@blamejs/exceptd-skills 0.9.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (136) hide show
  1. package/AGENTS.md +232 -0
  2. package/ARCHITECTURE.md +267 -0
  3. package/CHANGELOG.md +616 -0
  4. package/CONTEXT.md +203 -0
  5. package/LICENSE +200 -0
  6. package/NOTICE +82 -0
  7. package/README.md +307 -0
  8. package/SECURITY.md +73 -0
  9. package/agents/README.md +81 -0
  10. package/agents/report-generator.md +156 -0
  11. package/agents/skill-updater.md +102 -0
  12. package/agents/source-validator.md +119 -0
  13. package/agents/threat-researcher.md +149 -0
  14. package/bin/exceptd.js +183 -0
  15. package/data/_indexes/_meta.json +88 -0
  16. package/data/_indexes/activity-feed.json +362 -0
  17. package/data/_indexes/catalog-summaries.json +229 -0
  18. package/data/_indexes/chains.json +7135 -0
  19. package/data/_indexes/currency.json +359 -0
  20. package/data/_indexes/did-ladders.json +451 -0
  21. package/data/_indexes/frequency.json +2072 -0
  22. package/data/_indexes/handoff-dag.json +476 -0
  23. package/data/_indexes/jurisdiction-clocks.json +967 -0
  24. package/data/_indexes/jurisdiction-map.json +536 -0
  25. package/data/_indexes/recipes.json +319 -0
  26. package/data/_indexes/section-offsets.json +3656 -0
  27. package/data/_indexes/stale-content.json +14 -0
  28. package/data/_indexes/summary-cards.json +1736 -0
  29. package/data/_indexes/theater-fingerprints.json +381 -0
  30. package/data/_indexes/token-budget.json +2137 -0
  31. package/data/_indexes/trigger-table.json +1374 -0
  32. package/data/_indexes/xref.json +818 -0
  33. package/data/atlas-ttps.json +282 -0
  34. package/data/cve-catalog.json +496 -0
  35. package/data/cwe-catalog.json +1017 -0
  36. package/data/d3fend-catalog.json +738 -0
  37. package/data/dlp-controls.json +1039 -0
  38. package/data/exploit-availability.json +67 -0
  39. package/data/framework-control-gaps.json +1255 -0
  40. package/data/global-frameworks.json +2913 -0
  41. package/data/rfc-references.json +324 -0
  42. package/data/zeroday-lessons.json +377 -0
  43. package/keys/public.pem +3 -0
  44. package/lib/framework-gap.js +328 -0
  45. package/lib/job-queue.js +195 -0
  46. package/lib/lint-skills.js +536 -0
  47. package/lib/prefetch.js +372 -0
  48. package/lib/refresh-external.js +713 -0
  49. package/lib/schemas/cve-catalog.schema.json +151 -0
  50. package/lib/schemas/manifest.schema.json +106 -0
  51. package/lib/schemas/skill-frontmatter.schema.json +113 -0
  52. package/lib/scoring.js +149 -0
  53. package/lib/sign.js +197 -0
  54. package/lib/ttp-mapper.js +80 -0
  55. package/lib/validate-catalog-meta.js +198 -0
  56. package/lib/validate-cve-catalog.js +213 -0
  57. package/lib/validate-indexes.js +83 -0
  58. package/lib/validate-package.js +162 -0
  59. package/lib/validate-vendor.js +85 -0
  60. package/lib/verify.js +216 -0
  61. package/lib/worker-pool.js +84 -0
  62. package/manifest-snapshot.json +1833 -0
  63. package/manifest.json +2108 -0
  64. package/orchestrator/README.md +124 -0
  65. package/orchestrator/dispatcher.js +140 -0
  66. package/orchestrator/event-bus.js +146 -0
  67. package/orchestrator/index.js +874 -0
  68. package/orchestrator/pipeline.js +201 -0
  69. package/orchestrator/scanner.js +327 -0
  70. package/orchestrator/scheduler.js +137 -0
  71. package/package.json +113 -0
  72. package/sbom.cdx.json +158 -0
  73. package/scripts/audit-cross-skill.js +261 -0
  74. package/scripts/audit-perf.js +160 -0
  75. package/scripts/bootstrap.js +205 -0
  76. package/scripts/build-indexes.js +721 -0
  77. package/scripts/builders/activity-feed.js +79 -0
  78. package/scripts/builders/catalog-summaries.js +67 -0
  79. package/scripts/builders/currency.js +109 -0
  80. package/scripts/builders/cwe-chains.js +105 -0
  81. package/scripts/builders/did-ladders.js +149 -0
  82. package/scripts/builders/frequency.js +89 -0
  83. package/scripts/builders/jurisdiction-clocks.js +126 -0
  84. package/scripts/builders/recipes.js +159 -0
  85. package/scripts/builders/section-offsets.js +162 -0
  86. package/scripts/builders/stale-content.js +171 -0
  87. package/scripts/builders/summary-cards.js +166 -0
  88. package/scripts/builders/theater-fingerprints.js +198 -0
  89. package/scripts/builders/token-budget.js +96 -0
  90. package/scripts/check-manifest-snapshot.js +217 -0
  91. package/scripts/predeploy.js +267 -0
  92. package/scripts/refresh-manifest-snapshot.js +57 -0
  93. package/scripts/refresh-sbom.js +222 -0
  94. package/skills/age-gates-child-safety/skill.md +456 -0
  95. package/skills/ai-attack-surface/skill.md +282 -0
  96. package/skills/ai-c2-detection/skill.md +440 -0
  97. package/skills/ai-risk-management/skill.md +311 -0
  98. package/skills/api-security/skill.md +287 -0
  99. package/skills/attack-surface-pentest/skill.md +381 -0
  100. package/skills/cloud-security/skill.md +384 -0
  101. package/skills/compliance-theater/skill.md +365 -0
  102. package/skills/container-runtime-security/skill.md +379 -0
  103. package/skills/coordinated-vuln-disclosure/skill.md +473 -0
  104. package/skills/defensive-countermeasure-mapping/skill.md +300 -0
  105. package/skills/dlp-gap-analysis/skill.md +337 -0
  106. package/skills/email-security-anti-phishing/skill.md +206 -0
  107. package/skills/exploit-scoring/skill.md +331 -0
  108. package/skills/framework-gap-analysis/skill.md +374 -0
  109. package/skills/fuzz-testing-strategy/skill.md +313 -0
  110. package/skills/global-grc/skill.md +564 -0
  111. package/skills/identity-assurance/skill.md +272 -0
  112. package/skills/incident-response-playbook/skill.md +546 -0
  113. package/skills/kernel-lpe-triage/skill.md +303 -0
  114. package/skills/mcp-agent-trust/skill.md +326 -0
  115. package/skills/mlops-security/skill.md +325 -0
  116. package/skills/ot-ics-security/skill.md +340 -0
  117. package/skills/policy-exception-gen/skill.md +437 -0
  118. package/skills/pqc-first/skill.md +546 -0
  119. package/skills/rag-pipeline-security/skill.md +294 -0
  120. package/skills/researcher/skill.md +310 -0
  121. package/skills/sector-energy/skill.md +409 -0
  122. package/skills/sector-federal-government/skill.md +302 -0
  123. package/skills/sector-financial/skill.md +398 -0
  124. package/skills/sector-healthcare/skill.md +373 -0
