Skip to content

Latest commit

 

History

History
529 lines (370 loc) · 50.2 KB

File metadata and controls

529 lines (370 loc) · 50.2 KB

Hack23 Logo

🛡️ Hack23 AB — CRA Conformity Assessment Process

Evidence-Driven Conformity Through Systematic Assessment
Demonstrating CRA Compliance Excellence for Cybersecurity Consulting

Owner Version Effective Date Review Cycle

Document Owner: CEO | Version: 1.1.59 | Last Updated: 2026-04-28 Review Cycle: Quarterly | Next Review: 2026-07-21


🎯 Purpose Statement

Hack23 AB's CRA conformity assessment process demonstrates how systematic regulatory compliance directly enables business growth rather than creating operational burden. Our comprehensive assessment framework serves as both operational tool and client demonstration of our cybersecurity consulting methodologies.

As a cybersecurity consulting company, our approach to CRA compliance becomes a showcase of professional implementation, demonstrating to potential clients how systematic regulatory adherence creates competitive advantages through robust security foundations while enabling EU market access.

Our commitment to transparency means our conformity assessment practices become a reference implementation, showing how comprehensive regulatory compliance enables business expansion while protecting organizational interests and maintaining stakeholder trust.

— James Pether Sörling, CEO/Founder


🔍 Purpose & Scope

This process provides a concise, repeatable CRA Conformity Assessment format (pre‑market & ongoing) for the three initial products (CIA, Black Trigram, CIA Compliance Manager). Aligns with CRA Annex I & V, Hack23 classification, secure development, and transparency policies.

Scope: All products within Asset Register requiring EU market placement.


📋 Quick Use Instructions

Copy this entire template into CRA-ASSESSMENT.md in your project root. Replace all {{PLACEHOLDERS}}, remove unused badge options, tick checkboxes, and commit with project changes when security posture materially changes.

Evidence Integration: All evidence (SBOM, provenance, test reports) stored in GitHub release artifacts and repository documentation. Assessment references current project state and links to immutable evidence.

CRA Regulation Alignment: This template supports CRA Annex V technical documentation requirements and Annex I essential requirements for cybersecurity through systematic self-assessment.

📚 Reference Implementations

The following Hack23 AB projects demonstrate completed CRA assessments using this template:

🚀 Project 📦 Product Type 🏷️ CRA Classification 📋 Assessment Status 🔗 Reference Link
🕵️ CIA (Citizen Intelligence Agency) Political transparency platform Standard (Non-commercial OSS) ✅ Complete 📄 CRA Assessment
⚫ Black Trigram Korean martial atts game Standard (Non-commercial OSS) ✅ Complete 📄 CRA Assessment
🛡️ CIA Compliance Manager Compliance automation tool Standard (Non-commercial OSS) ✅ Complete 📄 CRA Assessment

🎯 Implementation Examples

📝 Common Template Usage Patterns:

  • 🔍 Classification: Each reference shows different market categories and CIA classification levels
  • 🛡️ Security Controls: Demonstrates technical documentation across various product types
  • 📊 Evidence Links: Examples of GitHub release attestations and ISMS policy integration
  • ⚖️ Risk Assessment: Different risk profiles for transparency, security, and compliance tools

🔗 Evidence Repository Structure: All reference implementations follow the standardized evidence pattern:

  • 📦 GitHub Releases: SBOM, SLSA attestations, and provenance documentation
  • 🛡️ Security Policies: Direct links to ISMS framework policies and procedures
  • 📊 Compliance Badges: OpenSSF Scorecard, CII Best Practices, and FOSSA license compliance
  • 🚨 Vulnerability Disclosure: Standardized SECURITY.md and coordinated disclosure processes

💡 Usage Tips:

  1. Start with Classification: Use reference implementations with similar CIA levels as templates
  2. Evidence Alignment: Follow the GitHub attestations pattern from existing assessments
  3. Risk Context: Adapt risk assessments based on similar product complexity
  4. ISMS Integration: Reference implementations show policy linkage patterns for different product types

