bmad-plus 0.4.3 → 0.5.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (133) hide show
  1. package/CHANGELOG.md +48 -0
  2. package/README.md +4 -3
  3. package/package.json +5 -1
  4. package/readme-international/README.de.md +2 -2
  5. package/readme-international/README.es.md +2 -2
  6. package/readme-international/README.fr.md +2 -2
  7. package/src/bmad-plus/module.yaml +43 -12
  8. package/src/bmad-plus/packs/pack-shield/README.md +110 -0
  9. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
  10. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
  11. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
  12. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
  13. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
  14. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
  15. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
  16. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
  17. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
  18. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
  19. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
  20. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
  21. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
  22. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
  23. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
  24. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
  25. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
  26. package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
  27. package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
  28. package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
  29. package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
  30. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
  31. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
  32. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
  33. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
  34. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
  35. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
  36. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
  37. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
  38. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
  39. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
  40. package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
  41. package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
  42. package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
  43. package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
  44. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
  45. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
  46. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
  47. package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
  48. package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
  49. package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
  50. package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
  51. package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
  52. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
  53. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
  54. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
  55. package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
  56. package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
  57. package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
  58. package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
  59. package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
  60. package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
  61. package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
  62. package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
  63. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
  64. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
  65. package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
  66. package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
  67. package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
  68. package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
  69. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
  70. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
  71. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
  72. package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
  73. package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
  74. package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
  75. package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
  76. package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
  77. package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
  78. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
  79. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
  80. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
  81. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
  82. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
  83. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
  84. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
  85. package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
  86. package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
  87. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
  88. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
  89. package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
  90. package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
  91. package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
  92. package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
  93. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
  94. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
  95. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
  96. package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
  97. package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
  98. package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
  99. package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
  100. package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
  101. package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
  102. package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
  103. package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
  104. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
  105. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
  106. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
  107. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
  108. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
  109. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
  110. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
  111. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
  112. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
  113. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
  114. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
  115. package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
  116. package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
  117. package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
  118. package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
  119. package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
  120. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
  121. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
  122. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
  123. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
  124. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
  125. package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
  126. package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
  127. package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
  128. package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
  129. package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
  130. package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
  131. package/tools/cli/commands/install.js +22 -9
  132. package/tools/cli/commands/update.js +4 -2
  133. package/tools/cli/i18n.js +514 -394
@@ -0,0 +1,181 @@
1
+ # ISM — Control Applicability Framework
2
+
3
+ Source: Australian Information Security Manual, March 2026 edition
4
+ Published by: Australian Signals Directorate (ASD)
5
+
6
+ ---
7
+
8
+ ## Classification Levels & Applicability Markings
9
+
10
+ Each ISM control carries applicability markings indicating which system classification levels require that control.
11
+
12
+ | Marking | Classification Level | Description |
13
+ |---------|---------------------|-------------|
14
+ | **NC** | Non-Classified | General government information; no formal protective marking required |
15
+ | **OS** | OFFICIAL: Sensitive | Sensitive but unclassified; default baseline for most federal agency systems |
16
+ | **P** | PROTECTED | Classified information; compromise could damage national/organisational interests |
17
+ | **S** | SECRET | Highly sensitive; serious damage to national security if compromised |
18
+ | **TS** | TOP SECRET | Exceptionally sensitive; grave damage to national security if compromised |
19
+
20
+ ### Stacking Rule
21
+ Higher classification systems must implement **all controls for lower levels plus their own level**:
22
+ - NC system → NC controls only
23
+ - OS system → NC + OS controls
24
+ - PROTECTED system → NC + OS + P controls
25
+ - SECRET system → NC + OS + P + S controls
26
+ - TOP SECRET system → NC + OS + P + S + TS controls
27
+
28
+ ---
29
+
30
+ ## Risk-Based Control Selection Process
31
+
32
+ The ISM does not mandate a one-size-fits-all approach. The selection process:
33
+
34
+ 1. **Determine system classification** based on the highest sensitivity of information the system stores, processes, or communicates
35
+ 2. **Define security objectives** — identify CIA (Confidentiality, Integrity, Availability) requirements
36
+ 3. **Select baseline controls** using applicability markings
37
+ 4. **Tailor controls** — add controls for specific threats; document exclusions with risk justification
38
+ 5. **Document in SSP** — all selected controls, exclusions, and justifications must be recorded in the System Security Plan
39
+
40
+ ---
41
+
42
+ ## System Security Plan (SSP) — Required Content
43
+
44
+ The SSP is the primary authorisation artefact. It must include:
45
+
46
+ | Section | Content |
47
+ |---------|---------|
48
+ | System overview | Name, owner, purpose, environment |
49
+ | System boundary | What is in scope (hardware, software, interfaces) |
50
+ | Classification level | Highest classification handled |
51
+ | Security objectives | Confidentiality, Integrity, Availability ratings (High/Medium/Low) |
52
+ | Control selection | All applicable ISM controls with applicability justification |
53
+ | Implemented controls | Evidence of implementation for each control |
54
+ | Excluded controls | Controls not implemented with documented risk acceptance |
55
+ | Risk register | Identified risks, likelihood, impact, treatment |
56
+ | Authorisation | Authorising Official signature and date |
57
+ | Review schedule | Next review date (minimum: every 24 months or after significant change) |
58
+
59
+ ---
60
+
61
+ ## IRAP Assessment Requirements
62
+
63
+ ### Who Needs an IRAP Assessment?
