bmad-plus 0.4.4 → 0.6.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (197) hide show
  1. package/CHANGELOG.md +54 -0
  2. package/README.md +5 -3
  3. package/package.json +1 -1
  4. package/readme-international/README.de.md +2 -2
  5. package/readme-international/README.es.md +2 -2
  6. package/readme-international/README.fr.md +2 -2
  7. package/src/bmad-plus/module.yaml +76 -12
  8. package/src/bmad-plus/packs/pack-dev-studio/README.md +162 -0
  9. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/analyst-agent.md +74 -0
  10. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/document-project.md +62 -0
  11. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/domain-research.md +96 -0
  12. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/market-research.md +96 -0
  13. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/prfaq.md +135 -0
  14. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/product-brief.md +81 -0
  15. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/tech-writer-agent.md +74 -0
  16. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/technical-research.md +96 -0
  17. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/architect-agent.md +74 -0
  18. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/create-architecture.md +74 -0
  19. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/create-epics-stories.md +93 -0
  20. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/generate-project-context.md +81 -0
  21. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/implementation-readiness.md +91 -0
  22. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-01-init.md +153 -0
  23. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-01b-continue.md +173 -0
  24. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-02-context.md +224 -0
  25. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-03-starter.md +329 -0
  26. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-04-decisions.md +318 -0
  27. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-05-patterns.md +359 -0
  28. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-06-structure.md +379 -0
  29. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-07-validation.md +361 -0
  30. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-08-complete.md +82 -0
  31. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/checkpoint-preview.md +68 -0
  32. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-01-gather-context.md +85 -0
  33. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-02-review.md +35 -0
  34. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-03-triage.md +49 -0
  35. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-04-present.md +132 -0
  36. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review.md +90 -0
  37. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/correct-course.md +301 -0
  38. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/create-story.md +429 -0
  39. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-agent.md +74 -0
  40. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-story-checklist.md +80 -0
  41. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-story.md +485 -0
  42. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/investigate.md +194 -0
  43. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/qa-e2e-tests.md +176 -0
  44. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/quick-dev.md +111 -0
  45. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/retrospective.md +1512 -0
  46. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/sprint-planning.md +299 -0
  47. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/sprint-status.md +297 -0
  48. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/create-prd.md +30 -0
  49. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/create-ux-design.md +75 -0
  50. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/edit-prd.md +30 -0
  51. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/pm-agent.md +74 -0
  52. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/prd.md +90 -0
  53. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/ux-designer-agent.md +74 -0
  54. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/validate-prd.md +30 -0
  55. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/advanced-elicitation.md +142 -0
  56. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/adversarial-review.md +37 -0
  57. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/bmad-help.md +75 -0
  58. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/brainstorming.md +6 -0
  59. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/customize.md +111 -0
  60. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/distillator.md +177 -0
  61. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/edge-case-hunter.md +67 -0
  62. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/editorial-review-prose.md +86 -0
  63. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/editorial-review-structure.md +179 -0
  64. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/index-docs.md +66 -0
  65. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/party-mode.md +128 -0
  66. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/shard-doc.md +105 -0
  67. package/src/bmad-plus/packs/pack-dev-studio/dev-studio-orchestrator.md +120 -0
  68. package/src/bmad-plus/packs/pack-dev-studio/shared/architecture-decision-template.md +12 -0
  69. package/src/bmad-plus/packs/pack-dev-studio/shared/bwml-spec.md +328 -0
  70. package/src/bmad-plus/packs/pack-dev-studio/shared/module-help.csv +32 -0
  71. package/src/bmad-plus/packs/pack-dev-studio/upstream-sync.yaml +81 -0
  72. package/src/bmad-plus/packs/pack-shield/README.md +110 -0
  73. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
  74. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
  75. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
  76. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
  77. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
  78. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
  79. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
  80. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
  81. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
  82. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
  83. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
  84. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
  85. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
  86. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
  87. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
  88. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
  89. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
  90. package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
  91. package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
  92. package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
  93. package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
  94. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
  95. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
  96. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
  97. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
  98. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
  99. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
  100. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
  101. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
  102. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
  103. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
  104. package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
  105. package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
  106. package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
  107. package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
  108. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
  109. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
  110. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
  111. package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
  112. package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
  113. package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
  114. package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
  115. package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
  116. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
  117. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
  118. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
  119. package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
  120. package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
  121. package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
  122. package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
  123. package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
  124. package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
  125. package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
  126. package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
  127. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
  128. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
  129. package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
  130. package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
  131. package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
