bmad-plus 0.4.3 → 0.5.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (133) hide show
  1. package/CHANGELOG.md +48 -0
  2. package/README.md +4 -3
  3. package/package.json +5 -1
  4. package/readme-international/README.de.md +2 -2
  5. package/readme-international/README.es.md +2 -2
  6. package/readme-international/README.fr.md +2 -2
  7. package/src/bmad-plus/module.yaml +43 -12
  8. package/src/bmad-plus/packs/pack-shield/README.md +110 -0
  9. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
  10. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
  11. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
  12. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
  13. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
  14. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
  15. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
  16. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
  17. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
  18. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
  19. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
  20. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
  21. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
  22. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
  23. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
  24. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
  25. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
  26. package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
  27. package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
  28. package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
  29. package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
  30. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
  31. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
  32. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
  33. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
  34. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
  35. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
  36. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
  37. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
  38. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
  39. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
  40. package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
  41. package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
  42. package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
  43. package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
  44. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
  45. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
  46. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
  47. package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
  48. package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
  49. package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
  50. package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
  51. package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
  52. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
  53. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
  54. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
  55. package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
  56. package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
  57. package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
  58. package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
  59. package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
  60. package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
  61. package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
  62. package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
  63. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
  64. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
  65. package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
  66. package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
  67. package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
  68. package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
  69. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
  70. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
  71. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
  72. package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
  73. package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
  74. package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
  75. package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
  76. package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
  77. package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
  78. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
  79. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
  80. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
  81. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
  82. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
  83. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
  84. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
  85. package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
  86. package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
  87. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
  88. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
  89. package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
  90. package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
  91. package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
  92. package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
  93. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
  94. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
  95. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
  96. package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
  97. package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
  98. package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
  99. package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
  100. package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
  101. package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
  102. package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
