"pqc_coverage": "Most concrete EU national PQC guidance: TR-02102 recommends hybrid (classical + Kyber/Dilithium) for protection beyond ~2030; stateful hash-based signatures (XMSS/LMS) approved for code-signing and similar use cases now",
|
|
2382
|
+
"theater_risk": "medium — depth of guidance is high, but scope-cutting in IT-Grundschutz audits is common",
|
|
2383
|
+
"notable_framework_gap": "BSIG § 8a 'state of the art' for KRITIS is benchmarked by industry-specific B3S documents endorsed by BSI; absent or stale B3S in a sub-sector creates a control vacuum (e.g., select critical-infrastructure verticals operated without a current B3S as of 2026-05)",
|
|
2384
|
+
"cross_reference_baseline": "Aligned with EU NIS2 Art. 21, EU CRA Annex I, ISO/IEC 27001:2022, NIST CSF 2.0; provides the most prescriptive German overlay on those baselines."
|
|
2385
|
+
}
|
|
2386
|
+
}
|
|
2387
|
+
},
|
|
2388
|
+
"EU_FR_ANSSI": {
|
|
2389
|
+
"jurisdiction": "EU member state sub-regulator — France",
|
|
2390
|
+
"jurisdiction_note": "France's national cybersecurity authority. Strong qualification regime for security providers (PASSI/PVID/PDIS/PRIS), sovereign-cloud (SecNumCloud), and OIV/OSE supervision under LPM and the NIS2 transposition.",
|
|
2391
|
+
"frameworks": {
|
|
2392
|
+
"ANSSI": {
|
|
2393
|
+
"full_name": "Agence nationale de la sécurité des systèmes d'information — National Agency for Information System Security",
|
|
2394
|
+
"authority": "ANSSI (under the Secretariat-General for National Defence and Security, SGDSN)",
|
|
2395
|
+
"source": "https://cyber.gouv.fr/",
|
|
2396
|
+
"key_publications": [
|
|
2397
|
+
"RGS (Référentiel Général de Sécurité) v2.0 — security framework for administrations interacting with citizens",
|
|
2398
|
+
"PGSSI-S — Politique Générale de Sécurité des Systèmes d'Information de Santé (health sector)",
|
|
2399
|
+
"II 901 / II 920 — Instructions interministérielles on protection of sensitive non-classified information and classified information systems",
|
|
2400
|
+
"SecNumCloud v3.2 — qualification for sovereign-cloud providers, basis for the French position in EUCS",
|
|
2401
|
+
"Cryptographic guidance: RGS Annex B1 (cryptographic mechanisms), B2 (key management), B3 (cryptographic device authentication)",
|
|
2402
|
+
"Guide d'hygiène informatique — 42 recommended hygiene measures",
|
|
2403
|
+
"ANSSI PQC guidance 'ANSSI views on the PQC transition' (2022, updated 2024) — recommends hybrid mode during transition"
|
|
2404
|
+
],
|
|
2405
|
+
"qualification_schemes": [
|
|
2406
|
+
"PASSI — Prestataires d'Audit de la Sécurité des Systèmes d'Information (security audit providers)",
|
|
2407
|
+
"PVID — Prestataires de Vérification d'Identité à Distance (remote identity verification, including for eIDAS-HighAssurance use)",
|
|
2408
|
+
"PDIS — Prestataires de Détection d'Incidents de Sécurité (security incident detection / SOC providers)",
|
|
2409
|
+
"PRIS — Prestataires de Réponse aux Incidents de Sécurité (incident response providers)",
|
|
2410
|
+
"SecNumCloud — qualified cloud providers"
|
|
2411
|
+
],
|
|
2412
|
+
"fields": [
|
|
2413
|
+
"OIV (Opérateurs d'Importance Vitale) supervision under LPM Loi de Programmation Militaire 2013-1168 and successor LPM 2024-449",
|
|
2414
|
+
"OSE (Opérateurs de Services Essentiels) supervision under the French NIS implementation; OSE replaced by NIS2 'essential entities' under the loi de transposition (2024 process)",
|
|
2415
|
+
"Cryptographic mechanism approvals for state and sensitive systems",
|
|
2416
|
+
"CSPN (Certification de Sécurité de Premier Niveau) — French national product certification, complementary to Common Criteria",
|
|
2417
|
+
"EUCC and EUCS schemes — France is a principal architect of EUCS sovereignty tiers"
|
|
2418
|
+
],
|
|
2419
|
+
"applies_to": "OIV (binding under LPM); OSE / NIS2 essential and important entities (binding); French public administrations (RGS binding); private sector providers seeking qualification (voluntary but contractually required for state procurement)",
|
|
2420
|
+
"framework_gaps": [
|
|
2421
|
+
"RGS v2.0 dates from 2014 — modernisation work ongoing as of 2026-05; gaps in coverage of cloud-native architectures and AI systems",
|
|
2422
|
+
"Qualification schemes are slow and resource-intensive; backlog of PDIS applicants",
|
|
2423
|
+
"AI/ML: ANSSI has published security recommendations for AI systems (2024) but no qualification scheme for AI providers",
|
|
2424
|
+
"SecNumCloud and EUCS High tier sovereignty requirements are politically contested at EU level — possible scope changes through 2026-2027"
|
|
2425
|
+
],
|
|
2426
|
+
"ai_coverage": "ANSSI 'Recommandations de sécurité pour un système d'IA générative' (April 2024) — non-binding security recommendations; no qualification scheme yet",
|
|
2427
|
+
"pqc_coverage": "Hybrid recommended during transition; ML-KEM and ML-DSA tracked; ANSSI joint work with BSI/NLNCSA on the 2024 PQC Migration Handbook",
|
|
2428
|
+
"theater_risk": "low for OIV scope (substantive LPM supervision); medium elsewhere due to qualification-scheme bottlenecks",
|
|
2429
|
+
"notable_framework_gap": "PDIS/PRIS qualification covers detection and response providers; there is no equivalent qualification for cloud-native or AI-system providers as of 2026-05, leaving a sovereignty/assurance gap for those technology classes",
|
|
2430
|
+
"cross_reference_baseline": "Aligned with EU NIS2 Art. 21, EU CRA, ISO/IEC 27001:2022. SecNumCloud is the most concrete EU sovereign-cloud overlay and informs the EUCS debate."
