icdev 1.0.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- icdev/__init__.py +18 -0
- icdev/_paths.py +85 -0
- icdev/_version.py +3 -0
- icdev/data/__init__.py +1 -0
- icdev/data/args/__init__.py +1 -0
- icdev/data/args/agent_authority.yaml +61 -0
- icdev/data/args/agent_config.yaml +355 -0
- icdev/data/args/agentic_fitness.yaml +31 -0
- icdev/data/args/ai_governance_config.yaml +137 -0
- icdev/data/args/atlas_critique_config.yaml +66 -0
- icdev/data/args/bedrock_models.yaml +63 -0
- icdev/data/args/cicd_config.yaml +82 -0
- icdev/data/args/classification_config.yaml +232 -0
- icdev/data/args/cli_config.yaml +154 -0
- icdev/data/args/cloud_config.yaml +63 -0
- icdev/data/args/code_pattern_config.yaml +151 -0
- icdev/data/args/code_quality_config.yaml +47 -0
- icdev/data/args/companion_registry.yaml +202 -0
- icdev/data/args/context_config.yaml +82 -0
- icdev/data/args/csp_monitor_config.yaml +268 -0
- icdev/data/args/cui_markings.yaml +35 -0
- icdev/data/args/db_config.yaml +40 -0
- icdev/data/args/deployment_profiles.yaml +248 -0
- icdev/data/args/dev_profile_config.yaml +144 -0
- icdev/data/args/devsecops_config.yaml +286 -0
- icdev/data/args/endpoint_security_config.yaml +137 -0
- icdev/data/args/extension_config.yaml +79 -0
- icdev/data/args/file_access_tiers.yaml +88 -0
- icdev/data/args/framework_registry.yaml +415 -0
- icdev/data/args/innovation_config.yaml +431 -0
- icdev/data/args/installation_manifest.yaml +1087 -0
- icdev/data/args/llm_config.yaml +495 -0
- icdev/data/args/maintenance_config.yaml +55 -0
- icdev/data/args/memory_config.yaml +83 -0
- icdev/data/args/monitoring_config.yaml +127 -0
- icdev/data/args/mosa_config.yaml +190 -0
- icdev/data/args/nlq_config.yaml +35 -0
- icdev/data/args/observability_config.yaml +39 -0
- icdev/data/args/observability_tracing_config.yaml +170 -0
- icdev/data/args/oscal_tools_config.yaml +43 -0
- icdev/data/args/owasp_agentic_config.yaml +171 -0
- icdev/data/args/phase_registry.yaml +618 -0
- icdev/data/args/project_defaults.yaml +235 -0
- icdev/data/args/prompt_chains.yaml +163 -0
- icdev/data/args/resilience_config.yaml +50 -0
- icdev/data/args/ricoas_config.yaml +191 -0
- icdev/data/args/role_personas.yaml +362 -0
- icdev/data/args/scaling_config.yaml +176 -0
- icdev/data/args/security_gates.yaml +685 -0
- icdev/data/args/skill_injection_config.yaml +322 -0
- icdev/data/args/spec_config.yaml +53 -0
- icdev/data/args/supply_chain_config.yaml +76 -0
- icdev/data/args/translation_config.yaml +228 -0
- icdev/data/args/workflow_templates/ato_acceleration.yaml +54 -0
- icdev/data/args/workflow_templates/build_deploy.yaml +63 -0
- icdev/data/args/workflow_templates/full_compliance.yaml +43 -0
- icdev/data/args/workflow_templates/security_hardening.yaml +55 -0
- icdev/data/args/worktree_config.yaml +34 -0
- icdev/data/args/zta_config.yaml +247 -0
- icdev/data/context/__init__.py +1 -0
- icdev/data/context/agent/__init__.py +1 -0
- icdev/data/context/agent/response_schemas/__init__.py +1 -0
- icdev/data/context/agent/response_schemas/debate_position.json +46 -0
- icdev/data/context/agent/response_schemas/fitness_scorecard.json +74 -0
- icdev/data/context/agent/response_schemas/review_decision.json +39 -0
- icdev/data/context/agent/response_schemas/task_decomposition.json +82 -0
- icdev/data/context/agent/response_schemas/veto_decision.json +40 -0
- icdev/data/context/agentic/__init__.py +1 -0
- icdev/data/context/agentic/architecture_patterns.md +269 -0
- icdev/data/context/agentic/capability_registry.yaml +202 -0
- icdev/data/context/agentic/csp_mcp_registry.yaml +280 -0
- icdev/data/context/agentic/fitness_rubric.md +56 -0
- icdev/data/context/agentic/governance_baseline.md +205 -0
- icdev/data/context/ci/__init__.py +1 -0
- icdev/data/context/ci/worktree_templates.json +44 -0
- icdev/data/context/cloud/__init__.py +1 -0
- icdev/data/context/cloud/csp_service_registry.json +739 -0
- icdev/data/context/compliance/__init__.py +1 -0
- icdev/data/context/compliance/atlas_mitigations.json +293 -0
- icdev/data/context/compliance/atlas_techniques.json +833 -0
- icdev/data/context/compliance/cisa_sbd_requirements.json +432 -0
- icdev/data/context/compliance/cjis_security_policy.json +522 -0
- icdev/data/context/compliance/cmmc_practices.json +2494 -0
- icdev/data/context/compliance/cmmc_report_template.md +142 -0
- icdev/data/context/compliance/cnssi_1253_overlay.json +109 -0
- icdev/data/context/compliance/control_crosswalk.json +1914 -0
- icdev/data/context/compliance/control_families/__init__.py +1 -0
- icdev/data/context/compliance/csp_certifications.json +251 -0
- icdev/data/context/compliance/cssp_report_template.md +193 -0
- icdev/data/context/compliance/cui_templates/__init__.py +1 -0
- icdev/data/context/compliance/cui_templates/banner_block.txt +4 -0
- icdev/data/context/compliance/cui_templates/code_header.txt +8 -0
- icdev/data/context/compliance/cui_templates/document_template.md +35 -0
- icdev/data/context/compliance/data_type_framework_map.json +321 -0
- icdev/data/context/compliance/data_type_registry.json +147 -0
- icdev/data/context/compliance/dod_cssp_8530.json +463 -0
- icdev/data/context/compliance/eu_ai_act_annex_iii.json +108 -0
- icdev/data/context/compliance/export_templates/__init__.py +1 -0
- icdev/data/context/compliance/export_templates/emass_controls.csv.j2 +4 -0
- icdev/data/context/compliance/export_templates/evidence_package.md.j2 +39 -0
- icdev/data/context/compliance/export_templates/executive_summary.md.j2 +55 -0
- icdev/data/context/compliance/export_templates/poam_tracking.csv.j2 +4 -0
- icdev/data/context/compliance/fedramp_20x_ksi_schemas.json +133 -0
- icdev/data/context/compliance/fedramp_high_baseline.json +4370 -0
- icdev/data/context/compliance/fedramp_moderate_baseline.json +2183 -0
- icdev/data/context/compliance/fedramp_report_template.md +181 -0
- icdev/data/context/compliance/fips_200_areas.json +362 -0
- icdev/data/context/compliance/gao_ai_accountability.json +262 -0
- icdev/data/context/compliance/hipaa_security_rule.json +720 -0
- icdev/data/context/compliance/hitrust_csf_v11.json +930 -0
- icdev/data/context/compliance/impact_level_profiles.json +251 -0
- icdev/data/context/compliance/incident_response_template.md +1110 -0
- icdev/data/context/compliance/iso27001_2022_controls.json +750 -0
- icdev/data/context/compliance/iso27001_nist_bridge.json +382 -0
- icdev/data/context/compliance/iso42001_controls.json +254 -0
- icdev/data/context/compliance/ivv_checklist_template.md +80 -0
- icdev/data/context/compliance/ivv_report_template.md +116 -0
- icdev/data/context/compliance/ivv_requirements.json +372 -0
- icdev/data/context/compliance/mosa_crosswalk.json +327 -0
- icdev/data/context/compliance/mosa_framework.json +250 -0
- icdev/data/context/compliance/narrative_templates/AC.md.j2 +101 -0
- icdev/data/context/compliance/narrative_templates/AU.md.j2 +106 -0
- icdev/data/context/compliance/narrative_templates/IA.md.j2 +104 -0
- icdev/data/context/compliance/narrative_templates/SC.md.j2 +102 -0
- icdev/data/context/compliance/narrative_templates/SI.md.j2 +111 -0
- icdev/data/context/compliance/narrative_templates/__init__.py +1 -0
- icdev/data/context/compliance/narrative_templates/default.md.j2 +50 -0
- icdev/data/context/compliance/narrative_templates/executive_summary.j2 +27 -0
- icdev/data/context/compliance/narrative_templates/poam_milestone.j2 +19 -0
- icdev/data/context/compliance/narrative_templates/ssp_section.j2 +11 -0
- icdev/data/context/compliance/nist_800_171_controls.json +1552 -0
- icdev/data/context/compliance/nist_800_207_crosswalk.json +399 -0
- icdev/data/context/compliance/nist_800_207_zta.json +258 -0
- icdev/data/context/compliance/nist_800_53.json +324 -0
- icdev/data/context/compliance/nist_ai_600_1_genai.json +326 -0
- icdev/data/context/compliance/nist_ai_rmf.json +206 -0
- icdev/data/context/compliance/nist_sp_800_60_types.json +1667 -0
- icdev/data/context/compliance/omb_m25_21_high_impact_ai.json +248 -0
- icdev/data/context/compliance/omb_m26_04_unbiased_ai.json +262 -0
- icdev/data/context/compliance/owasp_agentic_asi.json +133 -0
- icdev/data/context/compliance/owasp_agentic_threats.json +285 -0
- icdev/data/context/compliance/owasp_llm_top10.json +274 -0
- icdev/data/context/compliance/pci_dss_v4.json +510 -0
- icdev/data/context/compliance/poam_template.md +117 -0
- icdev/data/context/compliance/safeai_controls.json +512 -0
- icdev/data/context/compliance/sbd_report_template.md +77 -0
- icdev/data/context/compliance/siem_config_templates/__init__.py +1 -0
- icdev/data/context/compliance/siem_config_templates/filebeat.yml +213 -0
- icdev/data/context/compliance/siem_config_templates/log_sources.json +208 -0
- icdev/data/context/compliance/soc2_trust_criteria.json +661 -0
- icdev/data/context/compliance/ssp_template.md +432 -0
- icdev/data/context/compliance/stig_templates/__init__.py +1 -0
- icdev/data/context/compliance/stig_templates/webapp_stig.json +139 -0
- icdev/data/context/compliance/xai_requirements.json +108 -0
- icdev/data/context/dashboard/__init__.py +1 -0
- icdev/data/context/dashboard/nlq_examples.json +50 -0
- icdev/data/context/dashboard/schema_descriptions.json +23 -0
- icdev/data/context/integration/__init__.py +1 -0
- icdev/data/context/integration/approval_workflows.json +32 -0
- icdev/data/context/integration/gitlab_field_mappings.json +33 -0
- icdev/data/context/integration/jira_field_mappings.json +32 -0
- icdev/data/context/integration/reqif_export_schema.json +23 -0
- icdev/data/context/integration/servicenow_field_mappings.json +22 -0
- icdev/data/context/languages/__init__.py +1 -0
- icdev/data/context/languages/framework_patterns.json +205 -0
- icdev/data/context/languages/language_registry.json +279 -0
- icdev/data/context/llm/__init__.py +1 -0
- icdev/data/context/llm/example_provider.py +86 -0
- icdev/data/context/mbse/__init__.py +1 -0
- icdev/data/context/mbse/des_report_template.md +162 -0
- icdev/data/context/mbse/des_requirements.json +411 -0
- icdev/data/context/mbse/digital_thread_patterns.json +403 -0
- icdev/data/context/mbse/reqif_schema.json +280 -0
- icdev/data/context/mbse/sysml_element_types.json +432 -0
- icdev/data/context/modernization/__init__.py +1 -0
- icdev/data/context/modernization/db_type_mappings.json +148 -0
- icdev/data/context/modernization/decomposition_patterns.json +284 -0
- icdev/data/context/modernization/framework_migration_patterns.json +359 -0
- icdev/data/context/modernization/migration_report_template.md +168 -0
- icdev/data/context/modernization/seven_rs_catalog.json +369 -0
- icdev/data/context/modernization/version_upgrade_rules.json +279 -0
- icdev/data/context/oscal/NIST_SP-800-53_rev5_catalog.json +254987 -0
- icdev/data/context/oscal/README.md +43 -0
- icdev/data/context/patterns/__init__.py +1 -0
- icdev/data/context/profiles/__init__.py +1 -0
- icdev/data/context/profiles/dod_baseline_v1.yaml +145 -0
- icdev/data/context/profiles/fedramp_baseline_v1.yaml +143 -0
- icdev/data/context/profiles/financial_baseline_v1.yaml +142 -0
- icdev/data/context/profiles/healthcare_baseline_v1.yaml +135 -0
- icdev/data/context/profiles/law_enforcement_v1.yaml +129 -0
- icdev/data/context/profiles/startup_v1.yaml +134 -0
- icdev/data/context/requirements/__init__.py +1 -0
- icdev/data/context/requirements/ambiguity_patterns.json +97 -0
- icdev/data/context/requirements/boundary_impact_rules.json +123 -0
- icdev/data/context/requirements/default_constitutions.json +67 -0
- icdev/data/context/requirements/document_extraction_rules.json +58 -0
- icdev/data/context/requirements/gap_patterns.json +108 -0
- icdev/data/context/requirements/readiness_rubric.json +78 -0
- icdev/data/context/requirements/red_alternative_patterns.json +210 -0
- icdev/data/context/requirements/safe_templates.json +72 -0
- icdev/data/context/requirements/spec_quality_checklist.json +122 -0
- icdev/data/context/simulation/__init__.py +1 -0
- icdev/data/context/simulation/architecture_patterns.json +36 -0
- icdev/data/context/simulation/coa_templates.json +38 -0
- icdev/data/context/simulation/cost_models.json +23 -0
- icdev/data/context/simulation/risk_categories.json +46 -0
- icdev/data/context/supply_chain/__init__.py +1 -0
- icdev/data/context/supply_chain/isa_templates.json +129 -0
- icdev/data/context/supply_chain/nist_800_161_controls.json +247 -0
- icdev/data/context/supply_chain/scrm_risk_matrix.json +147 -0
- icdev/data/context/templates/__init__.py +1 -0
- icdev/data/context/templates/ansible/__init__.py +1 -0
- icdev/data/context/templates/ansible/playbooks/__init__.py +1 -0
- icdev/data/context/templates/ansible/roles/__init__.py +1 -0
- icdev/data/context/templates/gitlab_ci/__init__.py +1 -0
- icdev/data/context/templates/grafana/__init__.py +1 -0
- icdev/data/context/templates/kubernetes/__init__.py +1 -0
- icdev/data/context/templates/project/__init__.py +1 -0
- icdev/data/context/templates/project/api/__init__.py +1 -0
- icdev/data/context/templates/project/cli/__init__.py +1 -0
- icdev/data/context/templates/project/data_pipeline/__init__.py +1 -0
- icdev/data/context/templates/project/iac/__init__.py +1 -0
- icdev/data/context/templates/project/javascript_frontend/__init__.py +1 -0
- icdev/data/context/templates/project/javascript_frontend/src/__init__.py +1 -0
- icdev/data/context/templates/project/javascript_frontend/tests/__init__.py +1 -0
- icdev/data/context/templates/project/microservice/__init__.py +1 -0
- icdev/data/context/templates/project/python_backend/__init__.py +1 -0
- icdev/data/context/templates/project/python_backend/src/__init__.py +1 -0
- icdev/data/context/templates/project/python_backend/tests/__init__.py +1 -0
- icdev/data/context/templates/project/python_backend/tests/features/__init__.py +1 -0
- icdev/data/context/templates/project/python_backend/tests/steps/__init__.py +1 -0
- icdev/data/context/templates/terraform/__init__.py +1 -0
- icdev/data/context/templates/terraform/govcloud_base/__init__.py +1 -0
- icdev/data/context/templates/terraform/modules/__init__.py +1 -0
- icdev/data/context/tone/__init__.py +1 -0
- icdev/data/context/translation/dependency_mappings.json +186 -0
- icdev/data/context/translation/type_mappings.json +149 -0
- icdev/data/docs/README.md +187 -0
- icdev/data/docs/__init__.py +1 -0
- icdev/data/docs/admin/gateway-guide.md +338 -0
- icdev/data/docs/admin/marketplace-guide.md +396 -0
- icdev/data/docs/admin/monitoring-guide.md +509 -0
- icdev/data/docs/architecture/compliance-framework.md +764 -0
- icdev/data/docs/architecture/database-schema.md +689 -0
- icdev/data/docs/architecture/gotcha-framework.md +518 -0
- icdev/data/docs/architecture/multi-agent-system.md +603 -0
- icdev/data/docs/dx/README.md +106 -0
- icdev/data/docs/dx/__init__.py +1 -0
- icdev/data/docs/dx/ci-cd-integration.md +378 -0
- icdev/data/docs/dx/claude-code-guide.md +213 -0
- icdev/data/docs/dx/companion-guide.md +232 -0
- icdev/data/docs/dx/dev-profiles.md +309 -0
- icdev/data/docs/dx/icdev-yaml-spec.md +219 -0
- icdev/data/docs/dx/integration-tiers.md +279 -0
- icdev/data/docs/dx/llm-routing-guide.md +456 -0
- icdev/data/docs/dx/quickstart.md +192 -0
- icdev/data/docs/dx/sdk-reference.md +356 -0
- icdev/data/docs/dx/unified-mcp-setup.md +525 -0
- icdev/data/docs/features/__init__.py +1 -0
- icdev/data/docs/features/phase-01-gotcha-framework.md +249 -0
- icdev/data/docs/features/phase-02-atlas-build-workflow.md +223 -0
- icdev/data/docs/features/phase-03-tdd-bdd-testing.md +261 -0
- icdev/data/docs/features/phase-04-nist-compliance.md +255 -0
- icdev/data/docs/features/phase-05-security-scanning.md +229 -0
- icdev/data/docs/features/phase-06-infrastructure-deployment.md +288 -0
