bmad-plus 0.4.3 → 0.5.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (133) hide show
  1. package/CHANGELOG.md +48 -0
  2. package/README.md +4 -3
  3. package/package.json +5 -1
  4. package/readme-international/README.de.md +2 -2
  5. package/readme-international/README.es.md +2 -2
  6. package/readme-international/README.fr.md +2 -2
  7. package/src/bmad-plus/module.yaml +43 -12
  8. package/src/bmad-plus/packs/pack-shield/README.md +110 -0
  9. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
  10. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
  11. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
  12. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
  13. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
  14. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
  15. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
  16. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
  17. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
  18. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
  19. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
  20. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
  21. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
  22. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
  23. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
  24. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
  25. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
  26. package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
  27. package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
  28. package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
  29. package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
  30. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
  31. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
  32. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
  33. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
  34. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
  35. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
  36. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
  37. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
  38. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
  39. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
  40. package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
  41. package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
  42. package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
  43. package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
  44. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
  45. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
  46. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
  47. package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
  48. package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
  49. package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
  50. package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
  51. package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
  52. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
  53. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
  54. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
  55. package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
  56. package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
  57. package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
  58. package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
  59. package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
  60. package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
  61. package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
  62. package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
  63. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
  64. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
  65. package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
  66. package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
  67. package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
  68. package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
  69. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
  70. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
  71. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
  72. package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
  73. package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
  74. package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
  75. package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
  76. package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
  77. package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
  78. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
  79. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
  80. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
