bmad-plus 0.4.4 → 0.6.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (197) hide show
  1. package/CHANGELOG.md +54 -0
  2. package/README.md +5 -3
  3. package/package.json +1 -1
  4. package/readme-international/README.de.md +2 -2
  5. package/readme-international/README.es.md +2 -2
  6. package/readme-international/README.fr.md +2 -2
  7. package/src/bmad-plus/module.yaml +76 -12
  8. package/src/bmad-plus/packs/pack-dev-studio/README.md +162 -0
  9. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/analyst-agent.md +74 -0
  10. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/document-project.md +62 -0
  11. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/domain-research.md +96 -0
  12. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/market-research.md +96 -0
  13. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/prfaq.md +135 -0
  14. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/product-brief.md +81 -0
  15. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/tech-writer-agent.md +74 -0
  16. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/technical-research.md +96 -0
  17. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/architect-agent.md +74 -0
  18. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/create-architecture.md +74 -0
  19. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/create-epics-stories.md +93 -0
  20. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/generate-project-context.md +81 -0
  21. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/implementation-readiness.md +91 -0
  22. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-01-init.md +153 -0
  23. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-01b-continue.md +173 -0
  24. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-02-context.md +224 -0
  25. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-03-starter.md +329 -0
  26. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-04-decisions.md +318 -0
  27. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-05-patterns.md +359 -0
  28. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-06-structure.md +379 -0
  29. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-07-validation.md +361 -0
  30. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-08-complete.md +82 -0
  31. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/checkpoint-preview.md +68 -0
  32. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-01-gather-context.md +85 -0
  33. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-02-review.md +35 -0
  34. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-03-triage.md +49 -0
  35. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-04-present.md +132 -0
  36. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review.md +90 -0
  37. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/correct-course.md +301 -0
  38. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/create-story.md +429 -0
  39. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-agent.md +74 -0
  40. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-story-checklist.md +80 -0
  41. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-story.md +485 -0
  42. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/investigate.md +194 -0
  43. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/qa-e2e-tests.md +176 -0
  44. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/quick-dev.md +111 -0
  45. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/retrospective.md +1512 -0
  46. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/sprint-planning.md +299 -0
  47. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/sprint-status.md +297 -0
  48. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/create-prd.md +30 -0
  49. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/create-ux-design.md +75 -0
  50. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/edit-prd.md +30 -0
  51. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/pm-agent.md +74 -0
  52. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/prd.md +90 -0
  53. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/ux-designer-agent.md +74 -0
  54. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/validate-prd.md +30 -0
  55. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/advanced-elicitation.md +142 -0
  56. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/adversarial-review.md +37 -0
  57. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/bmad-help.md +75 -0
  58. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/brainstorming.md +6 -0
  59. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/customize.md +111 -0
  60. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/distillator.md +177 -0
  61. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/edge-case-hunter.md +67 -0
  62. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/editorial-review-prose.md +86 -0
  63. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/editorial-review-structure.md +179 -0
  64. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/index-docs.md +66 -0
  65. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/party-mode.md +128 -0
  66. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/shard-doc.md +105 -0
  67. package/src/bmad-plus/packs/pack-dev-studio/dev-studio-orchestrator.md +120 -0
  68. package/src/bmad-plus/packs/pack-dev-studio/shared/architecture-decision-template.md +12 -0
  69. package/src/bmad-plus/packs/pack-dev-studio/shared/bwml-spec.md +328 -0
  70. package/src/bmad-plus/packs/pack-dev-studio/shared/module-help.csv +32 -0
  71. package/src/bmad-plus/packs/pack-dev-studio/upstream-sync.yaml +81 -0
  72. package/src/bmad-plus/packs/pack-shield/README.md +110 -0
  73. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
  74. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
  75. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
  76. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
  77. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
  78. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
  79. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
  80. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
  81. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
  82. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
  83. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
  84. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
  85. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
  86. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
  87. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
  88. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
  89. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
  90. package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
  91. package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
  92. package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
  93. package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
  94. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
  95. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
  96. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
  97. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
  98. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
  99. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
  100. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
  101. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
  102. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
  103. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
  104. package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
  105. package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
  106. package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
  107. package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
  108. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
  109. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
  110. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
  111. package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
  112. package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
  113. package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
  114. package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
  115. package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
  116. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
  117. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
  118. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
  119. package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
  120. package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
  121. package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
  122. package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
  123. package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
  124. package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
  125. package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
  126. package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
  127. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
  128. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
  129. package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
  130. package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
  131. package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
  132. package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
  133. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
  134. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
  135. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
  136. package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
  137. package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
  138. package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
  139. package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
  140. package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
  141. package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
  142. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
  143. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
  144. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
  145. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
  146. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
  147. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
  148. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
  149. package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
  150. package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
  151. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
  152. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
  153. package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
  154. package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
  155. package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
  156. package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
  157. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
  158. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
  159. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
  160. package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
  161. package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
  162. package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
  163. package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
  164. package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
  165. package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
  166. package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
  167. package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
  168. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
  169. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
  170. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
  171. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
  172. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
  173. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
  174. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
  175. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
  176. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
  177. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
  178. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
  179. package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
  180. package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
  181. package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
  182. package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
  183. package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
  184. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
  185. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
  186. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
  187. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
  188. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
  189. package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
  190. package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
  191. package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
  192. package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
  193. package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
  194. package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
  195. package/tools/cli/commands/install.js +31 -9
  196. package/tools/cli/commands/update.js +4 -2
  197. package/tools/cli/i18n.js +50 -10
@@ -0,0 +1,153 @@
1
+ # NIS2 Article 21 — Cybersecurity Risk Management Measures
2
+
3
+ Directive (EU) 2022/2555, Art. 21 requires essential and important entities to take "appropriate and proportionate technical, operational and organisational measures" to manage risks and protect network and information systems. Proportionality is assessed against the entity's size, exposure, and the severity of potential impact.