- icdev/data/docs/features/phase-07-code-review-gates.md +276 -0
- icdev/data/docs/features/phase-08-self-healing.md +223 -0
- icdev/data/docs/features/phase-09-monitoring-observability.md +230 -0
- icdev/data/docs/features/phase-10-dashboard-web-ui.md +218 -0
- icdev/data/docs/features/phase-11-multi-agent-architecture.md +272 -0
- icdev/data/docs/features/phase-12-integration-testing.md +228 -0
- icdev/data/docs/features/phase-13-cicd-integration.md +257 -0
- icdev/data/docs/features/phase-14-secure-by-design-ivv.md +240 -0
- icdev/data/docs/features/phase-15-maintenance-audit.md +192 -0
- icdev/data/docs/features/phase-16-ato-acceleration.md +228 -0
- icdev/data/docs/features/phase-17-multi-framework-compliance.md +223 -0
- icdev/data/docs/features/phase-18-mbse-integration.md +242 -0
- icdev/data/docs/features/phase-19-agentic-generation.md +202 -0
- icdev/data/docs/features/phase-20-fips-security-categorization.md +198 -0
- icdev/data/docs/features/phase-21-saas-multi-tenancy.md +273 -0
- icdev/data/docs/features/phase-22-federated-gotcha-marketplace.md +242 -0
- icdev/data/docs/features/phase-23-universal-compliance-platform.md +238 -0
- icdev/data/docs/features/phase-24-devsecops-pipeline-security.md +198 -0
- icdev/data/docs/features/phase-25-zero-trust-architecture.md +220 -0
- icdev/data/docs/features/phase-26-dod-mosa.md +205 -0
- icdev/data/docs/features/phase-27-cli-capabilities.md +222 -0
- icdev/data/docs/features/phase-28-remote-command-gateway.md +235 -0
- icdev/data/docs/features/phase-29-proactive-monitoring.md +212 -0
- icdev/data/docs/features/phase-30-dashboard-auth.md +215 -0
- icdev/data/docs/features/phase-31-dashboard-ux-low-impact.md +188 -0
- icdev/data/docs/features/phase-32-dashboard-ux-medium-impact.md +223 -0
- icdev/data/docs/features/phase-33-modular-installation.md +218 -0
- icdev/data/docs/features/phase-34-dev-profiles.md +239 -0
- icdev/data/docs/features/phase-35-innovation-engine.md +257 -0
- icdev/data/docs/features/phase-36-evolutionary-intelligence.md +351 -0
- icdev/data/docs/features/phase-37-mitre-atlas-integration.md +485 -0
- icdev/data/docs/features/phase-38-cloud-agnostic-architecture.md +1033 -0
- icdev/data/docs/features/phase-39-observability-operations.md +178 -0
- icdev/data/docs/features/phase-40-nlq-compliance-queries.md +176 -0
- icdev/data/docs/features/phase-41-parallel-cicd.md +169 -0
- icdev/data/docs/features/phase-42-framework-planning.md +177 -0
- icdev/data/docs/features/phase-43-cross-language-translation.md +225 -0
- icdev/data/docs/features/phase-44-innovation-adaptation.md +227 -0
- icdev/data/docs/features/phase-45-owasp-agentic-security.md +239 -0
- icdev/data/docs/features/phase-46-observability-traceability-xai.md +240 -0
- icdev/data/docs/features/phase-47-unified-mcp-gateway.md +257 -0
- icdev/data/docs/features/phase-48-ai-transparency.md +203 -0
- icdev/data/docs/features/phase-49-ai-accountability.md +243 -0
- icdev/data/docs/features/phase-50-ai-governance-intake-chat.md +195 -0
- icdev/data/docs/features/phase-51-unified-chat-dashboard.md +240 -0
- icdev/data/docs/features/phase-52-code-intelligence.md +244 -0
- icdev/data/docs/features/phase-53-fedramp-20x-owasp-asi.md +359 -0
- icdev/data/docs/features/phase-54-slsa-swft-orchestration.md +379 -0
- icdev/data/docs/features/phase-55-a2a-v03-mcp-oauth.md +322 -0
- icdev/data/docs/features/phase-56-evidence-lineage.md +352 -0
- icdev/data/docs/features/phase-57-eu-ai-act-iron-bank.md +319 -0
- icdev/data/docs/features/phase-58-creative-engine.md +370 -0
- icdev/data/docs/features/phase-59-govcon-intelligence.md +535 -0
- icdev/data/docs/features/phase-60-cpmp.md +528 -0
- icdev/data/docs/features/phase-61-orchestration-improvements.md +534 -0
- icdev/data/docs/operations/dashboard-guide.md +354 -0
- icdev/data/docs/operations/deployment-guide.md +556 -0
- icdev/data/docs/operations/saas-admin-guide.md +439 -0
- icdev/data/docs/operations/security-operations-guide.md +733 -0
- icdev/data/docs/runbooks/backup-restore.md +412 -0
- icdev/data/docs/runbooks/troubleshooting.md +499 -0
- icdev/data/features/__init__.py +1 -0
- icdev/data/features/cicd_integration.feature +41 -0
- icdev/data/features/compliance_gates.feature +46 -0
- icdev/data/features/dashboard.feature +72 -0
- icdev/data/features/environment.py +25 -0
- icdev/data/features/project_management.feature +32 -0
- icdev/data/features/requirements_intake.feature +42 -0
- icdev/data/features/saas_platform.feature +53 -0
- icdev/data/features/security_scanning.feature +36 -0
- icdev/data/features/steps/__init__.py +1 -0
- icdev/data/features/steps/cicd_steps.py +465 -0
- icdev/data/features/steps/compliance_steps.py +308 -0
- icdev/data/features/steps/dashboard_steps.py +88 -0
- icdev/data/features/steps/project_steps.py +126 -0
- icdev/data/features/steps/requirements_intake_steps.py +689 -0
- icdev/data/features/steps/saas_platform_steps.py +572 -0
- icdev/data/features/steps/security_steps.py +236 -0
- icdev/data/features/steps/testing_steps.py +226 -0
- icdev/data/features/testing_pipeline.feature +42 -0
- icdev/data/goals/__init__.py +1 -0
- icdev/data/goals/agent_management.md +144 -0
- icdev/data/goals/agentic_generation.md +345 -0
- icdev/data/goals/agentic_threat_model.md +309 -0
- icdev/data/goals/ai_accountability.md +90 -0
- icdev/data/goals/ai_governance_intake.md +132 -0
- icdev/data/goals/ai_transparency.md +76 -0
- icdev/data/goals/atlas_integration.md +405 -0
- icdev/data/goals/ato_acceleration.md +139 -0
- icdev/data/goals/boundary_supply_chain.md +206 -0
- icdev/data/goals/build_app.md +544 -0
- icdev/data/goals/cicd_integration.md +86 -0
- icdev/data/goals/claude_dir_maintenance.md +77 -0
- icdev/data/goals/cli_capabilities.md +340 -0
- icdev/data/goals/cloud_agnostic.md +312 -0
- icdev/data/goals/code_intelligence.md +197 -0
- icdev/data/goals/code_review.md +94 -0
- icdev/data/goals/compliance_workflow.md +858 -0
- icdev/data/goals/continuous_harmonization.md +140 -0
- icdev/data/goals/cross_language_translation.md +171 -0
- icdev/data/goals/dashboard.md +142 -0
- icdev/data/goals/deploy_workflow.md +390 -0
- icdev/data/goals/devsecops_workflow.md +408 -0
- icdev/data/goals/evolutionary_intelligence.md +305 -0
- icdev/data/goals/external_integration.md +113 -0
- icdev/data/goals/framework_planning.md +63 -0
- icdev/data/goals/init_project.md +235 -0
- icdev/data/goals/innovation_engine.md +199 -0
- icdev/data/goals/integration_testing.md +189 -0
- icdev/data/goals/maintenance_audit.md +196 -0
- icdev/data/goals/manifest.md +56 -0
- icdev/data/goals/mbse_integration.md +504 -0
- icdev/data/goals/modernization_workflow.md +618 -0
- icdev/data/goals/monitoring.md +126 -0
- icdev/data/goals/mosa_workflow.md +463 -0
- icdev/data/goals/multi_agent_orchestration.md +68 -0
- icdev/data/goals/nlq_compliance.md +63 -0
- icdev/data/goals/observability.md +64 -0
- icdev/data/goals/observability_traceability_xai.md +154 -0
- icdev/data/goals/owasp_agentic_security.md +395 -0
- icdev/data/goals/parallel_cicd.md +61 -0
- icdev/data/goals/requirements_intake.md +213 -0
- icdev/data/goals/sbd_ivv_workflow.md +195 -0
- icdev/data/goals/security_categorization.md +133 -0
- icdev/data/goals/security_scan.md +381 -0
- icdev/data/goals/self_healing.md +120 -0
- icdev/data/goals/simulation_engine.md +111 -0
- icdev/data/goals/tdd_workflow.md +403 -0
- icdev/data/goals/zero_trust_architecture.md +403 -0
- icdev/data/hardprompts/__init__.py +1 -0
- icdev/data/hardprompts/agent/__init__.py +1 -0
- icdev/data/hardprompts/agent/agentic_architect.md +100 -0
- icdev/data/hardprompts/agent/debate_prompt.md +32 -0
- icdev/data/hardprompts/agent/fitness_evaluation.md +48 -0
- icdev/data/hardprompts/agent/governance_review.md +214 -0
- icdev/data/hardprompts/agent/reviewer_prompt.md +34 -0
- icdev/data/hardprompts/agent/skill_design.md +172 -0
- icdev/data/hardprompts/agent/task_decomposition.md +275 -0
- icdev/data/hardprompts/agent/veto_check_prompt.md +33 -0
- icdev/data/hardprompts/architect/__init__.py +1 -0
- icdev/data/hardprompts/architect/api_design.md +283 -0
- icdev/data/hardprompts/architect/data_model.md +277 -0
- icdev/data/hardprompts/architect/system_design.md +180 -0
- icdev/data/hardprompts/builder/__init__.py +1 -0
- icdev/data/hardprompts/builder/code_generation.md +59 -0
- icdev/data/hardprompts/builder/refactor.md +58 -0
- icdev/data/hardprompts/builder/scaffold_project.md +69 -0
- icdev/data/hardprompts/builder/test_generation.md +87 -0
- icdev/data/hardprompts/ci/__init__.py +1 -0
- icdev/data/hardprompts/ci/worktree_setup.md +35 -0
- icdev/data/hardprompts/compliance/__init__.py +1 -0
- icdev/data/hardprompts/compliance/cmmc_assessment.md +63 -0
- icdev/data/hardprompts/compliance/cssp_assessment.md +75 -0
- icdev/data/hardprompts/compliance/cui_marking.md +86 -0
- icdev/data/hardprompts/compliance/fedramp_assessment.md +55 -0
- icdev/data/hardprompts/compliance/ivv_assessment.md +96 -0
- icdev/data/hardprompts/compliance/poam_generation.md +57 -0
- icdev/data/hardprompts/compliance/sbd_assessment.md +101 -0
- icdev/data/hardprompts/compliance/security_categorization.md +74 -0
- icdev/data/hardprompts/compliance/ssp_generation.md +56 -0
- icdev/data/hardprompts/compliance/stig_evaluation.md +63 -0
- icdev/data/hardprompts/dashboard/__init__.py +1 -0
- icdev/data/hardprompts/dashboard/nlq_system_prompt.md +26 -0
- icdev/data/hardprompts/infra/__init__.py +1 -0
- icdev/data/hardprompts/infra/k8s_manifests.md +118 -0
- icdev/data/hardprompts/infra/pipeline_generation.md +160 -0
- icdev/data/hardprompts/infra/terraform_generation.md +92 -0
- icdev/data/hardprompts/integration/__init__.py +1 -0
- icdev/data/hardprompts/integration/approval_review.md +17 -0
- icdev/data/hardprompts/integration/jira_mapping.md +25 -0
- icdev/data/hardprompts/integration/servicenow_mapping.md +14 -0
- icdev/data/hardprompts/knowledge/__init__.py +1 -0
- icdev/data/hardprompts/knowledge/pattern_detection.md +73 -0
- icdev/data/hardprompts/knowledge/recommendation_engine.md +90 -0
- icdev/data/hardprompts/knowledge/root_cause_analysis.md +91 -0
- icdev/data/hardprompts/maintenance/__init__.py +1 -0
- icdev/data/hardprompts/maintenance/maintenance_assessment.md +82 -0
- icdev/data/hardprompts/mbse/__init__.py +1 -0
- icdev/data/hardprompts/mbse/digital_thread.md +67 -0
- icdev/data/hardprompts/mbse/model_import.md +62 -0
- icdev/data/hardprompts/mbse/model_to_code.md +65 -0
- icdev/data/hardprompts/modernization/__init__.py +1 -0
- icdev/data/hardprompts/modernization/legacy_analysis.md +93 -0
- icdev/data/hardprompts/modernization/migration_planning.md +150 -0
- icdev/data/hardprompts/modernization/seven_r_assessment.md +107 -0
- icdev/data/hardprompts/requirements/__init__.py +1 -0
- icdev/data/hardprompts/requirements/bdd_generation.md +35 -0
- icdev/data/hardprompts/requirements/clarification_prioritization.md +29 -0
- icdev/data/hardprompts/requirements/decomposition.md +60 -0
- icdev/data/hardprompts/requirements/document_extraction.md +45 -0
- icdev/data/hardprompts/requirements/gap_detection.md +70 -0
- icdev/data/hardprompts/requirements/intake_conversation.md +101 -0
- icdev/data/hardprompts/requirements/readiness_assessment.md +39 -0
- icdev/data/hardprompts/requirements/spec_quality.md +33 -0
- icdev/data/hardprompts/requirements/traceability_analysis.md +23 -0
- icdev/data/hardprompts/security/__init__.py +1 -0
- icdev/data/hardprompts/security/endpoint_security.md +78 -0
- icdev/data/hardprompts/security/threat_model.md +70 -0
- icdev/data/hardprompts/security/vulnerability_assessment.md +81 -0
- icdev/data/hardprompts/simulation/__init__.py +1 -0
- icdev/data/hardprompts/simulation/architecture_impact.md +27 -0
- icdev/data/hardprompts/simulation/coa_alternative.md +27 -0
- icdev/data/hardprompts/simulation/coa_generation.md +25 -0
- icdev/data/hardprompts/simulation/compliance_impact.md +28 -0
- icdev/data/hardprompts/simulation/cost_estimation.md +33 -0
- icdev/data/hardprompts/simulation/risk_assessment.md +28 -0
- icdev/data/hardprompts/translation/code_translation.md +68 -0
- icdev/data/hardprompts/translation/dependency_suggestion.md +44 -0
- icdev/data/hardprompts/translation/test_translation.md +64 -0
- icdev/data/hardprompts/translation/translation_repair.md +59 -0
- icdev/py.typed +0 -0
- icdev/tools/__init__.py +1 -0
- icdev/tools/_gen_formatter.py +12 -0
- icdev/tools/a2a/__init__.py +1 -0
- icdev/tools/a2a/agent_cards/architect.json +43 -0
- icdev/tools/a2a/agent_cards/builder.json +50 -0
- icdev/tools/a2a/agent_cards/compliance.json +57 -0
- icdev/tools/a2a/agent_cards/devsecops.json +71 -0
- icdev/tools/a2a/agent_cards/infra.json +57 -0
- icdev/tools/a2a/agent_cards/integration.json +57 -0
- icdev/tools/a2a/agent_cards/knowledge.json +43 -0
- icdev/tools/a2a/agent_cards/mbse.json +57 -0
- icdev/tools/a2a/agent_cards/modernization.json +50 -0
- icdev/tools/a2a/agent_cards/monitor.json +43 -0
- icdev/tools/a2a/agent_cards/orchestrator.json +36 -0
- icdev/tools/a2a/agent_cards/requirements_analyst.json +64 -0
- icdev/tools/a2a/agent_cards/security.json +50 -0
- icdev/tools/a2a/agent_cards/simulation.json +57 -0
- icdev/tools/a2a/agent_cards/supply_chain.json +50 -0
- icdev/tools/a2a/agent_client.py +349 -0
- icdev/tools/a2a/agent_registry.py +412 -0
- icdev/tools/a2a/agent_server.py +579 -0
- icdev/tools/a2a/task.py +200 -0
- icdev/tools/agent/__init__.py +2 -0
- icdev/tools/agent/a2a_agent_card_generator.py +285 -0
- icdev/tools/agent/a2a_discovery_server.py +250 -0
- icdev/tools/agent/agent_executor.py +529 -0
- icdev/tools/agent/agent_memory.py +557 -0
- icdev/tools/agent/agent_models.py +51 -0
- icdev/tools/agent/atlas_critique.py +908 -0
- icdev/tools/agent/authority.py +443 -0
- icdev/tools/agent/bedrock_client.py +1075 -0
- icdev/tools/agent/collaboration.py +871 -0
- icdev/tools/agent/dispatcher_mode.py +665 -0
- icdev/tools/agent/mailbox.py +575 -0
- icdev/tools/agent/prompt_chain_executor.py +1064 -0
- icdev/tools/agent/session_purpose.py +350 -0
- icdev/tools/agent/skill_router.py +638 -0
- icdev/tools/agent/skill_selector.py +486 -0
- icdev/tools/agent/team_orchestrator.py +1108 -0
- icdev/tools/agent/token_tracker.py +290 -0
- icdev/tools/analysis/__init__.py +1 -0
- icdev/tools/analysis/code_analyzer.py +780 -0
- icdev/tools/analysis/runtime_feedback.py +389 -0
- icdev/tools/audit/__init__.py +1 -0
- icdev/tools/audit/audit_logger.py +196 -0
- icdev/tools/audit/audit_query.py +157 -0
- icdev/tools/audit/decision_recorder.py +72 -0
- icdev/tools/builder/__init__.py +1 -0
- icdev/tools/builder/agentic_fitness.py +534 -0
- icdev/tools/builder/agentic_test_templates/test_a2a_callback.py +117 -0
- icdev/tools/builder/agentic_test_templates/test_a2a_lifecycle.feature +52 -0
- icdev/tools/builder/agentic_test_templates/test_agent_card.feature +37 -0
- icdev/tools/builder/agentic_test_templates/test_agent_health.py +128 -0
- icdev/tools/builder/agentic_test_templates/test_memory_system.feature +50 -0
- icdev/tools/builder/agentic_test_templates/test_skill_execution.feature +40 -0
- icdev/tools/builder/app_blueprint.py +1583 -0
- icdev/tools/builder/child_app_generator.py +2852 -0
- icdev/tools/builder/claude_md_generator.py +1734 -0
- icdev/tools/builder/code_generator.py +3703 -0
- icdev/tools/builder/db_init_generator.py +1709 -0
- icdev/tools/builder/dev_profile_manager.py +954 -0
- icdev/tools/builder/formatter.py +768 -0
- icdev/tools/builder/goal_adapter.py +592 -0
- icdev/tools/builder/gotcha_validator.py +812 -0
- icdev/tools/builder/language_support.py +441 -0
- icdev/tools/builder/linter.py +976 -0
- icdev/tools/builder/profile_detector.py +657 -0
