aipea 1.1.0__tar.gz

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (109) hide show
  1. aipea-1.1.0/.claude/commands/audit-deps.md +11 -0
  2. aipea-1.1.0/.claude/commands/test-module.md +11 -0
  3. aipea-1.1.0/.claude/commands/verify-spec.md +19 -0
  4. aipea-1.1.0/.github/CODEOWNERS +6 -0
  5. aipea-1.1.0/.github/ISSUE_TEMPLATE/bcp-drp-test.yml +112 -0
  6. aipea-1.1.0/.github/ISSUE_TEMPLATE/change-request.yml +112 -0
  7. aipea-1.1.0/.github/ISSUE_TEMPLATE/config.yml +8 -0
  8. aipea-1.1.0/.github/ISSUE_TEMPLATE/incident-response-drill.yml +118 -0
  9. aipea-1.1.0/.github/ISSUE_TEMPLATE/postmarket-monitoring-review.yml +100 -0
  10. aipea-1.1.0/.github/ISSUE_TEMPLATE/quarterly-access-review.yml +87 -0
  11. aipea-1.1.0/.github/ISSUE_TEMPLATE/vendor-risk-assessment.yml +87 -0
  12. aipea-1.1.0/.github/PULL_REQUEST_TEMPLATE.md +26 -0
  13. aipea-1.1.0/.github/dependabot.yml +27 -0
  14. aipea-1.1.0/.github/workflows/ci.yml +52 -0
  15. aipea-1.1.0/.github/workflows/codeql-analysis.yml +27 -0
  16. aipea-1.1.0/.github/workflows/compliance-evidence-scheduler.yml +529 -0
  17. aipea-1.1.0/.github/workflows/compliance-nightly.yml +45 -0
  18. aipea-1.1.0/.github/workflows/dependency-review.yml +14 -0
  19. aipea-1.1.0/.github/workflows/publish.yml +49 -0
  20. aipea-1.1.0/.github/workflows/scaffold-checks.yml +26 -0
  21. aipea-1.1.0/.gitignore +44 -0
  22. aipea-1.1.0/.pre-commit-config.yaml +58 -0
  23. aipea-1.1.0/.semgrep.yaml +20 -0
  24. aipea-1.1.0/CHANGELOG.md +72 -0
  25. aipea-1.1.0/CLAUDE.md +432 -0
  26. aipea-1.1.0/CONTRIBUTING.md +7 -0
  27. aipea-1.1.0/KNOWN_ISSUES.md +391 -0
  28. aipea-1.1.0/LICENSE +21 -0
  29. aipea-1.1.0/Makefile +40 -0
  30. aipea-1.1.0/PKG-INFO +256 -0
  31. aipea-1.1.0/README.md +226 -0
  32. aipea-1.1.0/SPECIFICATION.md +1297 -0
  33. aipea-1.1.0/ai/AIMS-POLICY.md +20 -0
  34. aipea-1.1.0/ai/data-card.yaml +30 -0
  35. aipea-1.1.0/ai/model-card.yaml +49 -0
  36. aipea-1.1.0/ai/oversight-plan.md +25 -0
  37. aipea-1.1.0/ai/postmarket-monitoring.md +55 -0
  38. aipea-1.1.0/ai/risk-register.yaml +44 -0
  39. aipea-1.1.0/ai/system-register.yaml +28 -0
  40. aipea-1.1.0/ai/technical_file/README.md +11 -0
  41. aipea-1.1.0/ai/technical_file/conformity/README.md +6 -0
  42. aipea-1.1.0/ai/technical_file/conformity/annex-iv-checklist.md +11 -0
  43. aipea-1.1.0/ai/technical_file/instructions-for-use.md +30 -0
  44. aipea-1.1.0/ai/technical_file/logs/README.md +109 -0
  45. aipea-1.1.0/ai/technical_file/testing/tev_report_template.md +24 -0
  46. aipea-1.1.0/aipea_knowledge.db +0 -0
  47. aipea-1.1.0/benchmarks/perf_baseline.json +8 -0
  48. aipea-1.1.0/benchmarks/run.sh +16 -0
  49. aipea-1.1.0/docs/NEXT_STEPS.md +444 -0
  50. aipea-1.1.0/docs/ROADMAP.md +188 -0
  51. aipea-1.1.0/docs/adr/ADR-001-extraction.md +66 -0
  52. aipea-1.1.0/docs/adr/template.md +14 -0
  53. aipea-1.1.0/docs/claude/audits/aipea.md +237 -0
  54. aipea-1.1.0/docs/compliance/ACCESS-REVIEW.md +129 -0
  55. aipea-1.1.0/docs/compliance/BCP-DRP.md +163 -0
  56. aipea-1.1.0/docs/compliance/CHANGE-MANAGEMENT.md +166 -0