  125. package/skills/security-maturity-tiers/skill.md +464 -0
  126. package/skills/skill-update-loop/skill.md +463 -0
  127. package/skills/supply-chain-integrity/skill.md +318 -0
  128. package/skills/threat-model-currency/skill.md +404 -0
  129. package/skills/threat-modeling-methodology/skill.md +312 -0
  130. package/skills/webapp-security/skill.md +281 -0
  131. package/skills/zeroday-gap-learn/skill.md +350 -0
  132. package/vendor/blamejs/LICENSE +201 -0
  133. package/vendor/blamejs/README.md +54 -0
  134. package/vendor/blamejs/_PROVENANCE.json +54 -0
  135. package/vendor/blamejs/retry.js +335 -0
  136. package/vendor/blamejs/worker-pool.js +418 -0
@@ -0,0 +1,373 @@
1
+ ---
2
+ name: sector-healthcare
3
+ version: "1.0.0"
4
+ description: Healthcare sector cybersecurity for mid-2026 — HIPAA + HITRUST + HL7 FHIR security, medical device cyber (FDA + EU MDR), AI-in-healthcare under EU AI Act + FDA AI/ML SaMD guidance, patient data flows through LLM clinical tools
5
+ triggers:
6
+ - healthcare security
7
+ - hipaa
8
+ - hitrust
9
+ - hl7
10
+ - fhir
11
+ - phi
12
+ - protected health information
13
+ - medical device security
14
+ - samd
15
+ - fda cyber
16
+ - eu mdr
17
+ - clinical decision support
18
+ - ai diagnostic
19
+ - patient data
20
+ data_deps:
21
+ - cve-catalog.json
22
+ - atlas-ttps.json
23
+ - framework-control-gaps.json
24
+ - global-frameworks.json
25
+ - cwe-catalog.json
26
+ - d3fend-catalog.json
27
+ - dlp-controls.json
28
+ atlas_refs:
29
+ - AML.T0051
30
+ - AML.T0017
31
+ attack_refs:
32
+ - T1078
33
+ - T1530
34
+ - T1567
35
+ framework_gaps:
36
+ - HIPAA-Security-Rule-164.312(a)(1)
37
+ - HITRUST-CSF-v11.4-09.l
38
+ - ISO-27001-2022-A.8.30
39
+ - NIST-800-53-AC-2
40
+ rfc_refs:
41
+ - RFC-7519
42
+ - RFC-9421
43
+ cwe_refs:
44
+ - CWE-200
45
+ - CWE-287
46
+ - CWE-862
47
+ - CWE-1426
48
+ d3fend_refs:
49
+ - D3-IOPR
50
+ - D3-CSPP
51
+ - D3-MFA
52
+ last_threat_review: "2026-05-11"
53
+ ---
54
+
55
+ # Healthcare Sector Cybersecurity (mid-2026)
56
+
57
+ ## Threat Context (mid-2026)
58
+
59
+ Healthcare has been the most targeted sector for ransomware for three consecutive years, and that ranking has not changed entering mid-2026:
60
+
61
+ - **Change Healthcare (Optum / UnitedHealth Group), Feb 2024** — ALPHV/BlackCat ransomware via a Citrix portal lacking MFA; pharmacy claims processing across the US disrupted for weeks; reported PHI exposure of approximately one-third of the US population; settlements and HHS-OCR enforcement still active in 2026.
62
+ - **Ascension Health, May 2024** — Black Basta intrusion via a clinician downloading a malicious file; 140 hospitals impacted; EHR downtime forced paper-record fallback for weeks.
63
+ - **NHS Synnovis (UK), June 2024** — Qilin ransomware against the pathology provider serving Guy's, St Thomas', and King's College London hospitals; blood-test backlogs forced multiple critical-incident declarations across south London; ICO and NHS England investigations open into 2026.
64
+ - **Kaiser Permanente, April 2024** — partial PHI exposure via third-party tracking pixels (Meta, Google) — a non-ransomware breach class that nevertheless triggered HHS-OCR Bulletin enforcement on online tracking technologies.
65
+
66
+ **AI-driven clinical decision support is mainstream by mid-2026.** Radiology triage (Aidoc, Viz.ai, Annalise.ai), pathology image classification (Paige, PathAI, Ibex), ED triage copilots (Epic + Microsoft, Oracle Cerner + Anthropic via vendor integrations), and ambient clinical-documentation tools (Abridge, Nuance DAX Copilot, Suki, DeepScribe) are deployed at scale. FDA's AI/ML-enabled medical-device list crossed 1,000 cleared devices in late 2024 and continues compounding.
67
+
68
+ **PHI in LLM context windows is the new exfiltration channel.** Clinicians paste de-identification-failed patient notes into ChatGPT / Claude / Gemini consumer tiers for differential-diagnosis assistance, drug-interaction lookup, or letter drafting. Shadow-AI usage in clinical workflows is well-documented (multiple 2024–2025 hospital surveys reporting 20–50% of clinicians admitting some PHI exposure to consumer LLMs). The HIPAA Privacy Rule treats this as an unauthorised disclosure; the HHS-OCR Dec 2023 Bulletin on online tracking technologies sets the enforcement tone for non-traditional disclosure channels.
69
+
70
+ **EU AI Act high-risk classification took binding effect for high-risk AI systems on 2 Aug 2026** for systems placed on the market post that date (transitional rules for pre-existing systems extend further). Annex III, item 5(a) and Annex I (covered medical-device AI under MDR/IVDR) place the bulk of clinical-decision-support AI in the high-risk category — requiring conformity assessment, risk-management system, data-governance, technical documentation, transparency, human oversight, accuracy/robustness/cybersecurity, and post-market monitoring obligations.
71
+
72
+ **FDA AI/ML SaMD guidance + Predetermined Change Control Plans (PCCP).** FDA finalized its PCCP guidance in Dec 2024, allowing pre-authorized modifications to AI/ML-enabled device software without resubmitting a 510(k) for each retrain — provided the PCCP is part of the original authorization. This reshapes the medical-device-update model from "freeze on clearance" to "evolve within an authorized envelope."
73
+
74
+ **Medical device cybersecurity is now an FDA pre-market requirement.** Since FDORA section 524B took effect in March 2023, FDA has a Refuse-to-Accept authority for cyber devices lacking SBOM, vulnerability-management plan, secure-by-design evidence, and post-market patching commitments. CISA-FDA joint advisories on medical-device CVEs have continued through 2024-2026 (Medtronic insulin pumps, MicroPort cardiac, Baxter Welch Allyn, BD Alaris, Illumina sequencer firmware, several Medtronic CareLink remote-monitoring CVEs).
75
+
76
+ **EU MDR + IVDR cybersecurity** is governed by MDCG 2019-16 Rev.1 (July 2020) and MDCG 2022-11 plus the ENISA medical-device threat-landscape work; notified bodies are increasingly demanding evidence of cybersecurity risk management as part of conformity assessment, but the 2017 MDR Annex I General Safety and Performance Requirement 17.2 (cybersecurity) language predates the AI-augmented-device threat class.
