icdev 1.0.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- icdev/__init__.py +18 -0
- icdev/_paths.py +85 -0
- icdev/_version.py +3 -0
- icdev/data/__init__.py +1 -0
- icdev/data/args/__init__.py +1 -0
- icdev/data/args/agent_authority.yaml +61 -0
- icdev/data/args/agent_config.yaml +355 -0
- icdev/data/args/agentic_fitness.yaml +31 -0
- icdev/data/args/ai_governance_config.yaml +137 -0
- icdev/data/args/atlas_critique_config.yaml +66 -0
- icdev/data/args/bedrock_models.yaml +63 -0
- icdev/data/args/cicd_config.yaml +82 -0
- icdev/data/args/classification_config.yaml +232 -0
- icdev/data/args/cli_config.yaml +154 -0
- icdev/data/args/cloud_config.yaml +63 -0
- icdev/data/args/code_pattern_config.yaml +151 -0
- icdev/data/args/code_quality_config.yaml +47 -0
- icdev/data/args/companion_registry.yaml +202 -0
- icdev/data/args/context_config.yaml +82 -0
- icdev/data/args/csp_monitor_config.yaml +268 -0
- icdev/data/args/cui_markings.yaml +35 -0
- icdev/data/args/db_config.yaml +40 -0
- icdev/data/args/deployment_profiles.yaml +248 -0
- icdev/data/args/dev_profile_config.yaml +144 -0
- icdev/data/args/devsecops_config.yaml +286 -0
- icdev/data/args/endpoint_security_config.yaml +137 -0
- icdev/data/args/extension_config.yaml +79 -0
- icdev/data/args/file_access_tiers.yaml +88 -0
- icdev/data/args/framework_registry.yaml +415 -0
- icdev/data/args/innovation_config.yaml +431 -0
- icdev/data/args/installation_manifest.yaml +1087 -0
- icdev/data/args/llm_config.yaml +495 -0
- icdev/data/args/maintenance_config.yaml +55 -0
- icdev/data/args/memory_config.yaml +83 -0
- icdev/data/args/monitoring_config.yaml +127 -0
- icdev/data/args/mosa_config.yaml +190 -0
- icdev/data/args/nlq_config.yaml +35 -0
- icdev/data/args/observability_config.yaml +39 -0
- icdev/data/args/observability_tracing_config.yaml +170 -0
- icdev/data/args/oscal_tools_config.yaml +43 -0
- icdev/data/args/owasp_agentic_config.yaml +171 -0
- icdev/data/args/phase_registry.yaml +618 -0
- icdev/data/args/project_defaults.yaml +235 -0
- icdev/data/args/prompt_chains.yaml +163 -0
- icdev/data/args/resilience_config.yaml +50 -0
- icdev/data/args/ricoas_config.yaml +191 -0
- icdev/data/args/role_personas.yaml +362 -0
- icdev/data/args/scaling_config.yaml +176 -0
- icdev/data/args/security_gates.yaml +685 -0
- icdev/data/args/skill_injection_config.yaml +322 -0
- icdev/data/args/spec_config.yaml +53 -0
- icdev/data/args/supply_chain_config.yaml +76 -0
- icdev/data/args/translation_config.yaml +228 -0
- icdev/data/args/workflow_templates/ato_acceleration.yaml +54 -0
- icdev/data/args/workflow_templates/build_deploy.yaml +63 -0
- icdev/data/args/workflow_templates/full_compliance.yaml +43 -0
- icdev/data/args/workflow_templates/security_hardening.yaml +55 -0
- icdev/data/args/worktree_config.yaml +34 -0
- icdev/data/args/zta_config.yaml +247 -0
- icdev/data/context/__init__.py +1 -0
- icdev/data/context/agent/__init__.py +1 -0
- icdev/data/context/agent/response_schemas/__init__.py +1 -0
- icdev/data/context/agent/response_schemas/debate_position.json +46 -0
- icdev/data/context/agent/response_schemas/fitness_scorecard.json +74 -0
- icdev/data/context/agent/response_schemas/review_decision.json +39 -0
- icdev/data/context/agent/response_schemas/task_decomposition.json +82 -0
- icdev/data/context/agent/response_schemas/veto_decision.json +40 -0
- icdev/data/context/agentic/__init__.py +1 -0
- icdev/data/context/agentic/architecture_patterns.md +269 -0
- icdev/data/context/agentic/capability_registry.yaml +202 -0
- icdev/data/context/agentic/csp_mcp_registry.yaml +280 -0
- icdev/data/context/agentic/fitness_rubric.md +56 -0
- icdev/data/context/agentic/governance_baseline.md +205 -0
- icdev/data/context/ci/__init__.py +1 -0
- icdev/data/context/ci/worktree_templates.json +44 -0
- icdev/data/context/cloud/__init__.py +1 -0
- icdev/data/context/cloud/csp_service_registry.json +739 -0
- icdev/data/context/compliance/__init__.py +1 -0
- icdev/data/context/compliance/atlas_mitigations.json +293 -0
- icdev/data/context/compliance/atlas_techniques.json +833 -0
- icdev/data/context/compliance/cisa_sbd_requirements.json +432 -0
- icdev/data/context/compliance/cjis_security_policy.json +522 -0
- icdev/data/context/compliance/cmmc_practices.json +2494 -0
- icdev/data/context/compliance/cmmc_report_template.md +142 -0
- icdev/data/context/compliance/cnssi_1253_overlay.json +109 -0
- icdev/data/context/compliance/control_crosswalk.json +1914 -0
- icdev/data/context/compliance/control_families/__init__.py +1 -0
- icdev/data/context/compliance/csp_certifications.json +251 -0
- icdev/data/context/compliance/cssp_report_template.md +193 -0
- icdev/data/context/compliance/cui_templates/__init__.py +1 -0
- icdev/data/context/compliance/cui_templates/banner_block.txt +4 -0
- icdev/data/context/compliance/cui_templates/code_header.txt +8 -0
- icdev/data/context/compliance/cui_templates/document_template.md +35 -0
- icdev/data/context/compliance/data_type_framework_map.json +321 -0
- icdev/data/context/compliance/data_type_registry.json +147 -0
- icdev/data/context/compliance/dod_cssp_8530.json +463 -0
- icdev/data/context/compliance/eu_ai_act_annex_iii.json +108 -0
- icdev/data/context/compliance/export_templates/__init__.py +1 -0
- icdev/data/context/compliance/export_templates/emass_controls.csv.j2 +4 -0
- icdev/data/context/compliance/export_templates/evidence_package.md.j2 +39 -0
- icdev/data/context/compliance/export_templates/executive_summary.md.j2 +55 -0
- icdev/data/context/compliance/export_templates/poam_tracking.csv.j2 +4 -0
- icdev/data/context/compliance/fedramp_20x_ksi_schemas.json +133 -0
- icdev/data/context/compliance/fedramp_high_baseline.json +4370 -0
- icdev/data/context/compliance/fedramp_moderate_baseline.json +2183 -0
- icdev/data/context/compliance/fedramp_report_template.md +181 -0
- icdev/data/context/compliance/fips_200_areas.json +362 -0
- icdev/data/context/compliance/gao_ai_accountability.json +262 -0
- icdev/data/context/compliance/hipaa_security_rule.json +720 -0
- icdev/data/context/compliance/hitrust_csf_v11.json +930 -0
- icdev/data/context/compliance/impact_level_profiles.json +251 -0
- icdev/data/context/compliance/incident_response_template.md +1110 -0
- icdev/data/context/compliance/iso27001_2022_controls.json +750 -0
- icdev/data/context/compliance/iso27001_nist_bridge.json +382 -0
- icdev/data/context/compliance/iso42001_controls.json +254 -0
- icdev/data/context/compliance/ivv_checklist_template.md +80 -0
- icdev/data/context/compliance/ivv_report_template.md +116 -0
- icdev/data/context/compliance/ivv_requirements.json +372 -0
- icdev/data/context/compliance/mosa_crosswalk.json +327 -0
- icdev/data/context/compliance/mosa_framework.json +250 -0
- icdev/data/context/compliance/narrative_templates/AC.md.j2 +101 -0
- icdev/data/context/compliance/narrative_templates/AU.md.j2 +106 -0
- icdev/data/context/compliance/narrative_templates/IA.md.j2 +104 -0
- icdev/data/context/compliance/narrative_templates/SC.md.j2 +102 -0
- icdev/data/context/compliance/narrative_templates/SI.md.j2 +111 -0
- icdev/data/context/compliance/narrative_templates/__init__.py +1 -0
- icdev/data/context/compliance/narrative_templates/default.md.j2 +50 -0
- icdev/data/context/compliance/narrative_templates/executive_summary.j2 +27 -0
- icdev/data/context/compliance/narrative_templates/poam_milestone.j2 +19 -0
- icdev/data/context/compliance/narrative_templates/ssp_section.j2 +11 -0
- icdev/data/context/compliance/nist_800_171_controls.json +1552 -0
- icdev/data/context/compliance/nist_800_207_crosswalk.json +399 -0
- icdev/data/context/compliance/nist_800_207_zta.json +258 -0
- icdev/data/context/compliance/nist_800_53.json +324 -0
- icdev/data/context/compliance/nist_ai_600_1_genai.json +326 -0
- icdev/data/context/compliance/nist_ai_rmf.json +206 -0
- icdev/data/context/compliance/nist_sp_800_60_types.json +1667 -0
- icdev/data/context/compliance/omb_m25_21_high_impact_ai.json +248 -0
- icdev/data/context/compliance/omb_m26_04_unbiased_ai.json +262 -0
- icdev/data/context/compliance/owasp_agentic_asi.json +133 -0
- icdev/data/context/compliance/owasp_agentic_threats.json +285 -0
- icdev/data/context/compliance/owasp_llm_top10.json +274 -0
- icdev/data/context/compliance/pci_dss_v4.json +510 -0
- icdev/data/context/compliance/poam_template.md +117 -0
- icdev/data/context/compliance/safeai_controls.json +512 -0
- icdev/data/context/compliance/sbd_report_template.md +77 -0
- icdev/data/context/compliance/siem_config_templates/__init__.py +1 -0
- icdev/data/context/compliance/siem_config_templates/filebeat.yml +213 -0
- icdev/data/context/compliance/siem_config_templates/log_sources.json +208 -0
- icdev/data/context/compliance/soc2_trust_criteria.json +661 -0
- icdev/data/context/compliance/ssp_template.md +432 -0
- icdev/data/context/compliance/stig_templates/__init__.py +1 -0
- icdev/data/context/compliance/stig_templates/webapp_stig.json +139 -0
- icdev/data/context/compliance/xai_requirements.json +108 -0
- icdev/data/context/dashboard/__init__.py +1 -0
- icdev/data/context/dashboard/nlq_examples.json +50 -0
- icdev/data/context/dashboard/schema_descriptions.json +23 -0
- icdev/data/context/integration/__init__.py +1 -0
- icdev/data/context/integration/approval_workflows.json +32 -0
- icdev/data/context/integration/gitlab_field_mappings.json +33 -0
- icdev/data/context/integration/jira_field_mappings.json +32 -0
- icdev/data/context/integration/reqif_export_schema.json +23 -0
- icdev/data/context/integration/servicenow_field_mappings.json +22 -0
- icdev/data/context/languages/__init__.py +1 -0
- icdev/data/context/languages/framework_patterns.json +205 -0
- icdev/data/context/languages/language_registry.json +279 -0
- icdev/data/context/llm/__init__.py +1 -0
- icdev/data/context/llm/example_provider.py +86 -0
- icdev/data/context/mbse/__init__.py +1 -0
- icdev/data/context/mbse/des_report_template.md +162 -0
- icdev/data/context/mbse/des_requirements.json +411 -0
- icdev/data/context/mbse/digital_thread_patterns.json +403 -0
- icdev/data/context/mbse/reqif_schema.json +280 -0
- icdev/data/context/mbse/sysml_element_types.json +432 -0
- icdev/data/context/modernization/__init__.py +1 -0
- icdev/data/context/modernization/db_type_mappings.json +148 -0
- icdev/data/context/modernization/decomposition_patterns.json +284 -0
- icdev/data/context/modernization/framework_migration_patterns.json +359 -0
- icdev/data/context/modernization/migration_report_template.md +168 -0
- icdev/data/context/modernization/seven_rs_catalog.json +369 -0
- icdev/data/context/modernization/version_upgrade_rules.json +279 -0
- icdev/data/context/oscal/NIST_SP-800-53_rev5_catalog.json +254987 -0
- icdev/data/context/oscal/README.md +43 -0
- icdev/data/context/patterns/__init__.py +1 -0
- icdev/data/context/profiles/__init__.py +1 -0
- icdev/data/context/profiles/dod_baseline_v1.yaml +145 -0
- icdev/data/context/profiles/fedramp_baseline_v1.yaml +143 -0
- icdev/data/context/profiles/financial_baseline_v1.yaml +142 -0
- icdev/data/context/profiles/healthcare_baseline_v1.yaml +135 -0
- icdev/data/context/profiles/law_enforcement_v1.yaml +129 -0
- icdev/data/context/profiles/startup_v1.yaml +134 -0
- icdev/data/context/requirements/__init__.py +1 -0
- icdev/data/context/requirements/ambiguity_patterns.json +97 -0
- icdev/data/context/requirements/boundary_impact_rules.json +123 -0
- icdev/data/context/requirements/default_constitutions.json +67 -0
- icdev/data/context/requirements/document_extraction_rules.json +58 -0
- icdev/data/context/requirements/gap_patterns.json +108 -0
- icdev/data/context/requirements/readiness_rubric.json +78 -0
- icdev/data/context/requirements/red_alternative_patterns.json +210 -0
- icdev/data/context/requirements/safe_templates.json +72 -0
- icdev/data/context/requirements/spec_quality_checklist.json +122 -0
- icdev/data/context/simulation/__init__.py +1 -0
- icdev/data/context/simulation/architecture_patterns.json +36 -0
- icdev/data/context/simulation/coa_templates.json +38 -0
- icdev/data/context/simulation/cost_models.json +23 -0
- icdev/data/context/simulation/risk_categories.json +46 -0
- icdev/data/context/supply_chain/__init__.py +1 -0
- icdev/data/context/supply_chain/isa_templates.json +129 -0
- icdev/data/context/supply_chain/nist_800_161_controls.json +247 -0
- icdev/data/context/supply_chain/scrm_risk_matrix.json +147 -0
- icdev/data/context/templates/__init__.py +1 -0
- icdev/data/context/templates/ansible/__init__.py +1 -0
- icdev/data/context/templates/ansible/playbooks/__init__.py +1 -0
- icdev/data/context/templates/ansible/roles/__init__.py +1 -0
- icdev/data/context/templates/gitlab_ci/__init__.py +1 -0
- icdev/data/context/templates/grafana/__init__.py +1 -0
- icdev/data/context/templates/kubernetes/__init__.py +1 -0
- icdev/data/context/templates/project/__init__.py +1 -0
- icdev/data/context/templates/project/api/__init__.py +1 -0
- icdev/data/context/templates/project/cli/__init__.py +1 -0
- icdev/data/context/templates/project/data_pipeline/__init__.py +1 -0
- icdev/data/context/templates/project/iac/__init__.py +1 -0
- icdev/data/context/templates/project/javascript_frontend/__init__.py +1 -0
- icdev/data/context/templates/project/javascript_frontend/src/__init__.py +1 -0
- icdev/data/context/templates/project/javascript_frontend/tests/__init__.py +1 -0
- icdev/data/context/templates/project/microservice/__init__.py +1 -0
- icdev/data/context/templates/project/python_backend/__init__.py +1 -0
- icdev/data/context/templates/project/python_backend/src/__init__.py +1 -0
- icdev/data/context/templates/project/python_backend/tests/__init__.py +1 -0
- icdev/data/context/templates/project/python_backend/tests/features/__init__.py +1 -0
- icdev/data/context/templates/project/python_backend/tests/steps/__init__.py +1 -0
- icdev/data/context/templates/terraform/__init__.py +1 -0
- icdev/data/context/templates/terraform/govcloud_base/__init__.py +1 -0
- icdev/data/context/templates/terraform/modules/__init__.py +1 -0
- icdev/data/context/tone/__init__.py +1 -0
- icdev/data/context/translation/dependency_mappings.json +186 -0
- icdev/data/context/translation/type_mappings.json +149 -0
- icdev/data/docs/README.md +187 -0
- icdev/data/docs/__init__.py +1 -0
- icdev/data/docs/admin/gateway-guide.md +338 -0
- icdev/data/docs/admin/marketplace-guide.md +396 -0
- icdev/data/docs/admin/monitoring-guide.md +509 -0
- icdev/data/docs/architecture/compliance-framework.md +764 -0
- icdev/data/docs/architecture/database-schema.md +689 -0
- icdev/data/docs/architecture/gotcha-framework.md +518 -0
- icdev/data/docs/architecture/multi-agent-system.md +603 -0
- icdev/data/docs/dx/README.md +106 -0
- icdev/data/docs/dx/__init__.py +1 -0
- icdev/data/docs/dx/ci-cd-integration.md +378 -0
