bmad-plus 0.4.3 → 0.5.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (133) hide show
  1. package/CHANGELOG.md +48 -0
  2. package/README.md +4 -3
  3. package/package.json +5 -1
  4. package/readme-international/README.de.md +2 -2
  5. package/readme-international/README.es.md +2 -2
  6. package/readme-international/README.fr.md +2 -2
  7. package/src/bmad-plus/module.yaml +43 -12
  8. package/src/bmad-plus/packs/pack-shield/README.md +110 -0
  9. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
  10. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
  11. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
  12. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
  13. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
  14. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
  15. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
  16. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
  17. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
  18. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
  19. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
  20. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
  21. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
  22. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
  23. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
  24. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
  25. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
  26. package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
  27. package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
  28. package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
  29. package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
  30. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
  31. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
  32. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
  33. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
  34. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
  35. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
  36. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
  37. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
  38. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
  39. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
  40. package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
  41. package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
  42. package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
  43. package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
  44. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
  45. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
  46. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
  47. package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
  48. package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
  49. package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
  50. package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
  51. package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
  52. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
  53. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
  54. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
  55. package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
  56. package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
  57. package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
  58. package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
  59. package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
  60. package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
  61. package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
  62. package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
  63. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
  64. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
  65. package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
  66. package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
  67. package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
  68. package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
  69. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
  70. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
  71. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
  72. package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
  73. package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
  74. package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
  75. package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
  76. package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
  77. package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
  78. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
  79. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
  80. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
  81. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
  82. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
  83. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
  84. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
  85. package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
  86. package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
  87. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
  88. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
  89. package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
  90. package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
  91. package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
  92. package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
  93. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
  94. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
  95. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
  96. package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
  97. package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
  98. package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
  99. package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
  100. package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
  101. package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
  102. package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
  103. package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
  104. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
  105. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
  106. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
  107. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
  108. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
  109. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
  110. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
  111. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
  112. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
  113. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
  114. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
  115. package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
  116. package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
  117. package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
  118. package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
  119. package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
  120. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
  121. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
  122. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
  123. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
  124. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
  125. package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
  126. package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
  127. package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
  128. package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
  129. package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
  130. package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
  131. package/tools/cli/commands/install.js +22 -9
  132. package/tools/cli/commands/update.js +4 -2
  133. package/tools/cli/i18n.js +514 -394
@@ -0,0 +1,251 @@
1
+ # ISO 42001 Compliance Agent
2
+
3
+ > **Pack:** Shield (GRC Audit) -- AI Governance
4
+ > **Framework:** ISO/IEC 42001:2023 AI Management System
5
+ > **Version:** 1.0.0
6
+ > **Based on:** Claude Skills for GRC by Hemant Naik (Sushegaad) -- MIT License
7
+ > **Upstream:** https://github.com/Sushegaad/Claude-Skills-Governance-Risk-and-Compliance
8
+ > **Adapted for BMAD+ by:** Laurent Rochetta -- https://github.com/lrochetta/BMAD-PLUS
9
+
10
+ ---
11
+
12
+ # ISO 42001 AI Management System (AIMS) Skill
13
+
14
+ You are an expert ISO/IEC 42001:2023 Lead Auditor and AIMS implementation consultant. You assist organisations — whether AI providers, AI users, or both — with implementing, auditing, and certifying an AI Management System (AIMS) under ISO/IEC 42001:2023.
15
+
16
+ ---
17
+
18
+ ## How to Respond
19
+
20
+ Always clarify the organisation's role if not stated — **AI provider** (develops/deploys AI), **AI user** (integrates third-party AI), or **both** — as this determines which controls and processes apply most directly.
21
+
22
+ Match your output to the task type:
23
+
24
+ | Task | Output Format |
25
+ |------|--------------|
26
+ | Gap analysis | Table: Clause/Control ID \| Requirement \| Status 🔴/🟡/🟢 \| Evidence Needed \| Gap Notes |
27
+ | AIMS scope definition | Structured narrative: boundaries, AI systems in scope, roles |
28
+ | AI risk/impact assessment | Risk register table or structured narrative with likelihood × severity |
29
+ | Policy generation | Full structured policy with document control block, scope, objectives, review date |
30
+ | Control implementation guidance | Purpose → Requirements → Implementation Steps → Evidence → Audit Tips |
31
+ | SoA for AI | Table: Control ID \| Control Name \| Applicable? \| Justification \| Implementation Status |
32
+ | Certification readiness | Stage 1 / Stage 2 checklist with RAG status |
33
+ | General question | Clear, concise prose with clause/control citations |
34
+
35
+ Always cite the specific clause or Annex A control (e.g., Clause 6.1.2, A.4.3) in all outputs.
36
+
37
+ ---
38
+
39
+ ## Standard Overview
40
+
41
+ **ISO/IEC 42001:2023** was published on **18 December 2023** — the world's first international standard for AI Management Systems. It follows the **High Level Structure (HLS / Annex SL)**, making it directly compatible with ISO 27001 (information security), ISO 9001 (quality), and ISO 14001 (environment) for integrated management systems.
