bmad-plus 0.4.4 → 0.6.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (197) hide show
  1. package/CHANGELOG.md +54 -0
  2. package/README.md +5 -3
  3. package/package.json +1 -1
  4. package/readme-international/README.de.md +2 -2
  5. package/readme-international/README.es.md +2 -2
  6. package/readme-international/README.fr.md +2 -2
  7. package/src/bmad-plus/module.yaml +76 -12
  8. package/src/bmad-plus/packs/pack-dev-studio/README.md +162 -0
  9. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/analyst-agent.md +74 -0
  10. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/document-project.md +62 -0
  11. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/domain-research.md +96 -0
  12. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/market-research.md +96 -0
  13. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/prfaq.md +135 -0
  14. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/product-brief.md +81 -0
  15. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/tech-writer-agent.md +74 -0
  16. package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/technical-research.md +96 -0
  17. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/architect-agent.md +74 -0
  18. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/create-architecture.md +74 -0
  19. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/create-epics-stories.md +93 -0
  20. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/generate-project-context.md +81 -0
  21. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/implementation-readiness.md +91 -0
  22. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-01-init.md +153 -0
  23. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-01b-continue.md +173 -0
  24. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-02-context.md +224 -0
  25. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-03-starter.md +329 -0
  26. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-04-decisions.md +318 -0
  27. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-05-patterns.md +359 -0
  28. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-06-structure.md +379 -0
  29. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-07-validation.md +361 -0
  30. package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-08-complete.md +82 -0
  31. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/checkpoint-preview.md +68 -0
  32. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-01-gather-context.md +85 -0
  33. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-02-review.md +35 -0
  34. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-03-triage.md +49 -0
  35. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-04-present.md +132 -0
  36. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review.md +90 -0
  37. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/correct-course.md +301 -0
  38. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/create-story.md +429 -0
  39. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-agent.md +74 -0
  40. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-story-checklist.md +80 -0
  41. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-story.md +485 -0
  42. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/investigate.md +194 -0
  43. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/qa-e2e-tests.md +176 -0
  44. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/quick-dev.md +111 -0
  45. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/retrospective.md +1512 -0
  46. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/sprint-planning.md +299 -0
  47. package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/sprint-status.md +297 -0
  48. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/create-prd.md +30 -0
  49. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/create-ux-design.md +75 -0
  50. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/edit-prd.md +30 -0
  51. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/pm-agent.md +74 -0
  52. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/prd.md +90 -0
  53. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/ux-designer-agent.md +74 -0
  54. package/src/bmad-plus/packs/pack-dev-studio/categories/planning/validate-prd.md +30 -0
  55. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/advanced-elicitation.md +142 -0
  56. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/adversarial-review.md +37 -0
  57. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/bmad-help.md +75 -0
  58. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/brainstorming.md +6 -0
  59. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/customize.md +111 -0
  60. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/distillator.md +177 -0
  61. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/edge-case-hunter.md +67 -0
  62. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/editorial-review-prose.md +86 -0
  63. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/editorial-review-structure.md +179 -0
  64. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/index-docs.md +66 -0
  65. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/party-mode.md +128 -0
  66. package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/shard-doc.md +105 -0
  67. package/src/bmad-plus/packs/pack-dev-studio/dev-studio-orchestrator.md +120 -0
  68. package/src/bmad-plus/packs/pack-dev-studio/shared/architecture-decision-template.md +12 -0
  69. package/src/bmad-plus/packs/pack-dev-studio/shared/bwml-spec.md +328 -0
  70. package/src/bmad-plus/packs/pack-dev-studio/shared/module-help.csv +32 -0
  71. package/src/bmad-plus/packs/pack-dev-studio/upstream-sync.yaml +81 -0
  72. package/src/bmad-plus/packs/pack-shield/README.md +110 -0
  73. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
  74. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
  75. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
  76. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
  77. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
  78. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
  79. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
  80. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
  81. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
  82. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
  83. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
  84. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
  85. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
  86. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
  87. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
  88. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
  89. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
  90. package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
  91. package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
  92. package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
  93. package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
  94. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
  95. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
  96. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
  97. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
  98. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
  99. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
