genai-security-crosswalk 2.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE.md +28 -0
- package/README.md +618 -0
- package/data/entries/ASI01.json +911 -0
- package/data/entries/ASI02.json +850 -0
- package/data/entries/ASI03.json +854 -0
- package/data/entries/ASI04.json +759 -0
- package/data/entries/ASI05.json +764 -0
- package/data/entries/ASI06.json +817 -0
- package/data/entries/ASI07.json +789 -0
- package/data/entries/ASI08.json +788 -0
- package/data/entries/ASI09.json +754 -0
- package/data/entries/ASI10.json +833 -0
- package/data/entries/DSGAI01.json +779 -0
- package/data/entries/DSGAI02.json +728 -0
- package/data/entries/DSGAI03.json +671 -0
- package/data/entries/DSGAI04.json +752 -0
- package/data/entries/DSGAI05.json +689 -0
- package/data/entries/DSGAI06.json +673 -0
- package/data/entries/DSGAI07.json +680 -0
- package/data/entries/DSGAI08.json +698 -0
- package/data/entries/DSGAI09.json +687 -0
- package/data/entries/DSGAI10.json +627 -0
- package/data/entries/DSGAI11.json +663 -0
- package/data/entries/DSGAI12.json +695 -0
- package/data/entries/DSGAI13.json +688 -0
- package/data/entries/DSGAI14.json +703 -0
- package/data/entries/DSGAI15.json +655 -0
- package/data/entries/DSGAI16.json +716 -0
- package/data/entries/DSGAI17.json +690 -0
- package/data/entries/DSGAI18.json +613 -0
- package/data/entries/DSGAI19.json +638 -0
- package/data/entries/DSGAI20.json +671 -0
- package/data/entries/DSGAI21.json +881 -0
- package/data/entries/LLM01.json +975 -0
- package/data/entries/LLM02.json +868 -0
- package/data/entries/LLM03.json +817 -0
- package/data/entries/LLM04.json +797 -0
- package/data/entries/LLM05.json +761 -0
- package/data/entries/LLM06.json +848 -0
- package/data/entries/LLM07.json +749 -0
- package/data/entries/LLM08.json +750 -0
- package/data/entries/LLM09.json +760 -0
- package/data/entries/LLM10.json +763 -0
- package/data/incidents-schema.json +121 -0
- package/data/incidents.json +1484 -0
- package/data/schema.json +134 -0
- package/dist/index.d.ts +97 -0
- package/dist/index.d.ts.map +1 -0
- package/dist/index.js +124 -0
- package/dist/index.js.map +1 -0
- package/dist/index.test.d.ts +2 -0
- package/dist/index.test.d.ts.map +1 -0
- package/dist/index.test.js +97 -0
- package/dist/index.test.js.map +1 -0
- package/package.json +62 -0
package/LICENSE.md
ADDED
|
@@ -0,0 +1,28 @@
|
|
|
1
|
+
Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0)
|
|
2
|
+
|
|
3
|
+
Copyright (c) 2026 emmanuelgjr
|
|
4
|
+
|
|
5
|
+
You are free to:
|
|
6
|
+
|
|
7
|
+
Share — copy and redistribute the material in any medium or format
|
|
8
|
+
for any purpose, even commercially.
|
|
9
|
+
|
|
10
|
+
Adapt — remix, transform, and build upon the material for any
|
|
11
|
+
purpose, even commercially.
|
|
12
|
+
|
|
13
|
+
Under the following terms:
|
|
14
|
+
|
|
15
|
+
Attribution — You must give appropriate credit, provide a link to
|
|
16
|
+
the license, and indicate if changes were made. You may do so in
|
|
17
|
+
any reasonable manner, but not in any way that suggests the licensor
|
|
18
|
+
endorses you or your use.
|
|
19
|
+
|
|
20
|
+
ShareAlike — If you remix, transform, or build upon the material,
|
|
21
|
+
you must distribute your contributions under the same license as
|
|
22
|
+
the original.
|
|
23
|
+
|
|
24
|
+
No additional restrictions — You may not apply legal terms or
|
|
25
|
+
technological measures that legally restrict others from doing
|
|
26
|
+
anything the license permits.
|
|
27
|
+
|
|
28
|
+
Full license text: https://creativecommons.org/licenses/by-sa/4.0/legalcode
|
package/README.md
ADDED
|
@@ -0,0 +1,618 @@
|
|
|
1
|
+
# GenAI Security Crosswalk
|
|
2
|
+
|
|
3
|
+
[](https://creativecommons.org/licenses/by-sa/4.0/)
|
|
4
|
+
[](https://genai.owasp.org)
|
|
5
|
+
[](CHANGELOG.md)
|
|
6
|
+
[](README.md)
|
|
7
|
+
[](README.md)
|
|
8
|
+
[](README.md)
|
|
9
|
+
[](https://www.npmjs.com/package/@owasp/genai-crosswalk)
|
|
10
|
+
|
|
11
|
+
> The most comprehensive publicly available mapping of OWASP GenAI security risks to industry frameworks — covering LLM applications, autonomous agentic AI, and GenAI data security across **20 frameworks** and **3 OWASP source lists**.
|
|
12
|
+
|
|
13
|
+
### [Live Web App](https://emmanuelgjr.github.io/GenAI-Security-Crosswalk/) | [Score Your Coverage](https://emmanuelgjr.github.io/GenAI-Security-Crosswalk/#/score) | [Explore Entries](https://emmanuelgjr.github.io/GenAI-Security-Crosswalk/#/explorer) | [View Incidents](https://emmanuelgjr.github.io/GenAI-Security-Crosswalk/#/incidents)
|
|
14
|
+
|
|
15
|
+
Created and led by **[Emmanuel Guilherme Junior](https://github.com/emmanuelgjr)**, who leads the [OWASP GenAI Data Security Initiative](https://genai.owasp.org).
|
|
16
|
+
|
|
17
|
+
---
|
|
18
|
+
|
|
19
|
+
## TL;DR — What is this and what do I do?
|
|
20
|
+
|
|
21
|
+
**The problem:** You're deploying AI (LLMs, agents, RAG pipelines) and need to know which security controls apply — across EU AI Act, NIST, ISO, SOC 2, FedRAMP, DORA, and 14 more frameworks. No single document maps AI risks to all of them.
|
|
22
|
+
|
|
23
|
+
**This repo solves that.** Every OWASP GenAI vulnerability (41 total) is mapped to specific controls in 20 industry frameworks. Pick your risk, find your controls.
|
|
24
|
+
|
|
25
|
+
### 3 ways to use it (pick one)
|
|
26
|
+
|
|
27
|
+
**1. Score your coverage in 60 seconds** (no install needed)
|
|
28
|
+
> Go to the **[web app](https://emmanuelgjr.github.io/GenAI-Security-Crosswalk/#/score)**, select the frameworks you implement, see your gaps instantly. Upload tool results to validate.
|
|
29
|
+
|
|
30
|
+
**2. Read the mapping file you need** (browse the repo)
|
|
31
|
+
> Find your framework below, click the file, read the controls. Example: deploying AI in the EU? Start with [LLM_EUAIAct.md](llm-top10/LLM_EUAIAct.md).