  103. package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
  104. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
  105. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
  106. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
  107. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
  108. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
  109. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
  110. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
  111. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
  112. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
  113. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
  114. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
  115. package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
  116. package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
  117. package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
  118. package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
  119. package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
  120. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
  121. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
  122. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
  123. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
  124. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
  125. package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
  126. package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
  127. package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
  128. package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
  129. package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
  130. package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
  131. package/tools/cli/commands/install.js +22 -9
  132. package/tools/cli/commands/update.js +4 -2
  133. package/tools/cli/i18n.js +514 -394
@@ -0,0 +1,359 @@
1
+ # TSA CRMP — Detailed Requirements and Implementation Guidance
2
+
3
+ Source: Based on publicly available TSA Security Directive summaries, Federal Register notices, and DHS/CISA publications.
4
+
5
+ ---
6
+
7
+ ## CRMP Component 1: Cybersecurity Implementation Plan (CIP) / COIP
8
+
9
+ ### Purpose
10
+ The CIP (or COIP under the NPRM) is the master compliance document that demonstrates how the covered entity implements and maintains all required cybersecurity measures. It must be submitted to TSA for review and approval.
11
+
12
+ ### Required Sections
13
+
14
+ **Section 1: Leadership and Accountability**
15
+ - Identity of the Accountable Executive (named C-suite individual with authority over cybersecurity decisions and resources)
16
+ - Identity of the Cybersecurity Coordinator (primary) and backup designee
17
+ - Contact information for both (including 24/7 phone numbers)
18
+ - Reporting structure between coordinator and accountable executive
19
+
20
+ **Section 2: Critical Cyber System (CCS) Inventory**
21
+ - Complete list of systems designated as Critical Cyber Systems
22
+ - For each CCS: system name, type (IT/OT/ICS), function, owner, physical location, network zone
23
+ - Methodology used for CCS determination
24
+ - Process for updating the inventory when architecture changes
25
+
26
+ **Section 3: Network Architecture Overview**
27
+ - Current network topology diagrams (IT and OT — must be accurate and current)
28
+ - Description of IT/OT boundary mechanisms (firewalls, DMZs, data diodes)
29
+ - Remote access architecture into OT environments
30
+ - Third-party and vendor connectivity to CCS
31
+ - Identification of any legacy systems with limited segmentation capability
32
+
33
+ **Section 4: Cybersecurity Measures (Four Technical Domains)**
34
+
35
+ *Domain 1 — Network Segmentation:*
36
+ - Segmentation policy and how it is enforced
37
+ - Description of technical controls implementing the IT/OT boundary
38
+ - Compensating controls for systems that cannot be fully segmented
39
+ - Process for authorising exceptions
40
+
41
+ *Domain 2 — Access Controls:*
42
+ - Authentication requirements for CCS access (MFA for remote and privileged access)
43
+ - Account lifecycle management (provisioning, review, de-provisioning)
44
+ - Privileged access management approach
45
+ - Third-party/vendor access controls
46
+
47
+ *Domain 3 — Continuous Monitoring:*
48
+ - Monitoring tools and coverage (IT and OT)
49
+ - Log collection and retention policy
50
+ - Alerting thresholds and escalation procedures
51
+ - Integration with SOC or monitoring team
52
+
53
+ *Domain 4 — Patch Management:*
54
+ - Risk-based patch prioritisation methodology
55
+ - Patch timelines by severity (critical, high, medium, low)
56
+ - OT-specific patching process (vendor approval, testing, maintenance windows)
57
+ - Compensating controls for unpatched legacy OT systems
58
+
59
+ **Section 5: Incident Detection and Response**
60
+ - High-level description of how incidents are detected (monitoring, alerting, user reporting)
61
+ - Escalation path from detection to Cybersecurity Coordinator
62
+ - Reference to the Cybersecurity Incident Response Plan (separate document)
63
+ - CISA 24-hour reporting procedure
64
+
65
+ **Section 6: Annual Review Process**
66
+ - Frequency and process for reviewing and updating the CIP
67
+ - Triggers for out-of-cycle review (major architecture change, significant incident, new threat intelligence)
68
+ - Approval process for CIP updates
69
+ - TSA submission process for material changes
70
+
71
+ ### CIP Approval Process
72
+ 1. Covered entity submits CIP to TSA via designated secure channel
73
+ 2. TSA reviews for completeness and alignment with directive requirements
74
+ 3. TSA may approve, request modifications, or reject
75
+ 4. Entity implements CIP; cannot claim TSA-approved CIP until approval is granted
76
+ 5. Material changes to CIP require resubmission
77
+
78
+ ---
79
+
80
+ ## CRMP Component 2: Incident Response Plan (IRP / CIRP)
81
+
82
+ ### Required IRP Elements
83
+
84
+ **1. Scope and Objectives**
85
+ - What systems are covered (all CCS)
86
+ - IRP objectives: contain, eradicate, recover, report
87
+
88
+ **2. Roles and Responsibilities**
89
+ - Incident Commander (typically Cybersecurity Coordinator)
90
+ - IT response team
91
+ - OT/ICS response team (may include OT vendor support)