|
|
2431
|
+
}
|
|
2432
|
+
}
|
|
2433
|
+
},
|
|
2434
|
+
"EU_ES_AEPD": {
|
|
2435
|
+
"jurisdiction": "EU member state sub-regulator — Spain",
|
|
2436
|
+
"jurisdiction_note": "AEPD has been among the most active GDPR enforcers by number of decisions and fines. Spain hosts the EU's first dedicated AI supervisory agency (AESIA).",
|
|
2437
|
+
"frameworks": {
|
|
2438
|
+
"AEPD": {
|
|
2439
|
+
"full_name": "Agencia Española de Protección de Datos — Spanish Data Protection Agency",
|
|
2440
|
+
"authority": "AEPD (independent administrative authority)",
|
|
2441
|
+
"source": "https://www.aepd.es/",
|
|
2442
|
+
"key_publications": [
|
|
2443
|
+
"Guía del Reglamento General de Protección de Datos para Responsables de Tratamiento",
|
|
2444
|
+
"Guía de Privacidad desde el Diseño (Privacy by Design Guide)",
|
|
2445
|
+
"Guía Adecuación al RGPD de Tratamientos que Incorporan Inteligencia Artificial (2020) and 2024 update on generative AI",
|
|
2446
|
+
"Notas técnicas on cookies, biometrics, fingerprinting, DPO designation, breach notification",
|
|
2447
|
+
"Esquema Nacional de Seguridad guidance overlap with INCIBE and CCN-CERT (Centro Criptológico Nacional)"
|
|
2448
|
+
],
|
|
2449
|
+
"fields": [
|
|
2450
|
+
"GDPR enforcement and DPO registry",
|
|
2451
|
+
"LOPDGDD (Ley Orgánica 3/2018) — Spain's GDPR implementing organic law including additional rights such as digital wills and right to be forgotten in internet searches",
|
|
2452
|
+
"Coordination with Catalan, Basque and Andalusian regional DPAs (APDCAT, AVPD, CTPDA)",
|
|
2453
|
+
"Cross-border GDPR cases via EDPB One-Stop-Shop"
|
|
2454
|
+
],
|
|
2455
|
+
"applies_to": "All controllers and processors in scope of GDPR with establishment or targeting in Spain; LOPDGDD provides additional Spanish-specific obligations",
|
|
2456
|
+
"framework_gaps": [
|
|
2457
|
+
"LOPDGDD additional articles (e.g., Art. 80 digital wills) create national-specific obligations not present in GDPR baseline",
|
|
2458
|
+
"Coordination with regional DPAs occasionally produces inconsistent guidance on the same processing scenario",
|
|
2459
|
+
"AI/ML: AEPD AI guidance (2020/2024) is non-binding interpretive material; binding AI rules now flow primarily through AESIA and EU AI Act"
|
|
2460
|
+
],
|
|
2461
|
+
"ai_coverage": "AEPD 2020 + 2024 guidance on AI under GDPR; binding AI supervision now coordinated with AESIA under EU AI Act implementation",
|
|
2462
|
+
"pqc_coverage": "Not specifically addressed; CCN-CERT issues complementary cryptographic guidance via CCN-STIC series",
|
|
2463
|
+
"theater_risk": "low for high-profile cases; medium-high for SME compliance which often follows guidance-as-checklist",
|
|
2464
|
+
"cross_reference_baseline": "AEPD enforcement statistics are the most extensive in the EU and a leading indicator for GDPR Art. 32 'appropriate measures' interpretation across the bloc."
