Skip to content

Latest commit

 

History

History
507 lines (373 loc) · 47.2 KB

File metadata and controls

507 lines (373 loc) · 47.2 KB

Hack23 Logo

🛡️ Hack23 AB — CRA Conformity Assessment Process

Evidence-Driven Conformity Through Systematic Assessment
Demonstrating CRA Compliance Excellence for Cybersecurity Consulting

Owner Version Effective Date Review Cycle

Document Owner: CEO | Version: 1.1 | Last Updated: 2025-08-23
Review Cycle: Quarterly | Next Review: 2025-11-23


🎯 Purpose Statement

Hack23 AB's CRA conformity assessment process demonstrates how systematic regulatory compliance directly enables business growth rather than creating operational burden. Our comprehensive assessment framework serves as both operational tool and client demonstration of our cybersecurity consulting methodologies.

As a cybersecurity consulting company, our approach to CRA compliance becomes a showcase of professional implementation, demonstrating to potential clients how systematic regulatory adherence creates competitive advantages through robust security foundations while enabling EU market access.

Our commitment to transparency means our conformity assessment practices become a reference implementation, showing how comprehensive regulatory compliance enables business expansion while protecting organizational interests and maintaining stakeholder trust.

— James Pether Sörling, CEO/Founder


🔍 Purpose & Scope

This process provides a concise, repeatable CRA Conformity Assessment format (pre‑market & ongoing) for the three initial products (CIA, Black Trigram, CIA Compliance Manager). Aligns with CRA Annex I & V, Hack23 classification, secure development, and transparency policies.

Scope: All products within Asset Register requiring EU market placement.


📋 Quick Use Instructions

Copy this entire template into CRA-ASSESSMENT.md in your project root. Replace all {{PLACEHOLDERS}}, remove unused badge options, tick checkboxes, and commit with project changes when security posture materially changes.

Evidence Integration: All evidence (SBOM, provenance, test reports) stored in GitHub release artifacts and repository documentation. Assessment references current project state and links to immutable evidence.

CRA Regulation Alignment: This template supports CRA Annex V technical documentation requirements and Annex I essential requirements for cybersecurity through systematic self-assessment.

📚 Reference Implementations

The following Hack23 AB projects demonstrate completed CRA assessments using this template:

🚀 Project 📦 Product Type 🏷️ CRA Classification 📋 Assessment Status 🔗 Reference Link
🕵️ CIA (Citizen Intelligence Agency) Political transparency platform Standard (Non-commercial OSS) ✅ Complete 📄 CRA Assessment
⚫ Black Trigram Korean martial atts game Standard (Non-commercial OSS) ✅ Complete 📄 CRA Assessment
🛡️ CIA Compliance Manager Compliance automation tool Standard (Non-commercial OSS) ✅ Complete 📄 CRA Assessment

🎯 Implementation Examples

📝 Common Template Usage Patterns:

  • 🔍 Classification: Each reference shows different market categories and CIA classification levels
  • 🛡️ Security Controls: Demonstrates technical documentation across various product types
  • 📊 Evidence Links: Examples of GitHub release attestations and ISMS policy integration
  • ⚖️ Risk Assessment: Different risk profiles for transparency, security, and compliance tools

🔗 Evidence Repository Structure: All reference implementations follow the standardized evidence pattern:

  • 📦 GitHub Releases: SBOM, SLSA attestations, and provenance documentation
  • 🛡️ Security Policies: Direct links to ISMS framework policies and procedures
  • 📊 Compliance Badges: OpenSSF Scorecard, CII Best Practices, and FOSSA license compliance
  • 🚨 Vulnerability Disclosure: Standardized SECURITY.md and coordinated disclosure processes

💡 Usage Tips:

  1. Start with Classification: Use reference implementations with similar CIA levels as templates
  2. Evidence Alignment: Follow the GitHub attestations pattern from existing assessments
  3. Risk Context: Adapt risk assessments based on similar product complexity
  4. ISMS Integration: Reference implementations show policy linkage patterns for different product types

