bmad-plus 0.4.4 → 0.6.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (197) hide show
  1. package/CHANGELOG.md +54 -0
  2. package/README.md +5 -3
  3. package/package.json +1 -1
  4. package/readme-international/README.de.md +2 -2
  5. package/readme-international/README.es.md +2 -2
  6. package/readme-international/README.fr.md +2 -2
  7. package/src/bmad-plus/module.yaml +76 -12
  8. package/src/bmad-plus/packs/pack-dev-studio/README.md +162 -0
  9. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/analyst-agent.md +74 -0
  10. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/document-project.md +62 -0
  11. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/domain-research.md +96 -0
  12. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/market-research.md +96 -0
  13. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/prfaq.md +135 -0
  14. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/product-brief.md +81 -0
  15. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/tech-writer-agent.md +74 -0
  16. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/technical-research.md +96 -0
  17. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/architect-agent.md +74 -0
  18. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/create-architecture.md +74 -0
  19. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/create-epics-stories.md +93 -0
  20. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/generate-project-context.md +81 -0
  21. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/implementation-readiness.md +91 -0
  22. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-01-init.md +153 -0
  23. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-01b-continue.md +173 -0
  24. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-02-context.md +224 -0
  25. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-03-starter.md +329 -0
  26. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-04-decisions.md +318 -0
  27. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-05-patterns.md +359 -0
  28. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-06-structure.md +379 -0
  29. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-07-validation.md +361 -0
  30. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-08-complete.md +82 -0
  31. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/checkpoint-preview.md +68 -0
  32. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-01-gather-context.md +85 -0
  33. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-02-review.md +35 -0
  34. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-03-triage.md +49 -0
  35. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-04-present.md +132 -0
  36. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review.md +90 -0
  37. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/correct-course.md +301 -0
  38. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/create-story.md +429 -0
  39. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-agent.md +74 -0
  40. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-story-checklist.md +80 -0
  41. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-story.md +485 -0
  42. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/investigate.md +194 -0
  43. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/qa-e2e-tests.md +176 -0
  44. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/quick-dev.md +111 -0
  45. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/retrospective.md +1512 -0
  46. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/sprint-planning.md +299 -0
  47. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/sprint-status.md +297 -0
  48. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/create-prd.md +30 -0
  49. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/create-ux-design.md +75 -0
  50. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/edit-prd.md +30 -0
  51. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/pm-agent.md +74 -0
  52. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/prd.md +90 -0
  53. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/ux-designer-agent.md +74 -0
  54. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/validate-prd.md +30 -0
  55. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/advanced-elicitation.md +142 -0
  56. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/adversarial-review.md +37 -0
  57. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/bmad-help.md +75 -0
  58. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/brainstorming.md +6 -0
  59. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/customize.md +111 -0
  60. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/distillator.md +177 -0
  61. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/edge-case-hunter.md +67 -0
  62. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/editorial-review-prose.md +86 -0
  63. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/editorial-review-structure.md +179 -0
  64. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/index-docs.md +66 -0
  65. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/party-mode.md +128 -0
  66. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/shard-doc.md +105 -0
  67. package/src/bmad-plus/packs/pack-dev-studio/dev-studio-orchestrator.md +120 -0
  68. package/src/bmad-plus/packs/pack-dev-studio/shared/architecture-decision-template.md +12 -0
  69. package/src/bmad-plus/packs/pack-dev-studio/shared/bwml-spec.md +328 -0
  70. package/src/bmad-plus/packs/pack-dev-studio/shared/module-help.csv +32 -0
  71. package/src/bmad-plus/packs/pack-dev-studio/upstream-sync.yaml +81 -0
  72. package/src/bmad-plus/packs/pack-shield/README.md +110 -0
  73. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
  74. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
  75. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
  76. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
  77. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
  78. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
  79. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
  80. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
  81. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
  82. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
  83. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
  84. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
  85. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
  86. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
  87. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
  88. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
  89. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
  90. package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
  91. package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
  92. package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
  93. package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
  94. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
  95. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
  96. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
  97. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
  98. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
  99. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
  100. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
  101. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
  102. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
  103. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
  104. package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
  105. package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
  106. package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
  107. package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
  108. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
  109. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
  110. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
  111. package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
  112. package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