  81. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
  82. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
  83. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
  84. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
  85. package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
  86. package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
  87. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
  88. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
  89. package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
  90. package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
  91. package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
  92. package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
  93. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
  94. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
  95. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
  96. package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
  97. package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
  98. package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
  99. package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
  100. package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
  101. package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
  102. package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
  103. package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
  104. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
  105. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
  106. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
  107. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
  108. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
  109. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
  110. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
  111. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
  112. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
  113. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
  114. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
  115. package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
  116. package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
  117. package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
  118. package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
  119. package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
  120. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
  121. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
  122. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
  123. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
  124. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
  125. package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
  126. package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
  127. package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
  128. package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
  129. package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
  130. package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
  131. package/tools/cli/commands/install.js +22 -9
  132. package/tools/cli/commands/update.js +4 -2
  133. package/tools/cli/i18n.js +514 -394
@@ -0,0 +1,252 @@
1
+ # CIS Controls v8 — All 153 Safeguards Detail
2
+
3
+ ## How to Use This Reference
4
+
5
+ Each safeguard entry shows:
6
+ - **Safeguard ID:** CIS Control # . Safeguard #
7
+ - **Title:** Official CIS safeguard name
8
+ - **IG:** Minimum implementation group (1, 2, or 3)
9
+ - **Asset Type:** Devices / Software / Data / Users / Network / Applications
10
+ - **Security Function:** Govern / Identify / Protect / Detect / Respond / Recover
11
+ - **Implementation Notes:** Practical guidance on what to do
12
+
13
+ ---
14
+
15
+ ## CIS Control 1: Inventory and Control of Enterprise Assets
16
+
17
+ | Safeguard | Title | IG | Asset Type | Security Function |
18
+ |-----------|-------|-----|-----------|------------------|
19
+ | 1.1 | Establish and Maintain Detailed Enterprise Asset Inventory | 1 | Devices | Identify |
20
+ | 1.2 | Address Unauthorized Assets | 1 | Devices | Respond |
21
+ | 1.3 | Utilize an Active Discovery Tool | 2 | Devices | Identify |
22
+ | 1.4 | Use Dynamic Host Configuration Protocol (DHCP) Logging to Update Enterprise Asset Inventory | 1 | Devices | Identify |
23
+ | 1.5 | Use a Passive Asset Discovery Tool | 3 | Devices | Identify |
24
+
25
+ **Implementation Notes:**
26
+ - **1.1:** Maintain inventory in a CMDB, spreadsheet, or MDM tool. Include: IP address, hostname, MAC address, owner, location, OS, asset type, acquisition date
27
+ - **1.2:** Define a process for handling unauthorized devices found on network — quarantine, investigate, document
28
+ - **1.3:** Run network scanners (Nmap, Nessus, Qualys, Tenable) on scheduled basis (weekly minimum)
29
