bmad-plus 0.4.4 → 0.5.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (133) hide show
  1. package/CHANGELOG.md +31 -0
  2. package/README.md +3 -3
  3. package/package.json +1 -1
  4. package/readme-international/README.de.md +2 -2
  5. package/readme-international/README.es.md +2 -2
  6. package/readme-international/README.fr.md +2 -2
  7. package/src/bmad-plus/module.yaml +43 -12
  8. package/src/bmad-plus/packs/pack-shield/README.md +110 -0
  9. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
  10. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
  11. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
  12. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
  13. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
  14. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
  15. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
  16. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
  17. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
  18. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
  19. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
  20. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
  21. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
  22. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
  23. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
  24. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
  25. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
  26. package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
  27. package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
  28. package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
  29. package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
  30. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
  31. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
  32. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
  33. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
  34. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
  35. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
  36. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
  37. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
  38. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
  39. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
  40. package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
  41. package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
  42. package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
  43. package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
  44. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
  45. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
  46. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
  47. package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
  48. package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
  49. package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
  50. package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
  51. package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
  52. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
  53. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
  54. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
  55. package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
  56. package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
  57. package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
  58. package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
  59. package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
  60. package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
  61. package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
  62. package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
  63. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
  64. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
  65. package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
  66. package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
  67. package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
  68. package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
  69. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
  70. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
  71. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
  72. package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
  73. package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
  74. package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
  75. package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
  76. package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
  77. package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
  78. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
  79. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
  80. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
  81. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
  82. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
  83. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
  84. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
  85. package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
  86. package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
  87. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
  88. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
  89. package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
  90. package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
  91. package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
  92. package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
  93. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
  94. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
  95. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
  96. package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
  97. package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
  98. package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
  99. package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
  100. package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
  101. package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
  102. package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
  103. package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
  104. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
  105. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
  106. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
  107. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
  108. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
  109. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
  110. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
  111. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
  112. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
  113. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
  114. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
  115. package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
  116. package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
  117. package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
  118. package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
  119. package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
  120. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
  121. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
  122. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
  123. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
  124. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
  125. package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
  126. package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
  127. package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
  128. package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
  129. package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
  130. package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
  131. package/tools/cli/commands/install.js +21 -8
  132. package/tools/cli/commands/update.js +4 -2
  133. package/tools/cli/i18n.js +50 -10
@@ -0,0 +1,276 @@
1
+ # SOC 2 Vendor Risk Reference
2
+
3
+ ## Table of Contents
4
+ 1. [Vendor Risk Program Overview](#vendor-risk-program-overview)
5
+ 2. [Vendor Inventory Template](#vendor-inventory-template)
6
+ 3. [Vendor Risk Questionnaire](#vendor-risk-questionnaire)
7
+ 4. [Reviewing a Vendor's SOC 2 Report](#reviewing-a-vendors-soc-2-report)
8
+ 5. [CUEC Management](#cuec-management)
9
+ 6. [Vendor Onboarding Checklist](#vendor-onboarding-checklist)
10
+
11
+ ---
12
+
13
+ ## Vendor Risk Program Overview
14
+
15
+ SOC 2 CC9.2 requires organizations to assess and manage risks arising from vendors and business
16
+ partners who have access to systems or data, or on whom the organization depends for critical
17
+ services.
18
+
19
+ ### What auditors look for:
20
+ 1. A **vendor inventory** exists and is maintained
21
+ 2. Vendors are **tiered by risk** and assessed accordingly
22
+ 3. **Due diligence** was performed before critical vendors were onboarded
23
+ 4. Vendor assessments are **reviewed at least annually**
24
+ 5. **Contracts** include appropriate security and data protection requirements
25
+ 6. **CUECs** from vendor SOC 2 reports are identified and addressed
26
+
27
+ ---
28
+
29
+ ## Vendor Inventory Template
30
+
31
+ Maintain a spreadsheet or GRC tool record for each vendor:
32
+
33
+ | Field | Description |
34
+ |---|---|
35
+ | Vendor Name | Legal entity name |
36
+ | Service Provided | What they do for you |
37
+ | Risk Tier | Critical / High / Medium / Low |
38
+ | Data Access | Types of data they can access (PII, Confidential, none) |
39
+ | System Access | Production / Staging / None |
40
+ | SOC 2 Available? | Yes / No / In progress |
41
+ | Last Assessment Date | Date of most recent due diligence |
42
+ | Next Review Due | Based on tier cadence |
43
+ | Contract Expiry | Date |
44
+ | DPA Signed? | Yes / No / N/A |
45
+ | Security Addendum? | Yes / No / N/A |
46
+ | Primary Contact | Vendor security/legal contact |
47
+ | Owner | Internal stakeholder who owns the relationship |
48
+
49
+ ### Risk Tier Definitions
50
+
51
+ **Critical:** Vendor has access to production systems or processes/stores customer PII.
