widgettdc-api / source_intel /CRA-ASSESSMENT.md
Kraft102's picture
fix: sql.js Docker/Alpine compatibility layer for PatternMemory and FailureMemory
5a81b95

Hack23 Logo

πŸ›‘οΈ Hack23 AB β€” CRA Conformity Assessment Process

Evidence-Driven Conformity Through Systematic Assessment
Demonstrating CRA Compliance Excellence for Cybersecurity Consulting

Owner Version Effective Date Review Cycle

Document Owner: CEO | Version: 1.1 | Last Updated: 2025-08-23
Review Cycle: Quarterly | Next Review: 2025-11-23


🎯 Purpose Statement

Hack23 AB's CRA conformity assessment process demonstrates how systematic regulatory compliance directly enables business growth rather than creating operational burden. Our comprehensive assessment framework serves as both operational tool and client demonstration of our cybersecurity consulting methodologies.

As a cybersecurity consulting company, our approach to CRA compliance becomes a showcase of professional implementation, demonstrating to potential clients how systematic regulatory adherence creates competitive advantages through robust security foundations while enabling EU market access.

Our commitment to transparency means our conformity assessment practices become a reference implementation, showing how comprehensive regulatory compliance enables business expansion while protecting organizational interests and maintaining stakeholder trust.

β€” James Pether SΓΆrling, CEO/Founder


πŸ” Purpose & Scope

This process provides a concise, repeatable CRA Conformity Assessment format (pre‑market & ongoing) for the three initial products (CIA, Black Trigram, CIA Compliance Manager). Aligns with CRA Annex I & V, Hack23 classification, secure development, and transparency policies.

Scope: All products within Asset Register requiring EU market placement.


πŸ“‹ Quick Use Instructions

Copy this entire template into CRA-ASSESSMENT.md in your project root. Replace all {{PLACEHOLDERS}}, remove unused badge options, tick checkboxes, and commit with project changes when security posture materially changes.

Evidence Integration: All evidence (SBOM, provenance, test reports) stored in GitHub release artifacts and repository documentation. Assessment references current project state and links to immutable evidence.

CRA Regulation Alignment: This template supports CRA Annex V technical documentation requirements and Annex I essential requirements for cybersecurity through systematic self-assessment.

πŸ“š Reference Implementations

The following Hack23 AB projects demonstrate completed CRA assessments using this template:

πŸš€ Project πŸ“¦ Product Type 🏷️ CRA Classification πŸ“‹ Assessment Status πŸ”— Reference Link
πŸ•΅οΈ CIA (Citizen Intelligence Agency) Political transparency platform Standard (Non-commercial OSS) βœ… Complete πŸ“„ CRA Assessment
⚫ Black Trigram Korean martial atts game Standard (Non-commercial OSS) βœ… Complete πŸ“„ CRA Assessment
πŸ›‘οΈ CIA Compliance Manager Compliance automation tool Standard (Non-commercial OSS) βœ… Complete πŸ“„ CRA Assessment

🎯 Implementation Examples

πŸ“ Common Template Usage Patterns:

  • πŸ” Classification: Each reference shows different market categories and CIA classification levels
  • πŸ›‘οΈ Security Controls: Demonstrates technical documentation across various product types
  • πŸ“Š Evidence Links: Examples of GitHub release attestations and ISMS policy integration
  • βš–οΈ Risk Assessment: Different risk profiles for transparency, security, and compliance tools

πŸ”— Evidence Repository Structure: All reference implementations follow the standardized evidence pattern:

  • πŸ“¦ GitHub Releases: SBOM, SLSA attestations, and provenance documentation
  • πŸ›‘οΈ Security Policies: Direct links to ISMS framework policies and procedures
  • πŸ“Š Compliance Badges: OpenSSF Scorecard, CII Best Practices, and FOSSA license compliance
  • 🚨 Vulnerability Disclosure: Standardized SECURITY.md and coordinated disclosure processes

πŸ’‘ Usage Tips:

