blacktrigram 0.7.8 → 0.7.9
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/ARCHITECTURE.md +2404 -0
- package/COMBAT_ARCHITECTURE.md +3322 -0
- package/CONTROLS.md +639 -0
- package/CRA-ASSESSMENT.md +508 -0
- package/DATA_MODEL.md +675 -0
- package/ISMS_REFERENCE_MAPPING.md +513 -0
- package/SECURITY_ARCHITECTURE.md +1160 -0
- package/THREAT_MODEL.md +1163 -0
- package/lib/components/screens/intro/IntroScreen3D.js +1 -1
- package/lib/components/shared/ui/SplashScreen.js +2 -2
- package/lib/data/archetypeClothing.js +1 -1
- package/lib/data/archetypePhysicalAttributes.js +158 -1
- package/lib/data/archetypePhysicalAttributes.js.map +1 -1
- package/lib/data/index.d.ts +14 -0
- package/lib/data/index.d.ts.map +1 -0
- package/lib/data/index.js +43 -0
- package/lib/data/index.js.map +1 -0
- package/lib/data/techniqueMappings.js +47 -2
- package/lib/data/techniqueMappings.js.map +1 -1
- package/lib/data/techniques.js +1 -1
- package/lib/hooks/index.d.ts +29 -0
- package/lib/hooks/index.d.ts.map +1 -0
- package/lib/hooks/index.js +53 -0
- package/lib/hooks/index.js.map +1 -0
- package/lib/hooks/useDebounce.js +52 -0
- package/lib/hooks/useDebounce.js.map +1 -0
- package/lib/hooks/usePauseMenu.js +60 -0
- package/lib/hooks/usePauseMenu.js.map +1 -0
- package/lib/hooks/useResponsiveLayout.js +160 -0
- package/lib/hooks/useResponsiveLayout.js.map +1 -0
- package/lib/hooks/useWebGLContextLossHandler.js +36 -1
- package/lib/hooks/useWebGLContextLossHandler.js.map +1 -1
- package/lib/hooks/useWindowSize.js +19 -1
- package/lib/hooks/useWindowSize.js.map +1 -1
- package/lib/index.d.ts +2 -0
- package/lib/index.d.ts.map +1 -1
- package/lib/index.js +3 -1
- package/package.json +19 -3
|
@@ -0,0 +1,508 @@
|
|
|
1
|
+
<!-- Replaced verbose prior version with concise ISMS‑style template -->
|
|
2
|
+
|
|
3
|
+
<p align="center">
|
|
4
|
+
<img src="https://hack23.com/icon-192.png" alt="Hack23 Logo" width="192" height="192">
|
|
5
|
+
</p>
|
|
6
|
+
|
|
7
|
+
<h1 align="center">🛡️ Hack23 AB — CRA Conformity Assessment Process</h1>
|
|
8
|
+
|
|
9
|
+
<p align="center">
|
|
10
|
+
<strong>Evidence-Driven Conformity Through Systematic Assessment</strong><br>
|
|
11
|
+
<em>Demonstrating CRA Compliance Excellence for Cybersecurity Consulting</em>
|
|
12
|
+
</p>
|
|
13
|
+
|
|
14
|
+
<p align="center">
|
|
15
|
+
<a href="#"><img src="https://img.shields.io/badge/Owner-CEO-0A66C2?style=for-the-badge" alt="Owner"/></a>
|
|
16
|
+
<a href="#"><img src="https://img.shields.io/badge/Version-1.2-555?style=for-the-badge" alt="Version"/></a>
|
|
17
|
+
<a href="#"><img src="https://img.shields.io/badge/Effective-2026--03--19-success?style=for-the-badge" alt="Effective Date"/></a>
|
|
18
|
+
<a href="#"><img src="https://img.shields.io/badge/Review-Quarterly-orange?style=for-the-badge" alt="Review Cycle"/></a>
|
|
19
|
+
</p>
|
|
20
|
+
|
|
21
|
+
**Document Owner:** CEO | **Version:** 1.2 | **Last Updated:** 2026-03-19
|
|
22
|
+
**Review Cycle:** Quarterly | **Next Review:** 2026-06-19
|
|
23
|
+
|
|
24
|
+
---
|
|
25
|
+
|
|
26
|
+
## 🎯 **Purpose Statement**
|
|
27
|
+
|
|
28
|
+
**Hack23 AB's** CRA conformity assessment process demonstrates how **systematic regulatory compliance directly enables business growth rather than creating operational burden.** Our comprehensive assessment framework serves as both operational tool and client demonstration of our cybersecurity consulting methodologies.
|
|
29
|
+
|
|
30
|
+
As a cybersecurity consulting company, our approach to CRA compliance becomes a showcase of professional implementation, demonstrating to potential clients how systematic regulatory adherence creates competitive advantages through robust security foundations while enabling EU market access.
|
|
31
|
+
|
|
32
|
+
Our commitment to transparency means our conformity assessment practices become a reference implementation, showing how comprehensive regulatory compliance enables business expansion while protecting organizational interests and maintaining stakeholder trust.
|
|
33
|
+
|
|
34
|
+
_— James Pether Sörling, CEO/Founder_
|
|
35
|
+
|
|
36
|
+
---
|
|
37
|
+
|
|
38
|
+
## 🔍 **Purpose & Scope**
|
|
39
|
+
|
|
40
|
+
This process provides a concise, repeatable CRA Conformity Assessment format (pre‑market & ongoing) for the three initial products (CIA, Black Trigram, CIA Compliance Manager). Aligns with CRA Annex I & V, Hack23 classification, secure development, and transparency policies.
|
|
41
|
+
|
|
42
|
+
**Scope:** All products within [Asset Register](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Asset_Register.md) requiring EU market placement.
|
|
43
|
+
|
|
44
|
+
---
|
|
45
|
+
|
|
46
|
+
## 📋 **Quick Use Instructions**
|
|
47
|
+
|
|
48
|
+
This document provides a concise, repeatable CRA Conformity Assessment for Black Trigram (흑괘). Aligns with CRA Annex I & V, Hack23 classification, secure development, and transparency policies.