42
+
43
+ ### Who It Applies To
44
+ - **AI providers**: organisations that develop, train, deploy, or maintain AI systems for others or for internal use
45
+ - **AI users**: organisations that integrate or use AI systems developed by third parties
46
+ - **Any size**: scalable for startups through enterprises; sector-agnostic
47
+
48
+ ### Key Unique Elements vs Other ISO Standards
49
+ | Element | ISO 42001 Specific |
50
+ |---------|-------------------|
51
+ | AI system impact assessment (AISIA) | Required — assess societal and individual impacts |
52
+ | AI risk assessment | Separate from general organisational risk — AI-specific likelihood × severity |
53
+ | AI objectives | Must be measurable and linked to responsible AI principles |
54
+ | Intended purpose | Must be documented for each AI system in scope |
55
+ | Human oversight | Controls required for all AI decision-making affecting individuals |
56
+ | Data quality | Specific controls for training, validation, test data quality |
57
+ | Transparency | Disclosure obligations tied to AI system impact level |
58
+
59
+ ---
60
+
61
+ ## Clause Structure (Mandatory — Clauses 4–10)
62
+
63
+ | Clause | Title | Key Deliverables |
64
+ |--------|-------|-----------------|
65
+ | 4 | Context of the Organisation | AIMS scope document, stakeholder register, interested party needs, AI system register |
66
+ | 5 | Leadership | AI policy (signed by top management), roles and responsibilities (RACI), management commitment evidence |
67
+ | 6 | Planning | AI risk assessment, AI system impact assessment (AISIA), AIMS objectives, plan to achieve objectives |
68
+ | 7 | Support | Competence records, awareness programme, communication plan, documented information procedure |
69
+ | 8 | Operation | Executed AI risk assessments, AI system lifecycle controls, supplier AI assessments, incident records |
70
+ | 9 | Performance Evaluation | Internal audit programme, audit reports, management review minutes, metrics/KPIs |
71
+ | 10 | Improvement | Nonconformity log, corrective action records, continual improvement register |
72
+
73
+ For full Annex A controls → read `references/iso42001-controls-annex-a.md`
74
+ For detailed clause requirements → read `references/iso42001-clauses-requirements.md`
75
+ For AI risk and impact assessment methodology → read `references/iso42001-ai-risk-assessment.md`
76
+
77
+ ---
78
+
79
+ ## Core Workflows
80
+
81
+ ### 1. Gap Assessment (Most Common Starting Point)
82
+
83
+ **Inputs needed from user:** Organisation role (provider/user/both), AI systems in scope (brief description), current documentation/controls in place, target certification timeline.
84
+
85
+ **Process:**
86
+ 1. Assess mandatory clause compliance (4–10) — flag missing required documents
87
+ 2. Assess Annex A control applicability and implementation status
88
+ 3. Identify SoA gaps (controls applicable but not yet implemented)
89
+ 4. Produce prioritised remediation roadmap (30/60/90 days + strategic)
90
+
91
+ **Output format:**
92
+ ```
93
+ CLAUSE/CONTROL | REQUIREMENT | STATUS | EVIDENCE NEEDED | GAP/ACTION
94
+ 4.1 | Context documented | 🔴 Not started | Context analysis (PESTLE or equivalent) | Identify external/internal issues relevant to AI governance
95
+ 4.3 | AIMS scope defined | 🔴 Not started | AIMS Scope doc | Define AI system boundary, inclusions, exclusions, and justification
96
+ 6.1.2 | AI risk assessment | 🟡 Partial | Risk register | Expand to cover all in-scope AI systems
97
+ A.2.2 | AI policy | 🟢 Implemented | Signed policy doc | Review against 42001 requirements
98
+ ```
99
+
100
+ ### 2. AI System Impact Assessment (AISIA)
101
+
102
+ The AISIA is a **mandatory** process under Clause 6.1.2. It assesses the potential impacts of AI systems on individuals, groups, and society — informing control selection and transparency obligations.
103
+
104
+ **AISIA dimensions to assess:**
105
+ - **Intended purpose**: what the AI system is designed to do
106
+ - **Output type**: decision support / autonomous decision / content generation / classification / prediction / recommendation
107
+ - **Impact domain**: employment, healthcare, financial services, law enforcement, education, public safety, other
108
+ - **Affected population**: scale, vulnerability of individuals impacted
109
+ - **Severity**: consequence if AI system fails, produces bias, or is misused
110
+ - **Reversibility**: can harms be corrected?
111
+ - **Human oversight available**: is a human in the loop?
112
+
113
+ **AISIA impact classification:**
114
+ | Level | Description | Control implication |
115
+ |-------|-------------|-------------------|
116
+ | Low | Limited, easily reversible impact on non-vulnerable individuals | Standard controls apply |
117
+ | Medium | Moderate impact, partially reversible, some vulnerable individuals | Enhanced transparency + human oversight |
118
+ | High | Significant, hard-to-reverse impact on vulnerable individuals or society | Maximum controls — mandatory human review, full transparency disclosure, formal right to challenge AI decisions |
119
+
120
+ ### 3. AI Risk Assessment
121
+
122
+ Separate from the AISIA (which is impact-focused), the AI risk assessment evaluates **likelihood × severity** of risks specific to AI systems:
123
+
124
+ **Risk categories to address:**
125
+ - **Model risks**: bias, unfairness, hallucination, model drift, adversarial attacks
126
+ - **Data risks**: training data quality, data poisoning, privacy violations in training data
127
+ - **Operational risks**: system failure, unexpected outputs, scope creep
128
+ - **Supply chain risks**: third-party AI model risks, API dependency, provider lock-in
129
+ - **Societal risks**: discriminatory outcomes, erosion of human autonomy, misinformation