|
|
2465
|
+
},
|
|
2466
|
+
"AESIA": {
|
|
2467
|
+
"full_name": "Agencia Española de Supervisión de la Inteligencia Artificial — Spanish AI Supervision Agency",
|
|
2468
|
+
"authority": "AESIA (statutory agency, headquartered in A Coruña)",
|
|
2469
|
+
"source": "https://aesia.digital.gob.es/",
|
|
2470
|
+
"key_publications": [
|
|
2471
|
+
"Royal Decree 729/2023 establishing AESIA",
|
|
2472
|
+
"EU AI Act implementation strategy for Spain (in development through 2025-2026)"
|
|
2473
|
+
],
|
|
2474
|
+
"fields": [
|
|
2475
|
+
"National market surveillance authority under EU AI Act Art. 70",
|
|
2476
|
+
"Spain's pre-Act sandboxes for high-risk AI systems (Royal Decree 817/2023 establishing the regulatory sandbox)",
|
|
2477
|
+
"Supervisory cooperation with AEPD where AI systems process personal data"
|
|
2478
|
+
],
|
|
2479
|
+
"applies_to": "Providers and deployers of AI systems with Spanish market presence; high-risk AI systems under EU AI Act Annex III",
|
|
2480
|
+
"framework_gaps": [
|
|
2481
|
+
"First-of-its-kind agency — staffing, case law, and supervisory practice still maturing as of 2026-05",
|
|
2482
|
+
"Overlap with AEPD where AI processes personal data; coordination protocol still developing",
|
|
2483
|
+
"Cybersecurity-of-AI specifics (e.g., prompt injection) addressed only by reference to EU AI Act Art. 15"
|
|
2484
|
+
],
|
|
2485
|
+
"ai_coverage": "Spain is the EU member state with the most mature institutional AI-supervision infrastructure as of 2026-05",
|
|
2486
|
+
"pqc_coverage": "Not within AESIA scope",
|
|
2487
|
+
"theater_risk": "unknown — agency too new for an enforcement-record assessment; sandboxes generate visibility but not yet adversarial evidence"
|
|
2488
|
+
}
|
|
2489
|
+
}
|
|
2490
|
+
},
|
|
2491
|
+
"EU_IT_AgID_ACN": {
|
|
2492
|
+
"jurisdiction": "EU member state sub-regulator — Italy",
|
|
2493
|
+
"jurisdiction_note": "Italy split its cyber authority in 2021 with the creation of ACN, separating cybersecurity from digital-government functions retained by AgID. Both authorities operate the Italian implementation of NIS2 and the Cybersecurity National Perimeter.",
|
|
2494
|
+
"frameworks": {
|
|
2495
|
+
"ACN": {
|
|
2496
|
+
"full_name": "Agenzia per la Cybersicurezza Nazionale — National Cybersecurity Agency",
|
|
2497
|
+
"authority": "ACN (established by Decree-Law 82/2021 converted by Law 109/2021)",
|
|
2498
|
+
"source": "https://www.acn.gov.it/",
|
|
2499
|
+
"key_publications": [
|
|
2500
|
+
"Italian National Cybersecurity Strategy 2022-2026",
|
|
2501
|
+
"Implementing measures for the Perimetro di Sicurezza Nazionale Cibernetica (PSNC) under DPCM 81/2021 and successor decrees",
|
|
2502
|
+
"ACN technical guidelines for essential and important entities under the Italian NIS2 transposition (Decree-Law 138/2024 / Legislative Decree 138/2024)",
|
|
2503
|
+
"Cloud qualifications under the National Cloud Strategy and PSN (Polo Strategico Nazionale)",
|
|
2504
|
+
"CSIRT Italia advisories and vulnerability bulletins"
|
|
2505
|
+
],
|
|
2506
|
+
"fields": [
|
|
2507
|
+
"Italian PSNC operator supervision — PSNC scope covers entities whose disruption would prejudice national security, broader than NIS2 essential-entity scope in some sectors",
|
|
2508
|
+
"National CSIRT (CSIRT Italia)",
|
|
2509
|
+
"Cybersecurity certification (national scheme aligned with EUCC)",
|
|
2510
|
+
"Cloud qualification for public-administration cloud procurement",
|
|
2511
|
+
"NIS2 implementation supervision following Legislative Decree 138/2024"
|
|
2512
|
+
],
|
|
2513
|
+
"applies_to": "PSNC operators (binding via DPCM 81/2021 and amendments); essential and important entities under Italian NIS2 transposition; public administration cloud procurement",
|
|
2514
|
+
"framework_gaps": [
|
|
2515
|
+
"PSNC vendor-procurement notification regime ('Golden Power' interaction) is unique to Italy and creates dual-clearance complexity for ICT supply chain",
|
|
2516
|
+
"AI/ML: AI Italian Strategy 2024-2026 is policy; AI supervisory authority designation under EU AI Act not yet finalised between AgID and ACN as of 2026-05",
|
|
2517
|
+
"Coordination with Garante Privacy on incidents involving personal data is documented but case-specific"
|
|
2518
|
+
],
|
|
2519
|
+
"ai_coverage": "Strategy level; supervisory designation pending",
|
|
2520
|
+
"pqc_coverage": "ACN endorses ENISA/ETSI PQC guidance; no separate Italian PQC mandate yet",
|
|
2521
|
+
"theater_risk": "low-medium — PSNC scope is enforced via state-security mechanisms; broader essential-entity supervision is newer",
|
|
2522
|
+
"cross_reference_baseline": "Aligned with EU NIS2 Art. 21 and EU CRA; PSNC adds Italy-specific national-security overlay above the EU baseline."