- icdev/data/docs/dx/claude-code-guide.md +213 -0
- icdev/data/docs/dx/companion-guide.md +232 -0
- icdev/data/docs/dx/dev-profiles.md +309 -0
- icdev/data/docs/dx/icdev-yaml-spec.md +219 -0
- icdev/data/docs/dx/integration-tiers.md +279 -0
- icdev/data/docs/dx/llm-routing-guide.md +456 -0
- icdev/data/docs/dx/quickstart.md +192 -0
- icdev/data/docs/dx/sdk-reference.md +356 -0
- icdev/data/docs/dx/unified-mcp-setup.md +525 -0
- icdev/data/docs/features/__init__.py +1 -0
- icdev/data/docs/features/phase-01-gotcha-framework.md +249 -0
- icdev/data/docs/features/phase-02-atlas-build-workflow.md +223 -0
- icdev/data/docs/features/phase-03-tdd-bdd-testing.md +261 -0
- icdev/data/docs/features/phase-04-nist-compliance.md +255 -0
- icdev/data/docs/features/phase-05-security-scanning.md +229 -0
- icdev/data/docs/features/phase-06-infrastructure-deployment.md +288 -0
- icdev/data/docs/features/phase-07-code-review-gates.md +276 -0
- icdev/data/docs/features/phase-08-self-healing.md +223 -0
- icdev/data/docs/features/phase-09-monitoring-observability.md +230 -0
- icdev/data/docs/features/phase-10-dashboard-web-ui.md +218 -0
- icdev/data/docs/features/phase-11-multi-agent-architecture.md +272 -0
- icdev/data/docs/features/phase-12-integration-testing.md +228 -0
- icdev/data/docs/features/phase-13-cicd-integration.md +257 -0
- icdev/data/docs/features/phase-14-secure-by-design-ivv.md +240 -0
- icdev/data/docs/features/phase-15-maintenance-audit.md +192 -0
- icdev/data/docs/features/phase-16-ato-acceleration.md +228 -0
- icdev/data/docs/features/phase-17-multi-framework-compliance.md +223 -0
- icdev/data/docs/features/phase-18-mbse-integration.md +242 -0
- icdev/data/docs/features/phase-19-agentic-generation.md +202 -0
- icdev/data/docs/features/phase-20-fips-security-categorization.md +198 -0
- icdev/data/docs/features/phase-21-saas-multi-tenancy.md +273 -0
- icdev/data/docs/features/phase-22-federated-gotcha-marketplace.md +242 -0
- icdev/data/docs/features/phase-23-universal-compliance-platform.md +238 -0
- icdev/data/docs/features/phase-24-devsecops-pipeline-security.md +198 -0
- icdev/data/docs/features/phase-25-zero-trust-architecture.md +220 -0
- icdev/data/docs/features/phase-26-dod-mosa.md +205 -0
- icdev/data/docs/features/phase-27-cli-capabilities.md +222 -0
- icdev/data/docs/features/phase-28-remote-command-gateway.md +235 -0
- icdev/data/docs/features/phase-29-proactive-monitoring.md +212 -0
- icdev/data/docs/features/phase-30-dashboard-auth.md +215 -0
- icdev/data/docs/features/phase-31-dashboard-ux-low-impact.md +188 -0
- icdev/data/docs/features/phase-32-dashboard-ux-medium-impact.md +223 -0
- icdev/data/docs/features/phase-33-modular-installation.md +218 -0
- icdev/data/docs/features/phase-34-dev-profiles.md +239 -0
- icdev/data/docs/features/phase-35-innovation-engine.md +257 -0
- icdev/data/docs/features/phase-36-evolutionary-intelligence.md +351 -0
- icdev/data/docs/features/phase-37-mitre-atlas-integration.md +485 -0
- icdev/data/docs/features/phase-38-cloud-agnostic-architecture.md +1033 -0
- icdev/data/docs/features/phase-39-observability-operations.md +178 -0
- icdev/data/docs/features/phase-40-nlq-compliance-queries.md +176 -0
- icdev/data/docs/features/phase-41-parallel-cicd.md +169 -0
- icdev/data/docs/features/phase-42-framework-planning.md +177 -0
- icdev/data/docs/features/phase-43-cross-language-translation.md +225 -0
- icdev/data/docs/features/phase-44-innovation-adaptation.md +227 -0
- icdev/data/docs/features/phase-45-owasp-agentic-security.md +239 -0
- icdev/data/docs/features/phase-46-observability-traceability-xai.md +240 -0
- icdev/data/docs/features/phase-47-unified-mcp-gateway.md +257 -0
- icdev/data/docs/features/phase-48-ai-transparency.md +203 -0
- icdev/data/docs/features/phase-49-ai-accountability.md +243 -0
- icdev/data/docs/features/phase-50-ai-governance-intake-chat.md +195 -0
- icdev/data/docs/features/phase-51-unified-chat-dashboard.md +240 -0
- icdev/data/docs/features/phase-52-code-intelligence.md +244 -0
- icdev/data/docs/features/phase-53-fedramp-20x-owasp-asi.md +359 -0
- icdev/data/docs/features/phase-54-slsa-swft-orchestration.md +379 -0
- icdev/data/docs/features/phase-55-a2a-v03-mcp-oauth.md +322 -0
- icdev/data/docs/features/phase-56-evidence-lineage.md +352 -0
- icdev/data/docs/features/phase-57-eu-ai-act-iron-bank.md +319 -0
- icdev/data/docs/features/phase-58-creative-engine.md +370 -0
- icdev/data/docs/features/phase-59-govcon-intelligence.md +535 -0
- icdev/data/docs/features/phase-60-cpmp.md +528 -0
- icdev/data/docs/features/phase-61-orchestration-improvements.md +534 -0
- icdev/data/docs/operations/dashboard-guide.md +354 -0
- icdev/data/docs/operations/deployment-guide.md +556 -0
- icdev/data/docs/operations/saas-admin-guide.md +439 -0
- icdev/data/docs/operations/security-operations-guide.md +733 -0
- icdev/data/docs/runbooks/backup-restore.md +412 -0
- icdev/data/docs/runbooks/troubleshooting.md +499 -0
- icdev/data/features/__init__.py +1 -0
- icdev/data/features/cicd_integration.feature +41 -0
- icdev/data/features/compliance_gates.feature +46 -0
- icdev/data/features/dashboard.feature +72 -0
- icdev/data/features/environment.py +25 -0
- icdev/data/features/project_management.feature +32 -0
- icdev/data/features/requirements_intake.feature +42 -0
- icdev/data/features/saas_platform.feature +53 -0
- icdev/data/features/security_scanning.feature +36 -0
- icdev/data/features/steps/__init__.py +1 -0
- icdev/data/features/steps/cicd_steps.py +465 -0
- icdev/data/features/steps/compliance_steps.py +308 -0
- icdev/data/features/steps/dashboard_steps.py +88 -0
- icdev/data/features/steps/project_steps.py +126 -0
- icdev/data/features/steps/requirements_intake_steps.py +689 -0
- icdev/data/features/steps/saas_platform_steps.py +572 -0
- icdev/data/features/steps/security_steps.py +236 -0
- icdev/data/features/steps/testing_steps.py +226 -0
- icdev/data/features/testing_pipeline.feature +42 -0
- icdev/data/goals/__init__.py +1 -0
- icdev/data/goals/agent_management.md +144 -0
- icdev/data/goals/agentic_generation.md +345 -0
- icdev/data/goals/agentic_threat_model.md +309 -0
- icdev/data/goals/ai_accountability.md +90 -0
- icdev/data/goals/ai_governance_intake.md +132 -0
- icdev/data/goals/ai_transparency.md +76 -0
- icdev/data/goals/atlas_integration.md +405 -0
- icdev/data/goals/ato_acceleration.md +139 -0
- icdev/data/goals/boundary_supply_chain.md +206 -0
- icdev/data/goals/build_app.md +544 -0
- icdev/data/goals/cicd_integration.md +86 -0
- icdev/data/goals/claude_dir_maintenance.md +77 -0
- icdev/data/goals/cli_capabilities.md +340 -0
- icdev/data/goals/cloud_agnostic.md +312 -0
- icdev/data/goals/code_intelligence.md +197 -0
- icdev/data/goals/code_review.md +94 -0
- icdev/data/goals/compliance_workflow.md +858 -0
- icdev/data/goals/continuous_harmonization.md +140 -0
- icdev/data/goals/cross_language_translation.md +171 -0
- icdev/data/goals/dashboard.md +142 -0
- icdev/data/goals/deploy_workflow.md +390 -0
- icdev/data/goals/devsecops_workflow.md +408 -0
- icdev/data/goals/evolutionary_intelligence.md +305 -0
- icdev/data/goals/external_integration.md +113 -0
- icdev/data/goals/framework_planning.md +63 -0
- icdev/data/goals/init_project.md +235 -0
- icdev/data/goals/innovation_engine.md +199 -0
- icdev/data/goals/integration_testing.md +189 -0
- icdev/data/goals/maintenance_audit.md +196 -0
- icdev/data/goals/manifest.md +56 -0
- icdev/data/goals/mbse_integration.md +504 -0
- icdev/data/goals/modernization_workflow.md +618 -0
- icdev/data/goals/monitoring.md +126 -0
- icdev/data/goals/mosa_workflow.md +463 -0
- icdev/data/goals/multi_agent_orchestration.md +68 -0
- icdev/data/goals/nlq_compliance.md +63 -0
- icdev/data/goals/observability.md +64 -0
- icdev/data/goals/observability_traceability_xai.md +154 -0
- icdev/data/goals/owasp_agentic_security.md +395 -0
- icdev/data/goals/parallel_cicd.md +61 -0
- icdev/data/goals/requirements_intake.md +213 -0
- icdev/data/goals/sbd_ivv_workflow.md +195 -0
- icdev/data/goals/security_categorization.md +133 -0
- icdev/data/goals/security_scan.md +381 -0
- icdev/data/goals/self_healing.md +120 -0
- icdev/data/goals/simulation_engine.md +111 -0
- icdev/data/goals/tdd_workflow.md +403 -0
- icdev/data/goals/zero_trust_architecture.md +403 -0
- icdev/data/hardprompts/__init__.py +1 -0
- icdev/data/hardprompts/agent/__init__.py +1 -0
- icdev/data/hardprompts/agent/agentic_architect.md +100 -0
- icdev/data/hardprompts/agent/debate_prompt.md +32 -0
- icdev/data/hardprompts/agent/fitness_evaluation.md +48 -0
- icdev/data/hardprompts/agent/governance_review.md +214 -0
- icdev/data/hardprompts/agent/reviewer_prompt.md +34 -0
- icdev/data/hardprompts/agent/skill_design.md +172 -0
- icdev/data/hardprompts/agent/task_decomposition.md +275 -0
- icdev/data/hardprompts/agent/veto_check_prompt.md +33 -0
- icdev/data/hardprompts/architect/__init__.py +1 -0
- icdev/data/hardprompts/architect/api_design.md +283 -0
- icdev/data/hardprompts/architect/data_model.md +277 -0
- icdev/data/hardprompts/architect/system_design.md +180 -0
- icdev/data/hardprompts/builder/__init__.py +1 -0
- icdev/data/hardprompts/builder/code_generation.md +59 -0
- icdev/data/hardprompts/builder/refactor.md +58 -0
- icdev/data/hardprompts/builder/scaffold_project.md +69 -0
- icdev/data/hardprompts/builder/test_generation.md +87 -0
- icdev/data/hardprompts/ci/__init__.py +1 -0
- icdev/data/hardprompts/ci/worktree_setup.md +35 -0
- icdev/data/hardprompts/compliance/__init__.py +1 -0
- icdev/data/hardprompts/compliance/cmmc_assessment.md +63 -0
- icdev/data/hardprompts/compliance/cssp_assessment.md +75 -0
- icdev/data/hardprompts/compliance/cui_marking.md +86 -0
- icdev/data/hardprompts/compliance/fedramp_assessment.md +55 -0
- icdev/data/hardprompts/compliance/ivv_assessment.md +96 -0
- icdev/data/hardprompts/compliance/poam_generation.md +57 -0
- icdev/data/hardprompts/compliance/sbd_assessment.md +101 -0
- icdev/data/hardprompts/compliance/security_categorization.md +74 -0
- icdev/data/hardprompts/compliance/ssp_generation.md +56 -0
- icdev/data/hardprompts/compliance/stig_evaluation.md +63 -0
- icdev/data/hardprompts/dashboard/__init__.py +1 -0
- icdev/data/hardprompts/dashboard/nlq_system_prompt.md +26 -0
- icdev/data/hardprompts/infra/__init__.py +1 -0
- icdev/data/hardprompts/infra/k8s_manifests.md +118 -0
- icdev/data/hardprompts/infra/pipeline_generation.md +160 -0
- icdev/data/hardprompts/infra/terraform_generation.md +92 -0
- icdev/data/hardprompts/integration/__init__.py +1 -0
- icdev/data/hardprompts/integration/approval_review.md +17 -0
- icdev/data/hardprompts/integration/jira_mapping.md +25 -0
- icdev/data/hardprompts/integration/servicenow_mapping.md +14 -0
- icdev/data/hardprompts/knowledge/__init__.py +1 -0
- icdev/data/hardprompts/knowledge/pattern_detection.md +73 -0
- icdev/data/hardprompts/knowledge/recommendation_engine.md +90 -0
- icdev/data/hardprompts/knowledge/root_cause_analysis.md +91 -0
- icdev/data/hardprompts/maintenance/__init__.py +1 -0
- icdev/data/hardprompts/maintenance/maintenance_assessment.md +82 -0
- icdev/data/hardprompts/mbse/__init__.py +1 -0
- icdev/data/hardprompts/mbse/digital_thread.md +67 -0
- icdev/data/hardprompts/mbse/model_import.md +62 -0
- icdev/data/hardprompts/mbse/model_to_code.md +65 -0
- icdev/data/hardprompts/modernization/__init__.py +1 -0
- icdev/data/hardprompts/modernization/legacy_analysis.md +93 -0
- icdev/data/hardprompts/modernization/migration_planning.md +150 -0
- icdev/data/hardprompts/modernization/seven_r_assessment.md +107 -0
- icdev/data/hardprompts/requirements/__init__.py +1 -0
- icdev/data/hardprompts/requirements/bdd_generation.md +35 -0
- icdev/data/hardprompts/requirements/clarification_prioritization.md +29 -0
- icdev/data/hardprompts/requirements/decomposition.md +60 -0
- icdev/data/hardprompts/requirements/document_extraction.md +45 -0
- icdev/data/hardprompts/requirements/gap_detection.md +70 -0
- icdev/data/hardprompts/requirements/intake_conversation.md +101 -0
- icdev/data/hardprompts/requirements/readiness_assessment.md +39 -0
- icdev/data/hardprompts/requirements/spec_quality.md +33 -0
- icdev/data/hardprompts/requirements/traceability_analysis.md +23 -0
- icdev/data/hardprompts/security/__init__.py +1 -0
- icdev/data/hardprompts/security/endpoint_security.md +78 -0
- icdev/data/hardprompts/security/threat_model.md +70 -0
- icdev/data/hardprompts/security/vulnerability_assessment.md +81 -0
- icdev/data/hardprompts/simulation/__init__.py +1 -0
- icdev/data/hardprompts/simulation/architecture_impact.md +27 -0
- icdev/data/hardprompts/simulation/coa_alternative.md +27 -0
- icdev/data/hardprompts/simulation/coa_generation.md +25 -0
- icdev/data/hardprompts/simulation/compliance_impact.md +28 -0
- icdev/data/hardprompts/simulation/cost_estimation.md +33 -0
- icdev/data/hardprompts/simulation/risk_assessment.md +28 -0
- icdev/data/hardprompts/translation/code_translation.md +68 -0
- icdev/data/hardprompts/translation/dependency_suggestion.md +44 -0
- icdev/data/hardprompts/translation/test_translation.md +64 -0
- icdev/data/hardprompts/translation/translation_repair.md +59 -0
- icdev/py.typed +0 -0
- icdev/tools/__init__.py +1 -0
- icdev/tools/_gen_formatter.py +12 -0
- icdev/tools/a2a/__init__.py +1 -0
- icdev/tools/a2a/agent_cards/architect.json +43 -0
- icdev/tools/a2a/agent_cards/builder.json +50 -0
- icdev/tools/a2a/agent_cards/compliance.json +57 -0
- icdev/tools/a2a/agent_cards/devsecops.json +71 -0
- icdev/tools/a2a/agent_cards/infra.json +57 -0
- icdev/tools/a2a/agent_cards/integration.json +57 -0
- icdev/tools/a2a/agent_cards/knowledge.json +43 -0
- icdev/tools/a2a/agent_cards/mbse.json +57 -0
- icdev/tools/a2a/agent_cards/modernization.json +50 -0
- icdev/tools/a2a/agent_cards/monitor.json +43 -0
- icdev/tools/a2a/agent_cards/orchestrator.json +36 -0
- icdev/tools/a2a/agent_cards/requirements_analyst.json +64 -0
- icdev/tools/a2a/agent_cards/security.json +50 -0
- icdev/tools/a2a/agent_cards/simulation.json +57 -0
- icdev/tools/a2a/agent_cards/supply_chain.json +50 -0
- icdev/tools/a2a/agent_client.py +349 -0
- icdev/tools/a2a/agent_registry.py +412 -0
- icdev/tools/a2a/agent_server.py +579 -0
- icdev/tools/a2a/task.py +200 -0
- icdev/tools/agent/__init__.py +2 -0
- icdev/tools/agent/a2a_agent_card_generator.py +285 -0
- icdev/tools/agent/a2a_discovery_server.py +250 -0
- icdev/tools/agent/agent_executor.py +529 -0
- icdev/tools/agent/agent_memory.py +557 -0
- icdev/tools/agent/agent_models.py +51 -0
- icdev/tools/agent/atlas_critique.py +908 -0
- icdev/tools/agent/authority.py +443 -0
- icdev/tools/agent/bedrock_client.py +1075 -0
- icdev/tools/agent/collaboration.py +871 -0
- icdev/tools/agent/dispatcher_mode.py +665 -0