|
|
32
|
+
|
|
33
|
+
**3. Run the tools** (for security engineers and red-teamers)
|
|
34
|
+
```bash
|
|
35
|
+
git clone https://github.com/emmanuelgjr/GenAI-Security-Crosswalk.git
|
|
36
|
+
cd GenAI-Security-Crosswalk
|
|
37
|
+
node scripts/compliance-report.js --framework "EU AI Act" # gap assessment
|
|
38
|
+
node scripts/incidents-report.js --entry LLM01 # incident analysis
|
|
39
|
+
node scripts/compliance-report.js --format oscal # GRC platform export
|
|
40
|
+
node scripts/incidents-report.js --format stix # SIEM/SOAR export
|
|
41
|
+
```
|
|
42
|
+
|
|
43
|
+
### Who is this for?
|
|
44
|
+
|
|
45
|
+
| You are... | Start here |
|
|
46
|
+
|---|---|
|
|
47
|
+
| **CISO / compliance officer** | [Score your coverage](https://emmanuelgjr.github.io/GenAI-Security-Crosswalk/#/score) → export the gap report |
|
|
48
|
+
| **Security engineer** | [Explorer](https://emmanuelgjr.github.io/GenAI-Security-Crosswalk/#/explorer) → search by risk, see all controls |
|
|
49
|
+
| **Red teamer** | [LAAF guide](evals/laaf/README.md) → run S1–S6 attack stages, map results to OWASP |
|
|
50
|
+
| **GRC / auditor** | `compliance-report.js --format oscal` → import into ServiceNow/Archer |
|
|
51
|
+
| **Developer** | `npm install @owasp/genai-crosswalk` → query risks + controls programmatically |
|
|
52
|
+
| **Threat intel analyst** | `incidents-report.js --format stix` → ingest 50 AI incidents into Sentinel/Splunk |
|
|
53
|
+
|
|
54
|
+
---
|
|
55
|
+
|
|
56
|
+
## What this repository provides
|
|
57
|
+
|
|
58
|
+
Every file answers one question: **which controls from framework X address vulnerability Y?**
|
|
59
|
+
|
|
60
|
+
| | |
|
|
61
|
+
|---|---|
|
|
62
|
+
| **3** source lists | LLM Top 10 · Agentic Top 10 · DSGAI 2026 |
|
|
63
|
+
| **20** frameworks | Compliance · Governance · Threat modeling · Testing · OT/ICS · Identity · Secure SDLC · Financial |
|
|
64
|
+
| **67** mapping files | Every source list entry × every applicable framework |
|
|
65
|
+
| **21** implementation recipes | Production-ready Python patterns |
|
|
66
|
+
| **70+** open-source tools | Catalogued and organised by function |
|
|
67
|
+
| **25** eval profiles | Runnable Garak (13) + PyRIT (6) + LAAF (6) tests mapped to OWASP entries |
|
|
68
|
+
| **20** compliance reports | Per-framework gap assessments auto-generated from data layer (MD, CSV, JSON, OSCAL) |
|
|
69
|
+
| **50** documented incidents | Real-world + research incidents with MAESTRO layer attribution (MD, CSV, JSON, STIX 2.1) |
|
|
70
|
+
| **LAAF v2.0** | First agentic LPCI red-teaming framework — fully integrated with 6-stage × OWASP crosswalk |
|
|
71
|
+
|
|
72
|
+
All free. All open-source. Built for practitioners.
|
|
73
|
+
|
|
74
|
+
---
|
|
75
|
+
|
|
76
|
+
## Source lists
|
|
77
|
+
|
|
78
|
+
| List | Entries | Version | Frameworks mapped |
|
|
79
|
+
|---|---|---|---|
|
|
80
|
+
| [OWASP LLM Top 10](https://genai.owasp.org/llm-top-10/) | LLM01–LLM10 | 2025 | 23 |
|
|
81
|
+
| [OWASP Agentic Top 10](https://genai.owasp.org/resource/owasp-top-10-for-agentic-applications-for-2026/) | ASI01–ASI10 | 2026 | 23 |
|
|
82
|
+
| [OWASP GenAI Data Security Risks](https://genai.owasp.org/resource/owasp-genai-data-security-risks-mitigations-2026/) | DSGAI01–DSGAI21 | 2026 | 21 |
|
|
83
|
+
|
|
84
|
+
---
|
|
85
|
+
|
|
86
|
+
## Framework coverage matrix
|
|
87
|
+
|
|
88
|
+
| Framework | LLM Top 10 | Agentic Top 10 | DSGAI 2026 |
|
|
89
|
+
|---|:---:|:---:|:---:|
|
|
90
|
+
| [MITRE ATLAS](https://atlas.mitre.org) | ✅ | ✅ | ✅ |
|
|
91
|
+
| [NIST AI RMF 1.0](https://www.nist.gov/system/files/documents/2023/01/26/AI%20RMF%201.0.pdf) | ✅ | ✅ | ✅ |
|
|
92
|
+
| [EU AI Act](https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32024R1689) | ✅ | ✅ | ✅ |
|
|
93
|
+
| [ISO/IEC 27001:2022](https://www.iso.org/standard/82875.html) | ✅ | ✅ | ✅ |
|
|
94
|
+
| [NIST CSF 2.0](https://www.nist.gov/cyberframework) | ✅ | ✅ | ✅ |
|
|
95
|
+
| [ISA/IEC 62443 — OT/ICS](https://www.isa.org/standards-and-publications/isa-standards/isa-iec-62443-series-of-standards) | ✅ | ✅ | ✅ |
|
|
96
|
+
| [MAESTRO — CSA](https://cloudsecurityalliance.org/blog/2025/02/06/agentic-ai-threat-modeling-framework-maestro) | ✅ | ✅ | ✅ |
|
|
97
|
+
| [ISO/IEC 42001:2023](https://www.iso.org/standard/81230.html) | ✅ | ✅ | ✅ |
|
|
98
|
+
| [CIS Controls v8.1](https://www.cisecurity.org/controls) | ✅ | ✅ | ✅ |
|
|
99
|
+
| [OWASP ASVS 4.0.3](https://owasp.org/www-project-application-security-verification-standard/) | ✅ | ✅ | ✅ |
|
|
100
|
+
| [SOC 2 Trust Services Criteria](https://www.aicpa-cima.com/resources/landing/2017-trust-services-criteria) | ✅ | ✅ | ✅ |
|
|
101
|
+
| [PCI DSS v4.0](https://www.pcisecuritystandards.org/document_library/) | ✅ | ✅ | ✅ |
|
|
102
|
+
| [ENISA Multilayer Framework](https://www.enisa.europa.eu/publications/multilayer-framework-for-good-cybersecurity-practices-for-ai) | ✅ | ✅ | ✅ |
|
|
103
|
+
| [OWASP SAMM v2.0](https://owaspsamm.org/) | ✅ | ✅ | ✅ |
|
|
104
|
+
| [NIST SP 800-82 Rev 3 — OT/ICS](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r3.pdf) | ✅ | ✅ | ✅ |
|
|
105
|
+
| [AIUC-1](https://www.aiuc-1.com) | ✅ | ✅ | ✅ |
|
|
106
|
+
| [OWASP NHI Top 10](https://owasp.org/www-project-non-human-identities-top-10/) | ✅ | ✅ | ✅ |
|
|
107
|
+
| [NIST SP 800-218A](https://doi.org/10.6028/NIST.SP.800-218A.ipd) | ✅ | ✅ | ✅ |
|
|
108
|
+
| [FedRAMP](https://www.fedramp.gov/) | ✅ | ✅ | ✅ |
|
|
109
|
+
| [DORA (EU 2022/2554)](https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32022R2554) | ✅ | ✅ | ✅ |
|
|
110
|
+
|
|
111
|
+
---
|
|
112
|
+
|
|
113
|
+
## All mapping files
|
|
114
|
+
|
|
115
|
+
### LLM Top 10 2025 — 23 framework mappings
|
|
116
|
+
|
|
117
|
+
| File | Framework | Standout content |
|
|
118
|
+
|---|---|---|
|
|
119
|
+
| [LLM_MITREATLAS.md](llm-top10/LLM_MITREATLAS.md) | MITRE ATLAS | Adversarial technique mapping with real-world incident references |
|
|
120
|
+
| [LLM_NISTAIRMF.md](llm-top10/LLM_NISTAIRMF.md) | NIST AI RMF 1.0 | GOVERN/MAP/MEASURE/MANAGE per vulnerability with AI RMF profile |
|
|
121
|
+
| [LLM_EUAIAct.md](llm-top10/LLM_EUAIAct.md) | EU AI Act | Article-level obligations, fines exposure, August 2026 compliance checklist |
|
|
122
|
+
| [LLM_ISO27001.md](llm-top10/LLM_ISO27001.md) | ISO/IEC 27001:2022 | ISMS extension checklist, 2022 new controls mapped to LLM risks |
|
|
123
|
+
| [LLM_ISO42001.md](llm-top10/LLM_ISO42001.md) | ISO/IEC 42001:2023 | AIMS implementation checklist, ISO 27001 integration guidance |
|
|
124
|
+