  57. aipea-1.1.0/docs/compliance/DSR-PRIVACY-OPERATIONS.md +196 -0
  58. aipea-1.1.0/docs/compliance/IRP.md +200 -0
  59. aipea-1.1.0/docs/compliance/VENDOR-RISK.md +146 -0
  60. aipea-1.1.0/docs/compliance/system-description.md +137 -0
  61. aipea-1.1.0/docs/design-reference/aipea-agent-framework.py +933 -0
  62. aipea-1.1.0/docs/design-reference/aipea-agora-integration.py +608 -0
  63. aipea-1.1.0/docs/design-reference/aipea-aws-deployment.txt +1287 -0
  64. aipea-1.1.0/docs/design-reference/aipea-config-management.txt +1599 -0
  65. aipea-1.1.0/docs/design-reference/aipea-enhancement-engine.py +616 -0
  66. aipea-1.1.0/docs/design-reference/aipea-market-configs.py +701 -0
  67. aipea-1.1.0/docs/design-reference/aipea-offline-knowledge.py +832 -0
  68. aipea-1.1.0/docs/design-reference/aipea-resilience-tests.py +945 -0
  69. aipea-1.1.0/docs/design-reference/aipea-specification.md +373 -0
  70. aipea-1.1.0/docs/integration/aegis-adapter.md +57 -0
  71. aipea-1.1.0/docs/integration/agora-adapter.md +68 -0
  72. aipea-1.1.0/policy/README.md +40 -0
  73. aipea-1.1.0/policy/agent-egress.rego +17 -0
  74. aipea-1.1.0/pyproject.toml +114 -0
  75. aipea-1.1.0/schemas/log_event.schema.json +88 -0
  76. aipea-1.1.0/src/aipea/__init__.py +108 -0
  77. aipea-1.1.0/src/aipea/__main__.py +6 -0
  78. aipea-1.1.0/src/aipea/_types.py +73 -0
  79. aipea-1.1.0/src/aipea/analyzer.py +838 -0
  80. aipea-1.1.0/src/aipea/cli.py +466 -0
  81. aipea-1.1.0/src/aipea/config.py +352 -0
  82. aipea-1.1.0/src/aipea/engine.py +1544 -0
  83. aipea-1.1.0/src/aipea/enhancer.py +1049 -0
  84. aipea-1.1.0/src/aipea/knowledge.py +706 -0
  85. aipea-1.1.0/src/aipea/models.py +105 -0
  86. aipea-1.1.0/src/aipea/py.typed +0 -0
  87. aipea-1.1.0/src/aipea/search.py +1227 -0
  88. aipea-1.1.0/src/aipea/security.py +709 -0
  89. aipea-1.1.0/tests/__init__.py +0 -0
  90. aipea-1.1.0/tests/conftest.py +8 -0
  91. aipea-1.1.0/tests/test_analyzer.py +73 -0
  92. aipea-1.1.0/tests/test_analyzer_enhanced.py +501 -0
  93. aipea-1.1.0/tests/test_cli.py +226 -0
  94. aipea-1.1.0/tests/test_config.py +556 -0
  95. aipea-1.1.0/tests/test_engine.py +1819 -0
  96. aipea-1.1.0/tests/test_enhancer.py +1158 -0
  97. aipea-1.1.0/tests/test_knowledge.py +694 -0
  98. aipea-1.1.0/tests/test_ollama.py +377 -0
  99. aipea-1.1.0/tests/test_search.py +1420 -0
  100. aipea-1.1.0/tests/test_security.py +729 -0
  101. aipea-1.1.0/tools/ci/ai_act_lint.py +28 -0
  102. aipea-1.1.0/tools/ci/ai_rmf_validate_artifacts.py +45 -0
  103. aipea-1.1.0/tools/ci/enforce_perf_gate.py +95 -0
  104. aipea-1.1.0/tools/ci/generate_precommit_config.py +402 -0
  105. aipea-1.1.0/tools/ci/generate_scorecard.py +321 -0
  106. aipea-1.1.0/tools/ci/validate_agent_messages.py +34 -0
  107. aipea-1.1.0/tools/ci/validate_log_schema.py +142 -0
  108. aipea-1.1.0/tools/ci/validate_scaffold_adoption.py +140 -0
  109. aipea-1.1.0/tools/ci/verify_fips.py +101 -0
@@ -0,0 +1,11 @@
1
+ Audit AIPEA dependencies for security vulnerabilities and license compliance.