1️⃣ Project Identification

Supports CRA Annex V § 1 - Product Description Requirements

Field Value
📦 Product Citizen Intelligence Agency
🏷️ Version Tag 2025.1.2 (reflects current project state)
🔗 Repository https://github.com/Hack23/cia
📧 Security Contact security@hack23.org
🎯 Purpose (1–2 lines) Independent, volunteer-driven OSINT platform monitoring Swedish political activity, providing comprehensive analysis of political activities, financial performance metrics, and transparency insights through data aggregation from authoritative government sources

📋 Evidence Links:

📊 Project Status & Quality Badges:

GitHub Release CII Best Practices OpenSSF Scorecard SLSA 3

Quality Gate Status Security Rating Maintainability Rating Reliability Rating Lines of Code

FOSSA Status CLA assistant Average time to resolve an issue Percentage of issues still open

🔧 CI/CD & Automation Badges:

Verify & Release Verify PR ZAP Scan

📋 Data Sources Evidence:

  • 🏛️ Swedish Parliament: data.riksdagen.se - Parliamentary members, committees, documents
  • 🗳️ Election Authority: val.se - Election data, parties, voting results
  • 🌍 World Bank: data.worldbank.org - Global economic indicators
  • 💹 Financial Authority: esv.se - Government finances and trends

2️⃣ CRA Scope & Classification

Supports CRA Article 6 - Scope and Article 7 - Product Classification Assessment

🏢 CRA Applicability (Select One):

Non-commercial OSS

🌐 Distribution Method (Select One):

Community

📋 CRA Classification (Select One):

Standard

📝 CRA Scope Justification: The Citizen Intelligence Agency is a non-commercial open-source software project providing political transparency services through data aggregation and analysis of Swedish government sources. As a volunteer-driven initiative with community distribution via GitHub under Apache 2.0 license, it falls under non-commercial OSS with Standard CRA classification enabling self-assessment approach.

📋 Classification Evidence:

🔍 Classification Impact:

  • Standard: Self-assessment approach (this document provides evidence)
  • Class I/II: Would require notified body assessment + additional documentation

3️⃣ Technical Documentation

Supports CRA Annex V § 2 - Technical Documentation Requirements

🏗️ CRA Technical Area 📝 Implementation Summary 📋 Evidence Location
🎨 Product Architecture (Annex V § 2.1) Complete C4 model architecture with container, component, and dynamic diagrams showing multi-layered Spring-based design ARCHITECTURE.md + SECURITY_ARCHITECTURE.md + System Mindmap + Future Architecture
📦 SBOM & Components (Annex I § 1.1) Automated SBOM generation via Maven with comprehensive dependency scanning and SLSA Level 3 attestations GitHub Attestations + Latest Release SBOM + Package Dependencies
🔐 Cybersecurity Controls (Annex I § 1.2) Spring Security framework with MFA via Google Authenticator, role-based access control (ANONYMOUS/USER/ADMIN), comprehensive Javers auditing, AWS security services integration Security Architecture + Future Security Architecture + Access Control Policy + Cryptography Policy
🛡️ Supply Chain Security (Annex I § 1.3) SLSA Level 3 attestations, Dependabot automation, signed releases, OpenSSF Scorecard monitoring, CII Best Practices compliance GitHub Attestations + Dependabot Config + WORKFLOWS.md + OpenSSF Scorecard + CII Best Practices
🔄 Update Mechanism (Annex I § 1.4) Automated CI/CD pipeline with comprehensive security scanning (CodeQL, dependency review), version management, signed releases via GitHub Actions CI/CD Workflows + Release Workflow + Future Workflows + Change Management
📊 Security Monitoring (Annex I § 1.5) Comprehensive logging via Javers auditing, ApplicationSession/ActionEvent tracking, AWS security services (GuardDuty, Security Hub, Config, Inspector), CloudWatch integration Security Architecture + AWS Security Services + Incident Response Plan
🏷️ Data Protection (Annex I § 2.1) Data classification system, GDPR compliance, encryption at rest/transit via AWS KMS, minimal personal data collection, PostgreSQL SSL configuration Data Classification Policy + Entity Documentation + Data Model + Future Data Model
📚 User Guidance (Annex I § 2.2) Comprehensive security configuration documentation including PostgreSQL 16 SSL setup, deployment guides, architecture documentation README.md + PostgreSQL Security Configuration + Security Architecture Guide + CloudFormation Template
🔍 Vulnerability Disclosure (Annex I § 2.3) Public vulnerability disclosure policy with GitHub Security Advisories, coordinated disclosure process, 48h acknowledgment timeline SECURITY.md + Security Advisories + Vulnerability Management

