bmad-plus 0.4.3 → 0.5.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +48 -0
- package/README.md +4 -3
- package/package.json +5 -1
- package/readme-international/README.de.md +2 -2
- package/readme-international/README.es.md +2 -2
- package/readme-international/README.fr.md +2 -2
- package/src/bmad-plus/module.yaml +43 -12
- package/src/bmad-plus/packs/pack-shield/README.md +110 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
- package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
- package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
- package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
- package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
- package/tools/cli/commands/install.js +22 -9
- package/tools/cli/commands/update.js +4 -2
- package/tools/cli/i18n.js +514 -394
|
@@ -0,0 +1,177 @@
|
|
|
1
|
+
# CCPA/CPRA Consumer Rights — Fulfillment Workflows
|
|
2
|
+
|
|
3
|
+
## General Request Handling Principles
|
|
4
|
+
|
|
5
|
+
**Intake channels (§1798.130):** Businesses must provide at least two methods for submitting requests, including (where applicable) a toll-free phone number and a web form or email. Online-only businesses may provide an email address as one method.
|
|
6
|
+
|
|
7
|
+
**Identity verification:** Must verify consumer identity before disclosing or deleting PI. Verification requirements scale with sensitivity:
|
|
8
|
+
- For non-sensitive requests: match 2 data points the business already holds
|
|
9
|
+
- For sensitive PI / financial data: match 3 data points + signed declaration under penalty of perjury
|
|
10
|
+
- For requests submitted through an authorized agent: require written permission + verification of agent identity
|
|
11
|
+
|
|
12
|
+
**Response timelines:** 45 calendar days from receipt (extendable once by another 45 days with notice). For SPI limitation requests: 15 business days.
|
|
13
|
+
|
|
14
|
+
**Free of charge:** Requests must be fulfilled free of charge, twice per 12-month period. Businesses may charge a reasonable fee for additional requests within 12 months if manifestly unfounded or excessive.
|
|
15
|
+
|
|
16
|
+
---
|
|
17
|
+
|
|
18
|
+
## Right to Know (§1798.110 / §1798.115)
|
|
19
|
+
|
|
20
|
+
**What must be disclosed:**
|
|
21
|
+
- Specific pieces of PI collected about the consumer
|
|
22
|
+
- Categories of PI collected
|
|
23
|
+
- Categories of sources from which PI was collected
|
|
24
|
+
- Business or commercial purpose for collecting, selling, or sharing PI
|
|
25
|
+
- Categories of third parties to whom PI was disclosed
|
|
26
|
+
- Categories of PI sold or shared and the categories of third parties to whom it was sold/shared
|
|
27
|
+
|
|
28
|
+
**Scope:** Covers PI collected in the 12 months prior to request (and ongoing from January 1, 2022 under CPRA, with no 12-month limit for data collected after that date).
|
|
29
|
+
|
|
30
|
+
**Exceptions where disclosure can be refused:**
|
|
31
|
+
- Would require disclosing third-party trade secrets
|
|
32
|
+
- Would conflict with federal/state law
|
|
33
|
+
- PI collected for single one-time transaction and not retained
|
|
34
|
+
- PI solely for internal operations consistent with context of collection
|
|
35
|
+
- Solely used to complete the transaction for which collected
|
|
36
|
+
|
|
37
|
+
**Workflow:**
|
|
38
|
+
1. Receive and log request with timestamp
|
|
39
|
+
2. Verify consumer identity (2-point match for standard requests)
|
|
40
|
+
3. Search PI systems using identifying data
|
|
41
|
+
4. Compile responsive PI across all systems (CRM, analytics, ad tech, etc.)
|
|
42
|
+
5. Apply exceptions — remove third-party trade secrets, conflicting legal holds
|
|
43
|
+
6. Deliver response in portable, readily usable format within 45 days
|
|
44
|
+
7. Provide notice if extension is needed (within original 45-day window)
|
|
45
|
+
|
|
46
|
+
---
|
|
47
|
+
|
|
48
|
+
## Right to Delete (§1798.105)
|
|
49
|
+
|
|
50
|
+
**Business must:**
|
|
51
|
+
- Delete the consumer's PI from its records
|
|
52
|
+
- Direct service providers and contractors to delete the PI
|
|
53
|
+
|
|
54
|
+
**Exceptions (business may retain PI if necessary to):**
|
|
55
|
+
1. Complete a transaction or perform a contract
|
|
56
|
+
2. Detect security incidents; protect against malicious, deceptive, fraudulent, or illegal activity
|
|
57
|
+
3. Fix errors that impair intended functionality
|
|
58
|
+
4. Exercise free speech or ensure another consumer's right to free speech
|
|
59
|
+
5. Comply with a legal obligation (CCPA §1798.145(a))
|
|
60
|
+
6. Use PI solely for internal purposes in a manner compatible with the context of collection (limited CPRA exception)
|
|
61
|
+
7. Research, journalism, or statistical purposes in the public interest
|
|
62
|
+
|
|
63
|
+
**Workflow:**
|
|
64
|
+
1. Receive and log deletion request
|
|
65
|
+
2. Verify consumer identity
|
|
66
|
+