77
+
78
+ ---
79
+
80
+ ## Framework Lag Declaration
81
+
82
+ | Framework | Control | Designed For | Fails Because |
83
+ |---|---|---|---|
84
+ | HIPAA Security Rule §164.312 (technical safeguards) | Access control, audit controls, integrity, person/entity authentication, transmission security | US covered entities and business associates; ePHI at rest and in transit | Last substantively updated 2003 (with minor adjustments since). 2024 NPRM ("HIPAA Security Rule To Strengthen the Cybersecurity of ePHI") proposes MFA, encryption baseline, network segmentation, vulnerability scanning, but is still under review entering mid-2026 — not yet binding. §164.312(a)(1) "Access Control" does not mention prompt injection as an access-control bypass; does not name LLM context windows as a disclosure surface; "minimum necessary" cannot be enforced against a clinician copy-pasting a full chart into ChatGPT. |
85
+ | HIPAA Privacy Rule §164.502(b) (minimum necessary) | Limit PHI uses and disclosures to the minimum necessary | US covered entities | Predates LLM-mediated workflows. HHS-OCR Dec 2023 Bulletin on online tracking pixels extends Privacy Rule reasoning to non-traditional channels but is sub-regulatory; consumer-LLM PHI disclosure is not formally addressed except as an unauthorised disclosure. |
86
+ | HIPAA Breach Notification Rule §164.400–414 | Notification timing for breaches (60 days HHS + individuals; 60 days media for breaches >500 individuals; state AGs per state law) | US-side breach response | 60-day clock assumes a discrete breach event; LLM-mediated leakage is continuous and aggregate. The "low probability of compromise" risk-assessment exception is being abused for consumer-AI prompt leakage. |
87
+ | HITRUST CSF v11.4 (2024) | Mapped, certifiable framework consolidating HIPAA, HITECH, NIST CSF, ISO 27001, GDPR, PCI DSS, NIST 800-53, CMS, CIS Controls plus AI Risk Management v1 | Healthcare-tilted but multi-industry; certifiable to e1 / i1 / r2 tiers | Voluntary. r2 certification is the meaningful tier; e1/i1 are baseline. HITRUST CSF v11.4 integrated AI risk-management controls (NIST AI RMF mapping, ISO/IEC 42001 alignment) but field adoption is uneven — most r2 reports issued in 2026 still draw from v11.2/v11.3 controls without the AI overlay. |
88
+ | HL7 FHIR R5 (2023) + R6 ballot | Healthcare data exchange API (REST/JSON) | EHR-to-EHR, EHR-to-app, payer-provider data exchange | Security is implementation-defined. SMART on FHIR + OAuth 2.0 + OpenID Connect is the de facto auth pattern but HL7 FHIR R5 does not mandate it. FHIR Bulk Data Access ($export) is a documented exfiltration channel where authorization scopes are over-broad. CARIN BB / Da Vinci profiles add semantics but not security. |
89
+ | FDA AI/ML SaMD guidance (PCCP final Dec 2024; AI/ML-Enabled Device Software Functions guidance final Jan 2025; Cybersecurity in Medical Devices guidance final Sept 2023 with refresh-cycle) | AI/ML-enabled medical-device software | US pre-market and post-market device review | Principle-based: secure product development framework (SPDF), threat modelling, SBOM, vulnerability management, post-market plan. Does not specifically address AI supply-chain compromise (training-data poisoning, model-weight tampering, dependency confusion in MLOps). PCCP authorizes retrain within envelope but the envelope's security boundary is not standardized. |
90
+ | EU MDR 2017/745 Annex I §17.2 + MDCG 2019-16 Rev.1 + MDCG 2022-11 | Cybersecurity requirements for medical devices placed on EU market | EU notified-body conformity assessment | Annex I 17.2 language is general ("state of the art" cybersecurity). MDCG guidance is non-binding but operationally treated as binding. AI-specific cybersecurity for medical devices under MDR is bridged to EU AI Act high-risk obligations from Aug 2026 onward — operators have to satisfy both regimes, often with duplicative-but-non-identical evidence. |
91
+ | EU AI Act (Reg. 2024/1689) Annex III + Annex I high-risk classification | Risk-management, data governance, technical documentation, transparency, human oversight, accuracy/robustness/cybersecurity, post-market monitoring for high-risk AI | EU-placed-on-market AI systems | High-risk obligations binding from 2 Aug 2026 onward. Article 15 (accuracy, robustness, cybersecurity) requires "appropriate level" with no concrete healthcare-AI threshold. Article 14 human-oversight obligations conflict in practice with ambient-documentation tools where the entire value proposition is reduced clinician attention. |
92
+ | GDPR Article 9 (special category data — health) + Article 35 DPIA | Lawful basis for processing health data; mandatory DPIA for high-risk processing | EU/EEA data subjects | Health-data DPIA scope rarely covers LLM-mediated workflows in practice; SCC + adequacy + Article 28 processor terms with US LLM providers remain operationally fragile (DPF challenges, Schrems-derived case law). |
93
+ | UK NHS DSPT (Data Security and Protection Toolkit) v6 | Annual self-assessment for NHS England organizations and suppliers | NHS provider trusts and connected suppliers | Self-assessment with audit sampling; lags actual practice. DSPT v6 added some AI-readiness questions in 2025 but does not bound generative-AI prompt-leakage explicitly. |
94
+ | AU My Health Records Act 2012 + Healthcare Identifiers Act 2010 + AESCSF for healthcare extension + Privacy Act 1988 (APP 11 + Notifiable Data Breaches scheme) | My Health Record system + AU-wide privacy | AU CIs and healthcare providers | OAIC notifiable-breach scheme triggers on eligible data breach; My Health Records Act has stricter penalties but narrow scope (the MyHR itself, not the wider provider environment). |
95
+ | JP APPI special-care-required personal information ("yō-hairyō kojin jōhō") | Sensitive personal information including medical history | JP entities | Consent requirements stronger; ISMS in healthcare is mostly ISMAP-adjacent + sector METI/MHLW guidance. AI-mediated processing of medical data is being scoped under the JP AI Strategy 2024 but not yet codified. |
96
+ | IL Patient Rights Law 5756-1996 + INCD healthcare directives + Privacy Protection Law 5741-1981 | Patient confidentiality + national cyber regulator directives | IL healthcare providers | INCD has issued healthcare-specific cyber directives but they remain advisory; binding force varies by HMO/hospital governance. |
97
+ | SG HCSA (Healthcare Services Act 2020, in force progressively 2022-2024) + PDPA + MOH Cybersecurity Guidelines for Healthcare | Healthcare licensing + data protection + sector cyber | SG licensed healthcare providers | HCSA cyber requirements are operational baseline; LLM-mediated PHI not specifically scoped. |
98
+ | IN DPDPA 2023 + DISHA (Digital Information Security in Healthcare Act, drafted, not yet enacted) + NDHM / ABDM | National data protection + pending healthcare-specific bill + national digital health mission | IN entities processing personal data including health | DPDPA treats health data as a sensitive category by implication but DISHA's separate sectoral protection remains pending into 2026. ABDM API ecosystem has its own consent-manager architecture but uptake-by-providers is uneven. |
99
+ | SA NHIA + POPIA (Protection of Personal Information Act 2013) | National Health Insurance + cross-sector privacy | SA healthcare entities | NHIA implementation phasing slow; POPIA Information Regulator enforcement maturing. |
100
+ | BR LGPD sensitive personal data + ANS cybersecurity guidance + CFM telemedicine resolutions | LGPD treats health data as sensitive | BR healthcare and health-insurance entities | ANPD guidance on AI + LGPD released 2024; healthcare-AI specifics still maturing. |
101
+ | UAE Federal Law No. 2 of 2019 on Use of ICT in Healthcare + Federal Decree-Law No. 45 of 2021 (PDPL) + DHA / DOH sector rules | Healthcare data residency + privacy + emirate-level sector rules | UAE-licensed healthcare providers | Data-residency obligations are operationally binding; cross-border LLM use cases run directly into these. |
102
+ | ISO 27001:2022 + ISO/IEC 27799 (health-sector ISMS) + ISO 81001-5-1 (medical-device cybersecurity lifecycle) + ISO/IEC 42001 (AI management system) | Generic ISMS + health sector + medical-device cyber lifecycle + AIMS | Organisation-level | A.8.30 outsourced development control needs explicit AI-pipeline interpretation. ISO 81001-5-1 is the strongest medical-device cybersecurity lifecycle standard available but adoption among smaller device vendors is partial. |
103
+ | NIST 800-53 Rev 5 + NIST 800-66 Rev 2 (HIPAA implementation guidance) + NIST AI RMF 1.0 + NIST GenAI Profile (NIST-AI-600-1) | US federal + HIPAA mapping + voluntary AI risk | US covered entities can opt-in for stronger baseline | AC-2 account management does not specifically address shared clinician credentials, break-glass accounts, or AI-service-principals for clinical copilots — extension required. |
104
+
105
+ **Cross-jurisdiction posture (per AGENTS.md rule #5):** Any healthcare gap analysis for a multi-jurisdiction operator must explicitly enumerate the regulator and primary instrument for: US (HHS-OCR, FDA), EU (each Member State DPA + ENISA + notified bodies + Commission for AI Act), UK (ICO + NHS England + MHRA), AU (OAIC + Department of Health + TGA), JP (PPC + MHLW + PMDA), IL (PPA + INCD + MoH), SG (PDPC + MOH), IN (DPB + MoHFW + CDSCO), SA (Information Regulator + SAHPRA), BR (ANPD + ANVISA + ANS), UAE (UAE Data Office + DHA / DOH / MOHAP), alongside ISO 27001:2022 + ISO/IEC 27799 + ISO 81001-5-1 + ISO/IEC 42001. US-only (HIPAA, FDA) is insufficient for any multinational provider, payer, device vendor, or digital-health platform.