64
+ - **Mandatory**: Systems handling PROTECTED and above
65
+ - **Strongly recommended**: Systems handling OFFICIAL: Sensitive
66
+ - **Government policy**: Any system used to deliver government services to citizens
67
+
68
+ ### IRAP Assessor Requirements
69
+ - Must be listed on the ASD IRAP Assessors Register
70
+ - Must be independent of the system being assessed
71
+ - Must have current ASD-recognised qualifications
72
+ - Find assessors: https://www.cyber.gov.au/resources-business-and-government/assessment-and-evaluation-programs/irap/irap-assessors
73
+
74
+ ### Assessment Cycle
75
+ - Initial assessment before system authorisation
76
+ - Re-assessment every **24 months** (minimum)
77
+ - Re-assessment required after **significant change** (major architecture change, new classification level, major new functionality)
78
+
79
+ ### IRAP Assessment Artefact Checklist
80
+ - [ ] Current System Security Plan (SSP)
81
+ - [ ] Network architecture diagrams
82
+ - [ ] Asset register (hardware and software)
83
+ - [ ] Risk register with current risk ratings
84
+ - [ ] Policy suite (all security policies referenced in SSP)
85
+ - [ ] Evidence of implemented controls (configuration screenshots, logs, test results)
86
+ - [ ] Previous IRAP assessment report (if re-assessment)
87
+ - [ ] Plan of Action & Milestones (POA&M) for any outstanding findings
88
+ - [ ] Incident register (last 12 months)
89
+ - [ ] Patch management reports
90
+
91
+ ---
92
+
93
+ ## Essential Eight — ISM Relationship
94
+
95
+ The Essential Eight are **eight priority mitigation strategies** extracted from the broader ISM control set. They are not a separate standard but a prioritised subset.
96
+
97
+ | Essential Eight Strategy | Primary ISM Chapter(s) | Notes |
98
+ |-------------------------|----------------------|-------|
99
+ | Application control (allow-listing) | Ch. 13 System Hardening | Prevents execution of unapproved software |
100
+ | Patch applications | Ch. 14 System Management | Critical patches ≤14 days |
101
+ | Configure Microsoft Office macros | Ch. 13 System Hardening | Restrict macro execution |
102
+ | User application hardening | Ch. 13 System Hardening | Browser, Office, PDF hardening |
103
+ | Restrict administrative privileges | Ch. 13 System Hardening, Ch. 6 Personnel | Least privilege, PAM |
104
+ | Patch operating systems | Ch. 14 System Management | Critical OS patches ≤14 days |
105
+ | Multi-factor authentication (MFA) | Ch. 6, Ch. 9, Ch. 19 | MFA for all remote access, privileged accounts |
106
+ | Regular backups | Ch. 14 System Management | Tested, offline/offsite, 3-2-1 rule |
107
+
108
+ ### Essential Eight Maturity Levels
109
+
110
+ | Level | Description | Who It Applies To |
111
+ |-------|-------------|------------------|
112
+ | **ML0** | Incomplete or ineffective implementation | Non-compliant |
113
+ | **ML1** | Partially aligned; addresses targeted attacks | Minimum for small/low-risk organisations |
114
+ | **ML2** | Mostly aligned; addresses sophisticated threats | ASD-recommended baseline for all government entities (2026 target) |
115
+ | **ML3** | Fully aligned; addresses advanced persistent threats | Required for critical infrastructure and high-risk sectors |
116
+
117
+ ---
118
+
119
+ ## Patch Management SLAs (Chapter 14)
120
+
121
+ | Patch Criticality | Maximum Remediation Timeframe |
122
+ |------------------|------------------------------|
123
+ | Critical (CVSS 9–10) | 48 hours for internet-facing; 14 days for internal |
124
+ | High (CVSS 7–8.9) | 14 days |
125
+ | Medium (CVSS 4–6.9) | 30 days |
126
+ | Low (CVSS < 4) | Within next maintenance window |
127
+
128
+ ---
129
+
130
+ ## Approved Cryptographic Algorithms (Chapter 20)
131
+
132
+ The ISM mandates ASD-approved algorithms. Key requirements for March 2026:
133
+
134
+ | Use Case | Approved Algorithm(s) | Notes |
135
+ |----------|----------------------|-------|
136