  1. Start with Classification: Use reference implementations with similar CIA levels as templates
  2. Evidence Alignment: Follow the GitHub attestations pattern from existing assessments
  3. Risk Context: Adapt risk assessments based on similar product complexity
  4. ISMS Integration: Reference implementations show policy linkage patterns for different product types

1️⃣ Project Identification

Supports CRA Annex V Β§ 1 - Product Description Requirements

Field Value
πŸ“¦ Product Citizen Intelligence Agency
🏷️ Version Tag 2025.1.2 (reflects current project state)
πŸ”— Repository https://github.com/Hack23/cia
πŸ“§ Security Contact security@hack23.org
🎯 Purpose (1–2 lines) Independent, volunteer-driven OSINT platform monitoring Swedish political activity, providing comprehensive analysis of political activities, financial performance metrics, and transparency insights through data aggregation from authoritative government sources

πŸ“‹ Evidence Links:

πŸ“Š Project Status & Quality Badges:

GitHub Release CII Best Practices OpenSSF Scorecard SLSA 3

Quality Gate Status Security Rating Maintainability Rating Reliability Rating Lines of Code

FOSSA Status CLA assistant Average time to resolve an issue Percentage of issues still open

πŸ”§ CI/CD & Automation Badges:

Verify & Release Verify PR ZAP Scan

πŸ“‹ Data Sources Evidence:

  • πŸ›οΈ Swedish Parliament: data.riksdagen.se - Parliamentary members, committees, documents
  • πŸ—³οΈ Election Authority: val.se - Election data, parties, voting results
  • 🌍 World Bank: data.worldbank.org - Global economic indicators
  • πŸ’Ή Financial Authority: esv.se - Government finances and trends

2️⃣ CRA Scope & Classification

Supports CRA Article 6 - Scope and Article 7 - Product Classification Assessment

🏒 CRA Applicability (Select One):

Non-commercial OSS

🌐 Distribution Method (Select One):

Community

πŸ“‹ CRA Classification (Select One):

Standard

πŸ“ CRA Scope Justification: The Citizen Intelligence Agency is a non-commercial open-source software project providing political transparency services through data aggregation and analysis of Swedish government sources. As a volunteer-driven initiative with community distribution via GitHub under Apache 2.0 license, it falls under non-commercial OSS with Standard CRA classification enabling self-assessment approach.

πŸ“‹ Classification Evidence:

πŸ” Classification Impact:

  • Standard: Self-assessment approach (this document provides evidence)
  • Class I/II: Would require notified body assessment + additional documentation

3️⃣ Technical Documentation

Supports CRA Annex V Β§ 2 - Technical Documentation Requirements

πŸ—οΈ CRA Technical Area πŸ“ Implementation Summary πŸ“‹ Evidence Location
🎨 Product Architecture (Annex V § 2.1) Complete C4 model architecture with container, component, and dynamic diagrams showing multi-layered Spring-based design ARCHITECTURE.md + SECURITY_ARCHITECTURE.md + System Mindmap + Future Architecture
πŸ“¦ SBOM & Components (Annex I Β§ 1.1) Automated SBOM generation via Maven with comprehensive dependency scanning and SLSA Level 3 attestations GitHub Attestations + Latest Release SBOM + Package Dependencies
πŸ” Cybersecurity Controls (Annex I Β§ 1.2) Spring Security framework with MFA via Google Authenticator, role-based access control (ANONYMOUS/USER/ADMIN), comprehensive Javers auditing, AWS security services integration Security Architecture + Future Security Architecture + Access Control Policy + Cryptography Policy
πŸ›‘οΈ Supply Chain Security (Annex I Β§ 1.3) SLSA Level 3 attestations, Dependabot automation, signed releases, OpenSSF Scorecard monitoring, CII Best Practices compliance GitHub Attestations + Dependabot Config + WORKFLOWS.md + OpenSSF Scorecard + CII Best Practices
πŸ”„ Update Mechanism (Annex I Β§ 1.4) Automated CI/CD pipeline with comprehensive security scanning (CodeQL, dependency review), version management, signed releases via GitHub Actions CI/CD Workflows + Release Workflow + Future Workflows + Change Management
πŸ“Š Security Monitoring (Annex I Β§ 1.5) Comprehensive logging via Javers auditing, ApplicationSession/ActionEvent tracking, AWS security services (GuardDuty, Security Hub, Config, Inspector), CloudWatch integration Security Architecture + AWS Security Services + Incident Response Plan
🏷️ Data Protection (Annex I § 2.1) Data classification system, GDPR compliance, encryption at rest/transit via AWS KMS, minimal personal data collection, PostgreSQL SSL configuration Data Classification Policy + Entity Documentation + Data Model + Future Data Model
πŸ“š User Guidance (Annex I Β§ 2.2) Comprehensive security configuration documentation including PostgreSQL 16 SSL setup, deployment guides, architecture documentation README.md + PostgreSQL Security Configuration + Security Architecture Guide + CloudFormation Template
πŸ” Vulnerability Disclosure (Annex I Β§ 2.3) Public vulnerability disclosure policy with GitHub Security Advisories, coordinated disclosure process, 48h acknowledgment timeline SECURITY.md + Security Advisories + Vulnerability Management

