@blamejs/exceptd-skills 0.9.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (136) hide show
  1. package/AGENTS.md +232 -0
  2. package/ARCHITECTURE.md +267 -0
  3. package/CHANGELOG.md +616 -0
  4. package/CONTEXT.md +203 -0
  5. package/LICENSE +200 -0
  6. package/NOTICE +82 -0
  7. package/README.md +307 -0
  8. package/SECURITY.md +73 -0
  9. package/agents/README.md +81 -0
  10. package/agents/report-generator.md +156 -0
  11. package/agents/skill-updater.md +102 -0
  12. package/agents/source-validator.md +119 -0
  13. package/agents/threat-researcher.md +149 -0
  14. package/bin/exceptd.js +183 -0
  15. package/data/_indexes/_meta.json +88 -0
  16. package/data/_indexes/activity-feed.json +362 -0
  17. package/data/_indexes/catalog-summaries.json +229 -0
  18. package/data/_indexes/chains.json +7135 -0
  19. package/data/_indexes/currency.json +359 -0
  20. package/data/_indexes/did-ladders.json +451 -0
  21. package/data/_indexes/frequency.json +2072 -0
  22. package/data/_indexes/handoff-dag.json +476 -0
  23. package/data/_indexes/jurisdiction-clocks.json +967 -0
  24. package/data/_indexes/jurisdiction-map.json +536 -0
  25. package/data/_indexes/recipes.json +319 -0
  26. package/data/_indexes/section-offsets.json +3656 -0
  27. package/data/_indexes/stale-content.json +14 -0
  28. package/data/_indexes/summary-cards.json +1736 -0
  29. package/data/_indexes/theater-fingerprints.json +381 -0
  30. package/data/_indexes/token-budget.json +2137 -0
  31. package/data/_indexes/trigger-table.json +1374 -0
  32. package/data/_indexes/xref.json +818 -0
  33. package/data/atlas-ttps.json +282 -0
  34. package/data/cve-catalog.json +496 -0
  35. package/data/cwe-catalog.json +1017 -0
  36. package/data/d3fend-catalog.json +738 -0
  37. package/data/dlp-controls.json +1039 -0
  38. package/data/exploit-availability.json +67 -0
  39. package/data/framework-control-gaps.json +1255 -0
  40. package/data/global-frameworks.json +2913 -0
  41. package/data/rfc-references.json +324 -0
  42. package/data/zeroday-lessons.json +377 -0
  43. package/keys/public.pem +3 -0
  44. package/lib/framework-gap.js +328 -0
  45. package/lib/job-queue.js +195 -0
  46. package/lib/lint-skills.js +536 -0
  47. package/lib/prefetch.js +372 -0
  48. package/lib/refresh-external.js +713 -0
  49. package/lib/schemas/cve-catalog.schema.json +151 -0
  50. package/lib/schemas/manifest.schema.json +106 -0
  51. package/lib/schemas/skill-frontmatter.schema.json +113 -0
  52. package/lib/scoring.js +149 -0
  53. package/lib/sign.js +197 -0
  54. package/lib/ttp-mapper.js +80 -0
  55. package/lib/validate-catalog-meta.js +198 -0
  56. package/lib/validate-cve-catalog.js +213 -0
  57. package/lib/validate-indexes.js +83 -0
  58. package/lib/validate-package.js +162 -0
  59. package/lib/validate-vendor.js +85 -0
  60. package/lib/verify.js +216 -0
  61. package/lib/worker-pool.js +84 -0
  62. package/manifest-snapshot.json +1833 -0
  63. package/manifest.json +2108 -0
  64. package/orchestrator/README.md +124 -0
  65. package/orchestrator/dispatcher.js +140 -0
  66. package/orchestrator/event-bus.js +146 -0
  67. package/orchestrator/index.js +874 -0
  68. package/orchestrator/pipeline.js +201 -0
  69. package/orchestrator/scanner.js +327 -0
  70. package/orchestrator/scheduler.js +137 -0
  71. package/package.json +113 -0
  72. package/sbom.cdx.json +158 -0
  73. package/scripts/audit-cross-skill.js +261 -0
  74. package/scripts/audit-perf.js +160 -0
  75. package/scripts/bootstrap.js +205 -0
  76. package/scripts/build-indexes.js +721 -0
  77. package/scripts/builders/activity-feed.js +79 -0
  78. package/scripts/builders/catalog-summaries.js +67 -0
  79. package/scripts/builders/currency.js +109 -0
  80. package/scripts/builders/cwe-chains.js +105 -0
  81. package/scripts/builders/did-ladders.js +149 -0
  82. package/scripts/builders/frequency.js +89 -0
  83. package/scripts/builders/jurisdiction-clocks.js +126 -0
  84. package/scripts/builders/recipes.js +159 -0
  85. package/scripts/builders/section-offsets.js +162 -0
  86. package/scripts/builders/stale-content.js +171 -0
  87. package/scripts/builders/summary-cards.js +166 -0
  88. package/scripts/builders/theater-fingerprints.js +198 -0
  89. package/scripts/builders/token-budget.js +96 -0
  90. package/scripts/check-manifest-snapshot.js +217 -0
  91. package/scripts/predeploy.js +267 -0
  92. package/scripts/refresh-manifest-snapshot.js +57 -0
  93. package/scripts/refresh-sbom.js +222 -0
  94. package/skills/age-gates-child-safety/skill.md +456 -0
  95. package/skills/ai-attack-surface/skill.md +282 -0
  96. package/skills/ai-c2-detection/skill.md +440 -0
  97. package/skills/ai-risk-management/skill.md +311 -0
  98. package/skills/api-security/skill.md +287 -0
  99. package/skills/attack-surface-pentest/skill.md +381 -0
  100. package/skills/cloud-security/skill.md +384 -0
  101. package/skills/compliance-theater/skill.md +365 -0
  102. package/skills/container-runtime-security/skill.md +379 -0
  103. package/skills/coordinated-vuln-disclosure/skill.md +473 -0
  104. package/skills/defensive-countermeasure-mapping/skill.md +300 -0
  105. package/skills/dlp-gap-analysis/skill.md +337 -0
  106. package/skills/email-security-anti-phishing/skill.md +206 -0
  107. package/skills/exploit-scoring/skill.md +331 -0
  108. package/skills/framework-gap-analysis/skill.md +374 -0
  109. package/skills/fuzz-testing-strategy/skill.md +313 -0
  110. package/skills/global-grc/skill.md +564 -0
  111. package/skills/identity-assurance/skill.md +272 -0
  112. package/skills/incident-response-playbook/skill.md +546 -0
  113. package/skills/kernel-lpe-triage/skill.md +303 -0
  114. package/skills/mcp-agent-trust/skill.md +326 -0
  115. package/skills/mlops-security/skill.md +325 -0
  116. package/skills/ot-ics-security/skill.md +340 -0
  117. package/skills/policy-exception-gen/skill.md +437 -0
  118. package/skills/pqc-first/skill.md +546 -0
  119. package/skills/rag-pipeline-security/skill.md +294 -0
  120. package/skills/researcher/skill.md +310 -0
  121. package/skills/sector-energy/skill.md +409 -0
  122. package/skills/sector-federal-government/skill.md +302 -0
  123. package/skills/sector-financial/skill.md +398 -0
  124. package/skills/sector-healthcare/skill.md +373 -0
  125. package/skills/security-maturity-tiers/skill.md +464 -0
  126. package/skills/skill-update-loop/skill.md +463 -0
  127. package/skills/supply-chain-integrity/skill.md +318 -0
  128. package/skills/threat-model-currency/skill.md +404 -0
  129. package/skills/threat-modeling-methodology/skill.md +312 -0
  130. package/skills/webapp-security/skill.md +281 -0
  131. package/skills/zeroday-gap-learn/skill.md +350 -0
  132. package/vendor/blamejs/LICENSE +201 -0
  133. package/vendor/blamejs/README.md +54 -0
  134. package/vendor/blamejs/_PROVENANCE.json +54 -0
  135. package/vendor/blamejs/retry.js +335 -0
  136. package/vendor/blamejs/worker-pool.js +418 -0
@@ -0,0 +1,546 @@
1
+ ---
2
+ name: incident-response-playbook
3
+ version: "1.0.0"
4
+ description: Incident response playbook design for mid-2026 — NIST 800-61r3, ISO 27035, ATT&CK-driven detection, PICERL phases, AI-class incident handling (prompt injection breach, model exfiltration, AI-API C2), cross-jurisdiction breach notification timing
5
+ triggers:
6
+ - incident response
7
+ - ir playbook
8
+ - csirt
9
+ - picerl
10
+ - nist 800-61
11
+ - iso 27035
12
+ - breach notification
13
+ - incident handler
14
+ - blue team
15
+ - soc playbook
16
+ - ai incident
17
+ - prompt injection incident
18
+ - model exfiltration incident
19
+ data_deps:
20
+ - cve-catalog.json
21
+ - atlas-ttps.json
22
+ - framework-control-gaps.json
23
+ - global-frameworks.json
24
+ - cwe-catalog.json
25
+ - d3fend-catalog.json
26
+ - zeroday-lessons.json
27
+ atlas_refs:
28
+ - AML.T0096
29
+ - AML.T0017
30
+ - AML.T0051
31
+ attack_refs:
32
+ - T1486
33
+ - T1041
34
+ - T1567
35
+ - T1078
36
+ framework_gaps:
37
+ - NIST-800-53-AC-2
38
+ - ISO-27001-2022-A.8.16
39
+ - SOC2-CC7-anomaly-detection
40
+ rfc_refs: []
41
+ cwe_refs: []
42
+ d3fend_refs:
43
+ - D3-RPA
44
+ - D3-NTA
45
+ - D3-IOPR
46
+ - D3-CSPP
47
+ forward_watch:
48
+ - NIST 800-61r3 minor revisions (expected 2026-2027) aligning incident-handling language with the in-force EU CRA Art. 11 24h clock and EU AI Act Art. 73 serious-incident reporting
49
+ - ISO/IEC 27035-3:2026 (technical incident response operations) — final publication expected Q3 2026, expected to formalize AI-class incident sub-types currently absent from 27035-1/-2
50
+ - CSAF 2.1 inclusion of incident-status profile (separate from VEX) for correlated advisory + incident records
51
+ - MITRE ATLAS additions for incident-response-relevant techniques: AI-agent-initiated unauthorized action, training-data exfiltration via inference-time prompts
52
+ - ENISA single-reporting-platform expansion: CRA Art. 11 channel goes operational 2026-09, NIS2 Art. 23 incident-reporting overlap to be reconciled
53
+ - AU SOCI Act expanded sector coverage (data-storage and processing entities added 2024; further mandatory-reporting tiers under review)
54
+ - IL INCD Incident Response Process v4 (slated for 2026-2027) consolidating AI-incident sub-class
55
+ - NYDFS 23 NYCRR 500.17 amendments tightening ransom-payment 24h disclosure operationalization
56
+ last_threat_review: "2026-05-11"
57
+ ---
58
+
59
+ # Incident Response Playbook
60
+
61
+ Incident response (IR) is the operational closure of every other skill in this catalog. A vulnerability becomes a CVE through `coordinated-vuln-disclosure`; a CVE becomes a lesson through `zeroday-gap-learn`; a lesson becomes a control through `framework-gap-analysis`; an attack on that control becomes an incident — and the incident handler runs the playbook this skill defines. If the playbook is wrong, every preceding investment leaks at the last yard.
