bmad-plus 0.4.3 → 0.5.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (133) hide show
  1. package/CHANGELOG.md +48 -0
  2. package/README.md +4 -3
  3. package/package.json +5 -1
  4. package/readme-international/README.de.md +2 -2
  5. package/readme-international/README.es.md +2 -2
  6. package/readme-international/README.fr.md +2 -2
  7. package/src/bmad-plus/module.yaml +43 -12
  8. package/src/bmad-plus/packs/pack-shield/README.md +110 -0
  9. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
  10. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
  11. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
  12. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
  13. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
  14. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
  15. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
  16. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
  17. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
  18. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
  19. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
  20. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
  21. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
  22. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
  23. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
  24. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
  25. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
  26. package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
  27. package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
  28. package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
  29. package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
  30. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
  31. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
  32. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
  33. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
  34. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
  35. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
  36. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
  37. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
  38. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
  39. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
  40. package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
  41. package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
  42. package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
  43. package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
  44. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
  45. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
  46. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
  47. package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
  48. package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
  49. package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
  50. package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
  51. package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
  52. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
  53. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
  54. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
  55. package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
  56. package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
  57. package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
  58. package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
  59. package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
  60. package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
  61. package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
  62. package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
  63. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
  64. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
  65. package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
  66. package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
  67. package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
  68. package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
  69. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
  70. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
  71. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
  72. package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
  73. package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
  74. package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
  75. package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
  76. package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
  77. package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
  78. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
  79. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
  80. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
  81. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
  82. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
  83. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
  84. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
  85. package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
  86. package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
  87. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
  88. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
  89. package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
  90. package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
  91. package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
  92. package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
  93. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
  94. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
  95. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
  96. package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
  97. package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
  98. package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
  99. package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
  100. package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
  101. package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
  102. package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
  103. package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
  104. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
  105. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
  106. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
  107. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
  108. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
  109. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
  110. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
  111. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
  112. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
  113. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
  114. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
  115. package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
  116. package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
  117. package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
  118. package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
  119. package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
  120. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
  121. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
  122. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
  123. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
  124. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
  125. package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
  126. package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
  127. package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
  128. package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
  129. package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
  130. package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
  131. package/tools/cli/commands/install.js +22 -9
  132. package/tools/cli/commands/update.js +4 -2
  133. package/tools/cli/i18n.js +514 -394
@@ -0,0 +1,177 @@
1
+ # CCPA/CPRA Consumer Rights — Fulfillment Workflows
2
+
3
+ ## General Request Handling Principles
4
+
5
+ **Intake channels (§1798.130):** Businesses must provide at least two methods for submitting requests, including (where applicable) a toll-free phone number and a web form or email. Online-only businesses may provide an email address as one method.
6
+
7
+ **Identity verification:** Must verify consumer identity before disclosing or deleting PI. Verification requirements scale with sensitivity:
8
+ - For non-sensitive requests: match 2 data points the business already holds
9
+ - For sensitive PI / financial data: match 3 data points + signed declaration under penalty of perjury
10
+ - For requests submitted through an authorized agent: require written permission + verification of agent identity
11
+
12
+ **Response timelines:** 45 calendar days from receipt (extendable once by another 45 days with notice). For SPI limitation requests: 15 business days.
13
+
14
+ **Free of charge:** Requests must be fulfilled free of charge, twice per 12-month period. Businesses may charge a reasonable fee for additional requests within 12 months if manifestly unfounded or excessive.
15
+
16
+ ---
17
+
18
+ ## Right to Know (§1798.110 / §1798.115)
19
+
20
+ **What must be disclosed:**
21
+ - Specific pieces of PI collected about the consumer
22
+ - Categories of PI collected
23
+ - Categories of sources from which PI was collected
24
+ - Business or commercial purpose for collecting, selling, or sharing PI
25
+ - Categories of third parties to whom PI was disclosed
26
+ - Categories of PI sold or shared and the categories of third parties to whom it was sold/shared
27
+
28
+ **Scope:** Covers PI collected in the 12 months prior to request (and ongoing from January 1, 2022 under CPRA, with no 12-month limit for data collected after that date).
29
+
30
+ **Exceptions where disclosure can be refused:**
31
+ - Would require disclosing third-party trade secrets
32
+ - Would conflict with federal/state law
33
+ - PI collected for single one-time transaction and not retained
34
+ - PI solely for internal operations consistent with context of collection
35
+ - Solely used to complete the transaction for which collected
36
+
37
+ **Workflow:**
38
+ 1. Receive and log request with timestamp
39
+ 2. Verify consumer identity (2-point match for standard requests)
40
+ 3. Search PI systems using identifying data
41
+ 4. Compile responsive PI across all systems (CRM, analytics, ad tech, etc.)