92
+ - Legal and communications (for regulatory reporting)
93
+ - Executive escalation path
94
+
95
+ **3. Incident Classification**
96
+ Define severity tiers:
97
+ | Tier | Definition | Response Time |
98
+ |------|-----------|--------------|
99
+ | Critical | Active threat to CCS operations/safety | Immediate — all hands |
100
+ | High | Confirmed unauthorised access to CCS | Within 1 hour |
101
+ | Medium | Suspected compromise; investigation underway | Within 4 hours |
102
+ | Low | Indicator of compromise; no confirmed access | Within 24 hours |
103
+
104
+ **4. Detection and Initial Analysis**
105
+ - How anomalies are identified (monitoring alerts, user reports, third-party notification)
106
+ - Initial triage process: confirm vs false positive
107
+ - Evidence preservation from first moments
108
+
109
+ **5. Containment Procedures**
110
+ - IT containment: isolate affected systems from network
111
+ - OT containment: procedures for isolating OT from IT (IT/OT segregation under incident conditions)
112
+ - Manual operation fallback: how to operate OT assets if control systems are isolated
113
+ - Preserve operational capability while containing cyber threat
114
+
115
+ **6. Eradication and Recovery**
116
+ - Threat removal procedures
117
+ - Backup restoration: integrity verification before restoration
118
+ - System rebuild and hardening before reconnecting
119
+ - Phased return to operation
120
+
121
+ **7. CISA and TSA Notification**
122
+ - 24-hour CISA reporting trigger (see `tsa-incident-reporting.md`)
123
+ - TSA notification procedure
124
+ - Internal escalation to Accountable Executive
125
+ - Regulatory notification log (record of all notifications made)
126
+
127
+ **8. Post-Incident Review**
128
+ - After-action review within 30 days of incident closure
129
+ - Root cause analysis
130
+ - Lessons learned documented
131
+ - CIP/IRP updated based on findings
132
+ - Consider sharing with CISA/ISAC
133
+
134
+ ### Annual IRP Testing
135
+
136
+ Covered entities must **test at least two IRP objectives annually**. Testing may be conducted via:
137
+ - **Tabletop exercise**: Discussion-based walkthrough of a scenario (minimum viable testing)
138
+ - **Functional exercise**: Partial activation of IRP with actual system interaction
139
+ - **Full-scale exercise**: Complete IRP activation with IT/OT teams
140
+
141
+ **Recommended test scenarios for TSA compliance**:
142
+ 1. **IT/OT segregation drill**: Simulate IT compromise; test ability to isolate OT and continue operations manually
143
+ 2. **Ransomware response drill**: Malware detected on IT; test containment, backup integrity check, restoration procedure
144
+ 3. **Unauthorised access to OT**: Simulate credential compromise leading to OT access; test detection and response
145
+ 4. **Vendor access abuse**: Simulate third-party remote access misuse; test detection and revocation
146
+
147
+ **Test documentation required**:
148
+ - Date and type of exercise
149
+ - Scenario description
150
+ - Participants
151
+ - Objectives tested
152
+ - Pass/fail for each objective
153
+ - Findings and corrective actions
154
+ - Corrective action closure tracking
155
+
156
+ ---
157
+
158
+ ## CRMP Component 3: Architecture Design Review (ADR)
159
+
160
+ ### ADR Objectives
161
+ 1. Confirm network diagrams are current, accurate, and complete
162
+ 2. Assess effectiveness of IT/OT segmentation
163
+ 3. Identify undocumented or unauthorised connections to CCS
164
+ 4. Evaluate remote access security
165
+ 5. Assess vendor/third-party connectivity risks
166
+ 6. Produce findings and remediation plan
167
+
168
+ ### ADR Process
169
+
170
+ **Step 1: Inventory and Documentation Review**
171
+ - Collect current network topology diagrams (IT and OT)
172
+ - Review CCS inventory for completeness
173
+ - Compare diagrams to actual architecture (passive discovery or authorised scan)
174
+ - Document any discrepancies
175
+
176
+ **Step 2: Segmentation Assessment**
177
+ For each IT/OT boundary connection:
178
+ - Is the connection documented and authorised?
179
+ - What security controls enforce the boundary (firewall, DMZ, data diode)?
180
+ - Are firewall rules reviewed and minimised?
181
+ - Is there a default-deny rule on the OT side?
182
+ - Are any direct connections from internet to OT environment?
183
+
184
+ **Step 3: Remote Access Review**
185
+ - Inventory all remote access paths into OT (VPN, RDP, vendor jump servers)
186
+ - Confirm MFA is enforced for all remote OT access
187
+ - Confirm all remote access is logged and monitored
188
+ - Confirm vendor access is time-limited and requires explicit approval
189
+
190
+ **Step 4: Third-Party Connectivity**
191
+ - Map all third-party connections to CCS (vendor remote support, SCADA hosting, cloud-based OT monitoring)
192
+ - Assess contractual cybersecurity obligations of third parties
193
+ - Confirm third parties cannot access OT without entity approval and monitoring
194
+
195
+ **Step 5: Vulnerability and Risk Identification**
196
+ - Identify high-risk architecture patterns:
197
+ - Flat networks where IT and OT share the same subnet
198
+ - OT devices with direct internet connectivity
199
+ - Obsolete OT systems with no compensating controls
200
+ - Shared accounts between IT and OT
201
+ - Unencrypted protocols on OT networks (Telnet, FTP, HTTP to HMIs)
202
+
203
+ **Step 6: Findings and Remediation Plan**
204
+ For each finding:
205
+ | Finding ID | Description | Risk Level | Recommendation | Owner | Target Date |
206
+ |-----------|-------------|-----------|----------------|-------|-------------|
207
+ | ADR-001 | PLC subnet not segmented from corporate LAN | Critical | Deploy firewall; implement DMZ | OT Manager | Q2 |
208
+
209
+ ### ADR Outputs
210
+ - Updated and validated network topology diagrams
211
+ - Findings report (findings, risk ratings, recommendations)
212
+ - Remediation action plan with owners and target dates
213
+ - Sign-off by Accountable Executive
214
+
215
+ ---
216
+
217
+ ## CRMP Component 4: Cybersecurity Assessment Plan (CAP)
218
+
219
+ ### Purpose
220
+ The CAP documents how the entity will assess the effectiveness of its CRMP each year. It is not the assessment itself — it is the plan for conducting assessments. Results are reported to TSA annually.