3. Check if any exceptions apply; document reasoning if invoking an exception
|
|
67
|
+
4. If proceeding with deletion: identify all PI records, propagate deletion to service providers and contractors
|
|
68
|
+
5. Confirm deletion to consumer (or explain exception invoked) within 45 days
|
|
69
|
+
6. Retain deletion request records (for proof of compliance) — note: retaining the request itself is not a contradiction
|
|
70
|
+
|
|
71
|
+
---
|
|
72
|
+
|
|
73
|
+
## Right to Correct (§1798.106) — CPRA Addition
|
|
74
|
+
|
|
75
|
+
**What the business must do:**
|
|
76
|
+
- Take commercially reasonable steps to correct inaccurate PI
|
|
77
|
+
- Instruct service providers and contractors to correct the PI
|
|
78
|
+
- Consumer must provide documentation if business contests the claimed inaccuracy
|
|
79
|
+
|
|
80
|
+
**Business may decline if:**
|
|
81
|
+
- Correction would require revealing another individual's PI
|
|
82
|
+
- Business disagrees the PI is inaccurate and documents its decision
|
|
83
|
+
|
|
84
|
+
**Workflow:**
|
|
85
|
+
1. Receive correction request with claimed correction details
|
|
86
|
+
2. Verify consumer identity
|
|
87
|
+
3. Evaluate accuracy of the claimed correction (may request supporting documentation)
|
|
88
|
+
4. If agreeing to correct: update all relevant systems; instruct service providers and contractors
|
|
89
|
+
5. Notify consumer of outcome within 45 days
|
|
90
|
+
|
|
91
|
+
---
|
|
92
|
+
|
|
93
|
+
## Right to Opt-Out of Sale / Sharing (§1798.120)
|
|
94
|
+
|
|
95
|
+
**Scope:** Applies to:
|
|
96
|
+
- **Sale**: disclosure of PI to a third party for monetary or other valuable consideration
|
|
97
|
+
- **Sharing** (CPRA): disclosure of PI to a third party for cross-context behavioral advertising
|
|
98
|
+
|
|
99
|
+
**Mechanics:**
|
|
100
|
+
- "Do Not Sell or Share My Personal Information" link must be prominently placed on homepage and in privacy policy
|
|
101
|
+
- Must honor the **Global Privacy Control (GPC)** signal as a valid opt-out — the CPPA has confirmed GPC compliance is required
|
|
102
|
+
- Once opted out, the business must wait **12 months** before asking the consumer to re-consent
|
|
103
|
+
|
|
104
|
+
**Impact on advertising:**
|
|
105
|
+
- Opt-out means the business cannot pass PI (including cookie IDs, device fingerprints) to ad tech partners, ad exchanges, or DMPs for targeting
|
|
106
|
+
- Analytics via first-party tools that do not involve PI disclosure to third parties are typically not affected
|
|
107
|
+
|
|
108
|
+
**Workflow:**
|
|
109
|
+
1. Consumer submits opt-out via link, form, or GPC signal
|
|
110
|
+
2. No identity verification required for opt-out (only reasonable verification to confirm they are the consumer)
|
|
111
|
+
3. Update consent/preference management platform within 15 business days
|
|
112
|
+
4. Propagate opt-out to service providers and contractors engaged in sale/sharing
|
|
113
|
+
5. Do not contact consumer for 12 months to ask them to reconsider
|
|
114
|
+
|
|
115
|
+
---
|
|
116
|
+
|
|
117
|
+
## Right to Limit Use of Sensitive Personal Information (§1798.121) — CPRA Addition
|
|
118
|
+
|
|
119
|
+
**Sensitive Personal Information (SPI) categories:**
|
|
120
|
+
- Social Security numbers, driver's license, passport, other government IDs
|
|
121
|
+
- Financial account credentials (login + security code)
|
|
122
|
+
- Precise geolocation (within 1/4 mile)
|
|
123
|
+
- Racial/ethnic origin, religious/philosophical beliefs, union membership
|
|
124
|
+
- Contents of consumer mail, email, or text messages (unless business is the intended recipient)
|
|
125
|
+
- Genetic data
|
|
126
|
+
- Biometric data for uniquely identifying a person
|
|
127
|
+
- Health/medical information
|
|
128
|
+
- Sexual orientation or sex life
|
|
129
|
+
|
|
130
|
+
**Permitted uses without limitation right:**
|
|
131
|
+
Business may use SPI without offering limitation if the purpose is:
|
|
132
|
+
- Performing services or providing goods reasonably expected by a consumer
|
|
133
|
+
- Safety, security, and integrity of services
|
|
134
|
+
- Short-term, transient use (e.g., contextual ad based on current session)
|
|
135
|
+
- Services on behalf of the business (service provider context)
|
|
136
|
+
- Verifying or maintaining quality of services
|
|
137
|
+
- Activities for which SPI was provided
|
|
138
|
+
|
|
139
|
+
**Workflow:**
|
|
140
|
+
1. Provide "Limit the Use of My Sensitive Personal Information" link on homepage (alongside or combined with "Do Not Sell or Share" link)
|
|
141
|
+
2. Consumer exercises right — no identity verification required beyond confirming consumer identity
|
|
142
|
+
3. Process within **15 business days**
|
|
143
|
+
4. Restrict use of SPI to only the permitted purposes listed above
|
|
144
|
+
5. Propagate limitation to service providers and contractors
|
|
145
|
+
|
|
146
|
+
---
|
|
147
|
+
|
|
148
|
+
## Right to Non-Discrimination (§1798.125)
|
|
149
|