42
+ 5. Apply exceptions — remove third-party trade secrets, conflicting legal holds
43
+ 6. Deliver response in portable, readily usable format within 45 days
44
+ 7. Provide notice if extension is needed (within original 45-day window)
45
+
46
+ ---
47
+
48
+ ## Right to Delete (§1798.105)
49
+
50
+ **Business must:**
51
+ - Delete the consumer's PI from its records
52
+ - Direct service providers and contractors to delete the PI
53
+
54
+ **Exceptions (business may retain PI if necessary to):**
55
+ 1. Complete a transaction or perform a contract
56
+ 2. Detect security incidents; protect against malicious, deceptive, fraudulent, or illegal activity
57
+ 3. Fix errors that impair intended functionality
58
+ 4. Exercise free speech or ensure another consumer's right to free speech
59
+ 5. Comply with a legal obligation (CCPA §1798.145(a))
60
+ 6. Use PI solely for internal purposes in a manner compatible with the context of collection (limited CPRA exception)
61
+ 7. Research, journalism, or statistical purposes in the public interest
62
+
63
+ **Workflow:**
64
+ 1. Receive and log deletion request
65
+ 2. Verify consumer identity
66
+ 3. Check if any exceptions apply; document reasoning if invoking an exception
67
+ 4. If proceeding with deletion: identify all PI records, propagate deletion to service providers and contractors
68
+ 5. Confirm deletion to consumer (or explain exception invoked) within 45 days
69
+ 6. Retain deletion request records (for proof of compliance) — note: retaining the request itself is not a contradiction
70
+
71
+ ---
72
+
73
+ ## Right to Correct (§1798.106) — CPRA Addition
74
+
75
+ **What the business must do:**
76
+ - Take commercially reasonable steps to correct inaccurate PI
77
+ - Instruct service providers and contractors to correct the PI
78
+ - Consumer must provide documentation if business contests the claimed inaccuracy
79
+
80
+ **Business may decline if:**
81
+ - Correction would require revealing another individual's PI
82
+ - Business disagrees the PI is inaccurate and documents its decision
83
+
84
+ **Workflow:**
85
+ 1. Receive correction request with claimed correction details
86
+ 2. Verify consumer identity
87
+ 3. Evaluate accuracy of the claimed correction (may request supporting documentation)
88
+ 4. If agreeing to correct: update all relevant systems; instruct service providers and contractors
89
+ 5. Notify consumer of outcome within 45 days
90
+
91
+ ---
92
+
93
+ ## Right to Opt-Out of Sale / Sharing (§1798.120)
94
+
95
+ **Scope:** Applies to:
96
+ - **Sale**: disclosure of PI to a third party for monetary or other valuable consideration
97
+ - **Sharing** (CPRA): disclosure of PI to a third party for cross-context behavioral advertising
98
+
99
+ **Mechanics:**
100
+ - "Do Not Sell or Share My Personal Information" link must be prominently placed on homepage and in privacy policy
101
+ - Must honor the **Global Privacy Control (GPC)** signal as a valid opt-out — the CPPA has confirmed GPC compliance is required
102
+ - Once opted out, the business must wait **12 months** before asking the consumer to re-consent
103
+
104
+ **Impact on advertising:**
105
+ - Opt-out means the business cannot pass PI (including cookie IDs, device fingerprints) to ad tech partners, ad exchanges, or DMPs for targeting
106
+ - Analytics via first-party tools that do not involve PI disclosure to third parties are typically not affected
107
+
108
+ **Workflow:**
109
+ 1. Consumer submits opt-out via link, form, or GPC signal
110
+ 2. No identity verification required for opt-out (only reasonable verification to confirm they are the consumer)
111
+ 3. Update consent/preference management platform within 15 business days
112
+ 4. Propagate opt-out to service providers and contractors engaged in sale/sharing
113
+ 5. Do not contact consumer for 12 months to ask them to reconsider
114
+
115
+ ---
116
+
117
+ ## Right to Limit Use of Sensitive Personal Information (§1798.121) — CPRA Addition
118
+
119
+ **Sensitive Personal Information (SPI) categories:**
120
+ - Social Security numbers, driver's license, passport, other government IDs
121
+ - Financial account credentials (login + security code)
122
+ - Precise geolocation (within 1/4 mile)
123
+ - Racial/ethnic origin, religious/philosophical beliefs, union membership
124