- icdev/tools/agent/mailbox.py +575 -0
- icdev/tools/agent/prompt_chain_executor.py +1064 -0
- icdev/tools/agent/session_purpose.py +350 -0
- icdev/tools/agent/skill_router.py +638 -0
- icdev/tools/agent/skill_selector.py +486 -0
- icdev/tools/agent/team_orchestrator.py +1108 -0
- icdev/tools/agent/token_tracker.py +290 -0
- icdev/tools/analysis/__init__.py +1 -0
- icdev/tools/analysis/code_analyzer.py +780 -0
- icdev/tools/analysis/runtime_feedback.py +389 -0
- icdev/tools/audit/__init__.py +1 -0
- icdev/tools/audit/audit_logger.py +196 -0
- icdev/tools/audit/audit_query.py +157 -0
- icdev/tools/audit/decision_recorder.py +72 -0
- icdev/tools/builder/__init__.py +1 -0
- icdev/tools/builder/agentic_fitness.py +534 -0
- icdev/tools/builder/agentic_test_templates/test_a2a_callback.py +117 -0
- icdev/tools/builder/agentic_test_templates/test_a2a_lifecycle.feature +52 -0
- icdev/tools/builder/agentic_test_templates/test_agent_card.feature +37 -0
- icdev/tools/builder/agentic_test_templates/test_agent_health.py +128 -0
- icdev/tools/builder/agentic_test_templates/test_memory_system.feature +50 -0
- icdev/tools/builder/agentic_test_templates/test_skill_execution.feature +40 -0
- icdev/tools/builder/app_blueprint.py +1583 -0
- icdev/tools/builder/child_app_generator.py +2852 -0
- icdev/tools/builder/claude_md_generator.py +1734 -0
- icdev/tools/builder/code_generator.py +3703 -0
- icdev/tools/builder/db_init_generator.py +1709 -0
- icdev/tools/builder/dev_profile_manager.py +954 -0
- icdev/tools/builder/formatter.py +768 -0
- icdev/tools/builder/goal_adapter.py +592 -0
- icdev/tools/builder/gotcha_validator.py +812 -0
- icdev/tools/builder/language_support.py +441 -0
- icdev/tools/builder/linter.py +976 -0
- icdev/tools/builder/profile_detector.py +657 -0
- icdev/tools/builder/profile_md_generator.py +723 -0
- icdev/tools/builder/scaffolder.py +1590 -0
- icdev/tools/builder/scaffolder_extended.py +1771 -0
- icdev/tools/builder/test_writer.py +950 -0
- icdev/tools/ci/__init__.py +2 -0
- icdev/tools/ci/connectors/__init__.py +2 -0
- icdev/tools/ci/connectors/base_connector.py +80 -0
- icdev/tools/ci/connectors/connector_registry.py +188 -0
- icdev/tools/ci/connectors/mattermost_connector.py +159 -0
- icdev/tools/ci/connectors/slack_connector.py +197 -0
- icdev/tools/ci/core/__init__.py +2 -0
- icdev/tools/ci/core/air_gap_detector.py +115 -0
- icdev/tools/ci/core/comment_handler.py +192 -0
- icdev/tools/ci/core/conversation_manager.py +479 -0
- icdev/tools/ci/core/event_envelope.py +500 -0
- icdev/tools/ci/core/event_router.py +443 -0
- icdev/tools/ci/core/failure_parser.py +397 -0
- icdev/tools/ci/core/recovery_engine.py +527 -0
- icdev/tools/ci/modules/__init__.py +2 -0
- icdev/tools/ci/modules/agent.py +271 -0
- icdev/tools/ci/modules/git_ops.py +175 -0
- icdev/tools/ci/modules/state.py +117 -0
- icdev/tools/ci/modules/vcs.py +303 -0
- icdev/tools/ci/modules/workflow_ops.py +295 -0
- icdev/tools/ci/modules/worktree.py +340 -0
- icdev/tools/ci/pipeline_config_generator.py +558 -0
- icdev/tools/ci/triggers/__init__.py +2 -0
- icdev/tools/ci/triggers/gitlab_task_monitor.py +330 -0
- icdev/tools/ci/triggers/poll_trigger.py +237 -0
- icdev/tools/ci/triggers/webhook_server.py +356 -0
- icdev/tools/ci/workflows/__init__.py +2 -0
- icdev/tools/ci/workflows/icdev_build.py +140 -0
- icdev/tools/ci/workflows/icdev_comply.py +284 -0
- icdev/tools/ci/workflows/icdev_document.py +152 -0
- icdev/tools/ci/workflows/icdev_e2e.py +188 -0
- icdev/tools/ci/workflows/icdev_patch.py +186 -0
- icdev/tools/ci/workflows/icdev_plan.py +202 -0
- icdev/tools/ci/workflows/icdev_plan_build.py +41 -0
- icdev/tools/ci/workflows/icdev_plan_build_test.py +46 -0
- icdev/tools/ci/workflows/icdev_plan_build_test_review.py +47 -0
- icdev/tools/ci/workflows/icdev_review.py +126 -0
- icdev/tools/ci/workflows/icdev_sdlc.py +261 -0
- icdev/tools/ci/workflows/icdev_test.py +240 -0
- icdev/tools/cli/__init__.py +1 -0
- icdev/tools/cli/output_formatter.py +756 -0
- icdev/tools/cli_formatter.py +42 -0
- icdev/tools/cloud/__init__.py +11 -0
- icdev/tools/cloud/cloud_mode_manager.py +364 -0
- icdev/tools/cloud/csp_changelog.py +383 -0
- icdev/tools/cloud/csp_health_checker.py +268 -0
- icdev/tools/cloud/csp_monitor.py +951 -0
- icdev/tools/cloud/iam_provider.py +593 -0
- icdev/tools/cloud/kms_provider.py +346 -0
- icdev/tools/cloud/monitoring_provider.py +628 -0
- icdev/tools/cloud/provider_factory.py +376 -0
- icdev/tools/cloud/region_validator.py +345 -0
- icdev/tools/cloud/registry_provider.py +563 -0
- icdev/tools/cloud/secrets_provider.py +486 -0
- icdev/tools/cloud/storage_provider.py +446 -0
- icdev/tools/compat/__init__.py +21 -0
- icdev/tools/compat/cli_harmonizer.py +251 -0
- icdev/tools/compat/datetime_utils.py +18 -0
- icdev/tools/compat/db_utils.py +160 -0
- icdev/tools/compat/platform_utils.py +123 -0
- icdev/tools/compliance/__init__.py +1 -0
- icdev/tools/compliance/accountability_manager.py +397 -0
- icdev/tools/compliance/ai_accountability_audit.py +294 -0
- icdev/tools/compliance/ai_impact_assessor.py +273 -0
- icdev/tools/compliance/ai_incident_response.py +301 -0
- icdev/tools/compliance/ai_inventory_manager.py +239 -0
- icdev/tools/compliance/ai_reassessment_scheduler.py +256 -0
- icdev/tools/compliance/ai_transparency_audit.py +248 -0
- icdev/tools/compliance/atlas_assessor.py +278 -0
- icdev/tools/compliance/atlas_report_generator.py +1211 -0
- icdev/tools/compliance/base_assessor.py +597 -0
- icdev/tools/compliance/cato_monitor.py +1385 -0
- icdev/tools/compliance/cato_scheduler.py +699 -0
- icdev/tools/compliance/cjis_assessor.py +76 -0
- icdev/tools/compliance/classification_manager.py +1353 -0
- icdev/tools/compliance/cmmc_assessor.py +1491 -0
- icdev/tools/compliance/cmmc_report_generator.py +1100 -0
- icdev/tools/compliance/compliance_detector.py +463 -0
- icdev/tools/compliance/compliance_exporter.py +427 -0
- icdev/tools/compliance/compliance_status.py +825 -0
- icdev/tools/compliance/control_mapper.py +505 -0
- icdev/tools/compliance/crosswalk_engine.py +1203 -0
- icdev/tools/compliance/cssp_assessor.py +1045 -0
- icdev/tools/compliance/cssp_evidence_collector.py +729 -0
- icdev/tools/compliance/cssp_report_generator.py +1116 -0
- icdev/tools/compliance/cui_marker.py +388 -0
- icdev/tools/compliance/diagram_validator.py +600 -0
- icdev/tools/compliance/emass/__init__.py +2 -0
- icdev/tools/compliance/emass/emass_client.py +840 -0
- icdev/tools/compliance/emass/emass_export.py +777 -0
- icdev/tools/compliance/emass/emass_sync.py +826 -0
- icdev/tools/compliance/eu_ai_act_classifier.py +194 -0
- icdev/tools/compliance/evidence_collector.py +468 -0
- icdev/tools/compliance/fairness_assessor.py +316 -0
- icdev/tools/compliance/fedramp_assessor.py +1808 -0
- icdev/tools/compliance/fedramp_authorization_packager.py +137 -0
- icdev/tools/compliance/fedramp_ksi_generator.py +355 -0
- icdev/tools/compliance/fedramp_report_generator.py +1128 -0
- icdev/tools/compliance/fips199_categorizer.py +881 -0
- icdev/tools/compliance/fips200_validator.py +315 -0
- icdev/tools/compliance/gao_ai_assessor.py +231 -0
- icdev/tools/compliance/gao_evidence_builder.py +308 -0
- icdev/tools/compliance/hipaa_assessor.py +78 -0
- icdev/tools/compliance/hitrust_assessor.py +49 -0
- icdev/tools/compliance/incident_response_plan.py +718 -0
- icdev/tools/compliance/iso27001_assessor.py +92 -0
- icdev/tools/compliance/iso42001_assessor.py +114 -0
- icdev/tools/compliance/ivv_assessor.py +2327 -0
- icdev/tools/compliance/ivv_report_generator.py +1662 -0
- icdev/tools/compliance/model_card_generator.py +297 -0
- icdev/tools/compliance/mosa_assessor.py +117 -0
- icdev/tools/compliance/multi_regime_assessor.py +451 -0
- icdev/tools/compliance/narrative_generator.py +1013 -0
- icdev/tools/compliance/nist_800_207_assessor.py +191 -0
- icdev/tools/compliance/nist_ai_600_1_assessor.py +188 -0
- icdev/tools/compliance/nist_ai_rmf_assessor.py +110 -0
- icdev/tools/compliance/nist_lookup.py +245 -0
- icdev/tools/compliance/omb_m25_21_assessor.py +228 -0
- icdev/tools/compliance/omb_m26_04_assessor.py +188 -0
- icdev/tools/compliance/oscal_catalog_adapter.py +395 -0
- icdev/tools/compliance/oscal_generator.py +2170 -0
- icdev/tools/compliance/oscal_tools.py +1182 -0
- icdev/tools/compliance/owasp_agentic_assessor.py +226 -0
- icdev/tools/compliance/owasp_asi_assessor.py +200 -0
- icdev/tools/compliance/owasp_llm_assessor.py +244 -0
- icdev/tools/compliance/pci_dss_assessor.py +80 -0
- icdev/tools/compliance/pi_compliance_tracker.py +1461 -0
- icdev/tools/compliance/poam_generator.py +405 -0
- icdev/tools/compliance/resolve_marking.py +283 -0
- icdev/tools/compliance/sbd_assessor.py +2068 -0
- icdev/tools/compliance/sbd_report_generator.py +1236 -0
- icdev/tools/compliance/sbom_generator.py +1008 -0
- icdev/tools/compliance/siem_config_generator.py +674 -0
- icdev/tools/compliance/slsa_attestation_generator.py +490 -0
- icdev/tools/compliance/soc2_assessor.py +77 -0
- icdev/tools/compliance/ssp_generator.py +573 -0
- icdev/tools/compliance/stig_checker.py +727 -0
- icdev/tools/compliance/swft_evidence_bundler.py +337 -0
- icdev/tools/compliance/system_card_generator.py +309 -0
- icdev/tools/compliance/traceability_matrix.py +1281 -0
- icdev/tools/compliance/universal_classification_manager.py +1172 -0
- icdev/tools/compliance/xacta/__init__.py +2 -0
- icdev/tools/compliance/xacta/xacta_client.py +449 -0
- icdev/tools/compliance/xacta/xacta_export.py +557 -0
- icdev/tools/compliance/xacta/xacta_sync.py +333 -0
- icdev/tools/compliance/xai_assessor.py +231 -0
- icdev/tools/dashboard/__init__.py +1 -0
- icdev/tools/dashboard/api/__init__.py +1 -0
- icdev/tools/dashboard/api/_pipeline_state.py +17 -0
- icdev/tools/dashboard/api/activity.py +206 -0
- icdev/tools/dashboard/api/admin.py +176 -0
- icdev/tools/dashboard/api/agents.py +53 -0
- icdev/tools/dashboard/api/ai_accountability.py +163 -0
- icdev/tools/dashboard/api/ai_transparency.py +198 -0
- icdev/tools/dashboard/api/audit.py +58 -0
- icdev/tools/dashboard/api/batch.py +666 -0
- icdev/tools/dashboard/api/chat.py +241 -0
- icdev/tools/dashboard/api/cicd.py +219 -0
- icdev/tools/dashboard/api/code_quality.py +223 -0
- icdev/tools/dashboard/api/compliance.py +171 -0
- icdev/tools/dashboard/api/cpmp.py +915 -0
- icdev/tools/dashboard/api/diagrams.py +65 -0
- icdev/tools/dashboard/api/events.py +250 -0
- icdev/tools/dashboard/api/evidence.py +99 -0
- icdev/tools/dashboard/api/fedramp_20x.py +77 -0
- icdev/tools/dashboard/api/govcon.py +1095 -0
- icdev/tools/dashboard/api/intake.py +1171 -0
- icdev/tools/dashboard/api/lineage.py +163 -0
- icdev/tools/dashboard/api/metrics.py +155 -0
- icdev/tools/dashboard/api/nlq.py +72 -0
- icdev/tools/dashboard/api/orchestration.py +472 -0
- icdev/tools/dashboard/api/oscal.py +183 -0
- icdev/tools/dashboard/api/prod_audit.py +183 -0
- icdev/tools/dashboard/api/projects.py +191 -0
- icdev/tools/dashboard/api/proposals.py +1084 -0
- icdev/tools/dashboard/api/traces.py +363 -0
- icdev/tools/dashboard/api/usage.py +234 -0
- icdev/tools/dashboard/app.py +1986 -0
- icdev/tools/dashboard/auth.py +500 -0
- icdev/tools/dashboard/byok.py +245 -0
- icdev/tools/dashboard/chat_manager.py +675 -0
- icdev/tools/dashboard/config.py +116 -0
- icdev/tools/dashboard/diagram_definitions.py +642 -0
- icdev/tools/dashboard/nlq_processor.py +323 -0
- icdev/tools/dashboard/phase_loader.py +136 -0
- icdev/tools/dashboard/sse_manager.py +89 -0
- icdev/tools/dashboard/state_tracker.py +267 -0
- icdev/tools/dashboard/static/css/style.css +706 -0
- icdev/tools/dashboard/static/css/ux.css +2047 -0
- icdev/tools/dashboard/static/js/activity.js +322 -0
- icdev/tools/dashboard/static/js/api.js +161 -0
- icdev/tools/dashboard/static/js/batch.js +814 -0
- icdev/tools/dashboard/static/js/charts.js +618 -0
- icdev/tools/dashboard/static/js/chat.js +1514 -0
- icdev/tools/dashboard/static/js/kanban.js +113 -0
- icdev/tools/dashboard/static/js/live.js +569 -0
- icdev/tools/dashboard/static/js/mermaid-icdev.js +332 -0
- icdev/tools/dashboard/static/js/proposals.js +588 -0
- icdev/tools/dashboard/static/js/shortcuts.js +544 -0
- icdev/tools/dashboard/static/js/tables.js +652 -0
- icdev/tools/dashboard/static/js/tour.js +524 -0
- icdev/tools/dashboard/static/js/ux.js +942 -0
- icdev/tools/dashboard/templates/404.html +10 -0
- icdev/tools/dashboard/templates/activity.html +80 -0
- icdev/tools/dashboard/templates/admin/users.html +144 -0
- icdev/tools/dashboard/templates/ai_accountability.html +235 -0
- icdev/tools/dashboard/templates/ai_transparency.html +263 -0
- icdev/tools/dashboard/templates/base.html +104 -0
- icdev/tools/dashboard/templates/batch.html +23 -0
- icdev/tools/dashboard/templates/chat.html +332 -0
- icdev/tools/dashboard/templates/children.html +149 -0
- icdev/tools/dashboard/templates/cicd.html +253 -0
- icdev/tools/dashboard/templates/code_quality.html +214 -0
- icdev/tools/dashboard/templates/cpmp/cor_detail.html +220 -0
- icdev/tools/dashboard/templates/cpmp/cor_portal.html +91 -0
- icdev/tools/dashboard/templates/cpmp/deliverable_detail.html +197 -0
- icdev/tools/dashboard/templates/cpmp/detail.html +578 -0
- icdev/tools/dashboard/templates/cpmp/portfolio.html +202 -0
- icdev/tools/dashboard/templates/dev_profiles.html +304 -0
- icdev/tools/dashboard/templates/diagrams.html +224 -0
- icdev/tools/dashboard/templates/events/timeline.html +232 -0
- icdev/tools/dashboard/templates/evidence.html +134 -0
- icdev/tools/dashboard/templates/fedramp_20x.html +207 -0
- icdev/tools/dashboard/templates/gateway.html +244 -0
- icdev/tools/dashboard/templates/govcon/capabilities.html +135 -0
- icdev/tools/dashboard/templates/govcon/pipeline.html +214 -0
- icdev/tools/dashboard/templates/govcon/requirements.html +120 -0
- icdev/tools/dashboard/templates/index.html +254 -0
- icdev/tools/dashboard/templates/lineage.html +141 -0
- icdev/tools/dashboard/templates/login.html +51 -0
- icdev/tools/dashboard/templates/monitoring/overview.html +193 -0
- icdev/tools/dashboard/templates/orchestration/dashboard.html +545 -0
- icdev/tools/dashboard/templates/oscal.html +263 -0
- icdev/tools/dashboard/templates/phases.html +150 -0
- icdev/tools/dashboard/templates/prod_audit.html +280 -0
- icdev/tools/dashboard/templates/profile.html +183 -0
- icdev/tools/dashboard/templates/projects/detail.html +583 -0
- icdev/tools/dashboard/templates/projects/list.html +47 -0
- icdev/tools/dashboard/templates/proposals/detail.html +1253 -0
- icdev/tools/dashboard/templates/proposals/list.html +179 -0
- icdev/tools/dashboard/templates/proposals/section_detail.html +193 -0
- icdev/tools/dashboard/templates/provenance.html +181 -0
- icdev/tools/dashboard/templates/query/nlq.html +234 -0
- icdev/tools/dashboard/templates/quick_paths.html +69 -0
- icdev/tools/dashboard/templates/traces.html +155 -0
