genai-security-crosswalk 2.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (55) hide show
  1. package/LICENSE.md +28 -0
  2. package/README.md +618 -0
  3. package/data/entries/ASI01.json +911 -0
  4. package/data/entries/ASI02.json +850 -0
  5. package/data/entries/ASI03.json +854 -0
  6. package/data/entries/ASI04.json +759 -0
  7. package/data/entries/ASI05.json +764 -0
  8. package/data/entries/ASI06.json +817 -0
  9. package/data/entries/ASI07.json +789 -0
  10. package/data/entries/ASI08.json +788 -0
  11. package/data/entries/ASI09.json +754 -0
  12. package/data/entries/ASI10.json +833 -0
  13. package/data/entries/DSGAI01.json +779 -0
  14. package/data/entries/DSGAI02.json +728 -0
  15. package/data/entries/DSGAI03.json +671 -0
  16. package/data/entries/DSGAI04.json +752 -0
  17. package/data/entries/DSGAI05.json +689 -0
  18. package/data/entries/DSGAI06.json +673 -0
  19. package/data/entries/DSGAI07.json +680 -0
  20. package/data/entries/DSGAI08.json +698 -0
  21. package/data/entries/DSGAI09.json +687 -0
  22. package/data/entries/DSGAI10.json +627 -0
  23. package/data/entries/DSGAI11.json +663 -0
  24. package/data/entries/DSGAI12.json +695 -0
  25. package/data/entries/DSGAI13.json +688 -0
  26. package/data/entries/DSGAI14.json +703 -0
  27. package/data/entries/DSGAI15.json +655 -0
  28. package/data/entries/DSGAI16.json +716 -0
  29. package/data/entries/DSGAI17.json +690 -0
  30. package/data/entries/DSGAI18.json +613 -0
  31. package/data/entries/DSGAI19.json +638 -0
  32. package/data/entries/DSGAI20.json +671 -0
  33. package/data/entries/DSGAI21.json +881 -0
  34. package/data/entries/LLM01.json +975 -0
  35. package/data/entries/LLM02.json +868 -0
  36. package/data/entries/LLM03.json +817 -0
  37. package/data/entries/LLM04.json +797 -0
  38. package/data/entries/LLM05.json +761 -0
  39. package/data/entries/LLM06.json +848 -0
  40. package/data/entries/LLM07.json +749 -0
  41. package/data/entries/LLM08.json +750 -0
  42. package/data/entries/LLM09.json +760 -0
  43. package/data/entries/LLM10.json +763 -0
  44. package/data/incidents-schema.json +121 -0
  45. package/data/incidents.json +1484 -0
  46. package/data/schema.json +134 -0
  47. package/dist/index.d.ts +97 -0
  48. package/dist/index.d.ts.map +1 -0
  49. package/dist/index.js +124 -0
  50. package/dist/index.js.map +1 -0
  51. package/dist/index.test.d.ts +2 -0
  52. package/dist/index.test.d.ts.map +1 -0
  53. package/dist/index.test.js +97 -0
  54. package/dist/index.test.js.map +1 -0
  55. package/package.json +62 -0
package/LICENSE.md ADDED
@@ -0,0 +1,28 @@
1
+ Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0)
2
+
3
+ Copyright (c) 2026 emmanuelgjr
4
+
5
+ You are free to:
6
+
7
+ Share — copy and redistribute the material in any medium or format
8
+ for any purpose, even commercially.
9
+
10
+ Adapt — remix, transform, and build upon the material for any
11
+ purpose, even commercially.
12
+
13
+ Under the following terms:
14
+
15
+ Attribution — You must give appropriate credit, provide a link to
16
+ the license, and indicate if changes were made. You may do so in
17
+ any reasonable manner, but not in any way that suggests the licensor
18
+ endorses you or your use.
19
+
20
+ ShareAlike — If you remix, transform, or build upon the material,
21
+ you must distribute your contributions under the same license as
22
+ the original.
23
+
24
+ No additional restrictions — You may not apply legal terms or
25
+ technological measures that legally restrict others from doing
26
+ anything the license permits.
27
+
28
+ Full license text: https://creativecommons.org/licenses/by-sa/4.0/legalcode
package/README.md ADDED
@@ -0,0 +1,618 @@
1
+ # GenAI Security Crosswalk
2
+
3
+ [![License: CC BY-SA 4.0](https://img.shields.io/badge/License-CC%20BY--SA%204.0-lightgrey.svg)](https://creativecommons.org/licenses/by-sa/4.0/)
4
+ [![OWASP Lab](https://img.shields.io/badge/OWASP-GenAI%20Data%20Security-blue)](https://genai.owasp.org)
5
+ [![Version](https://img.shields.io/badge/version-2.0.0-green)](CHANGELOG.md)
6
+ [![Source Lists](https://img.shields.io/badge/source%20lists-3-blueviolet)](README.md)
7
+ [![Mapping Files](https://img.shields.io/badge/mapping%20files-67-brightgreen)](README.md)
8
+ [![Frameworks](https://img.shields.io/badge/frameworks-20-orange)](README.md)
9
+ [![npm](https://img.shields.io/badge/npm-%40owasp%2Fgenai--crosswalk-red)](https://www.npmjs.com/package/@owasp/genai-crosswalk)
10
+
11
+ > The most comprehensive publicly available mapping of OWASP GenAI security risks to industry frameworks — covering LLM applications, autonomous agentic AI, and GenAI data security across **20 frameworks** and **3 OWASP source lists**.
12
+
13
+ ### [Live Web App](https://emmanuelgjr.github.io/GenAI-Security-Crosswalk/) | [Score Your Coverage](https://emmanuelgjr.github.io/GenAI-Security-Crosswalk/#/score) | [Explore Entries](https://emmanuelgjr.github.io/GenAI-Security-Crosswalk/#/explorer) | [View Incidents](https://emmanuelgjr.github.io/GenAI-Security-Crosswalk/#/incidents)
14
+
15
+ Created and led by **[Emmanuel Guilherme Junior](https://github.com/emmanuelgjr)**, who leads the [OWASP GenAI Data Security Initiative](https://genai.owasp.org).
16
+
17
+ ---
18
+
19
+ ## TL;DR — What is this and what do I do?
20
+
21
+ **The problem:** You're deploying AI (LLMs, agents, RAG pipelines) and need to know which security controls apply — across EU AI Act, NIST, ISO, SOC 2, FedRAMP, DORA, and 14 more frameworks. No single document maps AI risks to all of them.
22
+
23
+ **This repo solves that.** Every OWASP GenAI vulnerability (41 total) is mapped to specific controls in 20 industry frameworks. Pick your risk, find your controls.
24
+
25
+ ### 3 ways to use it (pick one)
26
+
27
+ **1. Score your coverage in 60 seconds** (no install needed)
28
+ > Go to the **[web app](https://emmanuelgjr.github.io/GenAI-Security-Crosswalk/#/score)**, select the frameworks you implement, see your gaps instantly. Upload tool results to validate.
29
+
30
+ **2. Read the mapping file you need** (browse the repo)
31
+ > Find your framework below, click the file, read the controls. Example: deploying AI in the EU? Start with [LLM_EUAIAct.md](llm-top10/LLM_EUAIAct.md).