📋 Comprehensive ISMS Integration:


4️⃣ Risk Assessment

Supports CRA Annex V § 3 - Risk Assessment Documentation

Reference: 📊 Risk Assessment Methodology and ⚠️ Risk Register

🚨 CRA Risk Category 🎯 Asset 📊 Likelihood 💥 Impact (C/I/A) 🛡️ CRA Control Implementation ⚖️ Residual 📋 Evidence
Supply Chain Attack (Art. 11) Build pipeline & dependencies M H/H/M SBOM + SLSA Level 3 provenance + Dependabot automation + OpenSSF Scorecard monitoring + CII Best Practices L GitHub Attestations + WORKFLOWS.md + Scorecard Results
Unauthorized Access (Art. 11) Political data & user accounts M H/H/H Spring Security + Google Authenticator MFA + login blocking thresholds + role-based access (ANONYMOUS/USER/ADMIN) + ApplicationSession tracking L Security Architecture + Authentication Implementation
Data Breach (Art. 11) Swedish political intelligence data L H/H/H PostgreSQL SSL + AWS KMS encryption + WAF + VPC segmentation + minimal personal data collection + Javers auditing L AWS Security Config + Data Protection
Component Vulnerability (Art. 11) Java dependencies & runtime M M/H/M CodeQL scanning + Dependabot updates + dependency review workflow + SonarCloud analysis + Amazon Inspector L Security Scans + Dependabot + Quality Gate
Service Disruption (Art. 11) Public transparency platform M L/M/H AWS multi-AZ architecture + ALB + CloudWatch monitoring + auto-scaling + AWS Resilience Hub assessment M Infrastructure Architecture + AWS Resilience

⚖️ CRA Risk Statement: LOW - Comprehensive security controls and evidence-based monitoring support CRA essential cybersecurity requirements evaluation
✅ Risk Acceptance: James Sörling, CEO Hack23 AB - December 2024

📋 Risk Management Framework Evidence:


5️⃣ Essential Cybersecurity Requirements

Supports CRA Annex I - Essential Requirements Self-Assessment

📋 CRA Annex I Requirement ✅ Status 📋 Implementation Evidence
🛡️ § 1.1 - Secure by Design [x] Defense-in-depth Architecture + AWS WAF Configuration + VPC Segmentation + Spring Security framework with method-level @Secured annotations
🔒 § 1.2 - Secure by Default [x] Hardened PostgreSQL 16 SSL Setup + SSL Configuration + Secure Defaults Documentation
🏷️ § 2.1 - Personal Data Protection [x] GDPR Compliance Policy + Minimal Data Collection + Entity Model Documentation
🔍 § 2.2 - Vulnerability Disclosure [x] Security Policy + Security Advisories + Vulnerability Management Process + 48h acknowledgment commitment
📦 § 2.3 - Software Bill of Materials [x] Automated SBOM Generation + SPDX Format Attestations + Release Evidence
🔐 § 2.4 - Secure Updates [x] SLSA Level 3 Attestations + Signed Releases + Secure CI/CD Pipeline
📊 § 2.5 - Security Monitoring [x] Javers Auditing System + ApplicationSession/ActionEvent Tracking + AWS Security Services
📚 § 2.6 - Security Documentation [x] PostgreSQL Security Guide + Complete Architecture Documentation + Security Implementation Guide