106
+
107
+ ---
108
+
109
+ ## TTP Mapping
110
+
111
+ | Surface | TTP | Matrix | Variant in mid-2026 | Gap Flag |
112
+ |---|---|---|---|---|
113
+ | Clinician credential phishing for EHR / VPN / Citrix access | T1078 — Valid Accounts | ATT&CK Enterprise | Targeted phishing of physicians and nurses using lookalike Epic / Cerner / Workday portals; MFA-fatigue against Duo/Microsoft Authenticator; SIM-swap on on-call physician phones | HIPAA §164.312(d) person/entity authentication does not specify AAL; many CEs accept SMS-OTP MFA — fails NIST 800-63B AAL2 phishing-resistance bar. Hand off to identity-assurance. |
114
+ | Bulk EHR / FHIR / data-warehouse exfiltration | T1530 — Data from Cloud Storage Object | ATT&CK Enterprise | FHIR `$export` Bulk Data over-broad scopes; cloud data warehouse (Snowflake / BigQuery / Redshift) credential theft from clinician laptop; AWS S3 misconfiguration on de-identification staging buckets | HIPAA §164.312(c) integrity controls do not address bulk-API exfil semantics; HITRUST CSF 09.l information-transfer-policies treats bulk data flow at a policy layer. CWE-200 (Information Exposure), CWE-862 (Missing Authorization). |
115
+ | PHI exfiltration via clinician prompt to consumer LLM | T1567 — Exfiltration Over Web Service | ATT&CK Enterprise | Clinician pastes patient note into ChatGPT / Claude / Gemini for differential diagnosis or letter drafting; ambient-doc tool retains and forwards transcript to vendor cloud outside BAA | No HIPAA control specifically names this channel; HHS-OCR Bulletin reasoning applies. Hand off to dlp-gap-analysis. CWE-200 (Information Exposure). |
116
+ | Prompt injection of clinical decision-support copilot | AML.T0051 — LLM Prompt Injection (with .000/.001/.002 sub-techniques) | ATLAS v5.1.0 | Indirect prompt injection via referenced lab report PDF, OCR'd intake form, or patient-portal message that exploits an EHR-integrated copilot; instruction to suppress allergy alert, reorder medications, or fabricate trend in vital signs | EU AI Act Art 15 cybersecurity obligation applies but lacks concrete healthcare-AI threshold; HIPAA silent on prompt-injection-as-disclosure-vector. CWE-1426 (Improper Validation of Generative AI Output). |
117
+ | Model extraction / membership inference against clinical AI | AML.T0017 — Develop Capabilities: Adversarial ML Attack | ATLAS v5.1.0 | Adversarial probing of a clinical-decision-support API to determine whether specific patient records were in training set; reconstruction of de-identified training examples from inference behaviour | EU AI Act Art 10 data-governance applies to training-data quality; does not codify membership-inference defence. CWE-1426 covers output-validation gap. |
118
+ | Medical-device firmware tamper / exploit | T1190 (IT-side initial access to device-network) chained with vendor-specific device CVEs | ATT&CK Enterprise + ICS where applicable | Insulin pumps, cardiac monitors, infusion pumps (BD Alaris), sequencers (Illumina firmware), patient-monitoring (BD, Philips, GE Healthcare), bedside imaging | FDA 524B PMA/510(k) cyber obligations only apply to devices submitted after March 2023; brownfield fleet pre-dates it. EU MDR Annex I 17.2 silent on AI-augmented devices. Hand off to ot-ics-security for device-network treatment, and coordinated-vuln-disclosure for vendor reporting. |
119
+ | FHIR / SMART on FHIR session token theft | T1078 chained with T1530 | ATT&CK Enterprise | Stolen JWT / OAuth2 bearer for SMART-on-FHIR launch; over-broad scopes (`*/*.read`, `patient/*.read`); refresh-token theft persists access; CWE-287 (improper authentication) and CWE-862 (missing authorization) | RFC-7519 JWT validation must enforce `iss`, `aud`, `exp`, signature algorithm, key rotation; RFC-9421 HTTP message signatures for FHIR API integrity in flight; HL7 FHIR R5 does not mandate either. |
120
+ | EHR over-privileged break-glass / shared-account access | T1078.002 — Valid Accounts: Domain Accounts | ATT&CK Enterprise | Shared "Nurse" account on med-cart Windows; break-glass clinician account auditing gap; service account for EHR-integrated copilot with patient/* scope rather than encounter-bound | HIPAA §164.312(a)(2)(i) unique user identification is met technically by user-account-per-clinician but break-glass and AI-service-principals are commonly outside that boundary. NIST 800-53 AC-2 account management does not codify AI-service-principal scoping. |
121
+
122
+ **Note on ATLAS coverage.** AML.T0051 (Prompt Injection) covers the direct, indirect, and jailbreak sub-techniques against clinical-decision-support copilots; AML.T0017 covers adversarial-ML capability development including model extraction and membership inference attacks relevant to clinical-AI training-data confidentiality.
