bmad-plus 0.4.3 → 0.5.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +48 -0
- package/README.md +4 -3
- package/package.json +5 -1
- package/readme-international/README.de.md +2 -2
- package/readme-international/README.es.md +2 -2
- package/readme-international/README.fr.md +2 -2
- package/src/bmad-plus/module.yaml +43 -12
- package/src/bmad-plus/packs/pack-shield/README.md +110 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
- package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
- package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
- package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
- package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
- package/tools/cli/commands/install.js +22 -9
- package/tools/cli/commands/update.js +4 -2
- package/tools/cli/i18n.js +514 -394
|
@@ -0,0 +1,182 @@
|
|
|
1
|
+
# EU AI Act — Risk Classification Reference
|
|
2
|
+
|
|
3
|
+
## Art. 3 — Key Definitions
|
|
4
|
+
|
|
5
|
+
| Term | Definition |
|
|
6
|
+
|------|-----------|
|
|
7
|
+
| **AI System** (Art. 3(1)) | A machine-based system designed to operate with varying levels of autonomy that, for a given set of objectives, infers from inputs how to generate outputs such as predictions, recommendations, decisions, or content affecting real or virtual environments |
|
|
8
|
+
| **GPAI Model** (Art. 3(63)) | An AI model trained with large amounts of data using self-supervision at scale that displays significant generality and competently performs a wide range of distinct tasks, regardless of placement method — excludes pre-release R&D models |
|
|
9
|
+
| **GPAI System** (Art. 3(64)) | An AI system based on a GPAI model capable of serving multiple purposes, directly or when integrated into other AI systems |
|
|
10
|
+
| **Provider** (Art. 3(3)) | Natural or legal person that develops an AI system or GPAI model and places it on the market or puts it into service under own name/trademark |
|
|
11
|
+
| **Deployer** (Art. 3(4)) | Natural or legal person using an AI system under own authority, except for personal non-professional activity |
|
|
12
|
+
| **Operator** (Art. 3(8)) | Encompasses provider, product manufacturer, deployer, authorised representative, importer, or distributor |
|
|
13
|
+
| **Authorised Representative** (Art. 3(5)) | Person established in EU with written mandate from non-EU provider to act on their behalf |
|
|
14
|
+
| **Importer** (Art. 3(6)) | EU-established person placing on market an AI system bearing third-country person's name/trademark |
|
|
15
|
+
| **Distributor** (Art. 3(7)) | Supply chain person (other than provider/importer) making AI system available on EU market |
|
|
16
|
+
| **Profiling** (Art. 3(52)) | Automated processing of personal data to evaluate natural persons — work performance, economic situation, health, preferences, reliability, behaviour, location |
|
|
17
|
+
|
|
18
|
+
---
|
|
19
|
+
|
|
20
|
+
## Risk Tier Overview
|
|
21
|
+
|
|
22
|
+
| Tier | Regulation Path | Key Obligation | Applies From |
|
|
23
|
+
|------|----------------|----------------|--------------|
|
|
24
|
+
| **Prohibited** | Art. 5 | Complete ban | 2 Feb 2025 |
|
|
25
|
+
| **High Risk** | Art. 6 + Annex I/III | Full conformity regime | 2 Aug 2026 (Annex III) / 2027 (Annex I) |
|
|
26
|
+
| **Limited Risk** | Art. 50 | Transparency disclosure only | 2 Aug 2026 |
|
|
27
|
+
| **Minimal / No Risk** | — | Voluntary codes of conduct | — |
|
|
28
|
+
|
|
29
|
+
---
|
|
30
|
+
|
|
31
|
+
## Art. 5 — Prohibited AI Practices (All 8, applies from 2 February 2025)
|
|
32
|
+
|
|
33
|
+
### 5(1)(a) — Subliminal / Manipulative Techniques
|
|
34
|
+
AI systems using subliminal techniques beyond a person's consciousness, or purposefully manipulative/deceptive techniques, that materially distort behavior and impair informed decision-making, causing or likely to cause significant harm to those persons or third parties.