1️⃣ Project Identification

Supports CRA Annex V § 1 - Product Description Requirements

Field Value
📦 Product CIA Compliance Manager
🏷️ Version Tag {{CURRENT_VERSION}}
🔗 Repository https://github.com/Hack23/cia-compliance-manager
📧 Security Contact security@hack23.org
🎯 Purpose (1–2 lines) Open source toolkit to assess, map, and communicate security posture, business impact, and compliance alignment across the CIA triad.
🏪 Market Open Source (non‑commercial)

📊 Selected Classification Summary

Aspect Selected Value Rationale
Market Category Open Source Public, collaborative development; no revenue generation currently.
Confidentiality C: Public All source and docs intentionally public.
Integrity I: Moderate Incorrect data impacts decisions but not safety‑critical.
Availability A: Standard Outages acceptable; no real‑time obligations.
RTO RTO: Standard Recovery can be scheduled without business loss.
RPO ![RPO: Daily](<https://img.shields.io/badge/RPO-Daily_(<24h)-lightblue?style=flat-square>) Daily backups / git history sufficient.

2️⃣ CRA Scope & Classification

Supports CRA Article 6 - Scope and Article 7 - Product Classification Assessment

🏢 CRA Applicability / Distribution / Classification

Applicability Distribution CRA Classification
Non-commercial OSS Community Standard

📝 CRA Scope Justification: Distributed as non-commercial open source (no revenue). Provides decision support (assessment, visualization) only; no embedded privileged execution or safety-critical control. Standard CRA product self-assessment is appropriate.

🔍 Classification Impact:

  • Standard: Self-assessment approach (this template supports documentation)
  • Class I/II: Notified body assessment required + additional documentation

3️⃣ Technical Documentation

Supports CRA Annex V § 2 - Technical Documentation Requirements

CRA Technical Area Status Implementation Summary Evidence (Direct Links)
🎨 Product Architecture (Annex V § 2.1) Implemented High‑level data & trust boundaries documented ARCHITECTURE.md · SECURITY_ARCHITECTURE.md · WORKFLOWS.md
📦 SBOM & Components (Annex I § 1.1) Implemented Complete dependency enumeration per build Latest Release (SBOM) (SPDX + signed)
🔐 Cybersecurity Controls (Annex I § 1.2) Implemented Authn, authz, encryption policies & control baseline Access Control Policy · Cryptography Policy
🛡️ Supply Chain Security (Annex I § 1.3) Implemented Signed builds + provenance attestations Attestations · Release SBOM assets
🔄 Update Mechanism (Annex I § 1.4) Implemented Controlled updates with provenance + rollback capability Change Management · Latest Release
📊 Security Monitoring (Annex I § 1.5) Partial Logging & incident handling defined; expanded runtime telemetry planned Incident Response Plan · Security Metrics
🏷️ Data Protection (Annex I § 2.1) Implemented Classification & handling controls (public data only) Data Classification Policy
📚 User Guidance (Annex I § 2.2) Planned Security configuration guide to be published (Planned) Will live in docs/USER_SECURITY_GUIDE.md (not yet committed)
🔍 Vulnerability Disclosure (Annex I § 2.3) Implemented Coordinated vulnerability disclosure process SECURITY.md · Vulnerability Management
Accessibility (v1.1.0) Implemented WCAG 2.1 AA compliance, ARIA, keyboard navigation, screen reader support ACCESSIBILITY_COMPLIANCE.md · ACCESSIBILITY_REPORT.md
Performance (v1.1.0) Implemented Bundle optimization (85.6% reduction), lazy loading, Core Web Vitals PERFORMANCE_COMPLIANCE.md · performance-testing.md
🛡️ Error Handling (v1.1.0) Implemented React Error Boundaries (11/11 widgets), graceful degradation ERROR_HANDLING.md · WidgetErrorHandlingGuide.md
🎨 Design System (v1.1.0) Implemented Centralized design tokens, consistent UI patterns, TailwindCSS DESIGN_SYSTEM.md · DESIGN_SYSTEM_IMPLEMENTATION_GUIDE.md
📋 Compliance Evidence (v1.1.0) Implemented Consolidated evidence catalog with 8 categories, 40+ artifacts COMPLIANCE_EVIDENCE.md

Legend: Implemented Implemented · Partial Partially implemented (enhancements scheduled) · Planned Planned.