🎯 CRA Self-Assessment Status: EVIDENCE_DOCUMENTED

🔍 Security Implementation Evidence:

🔍 Standard Security Reporting Process: Each project includes standardized security reporting via SECURITY.md following coordinated vulnerability disclosure:

  • 📧 Private Reporting: GitHub Security Advisories for confidential disclosure
  • ⏱️ Response Timeline: 48h acknowledgment, 7d validation, 30d resolution per SECURITY.md
  • 🏆 Recognition Program: Public acknowledgment with option for anonymity
  • 🔄 Continuous Support: Latest version maintained with security updates
  • 📋 Vulnerability Scope: Authentication bypass, injection attacks, remote code execution, data exposure

ISMS Integration: All vulnerability reports processed through ⚠️ Vulnerability Management procedures


6️⃣ Conformity Assessment Evidence

Supports CRA Article 19 - Conformity Assessment Documentation

📊 Quality & Security Automation Status:

Reference: 🛠️ Secure Development Policy

🧪 Control 🎯 Requirement ✅ Implementation 📋 Evidence
🧪 Unit Testing ≥80% line coverage, ≥70% branch ✅ Implemented SonarCloud Coverage + Maven Surefire Reports + Test Foundation
🌐 E2E Testing Critical user journeys validated ✅ Implemented Test Framework Documentation + Selenium WebDriver implementation + Test Results
🔍 SAST Scanning Zero critical/high vulnerabilities ✅ Implemented CodeQL Analysis + SonarCloud Security + Security Rating Badge
📦 SCA Scanning Zero critical unresolved dependencies ✅ Implemented Dependabot Alerts + Dependency Review Workflow + FOSSA Analysis
🔒 Secret Scanning Zero exposed secrets/credentials ✅ Implemented GitHub Secret Scanning + Push protection enabled + Security Tab
🕷️ DAST Scanning Zero exploitable high+ findings ✅ Implemented ZAP Scan
📦 SBOM Generation SPDX + CycloneDX per release ✅ Implemented GitHub Attestations + Release SBOM Evidence + Package Dependencies
🛡️ Provenance SLSA Level 3 attestation ✅ Implemented GitHub Attestations + SLSA Badge + Sigstore signing
📊 Quality Gates SonarCloud quality gate passing ✅ Implemented SonarCloud Quality Gate + Quality Badge

🎖️ Security & Compliance Badges:

🔍 Supply Chain Security: SLSA 3 OpenSSF Scorecard

🏆 Best Practices & Quality: CII Best Practices Quality Gate Status Security Rating Maintainability Rating Reliability Rating

⚖️ License & Compliance: FOSSA Status CLA assistant license

🛡️ Security Scanning: CodeQL Scorecard ZAP Scan

📊 Project Health: Average time to resolve an issue Percentage of issues still open Lines of Code

🔗 Release Evidence: GitHub Attestations: https://github.com/Hack23/cia/attestations

📦 CIA Release Evidence Pattern:

🎯 Release Assets Structure: Evidence available at: Latest Release

cia-dist-deb-2025.1.2.all.deb               # Debian package
cia-dist-deb-2025.1.2.all.deb.intoto.jsonl  # SLSA provenance
cia-dist-war-2025.1.2.war                   # WAR deployment  
cia-2025.1.2.spdx.json                      # SPDX SBOM
cia-2025.1.2.spdx.json.intoto.jsonl         # SBOM attestation

🔍 Evidence Validation Commands:

