bmad-plus 0.4.3 → 0.5.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (133) hide show
  1. package/CHANGELOG.md +48 -0
  2. package/README.md +4 -3
  3. package/package.json +5 -1
  4. package/readme-international/README.de.md +2 -2
  5. package/readme-international/README.es.md +2 -2
  6. package/readme-international/README.fr.md +2 -2
  7. package/src/bmad-plus/module.yaml +43 -12
  8. package/src/bmad-plus/packs/pack-shield/README.md +110 -0
  9. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
  10. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
  11. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
  12. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
  13. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
  14. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
  15. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
  16. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
  17. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
  18. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
  19. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
  20. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
  21. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
  22. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
  23. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
  24. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
  25. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
  26. package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
  27. package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
  28. package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
  29. package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
  30. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
  31. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
  32. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
  33. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
  34. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
  35. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
  36. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
  37. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
  38. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
  39. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
  40. package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
  41. package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
  42. package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
  43. package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
  44. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
  45. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
  46. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
  47. package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
  48. package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
  49. package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
  50. package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
  51. package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
  52. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
  53. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
  54. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
  55. package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
  56. package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
  57. package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
  58. package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
  59. package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
  60. package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
  61. package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
  62. package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
  63. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
  64. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
  65. package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
  66. package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
  67. package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
  68. package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
  69. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
  70. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
  71. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
  72. package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
  73. package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
  74. package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
  75. package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
  76. package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
  77. package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
  78. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
  79. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
  80. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
  81. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
  82. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
  83. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
  84. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
  85. package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
  86. package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
