bmad-plus 0.4.4 → 0.6.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +54 -0
- package/README.md +5 -3
- package/package.json +1 -1
- package/readme-international/README.de.md +2 -2
- package/readme-international/README.es.md +2 -2
- package/readme-international/README.fr.md +2 -2
- package/src/bmad-plus/module.yaml +76 -12
- package/src/bmad-plus/packs/pack-dev-studio/README.md +162 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/analyst-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/document-project.md +62 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/domain-research.md +96 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/market-research.md +96 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/prfaq.md +135 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/product-brief.md +81 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/tech-writer-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/technical-research.md +96 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/architect-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/create-architecture.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/create-epics-stories.md +93 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/generate-project-context.md +81 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/implementation-readiness.md +91 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-01-init.md +153 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-01b-continue.md +173 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-02-context.md +224 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-03-starter.md +329 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-04-decisions.md +318 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-05-patterns.md +359 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-06-structure.md +379 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-07-validation.md +361 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-08-complete.md +82 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/checkpoint-preview.md +68 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-01-gather-context.md +85 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-02-review.md +35 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-03-triage.md +49 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-04-present.md +132 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review.md +90 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/correct-course.md +301 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/create-story.md +429 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-story-checklist.md +80 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-story.md +485 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/investigate.md +194 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/qa-e2e-tests.md +176 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/quick-dev.md +111 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/retrospective.md +1512 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/sprint-planning.md +299 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/sprint-status.md +297 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/create-prd.md +30 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/create-ux-design.md +75 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/edit-prd.md +30 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/pm-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/prd.md +90 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/ux-designer-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/validate-prd.md +30 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/advanced-elicitation.md +142 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/adversarial-review.md +37 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/bmad-help.md +75 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/brainstorming.md +6 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/customize.md +111 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/distillator.md +177 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/edge-case-hunter.md +67 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/editorial-review-prose.md +86 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/editorial-review-structure.md +179 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/index-docs.md +66 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/party-mode.md +128 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/shard-doc.md +105 -0
- package/src/bmad-plus/packs/pack-dev-studio/dev-studio-orchestrator.md +120 -0
- package/src/bmad-plus/packs/pack-dev-studio/shared/architecture-decision-template.md +12 -0
- package/src/bmad-plus/packs/pack-dev-studio/shared/bwml-spec.md +328 -0
- package/src/bmad-plus/packs/pack-dev-studio/shared/module-help.csv +32 -0
- package/src/bmad-plus/packs/pack-dev-studio/upstream-sync.yaml +81 -0
- package/src/bmad-plus/packs/pack-shield/README.md +110 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
- package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
- package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
- package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
- package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
- package/tools/cli/commands/install.js +31 -9
- package/tools/cli/commands/update.js +4 -2
- package/tools/cli/i18n.js +50 -10
|
@@ -0,0 +1,277 @@
|
|
|
1
|
+
# NIST SP 800-53 Rev 5 — Baselines, Tailoring, and Overlays Reference
|
|
2
|
+
|
|
3
|
+
## SP 800-53B — Control Baselines
|
|
4
|
+
|
|
5
|
+
SP 800-53B (October 2020) is the companion publication that separates the control baselines from the main SP 800-53 catalog.
|
|
6
|
+
|
|
7
|
+
### Low Impact Baseline
|
|
8
|
+
|
|
9
|
+
**Used for:** Systems where the loss of confidentiality, integrity, or availability would have limited adverse effects.
|
|
10
|
+
|
|
11
|
+
**Examples:** Public-facing websites, internal collaboration tools with non-sensitive data, reference databases.
|
|
12
|
+
|
|
13
|
+
**Approximate scope:** ~156 controls and enhancements across 20 families (not counting PM family).
|
|
14
|
+
|
|
15
|
+
**Key characteristics:**
|
|
16
|
+
- Policy and procedure controls required for every family
|
|
17
|
+
- Basic access controls (AC-2 account management, AC-3 enforcement, AC-7 logon limits)
|
|
18
|
+
- Fundamental audit logging (AU-2 through AU-12)
|
|
19
|
+
- MFA required for privileged accounts (IA-2(1)) — extended post-EO 14028
|
|
20
|
+
- Basic boundary protection (SC-7) without detailed enhancement requirements
|
|
21
|
+
- Incident response plan (IR-8), incident reporting (IR-6)
|
|
22
|
+
- Vulnerability scanning (RA-5) — frequency defined by ODV
|
|
23
|
+
|
|
24
|
+
### Moderate Impact Baseline
|
|
25
|
+
|
|
26
|
+
**Used for:** Systems where a security breach could have serious adverse effects on organizational operations, assets, or individuals.