Note: User Security Guide intentionally marked Planned; no USER_SECURITY_GUIDE.md exists yet (kept within current gap management without adding a new GAP item).

📋 ISMS Policy Integration:


4️⃣ Risk Assessment

Supports CRA Annex V § 3 - Risk Assessment Documentation

Reference: 📊 Risk Assessment Methodology and ⚠️ Risk Register

🚨 CRA Risk Category 🎯 Asset 📊 Likelihood 💥 Impact (C/I/A) 🛡️ CRA Control Implementation ⚖️ Residual 📋 Evidence
Supply Chain Attack (Art. 11) Build pipeline M H/H/M SBOM + SLSA provenance + dependency pinning L GitHub attestations
Unauthorized Access (Art. 11) Authentication M H/H/H MFA + secret scanning + short-lived tokens L Access control logs
Data Breach (Art. 11) Data storage L H/H/H Encryption + IAM + least privilege L KMS configuration
Component Vulnerability (Art. 11) Dependencies M M/H/M SCA scanning + patch management L Vulnerability reports
Service Disruption (Art. 11) Public services M L/M/H WAF + DDoS protection + scaling M Infrastructure config

⚖️ CRA Risk Statement: LOW - Assessment supports CRA essential cybersecurity requirements evaluation
✅ Risk Acceptance: James Pether Sörling (CEO) - 2025-08-22

📋 Risk Management Framework:


5️⃣ Essential Cybersecurity Requirements

Supports CRA Annex I - Essential Requirements Self-Assessment

CRA Annex I Requirement Status Evidence (Badges / Links)
🛡️ § 1.1 - Secure by Design Partial Architecture & trust boundaries (docs/architecture/), 🛠️ Secure Development Policy, minimal surface principles documented. Pending: Threat model appendix (GAP-01).
🔒 § 1.2 - Secure by Default Planned Baseline hardening checklist not yet published (GAP-02). Config defaults governed by 🛠️ Secure Development Policy.
🏷️ § 2.1 - Personal Data Protection Implemented 🏷️ Data Classification Policy + classification applied (public data only).
🔍 § 2.2 - Vulnerability Disclosure Implemented SECURITY.md + ⚠️ Vulnerability Management (48h acknowledge SLA).
📦 § 2.3 - Software Bill of Materials Implemented Automated SBOM (SPDX) in Latest Release (signed) + attested (*.spdx.json).
🔐 § 2.4 - Secure Updates Implemented Signed build + provenance attestations (SLSA) + 📝 Change Management.
📊 § 2.5 - Security Monitoring Partial Detection & response via 🚨 Incident Response Plan + posture metrics (📊 Security Metrics). Planned: Expanded monitoring coverage baseline.
📚 § 2.6 - Security Documentation Implemented User/security guidance (docs/, portal) + public ISMS policies (listed below).

Legend: Implemented Implemented | Partial Partially implemented (gap scheduled) | Planned Planned / scheduled.

Open Gaps Referenced: GAP-01 (Threat model appendix), GAP-02 (Secure-by-default checklist) — see Section 9 for schedule.

