security-controls-mcp 0.2.0__tar.gz → 0.2.1__tar.gz
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/CHANGELOG.md +26 -0
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/CLAUDE_CODE_SETUP.md +1 -1
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/DEPLOYMENT_CHECKLIST.md +6 -6
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/INSTALL.md +1 -1
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/PAID_STANDARDS_GUIDE.md +1 -1
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/PKG-INFO +50 -11
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/QUICK_START.md +1 -1
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/README.md +49 -10
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/TESTING.md +2 -2
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/pyproject.toml +1 -1
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/scf-extract-starter.py +17 -0
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/src/security_controls_mcp/__init__.py +1 -1
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/src/security_controls_mcp/data/framework-to-scf.json +9453 -2035
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/src/security_controls_mcp/data/scf-controls.json +24413 -1373
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/src/security_controls_mcp/data_loader.py +17 -0
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/src/security_controls_mcp.egg-info/PKG-INFO +50 -11
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/tests/test_data_loader.py +1 -1
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/tests/test_integration.py +1 -1
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/tests/test_smoke.py +15 -1
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/verify_production_ready.py +4 -4
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/.gitleaks.toml +0 -0
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/CI-CD-PIPELINE.md +0 -0
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/Dockerfile +0 -0
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/LEGAL_COMPLIANCE.md +0 -0
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/LICENSE +0 -0
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/LICENSE-DATA.md +0 -0
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/MANIFEST.in +0 -0
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/SECURITY-TOOLS.md +0 -0
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/SECURITY.md +0 -0
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/quality_test.py +0 -0
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/scf-query-tester.py +0 -0
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/setup.cfg +0 -0
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/src/security_controls_mcp/__main__.py +0 -0
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/src/security_controls_mcp/cli.py +0 -0
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/src/security_controls_mcp/config.py +0 -0
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/src/security_controls_mcp/extractors/__init__.py +0 -0
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/src/security_controls_mcp/extractors/pdf_extractor.py +0 -0
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/src/security_controls_mcp/http_server.py +0 -0
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/src/security_controls_mcp/legal_notice.py +0 -0
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/src/security_controls_mcp/providers.py +0 -0
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/src/security_controls_mcp/registry.py +0 -0
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/src/security_controls_mcp/server.py +0 -0
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/src/security_controls_mcp.egg-info/SOURCES.txt +0 -0
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/src/security_controls_mcp.egg-info/dependency_links.txt +0 -0
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/src/security_controls_mcp.egg-info/entry_points.txt +0 -0
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/src/security_controls_mcp.egg-info/requires.txt +0 -0
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/src/security_controls_mcp.egg-info/top_level.txt +0 -0
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/test_server.py +0 -0
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/tests/README.md +0 -0
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/tests/__init__.py +0 -0
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/tests/test_content_quality.py +0 -0
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/tests/test_paid_standards.py +0 -0
- {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/tests/test_security.py +0 -0
|
@@ -5,6 +5,32 @@ All notable changes to this project will be documented in this file.
|
|
|
5
5
|
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
|
|
6
6
|
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).
|
|
7
7
|
|
|
8
|
+
## [0.3.0] - 2026-01-29
|
|
9
|
+
|
|
10
|
+
### Added
|
|
11
|
+
- **12 new framework mappings** from SCF 2025.4 - expanded global coverage
|
|
12
|
+
- **APAC:** Australian Essential Eight (37 controls), Australian ISM June 2024 (336 controls), Singapore MAS TRM 2021 (214 controls)
|
|
13
|
+
- **Financial:** SWIFT Customer Security Framework 2023 (127 controls)
|
|
14
|
+
- **Privacy:** NIST Privacy Framework 1.0 (187 controls)
|
|
15
|
+
- **European National:** Netherlands (27 controls), Norway (23 controls), Sweden (25 controls), Germany general (18 controls), Germany BAIT (91 controls), Germany C5:2020 (239 controls)
|
|
16
|
+
- **Cloud:** CSA Cloud Controls Matrix v4 (334 controls)
|
|
17
|
+
- **Framework Roadmap** section in README documenting:
|
|
18
|
+
- All 28 available frameworks with control counts
|
|
19
|
+
- Frameworks not yet available (BIO, KATAKRI, NSM, MSB, CFCS, CCB, ANSSI)
|
|
20
|
+
- Clear guidance on maintaining data quality via SCF-only mappings
|
|
21
|
+
|
|
22
|
+
### Changed
|
|
23
|
+
- Total framework coverage: **16 → 28 frameworks** (+75% expansion)
|
|
24
|
+
- Updated all documentation to reflect new framework count
|
|
25
|
+
- Enhanced framework categories in README (added APAC, European National, Financial, Cloud)
|
|
26
|
+
- Updated tests to verify 28 frameworks
|
|
27
|
+
- Updated `scf-extract-starter.py` with 12 new framework column mappings
|
|
28
|
+
|
|
29
|
+
### Technical
|
|
30
|
+
- Re-extracted data from SCF 2025.4 Excel file with expanded framework coverage
|
|
31
|
+
- Updated `src/security_controls_mcp/data_loader.py` with new framework display names
|
|
32
|
+
- All existing tools automatically support new frameworks (no API changes)
|
|
33
|
+
|
|
8
34
|
## [0.2.0] - 2025-01-29
|
|
9
35
|
|
|
10
36
|
### Added
|
|
@@ -183,7 +183,7 @@ Or use a relative path (less reliable):
|
|
|
183
183
|
User: List all available security frameworks
|
|
184
184
|
|
|
185
185
|
Claude: [Uses security-controls MCP server]
|
|
186
|
-
**Available Frameworks (
|
|
186
|
+
**Available Frameworks (28 total)**
|
|
187
187
|
|
|
188
188
|
- **nist_800_53_r5**: NIST SP 800-53 Revision 5 (777 controls)
|
|
189
189
|
- **soc_2_tsc**: SOC 2 (TSC 2017:2022) (412 controls)
|
|
@@ -13,7 +13,7 @@
|
|
|
13
13
|
- [ ] Run `python test_server.py` → All 5 tools work correctly
|
|
14
14
|
- [ ] Data files present: `scf-controls.json` (1.5MB), `framework-to-scf.json` (194KB)
|
|
15
15
|
- [ ] All 1,451 controls loaded
|
|
16
|
-
- [ ] All
|
|
16
|
+
- [ ] All 28 frameworks mapped correctly
|
|
17
17
|
|
|
18
18
|
**Command:**
|
|
19
19
|
```bash
|
|
@@ -51,7 +51,7 @@ python verify_production_ready.py
|
|
|
51
51
|
### ✅ Local Testing
|
|
52
52
|
|
|
53
53
|
- [ ] Install in your own Claude Desktop (follow QUICK_START.md)
|
|
54
|
-
- [ ] Test query: "List all available security frameworks" → Returns
|
|
54
|
+
- [ ] Test query: "List all available security frameworks" → Returns 28 frameworks
|
|
55
55
|
- [ ] Test query: "Search for encryption controls" → Returns CRY-* controls
|
|
56
56
|
- [ ] Test query: "Show me GOV-01 details" → Returns full control data
|
|
57
57
|
- [ ] Test query: "Map ISO 27001 5.1 to DORA" → Returns mappings
|
|
@@ -94,7 +94,7 @@ First production release of the Security Controls MCP server for Claude.
|
|
|
94
94
|
**Tools:**
|
|
95
95
|
1. `get_control` - Get details for specific controls
|
|
96
96
|
2. `search_controls` - Search by keyword
|
|
97
|
-
3. `list_frameworks` - List all
|
|
97
|
+
3. `list_frameworks` - List all 28 frameworks
|
|
98
98
|
4. `get_framework_controls` - Get all controls for a framework
|
|
99
99
|
5. `map_frameworks` - Map between frameworks
|
|
100
100
|
|
|
@@ -121,7 +121,7 @@ python verify_production_ready.py
|
|
|
121
121
|
|
|
122
122
|
All tests pass:
|
|
123
123
|
- ✅ 1,451 controls loaded
|
|
124
|
-
- ✅
|
|
124
|
+
- ✅ 28 frameworks mapped
|
|
125
125
|
- ✅ 5 tools functional
|
|
126
126
|
- ✅ MCP protocol working
|
|
127
127
|
- ✅ Claude Desktop compatible
|
|
@@ -153,7 +153,7 @@ Submit to: https://smithery.ai/submit
|
|
|
153
153
|
|
|
154
154
|
**Submission details:**
|
|
155
155
|
- Name: security-controls-mcp
|
|
156
|
-
- Description: "MCP server providing 1,451 security controls across
|
|
156
|
+
- Description: "MCP server providing 1,451 security controls across 28 frameworks (NIST, ISO, DORA, PCI DSS, SOC 2) for compliance mapping and gap analysis"
|
|
157
157
|
- Repository: https://github.com/Ansvar-Systems/security-controls-mcp
|
|
158
158
|
- Installation command: See INSTALL.md
|
|
159
159
|
- Category: Security / Compliance
|
|
@@ -203,7 +203,7 @@ GitHub: https://github.com/Ansvar-Systems/security-controls-mcp
|
|
|
203
203
|
I built an MCP server that brings security/compliance framework data directly into Claude conversations.