52
+ Examples: AWS, Azure, GCP, Salesforce, Snowflake, Stripe, database vendors.
53
+ - Requires: SOC 2 report review OR full questionnaire + annual re-assessment
54
+ - Contract must include: DPA, security addendum, breach notification <72hr, right to audit
55
+
56
+ **High:** Vendor processes sensitive business data or is operationally critical.
57
+ Examples: HR systems (Workday, Rippling), GitHub, Slack, identity providers.
58
+ - Requires: SOC 2 report or questionnaire annually
59
+ - Contract must include: DPA (if any personal data), security requirements
60
+
61
+ **Medium:** Limited data exposure, some operational dependency.
62
+ Examples: Project management tools, design tools, analytics platforms.
63
+ - Requires: Security questionnaire or SOC 2 review at onboarding + biennial review
64
+ - Contract should include: acceptable use and data handling clauses
65
+
66
+ **Low:** No meaningful data access, low operational risk.
67
+ Examples: Office supplies vendors, most SaaS point solutions without data access.
68
+ - Requires: Lightweight onboarding check (do they have a security program?)
69
+ - Standard contract terms sufficient
70
+
71
+ ---
72
+
73
+ ## Vendor Risk Questionnaire
74
+
75
+ Use this questionnaire for High/Critical vendors that don't have a SOC 2 report, or to
76
+ supplement a SOC 2 report. Customize based on the vendor's service type.
77
+
78
+ ---
79
+
80
+ ### Section 1: Company and Security Program
81
+
82
+ 1. Does your organization have a documented Information Security Policy? If yes, when was it last reviewed?
83
+
84
+ 2. Do you have a dedicated security function (e.g., CISO, security team)? Please describe its structure.
85
+
86
+ 3. Has your organization undergone any third-party security assessments in the past 12 months? (SOC 2, ISO 27001, pen test, etc.) If yes, please provide the most recent report or executive summary.
87
+
88
+ 4. Does your organization carry cybersecurity insurance? Please provide coverage amount.
89
+
90
+ 5. Have you experienced a security incident or data breach in the past 24 months that affected customers? If yes, please describe.
91
+
92
+ ---
93
+
94
+ ### Section 2: Access Controls
95
+
96
+ 6. Do you enforce multi-factor authentication (MFA) for access to systems that process our data? Which systems require MFA?
97
+
98
+ 7. How do you manage privileged/admin access? Do you use a Privileged Access Management (PAM) solution?
99
+
100
+ 8. How quickly are accounts for terminated employees deprovisioned? What is your offboarding process?
101
+
102
+ 9. Do you perform periodic access reviews? How frequently?
103
+
104
+ 10. Is access to customer data restricted to personnel who require it for their role (least privilege)?
105
+
106
+ ---
107
+
108
+ ### Section 3: Data Protection
109
+
110
+ 11. What data do you collect, process, or store on our behalf? Please provide a data inventory or data flow diagram.
111
+
112
+ 12. Is data encrypted at rest? If yes, what encryption standard is used?
113
+
114
+ 13. Is data encrypted in transit? What TLS version is enforced?
115
+
116
+ 14. How is our data logically separated from data belonging to other customers (multi-tenancy)?
117
+
118
+ 15. What is your data retention policy? How and when is our data deleted at contract end?
119
+
120
+ 16. Do you have a sub-processor/sub-vendor list? Will you notify us before engaging new sub-processors?
121
+
122
+ ---
123
+
124
+ ### Section 4: Incident Response
125
+
126
+ 17. Do you have a documented Incident Response Plan? When was it last tested?
127
+
128
+ 18. What is your process and timeline for notifying customers of a security incident that affects their data?
129
+
130
+ 19. Do you maintain security logs? For how long are logs retained?