221
+
222
+ ### Required CAP Elements
223
+
224
+ **1. Assessment Scope**
225
+ - Which CCS and CRMP components are in scope each assessment cycle
226
+ - Rationale for any CCS excluded from scope (with compensating coverage explanation)
227
+
228
+ **2. Assessment Methodology**
229
+ Define the types of assessments to be performed:
230
+ | Assessment Type | Description | Applicable To |
231
+ |----------------|-------------|---------------|
232
+ | Vulnerability scan | Automated scan of IT/OT assets for known CVEs | IT; limited OT (passive preferred) |
233
+ | Penetration testing | Authorised simulated attack to test defences | IT; OT where safe and agreed |
234
+ | Configuration review | Compare system configs against hardening standards | IT servers; network devices; OT where possible |
235
+ | Process review | Interview-based review of policies and procedures | All CRMP components |
236
+ | Red team exercise | Adversary simulation against CCS | Large/complex environments |
237
+
238
+ **OT assessment cautions**:
239
+ - Active scanning of OT networks can disrupt industrial communications — use passive monitoring tools
240
+ - Penetration testing in OT requires vendor coordination and operational approval
241
+ - Prioritise configuration review and architecture review over intrusive testing for OT
242
+
243
+ **3. Assessment Schedule**
244
+ Provide a 12-month schedule:
245
+ | Quarter | Assessment Activity | CCS in Scope |
246
+ |---------|-------------------|-------------|
247
+ | Q1 | Vulnerability scan (IT); IRP tabletop exercise | All IT CCS; IRP |
248
+ | Q2 | Configuration review (OT); ADR | OT CCS; architecture |
249
+ | Q3 | Penetration test (IT external + internal) | IT CCS |
250
+ | Q4 | Process review (all CRMP components); CAP results compilation | All |
251
+
252
+ **4. Responsible Parties**
253
+ - Internal assessment teams or third-party assessors
254
+ - OT assessment requires OT-qualified personnel (GICSP, GCIA, or equivalent)
255
+ - Independence requirements: assessors should not assess their own implementations
256
+
257
+ **5. Annual Reporting to TSA**
258
+ - Compile assessment findings and remediation status
259
+ - Submit results to TSA via designated secure channel annually
260
+ - Include: findings summary, risk ratings, remediation plan, open items, corrective action progress
261
+
262
+ ---
263
+
264
+ ## Four Technical Domains — Detailed Implementation Guidance
265
+
266
+ ### Domain 1: Network Segmentation — Implementation Details
267
+
268
+ **Minimum acceptable architecture:**
269
+ ```
270
+ [Internet] → [Edge Firewall] → [Corporate IT Network]
271
+
272
+ [IT/OT Firewall / DMZ]
273
+
274
+ [OT Network / ICS Network]
275
+
276
+ [Field Devices: PLCs, RTUs, HMIs]
277
+ ```
278
+
279
+ **Security controls for each boundary:**
280
+ - **Edge to IT**: Stateful firewall; DMZ for internet-facing services; IDS/IPS
281
+ - **IT to OT**: Dedicated firewall or data diode; default-deny; whitelist only required protocols/ports; no direct routing
282
+ - **OT to field**: Segmented VLANs for different process areas; restrict inter-VLAN traffic
283
+
284
+ **Data diodes / unidirectional gateways**: Preferred for highest-security OT environments. Data flows one way (OT → IT for monitoring/historian) — no return path possible. Vendors: Waterfall Security, Owl Cyber Defense, Bayshore Networks.