4
+
5
+ ---
6
+
7
+ ## Measure 1 — Risk Analysis & Information Security Policies
8
+
9
+ **Requirement:** Documented policies covering risk analysis methodology and information security governance.
10
+
11
+ **Implementation guidance:**
12
+ - Adopt a formal risk management methodology (ISO 27005, NIST RMF, or equivalent)
13
+ - Produce and maintain an asset inventory covering in-scope network and information systems
14
+ - Define risk acceptance criteria aligned to business impact
15
+ - Review risk assessments at least annually and after significant incidents or changes
16
+ - Ensure the management body approves the risk management policy (Art. 20 link)
17
+
18
+ ---
19
+
20
+ ## Measure 2 — Incident Handling
21
+
22
+ **Requirement:** Procedures for detection, analysis, containment, eradication, and recovery.
23
+
24
+ **Implementation guidance:**
25
+ - Maintain a written Incident Response Plan (IRP) covering all NIS2 significant incident scenarios
26
+ - Define "significant incident" thresholds in line with Art. 23(3): substantial disruption to service delivery, financial loss to the entity, or material/non-material damage to other natural or legal persons
27
+ - Establish 24h/72h/1-month reporting workflows with pre-drafted notification templates for the national CSIRT or competent authority
28
+ - Conduct post-incident reviews; feed lessons learned back into risk assessment
29
+ - Test IRP at least annually via tabletop exercises or simulations
30
+
31
+ **Significant incident indicators (Art. 23(3)):**
32
+ - Service disruption affecting a significant number of users
33
+ - Duration > a few hours for critical services
34
+ - Geographic spread affecting other Member States
35
+ - Reputational, financial, or safety impact
36
+
37
+ ---
38
+
39
+ ## Measure 3 — Business Continuity, Backup & Disaster Recovery
40
+
41
+ **Requirement:** Plans for service continuity, backup management, disaster recovery (DR), and crisis management during and after incidents.
42
+
43
+ **Implementation guidance:**
44
+ - Define Recovery Time Objective (RTO) and Recovery Point Objective (RPO) per critical service
45
+ - Implement automated, encrypted, offsite backups; test restoration quarterly
46
+ - Maintain DR runbooks and infrastructure failover playbooks
47
+ - Define a crisis management structure with clear roles, decision authorities, and escalation paths
48
+ - Test BCP/DR at least annually; involve management body in crisis management exercises
49
+
50
+ ---
51
+
52
+ ## Measure 4 — Supply Chain Security
53
+
54
+ **Requirement:** Address security in supply chain relationships, including between entities and their direct suppliers and service providers.
55
+
56
+ **Implementation guidance:**
57
+ - Maintain a register of critical ICT suppliers and third-party service providers
58
+ - Perform pre-onboarding security assessments (questionnaires, certifications, audits)
59
+ - Include NIS2/security requirements as contractual obligations (right-to-audit, incident notification SLAs, minimum security baselines)
60
+ - Assess supply chain risks as part of the annual risk assessment
61
+ - Monitor ENISA and national authority supply chain risk assessments (Art. 26 coordinated risk assessments)
62
+ - Apply enhanced due diligence to high-risk ICT vendors identified by Member States
63
+
64
+ ---
65
+
66
+ ## Measure 5 — Secure Acquisition, Development & Maintenance
67
+
68
+ **Requirement:** Security in the acquisition, development, and maintenance of network and information systems, including vulnerability handling and disclosure.
69
+
70
+ **Implementation guidance:**
71
+ - Apply Secure SDLC practices: threat modelling, code review, SAST/DAST, penetration testing
72
+ - Establish a vulnerability management programme with defined SLAs for patching by severity (e.g., critical ≤ 7 days, high ≤ 30 days)
73
+ - Maintain a coordinated vulnerability disclosure (CVD) policy (aligned with ENISA CVD guidelines)
74
+ - Track CVEs relevant to in-scope systems using threat intelligence feeds
75
+ - Include security acceptance criteria in vendor contracts for purchased systems
76
+
77
+ ---
78
+
79
+ ## Measure 6 — Effectiveness Assessment
80
+
81
+ **Requirement:** Policies and procedures to assess the effectiveness of cybersecurity risk management measures.