131
+
132
+ 20. Do you have a SIEM or security monitoring solution in place?
133
+
134
+ ---
135
+
136
+ ### Section 5: Vulnerability Management
137
+
138
+ 21. How frequently do you perform vulnerability scanning on systems that process our data?
139
+
140
+ 22. What is your SLA for remediating critical and high vulnerabilities?
141
+
142
+ 23. How frequently do you perform penetration testing? Who performs it (internal or third-party)?
143
+
144
+ 24. Do you have a patch management program? What is your patching cadence?
145
+
146
+ ---
147
+
148
+ ### Section 6: Business Continuity
149
+
150
+ 25. Do you have a Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP)?
151
+
152
+ 26. What are your RTO (Recovery Time Objective) and RPO (Recovery Point Objective) for the systems we depend on?
153
+
154
+ 27. How frequently do you test your DR plan? When was the last test performed?
155
+
156
+ 28. Do you have redundant infrastructure (e.g., multi-region, HA setup)?
157
+
158
+ ---
159
+
160
+ ### Section 7: Compliance and Legal
161
+
162
+ 29. Are you subject to any industry-specific compliance requirements (HIPAA, PCI-DSS, GDPR, etc.)? Are you currently compliant?
163
+
164
+ 30. Are you willing to sign a Data Processing Agreement (DPA) with our organization?
165
+
166
+ 31. Will you notify us within 72 hours of becoming aware of a breach involving our data?
167
+
168
+ 32. Do you have a process for responding to Data Subject Requests (DSRs) that require action on data you process on our behalf?
169
+
170
+ ---
171
+
172
+ ### Scoring Guidance
173
+
174
+ For each question, score:
175
+ - **2** — Fully in place with evidence available
176
+ - **1** — Partially in place or controls exist but not fully documented/tested
177
+ - **0** — Not in place
178
+
179
+ | Score Range | Risk Level | Recommendation |
180
+ |---|---|---|
181
+ | 45–64 | Low risk | Proceed; standard contract terms |
182
+ | 30–44 | Medium risk | Proceed with DPA; annual re-review |
183
+ | 15–29 | High risk | Requires security addendum; risk acceptance from CISO |
184
+ | 0–14 | Critical risk | Escalate to leadership; consider alternative vendor |
185
+
186
+ ---
187
+
188
+ ## Reviewing a Vendor's SOC 2 Report
189
+
190
+ When a vendor provides their SOC 2 report, review the following:
191
+
192
+ ### 1. Report Basics
193
+ - **Report type:** Is it Type 1 (design only) or Type 2 (operating effectiveness)? Prefer Type 2.
194
+ - **Audit period:** Does it cover a recent period? Reports older than 12 months are stale.
195
+ - **Criteria in scope:** Does the report include the criteria relevant to your use case? (e.g., if you care about availability, is Availability in scope?)
196
+ - **Auditor:** Is the CPA firm reputable? (Larger firms: Deloitte, KPMG, EY, PwC, Grant Thornton, etc.)
197
+
198
+ ### 2. Auditor's Opinion
199
+ - **Unqualified (clean) opinion:** No material exceptions.
200
+ - **Qualified opinion:** One or more criteria not met — flag for review.
201
+ - **Adverse opinion:** Multiple failures — escalate, this is a significant red flag.
202
+
203
+ ### 3. Exceptions and Deviations
204
+ - Read the "results of tests of controls" section carefully.
205
+ - Any **exceptions** (control failures during the audit period) must be evaluated:
206
+ - Is the control we depend on the one that had exceptions?
207
+ - What was the vendor's remediation plan?
208
+ - Has it been addressed (look for management response)?
209
+
210
+ ### 4. Complementary User Entity Controls (CUECs)
211
+ - Look for a section titled "Complementary User Entity Controls" or similar.
212
+ - These are controls the vendor *requires you to operate* for their controls to be effective.
213
+ - You must address every applicable CUEC (see [CUEC Management](#cuec-management) below).
214
+
215
+ ### 5. System Description
216
+ - Does the description match the services you actually use?
217
+ - Are the systems and infrastructure you depend on included in scope?