|
|
35
|
+
|
|
36
|
+
### 5(1)(b) — Exploitation of Vulnerabilities
|
|
37
|
+
AI systems exploiting vulnerabilities of persons or groups based on age, disability, or socioeconomic circumstances, distorting behavior in a manner that causes or is likely to cause significant harm.
|
|
38
|
+
|
|
39
|
+
### 5(1)(c) — Social Scoring
|
|
40
|
+
AI systems that evaluate or classify natural persons or groups based on social behavior over a period of time or inferred personal characteristics, leading to:
|
|
41
|
+
- Detrimental or unfavorable treatment of persons or groups in unrelated social contexts; OR
|
|
42
|
+
- Treatment that is disproportionate or unjustified relative to the social context in which the behavior occurred
|
|
43
|
+
|
|
44
|
+
### 5(1)(d) — Predictive Criminal Risk Assessment
|
|
45
|
+
AI systems assessing the risk of natural persons committing criminal offenses based solely on profiling or personality/character traits assessment. **Exception:** systems supporting human assessment based on objective, verifiable facts directly linked to criminal activity.
|
|
46
|
+
|
|
47
|
+
### 5(1)(e) — Untargeted Facial Recognition Database Creation
|
|
48
|
+
Creating or expanding facial recognition databases through untargeted scraping of facial images from the internet or CCTV footage.
|
|
49
|
+
|
|
50
|
+
### 5(1)(f) — Emotion Inference in Workplace or Educational Institutions
|
|
51
|
+
AI systems that infer emotions of natural persons in the workplace or educational institutions. **Exception:** for medical or safety purposes.
|
|
52
|
+
|
|
53
|
+
### 5(1)(g) — Biometric-Based Categorization for Sensitive Attributes
|
|
54
|
+
AI systems categorizing natural persons individually based on biometric data to deduce or infer race, political opinions, trade union membership, religious or philosophical beliefs, sex life, or sexual orientation. **Exception:** labeling/filtering of lawfully acquired biometric datasets in law enforcement.
|
|
55
|
+
|
|
56
|
+
### 5(1)(h) — Real-Time Remote Biometric Identification (RBI) in Public Spaces by Law Enforcement
|
|
57
|
+
Real-time RBI systems in publicly accessible spaces for law enforcement purposes. **Narrow exceptions:**
|
|
58
|
+
- (i) Targeted search for specific missing persons or trafficking victims
|
|
59
|
+
- (ii) Preventing specific, substantial, imminent threat to life or terrorist attack
|
|
60
|
+
- (iii) Identifying suspects of serious criminal offenses carrying ≥4-year sentences listed in Annex II
|
|
61
|
+
|
|
62
|
+
**Procedural requirements for exceptions:** Prior judicial or independent administrative body authorization (post-hoc authorization within 24 hours for urgency); fundamental rights impact assessment; registration in EU AI database; report to market surveillance authority after each use. **Prohibited:** use to identify protected attributes.
|
|
63
|
+
|
|
64
|
+
---
|
|
65
|
+
|
|
66
|
+
## Art. 6 — High-Risk Classification Rules
|
|
67
|
+
|
|
68
|
+
### Path A — Art. 6(1): Safety Component of Sectoral Product
|
|
69
|
+
System is high-risk when BOTH conditions are met:
|
|
70
|
+
1. It is a **safety component of a product** covered by Annex I harmonisation legislation (or is itself such a product); **AND**
|
|
71
|
+
2. That product **requires third-party conformity assessment** under the relevant Annex I legislation
|
|
72
|
+
|
|
73
|
+
### Path B — Art. 6(2): Annex III Listed Use Case
|
|
74
|
+
System is high-risk when **listed in Annex III**, unless the following non-high-risk exceptions all apply:
|
|
75
|
+
- Performs a narrow procedural task
|
|
76
|
+
- Improves result of a previously completed human activity
|
|
77
|
+
- Detects decision-making patterns/deviations without replacing/influencing human assessment
|
|
78
|
+
- Performs preparatory tasks for assessment relevant to Annex III use cases
|
|
79
|
+
|
|
80
|
+
**Critical override (Art. 6(3)):** Any Annex III system that **profiles natural persons** is ALWAYS high-risk regardless of the above exceptions.
