security-controls-mcp 0.2.0__tar.gz → 0.2.1__tar.gz

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (53) hide show
  1. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/CHANGELOG.md +26 -0
  2. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/CLAUDE_CODE_SETUP.md +1 -1
  3. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/DEPLOYMENT_CHECKLIST.md +6 -6
  4. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/INSTALL.md +1 -1
  5. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/PAID_STANDARDS_GUIDE.md +1 -1
  6. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/PKG-INFO +50 -11
  7. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/QUICK_START.md +1 -1
  8. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/README.md +49 -10
  9. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/TESTING.md +2 -2
  10. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/pyproject.toml +1 -1
  11. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/scf-extract-starter.py +17 -0
  12. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/src/security_controls_mcp/__init__.py +1 -1
  13. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/src/security_controls_mcp/data/framework-to-scf.json +9453 -2035
  14. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/src/security_controls_mcp/data/scf-controls.json +24413 -1373
  15. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/src/security_controls_mcp/data_loader.py +17 -0
  16. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/src/security_controls_mcp.egg-info/PKG-INFO +50 -11
  17. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/tests/test_data_loader.py +1 -1
  18. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/tests/test_integration.py +1 -1
  19. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/tests/test_smoke.py +15 -1
  20. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/verify_production_ready.py +4 -4
  21. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/.gitleaks.toml +0 -0
  22. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/CI-CD-PIPELINE.md +0 -0
  23. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/Dockerfile +0 -0
  24. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/LEGAL_COMPLIANCE.md +0 -0
  25. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/LICENSE +0 -0
  26. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/LICENSE-DATA.md +0 -0
  27. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/MANIFEST.in +0 -0
  28. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/SECURITY-TOOLS.md +0 -0
  29. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/SECURITY.md +0 -0
  30. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/quality_test.py +0 -0
  31. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/scf-query-tester.py +0 -0
  32. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/setup.cfg +0 -0
  33. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/src/security_controls_mcp/__main__.py +0 -0
  34. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/src/security_controls_mcp/cli.py +0 -0
  35. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/src/security_controls_mcp/config.py +0 -0
  36. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/src/security_controls_mcp/extractors/__init__.py +0 -0
  37. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/src/security_controls_mcp/extractors/pdf_extractor.py +0 -0
  38. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/src/security_controls_mcp/http_server.py +0 -0
  39. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/src/security_controls_mcp/legal_notice.py +0 -0
  40. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/src/security_controls_mcp/providers.py +0 -0
  41. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/src/security_controls_mcp/registry.py +0 -0
  42. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/src/security_controls_mcp/server.py +0 -0
  43. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/src/security_controls_mcp.egg-info/SOURCES.txt +0 -0
  44. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/src/security_controls_mcp.egg-info/dependency_links.txt +0 -0
  45. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/src/security_controls_mcp.egg-info/entry_points.txt +0 -0
  46. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/src/security_controls_mcp.egg-info/requires.txt +0 -0
  47. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/src/security_controls_mcp.egg-info/top_level.txt +0 -0
  48. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/test_server.py +0 -0
  49. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/tests/README.md +0 -0
  50. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/tests/__init__.py +0 -0
  51. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/tests/test_content_quality.py +0 -0
  52. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/tests/test_paid_standards.py +0 -0
  53. {security_controls_mcp-0.2.0 → security_controls_mcp-0.2.1}/tests/test_security.py +0 -0
@@ -5,6 +5,32 @@ All notable changes to this project will be documented in this file.
5
5
  The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
6
6
  and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).
7
7
 
8
+ ## [0.3.0] - 2026-01-29
9
+
10
+ ### Added
11
+ - **12 new framework mappings** from SCF 2025.4 - expanded global coverage
12
+ - **APAC:** Australian Essential Eight (37 controls), Australian ISM June 2024 (336 controls), Singapore MAS TRM 2021 (214 controls)
13
+ - **Financial:** SWIFT Customer Security Framework 2023 (127 controls)
14
+ - **Privacy:** NIST Privacy Framework 1.0 (187 controls)
15
+ - **European National:** Netherlands (27 controls), Norway (23 controls), Sweden (25 controls), Germany general (18 controls), Germany BAIT (91 controls), Germany C5:2020 (239 controls)
16
+ - **Cloud:** CSA Cloud Controls Matrix v4 (334 controls)
17
+ - **Framework Roadmap** section in README documenting:
18
+ - All 28 available frameworks with control counts
19
+ - Frameworks not yet available (BIO, KATAKRI, NSM, MSB, CFCS, CCB, ANSSI)
20
+ - Clear guidance on maintaining data quality via SCF-only mappings
21
+
22
+ ### Changed
23
+ - Total framework coverage: **16 → 28 frameworks** (+75% expansion)
24
+ - Updated all documentation to reflect new framework count
25
+ - Enhanced framework categories in README (added APAC, European National, Financial, Cloud)
26
+ - Updated tests to verify 28 frameworks
27
+ - Updated `scf-extract-starter.py` with 12 new framework column mappings
28
+
29
+ ### Technical
30
+ - Re-extracted data from SCF 2025.4 Excel file with expanded framework coverage
31
+ - Updated `src/security_controls_mcp/data_loader.py` with new framework display names
32
+ - All existing tools automatically support new frameworks (no API changes)
33
+
8
34
  ## [0.2.0] - 2025-01-29
9
35
 
10
36
  ### Added
@@ -183,7 +183,7 @@ Or use a relative path (less reliable):
183
183
  User: List all available security frameworks
184
184
 
185
185
  Claude: [Uses security-controls MCP server]
186
- **Available Frameworks (16 total)**
186
+ **Available Frameworks (28 total)**
187
187
 
188
188
  - **nist_800_53_r5**: NIST SP 800-53 Revision 5 (777 controls)
189
189
  - **soc_2_tsc**: SOC 2 (TSC 2017:2022) (412 controls)
@@ -13,7 +13,7 @@
13
13
  - [ ] Run `python test_server.py` → All 5 tools work correctly
14
14
  - [ ] Data files present: `scf-controls.json` (1.5MB), `framework-to-scf.json` (194KB)
15
15
  - [ ] All 1,451 controls loaded
16
- - [ ] All 16 frameworks mapped correctly
16
+ - [ ] All 28 frameworks mapped correctly
17
17
 