|
|
2523
|
+
},
|
|
2524
|
+
"AGID": {
|
|
2525
|
+
"full_name": "Agenzia per l'Italia Digitale — Agency for Digital Italy",
|
|
2526
|
+
"authority": "AgID (under Presidency of the Council of Ministers)",
|
|
2527
|
+
"source": "https://www.agid.gov.it/",
|
|
2528
|
+
"key_publications": [
|
|
2529
|
+
"Linee Guida AgID per la sicurezza ICT delle pubbliche amministrazioni — minimum ICT security baseline for Italian public administration (Misure Minime)",
|
|
2530
|
+
"SPID and CIE digital identity specifications",
|
|
2531
|
+
"PagoPA technical specifications",
|
|
2532
|
+
"Cloud qualification programme (transferred to ACN for cyber elements but AgID retains digital-government scope)"
|
|
2533
|
+
],
|
|
2534
|
+
"fields": [
|
|
2535
|
+
"Public-administration digital transformation",
|
|
2536
|
+
"Digital identity (SPID, CIE) governance",
|
|
2537
|
+
"Interoperability standards (Modello di Interoperabilità)",
|
|
2538
|
+
"Italian Digital Administration Code (CAD) implementation"
|
|
2539
|
+
],
|
|
2540
|
+
"applies_to": "Italian public administrations and contracted providers",
|
|
2541
|
+
"framework_gaps": [
|
|
2542
|
+
"Misure Minime baseline is dated (last comprehensive revision 2017) and overlapped by ACN guidance after 2021 split",
|
|
2543
|
+
"Allocation between AgID and ACN for some controls remains ambiguous in practice"
|
|
2544
|
+
],
|
|
2545
|
+
"ai_coverage": "AI in public administration covered via AgID guidance on algorithmic transparency in administrative procedures",
|
|
2546
|
+
"pqc_coverage": "Defers to ACN / ENISA",
|
|
2547
|
+
"theater_risk": "medium — public-administration compliance is heterogeneous and Misure Minime baseline is overdue for refresh"
|
|
2548
|
+
}
|
|
2549
|
+
}
|
|
2550
|
+
},
|
|
2551
|
+
"EU_ENISA": {
|
|
2552
|
+
"jurisdiction": "EU agency (not a member-state regulator)",
|
|
2553
|
+
"jurisdiction_note": "Not a regulator. ENISA is the EU agency for cybersecurity producing guidance, threat-landscape reports, and operating the EU Cybersecurity Certification Framework. Its outputs frequently become the technical foundation for binding EU regulation (NIS2 implementing acts, CRA technical specifications, EUCC scheme).",
|
|
2554
|
+
"frameworks": {
|
|
2555
|
+
"ENISA": {
|
|
2556
|
+
"full_name": "European Union Agency for Cybersecurity",
|
|
2557
|
+
"authority": "ENISA (established by Regulation (EU) 2019/881 — Cybersecurity Act)",
|
|
2558
|
+
"source": "https://www.enisa.europa.eu/",
|
|
2559
|
+
"key_publications": [
|
|
2560
|
+
"ENISA Threat Landscape (annual; ETL 2024 published 2024-09; ETL 2025 expected 2025-Q3) — primary EU threat-environment reference",
|
|
2561
|
+
"EU Cybersecurity Certification Scheme on Common Criteria (EUCC) — Commission Implementing Regulation (EU) 2024/482, operational from 2024",
|
|
2562
|
+
"EU Cybersecurity Certification Scheme for Cloud Services (EUCS) — draft scheme in deliberation as of 2026-05; sovereignty tiers contested",
|
|
2563
|
+
"EU 5G Cybersecurity Certification Scheme (EU5G) — in development",
|
|
2564
|
+
"ENISA guidelines for NIS2 implementing acts on incident-handling, supply chain, registry of entities",
|
|
2565
|
+
"ENISA Post-Quantum Cryptography reports (2021, 2022 updated) — technical input to EU PQC migration discussion",
|
|
2566
|
+
"ENISA AI Threat Landscape (2023) and AI Cybersecurity Standardisation (2023) reports — input to EU AI Act and CRA implementing acts",
|
|
2567
|
+
"ENISA Good Practices for Supply Chain Cybersecurity (2023) — input to NIS2 Art. 21(2)(d)/(j) and CRA Annex I"
|
|
2568
|
+
],
|
|
2569
|
+
"fields": [
|
|
2570
|
+
"EU-wide cybersecurity threat intelligence and trend reporting",
|
|
2571
|
+
"Operation of the European Cybersecurity Certification Framework under the Cybersecurity Act",
|
|
2572
|
+
"Technical input to Commission implementing and delegated acts under NIS2, CRA, EU AI Act, eIDAS 2",
|
|
2573
|
+
"Coordination of EU CSIRTs Network and EU CyCLONe (operational crisis cooperation)",
|
|
2574
|
+
"EU Cyber Skills Framework and capacity-building"
|
|
2575
|
+
],
|
|
2576
|
+
"applies_to": "ENISA outputs are not binding on their own; they become binding through (a) certification under the EUCC and successor schemes, (b) referenced standards in Commission implementing acts, and (c) member-state adoption in national NCSC guidance",
|
|
2577
|
+
"framework_gaps": [
|
|
2578
|
+
"Certification schemes are slow to publish — EUCS draft has been in deliberation since 2020 and remains unfinalised as of 2026-05 due to sovereignty-tier disagreement",
|
|
2579
|
+
"Voluntary character of most ENISA technical guidance means inconsistent adoption across member states",
|
|
2580
|
+
"AI cybersecurity standardisation is downstream of EU AI Act implementing-act timeline — substantive technical baseline awaited through 2026-2027",
|
|
2581
|
+
"PQC: ENISA reports recommend hybrid migration but do not bind member states to a deadline"
|
|
2582
|
+
],
|
|
2583
|
+
"ai_coverage": "Foundational technical input to EU AI Act Art. 15 cybersecurity requirements via 2023 AI Cybersecurity Standardisation report; binding AI security baseline awaits implementing acts",
|
|
2584
|
+
"pqc_coverage": "Recommends hybrid PQC migration plans; technical input to anticipated EU PQC roadmap",
|
|
2585
|
+
"theater_risk": "n/a (not a regulator) — but reliance on ENISA voluntary guidance instead of binding controls is itself a compliance-theater pattern at national level",
|
|
2586
|
+
"notable_framework_gap": "EUCS finalisation delay leaves a multi-year gap between the CSA-2019 mandate and an operational EU cloud certification — member states fill the gap with national sovereignty schemes (SecNumCloud, BSI C5, ENS Esquema Nacional de Seguridad)",
|
|
2587
|
+
"cross_reference_baseline": "ENISA outputs are the cross-cutting EU technical layer beneath the EU GDPR, NIS2, DORA, CRA, EU AI Act, and eIDAS 2 frameworks. National regulators (BSI, ANSSI, AEPD, ACN, NCSC, etc.) localise these into binding national overlays."