+ - **1.4:** Enable DHCP server logging; correlate logs with asset inventory; flag unknown MACs
30
+ - **1.5:** Deploy passive network TAP or IDS/NDR sensors for continuous asset detection without active scanning
31
+
32
+ **Recommended Tools:** Microsoft Intune, CrowdStrike Falcon, Tanium, Qualys VMDR, Nessus, Axonius, ServiceNow CMDB
33
+
34
+ ---
35
+
36
+ ## CIS Control 2: Inventory and Control of Software Assets
37
+
38
+ | Safeguard | Title | IG | Asset Type | Security Function |
39
+ |-----------|-------|-----|-----------|------------------|
40
+ | 2.1 | Establish and Maintain a Software Inventory | 1 | Applications | Identify |
41
+ | 2.2 | Ensure Authorized Software is Currently Supported | 1 | Applications | Protect |
42
+ | 2.3 | Address Unauthorized Software | 1 | Applications | Respond |
43
+ | 2.4 | Utilize Automated Software Inventory Tools | 2 | Applications | Identify |
44
+ | 2.5 | Allowlist Authorized Software | 2 | Applications | Protect |
45
+ | 2.6 | Allowlist Authorized Libraries | 2 | Applications | Protect |
46
+ | 2.7 | Allowlist Authorized Scripts | 2 | Applications | Protect |
47
+
48
+ **Implementation Notes:**
49
+ - **2.1:** Track all installed software: name, version, vendor, license, install date, responsible owner
50
+ - **2.2:** Identify software nearing end-of-support (EOS/EOL); plan upgrades before EOS date
51
+ - **2.3:** Detect and remove unauthorized software; consider policy/consequence for installing unauthorized tools
52
+ - **2.5:** Implement application allowlisting via Windows AppLocker, WDAC, or endpoint agents
53
+ - **2.6:** Track approved DLL, library, and package versions; use software composition analysis (SCA) for development
54
+ - **2.7:** Control scripting environments (PowerShell Constrained Language Mode, Python virtual environments)
55
+
56
+ **Recommended Tools:** Microsoft Intune, SCCM, Tanium, Flexera, Snyk (SCA), Veracode, AppLocker
57
+
58
+ ---
59
+
60
+ ## CIS Control 3: Data Protection
61
+
62
+ | Safeguard | Title | IG | Asset Type | Security Function |
63
+ |-----------|-------|-----|-----------|------------------|
64
+ | 3.1 | Establish and Maintain a Data Management Process | 1 | Data | Govern |
65
+ | 3.2 | Establish and Maintain a Data Inventory | 1 | Data | Identify |
66
+ | 3.3 | Configure Data Access Control Lists | 1 | Data | Protect |
67
+ | 3.4 | Enforce Data Retention | 1 | Data | Protect |
68
+ | 3.5 | Securely Dispose of Data | 1 | Data | Protect |
69
+ | 3.6 | Encrypt Data on End-User Devices | 2 | Data | Protect |
70
+ | 3.7 | Establish and Maintain a Data Classification Scheme | 2 | Data | Protect |
71
+ | 3.8 | Document Data Flows | 2 | Data | Identify |
72
+ | 3.9 | Encrypt Data on Removable Media | 2 | Data | Protect |
73
+ | 3.10 | Encrypt Sensitive Data in Transit | 2 | Data | Protect |
74
+ | 3.11 | Encrypt Sensitive Data at Rest | 2 | Data | Protect |
75
+ | 3.12 | Segment Data Processing and Storage Based on Sensitivity | 3 | Data | Protect |
76
+ | 3.13 | Deploy a Data Loss Prevention Solution | 3 | Data | Protect |
77
+ | 3.14 | Log Sensitive Data Access | 3 | Data | Detect |
78
+
79
+ **Implementation Notes:**
80
+ - **3.1:** Written policy covering classification, handling, retention, disposal — reviewed annually
81
+ - **3.2:** Inventory must include: data type, sensitivity, location (on-prem/cloud), owner, retention period
82
+ - **3.3:** Implement least-privilege on file shares, databases, cloud storage; review ACLs quarterly
83
+ - **3.6:** Enable full-disk encryption (BitLocker for Windows, FileVault for macOS, LUKS for Linux)
84
+ - **3.7:** Define classification labels: e.g., Public / Internal / Confidential / Restricted
85
+ - **3.10:** Enforce TLS 1.2+ for all data in transit; disable older protocols (SSL, TLS 1.0/1.1)
86
+ - **3.11:** Encrypt databases, backups, and file stores containing sensitive data
87
+ - **3.13:** Deploy DLP on email, endpoints, and cloud services to prevent data exfiltration
88
+
89
+ **Recommended Tools:** Microsoft Purview, Varonis, Symantec DLP, Zscaler, BitLocker, Vera (Digital Guardian)
90
+
91
+ ---
92
+
93
+ ## CIS Control 4: Secure Configuration
94
+
95
+ | Safeguard | Title | IG | Asset Type | Security Function |
96
+ |-----------|-------|-----|-----------|------------------|
97
+ | 4.1 | Establish and Maintain a Secure Configuration Process | 1 | Devices | Protect |
98
+ | 4.2 | Establish and Maintain a Secure Configuration Process for Network Infrastructure | 1 | Network | Protect |
99
+ | 4.3 | Configure Automatic Session Locking on Enterprise Assets | 1 | Devices/Users | Protect |
100
+ | 4.4 | Implement and Manage a Firewall on Servers | 1 | Devices | Protect |
101
+ | 4.5 | Implement and Manage a Firewall on End-User Devices | 1 | Devices | Protect |
102
+ | 4.6 | Securely Manage Enterprise Assets and Software | 2 | Devices | Protect |
103
+ | 4.7 | Manage Default Accounts on Enterprise Assets and Software | 2 | Users | Protect |
