@blamejs/exceptd-skills 0.9.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/AGENTS.md +232 -0
- package/ARCHITECTURE.md +267 -0
- package/CHANGELOG.md +616 -0
- package/CONTEXT.md +203 -0
- package/LICENSE +200 -0
- package/NOTICE +82 -0
- package/README.md +307 -0
- package/SECURITY.md +73 -0
- package/agents/README.md +81 -0
- package/agents/report-generator.md +156 -0
- package/agents/skill-updater.md +102 -0
- package/agents/source-validator.md +119 -0
- package/agents/threat-researcher.md +149 -0
- package/bin/exceptd.js +183 -0
- package/data/_indexes/_meta.json +88 -0
- package/data/_indexes/activity-feed.json +362 -0
- package/data/_indexes/catalog-summaries.json +229 -0
- package/data/_indexes/chains.json +7135 -0
- package/data/_indexes/currency.json +359 -0
- package/data/_indexes/did-ladders.json +451 -0
- package/data/_indexes/frequency.json +2072 -0
- package/data/_indexes/handoff-dag.json +476 -0
- package/data/_indexes/jurisdiction-clocks.json +967 -0
- package/data/_indexes/jurisdiction-map.json +536 -0
- package/data/_indexes/recipes.json +319 -0
- package/data/_indexes/section-offsets.json +3656 -0
- package/data/_indexes/stale-content.json +14 -0
- package/data/_indexes/summary-cards.json +1736 -0
- package/data/_indexes/theater-fingerprints.json +381 -0
- package/data/_indexes/token-budget.json +2137 -0
- package/data/_indexes/trigger-table.json +1374 -0
- package/data/_indexes/xref.json +818 -0
- package/data/atlas-ttps.json +282 -0
- package/data/cve-catalog.json +496 -0
- package/data/cwe-catalog.json +1017 -0
- package/data/d3fend-catalog.json +738 -0
- package/data/dlp-controls.json +1039 -0
- package/data/exploit-availability.json +67 -0
- package/data/framework-control-gaps.json +1255 -0
- package/data/global-frameworks.json +2913 -0
- package/data/rfc-references.json +324 -0
- package/data/zeroday-lessons.json +377 -0
- package/keys/public.pem +3 -0
- package/lib/framework-gap.js +328 -0
- package/lib/job-queue.js +195 -0
- package/lib/lint-skills.js +536 -0
- package/lib/prefetch.js +372 -0
- package/lib/refresh-external.js +713 -0
- package/lib/schemas/cve-catalog.schema.json +151 -0
- package/lib/schemas/manifest.schema.json +106 -0
- package/lib/schemas/skill-frontmatter.schema.json +113 -0
- package/lib/scoring.js +149 -0
- package/lib/sign.js +197 -0
- package/lib/ttp-mapper.js +80 -0
- package/lib/validate-catalog-meta.js +198 -0
- package/lib/validate-cve-catalog.js +213 -0
- package/lib/validate-indexes.js +83 -0
- package/lib/validate-package.js +162 -0
- package/lib/validate-vendor.js +85 -0
- package/lib/verify.js +216 -0
- package/lib/worker-pool.js +84 -0
- package/manifest-snapshot.json +1833 -0
- package/manifest.json +2108 -0
- package/orchestrator/README.md +124 -0
- package/orchestrator/dispatcher.js +140 -0
- package/orchestrator/event-bus.js +146 -0
- package/orchestrator/index.js +874 -0
- package/orchestrator/pipeline.js +201 -0
- package/orchestrator/scanner.js +327 -0
- package/orchestrator/scheduler.js +137 -0
- package/package.json +113 -0
- package/sbom.cdx.json +158 -0
- package/scripts/audit-cross-skill.js +261 -0
- package/scripts/audit-perf.js +160 -0
- package/scripts/bootstrap.js +205 -0
- package/scripts/build-indexes.js +721 -0
- package/scripts/builders/activity-feed.js +79 -0
- package/scripts/builders/catalog-summaries.js +67 -0
- package/scripts/builders/currency.js +109 -0
- package/scripts/builders/cwe-chains.js +105 -0
- package/scripts/builders/did-ladders.js +149 -0
- package/scripts/builders/frequency.js +89 -0
- package/scripts/builders/jurisdiction-clocks.js +126 -0
- package/scripts/builders/recipes.js +159 -0
- package/scripts/builders/section-offsets.js +162 -0
- package/scripts/builders/stale-content.js +171 -0
- package/scripts/builders/summary-cards.js +166 -0
- package/scripts/builders/theater-fingerprints.js +198 -0
- package/scripts/builders/token-budget.js +96 -0
- package/scripts/check-manifest-snapshot.js +217 -0
- package/scripts/predeploy.js +267 -0
- package/scripts/refresh-manifest-snapshot.js +57 -0
- package/scripts/refresh-sbom.js +222 -0
- package/skills/age-gates-child-safety/skill.md +456 -0
- package/skills/ai-attack-surface/skill.md +282 -0
- package/skills/ai-c2-detection/skill.md +440 -0
- package/skills/ai-risk-management/skill.md +311 -0
- package/skills/api-security/skill.md +287 -0
- package/skills/attack-surface-pentest/skill.md +381 -0
- package/skills/cloud-security/skill.md +384 -0
- package/skills/compliance-theater/skill.md +365 -0
- package/skills/container-runtime-security/skill.md +379 -0
- package/skills/coordinated-vuln-disclosure/skill.md +473 -0
- package/skills/defensive-countermeasure-mapping/skill.md +300 -0
- package/skills/dlp-gap-analysis/skill.md +337 -0
- package/skills/email-security-anti-phishing/skill.md +206 -0
- package/skills/exploit-scoring/skill.md +331 -0
- package/skills/framework-gap-analysis/skill.md +374 -0
- package/skills/fuzz-testing-strategy/skill.md +313 -0
- package/skills/global-grc/skill.md +564 -0
- package/skills/identity-assurance/skill.md +272 -0
- package/skills/incident-response-playbook/skill.md +546 -0
- package/skills/kernel-lpe-triage/skill.md +303 -0
- package/skills/mcp-agent-trust/skill.md +326 -0
- package/skills/mlops-security/skill.md +325 -0
- package/skills/ot-ics-security/skill.md +340 -0
- package/skills/policy-exception-gen/skill.md +437 -0
- package/skills/pqc-first/skill.md +546 -0
- package/skills/rag-pipeline-security/skill.md +294 -0
- package/skills/researcher/skill.md +310 -0
- package/skills/sector-energy/skill.md +409 -0
- package/skills/sector-federal-government/skill.md +302 -0
- package/skills/sector-financial/skill.md +398 -0
- package/skills/sector-healthcare/skill.md +373 -0
- package/skills/security-maturity-tiers/skill.md +464 -0
- package/skills/skill-update-loop/skill.md +463 -0
- package/skills/supply-chain-integrity/skill.md +318 -0
- package/skills/threat-model-currency/skill.md +404 -0
- package/skills/threat-modeling-methodology/skill.md +312 -0
- package/skills/webapp-security/skill.md +281 -0
- package/skills/zeroday-gap-learn/skill.md +350 -0
- package/vendor/blamejs/LICENSE +201 -0
- package/vendor/blamejs/README.md +54 -0
- package/vendor/blamejs/_PROVENANCE.json +54 -0
- package/vendor/blamejs/retry.js +335 -0
- package/vendor/blamejs/worker-pool.js +418 -0
|
@@ -0,0 +1,564 @@
|
|
|
1
|
+
---
|
|
2
|
+
name: global-grc
|
|
3
|
+
version: "1.0.0"
|
|
4
|
+
description: Multi-jurisdiction GRC mapping — EU (GDPR/NIS2/DORA/EU AI Act/CRA), UK, AU, SG, JP, IN, CA, ISO 27001:2022, CSA CCM v4
|
|
5
|
+
triggers:
|
|
6
|
+
- global grc
|
|
7
|
+
- international compliance
|
|
8
|
+
- gdpr security
|
|
9
|
+
- nis2
|
|
10
|
+
- dora compliance
|
|
11
|
+
- eu ai act
|
|
12
|
+
- cyber resilience act
|
|
13
|
+
- mas trm
|
|
14
|
+
- cert-in
|
|
15
|
+
- essential 8
|
|
16
|
+
- apra cps 234
|
|
17
|
+
- multi-jurisdiction
|
|
18
|
+
- global compliance
|
|
19
|
+
data_deps:
|
|
20
|
+
- global-frameworks.json
|
|
21
|
+
- framework-control-gaps.json
|
|
22
|
+
- atlas-ttps.json
|
|
23
|
+
atlas_refs: []
|
|
24
|
+
attack_refs: []
|
|
25
|
+
framework_gaps: []
|
|
26
|
+
last_threat_review: "2026-05-01"
|
|
27
|
+
---
|
|
28
|
+
|
|
29
|
+
# Global GRC Assessment
|
|
30
|
+
|
|
31
|
+
This skill provides multi-jurisdiction GRC analysis. It maps current security threats against frameworks from 14 jurisdictions and two global standards bodies, identifies universal control gaps that no jurisdiction's framework covers, and surfaces jurisdiction-specific notification and compliance requirements.