32
+
33
+ **3. Run the tools** (for security engineers and red-teamers)
34
+ ```bash
35
+ git clone https://github.com/emmanuelgjr/GenAI-Security-Crosswalk.git
36
+ cd GenAI-Security-Crosswalk
37
+ node scripts/compliance-report.js --framework "EU AI Act" # gap assessment
38
+ node scripts/incidents-report.js --entry LLM01 # incident analysis
39
+ node scripts/compliance-report.js --format oscal # GRC platform export
40
+ node scripts/incidents-report.js --format stix # SIEM/SOAR export
41
+ ```
42
+
43
+ ### Who is this for?
44
+
45
+ | You are... | Start here |
46
+ |---|---|
47
+ | **CISO / compliance officer** | [Score your coverage](https://emmanuelgjr.github.io/GenAI-Security-Crosswalk/#/score) → export the gap report |
48
+ | **Security engineer** | [Explorer](https://emmanuelgjr.github.io/GenAI-Security-Crosswalk/#/explorer) → search by risk, see all controls |
49
+ | **Red teamer** | [LAAF guide](evals/laaf/README.md) → run S1–S6 attack stages, map results to OWASP |
50
+ | **GRC / auditor** | `compliance-report.js --format oscal` → import into ServiceNow/Archer |
51
+ | **Developer** | `npm install @owasp/genai-crosswalk` → query risks + controls programmatically |
52
+ | **Threat intel analyst** | `incidents-report.js --format stix` → ingest 50 AI incidents into Sentinel/Splunk |
53
+
54
+ ---
55
+
56
+ ## What this repository provides
57
+
58
+ Every file answers one question: **which controls from framework X address vulnerability Y?**
59
+
60
+ | | |
61
+ |---|---|
62
+ | **3** source lists | LLM Top 10 · Agentic Top 10 · DSGAI 2026 |
63
+ | **20** frameworks | Compliance · Governance · Threat modeling · Testing · OT/ICS · Identity · Secure SDLC · Financial |
64
+ | **67** mapping files | Every source list entry × every applicable framework |
65
+ | **21** implementation recipes | Production-ready Python patterns |
66
+ | **70+** open-source tools | Catalogued and organised by function |
67
+ | **25** eval profiles | Runnable Garak (13) + PyRIT (6) + LAAF (6) tests mapped to OWASP entries |
68
+ | **20** compliance reports | Per-framework gap assessments auto-generated from data layer (MD, CSV, JSON, OSCAL) |
69
+ | **50** documented incidents | Real-world + research incidents with MAESTRO layer attribution (MD, CSV, JSON, STIX 2.1) |
70
+ | **LAAF v2.0** | First agentic LPCI red-teaming framework — fully integrated with 6-stage × OWASP crosswalk |
71
+
72
+ All free. All open-source. Built for practitioners.
73
+
74
+ ---
75
+
76
+ ## Source lists
77
+
78
+ | List | Entries | Version | Frameworks mapped |
79
+ |---|---|---|---|
80
+ | [OWASP LLM Top 10](https://genai.owasp.org/llm-top-10/) | LLM01–LLM10 | 2025 | 23 |
81
+ | [OWASP Agentic Top 10](https://genai.owasp.org/resource/owasp-top-10-for-agentic-applications-for-2026/) | ASI01–ASI10 | 2026 | 23 |
82
+ | [OWASP GenAI Data Security Risks](https://genai.owasp.org/resource/owasp-genai-data-security-risks-mitigations-2026/) | DSGAI01–DSGAI21 | 2026 | 21 |
83
+
84
+ ---
85
+
86
+ ## Framework coverage matrix
87
+
88
+ | Framework | LLM Top 10 | Agentic Top 10 | DSGAI 2026 |
89
+ |---|:---:|:---:|:---:|
90
+ | [MITRE ATLAS](https://atlas.mitre.org) | ✅ | ✅ | ✅ |
91
+ | [NIST AI RMF 1.0](https://www.nist.gov/system/files/documents/2023/01/26/AI%20RMF%201.0.pdf) | ✅ | ✅ | ✅ |
92
+ | [EU AI Act](https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32024R1689) | ✅ | ✅ | ✅ |
93
+ | [ISO/IEC 27001:2022](https://www.iso.org/standard/82875.html) | ✅ | ✅ | ✅ |
94
+ | [NIST CSF 2.0](https://www.nist.gov/cyberframework) | ✅ | ✅ | ✅ |
95
+ | [ISA/IEC 62443 — OT/ICS](https://www.isa.org/standards-and-publications/isa-standards/isa-iec-62443-series-of-standards) | ✅ | ✅ | ✅ |
96
+ | [MAESTRO — CSA](https://cloudsecurityalliance.org/blog/2025/02/06/agentic-ai-threat-modeling-framework-maestro) | ✅ | ✅ | ✅ |
97
+ | [ISO/IEC 42001:2023](https://www.iso.org/standard/81230.html) | ✅ | ✅ | ✅ |
98
+ | [CIS Controls v8.1](https://www.cisecurity.org/controls) | ✅ | ✅ | ✅ |
99
+ | [OWASP ASVS 4.0.3](https://owasp.org/www-project-application-security-verification-standard/) | ✅ | ✅ | ✅ |
100
+ | [SOC 2 Trust Services Criteria](https://www.aicpa-cima.com/resources/landing/2017-trust-services-criteria) | ✅ | ✅ | ✅ |
101
+ | [PCI DSS v4.0](https://www.pcisecuritystandards.org/document_library/) | ✅ | ✅ | ✅ |
102
+ | [ENISA Multilayer Framework](https://www.enisa.europa.eu/publications/multilayer-framework-for-good-cybersecurity-practices-for-ai) | ✅ | ✅ | ✅ |
103
+ | [OWASP SAMM v2.0](https://owaspsamm.org/) | ✅ | ✅ | ✅ |
104
+ | [NIST SP 800-82 Rev 3 — OT/ICS](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r3.pdf) | ✅ | ✅ | ✅ |
105
+ | [AIUC-1](https://www.aiuc-1.com) | ✅ | ✅ | ✅ |
106
+ | [OWASP NHI Top 10](https://owasp.org/www-project-non-human-identities-top-10/) | ✅ | ✅ | ✅ |
107
+ | [NIST SP 800-218A](https://doi.org/10.6028/NIST.SP.800-218A.ipd) | ✅ | ✅ | ✅ |
108
+ | [FedRAMP](https://www.fedramp.gov/) | ✅ | ✅ | ✅ |
109
+ | [DORA (EU 2022/2554)](https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32022R2554) | ✅ | ✅ | ✅ |
110
+
111
+ ---
112
+
113
+ ## All mapping files
114
+
115
+ ### LLM Top 10 2025 — 23 framework mappings
116
+
117
+ | File | Framework | Standout content |
118
+ |---|---|---|
119
+ | [LLM_MITREATLAS.md](llm-top10/LLM_MITREATLAS.md) | MITRE ATLAS | Adversarial technique mapping with real-world incident references |
120
+ | [LLM_NISTAIRMF.md](llm-top10/LLM_NISTAIRMF.md) | NIST AI RMF 1.0 | GOVERN/MAP/MEASURE/MANAGE per vulnerability with AI RMF profile |
121
+ | [LLM_EUAIAct.md](llm-top10/LLM_EUAIAct.md) | EU AI Act | Article-level obligations, fines exposure, August 2026 compliance checklist |
122
+ | [LLM_ISO27001.md](llm-top10/LLM_ISO27001.md) | ISO/IEC 27001:2022 | ISMS extension checklist, 2022 new controls mapped to LLM risks |
123
+ | [LLM_ISO42001.md](llm-top10/LLM_ISO42001.md) | ISO/IEC 42001:2023 | AIMS implementation checklist, ISO 27001 integration guidance |
124
+ | [LLM_CISControls.md](llm-top10/LLM_CISControls.md) | CIS Controls v8.1 | IG1/IG2/IG3 tiered safeguards per vulnerability |
125