|
|
2588
|
+
}
|
|
2589
|
+
}
|
|
2590
|
+
},
|
|
2591
|
+
"_notification_summary": {
|
|
2592
|
+
"note": "Notification SLAs by jurisdiction, sorted fastest to slowest. 'discretionary' indicates statutes using 'as soon as practicable', 'with diligence', 'reasonable time', or 'immediately' without numeric pinning.",
|
|
2593
|
+
"table": [
|
|
2594
|
+
{
|
|
2595
|
+
"jurisdiction": "Taiwan (CSMA L3-L4)",
|
|
2596
|
+
"sla_hours": 1,
|
|
2597
|
+
"trigger": "Highest-tier cyber incident at CIP",
|
|
2598
|
+
"note": "Enforcement Rules graduated by incident level — fastest mandatory cyber notification globally"
|
|
2599
|
+
},
|
|
2600
|
+
{
|
|
2601
|
+
"jurisdiction": "Philippines (BSP)",
|
|
2602
|
+
"sla_hours": 2,
|
|
2603
|
+
"trigger": "Major cyber incident at BSP-supervised financial institution",
|
|
2604
|
+
"note": "BSP Circular 1019 / M-2020-007 — among the world's fastest sector notifications"
|
|
2605
|
+
},
|
|
2606
|
+
{
|
|
2607
|
+
"jurisdiction": "Singapore (MAS TRM)",
|
|
2608
|
+
"sla_hours": 2,
|
|
2609
|
+
"trigger": "> 30min customer impact or breach",
|
|
2610
|
+
"note": "Tied with CSA CCoP and BSP"
|
|
2611
|
+
},
|
|
2612
|
+
{
|
|
2613
|
+
"jurisdiction": "Singapore (CSA CCoP)",
|
|
2614
|
+
"sla_hours": 2,
|
|
2615
|
+
"trigger": "CII cybersecurity incident",
|
|
2616
|
+
"note": ""
|
|
2617
|
+
},
|
|
2618
|
+
{
|
|
2619
|
+
"jurisdiction": "EU (DORA)",
|
|
2620
|
+
"sla_hours": 4,
|
|
2621
|
+
"trigger": "Major ICT incident in financial sector",
|
|
2622
|
+
"note": "Financial services only"
|
|
2623
|
+
},
|
|
2624
|
+
{
|
|
2625
|
+
"jurisdiction": "India (CERT-In)",
|
|
2626
|
+
"sla_hours": 6,
|
|
2627
|
+
"trigger": "Defined incident categories",
|
|
2628
|
+
"note": "Sectoral incident reporting (not data-protection)"
|
|
2629
|
+
},
|
|
2630
|
+
{
|
|
2631
|
+
"jurisdiction": "US NYDFS Part 500 (ransom payment)",
|
|
2632
|
+
"sla_hours": 24,
|
|
2633
|
+
"trigger": "Extortion/ransom payment by Covered Entity",
|
|
2634
|
+
"note": "§500.17(c) Second Amendment — 30-day follow-up explanation"
|
|
2635
|
+
},
|
|
2636
|
+
{
|
|
2637
|
+
"jurisdiction": "EU (NIS2 early warning)",
|
|
2638
|
+
"sla_hours": 24,
|
|
2639
|
+
"trigger": "Significant incident early warning",
|
|
2640
|
+
"note": "72h full notification follows"
|
|
2641
|
+
},
|
|
2642
|
+
{
|
|
2643
|
+
"jurisdiction": "Norway (NIS2 / Digitalsikkerhetsloven, anticipated)",
|
|
2644
|
+
"sla_hours": 24,
|
|
2645
|
+
"trigger": "Significant incident early warning at essential/important entity",
|
|
2646
|
+
"note": "Prop. 109 L (2023-2024) — anticipated EEA-implementation in 2026; mirrors EU NIS2 timing"
|
|
2647
|
+
},
|
|
2648
|
+
{
|
|
2649
|
+
"jurisdiction": "Canada (OSFI B-10)",
|
|
2650
|
+
"sla_hours": 24,
|
|
2651
|
+
"trigger": "Material technology/cyber incident",
|
|
2652
|
+
"note": "Financial services only"
|
|
2653
|
+
},
|
|
2654
|
+
{
|
|
2655
|
+
"jurisdiction": "EU (CRA)",
|
|
2656
|
+
"sla_hours": 24,
|
|
2657
|
+
"trigger": "Actively exploited vulnerability in product",
|
|
2658
|
+
"note": "Product manufacturers under EU CRA"
|
|
2659
|
+
},
|
|
2660
|
+
{
|
|
2661
|
+
"jurisdiction": "Switzerland (Information Security Act)",
|
|
2662
|
+
"sla_hours": 24,
|
|
2663
|
+
"trigger": "Cyberattack on critical infrastructure operators",
|
|
2664
|
+
"note": "Art. 74e ISG, in force 2025-04-01 — first Swiss numeric cyber SLA"
|
|