|
|
32
|
+
|
|
33
|
+
---
|
|
34
|
+
|
|
35
|
+
## Framework Registry (mid-2026 currency)
|
|
36
|
+
|
|
37
|
+
### European Union
|
|
38
|
+
|
|
39
|
+
#### GDPR — General Data Protection Regulation (2016/679)
|
|
40
|
+
|
|
41
|
+
**Relevant Articles:**
|
|
42
|
+
- **Art. 32** — Security of processing: "Appropriate technical and organisational measures" including: pseudonymisation/encryption, ongoing confidentiality/integrity/availability/resilience, ability to restore availability after incidents, regular testing/assessing/evaluating.
|
|
43
|
+
- **Art. 33** — Breach notification to supervisory authority within 72 hours
|
|
44
|
+
- **Art. 34** — Communication to data subjects when breach likely to result in high risk
|
|
45
|
+
|
|
46
|
+
**What "appropriate measures" means in 2026 context:**
|
|
47
|
+
Art. 32 is intentionally technology-neutral. For 2026 threat reality, DPAs (particularly EDPB, CNIL, BfDI, ICO) have signaled:
|
|
48
|
+
- Post-quantum cryptography migration planning is an "appropriate measure" given the quantum threat horizon
|
|
49
|
+
- AI processing of personal data requires specific security measures (no settled guidance yet — EU AI Act supplements)
|
|
50
|
+
- Prompt injection in AI systems processing personal data is an Art. 32 security concern (if successful, it is an unauthorized disclosure)
|
|
51
|
+
|
|
52
|
+
**Breach notification:** 72 hours from awareness to supervisory authority. Note: this is faster than many US frameworks. An AI-mediated data breach (prompt injection exfiltrating personal data) must be reported even if the AI service account was the "authorized" accessor.
|
|
53
|
+
|
|
54
|
+
**Currency assessment:** GDPR Art. 32 is reasonably current because "appropriate measures" evolves with technology. The gap is in interpretive guidance — there is no settled EDPB guidance on AI-specific security measures, MCP trust, or prompt injection as an Art. 32 failure.
|
|
55
|
+
|
|
56
|
+
---
|
|
57
|
+
|
|
58
|
+
#### NIS2 Directive (2022/2555) — Effective October 2024
|
|
59
|
+
|
|
60
|
+
**Classification:** Essential entities (energy, transport, banking, health, digital infrastructure) and Important entities (postal, waste, chemicals, food, manufacturing, digital providers, research).
|
|
61
|
+
|
|
62
|
+
**Key requirements (Art. 21):**
|
|
63
|
+
1. Risk analysis and information system security policies
|
|
64
|
+
2. Incident handling
|
|
65
|
+
3. Business continuity and crisis management
|
|
66
|
+
4. Supply chain security (including security in supplier/provider relationships)
|
|
67
|
+
5. Security in network/information systems acquisition, development, maintenance
|
|
68
|
+
6. Policies/procedures for assessing vulnerability handling measures
|
|
69
|
+
7. Cybersecurity hygiene and training
|
|
70
|
+
8. Policies on cryptography and, where appropriate, encryption
|
|
71
|
+
9. Human resources security, access control, asset management
|
|
72
|
+
10. Multi-factor authentication or continuous authentication
|
|
73
|
+
|
|
74
|
+
**Incident notification:** Significant incidents to national CSIRT within 24 hours (early warning), 72 hours (notification), 1 month (final report).
|
|
75
|
+
|
|
76
|
+
**Key gaps for 2026 threats:**
|
|
77
|
+
- Art. 21(2)(e) covers supply chain security but has no specific guidance for AI/MCP supply chain attacks
|
|
78
|
+
- Art. 21(2)(h) mentions "policies on cryptography and encryption" — post-quantum migration is implied but not mandated
|
|
79
|
+
- No specific Art. 21 measure for AI pipeline integrity, prompt injection, or AI-as-C2
|
|
80
|
+
- "Appropriate measures" language parallels GDPR — same gap in AI-specific interpretation
|
|
81
|
+
|
|
82
|
+
**Enforcement:** National competent authorities can impose fines up to €10M or 2% of global turnover for essential entities; €7M or 1.4% for important entities.
|
|
83
|
+
|
|
84
|
+
---
|
|
85
|
+
|
|
86
|
+
#### DORA — Digital Operational Resilience Act (2022/2554) — Effective January 2025
|
|
87
|
+
|
|
88
|
+
**Scope:** Financial entities (banks, investment firms, payment institutions, e-money, insurance, crypto-asset service providers) and their critical ICT third-party service providers.
|
|
89
|
+
|
|
90
|
+
**Five pillars:**
|
|
91
|
+
1. ICT risk management framework (Arts. 5–16)
|
|
92
|
+
2. ICT incident classification and reporting (Arts. 17–23)
|
|
93
|
+
3. Digital operational resilience testing (Arts. 24–27, including TLPT — Threat-Led Penetration Testing)
|
|
94
|
+
4. ICT third-party risk management (Arts. 28–44)
|
|
95
|
+
5. Information and intelligence sharing (Arts. 45–49)
|
|
96
|
+
|
|
97
|
+
**Key requirements relevant to 2026:**
|
|
98
|
+
- Art. 8: Identification of ICT risk — must include AI/ML systems as ICT assets
|
|
99
|
+
- Art. 9: Protection and prevention — encryption "in accordance with latest standards," access policies, monitoring
|
|
100
|
+
- Art. 16: Simplified ICT risk management framework for smaller entities
|
|
101
|
+
- Art. 26: TLPT (red team testing for significant institutions) — must use threat intelligence, should cover AI attack surfaces
|
|
102
|
+
- Art. 28: Third-party ICT risk — critical third-party providers (CTPs) are subject to direct oversight. LLM API providers may qualify as CTPs for financial entities heavily dependent on them.