62
+
63
+ This skill operationalizes NIST SP 800-61r3 (Computer Security Incident Handling Guide, 2025 update integrating ATT&CK and Cyber Kill Chain), ISO/IEC 27035-1:2023 (principles and process) + ISO/IEC 27035-2:2023 (guidelines for incident response planning), and the SANS PICERL phases (Preparation, Identification, Containment, Eradication, Recovery, Lessons learned). It threads the Diamond Model and the MITRE Unified Kill Chain for adversary-narrative reconstruction, anchors detection engineering to MITRE ATT&CK v15.1, and treats three incident classes that the legacy IR literature predates: AI-class incidents (prompt-injection breach, model exfiltration, AI-API as C2 channel, AI-agent-initiated unauthorized action), AI-generated supply-chain compromise, and regulator-mandated notification under cross-jurisdiction clocks running in parallel.
64
+
65
+ ---
66
+
67
+ ## Threat Context (mid-2026)
68
+
69
+ The incident-response landscape in mid-2026 is materially different from the regime the legacy guides describe.
70
+
71
+ - **Dwell time has compressed, but the window for regulator-clock compliance has compressed faster.** Mandiant M-Trends 2026 reports a global median dwell time of 7 days, down from 16 days in 2022. The classical IR cycle (detect → triage → contain → eradicate → recover → lessons) assumed quarters of engineering capacity. EU CRA Art. 11 (24h early warning for actively exploited vulnerabilities) and EU NIS2 Art. 23 (24h early warning for significant incidents at essential/important entities) collapse the time between "we have telemetry" and "we have a regulator notification due" to less than a day. NYDFS 23 NYCRR 500.17 requires 72h notification of cybersecurity events and 24h notification of ransom payment. CERT-In's 2022 direction requires 6h reporting for in-scope incidents in India. AU SOCI requires 12h notification for significant cyber incidents at critical infrastructure entities. The IR playbook that does not bake these clocks in is non-compliant by clock arithmetic alone.
72
+ - **Ransomware continues to dominate the critical-infrastructure incident class.** Healthcare (Change Healthcare 2024, NHS via Synnovis 2024), energy (Colonial Pipeline 2021 echoes through 2026 OT-IT segmentation requirements), manufacturing, and water utilities take the volume. Cl0p's MOVEit campaign (2023) demonstrated mass-exploit incident shape; LockBit-style affiliate ecosystems persist post-takedown via fork brands. Initial-access brokers monetize valid-account compromise (T1078) faster than the credential-rotation cycle.
73
+ - **AI-class incidents are operational reality, not a thought experiment.** Three sub-classes show up in 2024-2026 incident telemetry: (1) **prompt-injection breach** — indirect prompt injection via web content, RAG corpus, email signatures, or document metadata achieves unauthorized action against enterprise AI assistants and agentic systems (see `ai-attack-surface`, `rag-pipeline-security`); (2) **model exfiltration** (AML.T0017) — adversary extracts model weights, training data, or system prompts via inference-side attacks (membership inference, training-data extraction, prompt leaking); (3) **AI-API as C2 channel** (AML.T0096) — SesameOp-pattern operations where the adversary uses legitimate AI provider APIs (Claude, ChatGPT, Gemini) as a covert command-and-control channel, blending into legitimate enterprise AI usage. Detection coverage for these classes lags conventional incident classes by 12-24 months in most enterprise SOC stacks.
74
+ - **AI-generated code is a new supply-chain incident vector.** GitHub Copilot, Claude Code, Cursor, and Cline produce code that ships to production without the human-author guarantee SLSA Level 3 assumes. Compromise of an AI coding assistant's training data, system prompt, or runtime pipeline (the IDE plugin, the MCP server, the model endpoint) creates a class of supply-chain incident where the artifact in the SBOM has no human author to interview. The Anthropic / OpenAI / Microsoft / Google AI bug-bounty programs are the upstream pipeline; the downstream incident response is largely undocumented at most orgs.
75
+ - **Identity is the perimeter, and identity compromise is the dominant initial-access vector.** Snowflake 2024 (credentials harvested from infostealers used to authenticate to multi-tenant cloud without MFA), Microsoft Midnight Blizzard 2024 (legacy non-production tenant compromised via password-spray), and the broader infostealer market collectively make T1078 (Valid Accounts) the most common precursor to subsequent stages.
76
+ - **Cloud-ephemeral evidence preservation is the new hard problem.** When the compromised workload is a serverless function (Lambda, Cloud Run, Azure Functions) that scaled to zero before triage starts, or a Kubernetes pod that the scheduler killed and replaced, the chain of custody assumed by NIST 800-86 (Guide to Integrating Forensic Techniques into Incident Response) breaks. Memory, ephemeral disk, and stdout are gone. The mid-2026 fix is pre-incident: continuous forensic-grade telemetry shipping (process trees, syscall traces, network flows, container layer diffs) to an external store before the workload terminates. Most orgs have not configured this; their first incident in an ephemeral environment becomes their lessons-learned moment.
77
+
78
+ The mid-2026 reality: IR is no longer a quarterly tabletop, an after-hours pager rotation, and a Word-document playbook. It is a real-time pipeline that has to run multiple parallel regulator clocks while preserving ephemeral evidence in environments designed to destroy it, against adversary classes (AI-API C2, prompt-injection breach, agent-initiated unauthorized action) for which the SOC's existing detection stack has limited coverage.
79
+
80
+ ---
81
+
82
+ ## Framework Lag Declaration
83
+
84
+ IR obligations span four layers — methodology (NIST 800-61r3, ISO 27035, SANS PICERL), governance (NIST 800-53 IR family, ISO 27001 A.5.24/A.5.26, SOC 2 CC7), regulator-mandated reporting (EU CRA, NIS2, AI Act, NYDFS, CERT-In, SOCI), and sectoral (HIPAA breach notification, PSD2 incident reporting, NERC CIP-008). Each layer is partially covered; none is sufficient alone.