- icdev/tools/dashboard/templates/translation_detail.html +199 -0
- icdev/tools/dashboard/templates/translations.html +162 -0
- icdev/tools/dashboard/templates/usage.html +225 -0
- icdev/tools/dashboard/templates/wizard.html +539 -0
- icdev/tools/dashboard/templates/xai.html +208 -0
- icdev/tools/dashboard/ux_helpers.py +962 -0
- icdev/tools/dashboard/websocket.py +81 -0
- icdev/tools/db/__init__.py +1 -0
- icdev/tools/db/backup.py +312 -0
- icdev/tools/db/backup_manager.py +832 -0
- icdev/tools/db/init_icdev_db.py +5900 -0
- icdev/tools/db/migrate.py +178 -0
- icdev/tools/db/migration_runner.py +549 -0
- icdev/tools/db/migrations/001_baseline/meta.json +9 -0
- icdev/tools/db/migrations/001_baseline/up.py +68 -0
- icdev/tools/db/migrations/002_memory_enhancements/down.sql +8 -0
- icdev/tools/db/migrations/002_memory_enhancements/meta.json +9 -0
- icdev/tools/db/migrations/002_memory_enhancements/up.py +118 -0
- icdev/tools/db/migrations/003_dev_profiles/meta.json +8 -0
- icdev/tools/db/migrations/003_dev_profiles/up.py +93 -0
- icdev/tools/db/migrations/004_innovation_engine/down.py +19 -0
- icdev/tools/db/migrations/004_innovation_engine/up.py +227 -0
- icdev/tools/db/migrations/005_phase_37_ai_security/down.py +19 -0
- icdev/tools/db/migrations/005_phase_37_ai_security/up.py +258 -0
- icdev/tools/db/migrations/006_phase_36_evolution/down.py +21 -0
- icdev/tools/db/migrations/006_phase_36_evolution/up.py +323 -0
- icdev/tools/db/migrations/007_phase_38_cloud/down.py +14 -0
- icdev/tools/db/migrations/007_phase_38_cloud/up.py +110 -0
- icdev/tools/db/migrations/008_phase36_37_integration/up.py +55 -0
- icdev/tools/db/migrations/__init__.py +2 -0
- icdev/tools/devsecops/__init__.py +2 -0
- icdev/tools/devsecops/attestation_manager.py +458 -0
- icdev/tools/devsecops/network_segmentation_generator.py +614 -0
- icdev/tools/devsecops/pdp_config_generator.py +1256 -0
- icdev/tools/devsecops/pipeline_security_generator.py +484 -0
- icdev/tools/devsecops/policy_generator.py +653 -0
- icdev/tools/devsecops/profile_manager.py +388 -0
- icdev/tools/devsecops/service_mesh_generator.py +1073 -0
- icdev/tools/devsecops/zta_maturity_scorer.py +368 -0
- icdev/tools/devsecops/zta_terraform_generator.py +1303 -0
- icdev/tools/dx/__init__.py +3 -0
- icdev/tools/dx/companion.py +266 -0
- icdev/tools/dx/instruction_generator.py +753 -0
- icdev/tools/dx/mcp_config_generator.py +282 -0
- icdev/tools/dx/skill_translator.py +425 -0
- icdev/tools/dx/tool_detector.py +144 -0
- icdev/tools/extensions/__init__.py +21 -0
- icdev/tools/extensions/builtins/010_ai_governance_chat.py +277 -0
- icdev/tools/extensions/builtins/__init__.py +2 -0
- icdev/tools/extensions/extension_manager.py +455 -0
- icdev/tools/infra/__init__.py +1 -0
- icdev/tools/infra/ansible_generator.py +869 -0
- icdev/tools/infra/dockerfile_generator.py +361 -0
- icdev/tools/infra/infra_status.py +393 -0
- icdev/tools/infra/ironbank_metadata_generator.py +411 -0
- icdev/tools/infra/k8s_generator.py +1002 -0
- icdev/tools/infra/pipeline_generator.py +832 -0
- icdev/tools/infra/rollback.py +400 -0
- icdev/tools/infra/terraform_generator.py +1142 -0
- icdev/tools/infra/terraform_generator_azure.py +1254 -0
- icdev/tools/infra/terraform_generator_gcp.py +953 -0
- icdev/tools/infra/terraform_generator_ibm.py +360 -0
- icdev/tools/infra/terraform_generator_oci.py +919 -0
- icdev/tools/infra/terraform_generator_onprem.py +319 -0
- icdev/tools/innovation/__init__.py +8 -0
- icdev/tools/innovation/competitive_intel.py +492 -0
- icdev/tools/innovation/innovation_manager.py +681 -0
- icdev/tools/innovation/introspective_analyzer.py +774 -0
- icdev/tools/innovation/register_external_patterns.py +440 -0
- icdev/tools/innovation/signal_ranker.py +1038 -0
- icdev/tools/innovation/solution_generator.py +697 -0
- icdev/tools/innovation/standards_monitor.py +466 -0
- icdev/tools/innovation/trend_detector.py +1046 -0
- icdev/tools/innovation/triage_engine.py +1149 -0
- icdev/tools/innovation/web_scanner.py +894 -0
- icdev/tools/installer/__init__.py +1 -0
- icdev/tools/installer/compliance_configurator.py +637 -0
- icdev/tools/installer/installer.py +1711 -0
- icdev/tools/installer/module_registry.py +805 -0
- icdev/tools/installer/platform_setup.py +961 -0
- icdev/tools/integration/__init__.py +2 -0
- icdev/tools/integration/approval_manager.py +561 -0
- icdev/tools/integration/doors_exporter.py +627 -0
- icdev/tools/integration/gitlab_connector.py +784 -0
- icdev/tools/integration/jira_connector.py +774 -0
- icdev/tools/integration/servicenow_connector.py +693 -0
- icdev/tools/knowledge/__init__.py +1 -0
- icdev/tools/knowledge/knowledge_ingest.py +293 -0
- icdev/tools/knowledge/pattern_detector.py +693 -0
- icdev/tools/knowledge/recommendation_engine.py +461 -0
- icdev/tools/knowledge/self_heal_analyzer.py +504 -0
- icdev/tools/llm/__init__.py +72 -0
- icdev/tools/llm/anthropic_provider.py +170 -0
- icdev/tools/llm/azure_openai_provider.py +338 -0
- icdev/tools/llm/bedrock_provider.py +315 -0
- icdev/tools/llm/embedding_provider.py +438 -0
- icdev/tools/llm/gemini_provider.py +381 -0
- icdev/tools/llm/ibm_watsonx_provider.py +232 -0
- icdev/tools/llm/oci_genai_provider.py +462 -0
- icdev/tools/llm/ollama_provider.py +340 -0
- icdev/tools/llm/openai_provider.py +225 -0
- icdev/tools/llm/provider.py +355 -0
- icdev/tools/llm/provider_sdk.py +175 -0
- icdev/tools/llm/router.py +780 -0
- icdev/tools/llm/vertex_ai_provider.py +374 -0
- icdev/tools/maintenance/__init__.py +2 -0
- icdev/tools/maintenance/dependency_scanner.py +1030 -0
- icdev/tools/maintenance/maintenance_auditor.py +815 -0
- icdev/tools/maintenance/remediation_engine.py +966 -0
- icdev/tools/maintenance/vulnerability_checker.py +987 -0
- icdev/tools/mbse/__init__.py +3 -0
- icdev/tools/mbse/des_assessor.py +1186 -0
- icdev/tools/mbse/des_report_generator.py +800 -0
- icdev/tools/mbse/diagram_extractor.py +811 -0
- icdev/tools/mbse/digital_thread.py +1665 -0
- icdev/tools/mbse/model_code_generator.py +1122 -0
- icdev/tools/mbse/model_control_mapper.py +420 -0
- icdev/tools/mbse/pi_model_tracker.py +1093 -0
- icdev/tools/mbse/reqif_parser.py +1483 -0
- icdev/tools/mbse/sync_engine.py +1805 -0
- icdev/tools/mbse/xmi_parser.py +1573 -0
- icdev/tools/mcp/__init__.py +1 -0
- icdev/tools/mcp/base_server.py +535 -0
- icdev/tools/mcp/builder_server.py +725 -0
- icdev/tools/mcp/compliance_server.py +1407 -0
- icdev/tools/mcp/context_indexer.py +199 -0
- icdev/tools/mcp/context_server.py +305 -0
- icdev/tools/mcp/core_server.py +679 -0
- icdev/tools/mcp/devsecops_server.py +432 -0
- icdev/tools/mcp/gap_handlers.py +1079 -0
- icdev/tools/mcp/gateway_server.py +339 -0
- icdev/tools/mcp/generate_registry.py +623 -0
- icdev/tools/mcp/infra_server.py +264 -0
- icdev/tools/mcp/innovation_server.py +316 -0
- icdev/tools/mcp/integration_server.py +527 -0
- icdev/tools/mcp/knowledge_server.py +429 -0
- icdev/tools/mcp/maintenance_server.py +248 -0
- icdev/tools/mcp/marketplace_server.py +499 -0
- icdev/tools/mcp/mbse_server.py +398 -0
- icdev/tools/mcp/modernization_server.py +496 -0
- icdev/tools/mcp/observability_server.py +354 -0
- icdev/tools/mcp/requirements_server.py +415 -0
- icdev/tools/mcp/simulation_server.py +468 -0
- icdev/tools/mcp/standalone/__init__.py +2 -0
- icdev/tools/mcp/standalone/builder.py +59 -0
- icdev/tools/mcp/standalone/compliance.py +59 -0
- icdev/tools/mcp/standalone/core.py +59 -0
- icdev/tools/mcp/standalone/knowledge.py +59 -0
- icdev/tools/mcp/standalone/maintenance.py +59 -0
- icdev/tools/mcp/supply_chain_server.py +476 -0
- icdev/tools/mcp/tool_registry.py +2008 -0
- icdev/tools/mcp/unified_server.py +158 -0
- icdev/tools/memory/__init__.py +2 -0
- icdev/tools/memory/auto_capture.py +347 -0
- icdev/tools/memory/embed_memory.py +158 -0
- icdev/tools/memory/history_compressor.py +334 -0
- icdev/tools/memory/hybrid_search.py +236 -0
- icdev/tools/memory/maintenance_cron.py +289 -0
- icdev/tools/memory/memory_consolidation.py +444 -0
- icdev/tools/memory/memory_db.py +133 -0
- icdev/tools/memory/memory_read.py +102 -0
- icdev/tools/memory/memory_write.py +222 -0
- icdev/tools/memory/semantic_search.py +139 -0
- icdev/tools/memory/time_decay.py +435 -0
- icdev/tools/modernization/__init__.py +3 -0
- icdev/tools/modernization/architecture_extractor.py +734 -0
- icdev/tools/modernization/compliance_bridge.py +1499 -0
- icdev/tools/modernization/db_migration_planner.py +1385 -0
- icdev/tools/modernization/doc_generator.py +1428 -0
- icdev/tools/modernization/framework_migrator.py +1525 -0
- icdev/tools/modernization/legacy_analyzer.py +1948 -0
- icdev/tools/modernization/migration_code_generator.py +1639 -0
- icdev/tools/modernization/migration_report_generator.py +1653 -0
- icdev/tools/modernization/migration_tracker.py +1726 -0
- icdev/tools/modernization/monolith_decomposer.py +1508 -0
- icdev/tools/modernization/seven_r_assessor.py +1658 -0
- icdev/tools/modernization/strangler_fig_manager.py +1705 -0
- icdev/tools/modernization/ui_analyzer.py +771 -0
- icdev/tools/modernization/version_migrator.py +1392 -0
- icdev/tools/monitor/__init__.py +1 -0
- icdev/tools/monitor/alert_correlator.py +495 -0
- icdev/tools/monitor/auto_resolver.py +612 -0
- icdev/tools/monitor/health_checker.py +509 -0
- icdev/tools/monitor/heartbeat_daemon.py +792 -0
- icdev/tools/monitor/log_analyzer.py +516 -0
- icdev/tools/monitor/metric_collector.py +496 -0
- icdev/tools/mosa/__init__.py +10 -0
- icdev/tools/mosa/icd_generator.py +370 -0
- icdev/tools/mosa/modular_design_analyzer.py +683 -0
- icdev/tools/mosa/mosa_code_enforcer.py +349 -0
- icdev/tools/mosa/tsp_generator.py +265 -0
- icdev/tools/observability/__init__.py +100 -0
- icdev/tools/observability/genai_attributes.py +88 -0
- icdev/tools/observability/instrumentation.py +140 -0
- icdev/tools/observability/mlflow_exporter.py +194 -0
- icdev/tools/observability/otel_tracer.py +168 -0
- icdev/tools/observability/provenance/__init__.py +3 -0
- icdev/tools/observability/provenance/prov_recorder.py +324 -0
- icdev/tools/observability/shap/__init__.py +3 -0
- icdev/tools/observability/shap/agent_shap.py +275 -0
- icdev/tools/observability/sqlite_tracer.py +361 -0
- icdev/tools/observability/trace_context.py +205 -0
- icdev/tools/observability/tracer.py +230 -0
- icdev/tools/orchestration/__init__.py +2 -0
- icdev/tools/orchestration/workflow_composer.py +361 -0
- icdev/tools/project/__init__.py +1 -0
- icdev/tools/project/manifest_loader.py +418 -0
- icdev/tools/project/project_create.py +350 -0
- icdev/tools/project/project_list.py +174 -0
- icdev/tools/project/project_scaffold.py +1715 -0
- icdev/tools/project/project_status.py +479 -0
- icdev/tools/project/session_context_builder.py +757 -0
- icdev/tools/project/validate_manifest.py +55 -0
- icdev/tools/registry/__init__.py +10 -0
- icdev/tools/registry/absorption_engine.py +832 -0
- icdev/tools/registry/capability_evaluator.py +668 -0
- icdev/tools/registry/child_registry.py +617 -0
- icdev/tools/registry/cross_pollinator.py +1065 -0
- icdev/tools/registry/genome_manager.py +671 -0
- icdev/tools/registry/learning_collector.py +912 -0
- icdev/tools/registry/propagation_manager.py +942 -0
- icdev/tools/registry/staging_manager.py +742 -0
- icdev/tools/registry/telemetry_collector.py +423 -0
- icdev/tools/requirements/__init__.py +1 -0
- icdev/tools/requirements/ai_governance_scorer.py +208 -0
- icdev/tools/requirements/boundary_analyzer.py +1293 -0
- icdev/tools/requirements/clarification_engine.py +618 -0
- icdev/tools/requirements/complexity_scorer.py +387 -0
- icdev/tools/requirements/consistency_analyzer.py +803 -0
- icdev/tools/requirements/constitution_manager.py +605 -0
- icdev/tools/requirements/decomposition_engine.py +778 -0
- icdev/tools/requirements/document_extractor.py +1016 -0
- icdev/tools/requirements/elicitation_techniques.py +519 -0
- icdev/tools/requirements/gap_detector.py +271 -0
- icdev/tools/requirements/intake_engine.py +2188 -0
- icdev/tools/requirements/prd_generator.py +847 -0
- icdev/tools/requirements/prd_validator.py +595 -0
- icdev/tools/requirements/readiness_scorer.py +313 -0
- icdev/tools/requirements/spec_organizer.py +1029 -0
- icdev/tools/requirements/spec_quality_checker.py +1097 -0
- icdev/tools/requirements/traceability_builder.py +579 -0
- icdev/tools/resilience/__init__.py +34 -0
- icdev/tools/resilience/circuit_breaker.py +340 -0
- icdev/tools/resilience/correlation.py +150 -0
- icdev/tools/resilience/errors.py +81 -0
- icdev/tools/resilience/retry.py +95 -0
- icdev/tools/schemas/__init__.py +27 -0
- icdev/tools/schemas/chat.py +61 -0
- icdev/tools/schemas/compliance.py +56 -0
- icdev/tools/schemas/core.py +85 -0
- icdev/tools/schemas/innovation.py +37 -0
- icdev/tools/schemas/validation.py +109 -0
- icdev/tools/sdk/__init__.py +3 -0
- icdev/tools/sdk/icdev_client.py +218 -0
- icdev/tools/security/__init__.py +1 -0
- icdev/tools/security/agent_output_validator.py +330 -0
- icdev/tools/security/agent_trust_scorer.py +466 -0
- icdev/tools/security/ai_bom_generator.py +725 -0
- icdev/tools/security/ai_telemetry_logger.py +469 -0
- icdev/tools/security/atlas_red_team.py +543 -0
- icdev/tools/security/code_pattern_scanner.py +378 -0
- icdev/tools/security/confabulation_detector.py +271 -0
- icdev/tools/security/container_scanner.py +491 -0
- icdev/tools/security/dependency_auditor.py +944 -0
- icdev/tools/security/endpoint_security_scanner.py +579 -0
- icdev/tools/security/mcp_tool_authorizer.py +243 -0
- icdev/tools/security/prompt_injection_detector.py +737 -0
- icdev/tools/security/sast_runner.py +948 -0
- icdev/tools/security/secret_detector.py +378 -0
- icdev/tools/security/tool_chain_validator.py +357 -0
- icdev/tools/security/vuln_scanner.py +539 -0
- icdev/tools/simulation/__init__.py +2 -0
- icdev/tools/simulation/coa_generator.py +1552 -0
- icdev/tools/simulation/monte_carlo.py +758 -0
- icdev/tools/simulation/scenario_manager.py +1073 -0
- icdev/tools/simulation/simulation_engine.py +1104 -0
- icdev/tools/supply_chain/__init__.py +2 -0
- icdev/tools/supply_chain/cve_triager.py +705 -0
- icdev/tools/supply_chain/dependency_graph.py +645 -0
- icdev/tools/supply_chain/isa_manager.py +540 -0
- icdev/tools/supply_chain/scrm_assessor.py +546 -0
- icdev/tools/testing/__init__.py +2 -0
- icdev/tools/testing/acceptance_validator.py +411 -0
- icdev/tools/testing/claude_dir_validator.py +831 -0
- icdev/tools/testing/data_types.py +199 -0
- icdev/tools/testing/e2e_runner.py +715 -0
- icdev/tools/testing/fuzz_cli.py +306 -0
- icdev/tools/testing/health_check.py +483 -0
- icdev/tools/testing/platform_check.py +143 -0
- icdev/tools/testing/production_audit.py +1862 -0
- icdev/tools/testing/production_remediate.py +804 -0
- icdev/tools/testing/screenshot_validator.py +539 -0
