bmad-plus 0.4.4 → 0.5.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (133) hide show
  1. package/CHANGELOG.md +31 -0
  2. package/README.md +3 -3
  3. package/package.json +1 -1
  4. package/readme-international/README.de.md +2 -2
  5. package/readme-international/README.es.md +2 -2
  6. package/readme-international/README.fr.md +2 -2
  7. package/src/bmad-plus/module.yaml +43 -12
  8. package/src/bmad-plus/packs/pack-shield/README.md +110 -0
  9. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
  10. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
  11. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
  12. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
  13. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
  14. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
  15. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
  16. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
  17. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
  18. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
  19. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
  20. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
  21. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
  22. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
  23. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
  24. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
  25. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
  26. package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
  27. package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
  28. package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
  29. package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
  30. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
  31. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
  32. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
  33. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
  34. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
  35. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
  36. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
  37. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
  38. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
  39. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
  40. package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
  41. package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
  42. package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
  43. package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
  44. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
  45. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
  46. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
  47. package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
  48. package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
  49. package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
  50. package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
  51. package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
  52. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
  53. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
  54. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
  55. package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
  56. package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
  57. package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
  58. package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
  59. package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
  60. package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
  61. package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
  62. package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
  63. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
  64. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
  65. package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
  66. package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
  67. package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
  68. package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
  69. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
  70. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
  71. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
  72. package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
  73. package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
  74. package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
  75. package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
  76. package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
  77. package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
  78. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
  79. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
  80. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
  81. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
  82. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
  83. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
  84. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
  85. package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
  86. package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
  87. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
  88. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
  89. package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
  90. package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
  91. package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
  92. package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
  93. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
  94. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
  95. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
  96. package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
  97. package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
  98. package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
  99. package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
  100. package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
  101. package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
  102. package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
  103. package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
  104. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
  105. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
  106. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
  107. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
  108. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
  109. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
  110. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
  111. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
  112. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
