bmad-plus 0.4.3 → 0.5.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +48 -0
- package/README.md +4 -3
- package/package.json +5 -1
- package/readme-international/README.de.md +2 -2
- package/readme-international/README.es.md +2 -2
- package/readme-international/README.fr.md +2 -2
- package/src/bmad-plus/module.yaml +43 -12
- package/src/bmad-plus/packs/pack-shield/README.md +110 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
- package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
- package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
- package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
- package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
- package/tools/cli/commands/install.js +22 -9
- package/tools/cli/commands/update.js +4 -2
- package/tools/cli/i18n.js +514 -394
|
@@ -0,0 +1,187 @@
|
|
|
1
|
+
# TSA Cybersecurity Incident Reporting — Procedures and Requirements
|
|
2
|
+
|
|
3
|
+
Source: TSA Security Directives; CISA guidance; Federal Register notices
|
|
4
|
+
|
|
5
|
+
---
|
|
6
|
+
|
|
7
|
+
## 24-Hour Reporting Obligation
|
|
8
|
+
|
|
9
|
+
All covered entities under any TSA cybersecurity Security Directive are required to report cybersecurity incidents to **CISA within 24 hours** of identifying an incident. This is a **hard deadline** — the clock starts when the entity identifies the incident, not when the investigation is complete.
|
|
10
|
+
|
|
11
|
+
**Key principle**: Report early with limited information. TSA and CISA do not expect a complete investigation before the initial report. Updates are provided as the investigation progresses.
|
|
12
|
+
|
|
13
|
+
---
|
|
14
|
+
|
|
15
|
+
## What Qualifies as a Reportable Incident
|
|
16
|
+
|
|
17
|
+
A cybersecurity incident is reportable if it results in — or is reasonably likely to result in — operational disruption, safety impact, or unauthorised access involving a Critical Cyber System (CCS).
|
|
18
|
+
|
|
19
|
+
**Definite reportable incidents:**
|
|
20
|
+
- Ransomware infection confirmed on IT or OT systems
|
|
21
|
+
- Unauthorised access confirmed to any CCS
|
|
22
|
+
- Malware detected on CCS (even if contained)
|
|
23
|
+
- Denial of service that impacts operational capability
|
|
24
|
+
- Confirmed phishing attack with resultant system access
|
|
25
|
+
- Insider threat with confirmed access to CCS
|
|
26
|
+
- Physical security breach resulting in suspected cyber access
|
|
27
|
+
- Loss or suspected loss of operational control of OT systems
|
|
28
|
+
- Detection of reconnaissance activity specifically targeting CCS
|
|
29
|
+
|
|
30
|
+
**Potentially reportable (apply judgement; when in doubt, report):**
|
|
31
|
+
- Phishing with credential theft (no confirmed CCS access yet)
|
|
32
|
+
- Suspicious login attempts with partial success indicators
|
|
33
|
+
- Discovery of unknown devices on OT network segments
|
|
34
|
+
- Evidence of lateral movement in IT with potential path to OT
|
|
35
|
+
- Vendor notification of a breach affecting systems they manage for you
|
|
36
|
+
|
|
37
|
+
**Not reportable (generally):**
|
|
38
|
+
- Spam email with no credential compromise
|
|
39
|
+
- Blocked phishing attempt (no access)
|
|
40
|
+
- Routine vulnerability scan activity from authorised ASV/pen test firm
|
|
41
|
+
- Failed brute-force with no account compromise
|
|
42
|
+
|
|
43
|
+
---
|
|
44
|
+
|
|
45
|
+
## How to Report to CISA
|
|
46
|
+
|
|
47
|
+
### CISA Reporting Channels (24/7)
|
|
48
|
+
|
|
49
|
+
| Channel | Contact |
|
|
50
|
+
|---------|---------|
|
|
51
|
+
| **Phone** | 1-888-282-0870 (CISA 24/7 Operations Center) |
|
|
52
|
+
| **Email** | CISAgov@mail.dhs.gov |
|
|
53
|
+
| **Online** | https://myservices.cisa.gov/report (CISA Reporting Portal) |
|
|
54
|
+
|
|
55
|
+
### TSA Notification
|
|
56
|
+
In addition to CISA, notify TSA via the TSA Operations Center:
|
|
57
|
+
- **TSA Operations Center**: 1-866-289-9673
|
|
58
|
+
|
|
59
|
+
### Internal Notification Sequence
|
|
60
|
+
Before or concurrent with CISA reporting:
|
|
61
|
+
1. Cybersecurity Coordinator notified immediately upon incident identification
|
|
62
|
+
2. Cybersecurity Coordinator notifies Accountable Executive
|
|
63
|
+
3. Legal counsel notified (regulatory reporting obligations)
|
|
64
|
+
4. OT operations team notified if OT systems involved
|
|
65
|
+
5. CISA report made within 24 hours
|
|
66
|
+
6. TSA notification made per directive requirements
|
|
67
|
+
|
|
68
|
+
---
|
|
69
|
+
|
|
70
|
+
## Initial Report — Minimum Required Information
|
|
71
|
+
|
|
72
|
+
The initial 24-hour report should include as much of the following as available. Missing information can be provided in follow-up reports.
