bmad-plus 0.4.3 → 0.5.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (133) hide show
  1. package/CHANGELOG.md +48 -0
  2. package/README.md +4 -3
  3. package/package.json +5 -1
  4. package/readme-international/README.de.md +2 -2
  5. package/readme-international/README.es.md +2 -2
  6. package/readme-international/README.fr.md +2 -2
  7. package/src/bmad-plus/module.yaml +43 -12
  8. package/src/bmad-plus/packs/pack-shield/README.md +110 -0
  9. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
  10. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
  11. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
  12. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
  13. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
  14. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
  15. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
  16. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
  17. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
  18. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
  19. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
  20. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
  21. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
  22. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
  23. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
  24. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
  25. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
  26. package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
  27. package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
  28. package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
  29. package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
  30. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
  31. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
  32. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
  33. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
  34. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
  35. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
  36. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
  37. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
  38. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
  39. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
  40. package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
  41. package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
  42. package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
  43. package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
  44. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
  45. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
  46. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
  47. package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
  48. package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
  49. package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
  50. package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
  51. package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
  52. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
  53. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
  54. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
  55. package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
  56. package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
  57. package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
  58. package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
  59. package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
  60. package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
  61. package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
  62. package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
  63. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
  64. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
  65. package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
  66. package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
  67. package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
  68. package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
  69. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
  70. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
  71. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
  72. package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
  73. package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
  74. package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
  75. package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
  76. package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
  77. package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
  78. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
  79. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
  80. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
  81. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
  82. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
  83. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
  84. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
  85. package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
  86. package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
  87. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
  88. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
  89. package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
  90. package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
  91. package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
  92. package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
  93. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
  94. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
  95. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
  96. package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
  97. package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
  98. package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
  99. package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
  100. package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
  101. package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
  102. package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
  103. package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
  104. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
  105. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
  106. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
  107. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
  108. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
  109. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
  110. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
  111. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
  112. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
  113. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
  114. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
  115. package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
  116. package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
  117. package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
  118. package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
  119. package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
  120. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
  121. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
  122. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
  123. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
  124. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
  125. package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
  126. package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
  127. package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
  128. package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
  129. package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
  130. package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
  131. package/tools/cli/commands/install.js +22 -9
  132. package/tools/cli/commands/update.js +4 -2
  133. package/tools/cli/i18n.js +514 -394
@@ -0,0 +1,277 @@
1
+ # NIST SP 800-53 Rev 5 — Baselines, Tailoring, and Overlays Reference
2
+
3
+ ## SP 800-53B — Control Baselines
4
+
5
+ SP 800-53B (October 2020) is the companion publication that separates the control baselines from the main SP 800-53 catalog.
6
+
7
+ ### Low Impact Baseline
8
+
9
+ **Used for:** Systems where the loss of confidentiality, integrity, or availability would have limited adverse effects.
10
+
11
+ **Examples:** Public-facing websites, internal collaboration tools with non-sensitive data, reference databases.
12
+
13
+ **Approximate scope:** ~156 controls and enhancements across 20 families (not counting PM family).
14
+
15
+ **Key characteristics:**
16
+ - Policy and procedure controls required for every family
17
+ - Basic access controls (AC-2 account management, AC-3 enforcement, AC-7 logon limits)
18
+ - Fundamental audit logging (AU-2 through AU-12)
19
+ - MFA required for privileged accounts (IA-2(1)) — extended post-EO 14028
20
+ - Basic boundary protection (SC-7) without detailed enhancement requirements
21
+ - Incident response plan (IR-8), incident reporting (IR-6)
22
+ - Vulnerability scanning (RA-5) — frequency defined by ODV
23
+
24
+ ### Moderate Impact Baseline
25
+
26
+ **Used for:** Systems where a security breach could have serious adverse effects on organizational operations, assets, or individuals.
27
+
28
+ **Examples:** HR systems with PII, financial management systems, internal collaboration with sensitive data, most federal agency systems.
29
+
30
+ **Approximate scope:** ~323 controls and enhancements across 20 families.