|
|
27
|
+
|
|
28
|
+
**Examples:** HR systems with PII, financial management systems, internal collaboration with sensitive data, most federal agency systems.
|
|
29
|
+
|
|
30
|
+
**Approximate scope:** ~323 controls and enhancements across 20 families.
|
|
31
|
+
|
|
32
|
+
**Key additions over Low:**
|
|
33
|
+
- Automated account management (AC-2(1)), inactivity controls (AC-2(3)(5))
|
|
34
|
+
- Information flow enforcement (AC-4), separation of duties (AC-5)
|
|
35
|
+
- Least privilege requirements (AC-6 through AC-6(10))
|
|
36
|
+
- SIEM integration for audit (AU-6(1))
|
|
37
|
+
- Independent assessors (CA-2(1))
|
|
38
|
+
- Continuous monitoring with defined frequencies (CA-7)
|
|
39
|
+
- Configuration change control (CM-3), baseline automation (CM-2(2))
|
|
40
|
+
- Alternate storage and processing sites (CP-6, CP-7)
|
|
41
|
+
- Device and non-org user authentication (IA-3, IA-8)
|
|
42
|
+
- PKI/PIV support (IA-2(12), IA-5(2))
|
|
43
|
+
- Incident response testing (IR-3)
|
|
44
|
+
- Developer security testing (SA-11), configuration management (SA-10)
|
|
45
|
+
- Transmission protection (SC-8(1) — TLS required)
|
|
46
|
+
- Encryption at rest (SC-28(1))
|
|
47
|
+
- Software integrity verification (SI-7(1))
|
|
48
|
+
- Supply chain plan and controls (SR-2, SR-3, SR-5 through SR-8, SR-11, SR-12)
|
|
49
|
+
|
|
50
|
+
### High Impact Baseline
|
|
51
|
+
|
|
52
|
+
**Used for:** Systems where a breach could have severe or catastrophic effects on national security, safety of human life, or major financial damage.
|
|
53
|
+
|
|
54
|
+
**Examples:** National security systems, financial systems holding critical data, emergency services, election systems.
|
|
55
|
+
|
|
56
|
+
**Approximate scope:** ~422 controls and enhancements across 20 families.
|
|
57
|
+
|
|
58
|
+
**Key additions over Moderate:**
|
|
59
|
+
- Account monitoring for atypical usage (AC-2(12))
|
|
60
|
+
- Penetration testing (CA-8)
|
|
61
|
+
- Insider threat program integration (AT-2(2) at org level; PM-12)
|
|
62
|
+
- Threat hunting (RA-10)
|
|
63
|
+
- Non-repudiation (AU-10)
|
|
64
|
+
- Session audit (AU-14)
|
|
65
|
+
- Supply chain team, tamper resistance, counterfeit prevention (SR-2(1), SR-6(1), SR-9 through SR-11(1))
|
|
66
|
+
- Developer architecture review (SA-17)
|
|
67
|
+
- All SI family controls including function verification (SI-6)
|
|
68
|
+
- Enhanced cryptographic protections
|
|
69
|
+
|
|
70
|
+
---
|
|
71
|
+
|
|
72
|
+
## Control Baselines by Family — Quick Reference
|
|
73
|
+
|
|
74
|
+
| Family | L Controls | M Controls | H Controls |
|
|
75
|
+
|--------|-----------|-----------|-----------|
|
|
76
|
+
| AC | 8 | 18 | 20 |
|
|
77
|
+
| AT | 4 | 5 | 6 |
|
|
78
|
+
| AU | 10 | 14 | 15 |
|
|
79
|
+
| CA | 6 | 8 | 9 |
|
|
80
|
+
| CM | 8 | 14 | 14 |
|
|
81
|
+
| CP | 7 | 12 | 13 |
|
|
82
|
+
| IA | 8 | 12 | 14 |
|
|
83
|
+
| IR | 7 | 9 | 10 |
|
|
84
|
+
| MA | 3 | 6 | 6 |
|
|
85
|
+
| MP | 3 | 6 | 7 |
|
|
86
|
+
| PE | 11 | 15 | 18 |
|
|
87
|
+
| PL | 4 | 6 | 7 |
|
|
88
|
+
| PS | 8 | 9 | 9 |
|
|
89
|
+
| PT | varies | varies | varies |
|
|
90
|
+
| RA | 5 | 8 | 9 |
|
|
91
|
+
| SA | 7 | 16 | 17 |
|
|
92
|
+
| SC | 14 | 24 | 29 |
|
|
93
|
+
| SI | 9 | 17 | 19 |
|
|
94
|
+
| SR | 1 | 9 | 12 |
|
|
95
|
+
| PM | org-wide | org-wide | org-wide |
|
|
96
|
+
|
|
97
|
+
---
|
|
98
|
+
|
|
99
|
+
## Tailoring Process (SP 800-53B Section 2)
|
|
100
|
+
|
|
101
|
+
Tailoring produces a system-specific set of controls from the starting baseline. Document all tailoring decisions in the SSP.