| [LLM_CISControls.md](llm-top10/LLM_CISControls.md) | CIS Controls v8.1 | IG1/IG2/IG3 tiered safeguards per vulnerability |
|
|
125
|
+
| [LLM_ASVS.md](llm-top10/LLM_ASVS.md) | OWASP ASVS 4.0.3 | L1/L2/L3 verification requirements with ASVS checklist |
|
|
126
|
+
| [LLM_ISA62443.md](llm-top10/LLM_ISA62443.md) | ISA/IEC 62443 — OT/ICS | Zone model, SL ratings, FR/SR references, OT deployment checklist |
|
|
127
|
+
| [LLM_NISTSP80082.md](llm-top10/LLM_NISTSP80082.md) | NIST SP 800-82 Rev 3 | SP 800-53 controls, US regulatory crosswalk (NERC CIP, AWIA, CMMC) |
|
|
128
|
+
| [LLM_NISTCSF2.md](llm-top10/LLM_NISTCSF2.md) | NIST CSF 2.0 | Six-function mapping including new GOVERN function, CSF 2.0 profile |
|
|
129
|
+
| [LLM_SOC2.md](llm-top10/LLM_SOC2.md) | SOC 2 Trust Services Criteria | TSC mapping for SaaS and cloud LLM deployments |
|
|
130
|
+
| [LLM_PCIDSS.md](llm-top10/LLM_PCIDSS.md) | PCI DSS v4.0 | CHD scope guidance, Req 3/6/7/10/11/12 per vulnerability |
|
|
131
|
+
| [LLM_ENISA.md](llm-top10/LLM_ENISA.md) | ENISA Multilayer Framework | L1/L2/L3 layer mapping, EU AI Act and NIS2 alignment table |
|
|
132
|
+
| [LLM_SAMM.md](llm-top10/LLM_SAMM.md) | OWASP SAMM v2.0 | L1–L3 maturity roadmap per vulnerability with fillable scorecard |
|
|
133
|
+
| [LLM_STRIDE.md](llm-top10/LLM_STRIDE.md) | STRIDE | Six-category threat model per LLM entry with DFD integration guidance |
|
|
134
|
+
| [LLM_CWE_CVE.md](llm-top10/LLM_CWE_CVE.md) | CWE / CVE | CWE root cause taxonomy and confirmed CVE evidence table per entry |
|
|
135
|
+
| [LLM_AITG.md](llm-top10/LLM_AITG.md) | OWASP AI Testing Guide | Structured test cases per LLM entry with pass criteria and CI/CD integration guidance |
|
|
136
|
+
| [LLM_MAESTRO.md](llm-top10/LLM_MAESTRO.md) | MAESTRO | Seven-layer architectural threat model, layer-to-LLM mapping, 90-minute threat modeling session guide |
|
|
137
|
+
| [LLM_AIUC1.md](llm-top10/LLM_AIUC1.md) | AIUC-1 | Six-domain control mapping for LLM deployments — certification readiness checklist |
|
|
138
|
+
| [LLM_NHI.md](llm-top10/LLM_NHI.md) | OWASP NHI Top 10 | Credential and identity controls per LLM entry — NHI programme maturity table |
|
|
139
|
+
| [LLM_SP800218A.md](llm-top10/LLM_SP800218A.md) | NIST SP 800-218A | Secure AI SDLC practices — PW/PS/RV practice mapping per LLM entry |
|
|
140
|
+
| [LLM_FedRAMP.md](llm-top10/LLM_FedRAMP.md) | FedRAMP | SP 800-53 AI overlay — AC/AU/CA/CM/IA/IR/RA/SA/SC/SI/SR control families |
|
|
141
|
+
| [LLM_DORA.md](llm-top10/LLM_DORA.md) | DORA | EU financial sector resilience — Art. 5–45 per LLM entry |
|
|
142
|
+
|
|
143
|
+
### Agentic Top 10 2026 — 23 framework mappings
|
|
144
|
+
|
|
145
|
+
| File | Framework | Standout content |
|
|
146
|
+
|---|---|---|
|
|
147
|
+
| [Agentic_AIUC1.md](agentic-top10/Agentic_AIUC1.md) | AIUC-1 | Agentic AI governance certification control mapping |
|
|
148
|
+
| [Agentic_MITREATLAS.md](agentic-top10/Agentic_MITREATLAS.md) | MITRE ATLAS | Agentic technique chaining, OT amplifiers per entry |
|
|
149
|
+
| [Agentic_NISTAIRMF.md](agentic-top10/Agentic_NISTAIRMF.md) | NIST AI RMF 1.0 | Autonomy policy anchoring in GV-1.7, agentic AI RMF profile |
|
|
150
|
+
| [Agentic_EUAIAct.md](agentic-top10/Agentic_EUAIAct.md) | EU AI Act | Art. 14 human oversight per entry, autonomy premium fines analysis |
|
|
151
|
+
| [Agentic_ISO27001.md](agentic-top10/Agentic_ISO27001.md) | ISO/IEC 27001:2022 | ISMS extension checklist for agentic deployments, NHI as A.8.2 |
|
|
152
|
+
| [Agentic_ISO42001.md](agentic-top10/Agentic_ISO42001.md) | ISO/IEC 42001:2023 | A.5.2 impact assessment per entry, EU AI Act alignment table |
|
|
153
|
+
| [Agentic_NISTCSF2.md](agentic-top10/Agentic_NISTCSF2.md) | NIST CSF 2.0 | GOVERN-first autonomy policy mapping, agentic CSF 2.0 profile |
|
|
154
|
+
| [Agentic_ISA62443.md](agentic-top10/Agentic_ISA62443.md) | ISA/IEC 62443 — OT/ICS | Agentic OT zone model, kill switch design, SL uplift table |
|
|
155
|
+
| [Agentic_MAESTRO.md](agentic-top10/Agentic_MAESTRO.md) | MAESTRO — CSA | Seven-layer architectural threat model, layer-to-ASI mapping, session guide |
|
|
156
|
+
| [Agentic_OWASP_NHI.md](agentic-top10/Agentic_OWASP_NHI.md) | OWASP NHI Top 10 | Full NHI-to-ASI cross-mapping, NHI programme maturity table |
|
|
157
|
+
| [Agentic_CISControls.md](agentic-top10/Agentic_CISControls.md) | CIS Controls v8.1 | IG1/IG2/IG3 safeguards, agentic NHI treated as CIS 5 privileged access |
|
|
158
|
+
| [Agentic_ASVS.md](agentic-top10/Agentic_ASVS.md) | OWASP ASVS 4.0.3 | L1/L2/L3 verification checklist for agentic deployments |
|
|
159
|
+
| [Agentic_AITG.md](agentic-top10/Agentic_AITG.md) | OWASP AI Testing Guide | 50 structured test cases across ASI01–ASI10 with pre-deployment gates |
|
|
160
|
+
| [Agentic_AIVSS.md](agentic-top10/Agentic_AIVSS.md) | OWASP AIVSS | Dual-scenario scoring (supervised vs autonomous), +1.79 autonomy premium |
|
|
161
|
+
| [Agentic_ENISA.md](agentic-top10/Agentic_ENISA.md) | ENISA Multilayer Framework | L1/L2/L3 layer mapping, EU AI Act Art. 14/15/52 alignment, NIS2 Article 23 incident assessment guidance |
|
|
162
|
+
| [Agentic_SOC2.md](agentic-top10/Agentic_SOC2.md) | SOC 2 Trust Services Criteria | TSC mapping for agentic AI — autonomous action scope, processing integrity, supply chain criteria |
|
|
163
|
+
| [Agentic_PCIDSS.md](agentic-top10/Agentic_PCIDSS.md) | PCI DSS v4.0 | PCI audit guidance for agents with tool access to payment systems, Req 6/7/8/10/11/12 per entry |
|
|
164
|
+
| [Agentic_SAMM.md](agentic-top10/Agentic_SAMM.md) | OWASP SAMM v2.0 | L1–L3 maturity scorecard for agentic AI — pre-deployment gates and programme maturity roadmap |
|
|
165
|
+
| [Agentic_NISTSP80082.md](agentic-top10/Agentic_NISTSP80082.md) | NIST SP 800-82 Rev 3 | OT agent placement, SP 800-53 controls, U.S. regulatory crosswalk (NERC CIP, AWIA, CMMC) |
|
|
166
|
+
| [Agentic_SP800218A.md](agentic-top10/Agentic_SP800218A.md) | NIST SP 800-218A | Secure agentic SDLC — tool access, memory integrity, multi-agent pipeline practices |
|
|
167
|
+
| [Agentic_FedRAMP.md](agentic-top10/Agentic_FedRAMP.md) | FedRAMP | Federal agentic AI authorization — agent identity, tool access, cascade controls |
|
|
168
|
+
| [Agentic_DORA.md](agentic-top10/Agentic_DORA.md) | DORA | Financial sector agentic resilience — incident reporting, third-party agent risk |
|
|
169
|
+
|
|
170
|
+
> **Also in this folder:** [Agentic_CWE_CVE.md](agentic-top10/Agentic_CWE_CVE.md) — CWE root cause taxonomy, confirmed CVEs, full CWE cross-reference index.