  132. package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
  133. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
  134. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
  135. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
  136. package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
  137. package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
  138. package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
  139. package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
  140. package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
  141. package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
  142. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
  143. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
  144. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
  145. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
  146. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
  147. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
  148. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
  149. package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
  150. package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
  151. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
  152. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
  153. package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
  154. package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
  155. package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
  156. package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
  157. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
  158. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
  159. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
  160. package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
  161. package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
  162. package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
  163. package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
  164. package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
  165. package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
  166. package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
  167. package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
  168. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
  169. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
  170. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
  171. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
  172. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
  173. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
  174. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
  175. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
  176. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
  177. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
  178. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
  179. package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
  180. package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
  181. package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
  182. package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
  183. package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
  184. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
  185. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
  186. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
  187. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
  188. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
  189. package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
  190. package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
  191. package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
  192. package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
  193. package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
  194. package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
  195. package/tools/cli/commands/install.js +31 -9
  196. package/tools/cli/commands/update.js +4 -2
  197. package/tools/cli/i18n.js +50 -10
@@ -0,0 +1,190 @@
1
+ # PCI DSS v3.2.1 → v4.0 / v4.0.1 Change Guide
2
+
3
+ Source: PCI DSS Summary of Changes v3.2.1 to v4.0 (PCI SSC); PCI DSS v4.0.1 (June 2024)
4
+
5
+ ---
6
+
7
+ ## Version Timeline
8
+
9
+ | Version | Released | Status |
10
+ |---------|----------|--------|
11
+ | PCI DSS v3.2.1 | May 2018 | **Retired March 31, 2024** |
12
+ | PCI DSS v4.0 | March 2022 | Superseded by v4.0.1 |
13
+ | PCI DSS v4.0.1 | June 2024 | **Current** — minor errata update |
14
+
15
+ **Important milestones:**
16
+ - March 31, 2024: PCI DSS v3.2.1 retired — all assessments now use v4.0 or v4.0.1
17
+ - March 31, 2025: All "future-dated" requirements from PCI DSS v4.0 became **mandatory** (previously best practice)
18
+ - v4.0.1 corrects typographical errors and clarifications in v4.0; no new controls added
19
+
20
+ ---
21
+
22
+ ## Structural Changes
23
+
24
+ | Aspect | v3.2.1 | v4.0 / v4.0.1 |
25
+ |--------|--------|--------------|
26
+ | Compliance approach | Defined approach only | Added **Customised Approach** |
27
+ | Targeted Risk Analysis | Informal | **Formalised requirement** for flexible controls |
28
+ | Requirements structure | 12 requirements, 259 sub-requirements | 12 requirements, 300+ sub-requirements |
29
+ | Future-dated requirements | N/A | Requirements phased in by March 2025 |
30
+ | Informative references | Embedded | Moved to PCI SSC Reference Tool (online) |
31
+ | Focus | Prescriptive controls | Outcomes-focused (especially Customised Approach) |
32
+
33
+ ---
34
+
35
+ ## New Requirements in v4.0 (Mandatory from March 31, 2025)
36
+
37
+ These requirements were "future-dated" in v4.0 (published March 2022 as best practice) and became mandatory on **March 31, 2025**:
38
+
39
+ ### Requirement 3: Protect Stored Account Data
40
+ - **3.3.2**: SAD stored prior to authorisation is encrypted using strong cryptography (Applies to issuers and companies supporting issuing services only)
41
+ - **3.3.3**: Encryption keys for pre-authorisation SAD are managed per key management requirements
42
+
43
+ ### Requirement 4: Protect CHD During Transmission
44
+ - **4.2.1.1**: Inventory of trusted keys and certificates is maintained
45
+
46
+ ### Requirement 5: Anti-Malware
47
+ - **5.3.3**: Anti-malware solution performs scans of removable electronic media
48
+ - **5.4.1**: Automated technical solution to detect and protect against phishing attacks (**NEW concept**)
49
+
50
+ ### Requirement 6: Secure Development
51
+ - **6.3.2**: Software inventory (SBOM) maintained for bespoke and custom software
52
+ - **6.4.3**: All payment page scripts inventoried, authorised, and integrity protected (**NEW — critical for e-commerce**)
53
+
54
+ ### Requirement 7: Access Control
55
+ - **7.2.4**: User accounts and access privileges reviewed at minimum every 6 months
56
+ - **7.2.5**: Application/system accounts managed per policy
57
+ - **7.2.5.1**: Privileges of application/system accounts reviewed at least every 6 months
58
+ - **7.3.2**: Access control system configured to enforce least privilege
59
+
60
+ ### Requirement 8: Authentication
61
+ - **8.3.6**: Passwords/passphrases for users without MFA changed at least every 90 days
62
+ - **8.4.2**: MFA for all access into the CDE (**Extended scope — was only for remote access in v3.2.1**)
63
+ - **8.6.1**: System/application accounts that can be used interactively managed and protected
64
+ - **8.6.2**: Passwords/passphrases for system/application accounts not hardcoded in scripts or source code
65
+
66
+ ### Requirement 10: Logging
67
+ - **10.4.1.1**: Automated log review mechanisms used (**NEW — manual-only review no longer sufficient**)
68
+ - **10.7.2**: Failures of critical security controls detected, reported, and addressed promptly (**NEW**)
69
+ - **10.7.3**: Failures of critical security controls responded to within defined timeframes
70
+
71
+ ### Requirement 11: Security Testing
72
+ - **11.4.7**: Multi-tenant service providers support customers' requests for penetration testing
73
+ - **11.6.1**: Change and tamper detection mechanism for HTTP headers and scripts on payment pages deployed (**NEW — critical for web skimming prevention**)
74
+
75
+ ### Requirement 12: Policy and Programs
76
+ - **12.3.2**: Targeted risk analysis for each PCI DSS requirement that has a customised approach
77
+ - **12.3.3**: Cryptographic cipher suites and protocols reviewed at least every 12 months
78
+ - **12.3.4**: Hardware and software technologies reviewed at least every 12 months
79
+ - **12.5.2.1**: PCI DSS scope verified by multi-tenant service providers at minimum every 6 months
80
+ - **12.8.4**: TPSP compliance status monitored at least every 12 months
81
+ - **12.9.2**: TPSPs support customers' requests for confirmation of PCI DSS responsibility
82
+ - **12.10.4.1**: IR personnel training at minimum every 12 months
83
+ - **12.10.7**: IR procedures for discovery of stored PAN in unexpected location
84
+
85
+ ---
86
+
87
+ ## Key Conceptual Changes
88
+
89
+ ### 1. Customised Approach (Major v4.0 Innovation)
90
+ The Customised Approach allows organisations to implement alternative controls designed by the entity to achieve the stated **Objective** of a PCI DSS requirement, rather than following the prescriptive testing procedure.
