bmad-plus 0.4.3 → 0.5.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (133) hide show
  1. package/CHANGELOG.md +48 -0
  2. package/README.md +4 -3
  3. package/package.json +5 -1
  4. package/readme-international/README.de.md +2 -2
  5. package/readme-international/README.es.md +2 -2
  6. package/readme-international/README.fr.md +2 -2
  7. package/src/bmad-plus/module.yaml +43 -12
  8. package/src/bmad-plus/packs/pack-shield/README.md +110 -0
  9. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
  10. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
  11. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
  12. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
  13. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
  14. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
  15. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
  16. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
  17. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
  18. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
  19. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
  20. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
  21. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
  22. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
  23. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
  24. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
  25. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
  26. package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
  27. package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
  28. package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
  29. package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
  30. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
  31. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
  32. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
  33. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
  34. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
  35. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
  36. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
  37. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
  38. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
  39. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
  40. package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
  41. package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
  42. package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
  43. package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
  44. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
  45. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
  46. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
  47. package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
  48. package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
  49. package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
  50. package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
  51. package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
  52. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
  53. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
  54. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
  55. package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
  56. package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
  57. package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
  58. package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
  59. package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
  60. package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
  61. package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
  62. package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
  63. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
  64. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
  65. package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
  66. package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
  67. package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
  68. package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
  69. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
  70. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
  71. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
  72. package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
  73. package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
  74. package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
  75. package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
  76. package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
  77. package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
  78. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
  79. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
  80. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
  81. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
  82. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
  83. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
  84. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
  85. package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
  86. package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
  87. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
  88. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
  89. package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
  90. package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
  91. package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
  92. package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
  93. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
  94. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
  95. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
  96. package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
  97. package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
  98. package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
  99. package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
  100. package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
  101. package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
  102. package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
  103. package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
  104. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
  105. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
  106. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
  107. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
  108. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
  109. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
  110. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
  111. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
  112. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
  113. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
  114. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
  115. package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
  116. package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
  117. package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
  118. package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
  119. package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
  120. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
  121. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
  122. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
  123. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
  124. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
  125. package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
  126. package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
  127. package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
  128. package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
  129. package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
  130. package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
  131. package/tools/cli/commands/install.js +22 -9
  132. package/tools/cli/commands/update.js +4 -2
  133. package/tools/cli/i18n.js +514 -394
@@ -0,0 +1,187 @@
1
+ # TSA Cybersecurity Incident Reporting — Procedures and Requirements
2
+
3
+ Source: TSA Security Directives; CISA guidance; Federal Register notices
4
+
5
+ ---
6
+
7
+ ## 24-Hour Reporting Obligation
8
+
9
+ All covered entities under any TSA cybersecurity Security Directive are required to report cybersecurity incidents to **CISA within 24 hours** of identifying an incident. This is a **hard deadline** — the clock starts when the entity identifies the incident, not when the investigation is complete.
10
+
11
+ **Key principle**: Report early with limited information. TSA and CISA do not expect a complete investigation before the initial report. Updates are provided as the investigation progresses.
12
+
13
+ ---
14
+
15
+ ## What Qualifies as a Reportable Incident
16
+
17
+ A cybersecurity incident is reportable if it results in — or is reasonably likely to result in — operational disruption, safety impact, or unauthorised access involving a Critical Cyber System (CCS).
