bmad-plus 0.4.3 → 0.5.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +48 -0
- package/README.md +4 -3
- package/package.json +5 -1
- package/readme-international/README.de.md +2 -2
- package/readme-international/README.es.md +2 -2
- package/readme-international/README.fr.md +2 -2
- package/src/bmad-plus/module.yaml +43 -12
- package/src/bmad-plus/packs/pack-shield/README.md +110 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
- package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
- package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
- package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
- package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
- package/tools/cli/commands/install.js +22 -9
- package/tools/cli/commands/update.js +4 -2
- package/tools/cli/i18n.js +514 -394
|
@@ -0,0 +1,190 @@
|
|
|
1
|
+
# PCI DSS v3.2.1 → v4.0 / v4.0.1 Change Guide
|
|
2
|
+
|
|
3
|
+
Source: PCI DSS Summary of Changes v3.2.1 to v4.0 (PCI SSC); PCI DSS v4.0.1 (June 2024)
|
|
4
|
+
|
|
5
|
+
---
|
|
6
|
+
|
|
7
|
+
## Version Timeline
|
|
8
|
+
|
|
9
|
+
| Version | Released | Status |
|
|
10
|
+
|---------|----------|--------|
|
|
11
|
+
| PCI DSS v3.2.1 | May 2018 | **Retired March 31, 2024** |
|
|
12
|
+
| PCI DSS v4.0 | March 2022 | Superseded by v4.0.1 |
|
|
13
|
+
| PCI DSS v4.0.1 | June 2024 | **Current** — minor errata update |
|
|
14
|
+
|
|
15
|
+
**Important milestones:**
|
|
16
|
+
- March 31, 2024: PCI DSS v3.2.1 retired — all assessments now use v4.0 or v4.0.1
|
|
17
|
+
- March 31, 2025: All "future-dated" requirements from PCI DSS v4.0 became **mandatory** (previously best practice)
|
|
18
|
+
- v4.0.1 corrects typographical errors and clarifications in v4.0; no new controls added
|
|
19
|
+
|
|
20
|
+
---
|
|
21
|
+
|
|
22
|
+
## Structural Changes
|
|
23
|
+
|
|
24
|
+
| Aspect | v3.2.1 | v4.0 / v4.0.1 |
|
|
25
|
+
|--------|--------|--------------|
|
|
26
|
+
| Compliance approach | Defined approach only | Added **Customised Approach** |
|
|
27
|
+
| Targeted Risk Analysis | Informal | **Formalised requirement** for flexible controls |
|
|
28
|
+
| Requirements structure | 12 requirements, 259 sub-requirements | 12 requirements, 300+ sub-requirements |
|
|
29
|
+
| Future-dated requirements | N/A | Requirements phased in by March 2025 |
|
|
30
|
+
| Informative references | Embedded | Moved to PCI SSC Reference Tool (online) |
|
|
31
|
+
| Focus | Prescriptive controls | Outcomes-focused (especially Customised Approach) |
|
|
32
|
+
|
|
33
|
+
---
|
|
34
|
+
|
|
35
|
+
## New Requirements in v4.0 (Mandatory from March 31, 2025)
|
|
36
|
+
|
|
37
|
+
These requirements were "future-dated" in v4.0 (published March 2022 as best practice) and became mandatory on **March 31, 2025**:
|
|
38
|
+
|
|
39
|
+
### Requirement 3: Protect Stored Account Data
|
|
40
|
+
- **3.3.2**: SAD stored prior to authorisation is encrypted using strong cryptography (Applies to issuers and companies supporting issuing services only)
|
|
41
|
+
- **3.3.3**: Encryption keys for pre-authorisation SAD are managed per key management requirements
|
|
42
|
+
|
|
43
|
+
### Requirement 4: Protect CHD During Transmission
|
|
44
|
+
- **4.2.1.1**: Inventory of trusted keys and certificates is maintained
|
|
45
|
+
|
|
46
|
+
### Requirement 5: Anti-Malware
|
|
47
|
+
- **5.3.3**: Anti-malware solution performs scans of removable electronic media
|
|
48
|
+
- **5.4.1**: Automated technical solution to detect and protect against phishing attacks (**NEW concept**)
|
|
49
|
+
|
|
50
|
+
### Requirement 6: Secure Development
|
|
51
|
+
- **6.3.2**: Software inventory (SBOM) maintained for bespoke and custom software
|
|
52
|
+
- **6.4.3**: All payment page scripts inventoried, authorised, and integrity protected (**NEW — critical for e-commerce**)
|
|
53
|
+
|
|
54
|
+
### Requirement 7: Access Control
|
|
55
|
+
- **7.2.4**: User accounts and access privileges reviewed at minimum every 6 months
|
|
56
|
+
- **7.2.5**: Application/system accounts managed per policy
|
|
57
|
+
- **7.2.5.1**: Privileges of application/system accounts reviewed at least every 6 months
|
|
58
|
+
- **7.3.2**: Access control system configured to enforce least privilege
|
|
59
|
+
|
|
60
|
+
### Requirement 8: Authentication
|
|
61
|
+
- **8.3.6**: Passwords/passphrases for users without MFA changed at least every 90 days
|
|
62
|
+
- **8.4.2**: MFA for all access into the CDE (**Extended scope — was only for remote access in v3.2.1**)
|
|
63
|
+
- **8.6.1**: System/application accounts that can be used interactively managed and protected
|
|
64
|
+
- **8.6.2**: Passwords/passphrases for system/application accounts not hardcoded in scripts or source code
|
|
65
|
+
|
|
66
|
+
### Requirement 10: Logging
|
|
67
|
+
- **10.4.1.1**: Automated log review mechanisms used (**NEW — manual-only review no longer sufficient**)
|
|
68
|
+
- **10.7.2**: Failures of critical security controls detected, reported, and addressed promptly (**NEW**)
|
|
69
|
+
- **10.7.3**: Failures of critical security controls responded to within defined timeframes
|
|
70
|
+
|
|
71
|
+
