aipea 1.1.0__tar.gz
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- aipea-1.1.0/.claude/commands/audit-deps.md +11 -0
- aipea-1.1.0/.claude/commands/test-module.md +11 -0
- aipea-1.1.0/.claude/commands/verify-spec.md +19 -0
- aipea-1.1.0/.github/CODEOWNERS +6 -0
- aipea-1.1.0/.github/ISSUE_TEMPLATE/bcp-drp-test.yml +112 -0
- aipea-1.1.0/.github/ISSUE_TEMPLATE/change-request.yml +112 -0
- aipea-1.1.0/.github/ISSUE_TEMPLATE/config.yml +8 -0
- aipea-1.1.0/.github/ISSUE_TEMPLATE/incident-response-drill.yml +118 -0
- aipea-1.1.0/.github/ISSUE_TEMPLATE/postmarket-monitoring-review.yml +100 -0
- aipea-1.1.0/.github/ISSUE_TEMPLATE/quarterly-access-review.yml +87 -0
- aipea-1.1.0/.github/ISSUE_TEMPLATE/vendor-risk-assessment.yml +87 -0
- aipea-1.1.0/.github/PULL_REQUEST_TEMPLATE.md +26 -0
- aipea-1.1.0/.github/dependabot.yml +27 -0
- aipea-1.1.0/.github/workflows/ci.yml +52 -0
- aipea-1.1.0/.github/workflows/codeql-analysis.yml +27 -0
- aipea-1.1.0/.github/workflows/compliance-evidence-scheduler.yml +529 -0
- aipea-1.1.0/.github/workflows/compliance-nightly.yml +45 -0
- aipea-1.1.0/.github/workflows/dependency-review.yml +14 -0
- aipea-1.1.0/.github/workflows/publish.yml +49 -0
- aipea-1.1.0/.github/workflows/scaffold-checks.yml +26 -0
- aipea-1.1.0/.gitignore +44 -0
- aipea-1.1.0/.pre-commit-config.yaml +58 -0
- aipea-1.1.0/.semgrep.yaml +20 -0
- aipea-1.1.0/CHANGELOG.md +72 -0
- aipea-1.1.0/CLAUDE.md +432 -0
- aipea-1.1.0/CONTRIBUTING.md +7 -0
- aipea-1.1.0/KNOWN_ISSUES.md +391 -0
- aipea-1.1.0/LICENSE +21 -0
- aipea-1.1.0/Makefile +40 -0
- aipea-1.1.0/PKG-INFO +256 -0
- aipea-1.1.0/README.md +226 -0
- aipea-1.1.0/SPECIFICATION.md +1297 -0
- aipea-1.1.0/ai/AIMS-POLICY.md +20 -0
- aipea-1.1.0/ai/data-card.yaml +30 -0
- aipea-1.1.0/ai/model-card.yaml +49 -0
- aipea-1.1.0/ai/oversight-plan.md +25 -0
- aipea-1.1.0/ai/postmarket-monitoring.md +55 -0
- aipea-1.1.0/ai/risk-register.yaml +44 -0
- aipea-1.1.0/ai/system-register.yaml +28 -0
- aipea-1.1.0/ai/technical_file/README.md +11 -0
- aipea-1.1.0/ai/technical_file/conformity/README.md +6 -0
- aipea-1.1.0/ai/technical_file/conformity/annex-iv-checklist.md +11 -0
- aipea-1.1.0/ai/technical_file/instructions-for-use.md +30 -0
- aipea-1.1.0/ai/technical_file/logs/README.md +109 -0
- aipea-1.1.0/ai/technical_file/testing/tev_report_template.md +24 -0
- aipea-1.1.0/aipea_knowledge.db +0 -0
- aipea-1.1.0/benchmarks/perf_baseline.json +8 -0
- aipea-1.1.0/benchmarks/run.sh +16 -0
- aipea-1.1.0/docs/NEXT_STEPS.md +444 -0
- aipea-1.1.0/docs/ROADMAP.md +188 -0
- aipea-1.1.0/docs/adr/ADR-001-extraction.md +66 -0
- aipea-1.1.0/docs/adr/template.md +14 -0
- aipea-1.1.0/docs/claude/audits/aipea.md +237 -0
- aipea-1.1.0/docs/compliance/ACCESS-REVIEW.md +129 -0
- aipea-1.1.0/docs/compliance/BCP-DRP.md +163 -0
- aipea-1.1.0/docs/compliance/CHANGE-MANAGEMENT.md +166 -0
- aipea-1.1.0/docs/compliance/DSR-PRIVACY-OPERATIONS.md +196 -0
- aipea-1.1.0/docs/compliance/IRP.md +200 -0
- aipea-1.1.0/docs/compliance/VENDOR-RISK.md +146 -0
- aipea-1.1.0/docs/compliance/system-description.md +137 -0
- aipea-1.1.0/docs/design-reference/aipea-agent-framework.py +933 -0
- aipea-1.1.0/docs/design-reference/aipea-agora-integration.py +608 -0
- aipea-1.1.0/docs/design-reference/aipea-aws-deployment.txt +1287 -0
- aipea-1.1.0/docs/design-reference/aipea-config-management.txt +1599 -0
- aipea-1.1.0/docs/design-reference/aipea-enhancement-engine.py +616 -0
- aipea-1.1.0/docs/design-reference/aipea-market-configs.py +701 -0
- aipea-1.1.0/docs/design-reference/aipea-offline-knowledge.py +832 -0