|
|
49
|
+
|
|
50
|
+
**Evidence Integration:** All evidence (SBOM, provenance, test reports) stored in GitHub release artifacts and repository documentation. Assessment references current project state and links to immutable evidence.
|
|
51
|
+
|
|
52
|
+
**CRA Regulation Alignment:** This template supports CRA Annex V technical documentation requirements and Annex I essential requirements for cybersecurity through systematic self-assessment.
|
|
53
|
+
|
|
54
|
+
### 📚 **Reference Implementations**
|
|
55
|
+
|
|
56
|
+
The following Hack23 AB projects demonstrate completed CRA assessments using this template:
|
|
57
|
+
|
|
58
|
+
| 🚀 **Project** | 📦 **Product Type** | 🏷️ **CRA Classification** | 📋 **Assessment Status** | 🔗 **Reference Link** |
|
|
59
|
+
|---------------|-------------------|------------------------|------------------------|---------------------|
|
|
60
|
+
| **🕵️ CIA (Citizen Intelligence Agency)** | Political transparency platform | Standard (Non-commercial OSS) | ✅ Complete | [📄 CRA Assessment](https://github.com/Hack23/cia/blob/master/CRA-ASSESSMENT.md) |
|
|
61
|
+
| **⚫ Black Trigram** | Korean martial arts game | Standard (Non-commercial OSS) | ✅ Complete | [📄 CRA Assessment](https://github.com/Hack23/blacktrigram/blob/main/CRA-ASSESSMENT.md) |
|
|
62
|
+
| **🛡️ CIA Compliance Manager** | Compliance automation tool | Standard (Non-commercial OSS) | ✅ Complete | [📄 CRA Assessment](https://github.com/Hack23/cia-compliance-manager/blob/main/CRA-ASSESSMENT.md) |
|
|
63
|
+
|
|
64
|
+
### 🎯 **Implementation Examples**
|
|
65
|
+
|
|
66
|
+
**📝 Common Template Usage Patterns:**
|
|
67
|
+
- **🔍 Classification:** Each reference shows different market categories and CIA classification levels
|
|
68
|
+
- **🛡️ Security Controls:** Demonstrates technical documentation across various product types
|
|
69
|
+
- **📊 Evidence Links:** Examples of GitHub release attestations and ISMS policy integration
|
|
70
|
+
- **⚖️ Risk Assessment:** Different risk profiles for transparency, security, and compliance tools
|
|
71
|
+
|
|
72
|
+
**🔗 Evidence Repository Structure:**
|
|
73
|
+
All reference implementations follow the standardized evidence pattern:
|
|
74
|
+
- **📦 GitHub Releases:** SBOM, SLSA attestations, and provenance documentation
|
|
75
|
+
- **🛡️ Security Policies:** Direct links to ISMS framework policies and procedures
|
|
76
|
+
- **📊 Compliance Badges:** OpenSSF Scorecard, CII Best Practices, and FOSSA license compliance
|
|
77
|
+
- **🚨 Vulnerability Disclosure:** Standardized `SECURITY.md` and coordinated disclosure processes
|
|
78
|
+
|
|
79
|
+
**💡 Usage Tips:**
|
|
80
|
+
1. **Start with Classification:** Use reference implementations with similar CIA levels as templates
|
|
81
|
+
2. **Evidence Alignment:** Follow the GitHub attestations pattern from existing assessments
|
|
82
|
+
3. **Risk Context:** Adapt risk assessments based on similar product complexity
|
|
83
|
+
4. **ISMS Integration:** Reference implementations show policy linkage patterns for different product types
|
|
84
|
+
|
|
85
|
+
---
|
|
86
|
+
|
|
87
|
+
## 1️⃣ **Project Identification**
|
|
88
|
+
|
|
89
|
+
_Supports CRA Annex V § 1 - Product Description Requirements_
|
|
90
|
+
|
|
91
|
+
| Field | Value |
|
|
92
|
+
| ---------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------- |
|
|
93
|
+
| 📦 Product | Black Trigram (흑괘) - Korean Martial Arts Combat Simulator |
|
|
94
|
+
| 🏷️ Version Tag | 0.6.58 (reflects current project state) |
|
|
95
|
+
| 🔗 Repository | https://github.com/Hack23/blacktrigram |
|
|
96
|
+
| 📧 Security Contact | security@hack23.org |
|
|
97
|
+
| 🎯 Purpose (1–2 lines) | Educational 3D combat game teaching authentic Korean martial arts through realistic anatomical targeting and traditional Eight Trigram philosophy |
|
|
98
|
+
| 🏪 Market | **Select one:** |
|
|
99
|
+
|
|
100
|
+
### 🏪 Market Category (Select One):
|
|
101
|
+
|
|
102
|
+
**[](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md#project-type-classifications)** [](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md#project-type-classifications) [](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md#project-type-classifications)
|
|
103
|
+
|
|
104
|
+
### 🛡️ Confidentiality Level (Select One):
|
|
105
|
+
|
|
106
|
+
[](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md#confidentiality-levels) [](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md#confidentiality-levels) [](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md#confidentiality-levels) [](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md#confidentiality-levels) [](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md#confidentiality-levels) **[](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md#confidentiality-levels)**
|
|
107
|
+
|
|
108
|
+
### ✅ Integrity Level (Select One):
|
|
109
|
+
|
|
110
|
+
[](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md#integrity-levels) [](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md#integrity-levels) **[](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md#integrity-levels)** [](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md#integrity-levels) [](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md#integrity-levels)
|
|
111
|
+
|
|
112
|
+
### ⏱️ Availability Level (Select One):
|
|
113
|
+
|
|
114
|
+
[](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md#availability-levels) [](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md#availability-levels) [](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md#availability-levels) **[](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md#availability-levels)** [](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md#availability-levels)
|
|
115
|
+
|
|
116
|
+
### 🕐 Recovery Time Objective (Select One):
|
