erosolar-cli 2.1.245 → 2.1.246

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -2293,6 +2293,1019 @@ UnifiedFraudOrchestrator.prototype.getAttackChainReport = async function (chainI
2293
2293
  }
2294
2294
  return this.attackChainDetector.generateChainReport(chainId);
2295
2295
  };
2296
+ // ─────────────────────────────────────────────────────────────────────────────
2297
+ // GOOGLE GOVERNMENT & DEFENSE SYSTEMS
2298
+ // ─────────────────────────────────────────────────────────────────────────────
2299
+ export const GOOGLE_GOV_PRODUCTS = [
2300
+ {
2301
+ id: 'google-workspace-gov',
2302
+ name: 'Google Workspace for Government',
2303
+ vendor: 'google',
2304
+ category: 'productivity',
2305
+ description: 'Gmail, Drive, Docs, Meet, Calendar for government agencies. FedRAMP authorized cloud productivity suite.',
2306
+ targetCustomers: ['federal', 'state_local'],
2307
+ certifications: ['FedRAMP High', 'CJIS', 'ITAR', 'SOC 1/2/3', 'ISO 27001'],
2308
+ dataResidency: ['US-only data centers', 'Assured Workloads regions'],
2309
+ knownContracts: ['DOI', 'USDA', 'GSA', 'Various state governments'],
2310
+ securityConcerns: [
2311
+ 'Google retains access to all data for "support"',
2312
+ 'AI/ML processing of government communications',
2313
+ 'Metadata collection even in "sovereign" mode',
2314
+ 'Key management controlled by Google',
2315
+ ],
2316
+ accessPoints: [
2317
+ 'Admin console access by Google support',
2318
+ 'Automated scanning for "security"',
2319
+ 'AI training on anonymized data',
2320
+ 'Vault/eDiscovery backdoor access',
2321
+ ],
2322
+ integrations: ['Google Cloud Platform', 'Chronicle SIEM', 'BeyondCorp', 'Mandiant'],
2323
+ },
2324
+ {
2325
+ id: 'google-cloud-gov',
2326
+ name: 'Google Cloud Platform for Government',
2327
+ vendor: 'google',
2328
+ category: 'cloud',
2329
+ description: 'FedRAMP authorized cloud infrastructure including Compute, Storage, BigQuery, AI/ML services.',
2330
+ targetCustomers: ['federal', 'dod', 'state_local', 'defense_contractors'],
2331
+ certifications: ['FedRAMP High', 'FedRAMP Moderate', 'IL2', 'IL4', 'IL5', 'CJIS', 'ITAR'],
2332
+ dataResidency: ['US regions', 'Assured Workloads', 'Sovereign Controls'],
2333
+ knownContracts: ['JEDI follow-on work', 'VA', 'DOE National Labs'],
2334
+ securityConcerns: [
2335
+ 'Shared infrastructure with commercial cloud',
2336
+ 'Google employee access to customer instances',
2337
+ 'AI services process sensitive data',
2338
+ 'Supply chain concerns with hardware',
2339
+ ],
2340
+ accessPoints: [
2341
+ 'Infrastructure-level access',
2342
+ 'Customer-managed encryption keys (CMEK) still Google-accessible',
2343
+ 'Logging and monitoring infrastructure',
2344
+ 'Break-glass emergency access',
2345
+ ],
2346
+ integrations: ['Anthos', 'GKE', 'BigQuery', 'Vertex AI', 'Chronicle'],
2347
+ },
2348
+ {
2349
+ id: 'google-chronicle',
2350
+ name: 'Chronicle Security Operations (Google SecOps)',
2351
+ vendor: 'google',
2352
+ category: 'security',
2353
+ subcategory: 'SIEM/SOAR',
2354
+ description: 'Cloud-native SIEM built on Google infrastructure. Ingests and analyzes security telemetry at scale.',
2355
+ targetCustomers: ['federal', 'dod', 'ic', 'defense_contractors'],
2356
+ certifications: ['FedRAMP High', 'SOC 2'],
2357
+ dataResidency: ['US data centers'],
2358
+ knownContracts: ['Multiple federal agencies'],
2359
+ securityConcerns: [
2360
+ 'All security logs sent to Google infrastructure',
2361
+ 'Google can see all ingested security data',
2362
+ 'Detection rules and threat intel controlled by Google',
2363
+ 'Creates comprehensive visibility into customer security posture',
2364
+ ],
2365
+ accessPoints: [
2366
+ 'Full access to ingested security logs',
2367
+ 'Threat detection rule management',
2368
+ 'Incident response data',
2369
+ 'Network flow and endpoint telemetry',
2370
+ ],
2371
+ integrations: ['Mandiant', 'VirusTotal', 'Google Cloud', 'Third-party SIEM'],
2372
+ },
2373
+ {
2374
+ id: 'google-mandiant',
2375
+ name: 'Mandiant (Google Cloud Security)',
2376
+ vendor: 'google',
2377
+ category: 'security',
2378
+ subcategory: 'Threat Intelligence & IR',
2379
+ description: 'Threat intelligence, incident response, and security consulting. Acquired by Google 2022.',
2380
+ targetCustomers: ['federal', 'dod', 'ic', 'defense_contractors', 'allied_nations'],
2381
+ certifications: ['FedRAMP (via Google Cloud)', 'Various clearances for personnel'],
2382
+ dataResidency: ['US-based operations', 'Global threat intel'],
2383
+ knownContracts: ['DOD', 'DHS', 'FBI', 'Various IC agencies', 'NATO allies'],
2384
+ securityConcerns: [
2385
+ 'Incident response gives access to breached networks',
2386
+ 'Threat intel includes sensitive attack data',
2387
+ 'Acquisition by Google centralizes security intelligence',
2388
+ 'Consultants may retain access post-engagement',
2389
+ ],
2390
+ accessPoints: [
2391
+ 'Incident response network access',
2392
+ 'Threat intelligence sharing',
2393
+ 'Adversary tracking data',
2394
+ 'Customer breach forensics',
2395
+ ],
2396
+ integrations: ['Chronicle', 'VirusTotal', 'Google Cloud', 'Siemplify'],
2397
+ },
2398
+ {
2399
+ id: 'google-beyondcorp',
2400