+ | Symmetric encryption | AES-128 minimum (AES-256 for PROTECTED+) | |
137
+ | Asymmetric encryption | RSA-2048 minimum; EC P-256 or above | RSA-4096 / P-384 for PROTECTED+ |
138
+ | Hashing | SHA-256 minimum (SHA-384 for PROTECTED+) | MD5 and SHA-1 prohibited |
139
+ | TLS | TLS 1.2 minimum; TLS 1.3 preferred | SSL and TLS 1.0/1.1 prohibited |
140
+ | Key exchange | ECDH or DHE (2048-bit minimum) | Static DH prohibited |
141
+ | SSH | SSH2 only; ED25519 or RSA-4096 | SSH1 prohibited |
142
+
143
+ ---
144
+
145
+ ## Log Retention Requirements (Chapter 15)
146
+
147
+ | System Classification | Minimum Log Retention |
148
+ |----------------------|----------------------|
149
+ | NC | 12 months |
150
+ | OFFICIAL: Sensitive | 18 months |
151
+ | PROTECTED | 18 months |
152
+ | SECRET / TOP SECRET | As directed by agency security policy (typically 7 years) |
153
+
154
+ Logs must be stored in a tamper-evident manner, separate from the system being monitored.
155
+
156
+ ---
157
+
158
+ ## Key Differences: ISM vs ISO 27001
159
+
160
+ | Aspect | ISM (ASD) | ISO 27001 |
161
+ |--------|-----------|-----------|
162
+ | Jurisdiction | Australia (government mandatory) | International (voluntary certification) |
163
+ | Structure | 22 guideline chapters + individual controls | 10 clauses + 93 Annex A controls (2022) |
164
+ | Assessment | IRAP (ASD-certified assessors) | Third-party certification bodies |
165
+ | Classification | NC / OS / P / S / TS markings | Not classification-based |
166
+ | Update cycle | Typically annually (March edition) | Major revision every ~7 years |
167
+ | Audience | Government entities + supply chain | Any organisation |
168
+ | Essential Eight | Subset of ISM; ASD-mandated for government | No direct equivalent |
169
+
170
+ ---
171
+
172
+ ## Useful Official References
173
+
174
+ | Resource | URL |
175
+ |----------|-----|
176
+ | ISM (March 2026 PDF) | https://www.cyber.gov.au/sites/default/files/2026-03/Information%20security%20manual%20(March%202026).pdf |
177
+ | ISM OSCAL releases | https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/ism/ism-oscal-releases |
178
+ | IRAP Assessors Register | https://www.cyber.gov.au/resources-business-and-government/assessment-and-evaluation-programs/irap/irap-assessors |
179
+ | Essential Eight | https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/essential-eight |
180
+ | Essential Eight to ISM mapping | https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/essential-eight/essential-eight-maturity-model-and-ism-mapping |
181
+ | ISM GitHub (OSCAL) | https://github.com/AustralianCyberSecurityCentre/ism-oscal |
@@ -0,0 +1,183 @@
1
+ # ISM — 22 Guideline Chapters Overview
2
+
3
+ Source: Australian Information Security Manual, March 2026 edition
4
+ Published by: Australian Signals Directorate (ASD)
5
+ URL: https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/ism
6
+
7
+ ---
8
+
9
+ ## Chapter Summary Table
10
+
11
+ | # | Chapter | Domain | Key Control Areas |
12
+ |---|---------|--------|------------------|
13
+ | 1 | Cyber Security Roles | Governance | CISO appointment, security responsibilities, accountability structures, security culture |
14
+ | 2 | Cyber Security Incidents | Detect/Respond | Incident definition, reporting obligations, response procedures, ASD notification |
15
+ | 3 | Procurement & Outsourcing | Governance | Supply chain security, vendor assessment, cloud service security requirements |
16
+ | 4 | Cyber Security Documentation | Governance | SSP, risk register, security policies, document classification and review |
17
+ | 5 | Physical Security | Protect | Secure areas, physical access controls, equipment security, clean desk |
18
+ | 6 | Personnel Security | Protect | Personnel screening, security clearances, user awareness, termination procedures |
19
+ | 7 | Communications Infrastructure | Protect | Cabling, network zoning, physical comms protection, signal security |
20