|
|
81
|
+
|
|
82
|
+
**Documentation obligation (Art. 6(3)):** Providers claiming non-high-risk status must document their assessment before market placement and make it available to national authorities on request.
|
|
83
|
+
|
|
84
|
+
---
|
|
85
|
+
|
|
86
|
+
## Annex I — Sectoral Harmonisation Laws (Safety Component Path)
|
|
87
|
+
|
|
88
|
+
### Section A — New Legislative Framework Products
|
|
89
|
+
1. Machinery — Directive 2006/42/EC
|
|
90
|
+
2. Toys — Directive 2009/48/EC
|
|
91
|
+
3. Recreational watercraft — Directive 2013/53/EU
|
|
92
|
+
4. Lifts — Directive 2014/33/EU
|
|
93
|
+
5. ATEX equipment — Directive 2014/34/EU
|
|
94
|
+
6. Radio equipment — Directive 2014/53/EU
|
|
95
|
+
7. Pressure equipment — Directive 2014/68/EU
|
|
96
|
+
8. Cableway installations — Regulation 2016/424
|
|
97
|
+
9. Personal protective equipment — Regulation 2016/425
|
|
98
|
+
10. Gaseous fuel appliances — Regulation 2016/426
|
|
99
|
+
11. Medical devices — Regulation 2017/745
|
|
100
|
+
12. In vitro diagnostic medical devices — Regulation 2017/746
|
|
101
|
+
|
|
102
|
+
### Section B — Other Harmonisation Legislation
|
|
103
|
+
13. Civil aviation security — Regulation 300/2008
|
|
104
|
+
14. Two/three-wheel vehicles — Regulation 168/2013
|
|
105
|
+
15. Agricultural/forestry vehicles — Regulation 167/2013
|
|
106
|
+
16. Marine equipment — Directive 2014/90/EU
|
|
107
|
+
17. Rail interoperability — Directive 2016/797
|
|
108
|
+
18. Motor vehicles and trailers — Regulation 2018/858
|
|
109
|
+
19. Motor vehicle safety standards — Regulation 2019/2144
|
|
110
|
+
20. Civil aviation and drones — Regulation 2018/1139
|
|
111
|
+
|
|
112
|
+
---
|
|
113
|
+
|
|
114
|
+
## Annex III — High-Risk AI Use Case Areas (8 Areas)
|
|
115
|
+
|
|
116
|
+
### Area 1 — Biometrics
|
|
117
|
+
- (a) Remote biometric identification systems (excluding personal identity verification)
|
|
118
|
+
- (b) Biometric categorization systems inferring sensitive/protected attributes
|
|
119
|
+
- (c) Emotion recognition systems
|
|
120
|
+
|
|
121
|
+
**Notes:** (b) and (c) are prohibited under Art. 5(1)(g) and 5(1)(f) respectively in many contexts. Area 1(a) biometric categorization/emotion recognition systems that fall under Art. 5 prohibitions cannot qualify as merely high-risk — the prohibition takes precedence.
|
|
122
|
+
|
|
123
|
+
### Area 2 — Critical Infrastructure
|
|
124
|
+
AI safety components managing or used in safety-critical management of: road traffic, water supply, gas supply, heating supply, electricity supply, and critical digital infrastructure.
