icdev 1.0.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (1105) hide show
  1. icdev/__init__.py +18 -0
  2. icdev/_paths.py +85 -0
  3. icdev/_version.py +3 -0
  4. icdev/data/__init__.py +1 -0
  5. icdev/data/args/__init__.py +1 -0
  6. icdev/data/args/agent_authority.yaml +61 -0
  7. icdev/data/args/agent_config.yaml +355 -0
  8. icdev/data/args/agentic_fitness.yaml +31 -0
  9. icdev/data/args/ai_governance_config.yaml +137 -0
  10. icdev/data/args/atlas_critique_config.yaml +66 -0
  11. icdev/data/args/bedrock_models.yaml +63 -0
  12. icdev/data/args/cicd_config.yaml +82 -0
  13. icdev/data/args/classification_config.yaml +232 -0
  14. icdev/data/args/cli_config.yaml +154 -0
  15. icdev/data/args/cloud_config.yaml +63 -0
  16. icdev/data/args/code_pattern_config.yaml +151 -0
  17. icdev/data/args/code_quality_config.yaml +47 -0
  18. icdev/data/args/companion_registry.yaml +202 -0
  19. icdev/data/args/context_config.yaml +82 -0
  20. icdev/data/args/csp_monitor_config.yaml +268 -0
  21. icdev/data/args/cui_markings.yaml +35 -0
  22. icdev/data/args/db_config.yaml +40 -0
  23. icdev/data/args/deployment_profiles.yaml +248 -0
  24. icdev/data/args/dev_profile_config.yaml +144 -0
  25. icdev/data/args/devsecops_config.yaml +286 -0
  26. icdev/data/args/endpoint_security_config.yaml +137 -0
  27. icdev/data/args/extension_config.yaml +79 -0
  28. icdev/data/args/file_access_tiers.yaml +88 -0
  29. icdev/data/args/framework_registry.yaml +415 -0
  30. icdev/data/args/innovation_config.yaml +431 -0
  31. icdev/data/args/installation_manifest.yaml +1087 -0
  32. icdev/data/args/llm_config.yaml +495 -0
  33. icdev/data/args/maintenance_config.yaml +55 -0
  34. icdev/data/args/memory_config.yaml +83 -0
  35. icdev/data/args/monitoring_config.yaml +127 -0
  36. icdev/data/args/mosa_config.yaml +190 -0
  37. icdev/data/args/nlq_config.yaml +35 -0
  38. icdev/data/args/observability_config.yaml +39 -0
  39. icdev/data/args/observability_tracing_config.yaml +170 -0
  40. icdev/data/args/oscal_tools_config.yaml +43 -0
  41. icdev/data/args/owasp_agentic_config.yaml +171 -0
  42. icdev/data/args/phase_registry.yaml +618 -0
  43. icdev/data/args/project_defaults.yaml +235 -0
  44. icdev/data/args/prompt_chains.yaml +163 -0
  45. icdev/data/args/resilience_config.yaml +50 -0
  46. icdev/data/args/ricoas_config.yaml +191 -0
  47. icdev/data/args/role_personas.yaml +362 -0
  48. icdev/data/args/scaling_config.yaml +176 -0
  49. icdev/data/args/security_gates.yaml +685 -0
  50. icdev/data/args/skill_injection_config.yaml +322 -0
  51. icdev/data/args/spec_config.yaml +53 -0
  52. icdev/data/args/supply_chain_config.yaml +76 -0
  53. icdev/data/args/translation_config.yaml +228 -0
  54. icdev/data/args/workflow_templates/ato_acceleration.yaml +54 -0
  55. icdev/data/args/workflow_templates/build_deploy.yaml +63 -0
  56. icdev/data/args/workflow_templates/full_compliance.yaml +43 -0
  57. icdev/data/args/workflow_templates/security_hardening.yaml +55 -0
  58. icdev/data/args/worktree_config.yaml +34 -0
  59. icdev/data/args/zta_config.yaml +247 -0
  60. icdev/data/context/__init__.py +1 -0
  61. icdev/data/context/agent/__init__.py +1 -0
  62. icdev/data/context/agent/response_schemas/__init__.py +1 -0
  63. icdev/data/context/agent/response_schemas/debate_position.json +46 -0
  64. icdev/data/context/agent/response_schemas/fitness_scorecard.json +74 -0
  65. icdev/data/context/agent/response_schemas/review_decision.json +39 -0
  66. icdev/data/context/agent/response_schemas/task_decomposition.json +82 -0
  67. icdev/data/context/agent/response_schemas/veto_decision.json +40 -0
  68. icdev/data/context/agentic/__init__.py +1 -0
  69. icdev/data/context/agentic/architecture_patterns.md +269 -0
  70. icdev/data/context/agentic/capability_registry.yaml +202 -0
  71. icdev/data/context/agentic/csp_mcp_registry.yaml +280 -0
  72. icdev/data/context/agentic/fitness_rubric.md +56 -0
  73. icdev/data/context/agentic/governance_baseline.md +205 -0
  74. icdev/data/context/ci/__init__.py +1 -0
  75. icdev/data/context/ci/worktree_templates.json +44 -0
  76. icdev/data/context/cloud/__init__.py +1 -0
  77. icdev/data/context/cloud/csp_service_registry.json +739 -0
  78. icdev/data/context/compliance/__init__.py +1 -0
  79. icdev/data/context/compliance/atlas_mitigations.json +293 -0
  80. icdev/data/context/compliance/atlas_techniques.json +833 -0
  81. icdev/data/context/compliance/cisa_sbd_requirements.json +432 -0
  82. icdev/data/context/compliance/cjis_security_policy.json +522 -0
  83. icdev/data/context/compliance/cmmc_practices.json +2494 -0
  84. icdev/data/context/compliance/cmmc_report_template.md +142 -0
  85. icdev/data/context/compliance/cnssi_1253_overlay.json +109 -0
  86. icdev/data/context/compliance/control_crosswalk.json +1914 -0
  87. icdev/data/context/compliance/control_families/__init__.py +1 -0
  88. icdev/data/context/compliance/csp_certifications.json +251 -0
  89. icdev/data/context/compliance/cssp_report_template.md +193 -0
  90. icdev/data/context/compliance/cui_templates/__init__.py +1 -0
  91. icdev/data/context/compliance/cui_templates/banner_block.txt +4 -0
  92. icdev/data/context/compliance/cui_templates/code_header.txt +8 -0
  93. icdev/data/context/compliance/cui_templates/document_template.md +35 -0
  94. icdev/data/context/compliance/data_type_framework_map.json +321 -0
  95. icdev/data/context/compliance/data_type_registry.json +147 -0
  96. icdev/data/context/compliance/dod_cssp_8530.json +463 -0
  97. icdev/data/context/compliance/eu_ai_act_annex_iii.json +108 -0
  98. icdev/data/context/compliance/export_templates/__init__.py +1 -0
  99. icdev/data/context/compliance/export_templates/emass_controls.csv.j2 +4 -0
  100. icdev/data/context/compliance/export_templates/evidence_package.md.j2 +39 -0
  101. icdev/data/context/compliance/export_templates/executive_summary.md.j2 +55 -0
  102. icdev/data/context/compliance/export_templates/poam_tracking.csv.j2 +4 -0
  103. icdev/data/context/compliance/fedramp_20x_ksi_schemas.json +133 -0
  104. icdev/data/context/compliance/fedramp_high_baseline.json +4370 -0
  105. icdev/data/context/compliance/fedramp_moderate_baseline.json +2183 -0
  106. icdev/data/context/compliance/fedramp_report_template.md +181 -0
  107. icdev/data/context/compliance/fips_200_areas.json +362 -0
  108. icdev/data/context/compliance/gao_ai_accountability.json +262 -0
  109. icdev/data/context/compliance/hipaa_security_rule.json +720 -0
  110. icdev/data/context/compliance/hitrust_csf_v11.json +930 -0
  111. icdev/data/context/compliance/impact_level_profiles.json +251 -0
  112. icdev/data/context/compliance/incident_response_template.md +1110 -0
  113. icdev/data/context/compliance/iso27001_2022_controls.json +750 -0
  114. icdev/data/context/compliance/iso27001_nist_bridge.json +382 -0
  115. icdev/data/context/compliance/iso42001_controls.json +254 -0
  116. icdev/data/context/compliance/ivv_checklist_template.md +80 -0
  117. icdev/data/context/compliance/ivv_report_template.md +116 -0
  118. icdev/data/context/compliance/ivv_requirements.json +372 -0
  119. icdev/data/context/compliance/mosa_crosswalk.json +327 -0
  120. icdev/data/context/compliance/mosa_framework.json +250 -0
  121. icdev/data/context/compliance/narrative_templates/AC.md.j2 +101 -0
  122. icdev/data/context/compliance/narrative_templates/AU.md.j2 +106 -0
  123. icdev/data/context/compliance/narrative_templates/IA.md.j2 +104 -0
  124. icdev/data/context/compliance/narrative_templates/SC.md.j2 +102 -0
  125. icdev/data/context/compliance/narrative_templates/SI.md.j2 +111 -0
  126. icdev/data/context/compliance/narrative_templates/__init__.py +1 -0
  127. icdev/data/context/compliance/narrative_templates/default.md.j2 +50 -0
  128. icdev/data/context/compliance/narrative_templates/executive_summary.j2 +27 -0
  129. icdev/data/context/compliance/narrative_templates/poam_milestone.j2 +19 -0
  130. icdev/data/context/compliance/narrative_templates/ssp_section.j2 +11 -0
  131. icdev/data/context/compliance/nist_800_171_controls.json +1552 -0
  132. icdev/data/context/compliance/nist_800_207_crosswalk.json +399 -0
  133. icdev/data/context/compliance/nist_800_207_zta.json +258 -0
  134. icdev/data/context/compliance/nist_800_53.json +324 -0
  135. icdev/data/context/compliance/nist_ai_600_1_genai.json +326 -0
  136. icdev/data/context/compliance/nist_ai_rmf.json +206 -0
  137. icdev/data/context/compliance/nist_sp_800_60_types.json +1667 -0
  138. icdev/data/context/compliance/omb_m25_21_high_impact_ai.json +248 -0
  139. icdev/data/context/compliance/omb_m26_04_unbiased_ai.json +262 -0
  140. icdev/data/context/compliance/owasp_agentic_asi.json +133 -0
  141. icdev/data/context/compliance/owasp_agentic_threats.json +285 -0
  142. icdev/data/context/compliance/owasp_llm_top10.json +274 -0
  143. icdev/data/context/compliance/pci_dss_v4.json +510 -0
  144. icdev/data/context/compliance/poam_template.md +117 -0
  145. icdev/data/context/compliance/safeai_controls.json +512 -0
  146. icdev/data/context/compliance/sbd_report_template.md +77 -0
  147. icdev/data/context/compliance/siem_config_templates/__init__.py +1 -0
  148. icdev/data/context/compliance/siem_config_templates/filebeat.yml +213 -0
  149. icdev/data/context/compliance/siem_config_templates/log_sources.json +208 -0
  150. icdev/data/context/compliance/soc2_trust_criteria.json +661 -0
  151. icdev/data/context/compliance/ssp_template.md +432 -0
  152. icdev/data/context/compliance/stig_templates/__init__.py +1 -0
  153. icdev/data/context/compliance/stig_templates/webapp_stig.json +139 -0
  154. icdev/data/context/compliance/xai_requirements.json +108 -0
  155. icdev/data/context/dashboard/__init__.py +1 -0
  156. icdev/data/context/dashboard/nlq_examples.json +50 -0
  157. icdev/data/context/dashboard/schema_descriptions.json +23 -0
  158. icdev/data/context/integration/__init__.py +1 -0
  159. icdev/data/context/integration/approval_workflows.json +32 -0
  160. icdev/data/context/integration/gitlab_field_mappings.json +33 -0
  161. icdev/data/context/integration/jira_field_mappings.json +32 -0
  162. icdev/data/context/integration/reqif_export_schema.json +23 -0
  163. icdev/data/context/integration/servicenow_field_mappings.json +22 -0
  164. icdev/data/context/languages/__init__.py +1 -0
  165. icdev/data/context/languages/framework_patterns.json +205 -0
  166. icdev/data/context/languages/language_registry.json +279 -0
  167. icdev/data/context/llm/__init__.py +1 -0
  168. icdev/data/context/llm/example_provider.py +86 -0
  169. icdev/data/context/mbse/__init__.py +1 -0
  170. icdev/data/context/mbse/des_report_template.md +162 -0
  171. icdev/data/context/mbse/des_requirements.json +411 -0
  172. icdev/data/context/mbse/digital_thread_patterns.json +403 -0
  173. icdev/data/context/mbse/reqif_schema.json +280 -0
  174. icdev/data/context/mbse/sysml_element_types.json +432 -0
  175. icdev/data/context/modernization/__init__.py +1 -0
  176. icdev/data/context/modernization/db_type_mappings.json +148 -0
  177. icdev/data/context/modernization/decomposition_patterns.json +284 -0
  178. icdev/data/context/modernization/framework_migration_patterns.json +359 -0
  179. icdev/data/context/modernization/migration_report_template.md +168 -0
  180. icdev/data/context/modernization/seven_rs_catalog.json +369 -0
  181. icdev/data/context/modernization/version_upgrade_rules.json +279 -0
  182. icdev/data/context/oscal/NIST_SP-800-53_rev5_catalog.json +254987 -0
  183. icdev/data/context/oscal/README.md +43 -0
  184. icdev/data/context/patterns/__init__.py +1 -0
  185. icdev/data/context/profiles/__init__.py +1 -0
  186. icdev/data/context/profiles/dod_baseline_v1.yaml +145 -0
  187. icdev/data/context/profiles/fedramp_baseline_v1.yaml +143 -0
  188. icdev/data/context/profiles/financial_baseline_v1.yaml +142 -0
  189. icdev/data/context/profiles/healthcare_baseline_v1.yaml +135 -0
  190. icdev/data/context/profiles/law_enforcement_v1.yaml +129 -0
  191. icdev/data/context/profiles/startup_v1.yaml +134 -0
  192. icdev/data/context/requirements/__init__.py +1 -0
  193. icdev/data/context/requirements/ambiguity_patterns.json +97 -0
  194. icdev/data/context/requirements/boundary_impact_rules.json +123 -0
  195. icdev/data/context/requirements/default_constitutions.json +67 -0
  196. icdev/data/context/requirements/document_extraction_rules.json +58 -0
  197. icdev/data/context/requirements/gap_patterns.json +108 -0
  198. icdev/data/context/requirements/readiness_rubric.json +78 -0
  199. icdev/data/context/requirements/red_alternative_patterns.json +210 -0
  200. icdev/data/context/requirements/safe_templates.json +72 -0
  201. icdev/data/context/requirements/spec_quality_checklist.json +122 -0
  202. icdev/data/context/simulation/__init__.py +1 -0
  203. icdev/data/context/simulation/architecture_patterns.json +36 -0
  204. icdev/data/context/simulation/coa_templates.json +38 -0
  205. icdev/data/context/simulation/cost_models.json +23 -0
  206. icdev/data/context/simulation/risk_categories.json +46 -0
  207. icdev/data/context/supply_chain/__init__.py +1 -0
  208. icdev/data/context/supply_chain/isa_templates.json +129 -0
  209. icdev/data/context/supply_chain/nist_800_161_controls.json +247 -0
  210. icdev/data/context/supply_chain/scrm_risk_matrix.json +147 -0
  211. icdev/data/context/templates/__init__.py +1 -0
  212. icdev/data/context/templates/ansible/__init__.py +1 -0
  213. icdev/data/context/templates/ansible/playbooks/__init__.py +1 -0
  214. icdev/data/context/templates/ansible/roles/__init__.py +1 -0
  215. icdev/data/context/templates/gitlab_ci/__init__.py +1 -0
  216. icdev/data/context/templates/grafana/__init__.py +1 -0
  217. icdev/data/context/templates/kubernetes/__init__.py +1 -0
  218. icdev/data/context/templates/project/__init__.py +1 -0
  219. icdev/data/context/templates/project/api/__init__.py +1 -0
  220. icdev/data/context/templates/project/cli/__init__.py +1 -0
  221. icdev/data/context/templates/project/data_pipeline/__init__.py +1 -0
  222. icdev/data/context/templates/project/iac/__init__.py +1 -0
  223. icdev/data/context/templates/project/javascript_frontend/__init__.py +1 -0
  224. icdev/data/context/templates/project/javascript_frontend/src/__init__.py +1 -0
  225. icdev/data/context/templates/project/javascript_frontend/tests/__init__.py +1 -0
  226. icdev/data/context/templates/project/microservice/__init__.py +1 -0
  227. icdev/data/context/templates/project/python_backend/__init__.py +1 -0
  228. icdev/data/context/templates/project/python_backend/src/__init__.py +1 -0
  229. icdev/data/context/templates/project/python_backend/tests/__init__.py +1 -0
  230. icdev/data/context/templates/project/python_backend/tests/features/__init__.py +1 -0
  231. icdev/data/context/templates/project/python_backend/tests/steps/__init__.py +1 -0