2
+
3
+ Steps:
4
+ 1. Read `pyproject.toml` to list all dependencies (core + dev)
5
+ 2. For each dependency, verify:
6
+ - License is MIT-compatible (MIT, BSD, Apache 2.0, ISC) — REFUSE GPL/LGPL/AGPL
7
+ - No known CVEs (check via `pip audit` if available, or web search)
8
+ 3. Verify core modules (`security.py`, `knowledge.py`, `search.py`) import only stdlib + httpx
9
+ - Run: `grep "^import\|^from" src/aipea/security.py src/aipea/knowledge.py src/aipea/search.py`
10
+ 4. Check for outdated packages: `pip list --outdated` (if in venv)
11
+ 5. Report findings as a table: Package | Version | License | Status | Notes
@@ -0,0 +1,11 @@
1
+ Test a specific AIPEA module with coverage reporting.
2
+
3
+ Usage: /test-module <module_name>
4
+
5
+ Run targeted tests for the specified module (e.g., security, analyzer, engine, enhancer, knowledge, search) and report coverage for that module only.
6
+
7
+ Steps:
8
+ 1. Run: `pytest tests/test_$ARGUMENTS.py -v --cov=src/aipea/$ARGUMENTS --cov-report=term-missing`
9
+ 2. If the test file doesn't exist, search for matching test files: `ls tests/test_*$ARGUMENTS*.py`
10
+ 3. Report pass/fail count, coverage percentage, and any uncovered lines
11
+ 4. If coverage is below 75%, suggest which lines/branches need tests
@@ -0,0 +1,19 @@
1
+ Verify that the AIPEA implementation matches SPECIFICATION.md.
2
+
3
+ Steps:
4
+ 1. Read `SPECIFICATION.md` to extract:
5
+ - All defined modules and their responsibilities
6
+ - All public classes/functions specified
7
+ - All environment variables specified
8
+ - All compliance modes specified
9
+ - All processing tiers and query types
10
+ 2. Read `src/aipea/__init__.py` to get the actual public API (`__all__`)
11
+ 3. For each module in the spec, read the corresponding source file and verify:
12
+ - All specified classes/functions exist
13
+ - All specified parameters are present
14
+ - Return types match specification
15
+ 4. Check for implementation drift:
16
+ - Features in code but NOT in spec (undocumented)
17
+ - Features in spec but NOT in code (unimplemented)
18
+ 5. Report as a table: Feature | Spec Status | Code Status | Match?
19
+ 6. Flag any critical mismatches that need attention
@@ -0,0 +1,6 @@
1
+ # Default: all changes require joshuakirby review
2
+ * @ThermoclineLeviathan
3
+
4
+ # Critical paths: require explicit admin review
5
+ .github/ @ThermoclineLeviathan
6
+ CLAUDE.md @ThermoclineLeviathan
@@ -0,0 +1,112 @@
1
+ name: "BCP/DRP Test"
2
+ description: "SOC 2 A1.x / FedRAMP CP-9,CP-10 — Document annual business continuity and disaster recovery test"
3
+ title: "[BCP/DRP Test] YYYY"
4
+ labels:
5
+ - "compliance/soc2"
6
+ - "cadence/annual"
7
+ - "evidence/bcp-drp"
8
+ assignees: []
9
+ body:
10
+ - type: markdown
11
+ attributes:
12
+ value: |
13
+ ## Annual BCP/DRP Test
14
+ Complete this form to document the annual business continuity and disaster recovery test.
15
+ Reference: `docs/compliance/BCP-DRP.md` for the full Business Continuity / Disaster Recovery plan.
16
+
17
+ **Compliance mapping**: SOC 2 A1.2/A1.3 | FedRAMP CP-9, CP-10 | ISO 42001 Support
18
+
19
+ - type: input
20
+ id: test-date
21
+ attributes:
22
+ label: "Test Date"
23
+ description: "Date the BCP/DRP test was conducted"
24
+ placeholder: "YYYY-MM-DD"
25
+ validations:
26
+ required: true
27
+
28
+ - type: dropdown
29
+ id: test-type
30
+ attributes:
31
+ label: "Test Type"
32
+ description: "What type of test was conducted?"