31
+
32
+ **Key additions over Low:**
33
+ - Automated account management (AC-2(1)), inactivity controls (AC-2(3)(5))
34
+ - Information flow enforcement (AC-4), separation of duties (AC-5)
35
+ - Least privilege requirements (AC-6 through AC-6(10))
36
+ - SIEM integration for audit (AU-6(1))
37
+ - Independent assessors (CA-2(1))
38
+ - Continuous monitoring with defined frequencies (CA-7)
39
+ - Configuration change control (CM-3), baseline automation (CM-2(2))
40
+ - Alternate storage and processing sites (CP-6, CP-7)
41
+ - Device and non-org user authentication (IA-3, IA-8)
42
+ - PKI/PIV support (IA-2(12), IA-5(2))
43
+ - Incident response testing (IR-3)
44
+ - Developer security testing (SA-11), configuration management (SA-10)
45
+ - Transmission protection (SC-8(1) — TLS required)
46
+ - Encryption at rest (SC-28(1))
47
+ - Software integrity verification (SI-7(1))
48
+ - Supply chain plan and controls (SR-2, SR-3, SR-5 through SR-8, SR-11, SR-12)
49
+
50
+ ### High Impact Baseline
51
+
52
+ **Used for:** Systems where a breach could have severe or catastrophic effects on national security, safety of human life, or major financial damage.
53
+
54
+ **Examples:** National security systems, financial systems holding critical data, emergency services, election systems.
55
+
56
+ **Approximate scope:** ~422 controls and enhancements across 20 families.
57
+
58
+ **Key additions over Moderate:**
59
+ - Account monitoring for atypical usage (AC-2(12))
60
+ - Penetration testing (CA-8)
61
+ - Insider threat program integration (AT-2(2) at org level; PM-12)
62
+ - Threat hunting (RA-10)
63
+ - Non-repudiation (AU-10)
64
+ - Session audit (AU-14)
65
+ - Supply chain team, tamper resistance, counterfeit prevention (SR-2(1), SR-6(1), SR-9 through SR-11(1))
66
+ - Developer architecture review (SA-17)
67
+ - All SI family controls including function verification (SI-6)
68
+ - Enhanced cryptographic protections
69
+
70
+ ---
71
+
72
+ ## Control Baselines by Family — Quick Reference
73
+
74
+ | Family | L Controls | M Controls | H Controls |
75
+ |--------|-----------|-----------|-----------|
76
+ | AC | 8 | 18 | 20 |
77
+ | AT | 4 | 5 | 6 |
78
+ | AU | 10 | 14 | 15 |
79
+ | CA | 6 | 8 | 9 |
80
+ | CM | 8 | 14 | 14 |
81
+ | CP | 7 | 12 | 13 |
82
+ | IA | 8 | 12 | 14 |
83
+ | IR | 7 | 9 | 10 |
84
+ | MA | 3 | 6 | 6 |
85
+ | MP | 3 | 6 | 7 |
86
+ | PE | 11 | 15 | 18 |
87
+ | PL | 4 | 6 | 7 |
88
+ | PS | 8 | 9 | 9 |
89
+ | PT | varies | varies | varies |
90
+ | RA | 5 | 8 | 9 |
91
+ | SA | 7 | 16 | 17 |
92
+ | SC | 14 | 24 | 29 |
93
+ | SI | 9 | 17 | 19 |
94
+ | SR | 1 | 9 | 12 |
95
+ | PM | org-wide | org-wide | org-wide |
96
+
97
+ ---
98
+
99
+ ## Tailoring Process (SP 800-53B Section 2)
100
+
101
+ Tailoring produces a system-specific set of controls from the starting baseline. Document all tailoring decisions in the SSP.
102
+
103
+ ### Tailoring Step 1 — Identify Common Controls
104
+
105
+ **Common controls** (also called "inherited controls") are implemented at the organization or facility level and inherited by multiple systems:
106
+
107
+ | Example | Control | Implemented By |
108
+ |---------|---------|---------------|
109
+ | Enterprise firewall | SC-7 | Network Operations |
110
+ | Badge access system | PE-3 | Facilities |
111
+ | Enterprise AV solution | SI-3 | IT Security |
112
+ | Security awareness training | AT-2 | ISSO / HR |
113
+ | Physical data center security | PE-2, PE-13 | Data Center Ops |
114
+
115
+ **Designation types:**
116
+ - **Common:** Fully inherited from another system/organization
117
+ - **System-specific:** Implemented entirely by the system
118
+ - **Hybrid:** Partially inherited, partially system-specific
119
+
120
+ Document in SSP Section: Common Control Inheritance table.