  100. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
  101. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
  102. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
  103. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
  104. package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
  105. package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
  106. package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
  107. package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
  108. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
  109. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
  110. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
  111. package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
  112. package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
  113. package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
  114. package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
  115. package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
  116. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
  117. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
  118. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
  119. package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
  120. package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
  121. package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
  122. package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
  123. package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
  124. package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
  125. package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
  126. package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
  127. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
  128. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
  129. package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
  130. package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
  131. package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
  132. package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
  133. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
  134. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
  135. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
  136. package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
  137. package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
  138. package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
  139. package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
  140. package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
  141. package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
  142. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
  143. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
  144. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
  145. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
  146. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
  147. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
  148. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
  149. package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
  150. package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
  151. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
  152. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
  153. package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
  154. package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
  155. package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
  156. package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
  157. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
  158. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
  159. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
  160. package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
  161. package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
  162. package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
  163. package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
  164. package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
  165. package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
  166. package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
  167. package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
  168. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
  169. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
  170. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
  171. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
  172. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
  173. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
  174. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
  175. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
  176. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
  177. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
  178. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
  179. package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
  180. package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
  181. package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
  182. package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
  183. package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
  184. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
  185. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
  186. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
  187. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
  188. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
  189. package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
  190. package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
  191. package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
  192. package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
  193. package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
  194. package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
  195. package/tools/cli/commands/install.js +31 -9
  196. package/tools/cli/commands/update.js +4 -2
  197. package/tools/cli/i18n.js +50 -10
@@ -0,0 +1,236 @@
1
+ # SOC 2 Audit Evidence Reference
2
+
3
+ ## Table of Contents
4
+ 1. [Evidence Fundamentals](#evidence-fundamentals)
5
+ 2. [Evidence by Criterion](#evidence-by-criterion)
6
+ 3. [Evidence Quality Checklist](#evidence-quality-checklist)
7
+ 4. [Common Evidence Pitfalls](#common-evidence-pitfalls)
8
+
9
+ ---
10
+
11
+ ## Evidence Fundamentals
12
+
13
+ ### Type 1 vs Type 2 Evidence
14
+
15
+ | | Type 1 | Type 2 |
16
+ |---|---|---|
17
+ | **What's tested** | Control design at a point in time | Control operating effectiveness over a period |
18
+ | **Evidence needed** | Proof control *exists* and is *designed* correctly | Proof control *operated consistently* throughout the period |
19
+ | **Sampling** | Single instance is usually sufficient | Auditor will sample multiple instances across the period |
20
+ | **Typical audit period** | A date (e.g., Dec 31, 2024) | 6–12 months (e.g., Jan 1 – Dec 31, 2024) |
21
+
22
+ For Type 2, auditors typically use **statistical sampling** — for higher-frequency controls (daily logs, weekly scans), they'll pull samples from across the period. For lower-frequency controls (annual risk assessment, quarterly access reviews), they'll test every instance.