|
|
125
|
+
|
|
126
|
+
### Area 3 — Education and Vocational Training
|
|
127
|
+
- (a) Determining access/admission to or assignment to educational institutions at any level
|
|
128
|
+
- (b) Evaluating learning outcomes that materially influence the learning process
|
|
129
|
+
- (c) Assessing appropriate level of education and materially influencing the level of education received
|
|
130
|
+
- (d) Monitoring and detecting prohibited student behavior in tests/examinations
|
|
131
|
+
|
|
132
|
+
### Area 4 — Employment, Workers Management, and Self-Employment
|
|
133
|
+
- (a) Recruitment and selection: targeted job advertising, application filtering/screening, candidate evaluation and selection
|
|
134
|
+
- (b) Making decisions affecting terms of employment/work relationships: promotion, termination, task allocation, monitoring/evaluating performance/behavior of employed persons
|
|
135
|
+
|
|
136
|
+
### Area 5 — Access to and Enjoyment of Essential Private and Public Services
|
|
137
|
+
- (a) Public authorities evaluating individual eligibility for public assistance benefits and services (including healthcare)
|
|
138
|
+
- (b) Creditworthiness assessment and credit scoring (excluding fraud detection)
|
|
139
|
+
- (c) Life insurance and health insurance risk assessment and pricing for natural persons
|
|
140
|
+
- (d) Emergency dispatch and emergency call classification and prioritization
|
|
141
|
+
|
|
142
|
+
### Area 6 — Law Enforcement
|
|
143
|
+
- (a) Individual risk assessment for becoming victim of criminal offenses
|
|
144
|
+
- (b) Polygraphs and similar tools to assess reliability of persons
|
|
145
|
+
- (c) Evaluating reliability of evidence in criminal investigations/prosecution
|
|
146
|
+
- (d) Assessing risk of offending/reoffending, including recidivism assessment
|
|
147
|
+
- (e) Profiling natural persons in course of criminal detection, investigation, or prosecution
|
|
148
|
+
|
|
149
|
+
### Area 7 — Migration, Asylum, and Border Control Management
|
|
150
|
+
- (a) Polygraph-like tools and similar for competent authorities in migration/asylum/border control
|
|
151
|
+
- (b) Assessing risk (including security/irregular migration risk) of persons intending to enter or having entered EU territory
|
|
152
|
+
- (c) Assisting competent authorities in examining applications for asylum, visa, and residence permits
|
|
153
|
+
- (d) Detecting, recognizing, or identifying natural persons (excluding verification of travel documents)
|
|
154
|
+
|
|
155
|
+
### Area 8 — Administration of Justice and Democratic Processes
|
|
156
|
+
- (a) AI assisting judicial authorities in researching, interpreting, and applying the law
|
|
157
|
+
- (b) AI intended to influence the outcome of elections or referenda, or the voting behavior of natural persons
|
|
158
|
+
|
|
159
|
+
---
|
|
160
|
+
|
|
161
|
+
## Art. 50 — Limited Risk Transparency Obligations (applies from 2 August 2026)
|
|
162
|
+
|
|
163
|
+
### Chatbots and AI Interaction Systems (Art. 50(1))
|
|
164
|
+
Providers must ensure users are informed they are interacting with an AI system, unless:
|
|
165
|
+
- Obvious to a reasonably well-informed user given context and circumstances
|
|
166
|
+
- System is authorized by law for detection of criminal offenses
|
|
167
|
+
|
|
168
|
+
### Synthetic Media — Deepfakes (Art. 50(2) and (4))
|
|
169
|
+
- Deployers of systems generating synthetic image/video/audio/text resembling real persons/places/events must disclose in machine-readable format that content is artificially generated or manipulated
|
|
170
|
+
- Deployer disclosure exceptions: authorized by law for criminal offense detection; artistic, satirical, or fictional works with appropriate disclosure that doesn't impair enjoyment
|
|
171
|
+
- All AI-generated text published to inform public on matters of public interest must be disclosed as AI-generated, unless: authorized for criminal investigation; content underwent human editorial review and editorial accountability exists
|
|
172
|
+
|
|
173
|
+
### Emotion Recognition and Biometric Categorization (Art. 50(3))
|
|
174
|
+
Deployers must inform natural persons exposed to these systems of:
|
|
175
|
+
- The operation of the system
|
|
176
|
+
- Must comply with GDPR and data protection law
|
|
177
|
+
- Exception: authorized for law enforcement
|
|
178
|
+
|
|
179
|
+
### Format Requirements
|
|
180
|
+
- Disclosures must be made at the latest at first interaction/exposure
|
|
181
|
+
- Clear and distinguishable manner
|
|
182
|
+
- Must meet accessibility standards (Directive 2019/882)
|
|
@@ -0,0 +1,209 @@
|
|
|
1
|
+
# FedRAMP SSP Appendices Guide (A–Q)
|
|
2
|
+
|
|
3
|
+
All FedRAMP SSP appendices must use official FedRAMP templates where indicated.