|
|
102
|
+
|
|
103
|
+
### Tailoring Step 1 — Identify Common Controls
|
|
104
|
+
|
|
105
|
+
**Common controls** (also called "inherited controls") are implemented at the organization or facility level and inherited by multiple systems:
|
|
106
|
+
|
|
107
|
+
| Example | Control | Implemented By |
|
|
108
|
+
|---------|---------|---------------|
|
|
109
|
+
| Enterprise firewall | SC-7 | Network Operations |
|
|
110
|
+
| Badge access system | PE-3 | Facilities |
|
|
111
|
+
| Enterprise AV solution | SI-3 | IT Security |
|
|
112
|
+
| Security awareness training | AT-2 | ISSO / HR |
|
|
113
|
+
| Physical data center security | PE-2, PE-13 | Data Center Ops |
|
|
114
|
+
|
|
115
|
+
**Designation types:**
|
|
116
|
+
- **Common:** Fully inherited from another system/organization
|
|
117
|
+
- **System-specific:** Implemented entirely by the system
|
|
118
|
+
- **Hybrid:** Partially inherited, partially system-specific
|
|
119
|
+
|
|
120
|
+
Document in SSP Section: Common Control Inheritance table.
|
|
121
|
+
|
|
122
|
+
### Tailoring Step 2 — Apply Scoping Considerations
|
|
123
|
+
|
|
124
|
+
Remove controls that are not applicable based on:
|
|
125
|
+
|
|
126
|
+
| Scoping Consideration | Example |
|
|
127
|
+
|----------------------|---------|
|
|
128
|
+
| Technology not present | MA-4 (remote maintenance) if system has no remote maintenance capability |
|
|
129
|
+
| Physical location | PE-3 not applicable for cloud-hosted system (inherited from CSP) |
|
|
130
|
+
| Mission/operational need | AC-18 (wireless) not applicable for air-gapped system |
|
|
131
|
+
| Applicable laws/regulations | Some PT controls not applicable if no PII processed |
|
|
132
|
+
|
|
133
|
+
**Document every scoping decision** in the SSP with rationale. Regulators and auditors will scrutinize unjustified scoping.
|
|
134
|
+
|
|
135
|
+
### Tailoring Step 3 — Organization-Defined Values (ODVs)
|
|
136
|
+
|
|
137
|
+
Every control with brackets `[Assignment: ...]` requires an ODV. Failure to fill in ODVs is a common SSP finding.