|
|
204
204
|
|
|
205
205
|
**What it does:**
|
|
206
|
-
- Access 1,451 security controls from
|
|
206
|
+
- Access 1,451 security controls from 28 frameworks
|
|
207
207
|
- Search controls by keyword
|
|
208
208
|
- Map between frameworks (ISO ↔ DORA, NIST ↔ SOC 2, etc.)
|
|
209
209
|
- Get control implementation details
|
|
@@ -6,7 +6,7 @@ This guide explains how to add your purchased security standards (ISO 27001, NIS
|
|
|
6
6
|
|
|
7
7
|
## Overview
|
|
8
8
|
|
|
9
|
-
The Security Controls MCP Server includes **1,451 free SCF controls** that map across
|
|
9
|
+
The Security Controls MCP Server includes **1,451 free SCF controls** that map across 28 frameworks. When you add your **purchased standards**, you get:
|
|
10
10
|
|
|
11
11
|
- ✅ **Official text** from your licensed copies
|
|
12
12
|
- ✅ **Full clauses** with page numbers
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
Metadata-Version: 2.4
|
|
2
2
|
Name: security-controls-mcp
|
|
3
|
-
Version: 0.2.
|
|
3
|
+
Version: 0.2.1
|
|
4
4
|
Summary: MCP server for querying security framework controls (SCF) - map between ISO 27001, NIST CSF, DORA, PCI DSS, and more
|
|
5
5
|
Author-email: Ansvar Systems <hello@ansvar.eu>
|
|
6
6
|
License: Apache-2.0
|
|
@@ -43,7 +43,7 @@ Dynamic: license-file
|
|
|
43
43
|
|
|
44
44
|
**The universal translator for security frameworks.**
|
|
45
45
|
|
|
46
|
-
The Security Controls MCP Server is an open-source tool that makes 1,451 security controls across
|
|
46
|
+
The Security Controls MCP Server is an open-source tool that makes 1,451 security controls across 28 frameworks searchable and AI-accessible directly through Claude, Cursor, or any MCP-compatible client.
|
|
47
47
|
|
|
48
48
|
Built on the [Secure Controls Framework (SCF)](https://securecontrolsframework.com/) by ComplianceForge.
|
|
49
49
|
|
|
@@ -51,7 +51,7 @@ Built on the [Secure Controls Framework (SCF)](https://securecontrolsframework.c
|
|
|
51
51
|
|
|
52
52
|
**Coverage:**
|
|
53
53
|
- 1,451 security controls spanning governance, risk, compliance, and technical domains
|
|
54
|
-
-
|
|
54
|
+
- 28 major frameworks including ISO 27001, NIST CSF, DORA, PCI DSS, CMMC, Australian Essential Eight, Singapore MAS TRM, SWIFT CSCF, and more
|
|
55
55
|
- Bidirectional mapping between any two frameworks via SCF rosetta stone
|
|
56
56
|
- Optional integration with purchased standards (ISO, NIST 800-53) for official text
|
|
57
57
|
|
|
@@ -229,37 +229,76 @@ Ask Claude these natural language questions:
|
|
|
229
229
|
|
|
230
230
|
---
|
|
231
231
|
|
|
232
|
-
## Available Frameworks (
|
|
232
|
+
## Available Frameworks (28 Total)
|
|
233
233
|
|
|
234
234
|
When you call `list_frameworks()`, you get:
|
|
235
235
|
|
|
236
236
|
```
|
|
237
|
-
Available Frameworks (
|
|
237
|
+
Available Frameworks (28 total)
|
|
238
238
|
|
|
239
239
|
- nist_800_53_r5: NIST SP 800-53 Revision 5 (777 controls)
|
|
240
240
|
- soc_2_tsc: SOC 2 (TSC 2017:2022) (412 controls)
|
|
241
241
|
- pci_dss_4.0.1: PCI DSS v4.0.1 (364 controls)
|
|
242
242
|