121
+
122
+ ### Tailoring Step 2 — Apply Scoping Considerations
123
+
124
+ Remove controls that are not applicable based on:
125
+
126
+ | Scoping Consideration | Example |
127
+ |----------------------|---------|
128
+ | Technology not present | MA-4 (remote maintenance) if system has no remote maintenance capability |
129
+ | Physical location | PE-3 not applicable for cloud-hosted system (inherited from CSP) |
130
+ | Mission/operational need | AC-18 (wireless) not applicable for air-gapped system |
131
+ | Applicable laws/regulations | Some PT controls not applicable if no PII processed |
132
+
133
+ **Document every scoping decision** in the SSP with rationale. Regulators and auditors will scrutinize unjustified scoping.
134
+
135
+ ### Tailoring Step 3 — Organization-Defined Values (ODVs)
136
+
137
+ Every control with brackets `[Assignment: ...]` requires an ODV. Failure to fill in ODVs is a common SSP finding.
138
+
139
+ **High-priority ODVs to define:**
140
+
141
+ | Control | Parameter | Federal Guidance | Example Value |
142
+ |---------|-----------|-----------------|---------------|
143
+ | AC-2(3) | Inactivity period before disable | OMB M-22-09: 90 days | 90 days |
144
+ | AC-7 | Max login attempts before lockout | NIST guidance: 3–5 | 3 attempts |
145
+ | AC-11 | Session inactivity before lock | OMB M-22-09: 15 minutes | 15 minutes |
146
+ | AU-11 | Audit log retention | NARA/OMB: 3 years minimum | 3 years |
147
+ | CA-7 | ConMon assessment frequency | FedRAMP: monthly/annually | Monthly for controls; annually for pen test |
148
+ | IA-5(1)(a) | Minimum password length | NIST SP 800-63B: 8+; typical federal: 15+ | 15 characters |
149
+ | IA-5(1)(h) | Password complexity | NIST SP 800-63B: no complexity requirements (memorized secrets) | No composition rules |
150
+ | RA-5 | Vulnerability scan frequency | CISA BOD 19-02; FedRAMP: monthly OS, weekly DB | Monthly OS scans |
151
+ | SI-2 | Patch critical vulns within | CISA BOD 19-02: 15 days Critical | 15 days critical; 30 days high |
152
+
153
+ ### Tailoring Step 4 — Compensating Controls
154
+
155
+ A **compensating control** provides equivalent security when the baseline control cannot be implemented as written:
156
+
157
+ **Requirements for compensating controls:**
158
+ 1. Must be as effective as the original control
159
+ 2. Must be documented with rationale
160
+ 3. Must not create additional risk
161
+ 4. Must be assessed as part of the authorization
162
+ 5. Must be reviewed at each authorization renewal
163
+
164
+ **Example:** If a legacy system cannot implement IA-2(1) (MFA for privileged accounts), a compensating control could be: enhanced privileged access monitoring (AC-2(12)) + strict IP allowlisting + privileged access workstations + session recording.
165
+
166
+ ### Tailoring Step 5 — Supplementing the Baseline
167
+
168
+ Add controls beyond the baseline when:
169
+ - Risk assessment identifies elevated threats
170
+ - Agency or system-specific security requirements demand it
171
+ - Laws, regulations, or policies require additional protections
172
+ - System processes highly sensitive data not reflected in impact level
173
+
174
+ ---
175
+
176
+ ## Overlays
177
+
178
+ ### What is an Overlay?
179
+
180
+ An overlay is a pre-tailored baseline for a specific community of interest, technology type, or operating environment. Overlays save time and promote consistency — organizations apply the overlay instead of performing baseline tailoring from scratch.
181
+
182
+ ### FedRAMP Overlay
183
+
184
+ **Scope:** Cloud services offered to federal agencies.