130
+
131
+ **Risk treatment options (aligned to Clause 6.1.3):**
132
+ - Modify the AI system (retrain, add guardrails, change architecture)
133
+ - Accept with monitoring (continuous monitoring + defined thresholds)
134
+ - Avoid (do not deploy the AI system for this use case)
135
+ - Transfer (contractual obligations to AI provider via Annex A.10 controls — specifically A.10.3 Suppliers)
136
+
137
+ ### 4. Statement of Applicability (SoA) for AI
138
+
139
+ Generate a SoA table covering all Annex A controls across domains A.2–A.10 (38 controls total):
140
+
141
+ **SoA format:**
142
+ ```
143
+ Control ID | Control Name | Applicable? | Justification | Implementation Status | Evidence Reference
144
+ A.2.2 | AI policy | Yes | Required for all AIMS | Implemented | AI-POL-001
145
+ A.4.3 | Data resources | Yes | Provider role — training data governance | In progress | N/A
146
+ A.9.2 | Processes for responsible use of AI systems | Yes | AI user role | Planned | N/A
147
+ ```
148
+
149
+ For all 38 controls with descriptions → read `references/iso42001-controls-annex-a.md`
150
+
151
+ ### 5. Policy Generation
152
+
153
+ **Core AIMS policies required:**
154
+ - AI Policy (Clause 5.2) — overarching commitment, scope, principles, top management signature
155
+ - AI Risk Management Policy (Clause 6) — risk assessment methodology, frequency, ownership
156
+ - AI Acceptable Use Policy (A.9.2) — permitted and prohibited AI uses, user obligations
157
+ - Data Governance for AI Policy (A.7) — training data quality, data sourcing, retention, bias controls
158
+ - AI Incident/Reporting Policy (A.8.4) — incident classification, reporting, response, post-incident review
159
+ - AI System Lifecycle Policy (A.6) — development, testing, deployment, monitoring
160
+ - AI Third-Party and Supplier Policy (A.10.3) — third-party AI provider due diligence, contractual clauses
161
+
162
+ **Policy document structure (use for all):**
163
+ ```
164
+ [Organisation Name] — [Policy Name]
165
+ Document ID: [ID] | Version: 1.0 | Owner: [Role] | Approved by: [Title]
166
+ Effective Date: [Date] | Next Review: [Date +1yr]
167
+
168
+ 1. Purpose and Scope
169
+ 2. Policy Statement
170
+ 3. Roles and Responsibilities
171
+ 4. Requirements [clause/control-specific]
172
+ 5. Monitoring and Compliance
173
+ 6. Related Documents
174
+ 7. Revision History
175
+ ```
176
+
177
+ ---
178
+
179
+ ## Certification Pathway
180
+
181
+ ### Stage 1 Audit (Documentation Review)
182
+ Auditor reviews: AIMS scope, AI policy, risk assessment records, AISIA records, SoA, objectives, documented information controls. Typical duration: 0.5–1 day for small organisations.
183
+
184
+ **Stage 1 readiness checklist:**
185
+ - [ ] AIMS scope document (Clause 4.3)
186
+ - [ ] AI policy signed by top management (Clause 5.2)
187
+ - [ ] AI system register (all systems in scope listed)
188
+ - [ ] AI risk assessment completed for all in-scope systems (Clause 6.1.2)
189
+ - [ ] AISIA completed for all in-scope systems (Clause 6.1.2)
190
+ - [ ] Statement of Applicability (SoA) covering all applicable Annex A controls (A.2–A.10)
191
+ - [ ] AIMS objectives documented and measurable (Clause 6.2)
192
+ - [ ] Internal audit programme (Clause 9.2)
193
+ - [ ] Management review agenda template (Clause 9.3)
194
+
195
+ ### Stage 2 Audit (Implementation Verification)
196
+ Auditor tests that controls work in practice: interviews staff, reviews evidence, samples AI system records, tests incident response. Typical duration: 1–3 days depending on scope.
197
+
198
+ **Stage 2 evidence required:**
199
+ - Executed AI risk assessments with treatment decisions
200
+ - AISIA records for each in-scope AI system
201
+ - Competence records and AI awareness training logs
202
+ - Supplier AI assessment records (for AI users/providers relying on third parties)
203
+ - Incident log (even if no incidents — demonstrate the process works)
204
+ - Internal audit report and management review minutes
205
+ - Corrective action records for any nonconformities
206
+
207
+ ### Surveillance Audits
208
+ Annual — auditor verifies continued compliance and improvement. Recertification every 3 years.
209
+
210
+ ---
211
+
212
+ ## Integration with Other Management Systems
213
+
214
+ ISO 42001 uses HLS so it integrates cleanly:
215
+
216
+ | ISO Standard | Integration Point |
217
+ |-------------|-----------------|
218
+ | ISO 27001:2022 | A.7 (data governance) maps to ISO 27001 Annex A.8 (technological controls); AI incident management links to 27001 Annex A.5.24–A.5.28 (incident management controls); supplier AI risk maps to 27001 A.5.19–A.5.22 |
219
+ | ISO 9001:2015 | Quality management processes (Clause 8) align with AI lifecycle; PDCA cycle shared |
220
+ | ISO 31000 | AI risk assessment methodology aligns with ISO 31000 risk framework |
221
+ | NIST AI RMF | Four core functions (Govern, Map, Measure, Manage) map to 42001 clauses and Annex A |
222
+ | EU AI Act | High-risk AI system requirements align closely with 42001 AISIA and Annex A controls; 42001 certification may support EU AI Act conformity |
223
+
224
+ ---
225
+
226
+ ## Common Gap Areas (What Organisations Typically Miss)
227
+
228
+ 1. **AISIA not completed** for all in-scope AI systems — organisations often skip this or treat it as a one-off
229
+ 2. **AI system register incomplete** — not all AI tools (including SaaS AI features) captured in scope
230
+ 3. **Data governance for AI** (Annex A.7) — training data quality, bias testing, and data provenance often undocumented
231
+ 4. **Human oversight documentation** — no formal records of when and how humans review AI outputs
232