+
|
|
150
|
+
Businesses **cannot**, because a consumer exercised a CCPA/CPRA right:
|
|
151
|
+
- Deny goods or services
|
|
152
|
+
- Charge a different price (except where directly related to value of data)
|
|
153
|
+
- Provide a different level or quality of goods/services
|
|
154
|
+
- Suggest any of the above will occur
|
|
155
|
+
|
|
156
|
+
**Exception:** Businesses may offer financial incentives (loyalty programs, discounts) in exchange for PI, provided:
|
|
157
|
+
- The financial incentive is reasonably related to the value of the consumer's PI
|
|
158
|
+
- Consumer provides opt-in consent with a clear description of material terms
|
|
159
|
+
- Consumer can withdraw at any time
|
|
160
|
+
|
|
161
|
+
---
|
|
162
|
+
|
|
163
|
+
## Authorized Agent Requests
|
|
164
|
+
|
|
165
|
+
Consumers may designate an authorized agent to submit requests on their behalf. Business must:
|
|
166
|
+
- Require written permission from the consumer (signed authorization)
|
|
167
|
+
- Verify the agent's identity
|
|
168
|
+
- May require direct verification with the consumer as well (except for opt-out requests where agent has power of attorney)
|
|
169
|
+
|
|
170
|
+
---
|
|
171
|
+
|
|
172
|
+
## Record-Keeping
|
|
173
|
+
|
|
174
|
+
**CPRA requires businesses handling PI of 10M+ consumers/households** to maintain records of:
|
|
175
|
+
- Consumer requests and responses for 24 months
|
|
176
|
+
- Disclosures for 24 months
|
|
177
|
+
- Training records for CCPA/CPRA compliance
|
|
@@ -0,0 +1,162 @@
|
|
|
1
|
+
# CIS Controls v8 — Framework Mapping Reference
|
|
2
|
+
|
|
3
|
+
## CIS Controls v8 ↔ NIST CSF 2.0 (Detailed)
|
|
4
|
+
|
|
5
|
+
| CIS Control | Safeguard | NIST CSF 2.0 Function | NIST CSF Category | NIST CSF Subcategory |
|
|
6
|
+
|------------|-----------|----------------------|-------------------|----------------------|
|
|
7
|
+
| 1.1 | Enterprise Asset Inventory | Identify | Asset Management (ID.AM) | ID.AM-01, ID.AM-02 |
|
|
8
|
+
| 1.2 | Address Unauthorized Assets | Respond | Incident Management (RS.MA) | RS.MA-01 |
|
|
9
|
+
| 2.1 | Software Inventory | Identify | Asset Management (ID.AM) | ID.AM-02, ID.AM-08 |
|
|
10
|
+
| 2.2 | Supported Software | Govern | Policy (GV.PO) | GV.PO-01 |
|
|
11
|
+
| 3.1 | Data Management Process | Govern | Policy (GV.PO) | GV.PO-01, GV.PO-02 |
|
|
12
|
+
| 3.3 | Data Access Control Lists | Protect | Data Security (PR.DS) | PR.DS-01, PR.DS-05 |
|
|
13
|
+
| 3.6 | Encrypt End-User Devices | Protect | Data Security (PR.DS) | PR.DS-01 |
|
|
14
|
+
| 3.10 | Encrypt Data in Transit | Protect | Data Security (PR.DS) | PR.DS-02 |
|
|
15
|
+
| 3.11 | Encrypt Data at Rest | Protect | Data Security (PR.DS) | PR.DS-01 |
|
|
16
|
+
| 3.13 | Data Loss Prevention | Protect | Data Security (PR.DS) | PR.DS-05 |
|
|
17
|
+
| 4.1 | Secure Configuration Process | Protect | Configuration Management (PR.IP) | PR.IP-01, PR.IP-03 |
|
|
18
|
+
| 4.4 | Firewall on Servers | Protect | Network Security (PR.IR) | PR.IR-01 |
|
|
19
|
+
| 5.4 | Separate Admin Accounts | Protect | Identity Management (PR.AA) | PR.AA-05 |
|
|
20
|
+
| 6.3 | MFA External Applications | Protect | Identity Management (PR.AA) | PR.AA-03 |
|
|
21
|
+
| 6.4 | MFA Remote Access | Protect | Identity Management (PR.AA) | PR.AA-03 |
|
|
22
|
+
| 6.5 | MFA Admin Access | Protect | Identity Management (PR.AA) | PR.AA-05 |
|
|
23
|
+
| 7.3 | OS Patch Management | Protect | Configuration Management (PR.IP) | PR.IP-12 |
|
|
24
|
+
| 7.5 | Internal Vulnerability Scans | Identify | Risk Assessment (ID.RA) | ID.RA-01 |
|
|
25
|
+
| 7.7 | Remediate Vulnerabilities | Protect | Configuration Management (PR.IP) | PR.IP-12 |
|
|
26
|
+
| 8.2 | Collect Audit Logs | Detect | Adverse Event Analysis (DE.AE) | DE.AE-02, DE.AE-03 |
|
|
27
|
+
| 8.9 | Centralize Audit Logs | Detect | Adverse Event Analysis (DE.AE) | DE.AE-03 |
|
|
28
|
+
| 8.11 | Log Reviews | Detect | Continuous Monitoring (DE.CM) | DE.CM-09 |
|
|
29
|
+
| 9.3 | Email Anti-Spoofing | Protect | Platform Security (PR.PS) | PR.PS-05 |
|
|
30
|
+
| 9.5 | DMARC | Protect | Platform Security (PR.PS) | PR.PS-05 |
|
|
31
|
+
| 10.1 | Anti-Malware | Protect | Platform Security (PR.PS) | PR.PS-05 |
|
|
32
|
+
| 10.7 | Behavior-Based AV | Detect | Continuous Monitoring (DE.CM) | DE.CM-09 |
|
|
33
|
+
| 11.2 | Automated Backups | Recover | Incident Recovery Plan (RC.RP) | RC.RP-05 |
|
|
34
|
+
| 11.4 | Isolated Backup Copy | Recover | Incident Recovery Plan (RC.RP) | RC.RP-05 |
|
|
35
|
+
| 12.2 | Secure Network Architecture | Protect | Network Security (PR.IR) | PR.IR-01, PR.IR-02 |
|
|
36
|
+
| 13.1 | Security Event Alerting | Detect | Adverse Event Analysis (DE.AE) | DE.AE-06 |
|
|
37
|
+
| 13.3 | Network Intrusion Detection | Detect | Continuous Monitoring (DE.CM) | DE.CM-01, DE.CM-06 |
|
|
38
|
+
| 14.1 | Security Awareness Program | Protect | Awareness and Training (PR.AT) | PR.AT-01, PR.AT-02 |
|
|
39
|
+