  87. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
  88. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
  89. package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
  90. package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
  91. package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
  92. package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
  93. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
  94. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
  95. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
  96. package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
  97. package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
  98. package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
  99. package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
  100. package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
  101. package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
  102. package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
  103. package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
  104. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
  105. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
  106. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
  107. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
  108. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
  109. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
  110. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
  111. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
  112. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
  113. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
  114. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
  115. package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
  116. package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
  117. package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
  118. package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
  119. package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
  120. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
  121. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
  122. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
  123. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
  124. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
  125. package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
  126. package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
  127. package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
  128. package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
  129. package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
  130. package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
  131. package/tools/cli/commands/install.js +22 -9
  132. package/tools/cli/commands/update.js +4 -2
  133. package/tools/cli/i18n.js +514 -394
@@ -0,0 +1,211 @@
1
+ # CMMC 2.0 — All 110 Practices (NIST SP 800-171 Rev 2 Mapped)
2
+
3
+ Level codes: **L1** = Level 1 (17 practices) · **L2** = Level 2 (all 110) · **L3** = Level 3 (110 + SP 800-172 enhancements)
4
+
5
+ ---
6
+
7
+ ## AC — Access Control (22 practices)
8
+
9
+ | Practice ID | Level | Requirement |
10
+ |-------------|-------|-------------|
11
+ | AC.L1-3.1.1 | L1 | Limit system access to authorized users, processes acting on behalf of authorized users, and devices (including other systems). |
12
+ | AC.L1-3.1.2 | L1 | Limit system access to the types of transactions and functions authorized users are permitted to execute. |
13
+ | AC.L2-3.1.3 | L2 | Control the flow of CUI in accordance with approved authorizations. |
14
+ | AC.L2-3.1.4 | L2 | Separate the duties of individuals to reduce the risk of malevolent activity without collusion. |
15
+ | AC.L2-3.1.5 | L2 | Employ the principle of least privilege, including for specific security functions and privileged accounts. |
16
+ | AC.L2-3.1.6 | L2 | Use non-privileged accounts or roles when accessing non-security functions. |
17
+ | AC.L2-3.1.7 | L2 | Prevent non-privileged users from executing privileged functions and capture the execution in audit logs. |
18
+ | AC.L2-3.1.8 | L2 | Limit unsuccessful logon attempts. |
19
+ | AC.L2-3.1.9 | L2 | Provide privacy and security notices consistent with CUI rules. |
20
+ | AC.L2-3.1.10 | L2 | Use session lock with pattern-hiding displays after a period of inactivity. |
21
+ | AC.L2-3.1.11 | L2 | Terminate (automatically) a user session after a defined condition. |
22
+ | AC.L2-3.1.12 | L2 | Monitor and control remote access sessions. |
23
+ | AC.L2-3.1.13 | L2 | Employ cryptographic mechanisms to protect the confidentiality of remote access sessions. |
24
+ | AC.L2-3.1.14 | L2 | Route remote access via managed access control points. |
25
+ | AC.L2-3.1.15 | L2 | Authorize remote execution of privileged commands and access to security-relevant information via remote access only for documented operational needs. |
26
+ | AC.L2-3.1.16 | L2 | Authorize wireless access prior to allowing connections. |
27
+ | AC.L2-3.1.17 | L2 | Protect wireless access using authentication and encryption. |
28
+ | AC.L2-3.1.18 | L2 | Control connection of mobile devices. |
29
+ | AC.L2-3.1.19 | L2 | Encrypt CUI on mobile devices and mobile computing platforms. |
30