|
|
73
|
+
|
|
74
|
+
**Required fields for initial report:**
|
|
75
|
+
- Organisation name and sector (pipeline, freight rail, transit, etc.)
|
|
76
|
+
- Contact name and phone number (Cybersecurity Coordinator)
|
|
77
|
+
- Date and approximate time incident was identified
|
|
78
|
+
- Brief description of what was observed
|
|
79
|
+
- Systems affected (IT, OT, or both — be as specific as safe to share)
|
|
80
|
+
- Operational impact (disruption to operations? estimated scope)
|
|
81
|
+
- Containment actions taken so far
|
|
82
|
+
- Whether law enforcement has been notified (FBI, etc.)
|
|
83
|
+
|
|
84
|
+
**Sample initial report language:**
|
|
85
|
+
> "[Organisation Name], a [natural gas pipeline / freight railroad / transit agency] operator, is reporting a cybersecurity incident identified on [date/time]. We detected [ransomware/unauthorised access/malware] on [IT systems / OT control systems / both]. At this time, [describe operational impact]. We have taken [initial containment actions]. Our Cybersecurity Coordinator is [Name] and can be reached at [phone]. We will provide updates as our investigation progresses."
|
|
86
|
+
|
|
87
|
+
---
|
|
88
|
+
|
|
89
|
+
## Follow-Up Reporting
|
|
90
|
+
|
|
91
|
+
After the initial 24-hour report, maintain regular communication with CISA and TSA as the investigation develops:
|
|
92
|
+
|
|
93
|
+
**Follow-up report triggers:**
|
|
94
|
+
- Identification of root cause
|
|
95
|
+
- Significant change in scope (more systems affected than initially reported)
|
|
96
|
+
- Significant operational impact change
|
|
97
|
+
- Recovery milestones reached
|
|
98
|
+
- Incident closure
|
|
99
|
+
|
|
100
|
+
**Incident closure report should include:**
|
|
101
|
+
- Timeline from detection to containment to eradication to recovery
|
|
102
|
+
- Root cause analysis
|
|
103
|
+
- Systems affected (final scope)
|
|
104
|
+
- Data involved (any cardholder data, PII, operational data)
|
|
105
|
+
- Actions taken (containment, eradication, recovery)
|
|
106
|
+
- Lessons learned
|
|
107
|
+
- Corrective actions planned or implemented to prevent recurrence
|
|
108
|
+
|
|
109
|
+
---
|
|
110
|
+
|
|
111
|
+
## CIRB (Cyber Incident Response Board) and External Assistance
|
|
112
|
+
|
|
113
|
+
If the incident is significant, CISA may:
|
|
114
|
+
- Dispatch a CISA Rapid Response Team (CISA has dedicated ICS/OT responders)
|
|
115
|
+
- Coordinate with FBI Cyber Division if criminal activity suspected
|
|
116
|
+
- Share sanitised threat intelligence with other critical infrastructure operators via ISACs
|
|
117
|
+
|
|
118
|
+
**Free CISA services available to covered entities:**
|
|
119
|
+
- Incident response support (CIRP assistance, forensics support)
|
|
120
|
+
- Cybersecurity advisory services
|
|
121
|
+
- Vulnerability scanning (CISA CSET — Cybersecurity Evaluation Tool)
|
|
122
|
+
- Exercises (tabletop exercise facilitation)
|
|
123
|
+
- Threat intelligence (CISA advisories, ICS-CERT alerts)
|
|
124
|
+
|
|
125
|
+
---
|
|
126
|
+
|
|
127
|
+
## Sector-Specific ISACs
|
|
128
|
+
|
|
129
|
+
Information Sharing and Analysis Centers (ISACs) provide sector-specific threat intelligence and incident coordination:
|
|
130
|
+
|
|
131
|
+
| Sector | ISAC | Website |
|
|
132
|
+
|--------|------|---------|
|
|
133
|
+
| Pipeline / Energy | E-ISAC (Energy ISAC) | https://www.eisac.com |
|
|
134
|
+
| Oil and Natural Gas | ONG-ISAC | https://www.ongisac.org |
|
|
135
|
+
| Rail / Surface Transportation | Surface Transportation ISAC (ST-ISAC) | https://www.surfacetransportationisac.org |
|
|
136
|
+
| Public Transit | PT-ISAC | https://www.pt-isac.org |
|
|
137
|
+
| Multi-sector | MS-ISAC (focused on SLTT) | https://www.cisecurity.org/ms-isac |
|
|
138
|
+
|
|
139
|
+
ISAC membership is strongly encouraged by TSA and CISA. Incidents can be reported to ISACs for anonymised sharing with sector peers.