  232. icdev/data/context/templates/terraform/__init__.py +1 -0
  233. icdev/data/context/templates/terraform/govcloud_base/__init__.py +1 -0
  234. icdev/data/context/templates/terraform/modules/__init__.py +1 -0
  235. icdev/data/context/tone/__init__.py +1 -0
  236. icdev/data/context/translation/dependency_mappings.json +186 -0
  237. icdev/data/context/translation/type_mappings.json +149 -0
  238. icdev/data/docs/README.md +187 -0
  239. icdev/data/docs/__init__.py +1 -0
  240. icdev/data/docs/admin/gateway-guide.md +338 -0
  241. icdev/data/docs/admin/marketplace-guide.md +396 -0
  242. icdev/data/docs/admin/monitoring-guide.md +509 -0
  243. icdev/data/docs/architecture/compliance-framework.md +764 -0
  244. icdev/data/docs/architecture/database-schema.md +689 -0
  245. icdev/data/docs/architecture/gotcha-framework.md +518 -0
  246. icdev/data/docs/architecture/multi-agent-system.md +603 -0
  247. icdev/data/docs/dx/README.md +106 -0
  248. icdev/data/docs/dx/__init__.py +1 -0
  249. icdev/data/docs/dx/ci-cd-integration.md +378 -0
  250. icdev/data/docs/dx/claude-code-guide.md +213 -0
  251. icdev/data/docs/dx/companion-guide.md +232 -0
  252. icdev/data/docs/dx/dev-profiles.md +309 -0
  253. icdev/data/docs/dx/icdev-yaml-spec.md +219 -0
  254. icdev/data/docs/dx/integration-tiers.md +279 -0
  255. icdev/data/docs/dx/llm-routing-guide.md +456 -0
  256. icdev/data/docs/dx/quickstart.md +192 -0
  257. icdev/data/docs/dx/sdk-reference.md +356 -0
  258. icdev/data/docs/dx/unified-mcp-setup.md +525 -0
  259. icdev/data/docs/features/__init__.py +1 -0
  260. icdev/data/docs/features/phase-01-gotcha-framework.md +249 -0
  261. icdev/data/docs/features/phase-02-atlas-build-workflow.md +223 -0
  262. icdev/data/docs/features/phase-03-tdd-bdd-testing.md +261 -0
  263. icdev/data/docs/features/phase-04-nist-compliance.md +255 -0
  264. icdev/data/docs/features/phase-05-security-scanning.md +229 -0
  265. icdev/data/docs/features/phase-06-infrastructure-deployment.md +288 -0
  266. icdev/data/docs/features/phase-07-code-review-gates.md +276 -0
  267. icdev/data/docs/features/phase-08-self-healing.md +223 -0
  268. icdev/data/docs/features/phase-09-monitoring-observability.md +230 -0
  269. icdev/data/docs/features/phase-10-dashboard-web-ui.md +218 -0
  270. icdev/data/docs/features/phase-11-multi-agent-architecture.md +272 -0
  271. icdev/data/docs/features/phase-12-integration-testing.md +228 -0
  272. icdev/data/docs/features/phase-13-cicd-integration.md +257 -0
  273. icdev/data/docs/features/phase-14-secure-by-design-ivv.md +240 -0
  274. icdev/data/docs/features/phase-15-maintenance-audit.md +192 -0
  275. icdev/data/docs/features/phase-16-ato-acceleration.md +228 -0
  276. icdev/data/docs/features/phase-17-multi-framework-compliance.md +223 -0
  277. icdev/data/docs/features/phase-18-mbse-integration.md +242 -0
  278. icdev/data/docs/features/phase-19-agentic-generation.md +202 -0
  279. icdev/data/docs/features/phase-20-fips-security-categorization.md +198 -0
  280. icdev/data/docs/features/phase-21-saas-multi-tenancy.md +273 -0
  281. icdev/data/docs/features/phase-22-federated-gotcha-marketplace.md +242 -0
  282. icdev/data/docs/features/phase-23-universal-compliance-platform.md +238 -0
  283. icdev/data/docs/features/phase-24-devsecops-pipeline-security.md +198 -0
  284. icdev/data/docs/features/phase-25-zero-trust-architecture.md +220 -0
  285. icdev/data/docs/features/phase-26-dod-mosa.md +205 -0
  286. icdev/data/docs/features/phase-27-cli-capabilities.md +222 -0
  287. icdev/data/docs/features/phase-28-remote-command-gateway.md +235 -0
  288. icdev/data/docs/features/phase-29-proactive-monitoring.md +212 -0
  289. icdev/data/docs/features/phase-30-dashboard-auth.md +215 -0
  290. icdev/data/docs/features/phase-31-dashboard-ux-low-impact.md +188 -0
  291. icdev/data/docs/features/phase-32-dashboard-ux-medium-impact.md +223 -0
  292. icdev/data/docs/features/phase-33-modular-installation.md +218 -0
  293. icdev/data/docs/features/phase-34-dev-profiles.md +239 -0
  294. icdev/data/docs/features/phase-35-innovation-engine.md +257 -0
  295. icdev/data/docs/features/phase-36-evolutionary-intelligence.md +351 -0
  296. icdev/data/docs/features/phase-37-mitre-atlas-integration.md +485 -0
  297. icdev/data/docs/features/phase-38-cloud-agnostic-architecture.md +1033 -0
  298. icdev/data/docs/features/phase-39-observability-operations.md +178 -0
  299. icdev/data/docs/features/phase-40-nlq-compliance-queries.md +176 -0
  300. icdev/data/docs/features/phase-41-parallel-cicd.md +169 -0
  301. icdev/data/docs/features/phase-42-framework-planning.md +177 -0
  302. icdev/data/docs/features/phase-43-cross-language-translation.md +225 -0
  303. icdev/data/docs/features/phase-44-innovation-adaptation.md +227 -0
  304. icdev/data/docs/features/phase-45-owasp-agentic-security.md +239 -0
  305. icdev/data/docs/features/phase-46-observability-traceability-xai.md +240 -0
  306. icdev/data/docs/features/phase-47-unified-mcp-gateway.md +257 -0
  307. icdev/data/docs/features/phase-48-ai-transparency.md +203 -0
  308. icdev/data/docs/features/phase-49-ai-accountability.md +243 -0
  309. icdev/data/docs/features/phase-50-ai-governance-intake-chat.md +195 -0
  310. icdev/data/docs/features/phase-51-unified-chat-dashboard.md +240 -0
  311. icdev/data/docs/features/phase-52-code-intelligence.md +244 -0
  312. icdev/data/docs/features/phase-53-fedramp-20x-owasp-asi.md +359 -0
  313. icdev/data/docs/features/phase-54-slsa-swft-orchestration.md +379 -0
  314. icdev/data/docs/features/phase-55-a2a-v03-mcp-oauth.md +322 -0
  315. icdev/data/docs/features/phase-56-evidence-lineage.md +352 -0
  316. icdev/data/docs/features/phase-57-eu-ai-act-iron-bank.md +319 -0
  317. icdev/data/docs/features/phase-58-creative-engine.md +370 -0
  318. icdev/data/docs/features/phase-59-govcon-intelligence.md +535 -0
  319. icdev/data/docs/features/phase-60-cpmp.md +528 -0
  320. icdev/data/docs/features/phase-61-orchestration-improvements.md +534 -0
  321. icdev/data/docs/operations/dashboard-guide.md +354 -0
  322. icdev/data/docs/operations/deployment-guide.md +556 -0
  323. icdev/data/docs/operations/saas-admin-guide.md +439 -0
  324. icdev/data/docs/operations/security-operations-guide.md +733 -0
  325. icdev/data/docs/runbooks/backup-restore.md +412 -0
  326. icdev/data/docs/runbooks/troubleshooting.md +499 -0
  327. icdev/data/features/__init__.py +1 -0
  328. icdev/data/features/cicd_integration.feature +41 -0
  329. icdev/data/features/compliance_gates.feature +46 -0
  330. icdev/data/features/dashboard.feature +72 -0
  331. icdev/data/features/environment.py +25 -0
  332. icdev/data/features/project_management.feature +32 -0
  333. icdev/data/features/requirements_intake.feature +42 -0
  334. icdev/data/features/saas_platform.feature +53 -0
  335. icdev/data/features/security_scanning.feature +36 -0
  336. icdev/data/features/steps/__init__.py +1 -0
  337. icdev/data/features/steps/cicd_steps.py +465 -0
  338. icdev/data/features/steps/compliance_steps.py +308 -0
  339. icdev/data/features/steps/dashboard_steps.py +88 -0
  340. icdev/data/features/steps/project_steps.py +126 -0
  341. icdev/data/features/steps/requirements_intake_steps.py +689 -0
  342. icdev/data/features/steps/saas_platform_steps.py +572 -0
  343. icdev/data/features/steps/security_steps.py +236 -0
  344. icdev/data/features/steps/testing_steps.py +226 -0
  345. icdev/data/features/testing_pipeline.feature +42 -0
  346. icdev/data/goals/__init__.py +1 -0
  347. icdev/data/goals/agent_management.md +144 -0
  348. icdev/data/goals/agentic_generation.md +345 -0
  349. icdev/data/goals/agentic_threat_model.md +309 -0
  350. icdev/data/goals/ai_accountability.md +90 -0
  351. icdev/data/goals/ai_governance_intake.md +132 -0
  352. icdev/data/goals/ai_transparency.md +76 -0
  353. icdev/data/goals/atlas_integration.md +405 -0
  354. icdev/data/goals/ato_acceleration.md +139 -0
  355. icdev/data/goals/boundary_supply_chain.md +206 -0
  356. icdev/data/goals/build_app.md +544 -0
  357. icdev/data/goals/cicd_integration.md +86 -0
  358. icdev/data/goals/claude_dir_maintenance.md +77 -0
  359. icdev/data/goals/cli_capabilities.md +340 -0
  360. icdev/data/goals/cloud_agnostic.md +312 -0
  361. icdev/data/goals/code_intelligence.md +197 -0
  362. icdev/data/goals/code_review.md +94 -0
  363. icdev/data/goals/compliance_workflow.md +858 -0
  364. icdev/data/goals/continuous_harmonization.md +140 -0
  365. icdev/data/goals/cross_language_translation.md +171 -0
  366. icdev/data/goals/dashboard.md +142 -0
  367. icdev/data/goals/deploy_workflow.md +390 -0
  368. icdev/data/goals/devsecops_workflow.md +408 -0
  369. icdev/data/goals/evolutionary_intelligence.md +305 -0
  370. icdev/data/goals/external_integration.md +113 -0
  371. icdev/data/goals/framework_planning.md +63 -0
  372. icdev/data/goals/init_project.md +235 -0
  373. icdev/data/goals/innovation_engine.md +199 -0
  374. icdev/data/goals/integration_testing.md +189 -0
  375. icdev/data/goals/maintenance_audit.md +196 -0
  376. icdev/data/goals/manifest.md +56 -0
  377. icdev/data/goals/mbse_integration.md +504 -0
  378. icdev/data/goals/modernization_workflow.md +618 -0
  379. icdev/data/goals/monitoring.md +126 -0
  380. icdev/data/goals/mosa_workflow.md +463 -0
  381. icdev/data/goals/multi_agent_orchestration.md +68 -0
  382. icdev/data/goals/nlq_compliance.md +63 -0
  383. icdev/data/goals/observability.md +64 -0
  384. icdev/data/goals/observability_traceability_xai.md +154 -0
  385. icdev/data/goals/owasp_agentic_security.md +395 -0
  386. icdev/data/goals/parallel_cicd.md +61 -0
  387. icdev/data/goals/requirements_intake.md +213 -0
  388. icdev/data/goals/sbd_ivv_workflow.md +195 -0
  389. icdev/data/goals/security_categorization.md +133 -0
  390. icdev/data/goals/security_scan.md +381 -0
  391. icdev/data/goals/self_healing.md +120 -0
  392. icdev/data/goals/simulation_engine.md +111 -0
  393. icdev/data/goals/tdd_workflow.md +403 -0
  394. icdev/data/goals/zero_trust_architecture.md +403 -0
  395. icdev/data/hardprompts/__init__.py +1 -0
  396. icdev/data/hardprompts/agent/__init__.py +1 -0
  397. icdev/data/hardprompts/agent/agentic_architect.md +100 -0
  398. icdev/data/hardprompts/agent/debate_prompt.md +32 -0
  399. icdev/data/hardprompts/agent/fitness_evaluation.md +48 -0
  400. icdev/data/hardprompts/agent/governance_review.md +214 -0
  401. icdev/data/hardprompts/agent/reviewer_prompt.md +34 -0
  402. icdev/data/hardprompts/agent/skill_design.md +172 -0
  403. icdev/data/hardprompts/agent/task_decomposition.md +275 -0
  404. icdev/data/hardprompts/agent/veto_check_prompt.md +33 -0
  405. icdev/data/hardprompts/architect/__init__.py +1 -0
  406. icdev/data/hardprompts/architect/api_design.md +283 -0
  407. icdev/data/hardprompts/architect/data_model.md +277 -0
  408. icdev/data/hardprompts/architect/system_design.md +180 -0
  409. icdev/data/hardprompts/builder/__init__.py +1 -0
  410. icdev/data/hardprompts/builder/code_generation.md +59 -0
  411. icdev/data/hardprompts/builder/refactor.md +58 -0
  412. icdev/data/hardprompts/builder/scaffold_project.md +69 -0
  413. icdev/data/hardprompts/builder/test_generation.md +87 -0
  414. icdev/data/hardprompts/ci/__init__.py +1 -0
  415. icdev/data/hardprompts/ci/worktree_setup.md +35 -0
  416. icdev/data/hardprompts/compliance/__init__.py +1 -0
  417. icdev/data/hardprompts/compliance/cmmc_assessment.md +63 -0
  418. icdev/data/hardprompts/compliance/cssp_assessment.md +75 -0
  419. icdev/data/hardprompts/compliance/cui_marking.md +86 -0
  420. icdev/data/hardprompts/compliance/fedramp_assessment.md +55 -0
  421. icdev/data/hardprompts/compliance/ivv_assessment.md +96 -0
  422. icdev/data/hardprompts/compliance/poam_generation.md +57 -0
  423. icdev/data/hardprompts/compliance/sbd_assessment.md +101 -0
  424. icdev/data/hardprompts/compliance/security_categorization.md +74 -0
  425. icdev/data/hardprompts/compliance/ssp_generation.md +56 -0
  426. icdev/data/hardprompts/compliance/stig_evaluation.md +63 -0
  427. icdev/data/hardprompts/dashboard/__init__.py +1 -0
  428. icdev/data/hardprompts/dashboard/nlq_system_prompt.md +26 -0
  429. icdev/data/hardprompts/infra/__init__.py +1 -0
  430. icdev/data/hardprompts/infra/k8s_manifests.md +118 -0
  431. icdev/data/hardprompts/infra/pipeline_generation.md +160 -0
  432. icdev/data/hardprompts/infra/terraform_generation.md +92 -0
  433. icdev/data/hardprompts/integration/__init__.py +1 -0
  434. icdev/data/hardprompts/integration/approval_review.md +17 -0
  435. icdev/data/hardprompts/integration/jira_mapping.md +25 -0
  436. icdev/data/hardprompts/integration/servicenow_mapping.md +14 -0
  437. icdev/data/hardprompts/knowledge/__init__.py +1 -0
  438. icdev/data/hardprompts/knowledge/pattern_detection.md +73 -0
  439. icdev/data/hardprompts/knowledge/recommendation_engine.md +90 -0
  440. icdev/data/hardprompts/knowledge/root_cause_analysis.md +91 -0
  441. icdev/data/hardprompts/maintenance/__init__.py +1 -0
  442. icdev/data/hardprompts/maintenance/maintenance_assessment.md +82 -0
  443. icdev/data/hardprompts/mbse/__init__.py +1 -0
  444. icdev/data/hardprompts/mbse/digital_thread.md +67 -0
  445. icdev/data/hardprompts/mbse/model_import.md +62 -0
  446. icdev/data/hardprompts/mbse/model_to_code.md +65 -0
  447. icdev/data/hardprompts/modernization/__init__.py +1 -0
  448. icdev/data/hardprompts/modernization/legacy_analysis.md +93 -0
  449. icdev/data/hardprompts/modernization/migration_planning.md +150 -0
  450. icdev/data/hardprompts/modernization/seven_r_assessment.md +107 -0
  451. icdev/data/hardprompts/requirements/__init__.py +1 -0
  452. icdev/data/hardprompts/requirements/bdd_generation.md +35 -0
  453. icdev/data/hardprompts/requirements/clarification_prioritization.md +29 -0
  454. icdev/data/hardprompts/requirements/decomposition.md +60 -0
  455. icdev/data/hardprompts/requirements/document_extraction.md +45 -0
  456. icdev/data/hardprompts/requirements/gap_detection.md +70 -0
  457. icdev/data/hardprompts/requirements/intake_conversation.md +101 -0
  458. icdev/data/hardprompts/requirements/readiness_assessment.md +39 -0
  459. icdev/data/hardprompts/requirements/spec_quality.md +33 -0
  460. icdev/data/hardprompts/requirements/traceability_analysis.md +23 -0
  461. icdev/data/hardprompts/security/__init__.py +1 -0
  462. icdev/data/hardprompts/security/endpoint_security.md +78 -0
  463. icdev/data/hardprompts/security/threat_model.md +70 -0
  464. icdev/data/hardprompts/security/vulnerability_assessment.md +81 -0
  465. icdev/data/hardprompts/simulation/__init__.py +1 -0
  466. icdev/data/hardprompts/simulation/architecture_impact.md +27 -0
  467. icdev/data/hardprompts/simulation/coa_alternative.md +27 -0
  468. icdev/data/hardprompts/simulation/coa_generation.md +25 -0
  469. icdev/data/hardprompts/simulation/compliance_impact.md +28 -0