+ | AC.L2-3.1.20 | L2 | Verify and control/limit connections to external systems. |
31
+ | AC.L2-3.1.21 | L2 | Limit use of portable storage devices on external systems. |
32
+ | AC.L2-3.1.22 | L2 | Control CUI posted or processed on publicly accessible systems. |
33
+
34
+ ---
35
+
36
+ ## AT — Awareness and Training (3 practices)
37
+
38
+ | Practice ID | Level | Requirement |
39
+ |-------------|-------|-------------|
40
+ | AT.L2-3.2.1 | L2 | Ensure personnel are aware of the security risks associated with their activities and policies/procedures related to CUI. |
41
+ | AT.L2-3.2.2 | L2 | Ensure personnel are trained to carry out assigned security responsibilities. |
42
+ | AT.L2-3.2.3 | L2 | Provide security awareness training on recognizing and reporting potential indicators of insider threat. |
43
+
44
+ ---
45
+
46
+ ## AU — Audit and Accountability (9 practices)
47
+
48
+ | Practice ID | Level | Requirement |
49
+ |-------------|-------|-------------|
50
+ | AU.L2-3.3.1 | L2 | Create and retain system audit logs and records to enable monitoring, analysis, investigation, and reporting of unlawful or unauthorized activity. |
51
+ | AU.L2-3.3.2 | L2 | Ensure that the actions of individual users can be uniquely traced to those users. |
52
+ | AU.L2-3.3.3 | L2 | Review and update logged events. |
53
+ | AU.L2-3.3.4 | L2 | Alert in the event of an audit logging process failure. |
54
+ | AU.L2-3.3.5 | L2 | Correlate audit record review, analysis, and reporting processes. |
55
+ | AU.L2-3.3.6 | L2 | Provide audit record reduction and report generation to support analysis and reporting. |
56
+ | AU.L2-3.3.7 | L2 | Provide a system capability that compares and synchronizes internal clocks with authoritative sources. |
57
+ | AU.L2-3.3.8 | L2 | Protect audit information and tools from unauthorized access, modification, and deletion. |
58
+ | AU.L2-3.3.9 | L2 | Limit management of audit logging to a subset of privileged users. |
59
+
60
+ ---
61
+
62
+ ## CM — Configuration Management (9 practices)
63
+
64
+ | Practice ID | Level | Requirement |
65
+ |-------------|-------|-------------|
66
+ | CM.L2-3.4.1 | L2 | Establish and maintain baseline configurations and inventories of organizational systems (hardware, software, firmware, and documentation). |
67
+ | CM.L2-3.4.2 | L2 | Establish and enforce security configuration settings for IT products employed in systems. |
68
+ | CM.L2-3.4.3 | L2 | Track, review, approve, and log changes to systems. |
69
+ | CM.L2-3.4.4 | L2 | Analyze the security impact of changes prior to implementation. |
70
+ | CM.L2-3.4.5 | L2 | Define, document, approve, and enforce physical and logical access restrictions associated with changes. |
71
+ | CM.L2-3.4.6 | L2 | Employ the principle of least functionality by configuring systems to provide only essential capabilities. |
72
+ | CM.L2-3.4.7 | L2 | Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services. |
73
+ | CM.L2-3.4.8 | L2 | Apply deny-by-exception (blacklisting) policy to prevent use of unauthorized software or deny-all, permit-by-exception (whitelisting). |
74
+ | CM.L2-3.4.9 | L2 | Control and monitor user-installed software. |
75
+
76
+ ---
77
+
78
+ ## IA — Identification and Authentication (11 practices)
79
+
80
+ | Practice ID | Level | Requirement |
81
+ |-------------|-------|-------------|
82
+ | IA.L1-3.5.1 | L1 | Identify system users, processes acting on behalf of users, and devices. |
83
+ | IA.L1-3.5.2 | L1 | Authenticate (or verify) the identities of users, processes, or devices before allowing access. |
84
+ | IA.L2-3.5.3 | L2 | Use multifactor authentication (MFA) for local and network access to privileged accounts and for network access to non-privileged accounts. |
85
+ | IA.L2-3.5.4 | L2 | Employ replay-resistant authentication mechanisms for network access. |
86
+ | IA.L2-3.5.5 | L2 | Employ identifier management to prevent reuse of identifiers for a defined period. |
87
+ | IA.L2-3.5.6 | L2 | Disable identifiers after a defined inactivity period. |
88
+ | IA.L2-3.5.7 | L2 | Enforce a minimum password complexity and change requirements. |
89
+ | IA.L2-3.5.8 | L2 | Prohibit password reuse for a specified number of generations. |
90
+ | IA.L2-3.5.9 | L2 | Allow temporary password use with immediate change requirement. |
91
+ | IA.L2-3.5.10 | L2 | Store and transmit only cryptographically-protected passwords (FIPS 140-2/3 validated). |
92
+ | IA.L2-3.5.11 | L2 | Obscure feedback of authentication information. |
93
+
94
+ ---
95
+
96
+ ## IR — Incident Response (3 practices)
97
+
98
+ | Practice ID | Level | Requirement |
99
+ |-------------|-------|-------------|
100
+ | IR.L2-3.6.1 | L2 | Establish an operational incident-handling capability including preparation, detection, analysis, containment, recovery, and user response activities. |
101
+ | IR.L2-3.6.2 | L2 | Track, document, and report incidents to designated officials and/or authorities both internal and external. |
102
+ | IR.L2-3.6.3 | L2 | Test the organizational incident response capability. |
103
+
104
+ ---
105
+
106
+ ## MA — Maintenance (6 practices)
107
+
108
+ | Practice ID | Level | Requirement |
109
+ |-------------|-------|-------------|
110
+ | MA.L2-3.7.1 | L2 | Perform maintenance on organizational systems. |
111
+ | MA.L2-3.7.2 | L2 | Provide controls on the tools, techniques, mechanisms, and personnel that conduct system maintenance. |