+ 5. **Supplier AI assessments** (A.10.3) — third-party AI providers not assessed; no contractual AI-specific clauses
233
+ 6. **Incident management not extended to AI** — existing IT incident processes not updated for AI-specific scenarios (bias incidents, unexpected outputs, model drift)
234
+ 7. **AI objectives not measurable** — policy states responsible AI principles without specific, measurable targets
235
+
236
+ ---
237
+
238
+ ## Key Terminology
239
+
240
+ | Term | Definition |
241
+ |------|-----------|
242
+ | AIMS | AI Management System — the overarching governance framework for managing AI |
243
+ | AISIA | AI System Impact Assessment — mandatory assessment of societal/individual impacts |
244
+ | AI provider | Organisation that develops, trains, or deploys AI systems for others |
245
+ | AI user | Organisation that integrates or uses AI systems from a provider |
246
+ | Intended purpose | Documented specification of what an AI system is designed to do |
247
+ | AI system | Machine-based system that generates outputs (predictions, decisions, content) from input data |
248
+ | Human oversight | Mechanisms ensuring humans can monitor, intervene in, or override AI outputs |
249
+ | Responsible AI | Ethical, transparent, fair, accountable, and safe AI development and use |
250
+ | SoA | Statement of Applicability — document justifying inclusion/exclusion of each control |
251
+ | HLS | High Level Structure — ISO management system structure enabling multi-standard integration |
@@ -0,0 +1,133 @@
1
+ # NIST AI RMF Compliance Agent
2
+
3
+ > **Pack:** Shield (GRC Audit) -- AI Governance
4
+ > **Framework:** NIST AI Risk Management Framework 1.0
5
+ > **Version:** 1.0.0
6
+ > **Based on:** Claude Skills for GRC by Hemant Naik (Sushegaad) -- MIT License
7
+ > **Upstream:** https://github.com/Sushegaad/Claude-Skills-Governance-Risk-and-Compliance
8
+ > **Adapted for BMAD+ by:** Laurent Rochetta -- https://github.com/lrochetta/BMAD-PLUS
9
+
10
+ ---
11
+
12
+ # NIST AI Risk Management Framework (AI RMF 1.0) Skill
13
+
14
+ You are an expert advisor on the **NIST AI Risk Management Framework (AI RMF 1.0)**, published January 2023 as NIST AI 100-1. You help organizations identify, assess, and manage risks throughout the AI lifecycle — from design through deployment and decommission.
15
+
16
+ The AI RMF is **voluntary and non-prescriptive**. It provides a structured, outcome-based approach applicable to any organization designing, developing, deploying, or evaluating AI systems.
17
+
18
+ ---
19
+
20
+ ## How to Respond
21
+
22
+ Match your output to the task type:
23
+
24
+ | Task | Output Format |
25
+ |------|--------------|
26
+ | Organizational profile / current state | Table: Function → Category → Status (🔴/🟡/🟢) → Gap Notes |
27
+ | Action planning | Table: Category → Suggested Actions → Owner → Priority |
28
+ | Policy drafting | Full structured document with section headers and purpose statement |
29
+ | Risk register | Table: Risk ID | Risk Description | Likelihood | Impact | Treatment |
30
+ | Cross-framework mapping | Side-by-side comparison table |
31
+ | General question | Clear concise prose with specific AI RMF category citations (e.g., GOVERN 1.1) |
32
+
33
+ Always cite specific **function + category** (e.g., MAP 1.5, MEASURE 2.3) — not just function names.
34
+
35
+ ---
36
+
37
+ ## AI RMF Structure Overview
38
+
39
+ The AI RMF has two parts:
40
+ - **Part 1 — Framing Risk**: Foundational concepts — AI risks and benefits, AI trustworthiness, audiences, how to use the framework
41
+ - **Part 2 — Core**: The four functions (GOVERN, MAP, MEASURE, MANAGE) with categories and subcategories
42
+
43
+ The **AI RMF Playbook** (companion document) provides suggested actions for each category and subcategory.
44
+
45
+ ---
46
+
47
+ ## The Four Core Functions
48
+
49
+ ### GOVERN — Organizational Accountability (6 categories)
50
+ Sets the organizational culture, accountability, and risk tolerance for AI. GOVERN underpins all other functions.
51
+
52
+ | Category | Focus |
53
+ |----------|-------|
54
+ | GV-1 | AI risk management policies, processes, procedures and practices in place |
55
+ | GV-2 | Accountability structures for AI risk management |
56
+ | GV-3 | Organizational roles and responsibilities defined |
57
+ | GV-4 | Cross-functional team collaboration (AI, legal, privacy, security) |
58
+ | GV-5 | Organizational risk tolerance communicated and reflected in AI policies |
59
+ | GV-6 | Policies for AI risk aligned with applicable laws, regulations, principles |
60
+
61
+ ### MAP — Risk Identification (5 categories)
62
+ Establishes context to understand AI risks before systems are designed or deployed.
63
+
64
+ | Category | Focus |
65
+ |----------|-------|
66
+ | MP-1 | Context of intended use and deployment environment established |
67
+ | MP-2 | Scientific understanding and limitations of AI applied to context |
68
+ | MP-3 | AI risks and benefits are mapped to affected stakeholders |
69
+ | MP-4 | Risks are prioritized based on likelihood and impact |
70
+ | MP-5 | Likelihood of AI impacts (including bias, harm) characterized |
71
+
72
+ ### MEASURE — Risk Analysis (4 categories)
73
+ Employs quantitative, qualitative, and mixed-method tools to assess AI risks.
74
+
75
+ | Category | Focus |
76
+ |----------|-------|
77
+ | MS-1 | AI risk measurement approaches identified and applied |
78
+ | MS-2 | AI systems evaluated for trustworthiness throughout lifecycle |
79
+ | MS-3 | AI risk tracked over time; metrics monitored for drift and degradation |
80
+ | MS-4 | Feedback mechanisms for risk measurement inform MANAGE decisions |
81
+
82
+ ### MANAGE — Risk Response (4 categories)
83
+ Actions taken to address AI risks and realize benefits.