18
18
  **Command:**
19
19
  ```bash
@@ -51,7 +51,7 @@ python verify_production_ready.py
51
51
  ### ✅ Local Testing
52
52
 
53
53
  - [ ] Install in your own Claude Desktop (follow QUICK_START.md)
54
- - [ ] Test query: "List all available security frameworks" → Returns 16 frameworks
54
+ - [ ] Test query: "List all available security frameworks" → Returns 28 frameworks
55
55
  - [ ] Test query: "Search for encryption controls" → Returns CRY-* controls
56
56
  - [ ] Test query: "Show me GOV-01 details" → Returns full control data
57
57
  - [ ] Test query: "Map ISO 27001 5.1 to DORA" → Returns mappings
@@ -94,7 +94,7 @@ First production release of the Security Controls MCP server for Claude.
94
94
  **Tools:**
95
95
  1. `get_control` - Get details for specific controls
96
96
  2. `search_controls` - Search by keyword
97
- 3. `list_frameworks` - List all 16 frameworks
97
+ 3. `list_frameworks` - List all 28 frameworks
98
98
  4. `get_framework_controls` - Get all controls for a framework
99
99
  5. `map_frameworks` - Map between frameworks
100
100
 
@@ -121,7 +121,7 @@ python verify_production_ready.py
121
121
 
122
122
  All tests pass:
123
123
  - ✅ 1,451 controls loaded
124
- - ✅ 16 frameworks mapped
124
+ - ✅ 28 frameworks mapped
125
125
  - ✅ 5 tools functional
126
126
  - ✅ MCP protocol working
127
127
  - ✅ Claude Desktop compatible
@@ -153,7 +153,7 @@ Submit to: https://smithery.ai/submit
153
153
 
154
154
  **Submission details:**
155
155
  - Name: security-controls-mcp
156
- - Description: "MCP server providing 1,451 security controls across 16 frameworks (NIST, ISO, DORA, PCI DSS, SOC 2) for compliance mapping and gap analysis"
156
+ - Description: "MCP server providing 1,451 security controls across 28 frameworks (NIST, ISO, DORA, PCI DSS, SOC 2) for compliance mapping and gap analysis"
157
157
  - Repository: https://github.com/Ansvar-Systems/security-controls-mcp
158
158
  - Installation command: See INSTALL.md
159
159
  - Category: Security / Compliance
@@ -203,7 +203,7 @@ GitHub: https://github.com/Ansvar-Systems/security-controls-mcp
203
203
  I built an MCP server that brings security/compliance framework data directly into Claude conversations.
204
204
 
205
205
  **What it does:**
206
- - Access 1,451 security controls from 16 frameworks
206
+ - Access 1,451 security controls from 28 frameworks
207
207
  - Search controls by keyword
208
208
  - Map between frameworks (ISO ↔ DORA, NIST ↔ SOC 2, etc.)
209
209
  - Get control implementation details
@@ -59,7 +59,7 @@ python test_server.py
59
59
  You should see:
60
60
  ```
61
61
  ✓ Loaded 1451 controls
62
- ✓ Loaded 16 frameworks
62
+ ✓ Loaded 28 frameworks
63
63
  ✓ All tests passed!
64
64
  ```
65
65
 
@@ -6,7 +6,7 @@ This guide explains how to add your purchased security standards (ISO 27001, NIS
6
6
 
7
7
  ## Overview
8
8
 
9
- The Security Controls MCP Server includes **1,451 free SCF controls** that map across 16 frameworks. When you add your **purchased standards**, you get:
9
+ The Security Controls MCP Server includes **1,451 free SCF controls** that map across 28 frameworks. When you add your **purchased standards**, you get:
10
10
 
11
11
  - ✅ **Official text** from your licensed copies
12
12
  - ✅ **Full clauses** with page numbers
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.4
2
2
  Name: security-controls-mcp
3
- Version: 0.2.0
3
+ Version: 0.2.1
4
4
  Summary: MCP server for querying security framework controls (SCF) - map between ISO 27001, NIST CSF, DORA, PCI DSS, and more
5
5
  Author-email: Ansvar Systems <hello@ansvar.eu>
6
6
  License: Apache-2.0
@@ -43,7 +43,7 @@ Dynamic: license-file
43
43
 
44
44
  **The universal translator for security frameworks.**
45
45
 
46
- The Security Controls MCP Server is an open-source tool that makes 1,451 security controls across 16 frameworks searchable and AI-accessible directly through Claude, Cursor, or any MCP-compatible client.
46
+ The Security Controls MCP Server is an open-source tool that makes 1,451 security controls across 28 frameworks searchable and AI-accessible directly through Claude, Cursor, or any MCP-compatible client.
47
47
 
48
48
  Built on the [Secure Controls Framework (SCF)](https://securecontrolsframework.com/) by ComplianceForge.
49
49
 
@@ -51,7 +51,7 @@ Built on the [Secure Controls Framework (SCF)](https://securecontrolsframework.c
51
51
 
52
52
  **Coverage:**
53
53
  - 1,451 security controls spanning governance, risk, compliance, and technical domains
54
- - 16 major frameworks including ISO 27001, NIST CSF, DORA, PCI DSS, CMMC, and more
54
+ - 28 major frameworks including ISO 27001, NIST CSF, DORA, PCI DSS, CMMC, Australian Essential Eight, Singapore MAS TRM, SWIFT CSCF, and more
55
55
  - Bidirectional mapping between any two frameworks via SCF rosetta stone
56
56
  - Optional integration with purchased standards (ISO, NIST 800-53) for official text
57
57
 
@@ -229,37 +229,76 @@ Ask Claude these natural language questions:
229
229
 
230
230
  ---
231
231
 
232
- ## Available Frameworks (16 Total)
232
+ ## Available Frameworks (28 Total)
233
233
 
234
234
  When you call `list_frameworks()`, you get:
235
235
 
236
236
  ```
237
- Available Frameworks (16 total)
237
+ Available Frameworks (28 total)
238
238
 