πŸ“‹ Comprehensive ISMS Integration:


4️⃣ Risk Assessment

Supports CRA Annex V Β§ 3 - Risk Assessment Documentation

Reference: πŸ“Š Risk Assessment Methodology and ⚠️ Risk Register

🚨 CRA Risk Category 🎯 Asset πŸ“Š Likelihood πŸ’₯ Impact (C/I/A) πŸ›‘οΈ CRA Control Implementation βš–οΈ Residual πŸ“‹ Evidence
Supply Chain Attack (Art. 11) Build pipeline & dependencies M H/H/M SBOM + SLSA Level 3 provenance + Dependabot automation + OpenSSF Scorecard monitoring + CII Best Practices L GitHub Attestations + WORKFLOWS.md + Scorecard Results
Unauthorized Access (Art. 11) Political data & user accounts M H/H/H Spring Security + Google Authenticator MFA + login blocking thresholds + role-based access (ANONYMOUS/USER/ADMIN) + ApplicationSession tracking L Security Architecture + Authentication Implementation
Data Breach (Art. 11) Swedish political intelligence data L H/H/H PostgreSQL SSL + AWS KMS encryption + WAF + VPC segmentation + minimal personal data collection + Javers auditing L AWS Security Config + Data Protection
Component Vulnerability (Art. 11) Java dependencies & runtime M M/H/M CodeQL scanning + Dependabot updates + dependency review workflow + SonarCloud analysis + Amazon Inspector L Security Scans + Dependabot + Quality Gate
Service Disruption (Art. 11) Public transparency platform M L/M/H AWS multi-AZ architecture + ALB + CloudWatch monitoring + auto-scaling + AWS Resilience Hub assessment M Infrastructure Architecture + AWS Resilience

βš–οΈ CRA Risk Statement: LOW - Comprehensive security controls and evidence-based monitoring support CRA essential cybersecurity requirements evaluation
βœ… Risk Acceptance: James SΓΆrling, CEO Hack23 AB - December 2024

πŸ“‹ Risk Management Framework Evidence:


5️⃣ Essential Cybersecurity Requirements

Supports CRA Annex I - Essential Requirements Self-Assessment

πŸ“‹ CRA Annex I Requirement βœ… Status πŸ“‹ Implementation Evidence
πŸ›‘οΈ Β§ 1.1 - Secure by Design [x] Defense-in-depth Architecture + AWS WAF Configuration + VPC Segmentation + Spring Security framework with method-level @Secured annotations
πŸ”’ Β§ 1.2 - Secure by Default [x] Hardened PostgreSQL 16 SSL Setup + SSL Configuration + Secure Defaults Documentation
🏷️ § 2.1 - Personal Data Protection [x] GDPR Compliance Policy + Minimal Data Collection + Entity Model Documentation
πŸ” Β§ 2.2 - Vulnerability Disclosure [x] Security Policy + Security Advisories + Vulnerability Management Process + 48h acknowledgment commitment
πŸ“¦ Β§ 2.3 - Software Bill of Materials [x] Automated SBOM Generation + SPDX Format Attestations + Release Evidence
πŸ” Β§ 2.4 - Secure Updates [x] SLSA Level 3 Attestations + Signed Releases + Secure CI/CD Pipeline
πŸ“Š Β§ 2.5 - Security Monitoring [x] Javers Auditing System + ApplicationSession/ActionEvent Tracking + AWS Security Services
πŸ“š Β§ 2.6 - Security Documentation [x] PostgreSQL Security Guide + Complete Architecture Documentation + Security Implementation Guide