23
+
24
+ ### Sampling Guidance by Control Frequency
25
+
26
+ | Frequency | Auditor sample size (typical) |
27
+ |---|---|
28
+ | Continuous / daily | 20–30 items from across the period |
29
+ | Weekly | 5–10 weeks sampled |
30
+ | Monthly | 3–6 months sampled |
31
+ | Quarterly | All 4 quarters |
32
+ | Annual | 1 (but must cover the audit period) |
33
+ | Event-driven (e.g., per hire/termination) | 20–30 events or 100% if fewer than 20 |
34
+
35
+ ---
36
+
37
+ ## Evidence by Criterion
38
+
39
+ ### CC1 — Control Environment
40
+
41
+ | Evidence Item | What it proves | Format |
42
+ |---|---|---|
43
+ | Organizational chart (current) | Org structure and reporting lines | PDF / org tool export |
44
+ | Code of Conduct / Ethics policy | Commitment to integrity | Signed policy doc |
45
+ | Security awareness training completion report | CC1.4 — competent personnel | LMS export with timestamps |
46
+ | Board/executive security meeting minutes | Leadership oversight | Meeting minutes PDF |
47
+ | Background check records | CC1.4 — personnel screening | HRIS confirmation (redacted) |
48
+ | Security committee charter | Governance structure | Document |
49
+
50
+ ---
51
+
52
+ ### CC2 — Communication and Information
53
+
54
+ | Evidence Item | What it proves | Format |
55
+ |---|---|---|
56
+ | Policy distribution records | Policies communicated to employees | Email screenshots, intranet access logs |
57
+ | Employee policy acknowledgment log | Personnel aware of requirements | Signed acknowledgments or LMS completion |
58
+ | Customer-facing security communications (e.g., SLA, security page) | External communication | URL / screenshot with date |
59
+ | Incident notification records (if any occurred) | CC2.3 — external notification process | Email/ticket records |
60
+
61
+ ---
62
+
63
+ ### CC3 — Risk Assessment
64
+
65
+ | Evidence Item | What it proves | Format |
66
+ |---|---|---|
67
+ | Risk register (dated, with owners) | Risks identified and tracked | Spreadsheet / GRC tool export |
68
+ | Risk assessment report with management sign-off | Formal annual process completed | PDF with signatures and date |
69
+ | Security committee meeting minutes (risk review) | Ongoing risk oversight | Minutes |
70
+ | Risk treatment decisions (accept/mitigate/transfer) | Risks actively managed | Risk register or separate log |
71
+
72
+ ---
73
+
74
+ ### CC4 — Monitoring Controls
75
+
76
+ | Evidence Item | What it proves | Format |
77
+ |---|---|---|
78
+ | Internal audit reports | Self-evaluation of controls | Audit report PDF |
79
+ | Control deficiency log / tracking | Deficiencies identified and remediated | Spreadsheet or ticket system |
80
+ | Executive/board security reporting | Control performance communicated upward | Dashboard screenshots, board slides |
81
+
82
+ ---
83
+
84
+ ### CC5 — Control Activities
85
+
86
+ | Evidence Item | What it proves | Format |
87
+ |---|---|---|
88
+ | Controls matrix (policies mapped to risks) | Controls selected to address risks | Spreadsheet |
89
+ | MFA enrollment reports | Technology controls deployed | Okta/Azure AD report |
90
+ | Endpoint protection deployment report | CC5.2 — technology controls | MDM / EDR console export |
91
+ | Firewall rule review records | Network controls reviewed | Firewall config review document |
92
+
93
+ ---
94
+
95
+ ### CC6 — Logical and Physical Access Controls
96
+
97
+ This criterion typically generates the most evidence requests.