|
|
138
|
+
|
|
139
|
+
**High-priority ODVs to define:**
|
|
140
|
+
|
|
141
|
+
| Control | Parameter | Federal Guidance | Example Value |
|
|
142
|
+
|---------|-----------|-----------------|---------------|
|
|
143
|
+
| AC-2(3) | Inactivity period before disable | OMB M-22-09: 90 days | 90 days |
|
|
144
|
+
| AC-7 | Max login attempts before lockout | NIST guidance: 3–5 | 3 attempts |
|
|
145
|
+
| AC-11 | Session inactivity before lock | OMB M-22-09: 15 minutes | 15 minutes |
|
|
146
|
+
| AU-11 | Audit log retention | NARA/OMB: 3 years minimum | 3 years |
|
|
147
|
+
| CA-7 | ConMon assessment frequency | FedRAMP: monthly/annually | Monthly for controls; annually for pen test |
|
|
148
|
+
| IA-5(1)(a) | Minimum password length | NIST SP 800-63B: 8+; typical federal: 15+ | 15 characters |
|
|
149
|
+
| IA-5(1)(h) | Password complexity | NIST SP 800-63B: no complexity requirements (memorized secrets) | No composition rules |
|
|
150
|
+
| RA-5 | Vulnerability scan frequency | CISA BOD 19-02; FedRAMP: monthly OS, weekly DB | Monthly OS scans |
|
|
151
|
+
| SI-2 | Patch critical vulns within | CISA BOD 19-02: 15 days Critical | 15 days critical; 30 days high |
|
|
152
|
+
|
|
153
|
+
### Tailoring Step 4 — Compensating Controls
|
|
154
|
+
|
|
155
|
+
A **compensating control** provides equivalent security when the baseline control cannot be implemented as written:
|
|
156
|
+
|
|
157
|
+
**Requirements for compensating controls:**
|
|
158
|
+
1. Must be as effective as the original control
|
|
159
|
+
2. Must be documented with rationale
|
|
160
|
+
3. Must not create additional risk
|
|
161
|
+
4. Must be assessed as part of the authorization
|
|
162
|
+
5. Must be reviewed at each authorization renewal
|
|
163
|
+
|
|
164
|
+
**Example:** If a legacy system cannot implement IA-2(1) (MFA for privileged accounts), a compensating control could be: enhanced privileged access monitoring (AC-2(12)) + strict IP allowlisting + privileged access workstations + session recording.
|
|
165
|
+
|
|
166
|
+
### Tailoring Step 5 — Supplementing the Baseline
|
|
167
|
+
|
|
168
|
+
Add controls beyond the baseline when:
|
|
169
|
+
- Risk assessment identifies elevated threats
|
|
170
|
+
- Agency or system-specific security requirements demand it
|
|
171
|
+
- Laws, regulations, or policies require additional protections
|
|
172
|
+
- System processes highly sensitive data not reflected in impact level
|
|
173
|
+
|
|
174
|
+
---
|
|
175
|
+
|
|
176
|
+
## Overlays
|
|
177
|
+
|
|
178
|
+
### What is an Overlay?
|
|
179
|
+
|
|
180
|
+
An overlay is a pre-tailored baseline for a specific community of interest, technology type, or operating environment. Overlays save time and promote consistency — organizations apply the overlay instead of performing baseline tailoring from scratch.
|
|
181
|
+
|
|
182
|
+
### FedRAMP Overlay
|
|
183
|
+
|
|
184
|
+
**Scope:** Cloud services offered to federal agencies.
|
|
185
|
+
|
|
186
|
+
Key FedRAMP additions to SP 800-53 Moderate baseline:
|
|
187
|
+
- Specific ODV values (e.g., AU-11: 1 year; RA-5: monthly for all vulnerability types)
|
|
188
|
+
- FedRAMP-specific controls (e.g., FedRAMP-specific ConMon requirements)
|
|
189
|
+
- Required 3PAO (Third Party Assessment Organization) for independent assessment
|
|
190
|
+
- Continuous monitoring reporting: monthly vulnerability reports, annual pen test, POA&M updates
|
|
191
|
+
- JAB (Joint Authorization Board) authorization for P-ATO vs. Agency ATO path
|
|
192
|
+
|
|
193
|
+
### DoD/CNSS Overlay (CNSS Instruction 1253)
|
|
194
|
+
|
|
195
|
+
**Scope:** National Security Systems (NSS) — classified or intelligence systems.
|
|
196
|
+
|
|
197
|
+
Key additions:
|
|
198
|
+
- Higher baseline requirements for NSS systems
|
|
199
|
+
- CNSS-specific control parameters
|
|
200
|
+
- Applies to systems handling Classified National Security Information (CNSI)