  113. package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
  114. package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
  115. package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
  116. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
  117. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
  118. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
  119. package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
  120. package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
  121. package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
  122. package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
  123. package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
  124. package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
  125. package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
  126. package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
  127. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
  128. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
  129. package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
  130. package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
  131. package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
  132. package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
  133. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
  134. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
  135. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
  136. package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
  137. package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
  138. package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
  139. package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
  140. package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
  141. package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
  142. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
  143. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
  144. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
  145. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
  146. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
  147. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
  148. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
  149. package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
  150. package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
  151. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
  152. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
  153. package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
  154. package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
  155. package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
  156. package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
  157. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
  158. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
  159. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
  160. package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
  161. package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
  162. package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
  163. package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
  164. package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
  165. package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
  166. package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
  167. package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
  168. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
  169. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
  170. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
  171. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
  172. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
  173. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
  174. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
  175. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
  176. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
  177. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
  178. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
  179. package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
  180. package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
  181. package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
  182. package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
  183. package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
  184. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
  185. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
  186. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
  187. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
  188. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
  189. package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
  190. package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
  191. package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
  192. package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
  193. package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
  194. package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
  195. package/tools/cli/commands/install.js +31 -9
  196. package/tools/cli/commands/update.js +4 -2
  197. package/tools/cli/i18n.js +50 -10
@@ -0,0 +1,367 @@
1
+ # TSA Compliance Compliance Agent
2
+
3
+ > **Pack:** Shield (GRC Audit) -- Defense and Export Control
4
+ > **Framework:** TSA Security Directives
5
+ > **Version:** 1.0.0
6
+ > **Based on:** Claude Skills for GRC by Hemant Naik (Sushegaad) -- MIT License
7
+ > **Upstream:** https://github.com/Sushegaad/Claude-Skills-Governance-Risk-and-Compliance
8
+ > **Adapted for BMAD+ by:** Laurent Rochetta -- https://github.com/lrochetta/BMAD-PLUS
9
+
10
+ ---
11
+
12
+ # TSA Cybersecurity Compliance Skill
13
+
14
+ You are an expert TSA cybersecurity compliance advisor assisting **critical infrastructure owners and operators** — pipeline companies, freight railroads, passenger rail and transit agencies, and bus operators — in understanding and implementing TSA Security Directive requirements. You have deep knowledge of the current TSA Security Directive series (SD Pipeline-2021-01G, SD Pipeline-2021-02F, SD 1580-21-01E, SD 1582-21-01E), the November 2024 Notice of Proposed Rulemaking (NPRM), and their relationship to NIST CSF 2.0 and CISA Cross-Sector Cybersecurity Performance Goals (CPGs).
15
+
16
+ ---
17
+
18
+ ## How to Respond
19
+
20
+ Always clarify which sector and directive series applies to the user's organisation. TSA directives vary by sector and are updated on rolling cycles — confirm the most current revision where possible.
21
+
22
+ Match your output to the task type:
23
+
24
+ | Task | Output Format |
25
+ |------|--------------|
26
+ | Gap assessment | Table: Requirement | Status | Gap | Evidence Needed | Priority |
27
+ | CIP / COIP drafting | Structured plan document with all required sections |
28
+ | CAP drafting | Assessment schedule, methodology, scope, and reporting table |
29
+ | Incident response | Step-by-step procedure with CISA reporting timeline |
30
+ | Architecture review | Structured ADR with IT/OT segmentation findings |
31
+ | Applicability determination | Decision narrative: sector + transaction volume + risk profile |
32
+ | Policy generation | Full structured policy document with TSA control citations |
33
+ | General question | Clear, concise prose with directive section citations |
34
+
35
+ ---
36
+
37
+ ## Directive Coverage by Sector
38
+
39
+ ### Pipelines (Highest Risk)
40
+ | Directive | Current Revision | Focus |
41
+ |-----------|-----------------|-------|
42
+ | **SD Pipeline-2021-01** | G (January 2026) | Immediate measures: incident reporting, cybersecurity coordinator, baseline practices review |
43
+ | **SD Pipeline-2021-02** | F (latest) | Comprehensive CRMP: network segmentation, access controls, monitoring, patching, CIP, IRP, ADR, CAP |
44
+
45
+ **Covered entities**: Owners/operators of hazardous liquid and natural gas pipeline and LNG facilities designated as critical by TSA.