|
|
4
|
+
Templates: https://www.fedramp.gov/rev5/documents-templates/
|
|
5
|
+
|
|
6
|
+
---
|
|
7
|
+
|
|
8
|
+
## Appendix A — Acronyms & Glossary
|
|
9
|
+
**Required:** Yes | **Author:** CSP
|
|
10
|
+
- List all acronyms used in the SSP
|
|
11
|
+
- Define any system-specific or agency-specific terms
|
|
12
|
+
- FedRAMP provides a standard glossary; supplement with system-specific terms
|
|
13
|
+
- Keep synchronized with the SSP body — if a new term appears in Section 7, add it here
|
|
14
|
+
|
|
15
|
+
---
|
|
16
|
+
|
|
17
|
+
## Appendix B — Related Laws & Regulations
|
|
18
|
+
**Required:** Yes | **Author:** CSP (use FedRAMP template as base)
|
|
19
|
+
- Enumerates applicable federal laws, Executive Orders, OMB memos, and standards
|
|
20
|
+
- Core list includes: FISMA 2014, Privacy Act of 1974, E-Government Act (Section 208), FIPS 199, FIPS 200, NIST SP 800-53 Rev 5, OMB Circular A-130
|
|
21
|
+
- Add agency-specific requirements if applicable (e.g., HIPAA, CJIS, IRS Publication 1075)
|
|
22
|
+
- Review annually — regulatory landscape changes; new OMB guidance and executive orders may require additions
|
|
23
|
+
|
|
24
|
+
**Common mistake:** Using the Rev 4 version of this appendix; ensure it reflects Rev 5 requirements and current OMB directives.
|
|
25
|
+
|
|
26
|
+
---
|
|
27
|
+
|
|
28
|
+
## Appendix C — Security Policies & Procedures
|
|
29
|
+
**Required:** Yes | **Author:** CSP
|
|
30
|
+
- Attach or reference all CSP security policies and standard operating procedures
|
|
31
|
+
- Must cover each NIST 800-53 Rev 5 control family that has policies and procedures controls (e.g., AC-1, AU-1, CA-1, CM-1, etc.)
|
|
32
|
+
- Policies must be: approved by senior leadership, dated, versioned, and reviewed at defined intervals
|
|
33
|
+
- Common approach: include a policy index table in the appendix body, with the actual policy documents attached or linked via evidence repository
|
|
34
|
+
|
|
35
|
+
**Common finding:** Policies exist but are not dated or version-controlled; policies reference Rev 4 controls.
|
|
36
|
+
|
|
37
|
+
---
|
|
38
|
+
|
|
39
|
+
## Appendix D — User Guide
|
|
40
|
+
**Required:** Yes | **Author:** CSP
|
|
41
|
+
- End-user guide for the cloud service
|
|
42
|
+
- Describes: how to access the system, user responsibilities, what the system does, how to report security incidents
|
|
43
|
+
- For SaaS offerings, this may be a customer-facing documentation excerpt
|
|
44
|
+
- Must align with the Rules of Behavior (Appendix E)
|
|
45
|
+
|
|
46
|
+
---
|
|
47
|
+
|
|
48
|
+
## Appendix E — Rules of Behavior (RoB)
|
|
49
|
+
**Required:** Yes | **Author:** CSP (FedRAMP template available)
|
|
50
|
+
- Signed by all users prior to access
|
|
51
|
+
- Covers: acceptable use, data handling obligations, password requirements, incident reporting obligations, consequences of non-compliance