### Requirement 11: Security Testing
|
|
72
|
+
- **11.4.7**: Multi-tenant service providers support customers' requests for penetration testing
|
|
73
|
+
- **11.6.1**: Change and tamper detection mechanism for HTTP headers and scripts on payment pages deployed (**NEW — critical for web skimming prevention**)
|
|
74
|
+
|
|
75
|
+
### Requirement 12: Policy and Programs
|
|
76
|
+
- **12.3.2**: Targeted risk analysis for each PCI DSS requirement that has a customised approach
|
|
77
|
+
- **12.3.3**: Cryptographic cipher suites and protocols reviewed at least every 12 months
|
|
78
|
+
- **12.3.4**: Hardware and software technologies reviewed at least every 12 months
|
|
79
|
+
- **12.5.2.1**: PCI DSS scope verified by multi-tenant service providers at minimum every 6 months
|
|
80
|
+
- **12.8.4**: TPSP compliance status monitored at least every 12 months
|
|
81
|
+
- **12.9.2**: TPSPs support customers' requests for confirmation of PCI DSS responsibility
|
|
82
|
+
- **12.10.4.1**: IR personnel training at minimum every 12 months
|
|
83
|
+
- **12.10.7**: IR procedures for discovery of stored PAN in unexpected location
|
|
84
|
+
|
|
85
|
+
---
|
|
86
|
+
|
|
87
|
+
## Key Conceptual Changes
|
|
88
|
+
|
|
89
|
+
### 1. Customised Approach (Major v4.0 Innovation)
|
|
90
|
+
The Customised Approach allows organisations to implement alternative controls designed by the entity to achieve the stated **Objective** of a PCI DSS requirement, rather than following the prescriptive testing procedure.
|
|
91
|
+
|
|
92
|
+
**Requirements for Customised Approach:**
|
|
93
|
+
- A Targeted Risk Analysis (TRA) must be performed and documented for each customised control
|
|
94
|
+
- TRA must be approved by senior management
|
|
95
|
+
- Customised control must be assessed by a QSA using a Customised Approach Test Plan (CATP)
|
|
96
|
+
- Annual review and revalidation required
|
|
97
|
+
- Not available for SAQ A or SAQ B; typically used in ROC environments
|
|
98
|
+
|
|
99
|
+
**When to use**: When the defined approach does not fit the technology architecture (e.g., cloud-native, microservices, zero-trust) and the organisation can demonstrably achieve the security objective through alternative means.
|
|
100
|
+
|
|
101
|
+
### 2. Expanded MFA Requirement (Req 8.4.2)
|
|
102
|
+
In v3.2.1, MFA was required for:
|
|
103
|
+
- All non-console administrative access to the CDE
|
|
104
|
+
- Remote access to the network from outside the entity's network
|
|
105
|
+
|
|
106
|
+
In v4.0, MFA is required for **ALL access into the CDE** — including access from within the internal network. This is the most impactful change for many organisations and a common gap.
|
|
107
|
+
|
|
108
|
+
**Practical impact**: If a user on the internal corporate LAN accesses a CDE system, MFA is now required. VPN + network segmentation alone is no longer sufficient.
|
|
109
|
+
|
|
110
|
+
### 3. Payment Page Script Security (Req 6.4.3 and 11.6.1)
|
|
111
|
+
These requirements address **web skimming** (e.g., Magecart attacks) where malicious scripts are injected into payment pages to steal cardholder data.
|
|
112
|
+
|
|
113
|
+
**Req 6.4.3**: All scripts loaded and executed in the consumer's browser on a payment page must be:
|
|
114
|
+
- Inventoried with a method to confirm integrity
|
|
115
|
+
- Authorised by management — documented justification for each script
|
|
116
|
+
- Integrity protected — either using CSP (Content Security Policy), SRI (Sub-Resource Integrity), or equivalent
|
|
117
|
+
|
|
118
|
+
**Req 11.6.1**: A change and tamper detection mechanism must be deployed that:
|
|
119
|
+
- Alerts personnel to unauthorised modification of HTTP headers and content of payment pages
|
|
120
|
+
- Is assessed at minimum every 7 days (or frequency defined by targeted risk analysis)
|
|
121
|
+
|
|
122
|
+
### 4. Phishing Protection (Req 5.4.1)
|
|
123
|
+
Organisations must now implement automated technical solutions to detect and protect users against phishing attacks. Acceptable solutions include:
|
|
124
|
+
- Email security gateways with anti-phishing/URL scanning
|
|
125
|
+
- DNS filtering solutions
|
|
126
|
+
- DMARC + DKIM + SPF email authentication
|
|
127
|
+
- Anti-phishing browser extensions managed by policy
|
|
128
|
+
|
|
129
|
+
### 5. Targeted Risk Analysis (TRA)
|
|
130
|
+
The TRA is a formalised risk analysis process used to:
|
|
131
|
+
- Define controls for requirements with flexible frequencies (e.g., how often to review certain items)
|
|
132
|
+
- Justify Customised Approach implementations
|
|
133
|
+
- Document risk-based decisions
|
|
134
|
+
|
|
135
|
+
Required TRA elements: Risk description | Defined approach requirement | Reason for customisation | How the objective is achieved | Evidence of effectiveness | Management sign-off | Annual review date
|
|
136
|
+
|
|
137
|
+
### 6. Automated Log Review (Req 10.4.1.1)
|
|
138
|
+
Manual daily log review is no longer sufficient. An automated mechanism (e.g., SIEM with alert rules, automated anomaly detection) must be in place. The automated system must alert on anomalous activity.