|
117
|
+
|
|
118
|
+
[-red?style=flat-square>)](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md#rto-classifications) [-orange?style=flat-square>)](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md#rto-classifications) [-yellow?style=flat-square>)](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md#rto-classifications) [-lightgreen?style=flat-square>)](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md#rto-classifications) [-lightblue?style=flat-square>)](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md#rto-classifications) **[-lightgrey?style=flat-square>)](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md#rto-classifications)**
|
|
119
|
+
|
|
120
|
+
### 🔄 Recovery Point Objective (Select One):
|
|
121
|
+
|
|
122
|
+
[-red?style=flat-square>)](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md#rpo-classifications) [-orange?style=flat-square>)](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md#rpo-classifications) [-yellow?style=flat-square>)](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md#rpo-classifications) [-lightgreen?style=flat-square>)](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md#rpo-classifications) [-lightblue?style=flat-square>)](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md#rpo-classifications) **[-lightgrey?style=flat-square>)](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md#rpo-classifications)**
|
|
123
|
+
|
|
124
|
+
---
|
|
125
|
+
|
|
126
|
+
## 2️⃣ **CRA Scope & Classification**
|
|
127
|
+
|
|
128
|
+
_Supports CRA Article 6 - Scope and Article 7 - Product Classification Assessment_
|
|
129
|
+
|
|
130
|
+
### 🏢 CRA Applicability (Select One):
|
|
131
|
+
|
|
132
|
+
**[](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md#project-type-classifications)** [](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md#project-type-classifications)
|
|
133
|
+
|
|
134
|
+
### 🌐 Distribution Method (Select One):
|
|
135
|
+
|
|
136
|
+
**[](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md#project-type-classifications)** [](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md#project-type-classifications) [](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md#project-type-classifications)
|
|
137
|
+
|
|
138
|
+
### 📋 CRA Classification (Select One):
|
|
139
|
+
|
|
140
|
+
**[](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md#project-type-classifications)** [](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md#project-type-classifications) [](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md#project-type-classifications)
|
|
141
|
+
|
|
142
|
+
**📝 CRA Scope Justification:** Black Trigram is a non-commercial open source educational game project distributed through GitHub and GitHub Pages. As a frontend-only web application with no backend services or personal data collection, it qualifies for standard CRA classification with self-assessment approach.
|
|
143
|
+
|
|
144
|
+
**🔍 Classification Impact:**
|
|
145
|
+
|
|
146
|
+
- **Standard:** Self-assessment approach (this template supports documentation)
|
|
147
|
+
- **Class I/II:** Notified body assessment required + additional documentation
|
|
148
|
+
|
|
149
|
+
---
|
|
150
|
+
|
|
151
|
+
## 3️⃣ **Technical Documentation**
|
|
152
|
+
|
|
153
|
+
_Supports CRA Annex V § 2 - Technical Documentation Requirements_
|
|
154
|
+
|
|
155
|
+
| 🏗️ CRA Technical Area | 📝 Implementation Summary | 📋 Evidence Location |
|
|
156
|
+
| ------------------------------------------------- | ------------------------------------------------------------------------------------ | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ |
|
|
157
|
+
| 🎨 **Product Architecture** _(Annex V § 2.1)_ | React + Three.js frontend-only architecture with Korean martial arts game engine | [📋 Architecture Overview](https://www.hack23.com/black-trigram-docs.html) + [🏛️ ARCHITECTURE.md](https://github.com/Hack23/blacktrigram/blob/main/ARCHITECTURE.md) + [⚔️ COMBAT_ARCHITECTURE.md](https://github.com/Hack23/blacktrigram/blob/main/COMBAT_ARCHITECTURE.md) |
|
|
158
|
+
| 📦 **SBOM & Components** _(Annex I § 1.1)_ | Complete dependency enumeration via package-lock.json and automated SLSA attestation | [📦 GitHub Release SBOM](https://github.com/Hack23/blacktrigram/releases) + [📋 package.json](https://github.com/Hack23/blacktrigram/blob/main/package.json) |
|
|
159
|
+
| 🔐 **Cybersecurity Controls** _(Annex I § 1.2)_ | Frontend-only app with HTTPS-only delivery, CSP headers, dependency scanning | [🛡️ SECURITY_ARCHITECTURE.md](https://github.com/Hack23/blacktrigram/blob/main/SECURITY_ARCHITECTURE.md) + [🔑 Access Control Policy](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Access_Control_Policy.md) + [🔒 Cryptography Policy](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Cryptography_Policy.md) |
|
|
160
|
+
| 🛡️ **Supply Chain Security** _(Annex I § 1.3)_ | SLSA Level 3 attestations, dependency pinning, automated security scanning | [🏷️ GitHub Attestations](https://github.com/Hack23/blacktrigram/attestations) + [⚡ WORKFLOWS.md](https://github.com/Hack23/blacktrigram/blob/main/WORKFLOWS.md) |
|
|
161
|
+
| 🔄 **Update Mechanism** _(Annex I § 1.4)_ | Automated CI/CD with GitHub Actions, immutable releases, CDN cache invalidation | [🚀 Release Workflow](https://github.com/Hack23/blacktrigram/blob/main/.github/workflows/build-attest-release.yml) + [📝 Change Management](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Change_Management.md) |
|
|
162
|
+
| 📊 **Security Monitoring** _(Annex I § 1.5)_ | GitHub security advisories, dependency vulnerability scanning, OSSF Scorecard | [🔍 Security Tab](https://github.com/Hack23/blacktrigram/security) + [⭐ OSSF Scorecard](https://scorecard.dev/viewer/?uri=github.com/Hack23/blacktrigram) + [🚨 Incident Response Plan](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Incident_Response_Plan.md) |