91
+
92
+ **Requirements for Customised Approach:**
93
+ - A Targeted Risk Analysis (TRA) must be performed and documented for each customised control
94
+ - TRA must be approved by senior management
95
+ - Customised control must be assessed by a QSA using a Customised Approach Test Plan (CATP)
96
+ - Annual review and revalidation required
97
+ - Not available for SAQ A or SAQ B; typically used in ROC environments
98
+
99
+ **When to use**: When the defined approach does not fit the technology architecture (e.g., cloud-native, microservices, zero-trust) and the organisation can demonstrably achieve the security objective through alternative means.
100
+
101
+ ### 2. Expanded MFA Requirement (Req 8.4.2)
102
+ In v3.2.1, MFA was required for:
103
+ - All non-console administrative access to the CDE
104
+ - Remote access to the network from outside the entity's network
105
+
106
+ In v4.0, MFA is required for **ALL access into the CDE** — including access from within the internal network. This is the most impactful change for many organisations and a common gap.
107
+
108
+ **Practical impact**: If a user on the internal corporate LAN accesses a CDE system, MFA is now required. VPN + network segmentation alone is no longer sufficient.
109
+
110
+ ### 3. Payment Page Script Security (Req 6.4.3 and 11.6.1)
111
+ These requirements address **web skimming** (e.g., Magecart attacks) where malicious scripts are injected into payment pages to steal cardholder data.
112
+
113
+ **Req 6.4.3**: All scripts loaded and executed in the consumer's browser on a payment page must be:
114
+ - Inventoried with a method to confirm integrity
115
+ - Authorised by management — documented justification for each script
116
+ - Integrity protected — either using CSP (Content Security Policy), SRI (Sub-Resource Integrity), or equivalent
117
+
118
+ **Req 11.6.1**: A change and tamper detection mechanism must be deployed that:
119
+ - Alerts personnel to unauthorised modification of HTTP headers and content of payment pages
120
+ - Is assessed at minimum every 7 days (or frequency defined by targeted risk analysis)
121
+
122
+ ### 4. Phishing Protection (Req 5.4.1)
123
+ Organisations must now implement automated technical solutions to detect and protect users against phishing attacks. Acceptable solutions include:
124
+ - Email security gateways with anti-phishing/URL scanning
125
+ - DNS filtering solutions
126
+ - DMARC + DKIM + SPF email authentication
127
+ - Anti-phishing browser extensions managed by policy
128
+
129
+ ### 5. Targeted Risk Analysis (TRA)
130
+ The TRA is a formalised risk analysis process used to:
131
+ - Define controls for requirements with flexible frequencies (e.g., how often to review certain items)
132
+ - Justify Customised Approach implementations
133
+ - Document risk-based decisions
134
+
135
+ Required TRA elements: Risk description | Defined approach requirement | Reason for customisation | How the objective is achieved | Evidence of effectiveness | Management sign-off | Annual review date
136
+
137
+ ### 6. Automated Log Review (Req 10.4.1.1)
138
+ Manual daily log review is no longer sufficient. An automated mechanism (e.g., SIEM with alert rules, automated anomaly detection) must be in place. The automated system must alert on anomalous activity.