|
|
139
|
+
|
|
140
|
+
---
|
|
141
|
+
|
|
142
|
+
## Requirements Removed or Significantly Changed
|
|
143
|
+
|
|
144
|
+
| v3.2.1 Requirement | Change in v4.0 |
|
|
145
|
+
|-------------------|---------------|
|
|
146
|
+
| Req 6.3 (Application vulnerabilities) | Restructured into 6.3.1–6.5.6 |
|
|
147
|
+
| Req 10.6 (Log review) | Restructured into 10.4 with automated review added |
|
|
148
|
+
| Req 11.2 (Vulnerability scans) | Restructured; ASV scan requirements unchanged |
|
|
149
|
+
| Req 12.10 (IR plan) | Expanded with new sub-requirements |
|
|
150
|
+
| Business-as-usual (BAU) activities | Replaced by more specific ongoing compliance requirements |
|
|
151
|
+
| Appendix A2 (TLS migration) | Removed — TLS 1.0/1.1 migration deadline passed |
|
|
152
|
+
| Appendix A3 (Designated Entities) | Moved/updated |
|
|
153
|
+
|
|
154
|
+
---
|
|
155
|
+
|
|
156
|
+
## Migration Checklist: v3.2.1 → v4.0.1
|
|
157
|
+
|
|
158
|
+
**Governance and Policy (Req 12)**
|
|
159
|
+
- [ ] Establish a formal Targeted Risk Analysis (TRA) process and template (12.3.2)
|
|
160
|
+
- [ ] Conduct annual review of cryptographic cipher suites (12.3.3)
|
|
161
|
+
- [ ] Conduct annual hardware/software technology lifecycle review (12.3.4)
|
|
162
|
+
- [ ] Confirm TPSP compliance status annually — update TPSP register (12.8.4)
|
|
163
|
+
- [ ] Train IR personnel at minimum annually (12.10.4.1)
|
|
164
|
+
- [ ] Create IR procedure for unexpected PAN discovery (12.10.7)
|
|
165
|
+
- [ ] Verify PCI DSS scope at least every 12 months and after major changes (12.5.2)
|
|
166
|
+
|
|
167
|
+
**Authentication (Req 8)**
|
|
168
|
+
- [ ] Extend MFA to ALL access into the CDE — including internal network users (8.4.2)
|
|
169
|
+
- [ ] Update password policy: minimum 12 characters (8.3.5)
|
|
170
|
+
- [ ] Ensure no hardcoded passwords in scripts or source code (8.6.2)
|
|
171
|
+
|
|
172
|
+
**E-commerce and Web Application (Req 6, 11)**
|
|
173
|
+
- [ ] Create inventory of all payment page scripts with authorisation and integrity controls (6.4.3)
|
|
174
|
+
- [ ] Deploy change/tamper detection on HTTP headers and payment page content (11.6.1)
|
|
175
|
+
- [ ] Enable CSP/SRI headers or equivalent script integrity controls
|
|
176
|
+
|
|
177
|
+
**Anti-Malware and Phishing (Req 5)**
|
|
178
|
+
- [ ] Deploy automated anti-phishing technical solution (5.4.1): email gateway + SPF/DKIM/DMARC
|
|
179
|
+
- [ ] Add removable media scanning to anti-malware coverage (5.3.3)
|
|
180
|
+
|
|
181
|
+
**Logging (Req 10)**
|
|
182
|
+
- [ ] Implement automated log review mechanism (SIEM or equivalent) (10.4.1.1)
|
|
183
|
+
- [ ] Configure monitoring for critical security control failures (10.7.2)
|
|
184
|
+
|
|
185
|
+
**Access Control (Req 7, 8)**
|
|
186
|
+
- [ ] Implement 6-monthly access reviews for all accounts (7.2.4)
|
|
187
|
+
- [ ] Document and control all application/system account access (7.2.5)
|
|
188
|
+
|
|
189
|
+
**Software Inventory (Req 6)**
|
|
190
|
+
- [ ] Build and maintain Software Bill of Materials (SBOM) for bespoke software (6.3.2)
|
|
@@ -0,0 +1,160 @@
|
|
|
1
|
+
# Section 508 / WCAG 2.0 AA — Detailed Reference
|
|
2
|
+
|
|
3
|
+
## Section 508 Provision Map
|
|
4
|
+
|
|
5
|
+
| 508 Provision | Scope | WCAG Equivalent |
|
|
6
|
+
|---------------|-------|-----------------|
|
|
7
|
+
| E205.2 | Web content | WCAG 2.0 Level A and AA |
|
|
8
|
+
| E205.3 | Electronic documents | WCAG 2.0 Level A and AA (as applicable) |
|
|
9
|
+
| E205.4 | Software (user interface) | WCAG 2.0 Level A and AA |
|
|
10
|
+
| E204 | Authoring tools | WCAG 2.0 Level A and AA |
|
|
11
|
+
| Chapter 3 | Functional Performance Criteria | Without visual, colour, hearing, speech, fine motor, cognitive limitations |
|
|
12
|
+
| Chapter 4 | Hardware | Physical ICT accessible controls, display, clearance |
|
|
13
|
+
| Chapter 6 | Support docs and services | Documentation and help in accessible formats |
|
|
14
|
+
|
|
15
|
+
---
|
|
16
|
+
|
|
17
|
+
## WCAG 2.0 Level A Success Criteria — Common Failures
|
|
18
|
+
|
|
19
|
+
### 1.1.1 Non-text Content
|
|
20
|
+
- **Failure:** `<img>` missing `alt` attribute, or `alt=""` on informative image
|
|
21
|
+
- **Failure:** Icon buttons with no accessible name (`aria-label` or `aria-labelledby`)
|
|
22
|
+
- **Failure:** Charts and graphs with no text alternative describing data
|
|
23
|
+
- **Testing:** Automated (axe, WAVE) + manual screen reader review
|
|
24
|
+
- **Fix:** Add meaningful `alt` text; use `alt=""` only for decorative images; use `aria-label` on icon-only buttons
|
|
25
|
+
|
|
26
|
+
### 1.3.1 Info and Relationships
|
|
27
|
+