- icdev/tools/builder/profile_md_generator.py +723 -0
- icdev/tools/builder/scaffolder.py +1590 -0
- icdev/tools/builder/scaffolder_extended.py +1771 -0
- icdev/tools/builder/test_writer.py +950 -0
- icdev/tools/ci/__init__.py +2 -0
- icdev/tools/ci/connectors/__init__.py +2 -0
- icdev/tools/ci/connectors/base_connector.py +80 -0
- icdev/tools/ci/connectors/connector_registry.py +188 -0
- icdev/tools/ci/connectors/mattermost_connector.py +159 -0
- icdev/tools/ci/connectors/slack_connector.py +197 -0
- icdev/tools/ci/core/__init__.py +2 -0
- icdev/tools/ci/core/air_gap_detector.py +115 -0
- icdev/tools/ci/core/comment_handler.py +192 -0
- icdev/tools/ci/core/conversation_manager.py +479 -0
- icdev/tools/ci/core/event_envelope.py +500 -0
- icdev/tools/ci/core/event_router.py +443 -0
- icdev/tools/ci/core/failure_parser.py +397 -0
- icdev/tools/ci/core/recovery_engine.py +527 -0
- icdev/tools/ci/modules/__init__.py +2 -0
- icdev/tools/ci/modules/agent.py +271 -0
- icdev/tools/ci/modules/git_ops.py +175 -0
- icdev/tools/ci/modules/state.py +117 -0
- icdev/tools/ci/modules/vcs.py +303 -0
- icdev/tools/ci/modules/workflow_ops.py +295 -0
- icdev/tools/ci/modules/worktree.py +340 -0
- icdev/tools/ci/pipeline_config_generator.py +558 -0
- icdev/tools/ci/triggers/__init__.py +2 -0
- icdev/tools/ci/triggers/gitlab_task_monitor.py +330 -0
- icdev/tools/ci/triggers/poll_trigger.py +237 -0
- icdev/tools/ci/triggers/webhook_server.py +356 -0
- icdev/tools/ci/workflows/__init__.py +2 -0
- icdev/tools/ci/workflows/icdev_build.py +140 -0
- icdev/tools/ci/workflows/icdev_comply.py +284 -0
- icdev/tools/ci/workflows/icdev_document.py +152 -0
- icdev/tools/ci/workflows/icdev_e2e.py +188 -0
- icdev/tools/ci/workflows/icdev_patch.py +186 -0
- icdev/tools/ci/workflows/icdev_plan.py +202 -0
- icdev/tools/ci/workflows/icdev_plan_build.py +41 -0
- icdev/tools/ci/workflows/icdev_plan_build_test.py +46 -0
- icdev/tools/ci/workflows/icdev_plan_build_test_review.py +47 -0
- icdev/tools/ci/workflows/icdev_review.py +126 -0
- icdev/tools/ci/workflows/icdev_sdlc.py +261 -0
- icdev/tools/ci/workflows/icdev_test.py +240 -0
- icdev/tools/cli/__init__.py +1 -0
- icdev/tools/cli/output_formatter.py +756 -0
- icdev/tools/cli_formatter.py +42 -0
- icdev/tools/cloud/__init__.py +11 -0
- icdev/tools/cloud/cloud_mode_manager.py +364 -0
- icdev/tools/cloud/csp_changelog.py +383 -0
- icdev/tools/cloud/csp_health_checker.py +268 -0
- icdev/tools/cloud/csp_monitor.py +951 -0
- icdev/tools/cloud/iam_provider.py +593 -0
- icdev/tools/cloud/kms_provider.py +346 -0
- icdev/tools/cloud/monitoring_provider.py +628 -0
- icdev/tools/cloud/provider_factory.py +376 -0
- icdev/tools/cloud/region_validator.py +345 -0
- icdev/tools/cloud/registry_provider.py +563 -0
- icdev/tools/cloud/secrets_provider.py +486 -0
- icdev/tools/cloud/storage_provider.py +446 -0
- icdev/tools/compat/__init__.py +21 -0
- icdev/tools/compat/cli_harmonizer.py +251 -0
- icdev/tools/compat/datetime_utils.py +18 -0
- icdev/tools/compat/db_utils.py +160 -0
- icdev/tools/compat/platform_utils.py +123 -0
- icdev/tools/compliance/__init__.py +1 -0
- icdev/tools/compliance/accountability_manager.py +397 -0
- icdev/tools/compliance/ai_accountability_audit.py +294 -0
- icdev/tools/compliance/ai_impact_assessor.py +273 -0
- icdev/tools/compliance/ai_incident_response.py +301 -0
- icdev/tools/compliance/ai_inventory_manager.py +239 -0
- icdev/tools/compliance/ai_reassessment_scheduler.py +256 -0
- icdev/tools/compliance/ai_transparency_audit.py +248 -0
- icdev/tools/compliance/atlas_assessor.py +278 -0
- icdev/tools/compliance/atlas_report_generator.py +1211 -0
- icdev/tools/compliance/base_assessor.py +597 -0
- icdev/tools/compliance/cato_monitor.py +1385 -0
- icdev/tools/compliance/cato_scheduler.py +699 -0
- icdev/tools/compliance/cjis_assessor.py +76 -0
- icdev/tools/compliance/classification_manager.py +1353 -0
- icdev/tools/compliance/cmmc_assessor.py +1491 -0
- icdev/tools/compliance/cmmc_report_generator.py +1100 -0
- icdev/tools/compliance/compliance_detector.py +463 -0
- icdev/tools/compliance/compliance_exporter.py +427 -0
- icdev/tools/compliance/compliance_status.py +825 -0
- icdev/tools/compliance/control_mapper.py +505 -0
- icdev/tools/compliance/crosswalk_engine.py +1203 -0
- icdev/tools/compliance/cssp_assessor.py +1045 -0
- icdev/tools/compliance/cssp_evidence_collector.py +729 -0
- icdev/tools/compliance/cssp_report_generator.py +1116 -0
- icdev/tools/compliance/cui_marker.py +388 -0
- icdev/tools/compliance/diagram_validator.py +600 -0
- icdev/tools/compliance/emass/__init__.py +2 -0
- icdev/tools/compliance/emass/emass_client.py +840 -0
- icdev/tools/compliance/emass/emass_export.py +777 -0
- icdev/tools/compliance/emass/emass_sync.py +826 -0
- icdev/tools/compliance/eu_ai_act_classifier.py +194 -0
- icdev/tools/compliance/evidence_collector.py +468 -0
- icdev/tools/compliance/fairness_assessor.py +316 -0
- icdev/tools/compliance/fedramp_assessor.py +1808 -0
- icdev/tools/compliance/fedramp_authorization_packager.py +137 -0
- icdev/tools/compliance/fedramp_ksi_generator.py +355 -0
- icdev/tools/compliance/fedramp_report_generator.py +1128 -0
- icdev/tools/compliance/fips199_categorizer.py +881 -0
- icdev/tools/compliance/fips200_validator.py +315 -0
- icdev/tools/compliance/gao_ai_assessor.py +231 -0
- icdev/tools/compliance/gao_evidence_builder.py +308 -0
- icdev/tools/compliance/hipaa_assessor.py +78 -0
- icdev/tools/compliance/hitrust_assessor.py +49 -0
- icdev/tools/compliance/incident_response_plan.py +718 -0
- icdev/tools/compliance/iso27001_assessor.py +92 -0
- icdev/tools/compliance/iso42001_assessor.py +114 -0
- icdev/tools/compliance/ivv_assessor.py +2327 -0
- icdev/tools/compliance/ivv_report_generator.py +1662 -0
- icdev/tools/compliance/model_card_generator.py +297 -0
- icdev/tools/compliance/mosa_assessor.py +117 -0
- icdev/tools/compliance/multi_regime_assessor.py +451 -0
- icdev/tools/compliance/narrative_generator.py +1013 -0
- icdev/tools/compliance/nist_800_207_assessor.py +191 -0
- icdev/tools/compliance/nist_ai_600_1_assessor.py +188 -0
- icdev/tools/compliance/nist_ai_rmf_assessor.py +110 -0
- icdev/tools/compliance/nist_lookup.py +245 -0
- icdev/tools/compliance/omb_m25_21_assessor.py +228 -0
- icdev/tools/compliance/omb_m26_04_assessor.py +188 -0
- icdev/tools/compliance/oscal_catalog_adapter.py +395 -0
- icdev/tools/compliance/oscal_generator.py +2170 -0
- icdev/tools/compliance/oscal_tools.py +1182 -0
- icdev/tools/compliance/owasp_agentic_assessor.py +226 -0
- icdev/tools/compliance/owasp_asi_assessor.py +200 -0
- icdev/tools/compliance/owasp_llm_assessor.py +244 -0
- icdev/tools/compliance/pci_dss_assessor.py +80 -0
- icdev/tools/compliance/pi_compliance_tracker.py +1461 -0
- icdev/tools/compliance/poam_generator.py +405 -0
- icdev/tools/compliance/resolve_marking.py +283 -0
- icdev/tools/compliance/sbd_assessor.py +2068 -0
- icdev/tools/compliance/sbd_report_generator.py +1236 -0
- icdev/tools/compliance/sbom_generator.py +1008 -0
- icdev/tools/compliance/siem_config_generator.py +674 -0
- icdev/tools/compliance/slsa_attestation_generator.py +490 -0
- icdev/tools/compliance/soc2_assessor.py +77 -0
- icdev/tools/compliance/ssp_generator.py +573 -0
- icdev/tools/compliance/stig_checker.py +727 -0
- icdev/tools/compliance/swft_evidence_bundler.py +337 -0
- icdev/tools/compliance/system_card_generator.py +309 -0
- icdev/tools/compliance/traceability_matrix.py +1281 -0
- icdev/tools/compliance/universal_classification_manager.py +1172 -0
- icdev/tools/compliance/xacta/__init__.py +2 -0
- icdev/tools/compliance/xacta/xacta_client.py +449 -0
- icdev/tools/compliance/xacta/xacta_export.py +557 -0
- icdev/tools/compliance/xacta/xacta_sync.py +333 -0
- icdev/tools/compliance/xai_assessor.py +231 -0
- icdev/tools/dashboard/__init__.py +1 -0
- icdev/tools/dashboard/api/__init__.py +1 -0
- icdev/tools/dashboard/api/_pipeline_state.py +17 -0
- icdev/tools/dashboard/api/activity.py +206 -0
- icdev/tools/dashboard/api/admin.py +176 -0
- icdev/tools/dashboard/api/agents.py +53 -0
- icdev/tools/dashboard/api/ai_accountability.py +163 -0
- icdev/tools/dashboard/api/ai_transparency.py +198 -0
- icdev/tools/dashboard/api/audit.py +58 -0
- icdev/tools/dashboard/api/batch.py +666 -0
- icdev/tools/dashboard/api/chat.py +241 -0
- icdev/tools/dashboard/api/cicd.py +219 -0
- icdev/tools/dashboard/api/code_quality.py +223 -0
- icdev/tools/dashboard/api/compliance.py +171 -0
- icdev/tools/dashboard/api/cpmp.py +915 -0
- icdev/tools/dashboard/api/diagrams.py +65 -0
- icdev/tools/dashboard/api/events.py +250 -0
- icdev/tools/dashboard/api/evidence.py +99 -0
- icdev/tools/dashboard/api/fedramp_20x.py +77 -0
- icdev/tools/dashboard/api/govcon.py +1095 -0
- icdev/tools/dashboard/api/intake.py +1171 -0
- icdev/tools/dashboard/api/lineage.py +163 -0
- icdev/tools/dashboard/api/metrics.py +155 -0
- icdev/tools/dashboard/api/nlq.py +72 -0
- icdev/tools/dashboard/api/orchestration.py +472 -0
- icdev/tools/dashboard/api/oscal.py +183 -0
- icdev/tools/dashboard/api/prod_audit.py +183 -0
- icdev/tools/dashboard/api/projects.py +191 -0
- icdev/tools/dashboard/api/proposals.py +1084 -0
- icdev/tools/dashboard/api/traces.py +363 -0
- icdev/tools/dashboard/api/usage.py +234 -0
- icdev/tools/dashboard/app.py +1986 -0
- icdev/tools/dashboard/auth.py +500 -0
- icdev/tools/dashboard/byok.py +245 -0
- icdev/tools/dashboard/chat_manager.py +675 -0
- icdev/tools/dashboard/config.py +116 -0
- icdev/tools/dashboard/diagram_definitions.py +642 -0
- icdev/tools/dashboard/nlq_processor.py +323 -0
- icdev/tools/dashboard/phase_loader.py +136 -0
- icdev/tools/dashboard/sse_manager.py +89 -0
- icdev/tools/dashboard/state_tracker.py +267 -0
- icdev/tools/dashboard/static/css/style.css +706 -0
- icdev/tools/dashboard/static/css/ux.css +2047 -0
- icdev/tools/dashboard/static/js/activity.js +322 -0
- icdev/tools/dashboard/static/js/api.js +161 -0
- icdev/tools/dashboard/static/js/batch.js +814 -0
- icdev/tools/dashboard/static/js/charts.js +618 -0
- icdev/tools/dashboard/static/js/chat.js +1514 -0
- icdev/tools/dashboard/static/js/kanban.js +113 -0
- icdev/tools/dashboard/static/js/live.js +569 -0
- icdev/tools/dashboard/static/js/mermaid-icdev.js +332 -0
- icdev/tools/dashboard/static/js/proposals.js +588 -0
- icdev/tools/dashboard/static/js/shortcuts.js +544 -0
- icdev/tools/dashboard/static/js/tables.js +652 -0
- icdev/tools/dashboard/static/js/tour.js +524 -0
- icdev/tools/dashboard/static/js/ux.js +942 -0
- icdev/tools/dashboard/templates/404.html +10 -0
- icdev/tools/dashboard/templates/activity.html +80 -0
- icdev/tools/dashboard/templates/admin/users.html +144 -0
- icdev/tools/dashboard/templates/ai_accountability.html +235 -0
- icdev/tools/dashboard/templates/ai_transparency.html +263 -0
- icdev/tools/dashboard/templates/base.html +104 -0
- icdev/tools/dashboard/templates/batch.html +23 -0
- icdev/tools/dashboard/templates/chat.html +332 -0
- icdev/tools/dashboard/templates/children.html +149 -0
- icdev/tools/dashboard/templates/cicd.html +253 -0
- icdev/tools/dashboard/templates/code_quality.html +214 -0
- icdev/tools/dashboard/templates/cpmp/cor_detail.html +220 -0
- icdev/tools/dashboard/templates/cpmp/cor_portal.html +91 -0
- icdev/tools/dashboard/templates/cpmp/deliverable_detail.html +197 -0
- icdev/tools/dashboard/templates/cpmp/detail.html +578 -0
- icdev/tools/dashboard/templates/cpmp/portfolio.html +202 -0
- icdev/tools/dashboard/templates/dev_profiles.html +304 -0
- icdev/tools/dashboard/templates/diagrams.html +224 -0
- icdev/tools/dashboard/templates/events/timeline.html +232 -0
- icdev/tools/dashboard/templates/evidence.html +134 -0
- icdev/tools/dashboard/templates/fedramp_20x.html +207 -0
- icdev/tools/dashboard/templates/gateway.html +244 -0
- icdev/tools/dashboard/templates/govcon/capabilities.html +135 -0
- icdev/tools/dashboard/templates/govcon/pipeline.html +214 -0
- icdev/tools/dashboard/templates/govcon/requirements.html +120 -0
- icdev/tools/dashboard/templates/index.html +254 -0
- icdev/tools/dashboard/templates/lineage.html +141 -0
- icdev/tools/dashboard/templates/login.html +51 -0
- icdev/tools/dashboard/templates/monitoring/overview.html +193 -0
- icdev/tools/dashboard/templates/orchestration/dashboard.html +545 -0
- icdev/tools/dashboard/templates/oscal.html +263 -0
- icdev/tools/dashboard/templates/phases.html +150 -0
- icdev/tools/dashboard/templates/prod_audit.html +280 -0
- icdev/tools/dashboard/templates/profile.html +183 -0
- icdev/tools/dashboard/templates/projects/detail.html +583 -0
- icdev/tools/dashboard/templates/projects/list.html +47 -0
- icdev/tools/dashboard/templates/proposals/detail.html +1253 -0
- icdev/tools/dashboard/templates/proposals/list.html +179 -0
- icdev/tools/dashboard/templates/proposals/section_detail.html +193 -0
- icdev/tools/dashboard/templates/provenance.html +181 -0
- icdev/tools/dashboard/templates/query/nlq.html +234 -0
- icdev/tools/dashboard/templates/quick_paths.html +69 -0
- icdev/tools/dashboard/templates/traces.html +155 -0
- icdev/tools/dashboard/templates/translation_detail.html +199 -0
- icdev/tools/dashboard/templates/translations.html +162 -0
- icdev/tools/dashboard/templates/usage.html +225 -0
- icdev/tools/dashboard/templates/wizard.html +539 -0
- icdev/tools/dashboard/templates/xai.html +208 -0
- icdev/tools/dashboard/ux_helpers.py +962 -0
- icdev/tools/dashboard/websocket.py +81 -0
- icdev/tools/db/__init__.py +1 -0
- icdev/tools/db/backup.py +312 -0
- icdev/tools/db/backup_manager.py +832 -0
- icdev/tools/db/init_icdev_db.py +5900 -0
- icdev/tools/db/migrate.py +178 -0
- icdev/tools/db/migration_runner.py +549 -0
- icdev/tools/db/migrations/001_baseline/meta.json +9 -0
- icdev/tools/db/migrations/001_baseline/up.py +68 -0
- icdev/tools/db/migrations/002_memory_enhancements/down.sql +8 -0
- icdev/tools/db/migrations/002_memory_enhancements/meta.json +9 -0
- icdev/tools/db/migrations/002_memory_enhancements/up.py +118 -0
- icdev/tools/db/migrations/003_dev_profiles/meta.json +8 -0
- icdev/tools/db/migrations/003_dev_profiles/up.py +93 -0
- icdev/tools/db/migrations/004_innovation_engine/down.py +19 -0
- icdev/tools/db/migrations/004_innovation_engine/up.py +227 -0
- icdev/tools/db/migrations/005_phase_37_ai_security/down.py +19 -0
- icdev/tools/db/migrations/005_phase_37_ai_security/up.py +258 -0
- icdev/tools/db/migrations/006_phase_36_evolution/down.py +21 -0
- icdev/tools/db/migrations/006_phase_36_evolution/up.py +323 -0
- icdev/tools/db/migrations/007_phase_38_cloud/down.py +14 -0
- icdev/tools/db/migrations/007_phase_38_cloud/up.py +110 -0
- icdev/tools/db/migrations/008_phase36_37_integration/up.py +55 -0
- icdev/tools/db/migrations/__init__.py +2 -0
- icdev/tools/devsecops/__init__.py +2 -0
- icdev/tools/devsecops/attestation_manager.py +458 -0
- icdev/tools/devsecops/network_segmentation_generator.py +614 -0
- icdev/tools/devsecops/pdp_config_generator.py +1256 -0
- icdev/tools/devsecops/pipeline_security_generator.py +484 -0
- icdev/tools/devsecops/policy_generator.py +653 -0
- icdev/tools/devsecops/profile_manager.py +388 -0
- icdev/tools/devsecops/service_mesh_generator.py +1073 -0
- icdev/tools/devsecops/zta_maturity_scorer.py +368 -0
- icdev/tools/devsecops/zta_terraform_generator.py +1303 -0
- icdev/tools/dx/__init__.py +3 -0
- icdev/tools/dx/companion.py +266 -0
- icdev/tools/dx/instruction_generator.py +753 -0
- icdev/tools/dx/mcp_config_generator.py +282 -0
- icdev/tools/dx/skill_translator.py +425 -0
- icdev/tools/dx/tool_detector.py +144 -0
- icdev/tools/extensions/__init__.py +21 -0
- icdev/tools/extensions/builtins/010_ai_governance_chat.py +277 -0