- fedramp_r5_moderate: FedRAMP Revision 5 (Moderate) (343 controls)
|
|
243
|
+
- australia_ism_2024: Australian ISM (June 2024) (336 controls)
|
|
244
|
+
- csa_ccm_4: CSA Cloud Controls Matrix v4 (334 controls)
|
|
243
245
|
- iso_27002_2022: ISO/IEC 27002:2022 (316 controls)
|
|
244
246
|
- nist_csf_2.0: NIST Cybersecurity Framework 2.0 (253 controls)
|
|
247
|
+
- germany_c5_2020: Germany C5:2020 (Cloud Controls) (239 controls)
|
|
245
248
|
- cis_csc_8.1: CIS Critical Security Controls v8.1 (234 controls)
|
|
249
|
+
- singapore_mas_trm_2021: Singapore MAS TRM 2021 (214 controls)
|
|
246
250
|
- cmmc_2.0_level_2: CMMC 2.0 Level 2 (198 controls)
|
|
251
|
+
- nist_privacy_framework_1_0: NIST Privacy Framework 1.0 (187 controls)
|
|
247
252
|
- hipaa_security_rule: HIPAA Security Rule (136 controls)
|
|
253
|
+
- swift_cscf_2023: SWIFT Customer Security Framework 2023 (127 controls)
|
|
248
254
|
- dora: Digital Operational Resilience Act (DORA) (103 controls)
|
|
255
|
+
- germany_bait: Germany BAIT (Banking IT Requirements) (91 controls)
|
|
249
256
|
- nis2: Network and Information Security Directive (NIS2) (68 controls)
|
|
250
257
|
- ncsc_caf_4.0: NCSC Cyber Assessment Framework 4.0 (67 controls)
|
|
251
258
|
- cmmc_2.0_level_1: CMMC 2.0 Level 1 (52 controls)
|
|
252
259
|
- iso_27001_2022: ISO/IEC 27001:2022 (51 controls)
|
|
253
260
|
- gdpr: General Data Protection Regulation (GDPR) (42 controls)
|
|
261
|
+
- australia_essential_8: Australian Essential Eight (37 controls)
|
|
262
|
+
- netherlands: Netherlands Cybersecurity Regulations (27 controls)
|
|
254
263
|
- uk_cyber_essentials: UK Cyber Essentials (26 controls)
|
|
264
|
+
- sweden: Sweden Cybersecurity Regulations (25 controls)
|
|
265
|
+
- norway: Norway Cybersecurity Regulations (23 controls)
|
|
266
|
+
- germany: Germany Cybersecurity Regulations (18 controls)
|
|
255
267
|
```
|
|
256
268
|
|
|
257
269
|
**Framework categories:**
|
|
258
|
-
- **Government:** NIST 800-53, NIST CSF, FedRAMP, CMMC
|
|
270
|
+
- **US Government:** NIST 800-53, NIST CSF, NIST Privacy, FedRAMP, CMMC
|
|
259
271
|
- **International Standards:** ISO 27001, ISO 27002, CIS CSC
|
|
260
|
-
- **Industry:** PCI DSS, SOC 2, HIPAA
|
|
261
|
-
- **
|
|
272
|
+
- **US Industry:** PCI DSS, SOC 2, HIPAA
|
|
273
|
+
- **APAC:** Australia Essential Eight, Australia ISM, Singapore MAS TRM
|
|
274
|
+
- **EU Regulations:** GDPR, DORA, NIS2
|
|
262
275
|
- **UK Standards:** NCSC CAF, Cyber Essentials
|
|
276
|
+
- **European National:** Netherlands, Norway, Sweden, Germany (general/BAIT/C5)
|
|
277
|
+
- **Financial:** SWIFT CSCF
|
|
278
|
+
- **Cloud:** CSA CCM
|
|
279
|
+
|
|
280
|
+
---
|
|
281
|
+
|
|
282
|
+
## Framework Roadmap
|
|
283
|
+
|
|
284
|
+
**Not Yet Available (Waiting for SCF Coverage):**
|
|
285
|
+
|
|
286
|
+
These security frameworks are not currently included because the Secure Controls Framework (SCF) doesn't provide official mappings. We maintain data quality and compliance consulting credibility by using only ComplianceForge-vetted mappings.