🎯 CRA Self-Assessment Status: EVIDENCE_DOCUMENTED

πŸ” Security Implementation Evidence:

πŸ” Standard Security Reporting Process: Each project includes standardized security reporting via SECURITY.md following coordinated vulnerability disclosure:

  • πŸ“§ Private Reporting: GitHub Security Advisories for confidential disclosure
  • ⏱️ Response Timeline: 48h acknowledgment, 7d validation, 30d resolution per SECURITY.md
  • πŸ† Recognition Program: Public acknowledgment with option for anonymity
  • πŸ”„ Continuous Support: Latest version maintained with security updates
  • πŸ“‹ Vulnerability Scope: Authentication bypass, injection attacks, remote code execution, data exposure

ISMS Integration: All vulnerability reports processed through ⚠️ Vulnerability Management procedures


6️⃣ Conformity Assessment Evidence

Supports CRA Article 19 - Conformity Assessment Documentation

πŸ“Š Quality & Security Automation Status:

Reference: πŸ› οΈ Secure Development Policy

πŸ§ͺ Control 🎯 Requirement βœ… Implementation πŸ“‹ Evidence
πŸ§ͺ Unit Testing β‰₯80% line coverage, β‰₯70% branch βœ… Implemented SonarCloud Coverage + Maven Surefire Reports + Test Foundation
🌐 E2E Testing Critical user journeys validated βœ… Implemented Test Framework Documentation + Selenium WebDriver implementation + Test Results
πŸ” SAST Scanning Zero critical/high vulnerabilities βœ… Implemented CodeQL Analysis + SonarCloud Security + Security Rating Badge
πŸ“¦ SCA Scanning Zero critical unresolved dependencies βœ… Implemented Dependabot Alerts + Dependency Review Workflow + FOSSA Analysis
πŸ”’ Secret Scanning Zero exposed secrets/credentials βœ… Implemented GitHub Secret Scanning + Push protection enabled + Security Tab
πŸ•·οΈ DAST Scanning Zero exploitable high+ findings βœ… Implemented ZAP Scan
πŸ“¦ SBOM Generation SPDX + CycloneDX per release βœ… Implemented GitHub Attestations + Release SBOM Evidence + Package Dependencies
πŸ›‘οΈ Provenance SLSA Level 3 attestation βœ… Implemented GitHub Attestations + SLSA Badge + Sigstore signing
πŸ“Š Quality Gates SonarCloud quality gate passing βœ… Implemented SonarCloud Quality Gate + Quality Badge

πŸŽ–οΈ Security & Compliance Badges:

πŸ” Supply Chain Security: SLSA 3 OpenSSF Scorecard

πŸ† Best Practices & Quality: CII Best Practices Quality Gate Status Security Rating Maintainability Rating Reliability Rating

βš–οΈ License & Compliance: FOSSA Status CLA assistant license

πŸ›‘οΈ Security Scanning: CodeQL Scorecard ZAP Scan

πŸ“Š Project Health: Average time to resolve an issue Percentage of issues still open Lines of Code

πŸ”— Release Evidence: GitHub Attestations: https://github.com/Hack23/cia/attestations

πŸ“¦ CIA Release Evidence Pattern:

🎯 Release Assets Structure: Evidence available at: Latest Release

cia-dist-deb-2025.1.2.all.deb               # Debian package
cia-dist-deb-2025.1.2.all.deb.intoto.jsonl  # SLSA provenance
cia-dist-war-2025.1.2.war                   # WAR deployment  
cia-2025.1.2.spdx.json                      # SPDX SBOM
cia-2025.1.2.spdx.json.intoto.jsonl         # SBOM attestation