98
+
99
+ | Evidence Item | What it proves | Format |
100
+ |---|---|---|
101
+ | User access list (production systems, AWS, GitHub, SaaS) | Current state of access | Console exports |
102
+ | Access request/approval tickets | CC6.2 — provisioning authorized | JIRA / ServiceNow tickets |
103
+ | Termination access revocation records | CC6.3 — timely de-provisioning | HR ticket + AD/system logs |
104
+ | Access review sign-offs (quarterly/annual) | CC6.5 — reviews performed | Spreadsheet with reviewer signature and date |
105
+ | MFA configuration screenshots | CC6.1 — credentials protected | Admin console screenshots |
106
+ | Privileged access list and reviews | CC6.4, CC6.5 — admin access controlled | Export with review sign-off |
107
+ | Encryption-in-transit configuration | CC6.7 — data protected | SSL cert details, config screenshots |
108
+ | Physical access records (if applicable) | CC6 — physical controls | Keycard logs, visitor logs, office photos |
109
+
110
+ **Access review evidence tips:**
111
+ - Export must be dated and show reviewer name
112
+ - Bulk "no change" reviews are a flag — show evidence of actual review decisions
113
+ - Entitlement changes made as a result of review should be evidenced (tickets)
114
+
115
+ ---
116
+
117
+ ### CC7 — System Operations
118
+
119
+ | Evidence Item | What it proves | Format |
120
+ |---|---|---|
121
+ | Vulnerability scan reports (quarterly or more frequent) | CC7.1 — vulnerabilities detected | Scan tool export (Qualys, Tenable, etc.) |
122
+ | Penetration test report + remediation tracking | CC7.1 — testing performed | Pentest report PDF + remediation tickets |
123
+ | SIEM alerts / security event dashboard | CC7.2 — monitoring in place | Dashboard screenshot (dated) |
124
+ | Incident tickets (all incidents in period) | CC7.3, CC7.4 — incidents managed | Ticket system export |
125
+ | Incident post-mortems / lessons learned | CC7.4 — resolution documented | Post-mortem documents |
126
+ | Patch management reports (before/after) | CC7.5 — vulnerabilities remediated | Patch report with dates |
127
+ | IR tabletop exercise records | CC7.3 — IR plan tested | Exercise agenda, attendance, findings |
128
+ | Antivirus/EDR status reports | CC7.1 — malware detection | Console export |
129
+
130
+ ---
131
+
132
+ ### CC8 — Change Management
133
+
134
+ | Evidence Item | What it proves | Format |
135
+ |---|---|---|
136
+ | Change tickets with approvals (sample across period) | Changes authorized before deployment | JIRA / Linear / ServiceNow tickets |
137
+ | PR/merge request approvals in version control | Code review and approval | GitHub/GitLab PR screenshots |
138
+ | Deployment logs | Changes deployed as approved | CI/CD pipeline logs |
139
+ | Change advisory board (CAB) meeting minutes | High-risk changes reviewed | Meeting notes |
140
+ | Emergency change approvals and retroactive sign-offs | Emergency process followed | Ticket records |
141
+
142
+ ---
143
+
144
+ ### CC9 — Vendor Risk
145
+
146
+ | Evidence Item | What it proves | Format |
147
+ |---|---|---|
148
+ | Vendor inventory (tiered) | All vendors identified | Spreadsheet |
149
+ | Vendor SOC 2 reports (reviewed) | Critical vendors assessed | SOC 2 report copies + review log |
150
+ | Vendor security questionnaire responses | Due diligence performed | Questionnaire responses |
151
+ | Vendor contracts with security clauses / DPA | Contractual controls in place | Contract excerpts |
152
+ | CUEC (Complementary User Entity Controls) tracking | CUECs from vendor SOC 2 reports addressed | Mapping document |
153
+
154
+ ---
155
+
156
+ ### A1 — Availability
157
+
158
+ | Evidence Item | What it proves | Format |
159
+ |---|---|---|
160
+ | Uptime monitoring dashboards / SLA reports | System availability tracked | Monitoring tool export (e.g., Datadog, Pingdom) |
161
+ | Capacity monitoring alerts | A1.1 — capacity managed | Dashboard screenshots |
162
+ | Backup completion logs (all backups in period) | Backups running as configured | Backup tool reports |
163
+ | Backup restore test records | A1.2 — backups verified | Test procedure + results document |
164
+ | DR test plan and results | A1.3 — recovery tested | DR test report with date and RTO/RPO achieved |
165
