Skip to content

Commit ae26014

Browse files
emmanuelgjrclaude
andcommitted
Add framework registry, backlink index, and control-level pivot views
Phase 2: promote frameworks to first-class registry with full control inventories. Seed NIST AI RMF 1.0 (84 controls) and CoSAI (32 controls). Build backlink index (1,097 control→entry mappings) so the visualizer can pivot from any framework control to show all OWASP entries that reference it. Add ingestion script for onboarding new frameworks. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
1 parent 6fb2524 commit ae26014

51 files changed

Lines changed: 76762 additions & 3117 deletions

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

data/backlinks.json

Lines changed: 35896 additions & 0 deletions
Large diffs are not rendered by default.

data/entries/ASI01.json

Lines changed: 45 additions & 45 deletions
Large diffs are not rendered by default.

data/entries/ASI02.json

Lines changed: 44 additions & 44 deletions
Large diffs are not rendered by default.

data/entries/ASI03.json

Lines changed: 56 additions & 56 deletions
Large diffs are not rendered by default.

data/entries/ASI04.json

Lines changed: 39 additions & 39 deletions
Original file line numberDiff line numberDiff line change
@@ -49,52 +49,52 @@
4949
"control_name": "Policies for data privacy",
5050
"tier": "Foundational",
5151
"scope": "Both",
52-
"notes": "Supply chain governance policy approved sources for agent tools, MCP servers, and model components"
52+
"notes": "Supply chain governance policy approved sources for agent tools, MCP servers, and model components"
5353
},
5454
{
5555
"framework": "NIST AI RMF 1.0",
5656
"control_id": "MP-5.1",
5757
"control_name": "Interdependencies",
5858
"tier": "Foundational",
5959
"scope": "Both",
60-
"notes": "All agent supply chain components mapped dynamic tool loading inventoried, approved before use"
60+
"notes": "All agent supply chain components mapped dynamic tool loading inventoried, approved before use"
6161
},
6262
{
6363
"framework": "NIST AI RMF 1.0",
6464
"control_id": "MS-2.5",
65-
"control_name": "Testing adversarial",
65+
"control_name": "Testing adversarial",
6666
"tier": "Foundational",
6767
"scope": "Both",
68-
"notes": "Supply chain integrity testing signature verification, descriptor review, backdoor scanning"
68+
"notes": "Supply chain integrity testing signature verification, descriptor review, backdoor scanning"
6969
},
7070
{
7171
"framework": "NIST AI RMF 1.0",
7272
"control_id": "MG-3.2",
7373
"control_name": "Residual risk",
7474
"tier": "Foundational",
7575
"scope": "Both",
76-
"notes": "Residual supply chain risk documented and treated third-party component risks in AI risk register"
76+
"notes": "Residual supply chain risk documented and treated third-party component risks in AI risk register"
7777
},
7878
{
7979
"framework": "EU AI Act",
8080
"control_id": "Supply chain risks identified and mitigated",
81-
"control_name": "Art. 9 Risk management",
81+
"control_name": "Art. 9 Risk management",
8282
"tier": "Foundational",
8383
"scope": "Both",
84-
"notes": "All agent components in Art. 9 risk management dynamic runtime components explicitly in scope"
84+
"notes": "All agent components in Art. 9 risk management dynamic runtime components explicitly in scope"
8585
},
8686
{
8787
"framework": "EU AI Act",
8888
"control_id": "Quality management includes supply chain controls",
89-
"control_name": "Art. 17 Quality management",
89+
"control_name": "Art. 17 Quality management",
9090
"tier": "Foundational",
9191
"scope": "Both",
92-
"notes": "Documented supply chain security procedures component verification, change management"
92+
"notes": "Documented supply chain security procedures component verification, change management"
9393
},
9494
{
9595
"framework": "EU AI Act",
9696
"control_id": "Providers document obligations; deployers verify",
97-
"control_name": "Art. 25 Value chain responsibilities",
97+
"control_name": "Art. 25 Value chain responsibilities",
9898
"tier": "Foundational",
9999
"scope": "Both",
100100
"notes": "Agent tool and MCP server supply chain obligations distributed along value chain"
@@ -105,111 +105,111 @@
105105
"control_name": "Supplier relationships",
106106
"tier": "Foundational",
107107
"scope": "Both",
108-
"notes": "Security requirements applied to all agent tool and MCP server providers provenance, integrity, disclosure obligations"
108+
"notes": "Security requirements applied to all agent tool and MCP server providers provenance, integrity, disclosure obligations"
109109
},
110110
{
111111
"framework": "ISO/IEC 27001:2022",
112112
"control_id": "A.5.20",
113113
"control_name": "Supplier agreements",
114114
"tier": "Foundational",
115115
"scope": "Both",
116-
"notes": "Contractual security requirements for all agent component suppliers integrity guarantees, vulnerability notification SLA"
116+
"notes": "Contractual security requirements for all agent component suppliers integrity guarantees, vulnerability notification SLA"
117117