33
+ options:
34
+ - "Tabletop / walkthrough"
35
+ - "Partial failover (non-production)"
36
+ - "Full failover (production)"
37
+ - "Backup restoration test"
38
+ validations:
39
+ required: true
40
+
41
+ - type: input
42
+ id: facilitator
43
+ attributes:
44
+ label: "Test Lead"
45
+ description: "Person who led the BCP/DRP test"
46
+ placeholder: "Jane Smith"
47
+ validations:
48
+ required: true
49
+
50
+ - type: textarea
51
+ id: scope
52
+ attributes:
53
+ label: "Test Scope"
54
+ description: "Which systems, services, and recovery procedures were tested?"
55
+ placeholder: |
56
+ - RDS failover to secondary region
57
+ - S3 cross-region replication validation
58
+ - Application deployment to DR environment
59
+ - DNS failover procedure
60
+ validations:
61
+ required: true
62
+
63
+ - type: textarea
64
+ id: rto-rpo
65
+ attributes:
66
+ label: "RTO/RPO Results"
67
+ description: "Document actual recovery times vs. targets"
68
+ placeholder: |
69
+ | System | Target RTO | Actual RTO | Target RPO | Actual RPO | Pass? |
70
+ |--------|-----------|------------|-----------|------------|-------|
71
+ | API | 1 hour | 45 min | 15 min | 10 min | Yes |
72
+ | DB | 30 min | 25 min | 5 min | 3 min | Yes |
73
+ validations:
74
+ required: true
75
+
76
+ - type: textarea
77
+ id: findings
78
+ attributes:
79
+ label: "Findings & Issues"
80
+ description: "Document any issues discovered during the test"
81
+ placeholder: |
82
+ - [ ] All systems recovered within RTO targets
83
+ - [ ] All data recovered within RPO targets
84
+ - [ ] Runbooks were accurate and current
85
+ - [ ] Contact lists were up to date
86
+ - [ ] Communication procedures worked as expected
87
+ validations:
88
+ required: true
89
+
90
+ - type: textarea
91
+ id: improvements
92
+ attributes:
93
+ label: "Improvements & Action Items"
94
+ description: "Actions to improve BCP/DRP based on test results"
95
+ placeholder: |
96
+ - [ ] Update DNS failover TTL from 300s to 60s
97
+ - [ ] Add automated health check to DR environment
98
+ validations:
99
+ required: true
100
+
101
+ - type: checkboxes
102
+ id: attestation
103
+ attributes:
104
+ label: "Test Lead Attestation"
105
+ description: "Confirm the following"
106
+ options:
107
+ - label: "The test was conducted in accordance with docs/compliance/BCP-DRP.md"
108
+ required: true
109
+ - label: "All RTO/RPO results have been documented accurately"
110
+ required: true
111
+ - label: "The BCP/DRP plan will be updated to reflect lessons learned"
112
+ required: true
@@ -0,0 +1,112 @@
1
+ name: "Change Request"
2
+ description: "SOC 2 CC8.x / FedRAMP CM-2,CM-3 — Document a change management request"
3
+ title: "[Change Request]"
4
+ labels:
5
+ - "compliance/soc2"
6
+ - "evidence/change-mgmt"
7
+ assignees: []
8
+ body:
9
+ - type: markdown
10
+ attributes:
11
+ value: |
12
+ ## Change Management Request
13
+ Complete this form to document a change request per the change management process.
14
+ Reference: `docs/compliance/CHANGE-MANAGEMENT.md` for the full change management policy.
15
+
16
+ **Compliance mapping**: SOC 2 CC8.1 | FedRAMP CM-2, CM-3 | ISO 42001 Operation | NIST AI RMF MANAGE
17
+
18
+ - type: dropdown
19
+ id: change-class
20
+ attributes:
21
+ label: "Change Class"
22
+ description: "Classify the change per Engineering Standards S10 (Governance)"
23
+ options:
24
+ - "Class A — Style-only (auto-merge eligible)"
25
+ - "Class B — Refactor (perf + golden dataset verification required)"
26
+ - "Class C — Behavioral (backtest delta report + risk sign-off required)"
27
+ validations:
28
+ required: true
29
+
30
+ - type: dropdown
31
+ id: risk-level
32
+ attributes:
33
+ label: "Risk Level"
34
+ description: "Assessed risk level of this change"
35
+ options:
36
+ - "Low — No customer impact, easily reversible"
37
+ - "Medium — Limited customer impact, reversible with effort"
38
+ - "High — Significant customer impact or difficult to reverse"
39
+ - "Critical — Production-wide impact, requires maintenance window"