|
|
163
|
+
| 🏷️ **Data Protection** _(Annex I § 2.1)_ | No personal data collection, session-only browser storage, privacy by design | [🔒 SECURITY.md](https://github.com/Hack23/blacktrigram/blob/main/SECURITY.md) + [🏷️ Data Classification Policy](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Data_Classification_Policy.md) |
|
|
164
|
+
| 📚 **User Guidance** _(Annex I § 2.2)_ | Comprehensive game documentation with Korean martial arts educational content | [📖 Game Documentation](https://www.hack23.com/black-trigram-docs.html) + [🎮 README.md](https://github.com/Hack23/blacktrigram/blob/main/README.md) + [🥋 game-design.md](https://github.com/Hack23/blacktrigram/blob/main/game-design.md) |
|
|
165
|
+
| 🔍 **Vulnerability Disclosure** _(Annex I § 2.3)_ | Coordinated vulnerability disclosure via GitHub Security Advisories | [🔒 SECURITY.md](https://github.com/Hack23/blacktrigram/blob/main/SECURITY.md) + [⚠️ Vulnerability Management](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Vulnerability_Management.md) |
|
|
166
|
+
|
|
167
|
+
**📋 ISMS Policy Integration:**
|
|
168
|
+
|
|
169
|
+
- **🏗️ Architecture & Design:** Implementation aligned with [🔐 Information Security Policy](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Information_Security_Policy.md)
|
|
170
|
+
- **📦 Asset Management:** All components documented in [💻 Asset Register](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Asset_Register.md)
|
|
171
|
+
- **🔒 Encryption Standards:** Cryptographic requirements per [🔒 Cryptography Policy](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Cryptography_Policy.md)
|
|
172
|
+
- **🌐 Network Security:** Infrastructure controls via [🌐 Network Security Policy](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Network_Security_Policy.md)
|
|
173
|
+
|
|
174
|
+
---
|
|
175
|
+
|
|
176
|
+
## 4️⃣ **Risk Assessment**
|
|
177
|
+
|
|
178
|
+
_Supports CRA Annex V § 3 - Risk Assessment Documentation_
|
|
179
|
+
|
|
180
|
+
Reference: [📊 Risk Assessment Methodology](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Risk_Assessment_Methodology.md) and [⚠️ Risk Register](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Risk_Register.md)
|
|
181
|
+
|
|
182
|
+
| 🚨 **CRA Risk Category** | 🎯 Asset | 📊 Likelihood | 💥 Impact (C/I/A) | 🛡️ CRA Control Implementation | ⚖️ Residual | 📋 Evidence |
|
|
183
|
+
| --------------------------------------- | --------------- | ------------- | ----------------- | ------------------------------------------- | ----------- | --------------------- |
|
|
184
|
+
| **Supply Chain Attack** _(Art. 11)_ | Build pipeline | M | H/H/M | SBOM + SLSA provenance + dependency pinning | L | GitHub attestations |
|
|
185
|
+
| **Unauthorized Access** _(Art. 11)_ | Authentication | M | H/H/H | MFA + secret scanning + short-lived tokens | L | Access control logs |
|
|
186
|
+
| **Data Breach** _(Art. 11)_ | Data storage | L | H/H/H | Encryption + IAM + least privilege | L | KMS configuration |
|
|
187
|
+
| **Component Vulnerability** _(Art. 11)_ | Dependencies | M | M/H/M | SCA scanning + patch management | L | Vulnerability reports |
|
|
188
|
+
| **Service Disruption** _(Art. 11)_ | Public services | M | L/M/H | WAF + DDoS protection + scaling | M | Infrastructure config |
|
|
189
|
+
|
|
190
|
+
**⚖️ CRA Risk Statement:** LOW - Assessment supports CRA essential cybersecurity requirements evaluation
|
|
191
|
+
**✅ Risk Acceptance:** James Pether Sörling, CEO - 2025-08-22
|
|
192
|
+
|
|
193
|
+
**📋 Risk Management Framework:**
|
|
194
|
+
|
|
195
|
+
- **📊 Methodology:** Risk assessment per [📊 Risk Assessment Methodology](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Risk_Assessment_Methodology.md)
|
|
196
|
+
- **⚠️ Risk Tracking:** All risks documented in [⚠️ Risk Register](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Risk_Register.md)
|
|
197
|
+
- **🔄 Business Impact:** Continuity planning via [🔄 Business Continuity Plan](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Business_Continuity_Plan.md)
|
|
198
|
+
- **🆘 Recovery Planning:** Technical recovery per [🆘 Disaster Recovery Plan](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Disaster_Recovery_Plan.md)
|
|
199
|
+
|
|
200
|
+
---
|
|
201
|
+
|
|
202
|
+
## 5️⃣ **Essential Cybersecurity Requirements**
|
|
203
|
+
|
|
204
|
+
_Supports CRA Annex I - Essential Requirements Self-Assessment_
|
|
205
|
+
|
|
206
|
+
| 📋 **CRA Annex I Requirement** | ✅ Status | 📋 Implementation Evidence |
|
|
207
|
+
| ----------------------------------------- | --------- | ---------------------------------------------------------------------------------------------------------------------------------------------------- |
|
|
208
|
+
| **🛡️ § 1.1 - Secure by Design** | ✅ | Minimal attack surface via `SECURITY_ARCHITECTURE.md` |
|
|
209
|
+
| **🔒 § 1.2 - Secure by Default** | ✅ | Hardened default configurations documented |
|
|
210
|
+
| **🏷️ § 2.1 - Personal Data Protection** | ✅ | GDPR compliance via [🏷️ Data Classification Policy](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Data_Classification_Policy.md) |
|
|
211
|
+
| **🔍 § 2.2 - Vulnerability Disclosure** | ✅ | Public VDP via Repository `SECURITY.md` + [⚠️ Vulnerability Management](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Vulnerability_Management.md) |
|
|
212
|
+
| **📦 § 2.3 - Software Bill of Materials** | ✅ | Automated SBOM generation: GitHub Release includes signed SBOM |
|
|
213
|
+
| **🔐 § 2.4 - Secure Updates** | ✅ | Signed updates: GitHub Release includes attestations |
|
|
214
|
+
| **📊 § 2.5 - Security Monitoring** | ✅ | Comprehensive logging via [🚨 Incident Response Plan](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Incident_Response_Plan.md) |