- aipea-1.1.0/docs/design-reference/aipea-resilience-tests.py +945 -0
- aipea-1.1.0/docs/design-reference/aipea-specification.md +373 -0
- aipea-1.1.0/docs/integration/aegis-adapter.md +57 -0
- aipea-1.1.0/docs/integration/agora-adapter.md +68 -0
- aipea-1.1.0/policy/README.md +40 -0
- aipea-1.1.0/policy/agent-egress.rego +17 -0
- aipea-1.1.0/pyproject.toml +114 -0
- aipea-1.1.0/schemas/log_event.schema.json +88 -0
- aipea-1.1.0/src/aipea/__init__.py +108 -0
- aipea-1.1.0/src/aipea/__main__.py +6 -0
- aipea-1.1.0/src/aipea/_types.py +73 -0
- aipea-1.1.0/src/aipea/analyzer.py +838 -0
- aipea-1.1.0/src/aipea/cli.py +466 -0
- aipea-1.1.0/src/aipea/config.py +352 -0
- aipea-1.1.0/src/aipea/engine.py +1544 -0
- aipea-1.1.0/src/aipea/enhancer.py +1049 -0
- aipea-1.1.0/src/aipea/knowledge.py +706 -0
- aipea-1.1.0/src/aipea/models.py +105 -0
- aipea-1.1.0/src/aipea/py.typed +0 -0
- aipea-1.1.0/src/aipea/search.py +1227 -0
- aipea-1.1.0/src/aipea/security.py +709 -0
- aipea-1.1.0/tests/__init__.py +0 -0
- aipea-1.1.0/tests/conftest.py +8 -0
- aipea-1.1.0/tests/test_analyzer.py +73 -0
- aipea-1.1.0/tests/test_analyzer_enhanced.py +501 -0
- aipea-1.1.0/tests/test_cli.py +226 -0
- aipea-1.1.0/tests/test_config.py +556 -0
- aipea-1.1.0/tests/test_engine.py +1819 -0
- aipea-1.1.0/tests/test_enhancer.py +1158 -0
- aipea-1.1.0/tests/test_knowledge.py +694 -0
- aipea-1.1.0/tests/test_ollama.py +377 -0
- aipea-1.1.0/tests/test_search.py +1420 -0
- aipea-1.1.0/tests/test_security.py +729 -0
- aipea-1.1.0/tools/ci/ai_act_lint.py +28 -0
- aipea-1.1.0/tools/ci/ai_rmf_validate_artifacts.py +45 -0
- aipea-1.1.0/tools/ci/enforce_perf_gate.py +95 -0
- aipea-1.1.0/tools/ci/generate_precommit_config.py +402 -0
- aipea-1.1.0/tools/ci/generate_scorecard.py +321 -0
- aipea-1.1.0/tools/ci/validate_agent_messages.py +34 -0
- aipea-1.1.0/tools/ci/validate_log_schema.py +142 -0
- aipea-1.1.0/tools/ci/validate_scaffold_adoption.py +140 -0
- aipea-1.1.0/tools/ci/verify_fips.py +101 -0
|
@@ -0,0 +1,11 @@
|
|
|
1
|
+
Audit AIPEA dependencies for security vulnerabilities and license compliance.
|
|
2
|
+
|
|
3
|
+
Steps:
|
|
4
|
+
1. Read `pyproject.toml` to list all dependencies (core + dev)
|
|
5
|
+
2. For each dependency, verify:
|
|
6
|
+
- License is MIT-compatible (MIT, BSD, Apache 2.0, ISC) — REFUSE GPL/LGPL/AGPL
|
|
7
|
+
- No known CVEs (check via `pip audit` if available, or web search)
|
|
8
|
+
3. Verify core modules (`security.py`, `knowledge.py`, `search.py`) import only stdlib + httpx
|
|
9
|
+
- Run: `grep "^import\|^from" src/aipea/security.py src/aipea/knowledge.py src/aipea/search.py`
|
|
10
|
+
4. Check for outdated packages: `pip list --outdated` (if in venv)
|
|
11
|
+
5. Report findings as a table: Package | Version | License | Status | Notes
|
|
@@ -0,0 +1,11 @@
|
|
|
1
|
+
Test a specific AIPEA module with coverage reporting.
|
|
2
|
+
|
|
3
|
+
Usage: /test-module <module_name>
|
|
4
|
+
|
|
5
|
+
Run targeted tests for the specified module (e.g., security, analyzer, engine, enhancer, knowledge, search) and report coverage for that module only.
|
|
6
|
+
|
|
7
|
+
Steps:
|
|
8
|
+
1. Run: `pytest tests/test_$ARGUMENTS.py -v --cov=src/aipea/$ARGUMENTS --cov-report=term-missing`
|
|
9
|
+
2. If the test file doesn't exist, search for matching test files: `ls tests/test_*$ARGUMENTS*.py`
|
|
10
|
+
3. Report pass/fail count, coverage percentage, and any uncovered lines
|
|
11
|
+
4. If coverage is below 75%, suggest which lines/branches need tests
|
|
@@ -0,0 +1,19 @@
|
|
|
1
|
+
Verify that the AIPEA implementation matches SPECIFICATION.md.