123
+
124
+ ---
125
+
126
+ ## Exploit Availability Matrix
127
+
128
+ | Surface / CVE Class | CVSS | RWEP | CISA KEV | PoC Public | AI-Discovered | Active Exploitation | Patch Available | Live-Patchable | Sector-Aware Detection |
129
+ |---|---|---|---|---|---|---|---|---|---|
130
+ | Hospital-network ransomware delivery (Citrix, VPN, MFA-fatigue chain) | varies (CVE-2023-3519 Citrix, CVE-2024-1709 ConnectWise, etc.) | high | Multiple KEV entries 2023-2026 | Yes — many with Metasploit modules | Mixed — some classes AI-assisted in 2025 | Confirmed; weekly cadence in 2024-2026 across US, UK, EU, AU healthcare | Yes for in-support products; brownfield is exposed | Mostly no (vendor product patching is reboot-class) | EDR with healthcare-specific carve-outs; SOC visibility into EHR-host hardening typically partial |
131
+ | PHI on dark web | n/a | risk-modelled | n/a | n/a — leaked data, not exploit | n/a | Continuous; price per record moderate ($50-$1000 depending on completeness) | n/a | n/a | DLP and dark-web monitoring; hand off to dlp-gap-analysis |
132
+ | Medical-device exploits (Medtronic, BD, Philips, GE Healthcare, Illumina, Baxter) | varies | varies | Several KEV listings 2024-2026 | Mixed — vendor disclosure with optional researcher PoC | Increasingly AI-assisted reverse-engineering of device firmware | Targeted (nation-state interest in remote-monitoring and DNA-sequencing) | Vendor-dependent — patch lag often 90-180 days; deploy lag 6-24 months due to clinical-engineering change windows | No — firmware updates require clinical-engineering change windows | ICS-aware IDS where deployed; rare in hospital networks. Hand off to ot-ics-security for device-network treatment. |
133
+ | Clinical-AI prompt injection (no CVE-class yet for clinical specifically) | n/a | risk-modelled | n/a | Demonstrated in 2024-2025 research against EHR-integrated copilots (Epic + GPT-4 series, Cerner + various) | n/a (vector is AI conduit) | Suspected in 2025 advanced campaigns against ambient-doc and triage copilots | Mitigation only — design-time controls on AI integration | n/a | Requires LLM-aware telemetry — almost never present in healthcare today |
134
+ | FHIR / SMART JWT token theft / replay | varies (CVE-2024-X for various SMART-on-FHIR libraries) | medium-high | Few KEV | Yes for several library-level vulns | n/a | Confirmed in 2024-2025 against patient-app marketplaces | Yes per library | Yes (library hot-swap) | API-gateway telemetry where deployed; many EHR vendors deploy proprietary token-introspection without standardized log schema |
135
+ | EHR / patient-portal credential stuffing | n/a | high | n/a | n/a (credential reuse, not CVE) | n/a | Continuous | n/a | n/a | Bot-management and account-takeover detection if deployed; HHS-OCR has flagged inadequate protection as risk-analysis failure |
136
+
137
+ **Honest gap statement (per AGENTS.md rule #10).** This project's `data/cve-catalog.json` does not contain an exhaustive inventory of medical-device CVEs (Medtronic, BD, Philips, GE Healthcare, Illumina, Baxter, Welch Allyn, MicroPort, Abbott). The authoritative source is CISA's ICS Medical Advisory feed (https://www.cisa.gov/news-events/cybersecurity-advisories/ics-medical-advisories) and FDA's medical-device safety communications. Captured in `forward_watch` for inclusion in the next data refresh. Do not invent CVE IDs to fill this matrix.
138
+
139
+ ---
140
+
141
+ ## Analysis Procedure
142
+
143
+ This procedure threads the three foundational design principles required by AGENTS.md skill-format spec — defense in depth, least privilege, zero trust — through every step.
144
+
145
+ **Defense in depth.** Layer controls across: clinician identity (D3-MFA at phishing-resistant AAL2/AAL3), EHR application (RBAC + minimum-necessary enforcement + break-glass audit), API perimeter (FHIR gateway with JWT validation per RFC-7519 + HTTP message signatures per RFC-9421 where supported), data layer (encryption at rest, field-level encryption for sensitive PHI fields, tokenization for analytics), egress (DLP at LLM boundary D3-IOPR + sanctioned-AI-only egress policy D3-CSPP), endpoint (EDR + browser-isolation on clinician workstations where clipboard-paste-to-LLM is a documented vector), medical-device network (segmentation à la `ot-ics-security`), backups (immutable + air-gap + tested restore).
146
+
147
+ **Least privilege.** Clinician access enforces the HIPAA "minimum necessary" standard at technical level, not just policy. EHR roles scoped to encounter, department, and time window — not blanket patient/*. AI clinical tools get scoped contexts: ambient-documentation tools get the current encounter only, not the full chart; triage copilots get triage-relevant fields only; differential-diagnosis copilots run against de-identified or tokenized inputs with re-identification at the human-in-the-loop boundary. SMART-on-FHIR scopes restricted to encounter-bound rather than patient-wide where the use case permits. Break-glass accounts heavily audited; AI-service-principals treated as distinct identities with their own AC-2 lifecycle and audit trail.
148
+
149
+ **Zero trust.** Every EHR query verified through identity-bound session and policy-decision-point, not assumed trustworthy because the device is on the hospital LAN. Medical device-to-EHR / device-to-historian communications mutually authenticated (mTLS with device-provisioned certificates) — not bare TCP on a flat VLAN. AI clinical-tool prompts and completions logged with identity binding (which clinician, which encounter, which patient context, full prompt + completion, model identifier and version, retrieval-augmented sources). Federated authentication (SAML/OIDC) consumes attributes from a single source of truth — preventing the EHR from being its own identity silo.
150
+
151
+ ### Step 1 — HIPAA Security Rule risk analysis per §164.308(a)(1)(ii)(A)
152
+
153
+ - Is there a current risk analysis (dated within the last 12 months)? Note: HHS-OCR enforcement actions repeatedly cite "outdated or inadequate risk analysis" as the proximate finding — Anthem, Premera, Excellus, NewYork-Presbyterian, Memorial Hermann.
154
+ - Does the risk analysis cover the entire ePHI environment — including AI clinical tools, ambient-documentation vendors, third-party developers, and BA subcontractors?
155
+ - Does it cover newer threat classes — LLM prompt-leakage, prompt-injection of clinical copilots, FHIR Bulk Data over-scoped exports, medical-device CVEs?
156
+
157
+ ### Step 2 — HITRUST inheritance and scoping (if applicable)
158
+
159
+ - Is the entity pursuing HITRUST e1, i1, or r2? r2 is the meaningful certification for healthcare.
160
+ - What CSF version? v11.4 (2024) is current; v11.5 expected.
161
+ - Which AI-overlay controls from CSF v11.4 are in scope? (NIST AI RMF mapping, ISO/IEC 42001 alignment.)
162
+ - Inheritance posture: are cloud/EHR vendor (Epic Hosted, Oracle Cerner-as-a-Service, Microsoft Azure for healthcare, AWS HealthLake, Google Cloud Healthcare API) HITRUST certifications inherited via cross-mapping? Document the inherited control IDs and the residual control responsibility.
163
+
164
+ ### Step 3 — Medical-device inventory and MDS2 mapping
165
+
166
+ - Produce a clinical-engineering inventory: manufacturer, model, firmware, network connectivity, clinical use, criticality.
167
+ - Cross-reference with MDS2 forms (Manufacturer Disclosure Statement for Medical Device Security) on file. MDS2 is the de-facto standard (HIMSS / IHE / NEMA) for pre-procurement cybersecurity disclosure.