| 15.4 | Vendor Security Requirements | Identify | Supply Chain Risk (ID.SC) | ID.SC-02, ID.SC-04 |
|
|
40
|
+
| 16.1 | Secure Dev Process | Protect | Application Security (PR.PS) | PR.PS-04 |
|
|
41
|
+
| 17.4 | Incident Response Process | Respond | Incident Management (RS.MA) | RS.MA-01, RS.MA-02 |
|
|
42
|
+
| 17.7 | IR Exercises | Respond | Incident Management (RS.MA) | RS.MA-05 |
|
|
43
|
+
| 18.2 | External Pen Test | Identify | Risk Assessment (ID.RA) | ID.RA-05, ID.RA-06 |
|
|
44
|
+
|
|
45
|
+
---
|
|
46
|
+
|
|
47
|
+
## CIS Controls v8 ↔ ISO 27001:2022 Annex A (Detailed)
|
|
48
|
+
|
|
49
|
+
| CIS Control | CIS Safeguards | ISO 27001:2022 Controls |
|
|
50
|
+
|------------|----------------|-------------------------|
|
|
51
|
+
| **1 (Asset Inventory)** | 1.1, 1.2, 1.3 | 5.9 (Inventory of information and other associated assets), 8.8 (Management of technical vulnerabilities) |
|
|
52
|
+
| **2 (Software Inventory)** | 2.1, 2.2, 2.3 | 5.9 (Inventory), 8.8 (Technical vulnerabilities) |
|
|
53
|
+
| **3 (Data Protection)** | 3.1–3.14 | 5.12 (Classification), 5.13 (Labelling), 5.33 (Protection of records), 8.10 (Info deletion), 8.11 (Data masking), 8.24 (Use of cryptography) |
|
|
54
|
+
| **4 (Secure Config)** | 4.1–4.12 | 8.8 (Vulnerability management), 8.9 (Configuration management), 8.22 (Network segregation) |
|
|
55
|
+
| **5 (Account Management)** | 5.1–5.6 | 5.15 (Access control), 5.16 (Identity management), 5.18 (Access rights) |
|
|
56
|
+
| **6 (Access Control)** | 6.1–6.8 | 5.15 (Access control), 5.17 (Authentication info), 6.7 (Remote working), 8.2 (Privileged access rights), 8.3 (Info access restriction), 8.5 (Secure authentication) |
|
|
57
|
+
| **7 (Vulnerability Mgmt)** | 7.1–7.7 | 8.8 (Management of technical vulnerabilities) |
|
|
58
|
+
| **8 (Audit Logs)** | 8.1–8.12 | 8.15 (Logging), 8.16 (Monitoring activities), 8.17 (Clock synchronization) |
|
|
59
|
+
| **9 (Email/Web)** | 9.1–9.7 | 8.22 (Network segregation), 8.23 (Web filtering) |
|
|
60
|
+
| **10 (Malware)** | 10.1–10.7 | 8.7 (Protection against malware) |
|
|
61
|
+
| **11 (Data Recovery)** | 11.1–11.5 | 8.13 (Information backup), 8.14 (Redundancy) |
|
|
62
|
+
| **12 (Network Infra)** | 12.1–12.8 | 8.20 (Networks security), 8.21 (Security of network services), 8.22 (Network segregation) |
|
|
63
|
+
| **13 (Network Monitoring)** | 13.1–13.11 | 8.15 (Logging), 8.16 (Monitoring), 8.20 (Network security) |
|
|
64
|
+
| **14 (Security Training)** | 14.1–14.9 | 6.3 (Information security awareness/education/training), 6.8 (Information security event reporting) |
|
|
65
|
+
| **15 (Service Providers)** | 15.1–15.7 | 5.19 (Information security in supplier relationships), 5.20 (Addressing security in agreements), 5.21 (Managing security in ICT supply chain) |
|
|
66
|
+
| **16 (App Security)** | 16.1–16.14 | 8.25 (Secure development lifecycle), 8.26 (Application security requirements), 8.27 (Secure system architecture and engineering), 8.28 (Secure coding), 8.29 (Security testing in development/acceptance) |
|
|
67
|
+
| **17 (IR Management)** | 17.1–17.9 | 5.24 (IR planning and preparation), 5.25 (Assessment/decision on events), 5.26 (Response to incidents) |
|
|
68
|
+
| **18 (Pen Testing)** | 18.1–18.5 | 8.8 (Technical vulnerability management), 5.36 (Compliance with policies/standards) |
|
|
69
|
+
|
|
70
|
+
---
|
|
71
|
+
|
|
72
|
+
## CIS Controls v8 ↔ CMMC 2.0 (NIST SP 800-171)
|
|
73
|
+
|
|
74
|
+
| CIS Control | CMMC Domain | NIST 800-171 Requirements |
|
|
75
|
+
|------------|-------------|--------------------------|
|
|
76
|
+
| 1 (Asset Inventory) | Asset Management / System Inventory | Not explicitly in 800-171 but implied by CM.3.068 |
|
|
77
|
+
| 2 (Software Inventory) | Configuration Management (CM) | 3.4.1 (Baseline configurations), 3.4.2 (Configuration settings) |
|
|
78
|
+
| 3 (Data Protection) | Media Protection (MP) | 3.8.1–3.8.9 |
|
|
79
|
+
| 4 (Secure Config) | Configuration Management (CM) | 3.4.1, 3.4.2, 3.4.6, 3.4.7 |
|
|
80
|
+
| 5 (Account Management) | Identification & Authentication (IA) | 3.5.1, 3.5.2, 3.5.3 |
|
|
81
|
+
| 6 (Access Control) | Access Control (AC) | 3.1.1–3.1.22 |
|
|
82
|
+
| 7 (Vulnerability Mgmt) | Risk Assessment (RA) | 3.11.1, 3.11.2, 3.11.3 |
|
|
83
|
+
| 8 (Audit Logs) | Audit & Accountability (AU) | 3.3.1–3.3.9 |
|
|
84
|
+
| 9 (Email/Web) | System & Communications Protection (SC) | 3.13.6, 3.13.7 |
|
|
85
|
+
| 10 (Malware Defenses) | System & Information Integrity (SI) | 3.14.2, 3.14.4, 3.14.5 |
|
|
86
|
+
| 11 (Data Recovery) | Recovery not explicitly in 800-171 | 3.8.9 (Backup CUI on mobile devices) |
|
|
87
|
+
| 12 (Network Infra) | System & Communications Protection (SC) | 3.13.1, 3.13.2, 3.13.5 |
|
|
88
|
+
| 13 (Network Monitoring) | System & Information Integrity (SI) | 3.14.6, 3.14.7 |
|
|
89
|
+
| 14 (Security Training) | Awareness & Training (AT) | 3.2.1, 3.2.2, 3.2.3 |
|
|
90
|
+