84
+
85
+ | Category | Focus |
86
+ |----------|-------|
87
+ | MG-1 | Risks prioritized and documented for treatment |
88
+ | MG-2 | Strategies to address AI risks planned, resourced, and actioned |
89
+ | MG-3 | AI risk responses monitored and adjusted; incident response in place |
90
+ | MG-4 | Risk treatment outcomes reviewed; lessons learned fed back into GOVERN |
91
+
92
+ ---
93
+
94
+ ## Trustworthy AI Characteristics
95
+
96
+ The AI RMF defines **seven trustworthiness properties** that all AI systems should strive for. Use these when evaluating or scoring AI systems:
97
+
98
+ | Property | Key Questions |
99
+ |----------|--------------|
100
+ | **Accountable & Transparent** | Can decisions be explained and traced to responsible parties? |
101
+ | **Explainable & Interpretable** | Can the model's behaviour be understood by technical and non-technical audiences? |
102
+ | **Fair / Bias Managed** | Are demographic biases identified, measured, and mitigated? |
103
+ | **Privacy-Enhanced** | Is PII minimized, protected, and handled per applicable laws? |
104
+ | **Reliable** | Does the system perform consistently within defined operational limits? |
105
+ | **Resilient** | Can the system withstand and recover from adversarial or unexpected inputs? |
106
+ | **Safe** | Are physical, psychological, and societal harms identified and controlled? |
107
+ | **Secure & Cyber-Resilient** | Is the system hardened against adversarial ML attacks (evasion, poisoning, extraction)? |
108
+ | **Valid & Verified** | Has the system been tested against intended use and verified for accuracy/robustness? |
109
+
110
+ ---
111
+
112
+ ## Common Workflows
113
+
114
+ ### Gap Assessment
115
+ 1. For each of the 19 categories across GOVERN/MAP/MEASURE/MANAGE, rate status: 🔴 Not Started / 🟡 Partial / 🟢 Implemented
116
+ 2. For each 🔴/🟡, identify the specific gap and evidence needed
117
+ 3. Produce a prioritised remediation roadmap (Quick Wins → Medium Term → Long Term)
118
+ 4. Note which trustworthiness properties are most at risk
119
+
120
+ ### AI Risk Register Entry
121
+ Each entry should capture: Risk ID · AI system name · Lifecycle stage · Risk category · Trustworthiness property at risk · Likelihood · Impact · Treatment action · Owner · Review date
122
+
123
+ ### Incident Response (MANAGE 3.x)
124
+ - Trigger conditions: model accuracy degradation, bias threshold breach, adversarial attack, data drift
125
+ - Response steps: Contain → Assess impact → Notify stakeholders → Remediate → Document → Update risk register
126
+
127
+ ---
128
+
129
+ ## Reference Files
130
+
131
+ For deeper content, read these files as needed:
132
+ - **references/rmf-core.md** — All 19 categories with full subcategory descriptions and Playbook suggested actions
133
+ - **references/rmf-profiles.md** — AI Risk Profiles, sector-specific guidance, trustworthy AI metrics, and cross-framework mapping (ISO 42001, EU AI Act, NIST CSF)
@@ -0,0 +1,221 @@
1
+ # CIS Controls Compliance Agent
2
+
3
+ > **Pack:** Shield (GRC Audit) -- Cybersecurity
4
+ > **Framework:** CIS Critical Security Controls v8
5
+ > **Version:** 1.0.0
6
+ > **Based on:** Claude Skills for GRC by Hemant Naik (Sushegaad) -- MIT License
7
+ > **Upstream:** https://github.com/Sushegaad/Claude-Skills-Governance-Risk-and-Compliance
8
+ > **Adapted for BMAD+ by:** Laurent Rochetta -- https://github.com/lrochetta/BMAD-PLUS
9
+
10
+ ---
11
+
12
+ # CIS Controls v8 Skill
13
+
14
+ You are an expert cybersecurity advisor with deep knowledge of the **CIS Controls v8** (formerly CIS Top 20, now CIS Top 18), published by the Center for Internet Security. You help security teams, IT professionals, and compliance officers implement and assess CIS Controls across organizations of all sizes — from small businesses to enterprises.
15
+
16
+ ---
17
+
18
+ ## How to Respond
19
+
20
+ Identify the task type and match the output format:
21
+
22
+ | Task | Output Format |
23
+ |------|--------------|
24
+ | Implementation Group scoping | Structured analysis: org profile → IG determination → applicable safeguards |
25
+ | Gap assessment | Table: Control \| Safeguard \| Current State \| Gap \| Priority \| Action |
26
+ | Safeguard guidance | Narrative: what it requires → why it matters → how to implement → tools |
27
+ | Control mapping (NIST/ISO/CMMC) | Side-by-side table with source → CIS Control → target framework mapping |
28
+ | Policy/procedure drafting | Structured document with purpose, scope, requirements, responsibilities |
29
+ | Incident response / pen test | Step-by-step process with CIS Control 17/18 references |
30
+ | General question | Clear prose with CIS Controls v8 document section citations |
31
+
32
+ Always cite the relevant CIS Control number and Safeguard ID (e.g., "CIS Control 1, Safeguard 1.1").
33
+
34
+ ---
35
+
36
+ ## CIS Controls v8 Overview
37
+
38
+ **Published:** May 2021 by the Center for Internet Security (CIS)
39
+ **Key change from v7:** Consolidated from 20 to 18 controls; reorganized around asset classes (devices, software, data, users, network); added Implementation Groups.
40
+
41
+ ### Why CIS Controls?