239
239
  - nist_800_53_r5: NIST SP 800-53 Revision 5 (777 controls)
240
240
  - soc_2_tsc: SOC 2 (TSC 2017:2022) (412 controls)
241
241
  - pci_dss_4.0.1: PCI DSS v4.0.1 (364 controls)
242
242
  - fedramp_r5_moderate: FedRAMP Revision 5 (Moderate) (343 controls)
243
+ - australia_ism_2024: Australian ISM (June 2024) (336 controls)
244
+ - csa_ccm_4: CSA Cloud Controls Matrix v4 (334 controls)
243
245
  - iso_27002_2022: ISO/IEC 27002:2022 (316 controls)
244
246
  - nist_csf_2.0: NIST Cybersecurity Framework 2.0 (253 controls)
247
+ - germany_c5_2020: Germany C5:2020 (Cloud Controls) (239 controls)
245
248
  - cis_csc_8.1: CIS Critical Security Controls v8.1 (234 controls)
249
+ - singapore_mas_trm_2021: Singapore MAS TRM 2021 (214 controls)
246
250
  - cmmc_2.0_level_2: CMMC 2.0 Level 2 (198 controls)
251
+ - nist_privacy_framework_1_0: NIST Privacy Framework 1.0 (187 controls)
247
252
  - hipaa_security_rule: HIPAA Security Rule (136 controls)
253
+ - swift_cscf_2023: SWIFT Customer Security Framework 2023 (127 controls)
248
254
  - dora: Digital Operational Resilience Act (DORA) (103 controls)
255
+ - germany_bait: Germany BAIT (Banking IT Requirements) (91 controls)
249
256
  - nis2: Network and Information Security Directive (NIS2) (68 controls)
250
257
  - ncsc_caf_4.0: NCSC Cyber Assessment Framework 4.0 (67 controls)
251
258
  - cmmc_2.0_level_1: CMMC 2.0 Level 1 (52 controls)
252
259
  - iso_27001_2022: ISO/IEC 27001:2022 (51 controls)
253
260
  - gdpr: General Data Protection Regulation (GDPR) (42 controls)
261
+ - australia_essential_8: Australian Essential Eight (37 controls)
262
+ - netherlands: Netherlands Cybersecurity Regulations (27 controls)
254
263
  - uk_cyber_essentials: UK Cyber Essentials (26 controls)
264
+ - sweden: Sweden Cybersecurity Regulations (25 controls)
265
+ - norway: Norway Cybersecurity Regulations (23 controls)
266
+ - germany: Germany Cybersecurity Regulations (18 controls)
255
267
  ```
256
268
 
257
269
  **Framework categories:**
258
- - **Government:** NIST 800-53, NIST CSF, FedRAMP, CMMC
270
+ - **US Government:** NIST 800-53, NIST CSF, NIST Privacy, FedRAMP, CMMC
259
271
  - **International Standards:** ISO 27001, ISO 27002, CIS CSC
260
- - **Industry:** PCI DSS, SOC 2, HIPAA
261
- - **EU Regulations:** DORA, NIS2, GDPR
272
+ - **US Industry:** PCI DSS, SOC 2, HIPAA
273
+ - **APAC:** Australia Essential Eight, Australia ISM, Singapore MAS TRM
274
+ - **EU Regulations:** GDPR, DORA, NIS2
262
275
  - **UK Standards:** NCSC CAF, Cyber Essentials
276
+ - **European National:** Netherlands, Norway, Sweden, Germany (general/BAIT/C5)
277
+ - **Financial:** SWIFT CSCF
278
+ - **Cloud:** CSA CCM
279
+
280
+ ---
281
+
282
+ ## Framework Roadmap
283
+
284
+ **Not Yet Available (Waiting for SCF Coverage):**
285
+
286
+ These security frameworks are not currently included because the Secure Controls Framework (SCF) doesn't provide official mappings. We maintain data quality and compliance consulting credibility by using only ComplianceForge-vetted mappings.
287
+
288
+ - 🇳🇱 **Netherlands BIO** (Baseline Informatiebeveiliging Overheid) - Dutch government security baseline
289
+ - 🇫🇮 **Finland KATAKRI** - Finnish defense forces security audit criteria
290
+ - 🇳🇴 **Norway NSM** Grunnprinsipper - Norwegian NSA basic security principles
291
+ - 🇸🇪 **Sweden MSB** - Swedish Civil Contingencies Agency cybersecurity frameworks
292
+ - 🇩🇰 **Denmark CFCS** - Center for Cybersikkerhed guidelines
293
+ - 🇧🇪 **Belgium CCB** - Centre for Cybersecurity Belgium frameworks
294
+ - 🇫🇷 **France ANSSI** SecNumCloud - French cybersecurity agency cloud framework
295
+
296
+ **Note:** The European country frameworks we DO include (Netherlands, Norway, Sweden, Germany) map to national cybersecurity **laws and regulations** (article numbers from GDPR, NIS2, etc.), not the specific security baseline frameworks listed above.
297
+
298
+ **Want these frameworks?**
299
+
300
+ 1. **For private use:** Fork this repository and use the [paid standards import feature](PAID_STANDARDS_GUIDE.md) to add your purchased frameworks
301
+ 2. **For public benefit:** Contribute framework mappings to SCF at https://securecontrolsframework.com/contact/
263
302
 
264
303
  ---
265
304
 
@@ -272,7 +311,7 @@ Get details about a specific SCF control by ID.
272
311
  get_control(control_id="GOV-01")
273
312
  ```
274
313
 