218
+
219
+ ### Review Log Entry
220
+
221
+ Document each vendor SOC 2 review:
222
+ ```
223
+ Vendor: [Name]
224
+ Report Type: Type 1 / Type 2
225
+ Audit Period: [From] – [To]
226
+ Date Reviewed: [Date]
227
+ Reviewed By: [Name / Role]
228
+ Opinion: Unqualified / Qualified / Adverse
229
+ Notable Exceptions: [None / Description]
230
+ CUECs Identified: [None / List]
231
+ CUECs Addressed: [Yes / Partial / No — with details]
232
+ Risk Rating: Low / Medium / High
233
+ Action Items: [Any follow-up required]
234
+ ```
235
+
236
+ ---
237
+
238
+ ## CUEC Management
239
+
240
+ CUECs (Complementary User Entity Controls) are controls a vendor assumes *you* have in place.
241
+ If you don't have them, the vendor's controls may not fully protect your environment.
242
+
243
+ ### Common CUECs and Typical Responses
244
+
245
+ | Common CUEC | Typical Vendor (Example) | Your Corresponding Control |
246
+ |---|---|---|
247
+ | "User entities restrict access to the service using the vendor's access control features" | AWS, Salesforce | Access control policy; MFA enforcement; role-based access |
248
+ | "User entities are responsible for monitoring for unauthorized access using access logs" | AWS CloudTrail, Okta | SIEM ingesting vendor logs; alerting on suspicious logins |
249
+ | "User entities configure data encryption using the features provided" | AWS S3, RDS | Encryption enabled at rest; documented in system configuration |
250
+ | "User entities are responsible for their users' credentials" | Any SaaS | Password policy; MFA policy; offboarding process |
251
+ | "User entities notify the vendor of any personnel changes" | Managed service providers | Offboarding SOP includes notifying critical vendors |
252
+ | "User entities perform their own risk assessments" | Most vendors | Annual risk assessment process (CC3) |
253
+
254
+ ### CUEC Tracking Spreadsheet Fields
255
+
256
+ | CUEC # | Vendor | CUEC Description | Applicable? | Corresponding Control | Evidence | Owner | Status |
257
+ |---|---|---|---|---|---|---|---|
258
+ | 1 | AWS | Users restrict access via IAM | Yes | Access Control Policy + IAM review | Quarterly IAM review records | DevOps | Met |
259
+ | 2 | Salesforce | Users monitor login activity | Yes | SIEM ingests Salesforce logs | SIEM screenshots | Security | Met |
260
+
261
+ ---
262
+
263
+ ## Vendor Onboarding Checklist
264
+
265
+ Before onboarding a new Critical or High-tier vendor:
266
+
267
+ - [ ] Risk tier assigned based on data access and operational dependency
268
+ - [ ] Security questionnaire sent (or SOC 2 report requested)
269
+ - [ ] Questionnaire/report reviewed and scored
270
+ - [ ] Risk acceptance documented if score is medium/high
271
+ - [ ] Data Processing Agreement (DPA) executed (if PII involved)
272
+ - [ ] Security addendum signed (for Critical vendors)
273
+ - [ ] Contract includes: breach notification <72hr, data deletion on termination, right to audit
274
+ - [ ] CUECs identified and mapped to internal controls
275
+ - [ ] Vendor added to inventory with next review date
276
+ - [ ] Onboarding approved by CISO or security owner
@@ -0,0 +1,202 @@
1
+ # SWIFT CSCF — Assessment Process, Attestation, and Cross-Framework Mapping
2
+
3
+ ---
4
+
5
+ ## KYC-SA Attestation Process
6
+
7
+ ### Overview
8
+ All SWIFT users must submit an annual **KYC Security Attestation (KYC-SA)** confirming compliance with the CSCF mandatory controls. The attestation is submitted through the SWIFT portal at swift.com/myswift and is visible to your counterparties.