|
|
171
|
+
|
|
172
|
+
### DSGAI 2026 — 21 framework mappings
|
|
173
|
+
|
|
174
|
+
| File | Framework | Standout content |
|
|
175
|
+
|---|---|---|
|
|
176
|
+
| [DSGAI_ISO27001.md](dsgai-2026/DSGAI_ISO27001.md) | ISO/IEC 27001:2022 | ISMS extension covering all 21 DSGAI entries |
|
|
177
|
+
| [DSGAI_NISTAIRMF.md](dsgai-2026/DSGAI_NISTAIRMF.md) | NIST AI RMF 1.0 | GOVERN/MAP/MEASURE/MANAGE per DSGAI entry with data security profile |
|
|
178
|
+
| [DSGAI_EUAIAct.md](dsgai-2026/DSGAI_EUAIAct.md) | EU AI Act | Article-level obligations per entry, GPAI vs high-risk AI scope |
|
|
179
|
+
| [DSGAI_NISTCSF2.md](dsgai-2026/DSGAI_NISTCSF2.md) | NIST CSF 2.0 | Six-function mapping for all 21 entries, GenAI data security profile |
|
|
180
|
+
| [DSGAI_MITREATLAS.md](dsgai-2026/DSGAI_MITREATLAS.md) | MITRE ATLAS | Adversarial technique mapping, four complete attack path chains |
|
|
181
|
+
| [DSGAI_ISA62443.md](dsgai-2026/DSGAI_ISA62443.md) | ISA/IEC 62443 — OT/ICS | OT threat scenarios per entry, SL ratings, full OT checklist |
|
|
182
|
+
| [DSGAI_MAESTRO.md](dsgai-2026/DSGAI_MAESTRO.md) | MAESTRO — CSA | Layer-origin analysis for all 21 entries, L2 data operations as 52% of DSGAI threat surface |
|
|
183
|
+
| [DSGAI_SOC2.md](dsgai-2026/DSGAI_SOC2.md) | SOC 2 Trust Services Criteria | TSC mapping for SaaS and cloud GenAI deployments |
|
|
184
|
+
| [DSGAI_PCIDSS.md](dsgai-2026/DSGAI_PCIDSS.md) | PCI DSS v4.0 | CHD scope guidance, PCI audit checklist for GenAI data |
|
|
185
|
+
| [DSGAI_ASVS.md](dsgai-2026/DSGAI_ASVS.md) | OWASP ASVS 4.0.3 | L1/L2/L3 verification requirements for all 21 DSGAI entries, 4-phase implementation priority |
|
|
186
|
+
| [DSGAI_CISControls.md](dsgai-2026/DSGAI_CISControls.md) | CIS Controls v8.1 | IG1/IG2/IG3 safeguards for all 21 entries, GenAI data security implementation groups |
|
|
187
|
+
| [DSGAI_CWE_CVE.md](dsgai-2026/DSGAI_CWE_CVE.md) | CWE / CVE | CWE root cause taxonomy and confirmed CVE evidence for all 21 DSGAI entries |
|
|
188
|
+
| [DSGAI_ENISA.md](dsgai-2026/DSGAI_ENISA.md) | ENISA Multilayer Framework | L1/L2/L3 layer mapping, EU AI Act and NIS2 alignment for all 21 DSGAI entries |
|
|
189
|
+
| [DSGAI_ISO42001.md](dsgai-2026/DSGAI_ISO42001.md) | ISO/IEC 42001:2023 | AIMS controls per DSGAI entry, ISO 27001 integration guidance, A.7 data governance reference |
|
|
190
|
+
| [DSGAI_SAMM.md](dsgai-2026/DSGAI_SAMM.md) | OWASP SAMM v2.0 | L1–L3 maturity scorecard for GenAI data security — GDPR and regulatory compliance baseline |
|
|
191
|
+
| [DSGAI_NISTSP80082.md](dsgai-2026/DSGAI_NISTSP80082.md) | NIST SP 800-82 Rev 3 | OT data placement, SP 800-53 controls per DSGAI entry, NERC CIP/FISMA/CMMC crosswalk |
|
|
192
|
+
| [DSGAI_AIUC1.md](dsgai-2026/DSGAI_AIUC1.md) | AIUC-1 | Domain A (Data & Privacy) covers 50%+ of DSGAI entries — certification readiness table |
|
|
193
|
+
| [DSGAI_NHI.md](dsgai-2026/DSGAI_NHI.md) | OWASP NHI Top 10 | NHI as enabling condition for DSGAI risks — NHI programme maturity table for GenAI data |
|
|
194
|
+
| [DSGAI_SP800218A.md](dsgai-2026/DSGAI_SP800218A.md) | NIST SP 800-218A | Secure GenAI data SDLC — training data protection, data governance, provenance practices |
|
|
195
|
+
| [DSGAI_FedRAMP.md](dsgai-2026/DSGAI_FedRAMP.md) | FedRAMP | Federal data security controls — SC-28 data at rest, AU-2 logging, SR supply chain |
|
|
196
|
+
| [DSGAI_DORA.md](dsgai-2026/DSGAI_DORA.md) | DORA | Financial data resilience — Art. 8 asset inventory, Art. 12 backup, Art. 28-44 vendor risk |
|
|
197
|
+
|
|
198
|
+
### Shared resources
|
|
199
|
+
|
|
200
|
+
| File | Contents |
|
|
201
|
+
|---|---|
|
|
202
|
+
| [shared/RECIPES.md](shared/RECIPES.md) | 21 security implementation patterns with working Python — RAG, MCP, OT, Agentic, Data Pipeline |
|
|
203
|
+
| [shared/TOOLS.md](shared/TOOLS.md) | 70+ open-source security tools organised by function |
|
|
204
|
+
| [shared/GLOSSARY.md](shared/GLOSSARY.md) | Unified terminology across LLM, ASI, and DSGAI source lists |
|
|
205
|
+
| [shared/SEVERITY.md](shared/SEVERITY.md) | Severity definitions and AIVSS alignment |
|
|
206
|
+
| [shared/TEMPLATE.md](shared/TEMPLATE.md) | Canonical template for new mapping file contributors |
|
|
207
|
+
|
|
208
|
+
---
|
|
209
|
+
|
|
210
|
+
## Repository structure
|
|
211
|
+
|
|
212
|
+
```text
|
|
213
|
+
GenAI-Security-Crosswalk/
|
|
214
|
+
│
|
|
215
|
+
├── README.md
|
|
216
|
+
├── CROSSREF.md ← Master cross-reference: LLM ↔ ASI ↔ DSGAI
|
|
217
|
+
├── CONTRIBUTING.md
|
|
218
|
+
├── CHANGELOG.md
|
|
219
|
+
├── GOVERNANCE.md ← Maintainer roles, PR SLOs, decision process
|
|
220
|
+
├── SECURITY.md
|
|
221
|
+
├── CODE_OF_CONDUCT.md
|
|
222
|
+
├── package.json ← npm: @owasp/genai-crosswalk (node ≥18)
|
|
223
|
+
├── tsconfig.json ← TypeScript config
|
|
224
|
+
│
|
|
225
|
+
├── src/ ← npm package source (TypeScript)
|
|
226
|
+
│ ├── index.ts ← Typed API: getEntry, getFramework, searchEntries
|
|
227
|
+
│ └── index.test.ts ← 12 smoke tests (Node.js built-in runner)
|
|
228
|
+
│
|
|
229
|
+
├── llm-top10/ ← LLM01–LLM10 × 23 frameworks
|
|
230
|
+
│ ├── LLM_MITREATLAS.md
|
|
231
|
+
│ ├── LLM_NISTAIRMF.md
|
|
232
|
+
│ ├── LLM_EUAIAct.md
|
|
233
|
+
│ ├── LLM_ISO27001.md
|
|
234
|
+
│ ├── LLM_ISO42001.md
|
|
235
|
+
│ ├── LLM_CISControls.md
|
|
236
|
+
│ ├── LLM_ASVS.md
|
|
237
|
+
│ ├── LLM_ISA62443.md ← OT/ICS
|
|
238
|
+
│ ├── LLM_NISTSP80082.md ← OT/ICS
|
|
239
|
+
│ ├── LLM_NISTCSF2.md
|
|
240
|
+
│ ├── LLM_SOC2.md
|
|
241
|
+
│ ├── LLM_PCIDSS.md
|
|
242
|
+
│ ├── LLM_ENISA.md ← EU / NIS2
|
|
243
|
+
│ ├── LLM_SAMM.md ← Maturity model
|
|
244
|
+
│ ├── LLM_STRIDE.md ← Threat modeling
|
|
245
|
+
│ ├── LLM_CWE_CVE.md ← Root cause taxonomy + CVEs
|
|
246
|
+
│ ├── LLM_AITG.md ← AI Testing Guide
|
|
247
|
+
│ ├── LLM_MAESTRO.md ← MAESTRO seven-layer threat model
|
|
248
|
+
│ ├── LLM_AIUC1.md ← AIUC-1 certification framework
|
|
249
|
+
│ ├── LLM_NHI.md ← Non-Human Identity controls
|
|
250
|
+
│ ├── LLM_SP800218A.md ← Secure AI SDLC (SSDF extension)
|
|
251
|
+
│ ├── LLM_FedRAMP.md ← US federal cloud AI (SP 800-53 overlay)
|
|
252
|
+
│ └── LLM_DORA.md ← EU financial sector resilience
|
|
253
|
+
│
|
|
254
|
+
├── agentic-top10/ ← ASI01–ASI10 × 23 frameworks
|
|
255
|
+
│ ├── Agentic_AIUC1.md
|
|
256
|
+
│ ├── Agentic_MITREATLAS.md
|
|
257
|
+
│ ├── Agentic_NISTAIRMF.md
|
|
258
|
+
│ ├── Agentic_EUAIAct.md
|
|
259
|
+
│ ├── Agentic_ISO27001.md
|
|
260
|
+
│ ├── Agentic_ISO42001.md
|
|
261
|
+
│ ├── Agentic_NISTCSF2.md
|
|
262
|
+
│ ├── Agentic_ISA62443.md ← OT/ICS
|
|
263
|
+
│ ├── Agentic_MAESTRO.md ← Threat modeling — 7-layer architecture
|
|
264
|
+
│ ├── Agentic_OWASP_NHI.md ← Non-Human Identity
|
|
265
|
+
│ ├── Agentic_CISControls.md
|
|
266
|
+
│ ├── Agentic_ASVS.md
|
|
267
|
+
│ ├── Agentic_AITG.md ← AI Testing Guide — 50 test cases
|
|
268
|
+
│ ├── Agentic_AIVSS.md ← Risk scoring — autonomy premium
|
|
269
|
+
│ ├── Agentic_CWE_CVE.md ← CWE taxonomy + confirmed CVEs
|
|
270
|
+
│ ├── Agentic_ENISA.md ← EU / NIS2
|
|
271
|
+
│ ├── Agentic_SOC2.md ← SOC 2 TSC — agentic AI audit
|
|
272
|
+
│ ├── Agentic_PCIDSS.md ← PCI DSS v4.0 — payment system agents
|
|
273
|
+
│ ├── Agentic_SAMM.md ← Maturity model — pre-deployment gates
|
|
274
|
+
│ ├── Agentic_NISTSP80082.md ← OT/ICS — U.S. regulatory alignment
|
|
275
|
+
│ ├── Agentic_SP800218A.md ← Secure agentic SDLC
|
|
276
|
+
│ ├── Agentic_FedRAMP.md ← Federal agentic AI authorization
|
|
277
|
+
│ └── Agentic_DORA.md ← Financial sector agentic resilience
|
|
278
|
+
│
|
|
279
|
+
├── dsgai-2026/ ← DSGAI01–DSGAI21 × 21 frameworks
|
|
280
|
+
│ ├── DSGAI_ISO27001.md
|
|
281
|
+
│ ├── DSGAI_NISTAIRMF.md
|
|
282
|
+
│ ├── DSGAI_EUAIAct.md
|
|
283
|
+
│ ├── DSGAI_NISTCSF2.md
|
|
284
|
+
│ ├── DSGAI_MITREATLAS.md
|
|
285
|
+
│ ├── DSGAI_ISA62443.md ← OT/ICS
|
|
286
|
+
│ ├── DSGAI_MAESTRO.md ← Threat modeling — data operations lens
|
|
287
|
+
│ ├── DSGAI_SOC2.md
|
|
288
|
+
│ ├── DSGAI_PCIDSS.md
|
|
289
|
+
│ ├── DSGAI_ASVS.md ← OWASP ASVS 4.0.3
|
|
290
|
+
│ ├── DSGAI_CISControls.md ← CIS Controls v8.1
|
|
291
|
+
│ ├── DSGAI_CWE_CVE.md ← Root cause taxonomy + CVEs
|
|
292
|
+
│ ├── DSGAI_ENISA.md ← EU / NIS2
|
|
293
|
+
│ ├── DSGAI_ISO42001.md ← AI management system
|
|
294
|
+
│ ├── DSGAI_SAMM.md ← Maturity model — data security programme
|
|
295
|
+
│ ├── DSGAI_NISTSP80082.md ← OT/ICS — U.S. regulatory alignment
|
|
296
|
+
│ ├── DSGAI_AIUC1.md ← AIUC-1 certification framework
|
|
297
|
+
│ ├── DSGAI_NHI.md ← Non-Human Identity — data pipeline credentials
|
|
298
|
+
│ ├── DSGAI_SP800218A.md ← Secure GenAI data SDLC
|
|
299
|
+
│ ├── DSGAI_FedRAMP.md ← Federal data security controls
|
|
300
|
+
│ └── DSGAI_DORA.md ← Financial data resilience
|
|
301
|
+
│
|
|
302
|
+
├── shared/
|
|
303
|
+
│ ├── RECIPES.md ← 21 implementation patterns (Python code)
|
|
304
|
+
│ ├── TOOLS.md ← 70+ open-source tools catalogue
|
|
305
|
+
│ ├── GLOSSARY.md ← Unified terminology
|
|
306
|
+
│ ├── SEVERITY.md ← Severity definitions + AIVSS alignment
|
|
307
|
+
│ └── TEMPLATE.md ← Canonical template for new mapping files
|
|
308
|
+
│
|
|
309
|
+
├── data/
|
|
310
|
+
│ ├── schema.json ← JSON Schema (Draft 7) for entry files
|
|
311
|
+
│ ├── incidents.json ← 50 incidents with MAESTRO layer attribution
|
|
312
|
+
│ ├── incidents-schema.json ← JSON Schema for incidents
|
|
313
|
+
│ ├── tools-supplement.json ← Supplemental tools merged at generation time
|
|
314
|
+
│ ├── entries/ ← 41 machine-readable entry JSON files
|
|
315
|
+
│ └── README.md ← Data layer docs, jq query examples
|
|
316
|
+
│
|
|
317
|
+
├── scripts/
|
|
318
|
+
│ ├── validate.js ← Content validator (sections, links, counts)
|
|
319
|
+
│ ├── generate.js ← Markdown-to-JSON parser → data/entries/
|
|
320
|
+
│ ├── compliance-report.js ← Gap assessment generator (MD/CSV/JSON/OSCAL)
|
|
321
|
+
│ ├── incidents-report.js ← Incident query tool (MD/CSV/JSON/STIX 2.1)
|
|
322
|
+
│ ├── query.js ← CLI query interface (replaces jq)
|
|
323
|
+
│ ├── watch.js ← External source watcher (OWASP/arXiv/NVD/frameworks)
|
|
324
|
+
│ └── sbom-inventory.js ← Content-level CycloneDX SBOM generator
|
|
325
|
+
│
|
|
326
|
+
├── evals/
|
|
327
|
+
│ ├── README.md ← Setup guide and result interpretation
|
|
328
|
+
│ ├── garak/ ← 7 YAML profiles (LLM01/02/04/07/09, ASI01/05)
|
|
329
|
+
│ ├── pyrit/ ← 3 async Python scripts (LLM01, DSGAI04, ASI01)
|
|
330
|
+
│ ├── laaf/ ← LAAF v2.0 LPCI suite (S1–S6 + crosswalk reporter)
|
|
331
|
+
│ └── ci/ ← github-action.yml — drop-in CI/CD template
|
|
332
|
+
│
|
|
333
|
+
├── .github/workflows/
|
|
334
|
+
│ ├── validate.yml ← CI validation on PR
|
|
335
|
+
│ ├── link-check.yml ← Broken link detection
|
|
336
|
+
│ ├── markdown-lint.yml ← Markdown linting
|
|
337
|
+
│ ├── weekly-watch.yml ← Weekly source monitoring + monthly regeneration
|
|
338
|
+
│ └── sbom.yml ← CycloneDX SBOM on release tags
|
|
339
|
+
│
|
|
340
|
+
└── i18n/
|
|
341
|
+
├── WORKFLOW.md ← Translation contributor guide
|
|
342
|
+
├── es/README.md ← Spanish seed (machine-assisted)
|
|
343
|
+
├── ja/README.md ← Japanese seed (machine-assisted)
|
|
344
|
+
├── de/README.md ← German seed (machine-assisted)
|
|
345
|
+
├── fr/ ← French (accepting PRs)
|
|
346
|
+
└── pt/ ← Portuguese (accepting PRs)
|
|
347
|
+
```
|
|
348
|
+
|
|
349
|
+
---
|
|
350
|
+
|
|
351
|
+
## Compliance gap reports
|
|
352
|
+
|
|
353
|
+
Generate framework-specific gap assessments from the data layer in seconds:
|
|
354
|
+
|
|
355
|
+
```bash
|
|
356
|
+
node scripts/compliance-report.js # all 20 frameworks → reports/
|
|
357
|
+
node scripts/compliance-report.js --framework "EU AI Act" # one framework
|
|
358
|
+
node scripts/compliance-report.js --format csv # Excel-compatible
|
|
359
|
+
node scripts/compliance-report.js --format json # machine-readable
|
|
360
|
+
node scripts/compliance-report.js --list-frameworks # see all options
|
|
361
|
+
```
|
|
362
|
+
|
|
363
|
+
Each report includes: executive summary, coverage matrix (OWASP entries × controls), per-control detail with notes, and a prioritised action plan.