112
+ | MA.L2-3.7.3 | L2 | Ensure equipment removed for off-site maintenance is sanitized of CUI. |
113
+ | MA.L2-3.7.4 | L2 | Check media containing diagnostic and test programs for malicious code before the media are used. |
114
+ | MA.L2-3.7.5 | L2 | Require MFA to establish remote maintenance sessions and terminate sessions when maintenance is complete. |
115
+ | MA.L2-3.7.6 | L2 | Supervise the maintenance activities of personnel without required access authorization. |
116
+
117
+ ---
118
+
119
+ ## MP — Media Protection (9 practices)
120
+
121
+ | Practice ID | Level | Requirement |
122
+ |-------------|-------|-------------|
123
+ | MP.L1-3.8.3 | L1 | Sanitize or destroy system media before disposal or reuse. |
124
+ | MP.L2-3.8.1 | L2 | Protect (i.e., physically control and securely store) system media containing CUI, both paper and digital. |
125
+ | MP.L2-3.8.2 | L2 | Limit access to CUI on system media to authorized users. |
126
+ | MP.L2-3.8.4 | L2 | Mark media with necessary CUI markings and distribution limitations. |
127
+ | MP.L2-3.8.5 | L2 | Control access to media containing CUI and maintain accountability for media during transport. |
128
+ | MP.L2-3.8.6 | L2 | Implement cryptographic mechanisms to protect CUI during transport unless otherwise protected by alternative physical safeguards. |
129
+ | MP.L2-3.8.7 | L2 | Control the use of removable media on system components. |
130
+ | MP.L2-3.8.8 | L2 | Prohibit the use of portable storage devices when such devices have no identifiable owner. |
131
+ | MP.L2-3.8.9 | L2 | Protect the backups of CUI at storage locations. |
132
+
133
+ ---
134
+
135
+ ## PE — Physical Protection (6 practices)
136
+
137
+ | Practice ID | Level | Requirement |
138
+ |-------------|-------|-------------|
139
+ | PE.L1-3.10.1 | L1 | Limit physical access to systems to authorized individuals. |
140
+ | PE.L1-3.10.2 | L1 | Protect and monitor the physical facility and support infrastructure. |
141
+ | PE.L1-3.10.3 | L1 | Escort visitors and monitor visitor activity. |
142
+ | PE.L1-3.10.4 | L1 | Maintain audit logs of physical access. |
143
+ | PE.L1-3.10.5 | L1 | Control and manage physical access devices. |
144
+ | PE.L2-3.10.6 | L2 | Enforce safeguarding measures for CUI at alternate work sites. |
145
+
146
+ ---
147
+
148
+ ## PS — Personnel Security (2 practices)
149
+
150
+ | Practice ID | Level | Requirement |
151
+ |-------------|-------|-------------|
152
+ | PS.L2-3.9.1 | L2 | Screen individuals prior to authorizing access to systems containing CUI. |
153
+ | PS.L2-3.9.2 | L2 | Ensure CUI is protected during and after personnel actions such as terminations and transfers. |
154
+
155
+ ---
156
+
157
+ ## RA — Risk Assessment (3 practices)
158
+
159
+ | Practice ID | Level | Requirement |
160
+ |-------------|-------|-------------|
161
+ | RA.L2-3.11.1 | L2 | Periodically assess the risk to organizational operations, assets, and individuals from the operation of systems and associated CUI processing. |
162
+ | RA.L2-3.11.2 | L2 | Scan for vulnerabilities in organizational systems periodically and when new vulnerabilities affecting those systems are identified. |
163
+ | RA.L2-3.11.3 | L2 | Remediate vulnerabilities in accordance with risk assessments. |
164
+
165
+ ---
166
+
167
+ ## CA — Security Assessment (4 practices)
168
+
169
+ | Practice ID | Level | Requirement |
170
+ |-------------|-------|-------------|
171
+ | CA.L2-3.12.1 | L2 | Periodically assess the security controls in organizational systems to determine whether they are effective. |
172
+ | CA.L2-3.12.2 | L2 | Develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities. |
173
+ | CA.L2-3.12.3 | L2 | Monitor security controls on an ongoing basis to ensure the continued effectiveness. |
174
+ | CA.L2-3.12.4 | L2 | Develop, document, and periodically update system security plans (SSPs). |
175
+
176
+ ---
177
+
178
+ ## SC — System and Communications Protection (16 practices)
179
+
180
+ | Practice ID | Level | Requirement |
181
+ |-------------|-------|-------------|
182
+ | SC.L1-3.13.1 | L1 | Monitor, control, and protect communications at external boundaries and key internal boundaries. |
183
+ | SC.L1-3.13.5 | L1 | Implement subnetworks for publicly accessible system components. |
184
+ | SC.L2-3.13.2 | L2 | Employ architectural designs, software development techniques, and systems engineering principles that promote security. |
185
+ | SC.L2-3.13.3 | L2 | Separate user functionality from system management functionality. |
186
+ | SC.L2-3.13.4 | L2 | Prevent unauthorized and unintended information transfer via shared system resources. |
187
+ | SC.L2-3.13.6 | L2 | Deny network communications traffic by default and allow by exception (i.e., deny all, permit by exception). |
188
+ | SC.L2-3.13.7 | L2 | Prevent remote devices from simultaneously connecting to the system and to other resources (i.e., split tunneling). |
189
+ | SC.L2-3.13.8 | L2 | Implement cryptographic mechanisms to prevent unauthorized disclosure of CUI during transmission (FIPS 140-2/3). |
190
+ | SC.L2-3.13.9 | L2 | Terminate network connections after a defined period of inactivity. |
191
+ | SC.L2-3.13.10 | L2 | Establish and manage cryptographic keys when cryptography is employed. |
192