| 15 (Service Providers) | Supply Chain Risk not explicitly in 800-171 | Implied by CM and SI |
|
|
91
|
+
| 16 (App Security) | System & Communications Protection (SC) | 3.13.10, 3.13.16 |
|
|
92
|
+
| 17 (Incident Response) | Incident Response (IR) | 3.6.1, 3.6.2, 3.6.3 |
|
|
93
|
+
| 18 (Pen Testing) | Not explicitly in CMMC L2, required at L3 | NIST SP 800-172: 2.11.3 |
|
|
94
|
+
|
|
95
|
+
---
|
|
96
|
+
|
|
97
|
+
## CIS Controls v8 ↔ SOC 2 Trust Services Criteria
|
|
98
|
+
|
|
99
|
+
| CIS Control | SOC 2 Criterion | TSC Category |
|
|
100
|
+
|------------|----------------|-------------|
|
|
101
|
+
| 1 (Asset Inventory) | CC6.1 | Common Criteria |
|
|
102
|
+
| 2 (Software Inventory) | CC6.1, CC6.2 | Common Criteria |
|
|
103
|
+
| 3 (Data Protection) | CC6.1, CC6.5, C1.1, C1.2 | Common Criteria / Confidentiality |
|
|
104
|
+
| 4 (Secure Config) | CC6.1, CC7.1 | Common Criteria |
|
|
105
|
+
| 5 (Account Management) | CC6.2, CC6.3 | Common Criteria |
|
|
106
|
+
| 6 (Access Control) | CC6.1, CC6.2, CC6.3 | Common Criteria |
|
|
107
|
+
| 7 (Vulnerability Mgmt) | CC7.1 | Common Criteria |
|
|
108
|
+
| 8 (Audit Logs) | CC4.1, CC7.2, CC7.3 | Common Criteria |
|
|
109
|
+
| 9 (Email/Web) | CC6.1, CC6.6 | Common Criteria |
|
|
110
|
+
| 10 (Malware) | CC6.1, CC6.8 | Common Criteria |
|
|
111
|
+
| 11 (Data Recovery) | A1.2, A1.3 | Availability |
|
|
112
|
+
| 12 (Network Infra) | CC6.1, CC6.6 | Common Criteria |
|
|
113
|
+
| 13 (Network Monitoring) | CC7.2, CC7.3 | Common Criteria |
|
|
114
|
+
| 14 (Security Training) | CC1.4, CC2.2 | Common Criteria |
|
|
115
|
+
| 15 (Service Providers) | CC9.2 | Common Criteria |
|
|
116
|
+
| 16 (App Security) | CC8.1 | Common Criteria |
|
|
117
|
+
| 17 (Incident Response) | CC7.3, CC7.4, CC7.5 | Common Criteria |
|
|
118
|
+
| 18 (Pen Testing) | CC4.1, CC4.2 | Common Criteria |
|
|
119
|
+
|
|
120
|
+
---
|
|
121
|
+
|
|
122
|
+
## CIS Controls v8 ↔ PCI DSS v4.0
|
|
123
|
+
|
|
124
|
+
| PCI DSS Requirement | CIS Controls |
|
|
125
|
+
|--------------------|-------------|
|
|
126
|
+
| Req 1: Install network controls | 12, 13 |
|
|
127
|
+
| Req 2: Secure system/network components | 4 |
|
|
128
|
+
| Req 3: Protect stored cardholder data | 3 |
|
|
129
|
+
| Req 4: Protect cardholder data in transit | 3.10 |
|
|
130
|
+
| Req 5: Protect against malicious software | 10 |
|
|
131
|
+
| Req 6: Develop/maintain secure systems | 16 |
|
|
132
|
+
| Req 7: Restrict access by business need | 6 |
|
|
133
|
+
| Req 8: Identify users and authenticate access | 5, 6 |
|
|
134
|
+
| Req 9: Restrict physical access | (Physical — not covered by CIS Controls) |
|
|
135
|
+
| Req 10: Log and monitor all access | 8 |
|
|
136
|
+
| Req 11: Test system/network security | 7, 18 |
|
|
137
|
+
| Req 12: Support information security | 1, 2, 14, 15, 17 |
|
|
138
|
+
|
|
139
|
+
---
|
|
140
|
+
|
|
141
|
+
## CIS Controls v7.1 vs v8 Changes
|
|
142
|
+
|
|
143
|
+
Key changes to understand if transitioning from v7.1 to v8:
|
|
144
|
+
|
|
145
|
+
| Aspect | CIS Controls v7.1 | CIS Controls v8 |
|
|
146
|
+
|--------|------------------|-----------------|
|
|
147
|
+
| Number of controls | 20 | 18 |
|
|
148
|
+
| Sub-controls | 171 | 153 safeguards |
|
|
149
|
+
| Organization | Technology type | Asset type |
|
|
150
|
+
| Cloud coverage | Limited | Explicit throughout |
|
|
151
|
+
| Mobile coverage | Limited | Integrated |
|
|
152
|
+
| Implementation Groups | Yes (IG1/2/3) | Yes (enhanced) |
|
|
153
|
+
|
|
154
|
+
**Controls merged/reorganized:**
|
|
155
|
+
- v7 Controls 4 (Controlled Use of Admin Privileges) + 16 (Account Monitoring) → v8 Control 5 (Account Management)
|
|
156
|
+
- v7 Controls 12 (Boundary Defense) + 13 (Data Protection) → v8 Controls 3 (Data Protection) + 12 (Network Infrastructure)
|
|
157
|
+
- v7 Controls 7 (Email/Web Browsers) + 8 (Malware Defenses) → v8 Controls 9 + 10
|
|
158
|
+
|
|
159
|
+
**New in v8:**
|
|
160
|
+
- Explicit cloud asset coverage in all applicable controls
|
|
161
|
+
- Service Provider Management as standalone Control 15
|
|
162
|
+
- Clearer Implementation Group assignments per safeguard
|
|
@@ -0,0 +1,235 @@
|
|
|
1
|
+
# CIS Controls v8 — Implementation Guidance
|
|
2
|
+
|
|
3
|
+
## Getting Started: The Prioritization Principle
|
|
4
|
+
|
|
5
|
+
The CIS Controls are deliberately ordered by impact. Research consistently shows that implementing Controls 1–6 (the foundational six) eliminates the vast majority of cyber risk:
|
|
6
|
+
|
|
7
|
+
- **Controls 1–2** (Inventory): You can't protect what you don't know you have
|
|
8
|
+
- **Controls 3–6** (Protective): Prevent the most common attack paths
|
|
9
|
+
- **Control 7** (Vulnerability Management): Continuously reduce attack surface
|
|
10
|
+
- **Controls 8–18** (Detect, Respond, Recover): Build operational security capability
|
|
11
|
+
|
|
12
|
+
Start with IG1 completely before moving to IG2. IG1 is the minimum acceptable baseline for any organization.