+ | [LLM_ASVS.md](llm-top10/LLM_ASVS.md) | OWASP ASVS 4.0.3 | L1/L2/L3 verification requirements with ASVS checklist |
126
+ | [LLM_ISA62443.md](llm-top10/LLM_ISA62443.md) | ISA/IEC 62443 — OT/ICS | Zone model, SL ratings, FR/SR references, OT deployment checklist |
127
+ | [LLM_NISTSP80082.md](llm-top10/LLM_NISTSP80082.md) | NIST SP 800-82 Rev 3 | SP 800-53 controls, US regulatory crosswalk (NERC CIP, AWIA, CMMC) |
128
+ | [LLM_NISTCSF2.md](llm-top10/LLM_NISTCSF2.md) | NIST CSF 2.0 | Six-function mapping including new GOVERN function, CSF 2.0 profile |
129
+ | [LLM_SOC2.md](llm-top10/LLM_SOC2.md) | SOC 2 Trust Services Criteria | TSC mapping for SaaS and cloud LLM deployments |
130
+ | [LLM_PCIDSS.md](llm-top10/LLM_PCIDSS.md) | PCI DSS v4.0 | CHD scope guidance, Req 3/6/7/10/11/12 per vulnerability |
131
+ | [LLM_ENISA.md](llm-top10/LLM_ENISA.md) | ENISA Multilayer Framework | L1/L2/L3 layer mapping, EU AI Act and NIS2 alignment table |
132
+ | [LLM_SAMM.md](llm-top10/LLM_SAMM.md) | OWASP SAMM v2.0 | L1–L3 maturity roadmap per vulnerability with fillable scorecard |
133
+ | [LLM_STRIDE.md](llm-top10/LLM_STRIDE.md) | STRIDE | Six-category threat model per LLM entry with DFD integration guidance |
134
+ | [LLM_CWE_CVE.md](llm-top10/LLM_CWE_CVE.md) | CWE / CVE | CWE root cause taxonomy and confirmed CVE evidence table per entry |
135
+ | [LLM_AITG.md](llm-top10/LLM_AITG.md) | OWASP AI Testing Guide | Structured test cases per LLM entry with pass criteria and CI/CD integration guidance |
136
+ | [LLM_MAESTRO.md](llm-top10/LLM_MAESTRO.md) | MAESTRO | Seven-layer architectural threat model, layer-to-LLM mapping, 90-minute threat modeling session guide |
137
+ | [LLM_AIUC1.md](llm-top10/LLM_AIUC1.md) | AIUC-1 | Six-domain control mapping for LLM deployments — certification readiness checklist |
138
+ | [LLM_NHI.md](llm-top10/LLM_NHI.md) | OWASP NHI Top 10 | Credential and identity controls per LLM entry — NHI programme maturity table |
139
+ | [LLM_SP800218A.md](llm-top10/LLM_SP800218A.md) | NIST SP 800-218A | Secure AI SDLC practices — PW/PS/RV practice mapping per LLM entry |
140
+ | [LLM_FedRAMP.md](llm-top10/LLM_FedRAMP.md) | FedRAMP | SP 800-53 AI overlay — AC/AU/CA/CM/IA/IR/RA/SA/SC/SI/SR control families |
141
+ | [LLM_DORA.md](llm-top10/LLM_DORA.md) | DORA | EU financial sector resilience — Art. 5–45 per LLM entry |
142
+
143
+ ### Agentic Top 10 2026 — 23 framework mappings
144
+
145
+ | File | Framework | Standout content |
146
+ |---|---|---|
147
+ | [Agentic_AIUC1.md](agentic-top10/Agentic_AIUC1.md) | AIUC-1 | Agentic AI governance certification control mapping |
148
+ | [Agentic_MITREATLAS.md](agentic-top10/Agentic_MITREATLAS.md) | MITRE ATLAS | Agentic technique chaining, OT amplifiers per entry |
149
+ | [Agentic_NISTAIRMF.md](agentic-top10/Agentic_NISTAIRMF.md) | NIST AI RMF 1.0 | Autonomy policy anchoring in GV-1.7, agentic AI RMF profile |
150
+ | [Agentic_EUAIAct.md](agentic-top10/Agentic_EUAIAct.md) | EU AI Act | Art. 14 human oversight per entry, autonomy premium fines analysis |
151
+ | [Agentic_ISO27001.md](agentic-top10/Agentic_ISO27001.md) | ISO/IEC 27001:2022 | ISMS extension checklist for agentic deployments, NHI as A.8.2 |
152
+ | [Agentic_ISO42001.md](agentic-top10/Agentic_ISO42001.md) | ISO/IEC 42001:2023 | A.5.2 impact assessment per entry, EU AI Act alignment table |
153
+ | [Agentic_NISTCSF2.md](agentic-top10/Agentic_NISTCSF2.md) | NIST CSF 2.0 | GOVERN-first autonomy policy mapping, agentic CSF 2.0 profile |
154
+ | [Agentic_ISA62443.md](agentic-top10/Agentic_ISA62443.md) | ISA/IEC 62443 — OT/ICS | Agentic OT zone model, kill switch design, SL uplift table |
155
+ | [Agentic_MAESTRO.md](agentic-top10/Agentic_MAESTRO.md) | MAESTRO — CSA | Seven-layer architectural threat model, layer-to-ASI mapping, session guide |
156
+ | [Agentic_OWASP_NHI.md](agentic-top10/Agentic_OWASP_NHI.md) | OWASP NHI Top 10 | Full NHI-to-ASI cross-mapping, NHI programme maturity table |
157
+ | [Agentic_CISControls.md](agentic-top10/Agentic_CISControls.md) | CIS Controls v8.1 | IG1/IG2/IG3 safeguards, agentic NHI treated as CIS 5 privileged access |
158
+ | [Agentic_ASVS.md](agentic-top10/Agentic_ASVS.md) | OWASP ASVS 4.0.3 | L1/L2/L3 verification checklist for agentic deployments |
159
+ | [Agentic_AITG.md](agentic-top10/Agentic_AITG.md) | OWASP AI Testing Guide | 50 structured test cases across ASI01–ASI10 with pre-deployment gates |
160
+ | [Agentic_AIVSS.md](agentic-top10/Agentic_AIVSS.md) | OWASP AIVSS | Dual-scenario scoring (supervised vs autonomous), +1.79 autonomy premium |
161
+ | [Agentic_ENISA.md](agentic-top10/Agentic_ENISA.md) | ENISA Multilayer Framework | L1/L2/L3 layer mapping, EU AI Act Art. 14/15/52 alignment, NIS2 Article 23 incident assessment guidance |
162
+ | [Agentic_SOC2.md](agentic-top10/Agentic_SOC2.md) | SOC 2 Trust Services Criteria | TSC mapping for agentic AI — autonomous action scope, processing integrity, supply chain criteria |
163
+ | [Agentic_PCIDSS.md](agentic-top10/Agentic_PCIDSS.md) | PCI DSS v4.0 | PCI audit guidance for agents with tool access to payment systems, Req 6/7/8/10/11/12 per entry |
164
+ | [Agentic_SAMM.md](agentic-top10/Agentic_SAMM.md) | OWASP SAMM v2.0 | L1–L3 maturity scorecard for agentic AI — pre-deployment gates and programme maturity roadmap |
165
+ | [Agentic_NISTSP80082.md](agentic-top10/Agentic_NISTSP80082.md) | NIST SP 800-82 Rev 3 | OT agent placement, SP 800-53 controls, U.S. regulatory crosswalk (NERC CIP, AWIA, CMMC) |
166
+ | [Agentic_SP800218A.md](agentic-top10/Agentic_SP800218A.md) | NIST SP 800-218A | Secure agentic SDLC — tool access, memory integrity, multi-agent pipeline practices |
167
+ | [Agentic_FedRAMP.md](agentic-top10/Agentic_FedRAMP.md) | FedRAMP | Federal agentic AI authorization — agent identity, tool access, cascade controls |
168
+ | [Agentic_DORA.md](agentic-top10/Agentic_DORA.md) | DORA | Financial sector agentic resilience — incident reporting, third-party agent risk |
169
+
170
+ > **Also in this folder:** [Agentic_CWE_CVE.md](agentic-top10/Agentic_CWE_CVE.md) — CWE root cause taxonomy, confirmed CVEs, full CWE cross-reference index.
171
+
172
+ ### DSGAI 2026 — 21 framework mappings
173
+
174
+ | File | Framework | Standout content |
175
+ |---|---|---|
176
+ | [DSGAI_ISO27001.md](dsgai-2026/DSGAI_ISO27001.md) | ISO/IEC 27001:2022 | ISMS extension covering all 21 DSGAI entries |
177
+ | [DSGAI_NISTAIRMF.md](dsgai-2026/DSGAI_NISTAIRMF.md) | NIST AI RMF 1.0 | GOVERN/MAP/MEASURE/MANAGE per DSGAI entry with data security profile |
178
+ | [DSGAI_EUAIAct.md](dsgai-2026/DSGAI_EUAIAct.md) | EU AI Act | Article-level obligations per entry, GPAI vs high-risk AI scope |
179
+ | [DSGAI_NISTCSF2.md](dsgai-2026/DSGAI_NISTCSF2.md) | NIST CSF 2.0 | Six-function mapping for all 21 entries, GenAI data security profile |
180
+ | [DSGAI_MITREATLAS.md](dsgai-2026/DSGAI_MITREATLAS.md) | MITRE ATLAS | Adversarial technique mapping, four complete attack path chains |
181
+ | [DSGAI_ISA62443.md](dsgai-2026/DSGAI_ISA62443.md) | ISA/IEC 62443 — OT/ICS | OT threat scenarios per entry, SL ratings, full OT checklist |
182
+ | [DSGAI_MAESTRO.md](dsgai-2026/DSGAI_MAESTRO.md) | MAESTRO — CSA | Layer-origin analysis for all 21 entries, L2 data operations as 52% of DSGAI threat surface |
183
+ | [DSGAI_SOC2.md](dsgai-2026/DSGAI_SOC2.md) | SOC 2 Trust Services Criteria | TSC mapping for SaaS and cloud GenAI deployments |
184
+ | [DSGAI_PCIDSS.md](dsgai-2026/DSGAI_PCIDSS.md) | PCI DSS v4.0 | CHD scope guidance, PCI audit checklist for GenAI data |
185
+ | [DSGAI_ASVS.md](dsgai-2026/DSGAI_ASVS.md) | OWASP ASVS 4.0.3 | L1/L2/L3 verification requirements for all 21 DSGAI entries, 4-phase implementation priority |
186
+ | [DSGAI_CISControls.md](dsgai-2026/DSGAI_CISControls.md) | CIS Controls v8.1 | IG1/IG2/IG3 safeguards for all 21 entries, GenAI data security implementation groups |
187
+ | [DSGAI_CWE_CVE.md](dsgai-2026/DSGAI_CWE_CVE.md) | CWE / CVE | CWE root cause taxonomy and confirmed CVE evidence for all 21 DSGAI entries |
188
+ | [DSGAI_ENISA.md](dsgai-2026/DSGAI_ENISA.md) | ENISA Multilayer Framework | L1/L2/L3 layer mapping, EU AI Act and NIS2 alignment for all 21 DSGAI entries |
189
+ | [DSGAI_ISO42001.md](dsgai-2026/DSGAI_ISO42001.md) | ISO/IEC 42001:2023 | AIMS controls per DSGAI entry, ISO 27001 integration guidance, A.7 data governance reference |
190
+ | [DSGAI_SAMM.md](dsgai-2026/DSGAI_SAMM.md) | OWASP SAMM v2.0 | L1–L3 maturity scorecard for GenAI data security — GDPR and regulatory compliance baseline |
191
+ | [DSGAI_NISTSP80082.md](dsgai-2026/DSGAI_NISTSP80082.md) | NIST SP 800-82 Rev 3 | OT data placement, SP 800-53 controls per DSGAI entry, NERC CIP/FISMA/CMMC crosswalk |
192
+ | [DSGAI_AIUC1.md](dsgai-2026/DSGAI_AIUC1.md) | AIUC-1 | Domain A (Data & Privacy) covers 50%+ of DSGAI entries — certification readiness table |
193
+ | [DSGAI_NHI.md](dsgai-2026/DSGAI_NHI.md) | OWASP NHI Top 10 | NHI as enabling condition for DSGAI risks — NHI programme maturity table for GenAI data |
194
+ | [DSGAI_SP800218A.md](dsgai-2026/DSGAI_SP800218A.md) | NIST SP 800-218A | Secure GenAI data SDLC — training data protection, data governance, provenance practices |
195
+ | [DSGAI_FedRAMP.md](dsgai-2026/DSGAI_FedRAMP.md) | FedRAMP | Federal data security controls — SC-28 data at rest, AU-2 logging, SR supply chain |
196
+ | [DSGAI_DORA.md](dsgai-2026/DSGAI_DORA.md) | DORA | Financial data resilience — Art. 8 asset inventory, Art. 12 backup, Art. 28-44 vendor risk |
197
+
198
+ ### Shared resources
199
+
200
+ | File | Contents |
201
+ |---|---|
202
+ | [shared/RECIPES.md](shared/RECIPES.md) | 21 security implementation patterns with working Python — RAG, MCP, OT, Agentic, Data Pipeline |
203
+ | [shared/TOOLS.md](shared/TOOLS.md) | 70+ open-source security tools organised by function |
204
+ | [shared/GLOSSARY.md](shared/GLOSSARY.md) | Unified terminology across LLM, ASI, and DSGAI source lists |
205
+ | [shared/SEVERITY.md](shared/SEVERITY.md) | Severity definitions and AIVSS alignment |
206
+ | [shared/TEMPLATE.md](shared/TEMPLATE.md) | Canonical template for new mapping file contributors |
207
+
208
+ ---
209
+
210
+ ## Repository structure
211
+
212
+ ```text
213
+ GenAI-Security-Crosswalk/
214
+
215
+ ├── README.md
216
+ ├── CROSSREF.md ← Master cross-reference: LLM ↔ ASI ↔ DSGAI
217
+ ├── CONTRIBUTING.md
218
+ ├── CHANGELOG.md
219
+ ├── GOVERNANCE.md ← Maintainer roles, PR SLOs, decision process
220
+ ├── SECURITY.md
221
+ ├── CODE_OF_CONDUCT.md
222
+ ├── package.json ← npm: @owasp/genai-crosswalk (node ≥18)
223
+ ├── tsconfig.json ← TypeScript config
224
+
225
+ ├── src/ ← npm package source (TypeScript)
226
+ │ ├── index.ts ← Typed API: getEntry, getFramework, searchEntries
227
+ │ └── index.test.ts ← 12 smoke tests (Node.js built-in runner)
228
+
229
+ ├── llm-top10/ ← LLM01–LLM10 × 23 frameworks
230
+ │ ├── LLM_MITREATLAS.md
231
+ │ ├── LLM_NISTAIRMF.md
232
+ │ ├── LLM_EUAIAct.md
233
+ │ ├── LLM_ISO27001.md
234
+ │ ├── LLM_ISO42001.md
235
+ │ ├── LLM_CISControls.md
236
+ │ ├── LLM_ASVS.md
237
+ │ ├── LLM_ISA62443.md ← OT/ICS
238
+ │ ├── LLM_NISTSP80082.md ← OT/ICS