  470. icdev/data/hardprompts/simulation/cost_estimation.md +33 -0
  471. icdev/data/hardprompts/simulation/risk_assessment.md +28 -0
  472. icdev/data/hardprompts/translation/code_translation.md +68 -0
  473. icdev/data/hardprompts/translation/dependency_suggestion.md +44 -0
  474. icdev/data/hardprompts/translation/test_translation.md +64 -0
  475. icdev/data/hardprompts/translation/translation_repair.md +59 -0
  476. icdev/py.typed +0 -0
  477. icdev/tools/__init__.py +1 -0
  478. icdev/tools/_gen_formatter.py +12 -0
  479. icdev/tools/a2a/__init__.py +1 -0
  480. icdev/tools/a2a/agent_cards/architect.json +43 -0
  481. icdev/tools/a2a/agent_cards/builder.json +50 -0
  482. icdev/tools/a2a/agent_cards/compliance.json +57 -0
  483. icdev/tools/a2a/agent_cards/devsecops.json +71 -0
  484. icdev/tools/a2a/agent_cards/infra.json +57 -0
  485. icdev/tools/a2a/agent_cards/integration.json +57 -0
  486. icdev/tools/a2a/agent_cards/knowledge.json +43 -0
  487. icdev/tools/a2a/agent_cards/mbse.json +57 -0
  488. icdev/tools/a2a/agent_cards/modernization.json +50 -0
  489. icdev/tools/a2a/agent_cards/monitor.json +43 -0
  490. icdev/tools/a2a/agent_cards/orchestrator.json +36 -0
  491. icdev/tools/a2a/agent_cards/requirements_analyst.json +64 -0
  492. icdev/tools/a2a/agent_cards/security.json +50 -0
  493. icdev/tools/a2a/agent_cards/simulation.json +57 -0
  494. icdev/tools/a2a/agent_cards/supply_chain.json +50 -0
  495. icdev/tools/a2a/agent_client.py +349 -0
  496. icdev/tools/a2a/agent_registry.py +412 -0
  497. icdev/tools/a2a/agent_server.py +579 -0
  498. icdev/tools/a2a/task.py +200 -0
  499. icdev/tools/agent/__init__.py +2 -0
  500. icdev/tools/agent/a2a_agent_card_generator.py +285 -0
  501. icdev/tools/agent/a2a_discovery_server.py +250 -0
  502. icdev/tools/agent/agent_executor.py +529 -0
  503. icdev/tools/agent/agent_memory.py +557 -0
  504. icdev/tools/agent/agent_models.py +51 -0
  505. icdev/tools/agent/atlas_critique.py +908 -0
  506. icdev/tools/agent/authority.py +443 -0
  507. icdev/tools/agent/bedrock_client.py +1075 -0
  508. icdev/tools/agent/collaboration.py +871 -0
  509. icdev/tools/agent/dispatcher_mode.py +665 -0
  510. icdev/tools/agent/mailbox.py +575 -0
  511. icdev/tools/agent/prompt_chain_executor.py +1064 -0
  512. icdev/tools/agent/session_purpose.py +350 -0
  513. icdev/tools/agent/skill_router.py +638 -0
  514. icdev/tools/agent/skill_selector.py +486 -0
  515. icdev/tools/agent/team_orchestrator.py +1108 -0
  516. icdev/tools/agent/token_tracker.py +290 -0
  517. icdev/tools/analysis/__init__.py +1 -0
  518. icdev/tools/analysis/code_analyzer.py +780 -0
  519. icdev/tools/analysis/runtime_feedback.py +389 -0
  520. icdev/tools/audit/__init__.py +1 -0
  521. icdev/tools/audit/audit_logger.py +196 -0
  522. icdev/tools/audit/audit_query.py +157 -0
  523. icdev/tools/audit/decision_recorder.py +72 -0
  524. icdev/tools/builder/__init__.py +1 -0
  525. icdev/tools/builder/agentic_fitness.py +534 -0
  526. icdev/tools/builder/agentic_test_templates/test_a2a_callback.py +117 -0
  527. icdev/tools/builder/agentic_test_templates/test_a2a_lifecycle.feature +52 -0
  528. icdev/tools/builder/agentic_test_templates/test_agent_card.feature +37 -0
  529. icdev/tools/builder/agentic_test_templates/test_agent_health.py +128 -0
  530. icdev/tools/builder/agentic_test_templates/test_memory_system.feature +50 -0
  531. icdev/tools/builder/agentic_test_templates/test_skill_execution.feature +40 -0
  532. icdev/tools/builder/app_blueprint.py +1583 -0
  533. icdev/tools/builder/child_app_generator.py +2852 -0
  534. icdev/tools/builder/claude_md_generator.py +1734 -0
  535. icdev/tools/builder/code_generator.py +3703 -0
  536. icdev/tools/builder/db_init_generator.py +1709 -0
  537. icdev/tools/builder/dev_profile_manager.py +954 -0
  538. icdev/tools/builder/formatter.py +768 -0
  539. icdev/tools/builder/goal_adapter.py +592 -0
  540. icdev/tools/builder/gotcha_validator.py +812 -0
  541. icdev/tools/builder/language_support.py +441 -0
  542. icdev/tools/builder/linter.py +976 -0
  543. icdev/tools/builder/profile_detector.py +657 -0
  544. icdev/tools/builder/profile_md_generator.py +723 -0
  545. icdev/tools/builder/scaffolder.py +1590 -0
  546. icdev/tools/builder/scaffolder_extended.py +1771 -0
  547. icdev/tools/builder/test_writer.py +950 -0
  548. icdev/tools/ci/__init__.py +2 -0
  549. icdev/tools/ci/connectors/__init__.py +2 -0
  550. icdev/tools/ci/connectors/base_connector.py +80 -0
  551. icdev/tools/ci/connectors/connector_registry.py +188 -0
  552. icdev/tools/ci/connectors/mattermost_connector.py +159 -0
  553. icdev/tools/ci/connectors/slack_connector.py +197 -0
  554. icdev/tools/ci/core/__init__.py +2 -0
  555. icdev/tools/ci/core/air_gap_detector.py +115 -0
  556. icdev/tools/ci/core/comment_handler.py +192 -0
  557. icdev/tools/ci/core/conversation_manager.py +479 -0
  558. icdev/tools/ci/core/event_envelope.py +500 -0
  559. icdev/tools/ci/core/event_router.py +443 -0
  560. icdev/tools/ci/core/failure_parser.py +397 -0
  561. icdev/tools/ci/core/recovery_engine.py +527 -0
  562. icdev/tools/ci/modules/__init__.py +2 -0
  563. icdev/tools/ci/modules/agent.py +271 -0
  564. icdev/tools/ci/modules/git_ops.py +175 -0
  565. icdev/tools/ci/modules/state.py +117 -0
  566. icdev/tools/ci/modules/vcs.py +303 -0
  567. icdev/tools/ci/modules/workflow_ops.py +295 -0
  568. icdev/tools/ci/modules/worktree.py +340 -0
  569. icdev/tools/ci/pipeline_config_generator.py +558 -0
  570. icdev/tools/ci/triggers/__init__.py +2 -0
  571. icdev/tools/ci/triggers/gitlab_task_monitor.py +330 -0
  572. icdev/tools/ci/triggers/poll_trigger.py +237 -0
  573. icdev/tools/ci/triggers/webhook_server.py +356 -0
  574. icdev/tools/ci/workflows/__init__.py +2 -0
  575. icdev/tools/ci/workflows/icdev_build.py +140 -0
  576. icdev/tools/ci/workflows/icdev_comply.py +284 -0
  577. icdev/tools/ci/workflows/icdev_document.py +152 -0
  578. icdev/tools/ci/workflows/icdev_e2e.py +188 -0
  579. icdev/tools/ci/workflows/icdev_patch.py +186 -0
  580. icdev/tools/ci/workflows/icdev_plan.py +202 -0
  581. icdev/tools/ci/workflows/icdev_plan_build.py +41 -0
  582. icdev/tools/ci/workflows/icdev_plan_build_test.py +46 -0
  583. icdev/tools/ci/workflows/icdev_plan_build_test_review.py +47 -0
  584. icdev/tools/ci/workflows/icdev_review.py +126 -0
  585. icdev/tools/ci/workflows/icdev_sdlc.py +261 -0
  586. icdev/tools/ci/workflows/icdev_test.py +240 -0
  587. icdev/tools/cli/__init__.py +1 -0
  588. icdev/tools/cli/output_formatter.py +756 -0
  589. icdev/tools/cli_formatter.py +42 -0
  590. icdev/tools/cloud/__init__.py +11 -0
  591. icdev/tools/cloud/cloud_mode_manager.py +364 -0
  592. icdev/tools/cloud/csp_changelog.py +383 -0
  593. icdev/tools/cloud/csp_health_checker.py +268 -0
  594. icdev/tools/cloud/csp_monitor.py +951 -0
  595. icdev/tools/cloud/iam_provider.py +593 -0
  596. icdev/tools/cloud/kms_provider.py +346 -0
  597. icdev/tools/cloud/monitoring_provider.py +628 -0
  598. icdev/tools/cloud/provider_factory.py +376 -0
  599. icdev/tools/cloud/region_validator.py +345 -0
  600. icdev/tools/cloud/registry_provider.py +563 -0
  601. icdev/tools/cloud/secrets_provider.py +486 -0
  602. icdev/tools/cloud/storage_provider.py +446 -0
  603. icdev/tools/compat/__init__.py +21 -0
  604. icdev/tools/compat/cli_harmonizer.py +251 -0
  605. icdev/tools/compat/datetime_utils.py +18 -0
  606. icdev/tools/compat/db_utils.py +160 -0
  607. icdev/tools/compat/platform_utils.py +123 -0
  608. icdev/tools/compliance/__init__.py +1 -0
  609. icdev/tools/compliance/accountability_manager.py +397 -0
  610. icdev/tools/compliance/ai_accountability_audit.py +294 -0
  611. icdev/tools/compliance/ai_impact_assessor.py +273 -0
  612. icdev/tools/compliance/ai_incident_response.py +301 -0
  613. icdev/tools/compliance/ai_inventory_manager.py +239 -0
  614. icdev/tools/compliance/ai_reassessment_scheduler.py +256 -0
  615. icdev/tools/compliance/ai_transparency_audit.py +248 -0
  616. icdev/tools/compliance/atlas_assessor.py +278 -0
  617. icdev/tools/compliance/atlas_report_generator.py +1211 -0
  618. icdev/tools/compliance/base_assessor.py +597 -0
  619. icdev/tools/compliance/cato_monitor.py +1385 -0
  620. icdev/tools/compliance/cato_scheduler.py +699 -0
  621. icdev/tools/compliance/cjis_assessor.py +76 -0
  622. icdev/tools/compliance/classification_manager.py +1353 -0
  623. icdev/tools/compliance/cmmc_assessor.py +1491 -0
  624. icdev/tools/compliance/cmmc_report_generator.py +1100 -0
  625. icdev/tools/compliance/compliance_detector.py +463 -0
  626. icdev/tools/compliance/compliance_exporter.py +427 -0
  627. icdev/tools/compliance/compliance_status.py +825 -0
  628. icdev/tools/compliance/control_mapper.py +505 -0
  629. icdev/tools/compliance/crosswalk_engine.py +1203 -0
  630. icdev/tools/compliance/cssp_assessor.py +1045 -0
  631. icdev/tools/compliance/cssp_evidence_collector.py +729 -0
  632. icdev/tools/compliance/cssp_report_generator.py +1116 -0
  633. icdev/tools/compliance/cui_marker.py +388 -0
  634. icdev/tools/compliance/diagram_validator.py +600 -0
  635. icdev/tools/compliance/emass/__init__.py +2 -0
  636. icdev/tools/compliance/emass/emass_client.py +840 -0
  637. icdev/tools/compliance/emass/emass_export.py +777 -0
  638. icdev/tools/compliance/emass/emass_sync.py +826 -0
  639. icdev/tools/compliance/eu_ai_act_classifier.py +194 -0
  640. icdev/tools/compliance/evidence_collector.py +468 -0
  641. icdev/tools/compliance/fairness_assessor.py +316 -0
  642. icdev/tools/compliance/fedramp_assessor.py +1808 -0
  643. icdev/tools/compliance/fedramp_authorization_packager.py +137 -0
  644. icdev/tools/compliance/fedramp_ksi_generator.py +355 -0
  645. icdev/tools/compliance/fedramp_report_generator.py +1128 -0
  646. icdev/tools/compliance/fips199_categorizer.py +881 -0
  647. icdev/tools/compliance/fips200_validator.py +315 -0
  648. icdev/tools/compliance/gao_ai_assessor.py +231 -0
  649. icdev/tools/compliance/gao_evidence_builder.py +308 -0
  650. icdev/tools/compliance/hipaa_assessor.py +78 -0
  651. icdev/tools/compliance/hitrust_assessor.py +49 -0
  652. icdev/tools/compliance/incident_response_plan.py +718 -0
  653. icdev/tools/compliance/iso27001_assessor.py +92 -0
  654. icdev/tools/compliance/iso42001_assessor.py +114 -0
  655. icdev/tools/compliance/ivv_assessor.py +2327 -0
  656. icdev/tools/compliance/ivv_report_generator.py +1662 -0
  657. icdev/tools/compliance/model_card_generator.py +297 -0
  658. icdev/tools/compliance/mosa_assessor.py +117 -0
  659. icdev/tools/compliance/multi_regime_assessor.py +451 -0
  660. icdev/tools/compliance/narrative_generator.py +1013 -0
  661. icdev/tools/compliance/nist_800_207_assessor.py +191 -0
  662. icdev/tools/compliance/nist_ai_600_1_assessor.py +188 -0
  663. icdev/tools/compliance/nist_ai_rmf_assessor.py +110 -0
  664. icdev/tools/compliance/nist_lookup.py +245 -0
  665. icdev/tools/compliance/omb_m25_21_assessor.py +228 -0
  666. icdev/tools/compliance/omb_m26_04_assessor.py +188 -0
  667. icdev/tools/compliance/oscal_catalog_adapter.py +395 -0
  668. icdev/tools/compliance/oscal_generator.py +2170 -0
  669. icdev/tools/compliance/oscal_tools.py +1182 -0
  670. icdev/tools/compliance/owasp_agentic_assessor.py +226 -0
  671. icdev/tools/compliance/owasp_asi_assessor.py +200 -0
  672. icdev/tools/compliance/owasp_llm_assessor.py +244 -0
  673. icdev/tools/compliance/pci_dss_assessor.py +80 -0
  674. icdev/tools/compliance/pi_compliance_tracker.py +1461 -0
  675. icdev/tools/compliance/poam_generator.py +405 -0
  676. icdev/tools/compliance/resolve_marking.py +283 -0
  677. icdev/tools/compliance/sbd_assessor.py +2068 -0
  678. icdev/tools/compliance/sbd_report_generator.py +1236 -0
  679. icdev/tools/compliance/sbom_generator.py +1008 -0
  680. icdev/tools/compliance/siem_config_generator.py +674 -0
  681. icdev/tools/compliance/slsa_attestation_generator.py +490 -0
  682. icdev/tools/compliance/soc2_assessor.py +77 -0
  683. icdev/tools/compliance/ssp_generator.py +573 -0
  684. icdev/tools/compliance/stig_checker.py +727 -0
  685. icdev/tools/compliance/swft_evidence_bundler.py +337 -0
  686. icdev/tools/compliance/system_card_generator.py +309 -0
  687. icdev/tools/compliance/traceability_matrix.py +1281 -0
  688. icdev/tools/compliance/universal_classification_manager.py +1172 -0
  689. icdev/tools/compliance/xacta/__init__.py +2 -0
  690. icdev/tools/compliance/xacta/xacta_client.py +449 -0
  691. icdev/tools/compliance/xacta/xacta_export.py +557 -0
  692. icdev/tools/compliance/xacta/xacta_sync.py +333 -0
  693. icdev/tools/compliance/xai_assessor.py +231 -0
  694. icdev/tools/dashboard/__init__.py +1 -0
  695. icdev/tools/dashboard/api/__init__.py +1 -0
  696. icdev/tools/dashboard/api/_pipeline_state.py +17 -0
  697. icdev/tools/dashboard/api/activity.py +206 -0
  698. icdev/tools/dashboard/api/admin.py +176 -0
  699. icdev/tools/dashboard/api/agents.py +53 -0
  700. icdev/tools/dashboard/api/ai_accountability.py +163 -0
  701. icdev/tools/dashboard/api/ai_transparency.py +198 -0
  702. icdev/tools/dashboard/api/audit.py +58 -0
  703. icdev/tools/dashboard/api/batch.py +666 -0
  704. icdev/tools/dashboard/api/chat.py +241 -0
  705. icdev/tools/dashboard/api/cicd.py +219 -0
  706. icdev/tools/dashboard/api/code_quality.py +223 -0
  707. icdev/tools/dashboard/api/compliance.py +171 -0
  708. icdev/tools/dashboard/api/cpmp.py +915 -0
  709. icdev/tools/dashboard/api/diagrams.py +65 -0
  710. icdev/tools/dashboard/api/events.py +250 -0
  711. icdev/tools/dashboard/api/evidence.py +99 -0
  712. icdev/tools/dashboard/api/fedramp_20x.py +77 -0
  713. icdev/tools/dashboard/api/govcon.py +1095 -0
  714. icdev/tools/dashboard/api/intake.py +1171 -0
  715. icdev/tools/dashboard/api/lineage.py +163 -0
  716. icdev/tools/dashboard/api/metrics.py +155 -0
  717. icdev/tools/dashboard/api/nlq.py +72 -0
  718. icdev/tools/dashboard/api/orchestration.py +472 -0
  719. icdev/tools/dashboard/api/oscal.py +183 -0
  720. icdev/tools/dashboard/api/prod_audit.py +183 -0
  721. icdev/tools/dashboard/api/projects.py +191 -0
  722. icdev/tools/dashboard/api/proposals.py +1084 -0
  723. icdev/tools/dashboard/api/traces.py +363 -0
  724. icdev/tools/dashboard/api/usage.py +234 -0
  725. icdev/tools/dashboard/app.py +1986 -0
  726. icdev/tools/dashboard/auth.py +500 -0
  727. icdev/tools/dashboard/byok.py +245 -0
  728. icdev/tools/dashboard/chat_manager.py +675 -0
  729. icdev/tools/dashboard/config.py +116 -0
  730. icdev/tools/dashboard/diagram_definitions.py +642 -0
  731. icdev/tools/dashboard/nlq_processor.py +323 -0
  732. icdev/tools/dashboard/phase_loader.py +136 -0
  733. icdev/tools/dashboard/sse_manager.py +89 -0
  734. icdev/tools/dashboard/state_tracker.py +267 -0
  735. icdev/tools/dashboard/static/css/style.css +706 -0
  736. icdev/tools/dashboard/static/css/ux.css +2047 -0