|
|
364
|
+
|
|
365
|
+
## LAAF v2.0 — LPCI red-teaming
|
|
366
|
+
|
|
367
|
+
[LAAF v2.0](https://github.com/qorvexconsulting1/laaf-V2.0) is integrated as the third evaluation framework alongside Garak and PyRIT. It covers the attack surface that surface-level injection tests miss: memory persistence, layered encoding, semantic reframing, and 6-stage lifecycle attacks.
|
|
368
|
+
|
|
369
|
+
```bash
|
|
370
|
+
pip install git+https://github.com/qorvexconsulting1/laaf-V2.0.git
|
|
371
|
+
export OPENAI_API_KEY=sk-...
|
|
372
|
+
bash evals/laaf/run_laaf.sh # S1–S6 full suite
|
|
373
|
+
laaf scan --target mock --dry-run # No API key needed
|
|
374
|
+
```
|
|
375
|
+
|
|
376
|
+
| LAAF Stage | OWASP | Threshold |
|
|
377
|
+
|---|---|---|
|
|
378
|
+
| S1 Reconnaissance | LLM07, LLM01 | 0% |
|
|
379
|
+
| S2 Logic-Layer Injection | LLM01, ASI01, DSGAI04 | 5% |
|
|
380
|
+
| S3 Trigger Execution | ASI01, ASI06, LLM06 | 0% |
|
|
381
|
+
| S4 Persistence | ASI06, LLM06, DSGAI04 | 0% |
|
|
382
|
+
| S5 Evasion | LLM01, LLM02 | 10% |
|
|
383
|
+
| S6 Trace Tampering | DSGAI01, LLM07 | 0% |
|
|
384
|
+
|
|
385
|
+
See `evals/laaf/README.md` for the full LPCI attack vector → OWASP → MAESTRO crosswalk.
|
|
386
|
+
|
|
387
|
+
---
|
|
388
|
+
|
|
389
|
+
## Incident tracker
|
|
390
|
+
|
|
391
|
+
50 real-world and research-demonstrated incidents, each mapped to OWASP entries and MAESTRO architectural layers:
|
|
392
|
+
|
|
393
|
+
```bash
|
|
394
|
+
node scripts/incidents-report.js # all incidents → reports/incidents.md
|
|
395
|
+
node scripts/incidents-report.js --entry LLM01 # incidents for a specific entry
|
|
396
|
+
node scripts/incidents-report.js --layer L3 # incidents implicating Agent Frameworks
|
|
397
|
+
node scripts/incidents-report.js --category real-world
|
|
398
|
+
node scripts/incidents-report.js --format csv # Excel export
|
|
399
|
+
node scripts/incidents-report.js --format stix # STIX 2.1 bundle for Sentinel/Splunk
|
|
400
|
+
```
|
|
401
|
+
|
|
402
|
+
MAESTRO layer roles tracked per incident: **Origin** (where attack starts) · **Propagation** (how it spreads) · **Impact** (where harm manifests) · **Blind-spot** (where detection failed).
|
|
403
|
+
|
|
404
|
+
### Web app — interactive dashboard
|
|
405
|
+
|
|
406
|
+
**https://emmanuelgjr.github.io/GenAI-Security-Crosswalk/**
|
|
407
|
+
|
|
408
|
+
No install required. Works on desktop and mobile.
|
|
409
|
+
|
|
410
|
+
| Page | What it does |
|
|
411
|
+
|------|-------------|
|
|
412
|
+
| [**Score**](https://emmanuelgjr.github.io/GenAI-Security-Crosswalk/#/score) | Select your frameworks, see coverage gaps. Upload Garak/PyRIT/LAAF results to validate. Share your score card on LinkedIn. |
|
|
413
|
+
| [**Explorer**](https://emmanuelgjr.github.io/GenAI-Security-Crosswalk/#/explorer) | Search and filter all 41 entries. Click any entry to see controls across all 20 frameworks. |
|
|
414
|
+
| [**Frameworks**](https://emmanuelgjr.github.io/GenAI-Security-Crosswalk/#/frameworks) | Interactive 41×23 coverage matrix. Click any cell to see the specific controls mapped. |
|
|
415
|
+
| [**Incidents**](https://emmanuelgjr.github.io/GenAI-Security-Crosswalk/#/incidents) | Browse 50 AI security incidents. Filter by severity, year, MAESTRO layer. Full attribution details. |
|
|
416
|
+
|
|
417
|
+
**Evidence-based scoring** — three validation tiers:
|
|
418
|
+
- **Self-Assessed** — checkbox only (unvalidated)
|
|
419
|
+
- **Partially Validated** — some tool outputs uploaded
|
|
420
|
+
- **Tool-Validated** — 20+ entries backed by Garak/PyRIT/LAAF/compliance report evidence
|
|
421
|
+
|
|
422
|
+
### Enterprise export formats
|
|
423
|
+
|
|
424
|
+
```bash
|
|
425
|
+
# STIX 2.1 bundle — ingest into Splunk ES, Microsoft Sentinel, TAXII feeds
|
|
426
|
+
node scripts/incidents-report.js --format stix
|
|
427
|
+
|
|
428
|
+
# OSCAL 1.1.2 Component Definition — ingest into ServiceNow, Archer, XACTA
|
|
429
|
+
node scripts/compliance-report.js --framework "EU AI Act" --format oscal
|
|
430
|
+
```
|
|
431
|
+
|
|
432
|
+
### Automated source monitoring
|
|
433
|
+
|
|
434
|
+
```bash
|
|
435
|
+
node scripts/watch.js # check OWASP repos, arXiv, NVD, framework pages
|
|
436
|
+
node scripts/watch.js --dry-run # preview findings without opening issues
|
|
437
|
+
node scripts/watch.js --watcher arxiv # run single watcher
|
|
438
|
+
```
|
|
439
|
+
|
|
440
|
+
Weekly GitHub Actions cron (`.github/workflows/weekly-watch.yml`) runs all 4 watchers and opens labeled issues automatically.