+ | 8 | Communications Systems | Protect | Voice systems, video conferencing, fax and messaging security |
21
+ | 9 | Enterprise Mobility | Protect | Mobile devices, BYOD, remote access, mobile device management (MDM) |
22
+ | 10 | Evaluated Products | Protect | Use of evaluated/certified products (Common Criteria, FIPS), cryptographic modules |
23
+ | 11 | IT Equipment | Protect | Hardware procurement, asset register, equipment disposal, TEMPEST |
24
+ | 12 | Media | Protect | Removable media controls, media sanitisation, media destruction |
25
+ | 13 | System Hardening | Protect | OS hardening, application hardening, firmware security, least privilege |
26
+ | 14 | System Management | Protect | Patch management, change management, backups, configuration management |
27
+ | 15 | System Monitoring | Detect | Logging requirements, SIEM, anomaly detection, audit log retention |
28
+ | 16 | Software Development | Protect | Secure SDLC, code review, dependency management, vulnerability disclosure |
29
+ | 17 | Database Systems | Protect | Database hardening, access controls, encryption at rest, query controls |
30
+ | 18 | Email | Protect | Email filtering, DMARC/SPF/DKIM, email content security, phishing controls |
31
+ | 19 | Networking | Protect | Network segmentation, firewall rules, DNS security, VPN standards |
32
+ | 20 | Cryptography | Protect | Approved algorithms, key management, PKI, TLS standards |
33
+ | 21 | Gateways | Protect | Content filtering, data diodes, cross-domain solutions, proxy security |
34
+ | 22 | Data Transfers | Protect | Approved transfer methods, data labelling, transfer logging |
35
+
36
+ ---
37
+
38
+ ## Chapter Detail
39
+
40
+ ### Chapter 1 — Cyber Security Roles
41
+ - Organisations must appoint a Chief Information Security Officer (CISO) with appropriate authority
42
+ - Security responsibilities must be defined across all levels of the organisation
43
+ - A system owner must be designated for each ICT system
44
+ - Key controls cover: CISO role definition, security advisor appointments, escalation paths
45
+
46
+ ### Chapter 2 — Cyber Security Incidents
47
+ - Defines a cyber security incident as any actual or suspected compromise of a system's confidentiality, integrity, or availability
48
+ - ASD must be notified of significant incidents — especially for systems handling PROTECTED and above
49
+ - Response procedures must be documented and tested
50
+ - Incident evidence must be preserved; post-incident reviews required
51
+ - Key controls: incident categorisation, notification timelines, forensic preservation, lessons learned
52
+
53
+ ### Chapter 3 — Procurement & Outsourcing
54
+ - All ICT procurement must consider cyber security requirements before purchase
55
+ - Cloud services must be assessed for compliance with the ISM and ASD Cloud Security Guidance
56
+ - Outsourced services must contractually require ISM-aligned security controls
57
+ - Supply chain risks must be assessed and managed
58
+ - Key controls: vendor security assessments, contract clauses, cloud service provider evaluation
59
+
60
+ ### Chapter 4 — Cyber Security Documentation
61
+ - Every system must have a current System Security Plan (SSP) — the primary authorisation document
62
+ - Risk registers must be maintained and reviewed
63
+ - Security policies and procedures must be version-controlled, approved by management, and reviewed at least annually
64
+ - Key documents: SSP, risk register, incident response plan, change management plan, business continuity plan
65
+
66
+ ### Chapter 5 — Physical Security
67
+ - Secure areas must be established and access controlled
68
+ - Visitors must be escorted in secure areas
69
+ - Equipment must be protected from physical tampering
70
+ - Clean desk and clear screen policies required
71
+ - Key controls: physical access logs, secure area classifications, equipment labelling
72
+
73
+ ### Chapter 6 — Personnel Security
74