275
- **Returns:** Full control details including description, domain, weight, PPTDF category, and mappings to all 16 frameworks.
314
+ **Returns:** Full control details including description, domain, weight, PPTDF category, and mappings to all 28 frameworks.
276
315
 
277
316
  ---
278
317
 
@@ -296,7 +335,7 @@ List all available frameworks with metadata.
296
335
  list_frameworks()
297
336
  ```
298
337
 
299
- **Returns:** All 16 frameworks with display names and control counts.
338
+ **Returns:** All 28 frameworks with display names and control counts.
300
339
 
301
340
  ---
302
341
 
@@ -395,7 +434,7 @@ SCF JSON → In-memory index → MCP tools → AI response
395
434
  Based on **SCF 2025.4** released December 29, 2025.
396
435
 
397
436
  - **1,451 controls** across all domains
398
- - **180+ framework mappings** (16 frameworks × 0-777 controls each)
437
+ - **580+ framework mappings** (28 frameworks × 18-777 controls each)
399
438
  - Licensed under **Creative Commons** (data)
400
439
  - Source: [ComplianceForge SCF](https://securecontrolsframework.com/)
401
440
 
@@ -63,7 +63,7 @@ List all available security frameworks
63
63
 
64
64
  You should see output like:
65
65
  ```
66
- **Available Frameworks (16 total)**
66
+ **Available Frameworks (28 total)**
67
67
 
68
68
  - **nist_800_53_r5**: NIST SP 800-53 Revision 5 (777 controls)
69
69
  - **soc_2_tsc**: SOC 2 (TSC 2017:2022) (412 controls)
@@ -9,7 +9,7 @@
9
9
 