40
+ validations:
41
+ required: true
42
+
43
+ - type: input
44
+ id: requester
45
+ attributes:
46
+ label: "Requester"
47
+ description: "Person requesting the change"
48
+ placeholder: "Jane Smith"
49
+ validations:
50
+ required: true
51
+
52
+ - type: textarea
53
+ id: description
54
+ attributes:
55
+ label: "Change Description"
56
+ description: "Describe what is being changed and why"
57
+ placeholder: |
58
+ **What**: Upgrade PostgreSQL from 15.4 to 16.1
59
+ **Why**: End-of-life for 15.x in Q2, performance improvements for JSONB queries
60
+ **Scope**: Production RDS instances (us-east-1, us-west-2)
61
+ validations:
62
+ required: true
63
+
64
+ - type: textarea
65
+ id: impact-analysis
66
+ attributes:
67
+ label: "Impact Analysis"
68
+ description: "Document affected systems, users, and services"
69
+ placeholder: |
70
+ - Affected systems: API servers, background workers, analytics pipeline
71
+ - Affected users: All (during maintenance window)
72
+ - Dependencies: Application code is compatible (tested in staging)
73
+ validations:
74
+ required: true
75
+
76
+ - type: textarea
77
+ id: rollback-plan
78
+ attributes:
79
+ label: "Rollback Plan"
80
+ description: "Document how to revert this change if needed"
81
+ placeholder: |
82
+ 1. Restore RDS from pre-upgrade snapshot (< 15 min)
83
+ 2. Repoint DNS to restored instance
84
+ 3. Verify application connectivity
85
+ validations:
86
+ required: true
87
+
88
+ - type: textarea
89
+ id: test-plan
90
+ attributes:
91
+ label: "Test Plan"
92
+ description: "How will this change be verified?"
93
+ placeholder: |
94
+ - [ ] Staging environment upgrade completed successfully
95
+ - [ ] Integration tests pass against upgraded instance
96
+ - [ ] Performance benchmarks show no regression
97
+ - [ ] Backup/restore verified on upgraded version
98
+ validations:
99
+ required: true
100
+
101
+ - type: checkboxes
102
+ id: attestation
103
+ attributes:
104
+ label: "Requester Attestation"
105
+ description: "Confirm the following"
106
+ options:
107
+ - label: "This change has been tested in a non-production environment"
108
+ required: true
109
+ - label: "A rollback plan has been documented and verified"
110
+ required: true
111
+ - label: "Affected stakeholders have been notified"
112
+ required: true
@@ -0,0 +1,8 @@
1
+ blank_issues_enabled: false
2
+ contact_links:
3
+ - name: "Security Incident"
4
+ url: "https://github.com/undercurrentai/AIPEA/blob/main/docs/compliance/IRP.md"
5
+ about: "Report security incidents via the Incident Response process (docs/compliance/IRP.md)"
6
+ - name: "Privacy / Data Subject Request"
7
+ url: "https://github.com/undercurrentai/AIPEA/blob/main/docs/compliance/DSR-PRIVACY-OPERATIONS.md"
8
+ about: "Submit data subject requests via the DSR portal (docs/compliance/DSR-PRIVACY-OPERATIONS.md)"
@@ -0,0 +1,118 @@
1
+ name: "Incident Response Drill"
2
+ description: "SOC 2 CC7.x / FedRAMP IR-4,IR-5 — Document tabletop exercise or IR drill results"
3
+ title: "[IR Drill] Q_ YYYY"
4
+ labels:
5
+ - "compliance/soc2"
6
+ - "cadence/quarterly"
7
+ - "evidence/incident-drill"
8
+ assignees: []
9
+ body:
10
+ - type: markdown
11
+ attributes:
12
+ value: |
13
+ ## Incident Response Drill / Tabletop Exercise
14
+ Complete this form to document the periodic incident response drill.
15
+ Reference: `docs/compliance/IRP.md` for the full Incident Response Plan.
16
+
17
+ **Compliance mapping**: SOC 2 CC7.2/CC7.3/CC7.4 | FedRAMP IR-4, IR-5 | ISO 42001 Support | NIST AI RMF MANAGE
18
+
19
+ - type: dropdown
20
+ id: quarter
21
+ attributes:
22
+ label: "Review Period"
23
+ description: "Which quarter does this drill cover?"
24
+ options:
25
+ - "Q1 (Jan–Mar)"
26
+ - "Q2 (Apr–Jun)"
27
+ - "Q3 (Jul–Sep)"
28
+ - "Q4 (Oct–Dec)"
29
+ validations:
30
+ required: true
31
+
32
+ - type: dropdown
33
+ id: drill-type
34
+ attributes:
35
+ label: "Drill Type"
36
+ description: "What type of exercise was conducted?"