139
+
140
+ ---
141
+
142
+ ## Requirements Removed or Significantly Changed
143
+
144
+ | v3.2.1 Requirement | Change in v4.0 |
145
+ |-------------------|---------------|
146
+ | Req 6.3 (Application vulnerabilities) | Restructured into 6.3.1–6.5.6 |
147
+ | Req 10.6 (Log review) | Restructured into 10.4 with automated review added |
148
+ | Req 11.2 (Vulnerability scans) | Restructured; ASV scan requirements unchanged |
149
+ | Req 12.10 (IR plan) | Expanded with new sub-requirements |
150
+ | Business-as-usual (BAU) activities | Replaced by more specific ongoing compliance requirements |
151
+ | Appendix A2 (TLS migration) | Removed — TLS 1.0/1.1 migration deadline passed |
152
+ | Appendix A3 (Designated Entities) | Moved/updated |
153
+
154
+ ---
155
+
156
+ ## Migration Checklist: v3.2.1 → v4.0.1
157
+
158
+ **Governance and Policy (Req 12)**
159
+ - [ ] Establish a formal Targeted Risk Analysis (TRA) process and template (12.3.2)
160
+ - [ ] Conduct annual review of cryptographic cipher suites (12.3.3)
161
+ - [ ] Conduct annual hardware/software technology lifecycle review (12.3.4)
162
+ - [ ] Confirm TPSP compliance status annually — update TPSP register (12.8.4)
163
+ - [ ] Train IR personnel at minimum annually (12.10.4.1)
164
+ - [ ] Create IR procedure for unexpected PAN discovery (12.10.7)
165
+ - [ ] Verify PCI DSS scope at least every 12 months and after major changes (12.5.2)
166
+
167
+ **Authentication (Req 8)**
168
+ - [ ] Extend MFA to ALL access into the CDE — including internal network users (8.4.2)
169
+ - [ ] Update password policy: minimum 12 characters (8.3.5)
170
+ - [ ] Ensure no hardcoded passwords in scripts or source code (8.6.2)
171
+
172
+ **E-commerce and Web Application (Req 6, 11)**
173
+ - [ ] Create inventory of all payment page scripts with authorisation and integrity controls (6.4.3)
174
+ - [ ] Deploy change/tamper detection on HTTP headers and payment page content (11.6.1)
175
+ - [ ] Enable CSP/SRI headers or equivalent script integrity controls
176
+
177
+ **Anti-Malware and Phishing (Req 5)**
178
+ - [ ] Deploy automated anti-phishing technical solution (5.4.1): email gateway + SPF/DKIM/DMARC
179
+ - [ ] Add removable media scanning to anti-malware coverage (5.3.3)
180
+
181
+ **Logging (Req 10)**
182
+ - [ ] Implement automated log review mechanism (SIEM or equivalent) (10.4.1.1)
183
+ - [ ] Configure monitoring for critical security control failures (10.7.2)
184
+
185
+ **Access Control (Req 7, 8)**
186
+ - [ ] Implement 6-monthly access reviews for all accounts (7.2.4)
187
+ - [ ] Document and control all application/system account access (7.2.5)
188
+
189
+ **Software Inventory (Req 6)**
190
+ - [ ] Build and maintain Software Bill of Materials (SBOM) for bespoke software (6.3.2)
@@ -0,0 +1,160 @@
1
+ # Section 508 / WCAG 2.0 AA — Detailed Reference
2
+
3
+ ## Section 508 Provision Map
4
+
5
+ | 508 Provision | Scope | WCAG Equivalent |
6
+ |---------------|-------|-----------------|
7
+ | E205.2 | Web content | WCAG 2.0 Level A and AA |
8
+ | E205.3 | Electronic documents | WCAG 2.0 Level A and AA (as applicable) |
9
+ | E205.4 | Software (user interface) | WCAG 2.0 Level A and AA |
10
+ | E204 | Authoring tools | WCAG 2.0 Level A and AA |
11
+ | Chapter 3 | Functional Performance Criteria | Without visual, colour, hearing, speech, fine motor, cognitive limitations |
12
+ | Chapter 4 | Hardware | Physical ICT accessible controls, display, clearance |
13
+ | Chapter 6 | Support docs and services | Documentation and help in accessible formats |
14
+
15
+ ---
16
+
17
+ ## WCAG 2.0 Level A Success Criteria — Common Failures
18
+
19
+ ### 1.1.1 Non-text Content
20
+ - **Failure:** `<img>` missing `alt` attribute, or `alt=""` on informative image
21
+ - **Failure:** Icon buttons with no accessible name (`aria-label` or `aria-labelledby`)
22
+ - **Failure:** Charts and graphs with no text alternative describing data
23
+ - **Testing:** Automated (axe, WAVE) + manual screen reader review
24
+ - **Fix:** Add meaningful `alt` text; use `alt=""` only for decorative images; use `aria-label` on icon-only buttons
25
+
26
+ ### 1.3.1 Info and Relationships
27
+ - **Failure:** Visual headings not marked up with `<h1>`–`<h6>` (styled `<div>` or `<span>` used instead)
28
+ - **Failure:** Data tables with no `<th>` or `scope` attributes
29
+ - **Failure:** Form fields with visual label not programmatically associated (missing `<label for="">` or `aria-labelledby`)
30
+ - **Failure:** Required fields indicated only by colour or asterisk with no screen-reader-accessible text
31
+ - **Testing:** DOM inspection, NVDA/JAWS, automated (partial)
32
+ - **Fix:** Semantic HTML first; `aria-*` attributes only when semantic HTML insufficient
33
+
34
+ ### 2.1.1 Keyboard
35
+ - **Failure:** Custom dropdowns, date pickers, modal dialogs not operable by keyboard
36
+ - **Failure:** Mouse-only event handlers (`onclick` on non-interactive elements, `mouseover` without `focus` equivalent)
37
+ - **Failure:** Drag-and-drop with no keyboard alternative
38
+ - **Failure:** Keyboard trap in modal — Tab cycles only within modal but no way to close it
39
+ - **Testing:** Tab through entire page; activate all controls; open/close modals
40
+ - **Fix:** Use native HTML controls where possible; for custom widgets, implement ARIA keyboard patterns (ARIA Authoring Practices Guide)
41
+
42
+ ### 1.4.1 Use of Colour
43
+ - **Failure:** Form validation errors shown only by red border with no text or icon
44
+ - **Failure:** Required field indicator is colour-only (red asterisk with no "required" text)
45
+ - **Failure:** Link text colour is the only differentiator from surrounding body text (no underline or other visual cue)
46
+
47
+ ### 4.1.2 Name, Role, Value
48
+ - **Failure:** Custom checkboxes/radio buttons styled with CSS, no ARIA role or checked state
49
+ - **Failure:** Tab panels with no `role="tab"`, `role="tablist"`, `aria-selected`
50
+ - **Failure:** Toggle buttons with no `aria-pressed` attribute
51