42
+ The CIS Controls are developed from real-world attack data — specifically the MITRE ATT&CK framework and Verizon DBIR findings. They are **prioritized**: implementing IG1 alone defends against the majority of common attacks. They are **prescriptive**: each control contains specific, actionable Safeguards (formerly Sub-Controls).
43
+
44
+ ---
45
+
46
+ ## Implementation Groups (IGs)
47
+
48
+ The single most important scoping decision. Every organization starts with IG1.
49
+
50
+ | IG | Profile | Safeguards | Typical Organizations |
51
+ |----|---------|-----------|----------------------|
52
+ | **IG1** | Essential cyber hygiene | 56 safeguards | Small businesses, limited IT staff, low data sensitivity |
53
+ | **IG2** | IG1 + intermediate | 74 additional (130 total) | Mid-size, multiple departments, some sensitive data, IT team |
54
+ | **IG3** | IG2 + advanced | 23 additional (153 total) | Large enterprises, sensitive/regulated data, dedicated security team |
55
+
56
+ **All 153 safeguards** across all 18 controls are assigned to an IG. Organizations implement ALL safeguards up to their IG level.
57
+
58
+ ### IG Determination Criteria
59
+ - **IG1:** Limited cybersecurity expertise; commercially available products only; protecting employee/financial data; attacks would be significant but survivable
60
+ - **IG2:** Employs individuals responsible for managing/protecting IT; storing sensitive data affecting operations if compromised; can withstand some outages
61
+ - **IG3:** Security experts employed or contracted; stores/processes sensitive data subject to regulatory oversight; attacks could cause significant harm
62
+
63
+ ---
64
+
65
+ ## The 18 CIS Controls
66
+
67
+ ### IG1 Controls (Essential Cyber Hygiene — 56 Safeguards)
68
+
69
+ **CIS Control 1: Inventory and Control of Enterprise Assets**
70
+ - Know what hardware (endpoints, servers, network devices, IoT) is authorized on the network
71
+ - Key Safeguards: 1.1 Establish/maintain detailed enterprise asset inventory; 1.2 Address unauthorized assets; 1.3 Utilize DHCP logging; 1.4 Use dynamic host configuration protocol (DHCP) logging; 1.5 Use a passive asset discovery tool (IG2+)
72
+
73
+ **CIS Control 2: Inventory and Control of Software Assets**
74
+ - Know what software is authorized to run on enterprise assets
75
+ - Key Safeguards: 2.1 Establish/maintain a software inventory; 2.2 Ensure authorized software is currently supported; 2.3 Address unauthorized software (IG1); 2.5 Allowlist authorized software (IG2); 2.6 Allowlist authorized libraries (IG2); 2.7 Allowlist authorized scripts (IG2)
76
+
77
+ **CIS Control 3: Data Protection**
78
+ - Develop processes to identify, classify, securely handle, retain, and dispose of data
79
+ - Key Safeguards: 3.1 Establish/maintain a data management process; 3.2 Establish/maintain a data inventory; 3.3 Configure data access control lists; 3.4 Enforce data retention; 3.5 Securely dispose of data; 3.6 Encrypt data on end-user devices (IG2+); 3.11 Encrypt sensitive data at rest (IG2+); 3.13 Deploy a data loss prevention solution (IG3)
80
+
81
+ **CIS Control 4: Secure Configuration of Enterprise Assets and Software**
82
+ - Establish/maintain the secure configuration of enterprise assets and software
83
+ - Key Safeguards: 4.1 Establish/maintain a secure configuration process; 4.2 Establish/maintain a secure configuration process for network infrastructure; 4.3 Configure automatic session locking; 4.4 Implement/manage a firewall on servers; 4.5 Implement/manage a firewall on end-user devices; 4.8 Uninstall or disable unnecessary services on enterprise assets and software (IG2+)
84
+
85
+ **CIS Control 5: Account Management**
86
+ - Use processes and tools to assign/manage authorization to credentials for user accounts
87
+ - Key Safeguards: 5.1 Establish/maintain an inventory of accounts; 5.2 Use unique passwords; 5.3 Disable dormant accounts; 5.4 Restrict administrator privileges to dedicated admin accounts; 5.5 Establish/maintain an inventory of service accounts (IG2+); 5.6 Centralize account management (IG2+)
88
+
89
+ **CIS Control 6: Access Control Management**
90
+ - Use processes and tools to create, assign, manage, and revoke access credentials based on least privilege
91
+ - Key Safeguards: 6.1 Establish an access granting process; 6.2 Establish an access revoking process; 6.3 Require MFA for externally-exposed applications (IG2+); 6.4 Require MFA for remote network access (IG2+); 6.5 Require MFA for admin access (IG2+); 6.8 Define/maintain role-based access control (IG2+)
92
+
93
+ **CIS Control 7: Continuous Vulnerability Management**
94
+ - Develop a plan to continuously assess/track vulnerabilities on all enterprise assets
95
+ - Key Safeguards: 7.1 Establish/maintain a vulnerability management process; 7.2 Establish/maintain a remediation process; 7.3 Perform automated operating system patch management; 7.4 Perform automated application patch management; 7.6 Perform automated vulnerability scans of internally exposed enterprise assets (IG2+); 7.7 Remediate detected vulnerabilities (IG2+)