|
|
215
|
+
| **📚 § 2.6 - Security Documentation** | ✅ | User security guidance: `USER_SECURITY_GUIDE.md` |
|
|
216
|
+
|
|
217
|
+
**🎯 CRA Self-Assessment Status:** REQUIREMENTS_DOCUMENTED
|
|
218
|
+
|
|
219
|
+
**🔍 Standard Security Reporting Process:**
|
|
220
|
+
Each project includes standardized security reporting via `SECURITY.md` following coordinated vulnerability disclosure:
|
|
221
|
+
|
|
222
|
+
- **📧 Private Reporting:** GitHub Security Advisories for confidential disclosure
|
|
223
|
+
- **⏱️ Response Timeline:** 48h acknowledgment, 7d validation, 30d resolution
|
|
224
|
+
- **🏆 Recognition Program:** Public acknowledgment unless anonymity requested
|
|
225
|
+
- **🔄 Continuous Support:** Latest version maintained with security updates
|
|
226
|
+
- **📋 Vulnerability Scope:** Authentication bypass, injection attacks, remote code execution, data exposure
|
|
227
|
+
|
|
228
|
+
**ISMS Integration:** All vulnerability reports processed through [⚠️ Vulnerability Management](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Vulnerability_Management.md) procedures
|
|
229
|
+
|
|
230
|
+
---
|
|
231
|
+
|
|
232
|
+
## 6️⃣ **Conformity Assessment Evidence**
|
|
233
|
+
|
|
234
|
+
_Supports CRA Article 19 - Conformity Assessment Documentation_
|
|
235
|
+
|
|
236
|
+
### 📊 **Quality & Security Automation Status:**
|
|
237
|
+
|
|
238
|
+
Reference: [🛠️ Secure Development Policy](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Secure_Development_Policy.md)
|
|
239
|
+
|
|
240
|
+
| 🧪 Control | 🎯 Requirement | ✅ Implementation | 📋 Evidence |
|
|
241
|
+
| ------------------ | ------------------------------------- | ----------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
|
|
242
|
+
| 🧪 Unit Testing | ≥80% line coverage, ≥70% branch | ✅ IMPLEMENTED | [📊 Coverage reports](https://www.hack23.com/black-trigram-docs.html) + [🧪 test plans](https://github.com/Hack23/blacktrigram/blob/main/UnitTestPlan.md) |
|
|
243
|
+
| 🌐 E2E Testing | Critical user journeys validated | ✅ IMPLEMENTED | [📋 E2E test reports](https://github.com/Hack23/blacktrigram/blob/main/E2ETestPlan.md) + [📊 mochawesome](https://github.com/Hack23/blacktrigram/tree/main/docs/cypress) |
|
|
244
|
+
| 🔍 SAST Scanning | Zero critical/high vulnerabilities | ✅ IMPLEMENTED | [📊 CodeQL reports](https://github.com/Hack23/blacktrigram/security/code-scanning) |
|
|
245
|
+
| 📦 SCA Scanning | Zero critical unresolved dependencies | ✅ IMPLEMENTED | [⚠️ Dependabot alerts](https://github.com/Hack23/blacktrigram/security/dependabot) + [📊 dependency reports](https://github.com/Hack23/blacktrigram/network/dependencies) |
|
|
246
|
+
| 🔒 Secret Scanning | Zero exposed secrets/credentials | ✅ IMPLEMENTED | [🔍 Secret scan validation](https://github.com/Hack23/blacktrigram/security/secret-scanning) |
|
|
247
|
+
| 🕷️ DAST Scanning | Zero exploitable high+ findings | ✅ IMPLEMENTED | [🕷️ ZAP DAST reports](https://github.com/Hack23/blacktrigram/actions/workflows/zap-baseline.yml) |
|
|
248
|
+
| 📦 SBOM Generation | SPDX + CycloneDX per release | ✅ IMPLEMENTED | [📦 Release SBOM](https://github.com/Hack23/blacktrigram/releases) |
|
|
249
|
+
| 🛡️ Provenance | SLSA Level 3 attestation | ✅ IMPLEMENTED | [🏷️ GitHub attestations](https://github.com/Hack23/blacktrigram/attestations) |
|
|
250
|
+
| 📊 Quality Gates | SonarCloud quality gate passing | ✅ IMPLEMENTED | [📊 SonarCloud analysis](https://sonarcloud.io/project/overview?id=Hack23_blacktrigram) |
|
|
251
|
+
|
|
252
|
+
### 🎖️ **Security & Compliance Badges:**
|
|
253
|
+
|
|
254
|
+
**🔍 Supply Chain Security:**
|
|
255
|
+
[](https://github.com/Hack23/blacktrigram/attestations/)
|
|
256
|
+
[](https://scorecard.dev/viewer/?uri=github.com/Hack23/blacktrigram)
|
|
257
|
+
|
|
258
|
+
**🏆 Best Practices & Quality:**
|
|
259
|
+
[](https://bestpractices.coreinfrastructure.org/projects/10777)
|
|
260
|
+
[](https://sonarcloud.io/summary/new_code?id=Hack23_blacktrigram)
|
|
261
|
+
|
|
262
|
+
**⚖️ License & Compliance:**
|
|
263
|
+
[](https://app.fossa.io/projects/git%2Bgithub.com%2FHack23%2Fblacktrigram?ref=badge_shield)
|
|
264
|
+
|
|
265
|
+
**🔗 Release Evidence:**
|
|
266
|
+
GitHub Attestations: `https://github.com/Hack23/blacktrigram/attestations`
|
|
267
|
+
|
|
268
|
+
### 📦 Release Evidence Pattern (Following Hack23 Standard):
|
|
269
|
+
|
|
270
|
+
**🎯 Release Assets Structure:**
|
|
271
|
+
|
|
272
|
+
```
|
|
273
|
+
blacktrigram-0.6.58.zip # Main application bundle
|
|
274
|
+
blacktrigram-0.6.58.zip.intoto.jsonl # SLSA provenance attestation
|
|
275
|
+
blacktrigram-0.6.58.spdx.json # SPDX SBOM
|
|
276
|
+
blacktrigram-0.6.58.spdx.json.intoto.jsonl # SBOM attestation
|
|
277
|
+
```
|
|
278
|
+
|
|
279
|
+
**📋 Release Notes Format:**
|
|
280
|
+
|
|
281
|
+
```markdown
|
|
282
|
+
# Highlights
|
|
283
|
+
|
|
284
|
+
## 🏗️ Infrastructure & Performance
|
|
285
|
+
|
|
286
|
+
- build(deps): automated dependency updates via Dependabot
|
|
287
|
+
- ci: enhanced security scanning and compliance checks
|
|
288
|
+
- perf: performance optimizations and monitoring improvements
|
|
289
|
+
|
|
290
|
+
## 📦 Dependencies
|
|
291
|
+
|
|
292
|
+
- Complete list of dependency updates with version tracking
|
|
293
|
+
- Security vulnerability remediation
|
|
294
|
+
- License compliance verification
|
|
295
|
+
|
|
296
|
+
## 🔒 Security Compliance
|
|
297
|
+
|
|
298
|
+
[](https://github.com/Hack23/blacktrigram/attestations/)
|
|
299
|
+
[](https://bestpractices.coreinfrastructure.org/projects/10777)
|
|
300
|
+
[](https://scorecard.dev/viewer/?uri=github.com/Hack23/blacktrigram)
|
|
301
|
+
[](https://app.fossa.io/projects/git%2Bgithub.com%2FHack23%2Fblacktrigram?ref=badge_shield)
|
|
302
|
+
|
|
303
|
+
## Contributors
|
|
304
|
+
|
|
305
|
+
Thanks to @dependabot[bot] for automated security updates!