285
+
286
+ **Compensating controls for flat networks** (where full segmentation is not immediately feasible):
287
+ - Host-based firewall on all IT systems to block OT traffic
288
+ - Enhanced monitoring and alerting at the flat network level
289
+ - Documented exception with remediation timeline
290
+ - Enhanced access controls at OT device level
291
+
292
+ ### Domain 2: Access Controls — OT-Specific Guidance
293
+
294
+ **OT account management challenges**:
295
+ - Many OT systems have limited account management capability (single shared admin account)
296
+ - Legacy HMIs may not support MFA natively
297
+ - Vendor accounts are often needed for maintenance but may be always-on
298
+
299
+ **Solutions for OT access control limitations**:
300
+ | Challenge | Solution |
301
+ |-----------|---------|
302
+ | Legacy HMI, no MFA | Deploy a jump server/bastion host with MFA in front of HMI; access HMI only via jump server |
303
+ | Shared OT admin account | Log all access via PAM tool; require check-out with approval for shared account use |
304
+ | Vendor remote access | Use vendor-specific VPN with MFA; time-limited sessions; all sessions logged; revoke after job |
305
+ | No LDAP/AD support in OT | Maintain local accounts on OT devices with strong passwords; rotate quarterly |
306
+
307
+ **Privileged Access Management (PAM) for OT**:
308
+ - Check-out workflows for privileged OT credentials
309
+ - Session recording for all privileged OT access
310
+ - Automatic expiry of vendor sessions
311
+ - Alert on out-of-hours privileged access
312
+
313
+ ### Domain 3: Continuous Monitoring — OT-Specific Tools
314
+
315
+ **Recommended OT monitoring approaches:**
316
+ | Approach | Tools | Notes |
317
+ |---------|-------|-------|
318
+ | Passive network monitoring | Claroty, Dragos Platform, Nozomi Networks Guardian, Armis | No traffic injection; learn by listening |
319
+ | Asset discovery | Passive discovery via monitoring tools | Builds CCS inventory automatically |
320
+ | Anomaly detection | Dragos, Claroty, Nozomi | Alert on deviations from OT communication baselines |
321
+ | Log collection | Syslog from OT-capable devices; SIEM with OT parsers | Not all PLCs support syslog |
322
+ | Threat intelligence | Dragos WorldView, Claroty Team82, CISA ICS-CERT advisories | OT-specific threat intelligence |
323
+
324
+ **What to monitor in OT environments:**
325
+ - New devices appearing on OT network (unauthorised asset)
326
+ - New communication paths (protocol, endpoint pair)
327
+ - Engineering workstation connections to PLCs outside maintenance windows
328
+ - Remote access sessions to OT
329
+ - Command injection attempts (Modbus, DNP3, EtherNet/IP abnormal commands)
330
+ - Authentication failures on OT devices
331
+
332
+ ### Domain 4: Patch Management — OT-Specific Guidance
333
+
334
+ **OT patching lifecycle:**
335
+ 1. **Vendor notification**: Receive patch/advisory from OT vendor
336
+ 2. **Risk assessment**: Evaluate CVE severity vs operational impact of patching
337
+ 3. **Vendor confirmation**: Confirm patch is supported for your firmware version
338
+ 4. **Test environment**: Test patch in lab/test environment before production
339
+ 5. **Change approval**: Change management ticket; operations approval for downtime window
340
+ 6. **Deployment**: Apply during planned maintenance window
341
+ 7. **Verification**: Confirm system operation post-patch
342
+ 8. **Documentation**: Record patch applied, date, version
343
+
344
+ **Unpatched legacy OT systems (compensating controls)**:
345
+ | Compensating Control | Description |
346
+ |--------------------|-------------|
347
+ | Network isolation | Further isolate the legacy system to its own VLAN; restrict to minimum required communications |
348
+ | Enhanced monitoring | Increase monitoring sensitivity for the legacy system |
349
+ | Application whitelisting | If OS supports it, whitelist only authorised executables |
350
+ | Removal from internet path | Ensure no internet connectivity path to the legacy device |
351
+ | Documentation | Document the legacy system, its risks, and compensating controls in the CIP |
352
+
353
+ **Patch prioritisation (risk-based):**
354
+ | CVSS Score | Severity | Target Patch Timeline |
355
+ |-----------|---------|----------------------|
356
+ | 9.0–10.0 | Critical | 30 days (or compensating controls within 7 days) |
357
+ | 7.0–8.9 | High | 60 days |
358
+ | 4.0–6.9 | Medium | 90 days |
359
+ | 0.1–3.9 | Low | 180 days or next planned maintenance |
@@ -0,0 +1,187 @@
1
+ # TSA Cybersecurity Security Directives — Overview and Revision History
2
+
3
+ Source: Transportation Security Administration (TSA); Federal Register; DHS publications
4
+ https://www.tsa.gov/sd-and-ea
5
+
6
+ Note: TSA Security Directives are classified as Sensitive Security Information (SSI). Full directive text is not publicly available. This reference is based on publicly disclosed summaries, Federal Register notices, and TSA press releases.