πŸ” Evidence Validation Commands:

# Verify SBOM in GitHub release
gh release view --repo Hack23/cia --json assets

# Check SLSA attestations
gh attestation list --repo Hack23/cia

# Validate security scorecard
curl -s https://api.securityscorecards.dev/projects/github.com/Hack23/cia | jq '.score'

# Verify FOSSA compliance
curl -s https://app.fossa.io/api/projects/git%2Bgithub.com%2FHack23%2Fcia/issues | jq '.issues | length'

# Check SonarCloud quality metrics
curl -s https://sonarcloud.io/api/measures/component?component=Hack23_cia&metricKeys=alert_status,security_rating,reliability_rating,sqale_rating

7️⃣ Post-Market Surveillance

Supports CRA Article 23 - Obligations of Economic Operators

Reference: 🌐 ISMS Transparency Plan and πŸ“Š Security Metrics

πŸ“‘ CRA Monitoring Obligation πŸ”§ Implementation ⏱️ Frequency 🎯 Action Trigger πŸ“‹ Evidence
πŸ” Vulnerability Monitoring (Art. 23.1) Dependabot + GitHub advisories + CodeQL scanning + SonarCloud analysis + Amazon Inspector Continuous Auto-create security issues and PRs Dependabot Alerts + Security Advisories
🚨 Incident Reporting (Art. 23.2) ApplicationActionEvent tracking + Javers auditing + AWS CloudWatch/GuardDuty/Security Hub Real-time ENISA 24h notification prep via comprehensive logging Security Monitoring + AWS Security Services
πŸ“Š Security Posture Tracking (Art. 23.3) OpenSSF Scorecard + SonarCloud + FOSSA + CII Best Practices monitoring + AWS Config Weekly/Daily Score decline investigation via automated alerts OpenSSF Scorecard + SonarCloud Dashboard
πŸ”„ Update Distribution (Art. 23.4) Automated GitHub releases + Debian package distribution + SLSA attestations + AWS Systems Manager patching As needed Critical vulnerability patches via secure CI/CD pipeline Release Management + CI/CD Workflows

πŸ“‹ CRA Reporting Readiness: Documentation and procedures prepared for ENISA incident reporting per 🚨 Incident Response Plan

πŸ”— ISMS Monitoring Integration:


8️⃣ EU Declaration of Conformity

Supports CRA Article 28 - EU Declaration of Conformity

πŸ“ Complete when placing product on EU market

🏒 Manufacturer: Hack23 AB, Gothenburg, Sweden
πŸ“¦ Product: Citizen Intelligence Agency VERSION
πŸ“‹ CRA Compliance: Self-assessment documentation supporting CRA essential cybersecurity requirements evaluation
πŸ” Assessment: Self-assessment documentation per Article 24 (non-commercial OSS with standard classification)
πŸ“Š Standards: ISO/IEC 27001 security framework + OWASP ASVS application security + NIST SSDF secure development + AWS Well-Architected Framework

πŸ“… Date & Signature: 2025-08-23 - James SΓΆrling, CEO Hack23 AB

πŸ“‚ Technical Documentation: This assessment + evidence bundle supports CRA Annex V technical documentation requirements


9️⃣ Assessment Completion & Approval

Supports CRA Article 16 - Quality Management System Documentation

πŸ“Š CRA Self-Assessment Summary

Overall CRA Documentation Status: EVIDENCE_DOCUMENTED

Key CRA Documentation Areas:

  • βœ… Annex I essential requirements documented with comprehensive evidence links
  • βœ… Annex V technical documentation comprehensively structured
  • βœ… Article 11 security measures implemented and documented
  • βœ… Article 23 post-market surveillance procedures operational

Outstanding Documentation:

CIA-DAST-001: Implement dynamic application security testing β†’ Target: Q1 2025 (Owner: Security Team)
CIA-MOBILE-001: Enhance mobile responsive design security β†’ Target: Q2 2025 (Owner: Development Team)