- **Failure:** Visual headings not marked up with `<h1>`–`<h6>` (styled `<div>` or `<span>` used instead)
|
|
28
|
+
- **Failure:** Data tables with no `<th>` or `scope` attributes
|
|
29
|
+
- **Failure:** Form fields with visual label not programmatically associated (missing `<label for="">` or `aria-labelledby`)
|
|
30
|
+
- **Failure:** Required fields indicated only by colour or asterisk with no screen-reader-accessible text
|
|
31
|
+
- **Testing:** DOM inspection, NVDA/JAWS, automated (partial)
|
|
32
|
+
- **Fix:** Semantic HTML first; `aria-*` attributes only when semantic HTML insufficient
|
|
33
|
+
|
|
34
|
+
### 2.1.1 Keyboard
|
|
35
|
+
- **Failure:** Custom dropdowns, date pickers, modal dialogs not operable by keyboard
|
|
36
|
+
- **Failure:** Mouse-only event handlers (`onclick` on non-interactive elements, `mouseover` without `focus` equivalent)
|
|
37
|
+
- **Failure:** Drag-and-drop with no keyboard alternative
|
|
38
|
+
- **Failure:** Keyboard trap in modal — Tab cycles only within modal but no way to close it
|
|
39
|
+
- **Testing:** Tab through entire page; activate all controls; open/close modals
|
|
40
|
+
- **Fix:** Use native HTML controls where possible; for custom widgets, implement ARIA keyboard patterns (ARIA Authoring Practices Guide)
|
|
41
|
+
|
|
42
|
+
### 1.4.1 Use of Colour
|
|
43
|
+
- **Failure:** Form validation errors shown only by red border with no text or icon
|
|
44
|
+
- **Failure:** Required field indicator is colour-only (red asterisk with no "required" text)
|
|
45
|
+
- **Failure:** Link text colour is the only differentiator from surrounding body text (no underline or other visual cue)
|
|
46
|
+
|
|
47
|
+
### 4.1.2 Name, Role, Value
|
|
48
|
+
- **Failure:** Custom checkboxes/radio buttons styled with CSS, no ARIA role or checked state
|
|
49
|
+
- **Failure:** Tab panels with no `role="tab"`, `role="tablist"`, `aria-selected`
|
|
50
|
+
- **Failure:** Toggle buttons with no `aria-pressed` attribute
|
|
51
|
+
- **Failure:** Expanded/collapsed accordions with no `aria-expanded`
|
|
52
|
+
- **Testing:** Inspect ARIA properties in browser accessibility tree; test with NVDA/JAWS
|
|
53
|
+
- **Fix:** Follow WAI-ARIA Authoring Practices Guide patterns for each widget type
|
|
54
|
+
|
|
55
|
+
---
|
|
56
|
+
|
|
57
|
+
## WCAG 2.0 Level AA Success Criteria — Common Failures
|
|
58
|
+
|
|
59
|
+
### 1.4.3 Contrast (Minimum)
|
|
60
|
+
- Normal text (< 18pt or < 14pt bold): **4.5:1** minimum contrast ratio against background
|
|
61
|
+
- Large text (≥ 18pt or ≥ 14pt bold): **3:1** minimum
|
|
62
|
+
- **Failure:** Light grey text on white background (e.g., #767676 on #FFFFFF = 4.48:1 — fails AA)
|
|
63
|
+
- **Failure:** Placeholder text in input fields (often fails; placeholder is not a label substitute)
|
|
64
|
+
- **Exception:** Text in logos, inactive UI components, decorative text
|
|
65
|
+
- **Tool:** WebAIM Contrast Checker, Colour Contrast Analyser (desktop app), browser DevTools
|
|
66
|
+
|
|
67
|
+
### 1.4.4 Resize Text
|
|
68
|
+
- **Failure:** Text rendered in `px` units inside CSS `@media` queries that prevent browser zoom from scaling text
|
|
69
|
+
- **Failure:** Fixed-height containers that clip text when zoomed to 200%
|
|
70
|
+
- **Fix:** Use relative units (`rem`, `em`) for font sizes and container heights; test at 200% browser zoom
|
|
71
|
+
|
|
72
|
+
### 2.4.5 Multiple Ways
|
|
73
|
+
- **Requirement:** Provide at least two ways to find content: search + navigation, OR sitemap + navigation
|
|
74
|
+
- **Exception:** Pages that are the result of a process (e.g., checkout confirmation page) are excluded
|
|
75
|
+
|
|
76
|
+
### 2.4.7 Focus Visible
|
|
77
|
+
- **Failure:** CSS `outline: none` or `outline: 0` removing the default focus ring with no replacement
|
|
78
|
+
- **Failure:** Focus ring present but invisible against background colour
|
|
79
|
+
- **Fix:** Never remove focus styling without replacing it; use `focus-visible` CSS pseudo-class
|
|
80
|
+
|
|
81
|
+
### 3.3.3 Error Suggestion
|
|
82
|
+
- **Failure:** Form validation says "invalid input" without specifying what is wrong or how to fix it
|
|
83
|
+
- **Fix:** "Please enter a date in MM/DD/YYYY format" — specific, actionable suggestion
|
|
84
|
+
|
|
85
|
+
### 3.3.4 Error Prevention
|
|
86
|
+
- **Requirement:** For legal, financial, or data deletion transactions: provide a review-and-confirm step, OR allow the submission to be reversed/cancelled
|
|
87
|
+
|
|
88
|
+
---
|
|
89
|
+
|
|
90
|
+
## Functional Performance Criteria (Chapter 3) — Section 508
|
|
91
|
+
|
|
92
|
+
| Criterion | Requirement |
|
|
93
|
+
|-----------|-------------|