|
|
103
|
+
|
|
104
|
+
**DORA gaps for 2026:**
|
|
105
|
+
- No specific AI/LLM risk category in ICT risk taxonomy
|
|
106
|
+
- TLPT scope guidance doesn't explicitly include prompt injection or AI-as-C2
|
|
107
|
+
- CTP designation process for AI/LLM providers is still being clarified by ESAs
|
|
108
|
+
|
|
109
|
+
---
|
|
110
|
+
|
|
111
|
+
#### EU AI Act (2024/1689) — Fully Applicable August 2026
|
|
112
|
+
|
|
113
|
+
**Risk tiers for AI systems:**
|
|
114
|
+
- **Unacceptable risk** (Art. 5): Prohibited (social scoring, real-time biometric identification in public, etc.)
|
|
115
|
+
- **High risk** (Annex III): Critical infrastructure, biometric, employment, education, law enforcement, etc.
|
|
116
|
+
- **Limited risk** (Art. 50): Transparency obligations (chatbots must disclose they're AI)
|
|
117
|
+
- **Minimal risk**: No specific requirements
|
|
118
|
+
|
|
119
|
+
**For high-risk AI systems, Art. 9 Risk Management System requires:**
|
|
120
|
+
- Continuous iterative risk management process
|
|
121
|
+
- Identification and analysis of known/foreseeable risks
|
|
122
|
+
- Estimation and evaluation of risks in conditions of intended use
|
|
123
|
+
- Evaluation of risks from reasonably foreseeable misuse
|
|
124
|
+
- Risk management measures
|
|
125
|
+
|
|
126
|
+
**What "misuse" means for AI systems in 2026:**
|
|
127
|
+
Art. 9 requires identifying reasonably foreseeable misuse. For any high-risk AI system with a language model component, "reasonably foreseeable misuse" includes prompt injection — it is the most documented AI attack pattern in 2026. An Art. 9 risk management system that doesn't address prompt injection is incomplete.
|
|
128
|
+
|
|
129
|
+
**Interaction with NIS2:** High-risk AI systems operated by NIS2 entities must satisfy both frameworks. The intersection is not fully harmonized — no implementing regulation bridges Art. 9 AI Act risk management and NIS2 Art. 21 measures specifically for AI systems.
|
|
130
|
+
|
|
131
|
+
---
|
|
132
|
+
|
|
133
|
+
#### EU Cyber Resilience Act — CRA (2024)
|
|
134
|
+
|
|
135
|
+
**Scope:** Products with digital elements (hardware and software) placed on EU market.
|
|
136
|
+
|
|
137
|
+
**Key security requirements (Annex I):**
|
|
138
|
+
- No known exploitable vulnerabilities
|
|
139
|
+
- Secure by default configuration
|
|
140
|
+
- Confidentiality, integrity, and availability protections
|
|
141
|
+
- Limited attack surface
|
|
142
|
+
- Security updates for the support lifetime
|
|
143
|
+
|
|
144
|
+
**CRA relevance to 2026 threats:**
|
|
145
|
+
- MCP servers distributed as software products fall under CRA if sold to EU market
|
|
146
|
+
- "No known exploitable vulnerabilities" requirement means MCP servers must have a coordinated disclosure and patch process
|
|
147
|
+
- AI model components integrated into products are covered — model updates constitute "security patches" under CRA
|
|
148
|
+
- CRA will be the primary enforcement mechanism for AI tool supply chain security in the EU
|
|
149
|
+
|
|
150
|
+
---
|
|
151
|
+
|
|
152
|
+
### United Kingdom
|
|
153
|
+
|
|
154
|
+
#### Cyber Essentials / Cyber Essentials Plus
|
|
155
|
+
|
|
156
|
+
**Five controls:**
|
|
157
|
+
1. Firewalls (boundary firewalls and internet gateways)
|
|
158
|
+
2. Secure configuration
|
|
159
|
+
3. User access control
|
|
160
|
+
4. Malware protection
|
|
161
|
+
5. Patch management (high-risk patches within 14 days)
|
|
162
|
+
|
|
163
|
+
**Currency assessment for 2026:**
|
|
164
|
+
- 14-day patch window is better than NIST's 30-day but still insufficient for CISA KEV class (Copy Fail class should be 4 hours)
|
|
165
|
+
- No control for AI/ML attack surface, prompt injection, MCP trust
|
|
166
|
+
- Malware protection assumes signature-based or behavioral detection — no coverage for AI-generated evasion (PROMPTFLUX)
|
|
167
|
+
- Widely used as a baseline for UK government supplier requirements — creates systematic gap for AI-using suppliers
|
|
168
|
+
|
|
169
|
+
#### NCSC Cyber Assessment Framework (CAF)
|
|
170
|
+
|
|
171
|
+
**Four objectives, 14 principles:**
|
|
172
|
+
- A: Managing security risk (A1: Governance, A2: Risk Management, A3: Asset Management, A4: Supply Chain)
|
|
173
|
+
- B: Protecting against cyberattack (B1–B6 covering identity/access, data security, system security, resilient networks, staff awareness, vulnerability management)
|
|
174
|
+
- C: Detecting cyber security events (C1: Security Monitoring, C2: Proactive Security Event Discovery)
|
|
175
|
+
- D: Minimising impact (D1: Response/Recovery Planning, D2: Lessons Learned)
|
|
176
|
+
|
|
177
|
+
**CAF strength vs. 2026:** CAF Principle B6 (Vulnerability Management) and C1 (Security Monitoring) are principle-based, allowing more flexibility than control-based frameworks. An assessor applying CAF B6 can reasonably require CISA KEV-aligned response times. CAF C1 can be interpreted to require AI API behavioral monitoring.
|
|
178
|
+
|
|
179
|
+
**CAF gap:** The principle-based approach requires assessors to interpret current threats into each principle. There is no NCSC-published CAF guidance specifically for AI attack surfaces as of mid-2026.
|
|
180
|
+
|
|
181
|
+
---
|
|
182
|
+
|
|
183
|
+
### Australia
|
|
184
|
+
|
|
185
|
+
#### ASD Information Security Manual (ISM) — Monthly Updates
|
|
186
|
+
|
|
187
|
+
The Australian ISM is the most frequently updated major framework — monthly updates give it the shortest lag of any national framework. Key controls relevant to 2026:
|
|
188
|
+
|
|
189
|
+
- **ISM-1623**: Patch operating systems and applications within 48 hours when exploits exist (closest to RWEP-aligned patching in any national framework)
|
|
190
|
+
- **ISM-1694**: Employ application control to prevent execution of malicious code
|
|
191
|
+
- **ISM-1691**: Configure Microsoft Office macro settings (relevant for AI document processing pipelines)
|
|
192
|
+
|
|
193
|
+
**ISM strength:** 48-hour patching for exploited vulnerabilities is the best standard practice in any national framework. Aligns with ASD Essential 8 Maturity Level 3.
|
|
194
|
+
|
|
195
|
+
**ISM gap:** No specific controls for AI pipeline security, MCP trust boundaries, or prompt injection as of mid-2026 monthly updates.