|
|
201
|
+
- Coordination with Intelligence Community Directive (ICD) 503
|
|
202
|
+
|
|
203
|
+
### Privacy Overlay
|
|
204
|
+
|
|
205
|
+
**Scope:** Systems processing PII at scale.
|
|
206
|
+
|
|
207
|
+
- All 8 PT family controls required
|
|
208
|
+
- Enhanced PM privacy controls (PM-18 through PM-27)
|
|
209
|
+
- Privacy Impact Assessments (PTA/PIA) required
|
|
210
|
+
- SORN required for Privacy Act systems
|
|
211
|
+
- Data minimization and retention requirements
|
|
212
|
+
|
|
213
|
+
### ICS/SCADA Overlay
|
|
214
|
+
|
|
215
|
+
**Scope:** Industrial Control Systems, SCADA, Operational Technology.
|
|
216
|
+
|
|
217
|
+
Reference: **NIST SP 800-82 Rev 3** — Guide to OT Security.
|
|
218
|
+
- Availability prioritized over confidentiality
|
|
219
|
+
- Real-time processing constraints affect control applicability
|
|
220
|
+
- Legacy system accommodations
|
|
221
|
+
- Safety system isolation requirements
|
|
222
|
+
- Physical process monitoring integration
|
|
223
|
+
|
|
224
|
+
---
|
|
225
|
+
|
|
226
|
+
## Privacy Baseline (PT Family) — Detailed
|
|
227
|
+
|
|
228
|
+
### Privacy Act Connection
|
|
229
|
+
|
|
230
|
+
The **Privacy Act of 1974 (5 U.S.C. § 552a)** applies to federal agencies' systems of records (SOR). SP 800-53 PT controls implement Privacy Act requirements:
|
|
231
|
+
|
|
232
|
+
| PT Control | Privacy Act Requirement |
|
|
233
|
+
|-----------|------------------------|
|
|
234
|
+
| PT-5 | Privacy Act notice at collection |
|
|
235
|
+
| PT-6 | System of Records Notice (SORN) published in Federal Register |
|
|
236
|
+
| PT-8 | Computer matching agreements |
|
|
237
|
+
|
|
238
|
+
### Privacy Impact Assessment (PIA)
|
|
239
|
+
|
|
240
|
+
Required by the **E-Government Act of 2002** for new or substantially modified IT systems collecting PII:
|
|
241
|
+
- Document what PII is collected and why
|
|
242
|
+
- How PII is used, secured, and shared
|
|
243
|
+
- Access controls and retention
|
|
244
|
+
- Published on agency website (unless classified)
|
|
245
|
+
|
|
246
|
+
Related controls: PL-2 (SSP includes privacy requirements), RA-3 (privacy risk assessment).
|
|
247
|
+
|
|
248
|
+
---
|
|
249
|
+
|
|
250
|
+
## Supply Chain Risk Management (SR Family) — Details
|
|
251
|
+
|
|
252
|
+
### SCRM Plan (SR-2)
|
|
253
|
+
|
|
254
|
+
Document organization's SCRM approach:
|
|
255
|
+
- Component criticality (SR-4 provenance)
|
|
256
|
+
- Supplier risk criteria and assessment process (SR-6)
|
|
257
|
+
- Acquisition requirements (SR-5)
|
|
258
|
+
- Component authenticity verification (SR-11)
|
|
259
|
+
- Notification agreements with suppliers (SR-8)
|
|
260
|
+
|
|
261
|
+
### SBOM (Software Bill of Materials)
|
|
262
|
+
|
|
263
|
+
EO 14028 and CISA requirements have increased SBOM expectations. SBOMs support:
|
|
264
|
+
- SR-4 (Provenance) — knowing where software components came from
|
|
265
|
+
- SR-11 (Component Authenticity) — verifying software integrity
|
|
266
|
+
- SA-4 (Acquisition) — requiring SBOM in contracts
|
|
267
|
+
|
|
268
|
+
**SBOM minimum data fields (NTIA):**
|
|
269
|
+
- Supplier name, component name, version, unique identifiers, dependencies, author, timestamp
|
|
270
|
+
|
|
271
|
+
### Supplier Assessment (SR-6)
|
|
272
|
+
|
|
273
|
+
For critical suppliers:
|
|
274
|
+
- Annual assessments via questionnaire, audit, or site visit
|
|
275
|
+
- Review certifications (ISO 27001, SOC 2 Type 2, FedRAMP)
|
|
276
|
+
- Contractual security requirements (SA-4, SA-9)
|
|
277
|
+
- Incident notification agreements (SR-8)
|