2665
|
+
},
|
|
2666
|
+
{
|
|
2667
|
+
"jurisdiction": "Argentina (BCRA Comunicación 'A' 7724)",
|
|
2668
|
+
"sla_hours": 24,
|
|
2669
|
+
"trigger": "Cyber incident with significant impact at BCRA-supervised entity",
|
|
2670
|
+
"note": "Financial sector only"
|
|
2671
|
+
},
|
|
2672
|
+
{
|
|
2673
|
+
"jurisdiction": "Mexico (CNBV Annex 71)",
|
|
2674
|
+
"sla_hours": 24,
|
|
2675
|
+
"trigger": "Cyber incident affecting CNBV-supervised institution",
|
|
2676
|
+
"note": "Banking and broker-dealer sector"
|
|
2677
|
+
},
|
|
2678
|
+
{
|
|
2679
|
+
"jurisdiction": "Saudi Arabia (KSA PDPL)",
|
|
2680
|
+
"sla_hours": 72,
|
|
2681
|
+
"trigger": "Personal data breach causing potential damage",
|
|
2682
|
+
"note": "Implementing Regulations Art. 24"
|
|
2683
|
+
},
|
|
2684
|
+
{
|
|
2685
|
+
"jurisdiction": "Norway (Personopplysningsloven via EEA / GDPR)",
|
|
2686
|
+
"sla_hours": 72,
|
|
2687
|
+
"trigger": "Personal data breach affecting data subject rights",
|
|
2688
|
+
"note": "GDPR Art. 33 standard via EEA implementation"
|
|
2689
|
+
},
|
|
2690
|
+
{
|
|
2691
|
+
"jurisdiction": "Türkiye (KVKK)",
|
|
2692
|
+
"sla_hours": 72,
|
|
2693
|
+
"trigger": "Personal data breach (unauthorised acquisition)",
|
|
2694
|
+
"note": "KVKK Board Decision 2019/10 operationalises Art. 12(5)"
|
|
2695
|
+
},
|
|
2696
|
+
{
|
|
2697
|
+
"jurisdiction": "Thailand (PDPA)",
|
|
2698
|
+
"sla_hours": 72,
|
|
2699
|
+
"trigger": "Personal data breach risking rights and freedoms",
|
|
2700
|
+
"note": "PDPA Sec. 37(4)"
|
|
2701
|
+
},
|
|
2702
|
+
{
|
|
2703
|
+
"jurisdiction": "Philippines (DPA — NPC)",
|
|
2704
|
+
"sla_hours": 72,
|
|
2705
|
+
"trigger": "Sensitive PI breach with real risk of serious harm",
|
|
2706
|
+
"note": "NPC Circular 16-03 / 2022-01"
|
|
2707
|
+
},
|
|
2708
|
+
{
|
|
2709
|
+
"jurisdiction": "Korea (PIPA)",
|
|
2710
|
+
"sla_hours": 72,
|
|
2711
|
+
"trigger": "Personal information leakage",
|
|
2712
|
+
"note": "Enforcement Decree Art. 39"
|
|
2713
|
+
},
|
|
2714
|
+
{
|
|
2715
|
+
"jurisdiction": "India (DPDPA)",
|
|
2716
|
+
"sla_hours": 72,
|
|
2717
|
+
"trigger": "Personal data breach affecting Data Principals",
|
|
2718
|
+
"note": "Per Draft DPDP Rules 2025"
|
|
2719
|
+
},
|
|
2720
|
+
{
|
|
2721
|
+
"jurisdiction": "Brazil (LGPD)",
|
|
2722
|
+
"sla_hours": 72,
|
|
2723
|
+
"trigger": "Incident with relevant risk or damage",
|
|
2724
|
+
"note": "ANPD Resolution CD/ANPD 15/2024 ~ 3 business days"
|
|
2725
|
+
},
|
|
2726
|
+
{
|
|
2727
|
+
"jurisdiction": "Chile (Law 21,719)",
|
|
2728
|
+
"sla_hours": 72,
|
|
2729
|
+
"trigger": "Security breach with risk to rights",
|
|
2730
|
+
"note": "Effective 2026-12-01"
|
|
2731
|
+
},
|
|
2732
|
+
{
|
|
2733
|
+
"jurisdiction": "Indonesia (UU PDP)",
|
|
2734
|
+
"sla_hours": 72,
|
|
2735
|
+
"trigger": "Personal data protection failure with leakage/loss/unauthorised processing",
|
|
2736
|
+
"note": "Art. 46 — 3x24 hours"
|
|
2737
|
+
},
|
|
2738
|
+
{
|
|
2739
|
+
"jurisdiction": "Vietnam (PDPD)",
|
|
2740
|
+
"sla_hours": 72,
|
|
2741
|
+
"trigger": "Personal data breach with risk to rights",
|
|
2742
|
+
"note": "Decree 13/2023 Art. 23 — notify Ministry of Public Security"
|
|
2743
|
+
},
|
|
2744
|
+
{
|
|
2745
|
+
"jurisdiction": "EU (GDPR)",
|
|
2746
|
+
"sla_hours": 72,
|
|
2747
|
+
"trigger": "Personal data breach",
|
|
2748
|
+
"note": "72h standard"
|
|