7
+
8
+ ---
9
+
10
+ ## Overview
11
+
12
+ Following the May 2021 Colonial Pipeline ransomware attack, TSA issued mandatory cybersecurity Security Directives requiring critical transportation infrastructure owners and operators to implement baseline cybersecurity measures. These directives have been updated through multiple revisions and now cover pipelines, freight rail, passenger rail, public transit, and (via NPRM) bus operators.
13
+
14
+ Directives are renewed annually and carry the force of law under 49 U.S.C. § 114. Non-compliance can result in civil penalties. Each directive identifies specific "covered entities" by name — not all operators in a sector are automatically covered.
15
+
16
+ ---
17
+
18
+ ## Pipeline Security Directives
19
+
20
+ ### SD Pipeline-2021-01 Series — Immediate Measures
21
+ **Purpose**: Established minimum immediate cybersecurity requirements for pipeline operators following the Colonial Pipeline incident.
22
+
23
+ **Current revision**: Pipeline-2021-01G (effective January 2026)
24
+
25
+ | Revision | Issued | Key Changes |
26
+ |----------|--------|-------------|
27
+ | Pipeline-2021-01 | May 2021 | Initial directive: incident reporting, coordinator, practices review |
28
+ | Pipeline-2021-01A | July 2021 | Minor clarifications |
29
+ | Pipeline-2021-01B/C | 2022–2023 | Renewed with refinements |
30
+ | Pipeline-2021-01D | May 2024 | Extended; clarified applicability and reporting requirements |
31
+ | Pipeline-2021-01E | 2025 | Extended; additional clarifications |
32
+ | Pipeline-2021-01G | January 2026 | Current revision |
33
+
34
+ **Core requirements of SD Pipeline-2021-01 series**:
35
+ 1. Report cybersecurity incidents to CISA within 24 hours
36
+ 2. Designate a Cybersecurity Coordinator (24/7 availability; backup designee)
37
+ 3. Review current cybersecurity practices and identify gaps relative to TSA/CISA guidance
38
+ 4. Develop and implement remediation measures to address identified gaps
39
+
40
+ **Covered entities**: Owners and operators of TSA-designated critical hazardous liquid and natural gas pipelines and LNG facilities.
41
+
42
+ ---
43
+
44
+ ### SD Pipeline-2021-02 Series — Comprehensive CRMP
45
+ **Purpose**: Established comprehensive Cyber Risk Management Program requirements for pipeline operators.
46
+
47
+ **Current revision**: Pipeline-2021-02F (latest)
48
+
49
+ | Revision | Issued | Key Changes |
50
+ |----------|--------|-------------|
51
+ | Pipeline-2021-02 | July 2021 | Initial comprehensive CRMP requirements |
52
+ | Pipeline-2021-02A/B | 2022 | Performance-based approach introduced; replaced prescriptive controls |
53
+ | Pipeline-2021-02C/D | 2023 | Further refinements; feedback incorporated from operators |
54
+ | Pipeline-2021-02E | July 2024 | Extended; strengthened; additional clarity on OT/IT requirements |
55
+ | Pipeline-2021-02F | 2025/2026 | Current revision |
56
+
57
+ **Core requirements of SD Pipeline-2021-02 series**:
58
+ 1. **Cybersecurity Implementation Plan (CIP)**: Submit to TSA for review and approval
59
+ 2. **Cybersecurity Incident Response Plan (IRP/CIRP)**: Document + test two objectives annually
60
+ 3. **Architecture Design Review (ADR)**: Annual review of IT/OT network architecture
61
+ 4. **Cybersecurity Assessment Plan (CAP)**: Annual assessment + results reported to TSA
62
+ 5. **Four technical domains**: Network segmentation, access controls, continuous monitoring, patch management
63
+ 6. **Accountable Executive**: C-suite individual with authority for cybersecurity decisions
64
+
65
+ **Sensitive Security Information (SSI)**: The full text of SD Pipeline-2021-02 and its revisions is SSI. Covered entities receive the directive directly from TSA.