|
|
441
|
+
|
|
442
|
+
### npm package
|
|
443
|
+
|
|
444
|
+
```bash
|
|
445
|
+
npm install @owasp/genai-crosswalk
|
|
446
|
+
```
|
|
447
|
+
|
|
448
|
+
```typescript
|
|
449
|
+
import { getEntry, getFramework, searchEntries, incidents } from '@owasp/genai-crosswalk';
|
|
450
|
+
|
|
451
|
+
const llm01 = getEntry('LLM01'); // typed Entry object
|
|
452
|
+
const euai = getFramework('EU AI Act'); // { framework, entries, controls }
|
|
453
|
+
const hits = searchEntries('injection'); // Entry[]
|
|
454
|
+
const incs = incidents; // 50 Incident[] with MAESTRO layers
|
|
455
|
+
```
|
|
456
|
+
|
|
457
|
+
Full TypeScript types included for all data structures.
|
|
458
|
+
|
|
459
|
+
---
|
|
460
|
+
|
|
461
|
+
## Start here — by role
|
|
462
|
+
|
|
463
|
+
Find your entry point in under 60 seconds.
|
|
464
|
+
|
|
465
|
+
**I need to comply with EU AI Act before August 2026**
|
|
466
|
+
→ Start: [LLM_EUAIAct.md](llm-top10/LLM_EUAIAct.md) — article-level obligations, fines exposure, compliance checklist
|
|
467
|
+
→ Then: [Agentic_EUAIAct.md](agentic-top10/Agentic_EUAIAct.md) if you deploy autonomous agents (Art. 14 human oversight)
|
|
468
|
+
→ Then: [DSGAI_EUAIAct.md](dsgai-2026/DSGAI_EUAIAct.md) for GPAI model scope and data governance obligations
|
|
469
|
+
|
|
470
|
+
**I am deploying an autonomous AI agent and need to know what can go wrong**
|
|
471
|
+
→ Start: [CROSSREF.md](CROSSREF.md) — master cross-reference across all 41 vulnerability IDs
|
|
472
|
+
→ Then: [Agentic_MAESTRO.md](agentic-top10/Agentic_MAESTRO.md) — architectural threat model (where does each risk originate?)
|
|
473
|
+
→ Then: [Agentic_AIVSS.md](agentic-top10/Agentic_AIVSS.md) — score each risk; autonomy adds +1.79 avg severity
|
|
474
|
+
→ Then: [Agentic_OWASP_NHI.md](agentic-top10/Agentic_OWASP_NHI.md) — identity and credential controls
|
|
475
|
+
|
|
476
|
+
**I am a SOC 2 auditor or GRC professional preparing a GenAI controls assessment**
|
|
477
|
+
→ Start: [LLM_SOC2.md](llm-top10/LLM_SOC2.md) — TSC mapping for SaaS/cloud LLM deployments
|
|
478
|
+
→ Then: [Agentic_SOC2.md](agentic-top10/Agentic_SOC2.md) — autonomous action scope, processing integrity criteria
|
|
479
|
+
→ Then: [LLM_SAMM.md](llm-top10/LLM_SAMM.md) — fillable SAMM maturity scorecard to evidence programme completeness
|
|
480
|
+
|
|
481
|
+
**I am an AppSec engineer or red-teamer building a test plan**
|
|
482
|
+
→ Start: [Agentic_AITG.md](agentic-top10/Agentic_AITG.md) — 50 structured test cases with pass criteria and CI/CD gates
|
|
483
|
+
→ Then: [DSGAI_MITREATLAS.md](dsgai-2026/DSGAI_MITREATLAS.md) — attacker TTP mapping with four complete attack chains
|
|
484
|
+
→ Then: [shared/RECIPES.md](shared/RECIPES.md) — 21 working Python patterns to implement the controls you test against
|
|
485
|
+
|
|
486
|
+
**I am a US federal contractor needing FedRAMP authorization for AI services**
|
|
487
|
+
→ Start: [LLM_FedRAMP.md](llm-top10/LLM_FedRAMP.md) — SP 800-53 AI overlay controls (AC/AU/CA/CM/IA/IR/RA/SA/SC/SI/SR)
|
|
488
|
+
→ Then: [Agentic_FedRAMP.md](agentic-top10/Agentic_FedRAMP.md) for agentic AI agent identity and cascade controls
|
|
489
|
+
→ Then: [DSGAI_FedRAMP.md](dsgai-2026/DSGAI_FedRAMP.md) for data security controls (SC-28, AU-2, SR)
|
|
490
|
+
|
|
491
|
+
**I work in EU financial services and need DORA compliance for AI systems**
|
|
492
|
+
→ Start: [LLM_DORA.md](llm-top10/LLM_DORA.md) — Art. 5–45 per LLM risk, incident reporting requirements
|
|
493
|
+
→ Then: [Agentic_DORA.md](agentic-top10/Agentic_DORA.md) for third-party agent risk (Art. 28–44)
|
|
494
|
+
→ Then: [DSGAI_DORA.md](dsgai-2026/DSGAI_DORA.md) for data resilience and backup (Art. 8, Art. 12)
|
|
495
|
+
|
|
496
|
+
**I am securing AI deployed in OT/ICS environments (energy, utilities, manufacturing)**
|
|
497
|
+
→ Start: [Agentic_NISTSP80082.md](agentic-top10/Agentic_NISTSP80082.md) — OT zone model, SP 800-53 controls, NERC CIP/AWIA/CMMC crosswalk
|
|
498
|
+
→ Then: [Agentic_ISA62443.md](agentic-top10/Agentic_ISA62443.md) — SL ratings, zone model, kill switch design
|
|
499
|
+
→ Then: [DSGAI_ISA62443.md](dsgai-2026/DSGAI_ISA62443.md) — RAG corpus poisoning in OT (safety procedure manipulation scenario)
|
|
500
|
+
|
|
501
|
+
---
|
|
502
|
+
|
|
503
|
+
## Quick navigation
|
|
504
|
+
|
|
505
|
+
**EU AI Act compliance by August 2026**
|
|
506
|
+
→ [LLM_EUAIAct.md](llm-top10/LLM_EUAIAct.md) · [Agentic_EUAIAct.md](agentic-top10/Agentic_EUAIAct.md) · [DSGAI_EUAIAct.md](dsgai-2026/DSGAI_EUAIAct.md)
|
|
507
|
+
|
|
508
|
+
**European organisation subject to NIS2**
|
|
509
|
+
→ [LLM_ENISA.md](llm-top10/LLM_ENISA.md) — ENISA framework with NIS2 Article 23 incident assessment guidance
|
|
510
|
+
|
|
511
|
+
**AI in OT/ICS environments**
|
|
512
|
+
→ [LLM_ISA62443.md](llm-top10/LLM_ISA62443.md) · [Agentic_ISA62443.md](agentic-top10/Agentic_ISA62443.md) · [DSGAI_ISA62443.md](dsgai-2026/DSGAI_ISA62443.md) · [LLM_NISTSP80082.md](llm-top10/LLM_NISTSP80082.md)
|
|
513
|
+
|
|
514
|
+
**Deploying autonomous agents**
|
|
515
|
+
→ [Agentic_OWASP_NHI.md](agentic-top10/Agentic_OWASP_NHI.md) — identity governance
|
|
516
|
+
→ [Agentic_AIUC1.md](agentic-top10/Agentic_AIUC1.md) — agentic governance certification
|
|
517
|
+
→ [Agentic_AIVSS.md](agentic-top10/Agentic_AIVSS.md) — risk scoring with autonomy premium
|
|
518
|
+
|
|
519
|
+
**Threat modeling an agentic AI system before selecting controls**
|
|
520
|
+
→ [Agentic_MAESTRO.md](agentic-top10/Agentic_MAESTRO.md) — MAESTRO seven-layer threat enumeration with session guide
|
|
521
|
+
→ [DSGAI_MAESTRO.md](dsgai-2026/DSGAI_MAESTRO.md) — MAESTRO data operations lens for all 21 DSGAI entries
|
|
522
|
+
|
|
523
|
+
**ISO 27001 ISMS extension for GenAI**
|
|
524
|
+
→ [LLM_ISO27001.md](llm-top10/LLM_ISO27001.md) · [Agentic_ISO27001.md](agentic-top10/Agentic_ISO27001.md) · [DSGAI_ISO27001.md](dsgai-2026/DSGAI_ISO27001.md)
|
|
525
|
+
|
|
526
|
+
**ISO 42001 AIMS for AI governance**
|
|
527
|
+
→ [LLM_ISO42001.md](llm-top10/LLM_ISO42001.md) · [Agentic_ISO42001.md](agentic-top10/Agentic_ISO42001.md) — includes EU AI Act compliance evidence table
|
|
528
|
+
|
|
529
|
+
**Security programme maturity**
|
|
530
|
+
→ [LLM_SAMM.md](llm-top10/LLM_SAMM.md) — SAMM L1–L3 roadmap with fillable scorecard
|
|
531
|
+
|
|
532
|
+
**Security test plan for agentic AI**
|
|
533
|
+