185
+
186
+ Key FedRAMP additions to SP 800-53 Moderate baseline:
187
+ - Specific ODV values (e.g., AU-11: 1 year; RA-5: monthly for all vulnerability types)
188
+ - FedRAMP-specific controls (e.g., FedRAMP-specific ConMon requirements)
189
+ - Required 3PAO (Third Party Assessment Organization) for independent assessment
190
+ - Continuous monitoring reporting: monthly vulnerability reports, annual pen test, POA&M updates
191
+ - JAB (Joint Authorization Board) authorization for P-ATO vs. Agency ATO path
192
+
193
+ ### DoD/CNSS Overlay (CNSS Instruction 1253)
194
+
195
+ **Scope:** National Security Systems (NSS) — classified or intelligence systems.
196
+
197
+ Key additions:
198
+ - Higher baseline requirements for NSS systems
199
+ - CNSS-specific control parameters
200
+ - Applies to systems handling Classified National Security Information (CNSI)
201
+ - Coordination with Intelligence Community Directive (ICD) 503
202
+
203
+ ### Privacy Overlay
204
+
205
+ **Scope:** Systems processing PII at scale.
206
+
207
+ - All 8 PT family controls required
208
+ - Enhanced PM privacy controls (PM-18 through PM-27)
209
+ - Privacy Impact Assessments (PTA/PIA) required
210
+ - SORN required for Privacy Act systems
211
+ - Data minimization and retention requirements
212
+
213
+ ### ICS/SCADA Overlay
214
+
215
+ **Scope:** Industrial Control Systems, SCADA, Operational Technology.
216
+
217
+ Reference: **NIST SP 800-82 Rev 3** — Guide to OT Security.
218
+ - Availability prioritized over confidentiality
219
+ - Real-time processing constraints affect control applicability
220
+ - Legacy system accommodations
221
+ - Safety system isolation requirements
222
+ - Physical process monitoring integration
223
+
224
+ ---
225
+
226
+ ## Privacy Baseline (PT Family) — Detailed
227
+
228
+ ### Privacy Act Connection
229
+
230
+ The **Privacy Act of 1974 (5 U.S.C. § 552a)** applies to federal agencies' systems of records (SOR). SP 800-53 PT controls implement Privacy Act requirements:
231
+
232
+ | PT Control | Privacy Act Requirement |
233
+ |-----------|------------------------|
234
+ | PT-5 | Privacy Act notice at collection |
235
+ | PT-6 | System of Records Notice (SORN) published in Federal Register |
236
+ | PT-8 | Computer matching agreements |
237
+
238
+ ### Privacy Impact Assessment (PIA)
239
+
240
+ Required by the **E-Government Act of 2002** for new or substantially modified IT systems collecting PII:
241
+ - Document what PII is collected and why
242
+ - How PII is used, secured, and shared
243
+ - Access controls and retention
244
+ - Published on agency website (unless classified)
245
+
246
+ Related controls: PL-2 (SSP includes privacy requirements), RA-3 (privacy risk assessment).
247
+
248
+ ---
249
+
250
+ ## Supply Chain Risk Management (SR Family) — Details
251
+
252
+ ### SCRM Plan (SR-2)
253
+
254
+ Document organization's SCRM approach:
255
+ - Component criticality (SR-4 provenance)
256
+ - Supplier risk criteria and assessment process (SR-6)
257
+ - Acquisition requirements (SR-5)
258
+ - Component authenticity verification (SR-11)
259
+ - Notification agreements with suppliers (SR-8)
260
+
261
+ ### SBOM (Software Bill of Materials)
262
+
263
+ EO 14028 and CISA requirements have increased SBOM expectations. SBOMs support:
264
+ - SR-4 (Provenance) — knowing where software components came from
265
+ - SR-11 (Component Authenticity) — verifying software integrity
266
+ - SA-4 (Acquisition) — requiring SBOM in contracts
267
+
268
+ **SBOM minimum data fields (NTIA):**
269
+ - Supplier name, component name, version, unique identifiers, dependencies, author, timestamp
270
+
271
+ ### Supplier Assessment (SR-6)
272
+
273
+ For critical suppliers:
274
+ - Annual assessments via questionnaire, audit, or site visit
275
+ - Review certifications (ISO 27001, SOC 2 Type 2, FedRAMP)
276
+ - Contractual security requirements (SA-4, SA-9)
277
+ - Incident notification agreements (SR-8)