|
|
94
|
+
| 302.1 Without Vision | At least one mode operable without vision (screen reader support) |
|
|
95
|
+
| 302.2 With Limited Vision | At least one mode with features that accommodate limited vision (zoom, high contrast) |
|
|
96
|
+
| 302.3 Without Perception of Colour | Colour not the only means to convey information |
|
|
97
|
+
| 302.4 Without Hearing | At least one mode operable without hearing (captions, transcripts, visual alerts) |
|
|
98
|
+
| 302.5 With Limited Hearing | At least one mode with features for limited hearing (volume control, captioning) |
|
|
99
|
+
| 302.6 Without Speech | At least one mode operable without speech |
|
|
100
|
+
| 302.7 With Limited Manipulation | At least one mode operable without fine motor control (no simultaneous key presses, no timed actions) |
|
|
101
|
+
| 302.8 With Limited Reach and Strength | At least one mode for limited reach (reachable controls) |
|
|
102
|
+
| 302.9 With Limited Language, Cognitive, and Learning | At least one mode that accommodates limited cognitive ability |
|
|
103
|
+
|
|
104
|
+
---
|
|
105
|
+
|
|
106
|
+
## Assistive Technology Testing Matrix
|
|
107
|
+
|
|
108
|
+
| AT + Browser | Primary Use Case | Notes |
|
|
109
|
+
|--------------|-----------------|-------|
|
|
110
|
+
| JAWS + Chrome | Federal agency standard; most common screen reader in US gov | Test all interactive widgets, form flows, dynamic content (ARIA live regions) |
|
|
111
|
+
| NVDA + Chrome or Firefox | Open-source; widely used for testing; required for VPAT testing | Free; good for broad coverage |
|
|
112
|
+
| VoiceOver + Safari (macOS) | Mac users; required if product targets Mac/iOS | Keyboard shortcut: Cmd+F5 |
|
|
113
|
+
| VoiceOver + Safari (iOS) | Mobile web and native iOS apps | Swipe navigation; activate with triple-click Home/Side button |
|
|
114
|
+
| TalkBack + Chrome (Android) | Android web and native apps | Swipe navigation; activate in Accessibility settings |
|
|
115
|
+
| Dragon NaturallySpeaking | Voice control users | Test all link text and button labels are speakable |
|
|
116
|
+
| Keyboard only | Most impactful test; catches most 2.1.x failures | Tab, Shift-Tab, Enter, Space, Arrow keys |
|
|
117
|
+
| High Contrast Mode (Windows) | OS-level contrast override | Ensure no information lost; images must not disappear |
|
|
118
|
+
| Browser Zoom 200% | SC 1.4.4 | Check for horizontal scroll, content overlap, clipped text |
|
|
119
|
+
| ZoomText / Magnifier | Low-vision users | Test with 4x magnification |
|
|
120
|
+
|
|
121
|
+
---
|
|
122
|
+
|
|
123
|
+
## PDF Accessibility Checklist
|
|
124
|
+
|
|
125
|
+
| Requirement | How to Verify | Tool |
|
|
126
|
+
|-------------|---------------|------|
|
|
127
|
+
| Document is tagged | File → Properties → Description tab: "Tagged PDF: Yes" | Acrobat Pro |
|
|
128
|
+
| Tag tree structure correct | Accessibility → Reading Order; Tags panel | Acrobat Pro |
|
|
129
|
+
| Reading order = visual order | View → Read Out Loud; or Articles panel | Acrobat Pro |
|
|
130
|
+
| Images have Alt text | Right-click image tag → Properties → Alternate Text | Acrobat Pro |
|
|
131
|
+
| Form fields have Tooltip/name | Open Form Editor; check Tooltip field for each control | Acrobat Pro |
|
|
132
|
+
| Table tags with TH/Scope | Tags panel; Table Inspector | Acrobat Pro |
|
|
133
|
+
| Document language set | File → Properties → Advanced → Reading Options | Acrobat Pro |
|
|
134
|
+
| Document title set | File → Properties → Description → Title | Acrobat Pro |
|
|
135
|
+
| No flicker/motion (if any) | Review any embedded multimedia | Manual |
|
|
136
|
+
| Passes automated check | Accessibility → Full Check → Run | Acrobat Pro |
|
|
137
|
+
|
|
138
|
+
---
|
|
139
|
+
|
|
140
|
+
## Common Procurement Deficiencies in VPATs
|
|
141
|
+
|
|
142
|
+
1. **Outdated template** — using VPAT 1.x instead of VPAT 2.x (WCAG Edition). Reject and require resubmission.
|
|
143
|
+
2. **"Supports" without evidence** — vendor claims support with no remarks. Require explanation for each "Supports" claim.
|
|
144
|
+
3. **"Not Applicable" overuse** — vendor marks criteria N/A without justification. Challenge: almost no product has 100% N/A for interactive criteria.
|
|
145
|
+
4. **Missing functional performance criteria** — vendors skip Chapter 3 entirely. Required for all ICT.
|
|
146
|
+
5. **No testing methodology disclosed** — VPAT must state how testing was conducted (automated tools, AT + browser combinations, dates).
|
|
147
|
+
6. **Version mismatch** — VPAT covers version 1.0 but agency is procuring version 2.0. Require VPAT for the exact version being procured.