18
+
19
+ **Definite reportable incidents:**
20
+ - Ransomware infection confirmed on IT or OT systems
21
+ - Unauthorised access confirmed to any CCS
22
+ - Malware detected on CCS (even if contained)
23
+ - Denial of service that impacts operational capability
24
+ - Confirmed phishing attack with resultant system access
25
+ - Insider threat with confirmed access to CCS
26
+ - Physical security breach resulting in suspected cyber access
27
+ - Loss or suspected loss of operational control of OT systems
28
+ - Detection of reconnaissance activity specifically targeting CCS
29
+
30
+ **Potentially reportable (apply judgement; when in doubt, report):**
31
+ - Phishing with credential theft (no confirmed CCS access yet)
32
+ - Suspicious login attempts with partial success indicators
33
+ - Discovery of unknown devices on OT network segments
34
+ - Evidence of lateral movement in IT with potential path to OT
35
+ - Vendor notification of a breach affecting systems they manage for you
36
+
37
+ **Not reportable (generally):**
38
+ - Spam email with no credential compromise
39
+ - Blocked phishing attempt (no access)
40
+ - Routine vulnerability scan activity from authorised ASV/pen test firm
41
+ - Failed brute-force with no account compromise
42
+
43
+ ---
44
+
45
+ ## How to Report to CISA
46
+
47
+ ### CISA Reporting Channels (24/7)
48
+
49
+ | Channel | Contact |
50
+ |---------|---------|
51
+ | **Phone** | 1-888-282-0870 (CISA 24/7 Operations Center) |
52
+ | **Email** | CISAgov@mail.dhs.gov |
53
+ | **Online** | https://myservices.cisa.gov/report (CISA Reporting Portal) |
54
+
55
+ ### TSA Notification
56
+ In addition to CISA, notify TSA via the TSA Operations Center:
57
+ - **TSA Operations Center**: 1-866-289-9673
58
+
59
+ ### Internal Notification Sequence
60
+ Before or concurrent with CISA reporting:
61
+ 1. Cybersecurity Coordinator notified immediately upon incident identification
62
+ 2. Cybersecurity Coordinator notifies Accountable Executive
63
+ 3. Legal counsel notified (regulatory reporting obligations)
64
+ 4. OT operations team notified if OT systems involved
65
+ 5. CISA report made within 24 hours
66
+ 6. TSA notification made per directive requirements
67
+
68
+ ---
69
+
70
+ ## Initial Report — Minimum Required Information
71
+
72
+ The initial 24-hour report should include as much of the following as available. Missing information can be provided in follow-up reports.
73
+
74
+ **Required fields for initial report:**
75
+ - Organisation name and sector (pipeline, freight rail, transit, etc.)
76
+ - Contact name and phone number (Cybersecurity Coordinator)
77
+ - Date and approximate time incident was identified
78
+ - Brief description of what was observed
79
+ - Systems affected (IT, OT, or both — be as specific as safe to share)
80
+ - Operational impact (disruption to operations? estimated scope)
81
+ - Containment actions taken so far
82
+ - Whether law enforcement has been notified (FBI, etc.)
83
+
84
+ **Sample initial report language:**
85
+ > "[Organisation Name], a [natural gas pipeline / freight railroad / transit agency] operator, is reporting a cybersecurity incident identified on [date/time]. We detected [ransomware/unauthorised access/malware] on [IT systems / OT control systems / both]. At this time, [describe operational impact]. We have taken [initial containment actions]. Our Cybersecurity Coordinator is [Name] and can be reached at [phone]. We will provide updates as our investigation progresses."
86
+
87
+ ---
88
+
89
+ ## Follow-Up Reporting
90
+
91
+ After the initial 24-hour report, maintain regular communication with CISA and TSA as the investigation develops:
92
+
93
+ **Follow-up report triggers:**
94
+ - Identification of root cause
95
+ - Significant change in scope (more systems affected than initially reported)
96
+ - Significant operational impact change
97
+ - Recovery milestones reached
98
+ - Incident closure
99
+
100
+ **Incident closure report should include:**
101
+ - Timeline from detection to containment to eradication to recovery
102
+ - Root cause analysis
103
+ - Systems affected (final scope)
104
+ - Data involved (any cardholder data, PII, operational data)
105
+ - Actions taken (containment, eradication, recovery)