+ - Contents of consumer mail, email, or text messages (unless business is the intended recipient)
125
+ - Genetic data
126
+ - Biometric data for uniquely identifying a person
127
+ - Health/medical information
128
+ - Sexual orientation or sex life
129
+
130
+ **Permitted uses without limitation right:**
131
+ Business may use SPI without offering limitation if the purpose is:
132
+ - Performing services or providing goods reasonably expected by a consumer
133
+ - Safety, security, and integrity of services
134
+ - Short-term, transient use (e.g., contextual ad based on current session)
135
+ - Services on behalf of the business (service provider context)
136
+ - Verifying or maintaining quality of services
137
+ - Activities for which SPI was provided
138
+
139
+ **Workflow:**
140
+ 1. Provide "Limit the Use of My Sensitive Personal Information" link on homepage (alongside or combined with "Do Not Sell or Share" link)
141
+ 2. Consumer exercises right — no identity verification required beyond confirming consumer identity
142
+ 3. Process within **15 business days**
143
+ 4. Restrict use of SPI to only the permitted purposes listed above
144
+ 5. Propagate limitation to service providers and contractors
145
+
146
+ ---
147
+
148
+ ## Right to Non-Discrimination (§1798.125)
149
+
150
+ Businesses **cannot**, because a consumer exercised a CCPA/CPRA right:
151
+ - Deny goods or services
152
+ - Charge a different price (except where directly related to value of data)
153
+ - Provide a different level or quality of goods/services
154
+ - Suggest any of the above will occur
155
+
156
+ **Exception:** Businesses may offer financial incentives (loyalty programs, discounts) in exchange for PI, provided:
157
+ - The financial incentive is reasonably related to the value of the consumer's PI
158
+ - Consumer provides opt-in consent with a clear description of material terms
159
+ - Consumer can withdraw at any time
160
+
161
+ ---
162
+
163
+ ## Authorized Agent Requests
164
+
165
+ Consumers may designate an authorized agent to submit requests on their behalf. Business must:
166
+ - Require written permission from the consumer (signed authorization)
167
+ - Verify the agent's identity
168
+ - May require direct verification with the consumer as well (except for opt-out requests where agent has power of attorney)
169
+
170
+ ---
171
+
172
+ ## Record-Keeping
173
+
174
+ **CPRA requires businesses handling PI of 10M+ consumers/households** to maintain records of:
175
+ - Consumer requests and responses for 24 months
176
+ - Disclosures for 24 months
177
+ - Training records for CCPA/CPRA compliance
@@ -0,0 +1,162 @@
1
+ # CIS Controls v8 — Framework Mapping Reference
2
+
3
+ ## CIS Controls v8 ↔ NIST CSF 2.0 (Detailed)
4
+
5
+ | CIS Control | Safeguard | NIST CSF 2.0 Function | NIST CSF Category | NIST CSF Subcategory |
6
+ |------------|-----------|----------------------|-------------------|----------------------|
7
+ | 1.1 | Enterprise Asset Inventory | Identify | Asset Management (ID.AM) | ID.AM-01, ID.AM-02 |
8
+ | 1.2 | Address Unauthorized Assets | Respond | Incident Management (RS.MA) | RS.MA-01 |
9
+ | 2.1 | Software Inventory | Identify | Asset Management (ID.AM) | ID.AM-02, ID.AM-08 |
10
+ | 2.2 | Supported Software | Govern | Policy (GV.PO) | GV.PO-01 |
11
+ | 3.1 | Data Management Process | Govern | Policy (GV.PO) | GV.PO-01, GV.PO-02 |
12
+ | 3.3 | Data Access Control Lists | Protect | Data Security (PR.DS) | PR.DS-01, PR.DS-05 |
13
+ | 3.6 | Encrypt End-User Devices | Protect | Data Security (PR.DS) | PR.DS-01 |
14
+ | 3.10 | Encrypt Data in Transit | Protect | Data Security (PR.DS) | PR.DS-02 |
15
+ | 3.11 | Encrypt Data at Rest | Protect | Data Security (PR.DS) | PR.DS-01 |
16
+ | 3.13 | Data Loss Prevention | Protect | Data Security (PR.DS) | PR.DS-05 |
17
+ | 4.1 | Secure Configuration Process | Protect | Configuration Management (PR.IP) | PR.IP-01, PR.IP-03 |
18
+ | 4.4 | Firewall on Servers | Protect | Network Security (PR.IR) | PR.IR-01 |
19
+ | 5.4 | Separate Admin Accounts | Protect | Identity Management (PR.AA) | PR.AA-05 |
20
+ | 6.3 | MFA External Applications | Protect | Identity Management (PR.AA) | PR.AA-03 |
21
+ | 6.4 | MFA Remote Access | Protect | Identity Management (PR.AA) | PR.AA-03 |
22
+ | 6.5 | MFA Admin Access | Protect | Identity Management (PR.AA) | PR.AA-05 |
23
+ | 7.3 | OS Patch Management | Protect | Configuration Management (PR.IP) | PR.IP-12 |