  113. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
  114. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
  115. package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
  116. package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
  117. package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
  118. package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
  119. package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
  120. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
  121. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
  122. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
  123. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
  124. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
  125. package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
  126. package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
  127. package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
  128. package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
  129. package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
  130. package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
  131. package/tools/cli/commands/install.js +21 -8
  132. package/tools/cli/commands/update.js +4 -2
  133. package/tools/cli/i18n.js +50 -10
@@ -0,0 +1,182 @@
1
+ # EU AI Act — Risk Classification Reference
2
+
3
+ ## Art. 3 — Key Definitions
4
+
5
+ | Term | Definition |
6
+ |------|-----------|
7
+ | **AI System** (Art. 3(1)) | A machine-based system designed to operate with varying levels of autonomy that, for a given set of objectives, infers from inputs how to generate outputs such as predictions, recommendations, decisions, or content affecting real or virtual environments |
8
+ | **GPAI Model** (Art. 3(63)) | An AI model trained with large amounts of data using self-supervision at scale that displays significant generality and competently performs a wide range of distinct tasks, regardless of placement method — excludes pre-release R&D models |
9
+ | **GPAI System** (Art. 3(64)) | An AI system based on a GPAI model capable of serving multiple purposes, directly or when integrated into other AI systems |
10
+ | **Provider** (Art. 3(3)) | Natural or legal person that develops an AI system or GPAI model and places it on the market or puts it into service under own name/trademark |
11
+ | **Deployer** (Art. 3(4)) | Natural or legal person using an AI system under own authority, except for personal non-professional activity |
12
+ | **Operator** (Art. 3(8)) | Encompasses provider, product manufacturer, deployer, authorised representative, importer, or distributor |
13
+ | **Authorised Representative** (Art. 3(5)) | Person established in EU with written mandate from non-EU provider to act on their behalf |
14
+ | **Importer** (Art. 3(6)) | EU-established person placing on market an AI system bearing third-country person's name/trademark |
15
+ | **Distributor** (Art. 3(7)) | Supply chain person (other than provider/importer) making AI system available on EU market |
16
+ | **Profiling** (Art. 3(52)) | Automated processing of personal data to evaluate natural persons — work performance, economic situation, health, preferences, reliability, behaviour, location |
17
+
18
+ ---
19
+
20
+ ## Risk Tier Overview
21
+
22
+ | Tier | Regulation Path | Key Obligation | Applies From |
23
+ |------|----------------|----------------|--------------|
24
+ | **Prohibited** | Art. 5 | Complete ban | 2 Feb 2025 |
25
+ | **High Risk** | Art. 6 + Annex I/III | Full conformity regime | 2 Aug 2026 (Annex III) / 2027 (Annex I) |
26
+ | **Limited Risk** | Art. 50 | Transparency disclosure only | 2 Aug 2026 |
27
+ | **Minimal / No Risk** | — | Voluntary codes of conduct | — |
28
+
29
+ ---
30
+
31
+ ## Art. 5 — Prohibited AI Practices (All 8, applies from 2 February 2025)
32
+
33
+ ### 5(1)(a) — Subliminal / Manipulative Techniques
34
+ AI systems using subliminal techniques beyond a person's consciousness, or purposefully manipulative/deceptive techniques, that materially distort behavior and impair informed decision-making, causing or likely to cause significant harm to those persons or third parties.
35
+
36
+ ### 5(1)(b) — Exploitation of Vulnerabilities
37
+ AI systems exploiting vulnerabilities of persons or groups based on age, disability, or socioeconomic circumstances, distorting behavior in a manner that causes or is likely to cause significant harm.
38
+
39
+ ### 5(1)(c) — Social Scoring
40
+ AI systems that evaluate or classify natural persons or groups based on social behavior over a period of time or inferred personal characteristics, leading to:
41
+ - Detrimental or unfavorable treatment of persons or groups in unrelated social contexts; OR
42
+ - Treatment that is disproportionate or unjustified relative to the social context in which the behavior occurred
43
+
44
+ ### 5(1)(d) — Predictive Criminal Risk Assessment
45
+ AI systems assessing the risk of natural persons committing criminal offenses based solely on profiling or personality/character traits assessment. **Exception:** systems supporting human assessment based on objective, verifiable facts directly linked to criminal activity.
46
+
47
+ ### 5(1)(e) — Untargeted Facial Recognition Database Creation
48
+ Creating or expanding facial recognition databases through untargeted scraping of facial images from the internet or CCTV footage.
49
+
50
+ ### 5(1)(f) — Emotion Inference in Workplace or Educational Institutions
51
+ AI systems that infer emotions of natural persons in the workplace or educational institutions. **Exception:** for medical or safety purposes.
52
+
53
+ ### 5(1)(g) — Biometric-Based Categorization for Sensitive Attributes
54
+ AI systems categorizing natural persons individually based on biometric data to deduce or infer race, political opinions, trade union membership, religious or philosophical beliefs, sex life, or sexual orientation. **Exception:** labeling/filtering of lawfully acquired biometric datasets in law enforcement.
55
+
56
+ ### 5(1)(h) — Real-Time Remote Biometric Identification (RBI) in Public Spaces by Law Enforcement
57
+ Real-time RBI systems in publicly accessible spaces for law enforcement purposes. **Narrow exceptions:**
58
+ - (i) Targeted search for specific missing persons or trafficking victims
59
+ - (ii) Preventing specific, substantial, imminent threat to life or terrorist attack
60
+ - (iii) Identifying suspects of serious criminal offenses carrying ≥4-year sentences listed in Annex II
61
+
62
+ **Procedural requirements for exceptions:** Prior judicial or independent administrative body authorization (post-hoc authorization within 24 hours for urgency); fundamental rights impact assessment; registration in EU AI database; report to market surveillance authority after each use. **Prohibited:** use to identify protected attributes.