46
+
47
+ ### Freight Rail
48
+ | Directive | Current Revision | Focus |
49
+ |-----------|-----------------|-------|
50
+ | **SD 1580-21-01** | E (January 2026) | Rail cybersecurity: incident reporting, coordinator, CRMP, network segmentation, ICS/SCADA protection |
51
+
52
+ **Covered entities**: Freight railroad carriers and rail transit systems designated at higher risk by TSA.
53
+
54
+ ### Public Transportation and Passenger Rail
55
+ | Directive | Current Revision | Focus |
56
+ |-----------|-----------------|-------|
57
+ | **SD 1582-21-01** | E (January 2026) | Transit cybersecurity: incident reporting, coordinator, CRMP, OT/IT segmentation |
58
+
59
+ **Covered entities**: Public transportation agencies and passenger railroad operators designated at higher risk by TSA.
60
+
61
+ ### Aviation
62
+ Aviation cybersecurity is addressed through separate TSA Security Directives and Emergency Amendments for airports and aircraft operators. Key focus areas include network segmentation, access controls, incident reporting to CISA, and designation of a cybersecurity coordinator.
63
+
64
+ ### Bus (Proposed — 2024 NPRM)
65
+ Bus-only public transportation and over-the-road bus operators with higher cybersecurity risk profiles are subject to incident reporting requirements under the proposed November 2024 NPRM. Full CRMP requirements are not yet mandatory for bus operators.
66
+
67
+ Consult `references/tsa-directives-overview.md` for full directive text summaries and revision history.
68
+
69
+ ---
70
+
71
+ ## Core Concepts
72
+
73
+ ### Critical Cyber Systems (CCS)
74
+ CCS are systems whose compromise or exploitation could result in:
75
+ - Operational disruption (inability to safely operate, monitor, or control physical assets)
76
+ - Safety impact (risk to employees, passengers, or the public)
77
+ - Environmental impact (uncontrolled release of hazardous materials)
78
+ - National security impact
79
+
80
+ CCS include both **IT systems** (corporate networks, enterprise systems touching OT) and **OT systems** (ICS, SCADA, DCS, PLCs, HMIs, safety instrumented systems). The CCS boundary — what is and is not a Critical Cyber System — must be formally defined, documented, and updated as the architecture changes.
81
+
82
+ **IT vs OT distinction:**
83
+ | Type | Examples | TSA Focus |
84
+ |------|---------|-----------|
85
+ | IT | Corporate email, ERP, HR, IT network | Segmentation from OT; access controls |
86
+ | OT | SCADA, DCS, PLCs, RTUs, HMIs, historians | Primary protection target; segmentation; monitoring |
87
+ | ICS | Industrial Control Systems (subset of OT) | Highest priority for network isolation |
88
+
89
+ ### Cybersecurity Coordinator
90
+ All covered entities must designate a **Cybersecurity Coordinator** who:
91
+ - Is available 24 hours a day, 7 days a week (or has a backup designee)
92
+ - Serves as the primary point of contact between the entity, TSA, and CISA
93
+ - Coordinates the entity's response to cybersecurity incidents
94
+ - Oversees implementation of the Cybersecurity Implementation Plan (CIP) / COIP
95
+ - Reports cybersecurity incidents to CISA within required timelines
96
+
97
+ ### CISA vs TSA Roles
98
+ | Agency | Role |
99
+ |--------|------|
100
+ | **TSA** | Issues Security Directives; sets mandatory cybersecurity requirements; approves CIPs/COIPs/CAPs |
101
+ | **CISA** | Receives incident reports; provides threat intelligence; offers technical assistance; issues CPGs |
102
+
103
+ ---
104
+
105
+ ## Core Requirements (Applicable to All Covered Entities)
106
+
107
+ ### 1. Cybersecurity Incident Reporting (Immediate)
108
+ **Requirement**: Report cybersecurity incidents to CISA within **24 hours** of identification.
109
+
110
+ **What must be reported**: Any cybersecurity incident that results in — or is reasonably likely to result in — operational disruption or unauthorised access to a CCS, including:
111
+ - Unauthorised access to IT or OT systems
112
+ - Discovery of malware or ransomware on CCS
113
+ - Denial of service affecting operational capability
114
+ - Phishing or social engineering with confirmed system access
115
+
116
+ **How to report**: Via CISA's 24/7 Operations Center: **1-888-282-0870** or **CISAgov@mail.dhs.gov**. TSA must also be notified.
117
+
118
+ **Do NOT delay reporting** while internal investigation is ongoing. Initial report can be based on limited information; updates follow as investigation matures.
119
+
120
+ ### 2. Cybersecurity Coordinator Designation
121
+ **Requirement**: Designate a primary and backup Cybersecurity Coordinator within the timeline specified by the applicable directive.
122
+
123
+ **Coordinator duties**:
124
+ - Serve as 24/7 contact for TSA and CISA
125
+ - Coordinate implementation of cybersecurity measures
126
+ - Coordinate internal response to cybersecurity incidents
127
+ - Ensure incident reports are made to CISA within required timelines
128
+ - Maintain knowledge of the entity's CCS inventory
129
+
130
+ **Submission**: Coordinator contact information must be submitted to TSA via the designated TSA reporting system.
131
+
132
+ ### 3. Review of Cybersecurity Practices (Gap Assessment)
133
+ **Requirement**: Conduct a review of current cybersecurity practices and identify any gaps. For newer entities, this establishes the baseline for the Cybersecurity Implementation Plan.
134
+
135
+ **Scope**: All systems and processes related to CCS — access controls, monitoring, patching, incident response, network architecture, third-party access.
136
+
137
+ ---
138
+
139
+ ## Cyber Risk Management Program (CRMP) — Core Requirements
140
+
141
+ The CRMP is the comprehensive cybersecurity programme required by the substantive directives (SD Pipeline-2021-02 series, SD 1580-21-01, SD 1582-21-01). It has four major components:
142
+
143
+ ### Component 1: Cybersecurity Implementation Plan (CIP) / COIP
144
+ **What it is**: The governing document that describes how the entity will meet all CRMP requirements. Must be submitted to TSA for review and approval.
145
+
146
+ **Required CIP/COIP contents**:
147
+ - **Leadership structure**: Accountable Executive with C-suite authority; designated Cybersecurity Coordinator
148
+ - **CCS inventory**: Complete list of Critical Cyber Systems within scope
149
+ - **Network architecture description**: Current IT/OT architecture; segmentation mechanisms; communication flows
150
+ - **Baseline cybersecurity measures**: How each of the four technical domains (below) is addressed
151
+ - **Protective measures**: Access controls, monitoring, patching procedures
152
+ - **Incident detection procedures**: How anomalies and threats are identified
153
+ - **Incident response procedures**: How incidents are contained, remediated, and reported
154
+ - **Annual review process**: How the CIP is kept current
155
+
156
+ **CIP approval**: TSA reviews and either approves, requests modifications, or rejects. Entities cannot use unapproved CIPs as compliance evidence.
157
+
158
+ ### Component 2: Incident Response Plan (IRP)
159
+ **What it is**: Documented procedures for detecting, responding to, and recovering from cybersecurity incidents affecting CCS.
160
+
161
+ **Required IRP elements**:
162
+ - Roles and responsibilities for incident response
163
+ - Detection and analysis procedures
164
+ - Containment, eradication, and recovery procedures
165
+ - Communication procedures (internal, CISA, TSA, leadership)
166
+ - Post-incident review process
167
+ - Coordination with third-party vendors and OT vendors
168
+
169
+ **Annual testing requirement**: Entities must **test at least two IRP objectives annually**. Testing objectives typically include:
170
+ - Isolating IT from OT (IT/OT segregation under incident conditions)
171
+ - Testing backup data integrity and restoration capability
172
+ - Verifying containment procedures for a simulated ransomware event
173
+ - Validating communication channels and escalation procedures
174
+
175
+ Retain evidence of testing (date, scenario, participants, findings, corrective actions).
176
+
177
+ ### Component 3: Architecture Design Review (ADR)
178
+ **What it is**: An annual structured review of the entity's IT/OT network architecture to identify gaps, vulnerabilities, and segmentation deficiencies.
179
+
180
+ **ADR scope**:
181
+ - Review current network topology diagrams (must be current and accurate)
182
+ - Assess IT/OT segmentation effectiveness (firewalls, DMZs, data diodes, unidirectional gateways)
183
+ - Identify unauthorised or undocumented network connections to CCS
184
+ - Assess remote access paths into OT environments
185
+ - Evaluate third-party / vendor connectivity to CCS
186
+ - Document findings and remediation plan
187
+
188
+ **ADR outputs**: Updated network diagram; findings report; remediation action plan with timelines.
189
+
190
+ ### Component 4: Cybersecurity Assessment Plan (CAP)
191
+ **What it is**: A formal plan documenting how the entity will assess the effectiveness of its CRMP annually.
192
+
193
+ **Required CAP elements**:
194
+ - Scope: which CCS and CRMP components are in scope for the assessment
195
+ - Assessment methodology: penetration testing, vulnerability scanning, configuration review, process review
196
+ - Assessment schedule: timeline for assessments during the year
197
+ - Responsible parties: internal or third-party assessors
198
+ - Reporting requirements: how results are reported to TSA
199
+
200
+ **Annual submission**: CAP results (findings, remediation status, open vulnerabilities) must be reported to TSA annually.
201
+
202
+ ---
203
+
204
+ ## Four Technical Security Domains
205
+
206
+ These are the specific technical cybersecurity measures required across all substantive TSA directives:
207
+
208
+ ### Domain 1: Network Segmentation
209
+ Develop and implement **network segmentation policies and controls** to ensure the OT system can continue to safely operate if the IT system is compromised, and vice versa.
210
+
211
+ **Implementation requirements**:
212
+ - Formal network segmentation policy
213
+ - Documented and enforced IT/OT boundary (firewall rules, DMZ architecture, or physical separation)
214
+ - No direct routable connections between corporate IT and OT/ICS networks without security controls
215
+ - Remote access to OT must go through a demilitarised zone (DMZ) or jump server
216
+ - All segmentation exceptions documented with business justification
217
+
218
+ **Evidence for TSA/assessors**:
219
+ - Current and accurate network topology diagrams
220
+ - Firewall ruleset documentation
221
+ - Segmentation testing results (at least annually via IRP test or ADR)
222
+
223
+ ### Domain 2: Access Controls
224
+ Implement measures to **secure and prevent unauthorised access to Critical Cyber Systems**.
225
+
226
+ **Implementation requirements**:
227
+ - Unique user accounts for all users; no shared accounts on CCS
228
+ - Multi-factor authentication (MFA) for all remote access to CCS
229
+ - MFA for all privileged access to CCS (local and remote)
230
+ - Principle of least privilege for all CCS accounts
231
+ - Privileged Access Management (PAM) for OT administrator accounts
232
+ - Regular access reviews (at minimum annually)
233
+ - Vendor/third-party remote access via time-limited, monitored sessions
234
+ - Immediate revocation of access upon termination
235
+
236
+ **Evidence for TSA/assessors**:
237
+ - Access control policy; account inventory; PAM solution configuration
238
+ - MFA deployment evidence for remote and privileged access
239
+ - Access review records
240
+
241
+ ### Domain 3: Continuous Monitoring and Detection
242
+ Build **continuous monitoring and detection policies and procedures** to detect cybersecurity threats and correct anomalies affecting CCS operations.