239
+ │ ├── LLM_NISTCSF2.md
240
+ │ ├── LLM_SOC2.md
241
+ │ ├── LLM_PCIDSS.md
242
+ │ ├── LLM_ENISA.md ← EU / NIS2
243
+ │ ├── LLM_SAMM.md ← Maturity model
244
+ │ ├── LLM_STRIDE.md ← Threat modeling
245
+ │ ├── LLM_CWE_CVE.md ← Root cause taxonomy + CVEs
246
+ │ ├── LLM_AITG.md ← AI Testing Guide
247
+ │ ├── LLM_MAESTRO.md ← MAESTRO seven-layer threat model
248
+ │ ├── LLM_AIUC1.md ← AIUC-1 certification framework
249
+ │ ├── LLM_NHI.md ← Non-Human Identity controls
250
+ │ ├── LLM_SP800218A.md ← Secure AI SDLC (SSDF extension)
251
+ │ ├── LLM_FedRAMP.md ← US federal cloud AI (SP 800-53 overlay)
252
+ │ └── LLM_DORA.md ← EU financial sector resilience
253
+
254
+ ├── agentic-top10/ ← ASI01–ASI10 × 23 frameworks
255
+ │ ├── Agentic_AIUC1.md
256
+ │ ├── Agentic_MITREATLAS.md
257
+ │ ├── Agentic_NISTAIRMF.md
258
+ │ ├── Agentic_EUAIAct.md
259
+ │ ├── Agentic_ISO27001.md
260
+ │ ├── Agentic_ISO42001.md
261
+ │ ├── Agentic_NISTCSF2.md
262
+ │ ├── Agentic_ISA62443.md ← OT/ICS
263
+ │ ├── Agentic_MAESTRO.md ← Threat modeling — 7-layer architecture
264
+ │ ├── Agentic_OWASP_NHI.md ← Non-Human Identity
265
+ │ ├── Agentic_CISControls.md
266
+ │ ├── Agentic_ASVS.md
267
+ │ ├── Agentic_AITG.md ← AI Testing Guide — 50 test cases
268
+ │ ├── Agentic_AIVSS.md ← Risk scoring — autonomy premium
269
+ │ ├── Agentic_CWE_CVE.md ← CWE taxonomy + confirmed CVEs
270
+ │ ├── Agentic_ENISA.md ← EU / NIS2
271
+ │ ├── Agentic_SOC2.md ← SOC 2 TSC — agentic AI audit
272
+ │ ├── Agentic_PCIDSS.md ← PCI DSS v4.0 — payment system agents
273
+ │ ├── Agentic_SAMM.md ← Maturity model — pre-deployment gates
274
+ │ ├── Agentic_NISTSP80082.md ← OT/ICS — U.S. regulatory alignment
275
+ │ ├── Agentic_SP800218A.md ← Secure agentic SDLC
276
+ │ ├── Agentic_FedRAMP.md ← Federal agentic AI authorization
277
+ │ └── Agentic_DORA.md ← Financial sector agentic resilience
278
+
279
+ ├── dsgai-2026/ ← DSGAI01–DSGAI21 × 21 frameworks
280
+ │ ├── DSGAI_ISO27001.md
281
+ │ ├── DSGAI_NISTAIRMF.md
282
+ │ ├── DSGAI_EUAIAct.md
283
+ │ ├── DSGAI_NISTCSF2.md
284
+ │ ├── DSGAI_MITREATLAS.md
285
+ │ ├── DSGAI_ISA62443.md ← OT/ICS
286
+ │ ├── DSGAI_MAESTRO.md ← Threat modeling — data operations lens
287
+ │ ├── DSGAI_SOC2.md
288
+ │ ├── DSGAI_PCIDSS.md
289
+ │ ├── DSGAI_ASVS.md ← OWASP ASVS 4.0.3
290
+ │ ├── DSGAI_CISControls.md ← CIS Controls v8.1
291
+ │ ├── DSGAI_CWE_CVE.md ← Root cause taxonomy + CVEs
292
+ │ ├── DSGAI_ENISA.md ← EU / NIS2
293
+ │ ├── DSGAI_ISO42001.md ← AI management system
294
+ │ ├── DSGAI_SAMM.md ← Maturity model — data security programme
295
+ │ ├── DSGAI_NISTSP80082.md ← OT/ICS — U.S. regulatory alignment
296
+ │ ├── DSGAI_AIUC1.md ← AIUC-1 certification framework
297
+ │ ├── DSGAI_NHI.md ← Non-Human Identity — data pipeline credentials
298
+ │ ├── DSGAI_SP800218A.md ← Secure GenAI data SDLC
299
+ │ ├── DSGAI_FedRAMP.md ← Federal data security controls
300
+ │ └── DSGAI_DORA.md ← Financial data resilience
301
+
302
+ ├── shared/
303
+ │ ├── RECIPES.md ← 21 implementation patterns (Python code)
304
+ │ ├── TOOLS.md ← 70+ open-source tools catalogue
305
+ │ ├── GLOSSARY.md ← Unified terminology
306
+ │ ├── SEVERITY.md ← Severity definitions + AIVSS alignment
307
+ │ └── TEMPLATE.md ← Canonical template for new mapping files
308
+
309
+ ├── data/
310
+ │ ├── schema.json ← JSON Schema (Draft 7) for entry files
311
+ │ ├── incidents.json ← 50 incidents with MAESTRO layer attribution
312
+ │ ├── incidents-schema.json ← JSON Schema for incidents
313
+ │ ├── tools-supplement.json ← Supplemental tools merged at generation time
314
+ │ ├── entries/ ← 41 machine-readable entry JSON files
315
+ │ └── README.md ← Data layer docs, jq query examples
316
+
317
+ ├── scripts/
318
+ │ ├── validate.js ← Content validator (sections, links, counts)
319
+ │ ├── generate.js ← Markdown-to-JSON parser → data/entries/
320
+ │ ├── compliance-report.js ← Gap assessment generator (MD/CSV/JSON/OSCAL)
321
+ │ ├── incidents-report.js ← Incident query tool (MD/CSV/JSON/STIX 2.1)
322
+ │ ├── query.js ← CLI query interface (replaces jq)
323
+ │ ├── watch.js ← External source watcher (OWASP/arXiv/NVD/frameworks)
324
+ │ └── sbom-inventory.js ← Content-level CycloneDX SBOM generator
325
+
326
+ ├── evals/
327
+ │ ├── README.md ← Setup guide and result interpretation
328
+ │ ├── garak/ ← 7 YAML profiles (LLM01/02/04/07/09, ASI01/05)
329
+ │ ├── pyrit/ ← 3 async Python scripts (LLM01, DSGAI04, ASI01)
330
+ │ ├── laaf/ ← LAAF v2.0 LPCI suite (S1–S6 + crosswalk reporter)
331
+ │ └── ci/ ← github-action.yml — drop-in CI/CD template
332
+
333
+ ├── .github/workflows/
334
+ │ ├── validate.yml ← CI validation on PR
335
+ │ ├── link-check.yml ← Broken link detection
336
+ │ ├── markdown-lint.yml ← Markdown linting
337
+ │ ├── weekly-watch.yml ← Weekly source monitoring + monthly regeneration
338
+ │ └── sbom.yml ← CycloneDX SBOM on release tags
339
+
340
+ └── i18n/
341
+ ├── WORKFLOW.md ← Translation contributor guide
342
+ ├── es/README.md ← Spanish seed (machine-assisted)