66
+
67
+ ---
68
+
69
+ ## Freight Rail Security Directives
70
+
71
+ ### SD 1580-21-01 Series — Freight Rail Cybersecurity
72
+ **Purpose**: Requires freight railroad carriers and related entities to implement cybersecurity measures equivalent in scope to the pipeline directives.
73
+
74
+ **Current revision**: SD 1580-21-01E (effective January 15, 2026)
75
+
76
+ | Revision | Issued | Key Changes |
77
+ |----------|--------|-------------|
78
+ | SD 1580-21-01 | 2021 | Initial rail cybersecurity: incident reporting, coordinator |
79
+ | SD 1580-21-01A/B/C | 2022–2023 | CRMP requirements added; performance-based updates |
80
+ | SD 1580-21-01D | October 2024 | Updated; aligned with pipeline directive structure |
81
+ | SD 1580-21-01E | January 15, 2026 | Current revision |
82
+
83
+ **Core requirements of SD 1580-21-01 series**:
84
+ 1. Report cybersecurity incidents to CISA within 24 hours
85
+ 2. Designate a Cybersecurity Coordinator (24/7)
86
+ 3. Implement CRMP including CIP, IRP (annual testing), ADR, CAP
87
+ 4. Four technical domains: segmentation, access controls, monitoring, patching
88
+ 5. Specific attention to ICS/SCADA systems controlling rail operations (switches, signals, dispatch)
89
+
90
+ **Covered entities**: TSA-designated freight railroad owners and operators with higher cybersecurity risk profiles. Includes Class I railroads and potentially higher-risk Class II/III operations.
91
+
92
+ ---
93
+
94
+ ## Public Transportation and Passenger Rail Security Directives
95
+
96
+ ### SD 1582-21-01 Series — Transit and Passenger Rail Cybersecurity
97
+ **Purpose**: Requires public transportation agencies and passenger railroad operators to implement cybersecurity measures.
98
+
99
+ **Current revision**: SD 1582-21-01E (effective January 15, 2026)
100
+
101
+ | Revision | Issued | Key Changes |
102
+ |----------|--------|-------------|
103
+ | SD 1582-21-01 | 2021 | Initial transit cybersecurity requirements |
104
+ | SD 1582-21-01A/B/C | 2022–2023 | CRMP additions; performance-based approach |
105
+ | SD 1582-21-01D | October 2024 | Updated requirements |
106
+ | SD 1582-21-01E | January 15, 2026 | Current revision |
107
+
108
+ **Core requirements of SD 1582-21-01 series**: Same structure as freight rail — incident reporting, coordinator, CRMP (CIP, IRP, ADR, CAP), four technical domains.
109
+
110
+ **Covered entities**: TSA-designated public transportation agencies (metro, light rail, commuter rail, bus rapid transit) and passenger railroad operators (Amtrak and designated commuter rail agencies).
111
+
112
+ **OT focus for transit**: Automatic Train Control (ATC) systems, SCADA for traction power and ventilation, Communications-Based Train Control (CBTC), Electronic Ticketing Systems (where they interface with operational systems), CCTV/access control integration.
113
+
114
+ ---
115
+
116
+ ## Aviation Cybersecurity
117
+
118
+ Aviation cybersecurity directives are issued separately by TSA to airport operators and aircraft operators. These are largely SSI and address:
119
+ - Incident reporting to CISA within 24 hours
120
+ - Cybersecurity Coordinator designation
121
+ - Access controls for aviation systems
122
+ - Network segmentation between passenger and operational networks
123
+ - Passenger screening system security
124
+
125
+ The aviation sector also operates under FAA cybersecurity requirements for aircraft systems, which are distinct from TSA directives.