85
+
86
+ | Framework / Jurisdiction | Control | What It Says | Why It Fails as an IR Playbook Spec |
87
+ |---|---|---|---|
88
+ | NIST SP 800-61r3 (2025) | Computer Security Incident Handling Guide | Integrates MITRE ATT&CK + Cyber Kill Chain into the four-phase handling lifecycle (Preparation; Detection & Analysis; Containment, Eradication & Recovery; Post-Incident Activity). | Does not operationalize AI-class incidents (prompt-injection breach, model exfiltration, AI-API C2). Does not name the EU CRA 24h or NIS2 24h clocks. Ephemeral / serverless evidence preservation receives one paragraph; the operational detail required (continuous telemetry shipping, container layer snapshots) is absent. |
89
+ | ISO/IEC 27035-1:2023 | Information security incident management — Principles and process | Process model: plan & prepare → detect & report → assess & decide → respond → learn lessons. | Process-shaped, not playbook-shaped. No AI-class sub-types. No regulator-clock matrix. Conformance does not imply playbook completeness. |
90
+ | ISO/IEC 27035-2:2023 | Guidelines to plan and prepare for incident response | Planning, team structure, communication. | Same process orientation. Mentions "external reporting obligations" without operationalizing EU CRA / NIS2 / AI Act / NYDFS clocks. |
91
+ | NIST SP 800-53 rev 5 | IR-4 Incident Handling; IR-5 Incident Monitoring; IR-6 Incident Reporting; IR-8 Incident Response Plan | Method-neutral control objectives. | Per `framework-control-gaps.json` NIST-800-53-AC-2: AC-2 (Account Management) does not require AI-agent identity lifecycle management; identity-compromise (T1078) detection feeds IR but the underlying control gap leaves AI-agent service accounts under-instrumented. IR-4 says "implement an incident handling capability" without specifying AI-class handling. |
92
+ | ISO/IEC 27001:2022 | A.5.24 Information security incident management planning and preparation; A.5.26 Response to information security incidents; A.8.16 Monitoring activities | Process-level requirements for incident response and monitoring. | Per `framework-control-gaps.json` ISO-27001-2022-A.8.16: monitoring requirements are technology-neutral but AI-system telemetry (prompt logs, embedding-store access, model-output classification) is not addressed. An ISO 27001-certified org with no AI-system monitoring is formally compliant and operationally blind to AML.T0051 / T0096 / T0017. |
93
+ | SOC 2 | CC7 (System operations — security event detection, incident response) | Trust services criteria for anomaly detection and incident response. | Per `framework-control-gaps.json` SOC2-CC7-anomaly-detection: CC7 requires anomaly detection without specifying coverage for AI-API C2 (AML.T0096), training-data exfiltration (AML.T0017), or prompt-injection incident triggers (AML.T0051). Auditors test for "an anomaly detection system" without testing whether it covers AI traffic shape. Theater-prone. |
94
+ | EU NIS2 Directive (2022/2555) | Art. 23 — incident notification | 24h early warning, 72h initial notification, 1-month final report to national CSIRT for significant incidents at essential/important entities. | Clocks are explicit; significance criteria are partly Member-State-defined; cross-border coordination via ENISA CSIRTs Network. The IR playbook must run the clocks; the directive does not define playbook content. |
95
+ | EU DORA (Regulation 2022/2554) | Art. 17 (ICT incident management); Art. 19 (major ICT-related incident reporting); Art. 18 (classification) | Financial-entity-specific: 4h initial notification for major ICT incidents, 72h intermediate, 1-month final, all to competent authority (national + ECB/EIOPA/ESMA depending on entity). | DORA 4h is tighter than NIS2 24h; an entity in scope of both runs whichever is shorter. DORA RTS on classification (2024) defines "major" but the operational determination at the 4h mark requires triage maturity most entities lack. |
96
+ | EU AI Act (Regulation 2024/1689) | Art. 73 — serious incident reporting (high-risk AI systems) | High-risk AI providers must report serious incidents to market surveillance authorities within 15 days; 2 days for "widespread infringement" or breaches of fundamental rights. | Clock is longer than CRA/NIS2/DORA but the determination ("serious incident" in an AI system) is novel. Overlap with CRA Art. 11 unresolved — same event may trigger both. |
97
+ | EU Cyber Resilience Act (2024/2847) | Art. 11 — vulnerability and incident reporting | 24h early warning to ENISA + national CSIRT for actively exploited vulnerabilities and severe incidents; 72h intermediate; 14d final. | The IR playbook must distinguish "vulnerability exploited" (CRA Art. 11) from "significant incident" (NIS2 Art. 23) — the same event often triggers both, on slightly different definitions, to overlapping but non-identical authorities. |
98
+ | UK NCSC Incident Management Process (IMP) | Guidance | Practical IR process guidance; NIS Regulations 2018 (UK NIS post-Brexit) for OES/RDSP reporting. | Guidance not requirement at the IMP level. UK NIS reporting timing similar to pre-Brexit NIS1 (72h). UK GDPR Art. 33 retains 72h personal-data-breach notification. |
99
+ | AU ACSC Incident Response Guidance + AU SOCI Act 2018 (as amended) | Critical infrastructure incident reporting | 12h notification of a "significant" cyber incident; 72h for "relevant" incidents at SoNS (Systems of National Significance). | 12h is among the tightest cyber clocks globally for designated CI. SOCI sector coverage expanded 2024 to include data-storage/processing — many entities discover scope mid-incident. |
100
+ | JP NISC Incident Response Manual + METI Cybersecurity Management Guidelines v3.0 | National incident response process | National coordination via NISC, sectoral CSIRTs (e.g., JPCERT/CC). | Method-neutral. JP Personal Information Protection Act (APPI) requires personal-data-breach notification to PPC "promptly" — operationally ~3-5 days; tighter for "high-risk" breaches. |
101
+ | IL INCD Incident Response Process v3 | National incident response process | Mature national framework with sectoral CERT structure (Finance, Energy, Health). | Among the most operationally detailed national IR frameworks. v4 expected to add AI-incident sub-class. Israel Privacy Protection Authority enforces breach notification under Privacy Protection Regulations (Data Security) 2017 — "without delay." |
102
+ | SG CSA Cybersecurity Code of Practice for Critical Information Infrastructure (CCoP2.0) | Critical Information Infrastructure incident reporting | 2h notification of cybersecurity incidents for CII; 24h for others. | 2h is the tightest cyber-incident clock in this matrix; applies only to designated CII. PDPA breach notification: "soon as practicable" and within 3 calendar days for notifiable breaches. |
103
+ | IN CERT-In (2022 Directions, effective 2022-06-28) | Reporting of cyber incidents | 6h reporting requirement for in-scope cyber incidents to CERT-In; comprehensive log-retention obligations. | 6h is among the tightest in this matrix; scope is broad (essentially all body-corporates, data centers, service providers). Most enterprises run an internal compliance gap here. |
104
+ | BR LGPD (Law 13.709/2018) Art. 48 | Data security incident notification | ANPD notification "in a reasonable time period"; ANPD Resolution CD/ANPD No. 15/2024 operationalized to 3 business days for incidents likely to cause significant risk. | Personal-data-shaped; the cyber-incident-only event without personal-data impact is out of scope. |
105
+ | CN MLPS 2.0 (GB/T 22239-2019) + Cybersecurity Law Art. 25 + Data Security Law Art. 29 + PIPL Art. 57 | Multi-level cyber incident reporting | MLPS-level-specific reporting to public security organs; PIPL personal-information-breach notification "immediately." | Multi-track: MLPS (cyber), CSL (network operator), DSL (data handler), PIPL (personal info). Cross-jurisdictional entities run all four. CAC additionally regulates cross-border data flow incidents. |
106
+ | NYDFS 23 NYCRR 500.17 | Cybersecurity event notification | 72h notification to NYDFS for covered cybersecurity events; **24h notification of ransom payment** (added by 2023 amendments, in force 2023-12). | Tighter than HIPAA / state breach laws for in-scope entities. Ransom-payment 24h clock is operationally novel — runs in parallel with FBI / OFAC engagement. |
107
+ | AE TDRA + UAE Cybersecurity Council Standards | Cyber incident reporting | TDRA reporting for telecom-sector incidents; UAE Information Assurance Standards (IAS) for federal entities; aeCERT national coordination. | Sector-specific clocks. DIFC Data Protection Law 2020 separately requires "without undue delay" personal-data-breach notification. |
108
+ | US HIPAA (45 CFR 164.400-414) | Breach Notification Rule | 60d notification to affected individuals + HHS for breaches of unsecured PHI; immediate for >500 individuals to HHS + media. | Health-sector-specific. Slower than cyber-event clocks above. Intersection with cyber-incident reporting (NYDFS for NY health insurers, state laws) creates parallel timers. |
109
+ | NERC CIP-008-6 | Cyber security — Incident reporting and response planning | Reportable Cyber Security Incident notification to E-ISAC within 1h of determination. | Electric-sector. 1h is among the tightest sector-specific clocks. CIP-008-7 (in queue) extends to "attempts to compromise." |
110
+
111
+ Cross-cutting gap: **no IR framework treats AI-class incidents as a first-class category with concrete handling steps.** NIST 800-61r3 (2025) integrates ATT&CK but does not enumerate AML TTPs. ISO 27035 series is process-shaped. Regulator regimes specify clocks but not playbook content. The org-level workaround: extend the playbook library to cover AI-class incidents explicitly. The framework-level fix is pending the next revision cycle.
112
+
113
+ ---
114
+
115
+ ## TTP Mapping
116
+
117
+ This skill is response-shaped — the TTPs below name the incident classes the playbook library must cover. Each maps to PICERL-phase response procedures (Section 5 / Step 4) and to detection coverage requirements (Section 5 / Step 1).