- icdev/tools/testing/smoke_test.py +283 -0
- icdev/tools/testing/test_agent_models.py +117 -0
- icdev/tools/testing/test_orchestrator.py +957 -0
- icdev/tools/testing/utils.py +229 -0
- icdev/tools/translation/__init__.py +17 -0
- icdev/tools/translation/code_translator.py +550 -0
- icdev/tools/translation/dependency_mapper.py +277 -0
- icdev/tools/translation/feature_map.py +395 -0
- icdev/tools/translation/project_assembler.py +439 -0
- icdev/tools/translation/source_extractor.py +609 -0
- icdev/tools/translation/test_translator.py +333 -0
- icdev/tools/translation/translation_manager.py +582 -0
- icdev/tools/translation/translation_validator.py +662 -0
- icdev/tools/translation/type_checker.py +371 -0
- icdev-1.0.0.dist-info/METADATA +868 -0
- icdev-1.0.0.dist-info/RECORD +1105 -0
- icdev-1.0.0.dist-info/WHEEL +5 -0
- icdev-1.0.0.dist-info/entry_points.txt +9 -0
- icdev-1.0.0.dist-info/licenses/LICENSE +254 -0
- icdev-1.0.0.dist-info/licenses/NOTICE +268 -0
- icdev-1.0.0.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,258 @@
|
|
|
1
|
+
{
|
|
2
|
+
"metadata": {
|
|
3
|
+
"title": "NIST SP 800-207 Zero Trust Architecture Control Catalog",
|
|
4
|
+
"source": "NIST Special Publication 800-207, Zero Trust Architecture (August 2020)",
|
|
5
|
+
"classification": "CUI // SP-CTI",
|
|
6
|
+
"version": "1.0",
|
|
7
|
+
"last_updated": "2026-02-18",
|
|
8
|
+
"description": "NIST SP 800-207 Zero Trust Architecture requirements catalog covering 8 ZTA pillars plus foundational architecture principles. Zero Trust assumes no implicit trust is granted to assets or user accounts based solely on their physical or network location. Each requirement maps to NIST 800-53 Rev 5 controls via crosswalk, enabling integration with the ICDEV dual-hub compliance model (ADR D111)."
|
|
9
|
+
},
|
|
10
|
+
"families": [
|
|
11
|
+
{
|
|
12
|
+
"code": "ZTA-ARCH",
|
|
13
|
+
"name": "Architecture & Design Principles",
|
|
14
|
+
"requirement_count": 4,
|
|
15
|
+
"description": "Foundational ZTA architecture principles governing policy engine design, risk-based access decision making, least privilege enforcement, and overall zero trust system design documentation"
|
|
16
|
+
},
|
|
17
|
+
{
|
|
18
|
+
"code": "ZTA-ID",
|
|
19
|
+
"name": "User/Identity Pillar",
|
|
20
|
+
"requirement_count": 4,
|
|
21
|
+
"description": "Identity-centric controls ensuring strong verification, multi-factor authentication, identity governance, and privileged access management as the primary perimeter in a zero trust architecture"
|
|
22
|
+
},
|
|
23
|
+
{
|
|
24
|
+
"code": "ZTA-DEV",
|
|
25
|
+
"name": "Device Pillar",
|
|
26
|
+
"requirement_count": 3,
|
|
27
|
+
"description": "Device trust controls covering asset inventory, device health attestation, and endpoint protection to ensure only known and healthy devices can access enterprise resources"
|
|
28
|
+
},
|
|
29
|
+
{
|
|
30
|
+
"code": "ZTA-NET",
|
|
31
|
+
"name": "Network/Environment Pillar",
|
|
32
|
+
"requirement_count": 4,
|
|
33
|
+
"description": "Network segmentation and traffic inspection controls implementing micro-segmentation, encrypted channels, default deny posture, and east-west traffic inspection to eliminate implicit network trust"
|
|
34
|
+
},
|
|
35
|
+
{
|
|
36
|
+
"code": "ZTA-APP",
|
|
37
|
+
"name": "Application/Workload Pillar",
|
|
38
|
+
"requirement_count": 4,
|
|
39
|
+
"description": "Application and workload security controls governing secure software development, container hardening, service-to-service authentication, and software supply chain integrity"
|
|
40
|
+
},
|
|
41
|
+
{
|
|
42
|
+
"code": "ZTA-DATA",
|
|
43
|
+
"name": "Data Pillar",
|
|
44
|
+
"requirement_count": 3,
|
|
45
|
+
"description": "Data-centric security controls ensuring classification, encryption, and loss prevention protect data regardless of where it resides or transits within or outside the enterprise environment"
|
|
46
|
+
},
|
|
47
|
+
{
|
|
48
|
+
"code": "ZTA-VIS",
|
|
49
|
+
"name": "Visibility & Analytics Pillar",
|
|
50
|
+
"requirement_count": 3,
|
|
51
|
+
"description": "Continuous monitoring, SIEM integration, and anomaly detection controls providing the telemetry and analytics required for dynamic trust evaluation and informed access decisions in a ZTA environment"
|
|
52
|
+
},
|
|
53
|
+
{
|
|
54
|
+
"code": "ZTA-AUTO",
|
|
55
|
+
"name": "Automation & Orchestration Pillar",
|
|
56
|
+
"requirement_count": 3,
|
|
57
|
+
"description": "Automated response, security orchestration, and policy automation controls that enable the real-time, machine-speed enforcement of zero trust access decisions across dynamic enterprise environments"
|
|
58
|
+
}
|
|
59
|
+
],
|
|
60
|
+
"requirements": [
|
|
61
|
+
{
|
|
62
|
+
"id": "ZTA-ARCH-1",
|
|
63
|
+
"family": "ZTA-ARCH",
|
|
64
|
+
"title": "ZTA Architecture Definition",
|
|
65
|
+
"description": "The organization must formally define and document its Zero Trust Architecture, including identification of all resources, subjects, and trust zones. The ZTA documentation must specify the logical components of the zero trust system — the Policy Engine (PE), Policy Administrator (PA), and Policy Enforcement Points (PEPs) — and their interactions. The architecture must establish that all enterprise resources are accessed as if the network is always hostile, no implicit trust is granted based on network location, and access is granted on a per-session basis after dynamic trust evaluation. ZTA documentation must be reviewed at least annually and updated to reflect system changes.",
|
|
66
|
+
"nist_800_53_crosswalk": ["SA-3", "SA-8", "PL-7"]
|
|
67
|
+
},
|
|
68
|
+
{
|
|
69
|
+
"id": "ZTA-ARCH-2",
|
|
70
|
+
"family": "ZTA-ARCH",
|
|
71
|
+
"title": "Policy Engine Architecture",
|
|
72
|
+
"description": "The organization must deploy a Policy Engine (PE) that serves as the trust evaluation component responsible for granting, denying, or revoking access to enterprise resources. The PE must evaluate access requests against enterprise policy, threat intelligence feeds, identity attributes, device posture, and behavioral signals. The Policy Administrator (PA) must act as the management plane communicating PE decisions to Policy Enforcement Points (PEPs). The PE and PA must be logically separated from the data plane to prevent compromise of enforcement points from affecting trust decisions. PE decision logs must be retained for audit purposes.",
|
|
73
|
+
"nist_800_53_crosswalk": ["AC-3", "PE-3"]
|
|
74
|
+
},
|
|
75
|
+
{
|
|
76
|
+
"id": "ZTA-ARCH-3",
|
|
77
|
+
"family": "ZTA-ARCH",
|
|
78
|
+
"title": "Risk-Based Access Decisions",
|
|
79
|
+
"description": "Access decisions within the ZTA must be dynamic and risk-informed, evaluating current risk context at the time of each access request rather than relying on prior session state. Risk signals must include identity posture (MFA status, credential age, anomalous behavior), device health (patch level, compliance status, integrity attestation), network context (source IP reputation, geolocation), and resource sensitivity classification. The Policy Engine must assign a confidence level to each access request and compare it against per-resource trust thresholds. Continuous assessment must revoke or restrict access when risk posture degrades mid-session.",
|
|
80
|
+
"nist_800_53_crosswalk": ["RA-3", "CA-7"]
|
|
81
|
+
},
|
|
82
|
+
{
|
|
83
|
+
"id": "ZTA-ARCH-4",
|
|
84
|
+
"family": "ZTA-ARCH",
|
|
85
|
+
"title": "Least Privilege Access",
|
|
86
|
+
"description": "All access grants within the ZTA must adhere to the principle of least privilege — subjects receive only the minimum access rights necessary to perform their assigned function at the time of the request. Access must be scoped to the specific resource, action, and data required, not granted at the network or system level. Broad permissions such as network-level access must be replaced with fine-grained resource-level access controls. Just-in-time (JIT) and just-enough-access (JEA) patterns must be implemented for privileged operations. Least privilege must be enforced at every Policy Enforcement Point.",
|
|
87
|
+
"nist_800_53_crosswalk": ["AC-6", "AC-3"]
|
|
88
|
+
},
|
|
89
|
+
{
|
|
90
|
+
"id": "ZTA-ID-1",
|
|
91
|
+
"family": "ZTA-ID",
|
|
92
|
+
"title": "Identity Verification",
|
|
93
|
+
"description": "All subjects — human users, service accounts, and non-person entities (NPEs) — must be individually identified and their identity verified before access to any enterprise resource is granted. Identity verification must use authoritative identity sources (enterprise IdP, PKI, or federated identity provider). User identifiers must be unique, non-reusable within defined periods, and linked to individual accountability. Service accounts and automated processes must have documented ownership and purpose. Identity proofing at IAL2 or higher (per NIST SP 800-63A) is required for accounts with access to sensitive resources.",
|
|
94
|
+
"nist_800_53_crosswalk": ["AC-2", "IA-2", "IA-5"]
|
|
95
|
+
},
|
|
96
|
+
{
|
|
97
|
+
"id": "ZTA-ID-2",
|
|
98
|
+
"family": "ZTA-ID",
|
|
99
|
+
"title": "Multi-Factor Authentication",
|
|
100
|
+
"description": "Multi-factor authentication (MFA) must be enforced for all user access to enterprise resources within the ZTA, regardless of network location or perceived trust level. MFA must combine at least two distinct authentication factors: something you know (password, PIN), something you have (hardware token, smart card, FIDO2 authenticator), or something you are (biometric). Phishing-resistant MFA methods — such as FIDO2/WebAuthn passkeys or PIV/CAC certificates — are required for access to high-value assets and privileged functions. MFA must be validated at every policy enforcement point and must not be bypassable by network position.",
|
|
101
|
+
"nist_800_53_crosswalk": ["IA-2(1)", "IA-2(2)"]
|
|
102
|
+
},
|
|
103
|
+
{
|
|
104
|
+
"id": "ZTA-ID-3",
|
|
105
|
+
"family": "ZTA-ID",
|
|
106
|
+
"title": "Identity Governance",
|
|
107
|
+
"description": "The organization must implement identity governance processes to ensure that access rights remain appropriate throughout the user lifecycle. Access entitlements must be reviewed at least quarterly for privileged accounts and at least annually for standard accounts. An identity governance platform or process must detect and remediate orphaned accounts, excessive entitlements, and separation-of-duties violations. All access provisioning, modification, and deprovisioning events must be logged in an immutable audit trail. Role assignments must be reviewed when organizational roles or responsibilities change.",
|
|
108
|
+
"nist_800_53_crosswalk": ["AC-2(4)", "AC-2(7)"]
|
|
109
|
+
},
|
|
110
|
+
{
|
|
111
|
+
"id": "ZTA-ID-4",
|
|
112
|
+
"family": "ZTA-ID",
|
|
113
|
+
"title": "Privileged Access Management",
|
|
114
|
+
"description": "Privileged accounts and super-user access must be managed through a dedicated Privileged Access Management (PAM) solution within the ZTA. Privileged sessions must require step-up authentication, be subject to continuous monitoring, and be recorded for forensic purposes. Shared privileged accounts must be eliminated in favor of individual privileged accounts with JIT elevation. Standing privileged access must be minimized; time-limited access must be issued on demand. Privileged account credentials must be vaulted and automatically rotated. Privileged access use must be reviewed weekly and anomalous activity must generate real-time alerts.",
|
|
115
|
+
"nist_800_53_crosswalk": ["AC-6(5)", "AC-6(9)"]
|
|
116
|
+
},
|
|
117
|
+
{
|
|
118
|
+
"id": "ZTA-DEV-1",
|
|
119
|
+
"family": "ZTA-DEV",
|
|
120
|
+
"title": "Device Inventory",
|
|
121
|
+
"description": "The organization must maintain a comprehensive, continuously updated inventory of all enterprise-owned and authorized non-enterprise devices permitted to access enterprise resources. The device inventory must include hardware identifiers (serial number, MAC address, asset tag), operating system and version, installed software, compliance status, assigned owner, and last-seen timestamp. The inventory must be authoritative — unregistered devices must be denied access by default. Device enrollment must trigger inventory updates. The inventory must be queried in real time by the Policy Engine during access decisions to validate device authorization.",
|
|
122
|
+
"nist_800_53_crosswalk": ["CM-8", "CM-8(1)"]
|
|
123
|
+
},
|
|
124
|
+
{
|
|
125
|
+
"id": "ZTA-DEV-2",
|
|
126
|
+
"family": "ZTA-DEV",
|
|
127
|
+
"title": "Device Health Attestation",
|
|
128
|
+
"description": "Device trustworthiness must be continuously validated through hardware-backed health attestation mechanisms. Devices must provide cryptographically verifiable attestations of their security posture at access time, including TPM-based boot integrity measurements, OS patch compliance status, security agent health, disk encryption status, and absence of known-bad configurations. Attestation must be verified by the Policy Engine before granting access. Devices failing attestation checks must be quarantined or granted only limited remediation access. Attestation must be re-evaluated at minimum on each new access session and triggered by significant posture changes.",
|
|
129
|
+
"nist_800_53_crosswalk": ["IA-3", "SA-4(9)"]
|
|
130
|
+
},
|
|
131
|
+
{
|
|
132
|
+
"id": "ZTA-DEV-3",
|
|
133
|
+
"family": "ZTA-DEV",
|
|
134
|
+
"title": "Endpoint Protection",
|
|
135
|
+
"description": "All enterprise-managed endpoints accessing enterprise resources must run an approved endpoint detection and response (EDR) solution. The EDR must provide real-time threat detection, behavioral analysis, and automated response capabilities. Anti-malware signatures and behavioral detection models must be kept current via automated updates. Endpoints must enforce application allowlisting or behavioral controls to prevent execution of unauthorized code. Host-based firewalls must restrict inbound connectivity and permit only traffic required for authorized functions. Endpoint security posture signals must be integrated with the Policy Engine as a continuous trust signal.",
|
|
136
|
+
"nist_800_53_crosswalk": ["SC-7(12)", "SI-3"]
|
|
137
|
+
},
|
|
138
|
+
{
|
|
139
|
+
"id": "ZTA-NET-1",
|
|
140
|
+
"family": "ZTA-NET",
|
|
141
|
+
"title": "Micro-segmentation",
|
|
142
|
+