+ | Incident tickets for outages | Availability events documented | Ticket records |
166
+
167
+ ---
168
+
169
+ ### C1 — Confidentiality
170
+
171
+ | Evidence Item | What it proves | Format |
172
+ |---|---|---|
173
+ | Data inventory / data map | Confidential data identified | Data inventory spreadsheet |
174
+ | Data classification labels applied | C1.1 — classification in practice | Screenshots, DLP reports |
175
+ | DLP (Data Loss Prevention) reports | Confidential data protected | DLP console export |
176
+ | Data disposal/destruction records | C1.2 — disposal per policy | Certificate of destruction, deletion logs |
177
+ | NDA log (employees, vendors) | Confidentiality agreements in place | NDA execution records |
178
+
179
+ ---
180
+
181
+ ### PI1 — Processing Integrity
182
+
183
+ | Evidence Item | What it proves | Format |
184
+ |---|---|---|
185
+ | Input validation test records | PI1.2 — inputs authorized and validated | Test results, code review records |
186
+ | Reconciliation reports | PI1.3 — outputs complete and accurate | Reconciliation logs |
187
+ | Error log reviews | PI1.4 — errors detected | Error monitoring reports |
188
+ | Data integrity monitoring alerts | PI1.5 — stored items protected | Monitoring screenshots |
189
+ | Job/batch processing success logs | PI1.1 — processing complete | Scheduler/job logs |
190
+
191
+ ---
192
+
193
+ ### P1–P8 — Privacy
194
+
195
+ | Evidence Item | What it proves | Format |
196
+ |---|---|---|
197
+ | Privacy notice (published, dated) | P1 — notice provided | URL / PDF |
198
+ | Consent mechanism screenshots | P2 — consent obtained | UI screenshots, consent logs |
199
+ | Data subject request (DSR) log | P8 — requests handled | DSR ticket log |
200
+ | DSR response records (sample) | P8 — timely response | Ticket records with dates |
201
+ | Data retention schedule | P5 — retention defined | Retention policy + schedule |
202
+ | Data deletion records | P5 — data disposed per policy | Deletion logs |
203
+ | Privacy impact assessments (PIA) | P3, P4 — collection/use reviewed | PIA documents |
204
+ | Third-party data sharing agreements | P6 — sharing authorized | DPA / data sharing contracts |
205
+
206
+ ---
207
+
208
+ ## Evidence Quality Checklist
209
+
210
+ Before submitting evidence to auditors, verify:
211
+
212
+ - [ ] **Dated** — every screenshot or export clearly shows the date it was captured
213
+ - [ ] **System-identified** — it's clear which system the evidence comes from
214
+ - [ ] **Complete for period** — Type 2 evidence covers the full audit window
215
+ - [ ] **Not reconstructed** — evidence was captured at the time of control operation, not created retroactively
216
+ - [ ] **Reviewer-attributable** — approvals show who approved (not just "admin" or a shared account)
217
+ - [ ] **Named with context** — files are named clearly (e.g., `CC6.5_AccessReview_Q3-2024_Signed.pdf`, not `screenshot1.png`)
218
+ - [ ] **Organized by criterion** — evidence folder mirrors the TSC structure
219
+
220
+ ---
221
+
222
+ ## Common Evidence Pitfalls
223
+
224
+ 1. **Screenshots with no date** — always capture the date/timestamp in the screenshot or use system-generated exports with metadata.
225
+
226
+ 2. **"As of today" exports provided after the audit period** — access lists pulled after the fact don't prove controls operated *during* the period. Configure periodic automated exports.
227
+
228
+ 3. **Approval from the same person who made the change** — self-approval violates separation of duties. Flag this for remediation before the audit.
229
+
230
+ 4. **Shared or service accounts used for approvals** — individual accountability cannot be established. Require personal accounts for all approvals.
231
+
232
+ 5. **Training completion reports showing < 100%** — auditors will ask about non-completers. Have a policy and evidence showing follow-up for late completers.
233
+
234
+ 6. **Incomplete incident tickets** — tickets must show: detection time, severity classification, responders, containment actions, resolution, and closure. Sparse tickets are a finding.
235
+
236
+ 7. **Vendor SOC 2 reports not reviewed** — simply *having* a vendor's SOC 2 report is insufficient. Show evidence it was reviewed (e.g., review memo, CUEC tracking).