+ | SC.L2-3.13.11 | L2 | Employ FIPS-validated cryptography when used to protect CUI. |
193
+ | SC.L2-3.13.12 | L2 | Prohibit remote activation of collaborative computing devices and provide indication of use to users present at the device. |
194
+ | SC.L2-3.13.13 | L2 | Control and monitor the use of mobile code. |
195
+ | SC.L2-3.13.14 | L2 | Control and monitor the use of VoIP technologies. |
196
+ | SC.L2-3.13.15 | L2 | Protect the authenticity of communications sessions. |
197
+ | SC.L2-3.13.16 | L2 | Protect CUI at rest. |
198
+
199
+ ---
200
+
201
+ ## SI — System and Information Integrity (7 practices)
202
+
203
+ | Practice ID | Level | Requirement |
204
+ |-------------|-------|-------------|
205
+ | SI.L1-3.14.1 | L1 | Identify, report, and correct information and system flaws in a timely manner. |
206
+ | SI.L1-3.14.2 | L1 | Provide protection from malicious code at appropriate locations within systems. |
207
+ | SI.L1-3.14.4 | L1 | Update malicious code protection mechanisms when new releases are available. |
208
+ | SI.L1-3.14.5 | L1 | Perform periodic scans of systems and real-time scans of files from external sources. |
209
+ | SI.L2-3.14.3 | L2 | Monitor system security alerts and advisories and take action in response. |
210
+ | SI.L2-3.14.6 | L2 | Monitor systems to detect attacks and indicators of potential attacks. |
211
+ | SI.L2-3.14.7 | L2 | Identify unauthorized use of systems. |
@@ -0,0 +1,281 @@
1
+ # CSRD Compliance Programme Reference
2
+
3
+ ## Programme Templates, Checklists, and Implementation Guidance
4
+
5
+ ---
6
+
7
+ ## 1. CSRD Implementation Roadmap
8
+
9
+ ### Phase 0 — Scoping (Months 1–2)
10
+ - [ ] Confirm in-scope status: check size thresholds (employees, turnover, assets), listing status, PIE status
11
+ - [ ] Determine first mandatory reporting year (FY 2024, 2025, 2026, or 2028)
12
+ - [ ] Identify group structure: parent, subsidiaries; check if subsidiary can rely on group CSRD report
13
+ - [ ] Assess non-EU company obligations if applicable (>€150M EU turnover)
14
+ - [ ] Identify existing ESG reporting: GRI, TCFD, CDP, SASB, NFRD — baseline assessment
15
+
16
+ ### Phase 1 — Foundation (Months 2–5)
17
+ - [ ] Appoint CSRD project lead and cross-functional team (Finance, Legal, Sustainability, HR, Risk)
18
+ - [ ] Establish governance: board/committee oversight of CSRD preparation
19
+ - [ ] Engage external advisors: CSRD consultant, assurance provider (early engagement recommended)
20
+ - [ ] Conduct preliminary Double Materiality Assessment (DMA) — identify material ESRS topics
21
+ - [ ] Map existing disclosures to ESRS datapoints — identify gaps
22
+ - [ ] Assess data availability across all material ESRS topics
23
+
24
+ ### Phase 2 — Gap Assessment and Planning (Months 4–8)
25
+ - [ ] Complete full DMA with stakeholder engagement
26
+ - [ ] Document DMA methodology and outputs (ESRS 2 IRO-1 / SBM-3)
27
+ - [ ] Conduct detailed gap assessment: required datapoints vs. data available
28
+ - [ ] Assess value chain data collection feasibility for material topics
29
+ - [ ] Evaluate IT/systems requirements: data collection, aggregation, reporting systems
30
+ - [ ] Design data collection processes and assign ownership
31
+ - [ ] Plan Scope 3 GHG emissions programme (if E1 material)
32
+ - [ ] Engage assurance provider: agree scope, approach, timeline for limited assurance
33
+
34
+ ### Phase 3 — Data Collection and Controls (Months 6–14)
35
+ - [ ] Implement data collection processes for all material ESRS datapoints
36
+ - [ ] Develop and implement internal controls over sustainability reporting
37
+ - [ ] Establish data quality review and sign-off procedures
38
+ - [ ] Collect and verify Scope 1, 2, 3 GHG emissions data
39
+ - [ ] Collect workforce data (ESRS S1 datapoints)
40
+ - [ ] Implement value chain data collection: supplier questionnaires, CDP, proxy data
41
+ - [ ] Develop transition plan (ESRS E1-1) if climate is material
42
+ - [ ] Conduct scenario analysis for climate risks/opportunities (ESRS E1-9)
43
+
44
+ ### Phase 4 — Drafting and Assurance (Months 12–18 from first reporting year)
45
+ - [ ] Draft CSRD disclosures for all material ESRS topics
46
+ - [ ] Ensure dedicated section in management report (Accounting Directive Art. 19a)
47
+ - [ ] Apply XBRL/iXBRL digital tagging to sustainability disclosures (ESEF taxonomy)
48
+ - [ ] Internal review: legal, finance, sustainability, board review of disclosures
49
+ - [ ] Engage assurance provider for limited assurance engagement
50
+ - [ ] Respond to assurance queries and implement recommendations
51
+ - [ ] Obtain assurance report
52
+ - [ ] Board / supervisory body sign-off
53
+
54
+ ### Phase 5 — Publication and Ongoing Compliance
55
+ - [ ] Publish sustainability disclosures in annual report
56
+ - [ ] File ESEF-tagged annual report with national registry
57
+ - [ ] Update DMA annually
58
+ - [ ] Track ESRS amendments and Commission guidance
59
+ - [ ] Monitor Omnibus Package simplifications (post-2025 legislative changes)
60
+ - [ ] Begin preparation for reasonable assurance (phased in post-2028)
61
+
62
+ ---
63
+
64
+ ## 2. CSRD Gap Assessment Template
65
+
66
+ ### Instructions
67
+ Complete this table after DMA. For each material ESRS topic, assess current data availability and identify gaps requiring action before first reporting year.
