|
11 | 11 | "name": "iso27001", |
12 | 12 | "source": "./plugins/iso27001", |
13 | 13 | "description": "Expert ISO 27001 gap analysis, policy writing, Annex A control guidance, SoA generation, and risk register creation for both 2013 and 2022 versions.", |
14 | | - "version": "0.3.0", |
| 14 | + "version": "0.4.0", |
15 | 15 | "author": { |
16 | 16 | "name": "Hemant Naik", |
17 | 17 | "email": "hemant.naik@gmail.com" |
|
32 | 32 | "name": "soc2", |
33 | 33 | "source": "./plugins/soc2", |
34 | 34 | "description": "Expert SOC 2 compliance advisor covering all Trust Services Criteria \u2014 gap analysis, policy drafting, control documentation, audit evidence, and vendor risk.", |
35 | | - "version": "0.3.0", |
| 35 | + "version": "0.4.0", |
36 | 36 | "author": { |
37 | 37 | "name": "Hemant Naik", |
38 | 38 | "email": "hemant.naik@gmail.com" |
|
52 | 52 | "name": "fedramp", |
53 | 53 | "source": "./plugins/fedramp", |
54 | 54 | "description": "End-to-end FedRAMP authorization guidance \u2014 readiness assessments, SSP narratives, POA&M management, NIST 800-53 Rev 5 control mapping, and ConMon support.", |
55 | | - "version": "0.3.0", |
| 55 | + "version": "0.4.0", |
56 | 56 | "author": { |
57 | 57 | "name": "Hemant Naik", |
58 | 58 | "email": "hemant.naik@gmail.com" |
|
74 | 74 | "name": "gdpr-compliance", |
75 | 75 | "source": "./plugins/gdpr-compliance", |
76 | 76 | "description": "GDPR compliance assistant \u2014 code and system audits, privacy notice drafting, DPAs, DPIAs, data flow reviews, and authoritative article-cited Q&A.", |
77 | | - "version": "0.3.0", |
| 77 | + "version": "0.4.0", |
78 | 78 | "author": { |
79 | 79 | "name": "Hemant Naik", |
80 | 80 | "email": "hemant.naik@gmail.com" |
|
95 | 95 | "name": "hipaa-compliance", |
96 | 96 | "source": "./plugins/hipaa-compliance", |
97 | 97 | "description": "HIPAA compliance advisor covering Privacy Rule, Security Rule, and Breach Notification \u2014 document generation, technical safeguards for cloud, and breach response.", |
98 | | - "version": "0.3.0", |
| 98 | + "version": "0.4.0", |
99 | 99 | "author": { |
100 | 100 | "name": "Hemant Naik", |
101 | 101 | "email": "hemant.naik@gmail.com" |
|
116 | 116 | "name": "nist-csf", |
117 | 117 | "source": "./plugins/nist-csf", |
118 | 118 | "description": "NIST Cybersecurity Framework (CSF 2.0 and 1.1) advisor \u2014 gap assessments, organisational profiles, implementation tiers, roadmaps, cross-framework mapping, and cybersecurity policy generation.", |
119 | | - "version": "0.3.0", |
| 119 | + "version": "0.4.0", |
120 | 120 | "author": { |
121 | 121 | "name": "Hemant Naik", |
122 | 122 | "email": "hemant.naik@gmail.com" |
|
139 | 139 | "name": "pci-compliance", |
140 | 140 | "source": "./plugins/pci-compliance", |
141 | 141 | "description": "PCI DSS v4.0.1 compliance advisor \u2014 CDE scoping, SAQ selection, gap assessments, control implementation guidance, QSA audit preparation, and remediation planning.", |
142 | | - "version": "0.3.0", |
| 142 | + "version": "0.4.0", |
143 | 143 | "author": { |
144 | 144 | "name": "Hemant Naik", |
145 | 145 | "email": "hemant.naik@gmail.com" |
|
161 | 161 | "name": "tsa-compliance", |
162 | 162 | "source": "./plugins/tsa-compliance", |
163 | 163 | "description": "TSA cybersecurity compliance advisor for critical infrastructure \u2014 pipeline, freight rail, and transit Security Directive requirements including CIP/COIP, IRP, ADR, CAP, incident reporting, and OT/ICS security.", |
164 | | - "version": "0.3.0", |
| 164 | + "version": "0.4.0", |
165 | 165 | "author": { |
166 | 166 | "name": "Hemant Naik", |
167 | 167 | "email": "hemant.naik@gmail.com" |
|
183 | 183 | "name": "iso27701", |
184 | 184 | "source": "./plugins/iso27701", |
185 | 185 | "description": "ISO 27701 Privacy Information Management System (PIMS) advisor \u2014 gap analysis, PIMS implementation, Annex A control guidance (A.1 controller, A.2 processor, A.3 security), SoA generation, privacy risk assessment, GDPR alignment, 2019\u21922025 transition, and certification readiness.", |
186 | | - "version": "0.3.0", |
| 186 | + "version": "0.4.0", |
187 | 187 | "author": { |
188 | 188 | "name": "Hemant Naik", |
189 | 189 | "email": "hemant.naik@gmail.com" |
|
205 | 205 | "name": "iso42001", |
206 | 206 | "source": "./plugins/iso42001", |
207 | 207 | "description": "ISO 42001 AI Management System (AIMS) advisor \u2014 gap analysis, AI risk assessment, AI system impact assessment (AISIA), Annex A control guidance, SoA generation, policy writing, and certification readiness for ISO/IEC 42001:2023.", |
208 | | - "version": "0.3.0", |
| 208 | + "version": "0.4.0", |
209 | 209 | "author": { |
210 | 210 | "name": "Hemant Naik", |
211 | 211 | "email": "hemant.naik@gmail.com" |
|
227 | 227 | "name": "dpdpa", |
228 | 228 | "source": "./plugins/dpdpa", |
229 | 229 | "description": "India's Digital Personal Data Protection Act, 2023 (DPDPA) and DPDP Rules, 2025 compliance advisor \u2014 gap analysis, notice and consent requirements, Data Principal rights, breach notification, children\u2019s data, Significant Data Fiduciary obligations, cross-border transfers, Data Protection Board proceedings, and GDPR alignment for global organisations.", |
230 | | - "version": "0.3.0", |
| 230 | + "version": "0.4.0", |
231 | 231 | "author": { |
232 | 232 | "name": "Hemant Naik", |
233 | 233 | "email": "hemant.naik@gmail.com" |
|
250 | 250 | "name": "dora", |
251 | 251 | "source": "./plugins/dora", |
252 | 252 | "description": "DORA (Regulation (EU) 2022/2554) compliance advisor for EU financial entities \u2014 ICT risk management framework, incident classification and reporting, TLPT, ICT third-party risk, Register of Information, and all adopted RTS/ITS with article-level citations.", |
253 | | - "version": "0.3.0", |
| 253 | + "version": "0.4.0", |
254 | 254 | "author": { |
255 | 255 | "name": "Hemant Naik", |
256 | 256 | "email": "hemant.naik@gmail.com" |
|
0 commit comments