},
118118
{
119119
"framework": "ISO/IEC 27001:2022",
120120
"control_id": "A.5.21",
121121
"control_name": "Supply chain security",
122122
"tier": "Foundational",
123123
"scope": "Both",
124-
"notes": "Managing ICT supply chain risks agent tool and MCP server ecosystem explicitly in scope"
124+
"notes": "Managing ICT supply chain risks agent tool and MCP server ecosystem explicitly in scope"
125125
},
126126
{
127127
"framework": "ISO/IEC 27001:2022",
128128
"control_id": "A.8.8",
129129
"control_name": "Management of technical vulnerabilities",
130130
"tier": "Foundational",
131131
"scope": "Both",
132-
"notes": "Agent component CVEs in vulnerability management ML libraries, inference runtime, MCP server dependencies"
132+
"notes": "Agent component CVEs in vulnerability management ML libraries, inference runtime, MCP server dependencies"
133133
},
134134
{
135135
"framework": "ISO/IEC 42001:2023",
136136
"control_id": "A.10.1",
137137
"control_name": "Third-party AI system acquisition",
138138
"tier": "Foundational",
139139
"scope": "Both",
140-
"notes": "All agent tool and MCP server providers assessed security obligations, integrity guarantees, disclosure SLA in contracts"
140+
"notes": "All agent tool and MCP server providers assessed security obligations, integrity guarantees, disclosure SLA in contracts"
141141
},
142142
{
143143
"framework": "ISO/IEC 42001:2023",
144144
"control_id": "A.10.2",
145145
"control_name": "Customer relationships",
146146
"tier": "Foundational",
147147
"scope": "Both",
148-
"notes": "Obligations to downstream consumers of agentic systems what supply chain security is guaranteed"
148+
"notes": "Obligations to downstream consumers of agentic systems what supply chain security is guaranteed"
149149
},
150150
{
151151
"framework": "ISO/IEC 42001:2023",
152152
"control_id": "A.6.2.3",
153153
"control_name": "AI system security",
154154
"tier": "Foundational",
155155
"scope": "Both",
156-
"notes": "Component integrity verification as AIMS security design requirement cryptographic signatures before loading"
156+
"notes": "Component integrity verification as AIMS security design requirement cryptographic signatures before loading"
157157
},
158158
{
159159
"framework": "ISO/IEC 42001:2023",
160160
"control_id": "A.7.2",
161161
"control_name": "Data quality",
162162
"tier": "Foundational",
163163
"scope": "Both",
164-
"notes": "Training data from third-party sources assessed same data quality criteria as internal data"
164+
"notes": "Training data from third-party sources assessed same data quality criteria as internal data"
165165
},
166166
{
167167
"framework": "CIS Controls v8.1",
168168
"control_id": "2.1 Establish and maintain software inventory",
169-
"control_name": "CIS 2 Inventory and Control of Software Assets",
169+
"control_name": "CIS 2 Inventory and Control of Software Assets",
170170
"tier": "Foundational",
171171
"scope": "Both",
172-
"notes": "ML SBOM as software asset inventory all agent components (tools, MCP servers, models, libraries)"
172+
"notes": "ML SBOM as software asset inventory all agent components (tools, MCP servers, models, libraries)"
173173
},
174174
{
175175
"framework": "CIS Controls v8.1",
176176
"control_id": "7.1 Establish vulnerability management process",
177-
"control_name": "CIS 7 Continuous Vulnerability Management",
177+
"control_name": "CIS 7 Continuous Vulnerability Management",
178178
"tier": "Foundational",
179179
"scope": "Both",
180-
"notes": "Agent component CVEs in vulnerability management urgent patching for code execution risks"
180+
"notes": "Agent component CVEs in vulnerability management urgent patching for code execution risks"
181181
},
182182
{
183183
"framework": "CIS Controls v8.1",
184184
"control_id": "16.6 Use only up-to-date and trusted third-party components",
185-
"control_name": "CIS 16 Application Software Security",
185+
"control_name": "CIS 16 Application Software Security",
186186
"tier": "Foundational",
187187
"scope": "Both",
188-
"notes": "Approved component list only sourced from approved vendors, signatures verified"
188+
"notes": "Approved component list only sourced from approved vendors, signatures verified"
189189
},
190190
{
191191
"framework": "CIS Controls v8.1",
192192
"control_id": "15.1 Establish service provider management process",
193-
"control_name": "CIS 15 Service Provider Management",
193+
"control_name": "CIS 15 Service Provider Management",
194194
"tier": "Foundational",
195195
"scope": "Both",
196-
"notes": "Agent tool and MCP providers managed as service providers security assessment before onboarding"
196+
"notes": "Agent tool and MCP providers managed as service providers security assessment before onboarding"
197197
},
198198
{
199199
"framework": "OWASP ASVS 4.0.3",
200200
"control_id": "V10.2.1",
201201
"control_name": "Verify third-party components current and free of vulnerabilities",
202202
"tier": "Foundational",
203203
"scope": "Both",
204-
"notes": "All agent component libraries scanned for CVEs ML SBOM maintained and monitored"