82
+
83
+ **Implementation guidance:**
84
+ - Define KPIs/KRIs for each Art. 21 measure (e.g., mean time to detect, patch compliance rate, training completion rate)
85
+ - Conduct internal audits or management reviews at least annually
86
+ - Engage independent third-party assessors or penetration testers as appropriate
87
+ - Report effectiveness metrics to the management body
88
+ - Map findings to the risk register and trigger remediation plans
89
+
90
+ ---
91
+
92
+ ## Measure 7 — Cyber Hygiene & Training
93
+
94
+ **Requirement:** Basic cyber hygiene practices and cybersecurity training for staff.
95
+
96
+ **Implementation guidance:**
97
+ - Deploy mandatory security awareness training for all staff at least annually
98
+ - Cover: phishing, social engineering, password hygiene, incident reporting, BYOD/remote working
99
+ - Provide role-based training for IT/OT administrators, incident responders, and the management body
100
+ - Management body must complete cybersecurity training specific to Art. 20 governance obligations
101
+ - Track completion rates; address gaps before audit cycles
102
+
103
+ ---
104
+
105
+ ## Measure 8 — Cryptography & Encryption
106
+
107
+ **Requirement:** Policies and procedures on the use of cryptography and, where appropriate, encryption.
108
+
109
+ **Implementation guidance:**
110
+ - Define approved cryptographic algorithms (AES-256 for data at rest, TLS 1.2+ for data in transit, SHA-256/SHA-384 for hashing)
111
+ - Establish a key management lifecycle: generation, storage (HSM recommended for critical keys), rotation, and destruction
112
+ - Require encryption of sensitive data stored in cloud environments and on portable media
113
+ - Review cryptographic standards annually given evolving threats (e.g., post-quantum readiness)
114
+ - Document exceptions and compensating controls where encryption is not feasible
115
+
116
+ ---
117
+
118
+ ## Measure 9 — Human Resources Security, Access Control & Asset Management
119
+
120
+ **Requirement:** HR security, access control policies and asset management.
121
+
122
+ **Implementation guidance:**
123
+ - Apply least-privilege and need-to-know principles for system access
124
+ - Implement role-based access control (RBAC); review permissions quarterly
125
+ - Conduct background screening for roles with privileged access (subject to applicable employment law)
126
+ - Maintain an authoritative asset inventory (hardware, software, data assets)
127
+ - Enforce joiners/movers/leavers process with same-day revocation for leavers
128
+ - Apply identity lifecycle management; disable dormant accounts after 30–90 days inactivity
129
+
130
+ ---
131
+
132
+ ## Measure 10 — MFA, Secure Communications & Emergency Systems
133
+
134
+ **Requirement:** Use of multi-factor authentication (MFA) or continuous authentication solutions, secured voice, video, and text communications, and secured emergency communication systems.
135
+
136
+ **Implementation guidance:**
137
+ - Require MFA for all remote access, privileged accounts, and cloud management consoles
138
+ - Apply phishing-resistant MFA (FIDO2/hardware tokens) for highest-privilege accounts
139
+ - Enforce MFA for email access, VPN, and SaaS platforms holding sensitive data
140
+ - Use end-to-end encrypted channels for sensitive internal communications (e.g., incident coordination)
141
+ - Maintain a separate, documented emergency communication plan with out-of-band channels in case primary systems are compromised
142
+
143
+ ---
144
+
145
+ ## Proportionality Principle
146
+
147
+ Art. 21(1) requires measures to be "appropriate and proportionate" taking into account:
148
+ - The entity's exposure to risks
149
+ - The entity's size
150
+ - The likelihood and severity of incidents including societal and economic impact
151
+ - The cost of implementation
152
+
153
+ Essential Entities face more rigorous supervisory scrutiny (Art. 32 proactive) and should apply controls at the higher end of the proportionality spectrum. Important Entities are subject to reactive supervision (Art. 33) but face the same 10-measure obligations.
@@ -0,0 +1,68 @@
1
+ # ISO 27001:2022 to NIS2 Art. 21 Cross-Reference
2
+
3
+ ISO/IEC 27001:2022 certification provides strong evidence of NIS2 compliance for many Art. 21 measures. However, ISO 27001 certification does NOT substitute NIS2 obligations — entities remain responsible for meeting Art. 21, Art. 20, and Art. 23 requirements directly.