118
+
119
+ | TTP ID | Name | Incident Class | PICERL Phase Notes | Gap Flag |
120
+ |---|---|---|---|---|
121
+ | **T1486** | Data Encrypted for Impact | Ransomware | Identification: EDR file-encryption telemetry, share-mass-write pattern. Containment: network-segment isolation, identity revocation. Eradication: backup-validation-before-restore. Recovery: validated-restore + service-level verification. Lessons: feed to `zeroday-gap-learn` if initial access was a known CVE. | Detection coverage strong; identity-rotation maturity weak. NYDFS 24h ransom-payment clock and OFAC sanctions screening intersect at decision-to-pay. |
122
+ | **T1041** | Exfiltration Over C2 Channel | Data exfiltration via established C2 | Identification: DLP egress, anomalous outbound bandwidth, beaconing patterns. Containment: egress filtering, certificate-pinned proxy. Eradication: C2 artifact removal. Recovery: identity + secrets rotation. Lessons: detection-engineering gap analysis. | EDR coverage variable; encrypted exfiltration to legitimate services (Box, OneDrive, S3) often missed by signature-based DLP. |
123
+ | **T1567** | Exfiltration Over Web Service | Exfiltration via legitimate web/SaaS services including AI-API | Identification: web-egress to anomalous services or anomalous-volume to legitimate services; for AI-API channel pair with `ai-c2-detection`. Containment: egress block of identified channel, AI-API key revocation, MCP-server scope reduction. Eradication: identify exfiltrated dataset, follow data-incident sub-playbook. Recovery: re-key + re-issue access. | AI-API exfiltration (sub-technique T1567.xxx pattern; ATLAS overlap with AML.T0017) typically blends with legitimate traffic — see `ai-c2-detection` for content-layer detection. |
124
+ | **T1078** | Valid Accounts | Identity compromise as initial access | Identification: anomalous-sign-in UEBA, impossible-travel, MFA-fatigue patterns. Containment: account disable + session revocation + re-authentication for affected blast radius. Eradication: credential rotation, token revocation, OAuth-grant audit, AI-agent service-account rotation. Recovery: re-issue under zero-trust posture. Lessons: identity-control gap analysis. | Dominant initial-access vector mid-2026; coverage strong for human accounts, weak for AI-agent / service-account / OAuth-app identities. |
125
+ | **AML.T0096** | LLM API as C2 | AI-API as command-and-control channel (SesameOp pattern) | Identification: see `ai-c2-detection` skill — content-layer detection at the AI API egress boundary, prompt-and-response correlation, anomalous AI-API usage shape. Containment: AI-API egress block or proxy-mediated allowlist. Eradication: identify the agent or workload abusing the channel. Recovery: re-issue AI-API keys under scoped least-privilege. | Detection coverage near-absent in legacy SOC stacks; the AI traffic shape is novel and signatures do not exist for most enterprise SIEMs. |
126
+ | **AML.T0017** | ML Model Exfiltration | Model weights, training data, or system-prompt extraction | Identification: anomalous inference-API usage patterns (high-volume queries, structured probing, membership-inference signatures, repeated training-data extraction prompts). Containment: rate-limit + API-key revocation + IP block. Eradication: identify attacker access surface; assess data sensitivity. Recovery: re-key, consider model-rotation if proprietary weights are at risk; for training-data exfiltration consider differential-privacy retraining. | No standardized detection signatures; org must build custom telemetry over AI inference APIs. |
127
+ | **AML.T0051** | LLM Prompt Injection | Prompt-injection breach as incident trigger | Identification: AI-assistant or agentic-system anomalous action (unauthorized data access, anomalous tool invocation, identity-context confusion). Containment: revoke AI-system tool scopes, disable agent autonomy, isolate affected RAG corpus. Eradication: identify injection vector (web content, email signature, document metadata, RAG corpus poisoning) and remove. Recovery: re-deploy with hardened system prompt + tool-scoping per `mcp-agent-trust`. | Detection lags; most orgs discover the incident from downstream effect (unauthorized action) rather than detection at the prompt boundary. |
128
+
129
+ ATLAS pinned to v5.1.0 (November 2025) per AGENTS.md rule #12. ATT&CK pinned to v15.1 (April 2025) per the same rule; ATT&CK v16 was released October 2024 with the v15-to-v16 ID migration not introducing breaking changes for the T-IDs cited above.
130
+
131
+ ---
132
+
133
+ ## Exploit Availability Matrix
134
+
135
+ For IR, "exploit availability" is the question of which incident exemplars are operationally current — i.e., which recent incidents the playbook library must explicitly handle because their TTPs are in active use and their detection patterns are public.
136
+
137
+ | Incident Exemplar | Year | Class | TTPs | Detection Maturity (mid-2026) | Playbook Implication |
138
+ |---|---|---|---|---|---|
139
+ | Change Healthcare ransomware | 2024 | Healthcare ransomware + data exfiltration | T1486, T1041, T1078 | Strong for ransomware encryption; weak for the 6-week pre-encryption dwell | Healthcare-sector playbook (`sector-healthcare`) requires HIPAA breach-notification + state AG notification + business-associate cascade. |
140
+ | Snowflake customer-tenant compromise | 2024 | Cloud-tenant identity compromise (no MFA) | T1078 | Strong for sign-in anomalies; weak for legacy MFA-not-enforced tenants | Identity-incident playbook requires MFA-status audit + service-account inventory + OAuth-grant review per `identity-assurance`. |
141
+ | MOVEit / Cl0p mass exploitation | 2023 | Mass-exploit of file-transfer software | T1190 + T1041 | Vendor-specific signatures available; broader file-transfer-class detection variable | Mass-incident playbook variant: parallel customer notification + supply-chain advisory hand-off to `coordinated-vuln-disclosure`. |
142
+ | SolarWinds Sunburst | 2020 | Supply-chain compromise (vendor-shipped malware) | T1195.002, T1041 | Detection capability significantly improved post-incident; SBOM/SLSA adoption | Supply-chain-incident playbook hand-off to `supply-chain-integrity` for VEX response. |
143
+ | Volt Typhoon / Salt Typhoon (telecom) | 2023-2024 | Nation-state telecom infrastructure compromise (CCP-attributed by USG) | T1078, T1133, T1556 | Improved post-CISA advisories; living-off-the-land patterns hard to detect | Telecom-sector playbook + national-security coordination. |
144
+ | Microsoft Midnight Blizzard | 2024 | Nation-state cloud-tenant compromise via legacy test tenant | T1078 (password spray on legacy account) | Strong for password-spray; weak for legacy-tenant inventory | Identity-hygiene playbook requires legacy-account inventory and decommissioning audit. |
145
+ | Anthropic / OpenAI / Microsoft AI bug bounty disclosures (multiple, 2024-2026) | 2024-2026 | Prompt-injection class, jailbreak class, training-data extraction | AML.T0051, AML.T0017 | Detection coverage near-absent in customer SOCs; vendors handle in serving infrastructure | AI-class incident playbook required; the customer-side IR playbook for AI-system anomalies is the gap. |
146
+ | Public agentic-system unauthorized-action incidents (research disclosures + named enterprise cases 2024-2026) | 2024-2026 | AI-agent-initiated unauthorized action via indirect prompt injection | AML.T0051 → unauthorized T-action | Detection at the agent-tool boundary, not the prompt boundary | Hand-off to `mcp-agent-trust` for tool-scope hardening; playbook covers agent-disable + scope-revoke + log-replay. |
147
+
148
+ Detection-tool maturity (mid-2026):
149
+ - **SIEM rules for ATT&CK**: high coverage for T1486, T1078, T1041; partial for T1567 (especially T1567 to legitimate AI/cloud SaaS).
150
+ - **EDR/XDR**: high coverage for encryption-impact and process-tree anomalies; partial for cloud-workload-only incidents; near-absent for AI-agent process behavior.
151
+ - **AI-incident detection**: emerging in 2025-2026; near-absent in legacy SOC stacks. See `ai-c2-detection` for the detection-engineering gap.
152
+ - **Identity telemetry**: strong for human accounts (sign-in logs, conditional access, UEBA); weak for AI-agent / service-account / OAuth-app identities.
153
+ - **Ephemeral-compute forensic capture**: per Section 1, pre-incident telemetry shipping is the only viable approach; the average enterprise has not configured it.
154
+
155
+ ---
156
+
157
+ ## Analysis Procedure
158
+
159
+ Before stepping through the IR program assessment, thread the three foundational design principles per AGENTS.md Skill File Format requirements.
160
+
161
+ **Defense in depth — IR as a multi-layer pipeline.** A real IR program is not the playbook document; it is the stack that produces the conditions for the playbook to fire and the conditions for it to succeed:
162
+ - **Layer 1 — Preparation.** Playbook library (by ATT&CK technique + incident class + sector + jurisdiction), tabletop exercises (at least quarterly, scenarios drawn from current threat-intel feed), runbook tooling (SOAR + ticketing + comms), redundant logging (SIEM + DLP + identity + EDR + AI-system telemetry shipped to immutable store), legal and PR alignment, executive and board awareness, retainer with external IR firm.
163
+ - **Layer 2 — Identification.** SIEM correlation rules mapped to ATT&CK; EDR / XDR on every endpoint and workload; UEBA for identity-anomaly detection; AI-incident detectors per `ai-c2-detection` for AML.T0096 / T0017 / T0051; threat-intel feed integration; honeypot / canary telemetry.