96
+
97
+ **CIS Control 8: Audit Log Management**
98
+ - Collect, alert, review, and retain audit logs of events that could help detect, understand, or recover from an attack
99
+ - Key Safeguards: 8.1 Establish/maintain an audit log management process; 8.2 Collect audit logs; 8.3 Ensure adequate audit log storage (IG2+); 8.5 Collect detailed audit logs (IG2+); 8.11 Conduct audit log reviews (IG2+); 8.12 Collect service provider logs (IG2+)
100
+
101
+ **CIS Control 9: Email and Web Browser Protections**
102
+ - Improve protections for email and web browsers
103
+ - Key Safeguards: 9.1 Ensure use of only fully supported browsers and email clients; 9.2 Use DNS filtering services; 9.3 Maintain/enforce email provider anti-spoofing protections (SPF, DMARC, DKIM); 9.4 Restrict unnecessary or unauthorized browser/email client extensions; 9.5 Implement DMARC (IG2+); 9.6 Block unnecessary file types (IG2+); 9.7 Deploy/maintain email server anti-malware protections (IG2+)
104
+
105
+ **CIS Control 10: Malware Defenses**
106
+ - Prevent or control installation, spread, and execution of malicious applications/code/scripts
107
+ - Key Safeguards: 10.1 Deploy/maintain anti-malware software; 10.2 Configure automatic anti-malware signature updates; 10.3 Disable autorun/autoplay; 10.4 Configure automatic anti-malware scanning of removable media; 10.5 Enable anti-exploitation features (IG2+); 10.6 Centrally manage anti-malware software (IG2+); 10.7 Use behavior-based anti-malware (IG2+)
108
+
109
+ **CIS Control 11: Data Recovery**
110
+ - Establish/maintain data recovery practices — backup critical data; protect and validate backups
111
+ - Key Safeguards: 11.1 Establish/maintain a data recovery process; 11.2 Perform automated backups; 11.3 Protect recovery data (IG2+); 11.4 Establish/maintain isolated instance of recovery data; 11.5 Test data recovery (IG2+)
112
+
113
+ **CIS Control 12: Network Infrastructure Management**
114
+ - Establish/maintain network devices to prevent attackers from exploiting services and access points
115
+ - Key Safeguards: 12.1 Ensure network infrastructure is up-to-date; 12.2 Establish/maintain a secure network architecture (IG2+); 12.3 Securely manage network infrastructure (IG2+); 12.4 Establish/maintain architecture diagram(s) (IG2+); 12.6 Use of secure network management/communication protocols (IG2+); 12.7 Ensure remote devices utilize a VPN and connecting to the enterprise's AAA infrastructure (IG2+)
116
+
117
+ **CIS Control 13: Network Monitoring and Defense**
118
+ - Operate processes and tooling to establish/maintain comprehensive network monitoring and defense
119
+ - Key Safeguards: 13.1 Centralize security event alerting (IG2+); 13.2 Deploy a host-based intrusion detection solution (IG2+); 13.3 Deploy a network intrusion detection solution (IG2+); 13.6 Collect network traffic flow logs (IG2+); 13.7 Deploy a host-based intrusion prevention solution (IG3); 13.8 Deploy a network intrusion prevention solution (IG3); 13.11 Tune security event alerting thresholds (IG3)
120
+
121
+ **CIS Control 14: Security Awareness and Skills Training**
122
+ - Establish/maintain a security awareness program to influence behavior
123
+ - Key Safeguards: 14.1 Establish/maintain a security awareness program; 14.2 Train workforce members to recognize social engineering attacks; 14.3 Train workforce on authentication best practices; 14.4 Train workforce on data handling best practices; 14.5 Train workforce on causes of unintentional data exposure; 14.6 Train on recognizing/reporting security incidents; 14.7 Train workforce on how to identify/report insider threats (IG2+)
124
+
125
+ **CIS Control 15: Service Provider Management**
126
+ - Develop a process to evaluate service providers who hold sensitive data or are responsible for critical IT platforms
127
+ - Key Safeguards: 15.1 Establish/maintain an inventory of service providers; 15.2 Establish/maintain a service provider management policy; 15.3 Classify service providers; 15.4 Ensure service provider contracts include security requirements; 15.5 Assess service providers (IG2+); 15.6 Monitor service providers (IG2+); 15.7 Securely decommission service providers (IG2+)
128
+
129
+ **CIS Control 16: Application Software Security**
130
+ - Manage the security life cycle of in-house developed, hosted, or acquired software
131
+ - Key Safeguards: 16.1 Establish/maintain a secure application development process; 16.2 Establish/maintain a process to accept/address software vulnerabilities; 16.3 Perform root cause analysis on security vulnerabilities; 16.4 Establish/maintain a process for receiving/acting on software vulnerability reports; 16.5 Use up-to-date/trusted third-party software components; 16.6 Establish/maintain a severity rating system for software vulnerabilities; 16.7 Use standard hardening configuration templates; 16.8 Separate production/non-production systems; 16.9 Train developers in application security; 16.10 Apply secure design principles (IG3); 16.11 Leverage vetted modules/services (IG3); 16.12 Implement code-level security checks (IG3); 16.13 Conduct root cause analysis on network penetrations (IG3); 16.14 Conduct threat modeling (IG3)
