feat(extensions): B+C extensions framework with NIST 800-53 compliance extension#239
feat(extensions): B+C extensions framework with NIST 800-53 compliance extension#239ClintEastman02 wants to merge 4 commits into
Conversation
…compliance extension Adds the extensions README and the first community extension for NIST 800-53 compliance controls, including opt-in manifest, control mappings, and documentation. Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
Adds ~90 control mappings across Access Control (AC-3 through AC-22), Audit and Accountability (AU-2 through AU-12), and Assessment/Monitoring (CA-3, CA-7) families for context-load testing of the extension. Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
… menu - Change extension opt-in from per-extension prompts to single selection menu - Remove redundant NIST README (consolidated into extensions/README.md) - Remove rule-manifest.yaml (not needed for official extensions) - Add community-extensions-index.yaml template at repo root - Align with awslabs#225 consensus: official (B) + community (C) hybrid model Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
NIST Compliance Extension - Test Results Summary
Network Isolation
Control IDs found (with-ext)
AWS mechanisms: Audit Logging
Control IDs found (with-ext)
Threat Detection
Control IDs found (with-ext)
Tenant Isolation
Control IDs foundNo-ext: With-ext: Aggregate Summary
Key Takeaways
|
|
|
||
| ## NIST 800-53 Compliance Controls | ||
|
|
||
| **Version**: 0.2.0 |
There was a problem hiding this comment.
Where does the 0.2.0 come from?
There was a problem hiding this comment.
this came from the different versions I was going through when the different versions i can revert to 0.1.0
scottschreckengaust
left a comment
There was a problem hiding this comment.
Looks viable, see comments for follow-ups
|
|
||
| ## Available Extensions | ||
|
|
||
| | Extension | Category | Description | |
There was a problem hiding this comment.
Is there an easy way to add the Level for the Maturity Lifecycle concept ?
| Should NIST 800-53 compliance controls be enforced for this project? This extension maps NIST 800-53 controls to AWS Control Tower preventive and detective controls. | ||
|
|
||
| A) Yes — enforce all applicable NIST 800-53 / AWS Control Tower controls as blocking constraints (recommended for regulated AWS workloads) | ||
| B) Yes — but only advisory (SHOULD/MAY, non-blocking) |
There was a problem hiding this comment.
How would a pick list of numbers (when presented a list of available extensions) select only the advisory choice?
There was a problem hiding this comment.
for now the users can write the answers as 1,3 or 1,2 and that enables the extensions they want.
… menu - Update Extensions section in README to describe selection menu, add NIST extension to tree, add community extensions paragraph - Update WORKING-WITH-AIDLC advanced tip to describe menu instead of per-extension opt-in
How the Extension Affects Generated DocumentsSide-by-side excerpts from the Network Isolation test — same prompt, same security baseline, only difference is NIST ON vs OFF. Without NIST ExtensionGeneric security NFRs with no compliance traceability: ### NFR-03: Security — Administrative Access
- Remote administrative access MUST be exclusively through AWS Systems Manager Session ManagerWith NIST ExtensionA dedicated compliance section maps each requirement to a specific NIST control: ## 5. NIST 800-53 Compliance Requirements
| Control | Implementation |
|----------------------|-------------------------------------------------------------|
| AC-4 (Info Flow) | VPC SGs + NACLs enforce traffic; no 0.0.0.0/0; VPC endpoints |
| AC-17 (Remote Access)| No VPN/SSH; SSM Session Manager only |
| AU-2 (Event Logging) | API execution logging; CloudWatch; X-Ray tracing |
| CA-7 (Monitoring) | GuardDuty with ECS runtime + malware protection |This mapping then carries into Application Design: ### NIST 800-53 Design Alignment
| AC-4 (Info Flow) | VPC security groups + NACLs restrict all traffic flows |
| AC-17 (Remote Access)| SSM Session Manager only; no SSH/VPN |
| CA-7 (Monitoring) | GuardDuty + Security Hub integration |What This MeansWithout the extension — reasonable security requirements but no framework traceability. With the extension — every security decision maps to a NIST control ID and that mapping carries from requirements through design, giving auditors a clear trail from framework to implementation. |
|
can you explain what test harness are you using. |
|
Also when u say its an official NIST 800-53 compliance extension. Does this mean that if I use this extension my NIST 800-53 audits are covered in my application built using AI-DLC. |
|
What does this statement mean - produced zero control ID's : Control ID coverage is the headline metric: The extension increased unique NIST control IDs from an average of 2.8 to 17.8 per run -- a 5.4x improvement. Three of four no-ext runs produced zero control IDs.. |
|
Why is this extension specific to control tower ? |
|
Compliance extensions have different trust requirements than quality/testing extensions. Suggest scoping them out of the public index and supporting them through the private extensions mechanism instead. |
|
Compliance extensions are best suited in the "community" category. |
Summary
Implements the hybrid B+C extensions model proposed in #225:
community-extensions-index.yamlestablishes the decentralized extension contract for future community contributionsWhat Changed
inception/requirements-analysis.mdextensions/README.mdextensions/compliance/nist-800-53/community-extensions-index.yamlcore-workflow.md.aidlc/path for AI-assisted setupNIST 800-53 Extension
~90 control mappings across 3 NIST families mapped to specific AWS mechanisms:
The model selectively applies controls relevant to each project — a network isolation project triggers AC-4/AC-17; a logging project triggers AU-2/AU-12.
Extension Selection Menu
Instead of N sequential yes/no prompts, all opt-in extensions are presented in one table:
Alignment with #225
extensions/, community via indexsha256per file, mandatory atreviewednew -> incubating -> reviewed -> adopted -> official*.opt-in.mdscanning handles both official and installed community extensionsTest plan
aidlc-state.mdrecords extension enablement statusBy submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of the project license.