|
|
196
|
+
|
|
197
|
+
#### ASD Essential 8
|
|
198
|
+
|
|
199
|
+
**Eight mitigations, Maturity Levels 0–3:**
|
|
200
|
+
1. Application control
|
|
201
|
+
2. Patch applications
|
|
202
|
+
3. Configure Microsoft Office macros
|
|
203
|
+
4. User application hardening
|
|
204
|
+
5. Restrict administrative privileges
|
|
205
|
+
6. Patch operating systems (ML3: within 48h of exploit availability)
|
|
206
|
+
7. Multi-factor authentication
|
|
207
|
+
8. Regular backups
|
|
208
|
+
|
|
209
|
+
**ML3 patch requirement (48 hours with exploit availability)** is the most operationally realistic framework requirement for CISA KEV class vulnerabilities. Still does not explicitly require live kernel patching as a capability.
|
|
210
|
+
|
|
211
|
+
**Essential 8 gap:** No AI-specific mitigations. Essential 8 was designed for Windows-centric enterprise environments; doesn't address Linux LPEs, AI assistant supply chain, or prompt injection.
|
|
212
|
+
|
|
213
|
+
#### APRA CPS 234 — Financial Sector
|
|
214
|
+
|
|
215
|
+
Requires financial entities to maintain information security capabilities commensurate with information security vulnerabilities and threats. Annual third-party penetration testing. Incident notification to APRA within 72 hours for material incidents.
|
|
216
|
+
|
|
217
|
+
**CPS 234 + AI:** No specific guidance for AI/ML systems. "Commensurate with threats" requires current threat awareness — a CPS 234-compliant entity should be assessing AI attack surfaces as part of threat landscape monitoring.
|
|
218
|
+
|
|
219
|
+
---
|
|
220
|
+
|
|
221
|
+
### Singapore
|
|
222
|
+
|
|
223
|
+
#### MAS Technology Risk Management Guidelines (TRM, Jan 2021 — updated)
|
|
224
|
+
|
|
225
|
+
**Scope:** MAS-regulated financial institutions.
|
|
226
|
+
|
|
227
|
+
**Key requirements:**
|
|
228
|
+
- Technology risk governance framework
|
|
229
|
+
- IT system resilience (RTO/RPO requirements)
|
|
230
|
+
- Cyber surveillance (continuous monitoring)
|
|
231
|
+
- Penetration testing (frequency based on risk classification)
|
|
232
|
+
- Patch management (critical patches within 1 month — same PCI-era problem)
|
|
233
|
+
- Third-party technology risk
|
|
234
|
+
|
|
235
|
+
**MAS TRM + AI:** MAS published AI governance guidelines separately (Fairness, Ethics, Accountability, Transparency framework). Integration between TRM and AI governance is incomplete — no specific TRM controls for AI attack surfaces. Financial institutions in Singapore are expected to apply TRM principles to AI systems but specific control requirements are not yet codified.
|
|
236
|
+
|
|
237
|
+
**MAS TRM gap:** 1-month critical patch window; no AI-specific controls; no MCP/agent trust boundary requirements.
|
|
238
|
+
|
|
239
|
+
#### CSA Cybersecurity Code of Practice (CCoP) — Critical Information Infrastructure
|
|
240
|
+
|
|
241
|
+
Requirements for 11 CII sectors (energy, water, banking, healthcare, transport, government, InfoComm, media, security & emergency, aviation, maritime).
|
|
242
|
+
|
|
243
|
+
**Key requirements:** Annual cybersecurity audit, annual penetration testing, incident reporting within 2 hours of confirmed incident, patch management within 14 days for critical systems.
|
|
244
|
+
|
|
245
|
+
**CCoP strength:** 2-hour incident reporting for CII is the fastest notification requirement in any framework.
|
|
246
|
+
|
|
247
|
+
---
|
|
248
|
+
|
|
249
|
+
### Japan
|
|
250
|
+
|
|
251
|
+
#### METI Cybersecurity Framework / NISC Basic Policy
|
|
252
|
+
|
|
253
|
+
Japan's national cybersecurity framework closely mirrors NIST CSF with adaptations for Japanese industry structure. NISC (National center of Incident readiness and Strategy for Cybersecurity) publishes the Basic Policy updated annually.
|
|
254
|
+
|
|
255
|
+
**Key gaps for 2026:** Japanese frameworks lag US equivalents by 12–18 months in AI-specific guidance. The METI AI Governance Guidelines (2023) address AI ethics and governance but not AI attack surfaces. No equivalent to EU AI Act security requirements in Japanese law as of mid-2026.
|
|
256
|
+
|
|
257
|
+
**Active Cyber Defense Law (2024):** Japan enacted limited offensive cyber capability legislation — relevant for understanding Japan's cyber threat posture and incident response coordination.
|
|
258
|
+
|
|
259
|
+
---
|
|
260
|
+
|
|
261
|
+
### India
|
|
262
|
+
|
|
263
|
+
#### CERT-In Directions (April 2022)
|
|
264
|
+
|
|
265
|
+
**Breach notification:** 6 hours from awareness — the shortest breach notification requirement globally.
|
|
266
|
+
|
|
267
|
+
**Other requirements:**
|
|
268
|
+
- Maintain logs of ICT systems for 180 days within India jurisdiction
|
|
269
|
+
- VPN service providers must maintain subscriber information for 5 years
|
|
270
|
+
- Data center operators, virtual asset service providers: same logging requirements
|
|
271
|
+
- Mandatory reporting of 20+ incident types including: targeted scanning/probing, compromise of critical systems, unauthorized access, data breach, attacks on applications, defacement
|
|
272
|
+
|
|
273
|
+
**CERT-In + AI:** No specific AI security requirements. The 6-hour notification requirement applies if an AI system breach results in a reportable incident (unauthorized access, data breach). An AI-mediated exfiltration via prompt injection that affected Indian citizens' data would trigger 6-hour notification.
|
|
274
|
+
|
|
275
|
+
#### SEBI Cybersecurity and Cyber Resilience Framework
|
|
276
|
+
|
|
277
|
+
**Scope:** Market infrastructure institutions, regulated entities.
|
|
278
|
+
|
|
279
|
+
**Requirements:** Annual VAPT, quarterly vulnerability assessment, incident reporting within 6 hours to SEBI. Aligns with CERT-In timelines for financial sector.
|
|
280
|
+
|
|
281
|
+
---
|
|
282
|
+
|
|
283
|
+
### Canada
|
|
284
|
+
|
|
285
|
+
#### OSFI Guideline B-10 (Technology and Cyber Risk, 2023)
|
|
286
|
+
|
|
287
|
+
**Scope:** Federally regulated financial institutions.
|
|
288
|
+
|
|
289
|
+
**Key requirements:**
|
|
290
|
+
- Technology and cyber risk management framework
|
|
291
|
+
- Incident notification to OSFI within 24 hours of high/critical incidents
|
|
292
|
+
- Supply chain due diligence for technology third parties
|
|
293
|
+
- Annual penetration testing
|
|
294
|
+
|
|
295
|
+
**B-10 + AI:** No specific AI guidance as of mid-2026. "Technology risk" is interpreted broadly enough to include AI systems. OSFI published draft AI guidance for consultation in 2025 — final guidance expected late 2026.
|
|
296
|
+
|
|
297
|
+
#### Bill C-27 / CPPA (Consumer Privacy Protection Act) — Proposed
|
|
298
|
+
|
|
299
|
+
Not yet in force as of mid-2026 (legislative delay). When enacted: 72-hour breach notification, $25M or 5% of global revenue penalties.