→ [Agentic_AITG.md](agentic-top10/Agentic_AITG.md) — 50 structured test cases, pre-deployment gates, OT addendum
|
|
534
|
+
|
|
535
|
+
**Risk register scoring for agentic AI**
|
|
536
|
+
→ [Agentic_AIVSS.md](agentic-top10/Agentic_AIVSS.md) — supervised vs autonomous dual-scenario scoring, avg +1.79 autonomy premium
|
|
537
|
+
|
|
538
|
+
**Attacker perspective on GenAI risks**
|
|
539
|
+
→ [DSGAI_MITREATLAS.md](dsgai-2026/DSGAI_MITREATLAS.md) — ATLAS technique mapping, four attack path chains
|
|
540
|
+
→ [Agentic_MITREATLAS.md](agentic-top10/Agentic_MITREATLAS.md) — agentic technique chaining
|
|
541
|
+
|
|
542
|
+
**CWE root causes and confirmed CVEs**
|
|
543
|
+
→ [Agentic_CWE_CVE.md](agentic-top10/Agentic_CWE_CVE.md) — root cause taxonomy, CVE evidence, cross-reference index
|
|
544
|
+
|
|
545
|
+
**Implementation code, not framework theory**
|
|
546
|
+
→ [shared/RECIPES.md](shared/RECIPES.md) — 21 production patterns with working Python
|
|
547
|
+
|
|
548
|
+
**US federal / FedRAMP authorization for AI services**
|
|
549
|
+
→ [LLM_FedRAMP.md](llm-top10/LLM_FedRAMP.md) · [Agentic_FedRAMP.md](agentic-top10/Agentic_FedRAMP.md) · [DSGAI_FedRAMP.md](dsgai-2026/DSGAI_FedRAMP.md)
|
|
550
|
+
|
|
551
|
+
**EU financial sector (DORA compliance)**
|
|
552
|
+
——— [LLM_DORA.md](llm-top10/LLM_DORA.md) · [Agentic_DORA.md](agentic-top10/Agentic_DORA.md) · [DSGAI_DORA.md](dsgai-2026/DSGAI_DORA.md)
|
|
553
|
+
|
|
554
|
+
**Secure AI development lifecycle (SSDF extension)**
|
|
555
|
+
→ [LLM_SP800218A.md](llm-top10/LLM_SP800218A.md) —— [Agentic_SP800218A.md](agentic-top10/Agentic_SP800218A.md) · [DSGAI_SP800218A.md](dsgai-2026/DSGAI_SP800218A.md)
|
|
556
|
+
|
|
557
|
+
**All risks across all three source lists**
|
|
558
|
+
→ [CROSSREF.md](CROSSREF.md) — master cross-reference
|
|
559
|
+
|
|
560
|
+
---
|
|
561
|
+
|
|
562
|
+
## Standout coverage
|
|
563
|
+
|
|
564
|
+
### Complete OT/ICS trilogy
|
|
565
|
+
|
|
566
|
+
The only publicly available mapping of all three OWASP GenAI source lists to ISA/IEC 62443 and NIST SP 800-82 Rev 3. Includes zone model placement, security level ratings, Fundamental Requirement and Security Requirement references, OT-specific threat scenarios, and pre-deployment checklists for each source list.
|
|
567
|
+
|
|
568
|
+
The RAG corpus poisoning scenario in [DSGAI_ISA62443.md](dsgai-2026/DSGAI_ISA62443.md) — a safety procedure manipulation attack that modifies maintenance intervals without any OT network access — exists nowhere else in public documentation.
|
|
569
|
+
|
|
570
|
+
### MAESTRO seven-layer threat modeling
|
|
571
|
+
|
|
572
|
+
[Agentic_MAESTRO.md](agentic-top10/Agentic_MAESTRO.md) and [DSGAI_MAESTRO.md](dsgai-2026/DSGAI_MAESTRO.md) are the only public mappings of OWASP GenAI risks to the MAESTRO framework from the Cloud Security Alliance. Unlike every other file in this repo — which maps risks to controls — MAESTRO maps each risk to the **architectural layer where it originates**, telling you which team owns the problem and where in the system the fix must be deployed.
|
|
573
|
+
|
|
574
|
+
Key finding from the DSGAI mapping: **L2 Data Operations is the originating layer for 52% of all DSGAI entries**. An organisation that does not treat RAG corpora, embedding stores, training pipelines, and memory systems as security-critical infrastructure is under-defended against the majority of the GenAI data security threat landscape.
|
|
575
|
+
|
|
576
|
+
### Agentic autonomy premium
|
|
577
|
+
|
|
578
|
+
[Agentic_AIVSS.md](agentic-top10/Agentic_AIVSS.md) quantifies what removing human oversight costs in risk: average **+1.79 AIVSS severity points** across all 10 agentic entries. Removing human oversight converts 7 of 10 entries from High to Critical — the quantitative case for mandatory human oversight under EU AI Act Article 14.
|
|
579
|
+
|
|
580
|
+
### Complete agentic identity coverage
|
|
581
|
+
|
|
582
|
+
[Agentic_OWASP_NHI.md](agentic-top10/Agentic_OWASP_NHI.md) maps every NHI Top 10 entry to every ASI entry — the only public document translating agentic security risks into the NHI controls that IAM teams already operate.
|
|
583
|
+
|
|
584
|
+
### SAMM maturity scorecard
|
|
585
|
+
|
|
586
|
+
[LLM_SAMM.md](llm-top10/LLM_SAMM.md) includes a fillable maturity scorecard with minimum viable levels per SAMM practice for any LLM production deployment — the artefact security programme leads use to brief engineering leadership on where the programme stands and what to improve next.
|
|
587
|
+
|
|
588
|
+
### Production implementation recipes
|
|
589
|
+
|
|
590
|
+
[shared/RECIPES.md](shared/RECIPES.md) contains 21 production-ready security patterns with working Python across 5 deployment architectures: RAG pipeline security (access control, ingestion integrity, circuit breakers), MCP server hardening (input validation, credential scoping), OT/ICS agent safety (kill switches, behavioural baselines, cascade containment), agentic AI security (memory sanitization, inter-agent message validation, credential rotation, output guardrails), and data pipeline security (provenance tracking, PII redaction, differential privacy, retention enforcement).
|
|
591
|
+
|
|
592
|
+
---
|
|
593
|
+
|
|
594
|
+
## Contributing
|
|
595
|
+
|
|
596
|
+
Contributions are welcome — new framework mappings, updated controls, new implementation recipes, translations, and additional tool entries.
|
|
597
|
+
|
|
598
|
+
See [CONTRIBUTING.md](CONTRIBUTING.md) for the file template, PR process, and contribution guidelines. All contributors are listed in the CHANGELOG.
|
|
599
|
+
|
|
600
|
+
---
|
|
601
|
+
|
|
602
|
+
## License
|
|
603
|
+
|
|
604
|
+
[Creative Commons Attribution-ShareAlike 4.0 International](LICENSE)
|
|
605
|
+
|
|
606
|
+
Free to share and adapt for any purpose, including commercial use, with appropriate credit and distribution under the same license.
|
|
607
|
+
|
|
608
|
+
---
|
|
609
|
+
|
|
610
|
+
## Acknowledgements
|
|
611
|
+
|
|
612
|
+
Created and led by **[Emmanuel Guilherme Junior](https://github.com/emmanuelgjr)**, who leads the [OWASP GenAI Data Security Initiative](https://genai.owasp.org).
|
|
613
|
+
|
|
614
|
+
Built on the work of the OWASP LLM Top 10, OWASP Agentic Top 10, OWASP GenAI Data Security, OWASP NHI Top 10, and OWASP SAMM project teams.
|
|
615
|
+
|
|
616
|
+
---
|
|
617
|
+
|
|
618
|
+
*[genai.owasp.org](https://genai.owasp.org) · [CC BY-SA 4.0](LICENSE)*
|