|
|
52
|
+
- Must be re-signed annually or when updated
|
|
53
|
+
- Keep signature records — auditors will ask for evidence of signed RoBs
|
|
54
|
+
|
|
55
|
+
**Common finding:** RoB exists but no evidence of user signatures; RoB not updated after major policy changes.
|
|
56
|
+
|
|
57
|
+
---
|
|
58
|
+
|
|
59
|
+
## Appendix F — IT Contingency Plan (ISCP)
|
|
60
|
+
**Required:** Yes | **Author:** CSP (FedRAMP ISCP template — updated December 2024)
|
|
61
|
+
- Use the FedRAMP Information System Contingency Plan (ISCP) template
|
|
62
|
+
- Must include: system description, activation criteria, notification procedures, recovery procedures, reconstitution, testing records
|
|
63
|
+
- RTO and RPO must be defined and achievable based on architecture
|
|
64
|
+
- Must be tested at least annually — tabletop minimum; functional exercise preferred for High baseline
|
|
65
|
+
- Append the most recent test results
|
|
66
|
+
|
|
67
|
+
**Common finding:** Plan exists but has never been tested; RTO/RPO are aspirational and not validated by DR testing.
|
|
68
|
+
|
|
69
|
+
---
|
|
70
|
+
|
|
71
|
+
## Appendix G — Configuration Management Plan (CMP)
|
|
72
|
+
**Required:** Yes | **Author:** CSP
|
|
73
|
+
- Describes how configuration baselines are established, maintained, and enforced
|
|
74
|
+
- Must reference specific baseline standards used (CIS Benchmarks, DISA STIGs)
|
|
75
|
+
- Documents the change control board (CCB) process and approval chain
|
|
76
|
+
- Defines how configuration deviations are documented and approved
|
|
77
|
+
- Links to the system inventory (IIW — Appendix K)
|
|
78
|
+
|
|
79
|
+
---
|
|
80
|
+
|
|
81
|
+
## Appendix H — Incident Response Plan (IRP)
|
|
82
|
+
**Required:** Yes | **Author:** CSP
|
|
83
|
+
- Must follow NIST SP 800-61 Rev 2 lifecycle: Preparation → Detection → Containment → Eradication → Recovery → Post-Incident
|
|
84
|
+
- FedRAMP-specific reporting SLAs:
|
|
85
|
+
- Report to US-CERT within **1 hour** of incident discovery (high-priority incidents)
|
|
86
|
+
- Report to agency AO within **1 hour** for incidents affecting federal data
|
|
87
|
+
- Include contact list: CSP IR team, agency AO contacts, US-CERT (CISA), FedRAMP PMO Security Inbox
|
|
88
|
+
- Must include the FedRAMP Security Inbox address for PMO notifications
|
|
89
|
+
- Must be tested at least annually (tabletop or functional exercise)
|
|
90
|
+
|
|
91
|
+
**Common finding:** IRP does not include agency AO notification procedure; reporting timeframes do not match FedRAMP SLAs; no evidence of annual testing.
|
|
92
|
+
|
|
93
|
+
---
|
|
94
|
+
|
|
95
|
+
## Appendix I — Control Implementation Summary (CIS) / Customer Responsibility Matrix (CRM)
|
|
96
|
+
**Required:** Yes | **Author:** CSP (FedRAMP CIS/CRM template)
|
|
97
|
+
- One of the most operationally important appendices for agency customers
|
|
98
|
+
- **CIS tab**: Lists every control in the baseline and its implementation status (Fully Implemented / Partially Implemented / Planned / Not Applicable / Alternative)
|
|
99
|
+
- **CRM tab**: For each shared/hybrid control, defines exactly what the CSP implements vs. what the customer/agency must implement
|
|
100
|
+
- Agency customers use the CRM to understand their inherited security obligations
|
|
101
|
+
- Must be kept current — a stale CRM is a common agency complaint and a finding during re-authorization
|
|
102
|
+
|
|
103
|
+
**Common mistake:** CRM lists "Customer Responsibility" generically without specifying what the agency must actually do; shared controls marked as fully CSP-implemented when agencies have configuration responsibilities.