|
|
148
|
+
|
|
149
|
+
---
|
|
150
|
+
|
|
151
|
+
## Key Legal References
|
|
152
|
+
|
|
153
|
+
- **29 U.S.C. § 794d** — Section 508 statutory text
|
|
154
|
+
- **36 CFR Part 1194** — Access Board's Revised Section 508 Standards (effective 18 January 2018)
|
|
155
|
+
- **FAR Subpart 39.2** — Federal Acquisition Regulation provisions on Section 508
|
|
156
|
+
- **FAR clause 52.239-2** — Section 508 contract clause (mandatory for ICT procurement)
|
|
157
|
+
- **OMB Memorandum M-24-08** — "Strengthening Digital Accessibility and the Management of Section 508 of the Rehabilitation Act" (January 2024)
|
|
158
|
+
- **Section508.gov** — GSA's official guidance, VPAT templates, testing resources
|
|
159
|
+
- **WCAG 2.0** — W3C Recommendation (11 December 2008) — the incorporated technical standard
|
|
160
|
+
- **WCAG 2.1** — W3C Recommendation (5 June 2018) — supersedes 2.0; additional mobile/cognitive criteria (not yet mandated by 508 but recommended)
|
|
@@ -0,0 +1,241 @@
|
|
|
1
|
+
# SOC 2 Control Matrix Reference
|
|
2
|
+
|
|
3
|
+
## Table of Contents
|
|
4
|
+
1. [Security — Common Criteria (CC1–CC9)](#security--common-criteria)
|
|
5
|
+
2. [Availability (A1)](#availability-a1)
|
|
6
|
+
3. [Confidentiality (C1)](#confidentiality-c1)
|
|
7
|
+
4. [Processing Integrity (PI1)](#processing-integrity-pi1)
|
|
8
|
+
5. [Privacy (P1–P8)](#privacy-p1p8)
|
|
9
|
+
6. [Control Statement Template](#control-statement-template)
|
|
10
|
+
|
|
11
|
+
---
|
|
12
|
+
|
|
13
|
+
## Security — Common Criteria
|
|
14
|
+
|
|
15
|
+
### CC1 — Control Environment
|
|
16
|
+
|
|
17
|
+
| Criterion | What auditors look for | Common gap |
|
|
18
|
+
|---|---|---|
|
|
19
|
+
| CC1.1 | COSO principles demonstrated; commitment to integrity and ethical values | No code of conduct or ethics policy; leadership not visibly engaged |
|
|
20
|
+
| CC1.2 | Board or equivalent oversight of security program | No documented board/executive security oversight; no meeting minutes |
|
|
21
|
+
| CC1.3 | Org structure, reporting lines, authorities defined | Org chart not current; security roles undefined |
|
|
22
|
+
| CC1.4 | Competent personnel; HR lifecycle controls | No background checks; no security training program |
|
|
23
|
+
| CC1.5 | Accountability for security responsibilities | Performance goals don't include security; no enforcement |
|
|
24
|
+
|
|
25
|
+
**Example control (CC1.4):**
|
|
26
|
+
```
|
|
27
|
+
Control ID: CC1.4-001
|
|
28
|
+
Title: Security Awareness Training
|
|
29
|
+
Type: Preventive
|
|
30
|
+
Owner: HR / Security
|
|
31
|
+
Frequency: Annual (+ onboarding)
|
|
32
|
+
Description: All employees complete annual security awareness training covering
|
|
33
|
+
phishing, data handling, and incident reporting. Completion is tracked
|
|
34
|
+
and non-completions escalated to managers.
|
|
35
|
+
Evidence: Training completion report from LMS, onboarding checklist sign-offs
|
|
36
|
+
Test: Inspect training platform report; confirm >95% completion within period;
|
|
37
|
+
sample 5 employees to verify completion dates within 12 months.
|
|
38
|
+
```
|
|
39
|
+
|
|
40
|
+
---
|
|
41
|
+
|
|
42
|
+
### CC2 — Communication and Information
|
|
43
|
+
|
|
44
|
+
| Criterion | What auditors look for | Common gap |
|
|
45
|
+
|---|---|---|
|
|
46
|
+
| CC2.1 | Quality information available to support control objectives | Policies inaccessible or not distributed; no intranet/wiki |
|
|
47
|
+
| CC2.2 | Internal communication about security responsibilities | Security updates not communicated; no all-hands or newsletter |
|
|
48
|
+
| CC2.3 | External communication with customers, regulators, vendors | No process to notify customers of security incidents; SLA terms vague |
|
|
49
|
+
|
|
50
|
+
---
|
|
51
|
+
|
|
52
|
+
### CC3 — Risk Assessment
|
|
53
|
+
|
|
54
|
+
| Criterion | What auditors look for | Common gap |
|
|
55
|
+
|---|---|---|
|
|
56
|
+
| CC3.1 | Defined risk objectives; risk tolerance stated | No written risk appetite or tolerance statement |
|
|
57
|
+
| CC3.2 | Risk identification and analysis process | No formal risk assessment; informal or ad hoc only |
|
|
58
|
+
| CC3.3 | Fraud risk considered | No fraud risk assessment or controls |
|
|
59
|
+
| CC3.4 | Technology change risks assessed | Changes don't trigger risk reassessment |
|
|
60
|
+
|
|
61
|
+
**Example control (CC3.2):**
|
|
62
|
+
```
|
|
63
|
+
Control ID: CC3.2-001
|
|
64
|
+
Title: Annual Risk Assessment
|
|
65
|
+
Type: Detective
|
|
66
|
+
Owner: CISO / Security Manager
|
|
67
|
+
Frequency: Annual + event-driven
|
|
68
|
+
Description: A formal risk assessment is performed annually, identifying threats,
|
|
69
|
+
vulnerabilities, and likelihood/impact ratings. A risk register is
|
|
70
|
+
maintained and reviewed quarterly by the security committee.