10
10
  **The universal translator for security frameworks.**
11
11
 
12
- The Security Controls MCP Server is an open-source tool that makes 1,451 security controls across 16 frameworks searchable and AI-accessible directly through Claude, Cursor, or any MCP-compatible client.
12
+ The Security Controls MCP Server is an open-source tool that makes 1,451 security controls across 28 frameworks searchable and AI-accessible directly through Claude, Cursor, or any MCP-compatible client.
13
13
 
14
14
  Built on the [Secure Controls Framework (SCF)](https://securecontrolsframework.com/) by ComplianceForge.
15
15
 
@@ -17,7 +17,7 @@ Built on the [Secure Controls Framework (SCF)](https://securecontrolsframework.c
17
17
 
18
18
  **Coverage:**
19
19
  - 1,451 security controls spanning governance, risk, compliance, and technical domains
20
- - 16 major frameworks including ISO 27001, NIST CSF, DORA, PCI DSS, CMMC, and more
20
+ - 28 major frameworks including ISO 27001, NIST CSF, DORA, PCI DSS, CMMC, Australian Essential Eight, Singapore MAS TRM, SWIFT CSCF, and more
21
21
  - Bidirectional mapping between any two frameworks via SCF rosetta stone
22
22
  - Optional integration with purchased standards (ISO, NIST 800-53) for official text
23
23
 
@@ -195,37 +195,76 @@ Ask Claude these natural language questions:
195
195
 
196
196
  ---
197
197
 
198
- ## Available Frameworks (16 Total)
198
+ ## Available Frameworks (28 Total)
199
199
 
200
200
  When you call `list_frameworks()`, you get:
201
201
 
202
202
  ```
203
- Available Frameworks (16 total)
203
+ Available Frameworks (28 total)
204
204
 
205
205
  - nist_800_53_r5: NIST SP 800-53 Revision 5 (777 controls)
206
206
  - soc_2_tsc: SOC 2 (TSC 2017:2022) (412 controls)
207
207
  - pci_dss_4.0.1: PCI DSS v4.0.1 (364 controls)
208
208
  - fedramp_r5_moderate: FedRAMP Revision 5 (Moderate) (343 controls)
209
+ - australia_ism_2024: Australian ISM (June 2024) (336 controls)
210
+ - csa_ccm_4: CSA Cloud Controls Matrix v4 (334 controls)
209
211
  - iso_27002_2022: ISO/IEC 27002:2022 (316 controls)
210
212
  - nist_csf_2.0: NIST Cybersecurity Framework 2.0 (253 controls)
213
+ - germany_c5_2020: Germany C5:2020 (Cloud Controls) (239 controls)
211
214
  - cis_csc_8.1: CIS Critical Security Controls v8.1 (234 controls)
215
+ - singapore_mas_trm_2021: Singapore MAS TRM 2021 (214 controls)
212
216
  - cmmc_2.0_level_2: CMMC 2.0 Level 2 (198 controls)
217
+ - nist_privacy_framework_1_0: NIST Privacy Framework 1.0 (187 controls)
213
218
  - hipaa_security_rule: HIPAA Security Rule (136 controls)
219
+ - swift_cscf_2023: SWIFT Customer Security Framework 2023 (127 controls)
214
220
  - dora: Digital Operational Resilience Act (DORA) (103 controls)
221
+ - germany_bait: Germany BAIT (Banking IT Requirements) (91 controls)
215
222
  - nis2: Network and Information Security Directive (NIS2) (68 controls)
216
223
  - ncsc_caf_4.0: NCSC Cyber Assessment Framework 4.0 (67 controls)
217
224
  - cmmc_2.0_level_1: CMMC 2.0 Level 1 (52 controls)
218
225
  - iso_27001_2022: ISO/IEC 27001:2022 (51 controls)
219
226
  - gdpr: General Data Protection Regulation (GDPR) (42 controls)
227
+ - australia_essential_8: Australian Essential Eight (37 controls)
228
+ - netherlands: Netherlands Cybersecurity Regulations (27 controls)
220
229
  - uk_cyber_essentials: UK Cyber Essentials (26 controls)
230
+ - sweden: Sweden Cybersecurity Regulations (25 controls)
231
+ - norway: Norway Cybersecurity Regulations (23 controls)
232
+ - germany: Germany Cybersecurity Regulations (18 controls)
221
233
  ```
222
234
 