37
+ options:
38
+ - "Tabletop exercise (discussion-based)"
39
+ - "Functional exercise (hands-on simulation)"
40
+ - "Full-scale exercise (live simulation)"
41
+ validations:
42
+ required: true
43
+
44
+ - type: input
45
+ id: facilitator
46
+ attributes:
47
+ label: "Facilitator"
48
+ description: "Person who facilitated the drill"
49
+ placeholder: "Jane Smith"
50
+ validations:
51
+ required: true
52
+
53
+ - type: textarea
54
+ id: scenario
55
+ attributes:
56
+ label: "Scenario Description"
57
+ description: "Describe the incident scenario used for the drill"
58
+ placeholder: |
59
+ Scenario: Unauthorized access to production database detected via anomalous
60
+ query patterns. Attacker appears to have exploited a SQL injection vulnerability
61
+ in the /api/search endpoint.
62
+ validations:
63
+ required: true
64
+
65
+ - type: textarea
66
+ id: participants
67
+ attributes:
68
+ label: "Participants"
69
+ description: "List all drill participants and their roles"
70
+ placeholder: |
71
+ - Jane Smith (Incident Commander)
72
+ - John Doe (Engineering Lead)
73
+ - Alice Johnson (Security)
74
+ - Bob Williams (Communications)
75
+ validations:
76
+ required: true
77
+
78
+ - type: textarea
79
+ id: timeline
80
+ attributes:
81
+ label: "Drill Timeline & Actions"
82
+ description: "Document the sequence of actions taken during the drill"
83
+ placeholder: |
84
+ 1. T+0: Alert received, triage initiated
85
+ 2. T+5: Incident Commander assigned, severity classified
86
+ 3. T+15: Containment actions identified and (simulated) executed
87
+ 4. T+30: Communication plan activated
88
+ 5. T+45: Root cause analysis discussion
89
+ 6. T+60: Recovery plan developed
90
+ validations:
91
+ required: true
92
+
93
+ - type: textarea
94
+ id: lessons-learned
95
+ attributes:
96
+ label: "Lessons Learned & Improvements"
97
+ description: "Document what went well, what needs improvement, and action items"
98
+ placeholder: |
99
+ **Went well**: Rapid triage, clear communication chain
100
+ **Needs improvement**: Runbook for database isolation was outdated
101
+ **Action items**:
102
+ - [ ] Update database isolation runbook by YYYY-MM-DD
103
+ - [ ] Add automated alerting for anomalous query patterns
104
+ validations:
105
+ required: true
106
+
107
+ - type: checkboxes
108
+ id: attestation
109
+ attributes:
110
+ label: "Facilitator Attestation"
111
+ description: "Confirm the following"
112
+ options:
113
+ - label: "The drill was conducted in accordance with docs/compliance/IRP.md"
114
+ required: true
115
+ - label: "All lessons learned have been documented with owners and due dates"
116
+ required: true
117
+ - label: "The IRP will be updated to reflect any procedural changes identified"
118
+ required: true
@@ -0,0 +1,100 @@
1
+ name: "Post-Market Monitoring Review"
2
+ description: "EU AI Act Art. 72 / NIST AI RMF MANAGE — Monthly AI system monitoring review"
3
+ title: "[Post-Market Monitoring] YYYY-MM"
4
+ labels:
5
+ - "compliance/eu-ai-act"
6
+ - "cadence/monthly"
7
+ - "evidence/postmarket"
8
+ assignees: []
9
+ body:
10
+ - type: markdown
11
+ attributes:
12
+ value: |
13
+ ## Monthly Post-Market Monitoring Review
14
+ Complete this form to document the monthly review of AI system performance and safety.
15
+ Reference: `ai/postmarket-monitoring.md` for the full monitoring plan.