68
+
69
+ | ESRS | Disclosure | Required Datapoint | Current State | Gap | Priority | Action Required | Owner | Target Date |
70
+ |------|-----------|-------------------|--------------|-----|---------|----------------|-------|------------|
71
+ | ESRS 2 | GOV-1 | Board sustainability oversight | Partial — board reviews ESG quarterly | Missing: expertise credentials, time spent | HIGH | Document board ESG discussion records; collect CV/bio data | Company Secretary | Q2 2025 |
72
+ | ESRS 2 | GOV-3 | Sustainability in incentive schemes | No ESG KPIs in remuneration | Gap: no linkage | HIGH | Board Remuneration Committee to design ESG KPIs | CHRO + Board RemCo | Q1 2025 |
73
+ | ESRS 2 | SBM-3 | DMA output — material IROs | DMA not conducted | Critical gap | CRITICAL | Conduct DMA with stakeholder engagement | Sustainability team | Q3 2024 |
74
+ | E1 | E1-6 | Scope 1, 2, 3 GHG emissions | Scope 1+2 available; Scope 3 not measured | Scope 3 all 15 categories missing | CRITICAL | Implement Scope 3 measurement programme | Operations + Procurement | Q1 2025 |
75
+ | E1 | E1-1 | Climate transition plan | No formal plan | Full gap | HIGH | Develop transition plan aligned with SBTi/Paris | CEO + Strategy | Q2 2025 |
76
+ | S1 | S1-16 | Gender pay gap | Partial HR data | Missing: median pay by gender | HIGH | Commission pay analysis; align with EU Pay Transparency Dir. | CHRO | Q3 2025 |
77
+ | S1 | S1-14 | LTIFR (lost time injury rate) | Available for own employees | Missing: contractor data | MEDIUM | Extend H&S data collection to contractors | EHS Manager | Q4 2025 |
78
+ | G1 | G1-3 | Anti-corruption training coverage | 60% employees trained | Missing: updated coverage data; need >80% | MEDIUM | Run annual anti-corruption training campaign | Legal/Compliance | Q2 2025 |
79
+
80
+ **Priority Definitions:**
81
+ - **CRITICAL:** Legal requirement; cannot publish without this data
82
+ - **HIGH:** Material gap; will result in qualified assurance if not resolved
83
+ - **MEDIUM:** Gap exists; resolution improves quality but limited assurance achievable
84
+ - **LOW:** Enhancement opportunity; not essential for first-year compliance
85
+
86
+ ---
87
+
88
+ ## 3. Data Collection Framework
89
+
90
+ ### Governance Data (ESRS 2 GOV)
91
+
92
+ | Datapoint | Data Source | Frequency | Owner |
93
+ |-----------|------------|-----------|-------|
94
+ | Board member sustainability expertise | Board CVs / biography | Annual | Company Secretary |
95
+ | Board ESG agenda items / time spent | Board meeting minutes | Annual | Company Secretary |
96
+ | ESG KPIs in executive remuneration | RemCo decisions / contracts | Annual | CHRO / Legal |
97
+ | Due diligence process coverage | Procurement / Legal | Annual | Legal |
98
+
99
+ ### Climate Data (ESRS E1)
100
+
101
+ | Datapoint | Data Source | Frequency | Owner |
102
+ |-----------|------------|-----------|-------|
103
+ | Scope 1 emissions | Fuel consumption records, fleet data | Monthly → Annual | Facilities / Fleet |
104
+ | Scope 2 (location-based) | Electricity invoices + IEA grid factors | Monthly → Annual | Finance / Facilities |
105
+ | Scope 2 (market-based) | Energy certificates (RECs, GOs, PPAs) | Annual | Energy Procurement |
106
+ | Scope 3 Cat. 1 (purchased goods) | Supplier spend × emission factors (EPA/ecoinvent) | Annual | Procurement |
107
+ | Scope 3 Cat. 3 (fuel & energy) | Calculated from S1+S2 data | Annual | Facilities |
108
+ | Scope 3 Cat. 6 (business travel) | Travel management system | Annual | HR / Travel |
109
+ | Scope 3 Cat. 7 (commuting) | Employee survey / commuting patterns | Annual | HR |
110
+ | Scope 3 Cat. 11 (product use) | Product emission factors + sales data | Annual | Product team |
111
+ | Scope 3 Cat. 12 (end-of-life) | Waste management data + product specs | Annual | Product team |
112
+ | Energy consumption total | All energy bills / smart metering | Monthly → Annual | Facilities |
113
+ | Renewable energy share | Energy purchase contracts / guarantees of origin | Annual | Energy Procurement |
114
+
115
+ ### Workforce Data (ESRS S1)
116
+
117
+ | Datapoint | Data Source | Frequency | Owner |
118
+ |-----------|------------|-----------|-------|
119
+ | Headcount by gender / contract type | HRIS system | Monthly → Annual | HR |
120
+ | Turnover rate | HRIS system | Annual | HR |
121
+ | Gender pay gap (median) | Payroll system analysis | Annual | HR / Finance |
122
+ | Collective bargaining coverage | HR records / legal | Annual | HR |
123
+ | LTIFR, fatalities | EHS / incident management system | Monthly → Annual | EHS |
124
+ | Training hours per employee | LMS (Learning Management System) | Annual | L&D |