|
|
104
|
+
|
|
105
|
+
---
|
|
106
|
+
|
|
107
|
+
## Appendix J — FIPS 199 Categorization
|
|
108
|
+
**Required:** Yes | **Author:** CSP
|
|
109
|
+
- Documents the formal FIPS 199 impact determination
|
|
110
|
+
- Categorizes Confidentiality, Integrity, and Availability separately for each information type
|
|
111
|
+
- Overall impact level = high-water mark (highest individual rating)
|
|
112
|
+
- Must justify each categorization with the types of federal information the system processes
|
|
113
|
+
- Ties directly to which FedRAMP baseline (Low / Moderate / High) applies
|
|
114
|
+
|
|
115
|
+
---
|
|
116
|
+
|
|
117
|
+
## Appendix K — Integrated Inventory Workbook (IIW)
|
|
118
|
+
**Required:** Yes | **Author:** CSP (FedRAMP IIW template — updated December 2024)
|
|
119
|
+
- Complete inventory of every asset within the authorization boundary
|
|
120
|
+
- Tabs typically include: hardware, software, services, databases, network components, virtual instances
|
|
121
|
+
- Must be 100% accurate — auditors sample from IIW and will flag missing assets as findings
|
|
122
|
+
- Updated continuously; submitted monthly during ConMon
|
|
123
|
+
- Must include: asset name/ID, OS/version, IP address, function, patch level, FedRAMP status, POC
|
|
124
|
+
|
|
125
|
+
**Common finding:** IIW is out of date; cloud-native ephemeral resources (auto-scaling instances, containers) not accounted for with appropriate dynamic inventory process.
|
|
126
|
+
|
|
127
|
+
---
|
|
128
|
+
|
|
129
|
+
## Appendix L — Cryptographic Modules Table
|
|
130
|
+
**Required:** Yes | **Author:** CSP
|
|
131
|
+
- Lists every cryptographic module in use within the boundary
|
|
132
|
+
- For each module: vendor, product name, version, FIPS 140-2/3 validation certificate number, use case (encryption at rest, in transit, key management, etc.)
|
|
133
|
+
- All modules must have active FIPS 140-2 or 140-3 validation certificates (check NIST CMVP)
|
|
134
|
+
- Identifies any non-FIPS algorithms still in use (must be remediated or deviation-approved)
|
|
135
|
+
|
|
136
|
+
**Common finding:** Module versions have changed since last authorization and certificates are no longer valid; legacy algorithms (MD5, SHA-1, DES, RC4) found in use without deviation.
|
|
137
|
+
|
|
138
|
+
---
|
|
139
|
+
|
|
140
|
+
## Appendix M — Continuous Monitoring Plan
|
|
141
|
+
**Required:** Yes | **Author:** CSP
|
|
142
|
+
- Documents the ongoing ConMon program
|
|
143
|
+
- Must specify: scan frequency and tools, vulnerability management SLAs, POA&M update cadence, reporting schedule to agency AO, annual assessment approach
|
|
144
|
+
- Scan requirements: OS/infrastructure monthly; web app monthly; database monthly; container images per CI/CD pipeline
|
|
145
|
+
- References the Security Inbox requirement (effective January 2026)
|
|
146
|
+
|
|
147
|
+
---
|
|
148
|
+
|
|
149
|
+
## Appendix N — Separation of Duties Matrix
|
|
150
|
+
**Required:** Conditional (required when separation of duties is a compensating control or specifically required by agency) | **Author:** CSP
|
|
151
|
+
- Documents which roles can and cannot be combined
|
|
152
|
+
- Relevant when a small team might otherwise hold conflicting privileges
|
|
153
|
+
- Ties to AC-5 (Separation of Duties) control implementation
|
|
154
|
+
|
|
155
|
+
---
|
|
156
|
+
|
|
157
|
+
## Appendix O — Plan of Action & Milestones (POA&M)
|
|
158
|
+
**Required:** Yes | **Author:** CSP (FedRAMP POA&M template)
|
|
159
|
+
- See `references/poam-guide.md` for full field definitions and SLA table
|
|
160
|
+
- Living document — updated monthly during ConMon
|
|
161
|
+
- Submitted monthly to agency AO(s)
|
|
162
|
+
- Every SAR finding must appear as a POA&M row
|
|
163
|
+
|
|
164
|
+
---
|
|
165
|
+
|
|
166
|
+
## Appendix P — Supply Chain Risk Management Plan (SCRM Plan)
|
|
167
|
+
**Required:** Yes (Rev 5) | **Author:** CSP
|
|
168
|
+
- New requirement introduced with NIST SP 800-53 Rev 5 (SR control family)
|
|
169
|
+
- Documents how the CSP manages supply chain risks for hardware, software, and services
|
|
170
|
+
- Must address: supplier assessment process, SBOM tracking, open source component vulnerability management, critical supplier identification
|
|
171
|
+
- Ties to SR-1 through SR-12 control implementations
|
|
172
|
+
|
|
173
|
+
**Common finding:** SCRM Plan is generic and doesn't describe the CSP's specific suppliers or risk assessment methodology; SBOM process undefined.