  737. icdev/tools/dashboard/static/js/activity.js +322 -0
  738. icdev/tools/dashboard/static/js/api.js +161 -0
  739. icdev/tools/dashboard/static/js/batch.js +814 -0
  740. icdev/tools/dashboard/static/js/charts.js +618 -0
  741. icdev/tools/dashboard/static/js/chat.js +1514 -0
  742. icdev/tools/dashboard/static/js/kanban.js +113 -0
  743. icdev/tools/dashboard/static/js/live.js +569 -0
  744. icdev/tools/dashboard/static/js/mermaid-icdev.js +332 -0
  745. icdev/tools/dashboard/static/js/proposals.js +588 -0
  746. icdev/tools/dashboard/static/js/shortcuts.js +544 -0
  747. icdev/tools/dashboard/static/js/tables.js +652 -0
  748. icdev/tools/dashboard/static/js/tour.js +524 -0
  749. icdev/tools/dashboard/static/js/ux.js +942 -0
  750. icdev/tools/dashboard/templates/404.html +10 -0
  751. icdev/tools/dashboard/templates/activity.html +80 -0
  752. icdev/tools/dashboard/templates/admin/users.html +144 -0
  753. icdev/tools/dashboard/templates/ai_accountability.html +235 -0
  754. icdev/tools/dashboard/templates/ai_transparency.html +263 -0
  755. icdev/tools/dashboard/templates/base.html +104 -0
  756. icdev/tools/dashboard/templates/batch.html +23 -0
  757. icdev/tools/dashboard/templates/chat.html +332 -0
  758. icdev/tools/dashboard/templates/children.html +149 -0
  759. icdev/tools/dashboard/templates/cicd.html +253 -0
  760. icdev/tools/dashboard/templates/code_quality.html +214 -0
  761. icdev/tools/dashboard/templates/cpmp/cor_detail.html +220 -0
  762. icdev/tools/dashboard/templates/cpmp/cor_portal.html +91 -0
  763. icdev/tools/dashboard/templates/cpmp/deliverable_detail.html +197 -0
  764. icdev/tools/dashboard/templates/cpmp/detail.html +578 -0
  765. icdev/tools/dashboard/templates/cpmp/portfolio.html +202 -0
  766. icdev/tools/dashboard/templates/dev_profiles.html +304 -0
  767. icdev/tools/dashboard/templates/diagrams.html +224 -0
  768. icdev/tools/dashboard/templates/events/timeline.html +232 -0
  769. icdev/tools/dashboard/templates/evidence.html +134 -0
  770. icdev/tools/dashboard/templates/fedramp_20x.html +207 -0
  771. icdev/tools/dashboard/templates/gateway.html +244 -0
  772. icdev/tools/dashboard/templates/govcon/capabilities.html +135 -0
  773. icdev/tools/dashboard/templates/govcon/pipeline.html +214 -0
  774. icdev/tools/dashboard/templates/govcon/requirements.html +120 -0
  775. icdev/tools/dashboard/templates/index.html +254 -0
  776. icdev/tools/dashboard/templates/lineage.html +141 -0
  777. icdev/tools/dashboard/templates/login.html +51 -0
  778. icdev/tools/dashboard/templates/monitoring/overview.html +193 -0
  779. icdev/tools/dashboard/templates/orchestration/dashboard.html +545 -0
  780. icdev/tools/dashboard/templates/oscal.html +263 -0
  781. icdev/tools/dashboard/templates/phases.html +150 -0
  782. icdev/tools/dashboard/templates/prod_audit.html +280 -0
  783. icdev/tools/dashboard/templates/profile.html +183 -0
  784. icdev/tools/dashboard/templates/projects/detail.html +583 -0
  785. icdev/tools/dashboard/templates/projects/list.html +47 -0
  786. icdev/tools/dashboard/templates/proposals/detail.html +1253 -0
  787. icdev/tools/dashboard/templates/proposals/list.html +179 -0
  788. icdev/tools/dashboard/templates/proposals/section_detail.html +193 -0
  789. icdev/tools/dashboard/templates/provenance.html +181 -0
  790. icdev/tools/dashboard/templates/query/nlq.html +234 -0
  791. icdev/tools/dashboard/templates/quick_paths.html +69 -0
  792. icdev/tools/dashboard/templates/traces.html +155 -0
  793. icdev/tools/dashboard/templates/translation_detail.html +199 -0
  794. icdev/tools/dashboard/templates/translations.html +162 -0
  795. icdev/tools/dashboard/templates/usage.html +225 -0
  796. icdev/tools/dashboard/templates/wizard.html +539 -0
  797. icdev/tools/dashboard/templates/xai.html +208 -0
  798. icdev/tools/dashboard/ux_helpers.py +962 -0
  799. icdev/tools/dashboard/websocket.py +81 -0
  800. icdev/tools/db/__init__.py +1 -0
  801. icdev/tools/db/backup.py +312 -0
  802. icdev/tools/db/backup_manager.py +832 -0
  803. icdev/tools/db/init_icdev_db.py +5900 -0
  804. icdev/tools/db/migrate.py +178 -0
  805. icdev/tools/db/migration_runner.py +549 -0
  806. icdev/tools/db/migrations/001_baseline/meta.json +9 -0
  807. icdev/tools/db/migrations/001_baseline/up.py +68 -0
  808. icdev/tools/db/migrations/002_memory_enhancements/down.sql +8 -0
  809. icdev/tools/db/migrations/002_memory_enhancements/meta.json +9 -0
  810. icdev/tools/db/migrations/002_memory_enhancements/up.py +118 -0
  811. icdev/tools/db/migrations/003_dev_profiles/meta.json +8 -0
  812. icdev/tools/db/migrations/003_dev_profiles/up.py +93 -0
  813. icdev/tools/db/migrations/004_innovation_engine/down.py +19 -0
  814. icdev/tools/db/migrations/004_innovation_engine/up.py +227 -0
  815. icdev/tools/db/migrations/005_phase_37_ai_security/down.py +19 -0
  816. icdev/tools/db/migrations/005_phase_37_ai_security/up.py +258 -0
  817. icdev/tools/db/migrations/006_phase_36_evolution/down.py +21 -0
  818. icdev/tools/db/migrations/006_phase_36_evolution/up.py +323 -0
  819. icdev/tools/db/migrations/007_phase_38_cloud/down.py +14 -0
  820. icdev/tools/db/migrations/007_phase_38_cloud/up.py +110 -0
  821. icdev/tools/db/migrations/008_phase36_37_integration/up.py +55 -0
  822. icdev/tools/db/migrations/__init__.py +2 -0
  823. icdev/tools/devsecops/__init__.py +2 -0
  824. icdev/tools/devsecops/attestation_manager.py +458 -0
  825. icdev/tools/devsecops/network_segmentation_generator.py +614 -0
  826. icdev/tools/devsecops/pdp_config_generator.py +1256 -0
  827. icdev/tools/devsecops/pipeline_security_generator.py +484 -0
  828. icdev/tools/devsecops/policy_generator.py +653 -0
  829. icdev/tools/devsecops/profile_manager.py +388 -0
  830. icdev/tools/devsecops/service_mesh_generator.py +1073 -0
  831. icdev/tools/devsecops/zta_maturity_scorer.py +368 -0
  832. icdev/tools/devsecops/zta_terraform_generator.py +1303 -0
  833. icdev/tools/dx/__init__.py +3 -0
  834. icdev/tools/dx/companion.py +266 -0
  835. icdev/tools/dx/instruction_generator.py +753 -0
  836. icdev/tools/dx/mcp_config_generator.py +282 -0
  837. icdev/tools/dx/skill_translator.py +425 -0
  838. icdev/tools/dx/tool_detector.py +144 -0
  839. icdev/tools/extensions/__init__.py +21 -0
  840. icdev/tools/extensions/builtins/010_ai_governance_chat.py +277 -0
  841. icdev/tools/extensions/builtins/__init__.py +2 -0
  842. icdev/tools/extensions/extension_manager.py +455 -0
  843. icdev/tools/infra/__init__.py +1 -0
  844. icdev/tools/infra/ansible_generator.py +869 -0
  845. icdev/tools/infra/dockerfile_generator.py +361 -0
  846. icdev/tools/infra/infra_status.py +393 -0
  847. icdev/tools/infra/ironbank_metadata_generator.py +411 -0
  848. icdev/tools/infra/k8s_generator.py +1002 -0
  849. icdev/tools/infra/pipeline_generator.py +832 -0
  850. icdev/tools/infra/rollback.py +400 -0
  851. icdev/tools/infra/terraform_generator.py +1142 -0
  852. icdev/tools/infra/terraform_generator_azure.py +1254 -0
  853. icdev/tools/infra/terraform_generator_gcp.py +953 -0
  854. icdev/tools/infra/terraform_generator_ibm.py +360 -0
  855. icdev/tools/infra/terraform_generator_oci.py +919 -0
  856. icdev/tools/infra/terraform_generator_onprem.py +319 -0
  857. icdev/tools/innovation/__init__.py +8 -0
  858. icdev/tools/innovation/competitive_intel.py +492 -0
  859. icdev/tools/innovation/innovation_manager.py +681 -0
  860. icdev/tools/innovation/introspective_analyzer.py +774 -0
  861. icdev/tools/innovation/register_external_patterns.py +440 -0
  862. icdev/tools/innovation/signal_ranker.py +1038 -0
  863. icdev/tools/innovation/solution_generator.py +697 -0
  864. icdev/tools/innovation/standards_monitor.py +466 -0
  865. icdev/tools/innovation/trend_detector.py +1046 -0
  866. icdev/tools/innovation/triage_engine.py +1149 -0
  867. icdev/tools/innovation/web_scanner.py +894 -0
  868. icdev/tools/installer/__init__.py +1 -0
  869. icdev/tools/installer/compliance_configurator.py +637 -0
  870. icdev/tools/installer/installer.py +1711 -0
  871. icdev/tools/installer/module_registry.py +805 -0
  872. icdev/tools/installer/platform_setup.py +961 -0
  873. icdev/tools/integration/__init__.py +2 -0
  874. icdev/tools/integration/approval_manager.py +561 -0
  875. icdev/tools/integration/doors_exporter.py +627 -0
  876. icdev/tools/integration/gitlab_connector.py +784 -0
  877. icdev/tools/integration/jira_connector.py +774 -0
  878. icdev/tools/integration/servicenow_connector.py +693 -0
  879. icdev/tools/knowledge/__init__.py +1 -0
  880. icdev/tools/knowledge/knowledge_ingest.py +293 -0
  881. icdev/tools/knowledge/pattern_detector.py +693 -0
  882. icdev/tools/knowledge/recommendation_engine.py +461 -0
  883. icdev/tools/knowledge/self_heal_analyzer.py +504 -0
  884. icdev/tools/llm/__init__.py +72 -0
  885. icdev/tools/llm/anthropic_provider.py +170 -0
  886. icdev/tools/llm/azure_openai_provider.py +338 -0
  887. icdev/tools/llm/bedrock_provider.py +315 -0
  888. icdev/tools/llm/embedding_provider.py +438 -0
  889. icdev/tools/llm/gemini_provider.py +381 -0
  890. icdev/tools/llm/ibm_watsonx_provider.py +232 -0
  891. icdev/tools/llm/oci_genai_provider.py +462 -0
  892. icdev/tools/llm/ollama_provider.py +340 -0
  893. icdev/tools/llm/openai_provider.py +225 -0
  894. icdev/tools/llm/provider.py +355 -0
  895. icdev/tools/llm/provider_sdk.py +175 -0
  896. icdev/tools/llm/router.py +780 -0
  897. icdev/tools/llm/vertex_ai_provider.py +374 -0
  898. icdev/tools/maintenance/__init__.py +2 -0
  899. icdev/tools/maintenance/dependency_scanner.py +1030 -0
  900. icdev/tools/maintenance/maintenance_auditor.py +815 -0
  901. icdev/tools/maintenance/remediation_engine.py +966 -0
  902. icdev/tools/maintenance/vulnerability_checker.py +987 -0
  903. icdev/tools/mbse/__init__.py +3 -0
  904. icdev/tools/mbse/des_assessor.py +1186 -0
  905. icdev/tools/mbse/des_report_generator.py +800 -0
  906. icdev/tools/mbse/diagram_extractor.py +811 -0
  907. icdev/tools/mbse/digital_thread.py +1665 -0
  908. icdev/tools/mbse/model_code_generator.py +1122 -0
  909. icdev/tools/mbse/model_control_mapper.py +420 -0
  910. icdev/tools/mbse/pi_model_tracker.py +1093 -0
  911. icdev/tools/mbse/reqif_parser.py +1483 -0
  912. icdev/tools/mbse/sync_engine.py +1805 -0
  913. icdev/tools/mbse/xmi_parser.py +1573 -0
  914. icdev/tools/mcp/__init__.py +1 -0
  915. icdev/tools/mcp/base_server.py +535 -0
  916. icdev/tools/mcp/builder_server.py +725 -0
  917. icdev/tools/mcp/compliance_server.py +1407 -0
  918. icdev/tools/mcp/context_indexer.py +199 -0
  919. icdev/tools/mcp/context_server.py +305 -0
  920. icdev/tools/mcp/core_server.py +679 -0
  921. icdev/tools/mcp/devsecops_server.py +432 -0
  922. icdev/tools/mcp/gap_handlers.py +1079 -0
  923. icdev/tools/mcp/gateway_server.py +339 -0
  924. icdev/tools/mcp/generate_registry.py +623 -0
  925. icdev/tools/mcp/infra_server.py +264 -0
  926. icdev/tools/mcp/innovation_server.py +316 -0
  927. icdev/tools/mcp/integration_server.py +527 -0
  928. icdev/tools/mcp/knowledge_server.py +429 -0
  929. icdev/tools/mcp/maintenance_server.py +248 -0
  930. icdev/tools/mcp/marketplace_server.py +499 -0
  931. icdev/tools/mcp/mbse_server.py +398 -0
  932. icdev/tools/mcp/modernization_server.py +496 -0
  933. icdev/tools/mcp/observability_server.py +354 -0
  934. icdev/tools/mcp/requirements_server.py +415 -0
  935. icdev/tools/mcp/simulation_server.py +468 -0
  936. icdev/tools/mcp/standalone/__init__.py +2 -0
  937. icdev/tools/mcp/standalone/builder.py +59 -0
  938. icdev/tools/mcp/standalone/compliance.py +59 -0
  939. icdev/tools/mcp/standalone/core.py +59 -0
  940. icdev/tools/mcp/standalone/knowledge.py +59 -0
  941. icdev/tools/mcp/standalone/maintenance.py +59 -0
  942. icdev/tools/mcp/supply_chain_server.py +476 -0
  943. icdev/tools/mcp/tool_registry.py +2008 -0
  944. icdev/tools/mcp/unified_server.py +158 -0
  945. icdev/tools/memory/__init__.py +2 -0
  946. icdev/tools/memory/auto_capture.py +347 -0
  947. icdev/tools/memory/embed_memory.py +158 -0
  948. icdev/tools/memory/history_compressor.py +334 -0
  949. icdev/tools/memory/hybrid_search.py +236 -0
  950. icdev/tools/memory/maintenance_cron.py +289 -0
  951. icdev/tools/memory/memory_consolidation.py +444 -0
  952. icdev/tools/memory/memory_db.py +133 -0
  953. icdev/tools/memory/memory_read.py +102 -0
  954. icdev/tools/memory/memory_write.py +222 -0
  955. icdev/tools/memory/semantic_search.py +139 -0
  956. icdev/tools/memory/time_decay.py +435 -0
  957. icdev/tools/modernization/__init__.py +3 -0
  958. icdev/tools/modernization/architecture_extractor.py +734 -0
  959. icdev/tools/modernization/compliance_bridge.py +1499 -0
  960. icdev/tools/modernization/db_migration_planner.py +1385 -0
  961. icdev/tools/modernization/doc_generator.py +1428 -0
  962. icdev/tools/modernization/framework_migrator.py +1525 -0
  963. icdev/tools/modernization/legacy_analyzer.py +1948 -0
  964. icdev/tools/modernization/migration_code_generator.py +1639 -0
  965. icdev/tools/modernization/migration_report_generator.py +1653 -0
  966. icdev/tools/modernization/migration_tracker.py +1726 -0
  967. icdev/tools/modernization/monolith_decomposer.py +1508 -0
  968. icdev/tools/modernization/seven_r_assessor.py +1658 -0
  969. icdev/tools/modernization/strangler_fig_manager.py +1705 -0
  970. icdev/tools/modernization/ui_analyzer.py +771 -0
  971. icdev/tools/modernization/version_migrator.py +1392 -0
  972. icdev/tools/monitor/__init__.py +1 -0
  973. icdev/tools/monitor/alert_correlator.py +495 -0
  974. icdev/tools/monitor/auto_resolver.py +612 -0
  975. icdev/tools/monitor/health_checker.py +509 -0
  976. icdev/tools/monitor/heartbeat_daemon.py +792 -0
  977. icdev/tools/monitor/log_analyzer.py +516 -0
  978. icdev/tools/monitor/metric_collector.py +496 -0
  979. icdev/tools/mosa/__init__.py +10 -0
  980. icdev/tools/mosa/icd_generator.py +370 -0
  981. icdev/tools/mosa/modular_design_analyzer.py +683 -0
  982. icdev/tools/mosa/mosa_code_enforcer.py +349 -0
  983. icdev/tools/mosa/tsp_generator.py +265 -0
  984. icdev/tools/observability/__init__.py +100 -0
  985. icdev/tools/observability/genai_attributes.py +88 -0
  986. icdev/tools/observability/instrumentation.py +140 -0
  987. icdev/tools/observability/mlflow_exporter.py +194 -0
  988. icdev/tools/observability/otel_tracer.py +168 -0
  989. icdev/tools/observability/provenance/__init__.py +3 -0
  990. icdev/tools/observability/provenance/prov_recorder.py +324 -0
  991. icdev/tools/observability/shap/__init__.py +3 -0
  992. icdev/tools/observability/shap/agent_shap.py +275 -0
  993. icdev/tools/observability/sqlite_tracer.py +361 -0
  994. icdev/tools/observability/trace_context.py +205 -0
  995. icdev/tools/observability/tracer.py +230 -0
  996. icdev/tools/orchestration/__init__.py +2 -0
  997. icdev/tools/orchestration/workflow_composer.py +361 -0