|
|
287
|
+
|
|
288
|
+
- 🇳🇱 **Netherlands BIO** (Baseline Informatiebeveiliging Overheid) - Dutch government security baseline
|
|
289
|
+
- 🇫🇮 **Finland KATAKRI** - Finnish defense forces security audit criteria
|
|
290
|
+
- 🇳🇴 **Norway NSM** Grunnprinsipper - Norwegian NSA basic security principles
|
|
291
|
+
- 🇸🇪 **Sweden MSB** - Swedish Civil Contingencies Agency cybersecurity frameworks
|
|
292
|
+
- 🇩🇰 **Denmark CFCS** - Center for Cybersikkerhed guidelines
|
|
293
|
+
- 🇧🇪 **Belgium CCB** - Centre for Cybersecurity Belgium frameworks
|
|
294
|
+
- 🇫🇷 **France ANSSI** SecNumCloud - French cybersecurity agency cloud framework
|
|
295
|
+
|
|
296
|
+
**Note:** The European country frameworks we DO include (Netherlands, Norway, Sweden, Germany) map to national cybersecurity **laws and regulations** (article numbers from GDPR, NIS2, etc.), not the specific security baseline frameworks listed above.
|
|
297
|
+
|
|
298
|
+
**Want these frameworks?**
|
|
299
|
+
|
|
300
|
+
1. **For private use:** Fork this repository and use the [paid standards import feature](PAID_STANDARDS_GUIDE.md) to add your purchased frameworks
|
|
301
|
+
2. **For public benefit:** Contribute framework mappings to SCF at https://securecontrolsframework.com/contact/
|
|
263
302
|
|
|
264
303
|
---
|
|
265
304
|
|
|
@@ -272,7 +311,7 @@ Get details about a specific SCF control by ID.
|
|
|
272
311
|
get_control(control_id="GOV-01")
|
|
273
312
|
```
|
|
274
313
|
|
|
275
|
-
**Returns:** Full control details including description, domain, weight, PPTDF category, and mappings to all
|
|
314
|
+
**Returns:** Full control details including description, domain, weight, PPTDF category, and mappings to all 28 frameworks.
|
|
276
315
|
|
|
277
316
|
---
|
|
278
317
|
|
|
@@ -296,7 +335,7 @@ List all available frameworks with metadata.
|
|
|
296
335
|
list_frameworks()
|
|
297
336
|
```
|
|
298
337
|
|
|
299
|
-
**Returns:** All
|
|
338
|
+
**Returns:** All 28 frameworks with display names and control counts.
|
|
300
339
|
|
|
301
340
|
---
|
|
302
341
|
|
|
@@ -395,7 +434,7 @@ SCF JSON → In-memory index → MCP tools → AI response
|
|
|
395
434
|
Based on **SCF 2025.4** released December 29, 2025.
|
|
396
435
|
|
|
397
436
|
- **1,451 controls** across all domains
|
|
398
|
-
- **
|
|
437
|
+
- **580+ framework mappings** (28 frameworks × 18-777 controls each)
|
|
399
438
|
- Licensed under **Creative Commons** (data)
|
|
400
439
|
- Source: [ComplianceForge SCF](https://securecontrolsframework.com/)
|
|
401
440
|
|
|
@@ -63,7 +63,7 @@ List all available security frameworks
|
|
|
63
63
|
|
|
64
64
|
You should see output like:
|
|
65
65
|
```
|
|
66
|
-
**Available Frameworks (
|
|
66
|
+
**Available Frameworks (28 total)**
|
|
67
67
|
|
|
68
68
|
- **nist_800_53_r5**: NIST SP 800-53 Revision 5 (777 controls)
|
|
69
69
|
- **soc_2_tsc**: SOC 2 (TSC 2017:2022) (412 controls)
|
|
@@ -9,7 +9,7 @@
|
|
|
9
9
|
|
|
10
10
|
**The universal translator for security frameworks.**
|
|
11
11
|
|
|
12
|
-
The Security Controls MCP Server is an open-source tool that makes 1,451 security controls across
|
|
12
|
+
The Security Controls MCP Server is an open-source tool that makes 1,451 security controls across 28 frameworks searchable and AI-accessible directly through Claude, Cursor, or any MCP-compatible client.
|
|
13
13
|
|
|
14
14
|
Built on the [Secure Controls Framework (SCF)](https://securecontrolsframework.com/) by ComplianceForge.