@@ -0,0 +1,254 @@
1
+ # SOC 2 Policy Writing Reference
2
+
3
+ ## Table of Contents
4
+ 1. [Policy Writing Standards](#policy-writing-standards)
5
+ 2. [Required Policy Set](#required-policy-set)
6
+ 3. [Policy Templates](#policy-templates)
7
+ 4. [Common Mistakes to Avoid](#common-mistakes-to-avoid)
8
+
9
+ ---
10
+
11
+ ## Policy Writing Standards
12
+
13
+ ### Universal Policy Header
14
+
15
+ Every policy should start with:
16
+
17
+ ```
18
+ Policy Title: [Name]
19
+ Policy ID: [e.g., ISP-001]
20
+ Version: [e.g., 1.2]
21
+ Effective Date: [Date]
22
+ Last Reviewed: [Date]
23
+ Next Review Date: [Date — maximum 12 months from last review]
24
+ Policy Owner: [Role]
25
+ Approved By: [Executive/leadership role + name]
26
+ TSC Criteria: [e.g., CC1.1, CC2.1, CC5.3]
27
+ ```
28
+
29
+ ### Required Sections (every policy)
30
+
31
+ 1. **Purpose** — Why this policy exists; what it protects
32
+ 2. **Scope** — Who and what systems it applies to (be explicit)
33
+ 3. **Policy Statements** — The actual rules (use "must", not "should")
34
+ 4. **Roles and Responsibilities** — Who enforces it, who complies
35
+ 5. **Exceptions** — How to request an exception; who approves
36
+ 6. **Enforcement** — Consequences of non-compliance
37
+ 7. **Related Documents** — Links to procedures, standards, other policies
38
+ 8. **Review and Revision History** — Version log
39
+
40
+ ### Language Standards
41
+
42
+ | Weak (avoid) | Strong (use) |
43
+ |---|---|
44
+ | should, may, could | must, shall, is required to |
45
+ | as appropriate | [specific action] |
46
+ | where possible | [specific action or explicit exception process] |
47
+ | periodically | [specific frequency: quarterly, annually] |
48
+ | sensitive data | [defined data classification tier] |
49
+ | promptly | within [X] hours/days |
50
+
51
+ ---
52
+
53
+ ## Required Policy Set
54
+
55
+ ### 1. Information Security Policy (ISP)
56
+ **Criteria:** CC1.1, CC1.2, CC2.1, CC5.1, CC5.3
57
+ **Purpose:** Overarching policy establishing management's commitment to security
58
+ **Must include:**
59
+ - Executive statement of commitment
60
+ - Security objectives aligned to business
61
+ - Reference to all subordinate security policies
62
+ - Defined security roles (CISO, security committee, data owners, users)
63
+ - Annual review requirement
64
+
65
+ ---
66
+
67
+ ### 2. Access Control Policy
68
+ **Criteria:** CC6.1, CC6.2, CC6.3, CC6.4, CC6.5, CC6.6
69
+ **Must include:**
70
+ - Principles: least privilege, need-to-know, separation of duties
71
+ - MFA requirements (which systems require it — be specific)
72
+ - Provisioning process: how access is requested, approved, granted
73
+ - Termination process: timeline for de-provisioning (e.g., within 24 hours)
74
+ - Privileged access: how admin/root access is controlled and reviewed
75
+ - Access review cadence (e.g., quarterly for privileged, annual for standard)
76
+ - Password/authentication standards (or reference to auth policy)
77
+
78
+ ---
79
+
80
+ ### 3. Incident Response Policy
81
+ **Criteria:** CC7.3, CC7.4, CC2.3
82
+ **Must include:**
83
+ - Incident classification levels (with examples: P1–P4 or Critical/High/Medium/Low)
84
+ - Roles: Incident Commander, responders, communications lead
85
+ - Detection and reporting process (how incidents are identified and escalated)
86
+ - Response phases: Identify → Contain → Eradicate → Recover → Lessons Learned
87
+ - Customer notification SLA (e.g., material breaches within 72 hours)
88
+ - Post-incident review requirement
89
+ - Annual IR tabletop exercise requirement
90
+
91
+ **Template snippet:**
92
+ ```
93
+ 4. Incident Classification
94
+
95
+ Severity 1 (Critical): Confirmed breach of customer data, ransomware, complete
96
+ system outage. Requires immediate escalation to CEO and CISO. Customer
97
+ notification within 72 hours if PII involved.