|
|
300
|
+
|
|
301
|
+
---
|
|
302
|
+
|
|
303
|
+
### Global Standards
|
|
304
|
+
|
|
305
|
+
#### ISO 27001:2022 / ISO 27002:2022
|
|
306
|
+
|
|
307
|
+
**Reorganized control set:** 93 controls in 4 clauses (Organizational, People, Physical, Technological). Reduced from ISO 27001:2013's 114 controls.
|
|
308
|
+
|
|
309
|
+
**New in 2022:**
|
|
310
|
+
- A.5.7: Threat intelligence (explicit requirement to collect and analyze threat intelligence)
|
|
311
|
+
- A.5.23: Information security for use of cloud services
|
|
312
|
+
- A.8.8: Management of technical vulnerabilities
|
|
313
|
+
- A.8.12: Data leakage prevention
|
|
314
|
+
- A.8.16: Monitoring activities
|
|
315
|
+
|
|
316
|
+
**ISO 27001:2022 gap for 2026:**
|
|
317
|
+
- A.5.7 threat intelligence: requires collecting and analyzing threat intel but no guidance on currency requirements — an org can comply with A.5.7 using threat intelligence that is years out of date
|
|
318
|
+
- A.8.16 monitoring: no guidance for AI API behavioral monitoring, no AI-as-C2 detection requirement
|
|
319
|
+
- No controls specific to AI/ML systems (planned for ISO/IEC 27090, still in development)
|
|
320
|
+
- A.8.8 same problem as NIST SI-2: "appropriate timescales" undefined for CISA KEV class
|
|
321
|
+
|
|
322
|
+
#### CSA Cloud Controls Matrix (CCM) v4
|
|
323
|
+
|
|
324
|
+
**17 domains, 197 control specifications.** Cloud-specific but applicable to any cloud-native or cloud-using organization.
|
|
325
|
+
|
|
326
|
+
**AI relevance:**
|
|
327
|
+
- AIS domain (Application & Interface Security) covers some AI risk areas
|
|
328
|
+
- SEF (Security Incident Management): breach notification requirements
|
|
329
|
+
- STA (Supply Chain Management): cloud service supply chain security
|
|
330
|
+
|
|
331
|
+
**CCM v4 gap:** No AIS controls specifically for LLM/AI systems, MCP servers, or prompt injection. CSA published "AI Controls" supplement (2025) — worth reviewing alongside CCM v4 for AI-using organizations.
|
|
332
|
+
|
|
333
|
+
#### CIS Controls v8
|
|
334
|
+
|
|
335
|
+
**18 controls, three Implementation Groups (IG1/IG2/IG3):**
|
|
336
|
+
|
|
337
|
+
Controls most relevant to 2026 gaps:
|
|
338
|
+
- Control 7 (Continuous Vulnerability Management): IG2/IG3 — automated patching. Doesn't specify CISA KEV-based timelines.
|
|
339
|
+
- Control 14 (Security Awareness): IG1+. AI-generated phishing is not in scope for current training content guidance.
|
|
340
|
+
- Control 16 (Application Software Security): IG2+. Does not cover AI/LLM application security.
|
|
341
|
+
- Control 17 (Incident Response Management): IG1+. No AI-specific playbooks recommended.
|
|
342
|
+
|
|
343
|
+
**CIS Control v8 strength:** Control 7 IG3 requires continuous vulnerability management with asset tracking — more operationally rigorous than NIST SI-2's "timely" language.
|
|
344
|
+
|
|
345
|
+
---
|
|
346
|
+
|
|
347
|
+
## Universal Gaps (No Jurisdiction Covers These)
|
|
348
|
+
|
|
349
|
+
These gaps exist across all 14 jurisdictions and both global standards:
|
|
350
|
+
|
|
351
|
+
| Gap | Evidence |
|
|
352
|
+
|---|---|
|
|
353
|
+
| Prompt injection as access control failure | Zero frameworks have a control for this attack class |
|
|
354
|
+
| MCP/agent tool trust boundaries | Zero frameworks address AI tool supply chain at this level |
|
|
355
|
+
| AI pipeline integrity (model versioning + behavioral regression) | Zero frameworks have technical control requirements |
|
|
356
|
+
| AI-as-C2 detection | Zero frameworks have detection/response requirements |
|
|
357
|
+
| Live kernel patching as required capability | Only ASD ISM approaches this (48h with exploit); still doesn't mandate live patching |
|
|
358
|
+
| CISA KEV-indexed patch SLAs | Closest: ASD ML3 48h, CCoP 14d. None mandate sub-4h for KEV + public PoC |
|
|
359
|
+
| AI-generated phishing detection update requirement | Zero frameworks require updating phishing detection for AI-generated content |
|
|
360
|
+
| RAG pipeline security | Zero frameworks have controls |
|
|
361
|
+
| Post-quantum cryptography migration mandate | NIST/CISA guidance recommends; no framework mandates timeline |
|
|
362
|
+
|
|
363
|
+
---
|
|
364
|
+
|
|
365
|
+
## Notification Timeline Summary
|
|
366
|
+
|
|
367
|
+
| Jurisdiction | Framework | Notification Trigger | Timeline |
|
|
368
|
+
|---|---|---|---|
|
|
369
|
+
| EU | GDPR | Personal data breach | 72h to SA |
|
|
370
|
+
| EU | NIS2 | Significant incident | 24h early warning, 72h notification |
|
|
371
|
+
| EU | DORA | Major ICT-related incident | 4h initial, 72h intermediate, 1 month final |
|
|
372
|
+
| UK | GDPR/UK DPA | Personal data breach | 72h to ICO |
|
|
373
|
+
| AU | Notifiable Data Breaches | Eligible data breach | ASAP (no fixed window), practicable |
|
|
374
|
+
| SG | PDPA | Data breach | 3 days to PDPC |
|
|
375
|
+
| SG | CSA CCoP (CII) | Cyber incident | 2 hours |
|
|
376
|
+
| JP | APPI | Personal data leak | Without delay |
|
|
377
|
+
| IN | CERT-In | 20+ incident types | **6 hours** |
|
|
378
|
+
| IN | SEBI | Cyber incident | 6 hours |
|
|
379
|
+
| CA | PIPEDA | Real risk of significant harm | Asap to OPC |
|
|
380
|
+
| CA | OSFI B-10 | High/critical tech/cyber incident | 24 hours |
|
|
381
|
+
| Global | ISO 27001 | No notification requirement | Framework-only |
|
|
382
|
+
|
|
383
|
+
---
|
|
384
|
+
|
|
385
|
+
## Threat Context
|
|
386
|
+
|
|
387
|
+
US-only GRC posture is structurally incomplete for any organisation operating across EU, UK, AU, SG, IN, JP, or CA in mid-2026. The following regulatory instruments are in force or about to be, and have no direct US-framework equivalent:
|
|
388
|
+
|
|
389
|
+
- **NIS2 Directive (EU 2022/2555)** — transposition deadline 2024-10-17; enforcement now active across all 27 Member States. Imposes obligations on essential and important entities that NIST CSF / SOC 2 do not mirror, including: 24-hour early-warning notification, mandatory MFA, supply-chain security including AI-tool plugins, board-level accountability with personal liability for senior management.