🎯 CRA Self-Assessment Status: IN_PROGRESS

🔍 Standard Security Reporting Process: Each project includes standardized security reporting via SECURITY.md following coordinated vulnerability disclosure:

  • 📧 Private Reporting: GitHub Security Advisories for confidential disclosure
  • ⏱️ Response Timeline: 48h acknowledgment, 7d validation, 30d resolution
  • 🏆 Recognition Program: Public acknowledgment unless anonymity requested
  • 🔄 Continuous Support: Latest version maintained with security updates
  • 📋 Vulnerability Scope: Authentication bypass, injection attacks, remote code execution, data exposure

ISMS Integration: All vulnerability reports processed through ⚠️ Vulnerability Management procedures


6️⃣ Conformity Assessment Evidence

Supports CRA Article 19 - Conformity Assessment Documentation

📊 Quality & Security Automation Status:

Reference: 🛠️ Secure Development Policy

Control Requirement Status Evidence (Badges / Links)
🧪 Unit Testing ≥80% line, ≥70% branch Active CI Tests Coverage
🌐 E2E Testing Critical user journeys validated Active Included in same workflow: see CI Tests badge + E2E Plan
🔍 SAST (CodeQL) Zero critical/high vulns Implemented CodeQL Code Scanning Alerts
📦 SCA (Dependencies) Zero critical unresolved Active Dependency Review Dependabot Alerts
🔒 Secret Scanning Zero exposed secrets Active Security Overview (GitHub native)
🕷️ DAST (ZAP) Zero exploitable high+ (on demand) On-Demand ZAP Scan
📦 SBOM Generation SPDX per release Implemented Release (SBOM asset)
🛡️ Provenance SLSA Level 3 attestation Implemented SLSA 3
📊 Quality Gates SonarCloud quality gate Active Lines of Code Quality Gate Status Security Rating Maintainability Rating Reliability Rating
🚦 Performance Budgets Budget file passes Active Lighthouse budget.json
🔍 Scorecards Score >= industry baseline Active OpenSSF Scorecard

Note: Some security pages (alerts, secret scanning) may require appropriate GitHub permissions to view detailed findings. All release artifacts (SBOM, attestations) are published with version {{CURRENT_VERSION}}.

🎖️ Security & Compliance Badges

Supply Chain Security
SLSA 3 OpenSSF Scorecard

Best Practices & Governance
CII Best Practices

Quality
Lines of Code Quality Gate Status Security Rating Maintainability Rating Reliability Rating

License Compliance
FOSSA Status

Release Integrity
SBOM + provenance attestations in release assets

Text Evidence Index (Complementary)

Category Primary URL Notes
SLSA Attestations https://github.com/Hack23/cia-compliance-manager/attestations Build & SBOM provenance
OpenSSF Scorecard https://scorecard.dev/viewer/?uri=github.com/Hack23/cia-compliance-manager Weekly automated scan
CII Best Practices https://bestpractices.coreinfrastructure.org/projects/10365 Open source maturity
SonarCloud (Planned) https://sonarcloud.io/summary/new_code?id=cia-compliance-manager Pending onboarding
FOSSA https://app.fossa.io/projects/git%2Bgithub.com%2FHack23%2Fcia-compliance-manager License & issue scan
Architecture Docs ./docs/architecture/ Design & component views
E2E Test Plan ./docs/E2ETestPlan.md Test coverage strategy
CI/CD Workflows ./docs/architecture/WORKFLOWS.md Automation overview

📦 Release Evidence Pattern (Following Hack23 Standard):

🎯 Release Assets Structure:

cia-compliance-manager-{{CURRENT_VERSION}}.zip               # Main application bundle
cia-compliance-manager-{{CURRENT_VERSION}}.zip.intoto.jsonl  # SLSA provenance attestation
cia-compliance-manager-{{CURRENT_VERSION}}.spdx.json         # SPDX SBOM
cia-compliance-manager-{{CURRENT_VERSION}}.spdx.json.intoto.jsonl  # SBOM attestation

📋 Release Notes Format:

# Highlights

## 🏗️ Infrastructure & Performance

- build(deps): automated dependency updates via Dependabot
- ci: enhanced security scanning and compliance checks
- perf: performance optimizations and monitoring improvements

## 📦 Dependencies

- Complete list of dependency updates with version tracking
- Security vulnerability remediation
- License compliance verification

## 🔒 Security Compliance (Evidence Links)

- SLSA Level 3 attestations: https://github.com/Hack23/cia-compliance-manager/attestations/
- OpenSSF Scorecard: https://scorecard.dev/viewer/?uri=github.com/Hack23/cia-compliance-manager
- CII Best Practices: https://bestpractices.coreinfrastructure.org/projects/10365
- FOSSA License Scan: https://app.fossa.io/projects/git%2Bgithub.com%2FHack23%2Fcia-compliance-manager

## Contributors

Thanks to @dependabot[bot] for automated security updates!