132
+
133
+ **CIS Control 17: Incident Response Management**
134
+ - Establish a program to develop/maintain an incident response capability
135
+ - Key Safeguards: 17.1 Designate personnel to manage incident handling; 17.2 Establish/maintain contact information for reporting security incidents; 17.3 Establish/maintain an enterprise process for reporting incidents; 17.4 Establish/maintain an incident response process; 17.5 Assign key roles/responsibilities for incident response; 17.6 Define mechanisms for communicating during incident response; 17.7 Conduct routine incident response exercises; 17.8 Conduct post-incident reviews; 17.9 Establish/maintain security incident thresholds (IG2+)
136
+
137
+ **CIS Control 18: Penetration Testing**
138
+ - Test the effectiveness and resiliency of enterprise assets through identifying/exploiting weaknesses
139
+ - Key Safeguards: 18.1 Establish/maintain a penetration testing program; 18.2 Perform periodic external penetration tests; 18.3 Remediate penetration test findings; 18.4 Validate security measures; 18.5 Perform periodic internal penetration tests (IG3)
140
+
141
+ ---
142
+
143
+ ## Framework Mapping
144
+
145
+ ### CIS Controls v8 → NIST CSF 2.0
146
+
147
+ | CIS Control | NIST CSF Function | Key Categories |
148
+ |------------|------------------|----------------|
149
+ | 1 (Asset Inventory) | Identify | ID.AM-1, ID.AM-2 |
150
+ | 2 (Software Inventory) | Identify | ID.AM-2, ID.AM-5 |
151
+ | 3 (Data Protection) | Protect | PR.DS-1, PR.DS-2, PR.DS-5 |
152
+ | 4 (Secure Config) | Protect | PR.IP-1, PR.IP-3 |
153
+ | 5 (Account Management) | Protect | PR.AC-1, PR.AC-4 |
154
+ | 6 (Access Control) | Protect | PR.AC-3, PR.AC-6, PR.AC-7 |
155
+ | 7 (Vuln Management) | Identify/Protect | ID.RA-1, PR.IP-12 |
156
+ | 8 (Audit Logs) | Detect | DE.AE-3, DE.CM-1, DE.CM-7 |
157
+ | 9 (Email/Web) | Protect | PR.AT-1, PR.DS-6 |
158
+ | 10 (Malware) | Protect | PR.DS-6, PR.IP-2 |
159
+ | 11 (Data Recovery) | Recover | RC.RP-1, PR.IP-4 |
160
+ | 12 (Network Infra) | Protect | PR.AC-5, PR.IP-1 |
161
+ | 13 (Network Monitoring) | Detect | DE.CM-1, DE.CM-7, DE.AE-2 |
162
+ | 14 (Security Training) | Protect | PR.AT-1, PR.AT-2 |
163
+ | 15 (Service Providers) | Identify/Protect | ID.SC-2, ID.SC-4, PR.IP-1 |
164
+ | 16 (App Security) | Protect | PR.IP-2, PR.DS-6 |
165
+ | 17 (Incident Response) | Respond | RS.RP-1, RS.CO-2, RS.AN-1 |
166
+ | 18 (Pen Testing) | Identify/Detect | ID.RA-5, DE.CM-8 |
167
+
168
+ ### CIS Controls v8 → ISO 27001:2022 Annex A
169
+
170
+ | CIS Control | ISO 27001 Controls |
171
+ |------------|-------------------|
172
+ | 1 | A.5.9, A.8.8 |
173
+ | 2 | A.5.9, A.8.8 |
174
+ | 3 | A.5.12, A.5.33, A.8.10, A.8.11 |
175
+ | 4 | A.8.8, A.8.9 |
176
+ | 5 | A.5.15, A.5.16, A.5.18 |
177
+ | 6 | A.5.15, A.6.7, A.8.2, A.8.3 |
178
+ | 7 | A.8.8 |
179
+ | 8 | A.8.15, A.8.17 |
180
+ | 9 | A.8.22, A.8.23 |
181
+ | 10 | A.8.7 |
182
+ | 11 | A.8.13, A.8.14 |
183
+ | 12 | A.8.20, A.8.21, A.8.22 |
184
+ | 13 | A.8.16, A.8.20 |
185
+ | 14 | A.6.3, A.6.8 |
186
+ | 15 | A.5.19, A.5.20, A.5.21 |
187
+ | 16 | A.8.25, A.8.26, A.8.28 |
188
+ | 17 | A.5.24, A.5.25, A.5.26 |
189
+ | 18 | A.8.8, A.5.36 |
190
+
191
+ ### CIS Controls v8 → CMMC 2.0
192
+
193
+ | CIS Control | CMMC Domain | Practices |
194
+ |------------|-------------|-----------|
195
+ | 1 | Asset Management | AM.L2-3.11.1 |
196
+ | 3 | Media Protection | MP.L2-3.8.x |
197
+ | 5 | Identification & Authentication | IA.L1-3.5.x, IA.L2-3.5.x |
198
+ | 6 | Access Control | AC.L1-3.1.x, AC.L2-3.1.x |
199
+ | 7 | Risk Assessment | RA.L2-3.11.x |
200
+ | 8 | Audit & Accountability | AU.L2-3.3.x |
201
+ | 10 | System & Information Integrity | SI.L1-3.14.x |
202
+ | 17 | Incident Response | IR.L2-3.6.x |
203
+
204
+ ---
205
+
206
+ ## Gap Assessment Workflow
207
+
208
+ 1. **Determine Implementation Group** — profile the organization (size, data sensitivity, IT capability)
209
+ 2. **Inventory current controls** — for each applicable safeguard, assess: implemented / partial / not implemented
210
+ 3. **Score maturity** — use CIS Controls CSAT (Controls Self-Assessment Tool) or simplified RAG scoring
211
+ 4. **Prioritize gaps** — IG1 gaps first (essential hygiene), then IG2, then IG3
212
+ 5. **Map to business risk** — connect each gap to potential attack scenarios (use MITRE ATT&CK)
213
+ 6. **Build remediation roadmap** — quick wins (low effort, high impact) → medium-term → strategic
214
+
215
+ ---
216
+
217
+ ## Reference Files
218
+
219
+ - **`references/safeguards-detail.md`** — All 153 safeguards with IG assignment, implementation notes, and recommended tools
220
+ - **`references/implementation-guidance.md`** — Control-by-control implementation guidance, tooling examples, metrics, and common pitfalls
221
+ - **`references/framework-mappings.md`** — Detailed CIS Controls v8 ↔ NIST CSF 2.0 / ISO 27001:2022 / CMMC 2.0 / SOC 2 mapping tables