|
|
390
|
+
- **DORA (EU 2022/2554)** — fully applicable 2025-01-17. Imposes a 4-hour initial incident notification, mandatory Threat-Led Penetration Testing (TLPT) for significant financial entities, and direct ESA oversight of Critical Third-Party Providers (CTPs). LLM API providers used by EU financial entities are candidate CTPs.
|
|
391
|
+
- **EU AI Act (Regulation 2024/1689)** — staged application; full application 2026-08-02 (less than three months from this skill's review date). High-risk AI systems must operate under Art. 9 risk management, Art. 15 cybersecurity, and post-market monitoring. No NIST or SOC 2 control maps to Art. 15 cybersecurity requirements for AI systems.
|
|
392
|
+
- **EU Cyber Resilience Act (Regulation 2024/2847)** — phased application; reporting obligations apply from 2026-09-11, full obligations from 2027-12-11. "Products with digital elements" placed on the EU market — including MCP servers, AI agent tooling, IoT — must satisfy Annex I essential cybersecurity requirements with vendor liability for the support lifetime.
|
|
393
|
+
- **CERT-In Directions (India, 2022)** — 6-hour breach notification, mandatory log retention in-jurisdiction. No US framework imposes a comparable timeline.
|
|
394
|
+
- **MAS TRM (Singapore)** and **CSA CCoP (Singapore CII)** — 1-hour critical-incident notification for CCoP CII, 14-day patch SLA. Stricter than any US framework.
|
|
395
|
+
- **APRA CPS 234 (Australia)** — third-party penetration testing mandate with personal accountability for boards; APRA enforcement actions in 2024–2025 demonstrate this is operationally enforced, not aspirational.
|
|
396
|
+
|
|
397
|
+
A US-only compliance posture in 2026 has no controls mapped to four of the most consequential regulatory developments of the past 24 months (NIS2, DORA, EU AI Act, CRA). Compliance theatre at the global level is the default state for orgs that have not run a jurisdiction-specific gap analysis since 2024.
|
|
398
|
+
|
|
399
|
+
---
|
|
400
|
+
|
|
401
|
+
## Framework Lag Declaration
|
|
402
|
+
|
|
403
|
+
Every applicable framework has at least one structural gap against mid-2026 threats. The lag is per-jurisdiction and per-control.
|
|
404
|
+
|
|
405
|
+
| Framework | Control | What it misses (mid-2026) |
|
|
406
|
+
|---|---|---|
|
|
407
|
+
| EU | GDPR Art. 32 ("appropriate technical and organisational measures") | Principle-based, intentionally technology-neutral. No mapped controls for prompt injection as an Art. 32 failure, no settled EDPB guidance on AI-system security, no PQC migration mandate. |
|
|
408
|
+
| EU | NIS2 Art. 21(2)(d) (supply chain) | Expanded scope to "supplier and provider relationships" but does not name AI tool plugins, MCP servers, or model providers. National-CSIRT enforcement timing varies — some Member States are still operationalising the 24h early-warning channel. |
|
|
409
|
+
| EU | DORA Art. 28–30 (ICT third-party risk) | Register of information for ICT third-party arrangements is mandated but there is no unified attestation regime yet; CTP designation for LLM/AI API providers is being clarified through ESA Joint Committee guidance. |
|
|
410
|
+
| EU | EU AI Act Art. 9 / Art. 15 (high-risk AI risk management and cybersecurity) | Transparency-obligation enforcement is left to Member-State competent authorities. As of mid-2026 the operational test of "appropriate level of accuracy, robustness, and cybersecurity" is being interpreted differently in DE, FR, IT, NL — uniform enforcement is not yet observed. |
|
|
411
|
+
| EU | EU CRA Annex I | "No known exploitable vulnerabilities" is a strict obligation but the conformity-assessment regime is new; market-surveillance authorities have limited tooling to test against ATLAS or KEV catalogs. |
|
|
412
|
+
| UK | NCSC CAF Principles A–D | Principle-based, deliberately not prescriptive. Currency of interpretation depends on the individual assessor. No NCSC-published AI-attack-surface guidance integrated into CAF as of mid-2026. |
|
|
413
|
+
| UK | Cyber Essentials Plus | 14-day high-risk patch SLA — better than NIST but still insufficient for KEV-class deterministic LPE. No AI-tool coverage. |
|
|
414
|
+
| AU | ASD ISM-1623 / Essential 8 ML3 | 48-hour patch window for known-exploit vulnerabilities is the best operational standard in any national framework — but does not mandate live-patching capability and has no AI-pipeline controls. |
|
|
415
|
+
| AU | APRA CPS 234 | "Commensurate with vulnerabilities and threats" — requires the regulated entity to keep its own threat catalog current. No CPS 234 controls mention AI surfaces explicitly. |
|
|
416
|
+
| SG | MAS TRM (2021, updates) | 1-month critical patch SLA still in force; AI governance handled in a parallel document (FEAT) with incomplete bridge to TRM technical controls. |
|
|
417
|
+
| IN | CERT-In Directions | 6-hour notification is fastest globally for the trigger set listed, but the trigger set predates the AI-mediated attack patterns now common — categorisation of an AI-mediated breach against the listed 20+ trigger types is interpretive. |
|
|
418
|
+
| JP | METI Cybersecurity / NISC Basic Policy | Lags US frameworks by 12–18 months on AI guidance. No equivalent to EU AI Act Art. 15 cybersecurity obligations for AI in Japanese law as of mid-2026. |
|
|
419
|
+
| Global | ISO 27001:2022 A.5.7 (Threat intelligence) | Requires intelligence collection; defines no currency metric — compliance achievable with stale intel. |
|
|
420
|
+
| Global | ISO 27001:2022 A.8.8 (Technical vulnerability management) | "Appropriate timescales" undefined — same SLA gap as NIST SI-2. |
|
|
421
|
+
| Global | CSA CCM v4 AIS / STA | AIS controls predate the LLM/MCP attack surface; STA covers supply chain but not AI-plugin trust boundaries. AI Controls supplement (2025) is not yet integrated into CCM v4 core. |
|
|
422
|
+
| US (for contrast) | NIST 800-53 SI-2, AC-2, SC-7 | 30-day patch window; no prompt-injection control; perimeter-centric SC-7 boundary protection misses AI-API egress. Cited here only to show parity with the global frameworks — US controls are not adequate either. |
|
|
423
|
+
|
|
424
|
+
Universal lag: every jurisdiction except Australia (ISM-1623) lacks an operationally testable patch-SLA for KEV-class deterministic LPE. Every jurisdiction lacks AI-pipeline-integrity controls in force as of mid-2026; the EU AI Act will be the first when Art. 15 becomes operationally enforced.
|
|
425
|
+
|
|
426
|
+
**Expanded jurisdictional coverage (per `data/global-frameworks.json`).** The EU/UK/AU/ISO baseline is no longer sufficient — the catalog tracks 21+ jurisdictions and the cross-border data-flow obligations are where most of the operational lag now lives:
|
|
427
|
+
|
|
428
|
+
- **China (PIPL Art. 38-42 / DSL / CSL):** Cross-border personal-information transfer requires one of three lawful bases — CAC Security Assessment (mandatory above thresholds), CAC-accredited Certification, or filed Standard Contract. PIPL enforcement against AI-tool prompt data is active (multi-vendor 2025 actions). No EU/UK control maps to the CAC Security Assessment trigger.