104
+ | 4.8 | Uninstall or Disable Unnecessary Services on Enterprise Assets | 2 | Devices | Protect |
105
+ | 4.9 | Configure Trusted DNS Servers on Enterprise Assets | 2 | Devices/Network | Protect |
106
+ | 4.10 | Enforce Automatic Device Lockout on Portable End-User Devices | 2 | Devices | Protect |
107
+ | 4.11 | Enforce Remote Wipe Capability on Portable End-User Devices | 2 | Devices | Protect |
108
+ | 4.12 | Separate Enterprise Workspaces on Mobile End-User Devices | 3 | Devices | Protect |
109
+
110
+ **Implementation Notes:**
111
+ - **4.1:** Use CIS Benchmarks as configuration baseline; automate hardening via Group Policy, Ansible, Chef, Puppet
112
+ - **4.2:** Apply router/switch hardening; disable unused ports, protocols, and services on network devices
113
+ - **4.3:** Set session timeout to 15 minutes or less; enforce screensaver lock via GPO/MDM
114
+ - **4.4:** Enable Windows Firewall or host-based firewall on all servers; define least-privilege inbound/outbound rules
115
+ - **4.7:** Rename or disable default admin accounts; change all default passwords immediately upon deployment
116
+ - **4.8:** Disable/uninstall: Telnet, FTP, rsh, RPC where not needed; audit running services quarterly
117
+
118
+ **CIS Benchmark Resources:** Free hardening guides available at cisecurity.org/benchmark for Windows, Linux, macOS, AWS, Azure, GCP, Kubernetes, Docker, browsers
119
+
120
+ ---
121
+
122
+ ## CIS Control 5: Account Management
123
+
124
+ | Safeguard | Title | IG | Asset Type | Security Function |
125
+ |-----------|-------|-----|-----------|------------------|
126
+ | 5.1 | Establish and Maintain an Inventory of Accounts | 1 | Users | Identify |
127
+ | 5.2 | Use Unique Passwords | 1 | Users | Protect |
128
+ | 5.3 | Disable Dormant Accounts | 1 | Users | Protect |
129
+ | 5.4 | Restrict Administrator Privileges to Dedicated Administrator Accounts | 1 | Users | Protect |
130
+ | 5.5 | Establish and Maintain an Inventory of Service Accounts | 2 | Users | Identify |
131
+ | 5.6 | Centralize Account Management | 2 | Users | Protect |
132
+
133
+ **Implementation Notes:**
134
+ - **5.1:** Inventory: all user, admin, service, and guest accounts across all systems
135
+ - **5.2:** Password policy: minimum 14 characters (or MFA required); check against breached password databases (HaveIBeenPwned); use password manager
136
+ - **5.3:** Disable accounts unused for 90 days; automate detection via IdP reporting
137
+ - **5.4:** Never use admin accounts for daily work; separate admin credentials; use PAM solutions for privileged access
138
+ - **5.5:** Service accounts: document purpose, owner, permissions; rotate passwords regularly
139
+ - **5.6:** Use Active Directory, Azure AD/Entra ID, Okta, or similar IdP as single source of truth
140
+
141
+ ---
142
+
143
+ ## CIS Control 6: Access Control Management
144
+
145
+ | Safeguard | Title | IG | Asset Type | Security Function |
146
+ |-----------|-------|-----|-----------|------------------|
147
+ | 6.1 | Establish an Access Granting Process | 1 | Users | Protect |
148
+ | 6.2 | Establish an Access Revoking Process | 1 | Users | Protect |
149
+ | 6.3 | Require MFA for Externally-Exposed Applications | 2 | Users | Protect |
150
+ | 6.4 | Require MFA for Remote Network Access | 2 | Users | Protect |
151
+ | 6.5 | Require MFA for Administrative Access | 2 | Users | Protect |
152
+ | 6.6 | Establish and Maintain an Inventory of Authentication/Authorization Systems | 2 | Users | Identify |
153
+ | 6.7 | Centralize Access Control | 2 | Users | Protect |
154
+ | 6.8 | Define and Maintain Role-Based Access Control | 2 | Users | Protect |
155
+
156
+ **Implementation Notes:**
157
+ - **6.1/6.2:** Formal access request and approval process; link to onboarding/offboarding procedures; review quarterly
158
+ - **6.3:** MFA on all SaaS, web portals, VPN, RDP — phishing-resistant MFA (FIDO2/passkeys) preferred over SMS OTP
159
+ - **6.5:** Require MFA for all admin console access (cloud management, AD, network devices)
160
+ - **6.8:** Define roles in RBAC model; avoid overly broad permissions; apply least-privilege principle
161
+
162
+ ---
163
+
164
+ ## CIS Control 7: Continuous Vulnerability Management
165
+
166
+ | Safeguard | Title | IG | Asset Type | Security Function |
167
+ |-----------|-------|-----|-----------|------------------|
168
+ | 7.1 | Establish and Maintain a Vulnerability Management Process | 1 | Devices/Apps | Protect |
169
+ | 7.2 | Establish and Maintain a Remediation Process | 1 | Devices/Apps | Respond |
170
+ | 7.3 | Perform Automated Operating System Patch Management | 1 | Devices | Protect |
171
+ | 7.4 | Perform Automated Application Patch Management | 1 | Applications | Protect |
172
+ | 7.5 | Perform Automated Vulnerability Scans of Internal Enterprise Assets | 2 | Devices | Identify |
173
+ | 7.6 | Perform Automated Vulnerability Scans of Externally Exposed Enterprise Assets | 2 | Devices/Network | Identify |