- icdev/tools/extensions/builtins/__init__.py +2 -0
- icdev/tools/extensions/extension_manager.py +455 -0
- icdev/tools/infra/__init__.py +1 -0
- icdev/tools/infra/ansible_generator.py +869 -0
- icdev/tools/infra/dockerfile_generator.py +361 -0
- icdev/tools/infra/infra_status.py +393 -0
- icdev/tools/infra/ironbank_metadata_generator.py +411 -0
- icdev/tools/infra/k8s_generator.py +1002 -0
- icdev/tools/infra/pipeline_generator.py +832 -0
- icdev/tools/infra/rollback.py +400 -0
- icdev/tools/infra/terraform_generator.py +1142 -0
- icdev/tools/infra/terraform_generator_azure.py +1254 -0
- icdev/tools/infra/terraform_generator_gcp.py +953 -0
- icdev/tools/infra/terraform_generator_ibm.py +360 -0
- icdev/tools/infra/terraform_generator_oci.py +919 -0
- icdev/tools/infra/terraform_generator_onprem.py +319 -0
- icdev/tools/innovation/__init__.py +8 -0
- icdev/tools/innovation/competitive_intel.py +492 -0
- icdev/tools/innovation/innovation_manager.py +681 -0
- icdev/tools/innovation/introspective_analyzer.py +774 -0
- icdev/tools/innovation/register_external_patterns.py +440 -0
- icdev/tools/innovation/signal_ranker.py +1038 -0
- icdev/tools/innovation/solution_generator.py +697 -0
- icdev/tools/innovation/standards_monitor.py +466 -0
- icdev/tools/innovation/trend_detector.py +1046 -0
- icdev/tools/innovation/triage_engine.py +1149 -0
- icdev/tools/innovation/web_scanner.py +894 -0
- icdev/tools/installer/__init__.py +1 -0
- icdev/tools/installer/compliance_configurator.py +637 -0
- icdev/tools/installer/installer.py +1711 -0
- icdev/tools/installer/module_registry.py +805 -0
- icdev/tools/installer/platform_setup.py +961 -0
- icdev/tools/integration/__init__.py +2 -0
- icdev/tools/integration/approval_manager.py +561 -0
- icdev/tools/integration/doors_exporter.py +627 -0
- icdev/tools/integration/gitlab_connector.py +784 -0
- icdev/tools/integration/jira_connector.py +774 -0
- icdev/tools/integration/servicenow_connector.py +693 -0
- icdev/tools/knowledge/__init__.py +1 -0
- icdev/tools/knowledge/knowledge_ingest.py +293 -0
- icdev/tools/knowledge/pattern_detector.py +693 -0
- icdev/tools/knowledge/recommendation_engine.py +461 -0
- icdev/tools/knowledge/self_heal_analyzer.py +504 -0
- icdev/tools/llm/__init__.py +72 -0
- icdev/tools/llm/anthropic_provider.py +170 -0
- icdev/tools/llm/azure_openai_provider.py +338 -0
- icdev/tools/llm/bedrock_provider.py +315 -0
- icdev/tools/llm/embedding_provider.py +438 -0
- icdev/tools/llm/gemini_provider.py +381 -0
- icdev/tools/llm/ibm_watsonx_provider.py +232 -0
- icdev/tools/llm/oci_genai_provider.py +462 -0
- icdev/tools/llm/ollama_provider.py +340 -0
- icdev/tools/llm/openai_provider.py +225 -0
- icdev/tools/llm/provider.py +355 -0
- icdev/tools/llm/provider_sdk.py +175 -0
- icdev/tools/llm/router.py +780 -0
- icdev/tools/llm/vertex_ai_provider.py +374 -0
- icdev/tools/maintenance/__init__.py +2 -0
- icdev/tools/maintenance/dependency_scanner.py +1030 -0
- icdev/tools/maintenance/maintenance_auditor.py +815 -0
- icdev/tools/maintenance/remediation_engine.py +966 -0
- icdev/tools/maintenance/vulnerability_checker.py +987 -0
- icdev/tools/mbse/__init__.py +3 -0
- icdev/tools/mbse/des_assessor.py +1186 -0
- icdev/tools/mbse/des_report_generator.py +800 -0
- icdev/tools/mbse/diagram_extractor.py +811 -0
- icdev/tools/mbse/digital_thread.py +1665 -0
- icdev/tools/mbse/model_code_generator.py +1122 -0
- icdev/tools/mbse/model_control_mapper.py +420 -0
- icdev/tools/mbse/pi_model_tracker.py +1093 -0
- icdev/tools/mbse/reqif_parser.py +1483 -0
- icdev/tools/mbse/sync_engine.py +1805 -0
- icdev/tools/mbse/xmi_parser.py +1573 -0
- icdev/tools/mcp/__init__.py +1 -0
- icdev/tools/mcp/base_server.py +535 -0
- icdev/tools/mcp/builder_server.py +725 -0
- icdev/tools/mcp/compliance_server.py +1407 -0
- icdev/tools/mcp/context_indexer.py +199 -0
- icdev/tools/mcp/context_server.py +305 -0
- icdev/tools/mcp/core_server.py +679 -0
- icdev/tools/mcp/devsecops_server.py +432 -0
- icdev/tools/mcp/gap_handlers.py +1079 -0
- icdev/tools/mcp/gateway_server.py +339 -0
- icdev/tools/mcp/generate_registry.py +623 -0
- icdev/tools/mcp/infra_server.py +264 -0
- icdev/tools/mcp/innovation_server.py +316 -0
- icdev/tools/mcp/integration_server.py +527 -0
- icdev/tools/mcp/knowledge_server.py +429 -0
- icdev/tools/mcp/maintenance_server.py +248 -0
- icdev/tools/mcp/marketplace_server.py +499 -0
- icdev/tools/mcp/mbse_server.py +398 -0
- icdev/tools/mcp/modernization_server.py +496 -0
- icdev/tools/mcp/observability_server.py +354 -0
- icdev/tools/mcp/requirements_server.py +415 -0
- icdev/tools/mcp/simulation_server.py +468 -0
- icdev/tools/mcp/standalone/__init__.py +2 -0
- icdev/tools/mcp/standalone/builder.py +59 -0
- icdev/tools/mcp/standalone/compliance.py +59 -0
- icdev/tools/mcp/standalone/core.py +59 -0
- icdev/tools/mcp/standalone/knowledge.py +59 -0
- icdev/tools/mcp/standalone/maintenance.py +59 -0
- icdev/tools/mcp/supply_chain_server.py +476 -0
- icdev/tools/mcp/tool_registry.py +2008 -0
- icdev/tools/mcp/unified_server.py +158 -0
- icdev/tools/memory/__init__.py +2 -0
- icdev/tools/memory/auto_capture.py +347 -0
- icdev/tools/memory/embed_memory.py +158 -0
- icdev/tools/memory/history_compressor.py +334 -0
- icdev/tools/memory/hybrid_search.py +236 -0
- icdev/tools/memory/maintenance_cron.py +289 -0
- icdev/tools/memory/memory_consolidation.py +444 -0
- icdev/tools/memory/memory_db.py +133 -0
- icdev/tools/memory/memory_read.py +102 -0
- icdev/tools/memory/memory_write.py +222 -0
- icdev/tools/memory/semantic_search.py +139 -0
- icdev/tools/memory/time_decay.py +435 -0
- icdev/tools/modernization/__init__.py +3 -0
- icdev/tools/modernization/architecture_extractor.py +734 -0
- icdev/tools/modernization/compliance_bridge.py +1499 -0
- icdev/tools/modernization/db_migration_planner.py +1385 -0
- icdev/tools/modernization/doc_generator.py +1428 -0
- icdev/tools/modernization/framework_migrator.py +1525 -0
- icdev/tools/modernization/legacy_analyzer.py +1948 -0
- icdev/tools/modernization/migration_code_generator.py +1639 -0
- icdev/tools/modernization/migration_report_generator.py +1653 -0
- icdev/tools/modernization/migration_tracker.py +1726 -0
- icdev/tools/modernization/monolith_decomposer.py +1508 -0
- icdev/tools/modernization/seven_r_assessor.py +1658 -0
- icdev/tools/modernization/strangler_fig_manager.py +1705 -0
- icdev/tools/modernization/ui_analyzer.py +771 -0
- icdev/tools/modernization/version_migrator.py +1392 -0
- icdev/tools/monitor/__init__.py +1 -0
- icdev/tools/monitor/alert_correlator.py +495 -0
- icdev/tools/monitor/auto_resolver.py +612 -0
- icdev/tools/monitor/health_checker.py +509 -0
- icdev/tools/monitor/heartbeat_daemon.py +792 -0
- icdev/tools/monitor/log_analyzer.py +516 -0
- icdev/tools/monitor/metric_collector.py +496 -0
- icdev/tools/mosa/__init__.py +10 -0
- icdev/tools/mosa/icd_generator.py +370 -0
- icdev/tools/mosa/modular_design_analyzer.py +683 -0
- icdev/tools/mosa/mosa_code_enforcer.py +349 -0
- icdev/tools/mosa/tsp_generator.py +265 -0
- icdev/tools/observability/__init__.py +100 -0
- icdev/tools/observability/genai_attributes.py +88 -0
- icdev/tools/observability/instrumentation.py +140 -0
- icdev/tools/observability/mlflow_exporter.py +194 -0
- icdev/tools/observability/otel_tracer.py +168 -0
- icdev/tools/observability/provenance/__init__.py +3 -0
- icdev/tools/observability/provenance/prov_recorder.py +324 -0
- icdev/tools/observability/shap/__init__.py +3 -0
- icdev/tools/observability/shap/agent_shap.py +275 -0
- icdev/tools/observability/sqlite_tracer.py +361 -0
- icdev/tools/observability/trace_context.py +205 -0
- icdev/tools/observability/tracer.py +230 -0
- icdev/tools/orchestration/__init__.py +2 -0
- icdev/tools/orchestration/workflow_composer.py +361 -0
- icdev/tools/project/__init__.py +1 -0
- icdev/tools/project/manifest_loader.py +418 -0
- icdev/tools/project/project_create.py +350 -0
- icdev/tools/project/project_list.py +174 -0
- icdev/tools/project/project_scaffold.py +1715 -0
- icdev/tools/project/project_status.py +479 -0
- icdev/tools/project/session_context_builder.py +757 -0
- icdev/tools/project/validate_manifest.py +55 -0
- icdev/tools/registry/__init__.py +10 -0
- icdev/tools/registry/absorption_engine.py +832 -0
- icdev/tools/registry/capability_evaluator.py +668 -0
- icdev/tools/registry/child_registry.py +617 -0
- icdev/tools/registry/cross_pollinator.py +1065 -0
- icdev/tools/registry/genome_manager.py +671 -0
- icdev/tools/registry/learning_collector.py +912 -0
- icdev/tools/registry/propagation_manager.py +942 -0
- icdev/tools/registry/staging_manager.py +742 -0
- icdev/tools/registry/telemetry_collector.py +423 -0
- icdev/tools/requirements/__init__.py +1 -0
- icdev/tools/requirements/ai_governance_scorer.py +208 -0
- icdev/tools/requirements/boundary_analyzer.py +1293 -0
- icdev/tools/requirements/clarification_engine.py +618 -0
- icdev/tools/requirements/complexity_scorer.py +387 -0
- icdev/tools/requirements/consistency_analyzer.py +803 -0
- icdev/tools/requirements/constitution_manager.py +605 -0
- icdev/tools/requirements/decomposition_engine.py +778 -0
- icdev/tools/requirements/document_extractor.py +1016 -0
- icdev/tools/requirements/elicitation_techniques.py +519 -0
- icdev/tools/requirements/gap_detector.py +271 -0
- icdev/tools/requirements/intake_engine.py +2188 -0
- icdev/tools/requirements/prd_generator.py +847 -0
- icdev/tools/requirements/prd_validator.py +595 -0
- icdev/tools/requirements/readiness_scorer.py +313 -0
- icdev/tools/requirements/spec_organizer.py +1029 -0
- icdev/tools/requirements/spec_quality_checker.py +1097 -0
- icdev/tools/requirements/traceability_builder.py +579 -0
- icdev/tools/resilience/__init__.py +34 -0
- icdev/tools/resilience/circuit_breaker.py +340 -0
- icdev/tools/resilience/correlation.py +150 -0
- icdev/tools/resilience/errors.py +81 -0
- icdev/tools/resilience/retry.py +95 -0
- icdev/tools/schemas/__init__.py +27 -0
- icdev/tools/schemas/chat.py +61 -0
- icdev/tools/schemas/compliance.py +56 -0
- icdev/tools/schemas/core.py +85 -0
- icdev/tools/schemas/innovation.py +37 -0
- icdev/tools/schemas/validation.py +109 -0
- icdev/tools/sdk/__init__.py +3 -0
- icdev/tools/sdk/icdev_client.py +218 -0
- icdev/tools/security/__init__.py +1 -0
- icdev/tools/security/agent_output_validator.py +330 -0
- icdev/tools/security/agent_trust_scorer.py +466 -0
- icdev/tools/security/ai_bom_generator.py +725 -0
- icdev/tools/security/ai_telemetry_logger.py +469 -0
- icdev/tools/security/atlas_red_team.py +543 -0
- icdev/tools/security/code_pattern_scanner.py +378 -0
- icdev/tools/security/confabulation_detector.py +271 -0
- icdev/tools/security/container_scanner.py +491 -0
- icdev/tools/security/dependency_auditor.py +944 -0
- icdev/tools/security/endpoint_security_scanner.py +579 -0
- icdev/tools/security/mcp_tool_authorizer.py +243 -0
- icdev/tools/security/prompt_injection_detector.py +737 -0
- icdev/tools/security/sast_runner.py +948 -0
- icdev/tools/security/secret_detector.py +378 -0
- icdev/tools/security/tool_chain_validator.py +357 -0
- icdev/tools/security/vuln_scanner.py +539 -0
- icdev/tools/simulation/__init__.py +2 -0
- icdev/tools/simulation/coa_generator.py +1552 -0
- icdev/tools/simulation/monte_carlo.py +758 -0
- icdev/tools/simulation/scenario_manager.py +1073 -0
- icdev/tools/simulation/simulation_engine.py +1104 -0
- icdev/tools/supply_chain/__init__.py +2 -0
- icdev/tools/supply_chain/cve_triager.py +705 -0
- icdev/tools/supply_chain/dependency_graph.py +645 -0
- icdev/tools/supply_chain/isa_manager.py +540 -0
- icdev/tools/supply_chain/scrm_assessor.py +546 -0
- icdev/tools/testing/__init__.py +2 -0
- icdev/tools/testing/acceptance_validator.py +411 -0
- icdev/tools/testing/claude_dir_validator.py +831 -0
- icdev/tools/testing/data_types.py +199 -0
- icdev/tools/testing/e2e_runner.py +715 -0
- icdev/tools/testing/fuzz_cli.py +306 -0
- icdev/tools/testing/health_check.py +483 -0
- icdev/tools/testing/platform_check.py +143 -0
- icdev/tools/testing/production_audit.py +1862 -0
- icdev/tools/testing/production_remediate.py +804 -0
- icdev/tools/testing/screenshot_validator.py +539 -0
- icdev/tools/testing/smoke_test.py +283 -0
- icdev/tools/testing/test_agent_models.py +117 -0
- icdev/tools/testing/test_orchestrator.py +957 -0
- icdev/tools/testing/utils.py +229 -0
- icdev/tools/translation/__init__.py +17 -0
- icdev/tools/translation/code_translator.py +550 -0
- icdev/tools/translation/dependency_mapper.py +277 -0
- icdev/tools/translation/feature_map.py +395 -0
- icdev/tools/translation/project_assembler.py +439 -0
- icdev/tools/translation/source_extractor.py +609 -0
- icdev/tools/translation/test_translator.py +333 -0
- icdev/tools/translation/translation_manager.py +582 -0
- icdev/tools/translation/translation_validator.py +662 -0
- icdev/tools/translation/type_checker.py +371 -0
- icdev-1.0.0.dist-info/METADATA +868 -0
- icdev-1.0.0.dist-info/RECORD +1105 -0
- icdev-1.0.0.dist-info/WHEEL +5 -0
- icdev-1.0.0.dist-info/entry_points.txt +9 -0
- icdev-1.0.0.dist-info/licenses/LICENSE +254 -0
- icdev-1.0.0.dist-info/licenses/NOTICE +268 -0
- icdev-1.0.0.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,1110 @@
|
|
|
1
|
+
////////////////////////////////////////////////////////////////////
|
|
2
|
+
CONTROLLED UNCLASSIFIED INFORMATION (CUI) // SP-CTI
|
|
3
|
+
Distribution: Distribution D -- Authorized DoD Personnel Only
|
|
4
|
+
////////////////////////////////////////////////////////////////////
|
|
5
|
+
|
|
6
|
+
# INCIDENT RESPONSE PLAN (IRP)
|
|
7
|
+
## Per DoD Instruction 8530.01 / NIST SP 800-61 Rev 2
|
|
8
|
+
|
|
9
|
+
---
|
|
10
|
+
|
|
11
|
+
## 1. Document Control
|
|
12
|
+
|
|
13
|
+
**System Name:** {{system_name}}
|
|
14
|
+
|
|
15
|
+
**System Identifier:** {{system_id}}
|
|
16
|
+
|
|
17
|
+
**Plan Version:** {{plan_version}}
|
|
18
|
+
|
|
19
|
+
**Classification:** {{classification}}
|
|
20
|
+
|
|
21
|
+
**Date Prepared:** {{plan_date}}
|
|
22
|
+
|
|
23
|
+
**Last Review Date:** {{last_review_date}}
|
|
24
|
+
|
|
25
|
+
**Next Scheduled Review:** {{next_review_date}}
|
|
26
|
+
|
|
27
|
+
**System Owner:** {{system_owner}}
|
|
28
|
+
|
|
29
|
+
**Authorizing Official:** {{ao_name}}
|
|
30
|
+
|
|
31
|
+
**ISSM:** {{issm_name}}
|
|
32
|
+
|
|
33
|
+
**ISSO:** {{isso_name}}
|
|
34
|
+
|
|
35
|
+
### Approval Signatures
|
|
36
|
+
|
|
37
|
+
| Role | Name | Signature | Date |
|
|
38
|
+
|------|------|-----------|------|
|
|
39
|
+
| System Owner | {{system_owner}} | __________________ | ________ |
|
|
40
|
+
| Authorizing Official | {{ao_name}} | __________________ | ________ |
|
|
41
|
+
| ISSM | {{issm_name}} | __________________ | ________ |
|
|
42
|
+
| ISSO | {{isso_name}} | __________________ | ________ |
|
|
43
|
+
|
|
44
|
+
### Revision History
|
|
45
|
+
|
|
46
|
+
{{revision_history}}
|
|
47
|
+
|
|
48
|
+
| Version | Date | Author | Description of Changes |
|
|
49
|
+
|---------|------|--------|------------------------|
|
|
50
|
+
| 1.0 | {{plan_date}} | {{isso_name}} | Initial release |
|
|
51
|
+
|
|
52
|
+
---
|
|
53
|
+
|
|
54
|
+
## 2. Purpose and Scope
|
|
55
|
+
|
|
56
|
+
### 2.1 Purpose
|
|
57
|
+
|
|
58
|
+
This Incident Response Plan (IRP) establishes procedures for detecting, reporting, analyzing, containing, eradicating, and recovering from cybersecurity incidents affecting **{{system_name}}** ({{system_id}}). This plan ensures that incidents are handled in a manner that minimizes damage, reduces recovery time and costs, preserves evidence for potential legal or disciplinary action, and satisfies all applicable DoD reporting requirements.