+ - **Failure:** Expanded/collapsed accordions with no `aria-expanded`
52
+ - **Testing:** Inspect ARIA properties in browser accessibility tree; test with NVDA/JAWS
53
+ - **Fix:** Follow WAI-ARIA Authoring Practices Guide patterns for each widget type
54
+
55
+ ---
56
+
57
+ ## WCAG 2.0 Level AA Success Criteria — Common Failures
58
+
59
+ ### 1.4.3 Contrast (Minimum)
60
+ - Normal text (< 18pt or < 14pt bold): **4.5:1** minimum contrast ratio against background
61
+ - Large text (≥ 18pt or ≥ 14pt bold): **3:1** minimum
62
+ - **Failure:** Light grey text on white background (e.g., #767676 on #FFFFFF = 4.48:1 — fails AA)
63
+ - **Failure:** Placeholder text in input fields (often fails; placeholder is not a label substitute)
64
+ - **Exception:** Text in logos, inactive UI components, decorative text
65
+ - **Tool:** WebAIM Contrast Checker, Colour Contrast Analyser (desktop app), browser DevTools
66
+
67
+ ### 1.4.4 Resize Text
68
+ - **Failure:** Text rendered in `px` units inside CSS `@media` queries that prevent browser zoom from scaling text
69
+ - **Failure:** Fixed-height containers that clip text when zoomed to 200%
70
+ - **Fix:** Use relative units (`rem`, `em`) for font sizes and container heights; test at 200% browser zoom
71
+
72
+ ### 2.4.5 Multiple Ways
73
+ - **Requirement:** Provide at least two ways to find content: search + navigation, OR sitemap + navigation
74
+ - **Exception:** Pages that are the result of a process (e.g., checkout confirmation page) are excluded
75
+
76
+ ### 2.4.7 Focus Visible
77
+ - **Failure:** CSS `outline: none` or `outline: 0` removing the default focus ring with no replacement
78
+ - **Failure:** Focus ring present but invisible against background colour
79
+ - **Fix:** Never remove focus styling without replacing it; use `focus-visible` CSS pseudo-class
80
+
81
+ ### 3.3.3 Error Suggestion
82
+ - **Failure:** Form validation says "invalid input" without specifying what is wrong or how to fix it
83
+ - **Fix:** "Please enter a date in MM/DD/YYYY format" — specific, actionable suggestion
84
+
85
+ ### 3.3.4 Error Prevention
86
+ - **Requirement:** For legal, financial, or data deletion transactions: provide a review-and-confirm step, OR allow the submission to be reversed/cancelled
87
+
88
+ ---
89
+
90
+ ## Functional Performance Criteria (Chapter 3) — Section 508
91
+
92
+ | Criterion | Requirement |
93
+ |-----------|-------------|
94
+ | 302.1 Without Vision | At least one mode operable without vision (screen reader support) |
95
+ | 302.2 With Limited Vision | At least one mode with features that accommodate limited vision (zoom, high contrast) |
96
+ | 302.3 Without Perception of Colour | Colour not the only means to convey information |
97
+ | 302.4 Without Hearing | At least one mode operable without hearing (captions, transcripts, visual alerts) |
98
+ | 302.5 With Limited Hearing | At least one mode with features for limited hearing (volume control, captioning) |
99
+ | 302.6 Without Speech | At least one mode operable without speech |
100
+ | 302.7 With Limited Manipulation | At least one mode operable without fine motor control (no simultaneous key presses, no timed actions) |
101
+ | 302.8 With Limited Reach and Strength | At least one mode for limited reach (reachable controls) |
102
+ | 302.9 With Limited Language, Cognitive, and Learning | At least one mode that accommodates limited cognitive ability |
103
+
104
+ ---
105
+
106
+ ## Assistive Technology Testing Matrix
107
+
108
+ | AT + Browser | Primary Use Case | Notes |
109
+ |--------------|-----------------|-------|
110
+ | JAWS + Chrome | Federal agency standard; most common screen reader in US gov | Test all interactive widgets, form flows, dynamic content (ARIA live regions) |
111
+ | NVDA + Chrome or Firefox | Open-source; widely used for testing; required for VPAT testing | Free; good for broad coverage |
112
+ | VoiceOver + Safari (macOS) | Mac users; required if product targets Mac/iOS | Keyboard shortcut: Cmd+F5 |
113
+ | VoiceOver + Safari (iOS) | Mobile web and native iOS apps | Swipe navigation; activate with triple-click Home/Side button |
114
+ | TalkBack + Chrome (Android) | Android web and native apps | Swipe navigation; activate in Accessibility settings |
115
+ | Dragon NaturallySpeaking | Voice control users | Test all link text and button labels are speakable |
116
+ | Keyboard only | Most impactful test; catches most 2.1.x failures | Tab, Shift-Tab, Enter, Space, Arrow keys |
117
+ | High Contrast Mode (Windows) | OS-level contrast override | Ensure no information lost; images must not disappear |
118
+ | Browser Zoom 200% | SC 1.4.4 | Check for horizontal scroll, content overlap, clipped text |
119
+ | ZoomText / Magnifier | Low-vision users | Test with 4x magnification |
120
+
121
+ ---
122
+
123
+ ## PDF Accessibility Checklist
124
+
125
+ | Requirement | How to Verify | Tool |
126
+ |-------------|---------------|------|
127
+ | Document is tagged | File → Properties → Description tab: "Tagged PDF: Yes" | Acrobat Pro |
128
+ | Tag tree structure correct | Accessibility → Reading Order; Tags panel | Acrobat Pro |
129
+ | Reading order = visual order | View → Read Out Loud; or Articles panel | Acrobat Pro |
130
+ | Images have Alt text | Right-click image tag → Properties → Alternate Text | Acrobat Pro |
131
+ | Form fields have Tooltip/name | Open Form Editor; check Tooltip field for each control | Acrobat Pro |
132
+ | Table tags with TH/Scope | Tags panel; Table Inspector | Acrobat Pro |
133
+ | Document language set | File → Properties → Advanced → Reading Options | Acrobat Pro |
134
+ | Document title set | File → Properties → Description → Title | Acrobat Pro |
135
+ | No flicker/motion (if any) | Review any embedded multimedia | Manual |
136
+ | Passes automated check | Accessibility → Full Check → Run | Acrobat Pro |
137
+
138
+ ---
139
+
140
+ ## Common Procurement Deficiencies in VPATs
141
+
142
+ 1. **Outdated template** — using VPAT 1.x instead of VPAT 2.x (WCAG Edition). Reject and require resubmission.