"description": "The enterprise network must be divided into granular microsegments to limit the blast radius of a breach and prevent unrestricted lateral movement. Microsegmentation must be implemented at the workload or application level, not solely at the VLAN or subnet level. Each microsegment must have an explicit policy defining which workloads can communicate with which other workloads, on which ports and protocols, and under what conditions. Policy Enforcement Points must be deployed at segment boundaries to evaluate and enforce these policies. Microsegmentation policies must be reviewed quarterly and updated to reflect changes in workload topology.",
|
|
143
|
+
"nist_800_53_crosswalk": ["AC-3", "SC-7", "SC-7(5)"]
|
|
144
|
+
},
|
|
145
|
+
{
|
|
146
|
+
"id": "ZTA-NET-2",
|
|
147
|
+
"family": "ZTA-NET",
|
|
148
|
+
"title": "Encrypted Channels",
|
|
149
|
+
"description": "All communications between subjects and enterprise resources, and between enterprise resources internally, must be encrypted end-to-end using FIPS 140-2 (or FIPS 140-3) validated cryptographic modules. TLS 1.2 or higher (preferably TLS 1.3) must be enforced for all session-based communications. Weak cipher suites, deprecated protocols (SSL, TLS 1.0/1.1), and export-grade cryptography must be disabled. Mutual TLS (mTLS) must be implemented for service-to-service communications within the ZTA. Data at rest must be encrypted using AES-256 or equivalent FIPS-approved algorithms. Encryption key lifecycle management — generation, distribution, rotation, and revocation — must be implemented.",
|
|
150
|
+
"nist_800_53_crosswalk": ["SC-8", "SC-13", "SC-28"]
|
|
151
|
+
},
|
|
152
|
+
{
|
|
153
|
+
"id": "ZTA-NET-3",
|
|
154
|
+
"family": "ZTA-NET",
|
|
155
|
+
"title": "Default Deny",
|
|
156
|
+
"description": "All network access policies within the ZTA must be configured with a default deny posture — all traffic is denied unless explicitly permitted by an approved policy rule. There must be no implicit trust granted based on network location, IP subnet membership, or VLAN assignment. Firewall and Policy Enforcement Point rule sets must be reviewed to ensure no permit-all or allow-from-internal rules exist that circumvent per-resource access policies. All deny events must be logged for anomaly detection and forensic analysis. The default deny posture must apply equally to north-south (external) and east-west (internal) traffic flows.",
|
|
157
|
+
"nist_800_53_crosswalk": ["AC-3(3)", "SC-7(5)"]
|
|
158
|
+
},
|
|
159
|
+
{
|
|
160
|
+
"id": "ZTA-NET-4",
|
|
161
|
+
"family": "ZTA-NET",
|
|
162
|
+
"title": "East-West Traffic Inspection",
|
|
163
|
+
"description": "Internal (east-west) network traffic between enterprise workloads must be subject to the same inspection and policy enforcement as external (north-south) traffic. The organization must deploy inline inspection capabilities — such as service mesh with sidecar proxies, software-defined networking controls, or network-based deep packet inspection — to detect and block malicious lateral movement within the enterprise network. All east-west traffic flows must be logged and correlated against expected communication patterns. Deviations from established baselines must trigger automated alerts. Inspected traffic that violates policy must be blocked and the event must be recorded for incident response.",
|
|
164
|
+
"nist_800_53_crosswalk": ["SI-4", "AC-4"]
|
|
165
|
+
},
|
|
166
|
+
{
|
|
167
|
+
"id": "ZTA-APP-1",
|
|
168
|
+
"family": "ZTA-APP",
|
|
169
|
+
"title": "Workload Security",
|
|
170
|
+
"description": "All application workloads — including web applications, APIs, microservices, and batch processes — must adhere to a secure software development lifecycle (SSDLC). Static application security testing (SAST), dynamic application security testing (DAST), and software composition analysis (SCA) must be integrated into the CI/CD pipeline and must gate deployments on critical and high severity findings. Security requirements must be defined at the design phase and verified through structured security testing prior to production deployment. Workload runtime behavior must be monitored and anomalous activity must trigger automated alerts.",
|
|
171
|
+
"nist_800_53_crosswalk": ["SA-11", "SA-15", "SI-7"]
|
|
172
|
+
},
|
|
173
|
+
{
|
|
174
|
+
"id": "ZTA-APP-2",
|
|
175
|
+
"family": "ZTA-APP",
|
|
176
|
+
"title": "Container Hardening",
|
|
177
|
+
"description": "Containerized workloads must be hardened to reduce attack surface and enforce runtime isolation. Container images must be built from minimal, approved base images and must not include unnecessary packages or tools. Container images must be scanned for known vulnerabilities prior to deployment and must meet defined severity thresholds. Containers must run as non-root users with read-only root filesystems, dropped Linux capabilities, and resource limits enforced. Container orchestration platforms (Kubernetes/OpenShift) must enforce Pod Security Standards at the restricted or baseline level. Image signing and admission control must prevent deployment of unsigned or non-compliant images.",
|
|
178
|
+
"nist_800_53_crosswalk": ["CM-7", "SC-39"]
|
|
179
|
+
},
|
|
180
|
+
{
|
|
181
|
+
"id": "ZTA-APP-3",
|
|
182
|
+
"family": "ZTA-APP",
|
|
183
|
+
"title": "Service-to-Service Authentication",
|
|
184
|
+
"description": "All service-to-service communications within the ZTA must be authenticated using strong, cryptographically verifiable credentials — no service may trust another service based solely on network proximity or IP address. Mutual TLS (mTLS) with short-lived certificates issued by an enterprise PKI or service mesh control plane must be used as the primary service authentication mechanism. Service identities must be bound to cryptographic credentials managed by the workload identity system (e.g., SPIFFE/SPIRE). Service credentials must be automatically rotated and must not be long-lived shared secrets. Service authentication events must be logged for audit and anomaly detection.",
|
|
185
|
+
"nist_800_53_crosswalk": ["IA-9", "SC-23"]
|
|
186
|
+
},
|
|
187
|
+
{
|
|
188
|
+
"id": "ZTA-APP-4",
|
|
189
|
+
"family": "ZTA-APP",
|
|
190
|
+
"title": "Secure Software Supply Chain",
|
|
191
|
+
"description": "The organization must implement controls to ensure the integrity and provenance of all software components used in enterprise workloads. A Software Bill of Materials (SBOM) must be generated for every build and must enumerate all first-party code, open-source dependencies, and third-party libraries with their versions and known vulnerabilities. Dependency provenance must be verified against trusted registries. Build pipelines must be protected from unauthorized modification via access controls, build attestations, and reproducible build practices. Third-party components must be reviewed for license compliance and security risk. SBOM must be regenerated on each build and stored in an immutable artifact repository.",
|
|
192
|
+
"nist_800_53_crosswalk": ["SA-12", "SR-3"]
|
|
193
|
+
},
|
|
194
|
+
{
|
|
195
|
+
"id": "ZTA-DATA-1",
|
|
196
|
+
"family": "ZTA-DATA",
|
|
197
|
+
"title": "Data Classification",
|
|
198
|
+
"description": "All enterprise data must be classified according to a defined data classification framework that assigns sensitivity labels (e.g., Public, CUI, Confidential, Secret) based on content, regulatory requirements, and potential impact of unauthorized disclosure. Data classification must be performed at creation or ingestion and must be maintained throughout the data lifecycle. Classification labels must be embedded in or persistently associated with data objects. Access policy decisions in the Policy Engine must use data classification as a primary input — access to higher-classification data requires higher trust levels. Data classification labels must be reviewed periodically to ensure they remain accurate.",
|
|
199
|
+
"nist_800_53_crosswalk": ["AC-16", "MP-4", "SC-28"]
|
|
200
|
+
},
|
|
201
|
+
{
|
|
202
|
+
"id": "ZTA-DATA-2",
|
|
203
|
+
"family": "ZTA-DATA",
|
|
204
|
+
"title": "Data Encryption",
|
|
205
|
+
"description": "Sensitive data must be encrypted at rest and in transit using FIPS 140-2 validated cryptographic modules. Encryption at rest must use AES-256 or equivalent FIPS-approved algorithms for all data stores containing data classified above Public. Transparent data encryption (TDE) for databases, full-disk encryption for endpoints, and object-level encryption for cloud storage are all acceptable mechanisms when properly configured. Encryption keys must be managed by a dedicated key management system (KMS) with documented key lifecycle procedures including generation, distribution, rotation (at minimum annually), and destruction. Application-layer encryption must be applied to CUI and higher classifications, providing defense-in-depth beyond storage-level encryption.",
|
|
206
|
+
"nist_800_53_crosswalk": ["SC-8", "SC-13", "SC-28(1)"]
|
|
207
|
+
},
|
|
208
|
+
{
|
|
209
|
+
"id": "ZTA-DATA-3",
|
|
210
|
+
"family": "ZTA-DATA",
|
|
211
|
+
"title": "Data Loss Prevention",
|
|
212
|
+
"description": "The organization must implement Data Loss Prevention (DLP) controls to detect and prevent unauthorized exfiltration of sensitive data from the enterprise environment. DLP policies must inspect outbound data flows — including email, web uploads, API calls, and endpoint file transfers — for content matching sensitive data patterns (PII, CUI, financial data, credentials). Policy actions must include block, quarantine, alert, and audit based on data sensitivity and channel risk. DLP controls must be deployed at network egress points and on managed endpoints. DLP policy violations must be logged, investigated, and reported. DLP controls must be tuned to minimize false positives while maintaining detection efficacy.",
|
|
213
|
+
"nist_800_53_crosswalk": ["AC-4(4)", "SC-7(10)"]
|
|
214
|
+
},
|
|
215
|
+
{
|
|
216
|
+
"id": "ZTA-VIS-1",
|
|
217
|
+
"family": "ZTA-VIS",
|
|
218
|
+
"title": "Continuous Monitoring",
|
|
219
|
+
"description": "The organization must implement a continuous monitoring program that collects and analyzes security telemetry from all ZTA components — identity providers, Policy Enforcement Points, endpoints, network controls, workloads, and data stores — in near real time. Monitoring must cover authentication events, access decisions (grants and denials), configuration changes, vulnerability state, and network flow data. Security metrics must be reviewed on a defined cadence and reported to leadership. The continuous monitoring capability must provide the Policy Engine with current risk signals to support dynamic access decision making. Monitoring coverage gaps must be identified, tracked, and remediated.",
|
|
220
|
+
"nist_800_53_crosswalk": ["SI-4", "AU-2", "AU-12"]
|
|
221
|
+
},
|
|
222
|
+
{
|
|
223
|
+
"id": "ZTA-VIS-2",
|
|
224
|
+
"family": "ZTA-VIS",
|
|
225
|
+
"title": "Security Information & Event Management",
|
|
226
|
+
"description": "A Security Information and Event Management (SIEM) platform must be deployed to aggregate, normalize, correlate, and analyze security events from all ZTA components. The SIEM must ingest logs from identity providers, Policy Engines, Policy Enforcement Points, network devices, endpoints, and cloud services. Correlation rules must detect multi-stage attack patterns — such as credential stuffing followed by lateral movement — that span individual log sources. SIEM alerts must be triaged by a Security Operations Center (SOC) function with defined response SLAs. Log retention within the SIEM must meet regulatory requirements with a minimum of one year online and three years archived.",
|
|
227
|
+
"nist_800_53_crosswalk": ["AU-6", "SI-4(2)"]
|
|
228
|
+
},
|
|
229
|
+
{
|
|
230
|
+
"id": "ZTA-VIS-3",
|
|
231
|
+
"family": "ZTA-VIS",
|
|
232
|
+
"title": "Anomaly Detection",
|
|
233
|
+
"description": "The organization must implement behavioral analytics and anomaly detection capabilities to identify deviations from established baseline behavior patterns across users, devices, and workloads. User and Entity Behavior Analytics (UEBA) must establish behavioral baselines and generate risk scores for anomalous activities such as impossible travel, off-hours access, access to previously unaccessed resources, and bulk data downloads. Anomaly detection signals must feed into the Policy Engine's dynamic trust scoring to automatically adjust access grants when behavioral risk scores exceed defined thresholds. High-confidence anomaly detections must trigger automated session termination and security alerts without requiring human-in-the-loop.",
|
|
234
|
+
"nist_800_53_crosswalk": ["SI-4(4)", "SI-4(5)"]
|
|
235
|
+
},
|
|
236
|
+
{
|
|
237
|
+
"id": "ZTA-AUTO-1",
|
|
238
|
+
"family": "ZTA-AUTO",
|
|
239
|
+
"title": "Automated Response",
|
|
240
|
+
"description": "The ZTA must support automated response capabilities that can react to detected threats and policy violations without requiring manual intervention for high-confidence, low-risk response actions. Automated responses must include: session revocation upon anomaly detection, account lockout upon credential compromise indicators, network quarantine of compromised endpoints, and blocking of known-malicious IP addresses or domains. Automated response actions must be logged in an immutable audit trail with the triggering event, action taken, affected resources, and timestamp. Response automation thresholds must be tunable to balance security response speed against operational false-positive risk. Automated responses must feed into the incident response workflow for tracking and post-incident analysis.",
|
|
241
|
+
"nist_800_53_crosswalk": ["IR-4", "SI-4(7)", "CP-2"]
|
|
242
|
+
},
|
|
243
|
+
{
|
|
244
|
+
"id": "ZTA-AUTO-2",
|
|
245
|
+
"family": "ZTA-AUTO",
|
|
246
|
+
"title": "Security Orchestration",
|
|
247
|
+
"description": "The organization must implement Security Orchestration, Automation, and Response (SOAR) capabilities to coordinate response actions across ZTA components in response to detected security events. SOAR playbooks must define automated workflows for common incident scenarios — including phishing, credential compromise, malware detection, and insider threat indicators — that orchestrate actions across the identity provider, endpoint management, network controls, and SIEM without manual hand-offs. Playbooks must be reviewed and tested at least quarterly and updated based on lessons learned from incidents and threat intelligence updates. Orchestrated actions must be logged and must support rollback where technically feasible.",
|
|
248
|
+
"nist_800_53_crosswalk": ["IR-4(1)", "SA-3(1)"]
|
|
249
|
+
},
|
|
250
|
+
{
|
|
251
|
+
"id": "ZTA-AUTO-3",
|
|
252
|
+
"family": "ZTA-AUTO",
|
|
253
|
+
"title": "Policy Automation",
|
|
254
|
+