|
|
429
|
+
- **Vietnam (Cybersecurity Law 2018 + Decree 53/2022/ND-CP, effective 2022-10-01):** Data-localization for "important data" of Vietnamese citizens; in-country storage and a local representative office for foreign providers above defined-user thresholds. Decree 53 is the operational implementation that NIS2 and DORA have no parallel for.
|
|
430
|
+
- **Israel (Privacy Protection Law Amendment 13, in force 2024 with the Privacy Protection Authority expanded enforcement powers; INCD Cyber Defense Methodology v2.0):** Expanded sensitive-data definitions and adequacy-equivalent transfer expectations; INCD methodology pins technical baselines that complement (not duplicate) ISO 27001 A.5 controls.
|
|
431
|
+
- **Switzerland (revFADP in force 2023-09-01; FINMA Circular 2023/1 Operational risks and resilience – banks):** Transfer rules require recognised adequacy or contractual safeguards equivalent to GDPR Art. 46; FINMA imposes financial-sector operational-resilience expectations distinct from DORA's scope.
|
|
432
|
+
- **Hong Kong (PCPD PDPO + HKMA SA-2 / TM-G-1):** PCPD cross-border transfer guidance (Section 33 historically un-commenced, now operationalised via PCPD 2024 guidance); HKMA TM-G-1 / SA-2 imposes banking-sector cyber resilience timelines comparable to MAS TRM.
|
|
433
|
+
- **Taiwan (PDPA TW + Cyber Security Management Act 2018):** CSMA classifies CII operators with sector-specific reporting timelines; PDPA TW cross-border restrictions are agency-imposed per data category.
|
|
434
|
+
- **Indonesia (UU PDP 2022, in force 2024-10-17):** New personal-data law with 72-hour breach notification, data-protection officer requirements, and cross-border transfer adequacy or BCR-equivalent safeguards.
|
|
435
|
+
- **Japan (expanded — APPI / FISC / NISC):** APPI cross-border consent (Art. 28) and anonymized-information leak rules supplement the existing METI/NISC entry; FISC Security Guidelines impose financial-sector requirements analogous to FFIEC.
|
|
436
|
+
- **South Korea (PIPA + Network Act):** Cross-border PI transfer requires consent or one of the specified exceptions; PIPC enforcement against AI tools is active.
|
|
437
|
+
- **Brazil (LGPD Art. 33-35):** Cross-border transfer requires adequacy decision, SCCs, BCRs, or specific consent; ANPD has signalled AI-tool enforcement interest under LGPD Art. 33.
|
|
438
|
+
- **US sub-national — NYDFS 23 NYCRR 500 (amended Nov 2023, phased through Nov 2025):** 72-hour cyber-event notification to DFS, CISO accountability, MFA mandate, annual independent audit for Class A companies, Third-Party Service Provider Security Policy at 500.11. NYDFS is the strictest US sub-national financial-sector regime and operationally exceeds most state-level analogues.
|
|
439
|
+
|
|
440
|
+
Per AGENTS.md rule #5, the global-grc analysis must cross-walk against the full catalog above, not just EU/UK/AU/ISO. A jurisdictional rollup that omits CN, VN, IL, CH, HK, TW, ID, JP-expanded, KR, BR, or NYDFS for an in-scope org is structurally incomplete.
|
|
441
|
+
|
|
442
|
+
---
|
|
443
|
+
|
|
444
|
+
## TTP Mapping
|
|
445
|
+
|
|
446
|
+
Regulatory frameworks are control-centric, not TTP-centric. This skill maps controls across jurisdictions; the TTP coverage of any one jurisdiction's controls is the union of mappings in `data/atlas-ttps.json` × `data/framework-control-gaps.json`. Use the **framework-gap-analysis** skill to score TTP coverage for a specific jurisdiction's control bundle; use this skill to compare obligations across jurisdictions.
|
|
447
|
+
|
|
448
|
+
A summary of the multi-jurisdiction control surface vs. the high-priority TTPs from `data/atlas-ttps.json`:
|
|
449
|
+
|
|
450
|
+
| TTP | ATLAS / ATT&CK ID | Jurisdiction with most specific obligation | Jurisdictions with no mapped control |
|
|
451
|
+
|---|---|---|---|
|
|
452
|
+
| Prompt injection | AML.T0051 | EU AI Act Art. 15 (interpretive, post 2026-08-02) | US (NIST/SOC2), UK CAF, AU ISM, SG TRM, IN CERT-In, JP, CA |
|
|
453
|
+
| ML supply chain (MCP, models) | AML.T0010 | EU CRA Annex I (post 2026-09-11 reporting) | All others — supply-chain controls do not name AI plugins |
|
|
454
|
+
| LLM C2 abuse (SesameOp) | AML.T0096 | None | All — no jurisdiction has a control for AI-API as C2 |
|
|
455
|
+
| Poison Training Data | AML.T0020 | EU AI Act Art. 10 (data and data governance for high-risk AI) | All others |
|
|
456
|
+
| Craft Adversarial Data — NLP | AML.T0054 | None — same gap as AML.T0051 | All |
|
|
457
|
+
| Develop Capabilities (AI-assisted) | AML.T0017 | None — adversary capability, not directly controllable | All |
|
|
458
|
+
| Privilege escalation (T1068) | ATT&CK T1068 | AU ISM-1623 / Essential 8 ML3 (48h patch with exploit) | EU (no specific SLA), UK (14d generic), SG (30d), JP, IN, CA |
|
|
459
|
+
| Exploit public-facing app (T1190) | ATT&CK T1190 | AU Essential 8 (patching applications) | All — none address AI-mediated T1190 like CVE-2025-53773 |
|
|
460
|
+
| Phishing (T1566) | ATT&CK T1566 | None updated for AI-generated content | All — phishing guidance generally pre-AI-baseline |
|
|
461
|
+
|
|
462
|
+
Use the framework-gap-analysis skill output alongside this skill's jurisdiction matrix to produce a per-jurisdiction TTP-coverage score.
|
|
463
|
+
|
|
464
|
+
---
|
|
465
|
+
|
|
466
|
+
## Exploit Availability Matrix
|
|
467
|
+
|
|
468
|
+
Per-jurisdiction breach- and incident-notification clocks. When a KEV-listed exploit with public PoC is in play, these clocks compress operationally — the regulator's published timeline is the upper bound, not the planning baseline.