24
+ | 7.5 | Internal Vulnerability Scans | Identify | Risk Assessment (ID.RA) | ID.RA-01 |
25
+ | 7.7 | Remediate Vulnerabilities | Protect | Configuration Management (PR.IP) | PR.IP-12 |
26
+ | 8.2 | Collect Audit Logs | Detect | Adverse Event Analysis (DE.AE) | DE.AE-02, DE.AE-03 |
27
+ | 8.9 | Centralize Audit Logs | Detect | Adverse Event Analysis (DE.AE) | DE.AE-03 |
28
+ | 8.11 | Log Reviews | Detect | Continuous Monitoring (DE.CM) | DE.CM-09 |
29
+ | 9.3 | Email Anti-Spoofing | Protect | Platform Security (PR.PS) | PR.PS-05 |
30
+ | 9.5 | DMARC | Protect | Platform Security (PR.PS) | PR.PS-05 |
31
+ | 10.1 | Anti-Malware | Protect | Platform Security (PR.PS) | PR.PS-05 |
32
+ | 10.7 | Behavior-Based AV | Detect | Continuous Monitoring (DE.CM) | DE.CM-09 |
33
+ | 11.2 | Automated Backups | Recover | Incident Recovery Plan (RC.RP) | RC.RP-05 |
34
+ | 11.4 | Isolated Backup Copy | Recover | Incident Recovery Plan (RC.RP) | RC.RP-05 |
35
+ | 12.2 | Secure Network Architecture | Protect | Network Security (PR.IR) | PR.IR-01, PR.IR-02 |
36
+ | 13.1 | Security Event Alerting | Detect | Adverse Event Analysis (DE.AE) | DE.AE-06 |
37
+ | 13.3 | Network Intrusion Detection | Detect | Continuous Monitoring (DE.CM) | DE.CM-01, DE.CM-06 |
38
+ | 14.1 | Security Awareness Program | Protect | Awareness and Training (PR.AT) | PR.AT-01, PR.AT-02 |
39
+ | 15.4 | Vendor Security Requirements | Identify | Supply Chain Risk (ID.SC) | ID.SC-02, ID.SC-04 |
40
+ | 16.1 | Secure Dev Process | Protect | Application Security (PR.PS) | PR.PS-04 |
41
+ | 17.4 | Incident Response Process | Respond | Incident Management (RS.MA) | RS.MA-01, RS.MA-02 |
42
+ | 17.7 | IR Exercises | Respond | Incident Management (RS.MA) | RS.MA-05 |
43
+ | 18.2 | External Pen Test | Identify | Risk Assessment (ID.RA) | ID.RA-05, ID.RA-06 |
44
+
45
+ ---
46
+
47
+ ## CIS Controls v8 ↔ ISO 27001:2022 Annex A (Detailed)
48
+
49
+ | CIS Control | CIS Safeguards | ISO 27001:2022 Controls |
50
+ |------------|----------------|-------------------------|
51
+ | **1 (Asset Inventory)** | 1.1, 1.2, 1.3 | 5.9 (Inventory of information and other associated assets), 8.8 (Management of technical vulnerabilities) |
52
+ | **2 (Software Inventory)** | 2.1, 2.2, 2.3 | 5.9 (Inventory), 8.8 (Technical vulnerabilities) |
53
+ | **3 (Data Protection)** | 3.1–3.14 | 5.12 (Classification), 5.13 (Labelling), 5.33 (Protection of records), 8.10 (Info deletion), 8.11 (Data masking), 8.24 (Use of cryptography) |
54
+ | **4 (Secure Config)** | 4.1–4.12 | 8.8 (Vulnerability management), 8.9 (Configuration management), 8.22 (Network segregation) |
55
+ | **5 (Account Management)** | 5.1–5.6 | 5.15 (Access control), 5.16 (Identity management), 5.18 (Access rights) |
56
+ | **6 (Access Control)** | 6.1–6.8 | 5.15 (Access control), 5.17 (Authentication info), 6.7 (Remote working), 8.2 (Privileged access rights), 8.3 (Info access restriction), 8.5 (Secure authentication) |
57
+ | **7 (Vulnerability Mgmt)** | 7.1–7.7 | 8.8 (Management of technical vulnerabilities) |
58
+ | **8 (Audit Logs)** | 8.1–8.12 | 8.15 (Logging), 8.16 (Monitoring activities), 8.17 (Clock synchronization) |
59
+ | **9 (Email/Web)** | 9.1–9.7 | 8.22 (Network segregation), 8.23 (Web filtering) |
60
+ | **10 (Malware)** | 10.1–10.7 | 8.7 (Protection against malware) |
61
+ | **11 (Data Recovery)** | 11.1–11.5 | 8.13 (Information backup), 8.14 (Redundancy) |
62
+ | **12 (Network Infra)** | 12.1–12.8 | 8.20 (Networks security), 8.21 (Security of network services), 8.22 (Network segregation) |
63
+ | **13 (Network Monitoring)** | 13.1–13.11 | 8.15 (Logging), 8.16 (Monitoring), 8.20 (Network security) |
64
+ | **14 (Security Training)** | 14.1–14.9 | 6.3 (Information security awareness/education/training), 6.8 (Information security event reporting) |
65
+ | **15 (Service Providers)** | 15.1–15.7 | 5.19 (Information security in supplier relationships), 5.20 (Addressing security in agreements), 5.21 (Managing security in ICT supply chain) |
66
+ | **16 (App Security)** | 16.1–16.14 | 8.25 (Secure development lifecycle), 8.26 (Application security requirements), 8.27 (Secure system architecture and engineering), 8.28 (Secure coding), 8.29 (Security testing in development/acceptance) |
67
+ | **17 (IR Management)** | 17.1–17.9 | 5.24 (IR planning and preparation), 5.25 (Assessment/decision on events), 5.26 (Response to incidents) |