125
+ | Parental leave uptake | HR records | Annual | HR |
126
+ | CEO pay ratio | Remuneration disclosures / payroll | Annual | Finance / HR |
127
+
128
+ ---
129
+
130
+ ## 4. Scope 3 GHG Emissions Programme
131
+
132
+ ### Category Priority Matrix
133
+
134
+ | Category | Typically Material? | Data Availability | Recommended Approach |
135
+ |----------|-------------------|------------------|---------------------|
136
+ | Cat. 1: Purchased goods & services | Yes (for most) | Low-Medium | Spend-based with EEIO factors → supplier surveys for key items |
137
+ | Cat. 2: Capital goods | Medium | Medium | Asset registry × emission factors |
138
+ | Cat. 3: Fuel & energy (upstream) | Yes | High | Calculate from S1+S2 using GHG Protocol factors |
139
+ | Cat. 4: Upstream transport | Medium | Low | Tonne-km × emission factors; freight invoices |
140
+ | Cat. 5: Waste in operations | Low-Medium | Medium | Waste management invoices |
141
+ | Cat. 6: Business travel | Medium | High | Travel management system data |
142
+ | Cat. 7: Employee commuting | Medium | Low | Annual employee survey |
143
+ | Cat. 8: Upstream leased assets | Sector-specific | Medium | Lease registry |
144
+ | Cat. 9: Downstream transport | Sector-specific | Low | Distribution data |
145
+ | Cat. 10: Processing of sold products | Sector-specific | Low | Industry averages |
146
+ | Cat. 11: Use of sold products | Yes (for manufacturers) | Medium-High | Product emission factors × sales volume |
147
+ | Cat. 12: End-of-life treatment | Medium | Low | Industry averages; waste composition |
148
+ | Cat. 13: Downstream leased assets | Sector-specific | Low | Lease register |
149
+ | Cat. 14: Franchises | Sector-specific | Low | Franchise data collection |
150
+ | Cat. 15: Investments | Sector-specific (financial) | Medium | PCAF methodology |
151
+
152
+ **Recommended Scope 3 Phasing:**
153
+ - **Year 1:** Cats. 1, 3, 6, 7, 11 (typically 80%+ of emissions)
154
+ - **Year 2:** Add Cats. 2, 4, 5, 12
155
+ - **Year 3:** Full coverage with improved primary data
156
+
157
+ ---
158
+
159
+ ## 5. Assurance Readiness Checklist
160
+
161
+ ### Pre-Assurance Requirements
162
+
163
+ **Governance and Responsibility**
164
+ - [ ] Named individual responsible for each material ESRS topic and its data
165
+ - [ ] Clear escalation path for sustainability data queries
166
+ - [ ] Board/audit committee oversight of sustainability reporting
167
+
168
+ **Documentation**
169
+ - [ ] DMA documented with methodology, scoring, stakeholder inputs
170
+ - [ ] Data collection procedures documented for each datapoint
171
+ - [ ] Calculation methodology documented (GHG Protocol, ESRS guidance)
172
+ - [ ] Internal review and sign-off process documented
173
+ - [ ] Correction procedure for sustainability data errors
174
+
175
+ **Data Quality**
176
+ - [ ] Data trail from source system to reported figure for each datapoint
177
+ - [ ] Evidence of data completeness checks (coverage of operations)
178
+ - [ ] Prior year comparatives available and reconciled
179
+ - [ ] Estimation methodology documented for gaps (proxy data, interpolation)
180
+ - [ ] Restatement policy defined
181
+
182
+ **Controls**
183
+ - [ ] Internal controls documented for key sustainability data processes
184
+ - [ ] Evidence of management review and approval of sustainability disclosures
185
+ - [ ] Segregation of duties between data collectors and approvers
186
+
187
+ **Boundary and Scope**
188
+ - [ ] Reporting boundary clearly defined (consolidation approach: financial control, operational control, equity share)
189
+ - [ ] Any boundary differences vs. financial reporting documented and justified
190
+ - [ ] Value chain scope clearly defined and disclosed
191
+
192
+ ### Limited Assurance vs. Reasonable Assurance
193
+
194
+ | Aspect | Limited Assurance (Current) | Reasonable Assurance (Future) |
195
+ |--------|----------------------------|------------------------------|
196
+ | Standard | ISAE 3000 (Revised) | ISAE 3000 (Revised) — higher standard |
197
+ | Procedures | Inquiries + analytical procedures | As above + substantive testing |
198
+ | Evidence | Less extensive | More extensive; site visits typical |
199
+ | Conclusion | "Nothing came to our attention" | "The information is fairly presented" |
200
+ | Documentation | Less detailed | Detailed audit-like evidence file |
201
+ | Timeline | CSRD Phase 1 (now) | Commission review by 2028 |
202
+
203
+ **Practical Tip:** Build reasonable assurance-quality documentation from day one — retroactively improving evidence trails is very difficult and expensive.