63
+
64
+ ---
65
+
66
+ ## Art. 6 — High-Risk Classification Rules
67
+
68
+ ### Path A — Art. 6(1): Safety Component of Sectoral Product
69
+ System is high-risk when BOTH conditions are met:
70
+ 1. It is a **safety component of a product** covered by Annex I harmonisation legislation (or is itself such a product); **AND**
71
+ 2. That product **requires third-party conformity assessment** under the relevant Annex I legislation
72
+
73
+ ### Path B — Art. 6(2): Annex III Listed Use Case
74
+ System is high-risk when **listed in Annex III**, unless the following non-high-risk exceptions all apply:
75
+ - Performs a narrow procedural task
76
+ - Improves result of a previously completed human activity
77
+ - Detects decision-making patterns/deviations without replacing/influencing human assessment
78
+ - Performs preparatory tasks for assessment relevant to Annex III use cases
79
+
80
+ **Critical override (Art. 6(3)):** Any Annex III system that **profiles natural persons** is ALWAYS high-risk regardless of the above exceptions.
81
+
82
+ **Documentation obligation (Art. 6(3)):** Providers claiming non-high-risk status must document their assessment before market placement and make it available to national authorities on request.
83
+
84
+ ---
85
+
86
+ ## Annex I — Sectoral Harmonisation Laws (Safety Component Path)
87
+
88
+ ### Section A — New Legislative Framework Products
89
+ 1. Machinery — Directive 2006/42/EC
90
+ 2. Toys — Directive 2009/48/EC
91
+ 3. Recreational watercraft — Directive 2013/53/EU
92
+ 4. Lifts — Directive 2014/33/EU
93
+ 5. ATEX equipment — Directive 2014/34/EU
94
+ 6. Radio equipment — Directive 2014/53/EU
95
+ 7. Pressure equipment — Directive 2014/68/EU
96
+ 8. Cableway installations — Regulation 2016/424
97
+ 9. Personal protective equipment — Regulation 2016/425
98
+ 10. Gaseous fuel appliances — Regulation 2016/426
99
+ 11. Medical devices — Regulation 2017/745
100
+ 12. In vitro diagnostic medical devices — Regulation 2017/746
101
+
102
+ ### Section B — Other Harmonisation Legislation
103
+ 13. Civil aviation security — Regulation 300/2008
104
+ 14. Two/three-wheel vehicles — Regulation 168/2013
105
+ 15. Agricultural/forestry vehicles — Regulation 167/2013
106
+ 16. Marine equipment — Directive 2014/90/EU
107
+ 17. Rail interoperability — Directive 2016/797
108
+ 18. Motor vehicles and trailers — Regulation 2018/858
109
+ 19. Motor vehicle safety standards — Regulation 2019/2144
110
+ 20. Civil aviation and drones — Regulation 2018/1139
111
+
112
+ ---
113
+
114
+ ## Annex III — High-Risk AI Use Case Areas (8 Areas)
115
+
116
+ ### Area 1 — Biometrics
117
+ - (a) Remote biometric identification systems (excluding personal identity verification)
118
+ - (b) Biometric categorization systems inferring sensitive/protected attributes
119
+ - (c) Emotion recognition systems
120
+
121
+ **Notes:** (b) and (c) are prohibited under Art. 5(1)(g) and 5(1)(f) respectively in many contexts. Area 1(a) biometric categorization/emotion recognition systems that fall under Art. 5 prohibitions cannot qualify as merely high-risk — the prohibition takes precedence.
122
+
123
+ ### Area 2 — Critical Infrastructure
124
+ AI safety components managing or used in safety-critical management of: road traffic, water supply, gas supply, heating supply, electricity supply, and critical digital infrastructure.