  998. icdev/tools/project/__init__.py +1 -0
  999. icdev/tools/project/manifest_loader.py +418 -0
  1000. icdev/tools/project/project_create.py +350 -0
  1001. icdev/tools/project/project_list.py +174 -0
  1002. icdev/tools/project/project_scaffold.py +1715 -0
  1003. icdev/tools/project/project_status.py +479 -0
  1004. icdev/tools/project/session_context_builder.py +757 -0
  1005. icdev/tools/project/validate_manifest.py +55 -0
  1006. icdev/tools/registry/__init__.py +10 -0
  1007. icdev/tools/registry/absorption_engine.py +832 -0
  1008. icdev/tools/registry/capability_evaluator.py +668 -0
  1009. icdev/tools/registry/child_registry.py +617 -0
  1010. icdev/tools/registry/cross_pollinator.py +1065 -0
  1011. icdev/tools/registry/genome_manager.py +671 -0
  1012. icdev/tools/registry/learning_collector.py +912 -0
  1013. icdev/tools/registry/propagation_manager.py +942 -0
  1014. icdev/tools/registry/staging_manager.py +742 -0
  1015. icdev/tools/registry/telemetry_collector.py +423 -0
  1016. icdev/tools/requirements/__init__.py +1 -0
  1017. icdev/tools/requirements/ai_governance_scorer.py +208 -0
  1018. icdev/tools/requirements/boundary_analyzer.py +1293 -0
  1019. icdev/tools/requirements/clarification_engine.py +618 -0
  1020. icdev/tools/requirements/complexity_scorer.py +387 -0
  1021. icdev/tools/requirements/consistency_analyzer.py +803 -0
  1022. icdev/tools/requirements/constitution_manager.py +605 -0
  1023. icdev/tools/requirements/decomposition_engine.py +778 -0
  1024. icdev/tools/requirements/document_extractor.py +1016 -0
  1025. icdev/tools/requirements/elicitation_techniques.py +519 -0
  1026. icdev/tools/requirements/gap_detector.py +271 -0
  1027. icdev/tools/requirements/intake_engine.py +2188 -0
  1028. icdev/tools/requirements/prd_generator.py +847 -0
  1029. icdev/tools/requirements/prd_validator.py +595 -0
  1030. icdev/tools/requirements/readiness_scorer.py +313 -0
  1031. icdev/tools/requirements/spec_organizer.py +1029 -0
  1032. icdev/tools/requirements/spec_quality_checker.py +1097 -0
  1033. icdev/tools/requirements/traceability_builder.py +579 -0
  1034. icdev/tools/resilience/__init__.py +34 -0
  1035. icdev/tools/resilience/circuit_breaker.py +340 -0
  1036. icdev/tools/resilience/correlation.py +150 -0
  1037. icdev/tools/resilience/errors.py +81 -0
  1038. icdev/tools/resilience/retry.py +95 -0
  1039. icdev/tools/schemas/__init__.py +27 -0
  1040. icdev/tools/schemas/chat.py +61 -0
  1041. icdev/tools/schemas/compliance.py +56 -0
  1042. icdev/tools/schemas/core.py +85 -0
  1043. icdev/tools/schemas/innovation.py +37 -0
  1044. icdev/tools/schemas/validation.py +109 -0
  1045. icdev/tools/sdk/__init__.py +3 -0
  1046. icdev/tools/sdk/icdev_client.py +218 -0
  1047. icdev/tools/security/__init__.py +1 -0
  1048. icdev/tools/security/agent_output_validator.py +330 -0
  1049. icdev/tools/security/agent_trust_scorer.py +466 -0
  1050. icdev/tools/security/ai_bom_generator.py +725 -0
  1051. icdev/tools/security/ai_telemetry_logger.py +469 -0
  1052. icdev/tools/security/atlas_red_team.py +543 -0
  1053. icdev/tools/security/code_pattern_scanner.py +378 -0
  1054. icdev/tools/security/confabulation_detector.py +271 -0
  1055. icdev/tools/security/container_scanner.py +491 -0
  1056. icdev/tools/security/dependency_auditor.py +944 -0
  1057. icdev/tools/security/endpoint_security_scanner.py +579 -0
  1058. icdev/tools/security/mcp_tool_authorizer.py +243 -0
  1059. icdev/tools/security/prompt_injection_detector.py +737 -0
  1060. icdev/tools/security/sast_runner.py +948 -0
  1061. icdev/tools/security/secret_detector.py +378 -0
  1062. icdev/tools/security/tool_chain_validator.py +357 -0
  1063. icdev/tools/security/vuln_scanner.py +539 -0
  1064. icdev/tools/simulation/__init__.py +2 -0
  1065. icdev/tools/simulation/coa_generator.py +1552 -0
  1066. icdev/tools/simulation/monte_carlo.py +758 -0
  1067. icdev/tools/simulation/scenario_manager.py +1073 -0
  1068. icdev/tools/simulation/simulation_engine.py +1104 -0
  1069. icdev/tools/supply_chain/__init__.py +2 -0
  1070. icdev/tools/supply_chain/cve_triager.py +705 -0
  1071. icdev/tools/supply_chain/dependency_graph.py +645 -0
  1072. icdev/tools/supply_chain/isa_manager.py +540 -0
  1073. icdev/tools/supply_chain/scrm_assessor.py +546 -0
  1074. icdev/tools/testing/__init__.py +2 -0
  1075. icdev/tools/testing/acceptance_validator.py +411 -0
  1076. icdev/tools/testing/claude_dir_validator.py +831 -0
  1077. icdev/tools/testing/data_types.py +199 -0
  1078. icdev/tools/testing/e2e_runner.py +715 -0
  1079. icdev/tools/testing/fuzz_cli.py +306 -0
  1080. icdev/tools/testing/health_check.py +483 -0
  1081. icdev/tools/testing/platform_check.py +143 -0
  1082. icdev/tools/testing/production_audit.py +1862 -0
  1083. icdev/tools/testing/production_remediate.py +804 -0
  1084. icdev/tools/testing/screenshot_validator.py +539 -0
  1085. icdev/tools/testing/smoke_test.py +283 -0
  1086. icdev/tools/testing/test_agent_models.py +117 -0
  1087. icdev/tools/testing/test_orchestrator.py +957 -0
  1088. icdev/tools/testing/utils.py +229 -0
  1089. icdev/tools/translation/__init__.py +17 -0
  1090. icdev/tools/translation/code_translator.py +550 -0
  1091. icdev/tools/translation/dependency_mapper.py +277 -0
  1092. icdev/tools/translation/feature_map.py +395 -0
  1093. icdev/tools/translation/project_assembler.py +439 -0
  1094. icdev/tools/translation/source_extractor.py +609 -0
  1095. icdev/tools/translation/test_translator.py +333 -0
  1096. icdev/tools/translation/translation_manager.py +582 -0
  1097. icdev/tools/translation/translation_validator.py +662 -0
  1098. icdev/tools/translation/type_checker.py +371 -0
  1099. icdev-1.0.0.dist-info/METADATA +868 -0
  1100. icdev-1.0.0.dist-info/RECORD +1105 -0
  1101. icdev-1.0.0.dist-info/WHEEL +5 -0
  1102. icdev-1.0.0.dist-info/entry_points.txt +9 -0
  1103. icdev-1.0.0.dist-info/licenses/LICENSE +254 -0
  1104. icdev-1.0.0.dist-info/licenses/NOTICE +268 -0
  1105. icdev-1.0.0.dist-info/top_level.txt +1 -0
@@ -0,0 +1,1110 @@
1
+ ////////////////////////////////////////////////////////////////////
2
+ CONTROLLED UNCLASSIFIED INFORMATION (CUI) // SP-CTI
3
+ Distribution: Distribution D -- Authorized DoD Personnel Only
4
+ ////////////////////////////////////////////////////////////////////
5
+
6
+ # INCIDENT RESPONSE PLAN (IRP)
7
+ ## Per DoD Instruction 8530.01 / NIST SP 800-61 Rev 2
8
+
9
+ ---
10
+
11
+ ## 1. Document Control
12
+
13
+ **System Name:** {{system_name}}
14
+
15
+ **System Identifier:** {{system_id}}
16
+
17
+ **Plan Version:** {{plan_version}}
18
+
19
+ **Classification:** {{classification}}
20
+
21
+ **Date Prepared:** {{plan_date}}
22
+
23
+ **Last Review Date:** {{last_review_date}}
24
+
25
+ **Next Scheduled Review:** {{next_review_date}}
26
+
27
+ **System Owner:** {{system_owner}}
28
+
29
+ **Authorizing Official:** {{ao_name}}
30
+
31
+ **ISSM:** {{issm_name}}
32
+
33
+ **ISSO:** {{isso_name}}
34
+
35
+ ### Approval Signatures
36
+
37
+ | Role | Name | Signature | Date |
38
+ |------|------|-----------|------|
39
+ | System Owner | {{system_owner}} | __________________ | ________ |
40
+ | Authorizing Official | {{ao_name}} | __________________ | ________ |
41
+ | ISSM | {{issm_name}} | __________________ | ________ |
42
+ | ISSO | {{isso_name}} | __________________ | ________ |
43
+
44
+ ### Revision History
45
+
46
+ {{revision_history}}
47
+
48
+ | Version | Date | Author | Description of Changes |
49
+ |---------|------|--------|------------------------|
50
+ | 1.0 | {{plan_date}} | {{isso_name}} | Initial release |
51
+
52
+ ---
53
+
54
+ ## 2. Purpose and Scope
55
+
56
+ ### 2.1 Purpose
57
+
58
+ This Incident Response Plan (IRP) establishes procedures for detecting, reporting, analyzing, containing, eradicating, and recovering from cybersecurity incidents affecting **{{system_name}}** ({{system_id}}). This plan ensures that incidents are handled in a manner that minimizes damage, reduces recovery time and costs, preserves evidence for potential legal or disciplinary action, and satisfies all applicable DoD reporting requirements.
59
+
60
+ ### 2.2 Scope
61
+
62
+ This plan applies to all information systems, networks, and data within the authorization boundary of {{system_name}}.
63
+
64
+ **System Boundary:** {{system_boundary}}
65
+
66
+ **Operating Environment:** {{operating_environment}}
67
+
68
+ **This plan covers:**
69
+ - All hardware, software, and network components within the {{system_name}} authorization boundary
70
+ - All personnel with access to the system, including administrators, developers, end users, and contractors
71
+ - All data processed, stored, or transmitted by the system, including CUI // SP-CTI
72
+ - Interconnected systems where incidents may propagate to or from the {{system_name}} boundary
73
+ - Cloud infrastructure components hosted in the {{operating_environment}}
74
+
75
+ **This plan does not cover:**
76
+ - Physical security incidents not involving information systems (refer to Physical Security Plan)
77
+ - Incidents on systems outside the {{system_name}} authorization boundary unless they directly impact this system
78
+ - Personnel security investigations (refer to Personnel Security Program)
79
+
80
+ ### 2.3 Applicable Regulations and Standards
81
+
82
+ | Document | Description | Applicability |
83
+ |----------|-------------|---------------|
84
+ | DoD Instruction 8530.01 | Cybersecurity Activities Support to DoD Information Network Operations | Primary directive for CSSP SOC engagement and reporting timelines |
85
+ | NIST SP 800-61 Rev 2 | Computer Security Incident Handling Guide | Technical framework for incident response lifecycle |
86
+ | NIST SP 800-53 Rev 5 (IR Family) | Incident Response Controls (IR-1 through IR-10) | Control requirements for authorization |
87
+ | CJCSM 6510.01B | Cyber Incident Handling Program | Joint Staff procedures for cyber incident handling |
88
+ | DoD Instruction 5200.48 | CUI Program | Requirements for protecting CUI during and after incidents |
89
+ | DFARS 252.204-7012 | Safeguarding Covered Defense Information | Contractor reporting obligations (72-hour rule) |
90
+ | DoDI 8500.01 | Cybersecurity | Overarching DoD cybersecurity policy |
91
+ | DoD Manual 5200.01 Vol 3 | DoD Information Security Program | Spillage and classified data incident procedures |
92
+
93
+ ---
94
+
95
+ ## 3. Roles and Responsibilities
96
+
97
+ ### 3.1 Incident Commander (IC)
98
+
99
+ **Default Assignment:** {{issm_name}} (ISSM)
100
+
101
+ The Incident Commander has overall authority for managing the incident response. During a declared incident, the IC:
102
+ - Activates the Incident Response Team (IRT) and assigns roles
103
+ - Makes containment, eradication, and recovery decisions
104
+ - Authorizes system isolation, shutdown, or network disconnection
105
+ - Approves external communications and notifications
106
+ - Ensures evidence preservation procedures are followed
107
+ - Coordinates with the Authorizing Official on risk acceptance decisions
108
+ - Declares incident closure and initiates after-action review
109
+ - May delegate IC role to a qualified alternate when unavailable
110
+
111
+ **Escalation:** If the ISSM is unavailable, IC authority passes to the ISSO, then to the Security Engineer.
112
+
113
+ ### 3.2 Information System Security Manager (ISSM)
114
+
115
+ **Name:** {{issm_name}}
116
+
117
+ - Serves as default Incident Commander for all incidents
118
+ - Reports incidents to the Authorizing Official ({{ao_name}})
119
+ - Coordinates with CSSP SOC ({{soc_name}}) on incident response activities
120
+ - Ensures all reporting timelines per DoDI 8530.01 are met
121
+ - Manages the Plan of Action and Milestones (POA&M) entries resulting from incidents
122
+ - Ensures lessons learned are documented and incorporated into security posture
123
+ - Validates that containment and eradication actions do not introduce new vulnerabilities
124
+ - Maintains the distribution list for this plan
125
+
126
+ ### 3.3 Information System Security Officer (ISSO)
127
+
128
+ **Name:** {{isso_name}}
129
+
130
+ - Performs initial incident triage and severity classification
131
+ - Conducts preliminary technical analysis of suspected incidents
132
+ - Executes containment actions as directed by the Incident Commander
133
+ - Documents all incident response actions in the incident tracking system
134
+ - Collects and preserves initial evidence per chain-of-custody procedures
135
+ - Coordinates with system administrators on technical response actions
136
+ - Updates continuous monitoring data to reflect incident impact
137
+ - Serves as alternate Incident Commander when ISSM is unavailable
138
+
139
+ ### 3.4 System Administrator
140
+
141
+ **Name:** {{system_admin}}
142
+
143
+ - Provides technical execution of containment actions (network isolation, account disablement, service shutdown)
144
+ - Performs system restoration from verified backups
145
+ - Implements configuration changes directed by the IRT
146
+ - Provides system logs, access records, and configuration data for analysis
147
+ - Verifies system integrity after eradication and before return to operations
148
+ - Maintains backup integrity and documents restoration procedures used
149
+ - Executes emergency patching and hardening actions as directed
150
+
151
+ ### 3.5 Security Engineer
152
+
153
+ **Name:** {{security_engineer}}
154
+
155
+ - Conducts detailed technical analysis of incident indicators and artifacts
156
+ - Performs forensic imaging and analysis per evidence preservation procedures
157
+ - Analyzes malware samples, network captures, and system artifacts
158
+ - Identifies attack vectors, lateral movement, and full scope of compromise
159
+ - Recommends containment strategies and eradication procedures
160
+ - Develops and validates indicators of compromise (IOCs) for detection rule updates
161
+ - Conducts root cause analysis and recommends preventive measures
162
+ - Coordinates with CSSP SOC analysts on technical findings
163
+
164
+ ### 3.6 CSSP SOC Liaison
165
+
166
+ **Primary SOC:** {{soc_name}}
167
+
168
+ The CSSP SOC Liaison is the designated point of contact between the {{system_name}} IRT and the supporting Cybersecurity Service Provider Security Operations Center.
169
+
170
+ - Submits incident tickets to CSSP SOC via {{soc_ticket_url}}
171
+ - Relays SOC directives and technical guidance to the IRT
172
+ - Provides requested technical data, logs, and artifacts to the SOC
173
+ - Coordinates SOC-provided capabilities (enhanced monitoring, threat hunting, forensic support)
174
+ - Ensures information sharing complies with classification and need-to-know requirements
175
+ - Tracks SOC ticket status and ensures timely updates
176
+
177
+ **Note:** The ISSO serves as the default CSSP SOC Liaison unless a separate individual is designated.