|
|
59
|
+
|
|
60
|
+
### 2.2 Scope
|
|
61
|
+
|
|
62
|
+
This plan applies to all information systems, networks, and data within the authorization boundary of {{system_name}}.
|
|
63
|
+
|
|
64
|
+
**System Boundary:** {{system_boundary}}
|
|
65
|
+
|
|
66
|
+
**Operating Environment:** {{operating_environment}}
|
|
67
|
+
|
|
68
|
+
**This plan covers:**
|
|
69
|
+
- All hardware, software, and network components within the {{system_name}} authorization boundary
|
|
70
|
+
- All personnel with access to the system, including administrators, developers, end users, and contractors
|
|
71
|
+
- All data processed, stored, or transmitted by the system, including CUI // SP-CTI
|
|
72
|
+
- Interconnected systems where incidents may propagate to or from the {{system_name}} boundary
|
|
73
|
+
- Cloud infrastructure components hosted in the {{operating_environment}}
|
|
74
|
+
|
|
75
|
+
**This plan does not cover:**
|
|
76
|
+
- Physical security incidents not involving information systems (refer to Physical Security Plan)
|
|
77
|
+
- Incidents on systems outside the {{system_name}} authorization boundary unless they directly impact this system
|
|
78
|
+
- Personnel security investigations (refer to Personnel Security Program)
|
|
79
|
+
|
|
80
|
+
### 2.3 Applicable Regulations and Standards
|
|
81
|
+
|
|
82
|
+
| Document | Description | Applicability |
|
|
83
|
+
|----------|-------------|---------------|
|
|
84
|
+
| DoD Instruction 8530.01 | Cybersecurity Activities Support to DoD Information Network Operations | Primary directive for CSSP SOC engagement and reporting timelines |
|
|
85
|
+
| NIST SP 800-61 Rev 2 | Computer Security Incident Handling Guide | Technical framework for incident response lifecycle |
|
|
86
|
+
| NIST SP 800-53 Rev 5 (IR Family) | Incident Response Controls (IR-1 through IR-10) | Control requirements for authorization |
|
|
87
|
+
| CJCSM 6510.01B | Cyber Incident Handling Program | Joint Staff procedures for cyber incident handling |
|
|
88
|
+
| DoD Instruction 5200.48 | CUI Program | Requirements for protecting CUI during and after incidents |
|
|
89
|
+
| DFARS 252.204-7012 | Safeguarding Covered Defense Information | Contractor reporting obligations (72-hour rule) |
|
|
90
|
+
| DoDI 8500.01 | Cybersecurity | Overarching DoD cybersecurity policy |
|
|
91
|
+
| DoD Manual 5200.01 Vol 3 | DoD Information Security Program | Spillage and classified data incident procedures |
|
|
92
|
+
|
|
93
|
+
---
|
|
94
|
+
|
|
95
|
+
## 3. Roles and Responsibilities
|
|
96
|
+
|
|
97
|
+
### 3.1 Incident Commander (IC)
|
|
98
|
+
|
|
99
|
+
**Default Assignment:** {{issm_name}} (ISSM)
|
|
100
|
+
|
|
101
|
+
The Incident Commander has overall authority for managing the incident response. During a declared incident, the IC:
|
|
102
|
+
- Activates the Incident Response Team (IRT) and assigns roles
|
|
103
|
+
- Makes containment, eradication, and recovery decisions
|
|
104
|
+
- Authorizes system isolation, shutdown, or network disconnection
|
|
105
|
+
- Approves external communications and notifications
|
|
106
|
+
- Ensures evidence preservation procedures are followed
|
|
107
|
+
- Coordinates with the Authorizing Official on risk acceptance decisions
|
|
108
|
+
- Declares incident closure and initiates after-action review
|
|
109
|
+
- May delegate IC role to a qualified alternate when unavailable
|
|
110
|
+
|
|
111
|
+
**Escalation:** If the ISSM is unavailable, IC authority passes to the ISSO, then to the Security Engineer.
|
|
112
|
+
|
|
113
|
+
### 3.2 Information System Security Manager (ISSM)
|
|
114
|
+
|
|
115
|
+
**Name:** {{issm_name}}
|
|
116
|
+
|
|
117
|
+
- Serves as default Incident Commander for all incidents
|
|
118
|
+
- Reports incidents to the Authorizing Official ({{ao_name}})
|
|
119
|
+
- Coordinates with CSSP SOC ({{soc_name}}) on incident response activities
|
|
120
|
+
- Ensures all reporting timelines per DoDI 8530.01 are met
|
|
121
|
+
- Manages the Plan of Action and Milestones (POA&M) entries resulting from incidents
|
|
122
|
+
- Ensures lessons learned are documented and incorporated into security posture
|
|
123
|
+
- Validates that containment and eradication actions do not introduce new vulnerabilities
|
|
124
|
+
- Maintains the distribution list for this plan
|
|
125
|
+
|
|
126
|
+
### 3.3 Information System Security Officer (ISSO)
|
|
127
|
+
|
|
128
|
+
**Name:** {{isso_name}}
|
|
129
|
+
|
|
130
|
+
- Performs initial incident triage and severity classification
|
|
131
|
+
- Conducts preliminary technical analysis of suspected incidents
|
|
132
|
+
- Executes containment actions as directed by the Incident Commander
|
|
133
|
+
- Documents all incident response actions in the incident tracking system
|
|
134
|
+
- Collects and preserves initial evidence per chain-of-custody procedures
|
|
135
|
+
- Coordinates with system administrators on technical response actions
|
|
136
|
+
- Updates continuous monitoring data to reflect incident impact
|
|
137
|
+
- Serves as alternate Incident Commander when ISSM is unavailable
|
|
138
|
+
|
|
139
|
+
### 3.4 System Administrator
|
|
140
|
+
|
|
141
|
+
**Name:** {{system_admin}}
|
|
142
|
+
|
|
143
|
+
- Provides technical execution of containment actions (network isolation, account disablement, service shutdown)
|
|
144
|
+
- Performs system restoration from verified backups
|
|
145
|
+
- Implements configuration changes directed by the IRT
|
|
146
|
+
- Provides system logs, access records, and configuration data for analysis
|
|
147
|
+
- Verifies system integrity after eradication and before return to operations
|
|
148
|
+
- Maintains backup integrity and documents restoration procedures used
|
|
149
|
+
- Executes emergency patching and hardening actions as directed
|
|
150
|
+
|
|
151
|
+
### 3.5 Security Engineer
|
|
152
|
+
|
|
153
|
+
**Name:** {{security_engineer}}
|
|
154
|
+
|
|
155
|
+
- Conducts detailed technical analysis of incident indicators and artifacts
|
|
156
|
+
- Performs forensic imaging and analysis per evidence preservation procedures
|
|
157
|
+
- Analyzes malware samples, network captures, and system artifacts
|
|
158
|
+
- Identifies attack vectors, lateral movement, and full scope of compromise
|
|
159
|
+
- Recommends containment strategies and eradication procedures
|
|
160
|
+
- Develops and validates indicators of compromise (IOCs) for detection rule updates
|
|
161
|
+
- Conducts root cause analysis and recommends preventive measures
|
|
162
|
+
- Coordinates with CSSP SOC analysts on technical findings
|
|
163
|
+
|
|
164
|
+
### 3.6 CSSP SOC Liaison
|
|
165
|
+
|
|
166
|
+
**Primary SOC:** {{soc_name}}
|
|
167
|
+
|
|
168
|
+
The CSSP SOC Liaison is the designated point of contact between the {{system_name}} IRT and the supporting Cybersecurity Service Provider Security Operations Center.
|
|
169
|
+
|
|
170
|
+
- Submits incident tickets to CSSP SOC via {{soc_ticket_url}}
|
|
171
|
+
- Relays SOC directives and technical guidance to the IRT
|
|
172
|
+
- Provides requested technical data, logs, and artifacts to the SOC
|
|
173
|
+
- Coordinates SOC-provided capabilities (enhanced monitoring, threat hunting, forensic support)
|
|
174
|
+
- Ensures information sharing complies with classification and need-to-know requirements
|
|
175
|
+
- Tracks SOC ticket status and ensures timely updates
|
|
176
|
+
|
|
177
|
+
**Note:** The ISSO serves as the default CSSP SOC Liaison unless a separate individual is designated.
|
|
178
|
+
|
|
179
|
+
### 3.7 Legal Counsel
|
|
180
|
+
|
|
181
|
+
**Contact:** {{legal_contact}}
|
|
182
|
+
|
|
183
|
+
- Advises on legal implications of incident response actions
|
|
184
|
+
- Determines whether law enforcement notification is required
|
|
185
|
+
- Ensures evidence handling meets legal standards for potential prosecution
|
|
186
|
+
- Advises on privacy and data breach notification requirements
|
|
187
|
+
- Reviews external communications for legal risk
|
|
188
|
+
- Coordinates with DoD Office of General Counsel as needed
|
|
189
|
+
- Advises on contract implications for contractor-reported incidents
|
|
190
|
+
|
|
191
|
+
### 3.8 Communications Lead
|
|
192
|
+
|
|
193
|
+
**Contact:** {{comms_contact}}
|
|
194
|
+
|
|
195
|
+
- Drafts internal and external incident notifications per approved templates
|
|
196
|
+
- Coordinates messaging with the Incident Commander before release
|
|
197
|
+
- Manages stakeholder communications and status updates
|
|
198
|
+
- Ensures communications do not disclose sensitive technical details inappropriately
|
|
199
|
+
- Coordinates with Public Affairs if media interest develops
|
|
200
|
+
- Maintains communication logs as part of the incident record
|
|
201
|
+
|
|
202
|
+
### 3.9 Incident Response Team (IRT) Activation
|
|
203
|
+
|
|
204
|
+
The IRT is activated by the Incident Commander when an event is classified as a confirmed incident at any severity level. The IRT composition scales with severity:
|
|
205
|
+
|
|
206
|
+
| Severity | Minimum IRT Composition |
|
|
207
|
+
|----------|------------------------|
|
|
208
|
+
| Critical | IC, ISSM, ISSO, System Admin, Security Engineer, SOC Liaison, Legal, Comms |
|
|
209
|
+
| High | IC, ISSO, System Admin, Security Engineer, SOC Liaison |
|
|
210
|
+
| Moderate | IC, ISSO, System Admin or Security Engineer |
|
|
211
|
+
| Low | ISSO, System Admin |
|
|
212
|
+
|
|
213
|
+
---
|
|
214
|
+
|
|
215
|
+
## 4. Incident Classification
|
|
216
|
+
|
|
217
|
+
### 4.1 Incident Categories
|
|
218
|
+
|
|
219
|
+
| Category | Code | Description | Examples |
|
|
220
|
+
|----------|------|-------------|----------|
|
|
221
|
+
| Unauthorized Access | CAT-1 | Successful unauthorized logical access to a system, application, or data | Compromised credentials, privilege escalation, unauthorized admin access, session hijacking |
|
|
222
|
+
| Malicious Code | CAT-2 | Installation or execution of malicious software | Ransomware, trojans, rootkits, worms, unauthorized scripts, cryptominers |
|
|
223
|
+
| Data Breach / Exfiltration | CAT-3 | Unauthorized disclosure, removal, or loss of CUI or sensitive data | Data exfiltration, unauthorized file transfer, lost/stolen media, email of CUI to unauthorized recipient |
|
|
224
|
+
| Denial of Service | CAT-4 | Actions that impair the availability of systems or services | DDoS attacks, resource exhaustion, service disruption, intentional system overload |
|
|
225
|
+
| Insider Threat | CAT-5 | Malicious or negligent actions by authorized users | Intentional policy violations, data theft by employees, sabotage, unauthorized system modifications |
|
|
226
|
+
| Supply Chain Compromise | CAT-6 | Compromise introduced through third-party software, hardware, or services | Malicious dependencies, compromised vendor updates, tampered hardware, backdoored libraries |
|
|
227
|
+
| Improper Usage / Misuse | CAT-7 | Violations of acceptable use policies that create security risk | Unauthorized software installation, policy violations, connecting unauthorized devices, shadow IT |
|
|
228
|
+
|
|
229
|
+
### 4.2 Severity Levels
|
|
230
|
+
|
|
231
|
+
| Severity | Level | Definition | Impact Criteria |
|
|
232
|
+
|----------|-------|------------|-----------------|
|
|
233
|
+
| **Critical** | 1 | Incident causing or likely to cause catastrophic damage to national security, DoD operations, or involving widespread compromise of CUI | -- Confirmed exfiltration of CUI // SP-CTI to adversary<br>-- Root-level compromise of production systems<br>-- Active adversary with persistent access<br>-- Ransomware impacting mission-critical operations<br>-- Spillage of classified information onto unclassified systems |
|
|
234
|
+
| **High** | 2 | Incident causing or likely to cause significant damage to operations, data integrity, or involving confirmed unauthorized access to sensitive systems | -- Unauthorized access to systems containing CUI<br>-- Malware execution on production systems<br>-- Compromise of privileged accounts<br>-- Partial data breach affecting CUI<br>-- Insider threat with confirmed malicious activity |
|
|
235
|
+
| **Moderate** | 3 | Incident causing limited damage or that could escalate if not contained promptly | -- Failed but targeted intrusion attempts from known threat actors<br>-- Malware detected and contained before execution<br>-- Non-privileged account compromise<br>-- Policy violations with potential security impact<br>-- Supply chain vulnerability affecting non-production systems |
|
|
236
|
+
| **Low** | 4 | Minor incident with minimal operational impact, or potential incident requiring investigation | -- Isolated acceptable use violations<br>-- Unsuccessful automated attack attempts<br>-- Low-risk vulnerability exploitation attempts blocked by controls<br>-- Non-sensitive data exposure with minimal impact<br>-- Lost device with no confirmed data access |
|
|
237
|
+
|
|
238
|
+
### 4.3 Severity Determination Criteria
|
|
239
|
+
|
|
240
|
+
When classifying incident severity, evaluate the following factors:
|
|
241
|
+
|
|
242
|
+
1. **Data Sensitivity** -- What type of data is affected? CUI // SP-CTI data elevates severity by one level minimum.
|
|
243
|
+
2. **Scope of Compromise** -- How many systems, accounts, or users are affected?
|
|
244
|
+
3. **Adversary Capability** -- Is this an automated scan, opportunistic attack, or targeted advanced threat?
|
|
245
|
+
4. **Mission Impact** -- Does this affect mission-critical operations, availability, or data integrity?
|
|
246
|
+
5. **Containment Status** -- Is the threat actively spreading or has it been contained?
|
|
247
|
+
6. **Recoverability** -- Can affected systems and data be fully restored?
|
|
248
|
+
|
|
249
|
+
**When in doubt, classify at the higher severity level.** Severity can be downgraded as analysis provides clarity, but delayed escalation risks mission impact.