125
+
126
+ ### Area 3 — Education and Vocational Training
127
+ - (a) Determining access/admission to or assignment to educational institutions at any level
128
+ - (b) Evaluating learning outcomes that materially influence the learning process
129
+ - (c) Assessing appropriate level of education and materially influencing the level of education received
130
+ - (d) Monitoring and detecting prohibited student behavior in tests/examinations
131
+
132
+ ### Area 4 — Employment, Workers Management, and Self-Employment
133
+ - (a) Recruitment and selection: targeted job advertising, application filtering/screening, candidate evaluation and selection
134
+ - (b) Making decisions affecting terms of employment/work relationships: promotion, termination, task allocation, monitoring/evaluating performance/behavior of employed persons
135
+
136
+ ### Area 5 — Access to and Enjoyment of Essential Private and Public Services
137
+ - (a) Public authorities evaluating individual eligibility for public assistance benefits and services (including healthcare)
138
+ - (b) Creditworthiness assessment and credit scoring (excluding fraud detection)
139
+ - (c) Life insurance and health insurance risk assessment and pricing for natural persons
140
+ - (d) Emergency dispatch and emergency call classification and prioritization
141
+
142
+ ### Area 6 — Law Enforcement
143
+ - (a) Individual risk assessment for becoming victim of criminal offenses
144
+ - (b) Polygraphs and similar tools to assess reliability of persons
145
+ - (c) Evaluating reliability of evidence in criminal investigations/prosecution
146
+ - (d) Assessing risk of offending/reoffending, including recidivism assessment
147
+ - (e) Profiling natural persons in course of criminal detection, investigation, or prosecution
148
+
149
+ ### Area 7 — Migration, Asylum, and Border Control Management
150
+ - (a) Polygraph-like tools and similar for competent authorities in migration/asylum/border control
151
+ - (b) Assessing risk (including security/irregular migration risk) of persons intending to enter or having entered EU territory
152
+ - (c) Assisting competent authorities in examining applications for asylum, visa, and residence permits
153
+ - (d) Detecting, recognizing, or identifying natural persons (excluding verification of travel documents)
154
+
155
+ ### Area 8 — Administration of Justice and Democratic Processes
156
+ - (a) AI assisting judicial authorities in researching, interpreting, and applying the law
157
+ - (b) AI intended to influence the outcome of elections or referenda, or the voting behavior of natural persons
158
+
159
+ ---
160
+
161
+ ## Art. 50 — Limited Risk Transparency Obligations (applies from 2 August 2026)
162
+
163
+ ### Chatbots and AI Interaction Systems (Art. 50(1))
164
+ Providers must ensure users are informed they are interacting with an AI system, unless:
165
+ - Obvious to a reasonably well-informed user given context and circumstances
166
+ - System is authorized by law for detection of criminal offenses
167
+
168
+ ### Synthetic Media — Deepfakes (Art. 50(2) and (4))
169
+ - Deployers of systems generating synthetic image/video/audio/text resembling real persons/places/events must disclose in machine-readable format that content is artificially generated or manipulated
170
+ - Deployer disclosure exceptions: authorized by law for criminal offense detection; artistic, satirical, or fictional works with appropriate disclosure that doesn't impair enjoyment
171
+ - All AI-generated text published to inform public on matters of public interest must be disclosed as AI-generated, unless: authorized for criminal investigation; content underwent human editorial review and editorial accountability exists
172
+
173
+ ### Emotion Recognition and Biometric Categorization (Art. 50(3))
174
+ Deployers must inform natural persons exposed to these systems of:
175
+ - The operation of the system
176
+ - Must comply with GDPR and data protection law
177
+ - Exception: authorized for law enforcement
178
+
179
+ ### Format Requirements
180
+ - Disclosures must be made at the latest at first interaction/exposure
181
+ - Clear and distinguishable manner
182
+ - Must meet accessibility standards (Directive 2019/882)
@@ -0,0 +1,209 @@
1
+ # FedRAMP SSP Appendices Guide (A–Q)
2
+
3
+ All FedRAMP SSP appendices must use official FedRAMP templates where indicated.