|
|
71
|
+
Evidence: Risk register (dated), risk assessment report with sign-off,
|
|
72
|
+
security committee meeting minutes
|
|
73
|
+
Test: Inspect risk register; confirm dated within 12 months; verify
|
|
74
|
+
management sign-off; confirm high risks have remediation owners.
|
|
75
|
+
```
|
|
76
|
+
|
|
77
|
+
---
|
|
78
|
+
|
|
79
|
+
### CC4 — Monitoring Controls
|
|
80
|
+
|
|
81
|
+
| Criterion | What auditors look for | Common gap |
|
|
82
|
+
|---|---|---|
|
|
83
|
+
| CC4.1 | Ongoing and separate evaluations of controls | No internal audits; no continuous monitoring program |
|
|
84
|
+
| CC4.2 | Deficiencies evaluated and communicated | No deficiency tracking; findings not escalated |
|
|
85
|
+
|
|
86
|
+
---
|
|
87
|
+
|
|
88
|
+
### CC5 — Control Activities
|
|
89
|
+
|
|
90
|
+
| Criterion | What auditors look for | Common gap |
|
|
91
|
+
|---|---|---|
|
|
92
|
+
| CC5.1 | Controls selected to mitigate risks | Controls not mapped to risks; no controls matrix |
|
|
93
|
+
| CC5.2 | Technology controls deployed | No MFA, no endpoint protection, no SIEM |
|
|
94
|
+
| CC5.3 | Policies and procedures deployed | Policies exist but not enforced; no procedures for key processes |
|
|
95
|
+
|
|
96
|
+
---
|
|
97
|
+
|
|
98
|
+
### CC6 — Logical and Physical Access Controls
|
|
99
|
+
|
|
100
|
+
This is typically the most heavily tested area.
|
|
101
|
+
|
|
102
|
+
| Criterion | What auditors look for | Common gap |
|
|
103
|
+
|---|---|---|
|
|
104
|
+
| CC6.1 | Logical access security measures | No MFA on critical systems; no SSO; shared accounts |
|
|
105
|
+
| CC6.2 | New access provisioning authorized | No formal access request/approval process |
|
|
106
|
+
| CC6.3 | Termination / role change access removal | Terminated employees not promptly de-provisioned (>24hr is a flag) |
|
|
107
|
+
| CC6.4 | Access credentials protected | Passwords stored in plaintext; no PAM for privileged accounts |
|
|
108
|
+
| CC6.5 | Logical access reviewed | No periodic user access reviews (quarterly/annual) |
|
|
109
|
+
| CC6.6 | Logical access restricted from threats | No IDS/IPS; no network segmentation |
|
|
110
|
+
| CC6.7 | Data transmission protected | Unencrypted data in transit; no TLS enforcement |
|
|
111
|
+
| CC6.8 | Unauthorized software prevented | No application whitelisting or MDM; shadow IT uncontrolled |
|
|
112
|
+
|
|
113
|
+
**Example control (CC6.3):**
|
|
114
|
+
```
|
|
115
|
+
Control ID: CC6.3-001
|
|
116
|
+
Title: Access Termination — Employee Offboarding
|
|
117
|
+
Type: Preventive
|
|
118
|
+
Owner: IT / HR
|
|
119
|
+
Frequency: Event-driven (each termination)
|
|
120
|
+
Description: Upon employee termination, IT disables all system access within 24 hours
|
|
121
|
+
of the HR-initiated offboarding ticket. A checklist confirms: AD account
|
|
122
|
+
disabled, SaaS app access revoked, VPN certificate revoked, hardware
|
|
123
|
+
returned. HR confirms completion in the HRIS.
|
|
124
|
+
Evidence: Offboarding tickets, access revocation logs, HRIS termination records
|
|
125
|
+
Test: Select sample of 10–25 terminations in audit period; verify access was
|
|
126
|
+
revoked within 24 hours using AD logs and ticket timestamps.
|
|
127
|
+
```
|
|
128
|
+
|
|
129
|
+
---
|
|
130
|
+
|
|
131
|
+
### CC7 — System Operations
|
|
132
|
+
|
|
133
|
+
| Criterion | What auditors look for | Common gap |
|
|
134
|
+
|---|---|---|
|
|
135
|
+
| CC7.1 | Vulnerability and malware detection | No vulnerability scanning; no EDR on endpoints |
|
|
136
|
+
| CC7.2 | Monitoring for security events | No SIEM or log aggregation; alerts not reviewed |
|
|
137
|
+
| CC7.3 | Security incidents evaluated and responded to | No incident response plan; incidents not documented |
|
|
138
|
+
| CC7.4 | Security incidents contained and resolved | No IR runbook; no post-incident review process |
|
|
139
|
+
| CC7.5 | Identified vulnerabilities remediated | No SLA for patching critical vulns; no patch cadence |
|
|
140
|
+
|
|
141
|
+
---
|
|
142
|
+
|
|
143
|
+
### CC8 — Change Management
|
|
144
|
+
|
|
145
|
+
| Criterion | What auditors look for | Common gap |
|
|
146
|
+
|---|---|---|
|
|
147
|
+
| CC8.1 | Authorized, tested, and approved changes | Changes deployed without tickets or approval; no testing in staging |
|
|
148
|
+
|
|
149
|
+
**Example control (CC8.1):**
|
|
150
|
+
```
|
|
151
|
+
Control ID: CC8.1-001
|
|
152
|
+
Title: Production Change Approval
|
|
153
|
+
Type: Preventive
|
|
154
|
+
Owner: Engineering / DevOps
|
|
155
|
+
Frequency: Event-driven
|
|
156
|
+
Description: All production changes require a change request ticket approved by
|
|
157
|
+
an authorized reviewer (tech lead or manager) before deployment.