68
+ | **18 (Pen Testing)** | 18.1–18.5 | 8.8 (Technical vulnerability management), 5.36 (Compliance with policies/standards) |
69
+
70
+ ---
71
+
72
+ ## CIS Controls v8 ↔ CMMC 2.0 (NIST SP 800-171)
73
+
74
+ | CIS Control | CMMC Domain | NIST 800-171 Requirements |
75
+ |------------|-------------|--------------------------|
76
+ | 1 (Asset Inventory) | Asset Management / System Inventory | Not explicitly in 800-171 but implied by CM.3.068 |
77
+ | 2 (Software Inventory) | Configuration Management (CM) | 3.4.1 (Baseline configurations), 3.4.2 (Configuration settings) |
78
+ | 3 (Data Protection) | Media Protection (MP) | 3.8.1–3.8.9 |
79
+ | 4 (Secure Config) | Configuration Management (CM) | 3.4.1, 3.4.2, 3.4.6, 3.4.7 |
80
+ | 5 (Account Management) | Identification & Authentication (IA) | 3.5.1, 3.5.2, 3.5.3 |
81
+ | 6 (Access Control) | Access Control (AC) | 3.1.1–3.1.22 |
82
+ | 7 (Vulnerability Mgmt) | Risk Assessment (RA) | 3.11.1, 3.11.2, 3.11.3 |
83
+ | 8 (Audit Logs) | Audit & Accountability (AU) | 3.3.1–3.3.9 |
84
+ | 9 (Email/Web) | System & Communications Protection (SC) | 3.13.6, 3.13.7 |
85
+ | 10 (Malware Defenses) | System & Information Integrity (SI) | 3.14.2, 3.14.4, 3.14.5 |
86
+ | 11 (Data Recovery) | Recovery not explicitly in 800-171 | 3.8.9 (Backup CUI on mobile devices) |
87
+ | 12 (Network Infra) | System & Communications Protection (SC) | 3.13.1, 3.13.2, 3.13.5 |
88
+ | 13 (Network Monitoring) | System & Information Integrity (SI) | 3.14.6, 3.14.7 |
89
+ | 14 (Security Training) | Awareness & Training (AT) | 3.2.1, 3.2.2, 3.2.3 |
90
+ | 15 (Service Providers) | Supply Chain Risk not explicitly in 800-171 | Implied by CM and SI |
91
+ | 16 (App Security) | System & Communications Protection (SC) | 3.13.10, 3.13.16 |
92
+ | 17 (Incident Response) | Incident Response (IR) | 3.6.1, 3.6.2, 3.6.3 |
93
+ | 18 (Pen Testing) | Not explicitly in CMMC L2, required at L3 | NIST SP 800-172: 2.11.3 |
94
+
95
+ ---
96
+
97
+ ## CIS Controls v8 ↔ SOC 2 Trust Services Criteria
98
+
99
+ | CIS Control | SOC 2 Criterion | TSC Category |
100
+ |------------|----------------|-------------|
101
+ | 1 (Asset Inventory) | CC6.1 | Common Criteria |
102
+ | 2 (Software Inventory) | CC6.1, CC6.2 | Common Criteria |
103
+ | 3 (Data Protection) | CC6.1, CC6.5, C1.1, C1.2 | Common Criteria / Confidentiality |
104
+ | 4 (Secure Config) | CC6.1, CC7.1 | Common Criteria |
105
+ | 5 (Account Management) | CC6.2, CC6.3 | Common Criteria |
106
+ | 6 (Access Control) | CC6.1, CC6.2, CC6.3 | Common Criteria |
107
+ | 7 (Vulnerability Mgmt) | CC7.1 | Common Criteria |
108
+ | 8 (Audit Logs) | CC4.1, CC7.2, CC7.3 | Common Criteria |
109
+ | 9 (Email/Web) | CC6.1, CC6.6 | Common Criteria |
110
+ | 10 (Malware) | CC6.1, CC6.8 | Common Criteria |
111
+ | 11 (Data Recovery) | A1.2, A1.3 | Availability |
112
+ | 12 (Network Infra) | CC6.1, CC6.6 | Common Criteria |
113
+ | 13 (Network Monitoring) | CC7.2, CC7.3 | Common Criteria |
114
+ | 14 (Security Training) | CC1.4, CC2.2 | Common Criteria |
115
+ | 15 (Service Providers) | CC9.2 | Common Criteria |
116
+ | 16 (App Security) | CC8.1 | Common Criteria |
117
+ | 17 (Incident Response) | CC7.3, CC7.4, CC7.5 | Common Criteria |
118
+ | 18 (Pen Testing) | CC4.1, CC4.2 | Common Criteria |
119
+
120
+ ---
121
+
122
+ ## CIS Controls v8 ↔ PCI DSS v4.0
123
+
124
+ | PCI DSS Requirement | CIS Controls |
125
+ |--------------------|-------------|
126
+ | Req 1: Install network controls | 12, 13 |
127
+ | Req 2: Secure system/network components | 4 |
128
+ | Req 3: Protect stored cardholder data | 3 |
129
+ | Req 4: Protect cardholder data in transit | 3.10 |
130
+ | Req 5: Protect against malicious software | 10 |
131
+ | Req 6: Develop/maintain secure systems | 16 |
132
+ | Req 7: Restrict access by business need | 6 |
133
+ | Req 8: Identify users and authenticate access | 5, 6 |
134
+ | Req 9: Restrict physical access | (Physical — not covered by CIS Controls) |
135
+ | Req 10: Log and monitor all access | 8 |
136
+ | Req 11: Test system/network security | 7, 18 |
137
+ | Req 12: Support information security | 1, 2, 14, 15, 17 |
138
+
139
+ ---
140
+
141
+ ## CIS Controls v7.1 vs v8 Changes
142
+
143
+ Key changes to understand if transitioning from v7.1 to v8:
144
+
145
+ | Aspect | CIS Controls v7.1 | CIS Controls v8 |
146