168
+ - For devices subject to FDA section 524B (submitted post March 2023), confirm SBOM available, vulnerability-management plan documented, post-market patching commitment in place.
169
+ - For EU MDR / IVDR devices, confirm cybersecurity conformity-assessment evidence: MDCG 2019-16 Rev.1 elements, ISO 81001-5-1 lifecycle evidence where adopted, and EU AI Act high-risk overlap where the device is AI/ML-enabled.
170
+ - Hand off to `ot-ics-security` for device-network segmentation treatment; hand off to `coordinated-vuln-disclosure` for vendor advisory handling.
171
+
172
+ ### Step 4 — AI clinical-tool inventory and EU AI Act tier classification
173
+
174
+ For each AI clinical tool in production or pilot, enumerate:
175
+
176
+ - Vendor + model + version + deployment topology (vendor SaaS, hyperscaler-hosted, on-prem).
177
+ - Clinical use case: triage, diagnostic, decision-support, ambient-documentation, drug-interaction, prior-auth, scheduling, patient-facing chat.
178
+ - EU AI Act classification: high-risk (Annex III item 5(a) or Annex I via MDR/IVDR), limited-risk (transparency obligations), minimal-risk.
179
+ - FDA classification: AI/ML-enabled SaMD or not; PCCP in place or not.
180
+ - BAA / data-processing agreement covering PHI flow into the tool.
181
+ - Prompt and completion logging: enabled? retention? identity-binding? accessible for HIPAA audit?
182
+ - Human-in-the-loop gate for write actions (order entry, alarm suppression, dosing changes, clinical-note finalization).
183
+ - Training-data provenance: was patient data from this entity in training? what de-identification / consent posture?
184
+
185
+ ### Step 5 — PHI-in-LLM channel inventory (hand off to `dlp-gap-analysis`)
186
+
187
+ - Enumerate every channel where PHI could reach an LLM: sanctioned vendor integration, sanctioned employee-facing copilot (e.g., Microsoft 365 Copilot, Google Workspace Duet/Gemini), shadow-AI via clinician browser, ambient-documentation pilots, patient-facing chat.
188
+ - For each sanctioned channel, document the BAA / DPA, the data-flow boundary, the DLP coverage (D3-IOPR at egress), the logging.
189
+ - For shadow-AI, document the detection coverage (browser-isolation logging, SWG / SASE telemetry, EDR clipboard-monitoring) and the policy enforcement (web-filter category, conditional-access, awareness training).
190
+ - Hand off to `dlp-gap-analysis` for full DLP control mapping.
191
+
192
+ ### Step 6 — FHIR / SMART-on-FHIR API security audit
193
+
194
+ - Inventory FHIR endpoints (production, staging, partner-facing).
195
+ - For each, audit OAuth 2.0 / OpenID Connect configuration: token lifetime, refresh-token rotation, scope granularity, audience binding, JWT signature algorithm (no `none`, no `HS256` with publicly-known key).
196
+ - Audit SMART-on-FHIR launch context — is the encounter binding enforced server-side, or only client-asserted?
197
+ - FHIR Bulk Data `$export` operation: which clients are authorized? what scopes? what export size limits? what asynchronous-job authorization-revocation handling?
198
+ - Validate per RFC-7519 (JWT) — `iss`, `aud`, `exp`, signature, key rotation. Where supported, validate per RFC-9421 (HTTP Message Signatures) for API integrity.
199
+
200
+ ### Step 7 — Identity assurance for clinicians and AI service principals (hand off to `identity-assurance`)
201
+
202
+ - Clinician auth at AAL2 minimum; AAL3 for privileged access (EHR admin, identity admin, security admin).
203
+ - Phishing-resistant factors (FIDO2 / WebAuthn / passkey) required, not just permitted; SMS-OTP retired.
204
+ - Break-glass account: distinct identity, time-boxed, alarmed, post-use review.
205
+ - AI-service-principals (Epic-to-GPT, Cerner-to-Anthropic, Snowflake-to-LLM, etc.) treated as distinct identities with workload-identity federation where supported; per-encounter scoped tokens, not long-lived service-account keys.
206
+
207
+ ### Step 8 — Breach-notification readiness
208
+
209
+ - HIPAA Breach Notification Rule: 60 days HHS for breaches >500 individuals, 60 days individual notification, 60 days media for breaches >500 in a state, plus state AGs per state law (CA, NY, MA, TX, IL among the stricter regimes; many states have shorter clocks than HIPAA — 30 to 45 days).
210
+ - EU GDPR Article 33: 72 hours to supervisory authority for personal-data breaches.
211
+ - UK ICO: 72 hours under UK GDPR.
212
+ - AU OAIC: as soon as practicable under the Notifiable Data Breaches scheme.
213
+ - Pre-position breach-counsel relationships, draft notification templates, and exercise the multi-jurisdiction notification matrix in tabletops.
214
+
215
+ ### Step 9 — Business Associate Agreement / processor agreement review
216
+
217
+ - Inventory every BA and sub-BA (cloud vendors, ambient-doc vendors, transcription, ML platform, FHIR aggregator, analytics, dark-web monitoring).
218
+ - For each, verify BAA executed, scope of PHI flow documented, sub-BA chain documented, breach-notification timing in BAA matches HIPAA + state requirements.
219
+ - For AI vendors specifically: verify training-data use restrictions (does the vendor use PHI to train base models? to fine-tune customer models? does opt-out actually disable training?), model-output retention, vendor's own subprocessors.
220
+ - EU-side: SCC + adequacy + Article 28 processor terms; verify data-residency posture.
221
+
222
+ ### Step 10 — AI vendor risk assessment for clinical-decision tools
223
+
224
+ - For each AI clinical tool, score:
225
+ - Regulatory: FDA AI/ML SaMD clearance status (510(k), De Novo, PMA, enforcement-discretion); EU AI Act high-risk conformity assessment status (CE under MDR + AI Act overlap); MDR notified-body involvement.
226
+ - Cybersecurity: SBOM available; vulnerability-management plan; secure development lifecycle (ISO 81001-5-1 / NIST SSDF aligned); supply-chain attestation (SLSA / in-toto / Sigstore — hand off to `supply-chain-integrity`).
227
+ - AI-specific: training-data governance and provenance; red-team report on prompt-injection and jailbreak resistance (hand off to `ai-attack-surface`); model-card; eval suite for clinical accuracy / robustness / fairness across demographic strata.
228
+ - Operational: incident-response interface; breach-notification interface; logging API; ability to deliver per-customer audit log; ability to revoke specific encounters / tenants on demand.
229
+
230
+ ### Step 11 — Compliance Theater Check (see dedicated section below for concrete tests)
231
+
232
+ ### Step 12 — Cross-jurisdiction output reconciliation
233
+
234
+ For each jurisdiction the operator is exposed to (US, EU, UK, AU, JP, IL, SG, IN, SA, BR, UAE), produce a single mapping of the same control findings to that jurisdiction's regulatory language. Disparate findings for the same control deficiency across jurisdictions are themselves a finding.
235
+
236
+ ---
237
+
238
+ ## Output Format
239
+
240
+ Produce this structure verbatim:
241
+
242
+ ```
243
+ ## Healthcare Sector Security Posture Assessment
244
+
245
+ **Assessment Date:** YYYY-MM-DD
246
+ **Entity:** [name] (covered entity / business associate / device vendor / digital-health platform)
247
+ **Scope:** [e.g., EHR + ambient-doc pilots + 3 device families; HMO national; payer + provider arms]
248
+ **Regulatory jurisdictions:** [US HHS-OCR + FDA, EU AI Act + MDR, UK ICO + MHRA, ...]