9
+
10
+ ### Attestation Workflow
11
+
12
+ 1. **Prepare evidence** — Gather implementation evidence for all 23 mandatory controls applicable to your architecture type
13
+ 2. **Engage independent assessor** — Community-standard users must have an independent assessor validate compliance (see below)
14
+ 3. **Complete KYC-SA form** — For each mandatory control, attest: Implemented / Partially Implemented / Not Implemented
15
+ 4. **Submit by July 31** — Annual deadline; late submission triggers counterparty notifications
16
+ 5. **Address counterparty queries** — Counterparties can view your attestation and may request clarification
17
+
18
+ ### Independent Assessment Requirements
19
+
20
+ Since CSCF v2020, an **independent assessment** is required for all users (previously self-attestation was permitted for smaller institutions):
21
+
22
+ | Assessment Standard | Applies To |
23
+ |--------------------|-----------|
24
+ | Community Standard Assessment (CSA) | All SWIFT users not subject to Enhanced Standard |
25
+ | Enhanced Standard | Users on enhanced programmes or at regulator request |
26
+
27
+ **Who can act as an independent assessor:**
28
+ - Internal audit team (if sufficiently independent from the SWIFT operations team)
29
+ - External audit firm with SWIFT CSP assessment competency
30
+ - SWIFT-certified assessors (listed on SWIFT's KYC Registry)
31
+ - The assessor must not have operational responsibility for the SWIFT environment assessed
32
+
33
+ **Assessment scope:** All 23 mandatory controls applicable to the architecture type; advisory controls optionally included.
34
+
35
+ ---
36
+
37
+ ## CSCF v2024 → v2025 Key Changes
38
+
39
+ | Change Area | v2024 | v2025 |
40
+ |-------------|-------|-------|
41
+ | Control count | 31 (23 mandatory, 8 advisory) | 31 (no change) |
42
+ | 2.2 Patching SLAs | Critical: 7 days | Critical: 3 days (tightened) |
43
+ | 4.2 MFA | Hardware token strongly recommended | Hardware token explicitly required; clarified app-based OTP insufficient for most types |
44
+ | 6.4 Log retention | 1 year minimum | Clarified: 1 year online, 3 years total |
45
+ | 7.1 SWIFT notification | 24-hour notification | Unchanged; emphasis on 30-day full report |
46
+ | A4 (Cloud) | Introduced in v2023 | Further clarified; cloud-specific guidance expanded |
47
+ | Assessment guidance | Community standard | Updated assessor qualification criteria |
48
+
49
+ ---
50
+
51
+ ## SWIFT Incident Notification Obligations
52
+
53
+ SWIFT requires notification when a cyber incident affects SWIFT infrastructure or transactions:
54
+
55
+ | Milestone | Deadline |
56
+ |-----------|----------|
57
+ | Initial notification to SWIFT (via CISO mailbox or KYC-SA portal) | 24 hours from confirmed cyber incident |
58
+ | Full incident report to SWIFT | 30 days |
59
+ | Internal escalation to senior management | Immediately upon detection |
60
+ | Law enforcement / regulatory notification | Per local requirements (varies by jurisdiction) |
61
+
62
+ **What constitutes a notifiable incident:**
63
+ - Unauthorised access to SWIFT systems or software
64
+ - Compromise of SWIFT credentials (operator tokens, passwords)
65
+ - Fraudulent or anomalous SWIFT transactions suspected to be cyber-related
66
+ - Malware found on SWIFT-connected systems
67
+ - Ransomware affecting the SWIFT zone
68
+
69
+ **SWIFT contact for incidents:** security@swift.com (SWIFT CISO office) and your SWIFT relationship manager.
70
+
71
+ ---
72
+
73
+ ## Service Bureau (Type B) Responsibilities
74
+
75
+ When using a service bureau (Type B architecture), responsibilities are split:
76
+
77
+ | Control Area | Service Bureau Responsibility | Customer Responsibility |
78
+ |-------------|-------------------------------|------------------------|
79
+ | SWIFT infrastructure security (1.1, 2.2, 2.3, 6.1, 6.2, 6.3) | Bureau attests on their KYC-SA | Customer must obtain and review bureau's KYC-SA |
80
+ | Operator access (4.2, 5.1) | Bureau provides access mechanism | Customer responsible for own operators' access |
81
+ | Log monitoring (6.4) | Bureau provides logs; may operate SIEM | Customer should receive relevant logs; review access |
82
+ | Incident response (7.1) | Bureau has own IRP | Customer must have SWIFT-specific addendum |
83
+ | Training (7.2) | Bureau trains its own staff | Customer trains own SWIFT users |
84
+
85
+ **Key obligation:** Customers using a service bureau must review their bureau's KYC-SA attestation annually and obtain assurance of compliance (Control 2.8). If the bureau is non-compliant, the customer may face counterparty notifications.