4
+
5
+ Key gaps where NIS2 goes beyond ISO 27001:
6
+ - **Art. 21(2)(d)**: NIS2 explicitly mandates supply chain security obligations tied to ENISA coordinated risk assessments (Art. 26)
7
+ - **Art. 21(2)(j)**: NIS2 explicitly mandates MFA — ISO 27001 Annex A.8.5 covers authentication but MFA is not universally required
8
+ - **Art. 20**: Management body personal liability has no ISO 27001 equivalent
9
+ - **Art. 23**: Incident reporting timelines (24h/72h/1 month) are more prescriptive than ISO 27001's general incident management controls
10
+
11
+ ---
12
+
13
+ ## Mapping Table
14
+
15
+ | NIS2 Art. 21 Measure | NIS2 Requirement | ISO 27001:2022 Annex A Controls |
16
+ |---|---|---|
17
+ | **M1** Risk Analysis & Policies | Risk analysis methodology, IS policies | A.5.1 Policies; A.6.1 IS roles; A.8.8 Vuln mgmt; Clause 6.1 Risk assessment; Clause 8.2 IS risk assessment |
18
+ | **M2** Incident Handling | Detection, response, recovery procedures | A.5.24 IS incident planning; A.5.25 Assessment of IS events; A.5.26 Response; A.5.27 Post-incident review; A.5.28 Evidence collection |
19
+ | **M3** BCP / DR / Crisis | Backup, DR, crisis management | A.5.29 IS during disruption; A.5.30 ICT readiness; A.8.13 Backup; A.8.14 Redundancy |
20
+ | **M4** Supply Chain Security | Supplier/service-provider risk | A.5.19 IS in supplier relationships; A.5.20 Supplier agreements; A.5.21 ICT supply chain; A.5.22 Supplier monitoring; A.5.23 Cloud services |
21
+ | **M5** Secure Acquisition & Dev | SDLC security, vulnerability disclosure | A.8.25 Secure dev lifecycle; A.8.26 App security; A.8.27 Secure architecture; A.8.28 Secure coding; A.8.29 Testing; A.8.30 Outsourced dev; A.5.8 IS in PM |
22
+ | **M6** Effectiveness Assessment | KPIs, audits, management review | A.5.35 Independent IS review; A.5.36 Policy compliance; Clause 9.1 Monitoring; Clause 9.2 Internal audit; Clause 9.3 Management review |
23
+ | **M7** Cyber Hygiene & Training | Awareness and training | A.6.3 IS awareness/training; A.5.7 Threat intelligence; A.6.8 IS event reporting |
24
+ | **M8** Cryptography | Crypto policies, key management | A.8.24 Use of cryptography |
25
+ | **M9** HR, Access Control, Asset Mgmt | Least privilege, RBAC, asset inventory | A.5.9 Asset inventory; A.5.10 Asset use; A.5.11 Asset return; A.8.2 Privileged access; A.8.3 Access restriction; A.8.4 Source code; A.6.1 Screening; A.6.5 Responsibilities on termination |
26
+ | **M10** MFA & Secure Comms | MFA, phishing-resistant auth, encrypted comms | A.8.5 Secure authentication; A.8.20 Network security; A.8.26 App security; A.8.24 Cryptography |
27
+
28
+ ---
29
+
30
+ ## ISO 27001 Controls With No Direct NIS2 Measure Equivalent
31
+
32
+ The following ISO 27001:2022 Annex A controls are important for overall security posture but do not map to a specific Art. 21 measure. They may still be relevant for NIS2 governance and compliance evidence:
33
+
34
+ - **A.5.2** IS roles and responsibilities
35
+ - **A.5.31** Legal, statutory, regulatory, contractual requirements
36
+ - **A.5.32** Intellectual property rights
37
+ - **A.5.33** Protection of records
38
+ - **A.5.34** Privacy and PII protection (→ see also GDPR)
39
+ - **A.6.4** Disciplinary process
40
+ - **A.8.1** User endpoint devices
41
+ - **A.8.9** Configuration management
42
+ - **A.8.10** Information deletion
43
+
44
+ ---
45
+
46
+ ## NIS2 Requirements With Limited ISO 27001 Coverage
47
+
48
+ | NIS2 Requirement | Gap vs ISO 27001 | Recommended Action |
49
+ |---|---|---|
50
+ | Art. 20 — Management body approval and personal liability | No ISO 27001 equivalent | Board cybersecurity policy; training records; documented approval minutes |
51
+ | Art. 23 — 24h early warning | ISO 27001 A.5.24–5.26 cover incident management but not specific timelines | Pre-drafted CSIRT notification templates; automated alerting workflows |
52
+ | Art. 23 — 72h notification | Same as above | Incident triage runbooks with timeline checkpoints |
53
+ | Art. 23 — 1-month final report | Same as above | Post-incident review template with all Art. 23(4) required fields |
54