249
+
250
+ ### HIPAA Technical-Safeguard Scorecard
251
+ | §164.312 Control | Implementation | Adequacy vs current TTPs | Theater Risk |
252
+ |------------------|----------------|--------------------------|--------------|
253
+ | (a)(1) Access control | ... | ... | ... |
254
+ | (a)(2)(i) Unique user identification | ... | ... | ... |
255
+ | (a)(2)(ii) Emergency access (break-glass) | ... | ... | ... |
256
+ | (a)(2)(iii) Automatic logoff | ... | ... | ... |
257
+ | (a)(2)(iv) Encryption / decryption | ... | ... | ... |
258
+ | (b) Audit controls | ... | ... | ... |
259
+ | (c)(1) Integrity | ... | ... | ... |
260
+ | (d) Person or entity authentication | ... | ... | ... |
261
+ | (e)(1) Transmission security | ... | ... | ... |
262
+
263
+ ### HIPAA Risk Analysis Currency
264
+ [Date of last analysis; scope; AI clinical tools and PHI-in-LLM channels covered yes/no; identified deficiencies; remediation plan status]
265
+
266
+ ### HITRUST Inheritance Matrix (if applicable)
267
+ | HITRUST Control Ref | Inherited From | Residual Responsibility | Evidence |
268
+
269
+ ### Medical-Device Inventory with MDS2 / FDA 524B / MDR Mapping
270
+ | Manufacturer | Model | Firmware | Clinical Use | MDS2 On File | SBOM | 524B-In-Scope | MDR/AI Act Tier | Network Position |
271
+
272
+ ### AI Clinical-Tool Inventory with EU AI Act + FDA SaMD Tier
273
+ | Vendor | Model | Use Case | EU AI Act Tier | FDA SaMD Status | PCCP | BAA | Prompt/Completion Logging | Human-in-Loop Write Gate |
274
+
275
+ ### PHI-in-LLM Channel Inventory
276
+ | Channel | Sanctioned? | BAA | DLP Coverage (D3-IOPR) | Egress Policy (D3-CSPP) | Logging | Retention |
277
+
278
+ ### FHIR / SMART-on-FHIR Security Audit
279
+ | Endpoint | OAuth Config | Token Lifetime | Scope Granularity | JWT Validation (RFC-7519) | Bulk $export Controls |
280
+
281
+ ### Identity Assurance Snapshot
282
+ | Population | AAL | Factors | Phishing-Resistant | Break-Glass Posture |
283
+
284
+ ### Breach-Notification Readiness Scorecard
285
+ | Jurisdiction | Notification Clock | Counsel Pre-Positioned | Templates Drafted | Last Tabletop Date |
286
+
287
+ ### Business Associate / Processor Posture
288
+ | BA | Sub-BAs | BAA Executed | Training-Use Restrictions | Data-Residency |
289
+
290
+ ### Compliance Theater Findings
291
+ [Outcome of the four tests in the Compliance Theater Check section]
292
+
293
+ ### Defensive Countermeasure Plan (D3FEND)
294
+ [D3-IOPR, D3-CSPP, D3-MFA — concrete control placements by layer]
295
+
296
+ ### Priority Remediation Actions
297
+ 1. ...
298
+ 2. ...
299
+ 3. ...
300
+
301
+ ### RWEP-Prioritised CVE Exposure
302
+ [Hospital-network + medical-device + FHIR-library CVEs ranked by RWEP, not CVSS; see `exploit-scoring` skill for recalculation]
303
+ ```
304
+
305
+ ---
306
+
307
+ ## Compliance Theater Check
308
+
309
+ Run all four tests. Any "fail" is a theater finding documented with the evidence (or absence thereof).
310
+
311
+ **Theater Test 1 — HIPAA risk analysis currency.**
312
+ Ask: "Show me the HIPAA Security Rule risk analysis dated within the last 12 months, and identify within it the treatment of AI clinical tools and PHI-in-LLM channels."
313
+
314
+ - If the most recent risk analysis is older than 24 months: §164.308(a)(1)(ii)(A) compliance is theater; HHS-OCR enforcement history shows this is the most frequently cited finding.
315
+ - If the analysis exists but does not address AI clinical tools, ambient-documentation vendors, or LLM channels: the analysis covers a network that no longer exists.
316
+ - Acceptable: analysis dated within 12 months, AI clinical tools enumerated and scored, PHI-in-LLM channels identified with treatment status, remediation tracker live and current.
317
+
318
+ **Theater Test 2 — Medical-device MDS2 coverage.**
319
+ Ask: "What percentage of medical devices in the environment have MDS2 forms on file, and what percentage of post-March-2023 procurements have FDA section 524B evidence (SBOM, vuln-management plan, post-market patching)?"
320
+
321
+ - If the answer is "we don't track that" or coverage is below 80%: regulatory device-cyber compliance posture is theater.
322
+ - If MDS2s exist but are uncorrelated with the clinical-engineering CMMS / asset inventory: the forms are not operationally used — theater.
323
+ - Acceptable: ≥80% MDS2 coverage of in-service devices, 100% MDS2 + 524B evidence for post-March-2023 procurements, clinical-engineering CMMS cross-referenced quarterly with cybersecurity vulnerability tracking.
324
+
325
+ **Theater Test 3 — PHI-in-LLM disclosure governance.**
326
+ Ask: "Show me the PHI flow into each LLM tool in use across the workforce, the BA agreement covering each, and the technical controls preventing unsanctioned LLM use from clinician workstations."
327
+
328
+ - If the answer is "we have a policy that staff cannot use ChatGPT for PHI": that is policy, not control — theater unless enforced.
329
+ - If the answer is "doctors just use ChatGPT for second opinions and we don't have a BAA": active HIPAA Privacy Rule exposure plus Security Rule §164.308(a)(5) workforce-training failure.
330
+ - Acceptable: sanctioned AI tools enumerated with BAAs; egress-policy at SWG / SASE blocks consumer-LLM domains from clinical workstations or routes through DLP-inspected proxy; browser-isolation or clipboard-DLP on workstations where complete egress block is operationally infeasible; awareness training tied to acceptable-use policy with documented attestation per workforce member.
331
+
332
+ **Theater Test 4 — Ransomware tabletop currency.**
333
+ Ask: "What's the most recent ransomware tabletop exercise outcome, including the decision tree for clinical-operations continuity (paper downtime, ED diversion, OR scheduling), the notification matrix across HHS-OCR + state AGs + EU/UK regulators where applicable, and the lessons-learned tracker?"
334
+
335
+ - If no tabletop in the last 12 months: incident-response capability is theater regardless of what the IR plan document says.
336
+ - If a tabletop happened but did not include clinical-operations decision-makers (CMO, CNO, ED chief, OR director): the exercise covered IT incident response, not healthcare-operations incident response — partial theater.
337
+ - If the lessons-learned tracker from the last tabletop has zero closed items 90+ days later: the exercise is documentation theater.
338
+ - Acceptable: tabletop within last 12 months, included clinical leadership, lessons-learned tracker live and being closed.