|
|
306
|
+
|
|
307
|
+
**Full Changelog**: https://github.com/Hack23/blacktrigram/compare/v0.6.57...v0.6.58
|
|
308
|
+
```
|
|
309
|
+
|
|
310
|
+
**🔍 Evidence Validation Commands:**
|
|
311
|
+
|
|
312
|
+
```bash
|
|
313
|
+
# Verify SBOM in GitHub release
|
|
314
|
+
gh release view --repo Hack23/blacktrigram --json assets
|
|
315
|
+
|
|
316
|
+
# Check SLSA attestations
|
|
317
|
+
gh attestation list --repo Hack23/blacktrigram
|
|
318
|
+
|
|
319
|
+
# Validate security scorecard
|
|
320
|
+
curl -s https://api.securityscorecards.dev/projects/github.com/Hack23/blacktrigram | jq '.score'
|
|
321
|
+
|
|
322
|
+
# Verify FOSSA compliance
|
|
323
|
+
curl -s https://app.fossa.io/api/projects/git%2Bgithub.com%2FHack23%2Fblacktrigram/issues | jq '.issues | length'
|
|
324
|
+
```
|
|
325
|
+
|
|
326
|
+
---
|
|
327
|
+
|
|
328
|
+
## 7️⃣ **Post-Market Surveillance**
|
|
329
|
+
|
|
330
|
+
_Supports CRA Article 23 - Obligations of Economic Operators_
|
|
331
|
+
|
|
332
|
+
Reference: [🌐 ISMS Transparency Plan](https://github.com/Hack23/ISMS-PUBLIC/blob/main/ISMS_Transparency_Plan.md) and [📊 Security Metrics](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Security_Metrics.md)
|
|
333
|
+
|
|
334
|
+
| 📡 **CRA Monitoring Obligation** | 🔧 Implementation | ⏱️ Frequency | 🎯 Action Trigger | 📋 Evidence |
|
|
335
|
+
| ---------------------------------------------- | ----------------------------- | ------------ | ------------------------------ | --------------------- |
|
|
336
|
+
| **🔍 Vulnerability Monitoring** _(Art. 23.1)_ | CVE feeds + GitHub advisories | Continuous | Auto-create security issues | SCA reports |
|
|
337
|
+
| **🚨 Incident Reporting** _(Art. 23.2)_ | Security event detection | Real-time | ENISA 24h notification prep | Monitoring dashboards |
|
|
338
|
+
| **📊 Security Posture Tracking** _(Art. 23.3)_ | OpenSSF Scorecard monitoring | Weekly | Score decline investigation | Security metrics |
|
|
339
|
+
| **🔄 Update Distribution** _(Art. 23.4)_ | Automated security updates | As needed | Critical vulnerability patches | Release management |
|
|
340
|
+
|
|
341
|
+
**📋 CRA Reporting Readiness:** Documentation and procedures prepared for ENISA incident reporting per [🚨 Incident Response Plan](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Incident_Response_Plan.md)
|
|
342
|
+
|
|
343
|
+
**🔗 ISMS Monitoring Integration:**
|
|
344
|
+
|
|
345
|
+
- **📊 Continuous Monitoring:** Security posture tracking per [📊 Security Metrics](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Security_Metrics.md)
|
|
346
|
+
- **🌐 Transparency Framework:** Public disclosure strategy via [🌐 ISMS Transparency Plan](https://github.com/Hack23/ISMS-PUBLIC/blob/main/ISMS_Transparency_Plan.md)
|
|
347
|
+
- **🤝 Third-Party Monitoring:** Supplier surveillance per [🤝 Third Party Management](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Third_Party_Management.md)
|
|
348
|
+
- **✅ Compliance Tracking:** Regulatory adherence via [✅ Compliance Checklist](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Compliance_Checklist.md)
|
|
349
|
+
- **💾 Data Protection:** Backup and recovery per [💾 Backup Recovery Policy](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Backup_Recovery_Policy.md)
|
|
350
|
+
|
|
351
|
+
---
|
|
352
|
+
|
|
353
|
+
## 8️⃣ **EU Declaration of Conformity**
|
|
354
|
+
|
|
355
|
+
_Supports CRA Article 28 - EU Declaration of Conformity_
|
|
356
|
+
|
|
357
|
+
> **📝 Complete when placing product on EU market**
|
|
358
|
+
|
|
359
|
+
**🏢 Manufacturer:** Hack23 AB, Stockholm, Sweden
|
|
360
|
+
**📦 Product:** Black Trigram (흑괘) 0.6.58
|
|
361
|
+
**📋 CRA Compliance:** Self-assessment documentation supporting CRA essential cybersecurity requirements evaluation
|
|
362
|
+
**🔍 Assessment:** Self-assessment documentation per Article 24 - Standard product classification
|
|
363
|
+
**📊 Standards:** ETSI EN 303 645 (IoT Security), ISO/IEC 27001 (ISMS), OWASP ASVS (Application Security), NIST SSDF (Secure Development)
|
|
364
|
+
|
|
365
|
+
**📅 Date & Signature:** 2026-03-19 - James Pether Sörling, CEO
|
|
366
|
+
|
|
367
|
+
**📂 Technical Documentation:** This assessment + evidence bundle supports CRA Annex V technical documentation requirements
|
|
368
|
+
|
|
369
|
+
---
|
|
370
|
+
|
|
371
|
+
## 9️⃣ **Assessment Completion & Approval**
|
|
372
|
+
|
|
373
|
+
_Supports CRA Article 16 - Quality Management System Documentation_
|
|
374
|
+
|
|
375
|
+
### 📊 **CRA Self-Assessment Summary**
|
|
376
|
+
|
|
377
|
+
**Overall CRA Documentation Status:** DOCUMENTATION_COMPLETE
|
|
378
|
+
|
|
379
|
+
**Key CRA Documentation Areas:**
|
|
380
|
+
|
|
381
|
+
- ✅ Annex I essential requirements documented and assessed
|
|
382
|
+
- ✅ Annex V technical documentation structured
|
|
383
|
+
- ✅ Article 11 security measures documented
|
|
384
|
+