|
|
2
|
+
|
|
3
|
+
Steps:
|
|
4
|
+
1. Read `SPECIFICATION.md` to extract:
|
|
5
|
+
- All defined modules and their responsibilities
|
|
6
|
+
- All public classes/functions specified
|
|
7
|
+
- All environment variables specified
|
|
8
|
+
- All compliance modes specified
|
|
9
|
+
- All processing tiers and query types
|
|
10
|
+
2. Read `src/aipea/__init__.py` to get the actual public API (`__all__`)
|
|
11
|
+
3. For each module in the spec, read the corresponding source file and verify:
|
|
12
|
+
- All specified classes/functions exist
|
|
13
|
+
- All specified parameters are present
|
|
14
|
+
- Return types match specification
|
|
15
|
+
4. Check for implementation drift:
|
|
16
|
+
- Features in code but NOT in spec (undocumented)
|
|
17
|
+
- Features in spec but NOT in code (unimplemented)
|
|
18
|
+
5. Report as a table: Feature | Spec Status | Code Status | Match?
|
|
19
|
+
6. Flag any critical mismatches that need attention
|
|
@@ -0,0 +1,112 @@
|
|
|
1
|
+
name: "BCP/DRP Test"
|
|
2
|
+
description: "SOC 2 A1.x / FedRAMP CP-9,CP-10 — Document annual business continuity and disaster recovery test"
|
|
3
|
+
title: "[BCP/DRP Test] YYYY"
|
|
4
|
+
labels:
|
|
5
|
+
- "compliance/soc2"
|
|
6
|
+
- "cadence/annual"
|
|
7
|
+
- "evidence/bcp-drp"
|
|
8
|
+
assignees: []
|
|
9
|
+
body:
|
|
10
|
+
- type: markdown
|
|
11
|
+
attributes:
|
|
12
|
+
value: |
|
|
13
|
+
## Annual BCP/DRP Test
|
|
14
|
+
Complete this form to document the annual business continuity and disaster recovery test.
|
|
15
|
+
Reference: `docs/compliance/BCP-DRP.md` for the full Business Continuity / Disaster Recovery plan.
|
|
16
|
+
|
|
17
|
+
**Compliance mapping**: SOC 2 A1.2/A1.3 | FedRAMP CP-9, CP-10 | ISO 42001 Support
|
|
18
|
+
|
|
19
|
+
- type: input
|
|
20
|
+
id: test-date
|
|
21
|
+
attributes:
|
|
22
|
+
label: "Test Date"
|
|
23
|
+
description: "Date the BCP/DRP test was conducted"
|
|
24
|
+
placeholder: "YYYY-MM-DD"
|
|
25
|
+
validations:
|
|
26
|
+
required: true
|
|
27
|
+
|
|
28
|
+
- type: dropdown
|
|
29
|
+
id: test-type
|
|
30
|
+
attributes:
|
|
31
|
+
label: "Test Type"
|
|
32
|
+
description: "What type of test was conducted?"
|
|
33
|
+
options:
|
|
34
|
+
- "Tabletop / walkthrough"
|
|
35
|
+
- "Partial failover (non-production)"
|
|
36
|
+
- "Full failover (production)"
|
|
37
|
+
- "Backup restoration test"
|
|
38
|
+
validations:
|
|
39
|
+
required: true
|
|
40
|
+
|
|
41
|
+
- type: input
|
|
42
|
+
id: facilitator
|
|
43
|
+
attributes:
|
|
44
|
+
label: "Test Lead"
|
|
45
|
+
description: "Person who led the BCP/DRP test"
|
|
46
|
+
placeholder: "Jane Smith"
|
|
47
|
+
validations:
|
|
48
|
+
required: true
|
|
49
|
+
|
|
50
|
+
- type: textarea
|
|
51
|
+
id: scope
|
|
52
|
+
attributes:
|
|
53
|
+
label: "Test Scope"
|
|
54
|
+
description: "Which systems, services, and recovery procedures were tested?"
|
|
55
|
+
placeholder: |
|
|
56
|
+
- RDS failover to secondary region
|
|
57
|
+
- S3 cross-region replication validation
|
|
58
|
+
- Application deployment to DR environment
|
|
59
|
+
- DNS failover procedure
|
|
60
|
+
validations:
|
|
61
|
+
required: true
|
|
62
|
+
|
|
63
|
+
- type: textarea
|
|
64
|
+
id: rto-rpo
|
|
65
|
+
attributes:
|
|
66
|
+
label: "RTO/RPO Results"
|
|
67
|
+
description: "Document actual recovery times vs. targets"
|
|
68
|
+
placeholder: |
|
|
69
|
+
| System | Target RTO | Actual RTO | Target RPO | Actual RPO | Pass? |
|
|
70
|
+
|--------|-----------|------------|-----------|------------|-------|
|
|
71
|
+
| API | 1 hour | 45 min | 15 min | 10 min | Yes |
|
|
72
|
+
| DB | 30 min | 25 min | 5 min | 3 min | Yes |
|
|
73
|
+
validations:
|
|
74
|
+
required: true
|
|
75
|
+
|
|
76
|
+
- type: textarea
|
|
77
|
+
id: findings
|
|
78
|
+
attributes:
|
|
79
|
+
label: "Findings & Issues"
|
|
80
|
+
description: "Document any issues discovered during the test"
|
|
81
|
+
placeholder: |
|
|
82
|
+
- [ ] All systems recovered within RTO targets
|
|
83
|
+
- [ ] All data recovered within RPO targets
|
|
84
|
+
- [ ] Runbooks were accurate and current
|
|
85
|
+
- [ ] Contact lists were up to date
|
|
86
|
+
- [ ] Communication procedures worked as expected
|
|
87
|
+
validations:
|
|
88
|
+
required: true
|
|
89
|
+
|
|
90
|
+
- type: textarea
|
|
91
|
+
id: improvements
|
|
92
|
+
attributes:
|
|
93
|
+
label: "Improvements & Action Items"
|
|
94
|
+
description: "Actions to improve BCP/DRP based on test results"
|
|
95
|
+
placeholder: |
|
|
96
|
+
- [ ] Update DNS failover TTL from 300s to 60s
|
|
97
|
+
- [ ] Add automated health check to DR environment
|
|
98
|
+
validations:
|
|
99
|
+
required: true
|
|
100
|
+
|
|
101
|
+
- type: checkboxes
|
|
102
|
+
id: attestation
|
|
103
|
+
attributes:
|
|
104
|
+
label: "Test Lead Attestation"
|
|
105
|
+
description: "Confirm the following"
|
|
106
|
+
options:
|
|
107
|
+
- label: "The test was conducted in accordance with docs/compliance/BCP-DRP.md"
|
|
108
|
+
required: true
|
|
109
|
+
- label: "All RTO/RPO results have been documented accurately"
|
|
110
|
+
required: true
|
|
111
|
+
- label: "The BCP/DRP plan will be updated to reflect lessons learned"
|
|
112
|
+
required: true
|
|
@@ -0,0 +1,112 @@
|
|
|
1
|
+
name: "Change Request"
|
|
2
|
+
description: "SOC 2 CC8.x / FedRAMP CM-2,CM-3 — Document a change management request"
|
|
3
|
+
title: "[Change Request]"
|
|
4
|
+
labels:
|
|
5
|
+
- "compliance/soc2"
|
|
6
|
+
- "evidence/change-mgmt"
|
|
7
|
+
assignees: []
|
|
8
|
+
body:
|
|
9
|
+
- type: markdown
|
|
10
|
+
attributes:
|
|
11
|
+
value: |
|
|
12
|
+
## Change Management Request
|
|
13
|
+
Complete this form to document a change request per the change management process.