+ name: 'BeyondCorp Enterprise',
2401
+ vendor: 'google',
2402
+ category: 'security',
2403
+ subcategory: 'Zero Trust',
2404
+ description: 'Zero trust access solution. Mediates all access to applications and data.',
2405
+ targetCustomers: ['federal', 'dod', 'defense_contractors'],
2406
+ certifications: ['FedRAMP High'],
2407
+ dataResidency: ['US'],
2408
+ securityConcerns: [
2409
+ 'All access decisions routed through Google',
2410
+ 'Full visibility into who accesses what',
2411
+ 'Device posture data collected',
2412
+ 'Can deny access to any resource',
2413
+ ],
2414
+ accessPoints: [
2415
+ 'Access policy enforcement point',
2416
+ 'User authentication data',
2417
+ 'Device inventory and health',
2418
+ 'Application access logs',
2419
+ ],
2420
+ integrations: ['Google Workspace', 'Google Cloud', 'Chrome Enterprise', 'Endpoint Verification'],
2421
+ },
2422
+ {
2423
+ id: 'google-distributed-cloud',
2424
+ name: 'Google Distributed Cloud',
2425
+ vendor: 'google',
2426
+ category: 'infrastructure',
2427
+ subcategory: 'Edge/On-prem',
2428
+ description: 'Google Cloud services running on-premises or at edge locations. For air-gapped and tactical environments.',
2429
+ targetCustomers: ['dod', 'ic', 'defense_contractors'],
2430
+ certifications: ['IL5', 'IL6 (in progress)', 'Secret/TS environments'],
2431
+ dataResidency: ['Customer premises', 'Tactical edge'],
2432
+ knownContracts: ['DOD tactical edge', 'IC facilities'],
2433
+ securityConcerns: [
2434
+ 'Google hardware in classified environments',
2435
+ 'Software updates from Google',
2436
+ 'Telemetry even in "air-gapped" mode',
2437
+ 'Hardware implant concerns',
2438
+ ],
2439
+ accessPoints: [
2440
+ 'Software update channel',
2441
+ 'Support access (even limited)',
2442
+ 'Hardware-level access potential',
2443
+ 'Licensing/activation systems',
2444
+ ],
2445
+ integrations: ['Anthos', 'GKE', 'AI/ML services'],
2446
+ },
2447
+ {
2448
+ id: 'google-vertex-ai-gov',
2449
+ name: 'Vertex AI for Government',
2450
+ vendor: 'google',
2451
+ category: 'ai_ml',
2452
+ description: 'Machine learning platform for government. Includes generative AI, AutoML, and custom model training.',
2453
+ targetCustomers: ['federal', 'dod', 'ic'],
2454
+ certifications: ['FedRAMP High', 'IL4/IL5 (select services)'],
2455
+ dataResidency: ['US Assured Workloads'],
2456
+ securityConcerns: [
2457
+ 'Training data potentially used by Google',
2458
+ 'Model architectures visible to Google',
2459
+ 'AI safety concerns for defense applications',
2460
+ 'Inference data accessible',
2461
+ ],
2462
+ accessPoints: [
2463
+ 'Training data access',
2464
+ 'Model weights and architecture',
2465
+ 'Inference inputs/outputs',
2466
+ 'Usage analytics',
2467
+ ],
2468
+ integrations: ['BigQuery', 'Cloud Storage', 'Gemini', 'PaLM'],
2469
+ },
2470
+ ];
2471
+ export const GOOGLE_GOV_PROFILE = {
2472
+ vendor: 'google',
2473
+ govDivision: 'Google Public Sector',
2474
+ annualGovRevenue: '$2B+ (estimated)',
2475
+ fedRampStatus: ['FedRAMP High (multiple)', 'FedRAMP Moderate', 'IL2', 'IL4', 'IL5'],
2476
+ primaryContracts: [
2477
+ 'DOD JEDI/JWCC participant',
2478
+ 'CBP border surveillance',
2479
+ 'VA healthcare',
2480
+ 'Various civilian agencies',
2481
+ ],
2482
+ products: GOOGLE_GOV_PRODUCTS,
2483
+ dataAccessCapabilities: [
2484
+ 'Full infrastructure access to cloud-hosted data',
2485
+ 'AI/ML processing of all content',
2486
+ 'Security monitoring and logging',
2487
+ 'Incident response access',
2488
+ 'Administrative backdoors',
2489
+ ],
2490
+ knownBackdoors: [
2491
+ 'Vault/eDiscovery access bypasses user encryption',
2492
+ 'Admin console "support access"',
2493
+ 'Break-glass emergency procedures',
2494
+ 'Automated content scanning',
2495
+ ],
2496
+ lawEnforcementCooperation: 'Complies with legal process. Transparency reports show high compliance rate. FISA court orders not disclosed.',
2497
+ };
2498
+ // ─────────────────────────────────────────────────────────────────────────────
2499
+ // APPLE GOVERNMENT & DEFENSE SYSTEMS
2500
+ // ─────────────────────────────────────────────────────────────────────────────
2501
+ export const APPLE_GOV_PRODUCTS = [
2502
+ {
2503
+ id: 'apple-business-essentials',
2504
+ name: 'Apple Business Essentials',
2505
+ vendor: 'apple',
2506
+ category: 'productivity',
2507
+ description: 'Device management, storage, and support for businesses and government. Includes iCloud storage and MDM.',
2508
+ targetCustomers: ['federal', 'state_local'],
2509
+ certifications: ['FedRAMP (via partners)', 'SOC 2'],
2510
+ dataResidency: ['US data centers', 'Limited options'],
2511
+ securityConcerns: [
2512
+ 'iCloud data accessible by Apple',
2513
+ 'MDM profiles controlled centrally',
2514
+ 'Device telemetry collected',
2515
+ 'Limited true air-gap capability',
2516
+ ],
2517
+ accessPoints: [
2518
+ 'iCloud infrastructure access',
2519
+ 'MDM command and control',
2520
+ 'Device enrollment data',
2521
+ 'AppleCare support access',
2522
+ ],
2523
+ integrations: ['iCloud', 'Apple School Manager', 'Apple Business Manager'],
2524
+ },
2525
+ {
2526
+ id: 'apple-managed-device-attestation',
2527
+ name: 'Managed Device Attestation',
2528