+ | Art. 26 — ENISA supply chain risk assessments | ISO 27001 A.5.19–5.23 cover supplier security generally | Monitor ENISA and national authority supply chain advisories; integrate into supplier risk register |
55
+ | Art. 21(2)(j) — MFA mandate | ISO 27001 A.8.5 covers authentication; MFA not universal | Deploy MFA for remote access, privileged accounts, cloud consoles as minimum |
56
+
57
+ ---
58
+
59
+ ## Practical Guidance for ISO 27001-Certified Entities
60
+
61
+ If your organisation holds ISO 27001:2022 certification, you are well-positioned for NIS2 but should:
62
+
63
+ 1. **Confirm entity classification** — verify whether you are an EE or IE under Art. 3 and your Member State's transposition law
64
+ 2. **Address Art. 20 governance** — document board-level approval of cybersecurity measures and ensure training records are maintained
65
+ 3. **Implement the Art. 23 reporting workflow** — your IRP likely needs an explicit NIS2 notification track with pre-drafted CSIRT templates and 24h/72h/1-month checkpoints
66
+ 4. **Review supply chain coverage** — map your supplier security controls to Art. 21(2)(d) and integrate ENISA coordinated risk assessment outputs
67
+ 5. **Mandate MFA** — if not already universal, deploy MFA for remote access and privileged accounts
68
+ 6. **Register with your national competent authority** — most Member States require in-scope entities to self-register
@@ -0,0 +1,349 @@
1
+ # NIST SP 800-53 — Assessment, RMF, ConMon, and Framework Mapping Reference
2
+
3
+ ## SP 800-53A Rev 5 — Assessment Procedures
4
+
5
+ ### Purpose
6
+
7
+ SP 800-53A Rev 5 (January 2022) provides **assessment procedures** for every control in SP 800-53 Rev 5. Each procedure specifies:
8
+
9
+ 1. **Objectives** — what the assessment must determine
10
+ 2. **Methods** — Examine, Interview, or Test
11
+ 3. **Objects** — what to examine/interview/test
12
+
13
+ ### The Three Assessment Methods
14
+
15
+ | Method | Description | Examples |
16
+ |--------|-------------|---------|
17
+ | **Examine** | Review artifacts and documentation | Policy documents, SSP, configuration files, system logs, architecture diagrams, audit records, training records |
18
+ | **Interview** | Discuss implementation with personnel | ISSO, system owner, help desk, IT administrators, end users, senior leaders |
19
+ | **Test** | Exercise mechanisms directly | Vulnerability scans, penetration tests, configuration checks, firewall rule reviews, backup restoration tests |
20
+
21
+ ### Assessment Depth
22
+
23
+ | Depth | Description | When Used |
24
+ |-------|-------------|----------|
25
+ | **Basic** | Check for existence of controls | Initial assessments; Low impact systems |
26
+ | **Focused** | Evaluate implementation | Most common approach |
27
+ | **Comprehensive** | Thorough, in-depth assessment | High impact systems; 3PAO assessments |
28
+
29
+ ### Security Assessment Report (SAR) Structure
30
+
31
+ The SAR documents assessment results:
32
+
33
+ 1. **Executive Summary** — High-level findings and authorization recommendation
34
+ 2. **Assessment Scope** — Systems, components, controls assessed
35
+ 3. **Assessment Methodology** — Methods used, depth, timeframe
36
+ 4. **Findings** — Control-by-control results
37
+ 5. **Weaknesses and Deficiencies** — OTS (Other Than Satisfied) findings
38
+ 6. **Risk Exposure** — Risk ratings for identified weaknesses
39
+ 7. **Recommendations** — Remediation actions
40
+
41
+ **Finding format:**
42
+ ```
43
+ Control: AC-2(3)
44
+ Objective: Determine if inactive accounts are disabled within the defined period.
45
+ Status: Other Than Satisfied
46
+ Finding: Audit of Active Directory accounts identified 47 accounts inactive for >120 days;
47
+ ODV is 90 days. Automated account review process is not functioning correctly.
48
+ Risk: Moderate — dormant accounts represent attack surface for credential-based attacks.
49
+ Recommendation: Fix automated review process; immediately disable the 47 identified accounts.
50
+ ```
51
+
52
+ ---
53
+
54
+ ## Plan of Action and Milestones (POA&M)
55
+
56
+ ### POA&M Purpose
57
+
58
+ The POA&M (CA-5) is a living document tracking all security weaknesses found during assessments, continuous monitoring, and self-assessment. Required for all federal systems.