86
+
87
+ ---
88
+
89
+ ## Cross-Framework Mapping
90
+
91
+ ### SWIFT CSCF ↔ ISO/IEC 27001:2022
92
+
93
+ | CSCF Control | ISO 27001:2022 Annex A Controls |
94
+ |-------------|--------------------------------|
95
+ | 1.1 SWIFT Environment Protection | A.8.22 (Segregation of networks), A.8.20 (Network security) |
96
+ | 1.2 OS Privileged Account Control | A.8.2 (Privileged access rights), A.8.18 (Use of privileged utility programs) |
97
+ | 1.4 Internet Restriction | A.8.20 (Network security), A.8.22 (Segregation) |
98
+ | 2.1 Internal Data Flow Security | A.8.24 (Cryptography), A.8.20 (Network security) |
99
+ | 2.2 Security Updates | A.8.8 (Management of technical vulnerabilities) |
100
+ | 2.3 System Hardening | A.8.8 (Technical vulnerability management), A.8.9 (Configuration management) |
101
+ | 2.6 Operator Session Security | A.8.24 (Cryptography), A.8.20 (Network security) |
102
+ | 2.7 Vulnerability Scanning | A.8.8 (Technical vulnerability management) |
103
+ | 2.8 Critical Activity Outsourcing | A.5.19 (Supplier relationships), A.5.20 (Addressing security in supplier agreements) |
104
+ | 3.1 Physical Security | A.7.1 (Physical security perimeters), A.7.2 (Physical entry) |
105
+ | 4.1 Password Policy | A.8.5 (Secure authentication) |
106
+ | 4.2 Multi-Factor Authentication | A.8.5 (Secure authentication) |
107
+ | 5.1 Logical Access Controls | A.8.3 (Information access restriction), A.8.2 (Privileged access rights) |
108
+ | 5.2 Token Management | A.8.5 (Secure authentication), A.8.2 (Privileged access rights) |
109
+ | 6.1 Malware Protection | A.8.7 (Protection against malware) |
110
+ | 6.2 Software Integrity | A.8.19 (Installation of software on operational systems), A.8.29 (Security testing in development) |
111
+ | 6.3 Database Integrity | A.8.3 (Information access restriction) |
112
+ | 6.4 Log and Monitoring | A.8.15 (Logging), A.8.16 (Monitoring activities) |
113
+ | 7.1 Incident Response | A.5.24 (Planning and preparation), A.5.26 (Response to incidents) |
114
+ | 7.2 Security Training | A.6.3 (Information security awareness) |
115
+
116
+ **Synergy note:** An ISO 27001-certified organisation will have satisfied many CSCF controls through their ISMS. However, SWIFT CSP adds SWIFT-specific requirements (e.g., hardware MFA tokens, SWIFT log sources, KYC-SA submission) that are not automatically covered by ISO 27001.
117
+
118
+ ---
119
+
120
+ ### SWIFT CSCF ↔ PCI DSS v4.0.1
121
+
122
+ | CSCF Control | PCI DSS Requirement |
123
+ |-------------|---------------------|
124
+ | 1.1 SWIFT Environment Protection | Req 1 (Network security controls), Req 1.2 (Firewall rules) |
125
+ | 1.4 Internet Restriction | Req 1.3 (Restrict inbound/outbound traffic) |
126
+ | 2.2 Security Updates | Req 6.3 (Security vulnerabilities addressed) |
127
+ | 2.3 System Hardening | Req 2.2 (System components configured securely) |
128
+ | 4.1 Password Policy | Req 8.3 (Strong authentication) |
129
+ | 4.2 Multi-Factor Authentication | Req 8.4 (MFA for non-console admin access and remote access) |
130
+ | 5.1 Logical Access Controls | Req 7 (Restrict access to system components and cardholder data) |
131
+ | 6.1 Malware Protection | Req 5 (Protect against malicious software) |
132
+ | 6.4 Log and Monitoring | Req 10 (Log and monitor all access) |
133
+ | 7.1 Incident Response | Req 12.10 (Incident response plan) |
134
+
135
+ **Key difference:** PCI DSS focuses on cardholder data environments; SWIFT CSP focuses on the SWIFT messaging infrastructure. A PCI-compliant organisation will have a strong security foundation but will need SWIFT-specific additions (e.g., hardware MFA, SWIFT log sources, 1-year log retention, KYC-SA submission).