223
235
  **Framework categories:**
224
- - **Government:** NIST 800-53, NIST CSF, FedRAMP, CMMC
236
+ - **US Government:** NIST 800-53, NIST CSF, NIST Privacy, FedRAMP, CMMC
225
237
  - **International Standards:** ISO 27001, ISO 27002, CIS CSC
226
- - **Industry:** PCI DSS, SOC 2, HIPAA
227
- - **EU Regulations:** DORA, NIS2, GDPR
238
+ - **US Industry:** PCI DSS, SOC 2, HIPAA
239
+ - **APAC:** Australia Essential Eight, Australia ISM, Singapore MAS TRM
240
+ - **EU Regulations:** GDPR, DORA, NIS2
228
241
  - **UK Standards:** NCSC CAF, Cyber Essentials
242
+ - **European National:** Netherlands, Norway, Sweden, Germany (general/BAIT/C5)
243
+ - **Financial:** SWIFT CSCF
244
+ - **Cloud:** CSA CCM
245
+
246
+ ---
247
+
248
+ ## Framework Roadmap
249
+
250
+ **Not Yet Available (Waiting for SCF Coverage):**
251
+
252
+ These security frameworks are not currently included because the Secure Controls Framework (SCF) doesn't provide official mappings. We maintain data quality and compliance consulting credibility by using only ComplianceForge-vetted mappings.
253
+
254
+ - 🇳🇱 **Netherlands BIO** (Baseline Informatiebeveiliging Overheid) - Dutch government security baseline
255
+ - 🇫🇮 **Finland KATAKRI** - Finnish defense forces security audit criteria
256
+ - 🇳🇴 **Norway NSM** Grunnprinsipper - Norwegian NSA basic security principles
257
+ - 🇸🇪 **Sweden MSB** - Swedish Civil Contingencies Agency cybersecurity frameworks
258
+ - 🇩🇰 **Denmark CFCS** - Center for Cybersikkerhed guidelines
259
+ - 🇧🇪 **Belgium CCB** - Centre for Cybersecurity Belgium frameworks
260
+ - 🇫🇷 **France ANSSI** SecNumCloud - French cybersecurity agency cloud framework
261
+
262
+ **Note:** The European country frameworks we DO include (Netherlands, Norway, Sweden, Germany) map to national cybersecurity **laws and regulations** (article numbers from GDPR, NIS2, etc.), not the specific security baseline frameworks listed above.
263
+
264
+ **Want these frameworks?**
265
+
266
+ 1. **For private use:** Fork this repository and use the [paid standards import feature](PAID_STANDARDS_GUIDE.md) to add your purchased frameworks
267
+ 2. **For public benefit:** Contribute framework mappings to SCF at https://securecontrolsframework.com/contact/
229
268
 
230
269
  ---
231
270
 
@@ -238,7 +277,7 @@ Get details about a specific SCF control by ID.
238
277
  get_control(control_id="GOV-01")
239
278
  ```
240
279
 
241
- **Returns:** Full control details including description, domain, weight, PPTDF category, and mappings to all 16 frameworks.
280
+ **Returns:** Full control details including description, domain, weight, PPTDF category, and mappings to all 28 frameworks.
242
281
 
243
282
  ---
244
283
 
@@ -262,7 +301,7 @@ List all available frameworks with metadata.
262
301
  list_frameworks()
263
302
  ```
264
303
 
265
- **Returns:** All 16 frameworks with display names and control counts.
304
+ **Returns:** All 28 frameworks with display names and control counts.
266
305
 
267
306
  ---
268
307
 
@@ -361,7 +400,7 @@ SCF JSON → In-memory index → MCP tools → AI response
361
400
  Based on **SCF 2025.4** released December 29, 2025.
362
401
 