+ |--------|------------------|-----------------|
147
+ | Number of controls | 20 | 18 |
148
+ | Sub-controls | 171 | 153 safeguards |
149
+ | Organization | Technology type | Asset type |
150
+ | Cloud coverage | Limited | Explicit throughout |
151
+ | Mobile coverage | Limited | Integrated |
152
+ | Implementation Groups | Yes (IG1/2/3) | Yes (enhanced) |
153
+
154
+ **Controls merged/reorganized:**
155
+ - v7 Controls 4 (Controlled Use of Admin Privileges) + 16 (Account Monitoring) → v8 Control 5 (Account Management)
156
+ - v7 Controls 12 (Boundary Defense) + 13 (Data Protection) → v8 Controls 3 (Data Protection) + 12 (Network Infrastructure)
157
+ - v7 Controls 7 (Email/Web Browsers) + 8 (Malware Defenses) → v8 Controls 9 + 10
158
+
159
+ **New in v8:**
160
+ - Explicit cloud asset coverage in all applicable controls
161
+ - Service Provider Management as standalone Control 15
162
+ - Clearer Implementation Group assignments per safeguard
@@ -0,0 +1,235 @@
1
+ # CIS Controls v8 — Implementation Guidance
2
+
3
+ ## Getting Started: The Prioritization Principle
4
+
5
+ The CIS Controls are deliberately ordered by impact. Research consistently shows that implementing Controls 1–6 (the foundational six) eliminates the vast majority of cyber risk:
6
+
7
+ - **Controls 1–2** (Inventory): You can't protect what you don't know you have
8
+ - **Controls 3–6** (Protective): Prevent the most common attack paths
9
+ - **Control 7** (Vulnerability Management): Continuously reduce attack surface
10
+ - **Controls 8–18** (Detect, Respond, Recover): Build operational security capability
11
+
12
+ Start with IG1 completely before moving to IG2. IG1 is the minimum acceptable baseline for any organization.
13
+
14
+ ---
15
+
16
+ ## Implementation Group 1 (IG1) — Essential Cyber Hygiene
17
+
18
+ **Target audience:** Organizations with limited IT resources, small teams, commercially available products
19
+ **Goal:** Defend against opportunistic, non-targeted attacks (the majority of incidents affecting small organizations)
20
+
21
+ ### IG1 Quick-Start Checklist (56 Safeguards)
22
+
23
+ **Week 1-2: Know Your Assets**
24
+ - [ ] Create hardware asset inventory (all computers, servers, printers, network devices) — Safeguard 1.1
25
+ - [ ] Create software inventory (all installed applications) — Safeguard 2.1
26
+ - [ ] Document all user accounts — Safeguard 5.1
27
+ - [ ] Document all data types and where they are stored — Safeguard 3.2
28
+
29
+ **Week 3-4: Secure Configuration**
30
+ - [ ] Enable host-based firewall on all workstations and servers — Safeguards 4.4, 4.5
31
+ - [ ] Set screen lock timeout to 15 minutes — Safeguard 4.3
32
+ - [ ] Change all default passwords on network devices, routers, and systems — Safeguard 4.7
33
+ - [ ] Enable full-disk encryption on all laptops — Safeguard 3.6
34
+
35
+ **Month 2: Account and Access Controls**
36
+ - [ ] Enforce strong password policy (14+ characters) — Safeguard 5.2
37
+ - [ ] Separate admin accounts from day-to-day user accounts — Safeguard 5.4
38
+ - [ ] Disable accounts unused for 90+ days — Safeguard 5.3
39
+ - [ ] Define and document access request/revoke process — Safeguards 6.1, 6.2
40
+
41
+ **Month 2: Patch Management**
42
+ - [ ] Enable automatic OS updates on all endpoints — Safeguard 7.3
43
+ - [ ] Enable automatic application updates (browsers, Office, etc.) — Safeguard 7.4
44
+ - [ ] Define a remediation SLA (e.g., critical patches within 15 days) — Safeguard 7.2
45
+
46
+ **Month 3: Backups, Training, Incident Response**
47
+ - [ ] Implement automated, tested backups (3-2-1 rule) — Safeguard 11.2, 11.4
48
+ - [ ] Conduct security awareness training for all employees — Safeguard 14.1, 14.2
49
+ - [ ] Document a basic incident response procedure — Safeguard 17.4
50
+ - [ ] Enable and retain basic audit logs (auth events, admin actions) — Safeguards 8.1, 8.2
51
+
52
+ ---
53
+
54
+ ## Implementation Group 2 (IG2) — Intermediate Controls
55
+
56
+ **Target audience:** Organizations with dedicated IT staff, sensitive data, moderate risk tolerance
57
+ **Goal:** Defend against more sophisticated, targeted attacks; comply with common regulatory frameworks
58
+
59
+ ### Key IG2 Additions Beyond IG1
60
+
61
+ **MFA Everywhere (Control 6)**
62
+ - Deploy MFA on all externally accessible systems (VPN, webmail, SaaS, remote access) — Safeguard 6.3
63