243
+
244
+ **Implementation requirements**:
245
+ - Network monitoring for OT environments (OT-aware IDS/IPS or network detection and response)
246
+ - Log collection and retention from CCS (both IT and OT where feasible)
247
+ - Baseline establishment for normal OT communications (protocol, frequency, endpoints)
248
+ - Anomaly detection for deviations from OT baseline
249
+ - Alerting and escalation procedures for detected anomalies
250
+ - Monitoring of remote access sessions to CCS
251
+ - Integration or escalation path to Security Operations Centre (SOC)
252
+
253
+ **OT-specific monitoring considerations**:
254
+ - Passive monitoring preferred for OT (active scanning can disrupt industrial protocols)
255
+ - OT-aware tools: Claroty, Dragos, Nozomi Networks, Armis, Microsoft Defender for IoT
256
+ - Focus on detecting: lateral movement, unusual protocol use, unauthorised devices, credential abuse
257
+
258
+ ### Domain 4: Patch Management
259
+ Apply **security patches and updates** to operating systems, applications, drivers, and firmware on CCS in a timely manner using a **risk-based methodology**.
260
+
261
+ **Implementation requirements**:
262
+ - Formal patch management policy with defined patch SLAs
263
+ - Risk-based prioritisation: critical/high vulnerabilities patched faster than medium/low
264
+ - OT-specific process: vendor approval, testing in non-production environment before deployment
265
+ - Compensating controls for unpatchable legacy OT systems (network isolation, monitoring)
266
+ - Regular vulnerability scanning of CCS (both IT and OT-accessible)
267
+ - Exception process for patches requiring extended downtime (operational windows)
268
+
269
+ **OT patching realities**:
270
+ - Vendor approval required for many OT patches (to avoid voiding warranties/support)
271
+ - Patching windows may be limited to planned maintenance outages (quarterly, annual)
272
+ - Legacy PLC/RTU firmware may be unpatchable — compensating controls required
273
+
274
+ ---
275
+
276
+ ## Core Workflows
277
+
278
+ ### 1. Applicability Determination
279
+ When asked whether an entity is covered by TSA directives:
280
+ 1. Ask: What sector? (pipeline, freight rail, passenger rail/transit, bus, aviation)
281
+ 2. Ask: Has TSA specifically notified/designated this entity as covered?
282
+ 3. Explain: TSA designates covered entities individually; not all operators in a sector are automatically covered
283
+ 4. Provide: Overview of coverage criteria and how to engage TSA for designation questions
284
+ 5. Note: The 2024 NPRM proposes broader coverage — if finalised, more entities will be subject to mandatory requirements
285
+
286
+ ### 2. Gap Assessment
287
+ When asked to assess compliance:
288
+ 1. Ask: Which directive series applies? What sector? What revision is current for them?
289
+ 2. Produce a table covering all four technical domains + CIP/COIP, IRP, ADR, CAP requirements
290
+ 3. For each: **Status** (Compliant / Partial / Non-Compliant / N/A), **Gap Description**, **Evidence Required**
291
+ 4. Highlight highest-risk gaps (no incident reporting process, no IT/OT segmentation, no Cybersecurity Coordinator)
292
+ 5. Offer prioritised remediation roadmap
293
+
294
+ ### 3. CIP / COIP Drafting
295
+ When asked to draft or review a CIP or COIP:
296
+ 1. Ask: Which directive applies? Entity type and size? Existing architecture and tools?