339
+
340
+ ---
341
+
342
+ ## Defensive Countermeasure Mapping
343
+
344
+ Per AGENTS.md optional 8th section (required for skills shipped on or after 2026-05-11). Maps healthcare-sector offensive findings to MITRE D3FEND IDs from `data/d3fend-catalog.json`, with explicit defense-in-depth layer position, least-privilege scope, zero-trust posture, and AI-pipeline applicability per Hard Rule #9.
345
+
346
+ | D3FEND ID | Technique | Healthcare Layer Position | Least-Privilege Scope | Zero-Trust Posture | AI-Pipeline Applicability (Hard Rule #9) |
347
+ |---|---|---|---|---|---|
348
+ | D3-IOPR | I/O Prompt Inspection (PHI inspection at the LLM boundary) | Egress proxy / DLP inline with the sanctioned AI-tool data path; browser-isolation / clipboard-DLP on clinician workstations for unsanctioned channels | Per-clinician identity binding; per-encounter context scope; per-tool BAA-coverage validation | Default-deny; every prompt inspected and policy-evaluated before reaching the model endpoint, every completion inspected before reaching the clinician | Required for sanctioned AI integration. For ephemeral / serverless clinical-AI tool architectures, the prompt-inspection point shifts to the API-gateway sidecar — never recommend host-agent-only DLP for ephemeral AI workloads. |
349
+ | D3-CSPP | Client-Server Payload Profiling (EHR / FHIR API payload profiling for exfil detection) | At FHIR API gateway, EHR application reverse-proxy, cloud-data-warehouse egress; sampling and signature on bulk-export operations | Per-API-client identity, per-scope, per-resource-type; flag deviations from baseline access pattern | Continuous verification of API-call conformance with declared scope; deviations alert and optionally throttle | Required at every AI-service-principal egress from the EHR — distinguishes legitimate AI workload reads from exfiltration patterns. For serverless AI architectures the profiling point is the API-gateway, not the ephemeral compute. |
350
+ | D3-MFA | Multi-Factor Authentication (clinician auth at AAL2+ minimum; AAL3 for privileged access) | Identity provider (Azure AD / Entra, Okta, PingFederate, ForgeRock) federating SAML/OIDC to EHR, FHIR app marketplace, VPN, Citrix, jump hosts | Per-clinician identity; step-up for privileged roles; phishing-resistant factors required, not optional | Every session re-verified at risk-signal change; no standing trust; break-glass identities distinct and alarmed | Applicable to AI-service-principals via workload-identity federation rather than human MFA; for ephemeral AI workloads use short-lived workload-identity tokens (OIDC workload federation, SPIFFE/SPIRE) rather than long-lived service-account keys. |
351
+
352
+ **Ephemeral and AI-pipeline applicability statement (per Hard Rule #9).** Recommendations in this skill are explicit about where the host-agent control assumption fails. Cloud-hosted clinical-AI tools and serverless ambient-documentation pipelines are by definition ephemeral; host-agent DLP and host-EDR controls do not apply. The compensating-control surface is the API-gateway / egress-proxy boundary, plus the workload-identity layer, plus immutable audit logging delivered to a SIEM under the covered entity's control rather than the vendor's. For brownfield deployments on traditional hospital infrastructure, host-agent controls do apply and should be the primary control plane — recommendations must specify which architectural mode the control is being placed in.
353
+
354
+ ---
355
+
356
+ ## Hand-Off / Related Skills
357
+
358
+ After producing the healthcare sector posture assessment, chain into the following skills.
359
+
360
+ - **`dlp-gap-analysis`** — for the PHI-in-LLM channel inventory (Step 5). Full DLP control coverage at the LLM egress boundary, clipboard-paste detection, browser-isolation deployment decisions, and sanctioned-AI-only egress policy enforcement live in this skill.
361
+ - **`identity-assurance`** — for clinician auth (AAL2/AAL3, phishing-resistant factors), break-glass account governance, and AI-service-principal scoping. The HIPAA §164.312(d) gap of unspecified AAL is closed here.
362
+ - **`ot-ics-security`** — medical devices are the healthcare-sector parallel to OT/ICS. The Purdue-style segmentation, signed-firmware enforcement, vendor remote-access ledger, and long-lifecycle compensating-control programme all apply to clinical-engineering fleets.
363
+ - **`ai-attack-surface`** — for clinical-AI prompt-injection threat modelling (AML.T0051) and adversarial-ML capability assessment (AML.T0017) against decision-support copilots, triage copilots, and ambient-documentation tools.
364
+ - **`coordinated-vuln-disclosure`** — for medical-device vulnerability reporting per FDA's 21 CFR 803/806 + CISA ICS-CERT pathway, plus EU MDR vigilance reporting. CVD on medical devices is operationally distinct from generic enterprise CVD.
365
+ - **`compliance-theater`** — extends the four tests above with general-purpose theater detection on the entity's wider GRC posture (HITRUST audit vs actual control evidence; HHS-OCR resolution-agreement currency; multi-jurisdiction reconciliation).
366
+ - **`framework-gap-analysis`** — for multi-jurisdiction reconciliation in Step 12 (US + EU + UK + AU + JP + IL + SG + IN + SA + BR + UAE).
367
+ - **`global-grc`** — alongside framework-gap-analysis when EU AI Act + MDR + GDPR, UK ICO + MHRA, AU OAIC + TGA, JP PPC + PMDA, and equivalent regulators apply simultaneously.
368
+ - **`mcp-agent-trust`** — when clinical copilots are MCP-server-backed (Epic, Cerner, and third-party connector ecosystems are increasingly MCP-fronted); tool-use governance on copilots with write access to orders / alarms / dosing.
369
+ - **`supply-chain-integrity`** — for AI-vendor SBOM, SLSA provenance, Sigstore/in-toto verification on training pipelines and model artefacts. The clinical-AI supply chain is one of the least-controlled surfaces in current healthcare deployments.
370
+ - **`policy-exception-gen`** — to generate defensible exceptions for brownfield medical devices where corporate IT SLAs are architecturally infeasible (pre-March-2023 device fleet); the exception evidence is the documented compensating-control programme (segmentation, allowlisting, ICS-IDS monitoring, change-window patching).
371
+ - **`exploit-scoring`** — to recalculate RWEP for hospital-network, medical-device, and FHIR-library CVEs — particularly KEV-listed Citrix / VPN / fileshare exposures with active healthcare exploitation campaigns.
372
+
373
+ **Forward watch (per skill-format spec).** HIPAA Security Rule modernization NPRM (2024) — track to final rule; HHS-OCR Bulletin on AI / LLM disclosures in clinical workflows — emerging guidance; FDA AI/ML SaMD action plan iterations and PCCP guidance refinements; EU AI Act high-risk implementing acts and harmonised standards (CEN/CENELEC JTC 21); EU MDR + AI Act conformity-assessment alignment guidance (MDCG); ISO/IEC 42001 + ISO 81001-5-1 + ISO/IEC 27799 revision cycles; HITRUST CSF v11.5 / v12 with expanded AI controls; HL7 FHIR R6 ballot security profile improvements; CISA ICS-Medical Advisory feed for medical-device CVE inclusion in `data/cve-catalog.json`; UK MHRA AI airlock pilot outcomes and post-pilot regulatory framework; AU TGA SaMD essential-principles update; SG MOH cybersecurity guidelines for healthcare refresh; IN DISHA enactment progress; BR ANPD healthcare-AI guidance.