98
+
99
+ Severity 2 (High): Suspected breach, significant service degradation >30 min,
100
+ compromised admin credentials. Requires CISO notification within 2 hours.
101
+
102
+ Severity 3 (Medium): Isolated malware, failed intrusion attempt, minor outage.
103
+ Requires Security team response within 4 hours.
104
+
105
+ Severity 4 (Low): Security policy violations, phishing attempts (no compromise),
106
+ suspicious activity (unconfirmed). Requires ticket within 24 hours.
107
+ ```
108
+
109
+ ---
110
+
111
+ ### 4. Change Management Policy
112
+ **Criteria:** CC8.1
113
+ **Must include:**
114
+ - Scope: what constitutes a "change" (code, infrastructure, configurations)
115
+ - Change types: standard (pre-approved), normal (requires review), emergency
116
+ - Approval requirements by change type
117
+ - Testing requirements (staging/QA before production)
118
+ - Rollback requirements: every change must have a documented rollback plan
119
+ - Emergency change: allowed with retroactive approval within 24 hours
120
+ - Change freeze periods (optional but common)
121
+
122
+ ---
123
+
124
+ ### 5. Risk Assessment Policy
125
+ **Criteria:** CC3.1, CC3.2, CC3.3, CC3.4
126
+ **Must include:**
127
+ - Frequency: at minimum annual, plus triggered by significant changes
128
+ - Risk scoring methodology (likelihood × impact matrix)
129
+ - Risk tolerance/appetite statement
130
+ - Risk register: ownership, format, review cadence
131
+ - Treatment options: accept, mitigate, transfer, avoid
132
+ - Escalation: who reviews and approves risk acceptance
133
+
134
+ ---
135
+
136
+ ### 6. Vendor Management Policy
137
+ **Criteria:** CC9.2
138
+ **Must include:**
139
+ - Vendor tiering criteria (Critical / High / Medium / Low)
140
+ - Due diligence requirements per tier (SOC 2 report, questionnaire, etc.)
141
+ - Contractual requirements: DPA, security addendum, right-to-audit
142
+ - Ongoing monitoring: annual review schedule
143
+ - Offboarding: data deletion requirements, access revocation
144
+ - Subprocessor disclosure for customer-facing vendors
145
+
146
+ ---
147
+
148
+ ### 7. Business Continuity & Disaster Recovery Policy
149
+ **Criteria:** A1.2, A1.3, CC9.1
150
+ **Must include:**
151
+ - RTO (Recovery Time Objective) and RPO (Recovery Point Objective) per system
152
+ - Backup frequency, retention, and verification requirements
153
+ - DR environment description (hot/warm/cold standby)
154
+ - DR test requirement: at minimum annual tabletop or failover test
155
+ - BCP activation criteria and escalation path
156
+ - Communication plan during an incident
157
+
158
+ ---
159
+
160
+ ### 8. Data Classification Policy
161
+ **Criteria:** C1.1, P3, CC6.7
162
+ **Must include:**
163
+ - Classification tiers (example: Public / Internal / Confidential / Restricted)
164
+ - Definition of each tier with examples
165
+ - Handling requirements per tier (storage, transmission, sharing, disposal)
166
+ - Labeling requirements
167
+ - Default classification (unclassified data = treated as what tier?)
168
+
169
+ **Template tiers:**
170
+ ```
171
+ Restricted: PII, PHI, payment card data, credentials, encryption keys.