"description": "ZTA access policies must be defined, tested, and deployed through an automated policy management pipeline that enforces peer review, testing in staging environments, and controlled rollout before policies affect production access decisions. Policy-as-code practices must be implemented so that access policies are version-controlled, auditable, and reproducible. Automated policy compliance checks must run continuously to detect configuration drift between intended policy state and enforced policy state. Policy changes must be reviewed and approved through a formal change management workflow before deployment. Automated rollback must be available if a policy change causes unintended access disruptions detected within a defined detection window.",
|
|
255
|
+
"nist_800_53_crosswalk": ["AC-3", "CM-3(2)"]
|
|
256
|
+
}
|
|
257
|
+
]
|
|
258
|
+
}
|
|
@@ -0,0 +1,324 @@
|
|
|
1
|
+
{
|
|
2
|
+
"metadata": {
|
|
3
|
+
"title": "NIST SP 800-53 Rev 5 - Selected Controls for Software Development",
|
|
4
|
+
"revision": "5",
|
|
5
|
+
"source": "National Institute of Standards and Technology",
|
|
6
|
+
"classification": "CUI // SP-CTI",
|
|
7
|
+
"last_updated": "2026-02-14",
|
|
8
|
+
"description": "Key NIST 800-53 Rev 5 controls relevant to DoD software development and compliance"
|
|
9
|
+
},
|
|
10
|
+
"controls": [
|
|
11
|
+
{
|
|
12
|
+
"id": "AC-1",
|
|
13
|
+
"family": "AC",
|
|
14
|
+
"title": "Policy and Procedures",
|
|
15
|
+
"description": "Develop, document, and disseminate an access control policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and procedures to facilitate the implementation of the access control policy and the associated access controls.",
|
|
16
|
+
"supplemental_guidance": "Access control policy and procedures address the controls in the AC family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures.",
|
|
17
|
+
"impact_level": "low"
|
|
18
|
+
},
|
|
19
|
+
{
|
|
20
|
+
"id": "AC-2",
|
|
21
|
+
"family": "AC",
|
|
22
|
+
"title": "Account Management",
|
|
23
|
+
"description": "Define and document the types of accounts allowed and specifically prohibited for use within the system. Assign account managers. Require prerequisites and criteria for group and role membership. Specify authorized users of the system, group and role membership, and access authorizations and other attributes for each account.",
|
|
24
|
+
"supplemental_guidance": "Types of system accounts include individual, shared, group, system, guest, anonymous, emergency, developer, temporary, and service. Conditions for creating, enabling, modifying, disabling, and removing accounts include when a user is terminated or transferred.",
|
|
25
|
+
"impact_level": "low"
|
|
26
|
+
},
|
|
27
|
+
{
|
|
28
|
+
"id": "AC-3",
|
|
29
|
+
"family": "AC",
|
|
30
|
+
"title": "Access Enforcement",
|
|
31
|
+
"description": "Enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.",
|
|
32
|
+
"supplemental_guidance": "Access control policies control access between active entities or subjects and passive entities or objects in organizational systems. Access enforcement mechanisms can employ identity/credential-based, role-based, attribute-based, or rule-based access control approaches.",
|
|
33
|
+
"impact_level": "low"
|
|
34
|
+
},
|
|
35
|
+
{
|
|
36
|
+
"id": "AC-6",
|
|
37
|
+
"family": "AC",
|
|
38
|
+
"title": "Least Privilege",
|
|
39
|
+
"description": "Employ the principle of least privilege, allowing only authorized accesses for users and processes acting on behalf of users that are necessary to accomplish assigned organizational tasks.",
|
|
40
|
+
"supplemental_guidance": "Organizations employ least privilege for specific duties and systems. The principle of least privilege is also applied to system processes, ensuring that the processes have access to systems and operate at privilege levels no higher than necessary to accomplish organizational missions or business functions.",
|
|
41
|
+
"impact_level": "moderate"
|
|
42
|
+
},
|
|
43
|
+
{
|
|
44
|
+
"id": "AC-17",
|
|
45
|
+
"family": "AC",
|
|
46
|
+
"title": "Remote Access",
|
|
47
|
+
"description": "Establish and document usage restrictions, configuration/connection requirements, and implementation guidance for each type of remote access allowed. Authorize each type of remote access to the system prior to allowing such connections.",
|
|
48
|
+
"supplemental_guidance": "Remote access is access to organizational systems by users communicating through external networks such as the Internet. Types of remote access include dial-up, broadband, and wireless. Virtual private networks (VPNs) with encrypted tunnels can be treated as internal networks if the organization has confidence in the security of the VPN.",
|
|
49
|
+
"impact_level": "moderate"
|
|
50
|
+
},
|
|
51
|
+
{
|
|
52
|
+
"id": "AU-1",
|
|
53
|
+
"family": "AU",
|
|
54
|
+
"title": "Policy and Procedures",
|
|
55
|
+
"description": "Develop, document, and disseminate an audit and accountability policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and procedures to facilitate the implementation of the audit and accountability policy and the associated audit and accountability controls.",
|
|
56
|
+
"supplemental_guidance": "Audit and accountability policy and procedures address the controls in the AU family that are implemented within systems and organizations.",
|
|
57
|
+
"impact_level": "low"
|
|
58
|
+
},
|
|
59
|
+
{
|
|
60
|
+
"id": "AU-2",
|
|
61
|
+
"family": "AU",
|
|
62
|
+
"title": "Event Logging",
|
|
63
|
+
"description": "Identify the types of events that the system is capable of logging in support of the audit function. Coordinate the event logging function with other organizational entities requiring audit-related information to guide and inform the selection criteria for events to be logged.",
|
|
64
|
+
"supplemental_guidance": "An event is any observable occurrence in a system. The types of events that require logging are those events that are significant and relevant to the security of systems and the privacy of individuals.",
|
|
65
|
+
"impact_level": "low"
|
|
66
|
+
},
|
|
67
|
+
{
|
|
68
|
+
"id": "AU-3",
|
|
69
|
+
"family": "AU",
|
|
70
|
+
"title": "Content of Audit Records",
|
|
71
|
+
"description": "Ensure that audit records contain information that establishes the following: what type of event occurred, when the event occurred, where the event occurred, the source of the event, the outcome of the event, and the identity of any individuals, subjects, or objects/entities associated with the event.",
|
|
72
|
+
"supplemental_guidance": "Audit record content that may be necessary to support the auditing function includes event descriptions, time stamps, source and destination addresses, user or process identifiers, success or fail indications, filenames involved, and access control or flow control rules invoked.",
|
|
73
|
+
"impact_level": "low"
|
|
74
|
+
},
|
|
75
|
+
{
|
|
76
|
+
"id": "AU-6",
|
|
77
|
+
"family": "AU",
|
|
78
|
+
"title": "Audit Record Review, Analysis, and Reporting",
|
|
79
|
+
"description": "Review and analyze system audit records for indications of inappropriate or unusual activity and report findings to designated organizational officials. Adjust the level of audit record review, analysis, and reporting within the system when there is a change in risk based on law enforcement information, intelligence information, or other credible sources of information.",
|
|
80
|
+
"supplemental_guidance": "Audit record review, analysis, and reporting covers information security and privacy-related logging performed by organizations. Finding can be reported to organizational incident response capabilities for security incident handling purposes.",
|
|
81
|
+
"impact_level": "low"
|
|
82
|
+
},
|
|
83
|
+
{
|
|
84
|
+
"id": "AU-12",
|
|
85
|
+
"family": "AU",
|
|
86
|
+
"title": "Audit Record Generation",
|
|
87
|
+
"description": "Provide audit record generation capability for the event types the system is capable of auditing as defined in AU-2a on all information system and network components. Allow designated organizational personnel to select the event types that are to be logged by specific components of the system. Generate audit records for the event types defined in AU-2c that include the audit record content defined in AU-3.",
|
|
88
|
+
"supplemental_guidance": "Audit records can be generated from many different system components. The event types specified in AU-2d are the event types for which audit logs are to be generated and are a subset of all event types for which the system can generate audit records.",
|
|
89
|
+
"impact_level": "low"
|
|
90
|
+
},
|
|
91
|
+
{
|
|
92
|
+
"id": "CM-1",
|
|
93
|
+
"family": "CM",
|
|
94
|
+
"title": "Policy and Procedures",
|
|
95
|
+
"description": "Develop, document, and disseminate a configuration management policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and procedures to facilitate the implementation of the configuration management policy and the associated configuration management controls.",
|
|
96
|
+
"supplemental_guidance": "Configuration management policy and procedures address the controls in the CM family that are implemented within systems and organizations.",
|
|
97
|
+
"impact_level": "low"
|
|
98
|
+
},
|
|
99
|
+
{
|
|
100
|
+
"id": "CM-2",
|
|
101
|
+
"family": "CM",
|
|
102
|
+
"title": "Baseline Configuration",
|
|
103
|
+
"description": "Develop, document, and maintain under configuration control, a current baseline configuration of the system.",
|
|
104
|
+
"supplemental_guidance": "Baseline configurations for systems include hardware, software, firmware, and documentation items that constitute the system. Baseline configurations serve as a basis for future builds, releases, or changes to systems and include security and privacy configurations for components.",
|
|
105
|
+
"impact_level": "low"
|
|
106
|
+
},
|
|
107
|
+
{
|
|
108
|
+
"id": "CM-3",
|
|
109
|
+
"family": "CM",
|
|
110
|
+
"title": "Configuration Change Control",
|
|
111
|
+
"description": "Determine and document the types of changes to the system that are configuration-controlled. Review proposed configuration-controlled changes to the system and approve or disapprove such changes with explicit consideration for security and privacy impact analyses.",
|
|
112
|
+
"supplemental_guidance": "Configuration change control for organizational systems involves the systematic proposal, justification, implementation, testing, review, and disposition of changes to systems, including upgrades and modifications.",
|
|
113
|
+
"impact_level": "moderate"
|
|
114
|
+
},
|
|
115
|
+
{
|
|
116
|
+
"id": "CM-6",
|
|
117
|
+
"family": "CM",
|
|
118
|
+
"title": "Configuration Settings",
|
|
119
|
+
"description": "Establish and document configuration settings for components employed within the system that reflect the most restrictive mode consistent with operational requirements using applicable STIGs, SRGs, or other hardening guidance.",
|
|
120
|
+
"supplemental_guidance": "Configuration settings are the parameters that can be changed in the hardware, software, or firmware components of the system that affect the security and privacy posture or functionality of the system. STIGs and SRGs provide established guidelines for hardening.",
|
|
121
|
+
"impact_level": "low"
|
|
122
|
+
},
|
|
123
|
+
{
|
|
124
|
+
"id": "CM-7",
|
|
125
|
+
"family": "CM",
|
|
126
|
+
"title": "Least Functionality",
|
|
127
|
+
"description": "Configure the system to provide only mission-essential capabilities. Prohibit or restrict the use of functions, ports, protocols, software, and/or services as defined in organizational policy.",
|
|
128
|
+
"supplemental_guidance": "Systems provide a wide variety of functions and services. Some of the functions and services routinely provided by default may not be necessary to support essential organizational missions, functions, or operations.",
|
|
129
|
+
"impact_level": "low"
|
|
130
|
+
},
|
|
131
|
+
{
|
|
132
|
+
"id": "IA-1",
|
|
133
|
+
"family": "IA",
|
|
134
|
+
"title": "Policy and Procedures",
|
|
135
|
+
"description": "Develop, document, and disseminate an identification and authentication policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and procedures to facilitate the implementation of the identification and authentication policy and the associated identification and authentication controls.",
|
|
136
|
+
"supplemental_guidance": "Identification and authentication policy and procedures address the controls in the IA family that are implemented within systems and organizations.",
|
|
137
|
+
"impact_level": "low"
|
|
138
|
+
},
|
|
139
|
+
{
|
|
140
|
+
"id": "IA-2",
|
|
141
|
+
"family": "IA",
|
|
142
|
+
"title": "Identification and Authentication (Organizational Users)",
|
|
143
|
+
"description": "Uniquely identify and authenticate organizational users and associate that unique identification with processes acting on behalf of those users.",
|
|
144
|
+
"supplemental_guidance": "Organizations can satisfy the identification and authentication requirements by complying with the requirements in HSPD-12. Organizational users include employees or individuals whom organizations consider to have an equivalent status to employees.",
|
|
145
|
+
"impact_level": "low"
|
|
146
|
+
},
|
|
147
|
+
{
|
|
148
|
+
"id": "IA-5",
|
|
149
|
+
"family": "IA",
|
|
150
|
+
"title": "Authenticator Management",
|
|
151
|
+
"description": "Manage system authenticators by verifying, as part of the initial authenticator distribution, the identity of the individual, group, role, service, or device receiving the authenticator. Establish initial authenticator content for any authenticators issued by the organization.",
|
|
152
|
+
"supplemental_guidance": "Authenticators include passwords, cryptographic devices, biometrics, certificates, one-time password devices, and ID badges. Device authenticators include certificates and passwords.",
|
|
153
|
+
"impact_level": "low"
|
|
154
|
+
},
|
|
155
|
+
{
|
|
156
|
+
"id": "IA-6",
|
|
157
|
+
"family": "IA",
|
|
158
|
+
"title": "Authentication Feedback",
|
|
159
|
+
"description": "Obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.",
|
|
160
|
+
"supplemental_guidance": "Authentication feedback from systems does not provide information that would allow unauthorized individuals to compromise authentication mechanisms. For some types of systems, such as desktops or notebooks with relatively large monitors, the threat of feedback providing information is less significant.",
|
|
161
|
+
"impact_level": "low"
|
|
162
|
+
},
|
|
163
|
+
{
|
|
164
|
+
"id": "IA-8",
|
|
165
|
+
"family": "IA",
|
|
166
|
+
"title": "Identification and Authentication (Non-Organizational Users)",
|
|
167
|
+
"description": "Uniquely identify and authenticate non-organizational users or processes acting on behalf of non-organizational users.",