+ vendor: 'apple',
2529
+ category: 'security',
2530
+ subcategory: 'Device Security',
2531
+ description: 'Cryptographic attestation that device is genuine Apple hardware with valid security state.',
2532
+ targetCustomers: ['federal', 'dod', 'ic'],
2533
+ certifications: ['FIPS 140-2 (Secure Enclave)', 'Common Criteria'],
2534
+ dataResidency: ['Apple servers for attestation'],
2535
+ securityConcerns: [
2536
+ 'Apple servers validate every device attestation',
2537
+ 'Apple knows which devices are in use by whom',
2538
+ 'Attestation can be revoked by Apple',
2539
+ 'Creates dependency on Apple infrastructure',
2540
+ ],
2541
+ accessPoints: [
2542
+ 'Device attestation traffic',
2543
+ 'Hardware identity database',
2544
+ 'Security state information',
2545
+ 'Enrollment status',
2546
+ ],
2547
+ integrations: ['MDM solutions', 'Apple Business Manager', 'Conditional access'],
2548
+ },
2549
+ {
2550
+ id: 'apple-platform-security',
2551
+ name: 'Apple Platform Security (T2/Apple Silicon)',
2552
+ vendor: 'apple',
2553
+ category: 'hardware',
2554
+ description: 'Secure Enclave, hardware encryption, secure boot on Mac and iOS devices.',
2555
+ targetCustomers: ['federal', 'dod', 'ic', 'defense_contractors'],
2556
+ certifications: ['FIPS 140-2/140-3', 'Common Criteria', 'Various national certifications'],
2557
+ dataResidency: ['On-device', 'Keys may escrow to iCloud'],
2558
+ securityConcerns: [
2559
+ 'Apple controls Secure Enclave firmware',
2560
+ 'Recovery key escrow to Apple',
2561
+ 'Activation lock controlled by Apple',
2562
+ 'Software updates can modify security behavior',
2563
+ ],
2564
+ accessPoints: [
2565
+ 'Firmware update channel',
2566
+ 'Activation lock servers',
2567
+ 'Recovery key escrow',
2568
+ 'Device enrollment status',
2569
+ ],
2570
+ integrations: ['iCloud', 'MDM', 'Apple services'],
2571
+ },
2572
+ {
2573
+ id: 'apple-imessage-gov',
2574
+ name: 'iMessage/FaceTime for Government',
2575
+ vendor: 'apple',
2576
+ category: 'communications',
2577
+ description: 'Encrypted messaging and video calls. Used by government personnel on Apple devices.',
2578
+ targetCustomers: ['federal', 'state_local'],
2579
+ certifications: ['None specific - consumer product'],
2580
+ dataResidency: ['Primarily US', 'Metadata on Apple servers'],
2581
+ securityConcerns: [
2582
+ 'Key distribution controlled by Apple IDS',
2583
+ 'No independent key verification',
2584
+ 'Metadata collected and retained',
2585
+ 'MITM possible via key substitution',
2586
+ 'iCloud backup defeats E2E encryption',
2587
+ ],
2588
+ accessPoints: [
2589
+ 'IDS key distribution servers',
2590
+ 'Key Transparency logs (Apple controlled)',
2591
+ 'Metadata collection',
2592
+ 'iCloud message backup',
2593
+ 'Push notification infrastructure',
2594
+ ],
2595
+ integrations: ['iCloud', 'Apple ID', 'CarPlay', 'HomePod'],
2596
+ },
2597
+ {
2598
+ id: 'apple-maps-location',
2599
+ name: 'Apple Maps / Location Services',
2600
+ vendor: 'apple',
2601
+ category: 'analytics',
2602
+ subcategory: 'Geolocation',
2603
+ description: 'Mapping and location services used by government apps and personnel.',
2604
+ targetCustomers: ['federal', 'state_local', 'dod'],
2605
+ certifications: ['None specific'],
2606
+ dataResidency: ['Apple servers globally'],
2607
+ securityConcerns: [
2608
+ 'Location history tracked',
2609
+ 'Significant Locations feature',
2610
+ 'Find My network creates mesh tracking',
2611
+ 'Government personnel movements visible to Apple',
2612
+ ],
2613
+ accessPoints: [
2614
+ 'Location Services API',
2615
+ 'Find My infrastructure',
2616
+ 'Significant Locations database',
2617
+ 'Maps search history',
2618
+ ],
2619
+ integrations: ['Siri', 'Find My', 'CarPlay', 'Weather'],
2620
+ },
2621
+ {
2622
+ id: 'apple-mdm-abm',
2623
+ name: 'Apple Business Manager / MDM',
2624
+ vendor: 'apple',
2625
+ category: 'identity',
2626
+ subcategory: 'Device Management',
2627
+ description: 'Centralized device enrollment and management for government Apple devices.',
2628
+ targetCustomers: ['federal', 'state_local', 'dod'],
2629
+ certifications: ['SOC 2', 'ISO 27001'],
2630
+ dataResidency: ['Apple servers'],
2631
+ securityConcerns: [
2632
+ 'Apple has visibility into all managed devices',
2633
+ 'Can push profiles and configurations',
2634
+ 'Device wipe capability',
2635
+ 'App distribution controlled',
2636
+ ],
2637
+ accessPoints: [
2638
+ 'Device enrollment data',
2639
+ 'Management command channel',
2640
+ 'App deployment',
2641
+ 'Configuration profiles',
2642
+ ],
2643
+ integrations: ['MDM vendors (Jamf, Kandji, etc.)', 'Apple School Manager', 'VPP'],
2644
+ },
2645
+ ];
2646
+ export const APPLE_GOV_PROFILE = {
2647
+ vendor: 'apple',
2648
+ govDivision: 'Apple Federal (via partners)',
2649
+ annualGovRevenue: '$1B+ (hardware sales, estimated)',
2650
+ fedRampStatus: ['No direct FedRAMP', 'Partners provide FedRAMP coverage'],
2651
+ primaryContracts: [
2652
+ 'Device purchases across federal agencies',
2653
+ 'DOD iOS device procurement',
2654
+ 'State/local education and government',
2655
+ ],
2656
+ products: APPLE_GOV_PRODUCTS,
2657
+ dataAccessCapabilities: [
2658
+ 'iCloud data access (even with ADP, metadata accessible)',