+ - Require MFA for administrative access — Safeguard 6.5
64
+ - Phishing-resistant MFA (FIDO2/hardware keys) for privileged users
65
+
66
+ **Application Allowlisting (Control 2)**
67
+ - Implement application allowlisting via Microsoft AppLocker, WDAC, or Carbon Black
68
+ - Allowlist approved scripts (PowerShell Constrained Language Mode) — Safeguard 2.7
69
+ - Block unauthorized DLLs and libraries — Safeguard 2.6
70
+
71
+ **Vulnerability Scanning (Control 7)**
72
+ - Deploy authenticated vulnerability scanner (Nessus, Qualys, Tenable, Rapid7)
73
+ - Weekly authenticated scans of all internal assets — Safeguard 7.5
74
+ - Monthly scans of external attack surface — Safeguard 7.6
75
+ - Track and remediate findings per SLA — Safeguard 7.7
76
+
77
+ **SIEM and Log Centralization (Control 8)**
78
+ - Deploy SIEM or log aggregation platform — Safeguard 8.9
79
+ - Collect: Windows event logs (4624, 4625, 4648, 4720, 4728), Linux auth.log, firewall deny logs, DNS, VPN — Safeguard 8.5
80
+ - Retain logs for minimum 12 months — Safeguard 8.10
81
+ - Enable NTP synchronization across all assets — Safeguard 8.4
82
+
83
+ **Email Security (Control 9)**
84
+ - Implement DMARC policy (start with p=none monitoring, move to p=quarantine/reject) — Safeguard 9.5
85
+ - Deploy email filtering with sandboxing — Safeguard 9.7
86
+ - Block dangerous attachment types (.exe, .js, .vbs, .bat, .macro-enabled Office) — Safeguard 9.6
87
+
88
+ **EDR/Next-Gen AV (Control 10)**
89
+ - Replace signature-only AV with EDR/XDR (CrowdStrike, SentinelOne, Microsoft Defender for Endpoint) — Safeguard 10.7
90
+ - Enable behavioral analysis and memory protection — Safeguard 10.5
91
+
92
+ **Network Architecture (Control 12)**
93
+ - Segment network by function (servers, workstations, IoT, guest Wi-Fi) — Safeguard 12.2
94
+ - Implement DMZ for externally accessible services — Safeguard 12.2
95
+ - Deploy Next-Gen Firewall with deep packet inspection — Safeguard 12.2
96
+
97
+ **Vendor Risk Management (Control 15)**
98
+ - Classify all service providers by data access and criticality — Safeguard 15.3
99
+ - Include security requirements in all vendor contracts — Safeguard 15.4
100
+ - Conduct annual vendor risk assessments for critical suppliers — Safeguard 15.5
101
+
102
+ ---
103
+
104
+ ## Implementation Group 3 (IG3) — Advanced Controls
105
+
106
+ **Target audience:** Large enterprises with security teams, sensitive regulated data, high-value targets
107
+ **Goal:** Defend against sophisticated, persistent adversaries; maintain continuous security operations
108
+
109
+ ### Key IG3 Capabilities
110
+
111
+ **Penetration Testing (Control 18)**
112
+ - External pen test: Annual minimum; quarterly for high-risk targets — Safeguard 18.2
113
+ - Internal pen test: Semi-annual — Safeguard 18.5
114
+ - Red team exercises with full adversary simulation — beyond base CIS scope
115
+ - Purple team exercises — combine red team and SOC for knowledge transfer
116
+
117
+ **Advanced Network Defense (Control 13)**
118
+ - Deploy Network Detection and Response (NDR/NTA) solution — Safeguard 13.3
119
+ - Implement SOAR for automated incident response playbooks
120
+ - HIPS on all servers — Safeguard 13.7
121
+ - Tune SIEM alert thresholds to reduce false positives — Safeguard 13.11
122
+ - Threat hunting program: proactive analysis for unknown threats
123
+
124
+ **Application Security (Control 16)**
125
+ - SAST integrated into CI/CD pipeline (pre-commit, PR gate) — Safeguard 16.12
126
+ - DAST for deployed applications (OWASP ZAP, Burp Suite) — Safeguard 16.12
127
+ - SCA for third-party components (Snyk, Black Duck) — related to 16.5
128
+ - Threat modeling for new features and applications — Safeguard 16.14
129
+ - Bug bounty program or responsible disclosure policy — related to 16.4
130
+
131
+ **Data Protection (Control 3)**
132
+ - Deploy DLP across email, endpoints, and cloud — Safeguard 3.13
133
+ - Segment data stores by sensitivity — Safeguard 3.12
134
+ - Log all access to sensitive data — Safeguard 3.14
135
+
136
+ ---
137
+
138
+ ## Common Implementation Pitfalls
139
+
140
+ ### Pitfall 1: Skipping IG1 to implement IG2/IG3 Controls
141
+ **Problem:** Organizations try to deploy SIEM before they know what assets they have
142
+ **Solution:** Complete IG1 systematically before advancing. Asset inventory (Controls 1-2) is the foundation for everything else.