16
+
17
+ **Compliance mapping**: EU AI Act Art. 72 | ISO 42001 Improvement | NIST AI RMF MANAGE | FedRAMP CA-7
18
+
19
+ - type: input
20
+ id: review-period
21
+ attributes:
22
+ label: "Review Period"
23
+ description: "Month being reviewed"
24
+ placeholder: "YYYY-MM"
25
+ validations:
26
+ required: true
27
+
28
+ - type: input
29
+ id: reviewer
30
+ attributes:
31
+ label: "Reviewer Name"
32
+ description: "Person conducting this monitoring review"
33
+ placeholder: "Jane Smith"
34
+ validations:
35
+ required: true
36
+
37
+ - type: textarea
38
+ id: systems-monitored
39
+ attributes:
40
+ label: "AI Systems Monitored"
41
+ description: "List all AI systems reviewed, referencing ai/system-register.yaml"
42
+ placeholder: |
43
+ | System ID | Name | Risk Level | Status |
44
+ |-----------|------|------------|--------|
45
+ | AI-001 | PCW | High | Active |
46
+ validations:
47
+ required: true
48
+
49
+ - type: textarea
50
+ id: performance-metrics
51
+ attributes:
52
+ label: "Performance Metrics"
53
+ description: "Document key performance indicators for each AI system"
54
+ placeholder: |
55
+ - Accuracy / F1 score: X.XX (target: >= Y.YY)
56
+ - Latency P95: XXms (target: <= YYms)
57
+ - Error rate: X.X% (target: <= Y.Y%)
58
+ - Drift detected: Yes/No
59
+ validations:
60
+ required: true
61
+
62
+ - type: textarea
63
+ id: safety-incidents
64
+ attributes:
65
+ label: "Safety & Bias Incidents"
66
+ description: "Document any safety incidents, bias detections, or unexpected behaviors"
67
+ placeholder: |
68
+ - [ ] No safety incidents reported
69
+ - [ ] No bias drift detected in monitoring dashboards
70
+ - [ ] No user complaints related to AI system behavior
71
+ - [ ] Feedback mechanisms operational
72
+ validations:
73
+ required: true
74
+
75
+ - type: textarea
76
+ id: actions
77
+ attributes:
78
+ label: "Actions & Model Updates"
79
+ description: "Document any corrective actions, model retraining, or system updates"
80
+ placeholder: |
81
+ - Updated model weights to address detected drift (version X.Y.Z → X.Y.W)
82
+ - Added new monitoring alert for edge case scenario
83
+ - None required — all metrics within acceptable bounds
84
+ validations:
85
+ required: true
86
+
87
+ - type: checkboxes
88
+ id: attestation
89
+ attributes:
90
+ label: "Reviewer Attestation"
91
+ description: "Confirm the following"
92
+ options:
93
+ - label: "All AI systems in the system register have been reviewed"
94
+ required: true
95
+ - label: "Performance metrics are within acceptable bounds or remediation is documented"
96
+ required: true
97
+ - label: "This review was completed in accordance with ai/postmarket-monitoring.md"
98
+ required: true
99
+ - label: "The risk register (ai/risk-register.yaml) has been updated if new risks were identified"
100
+ required: true
@@ -0,0 +1,87 @@
1
+ name: "Quarterly Access Review"
2
+ description: "SOC 2 CC6.x / FedRAMP AC-2,IA-5 — Review and certify user access rights"
3
+ title: "[Access Review] Q_ YYYY"
4
+ labels:
5
+ - "compliance/soc2"
6
+ - "cadence/quarterly"
7
+ - "evidence/access-review"
8
+ assignees: []
9
+ body:
10
+ - type: markdown
11
+ attributes:
12
+ value: |
13
+ ## Quarterly Access Review
14
+ Complete this form to document the periodic review of user access rights.
15
+ Reference: `docs/compliance/ACCESS-REVIEW.md` for full procedure.
16
+
17
+ **Compliance mapping**: SOC 2 CC6.1/CC6.2/CC6.3 | FedRAMP AC-2, IA-5 | ISO 42001 Support
18
+
19
+ - type: dropdown
20
+ id: quarter
21
+ attributes:
22
+ label: "Review Period"
23
+ description: "Which quarter does this review cover?"
24
+ options:
25
+ - "Q1 (Jan–Mar)"
26
+ - "Q2 (Apr–Jun)"
27
+ - "Q3 (Jul–Sep)"
28
+ - "Q4 (Oct–Dec)"
29
+ validations:
30
+ required: true
31
+
32
+ - type: input
33
+ id: reviewer
34
+ attributes:
35
+ label: "Reviewer Name"
36
+ description: "Person conducting this access review"
37
+ placeholder: "Jane Smith"
38
+ validations:
39
+ required: true
40
+
41
+ - type: textarea
42
+ id: systems-reviewed
43
+ attributes:
44
+ label: "Systems Reviewed"
45
+ description: "List all systems and platforms whose access was reviewed"
46
+ placeholder: |
47
+ - AWS IAM (production account)
48
+ - GitHub organization
49
+ - Database access (RDS)
50
+ - Secrets Manager
51
+ validations:
52
+ required: true
53
+
54
+ - type: textarea
55
+ id: findings
56
+ attributes:
57
+ label: "Findings"
58
+ description: "Document any access anomalies, orphaned accounts, or excessive privileges found"
59
+ placeholder: |
60
+ - [ ] All accounts have appropriate access levels
61
+ - [ ] No orphaned/inactive accounts found
62
+ - [ ] MFA enforced on all privileged accounts
63
+ - [ ] Service accounts have minimal required permissions
64
+ validations:
65
+ required: true
66
+
67
+ - type: textarea
68
+ id: remediation
69
+ attributes:
70
+ label: "Remediation Actions"
71
+ description: "Actions taken to resolve any findings (or 'None required' if clean)"
72
+ placeholder: "Revoked access for departed employee X. Reduced privileges for service account Y."