136
+
137
+ ---
138
+
139
+ ### SWIFT CSCF ↔ NIST CSF 2.0
140
+
141
+ | CSCF Control | NIST CSF 2.0 Function/Category |
142
+ |-------------|-------------------------------|
143
+ | 1.1 SWIFT Environment Protection | PR.IR (Infrastructure Resilience) |
144
+ | 2.2 Security Updates | PR.PS-2 (Software, firmware patched) |
145
+ | 2.3 System Hardening | PR.PS-1 (Configuration management) |
146
+ | 4.2 MFA | PR.AA-3 (Authentication) |
147
+ | 5.1 Logical Access Controls | PR.AA-1 (Identity management) |
148
+ | 6.1 Malware Protection | PR.PS-3 (Malware protection) |
149
+ | 6.4 Log and Monitoring | DE.CM (Continuous monitoring) |
150
+ | 7.1 Incident Response | RS.MA (Incident management) |
151
+ | 7.2 Security Training | PR.AT (Awareness and training) |
152
+
153
+ ---
154
+
155
+ ## Regulatory Context
156
+
157
+ SWIFT CSP compliance is increasingly referenced in financial sector regulation:
158
+
159
+ | Jurisdiction | Regulatory Reference |
160
+ |-------------|---------------------|
161
+ | **EU** | ECB TIBER-EU framework; EBA ICT guidelines under DORA reference SWIFT CSP for financial messaging |
162
+ | **US** | FFIEC Cybersecurity Assessment Tool references correspondent banking controls; NY DFS 23 NYCRR 500 aligns to SWIFT CSP |
163
+ | **UK** | Bank of England / PRA supervisory expectations for payment systems include SWIFT CSP |
164
+ | **Singapore** | MAS TRM (Technology Risk Management) guidelines align to SWIFT CSP for banks |
165
+ | **Hong Kong** | HKMA Cybersecurity Fortification Initiative (CFI) references SWIFT CSP for Tier 1 and 2 banks |
166
+ | **Australia** | APRA CPS 234 includes SWIFT CSP controls under critical third-party system security |
167
+
168
+ ---
169
+
170
+ ## Gap Assessment Checklist Template
171
+
172
+ For each mandatory control, assess against these criteria:
173
+
174
+ | Column | Description |
175
+ |--------|-------------|
176
+ | Control ID | e.g., 4.2 |
177
+ | Status | 🔴 Not Implemented / 🟡 Partially Implemented / 🟢 Implemented |
178
+ | Evidence Available | Yes / No / Partial |
179
+ | Evidence Type | Policy / Configuration / Logs / Test result / Screenshot |
180
+ | Gap Description | Specific gap narrative |
181
+ | Remediation Action | Concrete step to close the gap |
182
+ | Owner | Team/individual responsible |
183
+ | Target Date | When gap will be closed |
184
+ | Attestation Impact | If 🔴: Attest as Not Implemented; if 🟡: Partially; if 🟢: Implemented |
185
+
186
+ ---
187
+
188
+ ## Most Common CSCF Non-Compliance Patterns
189
+
190
+ 1. **Software-based OTP for MFA (Control 4.2):** Many organisations use authenticator apps rather than hardware tokens. SWIFT CSP requires hardware tokens for most architecture types.
191
+
192
+ 2. **Shared operator accounts (Control 5.1):** Named individual accounts not enforced; multiple operators sharing one account ID — makes non-repudiation impossible.
193
+
194
+ 3. **Log retention gaps (Control 6.4):** Logs collected but not retained for 1+ years; SWIFT-specific log sources (Alliance Access/Gateway) not included in SIEM scope.
195
+
196
+ 4. **Patch exceptions undocumented (Control 2.2):** Critical patches overdue beyond 3-day SLA with no documented exception/compensating control.
197
+
198
+ 5. **SWIFT zone not documented (Control 1.1):** Secure Zone exists technically but no network diagram; or servers are dual-homed to both SWIFT zone and corporate network.
199
+
200
+ 6. **No SWIFT-specific IRP (Control 7.1):** General incident response plan exists but no SWIFT-specific section covering SWIFT notification obligations and fraud scenarios.
201
+
202
+ 7. **Token inventory not maintained (Control 5.2):** Hardware tokens issued but no central inventory; deprovisioning process for leavers undocumented.