2749
|
+
},
|
|
2750
|
+
{
|
|
2751
|
+
"jurisdiction": "EU (NIS2 notification)",
|
|
2752
|
+
"sla_hours": 72,
|
|
2753
|
+
"trigger": "Significant incident full notification",
|
|
2754
|
+
"note": "After 24h early warning"
|
|
2755
|
+
},
|
|
2756
|
+
{
|
|
2757
|
+
"jurisdiction": "Australia (APRA CPS 234)",
|
|
2758
|
+
"sla_hours": 72,
|
|
2759
|
+
"trigger": "Material information security incident",
|
|
2760
|
+
"note": ""
|
|
2761
|
+
},
|
|
2762
|
+
{
|
|
2763
|
+
"jurisdiction": "US NYDFS Part 500 (cyber event)",
|
|
2764
|
+
"sla_hours": 72,
|
|
2765
|
+
"trigger": "Material cybersecurity event affecting Covered Entity",
|
|
2766
|
+
"note": "§500.17(a) — applies to foreign banks with NY branches globally"
|
|
2767
|
+
},
|
|
2768
|
+
{
|
|
2769
|
+
"jurisdiction": "Japan (APPI)",
|
|
2770
|
+
"sla_hours": null,
|
|
2771
|
+
"trigger": "Leak/loss/damage of personal data likely to harm rights",
|
|
2772
|
+
"note": "PPC Rules — 'promptly' (~3-5 days preliminary, 30-60 days final)"
|
|
2773
|
+
},
|
|
2774
|
+
{
|
|
2775
|
+
"jurisdiction": "Canada (Quebec Law 25)",
|
|
2776
|
+
"sla_hours": null,
|
|
2777
|
+
"trigger": "Confidentiality incident with risk of serious injury",
|
|
2778
|
+
"note": "discretionary — 'with diligence'; CAI practice trends toward days"
|
|
2779
|
+
},
|
|
2780
|
+
{
|
|
2781
|
+
"jurisdiction": "Canada (PIPEDA)",
|
|
2782
|
+
"sla_hours": null,
|
|
2783
|
+
"trigger": "Breach with real risk of significant harm",
|
|
2784
|
+
"note": "discretionary — 'as soon as feasible'"
|
|
2785
|
+
},
|
|
2786
|
+
{
|
|
2787
|
+
"jurisdiction": "South Africa (POPIA)",
|
|
2788
|
+
"sla_hours": null,
|
|
2789
|
+
"trigger": "Compromise of personal information",
|
|
2790
|
+
"note": "discretionary — 'as soon as reasonably possible'; Regulator practice ~72h"
|
|
2791
|
+
},
|
|
2792
|
+
{
|
|
2793
|
+
"jurisdiction": "New Zealand (Privacy Act 2020)",
|
|
2794
|
+
"sla_hours": null,
|
|
2795
|
+
"trigger": "Notifiable privacy breach (serious harm)",
|
|
2796
|
+
"note": "discretionary — 'as soon as practicable'; OPC practice ~72h"
|
|
2797
|
+
},
|
|
2798
|
+
{
|
|
2799
|
+
"jurisdiction": "UAE (PDPL)",
|
|
2800
|
+
"sla_hours": null,
|
|
2801
|
+
"trigger": "Personal data breach",
|
|
2802
|
+
"note": "discretionary — Executive Regulations pending as of 2026-05"
|
|
2803
|
+
},
|
|
2804
|
+
{
|
|
2805
|
+
"jurisdiction": "China (PIPL)",
|
|
2806
|
+
"sla_hours": null,
|
|
2807
|
+
"trigger": "PI leak, tampering, or loss",
|
|
2808
|
+
"note": "Art. 57 'immediately' (立即) — no fixed hour SLA"
|
|
2809
|
+
},
|
|
2810
|
+
{
|
|
2811
|
+
"jurisdiction": "Israel (Data Security Regulations)",
|
|
2812
|
+
"sla_hours": null,
|
|
2813
|
+
"trigger": "Severe security incident at medium/high level database",
|
|
2814
|
+
"note": "Reg. 11 — 'immediately'; PPA practice ~72h post-Amendment 13"
|
|
2815
|
+
},
|
|
2816
|
+
{
|
|
2817
|
+
"jurisdiction": "Switzerland (revFADP)",
|
|
2818
|
+
"sla_hours": null,
|
|
2819
|
+
"trigger": "Personal data breach with high risk to rights",
|
|
2820
|
+
"note": "Art. 24 — 'as soon as possible'; FDPIC practice trends to 72h"
|
|
2821
|
+
},
|
|
2822
|
+
{
|
|
2823
|
+
"jurisdiction": "Hong Kong (PDPO)",
|
|
2824
|
+
"sla_hours": null,
|
|
2825
|
+
"trigger": "Personal data breach",
|
|
2826
|
+
"note": "Voluntary regime — no statutory mandate as of 2026-05"
|
|
2827
|
+
},
|
|
2828
|
+
{
|
|