174
+ | 7.7 | Remediate Detected Vulnerabilities | 2 | Devices/Apps | Respond |
175
+
176
+ **Remediation SLAs (common industry standards):**
177
+ | CVSS Severity | Recommended Remediation Time |
178
+ |---------------|------------------------------|
179
+ | Critical (9.0–10.0) | 15 days |
180
+ | High (7.0–8.9) | 30 days |
181
+ | Medium (4.0–6.9) | 90 days |
182
+ | Low (0.1–3.9) | 180 days or risk accepted |
183
+
184
+ **Recommended Tools:** Qualys VMDR, Tenable Nessus/io, Rapid7 InsightVM, Microsoft Defender Vulnerability Management, CrowdStrike Spotlight
185
+
186
+ ---
187
+
188
+ ## CIS Control 8: Audit Log Management
189
+
190
+ | Safeguard | Title | IG | Asset Type | Security Function |
191
+ |-----------|-------|-----|-----------|------------------|
192
+ | 8.1 | Establish and Maintain an Audit Log Management Process | 1 | Network/Devices | Protect |
193
+ | 8.2 | Collect Audit Logs | 1 | Network/Devices | Detect |
194
+ | 8.3 | Ensure Adequate Audit Log Storage | 2 | Network/Devices | Protect |
195
+ | 8.4 | Standardize Time Synchronization | 2 | Network/Devices | Protect |
196
+ | 8.5 | Collect Detailed Audit Logs | 2 | Network/Devices | Detect |
197
+ | 8.6 | Collect DNS Query Audit Logs | 2 | Network | Detect |
198
+ | 8.7 | Collect URL Request Audit Logs | 2 | Network | Detect |
199
+ | 8.8 | Collect Command-Line Audit Logs | 2 | Devices | Detect |
200
+ | 8.9 | Centralize Audit Logs | 2 | Network/Devices | Detect |
201
+ | 8.10 | Retain Audit Logs | 2 | Network/Devices | Protect |
202
+ | 8.11 | Conduct Audit Log Reviews | 2 | Network/Devices | Detect |
203
+ | 8.12 | Collect Service Provider Logs | 2 | Data/Network | Detect |
204
+
205
+ **Minimum Log Retention:** 90 days hot (searchable), 1 year cold storage (regulatory minimum varies)
206
+ **Recommended Tools:** Splunk, Microsoft Sentinel, Elastic SIEM, Sumo Logic, IBM QRadar
207
+
208
+ ---
209
+
210
+ ## CIS Controls 9–18 Summary (Selected Key Safeguards)
211
+
212
+ ### Control 9: Email and Web Browser Protections
213
+ - 9.3 (IG1): Maintain/enforce email provider anti-spoofing (SPF, DKIM, DMARC)
214
+ - 9.5 (IG2): Implement DMARC policy (p=quarantine or p=reject)
215
+
216
+ ### Control 10: Malware Defenses
217
+ - 10.1 (IG1): Deploy/maintain anti-malware on all endpoints
218
+ - 10.7 (IG2): Use behavior-based/next-gen anti-malware (EDR)
219
+
220
+ ### Control 11: Data Recovery
221
+ - 11.2 (IG1): Automated backups on schedule; test restores quarterly
222
+ - 11.4 (IG1): Store backup copy isolated/offline (3-2-1 rule)
223
+
224
+ ### Control 12: Network Infrastructure Management
225
+ - 12.1 (IG1): Keep network devices firmware/OS current
226
+ - 12.7 (IG2): Require VPN for remote access with AAA
227
+
228
+ ### Control 13: Network Monitoring and Defense
229
+ - 13.1 (IG2): Centralize security event alerting (SIEM)
230
+ - 13.3 (IG2): Deploy NIDS/NIPS or NDR solution
231
+ - 13.7/13.8 (IG3): HIPS/NIPS for active blocking
232
+
233
+ ### Control 14: Security Awareness Training
234
+ - 14.2 (IG1): Annual phishing awareness training; quarterly simulations (IG2+)
235
+ - 14.6 (IG1): Train employees to recognize and report incidents
236
+
237
+ ### Control 15: Service Provider Management
238
+ - 15.1 (IG1): Inventory of all service providers with data access
239
+ - 15.4 (IG2): Contracts must include security requirements
240
+ - 15.5 (IG2): Annual risk assessment of critical service providers
241
+
242
+ ### Control 16: Application Software Security
243
+ - 16.9 (IG2): Developer security training (OWASP Top 10)
244
+ - 16.12 (IG3): SAST/DAST/IAST integrated in CI/CD pipeline
245
+
246
+ ### Control 17: Incident Response Management
247
+ - 17.4 (IG1): Document incident response plan; test annually
248
+ - 17.7 (IG2): Conduct tabletop exercises; include ransomware scenarios
249
+
250
+ ### Control 18: Penetration Testing
251
+ - 18.2 (IG2): Annual external penetration test by qualified third party
252
+ - 18.5 (IG3): Quarterly internal pen tests; red team exercises
@@ -0,0 +1,170 @@
1
+ # CMMC 2.0 — Assessment Guide: SPRS Scoring, C3PAO Process & POA&M Rules
2
+
3
+ ## SPRS Score Calculation
4
+
5
+ ### Scoring Methodology
6
+ The SPRS score is calculated per the DoD Assessment Methodology for NIST SP 800-171:
7
+ - **Starting score**: 110 points
8
+ - **Each NOT MET practice**: Deduct the assigned point value
9
+ - **Partial implementation**: Full deduction applies (no partial credit)
10
+ - **Score range**: +110 (all practices met) to −203 (all not met)
11
+ - **Submission**: Required for all Level 2 contracts; submit at sprs.csd.disa.mil
12
+
13
+ ### Point Values by Domain
14
+ Point values are assigned based on the practice's security impact:
15
+
16
+ | Domain | Practices | Total Points at Risk |
17
+ |--------|-----------|---------------------|
18
+ | AC (Access Control) | 22 | ~50 |
19
+ | AU (Audit & Accountability) | 9 | ~17 |
20
+ | CM (Configuration Management) | 9 | ~19 |