164
+ - **Layer 3 — Containment.** Network-segment isolation capability (SDN, microsegmentation, firewall policy push); identity revocation capability (Conditional Access, OAuth-grant revocation, service-account rotation); endpoint isolation (EDR-driven network quarantine); AI-API egress block; cloud-workload pause/snapshot.
165
+ - **Layer 4 — Eradication and recovery.** Artifact removal (file, registry, scheduled task, persistence mechanism); credential rotation at scope (privileged, service, AI-agent, OAuth app, API key); validated backup restore; AI-system rollback (model version, system prompt, RAG corpus state); service-level verification before declaring recovery.
166
+ - **Layer 5 — Lessons learned.** Post-incident review (root-cause analysis using the Diamond Model and the Unified Kill Chain for adversary-narrative reconstruction); playbook update; detection-engineering refinement; control-gap filing per `framework-gap-analysis`; zero-day learning per `zeroday-gap-learn`; threat-model refresh per `threat-model-currency`; skill-update propagation per `skill-update-loop`.
167
+
168
+ An org that runs only the document layer is brittle. The brittleness pattern: playbook exists but never tabletop-tested (the runbook is fiction); tabletop run but no SIEM correlation rules to fire identification (the runbook is fire-drill-only); identification but no containment capability (alert-fatigue without intervention); containment but no eradication maturity (re-compromise within days); eradication but no lessons-learned pipeline (same incident class repeats).
169
+
170
+ **Least privilege — IR scope is per-role, not org-wide.** The IR team has read-everywhere, write-narrow access: incident-handler accounts can read SIEM, EDR, identity, DLP, and AI-system telemetry across the org but write only to ticketing, incident-comms, and the IR-team workspace. Containment actions (network isolation, identity disable, service-account rotation) are performed via SOAR with audit trail, not direct admin access. Break-glass accounts are vaulted with dual-control retrieval and post-use rotation. AI-incident specialists are scoped to the AI tool inventory (model endpoints, MCP servers, agent runtimes, RAG corpora) and do not get blanket admin to non-AI infrastructure. Forensic-acquisition tooling is scoped to a sealed workstation set with chain-of-custody logging. External counsel and external IR firm receive scoped access per engagement.
171
+
172
+ **Zero trust — assume the network is hostile during containment; identity is not trusted until re-verified after compromise.** During an active incident: assume the SOC's own tooling may be compromised and validate findings via an independent channel where critical; assume the attacker may be reading the IR team's communications (use out-of-band comms — Signal, dedicated incident-bridge with separate identity, never the corporate Slack the attacker may be in); revoke and re-issue identities rather than trusting that "this account doesn't show compromise indicators"; revoke AI-system tool scopes and re-issue under the post-incident scoping policy, not the pre-incident one; verify-not-assume that backup integrity has not been tampered with before restore.
173
+
174
+ Then run the 10 program-assessment / live-incident steps.
175
+
176
+ ### Step 1 — Detection coverage audit (the "would we identify this" check)
177
+
178
+ Before any incident fires, audit detection coverage against the ATT&CK + ATLAS techniques the playbook library is supposed to cover:
179
+ - Map each playbook in the library to one or more ATT&CK / ATLAS techniques.
180
+ - For each technique, identify the detection rule, the log source, the false-positive baseline, and the tested-fire status.
181
+ - Identify coverage gaps: techniques with no rule, rules with no log source, rules with no recent test fire.
182
+ - Specifically audit AI-class detection: AML.T0096 (AI-API egress shape — hand off to `ai-c2-detection`), AML.T0017 (anomalous inference-API usage), AML.T0051 (downstream-action anomaly).
183
+ - Specifically audit identity detection: T1078 sub-technique coverage (cloud accounts, default accounts, domain accounts, local accounts) and service-account / AI-agent variants.
184
+
185
+ ### Step 2 — Incident classification taxonomy (the "what is this" check)
186
+
187
+ When an incident fires, classify before responding. Classification dimensions:
188
+ - **ATT&CK technique(s)** — primary and secondary. Tactic chain for adversary-narrative.
189
+ - **ATLAS technique(s)** — for AI-class incidents.
190
+ - **Incident class** — ransomware, data exfiltration, identity compromise, supply-chain, AI-system breach, business-email-compromise, DoS, insider, other.
191
+ - **Impact severity** — confidentiality / integrity / availability per the org's incident-severity matrix.
192
+ - **Jurisdictional notification clock** — per the matrix in Section 7. Which clocks start, when did they start (awareness moment), who is the named officer per clock.
193
+ - **AI-class flag** — does the incident involve an AI system as victim, vector, or attacker? AI-as-victim: AML.T0051/T0017. AI-as-vector: AML.T0096. AI-as-attacker: agent-initiated unauthorized action.
194
+ - **Sector flag** — does a sectoral framework apply (`sector-healthcare`, `sector-financial`, `sector-energy`, `sector-federal-government`)?
195
+
196
+ ### Step 3 — Declaration and runbook activation
197
+
198
+ Once classified:
199
+ - Declare the incident at the appropriate severity (incident commander assignment, comms-bridge stand-up, executive notification per matrix).
200
+ - Activate the playbook from the library matching the classification.
201
+ - Start the regulator-clock timers — each applicable jurisdiction's clock runs in parallel from the awareness moment.
202
+ - Assign named owners per regulator-notification channel.
203
+ - Brief the IR firm retainer if scope warrants.
204
+
205
+ ### Step 4 — Containment per playbook class (PICERL: Containment)
206
+
207
+ Apply containment matching the class. Common patterns:
208
+ - **Ransomware (T1486)**: network-segment isolation for affected hosts; identity revocation for compromised accounts; **do not pay yet** — preserve optionality; backup-integrity verification before recovery decisions.
209
+ - **Data exfiltration (T1041 / T1567)**: egress block at the identified channel; certificate-pinned proxy enforcement; identify what was exfiltrated (scope determination drives notification scope).
210
+ - **Identity compromise (T1078)**: account disable, session revocation, MFA re-enrollment, OAuth-grant audit; for service / AI-agent accounts, scope-reduce + rotate.
211
+ - **AI-API C2 (AML.T0096)**: AI-API egress block or proxy-mediated allowlist; identify the workload abusing the channel; AI-API key revocation.
212
+ - **Model exfiltration (AML.T0017)**: rate-limit the inference API; revoke the abusing API key; IP-block as supplemental; assess sensitivity of extracted data / weights.
213
+ - **Prompt-injection breach (AML.T0051)**: disable the affected agent autonomy or revoke its tool scopes; isolate the RAG corpus suspected as injection vector; capture the injected content for forensics.
214
+ - **Supply-chain (T1195)**: identify affected component versions via SBOM; coordinate with vendor (hand off to `coordinated-vuln-disclosure` reverse-direction — receiving vendor advisory); VEX-driven inventory of affected workloads.
215
+
216
+ For all classes: **preserve evidence before destructive containment.** In ephemeral environments, that means triggering pre-configured forensic-grade telemetry capture (memory snapshot, container layer diff, syscall trace) before scaling the workload to zero or killing the pod. Where the telemetry pipeline was not pre-configured, the lessons-learned phase produces a Section 10 action item to configure it.
217
+
218
+ ### Step 5 — Eradication and recovery (PICERL: Eradication, Recovery)
219
+
220
+ Eradication:
221
+ - Remove malicious artifacts (files, registry, scheduled tasks, services, container images, malicious model weights or system prompts).
222
+ - Rotate credentials at the determined blast-radius scope.
223
+ - Patch the exploited vulnerability (hand off to `zeroday-gap-learn` if zero-day; coordinate with vendor advisory per `coordinated-vuln-disclosure`).
224
+ - For AI-system incidents: rollback model version, re-deploy system prompt under hardened scope, scrub RAG corpus, re-validate tool-scoping per `mcp-agent-trust`.
225
+
226
+ Recovery:
227
+ - Validated backup restore (integrity verified, restore-test in isolated environment before production).
228
+ - Service-level verification — does the restored service exhibit the pre-incident behavior profile?
229
+ - Phased re-introduction — restore in stages with telemetry watching for re-compromise indicators.
230
+ - Identity re-verification for users affected by mass revocation — re-enroll MFA, re-issue tokens.
231
+
232
+ ### Step 6 — Regulator notification per jurisdiction matrix (PICERL: spans Containment / Eradication / Recovery / Lessons)
233
+
234
+ Run each jurisdiction's clock in parallel from the awareness moment. The notification template per jurisdiction is in Section 7 (Output Format). Verify the named officer per clock is engaged within the first hour of declaration. Reconcile overlapping reports (CRA Art. 11 + NIS2 Art. 23 + DORA Art. 19 + AI Act Art. 73 may all trigger for one event; the org files four reports on four clocks to overlapping authorities).
235
+
236
+ ### Step 7 — Evidence preservation and chain of custody
237
+
238
+ Per NIST 800-86:
239
+ - Acquire memory, disk, network capture, and log copies via documented forensic procedures.
240
+ - Hash artifacts at acquisition; chain-of-custody log maintained throughout.
241
+ - Store in evidence-management system with sealed access (least-privilege scope per Section 5 / least-privilege thread).