|
|
15
15
|
|
|
@@ -17,7 +17,7 @@ Built on the [Secure Controls Framework (SCF)](https://securecontrolsframework.c
|
|
|
17
17
|
|
|
18
18
|
**Coverage:**
|
|
19
19
|
- 1,451 security controls spanning governance, risk, compliance, and technical domains
|
|
20
|
-
-
|
|
20
|
+
- 28 major frameworks including ISO 27001, NIST CSF, DORA, PCI DSS, CMMC, Australian Essential Eight, Singapore MAS TRM, SWIFT CSCF, and more
|
|
21
21
|
- Bidirectional mapping between any two frameworks via SCF rosetta stone
|
|
22
22
|
- Optional integration with purchased standards (ISO, NIST 800-53) for official text
|
|
23
23
|
|
|
@@ -195,37 +195,76 @@ Ask Claude these natural language questions:
|
|
|
195
195
|
|
|
196
196
|
---
|
|
197
197
|
|
|
198
|
-
## Available Frameworks (
|
|
198
|
+
## Available Frameworks (28 Total)
|
|
199
199
|
|
|
200
200
|
When you call `list_frameworks()`, you get:
|
|
201
201
|
|
|
202
202
|
```
|
|
203
|
-
Available Frameworks (
|
|
203
|
+
Available Frameworks (28 total)
|
|
204
204
|
|
|
205
205
|
- nist_800_53_r5: NIST SP 800-53 Revision 5 (777 controls)
|
|
206
206
|
- soc_2_tsc: SOC 2 (TSC 2017:2022) (412 controls)
|
|
207
207
|
- pci_dss_4.0.1: PCI DSS v4.0.1 (364 controls)
|
|
208
208
|
- fedramp_r5_moderate: FedRAMP Revision 5 (Moderate) (343 controls)
|
|
209
|
+
- australia_ism_2024: Australian ISM (June 2024) (336 controls)
|
|
210
|
+
- csa_ccm_4: CSA Cloud Controls Matrix v4 (334 controls)
|
|
209
211
|
- iso_27002_2022: ISO/IEC 27002:2022 (316 controls)
|
|
210
212
|
- nist_csf_2.0: NIST Cybersecurity Framework 2.0 (253 controls)
|
|
213
|
+
- germany_c5_2020: Germany C5:2020 (Cloud Controls) (239 controls)
|
|
211
214
|
- cis_csc_8.1: CIS Critical Security Controls v8.1 (234 controls)
|
|
215
|
+
- singapore_mas_trm_2021: Singapore MAS TRM 2021 (214 controls)
|
|
212
216
|
- cmmc_2.0_level_2: CMMC 2.0 Level 2 (198 controls)
|
|
217
|
+
- nist_privacy_framework_1_0: NIST Privacy Framework 1.0 (187 controls)
|
|
213
218
|
- hipaa_security_rule: HIPAA Security Rule (136 controls)
|
|
219
|
+
- swift_cscf_2023: SWIFT Customer Security Framework 2023 (127 controls)
|
|
214
220
|
- dora: Digital Operational Resilience Act (DORA) (103 controls)
|
|
221
|
+
- germany_bait: Germany BAIT (Banking IT Requirements) (91 controls)
|
|
215
222
|
- nis2: Network and Information Security Directive (NIS2) (68 controls)
|
|
216
223
|
- ncsc_caf_4.0: NCSC Cyber Assessment Framework 4.0 (67 controls)
|
|
217
224
|
- cmmc_2.0_level_1: CMMC 2.0 Level 1 (52 controls)
|
|
218
225
|
- iso_27001_2022: ISO/IEC 27001:2022 (51 controls)
|
|
219
226
|
- gdpr: General Data Protection Regulation (GDPR) (42 controls)
|
|
227
|
+
- australia_essential_8: Australian Essential Eight (37 controls)
|
|
228
|
+
- netherlands: Netherlands Cybersecurity Regulations (27 controls)
|
|
220
229
|
- uk_cyber_essentials: UK Cyber Essentials (26 controls)
|
|
230
|
+
- sweden: Sweden Cybersecurity Regulations (25 controls)
|
|
231
|
+
- norway: Norway Cybersecurity Regulations (23 controls)
|
|
232
|
+
- germany: Germany Cybersecurity Regulations (18 controls)
|
|
221
233
|
```
|
|
222
234
|
|
|
223
235
|
**Framework categories:**
|
|
224
|
-
- **Government:** NIST 800-53, NIST CSF, FedRAMP, CMMC
|
|
236
|