59
+
60
+ ### POA&M Required Fields
61
+
62
+ | Field | Description |
63
+ |-------|-------------|
64
+ | POA&M ID | Unique identifier |
65
+ | Weakness/Deficiency | Description of the finding |
66
+ | Source | How discovered (scan, audit, assessment, pen test) |
67
+ | Control ID | Related SP 800-53 control |
68
+ | Risk Level | Critical / High / Moderate / Low |
69
+ | Scheduled Completion Date | When remediation will be complete |
70
+ | Milestone Description | Steps to remediate with dates |
71
+ | Resources Required | Staff, tools, budget |
72
+ | Status | Open / Completed / Delayed / Risk Accepted |
73
+
74
+ ### POA&M Timelines (FedRAMP Guidance)
75
+
76
+ | Risk Level | Remediation Deadline |
77
+ |-----------|---------------------|
78
+ | Critical | 30 days |
79
+ | High | 90 days |
80
+ | Moderate | 180 days |
81
+ | Low | 1 year |
82
+ | Operational Requirement | Risk accepted; ISSO/SO signature required |
83
+
84
+ ### Risk Acceptance
85
+
86
+ When a weakness cannot be remediated within the standard timeline:
87
+ - Document a **Risk Acceptance** with business justification
88
+ - ISSO and System Owner must sign off
89
+ - Authorizing Official (AO) may need to approve for High/Critical
90
+ - Review at each ConMon cycle
91
+ - Cannot be risk-accepted indefinitely for High/Critical findings
92
+
93
+ ---
94
+
95
+ ## Risk Management Framework (RMF) — SP 800-37 Rev 2
96
+
97
+ ### Step 1 — Prepare
98
+
99
+ **Purpose:** Establish the organizational and system context for managing security and privacy risk.
100
+
101
+ **Key tasks:**
102
+ - Assign roles: Authorizing Official (AO), System Owner (SO), ISSO, Senior Agency IS Official (SAISO)
103
+ - Develop or update organizational risk management strategy (PM-9)
104
+ - Identify common controls (PM-10)
105
+ - Conduct mission/business process analysis (PM-11)
106
+ - Perform organization-level risk assessment (RA-3)
107
+ - Establish information life cycle for the system
108
+
109
+ **Output:** Risk management roles assigned; organization-level risk assessment completed; common control inventory established.
110
+
111
+ ### Step 2 — Categorize
112
+
113
+ **Purpose:** Categorize the system and information processed, stored, and transmitted based on FIPS 199.
114
+
115
+ **Key tasks:**
116
+ - Describe the system (SSP Section 1 and 2)
117
+ - Identify information types using SP 800-60
118
+ - Determine impact levels for C, I, A
119
+ - Determine overall system impact level (high-water mark)
120
+ - Document in the Security Categorization document
121
+
122
+ **Output:** System Security Categorization document (signed by AO and SO).
123
+
124
+ ### Step 3 — Select
125
+
126
+ **Purpose:** Select, tailor, and document the controls for the system.
127
+
128
+ **Key tasks:**
129
+ - Select starting baseline from SP 800-53B (Low/Moderate/High)
130
+ - Apply tailoring (common controls, scoping, ODVs, compensating controls)
131
+ - Document all tailoring decisions in the SSP
132
+ - Develop continuous monitoring strategy (CA-7)
133
+ - Review and approve control selection (AO concurrence)
134
+
135
+ **Output:** SSP with control selection; ConMon strategy.
136
+
137
+ ### Step 4 — Implement
138
+
139
+ **Purpose:** Implement the controls and document how they are deployed in the operational environment.
140
+
141
+ **Key tasks:**
142
+ - Implement the selected controls
143
+ - Document implementation in SSP (one narrative per control)
144
+ - Document design and implementation information for developer controls (SA-4)
145
+ - Identify and address supply chain risks (SR family)
146
+
147
+ **Output:** Implemented controls; completed SSP implementation narratives.
148
+
149
+ ### Step 5 — Assess
150
+
151
+ **Purpose:** Determine if the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting security and privacy requirements.
152
+
153
+ **Key tasks:**
154
+ - Develop Security Assessment Plan (SAP) using SP 800-53A
155
+ - Select qualified assessors (independent for Moderate/High; 3PAO for FedRAMP)
156
+ - Conduct assessments (examine, interview, test)
157
+ - Document findings in SAR
158
+ - Develop initial POA&M from SAR findings
159
+
160
+ **Output:** SAP, SAR, initial POA&M.
161
+
162
+ **Independence requirements:**
163
+ - **Low systems:** Self-assessment permitted
164
+ - **Moderate systems:** Independent assessor (different team from implementers)
165
+ - **High systems / FedRAMP:** 3PAO required; must be accredited by A2LA/FedRAMP PMO
166
+
167
+ ### Step 6 — Authorize
168
+
169
+ **Purpose:** Provide organizational accountability by requiring a senior official to determine if the security and privacy risk to organizational operations/assets is acceptable.
170
+
171
+ **Authorization package contents:**
172
+ 1. System Security Plan (SSP)
173
+ 2. Security Assessment Report (SAR)
174
+ 3. Plan of Action and Milestones (POA&M)
175
+ 4. Executive Summary (for AO review)
176
+
177
+ **Authorization decisions:**
178
+ - **Authorization to Operate (ATO)** — risk is acceptable; typically granted for 3 years
179
+ - **Common Control Authorization (CCA)** — for common control providers
180
+ - **Denial of Authorization to Operate (DATO)** — risk is not acceptable; system must be shut down or remediated
181
+ - **Authorization to Use (ATU)** — for external systems/services
182
+
183
+ **Ongoing authorization:** Continuous authorization (preferred for Moderate/High) replaces periodic re-authorization with real-time risk management.