242
+ - For ephemeral compute: rely on the pre-incident telemetry pipeline (continuous forensic-grade capture to immutable store). If the pipeline was not configured pre-incident, document the gap as a Section 10 action item and acquire whatever post-hoc evidence is recoverable (logs that shipped before workload termination, immutable object-storage versions, audit trails).
243
+ - For AI-system evidence: prompt logs, response logs, embedding-store access logs, model-version metadata, system-prompt revision history, tool-invocation logs, RAG corpus state at incident time.
244
+
245
+ ### Step 8 — Post-incident review (PICERL: Lessons learned)
246
+
247
+ Within 14 days of recovery (or sooner for severe incidents):
248
+ - Adversary-narrative reconstruction using the Diamond Model (adversary, infrastructure, capability, victim) and the MITRE Unified Kill Chain (extended kill chain stages).
249
+ - Root-cause analysis: what control failed at which kill-chain stage? Was it a control gap (no control existed), a control failure (control existed but didn't fire), a control bypass (control fired but was evaded), or a detection gap (control fired but the signal was missed)?
250
+ - Detection-engineering refinement: new SIEM rules, EDR queries, AI-system telemetry hooks.
251
+ - Playbook refinement: did the playbook match the incident? Update where it didn't.
252
+ - Action items with owners and dates.
253
+
254
+ ### Step 9 — Learning-loop feedback (cross-skill hand-offs)
255
+
256
+ Per AGENTS.md DR-8 and the skill graph:
257
+ - File `data/zeroday-lessons.json` entry per `zeroday-gap-learn` if a zero-day or new attack class was involved.
258
+ - File `data/framework-control-gaps.json` entry per `framework-gap-analysis` if a control-class gap was exposed.
259
+ - Trigger `threat-model-currency` refresh — the incident is a real-world signal that the threat model may be stale.
260
+ - Trigger `skill-update-loop` if the incident exposes a gap in the skill library itself (a class of incident with no playbook, a TTP with no skill, a jurisdiction with no notification matrix entry).
261
+ - For AI-class incidents, feed `ai-attack-surface`, `rag-pipeline-security`, `mcp-agent-trust`, and `ai-c2-detection` with the observed attack pattern.
262
+
263
+ ### Step 10 — Continuous improvement metrics
264
+
265
+ Per ISO 27035-1:2023 §6 and NIST 800-61r3 post-incident activity:
266
+ - Mean time to detect (MTTD), mean time to acknowledge, mean time to contain, mean time to recover — by incident class.
267
+ - Regulator-clock on-time rate per jurisdiction.
268
+ - Tabletop exercise frequency and follow-up-completion rate.
269
+ - Detection coverage percentage (ATT&CK / ATLAS techniques covered vs. total in scope).
270
+ - Playbook coverage percentage (incident classes with playbook vs. total observed in 24-month window).
271
+ - AI-class incident detection latency vs. conventional-class incident detection latency — the operationally-relevant gap metric for mid-2026.
272
+
273
+ **Ephemeral / serverless / AI-pipeline reality (per AGENTS.md rule #9):** Evidence preservation in serverless and container environments is the new hard problem of mid-2026 IR. NIST 800-86 forensic procedures assume the workload still exists at acquisition time. For Lambda / Cloud Run / Azure Functions / Knative / Kubernetes pods scaled to zero, the workload is gone before the SOC opens the ticket. The architecturally honest recommendation: configure continuous forensic-grade telemetry shipping pre-incident (process trees, syscall traces, network flows, container-layer diffs, AI-system prompt / response / tool-invocation logs) to an external immutable store. Treat the absence of this pipeline as a precondition for incident-evidence-loss and document it as a control gap per `framework-gap-analysis` before the first incident, not after.
274
+
275
+ ---
276
+
277
+ ## Output Format
278
+
279
+ The skill produces seven artifacts per IR program assessment or live incident.
280
+
281
+ ### 1. Incident Classification Record
282
+
283
+ ```
284
+ Incident ID: INC-<YYYY>-<NNNN>
285
+ Awareness timestamp: <ISO timestamp — the regulator-clock anchor>
286
+ Declared severity: <Sev1/2/3>
287
+ Incident commander: <named>
288
+ Classification:
289
+ ATT&CK techniques: <T-IDs with sub-techniques>
290
+ ATLAS techniques: <AML.T-IDs, if applicable>
291
+ Incident class: <ransomware/exfiltration/identity/supply-chain/AI-system/BEC/DoS/insider/other>
292
+ Sector flag: <healthcare/financial/energy/federal/none>
293
+ AI-class flag: <victim/vector/attacker/none>
294
+ Cross-skill hand-offs triggered: <coordinated-vuln-disclosure / zeroday-gap-learn / ai-c2-detection / ...>
295
+ Jurisdictional clocks started:
296
+ EU CRA Art. 11: <ISO timestamp + 24h> — officer <name>
297
+ EU NIS2 Art. 23: <ISO timestamp + 24h> — officer <name>
298
+ EU DORA Art. 19 (if financial): <ISO timestamp + 4h> — officer <name>
299
+ EU AI Act Art. 73 (if high-risk AI): <ISO timestamp + 15d / 2d> — officer <name>
300
+ NYDFS 500.17 (if NY): <ISO timestamp + 72h; +24h if ransom paid> — officer <name>
301
+ CERT-In (if IN): <ISO timestamp + 6h> — officer <name>
302
+ AU SOCI (if AU CI): <ISO timestamp + 12h> — officer <name>
303
+ SG CSA CCoP2.0 (if SG CII): <ISO timestamp + 2h> — officer <name>
304
+ UK NIS / UK GDPR (if UK): <ISO timestamp + 72h> — officer <name>
305
+ JP NISC / APPI (if JP): <ISO timestamp + 3-5d> — officer <name>
306
+ IL INCD / Privacy Protection Regulations (if IL): <ISO timestamp + "without delay"> — officer <name>
307
+ BR LGPD (if BR personal data): <3 business days> — officer <name>
308
+ CN MLPS + CSL + DSL + PIPL (if CN): <multi-track per scope> — officer <name>
309
+ AE TDRA (if AE): <sector-specific> — officer <name>
310
+ HIPAA / NERC CIP-008 / sector-specific (as applicable): <per matrix> — officer <name>
311
+ ```
312
+
313
+ ### 2. Runbook Library Structure
314
+
315
+ ```
316
+ runbooks/
317
+ by-attack-technique/
318
+ T1486-ransomware.md
319
+ T1041-c2-exfil.md
320
+ T1567-web-service-exfil.md
321
+ T1078-valid-accounts.md
322
+ T1195-supply-chain.md
323
+ T1190-public-facing-app.md
324
+ ...
325
+ by-atlas-technique/
326
+ AML-T0051-prompt-injection.md
327
+ AML-T0017-model-exfiltration.md
328
+ AML-T0096-llm-api-c2.md
329
+ ...
330
+ by-incident-class/
331
+ ransomware.md
332
+ data-breach.md
333
+ business-email-compromise.md
334
+ ai-system-breach.md
335
+ agent-unauthorized-action.md
336
+ ddos.md
337
+ insider-data-loss.md
338
+ by-sector/
339
+ healthcare-hipaa.md
340
+ financial-dora-nydfs.md
341
+ energy-nerc-cip-008.md
342
+ federal-fisma.md
343
+ by-jurisdiction/
344
+ eu-cra-nis2-aiact.md
345
+ uk-nis-gdpr.md
346
+ au-soci-acsc.md
347
+ jp-nisc-appi.md
348
+ il-incd.md
349
+ sg-csa-ccop.md
350
+ in-cert-in.md
351
+ br-lgpd.md
352
+ cn-mlps-csl-dsl-pipl.md
353
+ nydfs-500-17.md
354
+ ae-tdra.md
355
+ ```
356
+
357
+ Each runbook contains: classification triggers, identification signals, containment steps (with named SOAR action), eradication checklist, recovery validation, communication template, regulator-notification references, hand-off triggers.