178
+
179
+ ### 3.7 Legal Counsel
180
+
181
+ **Contact:** {{legal_contact}}
182
+
183
+ - Advises on legal implications of incident response actions
184
+ - Determines whether law enforcement notification is required
185
+ - Ensures evidence handling meets legal standards for potential prosecution
186
+ - Advises on privacy and data breach notification requirements
187
+ - Reviews external communications for legal risk
188
+ - Coordinates with DoD Office of General Counsel as needed
189
+ - Advises on contract implications for contractor-reported incidents
190
+
191
+ ### 3.8 Communications Lead
192
+
193
+ **Contact:** {{comms_contact}}
194
+
195
+ - Drafts internal and external incident notifications per approved templates
196
+ - Coordinates messaging with the Incident Commander before release
197
+ - Manages stakeholder communications and status updates
198
+ - Ensures communications do not disclose sensitive technical details inappropriately
199
+ - Coordinates with Public Affairs if media interest develops
200
+ - Maintains communication logs as part of the incident record
201
+
202
+ ### 3.9 Incident Response Team (IRT) Activation
203
+
204
+ The IRT is activated by the Incident Commander when an event is classified as a confirmed incident at any severity level. The IRT composition scales with severity:
205
+
206
+ | Severity | Minimum IRT Composition |
207
+ |----------|------------------------|
208
+ | Critical | IC, ISSM, ISSO, System Admin, Security Engineer, SOC Liaison, Legal, Comms |
209
+ | High | IC, ISSO, System Admin, Security Engineer, SOC Liaison |
210
+ | Moderate | IC, ISSO, System Admin or Security Engineer |
211
+ | Low | ISSO, System Admin |
212
+
213
+ ---
214
+
215
+ ## 4. Incident Classification
216
+
217
+ ### 4.1 Incident Categories
218
+
219
+ | Category | Code | Description | Examples |
220
+ |----------|------|-------------|----------|
221
+ | Unauthorized Access | CAT-1 | Successful unauthorized logical access to a system, application, or data | Compromised credentials, privilege escalation, unauthorized admin access, session hijacking |
222
+ | Malicious Code | CAT-2 | Installation or execution of malicious software | Ransomware, trojans, rootkits, worms, unauthorized scripts, cryptominers |
223
+ | Data Breach / Exfiltration | CAT-3 | Unauthorized disclosure, removal, or loss of CUI or sensitive data | Data exfiltration, unauthorized file transfer, lost/stolen media, email of CUI to unauthorized recipient |
224
+ | Denial of Service | CAT-4 | Actions that impair the availability of systems or services | DDoS attacks, resource exhaustion, service disruption, intentional system overload |
225
+ | Insider Threat | CAT-5 | Malicious or negligent actions by authorized users | Intentional policy violations, data theft by employees, sabotage, unauthorized system modifications |
226
+ | Supply Chain Compromise | CAT-6 | Compromise introduced through third-party software, hardware, or services | Malicious dependencies, compromised vendor updates, tampered hardware, backdoored libraries |
227
+ | Improper Usage / Misuse | CAT-7 | Violations of acceptable use policies that create security risk | Unauthorized software installation, policy violations, connecting unauthorized devices, shadow IT |
228
+
229
+ ### 4.2 Severity Levels
230
+
231
+ | Severity | Level | Definition | Impact Criteria |
232
+ |----------|-------|------------|-----------------|
233
+ | **Critical** | 1 | Incident causing or likely to cause catastrophic damage to national security, DoD operations, or involving widespread compromise of CUI | -- Confirmed exfiltration of CUI // SP-CTI to adversary<br>-- Root-level compromise of production systems<br>-- Active adversary with persistent access<br>-- Ransomware impacting mission-critical operations<br>-- Spillage of classified information onto unclassified systems |
234
+ | **High** | 2 | Incident causing or likely to cause significant damage to operations, data integrity, or involving confirmed unauthorized access to sensitive systems | -- Unauthorized access to systems containing CUI<br>-- Malware execution on production systems<br>-- Compromise of privileged accounts<br>-- Partial data breach affecting CUI<br>-- Insider threat with confirmed malicious activity |
235
+ | **Moderate** | 3 | Incident causing limited damage or that could escalate if not contained promptly | -- Failed but targeted intrusion attempts from known threat actors<br>-- Malware detected and contained before execution<br>-- Non-privileged account compromise<br>-- Policy violations with potential security impact<br>-- Supply chain vulnerability affecting non-production systems |
236
+ | **Low** | 4 | Minor incident with minimal operational impact, or potential incident requiring investigation | -- Isolated acceptable use violations<br>-- Unsuccessful automated attack attempts<br>-- Low-risk vulnerability exploitation attempts blocked by controls<br>-- Non-sensitive data exposure with minimal impact<br>-- Lost device with no confirmed data access |
237
+
238
+ ### 4.3 Severity Determination Criteria
239
+
240
+ When classifying incident severity, evaluate the following factors:
241
+
242
+ 1. **Data Sensitivity** -- What type of data is affected? CUI // SP-CTI data elevates severity by one level minimum.
243
+ 2. **Scope of Compromise** -- How many systems, accounts, or users are affected?
244
+ 3. **Adversary Capability** -- Is this an automated scan, opportunistic attack, or targeted advanced threat?
245
+ 4. **Mission Impact** -- Does this affect mission-critical operations, availability, or data integrity?
246
+ 5. **Containment Status** -- Is the threat actively spreading or has it been contained?
247
+ 6. **Recoverability** -- Can affected systems and data be fully restored?
248
+
249
+ **When in doubt, classify at the higher severity level.** Severity can be downgraded as analysis provides clarity, but delayed escalation risks mission impact.
250
+
251
+ ---
252
+
253
+ ## 5. Reporting Timelines
254
+
255
+ ### 5.1 Reporting Requirements Per DoDI 8530.01
256
+
257
+ | Severity | Initial Report Deadline | Report To | Update Frequency |
258
+ |----------|------------------------|-----------|------------------|
259
+ | **Critical** | **1 hour** from detection | CSSP SOC, ISSM, AO, US-CERT, DC3 (if applicable) | Every 2 hours until contained, then every 12 hours |
260
+ | **High** | **24 hours** from detection | CSSP SOC, ISSM, AO | Every 24 hours until resolved |
261
+ | **Moderate** | **72 hours** from detection | CSSP SOC, ISSM | Every 72 hours until resolved |
262
+ | **Low** | **5 business days** from detection | ISSM | Weekly until closed |
263
+
264
+ ### 5.2 Notification Matrix
265
+
266
+ #### Critical Severity (1-Hour Reporting)
267
+
268
+ | Step | Action | Responsible | Contact Method | Timeline |
269
+ |------|--------|-------------|----------------|----------|
270
+ | 1 | Classify incident as Critical | ISSO | -- | Immediate |
271
+ | 2 | Notify ISSM / Incident Commander | ISSO | Phone + secure email | Within 15 minutes |
272
+ | 3 | Notify CSSP SOC | ISSO / SOC Liaison | {{soc_phone}} + {{soc_ticket_url}} | Within 30 minutes |
273
+ | 4 | Notify Authorizing Official | ISSM | Phone + secure email | Within 45 minutes |
274
+ | 5 | Notify US-CERT (if required) | ISSM | us-cert.cisa.gov portal | Within 1 hour |
275
+ | 6 | Notify DC3 (if cyber espionage / APT) | ISSM | DC3 portal | Within 1 hour |
276
+ | 7 | Notify Legal Counsel | IC | Phone | Within 1 hour |
277
+ | 8 | Notify Communications Lead | IC | Phone + secure email | Within 1 hour |
278
+ | 9 | Activate full IRT | IC | Phone tree | Within 1 hour |
279
+
280
+ #### High Severity (24-Hour Reporting)
281
+
282
+ | Step | Action | Responsible | Contact Method | Timeline |
283
+ |------|--------|-------------|----------------|----------|
284
+ | 1 | Classify incident as High | ISSO | -- | Immediate |
285
+ | 2 | Notify ISSM / Incident Commander | ISSO | Phone + secure email | Within 2 hours |
286
+ | 3 | Notify CSSP SOC | SOC Liaison | {{soc_ticket_url}} + {{soc_email}} | Within 4 hours |
287
+ | 4 | Notify Authorizing Official | ISSM | Secure email | Within 12 hours |
288
+ | 5 | Activate IRT (scaled composition) | IC | Phone + email | Within 4 hours |
289
+
290
+ #### Moderate Severity (72-Hour Reporting)
291
+
292
+ | Step | Action | Responsible | Contact Method | Timeline |
293
+ |------|--------|-------------|----------------|----------|
294
+ | 1 | Classify incident as Moderate | ISSO | -- | Immediate |
295
+ | 2 | Notify ISSM | ISSO | Secure email | Within 24 hours |
296
+ | 3 | Notify CSSP SOC | SOC Liaison | {{soc_ticket_url}} | Within 48 hours |
297
+ | 4 | Assign IRT members | IC | Email | Within 48 hours |
298
+
299
+ #### Low Severity (5 Business Day Reporting)
300
+
301
+ | Step | Action | Responsible | Contact Method | Timeline |
302
+ |------|--------|-------------|----------------|----------|
303
+ | 1 | Document incident | ISSO | Incident tracking system | Within 24 hours |
304
+ | 2 | Notify ISSM | ISSO | Secure email | Within 3 business days |
305
+ | 3 | Log with CSSP SOC (if required) | SOC Liaison | {{soc_ticket_url}} | Within 5 business days |
306
+
307
+ ### 5.3 Contractor Reporting Obligations
308
+
309
+ Per DFARS 252.204-7012, contractors must report cyber incidents affecting covered defense information to DC3 within 72 hours of discovery. This obligation exists in addition to the timelines above and requires:
310
+ - Submission via the DC3 DIBNet portal
311
+ - Preservation of all images, logs, and artifacts for at least 90 days
312
+ - Provision of access to additional information or equipment as required for forensic analysis
313
+
314
+ ---
315
+
316
+ ## 6. Detection and Analysis
317
+
318
+ ### 6.1 Detection Sources
319
+
320
+ | Source | Description | Monitoring Frequency | Responsible |
321
+ |--------|-------------|---------------------|-------------|
322
+ | SIEM Alerts | Correlation rules across log sources, anomaly detection | Continuous (real-time) | SOC / ISSO |
323
+ | IDS/IPS | Network-based and host-based intrusion detection | Continuous (real-time) | Security Engineer |
324
+ | Endpoint Detection and Response (EDR) | Host-level behavioral analysis, process monitoring | Continuous (real-time) | Security Engineer |
325
+ | Vulnerability Scanner | Identification of exploited or exploitable vulnerabilities | Scheduled + on-demand | ISSO |
326
+ | User Reports | Personnel reporting suspicious activity or anomalies | As received | Help Desk / ISSO |
327
+ | CSSP SOC Notifications | Threat intelligence, indicator feeds, directed actions | As received | SOC Liaison |
328
+ | Automated Security Scanning | SAST, dependency audit, secret detection, container scanning | Per CI/CD pipeline and scheduled | Security Engineer |
329
+ | Audit Log Review | Analysis of authentication, authorization, and admin activity logs | Daily review + real-time alerts | ISSO |
330
+ | Threat Intelligence Feeds | STIX/TAXII feeds, DoD threat advisories, CSSP IOC distribution | Continuous ingestion | SOC Liaison |
331
+ | File Integrity Monitoring | Detection of unauthorized changes to critical system files | Continuous (real-time) | System Admin |
332
+
333
+ ### 6.2 Initial Analysis Procedures
334
+
335
+ Upon receiving an alert or report of a potential incident, the ISSO (or designated initial responder) shall:
336
+
337
+ **Step 1: Validate the Event**
338
+ - Confirm the alert is not a false positive by correlating with additional data sources
339
+ - Check for known maintenance windows, authorized changes, or testing activities
340
+ - Verify the affected systems are within the {{system_name}} authorization boundary
341
+
342
+ **Step 2: Gather Initial Data**
343
+ - Identify affected systems (hostnames, IP addresses, services)
344
+ - Determine the timeline (when did the activity begin, when was it detected)
345
+ - Collect relevant log entries from SIEM, system logs, network logs, and application logs
346
+ - Identify the user accounts involved (source and target)
347
+ - Document initial findings in the incident tracking system
348
+
349
+ **Step 3: Determine Scope**
350
+ - Identify all systems that may be affected (lateral movement indicators)
351
+ - Determine what data may be at risk (CUI, PII, authentication credentials)
352
+ - Assess whether the incident is ongoing or has concluded
353
+ - Check for related alerts or activity in adjacent timeframes
354
+
355
+ **Step 4: Classify Severity**
356
+ - Apply the severity determination criteria from Section 4.3
357
+ - Assign an incident category from Section 4.1
358
+ - Document the classification rationale
359
+ - Initiate the appropriate notification timeline from Section 5
360
+
361
+ **Step 5: Notify and Escalate**
362
+ - Follow the notification matrix for the assigned severity level
363
+ - Brief the Incident Commander with: what happened, when, what is affected, current status, recommended immediate actions
364
+ - Request IRT activation if needed
365
+
366
+ ### 6.3 Analysis Tools and Techniques
367
+
368
+ | Tool/Technique | Purpose | When Used |
369
+ |----------------|---------|-----------|
370
+ | Log correlation (SIEM) | Identify related events across data sources | All incidents |
371
+ | Network packet capture | Analyze network communications, data exfiltration | CAT-1, CAT-2, CAT-3 |
372
+ | Memory forensics | Analyze running processes, detect fileless malware | CAT-1, CAT-2 |
373
+ | Disk forensics | Recover deleted files, analyze file system artifacts | CAT-1, CAT-2, CAT-3, CAT-5 |
374
+ | Malware analysis (static/dynamic) | Determine malware capabilities, C2 infrastructure | CAT-2, CAT-6 |
375
+ | IOC matching | Compare artifacts against known threat indicators | All incidents |
376
+ | Timeline reconstruction | Build comprehensive timeline of attacker activity | Critical and High severity |
377
+ | Behavioral analysis | Identify anomalous user or process behavior | CAT-5, CAT-7 |
378
+
379
+ ---
380
+
381
+ ## 7. Containment Procedures
382
+
383
+ ### 7.1 Containment Strategy Selection
384
+
385
+ The Incident Commander selects the containment strategy based on:
386
+ - The incident category and severity
387
+ - Whether the adversary is actively present on the network
388
+ - The potential for collateral damage from containment actions
389
+ - Mission-critical status of affected systems
390
+ - Evidence preservation requirements
391
+
392
+ **All containment actions must be documented in real-time in the incident tracking system, including the time, action taken, person executing, and authorization.**
393
+
394
+ ### 7.2 Short-Term Containment
395
+
396
+ Short-term containment actions are implemented immediately to stop the incident from spreading. These actions prioritize speed over thoroughness and may cause temporary service disruption.
397
+
398
+ | Action | Description | Authorized By | Executed By |
399
+ |--------|-------------|---------------|-------------|
400
+ | Network isolation | Disconnect affected system(s) from the network (VLAN change, firewall block, physical disconnect) | IC | System Admin |
401
+ | Account disablement | Disable compromised user accounts and reset credentials | IC | System Admin |
402
+ | Service shutdown | Stop affected services or applications | IC | System Admin |
403
+ | Firewall rule addition | Block known malicious IPs, domains, or ports at the perimeter | IC | Security Engineer |
404
+ | DNS sinkhole | Redirect malicious domain queries to prevent C2 communication | IC | Security Engineer |
405
+ | Endpoint quarantine | Use EDR to isolate an endpoint while maintaining forensic access | ISSO (Moderate/Low) or IC (High/Critical) | Security Engineer |
406
+
407
+ **Emergency Action Authority:** In situations where the IC is unreachable and delay would result in catastrophic damage (active data exfiltration of CUI, ransomware encryption in progress), the ISSO may authorize network isolation of affected systems and immediately notify the IC afterward.
408
+
409
+ ### 7.3 Long-Term Containment
410
+
411
+ Long-term containment is applied after short-term measures are in place and maintains containment while allowing continued investigation and planned recovery.
412
+
413
+ | Action | Description | Authorized By | Executed By |
414
+ |--------|-------------|---------------|-------------|
415
+ | Emergency patching | Apply critical patches to close the exploited vulnerability | IC | System Admin |
416
+ | Credential rotation | Reset passwords and API keys for all potentially exposed accounts | IC | System Admin |
417
+ | Certificate revocation | Revoke and reissue TLS certificates if private keys may be compromised | IC | Security Engineer |
418
+ | Enhanced monitoring | Deploy additional logging, packet capture, or honeypot systems | IC | Security Engineer |
419
+ | Temporary access restrictions | Implement more restrictive ACLs while investigation continues | IC | System Admin |
420
+ | Alternate system deployment | Stand up clean replacement systems for mission-critical functions | IC | System Admin |
421
+
422
+ ### 7.4 Evidence Preservation During Containment
423
+
424
+ Before executing any containment action that may alter evidence:
425
+
426
+ 1. **Capture volatile data first** -- Running processes, network connections, memory contents, logged-in users
427
+ 2. **Create forensic images** -- Full disk images of affected systems before remediation
428
+ 3. **Preserve logs** -- Export and hash relevant log files from SIEM, system, application, and network sources
429
+ 4. **Document the state** -- Screenshot system state, record active connections, note any anomalies
430
+ 5. **Maintain chain of custody** -- Log all evidence collection actions per Section 9
431
+
432
+ ---
433
+
434
+ ## 8. Eradication and Recovery
435
+
436
+ ### 8.1 Eradication Procedures
437
+
438
+ Eradication eliminates the root cause of the incident and all artifacts of the compromise.