4
+ Templates: https://www.fedramp.gov/rev5/documents-templates/
5
+
6
+ ---
7
+
8
+ ## Appendix A — Acronyms & Glossary
9
+ **Required:** Yes | **Author:** CSP
10
+ - List all acronyms used in the SSP
11
+ - Define any system-specific or agency-specific terms
12
+ - FedRAMP provides a standard glossary; supplement with system-specific terms
13
+ - Keep synchronized with the SSP body — if a new term appears in Section 7, add it here
14
+
15
+ ---
16
+
17
+ ## Appendix B — Related Laws & Regulations
18
+ **Required:** Yes | **Author:** CSP (use FedRAMP template as base)
19
+ - Enumerates applicable federal laws, Executive Orders, OMB memos, and standards
20
+ - Core list includes: FISMA 2014, Privacy Act of 1974, E-Government Act (Section 208), FIPS 199, FIPS 200, NIST SP 800-53 Rev 5, OMB Circular A-130
21
+ - Add agency-specific requirements if applicable (e.g., HIPAA, CJIS, IRS Publication 1075)
22
+ - Review annually — regulatory landscape changes; new OMB guidance and executive orders may require additions
23
+
24
+ **Common mistake:** Using the Rev 4 version of this appendix; ensure it reflects Rev 5 requirements and current OMB directives.
25
+
26
+ ---
27
+
28
+ ## Appendix C — Security Policies & Procedures
29
+ **Required:** Yes | **Author:** CSP
30
+ - Attach or reference all CSP security policies and standard operating procedures
31
+ - Must cover each NIST 800-53 Rev 5 control family that has policies and procedures controls (e.g., AC-1, AU-1, CA-1, CM-1, etc.)
32
+ - Policies must be: approved by senior leadership, dated, versioned, and reviewed at defined intervals
33
+ - Common approach: include a policy index table in the appendix body, with the actual policy documents attached or linked via evidence repository
34
+
35
+ **Common finding:** Policies exist but are not dated or version-controlled; policies reference Rev 4 controls.
36
+
37
+ ---
38
+
39
+ ## Appendix D — User Guide
40
+ **Required:** Yes | **Author:** CSP
41
+ - End-user guide for the cloud service
42
+ - Describes: how to access the system, user responsibilities, what the system does, how to report security incidents
43
+ - For SaaS offerings, this may be a customer-facing documentation excerpt
44
+ - Must align with the Rules of Behavior (Appendix E)
45
+
46
+ ---
47
+
48
+ ## Appendix E — Rules of Behavior (RoB)
49
+ **Required:** Yes | **Author:** CSP (FedRAMP template available)
50
+ - Signed by all users prior to access
51
+ - Covers: acceptable use, data handling obligations, password requirements, incident reporting obligations, consequences of non-compliance
52
+ - Must be re-signed annually or when updated
53
+ - Keep signature records — auditors will ask for evidence of signed RoBs
54
+
55
+ **Common finding:** RoB exists but no evidence of user signatures; RoB not updated after major policy changes.
56
+
57
+ ---
58
+
59
+ ## Appendix F — IT Contingency Plan (ISCP)
60
+ **Required:** Yes | **Author:** CSP (FedRAMP ISCP template — updated December 2024)
61
+ - Use the FedRAMP Information System Contingency Plan (ISCP) template
62
+ - Must include: system description, activation criteria, notification procedures, recovery procedures, reconstitution, testing records
63
+ - RTO and RPO must be defined and achievable based on architecture
64
+ - Must be tested at least annually — tabletop minimum; functional exercise preferred for High baseline
65
+ - Append the most recent test results
66
+
67
+ **Common finding:** Plan exists but has never been tested; RTO/RPO are aspirational and not validated by DR testing.
68
+
69
+ ---
70
+
71
+ ## Appendix G — Configuration Management Plan (CMP)
72
+ **Required:** Yes | **Author:** CSP
73
+ - Describes how configuration baselines are established, maintained, and enforced
74
+ - Must reference specific baseline standards used (CIS Benchmarks, DISA STIGs)
75
+ - Documents the change control board (CCB) process and approval chain
76
+ - Defines how configuration deviations are documented and approved
77
+ - Links to the system inventory (IIW — Appendix K)
78
+
79
+ ---
80
+
81
+ ## Appendix H — Incident Response Plan (IRP)
82
+ **Required:** Yes | **Author:** CSP
83
+ - Must follow NIST SP 800-61 Rev 2 lifecycle: Preparation → Detection → Containment → Eradication → Recovery → Post-Incident
84
+ - FedRAMP-specific reporting SLAs:
85
+ - Report to US-CERT within **1 hour** of incident discovery (high-priority incidents)
86
+ - Report to agency AO within **1 hour** for incidents affecting federal data
87
+ - Include contact list: CSP IR team, agency AO contacts, US-CERT (CISA), FedRAMP PMO Security Inbox
88
+ - Must include the FedRAMP Security Inbox address for PMO notifications
89
+ - Must be tested at least annually (tabletop or functional exercise)
90
+
91
+ **Common finding:** IRP does not include agency AO notification procedure; reporting timeframes do not match FedRAMP SLAs; no evidence of annual testing.