βœ… Formal Approval

πŸ‘€ Role πŸ“ Name πŸ“… Date ✍️ Assessment Attestation
πŸ”’ CRA Security Assessment James SΓΆrling 2025-08-23 Essential requirements documented with comprehensive evidence
🎯 Product Responsibility James Sârling 2025-08-23 Technical documentation complete and publicly accessible
βš–οΈ Legal Compliance Review James SΓΆrling 2025-08-23 EU regulatory documentation requirements satisfied

πŸ“Š CRA Assessment Status: SELF_ASSESSMENT_DOCUMENTED


🎨 CRA Assessment Maintenance

πŸ“‹ Update Triggers

Per CRA Article 15 - Substantial Modification

CRA assessment updated only when changes constitute "substantial modification" under CRA:

  1. πŸ—οΈ Security Architecture Changes: New authentication methods, trust boundaries, or encryption
  2. πŸ›‘οΈ Essential Requirement Impact: Changes affecting Annex I compliance
  3. πŸ“¦ Critical Dependencies: New supply chain components with security implications
  4. πŸ” Risk Profile Changes: New threats or vulnerability classes affecting political data
  5. βš–οΈ Regulatory Updates: CRA implementing acts or guidance changes

🎯 Maintenance Principle: Assessment stability preferred - avoid routine updates that don't impact CRA compliance

πŸ”— CRA Evidence Integration

## Current CRA Self-Assessment Evidence

**🏷️ Product Version:** {{CURRENT_VERSION}}
**πŸ“¦ CRA Technical Documentation:** This assessment + [Latest Release](https://github.com/Hack23/cia/releases/latest)
**πŸ›‘οΈ Security Attestations:** [GitHub Attestations](https://github.com/Hack23/cia/attestations)
**πŸ“Š Assessment Status:** ![CRA Status](https://img.shields.io/badge/CRA_Self_Assessment-EVIDENCE_DOCUMENTED-blue)

πŸ“š CRA Regulatory Alignment

πŸ” CRA Article Cross-References

  • Article 6: Scope determination β†’ Section 2 (CRA Classification)
  • Article 11: Essential cybersecurity requirements β†’ Section 5 (Requirements Assessment)
  • Article 19: Conformity assessment β†’ Section 6 (Evidence Documentation)
  • Article 23: Post-market obligations β†’ Section 7 (Surveillance Documentation)
  • Article 28: Declaration of conformity β†’ Section 8 (DoC Template)
  • Annex I: Technical requirements β†’ Section 5 (Requirements self-assessment mapping)
  • Annex V: Technical documentation β†’ Complete template structure

🌐 ISMS Integration Benefits

  • πŸ”„ Operational Continuity: CRA self-assessment integrated with existing security operations
  • πŸ“Š Evidence Reuse: Security metrics and monitoring serve dual ISMS/CRA documentation purposes
  • 🎯 Business Value: CRA readiness demonstrates cybersecurity consulting expertise through systematic documentation
  • 🀝 Client Confidence: Transparent self-assessment approach showcases professional implementation methodology

πŸ“‹ Complete ISMS Policy Framework

πŸ” Core Security Governance

πŸ›‘οΈ Security Control Implementation

βš™οΈ Operational Excellence Framework

🚨 Incident Response & Recovery

πŸ“Š Performance Management & Compliance

🎯 Framework Benefits for CRA Compliance:

  • πŸ”„ Process Maturity: Established ISMS demonstrates systematic security management capabilities
  • πŸ“‹ Evidence Repository: Comprehensive documentation supports CRA technical file requirements
  • πŸ›‘οΈ Control Effectiveness: Implemented security measures provide concrete evidence of essential requirements
  • πŸ“Š Continuous Improvement: Metrics and review cycles demonstrate ongoing security posture management
  • 🀝 Stakeholder Confidence: Transparent practices showcase professional cybersecurity consulting expertise

Document Control:
Approved by: James Pether SΓΆrling, CEO
Distribution: Public
Classification: Confidentiality: Public
Effective Date: 2025-08-23
CRA Alignment: Template supports CRA Annex V technical documentation and self-assessment requirements ISMS Integration: Comprehensive alignment with public ISMS framework for operational excellence