172
+ Encrypted at rest and in transit. Access strictly limited.
173
+ Cannot be stored in personal devices or unapproved cloud services.
174
+
175
+ Confidential: Business-sensitive data, source code, audit reports, contracts.
176
+ Encrypted in transit. Access on need-to-know basis. NDA required
177
+ for external sharing.
178
+
179
+ Internal: Internal communications, non-sensitive operational data.
180
+ Not for public distribution. Standard access controls apply.
181
+
182
+ Public: Marketing materials, published docs, press releases.
183
+ No special controls required.
184
+ ```
185
+
186
+ ---
187
+
188
+ ### 9. Acceptable Use Policy
189
+ **Criteria:** CC1.1, CC6.6, CC6.8
190
+ **Must include:**
191
+ - Acceptable use of company systems, networks, and data
192
+ - Prohibited activities (explicit list)
193
+ - Personal device / BYOD rules
194
+ - Monitoring disclosure ("Company may monitor use of systems")
195
+ - Reporting obligations for suspected incidents
196
+ - Acknowledgment requirement (signed annually)
197
+
198
+ ---
199
+
200
+ ### 10. Privacy Policy / Notice
201
+ **Criteria:** P1, P2, P3, P6, P8
202
+ **Must include (per AICPA GAPP):**
203
+ - What personal information is collected and why
204
+ - Legal basis for processing (if GDPR-applicable)
205
+ - How information is used
206
+ - With whom it is shared (third parties, subprocessors)
207
+ - Retention periods
208
+ - Individual rights (access, correction, deletion, portability)
209
+ - How to submit a data subject request
210
+ - Contact information for privacy inquiries
211
+ - How policy changes are communicated
212
+
213
+ ---
214
+
215
+ ### 11. Encryption Policy
216
+ **Criteria:** CC6.7, C1.1
217
+ **Must include:**
218
+ - Encryption standards (e.g., AES-256 at rest, TLS 1.2+ in transit)
219
+ - Which systems and data require encryption
220
+ - Key management: generation, rotation, storage, destruction
221
+ - Prohibition on deprecated algorithms (MD5, SHA-1, DES, RC4)
222
+
223
+ ---
224
+
225
+ ### 12. Vulnerability Management Policy
226
+ **Criteria:** CC7.1, CC7.5
227
+ **Must include:**
228
+ - Scanning frequency (e.g., weekly automated + quarterly penetration test)
229
+ - Severity-based remediation SLAs:
230
+ - Critical: patch within 24–72 hours
231
+ - High: patch within 7–14 days
232
+ - Medium: patch within 30 days
233
+ - Low: patch within 90 days or accepted risk
234
+ - Exception process for systems that can't be patched immediately
235
+ - Penetration testing requirement (annual minimum)
236
+ - Responsible disclosure / bug bounty program (optional)
237
+
238
+ ---
239
+
240
+ ## Common Mistakes to Avoid
241
+
242
+ 1. **Writing policies that describe the ideal, not the actual** — auditors test what you do, not what you aspirationally wrote. Only commit to what you'll consistently do.
243
+
244
+ 2. **No approval signatures** — policies must be formally approved by an appropriate executive or the board.
245
+
246
+ 3. **Copy-paste from the internet** — boilerplate policies often contain controls you don't have. Every control stated must be evidenced.
247
+
248
+ 4. **Missing scope statements** — "this policy applies to all employees" may be incomplete if contractors, vendors, or specific systems need to be called out.
249
+
250
+ 5. **Not distributing policies** — policies must be accessible to all in-scope personnel. Distribution evidence is required (e.g., intranet link, email announcement, acknowledgment log).
251
+
252
+ 6. **Neglecting annual review** — dated policies are a flag. Every policy must have a documented review with any changes noted.
253
+
254
+ 7. **Procedures missing from policies** — policies state *what* and *why*; procedures state *how*. Both are needed. "We will respond to incidents" without a runbook is a gap.