143
+ 2. **"Supports" without evidence** — vendor claims support with no remarks. Require explanation for each "Supports" claim.
144
+ 3. **"Not Applicable" overuse** — vendor marks criteria N/A without justification. Challenge: almost no product has 100% N/A for interactive criteria.
145
+ 4. **Missing functional performance criteria** — vendors skip Chapter 3 entirely. Required for all ICT.
146
+ 5. **No testing methodology disclosed** — VPAT must state how testing was conducted (automated tools, AT + browser combinations, dates).
147
+ 6. **Version mismatch** — VPAT covers version 1.0 but agency is procuring version 2.0. Require VPAT for the exact version being procured.
148
+
149
+ ---
150
+
151
+ ## Key Legal References
152
+
153
+ - **29 U.S.C. § 794d** — Section 508 statutory text
154
+ - **36 CFR Part 1194** — Access Board's Revised Section 508 Standards (effective 18 January 2018)
155
+ - **FAR Subpart 39.2** — Federal Acquisition Regulation provisions on Section 508
156
+ - **FAR clause 52.239-2** — Section 508 contract clause (mandatory for ICT procurement)
157
+ - **OMB Memorandum M-24-08** — "Strengthening Digital Accessibility and the Management of Section 508 of the Rehabilitation Act" (January 2024)
158
+ - **Section508.gov** — GSA's official guidance, VPAT templates, testing resources
159
+ - **WCAG 2.0** — W3C Recommendation (11 December 2008) — the incorporated technical standard
160
+ - **WCAG 2.1** — W3C Recommendation (5 June 2018) — supersedes 2.0; additional mobile/cognitive criteria (not yet mandated by 508 but recommended)
@@ -0,0 +1,241 @@
1
+ # SOC 2 Control Matrix Reference
2
+
3
+ ## Table of Contents
4
+ 1. [Security — Common Criteria (CC1–CC9)](#security--common-criteria)
5
+ 2. [Availability (A1)](#availability-a1)
6
+ 3. [Confidentiality (C1)](#confidentiality-c1)
7
+ 4. [Processing Integrity (PI1)](#processing-integrity-pi1)
8
+ 5. [Privacy (P1–P8)](#privacy-p1p8)
9
+ 6. [Control Statement Template](#control-statement-template)
10
+
11
+ ---
12
+
13
+ ## Security — Common Criteria
14
+
15
+ ### CC1 — Control Environment
16
+
17
+ | Criterion | What auditors look for | Common gap |
18
+ |---|---|---|
19
+ | CC1.1 | COSO principles demonstrated; commitment to integrity and ethical values | No code of conduct or ethics policy; leadership not visibly engaged |
20
+ | CC1.2 | Board or equivalent oversight of security program | No documented board/executive security oversight; no meeting minutes |
21
+ | CC1.3 | Org structure, reporting lines, authorities defined | Org chart not current; security roles undefined |
22
+ | CC1.4 | Competent personnel; HR lifecycle controls | No background checks; no security training program |
23
+ | CC1.5 | Accountability for security responsibilities | Performance goals don't include security; no enforcement |
24
+
25
+ **Example control (CC1.4):**
26
+ ```
27
+ Control ID: CC1.4-001
28
+ Title: Security Awareness Training
29
+ Type: Preventive
30
+ Owner: HR / Security
31
+ Frequency: Annual (+ onboarding)
32
+ Description: All employees complete annual security awareness training covering
33
+ phishing, data handling, and incident reporting. Completion is tracked
34
+ and non-completions escalated to managers.
35
+ Evidence: Training completion report from LMS, onboarding checklist sign-offs
36
+ Test: Inspect training platform report; confirm >95% completion within period;
37
+ sample 5 employees to verify completion dates within 12 months.