|
|
168
|
+
"supplemental_guidance": "Non-organizational users include system users other than organizational users explicitly covered by IA-2. Non-organizational users are uniquely identified and authenticated for accesses other than those explicitly identified and documented in AC-14.",
|
|
169
|
+
"impact_level": "low"
|
|
170
|
+
},
|
|
171
|
+
{
|
|
172
|
+
"id": "SA-1",
|
|
173
|
+
"family": "SA",
|
|
174
|
+
"title": "Policy and Procedures",
|
|
175
|
+
"description": "Develop, document, and disseminate a system and services acquisition policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and procedures to facilitate the implementation of the system and services acquisition policy and the associated system and services acquisition controls.",
|
|
176
|
+
"supplemental_guidance": "System and services acquisition policy and procedures address the controls in the SA family that are implemented within systems and organizations.",
|
|
177
|
+
"impact_level": "low"
|
|
178
|
+
},
|
|
179
|
+
{
|
|
180
|
+
"id": "SA-3",
|
|
181
|
+
"family": "SA",
|
|
182
|
+
"title": "System Development Life Cycle",
|
|
183
|
+
"description": "Acquire, develop, and manage the system using a system development life cycle methodology that incorporates information security and privacy considerations. Define and document information security and privacy roles and responsibilities throughout the system development life cycle.",
|
|
184
|
+
"supplemental_guidance": "A system development life cycle process provides the foundation for the successful development, implementation, and operation of organizational systems. The integration of security and privacy considerations early in the system development life cycle is a foundational principle of systems security engineering and privacy engineering.",
|
|
185
|
+
"impact_level": "low"
|
|
186
|
+
},
|
|
187
|
+
{
|
|
188
|
+
"id": "SA-4",
|
|
189
|
+
"family": "SA",
|
|
190
|
+
"title": "Acquisition Process",
|
|
191
|
+
"description": "Include security and privacy functional requirements, strength requirements, assurance requirements, documentation requirements, and acceptance criteria in the acquisition contract for the system, system component, or system service.",
|
|
192
|
+
"supplemental_guidance": "Security and privacy functional requirements are typically derived from the security and privacy requirements levied on organizations. Assurance requirements address the activities performed to generate confidence that the information technology satisfies the security and privacy requirements.",
|
|
193
|
+
"impact_level": "low"
|
|
194
|
+
},
|
|
195
|
+
{
|
|
196
|
+
"id": "SA-8",
|
|
197
|
+
"family": "SA",
|
|
198
|
+
"title": "Security and Privacy Engineering Principles",
|
|
199
|
+
"description": "Apply systems security and privacy engineering principles in the specification, design, development, implementation, and modification of the system and system components.",
|
|
200
|
+
"supplemental_guidance": "Systems security and privacy engineering principles are closely related to and can be used to support security and privacy policies. Security engineering principles include developing layered protections, establishing sound security policy, and managing the complexity of systems.",
|
|
201
|
+
"impact_level": "moderate"
|
|
202
|
+
},
|
|
203
|
+
{
|
|
204
|
+
"id": "SA-11",
|
|
205
|
+
"family": "SA",
|
|
206
|
+
"title": "Developer Testing and Evaluation",
|
|
207
|
+
"description": "Require the developer of the system, system component, or system service to create and implement a security and privacy assessment plan. Perform unit, integration, system, and regression testing/evaluation at the depth and coverage defined by the assessment plan. Produce evidence of the execution of the assessment plan and the results of the testing and evaluation.",
|
|
208
|
+
"supplemental_guidance": "Developmental testing/evaluation confirms that required security and privacy controls are implemented correctly, operating as intended, enforcing the desired security and privacy policy, and meeting established security and privacy requirements.",
|
|
209
|
+
"impact_level": "moderate"
|
|
210
|
+
},
|
|
211
|
+
{
|
|
212
|
+
"id": "SC-1",
|
|
213
|
+
"family": "SC",
|
|
214
|
+
"title": "Policy and Procedures",
|
|
215
|
+
"description": "Develop, document, and disseminate a system and communications protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and procedures to facilitate the implementation of the system and communications protection policy and the associated system and communications protection controls.",
|
|
216
|
+
"supplemental_guidance": "System and communications protection policy and procedures address the controls in the SC family that are implemented within systems and organizations.",
|
|
217
|
+
"impact_level": "low"
|
|
218
|
+
},
|
|
219
|
+
{
|
|
220
|
+
"id": "SC-7",
|
|
221
|
+
"family": "SC",
|
|
222
|
+
"title": "Boundary Protection",
|
|
223
|
+
"description": "Monitor and control communications at the external managed interfaces to the system and at key internal managed interfaces within the system. Implement subnetworks for publicly accessible system components that are physically or logically separated from internal organizational networks.",
|
|
224
|
+
"supplemental_guidance": "Managed interfaces include gateways, routers, firewalls, guards, network-based malicious code analysis, virtualization systems, or encrypted tunnels implemented within a security architecture. Subnetworks within the system are referred to as demilitarized zones or DMZs.",
|
|
225
|
+
"impact_level": "low"
|
|
226
|
+
},
|
|
227
|
+
{
|
|
228
|
+
"id": "SC-8",
|
|
229
|
+
"family": "SC",
|
|
230
|
+
"title": "Transmission Confidentiality and Integrity",
|
|
231
|
+
"description": "Protect the confidentiality and integrity of transmitted information.",
|
|
232
|
+
"supplemental_guidance": "Protecting the confidentiality and integrity of transmitted information applies to internal and external communications. Organizations rely on transport protocols such as TLS or IPsec to achieve confidentiality and integrity of transmitted information.",
|
|
233
|
+
"impact_level": "moderate"
|
|
234
|
+
},
|
|
235
|
+
{
|
|
236
|
+
"id": "SC-12",
|
|
237
|
+
"family": "SC",
|
|
238
|
+
"title": "Cryptographic Key Establishment and Management",
|
|
239
|
+
"description": "Establish and manage cryptographic keys when cryptography is employed within the system in accordance with applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidelines.",
|
|
240
|
+
"supplemental_guidance": "Cryptographic key management and establishment can be performed using manual procedures or automated mechanisms with supporting manual procedures. Organizations define key management requirements in accordance with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines and include them in organizational key management policy.",
|
|
241
|
+
"impact_level": "low"
|
|
242
|
+
},
|
|
243
|
+
{
|
|
244
|
+
"id": "SC-13",
|
|
245
|
+
"family": "SC",
|
|
246
|
+
"title": "Cryptographic Protection",
|
|
247
|
+
"description": "Determine the cryptographic uses needed; and implement the following types of cryptography required for each specified cryptographic use in accordance with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines: FIPS-validated or NSA-approved cryptography.",
|
|
248
|
+
"supplemental_guidance": "Cryptography can be employed to support a variety of security solutions, including the protection of classified information and controlled unclassified information, the provision and implementation of digital signatures, and the enforcement of information separation when authorized individuals have the necessary clearances but lack the necessary formal access approvals.",
|
|
249
|
+
"impact_level": "low"
|
|
250
|
+
},
|
|
251
|
+
{
|
|
252
|
+
"id": "RA-1",
|
|
253
|
+
"family": "RA",
|
|
254
|
+
"title": "Policy and Procedures",
|
|
255
|
+
"description": "Develop, document, and disseminate a risk assessment policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and procedures to facilitate the implementation of the risk assessment policy and the associated risk assessment controls.",
|
|
256
|
+
"supplemental_guidance": "Risk assessment policy and procedures address the controls in the RA family that are implemented within systems and organizations.",
|
|
257
|
+
"impact_level": "low"
|
|
258
|
+
},
|
|
259
|
+
{
|
|
260
|
+
"id": "RA-3",
|
|
261
|
+
"family": "RA",
|
|
262
|
+
"title": "Risk Assessment",
|
|
263
|
+
"description": "Conduct a risk assessment, including identifying threats to and vulnerabilities in the system. Determine the likelihood and magnitude of harm from unauthorized access, use, disclosure, disruption, modification, or destruction of the system, the information it processes, stores, or transmits, and any related information.",
|
|
264
|
+
"supplemental_guidance": "Risk assessments consider threats, vulnerabilities, likelihood, and impact to organizational operations and assets, individuals, other organizations, and the Nation. Risk assessments also consider risk from external parties.",
|
|
265
|
+
"impact_level": "low"
|
|
266
|
+
},
|
|
267
|
+
{
|
|
268
|
+
"id": "RA-5",
|
|
269
|
+
"family": "RA",
|
|
270
|
+
"title": "Vulnerability Monitoring and Scanning",
|
|
271
|
+
"description": "Monitor and scan for vulnerabilities in the system and hosted applications. Employ vulnerability monitoring tools and techniques that facilitate interoperability among tools. Analyze vulnerability scan reports and results from vulnerability monitoring. Remediate legitimate vulnerabilities in accordance with an organizational assessment of risk.",
|
|
272
|
+
"supplemental_guidance": "Security categorization of information and systems guides the frequency and comprehensiveness of vulnerability monitoring including scans. Organizations determine the required vulnerability monitoring for system components, ensuring that the potential sources of vulnerabilities are not overlooked.",
|
|
273
|
+
"impact_level": "low"
|
|
274
|
+
},
|
|
275
|
+
{
|
|
276
|
+
"id": "RA-7",
|
|
277
|
+
"family": "RA",
|
|
278
|
+
"title": "Risk Response",
|
|
279
|
+
"description": "Respond to findings from security and privacy assessments, monitoring, and audits in accordance with organizational risk tolerance.",
|
|
280
|
+
"supplemental_guidance": "Organizations have many options for responding to risk including mitigating risk by implementing new controls or strengthening existing controls, accepting risk with appropriate justification or rationale, sharing or transferring risk, or avoiding risk.",
|
|
281
|
+
"impact_level": "moderate"
|
|
282
|
+
},
|
|
283
|
+
{
|
|
284
|
+
"id": "CA-1",
|
|
285
|
+
"family": "CA",
|
|
286
|
+
"title": "Policy and Procedures",
|
|
287
|
+
"description": "Develop, document, and disseminate an assessment, authorization, and monitoring policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and procedures to facilitate the implementation of the assessment, authorization, and monitoring policy and the associated assessment, authorization, and monitoring controls.",
|
|
288
|
+
"supplemental_guidance": "Assessment, authorization, and monitoring policy and procedures address the controls in the CA family that are implemented within systems and organizations.",
|
|
289
|
+
"impact_level": "low"
|
|
290
|
+
},
|
|
291
|
+
{
|
|
292
|
+
"id": "CA-2",
|
|
293
|
+
"family": "CA",
|
|
294
|
+
"title": "Control Assessments",
|
|
295
|
+
"description": "Select the appropriate assessor or assessment team for the type of assessment being conducted. Develop a control assessment plan that describes the scope of the assessment. Assess the controls in the system and its environment of operation to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome.",
|
|
296
|
+
"supplemental_guidance": "Organizations assess controls in systems and the environments in which those systems operate as part of the system development life cycle, at the frequency established in organizational policies, as part of the authorization process, and on an ongoing basis after authorization.",
|
|
297
|
+
"impact_level": "low"
|
|
298
|
+
},
|
|
299
|
+
{
|
|
300
|
+
"id": "CA-5",
|
|
301
|
+
"family": "CA",
|
|
302
|
+
"title": "Plan of Action and Milestones",
|
|
303
|
+
"description": "Develop a plan of action and milestones for the system to document the planned remediation actions of the organization to correct weaknesses or deficiencies noted during the assessment of the controls and to reduce or eliminate known vulnerabilities in the system. Update existing plan of action and milestones based on the findings from control assessments, independent audits or reviews, and continuous monitoring activities.",
|
|
304
|
+
"supplemental_guidance": "Plans of action and milestones are useful for any type of organization to plan, implement, and document remedial actions to address security and privacy weaknesses, deficiencies, and findings identified during assessments, audits, and reviews.",
|
|
305
|
+
"impact_level": "low"
|
|
306
|
+
},
|
|
307
|
+
{
|
|
308
|
+
"id": "CA-6",
|
|
309
|
+
"family": "CA",
|
|
310
|
+
"title": "Authorization",
|
|
311
|
+
"description": "Assign a senior official as the authorizing official for the system. Ensure that the authorizing official authorizes the system for processing before commencing operations. Update the authorization on an ongoing basis.",
|
|
312
|
+
"supplemental_guidance": "Authorizations are official management decisions by senior officials or executives to authorize operation of systems and accept the risk to organizational operations, organizational assets, individuals, other organizations, and the Nation based on the implementation of agreed-upon controls.",
|
|
313
|
+
"impact_level": "low"
|
|
314
|
+
},
|
|
315
|
+
{
|
|
316
|
+
"id": "CA-7",
|
|
317
|
+
"family": "CA",
|
|
318
|
+
"title": "Continuous Monitoring",
|
|
319
|
+
"description": "Develop a system-level continuous monitoring strategy and implement continuous monitoring in accordance with the organization-level continuous monitoring strategy. Establish metrics to be monitored, frequencies for monitoring, and frequencies for assessment of control effectiveness.",
|
|
320
|
+
"supplemental_guidance": "Continuous monitoring at the system level facilitates ongoing awareness of the system security and privacy posture to support organizational risk management decisions. Continuous monitoring programs include ongoing assessment of control effectiveness in response to risk changes.",
|
|
321
|
+
"impact_level": "low"
|
|
322
|
+
}
|
|
323
|
+
]
|
|
324
|
+
}
|