- ✅ Article 23 post-market surveillance procedures documented
|
|
385
|
+
|
|
386
|
+
**Outstanding Documentation:**
|
|
387
|
+
|
|
388
|
+
```
|
|
389
|
+
No outstanding CRA documentation gaps identified for standard classification
|
|
390
|
+
```
|
|
391
|
+
|
|
392
|
+
### ✅ **Formal Approval**
|
|
393
|
+
|
|
394
|
+
| 👤 **Role** | 📝 **Name** | 📅 **Date** | ✍️ **Assessment Attestation** |
|
|
395
|
+
| ------------------------------ | -------------------- | ---------------- | -------------------------------------------------- |
|
|
396
|
+
| 🔒 **CRA Security Assessment** | James Pether Sörling | 2026-03-19 | Essential requirements documented and assessed |
|
|
397
|
+
| 🎯 **Product Responsibility** | James Pether Sörling | 2026-03-19 | Technical documentation complete and structured |
|
|
398
|
+
| ⚖️ **Legal Compliance Review** | James Pether Sörling | 2026-03-19 | EU regulatory documentation requirements addressed |
|
|
399
|
+
|
|
400
|
+
**📊 CRA Assessment Status:** SELF_ASSESSMENT_DOCUMENTED
|
|
401
|
+
|
|
402
|
+
---
|
|
403
|
+
|
|
404
|
+
## 🎨 **CRA Assessment Maintenance**
|
|
405
|
+
|
|
406
|
+
### **📋 Update Triggers**
|
|
407
|
+
|
|
408
|
+
_Per CRA Article 15 - Substantial Modification_
|
|
409
|
+
|
|
410
|
+
CRA assessment updated only when changes constitute "substantial modification" under CRA:
|
|
411
|
+
|
|
412
|
+
1. **🏗️ Security Architecture Changes:** New authentication methods, trust boundaries, or encryption
|
|
413
|
+
2. **🛡️ Essential Requirement Impact:** Changes affecting Annex I compliance
|
|
414
|
+
3. **📦 Critical Dependencies:** New supply chain components with security implications
|
|
415
|
+
4. **🔍 Risk Profile Changes:** New threats or vulnerability classes
|
|
416
|
+
5. **⚖️ Regulatory Updates:** CRA implementing acts or guidance changes
|
|
417
|
+
|
|
418
|
+
**🎯 Maintenance Principle:** Assessment stability preferred - avoid routine updates that don't impact CRA compliance
|
|
419
|
+
|
|
420
|
+
### **🔗 CRA Evidence Integration**
|
|
421
|
+
|
|
422
|
+
```markdown
|
|
423
|
+
## Current CRA Self-Assessment Evidence
|
|
424
|
+
|
|
425
|
+
**🏷️ Product Version:** 0.6.58
|
|
426
|
+
**📦 CRA Technical Documentation:** This assessment + [Latest Release](https://github.com/Hack23/blacktrigram/releases/latest)
|
|
427
|
+
**🛡️ Security Attestations:** [GitHub Attestations](https://github.com/Hack23/blacktrigram/attestations)
|
|
428
|
+
**📊 Assessment Status:** 
|
|
429
|
+
```
|
|
430
|
+
|
|
431
|
+
---
|
|
432
|
+
|
|
433
|
+
## 📚 **CRA Regulatory Alignment**
|
|
434
|
+
|
|
435
|
+
### **🔐 CRA Article Cross-References**
|
|
436
|
+
|
|
437
|
+
- **Article 6:** Scope determination → Section 2 (CRA Classification)
|
|
438
|
+
- **Article 11:** Essential cybersecurity requirements → Section 5 (Requirements Assessment)
|
|
439
|
+
- **Article 19:** Conformity assessment → Section 6 (Evidence Documentation)
|
|
440
|
+
- **Article 23:** Post-market obligations → Section 7 (Surveillance Documentation)
|
|
441
|
+
- **Article 28:** Declaration of conformity → Section 8 (DoC Template)
|
|
442
|
+
- **Annex I:** Technical requirements → Section 5 (Requirements self-assessment mapping)
|
|
443
|
+
- **Annex V:** Technical documentation → Complete template structure
|
|
444
|
+
|
|
445
|
+
### **🌐 ISMS Integration Benefits**
|
|
446
|
+
|
|
447
|
+
- **🔄 Operational Continuity:** CRA self-assessment integrated with existing security operations
|
|
448
|
+
- **📊 Evidence Reuse:** Security metrics and monitoring serve dual ISMS/CRA documentation purposes
|
|
449
|
+
- **🎯 Business Value:** CRA readiness demonstrates cybersecurity consulting expertise through systematic documentation
|
|
450
|
+
- **🤝 Client Confidence:** Transparent self-assessment approach showcases professional implementation methodology
|
|
451
|
+
|
|
452
|
+
### **📋 Complete ISMS Policy Framework**
|
|
453
|
+
|
|
454
|
+
#### **🔐 Core Security Governance**
|
|
455
|
+
|
|
456
|
+
- **[🔐 Information Security Policy](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Information_Security_Policy.md)** — Overall security governance and business value framework
|
|
457
|
+
- **[🏷️ Classification Framework](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md)** — Data and asset classification methodology with business impact analysis
|
|
458
|
+
- **[🌐 ISMS Transparency Plan](https://github.com/Hack23/ISMS-PUBLIC/blob/main/ISMS_Transparency_Plan.md)** — Public disclosure strategy and stakeholder communication
|
|
459
|
+
- **[📋 CRA Conformity Assessment Process](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CRA_Conformity_Assessment_Process.md)** — CRA self-assessment methodology and conformity documentation template
|
|
460
|
+
|
|
461
|
+
#### **🛡️ Security Control Implementation**
|
|
462
|
+
|
|
463
|
+