38
+ ```
39
+
40
+ ---
41
+
42
+ ### CC2 — Communication and Information
43
+
44
+ | Criterion | What auditors look for | Common gap |
45
+ |---|---|---|
46
+ | CC2.1 | Quality information available to support control objectives | Policies inaccessible or not distributed; no intranet/wiki |
47
+ | CC2.2 | Internal communication about security responsibilities | Security updates not communicated; no all-hands or newsletter |
48
+ | CC2.3 | External communication with customers, regulators, vendors | No process to notify customers of security incidents; SLA terms vague |
49
+
50
+ ---
51
+
52
+ ### CC3 — Risk Assessment
53
+
54
+ | Criterion | What auditors look for | Common gap |
55
+ |---|---|---|
56
+ | CC3.1 | Defined risk objectives; risk tolerance stated | No written risk appetite or tolerance statement |
57
+ | CC3.2 | Risk identification and analysis process | No formal risk assessment; informal or ad hoc only |
58
+ | CC3.3 | Fraud risk considered | No fraud risk assessment or controls |
59
+ | CC3.4 | Technology change risks assessed | Changes don't trigger risk reassessment |
60
+
61
+ **Example control (CC3.2):**
62
+ ```
63
+ Control ID: CC3.2-001
64
+ Title: Annual Risk Assessment
65
+ Type: Detective
66
+ Owner: CISO / Security Manager
67
+ Frequency: Annual + event-driven
68
+ Description: A formal risk assessment is performed annually, identifying threats,
69
+ vulnerabilities, and likelihood/impact ratings. A risk register is
70
+ maintained and reviewed quarterly by the security committee.
71
+ Evidence: Risk register (dated), risk assessment report with sign-off,
72
+ security committee meeting minutes
73
+ Test: Inspect risk register; confirm dated within 12 months; verify
74
+ management sign-off; confirm high risks have remediation owners.
75
+ ```
76
+
77
+ ---
78
+
79
+ ### CC4 — Monitoring Controls
80
+
81
+ | Criterion | What auditors look for | Common gap |
82
+ |---|---|---|
83
+ | CC4.1 | Ongoing and separate evaluations of controls | No internal audits; no continuous monitoring program |
84
+ | CC4.2 | Deficiencies evaluated and communicated | No deficiency tracking; findings not escalated |
85
+
86
+ ---
87
+
88
+ ### CC5 — Control Activities
89
+
90
+ | Criterion | What auditors look for | Common gap |
91
+ |---|---|---|
92
+ | CC5.1 | Controls selected to mitigate risks | Controls not mapped to risks; no controls matrix |
93
+ | CC5.2 | Technology controls deployed | No MFA, no endpoint protection, no SIEM |
94
+ | CC5.3 | Policies and procedures deployed | Policies exist but not enforced; no procedures for key processes |
95
+
96
+ ---
97
+
98
+ ### CC6 — Logical and Physical Access Controls
99
+
100
+ This is typically the most heavily tested area.
101
+
102
+ | Criterion | What auditors look for | Common gap |
103
+ |---|---|---|
104
+ | CC6.1 | Logical access security measures | No MFA on critical systems; no SSO; shared accounts |
105
+ | CC6.2 | New access provisioning authorized | No formal access request/approval process |
106
+ | CC6.3 | Termination / role change access removal | Terminated employees not promptly de-provisioned (>24hr is a flag) |
107
+ | CC6.4 | Access credentials protected | Passwords stored in plaintext; no PAM for privileged accounts |
108
+ | CC6.5 | Logical access reviewed | No periodic user access reviews (quarterly/annual) |
109
+ | CC6.6 | Logical access restricted from threats | No IDS/IPS; no network segmentation |
110
+ | CC6.7 | Data transmission protected | Unencrypted data in transit; no TLS enforcement |
111
+ | CC6.8 | Unauthorized software prevented | No application whitelisting or MDM; shadow IT uncontrolled |
112
+
113
+ **Example control (CC6.3):**
114
+ ```
115
+ Control ID: CC6.3-001
116
+ Title: Access Termination — Employee Offboarding
117
+ Type: Preventive
118
+ Owner: IT / HR
119
+ Frequency: Event-driven (each termination)
120
+ Description: Upon employee termination, IT disables all system access within 24 hours
121
+ of the HR-initiated offboarding ticket. A checklist confirms: AD account
122
+ disabled, SaaS app access revoked, VPN certificate revoked, hardware
123
+ returned. HR confirms completion in the HRIS.
124
+ Evidence: Offboarding tickets, access revocation logs, HRIS termination records
125
+ Test: Select sample of 10–25 terminations in audit period; verify access was
126
+ revoked within 24 hours using AD logs and ticket timestamps.