358
+
359
+ ### 3. Containment Script Catalog (SOAR Actions)
360
+
361
+ ```
362
+ containment/
363
+ network/
364
+ isolate-host.yaml # EDR-driven; rollback time-boxed
365
+ block-egress.yaml # firewall + proxy
366
+ segment-quarantine.yaml # SDN microsegmentation push
367
+ ai-api-egress-block.yaml # AI-provider domain block + proxy enforcement
368
+ identity/
369
+ disable-account.yaml # IdP + AD + cloud-IAM
370
+ revoke-sessions.yaml # all SSO + OAuth grants
371
+ rotate-service-account.yaml
372
+ rotate-ai-agent-identity.yaml
373
+ revoke-api-keys.yaml # incl. AI provider keys
374
+ revoke-oauth-grants.yaml
375
+ endpoint/
376
+ edr-quarantine.yaml
377
+ memory-snapshot.yaml
378
+ forensic-acquisition.yaml
379
+ cloud-workload/
380
+ snapshot-and-pause.yaml
381
+ ephemeral-evidence-capture.yaml # for serverless / container ephemeral environments
382
+ ai-system/
383
+ disable-agent-autonomy.yaml
384
+ revoke-tool-scopes.yaml
385
+ rollback-model-version.yaml
386
+ isolate-rag-corpus.yaml
387
+ rate-limit-inference-api.yaml
388
+ ```
389
+
390
+ ### 4. Regulatory Notification Matrix
391
+
392
+ The matrix maps jurisdiction × incident class × clock × authority × named officer. The shape:
393
+
394
+ | Jurisdiction | Authority | Clock | Triggering Incident Classes | Notification Channel | Named Officer |
395
+ |---|---|---|---|---|---|
396
+ | EU (CRA Art. 11) | ENISA + national CSIRT | 24h early / 72h intermediate / 14d final | actively exploited vulnerability + severe incident in product with digital elements | ENISA single reporting platform (operational 2026-09) | <name> |
397
+ | EU (NIS2 Art. 23) | national CSIRT | 24h early / 72h initial / 1m final | significant incident at essential/important entity | per Member State | <name> |
398
+ | EU (DORA Art. 19) | competent authority (national + ECB/EIOPA/ESMA) | 4h initial / 72h intermediate / 1m final | major ICT-related incident at financial entity | per RTS | <name> |
399
+ | EU (AI Act Art. 73) | market surveillance authority | 15d / 2d (fundamental rights / widespread infringement) | serious incident in high-risk AI system | per Member State | <name> |
400
+ | UK (NIS Regulations + UK GDPR) | NCSC + ICO | 72h | OES/RDSP significant incident; personal-data breach | per regulator | <name> |
401
+ | AU (SOCI Act) | ASD ACSC | 12h significant / 72h relevant | designated CI cyber incident | ReportCyber / direct | <name> |
402
+ | JP (NISC + APPI) | NISC + PPC | "promptly" (~3-5d operational) | designated CI / personal-data breach | per regulator | <name> |
403
+ | IL (INCD + PPA) | INCD + Privacy Protection Authority | "without delay" | national-significance / personal-data breach | per regulator | <name> |
404
+ | SG (CSA CCoP2.0 + PDPC) | CSA + PDPC | 2h CII / 24h others / 3d notifiable PDPA | CII cyber incident; notifiable personal-data breach | per regulator | <name> |
405
+ | IN (CERT-In 2022 Directions) | CERT-In | 6h | broad cyber-incident scope | CERT-In portal | <name> |
406
+ | BR (LGPD Art. 48) | ANPD | 3 business days for significant-risk events | personal-data security incident | ANPD portal | <name> |
407
+ | CN (MLPS + CSL + DSL + PIPL) | public security organs + CAC | per-track | network operator / data handler / personal info | per regulator | <name> |
408
+ | US-NYDFS (23 NYCRR 500.17) | NYDFS | 72h event / 24h ransom payment | covered cybersecurity event; ransom payment | NYDFS portal | <name> |
409
+ | US-HIPAA (45 CFR 164.400) | HHS OCR + state AGs | 60d individuals + HHS; immediate for >500 | unsecured-PHI breach | per regulator | <name> |
410
+ | US-NERC (CIP-008-6) | E-ISAC | 1h | Reportable Cyber Security Incident | E-ISAC portal | <name> |
411
+ | AE (TDRA + IAS + DIFC DP) | TDRA + UAE CSC + DIFC Commissioner | per sector | telecom / federal / DIFC personal-data | per regulator | <name> |
412
+
413
+ The org instantiates the matrix per its scope; multi-jurisdictional entities run multiple rows concurrently for a single event.
414
+
415
+ ### 5. Post-Incident Review Template
416
+
417
+ ```
418
+ # Post-Incident Review — INC-<YYYY>-<NNNN>
419
+
420
+ ## Executive Summary
421
+ <2-3 paragraphs: what happened, what was impacted, what was contained, what's next>
422
+
423
+ ## Timeline
424
+ | Timestamp | Event | Source |
425
+ |---|---|---|
426
+ | ... | ... | ... |
427
+
428
+ ## Adversary Narrative (Diamond Model)
429
+ - Adversary: <attribution confidence + indicators>
430
+ - Infrastructure: <C2, hosting, identity>
431
+ - Capability: <tools, techniques, exploits>
432
+ - Victim: <scope of impact>
433
+
434
+ ## Adversary Narrative (Unified Kill Chain)
435
+ For each stage (reconnaissance, weaponization, delivery, exploitation, persistence, defense evasion, command-and-control, action-on-objective):
436
+ - Observed: <evidence>
437
+ - Detected: <which control fired, when>
438
+ - Missed: <which control should have fired and didn't>
439
+
440
+ ## Root Cause Analysis
441
+ - Control gaps: <controls that did not exist>
442
+ - Control failures: <controls that existed and did not fire>
443
+ - Control bypasses: <controls that fired and were evaded>
444
+ - Detection gaps: <signals present but not surfaced>
445
+
446
+ ## Action Items
447
+ | Item | Owner | Due | Status |
448
+ |---|---|---|---|
449
+ | ... | ... | ... | ... |
450
+
451
+ ## Cross-Skill Hand-Offs
452
+ - zeroday-gap-learn entry: <reference>
453
+ - framework-gap-analysis entry: <reference>
454
+ - threat-model-currency refresh: <reference>
455
+ - skill-update-loop changes: <reference>
456
+ - ai-c2-detection / ai-attack-surface / mcp-agent-trust feedback (if AI-class): <reference>
457
+
458
+ ## Metrics
459
+ - MTTD: <time>
460
+ - MTTC: <time>
461
+ - MTTR: <time>
462
+ - Regulator-clock on-time per jurisdiction: <table>
463
+ ```
464
+
465
+ ### 6. Tabletop Exercise Record
466
+
467
+ ```
468
+ Exercise: <name>
469
+ Date: <ISO date>
470
+ Scenario: <one-paragraph; map to ATT&CK / ATLAS techniques>
471
+ Participants: <roles, not names — but record names internally>
472
+ Injects: <numbered list>
473
+ Observations: <gaps, friction, ambiguity>
474
+ Action items: <list with owners and dates>
475
+ Next exercise: <ISO date>
476
+ ```
477
+
478
+ A program with no tabletop record in the last 12 months fails the Compliance Theater Check Test 1.
479
+
480
+ ### 7. Lessons-Learned Feedback Record (for skill-update-loop)
481
+
482
+ ```
483
+ Source incident: INC-<YYYY>-<NNNN>
484
+ Date: <ISO date>
485
+ Feedback target: <skill-update-loop / threat-model-currency / framework-gap-analysis / specific skill>
486
+ Change required: <specific edit to a specific skill or data file>
487
+ Rationale: <one paragraph linking the incident observation to the change>
488
+ Filed by: <role>
489
+ ```
490
+
491
+ ---
492
+
493
+ ## Compliance Theater Check
494
+
495
+ Four concrete tests distinguish a real IR program from IR theater. Run them in order — each filters out a tier of paper compliance.
496
+
497
+ > **Test 1 — Show me your last tabletop exercise outcome and the assigned follow-ups, with completion status.** If the answer is "we don't run tabletops" or "the last one was more than 12 months ago" or "we ran one but didn't track follow-ups," the program is paper IR. ISO 27035-1:2023 §5 and NIST 800-61r3 both require tested incident-handling capability; an untested playbook is a hypothesis. If follow-ups were assigned but not completed, the tabletop was a compliance artifact, not an improvement loop. Particular smell: tabletops only at the IT level (no executive participation, no legal, no PR, no external counsel rehearsal) — these will miss the realities of decision-making at 3am during a regulator-clock event.
498
+
499
+ > **Test 2 — Walk me through your EU DORA 4-hour initial-notification process, named officer included.** Substitute the tightest jurisdictional clock that applies to the org (DORA 4h for in-scope financial entities; SG CSA CCoP2.0 2h for SG CII; NERC CIP-008 1h for North American electric utilities; CERT-In 6h for India-operating entities; AU SOCI 12h; CRA Art. 11 24h for EU manufacturers). If the answer is "we'll figure it out when it happens" or "legal will handle it," the program will miss the clock during a real incident. The named officer must be identifiable, reachable on a documented out-of-band channel, and trained on the determination criteria for the relevant "significance" or "major" or "actively exploited" thresholds. If the org cannot produce the named officer's contact card and the decision tree they will use at 03:00 on a Saturday, the regulator-notification capability is theater.
500
+
501
+ > **Test 3 — Do you have an AI-class incident playbook, and when was it last exercised?** Three failure modes signal theater: (a) "AI is just IT — we use our normal playbook" — the org has not engaged with AML.T0096 / T0017 / T0051 detection and containment specifics; (b) "we don't run AI systems" — verify against actual product surface (Copilot, Claude, ChatGPT, Gemini, AI features embedded in SaaS, internal agentic systems, RAG features); (c) "we have a draft playbook but never tested it" — untested AI-class playbooks fail at the same rate as untested conventional playbooks, but the failure modes are unfamiliar to the SOC. Particular smell: the AI-class playbook exists in the security team's shared drive but the AI-platform team and the data-science team have never seen it. AI-incident response requires cross-team rehearsal; AML.T0017 forensics requires data-science skills the SOC does not have.