363
402
  - **1,451 controls** across all domains
364
- - **180+ framework mappings** (16 frameworks × 0-777 controls each)
403
+ - **580+ framework mappings** (28 frameworks × 18-777 controls each)
365
404
  - Licensed under **Creative Commons** (data)
366
405
  - Source: [ComplianceForge SCF](https://securecontrolsframework.com/)
367
406
 
@@ -20,7 +20,7 @@ python test_mcp_integration.py
20
20
  Expected output:
21
21
  - ✅ All tests passed!
22
22
  - No errors or tracebacks
23
- - Data loads correctly (1,451 controls, 16 frameworks)
23
+ - Data loads correctly (1,451 controls, 28 frameworks)
24
24
 
25
25
  ---
26
26
 
@@ -57,7 +57,7 @@ Once configured in Claude Desktop, try these queries:
57
57
  **Query:** "List available frameworks"
58
58
 
59
59
  **Expected Response:**
60
- - 16 frameworks total
60
+ - 28 frameworks total
61
61
  - NIST SP 800-53 R5: 777 controls
62
62
  - SOC 2: 412 controls
63
63
  - PCI DSS v4.0.1: 364 controls
@@ -1,6 +1,6 @@
1
1
  [project]
2
2
  name = "security-controls-mcp"
3
- version = "0.2.0"
3
+ version = "0.2.1"
4
4
  description = "MCP server for querying security framework controls (SCF) - map between ISO 27001, NIST CSF, DORA, PCI DSS, and more"
5
5
  readme = "README.md"
6
6
  requires-python = ">=3.10"
@@ -32,6 +32,7 @@ def extract_scf_controls(excel_path: Path) -> dict:
32
32
 
33
33
  # Define framework columns to extract
34
34
  framework_columns = {
35
+ # Original 16 frameworks
35
36
  "nist_csf_2.0": "NIST\nCSF\n2.0",
36
37
  "nist_800_53_r5": "NIST\n800-53\nR5",
37
38
  "iso_27001_2022": "ISO\n27001\n2022",
@@ -48,6 +49,22 @@ def extract_scf_controls(excel_path: Path) -> dict:
48
49
  "uk_cyber_essentials": "EMEA\nUK\nCyber Essentials",
49
50
  "fedramp_r5_moderate": "US\nFedRAMP R5\n(moderate)",
50
51
  "hipaa_security_rule": "US\nHIPAA\nSecurity Rule / NIST SP 800-66 R2",
52
+ # Tier 1: APAC (3 frameworks)
53
+ "australia_essential_8": "APAC\nAustralia\nEssential 8",
54
+ "australia_ism_2024": "APAC\nAustralia\nISM\nJune 2024",
55
+ "singapore_mas_trm_2021": "APAC\nSingapore MAS\nTRM 2021",
56
+ # Tier 1: Industry/Privacy (2 frameworks)
57
+ "swift_cscf_2023": "SWIFT\nCSF\n2023",
58
+ "nist_privacy_framework_1_0": "NIST Privacy Framework\n1.0",
59
+ # Tier 2: European National (6 frameworks)
60
+ "netherlands": "EMEA\nNetherlands",
61
+ "norway": "EMEA\nNorway",
62
+ "sweden": "EMEA\nSweden",
63
+ "germany": "EMEA\nGermany",
64
+ "germany_bait": "EMEA\nGermany\nBanking Supervisory Requirements for IT (BAIT)",
65
+ "germany_c5_2020": "EMEA\nGermany\nC5\n2020",
66
+ # Tier 3: Cloud (1 framework)
67
+ "csa_ccm_4": "CSA\nCCM\n4",
51
68
  }
52
69
 
53
70
  # Build column index map
@@ -1,3 +1,3 @@
1
1
  """Security Controls MCP Server - Query security framework controls and mappings."""
2
2
 
3
- __version__ = "0.2.0"
3
+ __version__ = "0.3.0"