|
|
13
|
+
|
|
14
|
+
---
|
|
15
|
+
|
|
16
|
+
## Implementation Group 1 (IG1) — Essential Cyber Hygiene
|
|
17
|
+
|
|
18
|
+
**Target audience:** Organizations with limited IT resources, small teams, commercially available products
|
|
19
|
+
**Goal:** Defend against opportunistic, non-targeted attacks (the majority of incidents affecting small organizations)
|
|
20
|
+
|
|
21
|
+
### IG1 Quick-Start Checklist (56 Safeguards)
|
|
22
|
+
|
|
23
|
+
**Week 1-2: Know Your Assets**
|
|
24
|
+
- [ ] Create hardware asset inventory (all computers, servers, printers, network devices) — Safeguard 1.1
|
|
25
|
+
- [ ] Create software inventory (all installed applications) — Safeguard 2.1
|
|
26
|
+
- [ ] Document all user accounts — Safeguard 5.1
|
|
27
|
+
- [ ] Document all data types and where they are stored — Safeguard 3.2
|
|
28
|
+
|
|
29
|
+
**Week 3-4: Secure Configuration**
|
|
30
|
+
- [ ] Enable host-based firewall on all workstations and servers — Safeguards 4.4, 4.5
|
|
31
|
+
- [ ] Set screen lock timeout to 15 minutes — Safeguard 4.3
|
|
32
|
+
- [ ] Change all default passwords on network devices, routers, and systems — Safeguard 4.7
|
|
33
|
+
- [ ] Enable full-disk encryption on all laptops — Safeguard 3.6
|
|
34
|
+
|
|
35
|
+
**Month 2: Account and Access Controls**
|
|
36
|
+
- [ ] Enforce strong password policy (14+ characters) — Safeguard 5.2
|
|
37
|
+
- [ ] Separate admin accounts from day-to-day user accounts — Safeguard 5.4
|
|
38
|
+
- [ ] Disable accounts unused for 90+ days — Safeguard 5.3
|
|
39
|
+
- [ ] Define and document access request/revoke process — Safeguards 6.1, 6.2
|
|
40
|
+
|
|
41
|
+
**Month 2: Patch Management**
|
|
42
|
+
- [ ] Enable automatic OS updates on all endpoints — Safeguard 7.3
|
|
43
|
+
- [ ] Enable automatic application updates (browsers, Office, etc.) — Safeguard 7.4
|
|
44
|
+
- [ ] Define a remediation SLA (e.g., critical patches within 15 days) — Safeguard 7.2
|
|
45
|
+
|
|
46
|
+
**Month 3: Backups, Training, Incident Response**
|
|
47
|
+
- [ ] Implement automated, tested backups (3-2-1 rule) — Safeguard 11.2, 11.4
|
|
48
|
+
- [ ] Conduct security awareness training for all employees — Safeguard 14.1, 14.2
|
|
49
|
+
- [ ] Document a basic incident response procedure — Safeguard 17.4
|
|
50
|
+
- [ ] Enable and retain basic audit logs (auth events, admin actions) — Safeguards 8.1, 8.2
|
|
51
|
+
|
|
52
|
+
---
|
|
53
|
+
|
|
54
|
+
## Implementation Group 2 (IG2) — Intermediate Controls
|
|
55
|
+
|
|
56
|
+
**Target audience:** Organizations with dedicated IT staff, sensitive data, moderate risk tolerance
|
|
57
|
+
**Goal:** Defend against more sophisticated, targeted attacks; comply with common regulatory frameworks
|
|
58
|
+
|
|
59
|
+
### Key IG2 Additions Beyond IG1
|
|
60
|
+
|
|
61
|
+
**MFA Everywhere (Control 6)**
|
|
62
|
+
- Deploy MFA on all externally accessible systems (VPN, webmail, SaaS, remote access) — Safeguard 6.3
|
|
63
|
+
- Require MFA for administrative access — Safeguard 6.5
|
|
64
|
+
- Phishing-resistant MFA (FIDO2/hardware keys) for privileged users
|
|
65
|
+
|
|
66
|
+
**Application Allowlisting (Control 2)**
|
|
67
|
+
- Implement application allowlisting via Microsoft AppLocker, WDAC, or Carbon Black
|
|
68
|
+
- Allowlist approved scripts (PowerShell Constrained Language Mode) — Safeguard 2.7
|
|
69
|
+
- Block unauthorized DLLs and libraries — Safeguard 2.6
|
|
70
|
+
|
|
71
|
+
**Vulnerability Scanning (Control 7)**
|
|
72
|
+
- Deploy authenticated vulnerability scanner (Nessus, Qualys, Tenable, Rapid7)
|
|
73
|
+
- Weekly authenticated scans of all internal assets — Safeguard 7.5
|
|
74
|
+
- Monthly scans of external attack surface — Safeguard 7.6
|
|
75
|
+
- Track and remediate findings per SLA — Safeguard 7.7
|
|
76
|
+
|
|
77
|
+
**SIEM and Log Centralization (Control 8)**
|
|
78
|
+
- Deploy SIEM or log aggregation platform — Safeguard 8.9