+
- **US Government:** NIST 800-53, NIST CSF, NIST Privacy, FedRAMP, CMMC
|
|
225
237
|
- **International Standards:** ISO 27001, ISO 27002, CIS CSC
|
|
226
|
-
- **Industry:** PCI DSS, SOC 2, HIPAA
|
|
227
|
-
- **
|
|
238
|
+
- **US Industry:** PCI DSS, SOC 2, HIPAA
|
|
239
|
+
- **APAC:** Australia Essential Eight, Australia ISM, Singapore MAS TRM
|
|
240
|
+
- **EU Regulations:** GDPR, DORA, NIS2
|
|
228
241
|
- **UK Standards:** NCSC CAF, Cyber Essentials
|
|
242
|
+
- **European National:** Netherlands, Norway, Sweden, Germany (general/BAIT/C5)
|
|
243
|
+
- **Financial:** SWIFT CSCF
|
|
244
|
+
- **Cloud:** CSA CCM
|
|
245
|
+
|
|
246
|
+
---
|
|
247
|
+
|
|
248
|
+
## Framework Roadmap
|
|
249
|
+
|
|
250
|
+
**Not Yet Available (Waiting for SCF Coverage):**
|
|
251
|
+
|
|
252
|
+
These security frameworks are not currently included because the Secure Controls Framework (SCF) doesn't provide official mappings. We maintain data quality and compliance consulting credibility by using only ComplianceForge-vetted mappings.
|
|
253
|
+
|
|
254
|
+
- 🇳🇱 **Netherlands BIO** (Baseline Informatiebeveiliging Overheid) - Dutch government security baseline
|
|
255
|
+
- 🇫🇮 **Finland KATAKRI** - Finnish defense forces security audit criteria
|
|
256
|
+
- 🇳🇴 **Norway NSM** Grunnprinsipper - Norwegian NSA basic security principles
|
|
257
|
+
- 🇸🇪 **Sweden MSB** - Swedish Civil Contingencies Agency cybersecurity frameworks
|
|
258
|
+
- 🇩🇰 **Denmark CFCS** - Center for Cybersikkerhed guidelines
|
|
259
|
+
- 🇧🇪 **Belgium CCB** - Centre for Cybersecurity Belgium frameworks
|
|
260
|
+
- 🇫🇷 **France ANSSI** SecNumCloud - French cybersecurity agency cloud framework
|
|
261
|
+
|
|
262
|
+
**Note:** The European country frameworks we DO include (Netherlands, Norway, Sweden, Germany) map to national cybersecurity **laws and regulations** (article numbers from GDPR, NIS2, etc.), not the specific security baseline frameworks listed above.
|
|
263
|
+
|
|
264
|
+
**Want these frameworks?**
|
|
265
|
+
|
|
266
|
+
1. **For private use:** Fork this repository and use the [paid standards import feature](PAID_STANDARDS_GUIDE.md) to add your purchased frameworks
|
|
267
|
+
2. **For public benefit:** Contribute framework mappings to SCF at https://securecontrolsframework.com/contact/
|
|
229
268
|
|
|
230
269
|
---
|
|
231
270
|
|
|
@@ -238,7 +277,7 @@ Get details about a specific SCF control by ID.
|
|
|
238
277
|
get_control(control_id="GOV-01")
|
|
239
278
|
```
|
|
240
279
|
|
|
241
|
-
**Returns:** Full control details including description, domain, weight, PPTDF category, and mappings to all
|
|
280
|
+
**Returns:** Full control details including description, domain, weight, PPTDF category, and mappings to all 28 frameworks.
|
|
242
281
|
|
|
243
282
|
---
|
|
244
283
|
|
|
@@ -262,7 +301,7 @@ List all available frameworks with metadata.
|
|
|
262
301
|
list_frameworks()
|
|
263
302
|
```
|
|
264
303
|
|
|
265
|
-
**Returns:** All
|
|
304
|
+
**Returns:** All 28 frameworks with display names and control counts.
|
|
266
305
|
|
|
267
306
|
---
|
|
268
307
|
|
|
@@ -361,7 +400,7 @@ SCF JSON → In-memory index → MCP tools → AI response
|
|
|
361
400
|
Based on **SCF 2025.4** released December 29, 2025.