|
|
14
|
+
Reference: `docs/compliance/CHANGE-MANAGEMENT.md` for the full change management policy.
|
|
15
|
+
|
|
16
|
+
**Compliance mapping**: SOC 2 CC8.1 | FedRAMP CM-2, CM-3 | ISO 42001 Operation | NIST AI RMF MANAGE
|
|
17
|
+
|
|
18
|
+
- type: dropdown
|
|
19
|
+
id: change-class
|
|
20
|
+
attributes:
|
|
21
|
+
label: "Change Class"
|
|
22
|
+
description: "Classify the change per Engineering Standards S10 (Governance)"
|
|
23
|
+
options:
|
|
24
|
+
- "Class A — Style-only (auto-merge eligible)"
|
|
25
|
+
- "Class B — Refactor (perf + golden dataset verification required)"
|
|
26
|
+
- "Class C — Behavioral (backtest delta report + risk sign-off required)"
|
|
27
|
+
validations:
|
|
28
|
+
required: true
|
|
29
|
+
|
|
30
|
+
- type: dropdown
|
|
31
|
+
id: risk-level
|
|
32
|
+
attributes:
|
|
33
|
+
label: "Risk Level"
|
|
34
|
+
description: "Assessed risk level of this change"
|
|
35
|
+
options:
|
|
36
|
+
- "Low — No customer impact, easily reversible"
|
|
37
|
+
- "Medium — Limited customer impact, reversible with effort"
|
|
38
|
+
- "High — Significant customer impact or difficult to reverse"
|
|
39
|
+
- "Critical — Production-wide impact, requires maintenance window"
|
|
40
|
+
validations:
|
|
41
|
+
required: true
|
|
42
|
+
|
|
43
|
+
- type: input
|
|
44
|
+
id: requester
|
|
45
|
+
attributes:
|
|
46
|
+
label: "Requester"
|
|
47
|
+
description: "Person requesting the change"
|
|
48
|
+
placeholder: "Jane Smith"
|
|
49
|
+
validations:
|
|
50
|
+
required: true
|
|
51
|
+
|
|
52
|
+
- type: textarea
|
|
53
|
+
id: description
|
|
54
|
+
attributes:
|
|
55
|
+
label: "Change Description"
|
|
56
|
+
description: "Describe what is being changed and why"
|
|
57
|
+
placeholder: |
|
|
58
|
+
**What**: Upgrade PostgreSQL from 15.4 to 16.1
|
|
59
|
+
**Why**: End-of-life for 15.x in Q2, performance improvements for JSONB queries
|
|
60
|
+
**Scope**: Production RDS instances (us-east-1, us-west-2)
|
|
61
|
+
validations:
|
|
62
|
+
required: true
|
|
63
|
+
|
|
64
|
+
- type: textarea
|
|
65
|
+
id: impact-analysis
|
|
66
|
+
attributes:
|
|
67
|
+
label: "Impact Analysis"
|
|
68
|
+
description: "Document affected systems, users, and services"
|
|
69
|
+
placeholder: |
|
|
70
|
+
- Affected systems: API servers, background workers, analytics pipeline
|
|
71
|
+
- Affected users: All (during maintenance window)
|
|
72
|
+
- Dependencies: Application code is compatible (tested in staging)
|
|
73
|
+
validations:
|
|
74
|
+
required: true
|
|
75
|
+
|
|
76
|
+
- type: textarea
|
|
77
|
+
id: rollback-plan
|
|
78
|
+
attributes:
|
|
79
|
+
label: "Rollback Plan"
|
|
80
|
+
description: "Document how to revert this change if needed"
|
|
81
|
+
placeholder: |
|
|
82
|
+
1. Restore RDS from pre-upgrade snapshot (< 15 min)
|
|
83
|
+
2. Repoint DNS to restored instance
|
|
84
|
+
3. Verify application connectivity
|
|
85
|
+
validations:
|
|
86
|
+
required: true
|
|
87
|
+
|
|
88
|
+
- type: textarea
|
|
89
|
+
id: test-plan
|
|
90
|
+
attributes:
|
|
91
|
+
label: "Test Plan"
|
|
92
|
+
description: "How will this change be verified?"