# Verify SBOM in GitHub release
gh release view --repo Hack23/cia --json assets

# Check SLSA attestations
gh attestation list --repo Hack23/cia

# Validate security scorecard
curl -s https://api.securityscorecards.dev/projects/github.com/Hack23/cia | jq '.score'

# Verify FOSSA compliance
curl -s https://app.fossa.io/api/projects/git%2Bgithub.com%2FHack23%2Fcia/issues | jq '.issues | length'

# Check SonarCloud quality metrics
curl -s https://sonarcloud.io/api/measures/component?component=Hack23_cia&metricKeys=alert_status,security_rating,reliability_rating,sqale_rating

7️⃣ Post-Market Surveillance

Supports CRA Article 23 - Obligations of Economic Operators

Reference: 🌐 ISMS Transparency Plan and 📊 Security Metrics

📡 CRA Monitoring Obligation 🔧 Implementation ⏱️ Frequency 🎯 Action Trigger 📋 Evidence
🔍 Vulnerability Monitoring (Art. 23.1) Dependabot + GitHub advisories + CodeQL scanning + SonarCloud analysis + Amazon Inspector Continuous Auto-create security issues and PRs Dependabot Alerts + Security Advisories
🚨 Incident Reporting (Art. 23.2) ApplicationActionEvent tracking + Javers auditing + AWS CloudWatch/GuardDuty/Security Hub Real-time ENISA 24h notification prep via comprehensive logging Security Monitoring + AWS Security Services
📊 Security Posture Tracking (Art. 23.3) OpenSSF Scorecard + SonarCloud + FOSSA + CII Best Practices monitoring + AWS Config Weekly/Daily Score decline investigation via automated alerts OpenSSF Scorecard + SonarCloud Dashboard
🔄 Update Distribution (Art. 23.4) Automated GitHub releases + Debian package distribution + SLSA attestations + AWS Systems Manager patching As needed Critical vulnerability patches via secure CI/CD pipeline Release Management + CI/CD Workflows

📋 CRA Reporting Readiness: Documentation and procedures prepared for ENISA incident reporting per 🚨 Incident Response Plan

🔗 ISMS Monitoring Integration:


8️⃣ EU Declaration of Conformity

Supports CRA Article 28 - EU Declaration of Conformity

📝 Complete when placing product on EU market

🏢 Manufacturer: Hack23 AB, Gothenburg, Sweden
📦 Product: Citizen Intelligence Agency VERSION
📋 CRA Compliance: Self-assessment documentation supporting CRA essential cybersecurity requirements evaluation
🔍 Assessment: Self-assessment documentation per Article 24 (non-commercial OSS with standard classification)
📊 Standards: ISO/IEC 27001 security framework + OWASP ASVS application security + NIST SSDF secure development + AWS Well-Architected Framework

📅 Date & Signature: 2025-08-23 - James Sörling, CEO Hack23 AB

📂 Technical Documentation: This assessment + evidence bundle supports CRA Annex V technical documentation requirements


9️⃣ Assessment Completion & Approval

Supports CRA Article 16 - Quality Management System Documentation

📊 CRA Self-Assessment Summary

Overall CRA Documentation Status: EVIDENCE_DOCUMENTED

Key CRA Documentation Areas:

  • ✅ Annex I essential requirements documented with comprehensive evidence links
  • ✅ Annex V technical documentation comprehensively structured
  • ✅ Article 11 security measures implemented and documented
  • ✅ Article 23 post-market surveillance procedures operational

Outstanding Documentation:

CIA-DAST-001: Implement dynamic application security testing → Target: Q1 2025 (Owner: Security Team)
CIA-MOBILE-001: Enhance mobile responsive design security → Target: Q2 2025 (Owner: Development Team)

Formal Approval

👤 Role 📝 Name 📅 Date ✍️ Assessment Attestation
🔒 CRA Security Assessment James Sörling 2025-08-23 Essential requirements documented with comprehensive evidence
🎯 Product Responsibility James Sörling 2025-08-23 Technical documentation complete and publicly accessible
⚖️ Legal Compliance Review James Sörling 2025-08-23 EU regulatory documentation requirements satisfied