127
+ ```
128
+
129
+ ---
130
+
131
+ ### CC7 — System Operations
132
+
133
+ | Criterion | What auditors look for | Common gap |
134
+ |---|---|---|
135
+ | CC7.1 | Vulnerability and malware detection | No vulnerability scanning; no EDR on endpoints |
136
+ | CC7.2 | Monitoring for security events | No SIEM or log aggregation; alerts not reviewed |
137
+ | CC7.3 | Security incidents evaluated and responded to | No incident response plan; incidents not documented |
138
+ | CC7.4 | Security incidents contained and resolved | No IR runbook; no post-incident review process |
139
+ | CC7.5 | Identified vulnerabilities remediated | No SLA for patching critical vulns; no patch cadence |
140
+
141
+ ---
142
+
143
+ ### CC8 — Change Management
144
+
145
+ | Criterion | What auditors look for | Common gap |
146
+ |---|---|---|
147
+ | CC8.1 | Authorized, tested, and approved changes | Changes deployed without tickets or approval; no testing in staging |
148
+
149
+ **Example control (CC8.1):**
150
+ ```
151
+ Control ID: CC8.1-001
152
+ Title: Production Change Approval
153
+ Type: Preventive
154
+ Owner: Engineering / DevOps
155
+ Frequency: Event-driven
156
+ Description: All production changes require a change request ticket approved by
157
+ an authorized reviewer (tech lead or manager) before deployment.
158
+ Emergency changes require retroactive approval within 24 hours.
159
+ Changes are tested in staging/QA before production promotion.
160
+ Evidence: Change tickets with approvals, deployment logs, PR approvals in
161
+ version control (GitHub/GitLab), JIRA/Linear ticket history
162
+ Test: Sample 20–30 changes in audit period; verify each has prior
163
+ approval, tester other than developer, and ticket closure with
164
+ deployment confirmation.
165
+ ```
166
+
167
+ ---
168
+
169
+ ### CC9 — Risk Mitigation
170
+
171
+ | Criterion | What auditors look for | Common gap |
172
+ |---|---|---|
173
+ | CC9.1 | Business disruption risk mitigation | No BCP; BCP untested |
174
+ | CC9.2 | Vendor and business partner risk managed | No vendor inventory; no vendor assessments performed |
175
+
176
+ ---
177
+
178
+ ## Availability (A1)
179
+
180
+ | Criterion | What auditors look for | Common gap |
181
+ |---|---|---|
182
+ | A1.1 | Capacity monitored and managed | No capacity monitoring; no alerting on resource thresholds |
183
+ | A1.2 | Environmental threats managed; backups tested | No backup verification; no restore testing |
184
+ | A1.3 | Recovery tested; RTO/RPO defined | RTO/RPO not defined; no DR test records |
185
+
186
+ ---
187
+
188
+ ## Confidentiality (C1)
189
+
190
+ | Criterion | What auditors look for | Common gap |
191
+ |---|---|---|
192
+ | C1.1 | Confidential information identified and protected | No data classification; no data inventory |
193
+ | C1.2 | Confidential information disposed of appropriately | No data retention/disposal policy; no certificate of destruction |
194
+
195
+ ---
196
+
197
+ ## Processing Integrity (PI1)
198
+
199
+ | Criterion | What auditors look for | Common gap |
200
+ |---|---|---|
201
+ | PI1.1 | Processing complete, valid, accurate, timely, authorized | No input/output validation; no reconciliation controls |
202
+ | PI1.2 | System inputs authorized | No authorization checks; no separation of duties |
203
+ | PI1.3 | System outputs complete and accurate | No output verification or reconciliation |
204
+ | PI1.4 | Processing errors detected and corrected | No error handling or alerting; errors silently discarded |
205
+ | PI1.5 | Stored items protected | No integrity monitoring; no checksums |
206
+
207
+ ---
208
+
209
+ ## Privacy (P1–P8)
210
+
211
+ | Criterion | What auditors look for | Common gap |
212
+ |---|---|---|
213
+ | P1 | Privacy notice provided to individuals | No privacy notice; notice doesn't match actual practices |
214
+ | P2 | Choice and consent obtained | No consent mechanism; opt-out not honored |
215
+ | P3 | Personal information collected only as stated | Collecting more data than disclosed; no data minimization |
216
+ | P4 | Personal information used only as stated | Using PII for undisclosed purposes |
217
+ | P5 | Personal information retained and disposed per policy | No retention schedule; PII kept indefinitely |
218
+ | P6 | Personal information disclosed only as authorized | No data sharing agreements; unauthorized third-party access |
219
+ | P7 | Personal information quality maintained | No process to update/correct inaccurate data |
220
+ | P8 | Privacy complaints and inquiries handled | No DSR (Data Subject Request) process; no privacy contact |
221
+
222
+ ---
223
+
224
+ ## Control Statement Template
225
+
226
+ ```
227
+ Control ID: [TSC-criterion-sequence, e.g., CC6.1-002]
228
+ TSC Criterion: [e.g., CC6.1 – Logical Access Security Measures]
229
+ Control Title: [Short descriptive name]
230
+ Control Type: [Preventive | Detective | Corrective]
231
+ Control Owner: [Role/team]
232
+ Frequency: [Continuous | Daily | Weekly | Monthly | Quarterly | Annual | Event-driven]
233
+ Description: [What the control does, who performs it, how it works, and what
234
+ systems/processes are covered. 2–5 sentences.]
235
+ Evidence: [Artifacts produced by this control that prove it operates:
236
+ logs, reports, tickets, sign-offs, screenshots, exports.]
237
+ Test Procedure:[How an auditor would test this: sample size, data sources,
238
+ pass/fail criteria. Match Type 1 (design) vs Type 2 (operating).]
239
+ Related Policies: [Which policy governs this control]
240
+ Linked Risks: [Which risks from risk register this control mitigates]
241
+ ```