106
+ - Lessons learned
107
+ - Corrective actions planned or implemented to prevent recurrence
108
+
109
+ ---
110
+
111
+ ## CIRB (Cyber Incident Response Board) and External Assistance
112
+
113
+ If the incident is significant, CISA may:
114
+ - Dispatch a CISA Rapid Response Team (CISA has dedicated ICS/OT responders)
115
+ - Coordinate with FBI Cyber Division if criminal activity suspected
116
+ - Share sanitised threat intelligence with other critical infrastructure operators via ISACs
117
+
118
+ **Free CISA services available to covered entities:**
119
+ - Incident response support (CIRP assistance, forensics support)
120
+ - Cybersecurity advisory services
121
+ - Vulnerability scanning (CISA CSET — Cybersecurity Evaluation Tool)
122
+ - Exercises (tabletop exercise facilitation)
123
+ - Threat intelligence (CISA advisories, ICS-CERT alerts)
124
+
125
+ ---
126
+
127
+ ## Sector-Specific ISACs
128
+
129
+ Information Sharing and Analysis Centers (ISACs) provide sector-specific threat intelligence and incident coordination:
130
+
131
+ | Sector | ISAC | Website |
132
+ |--------|------|---------|
133
+ | Pipeline / Energy | E-ISAC (Energy ISAC) | https://www.eisac.com |
134
+ | Oil and Natural Gas | ONG-ISAC | https://www.ongisac.org |
135
+ | Rail / Surface Transportation | Surface Transportation ISAC (ST-ISAC) | https://www.surfacetransportationisac.org |
136
+ | Public Transit | PT-ISAC | https://www.pt-isac.org |
137
+ | Multi-sector | MS-ISAC (focused on SLTT) | https://www.cisecurity.org/ms-isac |
138
+
139
+ ISAC membership is strongly encouraged by TSA and CISA. Incidents can be reported to ISACs for anonymised sharing with sector peers.
140
+
141
+ ---
142
+
143
+ ## Post-Incident IRP Testing Requirement
144
+
145
+ Following a significant cybersecurity incident, covered entities should:
146
+ 1. Conduct an after-action review (AAR) within 30 days of incident closure
147
+ 2. Document lessons learned
148
+ 3. Update the IRP to reflect lessons learned
149
+ 4. Update the CIP if architectural or procedural changes are required
150
+ 5. Consider whether the incident warrants unscheduled IRP testing (e.g., drill on the specific scenario that occurred)
151
+ 6. Track corrective actions to closure
152
+
153
+ The annual IRP testing requirement (test two objectives) does not reset due to a real incident — a real incident response may count as a test if properly documented.
154
+
155
+ ---
156
+
157
+ ## Cyber Incident Notification Log
158
+
159
+ Maintain a log of all regulatory notifications made for each incident. Recommended fields:
160
+
161
+ | Field | Example |
162
+ |-------|---------|
163
+ | Incident ID | INC-2026-001 |
164
+ | Date/time identified | 2026-03-10 14:32 UTC |
165
+ | Date/time CISA notified | 2026-03-11 09:15 UTC (within 24h ✅) |
166
+ | CISA ticket/case number | CISA-2026-XXXXX |
167
+ | Date/time TSA notified | 2026-03-11 09:30 UTC |
168
+ | TSA case reference | TSA-XXXX |
169
+ | Date/time law enforcement notified | N/A or 2026-03-11 |
170
+ | Internal legal counsel notified | 2026-03-10 15:00 UTC |
171
+ | Accountable Executive notified | 2026-03-10 14:45 UTC |
172
+ | Follow-up reports submitted | 2026-03-15, 2026-03-22 |
173
+ | Incident closure date | 2026-03-25 |
174
+ | Closure report submitted to CISA | 2026-03-30 |
175
+
176
+ ---
177
+
178
+ ## CIRPA — Cyber Incident Reporting for Critical Infrastructure Act
179
+
180
+ In addition to TSA-specific reporting, large-scale incidents may also trigger reporting obligations under **CIRCIA (Cyber Incident Reporting for Critical Infrastructure Act of 2022)**:
181
+
182
+ - CIRCIA requires covered entities to report significant cyber incidents to CISA within **72 hours** (broader trigger than TSA's 24-hour requirement)
183
+ - Ransom payments must be reported within **24 hours** under CIRCIA
184
+ - TSA's 24-hour requirement is more stringent — complying with TSA also satisfies CIRCIA timelines
185
+ - CIRCIA final rules were under development as of 2025/2026; interim guidance from CISA applies
186
+
187
+ **Practical guidance**: When in doubt, report to CISA as early as possible. TSA's 24-hour requirement is the most demanding — use it as your reporting trigger.