204+
"notes": "All agent component libraries scanned for CVEs ML SBOM maintained and monitored"
205205
},
206206
{
207207
"framework": "OWASP ASVS 4.0.3",
208208
"control_id": "V10.2.2",
209209
"control_name": "Verify only minimal approved external libraries",
210210
"tier": "Foundational",
211211
"scope": "Both",
212-
"notes": "Approved component list unsigned or unverified agent components rejected"
212+
"notes": "Approved component list unsigned or unverified agent components rejected"
213213
},
214214
{
215215
"framework": "OWASP ASVS 4.0.3",
@@ -241,7 +241,7 @@
241241
"control_name": "Use control",
242242
"tier": "Foundational",
243243
"scope": "Both",
244-
"notes": "Only approved, verified agent components permitted in OT zones no runtime loading of unapproved tools"
244+
"notes": "Only approved, verified agent components permitted in OT zones no runtime loading of unapproved tools"
245245
},
246246
{
247247
"framework": "ISA/IEC 62443",
@@ -257,7 +257,7 @@
257257
"control_name": "Software and information integrity (change)",
258258
"tier": "Foundational",
259259
"scope": "Both",
260-
"notes": "Agent component updates subject to OT change management no automatic updates in production"
260+
"notes": "Agent component updates subject to OT change management no automatic updates in production"
261261
},
262262
{
263263
"framework": "NIST SP 800-82 Rev 3",
@@ -289,31 +289,31 @@
289289
"control_name": "Supply Chain Risk Management",
290290
"tier": "Foundational",
291291
"scope": "Both",
292-
"notes": "Cybersecurity supply chain risk management programme all agent component vendors in scope"
292+
"notes": "Cybersecurity supply chain risk management programme all agent component vendors in scope"
293293
},
294294
{
295295
"framework": "NIST CSF 2.0",
296296
"control_id": "GV.SC-06",
297297
"control_name": "Supply Chain Risk Management",
298298
"tier": "Foundational",
299299
"scope": "Both",
300-
"notes": "Cybersecurity requirements in supplier contracts integrity guarantees, vulnerability disclosure SLA"
300+
"notes": "Cybersecurity requirements in supplier contracts integrity guarantees, vulnerability disclosure SLA"
301301
},
302302
{
303303
"framework": "NIST CSF 2.0",
304304
"control_id": "ID.AM-08",
305305
"control_name": "Asset Management",
306306
"tier": "Foundational",
307307
"scope": "Both",
308-
"notes": "Agent components inventoried ML SBOM for all tools, MCP servers, model weights, libraries"
308+
"notes": "Agent components inventoried ML SBOM for all tools, MCP servers, model weights, libraries"
309309
},
310310
{
311311
"framework": "NIST CSF 2.0",
312312
"control_id": "PR.PS-02",
313313
"control_name": "Platform Security",
314314
"tier": "Foundational",
315315
"scope": "Both",
316-
"notes": "Software managed to reduce risk component integrity verification, change management"
316+
"notes": "Software managed to reduce risk component integrity verification, change management"
317317
},
318318
{
319319
"framework": "SOC 2",
@@ -494,23 +494,23 @@
494494
{
495495
"framework": "OWASP AI Testing Guide",
496496
"control_id": "Component integrity verification",
497-
"control_name": "SCT Supply Chain",
497+
"control_name": "SCT Supply Chain",
498498
"tier": "Foundational",
499499
"scope": "Both",
500500
"notes": "Verify cryptographic signatures of all agent components; scan for hidden instructions in descriptors"
501501
},
502502
{
503503
"framework": "OWASP AI Testing Guide",
504504
"control_id": "Behavioural change detection post-update",
505-
"control_name": "MBT Model Behaviour",
505+
"control_name": "MBT Model Behaviour",
506506
"tier": "Foundational",
507507
"scope": "Both",
508508
"notes": "Establish behavioural baseline before component update; verify no unexpected behaviour change after update"
509509
},
510510
{
511511
"framework": "OWASP AI Testing Guide",
512512
"control_id": "Runtime component monitoring",
513-
"control_name": "AST Agent-Specific",
513+
"control_name": "AST Agent-Specific",
514514
"tier": "Foundational",
515515
"scope": "Both",
516516
"notes": "Verify that component modification at runtime is detected and triggers agent suspension"
@@ -570,15 +570,15 @@
570570
"control_name": "NHI-3 Vulnerable Third-Party NHI",
571571
"tier": "Foundational",
572572
"scope": "Both",
573-
"notes": "Validate all third-party NHIs at connection revoke tokens from unverified sources"
573+
"notes": "Validate all third-party NHIs at connection revoke tokens from unverified sources"
574574
},
575575
{
576576
"framework": "OWASP NHI Top 10",
577577
"control_id": "Malicious components extract credentials from agent memory or config",
578578
"control_name": "NHI-6 Insecure Credential Storage",
579579
"tier": "Foundational",
580580
"scope": "Both",
581-
"notes": "Credential isolation components cannot access other components' credentials"
581+
"notes": "Credential isolation components cannot access other components' credentials"
582582
},
583583
{
584584
"framework": "OWASP NHI Top 10",

0 commit comments

Comments
 (0)