21
+ | IA (Identification & Authentication) | 11 | ~22 |
22
+ | IR (Incident Response) | 3 | ~5 |
23
+ | MA (Maintenance) | 6 | ~11 |
24
+ | MP (Media Protection) | 9 | ~8 |
25
+ | PE (Physical Protection) | 6 | ~11 |
26
+ | PS (Personnel Security) | 2 | ~4 |
27
+ | RA (Risk Assessment) | 3 | ~9 |
28
+ | CA (Security Assessment) | 4 | ~9 |
29
+ | SC (System & Communications) | 16 | ~39 |
30
+ | SI (System & Information Integrity) | 7 | ~14 |
31
+
32
+ *Exact point values per practice are published in the DoD Assessment Methodology document (v2.2, Nov 2020).*
33
+
34
+ ### Highest-Impact Practices (Largest Point Deductions)
35
+ Prioritize these when remediating — they carry the heaviest scoring weight:
36
+ 1. **AC.L2-3.1.3** — CUI flow control (5 pts)
37
+ 2. **SC.L2-3.13.8** — Encryption in transit / FIPS validated (5 pts)
38
+ 3. **SC.L2-3.13.11** — FIPS-validated cryptography (5 pts)
39
+ 4. **IA.L2-3.5.3** — Multifactor authentication (5 pts)
40
+ 5. **SI.L2-3.14.6** — Monitoring for attacks (5 pts)
41
+ 6. **AC.L2-3.1.5** — Least privilege (3 pts)
42
+ 7. **AU.L2-3.3.1** — Audit logging (3 pts)
43
+ 8. **CM.L2-3.4.1** — Baseline configuration (3 pts)
44
+
45
+ ---
46
+
47
+ ## C3PAO Assessment Process
48
+
49
+ ### Pre-Assessment (Contractor Responsibilities)
50
+ Before engaging a C3PAO, ensure:
51
+ - [ ] System Security Plan (SSP) is complete and covers all 110 practices
52
+ - [ ] System boundary is defined with network diagrams
53
+ - [ ] CUI data flows are documented
54
+ - [ ] POA&M lists all practices not yet met
55
+ - [ ] SPRS score has been self-calculated
56
+ - [ ] Personnel responsible for each practice are identified
57
+
58
+ ### Assessment Phases
59
+
60
+ **Phase 1 — Documentation Review (Remote)**
61
+ - C3PAO reviews SSP, network diagrams, policies, and POA&M
62
+ - Requests artifact list: logs, screenshots, configuration exports, training records
63
+ - Duration: 2–4 weeks
64
+
65
+ **Phase 2 — Assessment Activities (On-site or Remote)**
66
+ - Interviews with system administrators, security personnel, and executives
67
+ - Technical testing: vulnerability scans, configuration reviews, access control verification
68
+ - Observation of processes (incident response tabletop, maintenance procedures)
69
+ - Duration: 1–3 weeks depending on scope
70
+
71
+ **Phase 3 — Findings and Reporting**
72
+ - C3PAO issues Findings Report: MET, NOT MET, or NOT APPLICABLE per practice
73
+ - Contractor may provide additional evidence for disputed findings (limited window)
74
+ - Final report submitted to CMMC-AB
75
+
76
+ **Phase 4 — Certification Decision**
77
+ - **All 110 practices MET**: Full certification issued; valid 3 years
78
+ - **Limited unmet practices (non-critical)**: Conditional certification with POA&M; must remediate within 180 days
79
+ - **Critical practices unmet**: No certification; remediate and reschedule
80
+
81
+ ### Critical Practices (Cannot Have POA&M at Certification)
82
+ The following practices must be fully MET for any certification to be issued:
83
+ - AC.L2-3.1.3 (CUI flow control)
84
+ - IA.L2-3.5.3 (Multifactor authentication)
85
+ - SC.L2-3.13.8 (Encryption in transit)
86
+ - SC.L2-3.13.11 (FIPS-validated cryptography)
87
+ - SI.L2-3.14.6 (Attack monitoring)
88
+ - AU.L2-3.3.1 (Audit logging)
89
+ - IR.L2-3.6.1 (Incident response capability)
90
+
91
+ ---
92
+
93
+ ## POA&M Rules and Management
94
+
95
+ ### What Can Be in a POA&M at Certification
96
+ - Level 2: Up to a limited number of non-critical practices may remain in POA&M at time of certification
97
+ - POA&M remediation deadline: **180 days** from certification date
98
+ - Failure to remediate = certification revocation
99
+ - Level 3: No POA&M at certification — all practices must be MET
100
+
101
+ ### POA&M Entry Format
102
+
103
+ | Field | Description |
104
+ |-------|-------------|
105
+ | Practice ID | CMMC practice identifier (e.g., CM.L2-3.4.2) |
106
+ | Weakness Description | What is not implemented and why |
107
+ | Remediation Steps | Specific actions to achieve compliance |
108
+ | Milestone 1–N | Intermediate checkpoints with dates |
109
+ | Scheduled Completion | Target date for full implementation |
110
+ | Resources Required | Personnel, tools, budget |
111
+ | Status | Open / In Progress / Completed |
112
+ | Evidence of Closure | What artifacts will demonstrate completion |
113
+
114
+ ### POA&M Best Practices
115
+ - Never list a critical practice in a POA&M if seeking certification
116
+ - Update monthly; stale POA&Ms raise auditor concerns
117
+ - Link each POA&M item to the relevant SSP section
118
+ - Document root cause, not just the symptom
119
+
120
+ ---
121
+
122
+ ## Evidence Requirements by Practice Type
123
+
124
+ ### Documentary Evidence (policies, procedures, plans)
125
+ - Acceptable formats: PDF, Word, screenshots with metadata
126
+ - Must show: author, date, version, approval signature
127