143
+
144
+ ### Pitfall 2: Treating CIS Controls as a checklist, not a program
145
+ **Problem:** Point-in-time compliance; controls drift over time
146
+ **Solution:** Build operational processes: scheduled scans, monthly reporting, quarterly reviews, annual assessments
147
+
148
+ ### Pitfall 3: Ignoring cloud assets
149
+ **Problem:** Cloud VMs, SaaS apps, cloud storage not included in inventory or scans
150
+ **Solution:** CIS Controls v8 explicitly addresses cloud assets — include in all inventories; use CSPM tools (Wiz, Prisma, Defender for Cloud)
151
+
152
+ ### Pitfall 4: MFA deployment gaps
153
+ **Problem:** MFA enabled on some systems but not others; SMS OTP used for privileged access
154
+ **Solution:** Comprehensive MFA inventory; phishing-resistant MFA for privileged and external access
155
+
156
+ ### Pitfall 5: Log collection without review
157
+ **Problem:** SIEM deployed but alerts are not actioned; logs retained but never searched
158
+ **Solution:** Define alert response procedures; staff SOC or use MDR service; weekly log review as minimum
159
+
160
+ ### Pitfall 6: Patch management without vulnerability scanning
161
+ **Problem:** Patching OS only; missing application and firmware vulnerabilities
162
+ **Solution:** Authenticated vulnerability scanning to identify all missing patches, misconfigurations, and CVEs
163
+
164
+ ---
165
+
166
+ ## Metrics and KPIs for CIS Controls
167
+
168
+ ### IG1 KPIs
169
+ | Metric | Target | Frequency |
170
+ |--------|--------|-----------|
171
+ | % assets in inventory | ≥ 95% | Monthly |
172
+ | % endpoints with current AV | 100% | Weekly |
173
+ | % endpoints with disk encryption | 100% | Monthly |
174
+ | Critical patches applied within SLA | ≥ 95% | Monthly |
175
+ | % accounts with strong passwords | 100% | Quarterly |
176
+ | Backup test success rate | 100% | Quarterly |
177
+
178
+ ### IG2 KPIs
179
+ | Metric | Target | Frequency |
180
+ |--------|--------|-----------|
181
+ | % external systems with MFA | 100% | Monthly |
182
+ | Mean Time to Patch (MTTP) — Critical | ≤ 15 days | Monthly |
183
+ | Mean Time to Patch (MTTP) — High | ≤ 30 days | Monthly |
184
+ | SIEM alert response rate | ≥ 90% actioned | Weekly |
185
+ | Phishing click rate (simulation) | ≤ 5% | Quarterly |
186
+ | Vendor assessments completed | 100% of critical | Annual |
187
+
188
+ ### IG3 KPIs
189
+ | Metric | Target | Frequency |
190
+ |--------|--------|-----------|
191
+ | Pen test critical findings remediated | 100% within 30 days | After test |
192
+ | Mean Time to Detect (MTTD) | ≤ 24 hours | Monthly |
193
+ | Mean Time to Respond (MTTR) | ≤ 4 hours for P1 | Monthly |
194
+ | SAST scan coverage | 100% of repos | Per commit |
195
+ | DLP policy violation rate | Trending down | Monthly |
196
+
197
+ ---
198
+
199
+ ## CIS CSAT Tool
200
+
201
+ The **CIS Controls Self-Assessment Tool (CSAT)** is a free web-based platform from CIS:
202
+ - URL: https://csat.cisecurity.org/
203
+ - Maps to all 153 safeguards
204
+ - Generates maturity scores and prioritized gap reports
205
+ - Supports team collaboration and tracking
206
+ - Produces executive summary reports
207
+
208
+ **CIS SecureSuite Membership** provides access to additional resources:
209
+ - CIS Benchmarks (configuration hardening guides for 100+ technologies)
210
+ - CIS-CAT Pro (automated configuration assessment tool)
211
+ - CIS RAM (Risk Assessment Method)
212
+ - Priority and quick-start guides by sector
213
+
214
+ ---
215
+
216
+ ## Industry-Specific Guidance
217
+
218
+ ### Healthcare (HIPAA alignment)
219
+ - Priority: Controls 3 (PHI data protection), 6 (access control), 8 (audit logging), 17 (incident response)
220
+ - IG2 minimum for any covered entity or business associate
221
+ - Map CIS Controls to HIPAA Security Rule safeguards
222
+
223
+ ### Finance (PCI DSS / GLBA alignment)
224
+ - Priority: Controls 3, 6, 8, 12, 16 for cardholder data environments
225
+ - IG2 minimum; IG3 for large financial institutions
226
+ - CIS Controls v8 maps closely to PCI DSS v4.0 requirements
227
+
228
+ ### Government (FISMA / CMMC alignment)
229
+ - Priority: Full IG2 implementation for CMMC Level 2; IG3 elements for CMMC Level 3
230
+ - CIS Controls map to NIST SP 800-171 requirements used in CMMC
231
+ - Essential Eight (Australian cyber) aligns with CIS Controls 1-10
232
+
233
+ ### Education (FERPA alignment)
234
+ - Priority: Controls 1-7 for student data protection
235
+ - IG1 minimum for K-12; IG2 for higher education with research data