|
|
79
|
+
- Collect: Windows event logs (4624, 4625, 4648, 4720, 4728), Linux auth.log, firewall deny logs, DNS, VPN — Safeguard 8.5
|
|
80
|
+
- Retain logs for minimum 12 months — Safeguard 8.10
|
|
81
|
+
- Enable NTP synchronization across all assets — Safeguard 8.4
|
|
82
|
+
|
|
83
|
+
**Email Security (Control 9)**
|
|
84
|
+
- Implement DMARC policy (start with p=none monitoring, move to p=quarantine/reject) — Safeguard 9.5
|
|
85
|
+
- Deploy email filtering with sandboxing — Safeguard 9.7
|
|
86
|
+
- Block dangerous attachment types (.exe, .js, .vbs, .bat, .macro-enabled Office) — Safeguard 9.6
|
|
87
|
+
|
|
88
|
+
**EDR/Next-Gen AV (Control 10)**
|
|
89
|
+
- Replace signature-only AV with EDR/XDR (CrowdStrike, SentinelOne, Microsoft Defender for Endpoint) — Safeguard 10.7
|
|
90
|
+
- Enable behavioral analysis and memory protection — Safeguard 10.5
|
|
91
|
+
|
|
92
|
+
**Network Architecture (Control 12)**
|
|
93
|
+
- Segment network by function (servers, workstations, IoT, guest Wi-Fi) — Safeguard 12.2
|
|
94
|
+
- Implement DMZ for externally accessible services — Safeguard 12.2
|
|
95
|
+
- Deploy Next-Gen Firewall with deep packet inspection — Safeguard 12.2
|
|
96
|
+
|
|
97
|
+
**Vendor Risk Management (Control 15)**
|
|
98
|
+
- Classify all service providers by data access and criticality — Safeguard 15.3
|
|
99
|
+
- Include security requirements in all vendor contracts — Safeguard 15.4
|
|
100
|
+
- Conduct annual vendor risk assessments for critical suppliers — Safeguard 15.5
|
|
101
|
+
|
|
102
|
+
---
|
|
103
|
+
|
|
104
|
+
## Implementation Group 3 (IG3) — Advanced Controls
|
|
105
|
+
|
|
106
|
+
**Target audience:** Large enterprises with security teams, sensitive regulated data, high-value targets
|
|
107
|
+
**Goal:** Defend against sophisticated, persistent adversaries; maintain continuous security operations
|
|
108
|
+
|
|
109
|
+
### Key IG3 Capabilities
|
|
110
|
+
|
|
111
|
+
**Penetration Testing (Control 18)**
|
|
112
|
+
- External pen test: Annual minimum; quarterly for high-risk targets — Safeguard 18.2
|
|
113
|
+
- Internal pen test: Semi-annual — Safeguard 18.5
|
|
114
|
+
- Red team exercises with full adversary simulation — beyond base CIS scope
|
|
115
|
+
- Purple team exercises — combine red team and SOC for knowledge transfer
|
|
116
|
+
|
|
117
|
+
**Advanced Network Defense (Control 13)**
|
|
118
|
+
- Deploy Network Detection and Response (NDR/NTA) solution — Safeguard 13.3
|
|
119
|
+
- Implement SOAR for automated incident response playbooks
|
|
120
|
+
- HIPS on all servers — Safeguard 13.7
|
|
121
|
+
- Tune SIEM alert thresholds to reduce false positives — Safeguard 13.11
|
|
122
|
+
- Threat hunting program: proactive analysis for unknown threats
|
|
123
|
+
|
|
124
|
+
**Application Security (Control 16)**
|
|
125
|
+
- SAST integrated into CI/CD pipeline (pre-commit, PR gate) — Safeguard 16.12
|
|
126
|
+
- DAST for deployed applications (OWASP ZAP, Burp Suite) — Safeguard 16.12
|
|
127
|
+
- SCA for third-party components (Snyk, Black Duck) — related to 16.5
|
|
128
|
+
- Threat modeling for new features and applications — Safeguard 16.14
|
|
129
|
+
- Bug bounty program or responsible disclosure policy — related to 16.4
|
|
130
|
+
|
|
131
|
+
**Data Protection (Control 3)**
|
|
132
|
+
- Deploy DLP across email, endpoints, and cloud — Safeguard 3.13
|
|
133
|
+
- Segment data stores by sensitivity — Safeguard 3.12
|
|
134
|
+
- Log all access to sensitive data — Safeguard 3.14
|
|
135
|
+
|
|
136
|
+
---
|
|
137
|
+
|
|
138
|
+
## Common Implementation Pitfalls
|
|
139
|
+
|
|
140
|
+
### Pitfall 1: Skipping IG1 to implement IG2/IG3 Controls
|
|
141
|
+
**Problem:** Organizations try to deploy SIEM before they know what assets they have
|
|
142
|
+
**Solution:** Complete IG1 systematically before advancing. Asset inventory (Controls 1-2) is the foundation for everything else.