**Full Changelog**: https://github.com/Hack23/cia-compliance-manager/compare/previous...{{CURRENT_VERSION}}

🔍 Evidence Validation Commands:

# Verify SBOM in GitHub release
gh release view --repo Hack23/cia-compliance-manager --json assets

# Check SLSA attestations
gh attestation list --repo Hack23/cia-compliance-manager

# Validate security scorecard
curl -s https://api.securityscorecards.dev/projects/github.com/Hack23/cia-compliance-manager | jq '.score'

# Verify FOSSA compliance
curl -s https://app.fossa.io/api/projects/git%2Bgithub.com%2FHack23%2Fcia-compliance-manager/issues | jq '.issues | length'

7️⃣ Post-Market Surveillance

Supports CRA Article 23 - Obligations of Economic Operators

Reference: 🌐 ISMS Transparency Plan and 📊 Security Metrics

📡 CRA Monitoring Obligation 🔧 Implementation ⏱️ Frequency 🎯 Action Trigger 📋 Evidence
🔍 Vulnerability Monitoring (Art. 23.1) CVE feeds + GitHub advisories Continuous Auto-create security issues SCA reports
🚨 Incident Reporting (Art. 23.2) Security event detection Real-time ENISA 24h notification prep Monitoring dashboards
📊 Security Posture Tracking (Art. 23.3) OpenSSF Scorecard monitoring Weekly Score decline investigation Security metrics
🔄 Update Distribution (Art. 23.4) Automated security updates As needed Critical vulnerability patches Release management

📋 CRA Reporting Readiness: Documentation and procedures prepared for ENISA incident reporting per 🚨 Incident Response Plan

🔗 ISMS Monitoring Integration:


8️⃣ EU Declaration of Conformity

Supports CRA Article 28 - EU Declaration of Conformity

📝 Complete when placing product on EU market

🏢 Manufacturer: Hack23 AB, Stockholm, Sweden
📦 Product: CIA Compliance Manager {{CURRENT_VERSION}}
📋 CRA Compliance: Self-assessment documentation supporting CRA essential cybersecurity requirements evaluation
🔍 Assessment: Self-assessment documentation per Article 24 (Standard classification)
📊 Standards: Reference frameworks: OWASP ASVS, NIST SSDF, ISO/IEC 27001 (ISMS alignment)

📅 Date & Signature: 2025-08-22 - James Pether Sörling, CEO

📂 Technical Documentation: This assessment + evidence bundle supports CRA Annex V technical documentation requirements


9️⃣ Assessment Completion & Approval

Supports CRA Article 16 - Quality Management System Documentation

📊 CRA Self-Assessment Summary

Overall CRA Documentation Status: IN_PROGRESS

Key CRA Documentation Areas:

  • ✅ Annex I essential requirements documented and assessed
  • ✅ Annex V technical documentation structured
  • ✅ Article 11 security measures documented
  • ✅ Article 23 post-market surveillance procedures documented

Outstanding Documentation:

GAP-01: Threat model appendix → Target: 2025-09-15 (Owner: Security)
GAP-02: Secure-by-default hardening checklist → Target: 2025-09-30 (Owner: Engineering)
GAP-03: SonarCloud onboarding → Target: 2025-10-01 (Owner: Engineering)

Formal Approval

👤 Role 📝 Name 📅 Date ✍️ Assessment Attestation
🔒 CRA Security Assessment James Pether Sörling 2025-08-22 Essential requirements documented (gaps scheduled)
🎯 Product Responsibility James Pether Sörling 2025-08-22 Technical documentation baseline established
⚖️ Legal Compliance Review James Pether Sörling 2025-08-22 CRA scope & classification recorded