126
+
127
+ ---
128
+
129
+ ## November 2024 NPRM — Proposed Permanent Rule
130
+
131
+ **Title**: "Enhancing Surface Transportation Cybersecurity"
132
+ **Published**: Federal Register, November 2024
133
+ **Comment period**: Closed February 5, 2025
134
+
135
+ ### What the NPRM proposes:
136
+ The NPRM would formalise current Security Directive requirements into permanent federal regulations under 49 CFR, making them enforceable as regulation rather than directive.
137
+
138
+ **Proposed covered entities**:
139
+ | Sector | Coverage |
140
+ |--------|---------|
141
+ | Pipelines | Same as current directives; higher-risk designated operators |
142
+ | Freight railroad | Higher-risk Class I and designated Class II/III |
143
+ | Passenger rail/transit | Higher-risk passenger rail and transit agencies |
144
+ | Bus operators | Incident reporting requirements only (less prescriptive) |
145
+
146
+ **Three core proposed requirements**:
147
+ 1. **Annual Cybersecurity Evaluation**: Enterprise-wide evaluation comparing current profile vs target profile (explicitly using NIST CSF 2.0 as the framework)
148
+ 2. **Cybersecurity Operational Implementation Plan (COIP)**: TSA-approved plan (equivalent to current CIP) with accountable executive, CCS inventory, network architecture description, and measures for all four domains
149
+ 3. **Cybersecurity Assessment Plan (CAP)**: Annual assessment schedule and reporting to TSA
150
+
151
+ **Framework alignment**:
152
+ - **NIST CSF 2.0**: Primary framework for the annual profile-based evaluation
153
+ - **CISA Cross-Sector Cybersecurity Performance Goals (CPGs)**: Baseline performance measures referenced in the NPRM
154
+ - CPGs are grouped into IT and OT goals and map closely to NIST CSF subcategories
155
+
156
+ **Status as of 2026**: Comment period closed; final rule not yet published. Current Security Directives remain in force.
157
+
158
+ ---
159
+
160
+ ## Relationship to Other Frameworks
161
+
162
+ | Framework | Relationship to TSA Directives |
163
+ |-----------|-------------------------------|
164
+ | **NIST CSF 2.0** | Referenced in 2024 NPRM for annual profile evaluation; GV/ID/PR/DE/RS/RC maps to TSA domains |
165
+ | **CISA CPGs** | Baseline goals for critical infrastructure; TSA directives align with IT and OT CPGs |
166
+ | **NIST SP 800-82** | Guide to ICS/OT security; informative reference for implementing TSA's OT requirements |
167
+ | **NERC CIP** | Electric sector parallel; some operators subject to both TSA and NERC CIP |
168
+ | **IEC 62443** | OT/ICS security standard; applicable for implementing TSA's Domain 1–4 requirements |
169
+ | **NIST SP 800-53** | Federal controls; FedRAMP-covered systems within covered entities may have dual obligations |
170
+
171
+ ---
172
+
173
+ ## Key Definitions
174
+
175
+ | Term | Definition |
176
+ |------|-----------|
177
+ | **Critical Cyber System (CCS)** | IT or OT system whose compromise could disrupt operations, safety, or security |
178
+ | **Cybersecurity Coordinator** | 24/7 designated contact person for TSA and CISA |
179
+ | **CIP / COIP** | Cybersecurity Implementation Plan / Cybersecurity Operational Implementation Plan |
180
+ | **IRP / CIRP** | (Cybersecurity) Incident Response Plan |
181
+ | **ADR** | Architecture Design Review — annual IT/OT network architecture assessment |
182
+ | **CAP** | Cybersecurity Assessment Plan — annual CRMP effectiveness assessment |
183
+ | **CRMP** | Cyber Risk Management Program — the collective set of CIP, IRP, ADR, CAP requirements |
184
+ | **SSI** | Sensitive Security Information — information protected under 49 CFR Part 1520 |
185
+ | **OT** | Operational Technology — hardware/software controlling physical industrial processes |
186
+ | **ICS** | Industrial Control System — subset of OT |
187
+ | **SCADA** | Supervisory Control and Data Acquisition — OT system for monitoring/controlling distributed assets |