|
|
140
|
+
|
|
141
|
+
---
|
|
142
|
+
|
|
143
|
+
## Post-Incident IRP Testing Requirement
|
|
144
|
+
|
|
145
|
+
Following a significant cybersecurity incident, covered entities should:
|
|
146
|
+
1. Conduct an after-action review (AAR) within 30 days of incident closure
|
|
147
|
+
2. Document lessons learned
|
|
148
|
+
3. Update the IRP to reflect lessons learned
|
|
149
|
+
4. Update the CIP if architectural or procedural changes are required
|
|
150
|
+
5. Consider whether the incident warrants unscheduled IRP testing (e.g., drill on the specific scenario that occurred)
|
|
151
|
+
6. Track corrective actions to closure
|
|
152
|
+
|
|
153
|
+
The annual IRP testing requirement (test two objectives) does not reset due to a real incident — a real incident response may count as a test if properly documented.
|
|
154
|
+
|
|
155
|
+
---
|
|
156
|
+
|
|
157
|
+
## Cyber Incident Notification Log
|
|
158
|
+
|
|
159
|
+
Maintain a log of all regulatory notifications made for each incident. Recommended fields:
|
|
160
|
+
|
|
161
|
+
| Field | Example |
|
|
162
|
+
|-------|---------|
|
|
163
|
+
| Incident ID | INC-2026-001 |
|
|
164
|
+
| Date/time identified | 2026-03-10 14:32 UTC |
|
|
165
|
+
| Date/time CISA notified | 2026-03-11 09:15 UTC (within 24h ✅) |
|
|
166
|
+
| CISA ticket/case number | CISA-2026-XXXXX |
|
|
167
|
+
| Date/time TSA notified | 2026-03-11 09:30 UTC |
|
|
168
|
+
| TSA case reference | TSA-XXXX |
|
|
169
|
+
| Date/time law enforcement notified | N/A or 2026-03-11 |
|
|
170
|
+
| Internal legal counsel notified | 2026-03-10 15:00 UTC |
|
|
171
|
+
| Accountable Executive notified | 2026-03-10 14:45 UTC |
|
|
172
|
+
| Follow-up reports submitted | 2026-03-15, 2026-03-22 |
|
|
173
|
+
| Incident closure date | 2026-03-25 |
|
|
174
|
+
| Closure report submitted to CISA | 2026-03-30 |
|
|
175
|
+
|
|
176
|
+
---
|
|
177
|
+
|
|
178
|
+
## CIRPA — Cyber Incident Reporting for Critical Infrastructure Act
|
|
179
|
+
|
|
180
|
+
In addition to TSA-specific reporting, large-scale incidents may also trigger reporting obligations under **CIRCIA (Cyber Incident Reporting for Critical Infrastructure Act of 2022)**:
|
|
181
|
+
|
|
182
|
+
- CIRCIA requires covered entities to report significant cyber incidents to CISA within **72 hours** (broader trigger than TSA's 24-hour requirement)
|
|
183
|
+
- Ransom payments must be reported within **24 hours** under CIRCIA
|
|
184
|
+
- TSA's 24-hour requirement is more stringent — complying with TSA also satisfies CIRCIA timelines
|
|
185
|
+
- CIRCIA final rules were under development as of 2025/2026; interim guidance from CISA applies
|
|
186
|
+
|
|
187
|
+
**Practical guidance**: When in doubt, report to CISA as early as possible. TSA's 24-hour requirement is the most demanding — use it as your reporting trigger.
|