2659
+ 'Device attestation and enrollment data',
2660
+ 'IDS key distribution control',
2661
+ 'Location services data',
2662
+ 'Push notification content (briefly)',
2663
+ ],
2664
+ knownBackdoors: [
2665
+ 'IDS key substitution capability',
2666
+ 'iCloud backup decryption (without ADP)',
2667
+ 'Activation Lock control',
2668
+ 'MDM remote wipe',
2669
+ 'Recovery key escrow',
2670
+ ],
2671
+ lawEnforcementCooperation: 'Historically resisted FBI demands (San Bernardino). Complies with valid legal process. ADP makes iCloud data inaccessible but metadata still available.',
2672
+ };
2673
+ // ─────────────────────────────────────────────────────────────────────────────
2674
+ // MICROSOFT GOVERNMENT & DEFENSE SYSTEMS
2675
+ // ─────────────────────────────────────────────────────────────────────────────
2676
+ export const MICROSOFT_GOV_PRODUCTS = [
2677
+ {
2678
+ id: 'microsoft-365-gcc',
2679
+ name: 'Microsoft 365 Government (GCC/GCC-High)',
2680
+ vendor: 'microsoft',
2681
+ category: 'productivity',
2682
+ description: 'Office 365, Teams, SharePoint, Exchange for government. GCC-High for DoD and sensitive workloads.',
2683
+ targetCustomers: ['federal', 'dod', 'ic', 'state_local', 'defense_contractors'],
2684
+ certifications: ['FedRAMP High', 'DFARS', 'ITAR', 'CJIS', 'IRS 1075', 'IL2', 'IL4', 'IL5'],
2685
+ dataResidency: ['US-only sovereign cloud', 'GCC-High isolated infrastructure'],
2686
+ knownContracts: ['JEDI (terminated)', 'JWCC', 'DOD enterprise', 'Most federal agencies'],
2687
+ securityConcerns: [
2688
+ 'Microsoft retains admin access',
2689
+ 'Telemetry collection even in GCC-High',
2690
+ 'AI/Copilot processing of content',
2691
+ 'Key escrow capabilities',
2692
+ 'Partner ecosystem access',
2693
+ ],
2694
+ accessPoints: [
2695
+ 'Exchange Online admin access',
2696
+ 'SharePoint backend access',
2697
+ 'Teams message inspection',
2698
+ 'eDiscovery and Legal Hold',
2699
+ 'Customer Lockbox (still MS access)',
2700
+ ],
2701
+ integrations: ['Azure Government', 'Defender', 'Sentinel', 'Intune', 'Entra ID'],
2702
+ },
2703
+ {
2704
+ id: 'azure-government',
2705
+ name: 'Azure Government',
2706
+ vendor: 'microsoft',
2707
+ category: 'cloud',
2708
+ description: 'Isolated government cloud with FedRAMP High and DoD IL authorizations. Separate from commercial Azure.',
2709
+ targetCustomers: ['federal', 'dod', 'ic', 'state_local', 'defense_contractors'],
2710
+ certifications: ['FedRAMP High', 'IL2', 'IL4', 'IL5', 'IL6', 'CJIS', 'ITAR', 'IRS 1075'],
2711
+ dataResidency: ['US Government regions only', 'Air-gapped options (Azure Government Secret/Top Secret)'],
2712
+ knownContracts: ['JWCC', 'DOD enterprise', 'VA', 'DHS', 'Treasury'],
2713
+ securityConcerns: [
2714
+ 'Still connected to Microsoft corporate',
2715
+ 'Software supply chain from commercial',
2716
+ 'Microsoft employee access with clearance',
2717
+ 'Shared codebase with commercial Azure',
2718
+ ],
2719
+ accessPoints: [
2720
+ 'Infrastructure-level access',
2721
+ 'Support access with clearance',
2722
+ 'Monitoring and diagnostics',
2723
+ 'Update and patch channels',
2724
+ ],
2725
+ integrations: ['M365 GCC-High', 'Defender for Cloud', 'Sentinel', 'Key Vault'],
2726
+ },
2727
+ {
2728
+ id: 'azure-gov-secret',
2729
+ name: 'Azure Government Secret / Top Secret',
2730
+ vendor: 'microsoft',
2731
+ category: 'cloud',
2732
+ subcategory: 'Classified',
2733
+ description: 'Air-gapped Azure for classified workloads. Secret and Top Secret enclaves.',
2734
+ targetCustomers: ['dod', 'ic'],
2735
+ certifications: ['IL6', 'SECRET', 'TOP SECRET/SCI'],
2736
+ dataResidency: ['Classified US facilities', 'Air-gapped'],
2737
+ knownContracts: ['IC agencies', 'DOD classified programs'],
2738
+ securityConcerns: [
2739
+ 'Microsoft personnel with TS/SCI clearance',
2740
+ 'Hardware from Microsoft supply chain',
2741
+ 'Software updates through controlled channels',
2742
+ 'Potential for supply chain compromise',
2743
+ ],
2744
+ accessPoints: [
2745
+ 'Cleared Microsoft personnel',
2746
+ 'Software update channel',
2747
+ 'Hardware maintenance',
2748
+ 'Limited remote diagnostics',
2749
+ ],
2750
+ integrations: ['Classified Microsoft services', 'Partner solutions'],
2751
+ },
2752
+ {
2753
+ id: 'microsoft-defender-gov',
2754
+ name: 'Microsoft Defender for Government',
2755
+ vendor: 'microsoft',
2756
+ category: 'security',
2757
+ subcategory: 'XDR/EDR',
2758
+ description: 'Endpoint detection and response, threat protection for government. Part of M365 security stack.',
2759
+ targetCustomers: ['federal', 'dod', 'state_local', 'defense_contractors'],
2760
+ certifications: ['FedRAMP High', 'IL4', 'IL5'],
2761
+ dataResidency: ['US Government cloud'],
2762
+ securityConcerns: [
2763
+ 'All endpoint telemetry sent to Microsoft',
2764
+ 'Threat detection rules controlled by Microsoft',
2765
+ 'Response actions controllable by Microsoft',
2766
+ 'Creates complete visibility into government endpoints',
2767
+ ],
2768
+ accessPoints: [
2769
+ 'Endpoint telemetry collection',
2770
+ 'Threat detection and response',
2771
+ 'Security posture data',
2772
+ 'Incident investigation access',
2773
+ ],
2774