|
|
93
|
+
placeholder: |
|
|
94
|
+
- [ ] Staging environment upgrade completed successfully
|
|
95
|
+
- [ ] Integration tests pass against upgraded instance
|
|
96
|
+
- [ ] Performance benchmarks show no regression
|
|
97
|
+
- [ ] Backup/restore verified on upgraded version
|
|
98
|
+
validations:
|
|
99
|
+
required: true
|
|
100
|
+
|
|
101
|
+
- type: checkboxes
|
|
102
|
+
id: attestation
|
|
103
|
+
attributes:
|
|
104
|
+
label: "Requester Attestation"
|
|
105
|
+
description: "Confirm the following"
|
|
106
|
+
options:
|
|
107
|
+
- label: "This change has been tested in a non-production environment"
|
|
108
|
+
required: true
|
|
109
|
+
- label: "A rollback plan has been documented and verified"
|
|
110
|
+
required: true
|
|
111
|
+
- label: "Affected stakeholders have been notified"
|
|
112
|
+
required: true
|
|
@@ -0,0 +1,8 @@
|
|
|
1
|
+
blank_issues_enabled: false
|
|
2
|
+
contact_links:
|
|
3
|
+
- name: "Security Incident"
|
|
4
|
+
url: "https://github.com/undercurrentai/AIPEA/blob/main/docs/compliance/IRP.md"
|
|
5
|
+
about: "Report security incidents via the Incident Response process (docs/compliance/IRP.md)"
|
|
6
|
+
- name: "Privacy / Data Subject Request"
|
|
7
|
+
url: "https://github.com/undercurrentai/AIPEA/blob/main/docs/compliance/DSR-PRIVACY-OPERATIONS.md"
|
|
8
|
+
about: "Submit data subject requests via the DSR portal (docs/compliance/DSR-PRIVACY-OPERATIONS.md)"
|
|
@@ -0,0 +1,118 @@
|
|
|
1
|
+
name: "Incident Response Drill"
|
|
2
|
+
description: "SOC 2 CC7.x / FedRAMP IR-4,IR-5 — Document tabletop exercise or IR drill results"
|
|
3
|
+
title: "[IR Drill] Q_ YYYY"
|
|
4
|
+
labels:
|
|
5
|
+
- "compliance/soc2"
|
|
6
|
+
- "cadence/quarterly"
|
|
7
|
+
- "evidence/incident-drill"
|
|
8
|
+
assignees: []
|
|
9
|
+
body:
|
|
10
|
+
- type: markdown
|
|
11
|
+
attributes:
|
|
12
|
+
value: |
|
|
13
|
+
## Incident Response Drill / Tabletop Exercise
|
|
14
|
+
Complete this form to document the periodic incident response drill.
|
|
15
|
+
Reference: `docs/compliance/IRP.md` for the full Incident Response Plan.
|
|
16
|
+
|
|
17
|
+
**Compliance mapping**: SOC 2 CC7.2/CC7.3/CC7.4 | FedRAMP IR-4, IR-5 | ISO 42001 Support | NIST AI RMF MANAGE
|
|
18
|
+
|
|
19
|
+
- type: dropdown
|
|
20
|
+
id: quarter
|
|
21
|
+
attributes:
|
|
22
|
+
label: "Review Period"
|
|
23
|
+
description: "Which quarter does this drill cover?"
|
|
24
|
+
options:
|
|
25
|
+
- "Q1 (Jan–Mar)"
|
|
26
|
+
- "Q2 (Apr–Jun)"
|
|
27
|
+
- "Q3 (Jul–Sep)"
|
|
28
|
+
- "Q4 (Oct–Dec)"
|
|
29
|
+
validations:
|
|
30
|
+
required: true
|
|
31
|
+
|
|
32
|
+
- type: dropdown
|
|
33
|
+
id: drill-type
|
|
34
|
+
attributes:
|
|
35
|
+
label: "Drill Type"
|
|
36
|
+
description: "What type of exercise was conducted?"
|
|
37
|
+
options:
|
|
38
|
+
- "Tabletop exercise (discussion-based)"
|
|
39
|
+
- "Functional exercise (hands-on simulation)"
|
|
40
|
+
- "Full-scale exercise (live simulation)"
|
|
41
|
+
validations:
|
|
42
|
+
required: true
|
|
43
|
+
|
|
44
|
+
- type: input
|
|
45
|
+
id: facilitator
|
|
46
|
+
attributes:
|
|
47
|
+
label: "Facilitator"
|
|
48
|
+
description: "Person who facilitated the drill"
|
|
49
|
+
placeholder: "Jane Smith"
|
|
50
|
+
validations:
|
|
51
|
+
required: true
|
|
52
|
+
|
|
53
|
+
- type: textarea
|
|
54
|
+
id: scenario
|
|
55
|
+
attributes:
|
|
56
|
+
label: "Scenario Description"
|
|
57
|
+
description: "Describe the incident scenario used for the drill"
|
|
58
|
+
placeholder: |
|
|
59
|
+
Scenario: Unauthorized access to production database detected via anomalous
|
|
60
|
+
query patterns. Attacker appears to have exploited a SQL injection vulnerability
|
|
61
|
+
in the /api/search endpoint.