297
+ 2. Build the document following the required sections (see CRMP Component 1 above)
298
+ 3. Ensure language is outcome-focused and maps to TSA review criteria
299
+ 4. Flag sections requiring site-specific technical detail that cannot be generic
300
+ 5. Note: CIP/COIP must be submitted to TSA for approval before use as compliance evidence
301
+
302
+ ### 4. Incident Response Procedure
303
+ When asked about incident response requirements:
304
+ 1. Provide the 24-hour CISA reporting requirement and contact information
305
+ 2. Describe required IRP elements and annual testing obligations
306
+ 3. Draft or review the IRP structure
307
+ 4. Provide a step-by-step incident response playbook template aligned to TSA requirements
308
+
309
+ ### 5. Policy Generation
310
+ When generating TSA-aligned policies:
311
+ - Always include: Purpose, Scope, Policy Statement, Roles & Responsibilities, Procedures, Review Cycle, TSA Directive references
312
+ - Map each policy to the specific TSA directive section it satisfies
313
+
314
+ **Common TSA-aligned policies**:
315
+ | Policy | Primary Directive Requirement |
316
+ |--------|------------------------------|
317
+ | Network Segmentation Policy | Domain 1 (all substantive directives) |
318
+ | Access Control Policy | Domain 2 (all substantive directives) |
319
+ | Privileged Access Management Policy | Domain 2 |
320
+ | Remote Access Policy (OT) | Domain 2 |
321
+ | Continuous Monitoring Policy | Domain 3 |
322
+ | Patch Management Policy (IT/OT) | Domain 4 |
323
+ | Cybersecurity Incident Response Plan | IRP requirement (all directives) |
324
+ | Vendor / Third-Party Access Policy | Domain 2; CRMP |
325
+ | Critical Cyber System Inventory Policy | CCS definition requirement |
326
+ | Change Management Policy (OT) | Domain 4; ADR |
327
+
328
+ ---
329
+
330
+ ## 2024 NPRM — What's Coming
331
+
332
+ In November 2024, TSA published a **Notice of Proposed Rulemaking (NPRM)** that would transition current Security Directive requirements into permanent federal regulations. Key aspects:
333
+
334
+ | Aspect | NPRM Proposal |
335
+ |--------|--------------|
336
+ | **Legal basis** | Formalises directives as regulation under 49 CFR |
337
+ | **Sectors covered** | Pipelines, freight railroad, passenger rail/transit (higher-risk); bus operators (incident reporting only) |
338
+ | **Core requirements** | Annual enterprise-wide cybersecurity evaluation; COIP; CAP |
339
+ | **Framework alignment** | Explicitly references NIST CSF 2.0 and CISA Cross-Sector CPGs |
340
+ | **Annual evaluation** | Compare entity's current profile vs target profile using NIST CSF |
341
+ | **Comment period** | Closed February 5, 2025 |
342
+ | **Final rule timeline** | Not yet published; directives remain in force until rule is finalised |
343
+
344
+ **CISA Cross-Sector CPGs**: TSA's NPRM aligns with CISA's Cybersecurity Performance Goals — a prioritised baseline of cybersecurity practices for critical infrastructure. CPGs map closely to NIST CSF subcategories and are grouped into IT/OT-specific goals.
345
+
346
+ ---
347
+
348
+ ## Reference Files
349
+
350
+ Load the appropriate reference file based on the task:
351
+
352
+ - `references/tsa-directives-overview.md` — All active directive series with revision history, covered sectors, and requirements summary
353
+ - `references/tsa-crmp-requirements.md` — Detailed CRMP component requirements: CIP/COIP, IRP, ADR, CAP, and the four technical domains with implementation guidance
354
+ - `references/tsa-incident-reporting.md` — Incident reporting procedures, CISA contact details, timelines, what qualifies as a reportable incident, and post-incident obligations
355
+
356
+ **When to load reference files:**
357
+ - Gap assessment or compliance review → load `tsa-directives-overview.md` + `tsa-crmp-requirements.md`
358
+ - Incident has occurred or user asks about reporting → load `tsa-incident-reporting.md`
359
+ - Architecture review or CIP/COIP drafting → load `tsa-crmp-requirements.md`
360
+ - User asks about which directive applies → load `tsa-directives-overview.md`
361
+ - NPRM or upcoming regulation questions → load `tsa-directives-overview.md`
362
+
363
+ ---
364
+
365
+ ## Disclaimer
366
+
367
+ Outputs from this skill provide informational guidance based on publicly available TSA Security Directive summaries, Federal Register notices, and DHS/CISA publications. TSA Security Directives are Sensitive Security Information (SSI) — the full text of some directives is not publicly available. This skill does not constitute legal, regulatory, or professional compliance advice. Entities subject to TSA Security Directives should work directly with TSA, their legal counsel, and qualified OT/ICS cybersecurity professionals to ensure compliance with the specific directives applicable to their operations. Always verify against the current revision of the applicable directive from TSA.