|
|
362
401
|
|
|
363
402
|
- **1,451 controls** across all domains
|
|
364
|
-
- **
|
|
403
|
+
- **580+ framework mappings** (28 frameworks × 18-777 controls each)
|
|
365
404
|
- Licensed under **Creative Commons** (data)
|
|
366
405
|
- Source: [ComplianceForge SCF](https://securecontrolsframework.com/)
|
|
367
406
|
|
|
@@ -20,7 +20,7 @@ python test_mcp_integration.py
|
|
|
20
20
|
Expected output:
|
|
21
21
|
- ✅ All tests passed!
|
|
22
22
|
- No errors or tracebacks
|
|
23
|
-
- Data loads correctly (1,451 controls,
|
|
23
|
+
- Data loads correctly (1,451 controls, 28 frameworks)
|
|
24
24
|
|
|
25
25
|
---
|
|
26
26
|
|
|
@@ -57,7 +57,7 @@ Once configured in Claude Desktop, try these queries:
|
|
|
57
57
|
**Query:** "List available frameworks"
|
|
58
58
|
|
|
59
59
|
**Expected Response:**
|
|
60
|
-
-
|
|
60
|
+
- 28 frameworks total
|
|
61
61
|
- NIST SP 800-53 R5: 777 controls
|
|
62
62
|
- SOC 2: 412 controls
|
|
63
63
|
- PCI DSS v4.0.1: 364 controls
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
[project]
|
|
2
2
|
name = "security-controls-mcp"
|
|
3
|
-
version = "0.2.
|
|
3
|
+
version = "0.2.1"
|
|
4
4
|
description = "MCP server for querying security framework controls (SCF) - map between ISO 27001, NIST CSF, DORA, PCI DSS, and more"
|
|
5
5
|
readme = "README.md"
|
|
6
6
|
requires-python = ">=3.10"
|
|
@@ -32,6 +32,7 @@ def extract_scf_controls(excel_path: Path) -> dict:
|
|
|
32
32
|
|
|
33
33
|
# Define framework columns to extract
|
|
34
34
|
framework_columns = {
|
|
35
|
+
# Original 16 frameworks
|
|
35
36
|
"nist_csf_2.0": "NIST\nCSF\n2.0",
|
|
36
37
|
"nist_800_53_r5": "NIST\n800-53\nR5",
|
|
37
38
|
"iso_27001_2022": "ISO\n27001\n2022",
|
|
@@ -48,6 +49,22 @@ def extract_scf_controls(excel_path: Path) -> dict:
|
|
|
48
49
|
"uk_cyber_essentials": "EMEA\nUK\nCyber Essentials",
|
|
49
50
|
"fedramp_r5_moderate": "US\nFedRAMP R5\n(moderate)",
|
|
50
51
|
"hipaa_security_rule": "US\nHIPAA\nSecurity Rule / NIST SP 800-66 R2",
|
|
52
|
+
# Tier 1: APAC (3 frameworks)
|
|
53
|
+
"australia_essential_8": "APAC\nAustralia\nEssential 8",
|
|
54
|
+
"australia_ism_2024": "APAC\nAustralia\nISM\nJune 2024",
|
|
55
|
+
"singapore_mas_trm_2021": "APAC\nSingapore MAS\nTRM 2021",
|
|
56
|
+
# Tier 1: Industry/Privacy (2 frameworks)
|
|
57
|
+
"swift_cscf_2023": "SWIFT\nCSF\n2023",
|
|
58
|
+
"nist_privacy_framework_1_0": "NIST Privacy Framework\n1.0",
|
|
59
|
+
# Tier 2: European National (6 frameworks)
|
|
60
|
+
"netherlands": "EMEA\nNetherlands",
|
|
61
|
+
"norway": "EMEA\nNorway",
|
|
62
|
+
"sweden": "EMEA\nSweden",
|
|
63
|
+
"germany": "EMEA\nGermany",
|
|
64
|
+
"germany_bait": "EMEA\nGermany\nBanking Supervisory Requirements for IT (BAIT)",
|
|
65
|
+
"germany_c5_2020": "EMEA\nGermany\nC5\n2020",
|
|
66
|
+
# Tier 3: Cloud (1 framework)
|
|
67
|
+
"csa_ccm_4": "CSA\nCCM\n4",
|
|
51
68
|
}
|
|
52
69
|
|
|
53
70
|
# Build column index map
|