+ - Personnel must be screened before access to sensitive systems
75
+ - Security clearances must match the classification level of systems accessed
76
+ - Security awareness training must be provided at onboarding and annually
77
+ - Access must be revoked promptly on termination
78
+ - Key controls: background checks, clearance validation, training records, offboarding checklist
79
+
80
+ ### Chapter 7 — Communications Infrastructure
81
+ - Cabling must be protected from interception and damage
82
+ - Network zones must be established with appropriate separation
83
+ - Physical communications infrastructure in secure areas must be physically protected
84
+ - Key controls: cable labelling, conduit requirements, zone separation
85
+
86
+ ### Chapter 8 — Communications Systems
87
+ - Voice over IP (VoIP) and video conferencing systems must be secured
88
+ - PSTN systems connected to secure networks require additional controls
89
+ - Fax and messaging systems handling sensitive information must use approved encryption
90
+ - Key controls: VoIP hardening, conferencing system security, messaging encryption
91
+
92
+ ### Chapter 9 — Enterprise Mobility
93
+ - Mobile devices accessing government systems must be enrolled in an approved MDM solution
94
+ - BYOD must be managed through containerisation or equivalent
95
+ - Remote access must use approved VPN with MFA
96
+ - Lost or stolen devices must be remotely wipeable
97
+ - Key controls: MDM enrolment, remote wipe capability, MFA for remote access, mobile app vetting
98
+
99
+ ### Chapter 10 — Evaluated Products
100
+ - Systems handling PROTECTED and above must use cryptographic products evaluated or approved by ASD
101
+ - Common Criteria evaluated products are preferred for high-assurance environments
102
+ - FIPS 140-2/3 validated modules required for classified cryptographic operations
103
+ - Key controls: product evaluation requirements, cryptographic module validation
104
+
105
+ ### Chapter 11 — IT Equipment
106
+ - All ICT equipment must be recorded in an asset register
107
+ - Equipment must be disposed of securely (data sanitisation before disposal)
108
+ - Equipment in sensitive areas may require TEMPEST certification
109
+ - Key controls: asset register, equipment disposal procedures, TEMPEST assessment
110
+
111
+ ### Chapter 12 — Media
112
+ - Removable media must be controlled and authorised
113
+ - Media used in classified environments must be treated at the classification level of the system
114
+ - Media must be sanitised (overwrite/degauss) or destroyed before disposal
115
+ - Key controls: removable media register, sanitisation procedures, destruction certificates
116
+
117
+ ### Chapter 13 — System Hardening
118
+ - Operating systems must be hardened before deployment (remove unnecessary services, disable default accounts)
119
+ - Applications must be hardened (disable unused features, apply vendor hardening guides)
120
+ - Firmware security settings must be configured (Secure Boot, BIOS passwords)
121
+ - Least privilege must be enforced — no standing administrative access
122
+ - Key controls: OS hardening checklists, application allow-listing, firmware configuration, privileged access management
123
+
124
+ ### Chapter 14 — System Management
125
+ - Critical patches must be applied within defined timeframes (14 days for critical, 30 days for non-critical)
126
+ - Change management must follow a documented and approved process
127
+ - Backups must be tested regularly; backup media must be stored securely
128
+ - Configuration management must track all changes to system baseline
129
+ - Key controls: patch management SLAs, backup testing schedule, change approval process
130
+
131
+ ### Chapter 15 — System Monitoring
132
+ - Centralised event logging must be implemented (SIEM or equivalent)
133
+ - Log retention: minimum 18 months for systems handling PROTECTED and above
134
+ - Anomalous events must trigger alerts and investigation