|
|
158
|
+
Emergency changes require retroactive approval within 24 hours.
|
|
159
|
+
Changes are tested in staging/QA before production promotion.
|
|
160
|
+
Evidence: Change tickets with approvals, deployment logs, PR approvals in
|
|
161
|
+
version control (GitHub/GitLab), JIRA/Linear ticket history
|
|
162
|
+
Test: Sample 20–30 changes in audit period; verify each has prior
|
|
163
|
+
approval, tester other than developer, and ticket closure with
|
|
164
|
+
deployment confirmation.
|
|
165
|
+
```
|
|
166
|
+
|
|
167
|
+
---
|
|
168
|
+
|
|
169
|
+
### CC9 — Risk Mitigation
|
|
170
|
+
|
|
171
|
+
| Criterion | What auditors look for | Common gap |
|
|
172
|
+
|---|---|---|
|
|
173
|
+
| CC9.1 | Business disruption risk mitigation | No BCP; BCP untested |
|
|
174
|
+
| CC9.2 | Vendor and business partner risk managed | No vendor inventory; no vendor assessments performed |
|
|
175
|
+
|
|
176
|
+
---
|
|
177
|
+
|
|
178
|
+
## Availability (A1)
|
|
179
|
+
|
|
180
|
+
| Criterion | What auditors look for | Common gap |
|
|
181
|
+
|---|---|---|
|
|
182
|
+
| A1.1 | Capacity monitored and managed | No capacity monitoring; no alerting on resource thresholds |
|
|
183
|
+
| A1.2 | Environmental threats managed; backups tested | No backup verification; no restore testing |
|
|
184
|
+
| A1.3 | Recovery tested; RTO/RPO defined | RTO/RPO not defined; no DR test records |
|
|
185
|
+
|
|
186
|
+
---
|
|
187
|
+
|
|
188
|
+
## Confidentiality (C1)
|
|
189
|
+
|
|
190
|
+
| Criterion | What auditors look for | Common gap |
|
|
191
|
+
|---|---|---|
|
|
192
|
+
| C1.1 | Confidential information identified and protected | No data classification; no data inventory |
|
|
193
|
+
| C1.2 | Confidential information disposed of appropriately | No data retention/disposal policy; no certificate of destruction |
|
|
194
|
+
|
|
195
|
+
---
|
|
196
|
+
|
|
197
|
+
## Processing Integrity (PI1)
|
|
198
|
+
|
|
199
|
+
| Criterion | What auditors look for | Common gap |
|
|
200
|
+
|---|---|---|
|
|
201
|
+
| PI1.1 | Processing complete, valid, accurate, timely, authorized | No input/output validation; no reconciliation controls |
|
|
202
|
+
| PI1.2 | System inputs authorized | No authorization checks; no separation of duties |
|
|
203
|
+
| PI1.3 | System outputs complete and accurate | No output verification or reconciliation |
|
|
204
|
+
| PI1.4 | Processing errors detected and corrected | No error handling or alerting; errors silently discarded |
|
|
205
|
+
| PI1.5 | Stored items protected | No integrity monitoring; no checksums |
|
|
206
|
+
|
|
207
|
+
---
|
|
208
|
+
|
|
209
|
+
## Privacy (P1–P8)
|
|
210
|
+
|
|
211
|
+
| Criterion | What auditors look for | Common gap |
|
|
212
|
+
|---|---|---|
|
|
213
|
+
| P1 | Privacy notice provided to individuals | No privacy notice; notice doesn't match actual practices |
|
|
214
|
+
| P2 | Choice and consent obtained | No consent mechanism; opt-out not honored |
|
|
215
|
+
| P3 | Personal information collected only as stated | Collecting more data than disclosed; no data minimization |
|
|
216
|
+
| P4 | Personal information used only as stated | Using PII for undisclosed purposes |
|
|
217
|
+
| P5 | Personal information retained and disposed per policy | No retention schedule; PII kept indefinitely |
|
|
218
|
+
| P6 | Personal information disclosed only as authorized | No data sharing agreements; unauthorized third-party access |
|
|
219
|
+
| P7 | Personal information quality maintained | No process to update/correct inaccurate data |
|
|
220
|
+
| P8 | Privacy complaints and inquiries handled | No DSR (Data Subject Request) process; no privacy contact |
|
|
221
|
+
|
|
222
|
+
---
|
|
223
|
+
|
|
224
|
+
## Control Statement Template
|
|
225
|
+
|
|
226
|
+
```
|
|
227
|
+
Control ID: [TSC-criterion-sequence, e.g., CC6.1-002]
|
|
228
|
+
TSC Criterion: [e.g., CC6.1 – Logical Access Security Measures]
|
|
229
|
+
Control Title: [Short descriptive name]
|
|
230
|
+
Control Type: [Preventive | Detective | Corrective]
|
|
231
|
+
Control Owner: [Role/team]
|
|
232
|
+
Frequency: [Continuous | Daily | Weekly | Monthly | Quarterly | Annual | Event-driven]
|
|
233
|
+
Description: [What the control does, who performs it, how it works, and what
|
|
234
|
+
systems/processes are covered. 2–5 sentences.]
|
|
235
|
+
Evidence: [Artifacts produced by this control that prove it operates:
|
|
236
|
+
logs, reports, tickets, sign-offs, screenshots, exports.]
|
|
237
|
+
Test Procedure:[How an auditor would test this: sample size, data sources,
|
|
238
|
+
pass/fail criteria. Match Type 1 (design) vs Type 2 (operating).]
|
|
239
|
+
Related Policies: [Which policy governs this control]
|
|
240
|
+
Linked Risks: [Which risks from risk register this control mitigates]
|
|
241
|
+
```
|