|
|
62
|
+
validations:
|
|
63
|
+
required: true
|
|
64
|
+
|
|
65
|
+
- type: textarea
|
|
66
|
+
id: participants
|
|
67
|
+
attributes:
|
|
68
|
+
label: "Participants"
|
|
69
|
+
description: "List all drill participants and their roles"
|
|
70
|
+
placeholder: |
|
|
71
|
+
- Jane Smith (Incident Commander)
|
|
72
|
+
- John Doe (Engineering Lead)
|
|
73
|
+
- Alice Johnson (Security)
|
|
74
|
+
- Bob Williams (Communications)
|
|
75
|
+
validations:
|
|
76
|
+
required: true
|
|
77
|
+
|
|
78
|
+
- type: textarea
|
|
79
|
+
id: timeline
|
|
80
|
+
attributes:
|
|
81
|
+
label: "Drill Timeline & Actions"
|
|
82
|
+
description: "Document the sequence of actions taken during the drill"
|
|
83
|
+
placeholder: |
|
|
84
|
+
1. T+0: Alert received, triage initiated
|
|
85
|
+
2. T+5: Incident Commander assigned, severity classified
|
|
86
|
+
3. T+15: Containment actions identified and (simulated) executed
|
|
87
|
+
4. T+30: Communication plan activated
|
|
88
|
+
5. T+45: Root cause analysis discussion
|
|
89
|
+
6. T+60: Recovery plan developed
|
|
90
|
+
validations:
|
|
91
|
+
required: true
|
|
92
|
+
|
|
93
|
+
- type: textarea
|
|
94
|
+
id: lessons-learned
|
|
95
|
+
attributes:
|
|
96
|
+
label: "Lessons Learned & Improvements"
|
|
97
|
+
description: "Document what went well, what needs improvement, and action items"
|
|
98
|
+
placeholder: |
|
|
99
|
+
**Went well**: Rapid triage, clear communication chain
|
|
100
|
+
**Needs improvement**: Runbook for database isolation was outdated
|
|
101
|
+
**Action items**:
|
|
102
|
+
- [ ] Update database isolation runbook by YYYY-MM-DD
|
|
103
|
+
- [ ] Add automated alerting for anomalous query patterns
|
|
104
|
+
validations:
|
|
105
|
+
required: true
|
|
106
|
+
|
|
107
|
+
- type: checkboxes
|
|
108
|
+
id: attestation
|
|
109
|
+
attributes:
|
|
110
|
+
label: "Facilitator Attestation"
|
|
111
|
+
description: "Confirm the following"
|
|
112
|
+
options:
|
|
113
|
+
- label: "The drill was conducted in accordance with docs/compliance/IRP.md"
|
|
114
|
+
required: true
|
|
115
|
+
- label: "All lessons learned have been documented with owners and due dates"
|
|
116
|
+
required: true
|
|
117
|
+
- label: "The IRP will be updated to reflect any procedural changes identified"
|
|
118
|
+
required: true
|
|
@@ -0,0 +1,100 @@
|
|
|
1
|
+
name: "Post-Market Monitoring Review"
|
|
2
|
+
description: "EU AI Act Art. 72 / NIST AI RMF MANAGE — Monthly AI system monitoring review"
|
|
3
|
+
title: "[Post-Market Monitoring] YYYY-MM"
|
|
4
|
+
labels:
|
|
5
|
+
- "compliance/eu-ai-act"
|
|
6
|
+
- "cadence/monthly"
|
|
7
|
+
- "evidence/postmarket"
|
|
8
|
+
assignees: []
|
|
9
|
+
body:
|
|
10
|
+
- type: markdown
|
|
11
|
+
attributes:
|
|
12
|
+
value: |
|
|
13
|
+
## Monthly Post-Market Monitoring Review
|
|
14
|
+
Complete this form to document the monthly review of AI system performance and safety.
|
|
15
|
+
Reference: `ai/postmarket-monitoring.md` for the full monitoring plan.
|
|
16
|
+
|
|
17
|
+
**Compliance mapping**: EU AI Act Art. 72 | ISO 42001 Improvement | NIST AI RMF MANAGE | FedRAMP CA-7
|
|
18
|
+
|
|
19
|
+
- type: input
|
|
20
|
+
id: review-period
|
|
21
|
+
attributes:
|
|
22
|
+
label: "Review Period"
|
|
23
|
+
description: "Month being reviewed"
|
|
24
|
+
placeholder: "YYYY-MM"
|
|
25
|
+
validations:
|
|
26
|
+
required: true
|
|
27
|
+
|
|
28
|
+
- type: input
|
|
29
|
+
id: reviewer
|
|
30
|
+
attributes:
|
|
31
|
+
label: "Reviewer Name"
|
|
32
|
+
description: "Person conducting this monitoring review"
|
|
33
|
+
placeholder: "Jane Smith"
|
|
34
|
+
validations:
|
|
35
|
+
required: true
|
|
36
|
+
|
|
37
|
+
- type: textarea
|
|
38
|
+
id: systems-monitored
|
|
39
|
+
attributes:
|
|
40
|
+
label: "AI Systems Monitored"
|
|
41
|
+
description: "List all AI systems reviewed, referencing ai/system-register.yaml"
|
|
42
|
+
placeholder: |
|
|
43
|
+
| System ID | Name | Risk Level | Status |
|
|
44
|
+
|-----------|------|------------|--------|
|
|
45
|
+
| AI-001 | PCW | High | Active |
|
|
46
|
+
validations:
|
|
47
|
+
required: true
|
|
48
|
+
|
|
49
|
+
- type: textarea
|
|
50
|
+
id: performance-metrics
|
|
51
|
+
attributes:
|
|
52
|
+
label: "Performance Metrics"
|
|
53
|
+
description: "Document key performance indicators for each AI system"
|
|
54
|
+
placeholder: |
|
|
55
|
+
- Accuracy / F1 score: X.XX (target: >= Y.YY)
|
|
56
|
+
- Latency P95: XXms (target: <= YYms)
|
|
57
|
+
- Error rate: X.X% (target: <= Y.Y%)
|
|