184
+
185
+ ### Step 7 — Monitor
186
+
187
+ **Purpose:** Maintain ongoing situational awareness about the security and privacy posture of the system.
188
+
189
+ **Key tasks:**
190
+ - Implement ConMon strategy (CA-7)
191
+ - Conduct ongoing assessments of selected controls
192
+ - Respond to changes in system and threat environment
193
+ - Report security status to AO
194
+ - Update SSP, SAR, POA&M as changes occur
195
+ - Conduct ongoing risk determination and acceptance
196
+
197
+ **FedRAMP ConMon requirements:**
198
+ - Monthly vulnerability scans (OS, databases, web apps)
199
+ - Annual penetration test (conducted by 3PAO)
200
+ - Monthly POA&M updates
201
+ - Significant change request before major system changes
202
+ - Annual security reviews
203
+
204
+ ---
205
+
206
+ ## Continuous Monitoring (ConMon) Strategy
207
+
208
+ ### ConMon Frequencies (SP 800-137 / CA-7)
209
+
210
+ | Activity | Recommended Frequency | FedRAMP Frequency |
211
+ |----------|----------------------|------------------|
212
+ | Vulnerability scans (OS) | Monthly | Monthly |
213
+ | Vulnerability scans (Web app) | Monthly | Monthly |
214
+ | Vulnerability scans (Database) | Monthly | Weekly |
215
+ | Control assessments (selected) | Ongoing/quarterly | Annually |
216
+ | Security awareness training | Annual | Annual |
217
+ | Contingency plan testing | Annual | Annual |
218
+ | Full control assessment | Every 3 years / at reauthorization | Annual (3PAO) |
219
+ | Penetration testing | Annual (Moderate+) | Annual (3PAO) |
220
+
221
+ ### ConMon Automation
222
+
223
+ Support tools for ConMon implementation:
224
+ - **SCAP (Security Content Automation Protocol)** — standardized vulnerability scanning
225
+ - **CVE/CVSS** — common vulnerability scoring
226
+ - **OVAL/XCCDF** — configuration checking
227
+ - **NVD (National Vulnerability Database)** — NIST vulnerability repository
228
+ - **CDM (Continuous Diagnostics and Mitigation)** — DHS/CISA program for federal agencies
229
+ - **OSCAL** — machine-readable security control documentation
230
+
231
+ ---
232
+
233
+ ## OSCAL — Open Security Controls Assessment Language
234
+
235
+ OSCAL (developed by NIST) provides machine-readable representations of SP 800-53 content:
236
+
237
+ ### OSCAL Layers
238
+
239
+ | Layer | Purpose | Formats |
240
+ |-------|---------|---------|
241
+ | **Catalog** | Control definitions (SP 800-53 catalog) | JSON, XML, YAML |
242
+ | **Profile** | Baseline selection and tailoring | JSON, XML, YAML |
243
+ | **Component Definition** | Reusable component implementations | JSON, XML, YAML |
244
+ | **System Security Plan** | SSP in machine-readable format | JSON, XML, YAML |
245
+ | **Assessment Plan** | SAP in machine-readable format | JSON, XML, YAML |
246
+ | **Assessment Results** | SAR findings in machine-readable format | JSON, XML, YAML |
247
+ | **POA&M** | Plan of action in machine-readable format | JSON, XML, YAML |
248
+
249
+ **FedRAMP OSCAL adoption:** FedRAMP has been moving toward OSCAL-based SSP submissions. Tools supporting OSCAL: Trestle (IBM), Xacta 360, Atlasity, Empower.
250
+
251
+ ---
252
+
253
+ ## Cross-Framework Mapping
254
+
255
+ ### SP 800-53 Rev 5 → ISO 27001:2022
256
+
257
+ | SP 800-53 Family | ISO 27001:2022 Annex A Controls |
258
+ |-----------------|-------------------------------|
259
+ | AC (Access Control) | 5.15–5.18 (Access, privilege), 8.2–8.5 |
260
+ | AT (Awareness & Training) | 6.3 (Security awareness) |
261
+ | AU (Audit) | 8.15 (Logging), 8.16 (Monitoring) |
262
+ | CA (Assessment) | 5.35 (IS review), 5.36 (Compliance) |
263
+ | CM (Config Mgmt) | 8.8–8.9 (Vulnerability, config), 8.32 |
264
+ | CP (Contingency) | 5.29 (BCP), 8.13 (Backup) |
265
+ | IA (Authentication) | 5.17 (Authentication), 8.5 (MFA) |
266
+ | IR (Incident Response) | 5.24–5.28 (Incident management) |
267
+ | PE (Physical) | 7.1–7.14 (Physical controls) |
268
+ | RA (Risk Assessment) | 5.1 (Risk treatment), 6.1 (Risk process) |
269
+ | SC (Comms Protection) | 5.14 (Transfer), 8.20–8.26 (Network) |
270
+ | SI (Integrity) | 8.7 (Malware), 8.8 (Vulnerability), 8.19 |
271
+ | SR (Supply Chain) | 5.19–5.22 (Supplier security) |
272
+
273
+ ### SP 800-53 Rev 5 → NIST CSF 2.0
274
+
275
+ The CSF 2.0 (February 2024) maps to SP 800-53:
276
+
277
+ | CSF Function | Key SP 800-53 Families |
278
+ |-------------|----------------------|
279
+ | **GV (Govern)** | PM, PL, AT, RA |
280
+ | **ID (Identify)** | RA, CA, CM, PM |
281
+ | **PR (Protect)** | AC, AT, CM, IA, MA, MP, PE, SC, SI, SR |
282
+ | **DE (Detect)** | AU, CA, IR, RA, SI |
283
+ | **RS (Respond)** | IR, CA |
284
+ | **RC (Recover)** | CP, IR |
285
+
286
+ Full mapping: SP 800-53B Appendix B provides CSF subcategory → SP 800-53 control mapping.