📊 CRA Assessment Status: IN_PROGRESS


🎨 CRA Assessment Maintenance

📋 Update Triggers

Per CRA Article 15 - Substantial Modification

CRA assessment updated only when changes constitute "substantial modification" under CRA:

  1. 🏗️ Security Architecture Changes: New authentication methods, trust boundaries, or encryption
  2. 🛡️ Essential Requirement Impact: Changes affecting Annex I compliance
  3. 📦 Critical Dependencies: New supply chain components with security implications
  4. 🔍 Risk Profile Changes: New threats or vulnerability classes
  5. ⚖️ Regulatory Updates: CRA implementing acts or guidance changes

🎯 Maintenance Principle: Assessment stability preferred - avoid routine updates that don't impact CRA compliance

🔗 CRA Evidence Integration

## Current CRA Self-Assessment Evidence

**🏷️ Product Version:** {{CURRENT_VERSION}}
**📦 CRA Technical Documentation:** This assessment + [Latest Release](https://github.com/Hack23/cia-compliance-manager/releases/latest)
**🛡️ Security Attestations:** https://github.com/Hack23/cia-compliance-manager/attestations
**📊 Assessment Status:** ![CRA Status](https://img.shields.io/badge/CRA_Self_Assessment-In_Progress-yellow)

📚 CRA Regulatory Alignment

🔐 CRA Article Cross-References

  • Article 6: Scope determination → Section 2 (CRA Classification)
  • Article 11: Essential cybersecurity requirements → Section 5 (Requirements Assessment)
  • Article 19: Conformity assessment → Section 6 (Evidence Documentation)
  • Article 23: Post-market obligations → Section 7 (Surveillance Documentation)
  • Article 28: Declaration of conformity → Section 8 (DoC Template)
  • Annex I: Technical requirements → Section 5 (Requirements self-assessment mapping)
  • Annex V: Technical documentation → Complete template structure

🌐 ISMS Integration Benefits

  • 🔄 Operational Continuity: CRA self-assessment integrated with existing security operations
  • 📊 Evidence Reuse: Security metrics and monitoring serve dual ISMS/CRA documentation purposes
  • 🎯 Business Value: CRA readiness demonstrates cybersecurity consulting expertise through systematic documentation
  • 🤝 Client Confidence: Transparent self-assessment approach showcases professional implementation methodology

📋 Complete ISMS Policy Framework

🔐 Core Security Governance

🛡️ Security Control Implementation

⚙️ Operational Excellence Framework

🚨 Incident Response & Recovery

📊 Performance Management & Compliance

🎯 Framework Benefits for CRA Compliance:

  • 🔄 Process Maturity: Established ISMS demonstrates systematic security management capabilities
  • 📋 Evidence Repository: Comprehensive documentation supports CRA technical file requirements
  • 🛡️ Control Effectiveness: Implemented security measures provide concrete evidence of essential requirements
  • 📊 Continuous Improvement: Metrics and review cycles demonstrate ongoing security posture management
  • 🤝 Stakeholder Confidence: Transparent practices showcase professional cybersecurity consulting expertise

📋 Document Control:
✅ Approved by: James Pether Sörling, CEO
📤 Distribution: Public
🏷️ Classification: Confidentiality: Public
📅 Effective Date: 2025-08-23
⏰ Next Review: 2026-07-28
🎯 Framework Compliance: ISO 27001 NIST CSF 2.0 CIS Controls EU CRA
🛡️ CRA Alignment: Template supports CRA Annex V technical documentation and self-assessment requirements
📊 ISMS Integration: Comprehensive alignment with public ISMS framework for operational excellence
🌐 Documentation Portal: https://www.hack23.com/cia-compliance-manager-docs.html
⚖️ Non-Commercial Status: Open source project, currently non-commercial (subject to reassessment if classification changes)