security-controls-mcp 0.2.0__tar.gz
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- security_controls_mcp-0.2.0/.gitleaks.toml +38 -0
- security_controls_mcp-0.2.0/CHANGELOG.md +76 -0
- security_controls_mcp-0.2.0/CI-CD-PIPELINE.md +622 -0
- security_controls_mcp-0.2.0/CLAUDE_CODE_SETUP.md +222 -0
- security_controls_mcp-0.2.0/DEPLOYMENT_CHECKLIST.md +327 -0
- security_controls_mcp-0.2.0/Dockerfile +58 -0
- security_controls_mcp-0.2.0/INSTALL.md +165 -0
- security_controls_mcp-0.2.0/LEGAL_COMPLIANCE.md +284 -0
- security_controls_mcp-0.2.0/LICENSE +17 -0
- security_controls_mcp-0.2.0/LICENSE-DATA.md +61 -0
- security_controls_mcp-0.2.0/MANIFEST.in +19 -0
- security_controls_mcp-0.2.0/PAID_STANDARDS_GUIDE.md +341 -0
- security_controls_mcp-0.2.0/PKG-INFO +467 -0
- security_controls_mcp-0.2.0/QUICK_START.md +169 -0
- security_controls_mcp-0.2.0/README.md +433 -0
- security_controls_mcp-0.2.0/SECURITY-TOOLS.md +417 -0
- security_controls_mcp-0.2.0/SECURITY.md +167 -0
- security_controls_mcp-0.2.0/TESTING.md +229 -0
- security_controls_mcp-0.2.0/pyproject.toml +75 -0
- security_controls_mcp-0.2.0/quality_test.py +173 -0
- security_controls_mcp-0.2.0/scf-extract-starter.py +233 -0
- security_controls_mcp-0.2.0/scf-query-tester.py +238 -0
- security_controls_mcp-0.2.0/setup.cfg +4 -0
- security_controls_mcp-0.2.0/src/security_controls_mcp/__init__.py +3 -0
- security_controls_mcp-0.2.0/src/security_controls_mcp/__main__.py +8 -0
- security_controls_mcp-0.2.0/src/security_controls_mcp/cli.py +255 -0
- security_controls_mcp-0.2.0/src/security_controls_mcp/config.py +145 -0
- security_controls_mcp-0.2.0/src/security_controls_mcp/data/framework-to-scf.json +13986 -0
- security_controls_mcp-0.2.0/src/security_controls_mcp/data/scf-controls.json +50162 -0
- security_controls_mcp-0.2.0/src/security_controls_mcp/data_loader.py +180 -0
- security_controls_mcp-0.2.0/src/security_controls_mcp/extractors/__init__.py +5 -0
- security_controls_mcp-0.2.0/src/security_controls_mcp/extractors/pdf_extractor.py +248 -0
- security_controls_mcp-0.2.0/src/security_controls_mcp/http_server.py +477 -0
- security_controls_mcp-0.2.0/src/security_controls_mcp/legal_notice.py +82 -0
- security_controls_mcp-0.2.0/src/security_controls_mcp/providers.py +238 -0
- security_controls_mcp-0.2.0/src/security_controls_mcp/registry.py +132 -0
- security_controls_mcp-0.2.0/src/security_controls_mcp/server.py +613 -0
- security_controls_mcp-0.2.0/src/security_controls_mcp.egg-info/PKG-INFO +467 -0
- security_controls_mcp-0.2.0/src/security_controls_mcp.egg-info/SOURCES.txt +51 -0