92
+
93
+ ---
94
+
95
+ ## Appendix I — Control Implementation Summary (CIS) / Customer Responsibility Matrix (CRM)
96
+ **Required:** Yes | **Author:** CSP (FedRAMP CIS/CRM template)
97
+ - One of the most operationally important appendices for agency customers
98
+ - **CIS tab**: Lists every control in the baseline and its implementation status (Fully Implemented / Partially Implemented / Planned / Not Applicable / Alternative)
99
+ - **CRM tab**: For each shared/hybrid control, defines exactly what the CSP implements vs. what the customer/agency must implement
100
+ - Agency customers use the CRM to understand their inherited security obligations
101
+ - Must be kept current — a stale CRM is a common agency complaint and a finding during re-authorization
102
+
103
+ **Common mistake:** CRM lists "Customer Responsibility" generically without specifying what the agency must actually do; shared controls marked as fully CSP-implemented when agencies have configuration responsibilities.
104
+
105
+ ---
106
+
107
+ ## Appendix J — FIPS 199 Categorization
108
+ **Required:** Yes | **Author:** CSP
109
+ - Documents the formal FIPS 199 impact determination
110
+ - Categorizes Confidentiality, Integrity, and Availability separately for each information type
111
+ - Overall impact level = high-water mark (highest individual rating)
112
+ - Must justify each categorization with the types of federal information the system processes
113
+ - Ties directly to which FedRAMP baseline (Low / Moderate / High) applies
114
+
115
+ ---
116
+
117
+ ## Appendix K — Integrated Inventory Workbook (IIW)
118
+ **Required:** Yes | **Author:** CSP (FedRAMP IIW template — updated December 2024)
119
+ - Complete inventory of every asset within the authorization boundary
120
+ - Tabs typically include: hardware, software, services, databases, network components, virtual instances
121
+ - Must be 100% accurate — auditors sample from IIW and will flag missing assets as findings
122
+ - Updated continuously; submitted monthly during ConMon
123
+ - Must include: asset name/ID, OS/version, IP address, function, patch level, FedRAMP status, POC
124
+
125
+ **Common finding:** IIW is out of date; cloud-native ephemeral resources (auto-scaling instances, containers) not accounted for with appropriate dynamic inventory process.
126
+
127
+ ---
128
+
129
+ ## Appendix L — Cryptographic Modules Table
130
+ **Required:** Yes | **Author:** CSP
131
+ - Lists every cryptographic module in use within the boundary
132
+ - For each module: vendor, product name, version, FIPS 140-2/3 validation certificate number, use case (encryption at rest, in transit, key management, etc.)
133
+ - All modules must have active FIPS 140-2 or 140-3 validation certificates (check NIST CMVP)
134
+ - Identifies any non-FIPS algorithms still in use (must be remediated or deviation-approved)
135
+
136
+ **Common finding:** Module versions have changed since last authorization and certificates are no longer valid; legacy algorithms (MD5, SHA-1, DES, RC4) found in use without deviation.