58
|
+
- Drift detected: Yes/No
|
|
59
|
+
validations:
|
|
60
|
+
required: true
|
|
61
|
+
|
|
62
|
+
- type: textarea
|
|
63
|
+
id: safety-incidents
|
|
64
|
+
attributes:
|
|
65
|
+
label: "Safety & Bias Incidents"
|
|
66
|
+
description: "Document any safety incidents, bias detections, or unexpected behaviors"
|
|
67
|
+
placeholder: |
|
|
68
|
+
- [ ] No safety incidents reported
|
|
69
|
+
- [ ] No bias drift detected in monitoring dashboards
|
|
70
|
+
- [ ] No user complaints related to AI system behavior
|
|
71
|
+
- [ ] Feedback mechanisms operational
|
|
72
|
+
validations:
|
|
73
|
+
required: true
|
|
74
|
+
|
|
75
|
+
- type: textarea
|
|
76
|
+
id: actions
|
|
77
|
+
attributes:
|
|
78
|
+
label: "Actions & Model Updates"
|
|
79
|
+
description: "Document any corrective actions, model retraining, or system updates"
|
|
80
|
+
placeholder: |
|
|
81
|
+
- Updated model weights to address detected drift (version X.Y.Z → X.Y.W)
|
|
82
|
+
- Added new monitoring alert for edge case scenario
|
|
83
|
+
- None required — all metrics within acceptable bounds
|
|
84
|
+
validations:
|
|
85
|
+
required: true
|
|
86
|
+
|
|
87
|
+
- type: checkboxes
|
|
88
|
+
id: attestation
|
|
89
|
+
attributes:
|
|
90
|
+
label: "Reviewer Attestation"
|
|
91
|
+
description: "Confirm the following"
|
|
92
|
+
options:
|
|
93
|
+
- label: "All AI systems in the system register have been reviewed"
|
|
94
|
+
required: true
|
|
95
|
+
- label: "Performance metrics are within acceptable bounds or remediation is documented"
|
|
96
|
+
required: true
|
|
97
|
+
- label: "This review was completed in accordance with ai/postmarket-monitoring.md"
|
|
98
|
+
required: true
|
|
99
|
+
- label: "The risk register (ai/risk-register.yaml) has been updated if new risks were identified"
|
|
100
|
+
required: true
|
|
@@ -0,0 +1,87 @@
|
|
|
1
|
+
name: "Quarterly Access Review"
|
|
2
|
+
description: "SOC 2 CC6.x / FedRAMP AC-2,IA-5 — Review and certify user access rights"
|
|
3
|
+
title: "[Access Review] Q_ YYYY"
|
|
4
|
+
labels:
|
|
5
|
+
- "compliance/soc2"
|
|
6
|
+
- "cadence/quarterly"
|
|
7
|
+
- "evidence/access-review"
|
|
8
|
+
assignees: []
|
|
9
|
+
body:
|
|
10
|
+
- type: markdown
|
|
11
|
+
attributes:
|
|
12
|
+
value: |
|
|
13
|
+
## Quarterly Access Review
|
|
14
|
+
Complete this form to document the periodic review of user access rights.
|
|
15
|
+
Reference: `docs/compliance/ACCESS-REVIEW.md` for full procedure.
|
|
16
|
+
|
|
17
|
+
**Compliance mapping**: SOC 2 CC6.1/CC6.2/CC6.3 | FedRAMP AC-2, IA-5 | ISO 42001 Support
|
|
18
|
+
|
|
19
|
+
- type: dropdown
|
|
20
|
+
id: quarter
|
|
21
|
+
attributes:
|
|
22
|
+
label: "Review Period"
|
|
23
|
+
description: "Which quarter does this review cover?"
|
|
24
|
+
options:
|
|
25
|
+
- "Q1 (Jan–Mar)"
|
|
26
|
+
- "Q2 (Apr–Jun)"
|
|
27
|
+
- "Q3 (Jul–Sep)"
|
|
28
|
+
- "Q4 (Oct–Dec)"
|
|
29
|
+
validations:
|
|
30
|
+
required: true
|
|
31
|
+
|
|
32
|
+
- type: input
|
|
33
|
+
id: reviewer
|
|
34
|
+
attributes:
|
|
35
|
+
label: "Reviewer Name"
|
|
36
|
+
description: "Person conducting this access review"
|
|
37
|
+
placeholder: "Jane Smith"
|
|
38
|
+
validations:
|
|
39
|
+
required: true
|
|
40
|
+
|
|
41
|
+
- type: textarea
|
|
42
|
+
id: systems-reviewed
|
|
43
|
+
attributes:
|
|
44
|
+
label: "Systems Reviewed"
|
|
45
|
+
description: "List all systems and platforms whose access was reviewed"
|
|
46
|
+
placeholder: |
|
|
47
|
+
- AWS IAM (production account)
|
|
48
|
+
- GitHub organization
|
|
49
|
+
- Database access (RDS)
|
|
50
|
+
- Secrets Manager
|
|
51
|
+
validations:
|
|
52
|
+
required: true
|
|
53
|
+
|
|
54
|
+
- type: textarea
|
|
55
|
+
id: findings
|
|
56
|
+
attributes:
|
|
57
|
+
label: "Findings"
|
|
58
|
+
description: "Document any access anomalies, orphaned accounts, or excessive privileges found"
|
|
59
|
+
placeholder: |
|
|
60
|
+
- [ ] All accounts have appropriate access levels
|
|
61
|
+
- [ ] No orphaned/inactive accounts found
|
|
62
|
+
- [ ] MFA enforced on all privileged accounts
|
|
63
|
+
- [ ] Service accounts have minimal required permissions
|
|
64
|
+
validations:
|
|
65
|
+
required: true
|
|
66
|
+
|
|
67
|
+
- type: textarea
|
|
68
|
+
id: remediation
|
|
69
|
+
attributes:
|
|
70
|
+
label: "Remediation Actions"
|
|
71
|
+
description: "Actions taken to resolve any findings (or 'None required' if clean)"
|
|
72
|
+
placeholder: "Revoked access for departed employee X. Reduced privileges for service account Y."