343
+ ├── ja/README.md ← Japanese seed (machine-assisted)
344
+ ├── de/README.md ← German seed (machine-assisted)
345
+ ├── fr/ ← French (accepting PRs)
346
+ └── pt/ ← Portuguese (accepting PRs)
347
+ ```
348
+
349
+ ---
350
+
351
+ ## Compliance gap reports
352
+
353
+ Generate framework-specific gap assessments from the data layer in seconds:
354
+
355
+ ```bash
356
+ node scripts/compliance-report.js # all 20 frameworks → reports/
357
+ node scripts/compliance-report.js --framework "EU AI Act" # one framework
358
+ node scripts/compliance-report.js --format csv # Excel-compatible
359
+ node scripts/compliance-report.js --format json # machine-readable
360
+ node scripts/compliance-report.js --list-frameworks # see all options
361
+ ```
362
+
363
+ Each report includes: executive summary, coverage matrix (OWASP entries × controls), per-control detail with notes, and a prioritised action plan.
364
+
365
+ ## LAAF v2.0 — LPCI red-teaming
366
+
367
+ [LAAF v2.0](https://github.com/qorvexconsulting1/laaf-V2.0) is integrated as the third evaluation framework alongside Garak and PyRIT. It covers the attack surface that surface-level injection tests miss: memory persistence, layered encoding, semantic reframing, and 6-stage lifecycle attacks.
368
+
369
+ ```bash
370
+ pip install git+https://github.com/qorvexconsulting1/laaf-V2.0.git
371
+ export OPENAI_API_KEY=sk-...
372
+ bash evals/laaf/run_laaf.sh # S1–S6 full suite
373
+ laaf scan --target mock --dry-run # No API key needed
374
+ ```
375
+
376
+ | LAAF Stage | OWASP | Threshold |
377
+ |---|---|---|
378
+ | S1 Reconnaissance | LLM07, LLM01 | 0% |
379
+ | S2 Logic-Layer Injection | LLM01, ASI01, DSGAI04 | 5% |
380
+ | S3 Trigger Execution | ASI01, ASI06, LLM06 | 0% |
381
+ | S4 Persistence | ASI06, LLM06, DSGAI04 | 0% |
382
+ | S5 Evasion | LLM01, LLM02 | 10% |
383
+ | S6 Trace Tampering | DSGAI01, LLM07 | 0% |
384
+
385
+ See `evals/laaf/README.md` for the full LPCI attack vector → OWASP → MAESTRO crosswalk.
386
+
387
+ ---
388
+
389
+ ## Incident tracker
390
+
391
+ 50 real-world and research-demonstrated incidents, each mapped to OWASP entries and MAESTRO architectural layers:
392
+
393
+ ```bash
394
+ node scripts/incidents-report.js # all incidents → reports/incidents.md
395
+ node scripts/incidents-report.js --entry LLM01 # incidents for a specific entry
396
+ node scripts/incidents-report.js --layer L3 # incidents implicating Agent Frameworks
397
+ node scripts/incidents-report.js --category real-world
398
+ node scripts/incidents-report.js --format csv # Excel export
399
+ node scripts/incidents-report.js --format stix # STIX 2.1 bundle for Sentinel/Splunk
400
+ ```
401
+
402
+ MAESTRO layer roles tracked per incident: **Origin** (where attack starts) · **Propagation** (how it spreads) · **Impact** (where harm manifests) · **Blind-spot** (where detection failed).
403
+
404
+ ### Web app — interactive dashboard
405
+
406
+ **https://emmanuelgjr.github.io/GenAI-Security-Crosswalk/**
407
+
408
+ No install required. Works on desktop and mobile.
409
+
410
+ | Page | What it does |
411
+ |------|-------------|
412
+ | [**Score**](https://emmanuelgjr.github.io/GenAI-Security-Crosswalk/#/score) | Select your frameworks, see coverage gaps. Upload Garak/PyRIT/LAAF results to validate. Share your score card on LinkedIn. |
413
+ | [**Explorer**](https://emmanuelgjr.github.io/GenAI-Security-Crosswalk/#/explorer) | Search and filter all 41 entries. Click any entry to see controls across all 20 frameworks. |
414
+ | [**Frameworks**](https://emmanuelgjr.github.io/GenAI-Security-Crosswalk/#/frameworks) | Interactive 41×23 coverage matrix. Click any cell to see the specific controls mapped. |
415
+ | [**Incidents**](https://emmanuelgjr.github.io/GenAI-Security-Crosswalk/#/incidents) | Browse 50 AI security incidents. Filter by severity, year, MAESTRO layer. Full attribution details. |
416
+
417
+ **Evidence-based scoring** — three validation tiers:
418
+ - **Self-Assessed** — checkbox only (unvalidated)
419
+ - **Partially Validated** — some tool outputs uploaded
420
+ - **Tool-Validated** — 20+ entries backed by Garak/PyRIT/LAAF/compliance report evidence
421
+
422
+ ### Enterprise export formats
423
+
424
+ ```bash
425
+ # STIX 2.1 bundle — ingest into Splunk ES, Microsoft Sentinel, TAXII feeds
426
+ node scripts/incidents-report.js --format stix
427
+
428
+ # OSCAL 1.1.2 Component Definition — ingest into ServiceNow, Archer, XACTA
429
+ node scripts/compliance-report.js --framework "EU AI Act" --format oscal
430
+ ```
431
+
432
+ ### Automated source monitoring
433
+
434
+ ```bash
435
+ node scripts/watch.js # check OWASP repos, arXiv, NVD, framework pages
436
+ node scripts/watch.js --dry-run # preview findings without opening issues
437
+ node scripts/watch.js --watcher arxiv # run single watcher
438
+ ```
439
+
440
+ Weekly GitHub Actions cron (`.github/workflows/weekly-watch.yml`) runs all 4 watchers and opens labeled issues automatically.
441
+
442
+ ### npm package
443
+
444
+ ```bash
445
+ npm install @owasp/genai-crosswalk
446
+ ```
447
+
448
+ ```typescript
449
+ import { getEntry, getFramework, searchEntries, incidents } from '@owasp/genai-crosswalk';
450
+
451
+ const llm01 = getEntry('LLM01'); // typed Entry object
452
+ const euai = getFramework('EU AI Act'); // { framework, entries, controls }
453
+ const hits = searchEntries('injection'); // Entry[]
454
+ const incs = incidents; // 50 Incident[] with MAESTRO layers
455
+ ```
456
+
457
+ Full TypeScript types included for all data structures.
458
+
459
+ ---
460
+
461
+ ## Start here — by role
462
+
463
+ Find your entry point in under 60 seconds.
464
+
465
+ **I need to comply with EU AI Act before August 2026**
466
+ → Start: [LLM_EUAIAct.md](llm-top10/LLM_EUAIAct.md) — article-level obligations, fines exposure, compliance checklist
467
+ → Then: [Agentic_EUAIAct.md](agentic-top10/Agentic_EUAIAct.md) if you deploy autonomous agents (Art. 14 human oversight)
468
+ → Then: [DSGAI_EUAIAct.md](dsgai-2026/DSGAI_EUAIAct.md) for GPAI model scope and data governance obligations
469
+
470
+ **I am deploying an autonomous AI agent and need to know what can go wrong**
471
+ → Start: [CROSSREF.md](CROSSREF.md) — master cross-reference across all 41 vulnerability IDs
472
+ → Then: [Agentic_MAESTRO.md](agentic-top10/Agentic_MAESTRO.md) — architectural threat model (where does each risk originate?)
473
+ → Then: [Agentic_AIVSS.md](agentic-top10/Agentic_AIVSS.md) — score each risk; autonomy adds +1.79 avg severity
474
+ → Then: [Agentic_OWASP_NHI.md](agentic-top10/Agentic_OWASP_NHI.md) — identity and credential controls
475
+
476
+ **I am a SOC 2 auditor or GRC professional preparing a GenAI controls assessment**
477
+ → Start: [LLM_SOC2.md](llm-top10/LLM_SOC2.md) — TSC mapping for SaaS/cloud LLM deployments
478
+ → Then: [Agentic_SOC2.md](agentic-top10/Agentic_SOC2.md) — autonomous action scope, processing integrity criteria
479
+ → Then: [LLM_SAMM.md](llm-top10/LLM_SAMM.md) — fillable SAMM maturity scorecard to evidence programme completeness
480
+
481
+ **I am an AppSec engineer or red-teamer building a test plan**
482
+ → Start: [Agentic_AITG.md](agentic-top10/Agentic_AITG.md) — 50 structured test cases with pass criteria and CI/CD gates
483
+ → Then: [DSGAI_MITREATLAS.md](dsgai-2026/DSGAI_MITREATLAS.md) — attacker TTP mapping with four complete attack chains
484
+ → Then: [shared/RECIPES.md](shared/RECIPES.md) — 21 working Python patterns to implement the controls you test against
485
+
486
+ **I am a US federal contractor needing FedRAMP authorization for AI services**
487
+ → Start: [LLM_FedRAMP.md](llm-top10/LLM_FedRAMP.md) — SP 800-53 AI overlay controls (AC/AU/CA/CM/IA/IR/RA/SA/SC/SI/SR)
488
+ → Then: [Agentic_FedRAMP.md](agentic-top10/Agentic_FedRAMP.md) for agentic AI agent identity and cascade controls
489
+ → Then: [DSGAI_FedRAMP.md](dsgai-2026/DSGAI_FedRAMP.md) for data security controls (SC-28, AU-2, SR)
490
+
491
+ **I work in EU financial services and need DORA compliance for AI systems**
492
+ → Start: [LLM_DORA.md](llm-top10/LLM_DORA.md) — Art. 5–45 per LLM risk, incident reporting requirements
493
+ → Then: [Agentic_DORA.md](agentic-top10/Agentic_DORA.md) for third-party agent risk (Art. 28–44)
494
+ → Then: [DSGAI_DORA.md](dsgai-2026/DSGAI_DORA.md) for data resilience and backup (Art. 8, Art. 12)
495
+
496
+ **I am securing AI deployed in OT/ICS environments (energy, utilities, manufacturing)**
497
+ → Start: [Agentic_NISTSP80082.md](agentic-top10/Agentic_NISTSP80082.md) — OT zone model, SP 800-53 controls, NERC CIP/AWIA/CMMC crosswalk
498
+ → Then: [Agentic_ISA62443.md](agentic-top10/Agentic_ISA62443.md) — SL ratings, zone model, kill switch design
499
+ → Then: [DSGAI_ISA62443.md](dsgai-2026/DSGAI_ISA62443.md) — RAG corpus poisoning in OT (safety procedure manipulation scenario)
500
+
501
+ ---
502
+
503
+ ## Quick navigation
504
+
505
+ **EU AI Act compliance by August 2026**
506
+ → [LLM_EUAIAct.md](llm-top10/LLM_EUAIAct.md) · [Agentic_EUAIAct.md](agentic-top10/Agentic_EUAIAct.md) · [DSGAI_EUAIAct.md](dsgai-2026/DSGAI_EUAIAct.md)
507
+
508
+ **European organisation subject to NIS2**
509
+ → [LLM_ENISA.md](llm-top10/LLM_ENISA.md) — ENISA framework with NIS2 Article 23 incident assessment guidance
510
+
511
+ **AI in OT/ICS environments**
512
+ → [LLM_ISA62443.md](llm-top10/LLM_ISA62443.md) · [Agentic_ISA62443.md](agentic-top10/Agentic_ISA62443.md) · [DSGAI_ISA62443.md](dsgai-2026/DSGAI_ISA62443.md) · [LLM_NISTSP80082.md](llm-top10/LLM_NISTSP80082.md)
513
+
514
+ **Deploying autonomous agents**
515
+ → [Agentic_OWASP_NHI.md](agentic-top10/Agentic_OWASP_NHI.md) — identity governance
516
+ → [Agentic_AIUC1.md](agentic-top10/Agentic_AIUC1.md) — agentic governance certification
517
+ → [Agentic_AIVSS.md](agentic-top10/Agentic_AIVSS.md) — risk scoring with autonomy premium
518
+
519
+ **Threat modeling an agentic AI system before selecting controls**
520
+ → [Agentic_MAESTRO.md](agentic-top10/Agentic_MAESTRO.md) — MAESTRO seven-layer threat enumeration with session guide
521
+ → [DSGAI_MAESTRO.md](dsgai-2026/DSGAI_MAESTRO.md) — MAESTRO data operations lens for all 21 DSGAI entries
522
+
523
+ **ISO 27001 ISMS extension for GenAI**
524
+ → [LLM_ISO27001.md](llm-top10/LLM_ISO27001.md) · [Agentic_ISO27001.md](agentic-top10/Agentic_ISO27001.md) · [DSGAI_ISO27001.md](dsgai-2026/DSGAI_ISO27001.md)
525
+
526
+ **ISO 42001 AIMS for AI governance**
527
+ → [LLM_ISO42001.md](llm-top10/LLM_ISO42001.md) · [Agentic_ISO42001.md](agentic-top10/Agentic_ISO42001.md) — includes EU AI Act compliance evidence table
528
+
529
+ **Security programme maturity**
530
+ → [LLM_SAMM.md](llm-top10/LLM_SAMM.md) — SAMM L1–L3 roadmap with fillable scorecard
531
+
532
+ **Security test plan for agentic AI**
533
+ → [Agentic_AITG.md](agentic-top10/Agentic_AITG.md) — 50 structured test cases, pre-deployment gates, OT addendum