+ integrations: ['Microsoft 365', 'Sentinel', 'Intune', 'Entra ID'],
2775
+ },
2776
+ {
2777
+ id: 'microsoft-sentinel-gov',
2778
+ name: 'Microsoft Sentinel for Government',
2779
+ vendor: 'microsoft',
2780
+ category: 'security',
2781
+ subcategory: 'SIEM/SOAR',
2782
+ description: 'Cloud-native SIEM/SOAR on Azure Government. Ingests security logs from across the enterprise.',
2783
+ targetCustomers: ['federal', 'dod', 'ic', 'defense_contractors'],
2784
+ certifications: ['FedRAMP High', 'IL4', 'IL5'],
2785
+ dataResidency: ['Azure Government'],
2786
+ knownContracts: ['CISA', 'DOD components', 'Civilian agencies'],
2787
+ securityConcerns: [
2788
+ 'All security logs visible to Microsoft',
2789
+ 'AI/ML analysis of security data',
2790
+ 'Detection rules from Microsoft',
2791
+ 'Integration with commercial threat intel',
2792
+ ],
2793
+ accessPoints: [
2794
+ 'Security log ingestion',
2795
+ 'Threat detection analytics',
2796
+ 'Incident response data',
2797
+ 'Automation playbooks',
2798
+ ],
2799
+ integrations: ['Defender', 'M365', 'Azure Arc', 'Third-party connectors'],
2800
+ },
2801
+ {
2802
+ id: 'microsoft-intune-gov',
2803
+ name: 'Microsoft Intune for Government',
2804
+ vendor: 'microsoft',
2805
+ category: 'identity',
2806
+ subcategory: 'Device Management',
2807
+ description: 'Mobile device and endpoint management for government. Controls policy and app deployment.',
2808
+ targetCustomers: ['federal', 'dod', 'state_local'],
2809
+ certifications: ['FedRAMP High', 'IL4', 'IL5'],
2810
+ dataResidency: ['US Government cloud'],
2811
+ securityConcerns: [
2812
+ 'Microsoft controls device policy enforcement',
2813
+ 'Can push apps and configurations',
2814
+ 'Device wipe capability',
2815
+ 'Telemetry collection',
2816
+ ],
2817
+ accessPoints: [
2818
+ 'Device enrollment and inventory',
2819
+ 'Policy deployment',
2820
+ 'App distribution',
2821
+ 'Compliance data',
2822
+ ],
2823
+ integrations: ['Entra ID', 'Defender', 'Autopilot', 'Configuration Manager'],
2824
+ },
2825
+ {
2826
+ id: 'microsoft-teams-gov',
2827
+ name: 'Microsoft Teams for Government',
2828
+ vendor: 'microsoft',
2829
+ category: 'communications',
2830
+ description: 'Collaboration and communications platform for government. Chat, meetings, calls, and file sharing.',
2831
+ targetCustomers: ['federal', 'dod', 'state_local', 'defense_contractors'],
2832
+ certifications: ['FedRAMP High', 'IL4', 'IL5', 'CJIS'],
2833
+ dataResidency: ['US Government cloud'],
2834
+ securityConcerns: [
2835
+ 'All communications visible to Microsoft',
2836
+ 'Meeting recordings stored in Microsoft cloud',
2837
+ 'Transcription and AI processing',
2838
+ 'eDiscovery access to all content',
2839
+ ],
2840
+ accessPoints: [
2841
+ 'Message content and metadata',
2842
+ 'Meeting recordings and transcripts',
2843
+ 'File sharing and collaboration',
2844
+ 'Presence and activity data',
2845
+ ],
2846
+ integrations: ['SharePoint', 'OneDrive', 'Outlook', 'Power Platform'],
2847
+ },
2848
+ {
2849
+ id: 'microsoft-copilot-gov',
2850
+ name: 'Microsoft Copilot for Government (Preview)',
2851
+ vendor: 'microsoft',
2852
+ category: 'ai_ml',
2853
+ description: 'AI assistant integrated into M365 Government. Processes documents, emails, meetings.',
2854
+ targetCustomers: ['federal', 'state_local'],
2855
+ certifications: ['FedRAMP (in progress)', 'GCC availability'],
2856
+ dataResidency: ['US - processing location TBD'],
2857
+ securityConcerns: [
2858
+ 'AI processes all user content',
2859
+ 'Training on government data (even if anonymized)',
2860
+ 'Prompt injection vulnerabilities',
2861
+ 'Data leakage through AI responses',
2862
+ ],
2863
+ accessPoints: [
2864
+ 'Full access to user content for AI processing',
2865
+ 'Meeting transcriptions',
2866
+ 'Document analysis',
2867
+ 'Email content',
2868
+ ],
2869
+ integrations: ['M365 suite', 'Azure OpenAI', 'Graph API'],
2870
+ },
2871
+ ];
2872
+ export const MICROSOFT_GOV_PROFILE = {
2873
+ vendor: 'microsoft',
2874
+ govDivision: 'Microsoft Federal',
2875
+ annualGovRevenue: '$20B+ (estimated, largest gov IT vendor)',
2876
+ fedRampStatus: ['FedRAMP High (many services)', 'IL2-IL6', 'SECRET', 'TOP SECRET'],
2877
+ primaryContracts: [
2878
+ 'JWCC (multi-billion)',
2879
+ 'DOD Enterprise agreements',
2880
+ 'VA healthcare',
2881
+ 'Most federal agencies',
2882
+ 'State/local enterprise',
2883
+ ],
2884
+ products: MICROSOFT_GOV_PRODUCTS,
2885
+ dataAccessCapabilities: [
2886
+ 'Administrative access to all cloud services',
2887
+ 'eDiscovery and Legal Hold across M365',
2888
+ 'Endpoint telemetry via Defender',
2889
+ 'Security logs via Sentinel',
2890
+ 'AI processing of all content via Copilot',
2891
+ ],
2892
+ knownBackdoors: [
2893
+ 'Customer Lockbox (still allows access)',
2894
+ 'eDiscovery admin access',
2895
+ 'Defender response actions',
2896
+ 'Intune device wipe',
2897
+ 'Global admin account recovery',
2898
+ ],
2899
+ lawEnforcementCooperation: 'Complies with legal process. Transparency reports published. CLOUD Act agreements with allies. Known cooperation with national security requests.',
2900
+ };
2901
+ // ─────────────────────────────────────────────────────────────────────────────
2902
+ // AMAZON GOVERNMENT & DEFENSE SYSTEMS
2903
+ // ─────────────────────────────────────────────────────────────────────────────
2904
+ export const AMAZON_GOV_PRODUCTS = [
2905
+ {
2906
+ id: 'aws-govcloud',
2907
+ name: 'AWS GovCloud (US)',
2908
+ vendor: 'amazon',
2909
+ category: 'cloud',
2910
+ description: 'Isolated AWS regions for government workloads. FedRAMP High and DoD authorizations.',
2911
+ targetCustomers: ['federal', 'dod', 'ic', 'state_local', 'defense_contractors'],
2912
+ certifications: ['FedRAMP High', 'IL2', 'IL4', 'IL5', 'CJIS', 'ITAR', 'IRS 1075'],
2913
+ dataResidency: ['US-only regions', 'Isolated from commercial AWS'],
2914
+ knownContracts: ['CIA $600M (historic)', 'JWCC', 'NSA', 'DOD components'],
2915
+ securityConcerns: [
2916
+ 'AWS employees with clearances have access',
2917
+ 'Shared codebase with commercial AWS',
2918
+ 'Software supply chain from commercial',
2919
+ 'Hardware from AWS supply chain',
2920
+ ],
2921
+ accessPoints: [
2922
+ 'Infrastructure-level access',
2923
+ 'Support access with clearance',
2924
+ 'Monitoring and CloudWatch',
2925
+ 'Service control plane',
2926
+ ],
2927
+ integrations: ['All AWS services (subset)', 'AWS Marketplace', 'Partner solutions'],
2928
+ },
2929
+ {
2930
+ id: 'aws-secret-region',
2931
+ name: 'AWS Secret Region',
2932
+ vendor: 'amazon',
2933
+ category: 'cloud',
2934
+ subcategory: 'Classified',
2935
+ description: 'Air-gapped AWS for SECRET classified workloads. Operated for IC community.',
2936
+ targetCustomers: ['ic', 'dod'],
2937
+ certifications: ['SECRET', 'ICD 503'],
2938
+ dataResidency: ['Classified US facilities'],
2939
+ knownContracts: ['CIA', 'IC agencies'],
2940
+ securityConcerns: [
2941
+ 'AWS cleared personnel',
2942
+ 'Hardware in classified facilities',
2943
+ 'Limited oversight of operations',
2944
+ 'Supply chain for classified infrastructure',
2945
+ ],
2946
+ accessPoints: [
2947
+ 'Cleared AWS employees',
2948
+ 'Controlled software updates',
2949
+ 'Hardware maintenance',
2950
+ 'Limited diagnostics',
2951
+ ],
2952
+ integrations: ['IC-specific services', 'C2S'],
2953
+ },
2954
+ {
2955
+ id: 'aws-c2s',
2956
+ name: 'AWS Commercial Cloud Services (C2S)',
2957
+ vendor: 'amazon',
2958
+ category: 'cloud',
2959
+ subcategory: 'Classified',
2960
+ description: 'Top Secret cloud for IC. $600M+ contract with CIA, now expanded.',
2961
+ targetCustomers: ['ic'],
2962
+ certifications: ['TOP SECRET/SCI', 'ICD 503'],
2963
+ dataResidency: ['TS/SCI facilities'],
2964
+ knownContracts: ['CIA (original $600M)', 'Expanded IC community'],
2965
+ securityConcerns: [
2966
+ 'Most sensitive government data on commercial vendor infrastructure',
2967
+ 'AWS personnel with TS/SCI',
2968
+ 'Concentration of IC data',
2969
+ 'Single vendor risk',
2970
+ ],
2971
+ accessPoints: [
2972
+ 'Cleared AWS personnel',
2973
+ 'Infrastructure operations',
2974
+ 'Software and hardware supply chain',
2975
+ ],
2976
+ integrations: ['IC-specific tools', 'AWS services subset'],
2977
+ },
2978
+ {
2979
+ id: 'amazon-rekognition-gov',
2980
+ name: 'Amazon Rekognition for Government',
2981
+ vendor: 'amazon',
2982
+ category: 'ai_ml',
2983
+ subcategory: 'Computer Vision',
2984
+ description: 'Facial recognition and image analysis. Used by law enforcement and government.',
2985
+ targetCustomers: ['federal', 'state_local', 'dod'],
2986
+ certifications: ['FedRAMP (via GovCloud)'],
2987
+ dataResidency: ['US GovCloud'],
2988
+ knownContracts: ['ICE (controversial)', 'Law enforcement agencies', 'DOD programs'],
2989
+ securityConcerns: [
2990
+ 'Facial recognition accuracy concerns',
2991
+ 'Bias in AI models',
2992
+ 'Mass surveillance capability',
2993
+ 'Data retention and sharing',
2994
+ ],
2995
+ accessPoints: [
2996
+ 'Image and video processing',
2997
+ 'Facial recognition database',
2998
+ 'Analysis results',
2999
+ 'Model training data',
3000
+ ],
3001
+ integrations: ['S3', 'Lambda', 'Kinesis Video Streams'],
3002
+ },
3003
+ {
3004
+ id: 'amazon-ring-gov',
3005
+ name: 'Ring (Amazon) Law Enforcement Partnerships',
3006
+ vendor: 'amazon',
3007
+ category: 'security',
3008
+ subcategory: 'Surveillance',
3009
+ description: 'Doorbell cameras and neighborhood surveillance. Partnerships with 2000+ police departments.',
3010
+ targetCustomers: ['state_local'],
3011
+ certifications: ['None specific'],
3012
+ dataResidency: ['AWS US'],
3013
+ knownContracts: ['2000+ police department partnerships'],
3014
+ securityConcerns: [
3015
+ 'Mass neighborhood surveillance network',
3016
+ 'Police can request footage without warrant',
3017
+ 'Neighbors app creates tip network',
3018
+ 'Facial recognition integration',
3019
+ ],
3020
+ accessPoints: [
3021
+ 'Video footage access',
3022
+ 'Location data',
3023
+ 'Audio recordings',
3024
+ 'Request portal for law enforcement',
3025
+ ],
3026
+ integrations: ['Alexa', 'AWS', 'Neighbors app'],
3027
+ },
3028
+ {
3029
+ id: 'aws-nitro-enclaves',
3030
+ name: 'AWS Nitro Enclaves',
3031
+ vendor: 'amazon',
3032
+ category: 'security',
3033
+ subcategory: 'Confidential Computing',
3034
+ description: 'Isolated compute environments for processing sensitive data.',
3035
+ targetCustomers: ['federal', 'dod', 'defense_contractors'],
3036
+ certifications: ['FedRAMP (via GovCloud)'],
3037
+ dataResidency: ['US GovCloud'],
3038
+ securityConcerns: [
3039
+ 'AWS controls Nitro hypervisor',
3040
+ 'Side-channel attack potential',
3041
+ 'Key management complexity',
3042
+ 'Limited third-party attestation',
3043
+ ],
3044
+ accessPoints: [
3045
+ 'Hypervisor-level access',
3046
+ 'Attestation infrastructure',
3047
+ 'Enclave management',
3048
+ ],
3049
+ integrations: ['EC2', 'KMS', 'ACM'],
3050
+ },
3051
+ {
3052
+ id: 'aws-workspaces-gov',
3053
+ name: 'Amazon WorkSpaces for Government',
3054
+ vendor: 'amazon',
3055
+ category: 'infrastructure',
3056
+ subcategory: 'VDI',
3057
+ description: 'Virtual desktops in the cloud. Provides access to government applications.',
3058
+ targetCustomers: ['federal', 'dod', 'state_local'],
3059
+ certifications: ['FedRAMP High', 'IL4', 'IL5'],
3060
+ dataResidency: ['US GovCloud'],
3061
+ securityConcerns: [
3062
+ 'All desktop activity on AWS infrastructure',
3063
+ 'Session recording capability',
3064
+ 'Clipboard and file transfer monitoring',
3065
+ 'AWS admin access to desktops',
3066
+ ],
3067
+ accessPoints: [
3068
+ 'Desktop session data',
3069
+ 'User activity',
3070
+ 'File access',
3071
+ 'Application usage',
3072
+ ],
3073
+ integrations: ['Active Directory', 'WorkDocs', 'AppStream'],
3074
+ },
3075
+ ];
3076
+ export const AMAZON_GOV_PROFILE = {
3077
+ vendor: 'amazon',
3078
+ govDivision: 'AWS Public Sector / Amazon Web Services Government',
3079
+ annualGovRevenue: '$10B+ (estimated)',
3080
+ fedRampStatus: ['FedRAMP High', 'IL2-IL5', 'SECRET', 'TOP SECRET/SCI'],
3081
+ primaryContracts: [
3082
+ 'CIA C2S ($600M+)',
3083
+ 'JWCC participant',
3084
+ 'NSA',
3085
+ 'DOD components',
3086
+ 'Most federal agencies',
3087
+ ],
3088
+ products: AMAZON_GOV_PRODUCTS,
3089
+ dataAccessCapabilities: [
3090
+ 'Infrastructure-level access to all workloads',
3091
+ 'CloudWatch and logging access',
3092
+ 'Support access with clearances',
3093
+ 'Rekognition facial data',
3094
+ 'Ring video network',
3095
+ ],
3096
+ knownBackdoors: [
3097
+ 'AWS support access',
3098
+ 'CloudWatch log access',
3099
+ 'S3 bucket policy override (with warrant)',
3100
+ 'Ring law enforcement portal',
3101
+ 'Rekognition database',
3102
+ ],
3103
+ lawEnforcementCooperation: 'Complies with legal process. Ring partnerships with 2000+ police departments. Transparency reports published.',
3104
+ };
3105
+ // ─────────────────────────────────────────────────────────────────────────────
3106
+ // META GOVERNMENT & DEFENSE SYSTEMS
3107
+ // ─────────────────────────────────────────────────────────────────────────────
3108
+ export const META_GOV_PRODUCTS = [
3109
+ {
3110
+ id: 'meta-workplace-gov',
3111
+ name: 'Workplace from Meta for Government',
3112
+ vendor: 'meta',
3113
+ category: 'productivity',
3114
+ description: 'Enterprise collaboration platform. Chat, video, and intranet for organizations.',
3115
+ targetCustomers: ['federal', 'state_local'],
3116
+ certifications: ['FedRAMP (limited)', 'SOC 2'],
3117
+ dataResidency: ['US data centers'],
3118
+ securityConcerns: [
3119
+ 'All communications on Meta infrastructure',
3120
+ 'AI processing of content',
3121
+ 'Integration with consumer Facebook',
3122
+ 'Limited government-specific isolation',
3123
+ ],
3124
+ accessPoints: [
3125
+ 'Chat and messaging content',
3126
+ 'Video call data',
3127
+ 'File sharing',
3128
+ 'Employee directory',
3129
+ ],
3130
+ integrations: ['Microsoft 365', 'Google Workspace', 'ServiceNow'],
3131
+ },
3132
+ {
3133
+ id: 'meta-llama-gov',
3134
+ name: 'Llama AI Models for Government',
3135
+ vendor: 'meta',
3136
+ category: 'ai_ml',
3137
+ description: 'Open-source LLM available for government use. Various sizes from 7B to 70B+ parameters.',
3138
+ targetCustomers: ['federal', 'dod', 'defense_contractors'],
3139
+ certifications: ['None - open source', 'Self-hosted options'],
3140
+ dataResidency: ['Self-hosted capability'],
3141
+ securityConcerns: [
3142
+ 'Model weights from Meta',
3143
+ 'Unknown training data composition',
3144
+ 'Fine-tuning may leak data',
3145
+ 'Dual-use concerns for adversaries',
3146
+ ],
3147
+ accessPoints: [
3148
+ 'Model weights download',
3149
+ 'Usage telemetry (if using Meta cloud)',
3150
+ 'Research access program data',
3151
+ ],
3152
+ integrations: ['Various ML frameworks', 'Cloud platforms'],
3153
+ },
3154
+ {
3155
+ id: 'meta-whatsapp-gov',
3156
+ name: 'WhatsApp for Government Use',
3157
+ vendor: 'meta',
3158
+ category: 'communications',
3159
+ description: 'Not officially supported, but used by many government personnel worldwide.',
3160
+ targetCustomers: ['allied_nations', 'state_local'],
3161
+ certifications: ['None - consumer product'],
3162
+ dataResidency: ['Meta global infrastructure'],
3163
+ securityConcerns: [
3164
+ 'Metadata collection by Meta',
3165
+ 'Device backup defeats E2E encryption',
3166
+ 'Key distribution controlled by Meta',
3167
+ 'Business API allows message inspection',
3168
+ ],
3169
+ accessPoints: [
3170
+ 'Metadata and contact lists',
3171
+ 'Backup encryption keys',
3172
+ 'Business API access',
3173