135
+ - Privileged access and system changes must be logged
136
+ - Key controls: log collection scope, retention periods, alerting thresholds, log integrity
137
+
138
+ ### Chapter 16 — Software Development
139
+ - Software development must follow a secure Software Development Life Cycle (SDLC)
140
+ - Code reviews and vulnerability testing required before deployment
141
+ - Third-party dependencies must be tracked and patched
142
+ - Vulnerability disclosure policy required for externally facing systems
143
+ - Key controls: SDLC documentation, code review evidence, dependency scanning, pen testing
144
+
145
+ ### Chapter 17 — Database Systems
146
+ - Databases must be hardened (remove default accounts, disable unnecessary features)
147
+ - Access to databases must follow least privilege
148
+ - Sensitive data at rest must be encrypted
149
+ - Database activity must be logged
150
+ - Key controls: database hardening checklist, access control matrix, encryption at rest, query logging
151
+
152
+ ### Chapter 18 — Email
153
+ - Email gateways must implement DMARC, DKIM, and SPF
154
+ - Email filtering must block malicious attachments and phishing content
155
+ - Outbound emails containing sensitive information must be controlled
156
+ - Key controls: DMARC policy (reject), DKIM signing, SPF records, gateway filtering logs
157
+
158
+ ### Chapter 19 — Networking
159
+ - Network segmentation must separate sensitive systems from general-purpose networks
160
+ - Firewall rule sets must be documented, reviewed, and audited
161
+ - DNS security extensions (DNSSEC) recommended
162
+ - VPNs must use approved encryption standards
163
+ - Key controls: network architecture diagram, firewall rule review schedule, DNSSEC configuration
164
+
165
+ ### Chapter 20 — Cryptography
166
+ - Only ASD-approved cryptographic algorithms must be used
167
+ - TLS 1.2 minimum (TLS 1.3 preferred) for data in transit
168
+ - Key management must follow documented procedures (generation, storage, rotation, destruction)
169
+ - PKI must be underpinned by a trusted root CA
170
+ - Key controls: algorithm approval list, key management procedures, TLS version configuration, CA management
171
+
172
+ ### Chapter 21 — Gateways
173
+ - Internet gateways must implement web content filtering
174
+ - Cross-domain solutions (CDS) required for moving information between classification levels
175
+ - Data diodes used for one-way transfers in high-security environments
176
+ - Gateway security must be regularly assessed
177
+ - Key controls: content filtering policy, CDS accreditation, gateway security assessments
178
+
179
+ ### Chapter 22 — Data Transfers
180
+ - Data transfers between different classification domains must use approved methods
181
+ - All transfers of classified data must be logged
182
+ - Data must be labelled with its protective marking before transfer
183
+ - Key controls: approved transfer mechanisms, transfer logs, label verification procedures
@@ -0,0 +1,203 @@
1
+ # ISO 27001:2013 Annex A — All 114 Controls
2
+
3
+ ## Table of Contents
4
+ - [A.5 Information Security Policies (2)](#a5-information-security-policies)
5
+ - [A.6 Organisation of Information Security (7)](#a6-organisation-of-information-security)
6
+ - [A.7 Human Resource Security (6)](#a7-human-resource-security)
7
+ - [A.8 Asset Management (10)](#a8-asset-management)
8
+ - [A.9 Access Control (14)](#a9-access-control)
9
+ - [A.10 Cryptography (2)](#a10-cryptography)
10
+ - [A.11 Physical and Environmental Security (15)](#a11-physical-and-environmental-security)
11
+ - [A.12 Operations Security (14)](#a12-operations-security)
12
+ - [A.13 Communications Security (7)](#a13-communications-security)
13
+ - [A.14 System Acquisition, Development and Maintenance (13)](#a14-system-acquisition)
14
+ - [A.15 Supplier Relationships (5)](#a15-supplier-relationships)
15
+ - [A.16 Information Security Incident Management (7)](#a16-information-security-incident-management)