|
|
250
|
+
|
|
251
|
+
---
|
|
252
|
+
|
|
253
|
+
## 5. Reporting Timelines
|
|
254
|
+
|
|
255
|
+
### 5.1 Reporting Requirements Per DoDI 8530.01
|
|
256
|
+
|
|
257
|
+
| Severity | Initial Report Deadline | Report To | Update Frequency |
|
|
258
|
+
|----------|------------------------|-----------|------------------|
|
|
259
|
+
| **Critical** | **1 hour** from detection | CSSP SOC, ISSM, AO, US-CERT, DC3 (if applicable) | Every 2 hours until contained, then every 12 hours |
|
|
260
|
+
| **High** | **24 hours** from detection | CSSP SOC, ISSM, AO | Every 24 hours until resolved |
|
|
261
|
+
| **Moderate** | **72 hours** from detection | CSSP SOC, ISSM | Every 72 hours until resolved |
|
|
262
|
+
| **Low** | **5 business days** from detection | ISSM | Weekly until closed |
|
|
263
|
+
|
|
264
|
+
### 5.2 Notification Matrix
|
|
265
|
+
|
|
266
|
+
#### Critical Severity (1-Hour Reporting)
|
|
267
|
+
|
|
268
|
+
| Step | Action | Responsible | Contact Method | Timeline |
|
|
269
|
+
|------|--------|-------------|----------------|----------|
|
|
270
|
+
| 1 | Classify incident as Critical | ISSO | -- | Immediate |
|
|
271
|
+
| 2 | Notify ISSM / Incident Commander | ISSO | Phone + secure email | Within 15 minutes |
|
|
272
|
+
| 3 | Notify CSSP SOC | ISSO / SOC Liaison | {{soc_phone}} + {{soc_ticket_url}} | Within 30 minutes |
|
|
273
|
+
| 4 | Notify Authorizing Official | ISSM | Phone + secure email | Within 45 minutes |
|
|
274
|
+
| 5 | Notify US-CERT (if required) | ISSM | us-cert.cisa.gov portal | Within 1 hour |
|
|
275
|
+
| 6 | Notify DC3 (if cyber espionage / APT) | ISSM | DC3 portal | Within 1 hour |
|
|
276
|
+
| 7 | Notify Legal Counsel | IC | Phone | Within 1 hour |
|
|
277
|
+
| 8 | Notify Communications Lead | IC | Phone + secure email | Within 1 hour |
|
|
278
|
+
| 9 | Activate full IRT | IC | Phone tree | Within 1 hour |
|
|
279
|
+
|
|
280
|
+
#### High Severity (24-Hour Reporting)
|
|
281
|
+
|
|
282
|
+
| Step | Action | Responsible | Contact Method | Timeline |
|
|
283
|
+
|------|--------|-------------|----------------|----------|
|
|
284
|
+
| 1 | Classify incident as High | ISSO | -- | Immediate |
|
|
285
|
+
| 2 | Notify ISSM / Incident Commander | ISSO | Phone + secure email | Within 2 hours |
|
|
286
|
+
| 3 | Notify CSSP SOC | SOC Liaison | {{soc_ticket_url}} + {{soc_email}} | Within 4 hours |
|
|
287
|
+
| 4 | Notify Authorizing Official | ISSM | Secure email | Within 12 hours |
|
|
288
|
+
| 5 | Activate IRT (scaled composition) | IC | Phone + email | Within 4 hours |
|
|
289
|
+
|
|
290
|
+
#### Moderate Severity (72-Hour Reporting)
|
|
291
|
+
|
|
292
|
+
| Step | Action | Responsible | Contact Method | Timeline |
|
|
293
|
+
|------|--------|-------------|----------------|----------|
|
|
294
|
+
| 1 | Classify incident as Moderate | ISSO | -- | Immediate |
|
|
295
|
+
| 2 | Notify ISSM | ISSO | Secure email | Within 24 hours |
|
|
296
|
+
| 3 | Notify CSSP SOC | SOC Liaison | {{soc_ticket_url}} | Within 48 hours |
|
|
297
|
+
| 4 | Assign IRT members | IC | Email | Within 48 hours |
|
|
298
|
+
|
|
299
|
+
#### Low Severity (5 Business Day Reporting)
|
|
300
|
+
|
|
301
|
+
| Step | Action | Responsible | Contact Method | Timeline |
|
|
302
|
+
|------|--------|-------------|----------------|----------|
|
|
303
|
+
| 1 | Document incident | ISSO | Incident tracking system | Within 24 hours |
|
|
304
|
+
| 2 | Notify ISSM | ISSO | Secure email | Within 3 business days |
|
|
305
|
+
| 3 | Log with CSSP SOC (if required) | SOC Liaison | {{soc_ticket_url}} | Within 5 business days |
|
|
306
|
+
|
|
307
|
+
### 5.3 Contractor Reporting Obligations
|
|
308
|
+
|
|
309
|
+
Per DFARS 252.204-7012, contractors must report cyber incidents affecting covered defense information to DC3 within 72 hours of discovery. This obligation exists in addition to the timelines above and requires:
|
|
310
|
+
- Submission via the DC3 DIBNet portal
|
|
311
|
+
- Preservation of all images, logs, and artifacts for at least 90 days
|
|
312
|
+
- Provision of access to additional information or equipment as required for forensic analysis
|
|
313
|
+
|
|
314
|
+
---
|
|
315
|
+
|
|
316
|
+
## 6. Detection and Analysis
|
|
317
|
+
|
|
318
|
+
### 6.1 Detection Sources
|
|
319
|
+
|
|
320
|
+
| Source | Description | Monitoring Frequency | Responsible |
|
|
321
|
+
|--------|-------------|---------------------|-------------|
|
|
322
|
+
| SIEM Alerts | Correlation rules across log sources, anomaly detection | Continuous (real-time) | SOC / ISSO |
|
|
323
|
+
| IDS/IPS | Network-based and host-based intrusion detection | Continuous (real-time) | Security Engineer |
|
|
324
|
+
| Endpoint Detection and Response (EDR) | Host-level behavioral analysis, process monitoring | Continuous (real-time) | Security Engineer |
|
|
325
|
+
| Vulnerability Scanner | Identification of exploited or exploitable vulnerabilities | Scheduled + on-demand | ISSO |
|
|
326
|
+
| User Reports | Personnel reporting suspicious activity or anomalies | As received | Help Desk / ISSO |
|
|
327
|
+
| CSSP SOC Notifications | Threat intelligence, indicator feeds, directed actions | As received | SOC Liaison |
|
|
328
|
+
| Automated Security Scanning | SAST, dependency audit, secret detection, container scanning | Per CI/CD pipeline and scheduled | Security Engineer |
|
|
329
|
+
| Audit Log Review | Analysis of authentication, authorization, and admin activity logs | Daily review + real-time alerts | ISSO |
|
|
330
|
+
| Threat Intelligence Feeds | STIX/TAXII feeds, DoD threat advisories, CSSP IOC distribution | Continuous ingestion | SOC Liaison |
|
|
331
|
+
| File Integrity Monitoring | Detection of unauthorized changes to critical system files | Continuous (real-time) | System Admin |
|
|
332
|
+
|
|
333
|
+
### 6.2 Initial Analysis Procedures
|
|
334
|
+
|
|
335
|
+
Upon receiving an alert or report of a potential incident, the ISSO (or designated initial responder) shall:
|
|
336
|
+
|
|
337
|
+
**Step 1: Validate the Event**
|
|
338
|
+
- Confirm the alert is not a false positive by correlating with additional data sources
|
|
339
|
+
- Check for known maintenance windows, authorized changes, or testing activities
|
|
340
|
+
- Verify the affected systems are within the {{system_name}} authorization boundary
|
|
341
|
+
|
|
342
|
+
**Step 2: Gather Initial Data**
|
|
343
|
+
- Identify affected systems (hostnames, IP addresses, services)
|
|
344
|
+
- Determine the timeline (when did the activity begin, when was it detected)
|
|
345
|
+
- Collect relevant log entries from SIEM, system logs, network logs, and application logs
|
|
346
|
+
- Identify the user accounts involved (source and target)
|
|
347
|
+
- Document initial findings in the incident tracking system
|
|
348
|
+
|
|
349
|
+
**Step 3: Determine Scope**
|
|
350
|
+
- Identify all systems that may be affected (lateral movement indicators)
|
|
351
|
+
- Determine what data may be at risk (CUI, PII, authentication credentials)
|
|
352
|
+
- Assess whether the incident is ongoing or has concluded
|
|
353
|
+
- Check for related alerts or activity in adjacent timeframes
|
|
354
|
+
|
|
355
|
+
**Step 4: Classify Severity**
|
|
356
|
+
- Apply the severity determination criteria from Section 4.3
|
|
357
|
+
- Assign an incident category from Section 4.1
|
|
358
|
+
- Document the classification rationale
|
|
359
|
+
- Initiate the appropriate notification timeline from Section 5
|
|
360
|
+
|
|
361
|
+
**Step 5: Notify and Escalate**
|
|
362
|
+
- Follow the notification matrix for the assigned severity level
|
|
363
|
+
- Brief the Incident Commander with: what happened, when, what is affected, current status, recommended immediate actions
|
|
364
|
+
- Request IRT activation if needed
|
|
365
|
+
|
|
366
|
+
### 6.3 Analysis Tools and Techniques
|
|
367
|
+
|
|
368
|
+
| Tool/Technique | Purpose | When Used |
|
|
369
|
+
|----------------|---------|-----------|
|
|
370
|
+
| Log correlation (SIEM) | Identify related events across data sources | All incidents |
|
|
371
|
+
| Network packet capture | Analyze network communications, data exfiltration | CAT-1, CAT-2, CAT-3 |
|
|
372
|
+
| Memory forensics | Analyze running processes, detect fileless malware | CAT-1, CAT-2 |
|
|
373
|
+
| Disk forensics | Recover deleted files, analyze file system artifacts | CAT-1, CAT-2, CAT-3, CAT-5 |
|
|
374
|
+
| Malware analysis (static/dynamic) | Determine malware capabilities, C2 infrastructure | CAT-2, CAT-6 |
|
|
375
|
+
| IOC matching | Compare artifacts against known threat indicators | All incidents |
|
|
376
|
+
| Timeline reconstruction | Build comprehensive timeline of attacker activity | Critical and High severity |
|
|
377
|
+
| Behavioral analysis | Identify anomalous user or process behavior | CAT-5, CAT-7 |
|
|
378
|
+
|
|
379
|
+
---
|
|
380
|
+
|
|
381
|
+
## 7. Containment Procedures
|
|
382
|
+
|
|
383
|
+
### 7.1 Containment Strategy Selection
|
|
384
|
+
|
|
385
|
+
The Incident Commander selects the containment strategy based on:
|
|
386
|
+
- The incident category and severity
|
|
387
|
+
- Whether the adversary is actively present on the network
|
|
388
|
+
- The potential for collateral damage from containment actions
|
|
389
|
+
- Mission-critical status of affected systems
|
|
390
|
+
- Evidence preservation requirements
|
|
391
|
+
|
|
392
|
+
**All containment actions must be documented in real-time in the incident tracking system, including the time, action taken, person executing, and authorization.**
|
|
393
|
+
|
|
394
|
+
### 7.2 Short-Term Containment
|
|
395
|
+
|
|
396
|
+
Short-term containment actions are implemented immediately to stop the incident from spreading. These actions prioritize speed over thoroughness and may cause temporary service disruption.
|
|
397
|
+
|
|
398
|
+
| Action | Description | Authorized By | Executed By |
|
|
399
|
+
|--------|-------------|---------------|-------------|
|
|
400
|
+
| Network isolation | Disconnect affected system(s) from the network (VLAN change, firewall block, physical disconnect) | IC | System Admin |
|
|
401
|
+
| Account disablement | Disable compromised user accounts and reset credentials | IC | System Admin |
|
|
402
|
+
| Service shutdown | Stop affected services or applications | IC | System Admin |
|
|
403
|
+
| Firewall rule addition | Block known malicious IPs, domains, or ports at the perimeter | IC | Security Engineer |
|
|
404
|
+
| DNS sinkhole | Redirect malicious domain queries to prevent C2 communication | IC | Security Engineer |
|
|
405
|
+
| Endpoint quarantine | Use EDR to isolate an endpoint while maintaining forensic access | ISSO (Moderate/Low) or IC (High/Critical) | Security Engineer |
|
|
406
|
+
|
|
407
|
+
**Emergency Action Authority:** In situations where the IC is unreachable and delay would result in catastrophic damage (active data exfiltration of CUI, ransomware encryption in progress), the ISSO may authorize network isolation of affected systems and immediately notify the IC afterward.
|
|
408
|
+
|
|
409
|
+
### 7.3 Long-Term Containment
|
|
410
|
+
|
|
411
|
+
Long-term containment is applied after short-term measures are in place and maintains containment while allowing continued investigation and planned recovery.
|
|
412
|
+
|
|
413
|
+
| Action | Description | Authorized By | Executed By |
|
|
414
|
+
|--------|-------------|---------------|-------------|
|
|
415
|
+
| Emergency patching | Apply critical patches to close the exploited vulnerability | IC | System Admin |
|
|
416
|
+
| Credential rotation | Reset passwords and API keys for all potentially exposed accounts | IC | System Admin |
|
|
417
|
+
| Certificate revocation | Revoke and reissue TLS certificates if private keys may be compromised | IC | Security Engineer |
|
|
418
|
+
| Enhanced monitoring | Deploy additional logging, packet capture, or honeypot systems | IC | Security Engineer |
|
|
419
|
+
| Temporary access restrictions | Implement more restrictive ACLs while investigation continues | IC | System Admin |
|
|
420
|
+
| Alternate system deployment | Stand up clean replacement systems for mission-critical functions | IC | System Admin |
|
|
421
|
+
|
|
422
|
+
### 7.4 Evidence Preservation During Containment
|
|
423
|
+
|
|
424
|
+
Before executing any containment action that may alter evidence:
|
|
425
|
+
|
|
426
|
+
1. **Capture volatile data first** -- Running processes, network connections, memory contents, logged-in users
|
|
427
|
+
2. **Create forensic images** -- Full disk images of affected systems before remediation
|
|
428
|
+
3. **Preserve logs** -- Export and hash relevant log files from SIEM, system, application, and network sources
|
|
429
|
+
4. **Document the state** -- Screenshot system state, record active connections, note any anomalies
|
|
430
|
+
5. **Maintain chain of custody** -- Log all evidence collection actions per Section 9
|
|
431
|
+
|
|
432
|
+
---
|
|
433
|
+
|
|
434
|
+
## 8. Eradication and Recovery
|
|
435
|
+
|
|
436
|
+
### 8.1 Eradication Procedures
|
|
437
|
+
|
|
438
|
+
Eradication eliminates the root cause of the incident and all artifacts of the compromise.
|
|
439
|
+
|
|
440
|
+
**Step 1: Identify Root Cause**
|
|
441
|
+
- Determine the initial attack vector (phishing, vulnerability exploitation, insider action, supply chain)
|
|
442
|
+
- Identify all compromised systems, accounts, and data
|
|
443
|
+
- Map the full scope of adversary activity from initial access through current state
|
|
444
|
+
|
|
445
|
+
**Step 2: Remove Threat Artifacts**
|
|
446
|
+
- Delete malicious files, scripts, scheduled tasks, and persistence mechanisms
|
|
447
|
+
- Remove unauthorized accounts, SSH keys, and access tokens
|
|
448
|
+
- Clean or rebuild compromised systems from verified clean images
|
|
449
|
+
- Remove attacker tools and backdoors from all affected systems
|
|
450
|
+
|
|
451
|
+
**Step 3: Close Attack Vector**
|
|
452
|
+
- Patch the vulnerability that was exploited
|
|
453
|
+
- Update firewall rules, IDS/IPS signatures, and detection rules
|
|
454
|
+
- Implement additional controls to prevent recurrence
|
|
455
|
+
- Update STIG compliance baseline if configuration changes are required
|
|
456
|
+
|
|
457
|
+
**Step 4: Verify Eradication**
|
|
458
|
+
- Scan all affected systems with updated signatures
|
|
459
|
+
- Review logs for any continued adversary activity
|
|
460
|
+
- Validate that all IOCs associated with the incident are no longer present
|
|
461
|
+
- Conduct targeted vulnerability assessment of affected systems
|
|
462
|
+
|
|
463
|
+
### 8.2 Recovery Procedures
|
|
464
|
+
|
|
465
|
+
**Step 1: System Restoration**
|
|
466
|
+
- Restore from verified clean backups (validate backup integrity via checksums before restoration)
|
|
467
|
+
- Rebuild systems from approved baselines if backups may be compromised
|
|
468
|
+
- Apply all current patches and STIG hardening before reconnecting to the network
|
|
469
|
+
- Restore data from verified clean sources
|
|
470
|
+
|
|
471
|
+
**Step 2: Validation and Testing**
|
|
472
|
+
- Verify system functionality meets operational requirements
|
|
473
|
+
- Confirm all security controls are operational (authentication, authorization, logging, encryption)
|
|
474
|
+
- Run vulnerability scans and STIG compliance checks against restored systems
|
|
475
|
+
- Validate data integrity of restored information
|
|
476
|
+
- Test interconnections with dependent systems
|
|
477
|
+
|
|
478
|
+
**Step 3: Enhanced Monitoring**
|
|
479
|
+
- Implement increased monitoring on recovered systems for a minimum of 30 days
|
|
480
|
+
- Deploy additional detection rules based on incident IOCs
|
|
481
|
+
- Conduct daily log reviews for recovered systems during the monitoring period
|
|
482
|
+
- Set lower alert thresholds for activity related to the incident category
|
|
483
|
+
|
|
484
|
+
### 8.3 Return-to-Operations Criteria
|
|
485
|
+
|
|
486
|
+
Systems may be returned to normal operations only when ALL of the following criteria are met:
|
|
487
|
+
|
|
488
|
+
- [ ] Root cause has been identified and eliminated
|
|
489
|
+
- [ ] All compromised systems have been rebuilt or verified clean
|
|
490
|
+
- [ ] All exploited vulnerabilities have been patched
|
|
491
|
+
- [ ] STIG compliance has been verified on all affected systems
|
|
492
|
+
- [ ] Vulnerability scan shows no critical or high findings on affected systems
|
|
493
|
+
- [ ] All compromised credentials have been rotated
|
|
494
|
+
- [ ] Enhanced monitoring is in place and functioning
|
|
495
|
+
- [ ] Incident Commander has authorized return to operations
|
|
496
|
+
- [ ] CSSP SOC has been notified of planned return to operations
|
|
497
|
+
- [ ] ISSM has updated the POA&M with any residual risks
|
|
498
|
+
- [ ] AO has accepted any residual risk (if applicable)
|
|
499
|
+
|
|
500
|
+
**Authorization:** The Incident Commander authorizes return to operations. For Critical severity incidents, the Authorizing Official ({{ao_name}}) must also concur.
|
|
501
|
+
|
|
502
|
+
---
|
|
503
|
+
|
|
504
|
+
## 9. Evidence Preservation
|
|
505
|
+
|
|
506
|
+
### 9.1 Chain of Custody
|
|
507
|
+
|
|
508
|
+
All evidence collected during incident response must maintain a documented chain of custody. Each piece of evidence must be tracked from collection through final disposition.
|
|
509
|
+
|
|
510
|
+
**Chain of Custody Record (per item):**
|
|
511
|
+
|
|
512
|
+
| Field | Description |
|
|
513
|
+
|-------|-------------|
|
|
514
|
+
| Evidence ID | Unique identifier (format: {{system_id}}-INC-YYYYMMDD-NNN-E##) |
|
|
515
|
+
| Description | What the evidence is (disk image, log file, memory dump, etc.) |
|
|
516
|
+
| Source System | Hostname, IP, and system identifier of the source |
|
|
517
|
+
| Date/Time Collected | Timestamp of collection (UTC) |
|
|
518
|
+
| Collected By | Name and role of the person who collected the evidence |
|
|
519
|
+
| Hash (SHA-256) | Cryptographic hash computed at time of collection |
|
|
520
|
+
| Storage Location | Where the evidence is stored (physical and/or logical) |
|
|
521
|
+
| Access Log | Every person who has accessed the evidence, with timestamps |
|
|
522
|
+
|
|
523
|
+
**Chain of custody forms must be completed at the time of collection, not after the fact.**
|
|
524
|
+
|
|
525
|
+
### 9.2 Forensic Imaging Procedures
|
|
526
|
+
|
|
527
|
+
1. **Preparation** -- Verify that forensic tools are ready and write-blockers are functioning
|
|
528
|
+
2. **Documentation** -- Photograph the system, record serial numbers, document current state
|
|
529
|
+
3. **Volatile Data Collection** -- Capture memory, running processes, network connections, and open files before powering down
|
|
530
|
+
4. **Disk Imaging** -- Create a bit-for-bit forensic image using a write-blocker; create two copies minimum
|
|
531
|
+
5. **Hash Verification** -- Compute SHA-256 hashes of both the original media and each image; document and compare
|
|
532
|
+
6. **Secure Storage** -- Store forensic images in a secure, access-controlled location (encrypted storage recommended)
|
|
533
|
+
7. **Original Media** -- Secure the original media in a tamper-evident bag if physical seizure is warranted
|
|
534
|
+
|
|
535
|
+
### 9.3 Log Preservation
|
|
536
|
+
|
|
537
|
+
The following logs must be preserved for all incidents at Moderate severity and above:
|
|
538
|
+
|
|
539
|
+
| Log Source | Retention Period | Format | Storage |
|
|
540
|
+
|------------|-----------------|--------|---------|
|
|
541
|
+
| SIEM correlation logs | 1 year minimum | Raw + parsed | Secure log archive |
|
|
542
|
+
| System authentication logs | 1 year minimum | Syslog / Windows Event | Secure log archive |
|
|
543
|
+
| Network flow data | 90 days minimum | NetFlow / PCAP | Secure network storage |
|
|
544
|
+
| Application logs | 1 year minimum | Application-specific | Secure log archive |
|
|
545
|
+
| Firewall / IDS/IPS logs | 90 days minimum | Vendor format | Secure log archive |
|
|
546
|
+
| DNS query logs | 90 days minimum | DNS log format | Secure log archive |
|
|
547
|
+
| Email logs (if applicable) | 90 days minimum | MTA logs | Secure log archive |
|
|
548
|
+
| Audit trail (ICDEV) | Immutable / permanent | SQLite / JSON | data/icdev.db (append-only) |
|
|
549
|
+
|
|
550
|
+
**Note:** Per DFARS 252.204-7012, contractors must preserve images and logs for a minimum of 90 days following a reported cyber incident.