+ 'Device registration data',
3174
+ ],
3175
+ integrations: ['Facebook', 'Instagram', 'Meta Business Suite'],
3176
+ },
3177
+ {
3178
+ id: 'meta-oculus-gov',
3179
+ name: 'Meta Quest for Enterprise/Government',
3180
+ vendor: 'meta',
3181
+ category: 'hardware',
3182
+ subcategory: 'VR/AR',
3183
+ description: 'VR headsets for training and simulation. Used by military for training programs.',
3184
+ targetCustomers: ['dod', 'federal'],
3185
+ certifications: ['Limited government certifications'],
3186
+ dataResidency: ['Meta servers'],
3187
+ knownContracts: ['Military training programs', 'VA therapy'],
3188
+ securityConcerns: [
3189
+ 'Extensive sensor data collection',
3190
+ 'Biometric data (eye tracking, movement)',
3191
+ 'Room mapping and environment capture',
3192
+ 'Required Meta/Facebook account (historically)',
3193
+ ],
3194
+ accessPoints: [
3195
+ 'VR session telemetry',
3196
+ 'Biometric data',
3197
+ 'Environment mapping',
3198
+ 'User behavior analytics',
3199
+ ],
3200
+ integrations: ['Meta Horizon', 'Unity', 'Unreal Engine'],
3201
+ },
3202
+ ];
3203
+ export const META_GOV_PROFILE = {
3204
+ vendor: 'meta',
3205
+ govDivision: 'Meta for Business / Public Sector',
3206
+ annualGovRevenue: '<$500M (estimated, smaller gov footprint)',
3207
+ fedRampStatus: ['Limited FedRAMP (Workplace only)'],
3208
+ primaryContracts: [
3209
+ 'Workplace deployments',
3210
+ 'VR training programs',
3211
+ 'Research partnerships',
3212
+ ],
3213
+ products: META_GOV_PRODUCTS,
3214
+ dataAccessCapabilities: [
3215
+ 'Workplace communications access',
3216
+ 'WhatsApp metadata',
3217
+ 'VR biometric and sensor data',
3218
+ 'Llama usage data (if cloud)',
3219
+ ],
3220
+ knownBackdoors: [
3221
+ 'Workplace admin access',
3222
+ 'WhatsApp backup access',
3223
+ 'Business API message access',
3224
+ 'Quest telemetry',
3225
+ ],
3226
+ lawEnforcementCooperation: 'Complies with legal process. Large volume of law enforcement requests. Transparency reports published. Signal protocol messaging limits access to content.',
3227
+ };
3228
+ // ─────────────────────────────────────────────────────────────────────────────
3229
+ // COMPLETE VENDOR REGISTRY
3230
+ // ─────────────────────────────────────────────────────────────────────────────
3231
+ export const GOV_DEFENSE_VENDOR_REGISTRY = [
3232
+ GOOGLE_GOV_PROFILE,
3233
+ APPLE_GOV_PROFILE,
3234
+ MICROSOFT_GOV_PROFILE,
3235
+ AMAZON_GOV_PROFILE,
3236
+ META_GOV_PROFILE,
3237
+ ];
3238
+ export const ALL_GOV_DEFENSE_PRODUCTS = [
3239
+ ...GOOGLE_GOV_PRODUCTS,
3240
+ ...APPLE_GOV_PRODUCTS,
3241
+ ...MICROSOFT_GOV_PRODUCTS,
3242
+ ...AMAZON_GOV_PRODUCTS,
3243
+ ...META_GOV_PRODUCTS,
3244
+ ];
3245
+ /**
3246
+ * Get all government products for a specific vendor.
3247
+ */
3248
+ export function getGovProductsByVendor(vendor) {
3249
+ return ALL_GOV_DEFENSE_PRODUCTS.filter(p => p.vendor === vendor);
3250
+ }
3251
+ /**
3252
+ * Get government vendor profile.
3253
+ */
3254
+ export function getGovVendorProfile(vendor) {
3255
+ return GOV_DEFENSE_VENDOR_REGISTRY.find(p => p.vendor === vendor);
3256
+ }
3257
+ /**
3258
+ * Get all products matching a category.
3259
+ */
3260
+ export function getGovProductsByCategory(category) {
3261
+ return ALL_GOV_DEFENSE_PRODUCTS.filter(p => p.category === category);
3262
+ }
3263
+ /**
3264
+ * Get all products with specific certification.
3265
+ */
3266
+ export function getGovProductsByCertification(certification) {
3267
+ return ALL_GOV_DEFENSE_PRODUCTS.filter(p => p.certifications.some(c => c.toLowerCase().includes(certification.toLowerCase())));
3268
+ }
3269
+ /**
3270
+ * Get all products targeting specific customer type.
3271
+ */
3272
+ export function getGovProductsByCustomerType(customerType) {
3273
+ return ALL_GOV_DEFENSE_PRODUCTS.filter(p => p.targetCustomers.includes(customerType));
3274
+ }
3275
+ /**
3276
+ * Get security concerns summary across all vendors.
3277
+ */
3278
+ export function getSecurityConcernsSummary() {
3279
+ const summary = {};
3280
+ for (const product of ALL_GOV_DEFENSE_PRODUCTS) {
3281
+ if (!summary[product.vendor]) {
3282
+ summary[product.vendor] = [];
3283
+ }
3284
+ for (const concern of product.securityConcerns) {
3285
+ if (!summary[product.vendor].includes(concern)) {
3286
+ summary[product.vendor].push(concern);
3287
+ }
3288
+ }
3289
+ }
3290
+ return summary;
3291
+ }
3292
+ /**
3293
+ * Get access points summary - how vendors can access government data.
3294
+ */
3295
+ export function getAccessPointsSummary() {
3296
+ const summary = {};
3297
+ for (const product of ALL_GOV_DEFENSE_PRODUCTS) {
3298
+ if (!summary[product.vendor]) {
3299
+ summary[product.vendor] = [];
3300
+ }
3301
+ for (const access of product.accessPoints) {
3302
+ if (!summary[product.vendor].includes(access)) {
3303
+ summary[product.vendor].push(access);
3304
+ }
3305
+ }
3306
+ }
3307
+ return summary;
3308
+ }
2296
3309
  // ═══════════════════════════════════════════════════════════════════════════════
2297
3310
  // EXPORTS (note: GOOGLE_GMAIL_CLAIMS and GOOGLE_CHROME_CLAIMS are already exported inline)
2298
3311
  // ═══════════════════════════════════════════════════════════════════════════════