439
+
440
+ **Step 1: Identify Root Cause**
441
+ - Determine the initial attack vector (phishing, vulnerability exploitation, insider action, supply chain)
442
+ - Identify all compromised systems, accounts, and data
443
+ - Map the full scope of adversary activity from initial access through current state
444
+
445
+ **Step 2: Remove Threat Artifacts**
446
+ - Delete malicious files, scripts, scheduled tasks, and persistence mechanisms
447
+ - Remove unauthorized accounts, SSH keys, and access tokens
448
+ - Clean or rebuild compromised systems from verified clean images
449
+ - Remove attacker tools and backdoors from all affected systems
450
+
451
+ **Step 3: Close Attack Vector**
452
+ - Patch the vulnerability that was exploited
453
+ - Update firewall rules, IDS/IPS signatures, and detection rules
454
+ - Implement additional controls to prevent recurrence
455
+ - Update STIG compliance baseline if configuration changes are required
456
+
457
+ **Step 4: Verify Eradication**
458
+ - Scan all affected systems with updated signatures
459
+ - Review logs for any continued adversary activity
460
+ - Validate that all IOCs associated with the incident are no longer present
461
+ - Conduct targeted vulnerability assessment of affected systems
462
+
463
+ ### 8.2 Recovery Procedures
464
+
465
+ **Step 1: System Restoration**
466
+ - Restore from verified clean backups (validate backup integrity via checksums before restoration)
467
+ - Rebuild systems from approved baselines if backups may be compromised
468
+ - Apply all current patches and STIG hardening before reconnecting to the network
469
+ - Restore data from verified clean sources
470
+
471
+ **Step 2: Validation and Testing**
472
+ - Verify system functionality meets operational requirements
473
+ - Confirm all security controls are operational (authentication, authorization, logging, encryption)
474
+ - Run vulnerability scans and STIG compliance checks against restored systems
475
+ - Validate data integrity of restored information
476
+ - Test interconnections with dependent systems
477
+
478
+ **Step 3: Enhanced Monitoring**
479
+ - Implement increased monitoring on recovered systems for a minimum of 30 days
480
+ - Deploy additional detection rules based on incident IOCs
481
+ - Conduct daily log reviews for recovered systems during the monitoring period
482
+ - Set lower alert thresholds for activity related to the incident category
483
+
484
+ ### 8.3 Return-to-Operations Criteria
485
+
486
+ Systems may be returned to normal operations only when ALL of the following criteria are met:
487
+
488
+ - [ ] Root cause has been identified and eliminated
489
+ - [ ] All compromised systems have been rebuilt or verified clean
490
+ - [ ] All exploited vulnerabilities have been patched
491
+ - [ ] STIG compliance has been verified on all affected systems
492
+ - [ ] Vulnerability scan shows no critical or high findings on affected systems
493
+ - [ ] All compromised credentials have been rotated
494
+ - [ ] Enhanced monitoring is in place and functioning
495
+ - [ ] Incident Commander has authorized return to operations
496
+ - [ ] CSSP SOC has been notified of planned return to operations
497
+ - [ ] ISSM has updated the POA&M with any residual risks
498
+ - [ ] AO has accepted any residual risk (if applicable)
499
+
500
+ **Authorization:** The Incident Commander authorizes return to operations. For Critical severity incidents, the Authorizing Official ({{ao_name}}) must also concur.
501
+
502
+ ---
503
+
504
+ ## 9. Evidence Preservation
505
+
506
+ ### 9.1 Chain of Custody
507
+
508
+ All evidence collected during incident response must maintain a documented chain of custody. Each piece of evidence must be tracked from collection through final disposition.
509
+
510
+ **Chain of Custody Record (per item):**
511
+
512
+ | Field | Description |
513
+ |-------|-------------|
514
+ | Evidence ID | Unique identifier (format: {{system_id}}-INC-YYYYMMDD-NNN-E##) |
515
+ | Description | What the evidence is (disk image, log file, memory dump, etc.) |
516
+ | Source System | Hostname, IP, and system identifier of the source |
517
+ | Date/Time Collected | Timestamp of collection (UTC) |
518
+ | Collected By | Name and role of the person who collected the evidence |
519
+ | Hash (SHA-256) | Cryptographic hash computed at time of collection |
520
+ | Storage Location | Where the evidence is stored (physical and/or logical) |
521
+ | Access Log | Every person who has accessed the evidence, with timestamps |
522
+
523
+ **Chain of custody forms must be completed at the time of collection, not after the fact.**
524
+
525
+ ### 9.2 Forensic Imaging Procedures
526
+
527
+ 1. **Preparation** -- Verify that forensic tools are ready and write-blockers are functioning
528
+ 2. **Documentation** -- Photograph the system, record serial numbers, document current state
529
+ 3. **Volatile Data Collection** -- Capture memory, running processes, network connections, and open files before powering down
530
+ 4. **Disk Imaging** -- Create a bit-for-bit forensic image using a write-blocker; create two copies minimum
531
+ 5. **Hash Verification** -- Compute SHA-256 hashes of both the original media and each image; document and compare
532
+ 6. **Secure Storage** -- Store forensic images in a secure, access-controlled location (encrypted storage recommended)
533
+ 7. **Original Media** -- Secure the original media in a tamper-evident bag if physical seizure is warranted
534
+
535
+ ### 9.3 Log Preservation
536
+
537
+ The following logs must be preserved for all incidents at Moderate severity and above:
538
+
539
+ | Log Source | Retention Period | Format | Storage |
540
+ |------------|-----------------|--------|---------|
541
+ | SIEM correlation logs | 1 year minimum | Raw + parsed | Secure log archive |
542
+ | System authentication logs | 1 year minimum | Syslog / Windows Event | Secure log archive |
543
+ | Network flow data | 90 days minimum | NetFlow / PCAP | Secure network storage |
544
+ | Application logs | 1 year minimum | Application-specific | Secure log archive |
545
+ | Firewall / IDS/IPS logs | 90 days minimum | Vendor format | Secure log archive |
546
+ | DNS query logs | 90 days minimum | DNS log format | Secure log archive |
547
+ | Email logs (if applicable) | 90 days minimum | MTA logs | Secure log archive |
548
+ | Audit trail (ICDEV) | Immutable / permanent | SQLite / JSON | data/icdev.db (append-only) |
549
+
550
+ **Note:** Per DFARS 252.204-7012, contractors must preserve images and logs for a minimum of 90 days following a reported cyber incident.
551
+
552
+ ### 9.4 Evidence Storage Requirements
553
+
554
+ - All digital evidence must be stored on encrypted media
555
+ - Physical evidence must be stored in a locked container within a controlled-access area
556
+ - Evidence storage areas must have access logging
557
+ - Evidence integrity must be verified (hash comparison) at regular intervals and upon each access
558
+ - Evidence disposition must follow organizational records retention policies and legal hold requirements
559
+ - Evidence must not be stored on systems within the incident boundary
560
+
561
+ ---
562
+
563
+ ## 10. Communication Plan
564
+
565
+ ### 10.1 Internal Notification Matrix
566
+
567
+ | Audience | Critical | High | Moderate | Low | Method |
568
+ |----------|----------|------|----------|-----|--------|
569
+ | Incident Commander | Immediate | 2 hours | 24 hours | 3 business days | Phone + email |
570
+ | Authorizing Official ({{ao_name}}) | 45 minutes | 12 hours | As needed | Monthly report | Phone + email |
571
+ | System Owner ({{system_owner}}) | 1 hour | 12 hours | 72 hours | Monthly report | Phone + email |
572
+ | ISSM ({{issm_name}}) | 15 minutes | 2 hours | 24 hours | 3 business days | Phone + email |
573
+ | ISSO ({{isso_name}}) | Immediate | Immediate | 4 hours | 24 hours | Phone + email |
574
+ | System Admin ({{system_admin}}) | Immediate | 1 hour | 24 hours | As needed | Phone + email |
575
+ | Security Engineer ({{security_engineer}}) | 30 minutes | 2 hours | 24 hours | As needed | Phone + email |
576
+ | Legal Counsel ({{legal_contact}}) | 1 hour | 24 hours | As needed | N/A | Phone + email |
577
+ | Communications ({{comms_contact}}) | 1 hour | 24 hours | As needed | N/A | Phone + email |
578
+ | End Users (if impacted) | 4 hours | 24 hours | As needed | N/A | Email |
579
+
580
+ ### 10.2 External Notification Requirements
581
+
582
+ | Organization | When Required | Method | Timeline | Contact |
583
+ |-------------|---------------|--------|----------|---------|
584
+ | CSSP SOC ({{soc_name}}) | All confirmed incidents High and above; Moderate at ISSM discretion | Phone: {{soc_phone}}, Email: {{soc_email}}, Ticket: {{soc_ticket_url}} | Per Section 5.1 | SOC Liaison |
585
+ | US-CERT / CISA | Critical incidents; incidents affecting federal networks | us-cert.cisa.gov reporting portal | Within 1 hour (Critical) | ISSM |
586
+ | DC3 (Defense Cyber Crime Center) | Cyber espionage, APT activity, contractor incidents per DFARS | DIBNet portal | Within 72 hours (DFARS); Within 1 hour (Critical APT) | ISSM |
587
+ | Law Enforcement (DCIS, FBI, OSI) | Criminal activity, insider threat with criminal elements | Phone, coordinated through Legal | As directed by Legal Counsel | ISSM + Legal |
588
+ | Authorizing Official chain | All incidents affecting ATO status | Secure email + phone | Per Section 5.1 | ISSM |
589
+ | Interconnected system owners | Incidents that may propagate to connected systems | Secure email + phone | Within 4 hours of confirmation | ISSO |
590
+
591
+ ### 10.3 Communication Templates
592
+
593
+ #### Initial Incident Notification (Internal)
594
+
595
+ ```
596
+ SUBJECT: [SEVERITY] Cybersecurity Incident -- {{system_name}} -- [INC-YYYYMMDD-NNN]
597
+
598
+ CLASSIFICATION: CUI // SP-CTI
599
+
600
+ INCIDENT SUMMARY:
601
+ - Incident ID: [INC-YYYYMMDD-NNN]
602
+ - Date/Time Detected: [YYYY-MM-DD HH:MM UTC]
603
+ - Severity: [Critical/High/Moderate/Low]
604
+ - Category: [CAT-1 through CAT-7]
605
+ - Affected Systems: [List hostnames/IPs]
606
+ - Brief Description: [1-2 sentence summary]
607
+ - Current Status: [Investigating/Containing/Eradicating/Recovering]
608
+ - Incident Commander: [Name]
609
+
610
+ IMMEDIATE ACTIONS TAKEN:
611
+ - [List actions taken so far]
612
+
613
+ NEXT STEPS:
614
+ - [List planned actions]
615
+
616
+ CONTACT: [ISSO name and phone]
617
+
618
+ This notification is CUI // SP-CTI. Handle and distribute accordingly.
619
+ ```
620
+
621
+ #### CSSP SOC Incident Report
622
+
623
+ ```
624
+ SUBJECT: Incident Report -- {{system_name}} ({{system_id}}) -- [INC-YYYYMMDD-NNN]
625
+
626
+ CLASSIFICATION: CUI // SP-CTI
627
+
628
+ 1. REPORTING ORGANIZATION: [Organization name]
629
+ 2. SYSTEM: {{system_name}} ({{system_id}})
630
+ 3. DATE/TIME DETECTED: [YYYY-MM-DD HH:MM UTC]
631
+ 4. DATE/TIME OF INCIDENT: [YYYY-MM-DD HH:MM UTC] (if different from detection)
632
+ 5. INCIDENT CATEGORY: [CAT-1 through CAT-7]
633
+ 6. SEVERITY: [Critical/High/Moderate/Low]
634
+ 7. AFFECTED SYSTEMS: [Hostnames, IPs, OS, function]
635
+ 8. DESCRIPTION: [Detailed description of incident]
636
+ 9. INDICATORS OF COMPROMISE: [IPs, domains, hashes, file names, etc.]
637
+ 10. IMPACT: [Operational impact, data at risk]
638
+ 11. ACTIONS TAKEN: [Containment and response actions]
639
+ 12. ASSISTANCE REQUESTED: [Specific SOC support needed]
640
+ 13. POC: [Name, phone, email]
641
+ 14. NEXT UPDATE: [Date/time of next scheduled update]
642
+ ```
643
+
644
+ #### Status Update Template
645
+
646
+ ```
647
+ SUBJECT: UPDATE [#N] -- [SEVERITY] Incident -- {{system_name}} -- [INC-YYYYMMDD-NNN]
648
+
649
+ CLASSIFICATION: CUI // SP-CTI
650
+
651
+ UPDATE SUMMARY:
652
+ - Incident ID: [INC-YYYYMMDD-NNN]
653
+ - Update Number: [N]
654
+ - Current Severity: [Unchanged/Upgraded/Downgraded] -- [Level]
655
+ - Current Status: [Investigating/Containing/Eradicating/Recovering/Closed]
656
+
657
+ ACTIONS SINCE LAST UPDATE:
658
+ - [Bulleted list of actions taken]
659
+
660
+ FINDINGS:
661
+ - [New findings, analysis results, scope changes]
662
+
663
+ CURRENT CONTAINMENT STATUS:
664
+ - [Description of containment posture]
665
+
666
+ NEXT STEPS:
667
+ - [Planned actions with estimated timelines]
668
+
669
+ NEXT UPDATE: [Date/time]
670
+
671
+ CONTACT: [Name and phone]
672
+ ```
673
+
674
+ ---
675
+
676
+ ## 11. Escalation Matrix
677
+
678
+ | Severity | Initial Response | Reporting Deadline | Incident Commander | CSSP SOC Engagement | AO Notification | Briefing Cadence |
679
+ |----------|-----------------|--------------------|--------------------|---------------------|-----------------|------------------|
680
+ | **Critical** | Immediate IRT activation | 1 hour | ISSM ({{issm_name}}) | Full engagement: real-time coordination, SOC analyst support, threat hunting | Within 45 minutes | Every 2 hours until contained |
681
+ | **High** | IRT activation within 4 hours | 24 hours | ISSM ({{issm_name}}) | Active engagement: ticket submission, log sharing, IOC exchange | Within 12 hours | Every 24 hours |
682
+ | **Moderate** | Assigned responder within 24 hours | 72 hours | ISSO ({{isso_name}}) | Standard: ticket submission, periodic updates | As needed | Every 72 hours |
683
+ | **Low** | Normal business hours response | 5 business days | ISSO ({{isso_name}}) | Minimal: documented in tracking system | Monthly reporting | Weekly until closed |
684
+
685
+ ### Escalation Triggers
686
+
687
+ An incident must be escalated to the next higher severity level when any of the following occur:
688
+
689
+ - The scope of compromise expands beyond initial assessment
690
+ - CUI data is confirmed to have been exfiltrated
691
+ - Additional systems are found to be compromised
692
+ - The adversary demonstrates advanced capabilities (zero-day exploitation, custom tooling)
693
+ - Containment actions are ineffective after initial implementation
694
+ - The incident generates media or Congressional interest
695
+ - Law enforcement requests involvement
696
+ - The incident affects interconnected systems outside the {{system_name}} boundary
697
+
698
+ ---
699
+
700
+ ## 12. CSSP SOC Integration
701
+
702
+ ### 12.1 SOC Contact Information
703
+
704
+ | Item | Detail |
705
+ |------|--------|
706
+ | SOC Name | {{soc_name}} |
707
+ | Primary Phone | {{soc_phone}} |
708
+ | Email | {{soc_email}} |
709
+ | Ticket Submission Portal | {{soc_ticket_url}} |
710
+ | Hours of Operation | 24/7/365 (for Critical/High); Business hours for Moderate/Low |
711
+ | Secure Communication Channel | Per SOC-provided secure communication procedures |
712
+
713
+ ### 12.2 Ticket Submission Process
714
+
715
+ 1. **Create ticket** via {{soc_ticket_url}} with incident category, severity, and initial details
716
+ 2. **Receive ticket number** -- Reference this number in all subsequent communications
717
+ 3. **Upload supporting data** -- Logs, IOCs, forensic artifacts as requested by SOC
718
+ 4. **Respond to SOC queries** within the timeframe specified by the SOC based on severity
719
+ 5. **Update ticket** with new findings, status changes, and actions taken
720
+ 6. **Close ticket** only when the SOC confirms closure criteria are met
721
+
722
+ ### 12.3 SOC Capabilities Available
723
+
724
+ The CSSP SOC provides the following capabilities that may be requested during incident response:
725
+
726
+ | Capability | Description | Request Method |
727
+ |------------|-------------|----------------|
728
+ | Threat Hunting | Proactive search for adversary activity based on IOCs | SOC ticket |
729
+ | Forensic Support | Advanced forensic analysis beyond local capability | SOC ticket + phone |
730
+ | Malware Analysis | Static and dynamic analysis of malware samples | SOC ticket with sample submission |
731
+ | Threat Intelligence | Contextual information on threat actors, TTPs, campaigns | SOC ticket or email |
732
+ | Enhanced Monitoring | Temporary increased monitoring of specific assets or traffic | SOC ticket |
733
+ | Network Analysis | Deep packet inspection, traffic analysis, anomaly detection | SOC ticket |
734
+ | Indicator Sharing | Distribution of IOCs to detection systems across the enterprise | Automatic per SOC procedures |
735
+ | Incident Coordination | Multi-system incident coordination across organizational boundaries | SOC ticket + phone |
736
+
737
+ ### 12.4 Information Sharing Procedures
738
+
739
+ - All information shared with the CSSP SOC must be marked with appropriate CUI markings
740
+ - Share IOCs, logs, and artifacts via SOC-approved secure transfer mechanisms only
741
+ - Classify information shared based on the sensitivity of the underlying data
742
+ - Do not share classified information through CUI channels -- escalate to appropriate security authority
743
+ - Request SOC confirmation of receipt for all evidence and artifact submissions
744
+ - Maintain a log of all information shared with the SOC as part of the incident record
745
+
746
+ ---
747
+
748
+ ## 13. Testing and Exercises
749
+
750
+ ### 13.1 Annual Tabletop Exercise
751
+
752
+ **Frequency:** At least annually (more frequently for high-value assets)
753
+
754
+ **Scope:** Full IRP walkthrough using realistic scenarios appropriate to the {{system_name}} threat profile.
755
+
756
+ **Participants:** All IRT members, CSSP SOC representative (when available), system owner, AO representative.
757
+
758
+ **Exercise Requirements:**
759
+ - Scenario must include at least one Critical severity incident
760
+ - Must exercise external notification procedures (CSSP SOC, US-CERT, DC3 as applicable)
761
+ - Must validate contact information and notification chains
762
+ - Must test decision-making processes for containment, eradication, and recovery
763
+ - Must include a CUI data breach scenario at least every other year
764
+ - Scenarios should be based on current threat intelligence and recent incidents in the DoD community
765
+
766
+ **Documentation:** Exercise plan, participant list, scenario injects, participant responses, after-action report.