|
|
143
|
+
|
|
144
|
+
### Pitfall 2: Treating CIS Controls as a checklist, not a program
|
|
145
|
+
**Problem:** Point-in-time compliance; controls drift over time
|
|
146
|
+
**Solution:** Build operational processes: scheduled scans, monthly reporting, quarterly reviews, annual assessments
|
|
147
|
+
|
|
148
|
+
### Pitfall 3: Ignoring cloud assets
|
|
149
|
+
**Problem:** Cloud VMs, SaaS apps, cloud storage not included in inventory or scans
|
|
150
|
+
**Solution:** CIS Controls v8 explicitly addresses cloud assets — include in all inventories; use CSPM tools (Wiz, Prisma, Defender for Cloud)
|
|
151
|
+
|
|
152
|
+
### Pitfall 4: MFA deployment gaps
|
|
153
|
+
**Problem:** MFA enabled on some systems but not others; SMS OTP used for privileged access
|
|
154
|
+
**Solution:** Comprehensive MFA inventory; phishing-resistant MFA for privileged and external access
|
|
155
|
+
|
|
156
|
+
### Pitfall 5: Log collection without review
|
|
157
|
+
**Problem:** SIEM deployed but alerts are not actioned; logs retained but never searched
|
|
158
|
+
**Solution:** Define alert response procedures; staff SOC or use MDR service; weekly log review as minimum
|
|
159
|
+
|
|
160
|
+
### Pitfall 6: Patch management without vulnerability scanning
|
|
161
|
+
**Problem:** Patching OS only; missing application and firmware vulnerabilities
|
|
162
|
+
**Solution:** Authenticated vulnerability scanning to identify all missing patches, misconfigurations, and CVEs
|
|
163
|
+
|
|
164
|
+
---
|
|
165
|
+
|
|
166
|
+
## Metrics and KPIs for CIS Controls
|
|
167
|
+
|
|
168
|
+
### IG1 KPIs
|
|
169
|
+
| Metric | Target | Frequency |
|
|
170
|
+
|--------|--------|-----------|
|
|
171
|
+
| % assets in inventory | ≥ 95% | Monthly |
|
|
172
|
+
| % endpoints with current AV | 100% | Weekly |
|
|
173
|
+
| % endpoints with disk encryption | 100% | Monthly |
|
|
174
|
+
| Critical patches applied within SLA | ≥ 95% | Monthly |
|
|
175
|
+
| % accounts with strong passwords | 100% | Quarterly |
|
|
176
|
+
| Backup test success rate | 100% | Quarterly |
|
|
177
|
+
|
|
178
|
+
### IG2 KPIs
|
|
179
|
+
| Metric | Target | Frequency |
|
|
180
|
+
|--------|--------|-----------|
|
|
181
|
+
| % external systems with MFA | 100% | Monthly |
|
|
182
|
+
| Mean Time to Patch (MTTP) — Critical | ≤ 15 days | Monthly |
|
|
183
|
+
| Mean Time to Patch (MTTP) — High | ≤ 30 days | Monthly |
|
|
184
|
+
| SIEM alert response rate | ≥ 90% actioned | Weekly |
|
|
185
|
+
| Phishing click rate (simulation) | ≤ 5% | Quarterly |
|
|
186
|
+
| Vendor assessments completed | 100% of critical | Annual |
|
|
187
|
+
|
|
188
|
+
### IG3 KPIs
|
|
189
|
+
| Metric | Target | Frequency |
|
|
190
|
+
|--------|--------|-----------|
|
|
191
|
+
| Pen test critical findings remediated | 100% within 30 days | After test |
|
|
192
|
+
| Mean Time to Detect (MTTD) | ≤ 24 hours | Monthly |
|
|
193
|
+
| Mean Time to Respond (MTTR) | ≤ 4 hours for P1 | Monthly |
|
|
194
|
+
| SAST scan coverage | 100% of repos | Per commit |
|
|
195
|
+
| DLP policy violation rate | Trending down | Monthly |
|
|
196
|
+
|
|
197
|
+
---
|
|
198
|
+
|
|
199
|
+
## CIS CSAT Tool
|
|
200
|
+
|
|
201
|
+
The **CIS Controls Self-Assessment Tool (CSAT)** is a free web-based platform from CIS:
|
|
202
|
+
- URL: https://csat.cisecurity.org/
|
|
203
|
+
- Maps to all 153 safeguards
|
|
204
|
+
- Generates maturity scores and prioritized gap reports
|
|
205
|
+
- Supports team collaboration and tracking
|
|
206
|
+
- Produces executive summary reports
|
|
207
|
+
|
|
208
|
+
**CIS SecureSuite Membership** provides access to additional resources:
|
|
209
|
+
- CIS Benchmarks (configuration hardening guides for 100+ technologies)
|
|
210
|
+
- CIS-CAT Pro (automated configuration assessment tool)
|
|
211
|
+
- CIS RAM (Risk Assessment Method)
|
|
212
|
+
- Priority and quick-start guides by sector
|
|
213
|
+
|
|
214
|
+
---
|
|
215
|
+
|
|
216
|
+
## Industry-Specific Guidance
|
|
217
|
+
|
|
218
|
+
### Healthcare (HIPAA alignment)
|
|
219
|
+
- Priority: Controls 3 (PHI data protection), 6 (access control), 8 (audit logging), 17 (incident response)
|
|
220
|
+
- IG2 minimum for any covered entity or business associate
|
|
221
|
+
- Map CIS Controls to HIPAA Security Rule safeguards
|
|
222
|
+
|
|
223
|
+
### Finance (PCI DSS / GLBA alignment)
|
|
224
|
+
- Priority: Controls 3, 6, 8, 12, 16 for cardholder data environments
|
|
225
|
+
- IG2 minimum; IG3 for large financial institutions
|
|
226
|
+
- CIS Controls v8 maps closely to PCI DSS v4.0 requirements
|
|
227
|
+
|
|
228
|
+
### Government (FISMA / CMMC alignment)
|
|
229
|
+
- Priority: Full IG2 implementation for CMMC Level 2; IG3 elements for CMMC Level 3
|
|
230
|
+
- CIS Controls map to NIST SP 800-171 requirements used in CMMC
|
|
231
|
+
- Essential Eight (Australian cyber) aligns with CIS Controls 1-10
|
|
232
|
+
|
|
233
|
+
### Education (FERPA alignment)
|
|
234
|
+
- Priority: Controls 1-7 for student data protection
|
|
235
|
+
- IG1 minimum for K-12; IG2 for higher education with research data
|