- security_controls_mcp-0.2.0/src/security_controls_mcp.egg-info/dependency_links.txt +1 -0
- security_controls_mcp-0.2.0/src/security_controls_mcp.egg-info/entry_points.txt +2 -0
- security_controls_mcp-0.2.0/src/security_controls_mcp.egg-info/requires.txt +13 -0
- security_controls_mcp-0.2.0/src/security_controls_mcp.egg-info/top_level.txt +1 -0
- security_controls_mcp-0.2.0/test_server.py +68 -0
- security_controls_mcp-0.2.0/tests/README.md +124 -0
- security_controls_mcp-0.2.0/tests/__init__.py +1 -0
- security_controls_mcp-0.2.0/tests/test_content_quality.py +284 -0
- security_controls_mcp-0.2.0/tests/test_data_loader.py +183 -0
- security_controls_mcp-0.2.0/tests/test_integration.py +174 -0
- security_controls_mcp-0.2.0/tests/test_paid_standards.py +235 -0
- security_controls_mcp-0.2.0/tests/test_security.py +322 -0
- security_controls_mcp-0.2.0/tests/test_smoke.py +135 -0
- security_controls_mcp-0.2.0/verify_production_ready.py +344 -0
|
@@ -0,0 +1,38 @@
|
|
|
1
|
+
# Gitleaks configuration
|
|
2
|
+
# Customize secret detection rules and allowlists
|
|
3
|
+
|
|
4
|
+
title = "Security Controls MCP - Gitleaks Config"
|
|
5
|
+
|
|
6
|
+
[extend]
|
|
7
|
+
# Use default Gitleaks rules as base
|
|
8
|
+
useDefault = true
|
|
9
|
+
|
|
10
|
+
[allowlist]
|
|
11
|
+
description = "Allowlisted files and patterns"
|
|
12
|
+
|
|
13
|
+
# Allowlist specific paths (e.g., test fixtures, documentation examples)
|
|
14
|
+
paths = [
|
|
15
|
+
# Add paths to ignore, e.g.:
|
|
16
|
+
# '''tests/fixtures/example_secrets\.py''',
|
|
17
|
+
# '''docs/examples/.*'''
|
|
18
|
+
]
|
|
19
|
+
|
|
20
|
+
# Allowlist specific commit hashes (if secrets were already rotated)
|
|
21
|
+
commits = [
|
|
22
|
+
# Add commit SHAs to ignore, e.g.:
|
|
23
|
+
# "abc123def456",
|
|
24
|
+
]
|
|
25
|
+
|
|
26
|
+
# Allowlist specific regex patterns
|
|
27
|
+
regexes = [
|
|
28
|
+
# Add regex patterns to ignore, e.g.:
|
|
29
|
+
# '''example\.com''',
|
|
30
|
+
]
|
|
31
|
+
|
|
32
|
+
# Stop words that indicate a false positive
|
|
33
|
+
stopwords = [
|
|
34
|
+
# Add stop words, e.g.:
|
|
35
|
+
# '''fake''',
|
|
36
|
+
# '''example''',
|
|
37
|
+
# '''test''',
|
|
38
|
+
]
|
|
@@ -0,0 +1,76 @@
|
|
|
1
|
+
# Changelog
|
|
2
|
+
|
|
3
|
+
All notable changes to this project will be documented in this file.
|
|
4
|
+
|
|
5
|
+
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
|
|
6
|
+
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).
|
|
7
|
+
|
|
8
|
+
## [0.2.0] - 2025-01-29
|
|
9
|
+
|
|
10
|
+
### Added
|
|
11
|
+
- **Paid Standards Support** - Import and query purchased security standards (ISO 27001, NIST SP 800-53, etc.)