502
+
503
+ > **Test 4 — Enumerate every jurisdictional notification clock that applies to your operations, name the officer for each, and produce the last drill record per clock.** If the org cannot enumerate clocks — clocks are discovered mid-incident, while running them late — the program will miss at least one in a real cross-jurisdictional event. The minimum enumeration for a multinational organization: EU (CRA Art. 11 + NIS2 Art. 23 + DORA Art. 19 if financial + AI Act Art. 73 if high-risk AI), UK (NIS + UK GDPR), AU (SOCI), JP (NISC + APPI), IL (INCD + PPA), SG (CSA CCoP2.0 + PDPC), IN (CERT-In), BR (LGPD), CN (MLPS + CSL + DSL + PIPL), US-NYDFS, US-HIPAA (if in scope), US-NERC (if in scope), AE (TDRA + DIFC DP). For each: clock, authority, channel, named officer, last drill. If the clocks live in a regulatory-comms team's binder rather than the IR runbook library, the program will run them out of sequence with the technical response and burn one of them.
504
+
505
+ A program passing all four tests is operating IR as infrastructure. A program failing any one is operating IR as paperwork — and the next regulator clock will run through the gap publicly.
506
+
507
+ ---
508
+
509
+ ## Defensive Countermeasure Mapping
510
+
511
+ Per AGENTS.md Skill File Format optional 8th section (required for skills shipped on or after 2026-05-11): map this skill's findings to MITRE D3FEND IDs from `data/d3fend-catalog.json` with explicit defense-in-depth layer position, least-privilege scope, zero-trust posture, and AI-pipeline applicability.
512
+
513
+ IR consumes defensive controls across multiple D3FEND categories; the four cited below are the highest-leverage during active incident handling.
514
+
515
+ | D3FEND ID | Where It Applies in IR | Defense-in-Depth Layer | Least-Privilege Scope | Zero-Trust Posture | AI-Pipeline Applicability |
516
+ |---|---|---|---|---|---|
517
+ | **D3-RPA** (Remote Process Analysis) | Forensic acquisition during containment and eradication. Memory, syscall trace, container layer diff acquired from compromised hosts and from suspected-but-not-confirmed lateral-spread hosts. For ephemeral compute, applies to the immutable telemetry pipeline that captured the process state before workload termination. | Containment / Eradication layer. The acquisition runs *before* destructive containment so the post-incident review has evidence. | Forensic-acquisition tooling scoped to a sealed workstation set; chain-of-custody log restricts access to named incident-handler roles. | Treat the host as adversarial — its self-reported state cannot be trusted; rely on independent telemetry capture. | Applies — AI-system process analysis includes inference-runtime telemetry (prompt logs, response logs, tool-invocation logs), agent process trees, and MCP-server interaction logs. The AI-pipeline equivalent of memory capture is the prompt-and-response state at the incident time. |
518
+ | **D3-NTA** (Network Traffic Analysis) | Egress detection during identification; lateral-movement detection during containment; post-incident hunt for residual adversary infrastructure. For data-exfiltration incidents (T1041 / T1567), NTA is the primary identification surface. For AI-API C2 (AML.T0096) NTA alone is insufficient because the egress is to legitimate AI provider domains — pair with D3-CSPP for content-layer detection. | Identification layer (primary) and Containment / Eradication layer (residual). | NTA scoped to the IR analyst role; full-take capture is sealed and accessed under chain-of-custody for evidentiary use. | Default-suspect for unexpected egress patterns; verify per session against the baseline rather than trusting prior allowlist. | Partial — AI-API egress traffic shape is novel and most NTA stacks do not have signatures for AML.T0096. Pair with `ai-c2-detection` skill recommendations. |
519
+ | **D3-IOPR** (Input/Output Profiling) | AI-API egress correlation and SaaS-egress anomaly detection. For AI-system incidents, profiling the input (prompt) and output (response) distribution is the defensive surface that can detect AML.T0051 (anomalous prompt patterns), AML.T0017 (extraction-pattern queries), and AML.T0096 (C2-channel encoded payloads). | Identification layer (primary for AI-system incidents). | Scoped to the AI-incident specialist role; raw prompts and responses may contain confidential data and must be access-controlled per data-classification policy. | Default-suspect for prompt distributions outside the baseline; do not whitelist by source identity alone — verify per request. | High applicability — D3-IOPR is the highest-leverage D3FEND technique for AI-system incident detection and is the operational complement to D3-NTA when the egress is to a legitimate AI provider. |
520
+ | **D3-CSPP** (Client-Server Payload Profiling) | C2 protocol detection during identification; AI-API content-layer detection for AML.T0096. Where the C2 channel is HTTPS to a legitimate service (Box, OneDrive, S3, AI provider), CSPP is the content-shape detection surface that catches the abuse pattern. | Identification layer. | Scoped to the detection-engineering and IR analyst roles; payload-content access controlled. | Default-suspect for novel payload shapes against baseline; verify-not-assume that previously-good clients have not been compromised. | Applies — particularly for AI-API C2 detection where TLS termination at an enterprise proxy enables payload-shape analysis of prompts and responses. |
521
+
522
+ **Explicit statement per AGENTS.md rule #4 (no orphaned controls)**: each D3FEND technique above maps to one or more incident classes in the TTP Mapping section (T1486 / T1041 / T1567 / T1078, AML.T0096 / T0017 / T0051). The defensive cross-walk in `defensive-countermeasure-mapping` covers the broader D3FEND ontology; this section names only the techniques operationally invoked during IR.
523
+
524
+ **AI-pipeline statement per AGENTS.md rule #9**: D3FEND coverage of AI-incident defense is concentrated in D3-IOPR (input/output profiling) and the content-layer subset of D3-CSPP. The ephemeral-compute evidence-preservation problem is largely outside the D3FEND ontology as of mid-2026; the operational fix (continuous forensic-grade telemetry shipping to immutable store) is documented in `attack-surface-pentest` and `defensive-countermeasure-mapping` as a control gap pending ontology coverage.
525
+
526
+ ---
527
+
528
+ ## Hand-Off / Related Skills
529
+
530
+ IR sits downstream of detection and upstream of organizational learning. Route to the following on the indicated trigger:
531
+
532
+ - **`coordinated-vuln-disclosure`** — *upstream input.* When IR identification surfaces a vulnerability against an org product (received via researcher report, bug-bounty queue, or customer escalation), hand off to the CVD intake pipeline. Conversely, when CVD output identifies a vulnerability that is being actively exploited, the resulting EU CRA Art. 11 24h clock is run by the IR team using this skill's regulator-notification matrix.
533
+ - **`zeroday-gap-learn`** — *downstream learning loop.* Every incident with a novel attack class or a zero-day vector triggers a learning-loop entry per AGENTS.md DR-8. If IR is operating but `data/zeroday-lessons.json` entries are not being filed, the hand-off is broken.
534
+ - **`threat-model-currency`** — *downstream refresh trigger.* An incident is the strongest real-world signal that the threat model may be stale; trigger the currency refresh routine.
535
+ - **`compliance-theater`** — *paper-IR detection.* The four compliance theater tests in this skill compose with the broader theater detection across frameworks; run `compliance-theater` after this skill when the org is claiming SOC 2 / ISO 27001 / NIST CSF / HIPAA maturity that the IR test results contradict.
536
+ - **`framework-gap-analysis`** — *control-gap filing.* When an incident exposes that an existing control was insufficient to detect, prevent, or contain, file the gap under the appropriate framework entry per `data/framework-control-gaps.json`.
537
+ - **`dlp-gap-analysis`** — *data exfiltration incident class.* T1041 / T1567 / AML.T0017 incidents hand off to DLP gap analysis for the egress-control assessment.
538
+ - **`ai-c2-detection`** — *AML.T0096 incident trigger.* AI-API as C2 channel detection feeds IR identification; this skill consumes those detections.
539
+ - **`ai-attack-surface`**, **`rag-pipeline-security`**, **`mcp-agent-trust`** — *AI-class incident depth.* AML.T0051 and AI-agent-initiated unauthorized action route through these skills for vector identification and containment depth.
540
+ - **`defensive-countermeasure-mapping`** — *full D3FEND cross-walk* beyond the four IDs cited in the Defensive Countermeasure Mapping section above.
541
+ - **`sector-healthcare`** — *HIPAA Breach Notification Rule sequencing* for health-sector incidents.
542
+ - **`sector-financial`** — *DORA Art. 19 4h clock + NYDFS 500.17 + PSD2 incident reporting + SWIFT CSCF* for financial-sector incidents.
543
+ - **`sector-federal-government`** — *FISMA / CISA BOD / OMB M-22-09 zero-trust* reporting overlap for federal entities.
544
+ - **`sector-energy`** — *NERC CIP-008-6 1h E-ISAC reporting + TSA pipeline directives + AESCSF + NCCS-G* for energy-sector incidents.
545
+ - **`skill-update-loop`** — *meta-loop trigger.* When an incident exposes a skill-library gap (incident class with no playbook, TTP with no skill, jurisdiction with no notification matrix entry), trigger the loop.
546
+ - **`global-grc`** — *cross-jurisdiction routing* when the incident intersects multiple regulator regimes (the common case for multinational organizations).