16
+ - [A.17 IS Aspects of Business Continuity Management (4)](#a17-business-continuity)
17
+ - [A.18 Compliance (8)](#a18-compliance)
18
+
19
+ ---
20
+
21
+ ## A.5 Information Security Policies
22
+
23
+ | ID | Control Name |
24
+ |----|-------------|
25
+ | A.5.1.1 | Policies for information security |
26
+ | A.5.1.2 | Review of the policies for information security |
27
+
28
+ ## A.6 Organisation of Information Security
29
+
30
+ | ID | Control Name |
31
+ |----|-------------|
32
+ | A.6.1.1 | Information security roles and responsibilities |
33
+ | A.6.1.2 | Segregation of duties |
34
+ | A.6.1.3 | Contact with authorities |
35
+ | A.6.1.4 | Contact with special interest groups |
36
+ | A.6.1.5 | Information security in project management |
37
+ | A.6.2.1 | Mobile device policy |
38
+ | A.6.2.2 | Teleworking |
39
+
40
+ ## A.7 Human Resource Security
41
+
42
+ | ID | Control Name |
43
+ |----|-------------|
44
+ | A.7.1.1 | Screening |
45
+ | A.7.1.2 | Terms and conditions of employment |
46
+ | A.7.2.1 | Management responsibilities |
47
+ | A.7.2.2 | Information security awareness, education and training |
48
+ | A.7.2.3 | Disciplinary process |
49
+ | A.7.3.1 | Termination or change of employment responsibilities |
50
+
51
+ ## A.8 Asset Management
52
+
53
+ | ID | Control Name |
54
+ |----|-------------|
55
+ | A.8.1.1 | Inventory of assets |
56
+ | A.8.1.2 | Ownership of assets |
57
+ | A.8.1.3 | Acceptable use of assets |
58
+ | A.8.1.4 | Return of assets |
59
+ | A.8.2.1 | Classification of information |
60
+ | A.8.2.2 | Labelling of information |
61
+ | A.8.2.3 | Handling of assets |
62
+ | A.8.3.1 | Management of removable media |
63
+ | A.8.3.2 | Disposal of media |
64
+ | A.8.3.3 | Physical media transfer |
65
+
66
+ ## A.9 Access Control
67
+
68
+ | ID | Control Name |
69
+ |----|-------------|
70
+ | A.9.1.1 | Access control policy |
71
+ | A.9.1.2 | Access to networks and network services |
72
+ | A.9.2.1 | User registration and de-registration |
73
+ | A.9.2.2 | User access provisioning |
74
+ | A.9.2.3 | Management of privileged access rights |
75
+ | A.9.2.4 | Management of secret authentication information of users |
76
+ | A.9.2.5 | Review of user access rights |
77
+ | A.9.2.6 | Removal or adjustment of access rights |
78
+ | A.9.3.1 | Use of secret authentication information |
79
+ | A.9.4.1 | Information access restriction |
80
+ | A.9.4.2 | Secure log-on procedures |
81
+ | A.9.4.3 | Password management system |
82
+ | A.9.4.4 | Use of privileged utility programs |
83
+ | A.9.4.5 | Access control to program source code |
84
+
85
+ ## A.10 Cryptography
86
+
87
+ | ID | Control Name |
88
+ |----|-------------|
89
+ | A.10.1.1 | Policy on the use of cryptographic controls |
90
+ | A.10.1.2 | Key management |
91
+
92
+ ## A.11 Physical and Environmental Security
93
+
94
+ | ID | Control Name |
95
+ |----|-------------|
96
+ | A.11.1.1 | Physical security perimeter |
97
+ | A.11.1.2 | Physical entry controls |
98
+ | A.11.1.3 | Securing offices, rooms and facilities |
99
+ | A.11.1.4 | Protecting against external and environmental threats |
100
+ | A.11.1.5 | Working in secure areas |
101
+ | A.11.1.6 | Delivery and loading areas |
102
+ | A.11.2.1 | Equipment siting and protection |
103
+ | A.11.2.2 | Supporting utilities |
104
+ | A.11.2.3 | Cabling security |
105
+ | A.11.2.4 | Equipment maintenance |
106
+ | A.11.2.5 | Removal of assets |
107
+ | A.11.2.6 | Security of equipment and assets off-premises |
108
+ | A.11.2.7 | Secure disposal or re-use of equipment |
109
+ | A.11.2.8 | Unattended user equipment |
110
+ | A.11.2.9 | Clear desk and clear screen policy |
111
+
112
+ ## A.12 Operations Security
113
+
114
+ | ID | Control Name |
115
+ |----|-------------|
116
+ | A.12.1.1 | Documented operating procedures |
117
+ | A.12.1.2 | Change management |
118
+ | A.12.1.3 | Capacity management |
119