73
+ validations:
74
+ required: true
75
+
76
+ - type: checkboxes
77
+ id: attestation
78
+ attributes:
79
+ label: "Reviewer Attestation"
80
+ description: "Confirm the following"
81
+ options:
82
+ - label: "I have reviewed all user accounts for the systems listed above"
83
+ required: true
84
+ - label: "All identified issues have been remediated or have a documented remediation plan"
85
+ required: true
86
+ - label: "This review was completed in accordance with docs/compliance/ACCESS-REVIEW.md"
87
+ required: true
@@ -0,0 +1,87 @@
1
+ name: "Vendor Risk Assessment"
2
+ description: "SOC 2 CC9.x / FedRAMP SA-12 — Assess third-party vendor risk posture"
3
+ title: "[Vendor Risk] Q_ YYYY"
4
+ labels:
5
+ - "compliance/soc2"
6
+ - "cadence/quarterly"
7
+ - "evidence/vendor-risk"
8
+ assignees: []
9
+ body:
10
+ - type: markdown
11
+ attributes:
12
+ value: |
13
+ ## Quarterly Vendor Risk Assessment
14
+ Complete this form to document the periodic review of third-party vendor risk.
15
+ Reference: `docs/compliance/VENDOR-RISK.md` for full procedure.
16
+
17
+ **Compliance mapping**: SOC 2 CC9.1/CC9.2 | FedRAMP SA-12 | ISO 42001 Support | NIST AI RMF GOVERN
18
+
19
+ - type: dropdown
20
+ id: quarter
21
+ attributes:
22
+ label: "Review Period"
23
+ description: "Which quarter does this review cover?"
24
+ options:
25
+ - "Q1 (Jan–Mar)"
26
+ - "Q2 (Apr–Jun)"
27
+ - "Q3 (Jul–Sep)"
28
+ - "Q4 (Oct–Dec)"
29
+ validations:
30
+ required: true
31
+
32
+ - type: input
33
+ id: reviewer
34
+ attributes:
35
+ label: "Reviewer Name"
36
+ description: "Person conducting this vendor review"
37
+ placeholder: "Jane Smith"
38
+ validations:
39
+ required: true
40
+
41
+ - type: textarea
42
+ id: vendors-reviewed
43
+ attributes:
44
+ label: "Vendors Reviewed"
45
+ description: "List all vendors assessed in this cycle with their risk tier"
46
+ placeholder: |
47
+ | Vendor | Service | Data Access | Risk Tier | SOC 2 Report? |
48
+ |--------|---------|-------------|-----------|---------------|
49
+ | AWS | Cloud | Yes | Critical | Yes (Type II) |
50
+ | Stripe | Payments| Yes (PCI) | High | Yes (Type II) |
51
+ validations:
52
+ required: true
53
+
54
+ - type: textarea
55
+ id: risk-findings
56
+ attributes:
57
+ label: "Risk Findings"
58
+ description: "Document any vendor risk concerns, SLA breaches, or compliance gaps"
59
+ placeholder: |
60
+ - [ ] All critical vendors have current SOC 2 / ISO 27001 reports
61
+ - [ ] No vendor SLA breaches in review period
62
+ - [ ] All vendor contracts include security/privacy clauses
63
+ - [ ] Subprocessor lists reviewed for changes
64
+ validations:
65
+ required: true
66
+
67
+ - type: textarea
68
+ id: remediation
69
+ attributes:
70
+ label: "Remediation Actions"
71
+ description: "Actions taken for any findings (or 'None required' if clean)"
72
+ placeholder: "Requested updated SOC 2 report from vendor X. Added DPA to contract with vendor Y."
73
+ validations:
74
+ required: true
75
+
76
+ - type: checkboxes
77
+ id: attestation
78
+ attributes:
79
+ label: "Reviewer Attestation"
80
+ description: "Confirm the following"
81
+ options:
82
+ - label: "I have reviewed all vendors at or above the designated risk tier"
83
+ required: true
84
+ - label: "All identified risks have mitigations documented or in progress"
85
+ required: true
86
+ - label: "This review was completed in accordance with docs/compliance/VENDOR-RISK.md"
87
+ required: true