2829
|
+
"jurisdiction": "Taiwan (PDPA)",
|
|
2830
|
+
"sla_hours": null,
|
|
2831
|
+
"trigger": "Personal data theft/alteration/damage/loss/leakage",
|
|
2832
|
+
"note": "Art. 12 — 'after investigating the facts'; PDPC 2024 guidance suggests 72h"
|
|
2833
|
+
},
|
|
2834
|
+
{
|
|
2835
|
+
"jurisdiction": "Mexico (LFPDPPP)",
|
|
2836
|
+
"sla_hours": null,
|
|
2837
|
+
"trigger": "Security breach affecting data subjects",
|
|
2838
|
+
"note": "Reglamento Art. 64 — 'without delay'; INAI dissolution creates 2025-2026 enforcement uncertainty"
|
|
2839
|
+
},
|
|
2840
|
+
{
|
|
2841
|
+
"jurisdiction": "Argentina (Law 25.326)",
|
|
2842
|
+
"sla_hours": null,
|
|
2843
|
+
"trigger": "Security incident affecting personal data",
|
|
2844
|
+
"note": "AAIP Resolution 240/2022 recommends ~72h for medium/high-risk databases; no statutory hour SLA"
|
|
2845
|
+
},
|
|
2846
|
+
{
|
|
2847
|
+
"jurisdiction": "US California (CCPA / § 1798.82)",
|
|
2848
|
+
"sla_hours": null,
|
|
2849
|
+
"trigger": "Breach of unencrypted/unredacted personal information",
|
|
2850
|
+
"note": "'Most expedient time possible and without unreasonable delay'; AG notification when > 500 CA residents affected"
|
|
2851
|
+
}
|
|
2852
|
+
]
|
|
2853
|
+
},
|
|
2854
|
+
"_patch_sla_summary": {
|
|
2855
|
+
"note": "Critical patch SLAs by framework, sorted fastest to slowest",
|
|
2856
|
+
"table": [
|
|
2857
|
+
{
|
|
2858
|
+
"framework": "CISA KEV (US executive branch)",
|
|
2859
|
+
"sla_hours": null,
|
|
2860
|
+
"sla_days": "varies",
|
|
2861
|
+
"note": "CISA KEV does not set a universal SLA — BOD 22-01 requires 14 days for federal agencies"
|
|
2862
|
+
},
|
|
2863
|
+
{
|
|
2864
|
+
"framework": "ASD ISM + Essential 8 ML3 (AU)",
|
|
2865
|
+
"sla_hours": 48,
|
|
2866
|
+
"sla_days": 2,
|
|
2867
|
+
"note": "ISM-1623: exploit-confirmed critical patches"
|
|
2868
|
+
},
|
|
2869
|
+
{
|
|
2870
|
+
"framework": "UK Cyber Essentials (UK)",
|
|
2871
|
+
"sla_hours": 336,
|
|
2872
|
+
"sla_days": 14,
|
|
2873
|
+
"note": "Internet-facing systems"
|
|
2874
|
+
},
|
|
2875
|
+
{
|
|
2876
|
+
"framework": "CIS Controls v8 (global)",
|
|
2877
|
+
"sla_hours": 336,
|
|
2878
|
+
"sla_days": 14,
|
|
2879
|
+
"note": "Critical OS patches"
|
|
2880
|
+
},
|
|
2881
|
+
{
|
|
2882
|
+
"framework": "NIST 800-53 SI-2 (US)",
|
|
2883
|
+
"sla_hours": null,
|
|
2884
|
+
"sla_days": "organizationally defined",
|
|
2885
|
+
"note": "Typically interpreted as 30 days"
|
|
2886
|
+
},
|
|
2887
|
+
{
|
|
2888
|
+
"framework": "ISO 27001:2022 A.8.8 (global)",
|
|
2889
|
+
"sla_hours": null,
|
|
2890
|
+
"sla_days": "appropriate timescales",
|
|
2891
|
+
"note": "Typically interpreted as 30 days"
|
|
2892
|
+
},
|
|
2893
|
+
{
|
|
2894
|
+
"framework": "PCI DSS 4.0 6.3.3 (global)",
|
|
2895
|
+
"sla_hours": 720,
|
|
2896
|
+
"sla_days": 30,
|
|
2897
|
+
"note": "Critical patches: 1 month"
|
|
2898
|
+
},
|
|
2899
|
+
{
|
|
2900
|
+
"framework": "MAS TRM 11.2 (SG)",
|
|
2901
|
+
"sla_hours": 720,
|
|
2902
|
+
"sla_days": 30,
|
|
2903
|
+
"note": "Critical patches: 1 month"
|
|
2904
|
+
},
|
|
2905
|
+
{
|
|
2906
|
+
"framework": "NSM Grunnprinsipper 2.2.5 (NO)",
|
|
2907
|
+
"sla_hours": 720,
|
|
2908
|
+
"sla_days": 30,
|
|
2909
|
+
"note": "'As soon as possible' for known-exploited; sector audit practice ~30 days for critical"
|
|
2910
|
+
}
|
|
2911
|
+
]
|
|
2912
|
+
}
|
|
2913
|
+
}
|