|
|
174
|
+
|
|
175
|
+
---
|
|
176
|
+
|
|
177
|
+
## Appendix Q — Privacy Impact Assessment (PIA)
|
|
178
|
+
**Required:** If PII is in scope | **Author:** CSP
|
|
179
|
+
- Required when the system collects, processes, stores, or transmits PII
|
|
180
|
+
- Must follow the E-Government Act of 2002 Section 208 PIA requirements
|
|
181
|
+
- Covers: what PII is collected, why, how it's protected, retention, access controls, sharing with third parties
|
|
182
|
+
- Ties to PT control family (PII Processing & Transparency) — new in Rev 5
|
|
183
|
+
- Agency AO reviews PIA as part of authorization decision when PII is involved
|
|
184
|
+
|
|
185
|
+
**Common finding:** PIA omits specific PII data elements; PIA not updated when new PII types are added to the system.
|
|
186
|
+
|
|
187
|
+
---
|
|
188
|
+
|
|
189
|
+
## Quick Reference: Appendix Checklist
|
|
190
|
+
|
|
191
|
+
| App | Title | Required | Template |
|
|
192
|
+
|-----|-------|----------|----------|
|
|
193
|
+
| A | Acronyms & Glossary | Yes | CSP-authored |
|
|
194
|
+
| B | Laws & Regulations | Yes | FedRAMP base + CSP additions |
|
|
195
|
+
| C | Security Policies & Procedures | Yes | CSP-authored |
|
|
196
|
+
| D | User Guide | Yes | CSP-authored |
|
|
197
|
+
| E | Rules of Behavior | Yes | FedRAMP template |
|
|
198
|
+
| F | IT Contingency Plan (ISCP) | Yes | FedRAMP ISCP template (Dec 2024) |
|
|
199
|
+
| G | Configuration Management Plan | Yes | CSP-authored |
|
|
200
|
+
| H | Incident Response Plan | Yes | CSP-authored |
|
|
201
|
+
| I | CIS / CRM Workbook | Yes | FedRAMP template |
|
|
202
|
+
| J | FIPS 199 Categorization | Yes | CSP-authored |
|
|
203
|
+
| K | Integrated Inventory Workbook (IIW) | Yes | FedRAMP template (Dec 2024) |
|
|
204
|
+
| L | Cryptographic Modules Table | Yes | CSP-authored |
|
|
205
|
+
| M | Continuous Monitoring Plan | Yes | CSP-authored |
|
|
206
|
+
| N | Separation of Duties Matrix | Conditional | CSP-authored |
|
|
207
|
+
| O | POA&M | Yes | FedRAMP template |
|
|
208
|
+
| P | Supply Chain Risk Management Plan | Yes (Rev 5) | CSP-authored |
|
|
209
|
+
| Q | Privacy Impact Assessment (PIA) | If PII in scope | CSP-authored |
|