|
|
551
|
+
|
|
552
|
+
### 9.4 Evidence Storage Requirements
|
|
553
|
+
|
|
554
|
+
- All digital evidence must be stored on encrypted media
|
|
555
|
+
- Physical evidence must be stored in a locked container within a controlled-access area
|
|
556
|
+
- Evidence storage areas must have access logging
|
|
557
|
+
- Evidence integrity must be verified (hash comparison) at regular intervals and upon each access
|
|
558
|
+
- Evidence disposition must follow organizational records retention policies and legal hold requirements
|
|
559
|
+
- Evidence must not be stored on systems within the incident boundary
|
|
560
|
+
|
|
561
|
+
---
|
|
562
|
+
|
|
563
|
+
## 10. Communication Plan
|
|
564
|
+
|
|
565
|
+
### 10.1 Internal Notification Matrix
|
|
566
|
+
|
|
567
|
+
| Audience | Critical | High | Moderate | Low | Method |
|
|
568
|
+
|----------|----------|------|----------|-----|--------|
|
|
569
|
+
| Incident Commander | Immediate | 2 hours | 24 hours | 3 business days | Phone + email |
|
|
570
|
+
| Authorizing Official ({{ao_name}}) | 45 minutes | 12 hours | As needed | Monthly report | Phone + email |
|
|
571
|
+
| System Owner ({{system_owner}}) | 1 hour | 12 hours | 72 hours | Monthly report | Phone + email |
|
|
572
|
+
| ISSM ({{issm_name}}) | 15 minutes | 2 hours | 24 hours | 3 business days | Phone + email |
|
|
573
|
+
| ISSO ({{isso_name}}) | Immediate | Immediate | 4 hours | 24 hours | Phone + email |
|
|
574
|
+
| System Admin ({{system_admin}}) | Immediate | 1 hour | 24 hours | As needed | Phone + email |
|
|
575
|
+
| Security Engineer ({{security_engineer}}) | 30 minutes | 2 hours | 24 hours | As needed | Phone + email |
|
|
576
|
+
| Legal Counsel ({{legal_contact}}) | 1 hour | 24 hours | As needed | N/A | Phone + email |
|
|
577
|
+
| Communications ({{comms_contact}}) | 1 hour | 24 hours | As needed | N/A | Phone + email |
|
|
578
|
+
| End Users (if impacted) | 4 hours | 24 hours | As needed | N/A | Email |
|
|
579
|
+
|
|
580
|
+
### 10.2 External Notification Requirements
|
|
581
|
+
|
|
582
|
+
| Organization | When Required | Method | Timeline | Contact |
|
|
583
|
+
|-------------|---------------|--------|----------|---------|
|
|
584
|
+
| CSSP SOC ({{soc_name}}) | All confirmed incidents High and above; Moderate at ISSM discretion | Phone: {{soc_phone}}, Email: {{soc_email}}, Ticket: {{soc_ticket_url}} | Per Section 5.1 | SOC Liaison |
|
|
585
|
+
| US-CERT / CISA | Critical incidents; incidents affecting federal networks | us-cert.cisa.gov reporting portal | Within 1 hour (Critical) | ISSM |
|
|
586
|
+
| DC3 (Defense Cyber Crime Center) | Cyber espionage, APT activity, contractor incidents per DFARS | DIBNet portal | Within 72 hours (DFARS); Within 1 hour (Critical APT) | ISSM |
|
|
587
|
+
| Law Enforcement (DCIS, FBI, OSI) | Criminal activity, insider threat with criminal elements | Phone, coordinated through Legal | As directed by Legal Counsel | ISSM + Legal |
|
|
588
|
+
| Authorizing Official chain | All incidents affecting ATO status | Secure email + phone | Per Section 5.1 | ISSM |
|
|
589
|
+
| Interconnected system owners | Incidents that may propagate to connected systems | Secure email + phone | Within 4 hours of confirmation | ISSO |
|
|
590
|
+
|
|
591
|
+
### 10.3 Communication Templates
|
|
592
|
+
|
|
593
|
+
#### Initial Incident Notification (Internal)
|
|
594
|
+
|
|
595
|
+
```
|
|
596
|
+
SUBJECT: [SEVERITY] Cybersecurity Incident -- {{system_name}} -- [INC-YYYYMMDD-NNN]
|
|
597
|
+
|
|
598
|
+
CLASSIFICATION: CUI // SP-CTI
|
|
599
|
+
|
|
600
|
+
INCIDENT SUMMARY:
|
|
601
|
+
- Incident ID: [INC-YYYYMMDD-NNN]
|
|
602
|
+
- Date/Time Detected: [YYYY-MM-DD HH:MM UTC]
|
|
603
|
+
- Severity: [Critical/High/Moderate/Low]
|
|
604
|
+
- Category: [CAT-1 through CAT-7]
|
|
605
|
+
- Affected Systems: [List hostnames/IPs]
|
|
606
|
+
- Brief Description: [1-2 sentence summary]
|
|
607
|
+
- Current Status: [Investigating/Containing/Eradicating/Recovering]
|
|
608
|
+
- Incident Commander: [Name]
|
|
609
|
+
|
|
610
|
+
IMMEDIATE ACTIONS TAKEN:
|
|
611
|
+
- [List actions taken so far]
|
|
612
|
+
|
|
613
|
+
NEXT STEPS:
|
|
614
|
+
- [List planned actions]
|
|
615
|
+
|
|
616
|
+
CONTACT: [ISSO name and phone]
|
|
617
|
+
|
|
618
|
+
This notification is CUI // SP-CTI. Handle and distribute accordingly.
|
|
619
|
+
```
|
|
620
|
+
|
|
621
|
+
#### CSSP SOC Incident Report
|
|
622
|
+
|
|
623
|
+
```
|
|
624
|
+
SUBJECT: Incident Report -- {{system_name}} ({{system_id}}) -- [INC-YYYYMMDD-NNN]
|
|
625
|
+
|
|
626
|
+
CLASSIFICATION: CUI // SP-CTI
|
|
627
|
+
|
|
628
|
+
1. REPORTING ORGANIZATION: [Organization name]
|
|
629
|
+
2. SYSTEM: {{system_name}} ({{system_id}})
|
|
630
|
+
3. DATE/TIME DETECTED: [YYYY-MM-DD HH:MM UTC]
|
|
631
|
+
4. DATE/TIME OF INCIDENT: [YYYY-MM-DD HH:MM UTC] (if different from detection)
|
|
632
|
+
5. INCIDENT CATEGORY: [CAT-1 through CAT-7]
|
|
633
|
+
6. SEVERITY: [Critical/High/Moderate/Low]
|
|
634
|
+
7. AFFECTED SYSTEMS: [Hostnames, IPs, OS, function]
|
|
635
|
+
8. DESCRIPTION: [Detailed description of incident]
|
|
636
|
+
9. INDICATORS OF COMPROMISE: [IPs, domains, hashes, file names, etc.]
|
|
637
|
+
10. IMPACT: [Operational impact, data at risk]
|
|
638
|
+
11. ACTIONS TAKEN: [Containment and response actions]
|
|
639
|
+
12. ASSISTANCE REQUESTED: [Specific SOC support needed]
|
|
640
|
+
13. POC: [Name, phone, email]
|
|
641
|
+
14. NEXT UPDATE: [Date/time of next scheduled update]
|
|
642
|
+
```
|
|
643
|
+
|
|
644
|
+
#### Status Update Template
|
|
645
|
+
|
|
646
|
+
```
|
|
647
|
+
SUBJECT: UPDATE [#N] -- [SEVERITY] Incident -- {{system_name}} -- [INC-YYYYMMDD-NNN]
|
|
648
|
+
|
|
649
|
+
CLASSIFICATION: CUI // SP-CTI
|
|
650
|
+
|
|
651
|
+
UPDATE SUMMARY:
|
|
652
|
+
- Incident ID: [INC-YYYYMMDD-NNN]
|
|
653
|
+
- Update Number: [N]
|
|
654
|
+
- Current Severity: [Unchanged/Upgraded/Downgraded] -- [Level]
|
|
655
|
+
- Current Status: [Investigating/Containing/Eradicating/Recovering/Closed]
|
|
656
|
+
|
|
657
|
+
ACTIONS SINCE LAST UPDATE:
|
|
658
|
+
- [Bulleted list of actions taken]
|
|
659
|
+
|
|
660
|
+
FINDINGS:
|
|
661
|
+
- [New findings, analysis results, scope changes]
|
|
662
|
+
|
|
663
|
+
CURRENT CONTAINMENT STATUS:
|
|
664
|
+
- [Description of containment posture]
|
|
665
|
+
|
|
666
|
+
NEXT STEPS:
|
|
667
|
+
- [Planned actions with estimated timelines]
|
|
668
|
+
|
|
669
|
+
NEXT UPDATE: [Date/time]
|
|
670
|
+
|
|
671
|
+
CONTACT: [Name and phone]
|
|
672
|
+
```
|
|
673
|
+
|
|
674
|
+
---
|
|
675
|
+
|
|
676
|
+
## 11. Escalation Matrix
|
|
677
|
+
|
|
678
|
+
| Severity | Initial Response | Reporting Deadline | Incident Commander | CSSP SOC Engagement | AO Notification | Briefing Cadence |
|
|
679
|
+
|----------|-----------------|--------------------|--------------------|---------------------|-----------------|------------------|
|
|
680
|
+
| **Critical** | Immediate IRT activation | 1 hour | ISSM ({{issm_name}}) | Full engagement: real-time coordination, SOC analyst support, threat hunting | Within 45 minutes | Every 2 hours until contained |
|
|
681
|
+
| **High** | IRT activation within 4 hours | 24 hours | ISSM ({{issm_name}}) | Active engagement: ticket submission, log sharing, IOC exchange | Within 12 hours | Every 24 hours |
|
|
682
|
+
| **Moderate** | Assigned responder within 24 hours | 72 hours | ISSO ({{isso_name}}) | Standard: ticket submission, periodic updates | As needed | Every 72 hours |
|
|
683
|
+
| **Low** | Normal business hours response | 5 business days | ISSO ({{isso_name}}) | Minimal: documented in tracking system | Monthly reporting | Weekly until closed |
|
|
684
|
+
|
|
685
|
+
### Escalation Triggers
|
|
686
|
+
|
|
687
|
+
An incident must be escalated to the next higher severity level when any of the following occur:
|
|
688
|
+
|
|
689
|
+
- The scope of compromise expands beyond initial assessment
|
|
690
|
+
- CUI data is confirmed to have been exfiltrated
|
|
691
|
+
- Additional systems are found to be compromised
|
|
692
|
+
- The adversary demonstrates advanced capabilities (zero-day exploitation, custom tooling)
|
|
693
|
+
- Containment actions are ineffective after initial implementation
|
|
694
|
+
- The incident generates media or Congressional interest
|
|
695
|
+
- Law enforcement requests involvement
|
|
696
|
+
- The incident affects interconnected systems outside the {{system_name}} boundary
|
|
697
|
+
|
|
698
|
+
---
|
|
699
|
+
|
|
700
|
+
## 12. CSSP SOC Integration
|
|
701
|
+
|
|
702
|
+
### 12.1 SOC Contact Information
|
|
703
|
+
|
|
704
|
+
| Item | Detail |
|
|
705
|
+
|------|--------|
|
|
706
|
+
| SOC Name | {{soc_name}} |
|
|
707
|
+
| Primary Phone | {{soc_phone}} |
|
|
708
|
+
| Email | {{soc_email}} |
|
|
709
|
+
| Ticket Submission Portal | {{soc_ticket_url}} |
|
|
710
|
+
| Hours of Operation | 24/7/365 (for Critical/High); Business hours for Moderate/Low |
|
|
711
|
+
| Secure Communication Channel | Per SOC-provided secure communication procedures |
|
|
712
|
+
|
|
713
|
+
### 12.2 Ticket Submission Process
|
|
714
|
+
|
|
715
|
+
1. **Create ticket** via {{soc_ticket_url}} with incident category, severity, and initial details
|
|
716
|
+
2. **Receive ticket number** -- Reference this number in all subsequent communications
|
|
717
|
+
3. **Upload supporting data** -- Logs, IOCs, forensic artifacts as requested by SOC
|
|
718
|
+
4. **Respond to SOC queries** within the timeframe specified by the SOC based on severity
|
|
719
|
+
5. **Update ticket** with new findings, status changes, and actions taken
|
|
720
|
+
6. **Close ticket** only when the SOC confirms closure criteria are met
|
|
721
|
+
|
|
722
|
+
### 12.3 SOC Capabilities Available
|
|
723
|
+
|
|
724
|
+
The CSSP SOC provides the following capabilities that may be requested during incident response:
|
|
725
|
+
|
|
726
|
+
| Capability | Description | Request Method |
|
|
727
|
+
|------------|-------------|----------------|
|
|
728
|
+
| Threat Hunting | Proactive search for adversary activity based on IOCs | SOC ticket |
|
|
729
|
+
| Forensic Support | Advanced forensic analysis beyond local capability | SOC ticket + phone |
|
|
730
|
+
| Malware Analysis | Static and dynamic analysis of malware samples | SOC ticket with sample submission |
|
|
731
|
+
| Threat Intelligence | Contextual information on threat actors, TTPs, campaigns | SOC ticket or email |
|
|
732
|
+
| Enhanced Monitoring | Temporary increased monitoring of specific assets or traffic | SOC ticket |
|
|
733
|
+
| Network Analysis | Deep packet inspection, traffic analysis, anomaly detection | SOC ticket |
|
|
734
|
+
| Indicator Sharing | Distribution of IOCs to detection systems across the enterprise | Automatic per SOC procedures |
|
|
735
|
+
| Incident Coordination | Multi-system incident coordination across organizational boundaries | SOC ticket + phone |
|
|
736
|
+
|
|
737
|
+
### 12.4 Information Sharing Procedures
|
|
738
|
+
|
|
739
|
+
- All information shared with the CSSP SOC must be marked with appropriate CUI markings
|
|
740
|
+
- Share IOCs, logs, and artifacts via SOC-approved secure transfer mechanisms only
|
|
741
|
+
- Classify information shared based on the sensitivity of the underlying data
|
|
742
|
+
- Do not share classified information through CUI channels -- escalate to appropriate security authority
|
|
743
|
+
- Request SOC confirmation of receipt for all evidence and artifact submissions
|
|
744
|
+
- Maintain a log of all information shared with the SOC as part of the incident record
|
|
745
|
+
|
|
746
|
+
---
|
|
747
|
+
|
|
748
|
+
## 13. Testing and Exercises
|
|
749
|
+
|
|
750
|
+
### 13.1 Annual Tabletop Exercise
|
|
751
|
+
|
|
752
|
+
**Frequency:** At least annually (more frequently for high-value assets)
|
|
753
|
+
|
|
754
|
+
**Scope:** Full IRP walkthrough using realistic scenarios appropriate to the {{system_name}} threat profile.
|
|
755
|
+
|
|
756
|
+
**Participants:** All IRT members, CSSP SOC representative (when available), system owner, AO representative.
|
|
757
|
+
|
|
758
|
+
**Exercise Requirements:**
|
|
759
|
+
- Scenario must include at least one Critical severity incident
|
|
760
|
+
- Must exercise external notification procedures (CSSP SOC, US-CERT, DC3 as applicable)
|
|
761
|
+
- Must validate contact information and notification chains
|
|
762
|
+
- Must test decision-making processes for containment, eradication, and recovery
|
|
763
|
+
- Must include a CUI data breach scenario at least every other year
|
|
764
|
+
- Scenarios should be based on current threat intelligence and recent incidents in the DoD community
|
|
765
|
+
|
|
766
|
+
**Documentation:** Exercise plan, participant list, scenario injects, participant responses, after-action report.
|
|
767
|
+
|
|
768
|
+
### 13.2 Quarterly Communications Test
|
|
769
|
+
|
|
770
|
+
**Frequency:** Every 90 days
|
|
771
|
+
|
|
772
|
+
**Scope:** Verify all IRT contact information and communication channels are operational.
|
|
773
|
+
|
|
774
|
+
**Test Procedures:**
|
|
775
|
+
1. Contact each IRT member via primary and alternate contact methods
|
|
776
|
+
2. Verify CSSP SOC contact information and ticket submission process
|
|
777
|
+
3. Confirm secure communication channels are operational
|
|
778
|
+
4. Validate that phone trees and escalation paths are current
|
|
779
|
+
5. Update contact roster with any changes identified
|
|
780
|
+
|
|
781
|
+
**Documentation:** Test date, results for each contact, any failures and corrective actions.
|
|
782
|
+
|
|
783
|
+
### 13.3 After-Action Review (AAR)
|
|
784
|
+
|
|
785
|
+
An after-action review must be conducted following:
|
|
786
|
+
- Every actual incident at Moderate severity or above
|
|
787
|
+
- Every tabletop exercise
|
|
788
|
+
- Every significant change to the system architecture or operating environment
|
|
789
|
+
|
|
790
|
+
**AAR Requirements:**
|
|
791
|
+
1. Conduct within 10 business days of incident closure or exercise completion
|
|
792
|
+
2. Include all IRT members who participated in the response
|
|
793
|
+
3. Document what happened, what was planned, what went well, what needs improvement
|
|
794
|
+
4. Identify specific action items with owners and deadlines
|
|
795
|
+
5. Update this IRP based on findings
|
|
796
|
+
6. Update detection rules, playbooks, and procedures based on lessons learned
|
|
797
|
+
7. Brief the AO on significant findings
|
|
798
|
+
|
|
799
|
+
**AAR Report Template:**
|
|
800
|
+
|
|
801
|
+
| Section | Content |
|
|
802
|
+
|---------|---------|
|
|
803
|
+
| Incident/Exercise Summary | Brief description, timeline, severity |
|
|
804
|
+
| What Worked Well | Effective procedures, tools, coordination |
|
|
805
|
+
| Areas for Improvement | Gaps, delays, tool limitations, communication failures |
|
|
806
|
+
| Root Cause (incidents only) | Technical root cause and contributing factors |
|
|
807
|
+
| Action Items | Specific improvements with owner, deadline, and priority |
|
|
808
|
+
| IRP Updates Required | Sections of this plan that need revision |
|
|
809
|
+
| Training Needs | Knowledge or skill gaps identified |
|
|
810
|
+
|
|
811
|
+
---
|
|
812
|
+
|
|
813
|
+
## 14. Plan Maintenance
|
|
814
|
+
|
|
815
|
+
### 14.1 Review Schedule
|
|
816
|
+
|
|
817
|
+
| Review Type | Frequency | Responsible | Trigger |
|
|
818
|
+
|-------------|-----------|-------------|---------|
|
|
819
|
+
| Scheduled review | Annual minimum | ISSM ({{issm_name}}) | Calendar date ({{next_review_date}}) |
|
|
820
|
+
| Post-incident review | Within 10 business days of closure | ISSO ({{isso_name}}) | Every Moderate+ incident |
|
|
821
|
+
| Post-exercise review | Within 10 business days of exercise | ISSO ({{isso_name}}) | Every tabletop or communications test |
|
|
822
|
+
| Personnel change review | Within 5 business days | ISSO ({{isso_name}}) | Any IRT member departure or role change |
|
|
823
|
+
| System change review | Within 10 business days | ISSO ({{isso_name}}) | Major system architecture or boundary changes |
|
|
824
|
+
| Regulatory change review | Within 30 days | ISSM ({{issm_name}}) | New or updated DoD directives, NIST publications |
|
|
825
|
+
|
|
826
|
+
### 14.2 Update Triggers
|
|
827
|
+
|
|
828
|
+
This plan must be reviewed and updated when any of the following occur:
|
|
829
|
+
|
|
830
|
+
- Annual review date is reached
|
|
831
|
+
- A significant incident reveals gaps in current procedures
|
|
832
|
+
- After-action review identifies required changes
|
|
833
|
+
- IRT personnel changes (departures, new assignments, role changes)
|
|
834
|
+
- Significant changes to the {{system_name}} architecture or authorization boundary
|
|
835
|
+
- Changes to CSSP SOC contact information, procedures, or capabilities
|
|
836
|
+
- New or updated DoD directives, instructions, or NIST guidance affecting incident response
|
|
837
|
+
- Changes to the threat landscape relevant to {{system_name}}
|
|
838
|
+
- Changes to interconnected systems that affect incident response coordination
|
|
839
|
+
- Organizational restructuring affecting roles and responsibilities
|
|
840
|
+
|
|
841
|
+
### 14.3 Distribution List
|
|
842
|
+
|
|
843
|
+
This plan is distributed to the following personnel. Recipients are responsible for maintaining the most current version and destroying superseded copies.