534
+
535
+ **Risk register scoring for agentic AI**
536
+ → [Agentic_AIVSS.md](agentic-top10/Agentic_AIVSS.md) — supervised vs autonomous dual-scenario scoring, avg +1.79 autonomy premium
537
+
538
+ **Attacker perspective on GenAI risks**
539
+ → [DSGAI_MITREATLAS.md](dsgai-2026/DSGAI_MITREATLAS.md) — ATLAS technique mapping, four attack path chains
540
+ → [Agentic_MITREATLAS.md](agentic-top10/Agentic_MITREATLAS.md) — agentic technique chaining
541
+
542
+ **CWE root causes and confirmed CVEs**
543
+ → [Agentic_CWE_CVE.md](agentic-top10/Agentic_CWE_CVE.md) — root cause taxonomy, CVE evidence, cross-reference index
544
+
545
+ **Implementation code, not framework theory**
546
+ → [shared/RECIPES.md](shared/RECIPES.md) — 21 production patterns with working Python
547
+
548
+ **US federal / FedRAMP authorization for AI services**
549
+ → [LLM_FedRAMP.md](llm-top10/LLM_FedRAMP.md) · [Agentic_FedRAMP.md](agentic-top10/Agentic_FedRAMP.md) · [DSGAI_FedRAMP.md](dsgai-2026/DSGAI_FedRAMP.md)
550
+
551
+ **EU financial sector (DORA compliance)**
552
+ ——— [LLM_DORA.md](llm-top10/LLM_DORA.md) · [Agentic_DORA.md](agentic-top10/Agentic_DORA.md) · [DSGAI_DORA.md](dsgai-2026/DSGAI_DORA.md)
553
+
554
+ **Secure AI development lifecycle (SSDF extension)**
555
+ → [LLM_SP800218A.md](llm-top10/LLM_SP800218A.md) —— [Agentic_SP800218A.md](agentic-top10/Agentic_SP800218A.md) · [DSGAI_SP800218A.md](dsgai-2026/DSGAI_SP800218A.md)
556
+
557
+ **All risks across all three source lists**
558
+ → [CROSSREF.md](CROSSREF.md) — master cross-reference
559
+
560
+ ---
561
+
562
+ ## Standout coverage
563
+
564
+ ### Complete OT/ICS trilogy
565
+
566
+ The only publicly available mapping of all three OWASP GenAI source lists to ISA/IEC 62443 and NIST SP 800-82 Rev 3. Includes zone model placement, security level ratings, Fundamental Requirement and Security Requirement references, OT-specific threat scenarios, and pre-deployment checklists for each source list.
567
+
568
+ The RAG corpus poisoning scenario in [DSGAI_ISA62443.md](dsgai-2026/DSGAI_ISA62443.md) — a safety procedure manipulation attack that modifies maintenance intervals without any OT network access — exists nowhere else in public documentation.
569
+
570
+ ### MAESTRO seven-layer threat modeling
571
+
572
+ [Agentic_MAESTRO.md](agentic-top10/Agentic_MAESTRO.md) and [DSGAI_MAESTRO.md](dsgai-2026/DSGAI_MAESTRO.md) are the only public mappings of OWASP GenAI risks to the MAESTRO framework from the Cloud Security Alliance. Unlike every other file in this repo — which maps risks to controls — MAESTRO maps each risk to the **architectural layer where it originates**, telling you which team owns the problem and where in the system the fix must be deployed.
573
+
574
+ Key finding from the DSGAI mapping: **L2 Data Operations is the originating layer for 52% of all DSGAI entries**. An organisation that does not treat RAG corpora, embedding stores, training pipelines, and memory systems as security-critical infrastructure is under-defended against the majority of the GenAI data security threat landscape.
575
+
576
+ ### Agentic autonomy premium
577
+
578
+ [Agentic_AIVSS.md](agentic-top10/Agentic_AIVSS.md) quantifies what removing human oversight costs in risk: average **+1.79 AIVSS severity points** across all 10 agentic entries. Removing human oversight converts 7 of 10 entries from High to Critical — the quantitative case for mandatory human oversight under EU AI Act Article 14.
579
+
580
+ ### Complete agentic identity coverage
581
+
582
+ [Agentic_OWASP_NHI.md](agentic-top10/Agentic_OWASP_NHI.md) maps every NHI Top 10 entry to every ASI entry — the only public document translating agentic security risks into the NHI controls that IAM teams already operate.
583
+
584
+ ### SAMM maturity scorecard
585
+
586
+ [LLM_SAMM.md](llm-top10/LLM_SAMM.md) includes a fillable maturity scorecard with minimum viable levels per SAMM practice for any LLM production deployment — the artefact security programme leads use to brief engineering leadership on where the programme stands and what to improve next.
587
+
588
+ ### Production implementation recipes
589
+
590
+ [shared/RECIPES.md](shared/RECIPES.md) contains 21 production-ready security patterns with working Python across 5 deployment architectures: RAG pipeline security (access control, ingestion integrity, circuit breakers), MCP server hardening (input validation, credential scoping), OT/ICS agent safety (kill switches, behavioural baselines, cascade containment), agentic AI security (memory sanitization, inter-agent message validation, credential rotation, output guardrails), and data pipeline security (provenance tracking, PII redaction, differential privacy, retention enforcement).
591
+
592
+ ---
593
+
594
+ ## Contributing
595
+
596
+ Contributions are welcome — new framework mappings, updated controls, new implementation recipes, translations, and additional tool entries.
597
+
598
+ See [CONTRIBUTING.md](CONTRIBUTING.md) for the file template, PR process, and contribution guidelines. All contributors are listed in the CHANGELOG.
599
+
600
+ ---
601
+
602
+ ## License
603
+
604
+ [Creative Commons Attribution-ShareAlike 4.0 International](LICENSE)
605
+
606
+ Free to share and adapt for any purpose, including commercial use, with appropriate credit and distribution under the same license.
607
+
608
+ ---
609
+
610
+ ## Acknowledgements
611
+
612
+ Created and led by **[Emmanuel Guilherme Junior](https://github.com/emmanuelgjr)**, who leads the [OWASP GenAI Data Security Initiative](https://genai.owasp.org).
613
+
614
+ Built on the work of the OWASP LLM Top 10, OWASP Agentic Top 10, OWASP GenAI Data Security, OWASP NHI Top 10, and OWASP SAMM project teams.
615
+
616
+ ---
617
+
618
+ *[genai.owasp.org](https://genai.owasp.org) · [CC BY-SA 4.0](LICENSE)*