767
+
768
+ ### 13.2 Quarterly Communications Test
769
+
770
+ **Frequency:** Every 90 days
771
+
772
+ **Scope:** Verify all IRT contact information and communication channels are operational.
773
+
774
+ **Test Procedures:**
775
+ 1. Contact each IRT member via primary and alternate contact methods
776
+ 2. Verify CSSP SOC contact information and ticket submission process
777
+ 3. Confirm secure communication channels are operational
778
+ 4. Validate that phone trees and escalation paths are current
779
+ 5. Update contact roster with any changes identified
780
+
781
+ **Documentation:** Test date, results for each contact, any failures and corrective actions.
782
+
783
+ ### 13.3 After-Action Review (AAR)
784
+
785
+ An after-action review must be conducted following:
786
+ - Every actual incident at Moderate severity or above
787
+ - Every tabletop exercise
788
+ - Every significant change to the system architecture or operating environment
789
+
790
+ **AAR Requirements:**
791
+ 1. Conduct within 10 business days of incident closure or exercise completion
792
+ 2. Include all IRT members who participated in the response
793
+ 3. Document what happened, what was planned, what went well, what needs improvement
794
+ 4. Identify specific action items with owners and deadlines
795
+ 5. Update this IRP based on findings
796
+ 6. Update detection rules, playbooks, and procedures based on lessons learned
797
+ 7. Brief the AO on significant findings
798
+
799
+ **AAR Report Template:**
800
+
801
+ | Section | Content |
802
+ |---------|---------|
803
+ | Incident/Exercise Summary | Brief description, timeline, severity |
804
+ | What Worked Well | Effective procedures, tools, coordination |
805
+ | Areas for Improvement | Gaps, delays, tool limitations, communication failures |
806
+ | Root Cause (incidents only) | Technical root cause and contributing factors |
807
+ | Action Items | Specific improvements with owner, deadline, and priority |
808
+ | IRP Updates Required | Sections of this plan that need revision |
809
+ | Training Needs | Knowledge or skill gaps identified |
810
+
811
+ ---
812
+
813
+ ## 14. Plan Maintenance
814
+
815
+ ### 14.1 Review Schedule
816
+
817
+ | Review Type | Frequency | Responsible | Trigger |
818
+ |-------------|-----------|-------------|---------|
819
+ | Scheduled review | Annual minimum | ISSM ({{issm_name}}) | Calendar date ({{next_review_date}}) |
820
+ | Post-incident review | Within 10 business days of closure | ISSO ({{isso_name}}) | Every Moderate+ incident |
821
+ | Post-exercise review | Within 10 business days of exercise | ISSO ({{isso_name}}) | Every tabletop or communications test |
822
+ | Personnel change review | Within 5 business days | ISSO ({{isso_name}}) | Any IRT member departure or role change |
823
+ | System change review | Within 10 business days | ISSO ({{isso_name}}) | Major system architecture or boundary changes |
824
+ | Regulatory change review | Within 30 days | ISSM ({{issm_name}}) | New or updated DoD directives, NIST publications |
825
+
826
+ ### 14.2 Update Triggers
827
+
828
+ This plan must be reviewed and updated when any of the following occur:
829
+
830
+ - Annual review date is reached
831
+ - A significant incident reveals gaps in current procedures
832
+ - After-action review identifies required changes
833
+ - IRT personnel changes (departures, new assignments, role changes)
834
+ - Significant changes to the {{system_name}} architecture or authorization boundary
835
+ - Changes to CSSP SOC contact information, procedures, or capabilities
836
+ - New or updated DoD directives, instructions, or NIST guidance affecting incident response
837
+ - Changes to the threat landscape relevant to {{system_name}}
838
+ - Changes to interconnected systems that affect incident response coordination
839
+ - Organizational restructuring affecting roles and responsibilities
840
+
841
+ ### 14.3 Distribution List
842
+
843
+ This plan is distributed to the following personnel. Recipients are responsible for maintaining the most current version and destroying superseded copies.
844
+
845
+ | Recipient | Role | Distribution Method |
846
+ |-----------|------|---------------------|
847
+ | {{system_owner}} | System Owner | Secure electronic + printed copy |
848
+ | {{ao_name}} | Authorizing Official | Secure electronic |
849
+ | {{issm_name}} | ISSM | Secure electronic + printed copy |
850
+ | {{isso_name}} | ISSO | Secure electronic + printed copy |
851
+ | {{system_admin}} | System Administrator | Secure electronic |
852
+ | {{security_engineer}} | Security Engineer | Secure electronic |
853
+ | {{legal_contact}} | Legal Counsel | Secure electronic |
854
+ | {{comms_contact}} | Communications Lead | Secure electronic |
855
+ | {{soc_name}} | CSSP SOC (reference copy) | Secure electronic |
856
+
857
+ ### 14.4 Version Control
858
+
859
+ All changes to this plan must be:
860
+ 1. Reviewed and approved by the ISSM before distribution
861
+ 2. Documented in the Revision History table (Section 1)
862
+ 3. Distributed to all personnel on the distribution list within 5 business days
863
+ 4. Acknowledged by all IRT members within 10 business days of receipt
864
+
865
+ ---
866
+
867
+ ## 15. Appendices
868
+
869
+ ### Appendix A: Contact Roster
870
+
871
+ **CLASSIFICATION: CUI // SP-CTI -- Protect accordingly**
872
+
873
+ | Role | Name | Primary Phone | Alternate Phone | Secure Email | Location |
874
+ |------|------|---------------|-----------------|--------------|----------|
875
+ | System Owner | {{system_owner}} | ____________ | ____________ | ____________ | ____________ |
876
+ | Authorizing Official | {{ao_name}} | ____________ | ____________ | ____________ | ____________ |
877
+ | ISSM | {{issm_name}} | ____________ | ____________ | ____________ | ____________ |
878
+ | ISSO | {{isso_name}} | ____________ | ____________ | ____________ | ____________ |
879
+ | System Administrator | {{system_admin}} | ____________ | ____________ | ____________ | ____________ |
880
+ | Security Engineer | {{security_engineer}} | ____________ | ____________ | ____________ | ____________ |
881
+ | Legal Counsel | {{legal_contact}} | ____________ | ____________ | ____________ | ____________ |
882
+ | Communications Lead | {{comms_contact}} | ____________ | ____________ | ____________ | ____________ |
883
+ | CSSP SOC (Primary) | {{soc_name}} | {{soc_phone}} | ____________ | {{soc_email}} | ____________ |
884
+
885
+ **External Contacts:**
886
+
887
+ | Organization | Purpose | Phone | Email/Portal |
888
+ |-------------|---------|-------|--------------|
889
+ | US-CERT / CISA | Federal incident reporting | 1-888-282-0870 | us-cert.cisa.gov |
890
+ | DC3 (DoD Cyber Crime Center) | DoD/DIB incident reporting | 1-410-981-0104 | dc3.mil |
891
+ | FBI Cyber Division | Law enforcement | Local field office | ic3.gov |
892
+ | DCIS (Defense Criminal Investigative Service) | DoD criminal investigation | Local field office | dodig.mil/dcis |
893
+
894
+ **This contact roster must be verified quarterly (see Section 13.2).**
895
+
896
+ ---
897
+
898
+ ### Appendix B: Incident Report Form
899
+
900
+ ```
901
+ ////////////////////////////////////////////////////////////////////
902
+ CUI // SP-CTI
903
+ ////////////////////////////////////////////////////////////////////
904
+
905
+ CYBERSECURITY INCIDENT REPORT FORM
906
+ System: {{system_name}} ({{system_id}})
907
+
908
+ SECTION 1: INCIDENT IDENTIFICATION
909
+ Incident ID: INC-____________-___
910
+ Date/Time Detected: ____-__-__ __:__ UTC
911
+ Date/Time of Incident:____-__-__ __:__ UTC (if known)
912
+ Detected By: [ ] SIEM [ ] IDS/IPS [ ] EDR [ ] User Report
913
+ [ ] CSSP SOC [ ] Scanner [ ] Audit Review
914
+ [ ] Other: _______________
915
+ Reported By: Name: ________________ Role: ________________
916
+
917
+ SECTION 2: CLASSIFICATION
918
+ Category: [ ] CAT-1 Unauthorized Access [ ] CAT-2 Malicious Code
919
+ [ ] CAT-3 Data Breach [ ] CAT-4 Denial of Service
920
+ [ ] CAT-5 Insider Threat [ ] CAT-6 Supply Chain
921
+ [ ] CAT-7 Misuse
922
+ Severity: [ ] Critical [ ] High [ ] Moderate [ ] Low
923
+
924
+ SECTION 3: AFFECTED SYSTEMS
925
+ Hostname(s): ________________________________________________
926
+ IP Address(es): ________________________________________________
927
+ OS/Platform: ________________________________________________
928
+ Function: ________________________________________________
929
+ CUI Data at Risk: [ ] Yes [ ] No [ ] Unknown
930
+ Description of CUI: ___________________________________________
931
+
932
+ SECTION 4: INCIDENT DESCRIPTION
933
+ (Provide detailed narrative of what occurred, how it was detected,
934
+ and the current state of the incident.)
935
+ _______________________________________________________________
936
+ _______________________________________________________________
937
+ _______________________________________________________________
938
+ _______________________________________________________________
939
+
940
+ SECTION 5: INDICATORS OF COMPROMISE
941
+ Source IPs: ________________________________________________
942
+ Dest IPs: ________________________________________________
943
+ Domains/URLs: ________________________________________________
944
+ File Hashes: ________________________________________________
945
+ File Names: ________________________________________________
946
+ Other IOCs: ________________________________________________
947
+
948
+ SECTION 6: ACTIONS TAKEN
949
+ [ ] System isolated from network
950
+ [ ] Affected accounts disabled
951
+ [ ] Forensic image created
952
+ [ ] Logs preserved
953
+ [ ] CSSP SOC notified (Ticket #: _________)
954
+ [ ] ISSM notified
955
+ [ ] AO notified
956
+ [ ] Other: ____________________________________________________
957
+ Narrative: ____________________________________________________
958
+ _______________________________________________________________
959
+
960
+ SECTION 7: IMPACT ASSESSMENT
961
+ Operational Impact: [ ] None [ ] Minor [ ] Significant [ ] Severe
962
+ Data Compromise: [ ] None [ ] Suspected [ ] Confirmed
963
+ Users Affected: _____ (number)
964
+ Systems Affected: _____ (number)
965
+ Mission Impact: ___________________________________________
966
+
967
+ SECTION 8: SIGNATURES
968
+ Prepared By: ________________ Date: ________ Time: ________
969
+ Reviewed By: ________________ Date: ________ Time: ________
970
+ IC Approval: ________________ Date: ________ Time: ________
971
+
972
+ ////////////////////////////////////////////////////////////////////
973
+ CUI // SP-CTI
974
+ ////////////////////////////////////////////////////////////////////
975
+ ```
976
+
977
+ ---
978
+
979
+ ### Appendix C: Evidence Collection Checklist
980
+
981
+ Use this checklist for each system involved in an incident. Complete one checklist per system.
982
+
983
+ **System:** __________________ **Incident ID:** __________________
984
+
985
+ **Collector:** ________________ **Date/Time (UTC):** ______________
986
+
987
+ #### Volatile Data (Collect FIRST -- order matters)
988
+
989
+ - [ ] System date/time and timezone
990
+ - [ ] Running processes and services (full process tree with command lines)
991
+ - [ ] Open network connections and listening ports
992
+ - [ ] Logged-in users and active sessions
993
+ - [ ] Open files and file handles
994
+ - [ ] System memory (full RAM dump)
995
+ - [ ] Network interface configuration (IP, MAC, DNS, routes)
996
+ - [ ] Scheduled tasks and cron jobs
997
+ - [ ] Loaded kernel modules / drivers
998
+ - [ ] Clipboard contents (if accessible)
999
+ - [ ] Environment variables for suspicious processes
1000
+ - [ ] ARP cache and DNS cache
1001
+
1002
+ #### Non-Volatile Data
1003
+
1004
+ - [ ] Full disk forensic image (with write-blocker)
1005
+ - [ ] SHA-256 hash of forensic image computed and recorded
1006
+ - [ ] Second copy of forensic image created and stored separately
1007
+ - [ ] System configuration files
1008
+ - [ ] User account information and recent authentication logs
1009
+ - [ ] Application logs (web server, database, application-specific)
1010
+ - [ ] System event logs (syslog, Windows Event Log)
1011
+ - [ ] Security logs (authentication, authorization, audit)
1012
+ - [ ] Network device logs (firewall, router, switch, IDS/IPS)
1013
+ - [ ] SIEM correlation data for the incident timeframe
1014
+ - [ ] Email headers and content (if email-related incident)
1015
+ - [ ] Browser history and artifacts (if relevant)
1016
+ - [ ] Registry hives (Windows) or configuration databases
1017
+
1018
+ #### Evidence Handling
1019
+
1020
+ - [ ] Chain of custody form completed for each evidence item
1021
+ - [ ] All evidence items assigned unique Evidence IDs
1022
+ - [ ] SHA-256 hashes computed and recorded for all digital evidence
1023
+ - [ ] Evidence stored in secure, access-controlled location
1024
+ - [ ] Evidence storage location documented
1025
+ - [ ] Evidence access log initiated
1026
+ - [ ] Physical evidence placed in tamper-evident bags (if applicable)
1027
+ - [ ] Original media secured and isolated (do not analyze originals)
1028
+
1029
+ #### Notes
1030
+
1031
+ ```
1032
+ (Document any anomalies, collection difficulties, or deviations
1033
+ from standard procedures.)
1034
+ _________________________________________________________________
1035
+ _________________________________________________________________
1036
+ _________________________________________________________________
1037
+ _________________________________________________________________
1038
+ ```
1039
+
1040
+ ---
1041
+
1042
+ ### Appendix D: Acronyms and Abbreviations
1043
+
1044
+ | Acronym | Definition |
1045
+ |---------|------------|
1046
+ | AAR | After-Action Review |
1047
+ | AO | Authorizing Official |
1048
+ | ATO | Authorization to Operate |
1049
+ | C2 | Command and Control |
1050
+ | CISA | Cybersecurity and Infrastructure Security Agency |
1051
+ | CSSP | Cybersecurity Service Provider |
1052
+ | CUI | Controlled Unclassified Information |
1053
+ | CTI | Controlled Technical Information |
1054
+ | DC3 | DoD Cyber Crime Center |
1055
+ | DCIS | Defense Criminal Investigative Service |
1056
+ | DFARS | Defense Federal Acquisition Regulation Supplement |
1057
+ | DIB | Defense Industrial Base |
1058
+ | DoDI | DoD Instruction |
1059
+ | EDR | Endpoint Detection and Response |
1060
+ | IC | Incident Commander |
1061
+ | IDS | Intrusion Detection System |
1062
+ | IOC | Indicator of Compromise |
1063
+ | IPS | Intrusion Prevention System |
1064
+ | IRP | Incident Response Plan |
1065
+ | IRT | Incident Response Team |
1066
+ | ISSM | Information System Security Manager |
1067
+ | ISSO | Information System Security Officer |
1068
+ | NIST | National Institute of Standards and Technology |
1069
+ | PCAP | Packet Capture |
1070
+ | POA&M | Plan of Action and Milestones |
1071
+ | SAST | Static Application Security Testing |
1072
+ | SBOM | Software Bill of Materials |
1073
+ | SIEM | Security Information and Event Management |
1074
+ | SOC | Security Operations Center |
1075
+ | SP-CTI | Specified -- Controlled Technical Information |
1076
+ | SSP | System Security Plan |
1077
+ | STIG | Security Technical Implementation Guide |
1078
+ | TLP | Traffic Light Protocol |
1079
+ | TTP | Tactics, Techniques, and Procedures |
1080
+ | US-CERT | United States Computer Emergency Readiness Team |
1081
+
1082
+ ---
1083
+
1084
+ ### Appendix E: Referenced Documents
1085
+
1086
+ | Document | Version/Date | Relevance |
1087
+ |----------|-------------|-----------|
1088
+ | DoD Instruction 8530.01 | March 2016 (w/ changes) | Primary directive for CSSP SOC engagement and cyber incident reporting |
1089
+ | NIST SP 800-61 Rev 2 | August 2012 | Computer Security Incident Handling Guide |
1090
+ | NIST SP 800-53 Rev 5 | September 2020 | Security and Privacy Controls -- IR family |
1091
+ | NIST SP 800-86 | August 2006 | Guide to Integrating Forensic Techniques into IR |
1092
+ | CJCSM 6510.01B | July 2012 | Cyber Incident Handling Program |
1093
+ | DoDI 5200.48 | March 2020 | CUI Program |
1094
+ | DoDI 8500.01 | March 2014 | Cybersecurity |
1095
+ | DFARS 252.204-7012 | October 2016 | Safeguarding Covered Defense Information |
1096
+ | DoD Manual 5200.01 Vol 3 | February 2012 | DoD Information Security Program |
1097
+ | {{system_name}} SSP | Current version | System Security Plan for {{system_name}} |
1098
+ | {{system_name}} POA&M | Current version | Plan of Action and Milestones for {{system_name}} |
1099
+
1100
+ ---
1101
+
1102
+ **Document Classification:** {{classification}}
1103
+
1104
+ **Generated by:** ICDEV Compliance Engine v{{icdev_version}}
1105
+
1106
+ **Generated on:** {{generation_date}}
1107
+
1108
+ ////////////////////////////////////////////////////////////////////
1109
+ CUI // SP-CTI | Department of Defense
1110
+ ////////////////////////////////////////////////////////////////////