|
|
844
|
+
|
|
845
|
+
| Recipient | Role | Distribution Method |
|
|
846
|
+
|-----------|------|---------------------|
|
|
847
|
+
| {{system_owner}} | System Owner | Secure electronic + printed copy |
|
|
848
|
+
| {{ao_name}} | Authorizing Official | Secure electronic |
|
|
849
|
+
| {{issm_name}} | ISSM | Secure electronic + printed copy |
|
|
850
|
+
| {{isso_name}} | ISSO | Secure electronic + printed copy |
|
|
851
|
+
| {{system_admin}} | System Administrator | Secure electronic |
|
|
852
|
+
| {{security_engineer}} | Security Engineer | Secure electronic |
|
|
853
|
+
| {{legal_contact}} | Legal Counsel | Secure electronic |
|
|
854
|
+
| {{comms_contact}} | Communications Lead | Secure electronic |
|
|
855
|
+
| {{soc_name}} | CSSP SOC (reference copy) | Secure electronic |
|
|
856
|
+
|
|
857
|
+
### 14.4 Version Control
|
|
858
|
+
|
|
859
|
+
All changes to this plan must be:
|
|
860
|
+
1. Reviewed and approved by the ISSM before distribution
|
|
861
|
+
2. Documented in the Revision History table (Section 1)
|
|
862
|
+
3. Distributed to all personnel on the distribution list within 5 business days
|
|
863
|
+
4. Acknowledged by all IRT members within 10 business days of receipt
|
|
864
|
+
|
|
865
|
+
---
|
|
866
|
+
|
|
867
|
+
## 15. Appendices
|
|
868
|
+
|
|
869
|
+
### Appendix A: Contact Roster
|
|
870
|
+
|
|
871
|
+
**CLASSIFICATION: CUI // SP-CTI -- Protect accordingly**
|
|
872
|
+
|
|
873
|
+
| Role | Name | Primary Phone | Alternate Phone | Secure Email | Location |
|
|
874
|
+
|------|------|---------------|-----------------|--------------|----------|
|
|
875
|
+
| System Owner | {{system_owner}} | ____________ | ____________ | ____________ | ____________ |
|
|
876
|
+
| Authorizing Official | {{ao_name}} | ____________ | ____________ | ____________ | ____________ |
|
|
877
|
+
| ISSM | {{issm_name}} | ____________ | ____________ | ____________ | ____________ |
|
|
878
|
+
| ISSO | {{isso_name}} | ____________ | ____________ | ____________ | ____________ |
|
|
879
|
+
| System Administrator | {{system_admin}} | ____________ | ____________ | ____________ | ____________ |
|
|
880
|
+
| Security Engineer | {{security_engineer}} | ____________ | ____________ | ____________ | ____________ |
|
|
881
|
+
| Legal Counsel | {{legal_contact}} | ____________ | ____________ | ____________ | ____________ |
|
|
882
|
+
| Communications Lead | {{comms_contact}} | ____________ | ____________ | ____________ | ____________ |
|
|
883
|
+
| CSSP SOC (Primary) | {{soc_name}} | {{soc_phone}} | ____________ | {{soc_email}} | ____________ |
|
|
884
|
+
|
|
885
|
+
**External Contacts:**
|
|
886
|
+
|
|
887
|
+
| Organization | Purpose | Phone | Email/Portal |
|
|
888
|
+
|-------------|---------|-------|--------------|
|
|
889
|
+
| US-CERT / CISA | Federal incident reporting | 1-888-282-0870 | us-cert.cisa.gov |
|
|
890
|
+
| DC3 (DoD Cyber Crime Center) | DoD/DIB incident reporting | 1-410-981-0104 | dc3.mil |
|
|
891
|
+
| FBI Cyber Division | Law enforcement | Local field office | ic3.gov |
|
|
892
|
+
| DCIS (Defense Criminal Investigative Service) | DoD criminal investigation | Local field office | dodig.mil/dcis |
|
|
893
|
+
|
|
894
|
+
**This contact roster must be verified quarterly (see Section 13.2).**
|
|
895
|
+
|
|
896
|
+
---
|
|
897
|
+
|
|
898
|
+
### Appendix B: Incident Report Form
|
|
899
|
+
|
|
900
|
+
```
|
|
901
|
+
////////////////////////////////////////////////////////////////////
|
|
902
|
+
CUI // SP-CTI
|
|
903
|
+
////////////////////////////////////////////////////////////////////
|
|
904
|
+
|
|
905
|
+
CYBERSECURITY INCIDENT REPORT FORM
|
|
906
|
+
System: {{system_name}} ({{system_id}})
|
|
907
|
+
|
|
908
|
+
SECTION 1: INCIDENT IDENTIFICATION
|
|
909
|
+
Incident ID: INC-____________-___
|
|
910
|
+
Date/Time Detected: ____-__-__ __:__ UTC
|
|
911
|
+
Date/Time of Incident:____-__-__ __:__ UTC (if known)
|
|
912
|
+
Detected By: [ ] SIEM [ ] IDS/IPS [ ] EDR [ ] User Report
|
|
913
|
+
[ ] CSSP SOC [ ] Scanner [ ] Audit Review
|
|
914
|
+
[ ] Other: _______________
|
|
915
|
+
Reported By: Name: ________________ Role: ________________
|
|
916
|
+
|
|
917
|
+
SECTION 2: CLASSIFICATION
|
|
918
|
+
Category: [ ] CAT-1 Unauthorized Access [ ] CAT-2 Malicious Code
|
|
919
|
+
[ ] CAT-3 Data Breach [ ] CAT-4 Denial of Service
|
|
920
|
+
[ ] CAT-5 Insider Threat [ ] CAT-6 Supply Chain
|
|
921
|
+
[ ] CAT-7 Misuse
|
|
922
|
+
Severity: [ ] Critical [ ] High [ ] Moderate [ ] Low
|
|
923
|
+
|
|
924
|
+
SECTION 3: AFFECTED SYSTEMS
|
|
925
|
+
Hostname(s): ________________________________________________
|
|
926
|
+
IP Address(es): ________________________________________________
|
|
927
|
+
OS/Platform: ________________________________________________
|
|
928
|
+
Function: ________________________________________________
|
|
929
|
+
CUI Data at Risk: [ ] Yes [ ] No [ ] Unknown
|
|
930
|
+
Description of CUI: ___________________________________________
|
|
931
|
+
|
|
932
|
+
SECTION 4: INCIDENT DESCRIPTION
|
|
933
|
+
(Provide detailed narrative of what occurred, how it was detected,
|
|
934
|
+
and the current state of the incident.)
|
|
935
|
+
_______________________________________________________________
|
|
936
|
+
_______________________________________________________________
|
|
937
|
+
_______________________________________________________________
|
|
938
|
+
_______________________________________________________________
|
|
939
|
+
|
|
940
|
+
SECTION 5: INDICATORS OF COMPROMISE
|
|
941
|
+
Source IPs: ________________________________________________
|
|
942
|
+
Dest IPs: ________________________________________________
|
|
943
|
+
Domains/URLs: ________________________________________________
|
|
944
|
+
File Hashes: ________________________________________________
|
|
945
|
+
File Names: ________________________________________________
|
|
946
|
+
Other IOCs: ________________________________________________
|
|
947
|
+
|
|
948
|
+
SECTION 6: ACTIONS TAKEN
|
|
949
|
+
[ ] System isolated from network
|
|
950
|
+
[ ] Affected accounts disabled
|
|
951
|
+
[ ] Forensic image created
|
|
952
|
+
[ ] Logs preserved
|
|
953
|
+
[ ] CSSP SOC notified (Ticket #: _________)
|
|
954
|
+
[ ] ISSM notified
|
|
955
|
+
[ ] AO notified
|
|
956
|
+
[ ] Other: ____________________________________________________
|
|
957
|
+
Narrative: ____________________________________________________
|
|
958
|
+
_______________________________________________________________
|
|
959
|
+
|
|
960
|
+
SECTION 7: IMPACT ASSESSMENT
|
|
961
|
+
Operational Impact: [ ] None [ ] Minor [ ] Significant [ ] Severe
|
|
962
|
+
Data Compromise: [ ] None [ ] Suspected [ ] Confirmed
|
|
963
|
+
Users Affected: _____ (number)
|
|
964
|
+
Systems Affected: _____ (number)
|
|
965
|
+
Mission Impact: ___________________________________________
|
|
966
|
+
|
|
967
|
+
SECTION 8: SIGNATURES
|
|
968
|
+
Prepared By: ________________ Date: ________ Time: ________
|
|
969
|
+
Reviewed By: ________________ Date: ________ Time: ________
|
|
970
|
+
IC Approval: ________________ Date: ________ Time: ________
|
|
971
|
+
|
|
972
|
+
////////////////////////////////////////////////////////////////////
|
|
973
|
+
CUI // SP-CTI
|
|
974
|
+
////////////////////////////////////////////////////////////////////
|
|
975
|
+
```
|
|
976
|
+
|
|
977
|
+
---
|
|
978
|
+
|
|
979
|
+
### Appendix C: Evidence Collection Checklist
|
|
980
|
+
|
|
981
|
+
Use this checklist for each system involved in an incident. Complete one checklist per system.
|
|
982
|
+
|
|
983
|
+
**System:** __________________ **Incident ID:** __________________
|
|
984
|
+
|
|
985
|
+
**Collector:** ________________ **Date/Time (UTC):** ______________
|
|
986
|
+
|
|
987
|
+
#### Volatile Data (Collect FIRST -- order matters)
|
|
988
|
+
|
|
989
|
+
- [ ] System date/time and timezone
|
|
990
|
+
- [ ] Running processes and services (full process tree with command lines)
|
|
991
|
+
- [ ] Open network connections and listening ports
|
|
992
|
+
- [ ] Logged-in users and active sessions
|
|
993
|
+
- [ ] Open files and file handles
|
|
994
|
+
- [ ] System memory (full RAM dump)
|
|
995
|
+
- [ ] Network interface configuration (IP, MAC, DNS, routes)
|
|
996
|
+
- [ ] Scheduled tasks and cron jobs
|
|
997
|
+
- [ ] Loaded kernel modules / drivers
|
|
998
|
+
- [ ] Clipboard contents (if accessible)
|
|
999
|
+
- [ ] Environment variables for suspicious processes
|
|
1000
|
+
- [ ] ARP cache and DNS cache
|
|
1001
|
+
|
|
1002
|
+
#### Non-Volatile Data
|
|
1003
|
+
|
|
1004
|
+
- [ ] Full disk forensic image (with write-blocker)
|
|
1005
|
+
- [ ] SHA-256 hash of forensic image computed and recorded
|
|
1006
|
+
- [ ] Second copy of forensic image created and stored separately
|
|
1007
|
+
- [ ] System configuration files
|
|
1008
|
+
- [ ] User account information and recent authentication logs
|
|
1009
|
+
- [ ] Application logs (web server, database, application-specific)
|
|
1010
|
+
- [ ] System event logs (syslog, Windows Event Log)
|
|
1011
|
+
- [ ] Security logs (authentication, authorization, audit)
|
|
1012
|
+
- [ ] Network device logs (firewall, router, switch, IDS/IPS)
|
|
1013
|
+
- [ ] SIEM correlation data for the incident timeframe
|
|
1014
|
+
- [ ] Email headers and content (if email-related incident)
|
|
1015
|
+
- [ ] Browser history and artifacts (if relevant)
|
|
1016
|
+
- [ ] Registry hives (Windows) or configuration databases
|
|
1017
|
+
|
|
1018
|
+
#### Evidence Handling
|
|
1019
|
+
|
|
1020
|
+
- [ ] Chain of custody form completed for each evidence item
|
|
1021
|
+
- [ ] All evidence items assigned unique Evidence IDs
|
|
1022
|
+
- [ ] SHA-256 hashes computed and recorded for all digital evidence
|
|
1023
|
+
- [ ] Evidence stored in secure, access-controlled location
|
|
1024
|
+
- [ ] Evidence storage location documented
|
|
1025
|
+
- [ ] Evidence access log initiated
|
|
1026
|
+
- [ ] Physical evidence placed in tamper-evident bags (if applicable)
|
|
1027
|
+
- [ ] Original media secured and isolated (do not analyze originals)
|
|
1028
|
+
|
|
1029
|
+
#### Notes
|
|
1030
|
+
|
|
1031
|
+
```
|
|
1032
|
+
(Document any anomalies, collection difficulties, or deviations
|
|
1033
|
+
from standard procedures.)
|
|
1034
|
+
_________________________________________________________________
|
|
1035
|
+
_________________________________________________________________
|
|
1036
|
+
_________________________________________________________________
|
|
1037
|
+
_________________________________________________________________
|
|
1038
|
+
```
|
|
1039
|
+
|
|
1040
|
+
---
|
|
1041
|
+
|
|
1042
|
+
### Appendix D: Acronyms and Abbreviations
|
|
1043
|
+
|
|
1044
|
+
| Acronym | Definition |
|
|
1045
|
+
|---------|------------|
|
|
1046
|
+
| AAR | After-Action Review |
|
|
1047
|
+
| AO | Authorizing Official |
|
|
1048
|
+
| ATO | Authorization to Operate |
|
|
1049
|
+
| C2 | Command and Control |
|
|
1050
|
+
| CISA | Cybersecurity and Infrastructure Security Agency |
|
|
1051
|
+
| CSSP | Cybersecurity Service Provider |
|
|
1052
|
+
| CUI | Controlled Unclassified Information |
|
|
1053
|
+
| CTI | Controlled Technical Information |
|
|
1054
|
+
| DC3 | DoD Cyber Crime Center |
|
|
1055
|
+
| DCIS | Defense Criminal Investigative Service |
|
|
1056
|
+
| DFARS | Defense Federal Acquisition Regulation Supplement |
|
|
1057
|
+
| DIB | Defense Industrial Base |
|
|
1058
|
+
| DoDI | DoD Instruction |
|
|
1059
|
+
| EDR | Endpoint Detection and Response |
|
|
1060
|
+
| IC | Incident Commander |
|
|
1061
|
+
| IDS | Intrusion Detection System |
|
|
1062
|
+
| IOC | Indicator of Compromise |
|
|
1063
|
+
| IPS | Intrusion Prevention System |
|
|
1064
|
+
| IRP | Incident Response Plan |
|
|
1065
|
+
| IRT | Incident Response Team |
|
|
1066
|
+
| ISSM | Information System Security Manager |
|
|
1067
|
+
| ISSO | Information System Security Officer |
|
|
1068
|
+
| NIST | National Institute of Standards and Technology |
|
|
1069
|
+
| PCAP | Packet Capture |
|
|
1070
|
+
| POA&M | Plan of Action and Milestones |
|
|
1071
|
+
| SAST | Static Application Security Testing |
|
|
1072
|
+
| SBOM | Software Bill of Materials |
|
|
1073
|
+
| SIEM | Security Information and Event Management |
|
|
1074
|
+
| SOC | Security Operations Center |
|
|
1075
|
+
| SP-CTI | Specified -- Controlled Technical Information |
|
|
1076
|
+
| SSP | System Security Plan |
|
|
1077
|
+
| STIG | Security Technical Implementation Guide |
|
|
1078
|
+
| TLP | Traffic Light Protocol |
|
|
1079
|
+
| TTP | Tactics, Techniques, and Procedures |
|
|
1080
|
+
| US-CERT | United States Computer Emergency Readiness Team |
|
|
1081
|
+
|
|
1082
|
+
---
|
|
1083
|
+
|
|
1084
|
+
### Appendix E: Referenced Documents
|
|
1085
|
+
|
|
1086
|
+
| Document | Version/Date | Relevance |
|
|
1087
|
+
|----------|-------------|-----------|
|
|
1088
|
+
| DoD Instruction 8530.01 | March 2016 (w/ changes) | Primary directive for CSSP SOC engagement and cyber incident reporting |
|
|
1089
|
+
| NIST SP 800-61 Rev 2 | August 2012 | Computer Security Incident Handling Guide |
|
|
1090
|
+
| NIST SP 800-53 Rev 5 | September 2020 | Security and Privacy Controls -- IR family |
|
|
1091
|
+
| NIST SP 800-86 | August 2006 | Guide to Integrating Forensic Techniques into IR |
|
|
1092
|
+
| CJCSM 6510.01B | July 2012 | Cyber Incident Handling Program |
|
|
1093
|
+
| DoDI 5200.48 | March 2020 | CUI Program |
|
|
1094
|
+
| DoDI 8500.01 | March 2014 | Cybersecurity |
|
|
1095
|
+
| DFARS 252.204-7012 | October 2016 | Safeguarding Covered Defense Information |
|
|
1096
|
+
| DoD Manual 5200.01 Vol 3 | February 2012 | DoD Information Security Program |
|
|
1097
|
+
| {{system_name}} SSP | Current version | System Security Plan for {{system_name}} |
|
|
1098
|
+
| {{system_name}} POA&M | Current version | Plan of Action and Milestones for {{system_name}} |
|
|
1099
|
+
|
|
1100
|
+
---
|
|
1101
|
+
|
|
1102
|
+
**Document Classification:** {{classification}}
|
|
1103
|
+
|
|
1104
|
+
**Generated by:** ICDEV Compliance Engine v{{icdev_version}}
|
|
1105
|
+
|
|
1106
|
+
**Generated on:** {{generation_date}}
|
|
1107
|
+
|
|
1108
|
+
////////////////////////////////////////////////////////////////////
|
|
1109
|
+
CUI // SP-CTI | Department of Defense
|
|
1110
|
+
////////////////////////////////////////////////////////////////////
|