287
+
288
+ ### SP 800-53 Rev 5 → CMMC 2.0
289
+
290
+ CMMC 2.0 is based on **NIST SP 800-171 Rev 2**, which derives from SP 800-53:
291
+
292
+ | CMMC Level | SP 800-53 Basis |
293
+ |-----------|----------------|
294
+ | Level 1 (Foundational) | Subset of 800-171 practices (17 practices from FAR clause) |
295
+ | Level 2 (Advanced) | Full SP 800-171 Rev 2 (110 practices = ~320 SP 800-53 controls) |
296
+ | Level 3 (Expert) | SP 800-171 + selected SP 800-172 controls |
297
+
298
+ SP 800-171 Appendix D provides the mapping from each 800-171 requirement to the SP 800-53 source controls.
299
+
300
+ ### SP 800-53 Rev 5 → FedRAMP
301
+
302
+ FedRAMP uses the SP 800-53 Moderate or High baseline with overlay parameters:
303
+
304
+ | FedRAMP Difference | Detail |
305
+ |-------------------|--------|
306
+ | Specific ODV values | Defined in FedRAMP baseline documentation |
307
+ | Additional requirements | Incident reporting to US-CERT; 3PAO requirement |
308
+ | Cryptography | FIPS 140-2/140-3 validated modules explicitly required |
309
+ | ConMon | Specific monthly/annual frequencies required |
310
+ | SSP format | FedRAMP SSP template must be used |
311
+ | Authorization types | Agency ATO or JAB P-ATO |
312
+
313
+ ---
314
+
315
+ ## Key Roles in the RMF / SP 800-53 Context
316
+
317
+ | Role | Abbreviation | Responsibility |
318
+ |------|-------------|---------------|
319
+ | Authorizing Official | AO | Accepts risk; grants/denies ATO |
320
+ | Authorizing Official Designated Representative | AODR | Acts on behalf of AO |
321
+ | Chief Information Officer | CIO | Overall IT governance |
322
+ | Senior Agency Information Security Official | SAISO | Agency-wide IS oversight |
323
+ | Information System Security Officer | ISSO | Day-to-day security operations for system |
324
+ | Information System Security Manager | ISSM | Manages multiple ISSOs |
325
+ | System Owner | SO | Responsible for system operation |
326
+ | Common Control Provider | CCP | Implements shared/inherited controls |
327
+ | Security Control Assessor | SCA | Conducts independent assessment |
328
+ | Privacy Officer / CPO | CPO | Privacy program lead |
329
+
330
+ ---
331
+
332
+ ## Key NIST Publications Related to SP 800-53
333
+
334
+ | Publication | Title | Role |
335
+ |-------------|-------|------|
336
+ | SP 800-53 Rev 5 | Security and Privacy Controls | Main control catalog |
337
+ | SP 800-53A Rev 5 | Assessing Security and Privacy Controls | Assessment procedures |
338
+ | SP 800-53B | Control Baselines | Baseline definitions |
339
+ | SP 800-37 Rev 2 | Risk Management Framework | RMF steps |
340
+ | SP 800-60 Vol I/II | Information Types / Impact Levels | Categorization guidance |
341
+ | SP 800-30 Rev 1 | Risk Assessment | Risk assessment methodology |
342
+ | SP 800-137A | ConMon | Continuous monitoring |
343
+ | SP 800-63 Rev 3 | Digital Identity | Authentication assurance |
344
+ | SP 800-82 Rev 3 | OT Security | ICS/SCADA guide |
345
+ | SP 800-88 Rev 1 | Media Sanitization | Media disposal |
346
+ | SP 800-115 | Security Testing | Penetration testing methodology |
347
+ | FIPS 199 | Security Categorization | Impact level determination |
348
+ | FIPS 200 | Minimum Security Requirements | Baseline requirement |
349
+ | FIPS 140-3 | Cryptographic Modules | Cryptography standard |