📊 CRA Assessment Status: SELF_ASSESSMENT_DOCUMENTED


🎨 CRA Assessment Maintenance

📋 Update Triggers

Per CRA Article 15 - Substantial Modification

CRA assessment updated only when changes constitute "substantial modification" under CRA:

  1. 🏗️ Security Architecture Changes: New authentication methods, trust boundaries, or encryption
  2. 🛡️ Essential Requirement Impact: Changes affecting Annex I compliance
  3. 📦 Critical Dependencies: New supply chain components with security implications
  4. 🔍 Risk Profile Changes: New threats or vulnerability classes affecting political data
  5. ⚖️ Regulatory Updates: CRA implementing acts or guidance changes

🎯 Maintenance Principle: Assessment stability preferred - avoid routine updates that don't impact CRA compliance

🔗 CRA Evidence Integration

## Current CRA Self-Assessment Evidence

**🏷️ Product Version:** {{CURRENT_VERSION}}
**📦 CRA Technical Documentation:** This assessment + [Latest Release](https://github.com/Hack23/cia/releases/latest)
**🛡️ Security Attestations:** [GitHub Attestations](https://github.com/Hack23/cia/attestations)
**📊 Assessment Status:** ![CRA Status](https://img.shields.io/badge/CRA_Self_Assessment-EVIDENCE_DOCUMENTED-blue)

📚 CRA Regulatory Alignment

🔐 CRA Article Cross-References

  • Article 6: Scope determination → Section 2 (CRA Classification)
  • Article 11: Essential cybersecurity requirements → Section 5 (Requirements Assessment)
  • Article 19: Conformity assessment → Section 6 (Evidence Documentation)
  • Article 23: Post-market obligations → Section 7 (Surveillance Documentation)
  • Article 28: Declaration of conformity → Section 8 (DoC Template)
  • Annex I: Technical requirements → Section 5 (Requirements self-assessment mapping)
  • Annex V: Technical documentation → Complete template structure

🌐 ISMS Integration Benefits

  • 🔄 Operational Continuity: CRA self-assessment integrated with existing security operations
  • 📊 Evidence Reuse: Security metrics and monitoring serve dual ISMS/CRA documentation purposes
  • 🎯 Business Value: CRA readiness demonstrates cybersecurity consulting expertise through systematic documentation
  • 🤝 Client Confidence: Transparent self-assessment approach showcases professional implementation methodology

📋 Complete ISMS Policy Framework

🔐 Core Security Governance

🛡️ Security Control Implementation

⚙️ Operational Excellence Framework

🚨 Incident Response & Recovery

📊 Performance Management & Compliance

🎯 Framework Benefits for CRA Compliance:

  • 🔄 Process Maturity: Established ISMS demonstrates systematic security management capabilities
  • 📋 Evidence Repository: Comprehensive documentation supports CRA technical file requirements
  • 🛡️ Control Effectiveness: Implemented security measures provide concrete evidence of essential requirements
  • 📊 Continuous Improvement: Metrics and review cycles demonstrate ongoing security posture management
  • 🤝 Stakeholder Confidence: Transparent practices showcase professional cybersecurity consulting expertise

📋 Document Control:
✅ Approved by: James Pether Sörling, CEO - Hack23 AB
📤 Distribution: Public
🏷️ Classification: Confidentiality: Public Integrity: High Availability: Moderate
📅 Effective Date: 2025-08-23
⏰ Next Review: 2025-11-23
🎯 Framework Compliance: ISO 27001 NIST CSF 2.0 CIS Controls
🇪🇺 CRA Alignment: Template supports CRA Annex V technical documentation and self-assessment requirements
🔐 ISMS Integration: Comprehensive alignment with public ISMS framework for operational excellence