204
+
205
+ ---
206
+
207
+ ## 6. XBRL Digital Tagging — Practical Guide
208
+
209
+ ### What Must Be Tagged
210
+ - All quantitative datapoints in the sustainability disclosures
211
+ - Key qualitative disclosures (policy statements, targets)
212
+ - Taxonomy: European Single Electronic Format (ESEF) extended with CSRD sustainability taxonomy
213
+
214
+ ### Tagging Approach Options
215
+ 1. **Software-integrated:** Sustainability reporting software with built-in XBRL tagging (SAP Sustainability Footprint Management, Workiva, Sweep, etc.)
216
+ 2. **Post-report tagging:** Tag the final report using ESEF tagging tools
217
+ 3. **Outsourced:** Use XBRL tagging service provider
218
+
219
+ ### Timeline
220
+ - ESEF sustainability taxonomy: Commission in development (consult ESMA for latest timeline)
221
+ - First XBRL-tagged sustainability reports: aligned with first CSRD reporting year
222
+
223
+ ---
224
+
225
+ ## 7. Value Chain Data Collection — Supplier Engagement
226
+
227
+ ### Supplier Prioritisation Framework
228
+
229
+ Prioritise suppliers based on:
230
+ 1. **Spend-based emissions significance** (Cat. 1 Scope 3 contribution)
231
+ 2. **High-risk sectors** (garments, electronics, agriculture, extractives)
232
+ 3. **High-risk geographies** (countries with elevated labour/environmental risks)
233
+ 4. **Strategic / sole-source relationships** (limited substitutability)
234
+
235
+ ### Data Collection Methods
236
+
237
+ | Method | Best for | Effort | Data Quality |
238
+ |--------|---------|--------|-------------|
239
+ | CDP Supply Chain | Large, listed suppliers | Low (for company) | High |
240
+ | Supplier questionnaire (EcoVadis, custom) | Tier-1 suppliers | Medium | Medium-High |
241
+ | Spend-based emission factors (EEIO) | Long-tail suppliers | Very low | Low-Medium |
242
+ | Industry sector averages | Where direct data unavailable | Very low | Low |
243
+ | Site audits | High-risk suppliers | High | Very High |
244
+
245
+ ### Disclosure of Estimation Approaches (ESRS 1, para. 64)
246
+ Where value chain data is not directly available, companies must disclose:
247
+ - Which datapoints use estimated/proxy data
248
+ - The estimation methodology applied
249
+ - The level of accuracy and main sources of uncertainty
250
+ - Steps being taken to improve data quality over time
251
+
252
+ ---
253
+
254
+ ## 8. CSRD vs. NFRD — Key Differences
255
+
256
+ | Aspect | NFRD (old) | CSRD (new) |
257
+ |--------|-----------|-----------|
258
+ | Companies in scope | ~11,000 (PIEs >500 employees) | ~50,000 (all large + listed SMEs) |
259
+ | Non-EU companies | Not covered | >€150M EU turnover |
260
+ | Standards | No mandatory standards | Mandatory ESRS |
261
+ | Materiality | Financial only | Double materiality (impact + financial) |
262
+ | Value chain | Not required | Required where material |
263
+ | Assurance | Not required (some member states) | Mandatory limited assurance |
264
+ | Digital tagging | Not required | XBRL/iXBRL mandatory |
265
+ | Location | Flexible (separate report allowed) | Dedicated section of management report |
266
+
267
+ ---
268
+
269
+ ## 9. Omnibus Package Watch (2025)
270
+
271
+ The European Commission proposed CSRD simplifications in the "Omnibus Package" (February 2025):
272
+
273
+ **Proposed changes (not yet final as of ESRS publication date):**
274
+ - Narrowing scope: may raise employee threshold to 1,000 (from 250)
275
+ - Reducing mandatory datapoints
276
+ - Delaying listed SME obligations
277
+ - Simplifying value chain reporting requirements
278
+
279
+ **Important:** Always verify the current legislative status before advising clients on scope and datapoint requirements. Check EUR-Lex and the European Commission website for latest developments.
280
+
281
+ The underlying ESRS standards issued under Commission Delegated Regulation (EU) 2023/2772 remain the definitive source until amended.