|
|
73
|
+
validations:
|
|
74
|
+
required: true
|
|
75
|
+
|
|
76
|
+
- type: checkboxes
|
|
77
|
+
id: attestation
|
|
78
|
+
attributes:
|
|
79
|
+
label: "Reviewer Attestation"
|
|
80
|
+
description: "Confirm the following"
|
|
81
|
+
options:
|
|
82
|
+
- label: "I have reviewed all user accounts for the systems listed above"
|
|
83
|
+
required: true
|
|
84
|
+
- label: "All identified issues have been remediated or have a documented remediation plan"
|
|
85
|
+
required: true
|
|
86
|
+
- label: "This review was completed in accordance with docs/compliance/ACCESS-REVIEW.md"
|
|
87
|
+
required: true
|
|
@@ -0,0 +1,87 @@
|
|
|
1
|
+
name: "Vendor Risk Assessment"
|
|
2
|
+
description: "SOC 2 CC9.x / FedRAMP SA-12 — Assess third-party vendor risk posture"
|
|
3
|
+
title: "[Vendor Risk] Q_ YYYY"
|
|
4
|
+
labels:
|
|
5
|
+
- "compliance/soc2"
|
|
6
|
+
- "cadence/quarterly"
|
|
7
|
+
- "evidence/vendor-risk"
|
|
8
|
+
assignees: []
|
|
9
|
+
body:
|
|
10
|
+
- type: markdown
|
|
11
|
+
attributes:
|
|
12
|
+
value: |
|
|
13
|
+
## Quarterly Vendor Risk Assessment
|
|
14
|
+
Complete this form to document the periodic review of third-party vendor risk.
|
|
15
|
+
Reference: `docs/compliance/VENDOR-RISK.md` for full procedure.
|
|
16
|
+
|
|
17
|
+
**Compliance mapping**: SOC 2 CC9.1/CC9.2 | FedRAMP SA-12 | ISO 42001 Support | NIST AI RMF GOVERN
|
|
18
|
+
|
|
19
|
+
- type: dropdown
|
|
20
|
+
id: quarter
|
|
21
|
+
attributes:
|
|
22
|
+
label: "Review Period"
|
|
23
|
+
description: "Which quarter does this review cover?"
|
|
24
|
+
options:
|
|
25
|
+
- "Q1 (Jan–Mar)"
|
|
26
|
+
- "Q2 (Apr–Jun)"
|
|
27
|
+
- "Q3 (Jul–Sep)"
|
|
28
|
+
- "Q4 (Oct–Dec)"
|
|
29
|
+
validations:
|
|
30
|
+
required: true
|
|
31
|
+
|
|
32
|
+
- type: input
|
|
33
|
+
id: reviewer
|
|
34
|
+
attributes:
|
|
35
|
+
label: "Reviewer Name"
|
|
36
|
+
description: "Person conducting this vendor review"
|
|
37
|
+
placeholder: "Jane Smith"
|
|
38
|
+
validations:
|
|
39
|
+
required: true
|
|
40
|
+
|
|
41
|
+
- type: textarea
|
|
42
|
+
id: vendors-reviewed
|
|
43
|
+
attributes:
|
|
44
|
+
label: "Vendors Reviewed"
|
|
45
|
+
description: "List all vendors assessed in this cycle with their risk tier"
|
|
46
|
+
placeholder: |
|
|
47
|
+
| Vendor | Service | Data Access | Risk Tier | SOC 2 Report? |
|
|
48
|
+
|--------|---------|-------------|-----------|---------------|
|
|
49
|
+
| AWS | Cloud | Yes | Critical | Yes (Type II) |
|
|
50
|
+
| Stripe | Payments| Yes (PCI) | High | Yes (Type II) |
|
|
51
|
+
validations:
|
|
52
|
+
required: true
|
|
53
|
+
|
|
54
|
+
- type: textarea
|
|
55
|
+
id: risk-findings
|
|
56
|
+
attributes:
|
|
57
|
+
label: "Risk Findings"
|
|
58
|
+
description: "Document any vendor risk concerns, SLA breaches, or compliance gaps"
|
|
59
|
+
placeholder: |
|
|
60
|
+
- [ ] All critical vendors have current SOC 2 / ISO 27001 reports
|
|
61
|
+
- [ ] No vendor SLA breaches in review period
|
|
62
|
+
- [ ] All vendor contracts include security/privacy clauses
|
|
63
|
+
- [ ] Subprocessor lists reviewed for changes
|
|
64
|
+
validations:
|
|
65
|
+
required: true
|
|
66
|
+
|
|
67
|
+
- type: textarea
|
|
68
|
+
id: remediation
|
|
69
|
+
attributes:
|
|
70
|
+
label: "Remediation Actions"
|
|
71
|
+
description: "Actions taken for any findings (or 'None required' if clean)"
|
|
72
|
+
placeholder: "Requested updated SOC 2 report from vendor X. Added DPA to contract with vendor Y."
|
|
73
|
+
validations:
|
|
74
|
+
required: true
|
|
75
|
+
|
|
76
|
+
- type: checkboxes
|
|
77
|
+
id: attestation
|
|
78
|
+
attributes:
|
|
79
|
+
label: "Reviewer Attestation"
|
|
80
|
+
description: "Confirm the following"
|
|
81
|
+
options:
|
|
82
|
+
- label: "I have reviewed all vendors at or above the designated risk tier"
|
|
83
|
+
required: true
|
|
84
|
+
- label: "All identified risks have mitigations documented or in progress"
|
|
85
|
+
required: true
|
|
86
|
+
- label: "This review was completed in accordance with docs/compliance/VENDOR-RISK.md"
|
|
87
|
+
required: true
|