+ - Examples: SSP, access control policy, incident response plan, training records
128
+
129
+ ### Technical Evidence (system configuration, logs)
130
+ - Configuration exports from firewalls, Active Directory, SIEM
131
+ - Vulnerability scan reports (authenticated scans preferred)
132
+ - MFA enrollment reports showing all privileged user enrollment
133
+ - Patch management reports showing remediation timelines
134
+
135
+ ### Interview Evidence
136
+ - Assessors will interview: ISSO/ISSM, system admins, end users, executives
137
+ - Prepare personnel to describe their security responsibilities
138
+ - Cannot substitute documentation for interview — both required
139
+
140
+ ---
141
+
142
+ ## DIBNET Incident Reporting (DFARS 7012)
143
+
144
+ DFARS 252.204-7012 mandates cyber incident reporting regardless of CMMC level:
145
+ - **Report to**: DIBNET portal (dibnet.dod.mil)
146
+ - **Deadline**: Within **72 hours** of discovering the incident
147
+ - **What to report**: Systems affected, CUI categories involved, attack vectors, forensic indicators
148
+ - **Preserve evidence**: Maintain disk images and forensic evidence for 90 days; DoD may request copies
149
+ - **Notify prime**: If you are a subcontractor, notify the prime who notifies DoD
150
+
151
+ ### What Constitutes a Reportable Incident
152
+ - Unauthorized access to systems containing CUI
153
+ - Exfiltration of CUI (actual or suspected)
154
+ - Malware detected on systems that process CUI
155
+ - Compromise of credentials that could lead to CUI access
156
+
157
+ ---
158
+
159
+ ## Common Assessment Findings
160
+
161
+ | Practice | Common Finding | Typical Remediation |
162
+ |----------|---------------|---------------------|
163
+ | IA.L2-3.5.3 | MFA not enabled for all privileged accounts or remote access | Deploy MFA solution (Azure MFA, Duo, Okta); enforce via conditional access |
164
+ | SC.L2-3.13.11 | TLS 1.0/1.1 still enabled; non-FIPS algorithms in use | Disable TLS 1.0/1.1; enable only FIPS-validated cipher suites |
165
+ | AU.L2-3.3.1 | Logs not retained per policy; not all devices log to SIEM | Deploy/configure SIEM; set 3-year retention; cover all CUI-touching systems |
166
+ | CM.L2-3.4.1 | No formal baseline configuration document | Create baseline config docs per OS/application; store in change management |
167
+ | AC.L2-3.1.5 | Excessive admin rights; shared admin accounts | Implement PAM solution; audit/remove excess privileges quarterly |
168
+ | RA.L2-3.11.2 | Vulnerability scans not authenticated; not covering all assets | Configure credentialed scans; scan all in-scope assets monthly |
169
+ | CA.L2-3.12.4 | SSP outdated or incomplete | Update SSP; review and re-approve annually or after significant changes |
170
+ | AC.L2-3.1.3 | CUI accessible to users without need-to-know | Implement data classification labels; enforce access controls at file/folder level |
@@ -0,0 +1,113 @@
1
+ # CMMC 2.0 — Level Comparison, Assessment Types & Flow-Down Rules
2
+
3
+ ## Level Comparison Table
4
+
5
+ | Attribute | Level 1 — Foundational | Level 2 — Advanced | Level 3 — Expert |
6
+ |-----------|----------------------|-------------------|-----------------|
7
+ | **Practices** | 17 (FAR 52.204-21) | 110 (NIST SP 800-171 Rev 2) | 110+ (SP 800-171 + SP 800-172 subset) |
8
+ | **Focus** | Federal Contract Information (FCI) | Controlled Unclassified Information (CUI) | CUI on highest-priority DoD programs; APT resilience |
9
+ | **Assessment type** | Annual self-assessment | Triennial C3PAO assessment (critical) OR self-assessment (non-critical) | DIBCAC-led government assessment (triennial) |
10
+ | **SPRS submission** | Yes | Yes | Yes |
11
+ | **Certification body** | Self | C3PAO (CMMC Third-Party Assessment Organization) | DIBCAC (Defense Industrial Base Cybersecurity Assessment Center) |
12
+ | **Conditional certification** | No | Yes (limited POA&M allowed) | No |
13
+ | **Who needs it** | All DoD contractors receiving/generating FCI | Contractors handling CUI on DoD contracts | Contractors on highest-priority programs (e.g., nuclear C3, certain weapons systems) |
14
+
15
+ ---
16
+
17
+ ## DFARS Clause Mapping
18
+
19
+ | DFARS Clause | Requirement | Level Implied |
20
+ |-------------|-------------|---------------|
21
+ | FAR 52.204-21 | Basic Safeguarding of FCI — 15 requirements | Level 1 baseline |
22
+ | DFARS 252.204-7012 | Safeguarding CUI; 72-hr DIBNET incident reporting; cloud = FedRAMP Moderate | Level 2 prerequisite |
23
+ | DFARS 252.204-7019 | NIST SP 800-171 self-assessment; SPRS submission required | Level 2 self-assessment |
24
+ | DFARS 252.204-7020 | DoD access to contractor assessment results in SPRS | Level 2 |
25
+ | DFARS 252.204-7021 | CMMC certification requirement; flow-down to subcontractors | Level 2 or 3 |
26
+
27
+ **Rule**: If your contract contains DFARS 252.204-7021, your CMMC level is specified in the contract. Check Section L or the Performance Work Statement.