137
+
138
+ ---
139
+
140
+ ## Appendix M — Continuous Monitoring Plan
141
+ **Required:** Yes | **Author:** CSP
142
+ - Documents the ongoing ConMon program
143
+ - Must specify: scan frequency and tools, vulnerability management SLAs, POA&M update cadence, reporting schedule to agency AO, annual assessment approach
144
+ - Scan requirements: OS/infrastructure monthly; web app monthly; database monthly; container images per CI/CD pipeline
145
+ - References the Security Inbox requirement (effective January 2026)
146
+
147
+ ---
148
+
149
+ ## Appendix N — Separation of Duties Matrix
150
+ **Required:** Conditional (required when separation of duties is a compensating control or specifically required by agency) | **Author:** CSP
151
+ - Documents which roles can and cannot be combined
152
+ - Relevant when a small team might otherwise hold conflicting privileges
153
+ - Ties to AC-5 (Separation of Duties) control implementation
154
+
155
+ ---
156
+
157
+ ## Appendix O — Plan of Action & Milestones (POA&M)
158
+ **Required:** Yes | **Author:** CSP (FedRAMP POA&M template)
159
+ - See `references/poam-guide.md` for full field definitions and SLA table
160
+ - Living document — updated monthly during ConMon
161
+ - Submitted monthly to agency AO(s)
162
+ - Every SAR finding must appear as a POA&M row
163
+
164
+ ---
165
+
166
+ ## Appendix P — Supply Chain Risk Management Plan (SCRM Plan)
167
+ **Required:** Yes (Rev 5) | **Author:** CSP
168
+ - New requirement introduced with NIST SP 800-53 Rev 5 (SR control family)
169
+ - Documents how the CSP manages supply chain risks for hardware, software, and services
170
+ - Must address: supplier assessment process, SBOM tracking, open source component vulnerability management, critical supplier identification
171
+ - Ties to SR-1 through SR-12 control implementations
172
+
173
+ **Common finding:** SCRM Plan is generic and doesn't describe the CSP's specific suppliers or risk assessment methodology; SBOM process undefined.
174
+
175
+ ---
176
+
177
+ ## Appendix Q — Privacy Impact Assessment (PIA)
178
+ **Required:** If PII is in scope | **Author:** CSP
179
+ - Required when the system collects, processes, stores, or transmits PII
180
+ - Must follow the E-Government Act of 2002 Section 208 PIA requirements
181
+ - Covers: what PII is collected, why, how it's protected, retention, access controls, sharing with third parties
182
+ - Ties to PT control family (PII Processing & Transparency) — new in Rev 5
183
+ - Agency AO reviews PIA as part of authorization decision when PII is involved
184
+
185
+ **Common finding:** PIA omits specific PII data elements; PIA not updated when new PII types are added to the system.
186
+
187
+ ---
188
+
189
+ ## Quick Reference: Appendix Checklist
190
+
191
+ | App | Title | Required | Template |
192
+ |-----|-------|----------|----------|
193
+ | A | Acronyms & Glossary | Yes | CSP-authored |
194
+ | B | Laws & Regulations | Yes | FedRAMP base + CSP additions |
195
+ | C | Security Policies & Procedures | Yes | CSP-authored |
196
+ | D | User Guide | Yes | CSP-authored |
197
+ | E | Rules of Behavior | Yes | FedRAMP template |
198
+ | F | IT Contingency Plan (ISCP) | Yes | FedRAMP ISCP template (Dec 2024) |
199
+ | G | Configuration Management Plan | Yes | CSP-authored |
200
+ | H | Incident Response Plan | Yes | CSP-authored |
201
+ | I | CIS / CRM Workbook | Yes | FedRAMP template |
202
+ | J | FIPS 199 Categorization | Yes | CSP-authored |
203
+ | K | Integrated Inventory Workbook (IIW) | Yes | FedRAMP template (Dec 2024) |
204
+ | L | Cryptographic Modules Table | Yes | CSP-authored |
205
+ | M | Continuous Monitoring Plan | Yes | CSP-authored |
206
+ | N | Separation of Duties Matrix | Conditional | CSP-authored |
207
+ | O | POA&M | Yes | FedRAMP template |
208
+ | P | Supply Chain Risk Management Plan | Yes (Rev 5) | CSP-authored |
209
+ | Q | Privacy Impact Assessment (PIA) | If PII in scope | CSP-authored |