- **[🔒 Cryptography Policy](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Cryptography_Policy.md)** — Encryption standards, key management, and post-quantum readiness
|
|
464
|
+
- **[🔑 Access Control Policy](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Access_Control_Policy.md)** — Identity management, MFA requirements, and privilege management
|
|
465
|
+
- **[🌐 Network Security Policy](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Network_Security_Policy.md)** — Network segmentation, firewall rules, and perimeter security
|
|
466
|
+
- **[🏷️ Data Classification Policy](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Data_Classification_Policy.md)** — Information handling, protection levels, and retention requirements
|
|
467
|
+
- **[🎯 Threat Modeling](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Threat_Modeling.md)** — Threat identification, attack surface analysis, and risk-based security design
|
|
468
|
+
|
|
469
|
+
#### **⚙️ Operational Excellence Framework**
|
|
470
|
+
|
|
471
|
+
- **[🛠️ Secure Development Policy](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Secure_Development_Policy.md)** — SDLC security, testing requirements, and automation gates
|
|
472
|
+
- **[📝 Change Management](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Change_Management.md)** — Controlled modification procedures and release management
|
|
473
|
+
- **[🔍 Vulnerability Management](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Vulnerability_Management.md)** — Security testing, coordinated disclosure, and remediation
|
|
474
|
+
- **[🤝 Third Party Management](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Third_Party_Management.md)** — Supplier risk assessment and ongoing monitoring
|
|
475
|
+
- **[🔓 Open Source Policy](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Open_Source_Policy.md)** — OSS governance, license compliance, and contribution management
|
|
476
|
+
|
|
477
|
+
#### **🚨 Incident Response & Recovery**
|
|
478
|
+
|
|
479
|
+
- **[🚨 Incident Response Plan](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Incident_Response_Plan.md)** — Security event handling, communication, and forensics
|
|
480
|
+
- **[🔄 Business Continuity Plan](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Business_Continuity_Plan.md)** — Business resilience, recovery objectives, and continuity strategies
|
|
481
|
+
- **[🆘 Disaster Recovery Plan](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Disaster_Recovery_Plan.md)** — Technical recovery procedures and system restoration
|
|
482
|
+
- **[💾 Backup Recovery Policy](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Backup_Recovery_Policy.md)** — Data protection, backup validation, and restore procedures
|
|
483
|
+
|
|
484
|
+
#### **📊 Performance Management & Compliance**
|
|
485
|
+
|
|
486
|
+
- **[📊 Security Metrics](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Security_Metrics.md)** — KPI tracking, performance measurement, and continuous improvement
|
|
487
|
+
- **[💻 Asset Register](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Asset_Register.md)** — Comprehensive asset inventory with risk classifications
|
|
488
|
+
- **[📉 Risk Register](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Risk_Register.md)** — Risk identification, assessment, treatment, and monitoring
|
|
489
|
+
- **[📊 Risk Assessment Methodology](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Risk_Assessment_Methodology.md)** — Systematic risk evaluation framework
|
|
490
|
+
- **[✅ Compliance Checklist](https://github.com/Hack23/ISMS-PUBLIC/blob/main/Compliance_Checklist.md)** — Regulatory requirement tracking and attestation
|
|
491
|
+
|
|
492
|
+
**🎯 Framework Benefits for CRA Compliance:**
|
|
493
|
+
|
|
494
|
+
- **🔄 Process Maturity:** Established ISMS demonstrates systematic security management capabilities
|
|
495
|
+
- **📋 Evidence Repository:** Comprehensive documentation supports CRA technical file requirements
|
|
496
|
+
- **🛡️ Control Effectiveness:** Implemented security measures provide concrete evidence of essential requirements
|
|
497
|
+
- **📊 Continuous Improvement:** Metrics and review cycles demonstrate ongoing security posture management
|
|
498
|
+
- **🤝 Stakeholder Confidence:** Transparent practices showcase professional cybersecurity consulting expertise
|
|
499
|
+
|
|
500
|
+
---
|
|
501
|
+
|
|
502
|
+
**Document Control:**
|
|
503
|
+
**Approved by:** James Pether Sörling, CEO
|
|
504
|
+
**Distribution:** Public
|
|
505
|
+
**Classification:** [](https://github.com/Hack23/ISMS-PUBLIC/blob/main/CLASSIFICATION.md#confidentiality-levels)
|
|
506
|
+
**Effective Date:** 2026-03-19
|
|
507
|
+
**CRA Alignment:** Template supports CRA Annex V technical documentation and self-assessment requirements
|
|
508
|
+
**ISMS Integration:** Comprehensive alignment with public ISMS framework for operational excellence
|