|
|
12
|
+
- Three new MCP tools:
|
|
13
|
+
- `list_available_standards` - Show all available standards (SCF + imported)
|
|
14
|
+
- `query_standard` - Search within purchased standards
|
|
15
|
+
- `get_clause` - Get full text of specific clauses
|
|
16
|
+
- CLI tool (`scf-mcp`) for importing standards from PDF:
|
|
17
|
+
- `scf-mcp import-standard` - Extract and import PDF standards
|
|
18
|
+
- `scf-mcp list-standards` - List all imported standards
|
|
19
|
+
- Enhanced existing tools with official text from purchased standards:
|
|
20
|
+
- `get_control` now shows official text alongside SCF descriptions
|
|
21
|
+
- `map_frameworks` displays official text from both source and target frameworks
|
|
22
|
+
- User-local storage (`~/.security-controls-mcp/`) - keeps paid content private
|
|
23
|
+
- PDF extraction pipeline with intelligent structure detection
|
|
24
|
+
- Comprehensive documentation: PAID_STANDARDS_GUIDE.md (341 lines)
|
|
25
|
+
- 12 new tests for paid standards functionality (63 total tests)
|
|
26
|
+
- License compliance features: startup warnings, attribution, git safety checks
|
|
27
|
+
|
|
28
|
+
### Changed
|
|
29
|
+
- Updated README.md with paid standards overview and quick start
|
|
30
|
+
- Enhanced legal notices to show loaded paid standards
|
|
31
|
+
- Tool count increased from 5 to 8
|
|
32
|
+
|
|
33
|
+
### Technical Details
|
|
34
|
+
- Provider abstraction for extensible standard support
|
|
35
|
+
- Config system for managing imported standards
|
|
36
|
+
- Registry pattern for unified standard access
|
|
37
|
+
- Optional dependencies: `pip install -e '.[import-tools]'` for PDF extraction
|
|
38
|
+
|
|
39
|
+
### Fixed
|
|
40
|
+
- Git safety check when standards directory is outside repository
|
|
41
|
+
|
|
42
|
+
## [0.1.0] - 2025-01-29
|
|
43
|
+
|
|
44
|
+
### Added
|
|
45
|
+
- Initial release of Security Controls MCP Server
|
|
46
|
+
- Support for 16 security frameworks with 1,451 controls mapped from SCF 2025.4
|
|
47
|
+
- Five MCP tools:
|
|
48
|
+
- `get_control` - Retrieve detailed control information
|
|
49
|
+
- `search_controls` - Search controls by keyword
|
|
50
|
+
- `list_frameworks` - List all available frameworks
|
|
51
|
+
- `get_framework_controls` - Get controls for a specific framework
|
|
52
|
+
- `map_frameworks` - Map controls between any two frameworks
|
|
53
|
+
- Comprehensive documentation (README, INSTALL, TESTING)
|
|
54
|
+
- Test suite with MCP protocol integration tests
|
|
55
|
+
- Data files: scf-controls.json (1,451 controls), framework-to-scf.json (reverse mappings)
|
|
56
|
+
|
|
57
|
+
### Frameworks Supported
|
|
58
|
+
- NIST SP 800-53 R5 (777 controls)
|
|
59
|
+
- SOC 2 TSC (412 controls)
|
|
60
|
+
- PCI DSS v4.0.1 (364 controls)
|
|
61
|
+
- FedRAMP R5 Moderate (343 controls)
|
|
62
|
+
- ISO/IEC 27002:2022 (316 controls)
|
|
63
|
+
- NIST CSF 2.0 (253 controls)
|
|
64
|
+
- CIS CSC v8.1 (234 controls)
|
|
65
|
+
- CMMC 2.0 Level 2 (198 controls)
|
|
66
|
+
- HIPAA Security Rule (136 controls)
|
|
67
|
+
- DORA (103 controls)
|
|
68
|
+
- NIS2 (68 controls)
|
|
69
|
+
- NCSC CAF 4.0 (67 controls)
|
|
70
|
+
- CMMC 2.0 Level 1 (52 controls)
|
|
71
|
+
- ISO/IEC 27001:2022 (51 controls)
|
|
72
|
+
- GDPR (42 controls)
|
|
73
|
+
- UK Cyber Essentials (26 controls)
|
|
74
|
+
|
|
75
|
+
[0.2.0]: https://github.com/Ansvar-Systems/security-controls-mcp/releases/tag/v0.2.0
|
|
76
|
+
[0.1.0]: https://github.com/Ansvar-Systems/security-controls-mcp/releases/tag/v0.1.0
|