28
+
29
+ ---
30
+
31
+ ## Assessment Process by Level
32
+
33
+ ### Level 1 — Self-Assessment
34
+ 1. Assess all 17 practices against FAR 52.204-21
35
+ 2. Calculate and submit SPRS score (17 practices, max score = 17, each = 1 point)
36
+ 3. Submit to SPRS at https://www.sprs.csd.disa.mil/
37
+ 4. Senior official affirms accuracy
38
+ 5. Repeat annually
39
+
40
+ ### Level 2 — C3PAO Assessment (Critical Programs)
41
+ 1. **Pre-assessment preparation** (6–12 months): SSP, POA&M, gap remediation
42
+ 2. **Select a C3PAO**: Must be CMMC-AB authorized; find at cyberAB.us
43
+ 3. **Contract with C3PAO**: Negotiate scope, timeline, NDA
44
+ 4. **Assessment**: C3PAO reviews evidence, interviews, observes (typically 2–4 weeks on-site/remote)
45
+ 5. **Findings**: CMMC-AB receives results; conditional certification possible with limited POA&M
46
+ 6. **Certification**: Issued by CMMC-AB; valid for 3 years
47
+ 7. **Annual affirmation**: Affirm continued compliance each year
48
+
49
+ ### Level 2 — Self-Assessment (Non-Critical Programs)
50
+ - Same 110 practices as C3PAO path
51
+ - Self-assessed by contractor; senior official affirms in SPRS
52
+ - DoD reserves right to audit; false statements = False Claims Act liability
53
+ - Must still submit SPRS score
54
+
55
+ ### Level 3 — DIBCAC Assessment
56
+ 1. Contractor must hold a current Level 2 C3PAO certification first
57
+ 2. DIBCAC (government team) conducts assessment — not contractor-selected
58
+ 3. Assesses SP 800-171 practices PLUS select SP 800-172 enhanced requirements
59
+ 4. No conditional certification — all practices must be MET
60
+ 5. Government schedules the assessment; no commercial negotiation
61
+
62
+ ---
63
+
64
+ ## Flow-Down Requirements
65
+
66
+ DFARS 252.204-7021(c) requires prime contractors to:
67
+ - Include CMMC requirements in **all subcontracts** where the subcontractor processes, stores, or transmits CUI
68
+ - Specify the required CMMC level in the subcontract
69
+ - Verify subcontractor certification before award (Level 2/3 must appear in SPRS/CMMC-AB registry)
70
+ - Flow-down applies to **all tiers** — sub-subcontractors are not exempt
71
+
72
+ **Practical implication**: If you're a prime, map your CUI to each subcontractor and determine which level applies to each. Document this in your supply chain security program.
73
+
74
+ ---
75
+
76
+ ## Timeline and Key Dates
77
+
78
+ | Milestone | Date |
79
+ |-----------|------|
80
+ | CMMC 2.0 Final Rule (32 CFR Part 170) effective | December 16, 2024 |
81
+ | DFARS rule (48 CFR Parts 204, 212, 252) effective | December 16, 2024 |
82
+ | CMMC requirements in new contracts | Phased: began Q1 2025, full rollout through 2026 |
83
+ | Level 1 self-assessments required | All contracts with FAR 52.204-21, immediately |
84
+ | Level 2 C3PAO assessments | Required when DFARS 7021 included in solicitation |
85
+
86
+ ---
87
+
88
+ ## CUI Categories Most Common in Defense Contracts
89
+
90
+ | CUI Category | Examples | Typical Contract Types |
91
+ |-------------|----------|----------------------|
92
+ | Export Controlled (CTI) | Technical data, software, drawings | Engineering, manufacturing |
93
+ | Naval Nuclear Propulsion (NOFORN) | Propulsion design data | Shipbuilding, nuclear |
94
+ | Controlled Technical Information (CTI) | ITAR/EAR-controlled technical data | Weapons systems, aerospace |
95
+ | Privacy (PII) | Personnel records | HR, health, benefits |
96
+ | Law Enforcement Sensitive | Investigation data | Base security contractors |
97
+ | Procurement/Acquisition | Pre-award contract info | Proposal/BD teams |
98
+
99
+ ---
100
+
101
+ ## Key Definitions
102
+
103
+ | Term | Definition |
104
+ |------|-----------|
105
+ | **FCI** | Federal Contract Information — information provided by or generated for the Government under contract, not intended for public release |
106
+ | **CUI** | Controlled Unclassified Information — information the Government creates or possesses that requires safeguarding per law/regulation/policy |
107
+ | **SPRS** | Supplier Performance Risk System — DoD portal where self-assessment scores are submitted |
108
+ | **C3PAO** | CMMC Third-Party Assessment Organization — authorized to conduct Level 2 assessments |
109
+ | **DIBCAC** | Defense Industrial Base Cybersecurity Assessment Center — DCSA organization conducting Level 3 government assessments |
110
+ | **CMMC-AB** | Cyber AB — accreditation body that certifies C3PAOs, assessors, and consultants |
111
+ | **OSC** | Organization Seeking Certification — the defense contractor being assessed |
112
+ | **POA&M** | Plan of Action & Milestones — documented remediation plan for unmet practices |
113
+ | **SSP** | System Security Plan — describes the system boundary, CUI flows, and control implementations |