+ | A.12.1.4 | Separation of development, testing and operational environments |
120
+ | A.12.2.1 | Controls against malware |
121
+ | A.12.3.1 | Information backup |
122
+ | A.12.4.1 | Event logging |
123
+ | A.12.4.2 | Protection of log information |
124
+ | A.12.4.3 | Administrator and operator logs |
125
+ | A.12.4.4 | Clock synchronisation |
126
+ | A.12.5.1 | Installation of software on operational systems |
127
+ | A.12.6.1 | Management of technical vulnerabilities |
128
+ | A.12.6.2 | Restrictions on software installation |
129
+ | A.12.7.1 | Information systems audit controls |
130
+
131
+ ## A.13 Communications Security
132
+
133
+ | ID | Control Name |
134
+ |----|-------------|
135
+ | A.13.1.1 | Network controls |
136
+ | A.13.1.2 | Security of network services |
137
+ | A.13.1.3 | Segregation in networks |
138
+ | A.13.2.1 | Information transfer policies and procedures |
139
+ | A.13.2.2 | Agreements on information transfer |
140
+ | A.13.2.3 | Electronic messaging |
141
+ | A.13.2.4 | Confidentiality or non-disclosure agreements |
142
+
143
+ ## A.14 System Acquisition, Development and Maintenance
144
+
145
+ | ID | Control Name |
146
+ |----|-------------|
147
+ | A.14.1.1 | Information security requirements analysis and specification |
148
+ | A.14.1.2 | Securing application services on public networks |
149
+ | A.14.1.3 | Protecting application services transactions |
150
+ | A.14.2.1 | Secure development policy |
151
+ | A.14.2.2 | System change control procedures |
152
+ | A.14.2.3 | Technical review of applications after operating platform changes |
153
+ | A.14.2.4 | Restrictions on changes to software packages |
154
+ | A.14.2.5 | Secure system engineering principles |
155
+ | A.14.2.6 | Secure development environment |
156
+ | A.14.2.7 | Outsourced development |
157
+ | A.14.2.8 | System security testing |
158
+ | A.14.2.9 | System acceptance testing |
159
+ | A.14.3.1 | Protection of test data |
160
+
161
+ ## A.15 Supplier Relationships
162
+
163
+ | ID | Control Name |
164
+ |----|-------------|
165
+ | A.15.1.1 | Information security policy for supplier relationships |
166
+ | A.15.1.2 | Addressing security within supplier agreements |
167
+ | A.15.1.3 | Information and communication technology supply chain |
168
+ | A.15.2.1 | Monitoring and review of supplier services |
169
+ | A.15.2.2 | Managing changes to supplier services |
170
+
171
+ ## A.16 Information Security Incident Management
172
+
173
+ | ID | Control Name |
174
+ |----|-------------|
175
+ | A.16.1.1 | Responsibilities and procedures |
176
+ | A.16.1.2 | Reporting information security events |
177
+ | A.16.1.3 | Reporting information security weaknesses |
178
+ | A.16.1.4 | Assessment of and decision on information security events |
179
+ | A.16.1.5 | Response to information security incidents |
180
+ | A.16.1.6 | Learning from information security incidents |
181
+ | A.16.1.7 | Collection of evidence |
182
+
183
+ ## A.17 IS Aspects of Business Continuity Management
184
+
185
+ | ID | Control Name |
186
+ |----|-------------|
187
+ | A.17.1.1 | Planning information security continuity |
188
+ | A.17.1.2 | Implementing information security continuity |
189
+ | A.17.1.3 | Verify, review and evaluate information security continuity |
190
+ | A.17.2.1 | Availability of information processing facilities |
191
+
192
+ ## A.18 Compliance
193
+
194
+ | ID | Control Name |
195
+ |----|-------------|
196
+ | A.18.1.1 | Identification of applicable legislation and contractual requirements |
197
+ | A.18.1.2 | Intellectual property rights |
198
+ | A.18.1.3 | Protection of records |
199
+ | A.18.1.4 | Privacy and protection of personally identifiable information |
200
+ | A.18.1.5 | Regulation of cryptographic controls |
201
+ | A.18.2.1 | Independent review of information security |
202
+ | A.18.2.2 | Compliance with security policies and standards |
203
+ | A.18.2.3 | Technical compliance review |