|
|
469
|
+
|
|
470
|
+
| Jurisdiction | Framework | Trigger | Clock starts | Initial / final timeline | Tightening when PoC + KEV |
|
|
471
|
+
|---|---|---|---|---|---|
|
|
472
|
+
| EU | GDPR Art. 33 | Personal-data breach | Awareness | 72h to SA | Same legal clock; practical detection-to-classification window shrinks with confirmed active exploitation |
|
|
473
|
+
| EU | NIS2 Art. 23 | Significant incident | Awareness | 24h early warning / 72h notification / 1 month final | Early-warning trigger fires immediately on confirmed PoC affecting deployed asset |
|
|
474
|
+
| EU | DORA Art. 19 | Major ICT-related incident | Classification | 4h initial / 72h intermediate / 1 month final | 4h clock is unforgiving; KEV+PoC events likely auto-classify as major |
|
|
475
|
+
| EU | EU AI Act Art. 73 (post 2026-08-02) | Serious incident for high-risk AI | Provider awareness | 15 days for serious incidents; 10 days for widespread infringement; 2 days for serious incidents involving deceased person | KEV-class exploit chain in a high-risk AI deployment triggers the 2/10/15 cascade |
|
|
476
|
+
| UK | UK GDPR | Personal-data breach | Awareness | 72h to ICO | Same as GDPR |
|
|
477
|
+
| AU | Notifiable Data Breaches | Eligible data breach | Awareness | "As soon as practicable" — typically interpreted ≤ 30 days | Active KEV exploitation collapses "practicable" to hours |
|
|
478
|
+
| SG | PDPA | Notifiable data breach | Awareness | 3 days to PDPC | Same |
|
|
479
|
+
| SG | CSA CCoP (CII) | Cyber incident | Confirmation | **2 hours** | Already among tightest globally |
|
|
480
|
+
| SG | MAS Notice 644 (critical incidents) | Severity-1 incident | Detection | **1 hour** | Tightest globally for affected banks |
|
|
481
|
+
| IN | CERT-In Directions | 20+ incident types | Awareness | **6 hours** | Tightest sector-agnostic globally |
|
|
482
|
+
| IN | SEBI | Cyber incident | Awareness | 6 hours | Same |
|
|
483
|
+
| JP | APPI | Personal data leak | Awareness | "Without delay" (interpreted ≤ 5 working days) | Same |
|
|
484
|
+
| CA | OSFI B-10 | High/critical tech-or-cyber incident | Classification | 24h to OSFI | Same |
|
|
485
|
+
| CA | PIPEDA | Real risk of significant harm | Awareness | As soon as feasible | Same |
|
|
486
|
+
| Global | ISO 27001 | n/a — framework only | n/a | Framework imposes no notification obligation | n/a |
|
|
487
|
+
|
|
488
|
+
Operational implication: an organisation subject to MAS Notice 644, CSA CCoP, CERT-In, and DORA simultaneously has a 1-hour effective notification floor — the tightest applicable clock governs. A single "we notify within 72h" runbook fails three of those four obligations.
|
|
489
|
+
|
|
490
|
+
Refer to `data/exploit-availability.json` for per-CVE PoC and KEV state; the matrix above tightens whenever any catalog entry's `active_exploitation` is `confirmed` or `cisa_kev` is `true`.
|
|
491
|
+
|
|
492
|
+
---
|
|
493
|
+
|
|
494
|
+
## Compliance Theater Check
|
|
495
|
+
|
|
496
|
+
The single most reliable test for global-GRC theater:
|
|
497
|
+
|
|
498
|
+
> "Open your incident-response runbook. For each jurisdiction your organisation is subject to — EU (NIS2, DORA, GDPR, EU AI Act), UK, AU, SG (MAS, CSA), IN (CERT-In, SEBI), JP, CA — show the per-jurisdiction notification clock with the clock-start trigger documented. A single global '72-hour notification' policy fails this test by definition for any org subject to DORA (4h), MAS Notice 644 (1h critical), CSA CCoP (2h), CERT-In (6h), or NIS2 (24h early warning). If your runbook does not list jurisdiction-specific clocks with trigger criteria, the global-GRC compliance claim is theatre — you do not have operational notification capability for at least one jurisdiction you are subject to."
|
|
499
|
+
|
|
500
|
+
Two follow-up tests:
|
|
501
|
+
|
|
502
|
+
> "Your DORA Art. 28 register of information for ICT third-party arrangements: does it include the LLM/AI API providers your business lines use? If `provider=openai` or `provider=anthropic` or `provider=google-cloud-vertex-ai` is absent and any business line uses these providers, the register is incomplete. ESA Joint Committee guidance on CTP designation for AI providers is evolving — your register must include them now and be updated as the CTP designation crystallises."
|
|
503
|
+
|
|
504
|
+
> "Your EU AI Act readiness for 2026-08-02 full application: identify every system in your inventory that would be a high-risk AI system under Annex III. For each, show the Art. 9 risk management documentation and the Art. 15 cybersecurity controls (including resilience to prompt injection per the Commission's Q&A). If the inventory does not exist or shows zero high-risk systems despite the org operating AI in employment, education, law enforcement, critical infrastructure, biometric, or essential-services contexts, the readiness claim is theatre — you have not classified your own systems against the regulation that takes full effect in under three months."
|
|
505
|
+
|
|
506
|
+
---
|
|
507
|
+
|
|
508
|
+
## Analysis Procedure
|
|
509
|
+
|
|
510
|
+
### Step 1: Determine jurisdiction scope
|
|
511
|
+
|
|
512
|
+
For the target organization, identify:
|
|
513
|
+
- Where is the organization incorporated?
|
|
514
|
+
- Where does it operate?
|
|
515
|
+
- Where are its customers/users located?
|
|
516
|
+
- What sectors does it operate in? (Financial, health, critical infrastructure, etc.)
|
|
517
|
+
- Does it offer products with digital elements to the EU? (CRA scope)
|
|
518
|
+
|
|
519
|
+
### Step 2: Map applicable frameworks
|
|
520
|
+
|
|
521
|
+
Based on jurisdiction scope, select applicable frameworks from the registry above.
|
|
522
|
+
|
|
523
|
+
### Step 3: Identify framework requirements per threat class
|
|
524
|
+
|
|
525
|
+
For each relevant threat (kernel LPE, prompt injection, MCP supply chain, AI C2, etc.):
|
|
526
|
+
1. Which jurisdiction's framework has the most specific requirement?
|
|
527
|
+
2. Which has the shortest notification timeline?
|
|
528
|
+
3. Which has the steepest penalties for non-compliance?
|
|
529
|
+
4. Are there gaps in all applicable frameworks (universal gap)?
|
|
530
|
+
|
|
531
|
+
### Step 4: Generate compliance matrix
|
|
532
|
+
|
|
533
|
+
Produce a matrix of: threat class × jurisdiction framework × requirement adequacy × notification trigger.
|
|
534
|
+
|
|
535
|
+
---
|
|
536
|
+
|
|
537
|
+
## Output Format
|
|
538
|
+
|
|
539
|
+
```
|
|
540
|
+
## Global GRC Assessment
|
|
541
|
+
|
|
542
|
+
**Date:** YYYY-MM-DD
|
|
543
|
+
**Jurisdictions in scope:** [list]
|
|
544
|
+
**Sectors:** [list]
|
|
545
|
+
|
|
546
|
+
### Applicable Framework Matrix
|
|
547
|
+
| Framework | Jurisdiction | Trigger | Notification | Penalties | AI Coverage |
|
|
548
|
+
|-----------|-------------|---------|--------------|-----------|-------------|
|
|
549
|
+
|
|
550
|
+
### Fastest Notification Requirement
|
|
551
|
+
[Which jurisdiction, which framework, what timeline]
|
|
552
|
+
|
|
553
|
+
### Strictest AI/Security Requirements
|
|
554
|
+
[For current threats: which framework is most demanding]
|
|
555
|
+
|
|
556
|
+
### Universal Gaps
|
|
557
|
+
[Threats that no applicable framework covers adequately]
|
|
558
|
+
|
|
559
|
+
### Per-Threat Framework Mapping
|
|
560
|
+
[For each threat in scope: best available control, gap declaration]
|
|
561
|
+
|
|
562
|
+
### Recommended Control Additions
|
|
563
|
+
[Beyond framework requirements: what current threats require that frameworks don't mandate]
|
|
564
|
+
```
|