hack23-isms-compliance
SKILL.md
Hack23 ISMS Compliance Skill
Purpose
Ensure all Hack23 organization projects comply with the Information Security Management System (ISMS) requirements. Covers ISO 27001:2022, NIST CSF 2.0, CIS Controls v8, NIS2, and GDPR compliance across the development lifecycle. Provides actionable guidance for audit preparation and policy enforcement.
When to Use
- ✅ Starting new projects or repositories under Hack23
- ✅ Preparing for internal or external security audits
- ✅ Reviewing compliance status of existing projects
- ✅ Implementing security controls for new features
- ✅ Creating or updating security policies and procedures
- ✅ Responding to security incidents
Do NOT use for:
- ❌ Specific code-level security patterns (use secure-code-review skill)
- ❌ Threat modeling exercises (use threat-modeling skill)
- ❌ Infrastructure security (use aws-cloudwatch-monitoring skill)
ISMS Framework Overview
┌─────────────────────────────────────────────────────────┐
│ Hack23 ISMS Framework │
├─────────────────────────────────────────────────────────┤
│ │
│ ┌──────────────┐ ┌──────────────┐ ┌──────────────┐ │
│ │ ISO 27001 │ │ NIST CSF 2.0 │ │ CIS Controls │ │
│ │ :2022 │ │ │ │ v8 │ │
│ │ 93 Controls │ │ 6 Functions │ │ 18 Controls │ │
│ └──────────────┘ └──────────────┘ └──────────────┘ │
│ │
│ ┌──────────────┐ ┌──────────────┐ ┌──────────────┐ │
│ │ NIS2 │ │ GDPR │ │ EU CRA │ │
│ │ Directive │ │ │ │ │ │
│ │ │ │ Data Privacy │ │ Cyber │ │
│ └──────────────┘ └──────────────┘ └──────────────┘ │
│ │
│ Reference: github.com/Hack23/ISMS-PUBLIC │
└─────────────────────────────────────────────────────────┘
Compliance Checklist Per Repository
Mandatory Documents
| Document | Status | Description |
|---|---|---|
SECURITY.md |
Required | Security policy and vulnerability reporting |
SECURITY_ARCHITECTURE.md |
Required | Security architecture documentation |
THREAT_MODEL.md |
Required | Threat model using STRIDE framework |
LICENSE.txt |
Required | Apache 2.0 license file |
CODEOWNERS |
Required | Code ownership and review requirements |
CODE_OF_CONDUCT.md |
Required | Community standards |
Required GitHub Settings
- Branch protection on
main— require PR reviews - Secret scanning enabled with push protection
- Dependabot alerts enabled for all ecosystems
- Code scanning (CodeQL) enabled
- OSSF Scorecard action configured
- Signed commits required (recommended)
Required CI/CD Controls
- OWASP Dependency Check in pipeline
- SAST scanning (CodeQL or SonarCloud)
- License compliance check
- SBOM generation (CycloneDX)
- Container scanning (if applicable)
ISO 27001:2022 Control Mapping
Key Controls for Development
| Control ID | Control Name | Implementation |
|---|---|---|
| A.5.1 | Policies for information security | SECURITY.md, ISMS policies |
| A.8.4 | Access to source code | GitHub branch protection, CODEOWNERS |
| A.8.9 | Configuration management | Infrastructure as Code, version control |
| A.8.25 | Secure development lifecycle | CI/CD pipeline with security gates |
| A.8.26 | Application security requirements | Input validation, OWASP Top 10 |
| A.8.28 | Secure coding | Code review, SAST scanning |
| A.8.31 | Separation of environments | Dev/staging/prod separation |
| A.8.33 | Test information | No production data in test environments |
NIST CSF 2.0 Mapping
| Function | Category | CIA Platform Implementation |
|---|---|---|
| Identify | Asset Management | Repository inventory, SBOM |
| Protect | Access Control | Spring Security, RBAC |
| Protect | Data Security | Encryption, input validation |
| Detect | Continuous Monitoring | CodeQL, Dependabot, OSSF |
| Respond | Incident Response | SECURITY.md reporting process |
| Recover | Recovery Planning | Backup procedures, DR plans |
GDPR Compliance for Political Data
Data Classification
| Category | Examples | Handling |
|---|---|---|
| Public political data | Votes, speeches, motions | Open access, no restrictions |
| Politician profiles | Name, party, committee | Public figure exception applies |
| User accounts | Email, preferences | Minimize, encrypt, consent required |
| Analytics data | Usage patterns | Anonymize, aggregate |
GDPR Requirements Checklist
- Data Processing Register maintained
- Privacy Impact Assessment for new features
- Data retention periods defined and enforced
- Right to erasure implemented for user data
- Data breach notification procedure documented
- Third-party data processor agreements in place
Audit Preparation Guide
Pre-Audit Checklist
-
Documentation Review
- All mandatory documents up to date
- Architecture diagrams current
- Risk register reviewed within 90 days
-
Technical Controls Verification
- Run full security scan suite
- Verify all CI/CD security gates active
- Check dependency vulnerability status
- Review access control configuration
-
Evidence Collection
# Generate compliance evidence mvn dependency-check:check # Vulnerability scan mvn org.cyclonedx:cyclonedx-maven-plugin:makeBom # SBOM mvn site # Project reports -
Metrics Preparation
- Mean time to remediate vulnerabilities
- Code coverage percentages
- Open security issue count and age
- Dependency update compliance rate
Policy Enforcement
Automated Enforcement
# Branch protection rules (enforce via GitHub API)
protection:
required_reviews: 1
dismiss_stale_reviews: true
require_code_owner_reviews: true
required_status_checks:
- "build"
- "codeql"
- "dependency-check"
enforce_admins: true
Manual Review Requirements
| Change Type | Reviewer | Approval |
|---|---|---|
| Security policy | Security lead | Required |
| Architecture change | Tech lead | Required |
| New dependency | Any reviewer | Required + security scan |
| CI/CD pipeline | DevOps + Security | Both required |
| Data model change | Tech lead | Required |
Incident Response Alignment
When a security incident occurs:
- Detect — CodeQL alerts, Dependabot alerts, manual report via
SECURITY.md - Contain — Disable affected component, revoke compromised credentials
- Eradicate — Fix vulnerability, update dependencies
- Recover — Deploy fix, verify resolution
- Lessons Learned — Update threat model, create ADR if architectural change needed
ISMS Reference
The authoritative ISMS documentation is maintained at:
- Repository:
github.com/Hack23/ISMS-PUBLIC - Secure Development Policy:
Secure_Development_Policy.md - Key Management Policy:
Key_Management_Policy.md - Access Control Policy:
Access_Control_Policy.md
All Hack23 projects must align with these organization-wide policies.
Weekly Installs
5
Repository
hack23/ciaGitHub Stars
213
First Seen
12 days ago
Security Audits
Installed on
opencode5
gemini-cli5
claude-code5
github-copilot5
codex5
amp5