feat: add NIST SP 800-30 Rev 1 Risk Assessment skill#34
Open
sjackson0109 wants to merge 1 commit intoSushegaad:mainfrom
Open
feat: add NIST SP 800-30 Rev 1 Risk Assessment skill#34sjackson0109 wants to merge 1 commit intoSushegaad:mainfrom
sjackson0109 wants to merge 1 commit intoSushegaad:mainfrom
Conversation
NIST Special Publication 800-30 Revision 1 -- Guide for Conducting Risk Assessments Published: September 2012 | Source: https://doi.org/10.6028/NIST.SP.800-30r1 PLUGIN STRUCTURE - plugins/nist-sp-800-30/.claude-plugin/plugin.json - plugins/nist-sp-800-30/skills/nist-sp-800-30/SKILL.md - plugins/nist-sp-800-30/skills/nist-sp-800-30/references/risk-assessment-process.md - plugins/nist-sp-800-30/skills/nist-sp-800-30/references/threat-taxonomy.md - plugins/nist-sp-800-30/skills/nist-sp-800-30/references/impact-likelihood-scales.md FRAMEWORK COVERAGE SP 800-30 Rev 1 provides the authoritative NIST guidance for conducting risk assessments as part of an organisation-wide risk management process at all three tiers (organisation, mission/business process, information system). The skill covers: Step 1 -- Prepare for the Risk Assessment - Task 1-1: Identifying the purpose of the risk assessment - Task 1-2: Identifying the scope (organisational, system, information, temporal) - Task 1-3: Documenting assumptions and constraints - Task 1-4: Identifying authoritative threat, vulnerability, and impact sources - Task 1-5: Defining the risk model and analytic approach (qualitative, semi-quantitative, quantitative) Step 2 -- Conduct the Risk Assessment - Task 2-1: Threat source identification (adversarial and non-adversarial; Appendix D taxonomy) - Task 2-2: Threat event identification (Appendix E categories and representative events) - Task 2-3: Vulnerability and predisposing condition identification (Appendix F scales) - Task 2-4: Likelihood of occurrence determination (two-part: initiation + adverse impact; Table I-2 matrix) - Task 2-5: Impact magnitude determination (CIA triad + operational dimensions; Table H-2 scale) - Task 2-6: Risk level determination (5x5 risk matrix per Table I-4) Step 3 -- Communicate Risk Assessment Results - Risk assessment report structure and required sections - Risk register table format with all required columns - Communication to risk executives, authorising officials, and mission/business owners Step 4 -- Maintain the Risk Assessment - Periodic refresh triggers (annual minimum, event-driven, RMF-driven) - Integration with SP 800-137 continuous monitoring output REFERENCE FILES threat-taxonomy.md: Complete adversarial (Table D-1) and non-adversarial (Table D-2) threat source taxonomy; adversarial threat events from Appendix E Table E-2 covering reconnaissance, initial access, execution/persistence, privilege escalation, lateral movement, exfiltration, and impact; non-adversarial events from Table E-3; MITRE ATT&CK tactic mapping impact-likelihood-scales.md: All SP 800-30 qualitative and semi-quantitative scales including Table G-2 (adversarial initiation likelihood), Table G-3 (likelihood of adverse impact), Table G-4 (non-adversarial occurrence), Table H-2 (impact magnitude), Table H-3 (CIA+operational impact dimensions), Table I-2 (overall likelihood matrix), Table I-4 (risk determination matrix), Table I-5 (risk level definitions with required actions), Appendix F vulnerability severity and predisposing condition pervasiveness scales, and uncertainty notation guidance risk-assessment-process.md: Full task-by-task process guide with all tables, risk register template, report structure template, RMF step mapping, and continuous monitoring integration INTEGRATION POINTS - NIST SP 800-37 Rev 2 (RMF): Risk assessment maps to all six RMF steps; outputs feed ATO package - NIST SP 800-39: Supports Tier 1/2/3 risk management decisions - NIST SP 800-53 Rev 5: Risk assessment informs control baseline tailoring - NIST SP 800-53A: Security control assessment results update risk factors - NIST SP 800-137: Continuous monitoring data triggers risk assessment refresh TESTS All 10 plugin structure tests pass (test_plugin_structure.py -k nist-sp-800-30)
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
NIST SP 800-30 Rev 1 -- Guide for Conducting Risk Assessments
Source: NIST Special Publication 800-30 Revision 1, September 2012
https://doi.org/10.6028/NIST.SP.800-30r1
Summary
This PR adds a complete Claude skill for NIST SP 800-30 Rev 1, the authoritative NIST guide for conducting risk assessments across federal information systems and organisations. The skill supports all three tiers of risk management (organisation, mission/business process, information system) and integrates with the NIST Risk Management Framework (SP 800-37), SP 800-39, SP 800-53, and SP 800-137.
Files Added
Framework Coverage
The skill covers the complete SP 800-30 Rev 1 risk assessment process:
Step 1 -- Prepare for the Risk Assessment
Step 2 -- Conduct the Risk Assessment
Step 3 -- Communicate Risk Assessment Results
Step 4 -- Maintain the Risk Assessment
Reference Files
risk-assessment-process.md: Full task-by-task process guide, complete adversarial threat source table (Table D-1), full adversarial threat event categories (Table E-2), non-adversarial events (Table E-3), vulnerability categories, predisposing conditions (Appendix F Table F-5), overall likelihood matrix (Table I-2), impact area breakdown (Appendix H), risk score matrix (Table I-4), risk assessment report template, risk register table format, RMF step integration mapping, and continuous monitoring refresh triggers.
threat-taxonomy.md: Comprehensive threat source taxonomy from Appendices D-1 and D-2 with capability, intent, and characteristics for each source type; representative adversarial threat events covering all categories from Appendix E Table E-2; non-adversarial threat events from Table E-3; MITRE ATT&CK tactic mapping aligned to SP 800-30 threat event categories.
impact-likelihood-scales.md: All SP 800-30 quantitative and semi-quantitative scales: Table G-2 (adversarial initiation likelihood with descriptors and 0-100 scores), Table G-3 (likelihood of adverse impact), Table G-4 (non-adversarial occurrence), Table H-2 (impact magnitude with descriptors and scores), Table H-3 (CIA + operational impact dimensions), Table I-2 (overall likelihood matrix), Table I-4 (risk determination matrix), Table I-5 (risk level definitions with required actions), Appendix F vulnerability severity and predisposing condition pervasiveness scales, and uncertainty levels.
Integration Points
Tests
All 10 plugin structure tests pass: