refactor(backend/db): split models.py into per-aggregate modules (1466 -> 85 LOC shim)
The monolithic compliance/db/models.py is decomposed into seven sibling
aggregate modules following the existing repo pattern (dsr_models.py,
vvt_models.py, tom_models.py, etc.):
regulation_models.py (134 LOC) — RegulationDB, RequirementDB
control_models.py (279 LOC) — ControlDB, ControlMappingDB, EvidenceDB, RiskDB
ai_system_models.py (141 LOC) — AISystemDB, AuditExportDB
service_module_models.py (176 LOC) — ServiceModuleDB, ModuleRegulationMappingDB, ModuleRiskDB
audit_session_models.py (177 LOC) — AuditSessionDB, AuditSignOffDB
isms_governance_models.py (323 LOC) — ISMSScope, Context, Policy, Objective, SoA
isms_audit_models.py (468 LOC) — AuditFinding, CAPA, ManagementReview, InternalAudit,
AuditTrail, ReadinessCheck
models.py becomes an 85-line re-export shim — every public symbol is
re-exported in dependency order so existing imports work unchanged:
from compliance.db.models import RegulationDB, ControlDB, AuditFindingDB # still works
New code SHOULD import from the aggregate module directly; the shim is
for backwards compatibility during the migration.
Schema freeze preserved:
- __tablename__ byte-identical
- Column names, types, indexes, constraints byte-identical
- relationship() string references and back_populates unchanged
- cascade directives unchanged
Verified:
- 173/173 pytest compliance/tests/ pass
- tests/contracts/test_openapi_baseline.py passes (360 paths,
484 operations — identical to baseline)
- All new sibling files under the 500-line hard cap
(largest: isms_audit_models.py at 468 LOC)
- No file in compliance/db/ now exceeds the hard cap
This is Phase 1 Step 2 from PHASE1_RUNBOOK.md. Phase 1 Step 3 (split
compliance/api/schemas.py, 1899 LOC) is the next target.
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
This commit is contained in:
141
backend-compliance/compliance/db/ai_system_models.py
Normal file
141
backend-compliance/compliance/db/ai_system_models.py
Normal file
@@ -0,0 +1,141 @@
|
|||||||
|
"""
|
||||||
|
AI System & Audit Export models — extracted from compliance/db/models.py.
|
||||||
|
|
||||||
|
Covers AI Act system registration/classification and the audit export package
|
||||||
|
tracker. Re-exported from ``compliance.db.models`` for backwards compatibility.
|
||||||
|
|
||||||
|
DO NOT change __tablename__, column names, or relationship strings.
|
||||||
|
"""
|
||||||
|
|
||||||
|
import uuid
|
||||||
|
import enum
|
||||||
|
from datetime import datetime, timezone
|
||||||
|
|
||||||
|
from sqlalchemy import (
|
||||||
|
Column, String, Text, Integer, DateTime, Date,
|
||||||
|
Enum, JSON, Index, Float,
|
||||||
|
)
|
||||||
|
|
||||||
|
from classroom_engine.database import Base
|
||||||
|
|
||||||
|
|
||||||
|
# ============================================================================
|
||||||
|
# ENUMS
|
||||||
|
# ============================================================================
|
||||||
|
|
||||||
|
class AIClassificationEnum(str, enum.Enum):
|
||||||
|
"""AI Act risk classification."""
|
||||||
|
PROHIBITED = "prohibited"
|
||||||
|
HIGH_RISK = "high-risk"
|
||||||
|
LIMITED_RISK = "limited-risk"
|
||||||
|
MINIMAL_RISK = "minimal-risk"
|
||||||
|
UNCLASSIFIED = "unclassified"
|
||||||
|
|
||||||
|
|
||||||
|
class AISystemStatusEnum(str, enum.Enum):
|
||||||
|
"""Status of an AI system in compliance tracking."""
|
||||||
|
DRAFT = "draft"
|
||||||
|
CLASSIFIED = "classified"
|
||||||
|
COMPLIANT = "compliant"
|
||||||
|
NON_COMPLIANT = "non-compliant"
|
||||||
|
|
||||||
|
|
||||||
|
class ExportStatusEnum(str, enum.Enum):
|
||||||
|
"""Status of audit export."""
|
||||||
|
PENDING = "pending"
|
||||||
|
GENERATING = "generating"
|
||||||
|
COMPLETED = "completed"
|
||||||
|
FAILED = "failed"
|
||||||
|
|
||||||
|
|
||||||
|
# ============================================================================
|
||||||
|
# MODELS
|
||||||
|
# ============================================================================
|
||||||
|
|
||||||
|
class AISystemDB(Base):
|
||||||
|
"""
|
||||||
|
AI System registry for AI Act compliance.
|
||||||
|
Tracks AI systems, their risk classification, and compliance status.
|
||||||
|
"""
|
||||||
|
__tablename__ = 'compliance_ai_systems'
|
||||||
|
|
||||||
|
id = Column(String(36), primary_key=True, default=lambda: str(uuid.uuid4()))
|
||||||
|
name = Column(String(300), nullable=False)
|
||||||
|
description = Column(Text)
|
||||||
|
purpose = Column(String(500))
|
||||||
|
sector = Column(String(100))
|
||||||
|
|
||||||
|
# AI Act classification
|
||||||
|
classification = Column(Enum(AIClassificationEnum), default=AIClassificationEnum.UNCLASSIFIED)
|
||||||
|
status = Column(Enum(AISystemStatusEnum), default=AISystemStatusEnum.DRAFT)
|
||||||
|
|
||||||
|
# Assessment
|
||||||
|
assessment_date = Column(DateTime)
|
||||||
|
assessment_result = Column(JSON) # Full assessment result
|
||||||
|
obligations = Column(JSON) # List of AI Act obligations
|
||||||
|
risk_factors = Column(JSON) # Risk factors from assessment
|
||||||
|
recommendations = Column(JSON) # Recommendations from assessment
|
||||||
|
|
||||||
|
# Timestamps
|
||||||
|
created_at = Column(DateTime, default=lambda: datetime.now(timezone.utc))
|
||||||
|
updated_at = Column(DateTime, default=lambda: datetime.now(timezone.utc), onupdate=lambda: datetime.now(timezone.utc))
|
||||||
|
|
||||||
|
__table_args__ = (
|
||||||
|
Index('ix_ai_system_classification', 'classification'),
|
||||||
|
Index('ix_ai_system_status', 'status'),
|
||||||
|
)
|
||||||
|
|
||||||
|
def __repr__(self):
|
||||||
|
return f"<AISystem {self.name} ({self.classification.value})>"
|
||||||
|
|
||||||
|
|
||||||
|
class AuditExportDB(Base):
|
||||||
|
"""
|
||||||
|
Tracks audit export packages generated for external auditors.
|
||||||
|
"""
|
||||||
|
__tablename__ = 'compliance_audit_exports'
|
||||||
|
|
||||||
|
id = Column(String(36), primary_key=True, default=lambda: str(uuid.uuid4()))
|
||||||
|
|
||||||
|
export_type = Column(String(50), nullable=False) # "full", "controls_only", "evidence_only"
|
||||||
|
export_name = Column(String(200)) # User-friendly name
|
||||||
|
|
||||||
|
# Scope
|
||||||
|
included_regulations = Column(JSON) # List of regulation codes
|
||||||
|
included_domains = Column(JSON) # List of control domains
|
||||||
|
date_range_start = Column(Date)
|
||||||
|
date_range_end = Column(Date)
|
||||||
|
|
||||||
|
# Generation
|
||||||
|
requested_by = Column(String(100), nullable=False)
|
||||||
|
requested_at = Column(DateTime, nullable=False, default=lambda: datetime.now(timezone.utc))
|
||||||
|
completed_at = Column(DateTime)
|
||||||
|
|
||||||
|
# Output
|
||||||
|
file_path = Column(String(500))
|
||||||
|
file_hash = Column(String(64)) # SHA-256 of ZIP
|
||||||
|
file_size_bytes = Column(Integer)
|
||||||
|
|
||||||
|
status = Column(Enum(ExportStatusEnum), default=ExportStatusEnum.PENDING)
|
||||||
|
error_message = Column(Text)
|
||||||
|
|
||||||
|
# Statistics
|
||||||
|
total_controls = Column(Integer)
|
||||||
|
total_evidence = Column(Integer)
|
||||||
|
compliance_score = Column(Float)
|
||||||
|
|
||||||
|
# Timestamps
|
||||||
|
created_at = Column(DateTime, default=lambda: datetime.now(timezone.utc))
|
||||||
|
updated_at = Column(DateTime, default=lambda: datetime.now(timezone.utc), onupdate=lambda: datetime.now(timezone.utc))
|
||||||
|
|
||||||
|
def __repr__(self):
|
||||||
|
return f"<AuditExport {self.export_type} by {self.requested_by}>"
|
||||||
|
|
||||||
|
|
||||||
|
__all__ = [
|
||||||
|
"AIClassificationEnum",
|
||||||
|
"AISystemStatusEnum",
|
||||||
|
"ExportStatusEnum",
|
||||||
|
"AISystemDB",
|
||||||
|
"AuditExportDB",
|
||||||
|
]
|
||||||
177
backend-compliance/compliance/db/audit_session_models.py
Normal file
177
backend-compliance/compliance/db/audit_session_models.py
Normal file
@@ -0,0 +1,177 @@
|
|||||||
|
"""
|
||||||
|
Audit Session & Sign-Off models — Sprint 3 Phase 3.
|
||||||
|
|
||||||
|
Extracted from compliance/db/models.py as the first worked example of the
|
||||||
|
Phase 1 model split. The classes are re-exported from compliance.db.models
|
||||||
|
for backwards compatibility, so existing imports continue to work unchanged.
|
||||||
|
|
||||||
|
Tables:
|
||||||
|
- compliance_audit_sessions: Structured compliance audit sessions
|
||||||
|
- compliance_audit_signoffs: Per-requirement sign-offs with digital signatures
|
||||||
|
|
||||||
|
DO NOT change __tablename__, column names, or relationship strings — the
|
||||||
|
database schema is frozen.
|
||||||
|
"""
|
||||||
|
|
||||||
|
import uuid
|
||||||
|
import enum
|
||||||
|
from datetime import datetime, timezone
|
||||||
|
|
||||||
|
from sqlalchemy import (
|
||||||
|
Column, String, Text, Integer, DateTime,
|
||||||
|
ForeignKey, Enum, JSON, Index,
|
||||||
|
)
|
||||||
|
from sqlalchemy.orm import relationship
|
||||||
|
|
||||||
|
from classroom_engine.database import Base
|
||||||
|
|
||||||
|
|
||||||
|
# ============================================================================
|
||||||
|
# ENUMS
|
||||||
|
# ============================================================================
|
||||||
|
|
||||||
|
class AuditResultEnum(str, enum.Enum):
|
||||||
|
"""Result of an audit sign-off for a requirement."""
|
||||||
|
COMPLIANT = "compliant" # Fully compliant
|
||||||
|
COMPLIANT_WITH_NOTES = "compliant_notes" # Compliant with observations
|
||||||
|
NON_COMPLIANT = "non_compliant" # Not compliant - remediation required
|
||||||
|
NOT_APPLICABLE = "not_applicable" # Not applicable to this audit
|
||||||
|
PENDING = "pending" # Not yet reviewed
|
||||||
|
|
||||||
|
|
||||||
|
class AuditSessionStatusEnum(str, enum.Enum):
|
||||||
|
"""Status of an audit session."""
|
||||||
|
DRAFT = "draft" # Session created, not started
|
||||||
|
IN_PROGRESS = "in_progress" # Audit in progress
|
||||||
|
COMPLETED = "completed" # All items reviewed
|
||||||
|
ARCHIVED = "archived" # Historical record
|
||||||
|
|
||||||
|
|
||||||
|
# ============================================================================
|
||||||
|
# MODELS
|
||||||
|
# ============================================================================
|
||||||
|
|
||||||
|
class AuditSessionDB(Base):
|
||||||
|
"""
|
||||||
|
Audit session for structured compliance reviews.
|
||||||
|
|
||||||
|
Enables auditors to:
|
||||||
|
- Create named audit sessions (e.g., "Q1 2026 GDPR Audit")
|
||||||
|
- Track progress through requirements
|
||||||
|
- Sign off individual items with digital signatures
|
||||||
|
- Generate audit reports
|
||||||
|
"""
|
||||||
|
__tablename__ = 'compliance_audit_sessions'
|
||||||
|
|
||||||
|
id = Column(String(36), primary_key=True, default=lambda: str(uuid.uuid4()))
|
||||||
|
name = Column(String(200), nullable=False) # e.g., "Q1 2026 Compliance Audit"
|
||||||
|
description = Column(Text)
|
||||||
|
|
||||||
|
# Auditor information
|
||||||
|
auditor_name = Column(String(100), nullable=False) # e.g., "Dr. Thomas Müller"
|
||||||
|
auditor_email = Column(String(200))
|
||||||
|
auditor_organization = Column(String(200)) # External auditor company
|
||||||
|
|
||||||
|
# Session scope
|
||||||
|
status = Column(Enum(AuditSessionStatusEnum), default=AuditSessionStatusEnum.DRAFT)
|
||||||
|
regulation_ids = Column(JSON) # Filter: ["GDPR", "AIACT"] or null for all
|
||||||
|
|
||||||
|
# Progress tracking
|
||||||
|
total_items = Column(Integer, default=0)
|
||||||
|
completed_items = Column(Integer, default=0)
|
||||||
|
compliant_count = Column(Integer, default=0)
|
||||||
|
non_compliant_count = Column(Integer, default=0)
|
||||||
|
|
||||||
|
# Timestamps
|
||||||
|
created_at = Column(DateTime, default=lambda: datetime.now(timezone.utc))
|
||||||
|
started_at = Column(DateTime) # When audit began
|
||||||
|
completed_at = Column(DateTime) # When audit finished
|
||||||
|
updated_at = Column(DateTime, default=lambda: datetime.now(timezone.utc), onupdate=lambda: datetime.now(timezone.utc))
|
||||||
|
|
||||||
|
# Relationships
|
||||||
|
signoffs = relationship("AuditSignOffDB", back_populates="session", cascade="all, delete-orphan")
|
||||||
|
|
||||||
|
__table_args__ = (
|
||||||
|
Index('ix_audit_session_status', 'status'),
|
||||||
|
Index('ix_audit_session_auditor', 'auditor_name'),
|
||||||
|
)
|
||||||
|
|
||||||
|
def __repr__(self):
|
||||||
|
return f"<AuditSession {self.name} ({self.status.value})>"
|
||||||
|
|
||||||
|
@property
|
||||||
|
def completion_percentage(self) -> float:
|
||||||
|
"""Calculate completion percentage."""
|
||||||
|
if self.total_items == 0:
|
||||||
|
return 0.0
|
||||||
|
return round((self.completed_items / self.total_items) * 100, 1)
|
||||||
|
|
||||||
|
|
||||||
|
class AuditSignOffDB(Base):
|
||||||
|
"""
|
||||||
|
Individual sign-off for a requirement within an audit session.
|
||||||
|
|
||||||
|
Features:
|
||||||
|
- Records audit result (compliant, non-compliant, etc.)
|
||||||
|
- Stores auditor notes and observations
|
||||||
|
- Creates digital signature (SHA-256 hash) for tamper evidence
|
||||||
|
"""
|
||||||
|
__tablename__ = 'compliance_audit_signoffs'
|
||||||
|
|
||||||
|
id = Column(String(36), primary_key=True, default=lambda: str(uuid.uuid4()))
|
||||||
|
session_id = Column(String(36), ForeignKey('compliance_audit_sessions.id'), nullable=False, index=True)
|
||||||
|
requirement_id = Column(String(36), ForeignKey('compliance_requirements.id'), nullable=False, index=True)
|
||||||
|
|
||||||
|
# Audit result
|
||||||
|
result = Column(Enum(AuditResultEnum), default=AuditResultEnum.PENDING)
|
||||||
|
notes = Column(Text) # Auditor observations
|
||||||
|
|
||||||
|
# Evidence references for this sign-off
|
||||||
|
evidence_ids = Column(JSON) # List of evidence IDs reviewed
|
||||||
|
|
||||||
|
# Digital signature (SHA-256 hash of result + auditor + timestamp)
|
||||||
|
signature_hash = Column(String(64)) # SHA-256 hex string
|
||||||
|
signed_at = Column(DateTime)
|
||||||
|
signed_by = Column(String(100)) # Auditor name at time of signing
|
||||||
|
|
||||||
|
# Timestamps
|
||||||
|
created_at = Column(DateTime, default=lambda: datetime.now(timezone.utc))
|
||||||
|
updated_at = Column(DateTime, default=lambda: datetime.now(timezone.utc), onupdate=lambda: datetime.now(timezone.utc))
|
||||||
|
|
||||||
|
# Relationships
|
||||||
|
session = relationship("AuditSessionDB", back_populates="signoffs")
|
||||||
|
requirement = relationship("RequirementDB")
|
||||||
|
|
||||||
|
__table_args__ = (
|
||||||
|
Index('ix_signoff_session_requirement', 'session_id', 'requirement_id', unique=True),
|
||||||
|
Index('ix_signoff_result', 'result'),
|
||||||
|
)
|
||||||
|
|
||||||
|
def __repr__(self):
|
||||||
|
return f"<AuditSignOff {self.requirement_id}: {self.result.value}>"
|
||||||
|
|
||||||
|
def create_signature(self, auditor_name: str) -> str:
|
||||||
|
"""
|
||||||
|
Create a digital signature for this sign-off.
|
||||||
|
|
||||||
|
Returns SHA-256 hash of: result + requirement_id + auditor_name + timestamp
|
||||||
|
"""
|
||||||
|
import hashlib
|
||||||
|
|
||||||
|
timestamp = datetime.now(timezone.utc).isoformat()
|
||||||
|
data = f"{self.result.value}|{self.requirement_id}|{auditor_name}|{timestamp}"
|
||||||
|
signature = hashlib.sha256(data.encode()).hexdigest()
|
||||||
|
|
||||||
|
self.signature_hash = signature
|
||||||
|
self.signed_at = datetime.now(timezone.utc)
|
||||||
|
self.signed_by = auditor_name
|
||||||
|
|
||||||
|
return signature
|
||||||
|
|
||||||
|
|
||||||
|
__all__ = [
|
||||||
|
"AuditResultEnum",
|
||||||
|
"AuditSessionStatusEnum",
|
||||||
|
"AuditSessionDB",
|
||||||
|
"AuditSignOffDB",
|
||||||
|
]
|
||||||
279
backend-compliance/compliance/db/control_models.py
Normal file
279
backend-compliance/compliance/db/control_models.py
Normal file
@@ -0,0 +1,279 @@
|
|||||||
|
"""
|
||||||
|
Control, Evidence, and Risk models — extracted from compliance/db/models.py.
|
||||||
|
|
||||||
|
Covers the control framework (ControlDB), requirement↔control mappings,
|
||||||
|
evidence artifacts, and the risk register. Re-exported from
|
||||||
|
``compliance.db.models`` for backwards compatibility.
|
||||||
|
|
||||||
|
DO NOT change __tablename__, column names, or relationship strings.
|
||||||
|
"""
|
||||||
|
|
||||||
|
import uuid
|
||||||
|
import enum
|
||||||
|
from datetime import datetime, date, timezone
|
||||||
|
|
||||||
|
from sqlalchemy import (
|
||||||
|
Column, String, Text, Integer, Boolean, DateTime, Date,
|
||||||
|
ForeignKey, Enum, JSON, Index,
|
||||||
|
)
|
||||||
|
from sqlalchemy.orm import relationship
|
||||||
|
|
||||||
|
from classroom_engine.database import Base
|
||||||
|
|
||||||
|
|
||||||
|
# ============================================================================
|
||||||
|
# ENUMS
|
||||||
|
# ============================================================================
|
||||||
|
|
||||||
|
class ControlTypeEnum(str, enum.Enum):
|
||||||
|
"""Type of security control."""
|
||||||
|
PREVENTIVE = "preventive" # Prevents incidents
|
||||||
|
DETECTIVE = "detective" # Detects incidents
|
||||||
|
CORRECTIVE = "corrective" # Corrects after incidents
|
||||||
|
|
||||||
|
|
||||||
|
class ControlDomainEnum(str, enum.Enum):
|
||||||
|
"""Domain/category of control."""
|
||||||
|
GOVERNANCE = "gov" # Governance & Organization
|
||||||
|
PRIVACY = "priv" # Privacy & Data Protection
|
||||||
|
IAM = "iam" # Identity & Access Management
|
||||||
|
CRYPTO = "crypto" # Cryptography & Key Management
|
||||||
|
SDLC = "sdlc" # Secure Development Lifecycle
|
||||||
|
OPS = "ops" # Operations & Monitoring
|
||||||
|
AI = "ai" # AI-specific controls
|
||||||
|
CRA = "cra" # CRA & Supply Chain
|
||||||
|
AUDIT = "aud" # Audit & Traceability
|
||||||
|
|
||||||
|
|
||||||
|
class ControlStatusEnum(str, enum.Enum):
|
||||||
|
"""Implementation status of a control."""
|
||||||
|
PASS = "pass" # Fully implemented & passing
|
||||||
|
PARTIAL = "partial" # Partially implemented
|
||||||
|
FAIL = "fail" # Not passing
|
||||||
|
NOT_APPLICABLE = "n/a" # Not applicable
|
||||||
|
PLANNED = "planned" # Planned for implementation
|
||||||
|
|
||||||
|
|
||||||
|
class RiskLevelEnum(str, enum.Enum):
|
||||||
|
"""Risk severity level."""
|
||||||
|
LOW = "low"
|
||||||
|
MEDIUM = "medium"
|
||||||
|
HIGH = "high"
|
||||||
|
CRITICAL = "critical"
|
||||||
|
|
||||||
|
|
||||||
|
class EvidenceStatusEnum(str, enum.Enum):
|
||||||
|
"""Status of evidence artifact."""
|
||||||
|
VALID = "valid" # Currently valid
|
||||||
|
EXPIRED = "expired" # Past validity date
|
||||||
|
PENDING = "pending" # Awaiting validation
|
||||||
|
FAILED = "failed" # Failed validation
|
||||||
|
|
||||||
|
|
||||||
|
# ============================================================================
|
||||||
|
# MODELS
|
||||||
|
# ============================================================================
|
||||||
|
|
||||||
|
class ControlDB(Base):
|
||||||
|
"""
|
||||||
|
Technical or organizational security control.
|
||||||
|
|
||||||
|
Examples: PRIV-001 (Verarbeitungsverzeichnis), SDLC-001 (SAST Scanning)
|
||||||
|
"""
|
||||||
|
__tablename__ = 'compliance_controls'
|
||||||
|
|
||||||
|
id = Column(String(36), primary_key=True, default=lambda: str(uuid.uuid4()))
|
||||||
|
control_id = Column(String(20), unique=True, nullable=False, index=True) # e.g., "PRIV-001"
|
||||||
|
|
||||||
|
domain = Column(Enum(ControlDomainEnum), nullable=False, index=True)
|
||||||
|
control_type = Column(Enum(ControlTypeEnum), nullable=False)
|
||||||
|
|
||||||
|
title = Column(String(300), nullable=False)
|
||||||
|
description = Column(Text)
|
||||||
|
pass_criteria = Column(Text, nullable=False) # Measurable pass criteria
|
||||||
|
implementation_guidance = Column(Text) # How to implement
|
||||||
|
|
||||||
|
# Code/Evidence references
|
||||||
|
code_reference = Column(String(500)) # e.g., "backend/middleware/pii_redactor.py:45"
|
||||||
|
documentation_url = Column(String(500)) # Link to internal docs
|
||||||
|
|
||||||
|
# Automation
|
||||||
|
is_automated = Column(Boolean, default=False)
|
||||||
|
automation_tool = Column(String(100)) # e.g., "Semgrep", "Trivy"
|
||||||
|
automation_config = Column(JSON) # Tool-specific config
|
||||||
|
|
||||||
|
# Status
|
||||||
|
status = Column(Enum(ControlStatusEnum), default=ControlStatusEnum.PLANNED)
|
||||||
|
status_notes = Column(Text)
|
||||||
|
|
||||||
|
# Ownership & Review
|
||||||
|
owner = Column(String(100)) # Responsible person/team
|
||||||
|
review_frequency_days = Column(Integer, default=90)
|
||||||
|
last_reviewed_at = Column(DateTime)
|
||||||
|
next_review_at = Column(DateTime)
|
||||||
|
|
||||||
|
# Timestamps
|
||||||
|
created_at = Column(DateTime, default=lambda: datetime.now(timezone.utc))
|
||||||
|
updated_at = Column(DateTime, default=lambda: datetime.now(timezone.utc), onupdate=lambda: datetime.now(timezone.utc))
|
||||||
|
|
||||||
|
# Relationships
|
||||||
|
mappings = relationship("ControlMappingDB", back_populates="control", cascade="all, delete-orphan")
|
||||||
|
evidence = relationship("EvidenceDB", back_populates="control", cascade="all, delete-orphan")
|
||||||
|
|
||||||
|
__table_args__ = (
|
||||||
|
Index('ix_control_domain_status', 'domain', 'status'),
|
||||||
|
)
|
||||||
|
|
||||||
|
def __repr__(self):
|
||||||
|
return f"<Control {self.control_id}: {self.title}>"
|
||||||
|
|
||||||
|
|
||||||
|
class ControlMappingDB(Base):
|
||||||
|
"""
|
||||||
|
Maps requirements to controls (many-to-many with metadata).
|
||||||
|
"""
|
||||||
|
__tablename__ = 'compliance_control_mappings'
|
||||||
|
|
||||||
|
id = Column(String(36), primary_key=True, default=lambda: str(uuid.uuid4()))
|
||||||
|
requirement_id = Column(String(36), ForeignKey('compliance_requirements.id'), nullable=False, index=True)
|
||||||
|
control_id = Column(String(36), ForeignKey('compliance_controls.id'), nullable=False, index=True)
|
||||||
|
|
||||||
|
coverage_level = Column(String(20), default="full") # "full", "partial", "planned"
|
||||||
|
notes = Column(Text) # Explanation of coverage
|
||||||
|
|
||||||
|
# Timestamps
|
||||||
|
created_at = Column(DateTime, default=lambda: datetime.now(timezone.utc))
|
||||||
|
updated_at = Column(DateTime, default=lambda: datetime.now(timezone.utc), onupdate=lambda: datetime.now(timezone.utc))
|
||||||
|
|
||||||
|
# Relationships
|
||||||
|
requirement = relationship("RequirementDB", back_populates="control_mappings")
|
||||||
|
control = relationship("ControlDB", back_populates="mappings")
|
||||||
|
|
||||||
|
__table_args__ = (
|
||||||
|
Index('ix_mapping_req_ctrl', 'requirement_id', 'control_id', unique=True),
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
class EvidenceDB(Base):
|
||||||
|
"""
|
||||||
|
Audit evidence for controls.
|
||||||
|
|
||||||
|
Types: scan_report, policy_document, config_snapshot, test_result,
|
||||||
|
manual_upload, screenshot, external_link
|
||||||
|
"""
|
||||||
|
__tablename__ = 'compliance_evidence'
|
||||||
|
|
||||||
|
id = Column(String(36), primary_key=True, default=lambda: str(uuid.uuid4()))
|
||||||
|
control_id = Column(String(36), ForeignKey('compliance_controls.id'), nullable=False, index=True)
|
||||||
|
|
||||||
|
evidence_type = Column(String(50), nullable=False) # Type of evidence
|
||||||
|
title = Column(String(300), nullable=False)
|
||||||
|
description = Column(Text)
|
||||||
|
|
||||||
|
# File/Link storage
|
||||||
|
artifact_path = Column(String(500)) # Local file path
|
||||||
|
artifact_url = Column(String(500)) # External URL
|
||||||
|
artifact_hash = Column(String(64)) # SHA-256 hash
|
||||||
|
file_size_bytes = Column(Integer)
|
||||||
|
mime_type = Column(String(100))
|
||||||
|
|
||||||
|
# Validity period
|
||||||
|
valid_from = Column(DateTime, nullable=False, default=lambda: datetime.now(timezone.utc))
|
||||||
|
valid_until = Column(DateTime) # NULL = no expiry
|
||||||
|
status = Column(Enum(EvidenceStatusEnum), default=EvidenceStatusEnum.VALID)
|
||||||
|
|
||||||
|
# Source tracking
|
||||||
|
source = Column(String(100)) # "ci_pipeline", "manual", "api"
|
||||||
|
ci_job_id = Column(String(100)) # CI/CD job reference
|
||||||
|
uploaded_by = Column(String(100)) # User who uploaded
|
||||||
|
|
||||||
|
# Timestamps
|
||||||
|
collected_at = Column(DateTime, default=lambda: datetime.now(timezone.utc))
|
||||||
|
created_at = Column(DateTime, default=lambda: datetime.now(timezone.utc))
|
||||||
|
updated_at = Column(DateTime, default=lambda: datetime.now(timezone.utc), onupdate=lambda: datetime.now(timezone.utc))
|
||||||
|
|
||||||
|
# Relationships
|
||||||
|
control = relationship("ControlDB", back_populates="evidence")
|
||||||
|
|
||||||
|
__table_args__ = (
|
||||||
|
Index('ix_evidence_control_type', 'control_id', 'evidence_type'),
|
||||||
|
Index('ix_evidence_status', 'status'),
|
||||||
|
)
|
||||||
|
|
||||||
|
def __repr__(self):
|
||||||
|
return f"<Evidence {self.evidence_type}: {self.title}>"
|
||||||
|
|
||||||
|
|
||||||
|
class RiskDB(Base):
|
||||||
|
"""
|
||||||
|
Risk register entry with likelihood x impact scoring.
|
||||||
|
"""
|
||||||
|
__tablename__ = 'compliance_risks'
|
||||||
|
|
||||||
|
id = Column(String(36), primary_key=True, default=lambda: str(uuid.uuid4()))
|
||||||
|
risk_id = Column(String(20), unique=True, nullable=False, index=True) # e.g., "RISK-001"
|
||||||
|
|
||||||
|
title = Column(String(300), nullable=False)
|
||||||
|
description = Column(Text)
|
||||||
|
category = Column(String(50), nullable=False) # "data_breach", "compliance_gap", etc.
|
||||||
|
|
||||||
|
# Inherent risk (before controls)
|
||||||
|
likelihood = Column(Integer, nullable=False) # 1-5
|
||||||
|
impact = Column(Integer, nullable=False) # 1-5
|
||||||
|
inherent_risk = Column(Enum(RiskLevelEnum), nullable=False)
|
||||||
|
|
||||||
|
# Mitigating controls
|
||||||
|
mitigating_controls = Column(JSON) # List of control_ids
|
||||||
|
|
||||||
|
# Residual risk (after controls)
|
||||||
|
residual_likelihood = Column(Integer)
|
||||||
|
residual_impact = Column(Integer)
|
||||||
|
residual_risk = Column(Enum(RiskLevelEnum))
|
||||||
|
|
||||||
|
# Management
|
||||||
|
owner = Column(String(100))
|
||||||
|
status = Column(String(20), default="open") # "open", "mitigated", "accepted", "transferred"
|
||||||
|
treatment_plan = Column(Text)
|
||||||
|
|
||||||
|
# Review
|
||||||
|
identified_date = Column(Date, default=date.today)
|
||||||
|
review_date = Column(Date)
|
||||||
|
last_assessed_at = Column(DateTime)
|
||||||
|
|
||||||
|
# Timestamps
|
||||||
|
created_at = Column(DateTime, default=lambda: datetime.now(timezone.utc))
|
||||||
|
updated_at = Column(DateTime, default=lambda: datetime.now(timezone.utc), onupdate=lambda: datetime.now(timezone.utc))
|
||||||
|
|
||||||
|
__table_args__ = (
|
||||||
|
Index('ix_risk_category_status', 'category', 'status'),
|
||||||
|
Index('ix_risk_inherent', 'inherent_risk'),
|
||||||
|
)
|
||||||
|
|
||||||
|
def __repr__(self):
|
||||||
|
return f"<Risk {self.risk_id}: {self.title}>"
|
||||||
|
|
||||||
|
@staticmethod
|
||||||
|
def calculate_risk_level(likelihood: int, impact: int) -> RiskLevelEnum:
|
||||||
|
"""Calculate risk level from likelihood x impact matrix."""
|
||||||
|
score = likelihood * impact
|
||||||
|
if score >= 20:
|
||||||
|
return RiskLevelEnum.CRITICAL
|
||||||
|
elif score >= 12:
|
||||||
|
return RiskLevelEnum.HIGH
|
||||||
|
elif score >= 6:
|
||||||
|
return RiskLevelEnum.MEDIUM
|
||||||
|
else:
|
||||||
|
return RiskLevelEnum.LOW
|
||||||
|
|
||||||
|
|
||||||
|
__all__ = [
|
||||||
|
"ControlTypeEnum",
|
||||||
|
"ControlDomainEnum",
|
||||||
|
"ControlStatusEnum",
|
||||||
|
"RiskLevelEnum",
|
||||||
|
"EvidenceStatusEnum",
|
||||||
|
"ControlDB",
|
||||||
|
"ControlMappingDB",
|
||||||
|
"EvidenceDB",
|
||||||
|
"RiskDB",
|
||||||
|
]
|
||||||
468
backend-compliance/compliance/db/isms_audit_models.py
Normal file
468
backend-compliance/compliance/db/isms_audit_models.py
Normal file
@@ -0,0 +1,468 @@
|
|||||||
|
"""
|
||||||
|
ISMS Audit Execution models (ISO 27001 Kapitel 9-10) — extracted from
|
||||||
|
compliance/db/models.py.
|
||||||
|
|
||||||
|
Covers findings, corrective actions (CAPA), management reviews, internal
|
||||||
|
audits, audit trail, and readiness checks. The governance side (scope,
|
||||||
|
context, policies, objectives, SoA) lives in ``isms_governance_models.py``.
|
||||||
|
|
||||||
|
Re-exported from ``compliance.db.models`` for backwards compatibility.
|
||||||
|
|
||||||
|
DO NOT change __tablename__, column names, or relationship strings.
|
||||||
|
"""
|
||||||
|
|
||||||
|
import uuid
|
||||||
|
import enum
|
||||||
|
from datetime import datetime, date, timezone
|
||||||
|
|
||||||
|
from sqlalchemy import (
|
||||||
|
Column, String, Text, Integer, Boolean, DateTime, Date,
|
||||||
|
ForeignKey, Enum, JSON, Index, Float,
|
||||||
|
)
|
||||||
|
from sqlalchemy.orm import relationship
|
||||||
|
|
||||||
|
from classroom_engine.database import Base
|
||||||
|
|
||||||
|
|
||||||
|
# ============================================================================
|
||||||
|
# ENUMS
|
||||||
|
# ============================================================================
|
||||||
|
|
||||||
|
class FindingTypeEnum(str, enum.Enum):
|
||||||
|
"""ISO 27001 audit finding classification."""
|
||||||
|
MAJOR = "major" # Major nonconformity - blocks certification
|
||||||
|
MINOR = "minor" # Minor nonconformity - requires CAPA
|
||||||
|
OFI = "ofi" # Opportunity for Improvement
|
||||||
|
POSITIVE = "positive" # Positive observation
|
||||||
|
|
||||||
|
|
||||||
|
class FindingStatusEnum(str, enum.Enum):
|
||||||
|
"""Status of an audit finding."""
|
||||||
|
OPEN = "open"
|
||||||
|
IN_PROGRESS = "in_progress"
|
||||||
|
CORRECTIVE_ACTION_PENDING = "capa_pending"
|
||||||
|
VERIFICATION_PENDING = "verification_pending"
|
||||||
|
VERIFIED = "verified"
|
||||||
|
CLOSED = "closed"
|
||||||
|
|
||||||
|
|
||||||
|
class CAPATypeEnum(str, enum.Enum):
|
||||||
|
"""Type of corrective/preventive action."""
|
||||||
|
CORRECTIVE = "corrective" # Fix the nonconformity
|
||||||
|
PREVENTIVE = "preventive" # Prevent recurrence
|
||||||
|
BOTH = "both"
|
||||||
|
|
||||||
|
|
||||||
|
# ============================================================================
|
||||||
|
# MODELS
|
||||||
|
# ============================================================================
|
||||||
|
|
||||||
|
class AuditFindingDB(Base):
|
||||||
|
"""
|
||||||
|
Audit Finding with ISO 27001 Classification (Major/Minor/OFI)
|
||||||
|
|
||||||
|
Tracks findings from internal and external audits with proper
|
||||||
|
classification and CAPA workflow.
|
||||||
|
"""
|
||||||
|
__tablename__ = 'compliance_audit_findings'
|
||||||
|
|
||||||
|
id = Column(String(36), primary_key=True, default=lambda: str(uuid.uuid4()))
|
||||||
|
finding_id = Column(String(30), unique=True, nullable=False, index=True) # e.g., "FIND-2026-001"
|
||||||
|
|
||||||
|
# Source
|
||||||
|
audit_session_id = Column(String(36), ForeignKey('compliance_audit_sessions.id'), index=True)
|
||||||
|
internal_audit_id = Column(String(36), ForeignKey('compliance_internal_audits.id'), index=True)
|
||||||
|
|
||||||
|
# Classification (CRITICAL for ISO 27001!)
|
||||||
|
finding_type = Column(Enum(FindingTypeEnum), nullable=False)
|
||||||
|
|
||||||
|
# ISO reference
|
||||||
|
iso_chapter = Column(String(20)) # e.g., "6.1.2", "9.2"
|
||||||
|
annex_a_control = Column(String(20)) # e.g., "A.8.2"
|
||||||
|
|
||||||
|
# Finding details
|
||||||
|
title = Column(String(300), nullable=False)
|
||||||
|
description = Column(Text, nullable=False)
|
||||||
|
objective_evidence = Column(Text, nullable=False) # What the auditor observed
|
||||||
|
|
||||||
|
# Root cause analysis
|
||||||
|
root_cause = Column(Text)
|
||||||
|
root_cause_method = Column(String(50)) # "5-why", "fishbone", "pareto"
|
||||||
|
|
||||||
|
# Impact assessment
|
||||||
|
impact_description = Column(Text)
|
||||||
|
affected_processes = Column(JSON)
|
||||||
|
affected_assets = Column(JSON)
|
||||||
|
|
||||||
|
# Status tracking
|
||||||
|
status = Column(Enum(FindingStatusEnum), default=FindingStatusEnum.OPEN)
|
||||||
|
|
||||||
|
# Responsibility
|
||||||
|
owner = Column(String(100)) # Person responsible for closure
|
||||||
|
auditor = Column(String(100)) # Auditor who raised finding
|
||||||
|
|
||||||
|
# Dates
|
||||||
|
identified_date = Column(Date, nullable=False, default=date.today)
|
||||||
|
due_date = Column(Date) # Deadline for closure
|
||||||
|
closed_date = Column(Date)
|
||||||
|
|
||||||
|
# Verification
|
||||||
|
verification_method = Column(Text)
|
||||||
|
verified_by = Column(String(100))
|
||||||
|
verified_at = Column(DateTime)
|
||||||
|
verification_evidence = Column(Text)
|
||||||
|
|
||||||
|
# Closure
|
||||||
|
closure_notes = Column(Text)
|
||||||
|
closed_by = Column(String(100))
|
||||||
|
|
||||||
|
# Timestamps
|
||||||
|
created_at = Column(DateTime, default=lambda: datetime.now(timezone.utc))
|
||||||
|
updated_at = Column(DateTime, default=lambda: datetime.now(timezone.utc), onupdate=lambda: datetime.now(timezone.utc))
|
||||||
|
|
||||||
|
# Relationships
|
||||||
|
corrective_actions = relationship("CorrectiveActionDB", back_populates="finding", cascade="all, delete-orphan")
|
||||||
|
|
||||||
|
__table_args__ = (
|
||||||
|
Index('ix_finding_type_status', 'finding_type', 'status'),
|
||||||
|
Index('ix_finding_due_date', 'due_date'),
|
||||||
|
)
|
||||||
|
|
||||||
|
def __repr__(self):
|
||||||
|
return f"<AuditFinding {self.finding_id}: {self.finding_type.value}>"
|
||||||
|
|
||||||
|
@property
|
||||||
|
def is_blocking(self) -> bool:
|
||||||
|
"""Major findings block certification."""
|
||||||
|
return self.finding_type == FindingTypeEnum.MAJOR and self.status != FindingStatusEnum.CLOSED
|
||||||
|
|
||||||
|
|
||||||
|
class CorrectiveActionDB(Base):
|
||||||
|
"""
|
||||||
|
Corrective & Preventive Actions (CAPA) - ISO 27001 10.1
|
||||||
|
|
||||||
|
Tracks actions taken to address nonconformities.
|
||||||
|
"""
|
||||||
|
__tablename__ = 'compliance_corrective_actions'
|
||||||
|
|
||||||
|
id = Column(String(36), primary_key=True, default=lambda: str(uuid.uuid4()))
|
||||||
|
capa_id = Column(String(30), unique=True, nullable=False, index=True) # e.g., "CAPA-2026-001"
|
||||||
|
|
||||||
|
# Link to finding
|
||||||
|
finding_id = Column(String(36), ForeignKey('compliance_audit_findings.id'), nullable=False, index=True)
|
||||||
|
|
||||||
|
# Type
|
||||||
|
capa_type = Column(Enum(CAPATypeEnum), nullable=False)
|
||||||
|
|
||||||
|
# Action details
|
||||||
|
title = Column(String(300), nullable=False)
|
||||||
|
description = Column(Text, nullable=False)
|
||||||
|
expected_outcome = Column(Text)
|
||||||
|
|
||||||
|
# Responsibility
|
||||||
|
assigned_to = Column(String(100), nullable=False)
|
||||||
|
approved_by = Column(String(100))
|
||||||
|
|
||||||
|
# Timeline
|
||||||
|
planned_start = Column(Date)
|
||||||
|
planned_completion = Column(Date, nullable=False)
|
||||||
|
actual_completion = Column(Date)
|
||||||
|
|
||||||
|
# Status
|
||||||
|
status = Column(String(30), default="planned") # planned, in_progress, completed, verified, cancelled
|
||||||
|
progress_percentage = Column(Integer, default=0)
|
||||||
|
|
||||||
|
# Resources
|
||||||
|
estimated_effort_hours = Column(Integer)
|
||||||
|
actual_effort_hours = Column(Integer)
|
||||||
|
resources_required = Column(Text)
|
||||||
|
|
||||||
|
# Evidence of implementation
|
||||||
|
implementation_evidence = Column(Text)
|
||||||
|
evidence_ids = Column(JSON)
|
||||||
|
|
||||||
|
# Effectiveness review
|
||||||
|
effectiveness_criteria = Column(Text)
|
||||||
|
effectiveness_verified = Column(Boolean, default=False)
|
||||||
|
effectiveness_verification_date = Column(Date)
|
||||||
|
effectiveness_notes = Column(Text)
|
||||||
|
|
||||||
|
# Timestamps
|
||||||
|
created_at = Column(DateTime, default=lambda: datetime.now(timezone.utc))
|
||||||
|
updated_at = Column(DateTime, default=lambda: datetime.now(timezone.utc), onupdate=lambda: datetime.now(timezone.utc))
|
||||||
|
|
||||||
|
# Relationships
|
||||||
|
finding = relationship("AuditFindingDB", back_populates="corrective_actions")
|
||||||
|
|
||||||
|
__table_args__ = (
|
||||||
|
Index('ix_capa_status', 'status'),
|
||||||
|
Index('ix_capa_due', 'planned_completion'),
|
||||||
|
)
|
||||||
|
|
||||||
|
def __repr__(self):
|
||||||
|
return f"<CAPA {self.capa_id}: {self.capa_type.value}>"
|
||||||
|
|
||||||
|
|
||||||
|
class ManagementReviewDB(Base):
|
||||||
|
"""
|
||||||
|
Management Review (ISO 27001 Kapitel 9.3)
|
||||||
|
|
||||||
|
Records mandatory management reviews of the ISMS.
|
||||||
|
"""
|
||||||
|
__tablename__ = 'compliance_management_reviews'
|
||||||
|
|
||||||
|
id = Column(String(36), primary_key=True, default=lambda: str(uuid.uuid4()))
|
||||||
|
review_id = Column(String(30), unique=True, nullable=False, index=True) # e.g., "MR-2026-Q1"
|
||||||
|
|
||||||
|
# Review details
|
||||||
|
title = Column(String(200), nullable=False)
|
||||||
|
review_date = Column(Date, nullable=False)
|
||||||
|
review_period_start = Column(Date) # Period being reviewed
|
||||||
|
review_period_end = Column(Date)
|
||||||
|
|
||||||
|
# Participants
|
||||||
|
chairperson = Column(String(100), nullable=False) # Usually top management
|
||||||
|
attendees = Column(JSON) # List of {"name": "", "role": ""}
|
||||||
|
|
||||||
|
# 9.3 Review Inputs (mandatory!)
|
||||||
|
input_previous_actions = Column(Text) # Status of previous review actions
|
||||||
|
input_isms_changes = Column(Text) # Changes in internal/external issues
|
||||||
|
input_security_performance = Column(Text) # Nonconformities, monitoring, audit results
|
||||||
|
input_interested_party_feedback = Column(Text)
|
||||||
|
input_risk_assessment_results = Column(Text)
|
||||||
|
input_improvement_opportunities = Column(Text)
|
||||||
|
|
||||||
|
# Additional inputs
|
||||||
|
input_policy_effectiveness = Column(Text)
|
||||||
|
input_objective_achievement = Column(Text)
|
||||||
|
input_resource_adequacy = Column(Text)
|
||||||
|
|
||||||
|
# 9.3 Review Outputs (mandatory!)
|
||||||
|
output_improvement_decisions = Column(Text) # Decisions for improvement
|
||||||
|
output_isms_changes = Column(Text) # Changes needed to ISMS
|
||||||
|
output_resource_needs = Column(Text) # Resource requirements
|
||||||
|
|
||||||
|
# Action items
|
||||||
|
action_items = Column(JSON) # List of {"action": "", "owner": "", "due_date": ""}
|
||||||
|
|
||||||
|
# Overall assessment
|
||||||
|
isms_effectiveness_rating = Column(String(20)) # "effective", "partially_effective", "not_effective"
|
||||||
|
key_decisions = Column(Text)
|
||||||
|
|
||||||
|
# Approval
|
||||||
|
status = Column(String(30), default="draft") # draft, conducted, approved
|
||||||
|
approved_by = Column(String(100))
|
||||||
|
approved_at = Column(DateTime)
|
||||||
|
minutes_document_path = Column(String(500)) # Link to meeting minutes
|
||||||
|
|
||||||
|
# Next review
|
||||||
|
next_review_date = Column(Date)
|
||||||
|
|
||||||
|
# Timestamps
|
||||||
|
created_at = Column(DateTime, default=lambda: datetime.now(timezone.utc))
|
||||||
|
updated_at = Column(DateTime, default=lambda: datetime.now(timezone.utc), onupdate=lambda: datetime.now(timezone.utc))
|
||||||
|
|
||||||
|
__table_args__ = (
|
||||||
|
Index('ix_mgmt_review_date', 'review_date'),
|
||||||
|
Index('ix_mgmt_review_status', 'status'),
|
||||||
|
)
|
||||||
|
|
||||||
|
def __repr__(self):
|
||||||
|
return f"<ManagementReview {self.review_id}: {self.review_date}>"
|
||||||
|
|
||||||
|
|
||||||
|
class InternalAuditDB(Base):
|
||||||
|
"""
|
||||||
|
Internal Audit (ISO 27001 Kapitel 9.2)
|
||||||
|
|
||||||
|
Tracks internal audit program and individual audits.
|
||||||
|
"""
|
||||||
|
__tablename__ = 'compliance_internal_audits'
|
||||||
|
|
||||||
|
id = Column(String(36), primary_key=True, default=lambda: str(uuid.uuid4()))
|
||||||
|
audit_id = Column(String(30), unique=True, nullable=False, index=True) # e.g., "IA-2026-001"
|
||||||
|
|
||||||
|
# Audit details
|
||||||
|
title = Column(String(200), nullable=False)
|
||||||
|
audit_type = Column(String(50), nullable=False) # "scheduled", "surveillance", "special"
|
||||||
|
|
||||||
|
# Scope
|
||||||
|
scope_description = Column(Text, nullable=False)
|
||||||
|
iso_chapters_covered = Column(JSON) # e.g., ["4", "5", "6.1"]
|
||||||
|
annex_a_controls_covered = Column(JSON) # e.g., ["A.5", "A.6"]
|
||||||
|
processes_covered = Column(JSON)
|
||||||
|
departments_covered = Column(JSON)
|
||||||
|
|
||||||
|
# Audit criteria
|
||||||
|
criteria = Column(Text) # Standards, policies being audited against
|
||||||
|
|
||||||
|
# Timeline
|
||||||
|
planned_date = Column(Date, nullable=False)
|
||||||
|
actual_start_date = Column(Date)
|
||||||
|
actual_end_date = Column(Date)
|
||||||
|
|
||||||
|
# Audit team
|
||||||
|
lead_auditor = Column(String(100), nullable=False)
|
||||||
|
audit_team = Column(JSON) # List of auditor names
|
||||||
|
auditee_representatives = Column(JSON) # Who was interviewed
|
||||||
|
|
||||||
|
# Status
|
||||||
|
status = Column(String(30), default="planned") # planned, in_progress, completed, cancelled
|
||||||
|
|
||||||
|
# Results summary
|
||||||
|
total_findings = Column(Integer, default=0)
|
||||||
|
major_findings = Column(Integer, default=0)
|
||||||
|
minor_findings = Column(Integer, default=0)
|
||||||
|
ofi_count = Column(Integer, default=0)
|
||||||
|
positive_observations = Column(Integer, default=0)
|
||||||
|
|
||||||
|
# Conclusion
|
||||||
|
audit_conclusion = Column(Text)
|
||||||
|
overall_assessment = Column(String(30)) # "conforming", "minor_nc", "major_nc"
|
||||||
|
|
||||||
|
# Report
|
||||||
|
report_date = Column(Date)
|
||||||
|
report_document_path = Column(String(500))
|
||||||
|
|
||||||
|
# Sign-off
|
||||||
|
report_approved_by = Column(String(100))
|
||||||
|
report_approved_at = Column(DateTime)
|
||||||
|
|
||||||
|
# Follow-up
|
||||||
|
follow_up_audit_required = Column(Boolean, default=False)
|
||||||
|
follow_up_audit_id = Column(String(36))
|
||||||
|
|
||||||
|
# Timestamps
|
||||||
|
created_at = Column(DateTime, default=lambda: datetime.now(timezone.utc))
|
||||||
|
updated_at = Column(DateTime, default=lambda: datetime.now(timezone.utc), onupdate=lambda: datetime.now(timezone.utc))
|
||||||
|
|
||||||
|
# Relationships
|
||||||
|
findings = relationship("AuditFindingDB", backref="internal_audit", foreign_keys=[AuditFindingDB.internal_audit_id])
|
||||||
|
|
||||||
|
__table_args__ = (
|
||||||
|
Index('ix_internal_audit_date', 'planned_date'),
|
||||||
|
Index('ix_internal_audit_status', 'status'),
|
||||||
|
)
|
||||||
|
|
||||||
|
def __repr__(self):
|
||||||
|
return f"<InternalAudit {self.audit_id}: {self.title}>"
|
||||||
|
|
||||||
|
|
||||||
|
class AuditTrailDB(Base):
|
||||||
|
"""
|
||||||
|
Comprehensive Audit Trail for ISMS Changes
|
||||||
|
|
||||||
|
Tracks all changes to compliance-relevant data for
|
||||||
|
accountability and forensic analysis.
|
||||||
|
"""
|
||||||
|
__tablename__ = 'compliance_audit_trail'
|
||||||
|
|
||||||
|
id = Column(String(36), primary_key=True, default=lambda: str(uuid.uuid4()))
|
||||||
|
|
||||||
|
# What changed
|
||||||
|
entity_type = Column(String(50), nullable=False, index=True) # "control", "risk", "policy", etc.
|
||||||
|
entity_id = Column(String(36), nullable=False, index=True)
|
||||||
|
entity_name = Column(String(200)) # Human-readable identifier
|
||||||
|
|
||||||
|
# Action
|
||||||
|
action = Column(String(20), nullable=False) # "create", "update", "delete", "approve", "sign"
|
||||||
|
|
||||||
|
# Change details
|
||||||
|
field_changed = Column(String(100)) # Which field (for updates)
|
||||||
|
old_value = Column(Text)
|
||||||
|
new_value = Column(Text)
|
||||||
|
change_summary = Column(Text) # Human-readable summary
|
||||||
|
|
||||||
|
# Who & When
|
||||||
|
performed_by = Column(String(100), nullable=False)
|
||||||
|
performed_at = Column(DateTime, nullable=False, default=lambda: datetime.now(timezone.utc))
|
||||||
|
|
||||||
|
# Context
|
||||||
|
ip_address = Column(String(45))
|
||||||
|
user_agent = Column(String(500))
|
||||||
|
session_id = Column(String(100))
|
||||||
|
|
||||||
|
# Integrity
|
||||||
|
checksum = Column(String(64)) # SHA-256 of the change
|
||||||
|
|
||||||
|
# Timestamps (immutable after creation)
|
||||||
|
created_at = Column(DateTime, nullable=False, default=lambda: datetime.now(timezone.utc))
|
||||||
|
|
||||||
|
__table_args__ = (
|
||||||
|
Index('ix_audit_trail_entity', 'entity_type', 'entity_id'),
|
||||||
|
Index('ix_audit_trail_time', 'performed_at'),
|
||||||
|
Index('ix_audit_trail_user', 'performed_by'),
|
||||||
|
)
|
||||||
|
|
||||||
|
def __repr__(self):
|
||||||
|
return f"<AuditTrail {self.action} on {self.entity_type}/{self.entity_id}>"
|
||||||
|
|
||||||
|
|
||||||
|
class ISMSReadinessCheckDB(Base):
|
||||||
|
"""
|
||||||
|
ISMS Readiness Check Results
|
||||||
|
|
||||||
|
Stores automated pre-audit checks to identify potential
|
||||||
|
Major findings before external audit.
|
||||||
|
"""
|
||||||
|
__tablename__ = 'compliance_isms_readiness'
|
||||||
|
|
||||||
|
id = Column(String(36), primary_key=True, default=lambda: str(uuid.uuid4()))
|
||||||
|
|
||||||
|
# Check run
|
||||||
|
check_date = Column(DateTime, nullable=False, default=lambda: datetime.now(timezone.utc))
|
||||||
|
triggered_by = Column(String(100)) # "scheduled", "manual", "pre-audit"
|
||||||
|
|
||||||
|
# Overall status
|
||||||
|
overall_status = Column(String(20), nullable=False) # "ready", "at_risk", "not_ready"
|
||||||
|
certification_possible = Column(Boolean, nullable=False)
|
||||||
|
|
||||||
|
# Chapter-by-chapter status (ISO 27001)
|
||||||
|
chapter_4_status = Column(String(20)) # Context
|
||||||
|
chapter_5_status = Column(String(20)) # Leadership
|
||||||
|
chapter_6_status = Column(String(20)) # Planning
|
||||||
|
chapter_7_status = Column(String(20)) # Support
|
||||||
|
chapter_8_status = Column(String(20)) # Operation
|
||||||
|
chapter_9_status = Column(String(20)) # Performance
|
||||||
|
chapter_10_status = Column(String(20)) # Improvement
|
||||||
|
|
||||||
|
# Potential Major findings
|
||||||
|
potential_majors = Column(JSON) # List of {"check": "", "status": "", "recommendation": ""}
|
||||||
|
|
||||||
|
# Potential Minor findings
|
||||||
|
potential_minors = Column(JSON)
|
||||||
|
|
||||||
|
# Improvement opportunities
|
||||||
|
improvement_opportunities = Column(JSON)
|
||||||
|
|
||||||
|
# Scores
|
||||||
|
readiness_score = Column(Float) # 0-100
|
||||||
|
documentation_score = Column(Float)
|
||||||
|
implementation_score = Column(Float)
|
||||||
|
evidence_score = Column(Float)
|
||||||
|
|
||||||
|
# Recommendations
|
||||||
|
priority_actions = Column(JSON) # List of recommended actions before audit
|
||||||
|
# Timestamps
|
||||||
|
created_at = Column(DateTime, default=lambda: datetime.now(timezone.utc))
|
||||||
|
|
||||||
|
__table_args__ = (
|
||||||
|
Index('ix_readiness_date', 'check_date'),
|
||||||
|
Index('ix_readiness_status', 'overall_status'),
|
||||||
|
)
|
||||||
|
|
||||||
|
def __repr__(self):
|
||||||
|
return f"<ISMSReadiness {self.check_date}: {self.overall_status}>"
|
||||||
|
|
||||||
|
|
||||||
|
__all__ = [
|
||||||
|
"FindingTypeEnum",
|
||||||
|
"FindingStatusEnum",
|
||||||
|
"CAPATypeEnum",
|
||||||
|
"AuditFindingDB",
|
||||||
|
"CorrectiveActionDB",
|
||||||
|
"ManagementReviewDB",
|
||||||
|
"InternalAuditDB",
|
||||||
|
"AuditTrailDB",
|
||||||
|
"ISMSReadinessCheckDB",
|
||||||
|
]
|
||||||
323
backend-compliance/compliance/db/isms_governance_models.py
Normal file
323
backend-compliance/compliance/db/isms_governance_models.py
Normal file
@@ -0,0 +1,323 @@
|
|||||||
|
"""
|
||||||
|
ISMS Governance models (ISO 27001 Kapitel 4-6) — extracted from compliance/db/models.py.
|
||||||
|
|
||||||
|
Covers the documentation and planning side of the ISMS: scope, context,
|
||||||
|
policies, security objectives, and the Statement of Applicability. The audit
|
||||||
|
execution side (findings, CAPA, management reviews, internal audits, audit
|
||||||
|
trail, readiness checks) lives in ``isms_audit_models.py``.
|
||||||
|
|
||||||
|
Re-exported from ``compliance.db.models`` for backwards compatibility.
|
||||||
|
|
||||||
|
DO NOT change __tablename__, column names, or relationship strings — the
|
||||||
|
database schema is frozen.
|
||||||
|
"""
|
||||||
|
|
||||||
|
import uuid
|
||||||
|
import enum
|
||||||
|
from datetime import datetime, date, timezone
|
||||||
|
|
||||||
|
from sqlalchemy import (
|
||||||
|
Column, String, Text, Integer, Boolean, DateTime, Date,
|
||||||
|
ForeignKey, Enum, JSON, Index,
|
||||||
|
)
|
||||||
|
|
||||||
|
from classroom_engine.database import Base
|
||||||
|
|
||||||
|
|
||||||
|
# ============================================================================
|
||||||
|
# SHARED GOVERNANCE ENUMS
|
||||||
|
# ============================================================================
|
||||||
|
|
||||||
|
class ApprovalStatusEnum(str, enum.Enum):
|
||||||
|
"""Approval status for ISMS documents."""
|
||||||
|
DRAFT = "draft"
|
||||||
|
UNDER_REVIEW = "under_review"
|
||||||
|
APPROVED = "approved"
|
||||||
|
SUPERSEDED = "superseded"
|
||||||
|
|
||||||
|
|
||||||
|
# ============================================================================
|
||||||
|
# MODELS
|
||||||
|
# ============================================================================
|
||||||
|
|
||||||
|
class ISMSScopeDB(Base):
|
||||||
|
"""
|
||||||
|
ISMS Scope Definition (ISO 27001 Kapitel 4.3)
|
||||||
|
|
||||||
|
Defines the boundaries and applicability of the ISMS.
|
||||||
|
This is MANDATORY for certification.
|
||||||
|
"""
|
||||||
|
__tablename__ = 'compliance_isms_scope'
|
||||||
|
|
||||||
|
id = Column(String(36), primary_key=True, default=lambda: str(uuid.uuid4()))
|
||||||
|
version = Column(String(20), nullable=False, default="1.0")
|
||||||
|
|
||||||
|
# Scope definition
|
||||||
|
scope_statement = Column(Text, nullable=False) # Main scope text
|
||||||
|
included_locations = Column(JSON) # List of locations
|
||||||
|
included_processes = Column(JSON) # List of processes
|
||||||
|
included_services = Column(JSON) # List of services/products
|
||||||
|
excluded_items = Column(JSON) # Explicitly excluded items
|
||||||
|
exclusion_justification = Column(Text) # Why items are excluded
|
||||||
|
|
||||||
|
# Boundaries
|
||||||
|
organizational_boundary = Column(Text) # Legal entity, departments
|
||||||
|
physical_boundary = Column(Text) # Locations, networks
|
||||||
|
technical_boundary = Column(Text) # Systems, applications
|
||||||
|
|
||||||
|
# Approval
|
||||||
|
status = Column(Enum(ApprovalStatusEnum), default=ApprovalStatusEnum.DRAFT)
|
||||||
|
approved_by = Column(String(100))
|
||||||
|
approved_at = Column(DateTime)
|
||||||
|
approval_signature = Column(String(64)) # SHA-256 hash
|
||||||
|
|
||||||
|
# Validity
|
||||||
|
effective_date = Column(Date)
|
||||||
|
review_date = Column(Date) # Next mandatory review
|
||||||
|
|
||||||
|
# Timestamps
|
||||||
|
created_at = Column(DateTime, default=lambda: datetime.now(timezone.utc))
|
||||||
|
updated_at = Column(DateTime, default=lambda: datetime.now(timezone.utc), onupdate=lambda: datetime.now(timezone.utc))
|
||||||
|
created_by = Column(String(100))
|
||||||
|
updated_by = Column(String(100))
|
||||||
|
|
||||||
|
__table_args__ = (
|
||||||
|
Index('ix_isms_scope_status', 'status'),
|
||||||
|
)
|
||||||
|
|
||||||
|
def __repr__(self):
|
||||||
|
return f"<ISMSScope v{self.version} ({self.status.value})>"
|
||||||
|
|
||||||
|
|
||||||
|
class ISMSContextDB(Base):
|
||||||
|
"""
|
||||||
|
ISMS Context (ISO 27001 Kapitel 4.1, 4.2)
|
||||||
|
|
||||||
|
Documents internal/external issues and interested parties.
|
||||||
|
"""
|
||||||
|
__tablename__ = 'compliance_isms_context'
|
||||||
|
|
||||||
|
id = Column(String(36), primary_key=True, default=lambda: str(uuid.uuid4()))
|
||||||
|
version = Column(String(20), nullable=False, default="1.0")
|
||||||
|
|
||||||
|
# 4.1 Internal issues
|
||||||
|
internal_issues = Column(JSON) # List of {"issue": "", "impact": "", "treatment": ""}
|
||||||
|
|
||||||
|
# 4.1 External issues
|
||||||
|
external_issues = Column(JSON) # List of {"issue": "", "impact": "", "treatment": ""}
|
||||||
|
|
||||||
|
# 4.2 Interested parties
|
||||||
|
interested_parties = Column(JSON) # List of {"party": "", "requirements": [], "relevance": ""}
|
||||||
|
|
||||||
|
# Legal/regulatory requirements
|
||||||
|
regulatory_requirements = Column(JSON) # DSGVO, AI Act, etc.
|
||||||
|
contractual_requirements = Column(JSON) # Customer contracts
|
||||||
|
|
||||||
|
# Analysis
|
||||||
|
swot_strengths = Column(JSON)
|
||||||
|
swot_weaknesses = Column(JSON)
|
||||||
|
swot_opportunities = Column(JSON)
|
||||||
|
swot_threats = Column(JSON)
|
||||||
|
|
||||||
|
# Approval
|
||||||
|
status = Column(Enum(ApprovalStatusEnum), default=ApprovalStatusEnum.DRAFT)
|
||||||
|
approved_by = Column(String(100))
|
||||||
|
approved_at = Column(DateTime)
|
||||||
|
|
||||||
|
# Review
|
||||||
|
last_reviewed_at = Column(DateTime)
|
||||||
|
next_review_date = Column(Date)
|
||||||
|
|
||||||
|
# Timestamps
|
||||||
|
created_at = Column(DateTime, default=lambda: datetime.now(timezone.utc))
|
||||||
|
updated_at = Column(DateTime, default=lambda: datetime.now(timezone.utc), onupdate=lambda: datetime.now(timezone.utc))
|
||||||
|
|
||||||
|
def __repr__(self):
|
||||||
|
return f"<ISMSContext v{self.version}>"
|
||||||
|
|
||||||
|
|
||||||
|
class ISMSPolicyDB(Base):
|
||||||
|
"""
|
||||||
|
ISMS Policies (ISO 27001 Kapitel 5.2)
|
||||||
|
|
||||||
|
Information security policy and sub-policies.
|
||||||
|
"""
|
||||||
|
__tablename__ = 'compliance_isms_policies'
|
||||||
|
|
||||||
|
id = Column(String(36), primary_key=True, default=lambda: str(uuid.uuid4()))
|
||||||
|
policy_id = Column(String(30), unique=True, nullable=False, index=True) # e.g., "POL-ISMS-001"
|
||||||
|
|
||||||
|
# Policy details
|
||||||
|
title = Column(String(200), nullable=False)
|
||||||
|
policy_type = Column(String(50), nullable=False) # "master", "operational", "technical"
|
||||||
|
description = Column(Text)
|
||||||
|
policy_text = Column(Text, nullable=False) # Full policy content
|
||||||
|
|
||||||
|
# Scope
|
||||||
|
applies_to = Column(JSON) # Roles, departments, systems
|
||||||
|
|
||||||
|
# Document control
|
||||||
|
version = Column(String(20), nullable=False, default="1.0")
|
||||||
|
status = Column(Enum(ApprovalStatusEnum), default=ApprovalStatusEnum.DRAFT)
|
||||||
|
|
||||||
|
# Approval chain
|
||||||
|
authored_by = Column(String(100))
|
||||||
|
reviewed_by = Column(String(100))
|
||||||
|
approved_by = Column(String(100)) # Must be top management
|
||||||
|
approved_at = Column(DateTime)
|
||||||
|
approval_signature = Column(String(64))
|
||||||
|
|
||||||
|
# Validity
|
||||||
|
effective_date = Column(Date)
|
||||||
|
review_frequency_months = Column(Integer, default=12)
|
||||||
|
next_review_date = Column(Date)
|
||||||
|
|
||||||
|
# References
|
||||||
|
parent_policy_id = Column(String(36), ForeignKey('compliance_isms_policies.id'))
|
||||||
|
related_controls = Column(JSON) # List of control_ids
|
||||||
|
|
||||||
|
# Document path
|
||||||
|
document_path = Column(String(500)) # Link to full document
|
||||||
|
|
||||||
|
# Timestamps
|
||||||
|
created_at = Column(DateTime, default=lambda: datetime.now(timezone.utc))
|
||||||
|
updated_at = Column(DateTime, default=lambda: datetime.now(timezone.utc), onupdate=lambda: datetime.now(timezone.utc))
|
||||||
|
|
||||||
|
__table_args__ = (
|
||||||
|
Index('ix_policy_type_status', 'policy_type', 'status'),
|
||||||
|
)
|
||||||
|
|
||||||
|
def __repr__(self):
|
||||||
|
return f"<ISMSPolicy {self.policy_id}: {self.title}>"
|
||||||
|
|
||||||
|
|
||||||
|
class SecurityObjectiveDB(Base):
|
||||||
|
"""
|
||||||
|
Security Objectives (ISO 27001 Kapitel 6.2)
|
||||||
|
|
||||||
|
Measurable information security objectives.
|
||||||
|
"""
|
||||||
|
__tablename__ = 'compliance_security_objectives'
|
||||||
|
|
||||||
|
id = Column(String(36), primary_key=True, default=lambda: str(uuid.uuid4()))
|
||||||
|
objective_id = Column(String(30), unique=True, nullable=False, index=True) # e.g., "OBJ-001"
|
||||||
|
|
||||||
|
# Objective definition
|
||||||
|
title = Column(String(200), nullable=False)
|
||||||
|
description = Column(Text)
|
||||||
|
category = Column(String(50)) # "availability", "confidentiality", "integrity", "compliance"
|
||||||
|
|
||||||
|
# SMART criteria
|
||||||
|
specific = Column(Text) # What exactly
|
||||||
|
measurable = Column(Text) # How measured
|
||||||
|
achievable = Column(Text) # Is it realistic
|
||||||
|
relevant = Column(Text) # Why important
|
||||||
|
time_bound = Column(Text) # Deadline
|
||||||
|
|
||||||
|
# Metrics
|
||||||
|
kpi_name = Column(String(100))
|
||||||
|
kpi_target = Column(String(100)) # Target value
|
||||||
|
kpi_current = Column(String(100)) # Current value
|
||||||
|
kpi_unit = Column(String(50)) # %, count, score
|
||||||
|
measurement_frequency = Column(String(50)) # monthly, quarterly
|
||||||
|
|
||||||
|
# Responsibility
|
||||||
|
owner = Column(String(100))
|
||||||
|
accountable = Column(String(100)) # RACI: Accountable
|
||||||
|
|
||||||
|
# Status
|
||||||
|
status = Column(String(30), default="active") # active, achieved, not_achieved, cancelled
|
||||||
|
progress_percentage = Column(Integer, default=0)
|
||||||
|
|
||||||
|
# Timeline
|
||||||
|
target_date = Column(Date)
|
||||||
|
achieved_date = Column(Date)
|
||||||
|
|
||||||
|
# Linked items
|
||||||
|
related_controls = Column(JSON)
|
||||||
|
related_risks = Column(JSON)
|
||||||
|
|
||||||
|
# Approval
|
||||||
|
approved_by = Column(String(100))
|
||||||
|
approved_at = Column(DateTime)
|
||||||
|
|
||||||
|
# Timestamps
|
||||||
|
created_at = Column(DateTime, default=lambda: datetime.now(timezone.utc))
|
||||||
|
updated_at = Column(DateTime, default=lambda: datetime.now(timezone.utc), onupdate=lambda: datetime.now(timezone.utc))
|
||||||
|
|
||||||
|
__table_args__ = (
|
||||||
|
Index('ix_objective_status', 'status'),
|
||||||
|
Index('ix_objective_category', 'category'),
|
||||||
|
)
|
||||||
|
|
||||||
|
def __repr__(self):
|
||||||
|
return f"<SecurityObjective {self.objective_id}: {self.title}>"
|
||||||
|
|
||||||
|
|
||||||
|
class StatementOfApplicabilityDB(Base):
|
||||||
|
"""
|
||||||
|
Statement of Applicability (SoA) - ISO 27001 Anhang A Mapping
|
||||||
|
|
||||||
|
Documents which Annex A controls are applicable and why.
|
||||||
|
This is MANDATORY for certification.
|
||||||
|
"""
|
||||||
|
__tablename__ = 'compliance_soa'
|
||||||
|
|
||||||
|
id = Column(String(36), primary_key=True, default=lambda: str(uuid.uuid4()))
|
||||||
|
|
||||||
|
# ISO 27001:2022 Annex A reference
|
||||||
|
annex_a_control = Column(String(20), nullable=False, index=True) # e.g., "A.5.1"
|
||||||
|
annex_a_title = Column(String(300), nullable=False)
|
||||||
|
annex_a_category = Column(String(100)) # "Organizational", "People", "Physical", "Technological"
|
||||||
|
|
||||||
|
# Applicability decision
|
||||||
|
is_applicable = Column(Boolean, nullable=False)
|
||||||
|
applicability_justification = Column(Text, nullable=False) # MUST be documented
|
||||||
|
|
||||||
|
# Implementation status
|
||||||
|
implementation_status = Column(String(30), default="planned") # planned, partial, implemented, not_implemented
|
||||||
|
implementation_notes = Column(Text)
|
||||||
|
|
||||||
|
# Mapping to our controls
|
||||||
|
breakpilot_control_ids = Column(JSON) # List of our control_ids that address this
|
||||||
|
coverage_level = Column(String(20), default="full") # full, partial, planned
|
||||||
|
|
||||||
|
# Evidence
|
||||||
|
evidence_description = Column(Text)
|
||||||
|
evidence_ids = Column(JSON) # Links to EvidenceDB
|
||||||
|
|
||||||
|
# Risk-based justification (for exclusions)
|
||||||
|
risk_assessment_notes = Column(Text) # If not applicable, explain why
|
||||||
|
compensating_controls = Column(Text) # If partial, explain compensating measures
|
||||||
|
|
||||||
|
# Approval
|
||||||
|
reviewed_by = Column(String(100))
|
||||||
|
reviewed_at = Column(DateTime)
|
||||||
|
approved_by = Column(String(100))
|
||||||
|
approved_at = Column(DateTime)
|
||||||
|
|
||||||
|
# Version tracking
|
||||||
|
version = Column(String(20), default="1.0")
|
||||||
|
|
||||||
|
# Timestamps
|
||||||
|
created_at = Column(DateTime, default=lambda: datetime.now(timezone.utc))
|
||||||
|
updated_at = Column(DateTime, default=lambda: datetime.now(timezone.utc), onupdate=lambda: datetime.now(timezone.utc))
|
||||||
|
|
||||||
|
__table_args__ = (
|
||||||
|
Index('ix_soa_annex_control', 'annex_a_control', unique=True),
|
||||||
|
Index('ix_soa_applicable', 'is_applicable'),
|
||||||
|
Index('ix_soa_status', 'implementation_status'),
|
||||||
|
)
|
||||||
|
|
||||||
|
def __repr__(self):
|
||||||
|
return f"<SoA {self.annex_a_control}: {'Applicable' if self.is_applicable else 'N/A'}>"
|
||||||
|
|
||||||
|
|
||||||
|
__all__ = [
|
||||||
|
"ApprovalStatusEnum",
|
||||||
|
"ISMSScopeDB",
|
||||||
|
"ISMSContextDB",
|
||||||
|
"ISMSPolicyDB",
|
||||||
|
"SecurityObjectiveDB",
|
||||||
|
"StatementOfApplicabilityDB",
|
||||||
|
]
|
||||||
File diff suppressed because it is too large
Load Diff
134
backend-compliance/compliance/db/regulation_models.py
Normal file
134
backend-compliance/compliance/db/regulation_models.py
Normal file
@@ -0,0 +1,134 @@
|
|||||||
|
"""
|
||||||
|
Regulation & Requirement models — extracted from compliance/db/models.py.
|
||||||
|
|
||||||
|
The foundational compliance aggregate: regulations (GDPR, AI Act, CRA, ...) and
|
||||||
|
the individual requirements they contain. Re-exported from
|
||||||
|
``compliance.db.models`` for backwards compatibility.
|
||||||
|
|
||||||
|
DO NOT change __tablename__, column names, or relationship strings.
|
||||||
|
"""
|
||||||
|
|
||||||
|
import uuid
|
||||||
|
import enum
|
||||||
|
from datetime import datetime, timezone
|
||||||
|
|
||||||
|
from sqlalchemy import (
|
||||||
|
Column, String, Text, Integer, Boolean, DateTime, Date,
|
||||||
|
ForeignKey, Enum, JSON, Index,
|
||||||
|
)
|
||||||
|
from sqlalchemy.orm import relationship
|
||||||
|
|
||||||
|
from classroom_engine.database import Base
|
||||||
|
|
||||||
|
|
||||||
|
# ============================================================================
|
||||||
|
# ENUMS
|
||||||
|
# ============================================================================
|
||||||
|
|
||||||
|
class RegulationTypeEnum(str, enum.Enum):
|
||||||
|
"""Type of regulation/standard."""
|
||||||
|
EU_REGULATION = "eu_regulation" # Directly applicable EU law
|
||||||
|
EU_DIRECTIVE = "eu_directive" # Requires national implementation
|
||||||
|
DE_LAW = "de_law" # German national law
|
||||||
|
BSI_STANDARD = "bsi_standard" # BSI technical guidelines
|
||||||
|
INDUSTRY_STANDARD = "industry_standard" # ISO, OWASP, etc.
|
||||||
|
|
||||||
|
|
||||||
|
# ============================================================================
|
||||||
|
# MODELS
|
||||||
|
# ============================================================================
|
||||||
|
|
||||||
|
class RegulationDB(Base):
|
||||||
|
"""
|
||||||
|
Represents a regulation, directive, or standard.
|
||||||
|
|
||||||
|
Examples: GDPR, AI Act, CRA, BSI-TR-03161
|
||||||
|
"""
|
||||||
|
__tablename__ = 'compliance_regulations'
|
||||||
|
|
||||||
|
id = Column(String(36), primary_key=True, default=lambda: str(uuid.uuid4()))
|
||||||
|
code = Column(String(20), unique=True, nullable=False, index=True) # e.g., "GDPR", "AIACT"
|
||||||
|
name = Column(String(200), nullable=False) # Short name
|
||||||
|
full_name = Column(Text) # Full official name
|
||||||
|
regulation_type = Column(Enum(RegulationTypeEnum), nullable=False)
|
||||||
|
source_url = Column(String(500)) # EUR-Lex URL or similar
|
||||||
|
local_pdf_path = Column(String(500)) # Local PDF if available
|
||||||
|
effective_date = Column(Date) # When it came into force
|
||||||
|
description = Column(Text) # Brief description
|
||||||
|
is_active = Column(Boolean, default=True)
|
||||||
|
|
||||||
|
# Timestamps
|
||||||
|
created_at = Column(DateTime, default=lambda: datetime.now(timezone.utc))
|
||||||
|
updated_at = Column(DateTime, default=lambda: datetime.now(timezone.utc), onupdate=lambda: datetime.now(timezone.utc))
|
||||||
|
|
||||||
|
# Relationships
|
||||||
|
requirements = relationship("RequirementDB", back_populates="regulation", cascade="all, delete-orphan")
|
||||||
|
|
||||||
|
def __repr__(self):
|
||||||
|
return f"<Regulation {self.code}: {self.name}>"
|
||||||
|
|
||||||
|
|
||||||
|
class RequirementDB(Base):
|
||||||
|
"""
|
||||||
|
Individual requirement from a regulation.
|
||||||
|
|
||||||
|
Examples: GDPR Art. 32(1)(a), AI Act Art. 9, BSI-TR O.Auth_1
|
||||||
|
"""
|
||||||
|
__tablename__ = 'compliance_requirements'
|
||||||
|
|
||||||
|
id = Column(String(36), primary_key=True, default=lambda: str(uuid.uuid4()))
|
||||||
|
regulation_id = Column(String(36), ForeignKey('compliance_regulations.id'), nullable=False, index=True)
|
||||||
|
|
||||||
|
# Requirement identification
|
||||||
|
article = Column(String(50), nullable=False) # e.g., "Art. 32", "O.Auth_1"
|
||||||
|
paragraph = Column(String(20)) # e.g., "(1)(a)"
|
||||||
|
requirement_id_external = Column(String(50)) # External ID (e.g., BSI ID)
|
||||||
|
title = Column(String(300), nullable=False) # Requirement title
|
||||||
|
description = Column(Text) # Brief description
|
||||||
|
requirement_text = Column(Text) # Original text from regulation
|
||||||
|
|
||||||
|
# Breakpilot-specific interpretation and implementation
|
||||||
|
breakpilot_interpretation = Column(Text) # How Breakpilot interprets this
|
||||||
|
implementation_status = Column(String(30), default="not_started") # not_started, in_progress, implemented, verified
|
||||||
|
implementation_details = Column(Text) # How we implemented it
|
||||||
|
code_references = Column(JSON) # List of {"file": "...", "line": ..., "description": "..."}
|
||||||
|
documentation_links = Column(JSON) # List of internal doc links
|
||||||
|
|
||||||
|
# Evidence for auditors
|
||||||
|
evidence_description = Column(Text) # What evidence proves compliance
|
||||||
|
evidence_artifacts = Column(JSON) # List of {"type": "...", "path": "...", "description": "..."}
|
||||||
|
|
||||||
|
# Audit-specific fields
|
||||||
|
auditor_notes = Column(Text) # Notes from auditor review
|
||||||
|
audit_status = Column(String(30), default="pending") # pending, in_review, approved, rejected
|
||||||
|
last_audit_date = Column(DateTime)
|
||||||
|
last_auditor = Column(String(100))
|
||||||
|
|
||||||
|
is_applicable = Column(Boolean, default=True) # Applicable to Breakpilot?
|
||||||
|
applicability_reason = Column(Text) # Why/why not applicable
|
||||||
|
|
||||||
|
priority = Column(Integer, default=2) # 1=Critical, 2=High, 3=Medium
|
||||||
|
|
||||||
|
# Source document reference
|
||||||
|
source_page = Column(Integer) # Page number in source document
|
||||||
|
source_section = Column(String(100)) # Section in source document
|
||||||
|
|
||||||
|
# Timestamps
|
||||||
|
created_at = Column(DateTime, default=lambda: datetime.now(timezone.utc))
|
||||||
|
updated_at = Column(DateTime, default=lambda: datetime.now(timezone.utc), onupdate=lambda: datetime.now(timezone.utc))
|
||||||
|
|
||||||
|
# Relationships
|
||||||
|
regulation = relationship("RegulationDB", back_populates="requirements")
|
||||||
|
control_mappings = relationship("ControlMappingDB", back_populates="requirement", cascade="all, delete-orphan")
|
||||||
|
|
||||||
|
__table_args__ = (
|
||||||
|
Index('ix_requirement_regulation_article', 'regulation_id', 'article'),
|
||||||
|
Index('ix_requirement_audit_status', 'audit_status'),
|
||||||
|
Index('ix_requirement_impl_status', 'implementation_status'),
|
||||||
|
)
|
||||||
|
|
||||||
|
def __repr__(self):
|
||||||
|
return f"<Requirement {self.article} {self.paragraph or ''}>"
|
||||||
|
|
||||||
|
|
||||||
|
__all__ = ["RegulationTypeEnum", "RegulationDB", "RequirementDB"]
|
||||||
176
backend-compliance/compliance/db/service_module_models.py
Normal file
176
backend-compliance/compliance/db/service_module_models.py
Normal file
@@ -0,0 +1,176 @@
|
|||||||
|
"""
|
||||||
|
Service Module Registry models — extracted from compliance/db/models.py.
|
||||||
|
|
||||||
|
Sprint 3: registry of all Breakpilot services/modules for compliance mapping,
|
||||||
|
per-module regulation applicability, and per-module risk aggregation.
|
||||||
|
Re-exported from ``compliance.db.models`` for backwards compatibility.
|
||||||
|
|
||||||
|
DO NOT change __tablename__, column names, or relationship strings.
|
||||||
|
"""
|
||||||
|
|
||||||
|
import uuid
|
||||||
|
import enum
|
||||||
|
from datetime import datetime, timezone
|
||||||
|
|
||||||
|
from sqlalchemy import (
|
||||||
|
Column, String, Text, Integer, Boolean, DateTime,
|
||||||
|
ForeignKey, Enum, JSON, Index, Float,
|
||||||
|
)
|
||||||
|
from sqlalchemy.orm import relationship
|
||||||
|
|
||||||
|
from classroom_engine.database import Base
|
||||||
|
# RiskLevelEnum is re-used across aggregates; sourced here from control_models.
|
||||||
|
from compliance.db.control_models import RiskLevelEnum # noqa: F401
|
||||||
|
|
||||||
|
|
||||||
|
# ============================================================================
|
||||||
|
# ENUMS
|
||||||
|
# ============================================================================
|
||||||
|
|
||||||
|
class ServiceTypeEnum(str, enum.Enum):
|
||||||
|
"""Type of Breakpilot service/module."""
|
||||||
|
BACKEND = "backend" # API/Backend services
|
||||||
|
DATABASE = "database" # Data storage
|
||||||
|
AI = "ai" # AI/ML services
|
||||||
|
COMMUNICATION = "communication" # Chat/Video/Messaging
|
||||||
|
STORAGE = "storage" # File/Object storage
|
||||||
|
INFRASTRUCTURE = "infrastructure" # Load balancer, reverse proxy
|
||||||
|
MONITORING = "monitoring" # Logging, metrics
|
||||||
|
SECURITY = "security" # Auth, encryption, secrets
|
||||||
|
|
||||||
|
|
||||||
|
class RelevanceLevelEnum(str, enum.Enum):
|
||||||
|
"""Relevance level of a regulation to a service."""
|
||||||
|
CRITICAL = "critical" # Non-compliance = shutdown
|
||||||
|
HIGH = "high" # Major risk
|
||||||
|
MEDIUM = "medium" # Moderate risk
|
||||||
|
LOW = "low" # Minor risk
|
||||||
|
|
||||||
|
|
||||||
|
# ============================================================================
|
||||||
|
# MODELS
|
||||||
|
# ============================================================================
|
||||||
|
|
||||||
|
class ServiceModuleDB(Base):
|
||||||
|
"""
|
||||||
|
Registry of all Breakpilot services/modules for compliance mapping.
|
||||||
|
|
||||||
|
Tracks which regulations apply to which services, enabling:
|
||||||
|
- Service-specific compliance views
|
||||||
|
- Aggregated risk per service
|
||||||
|
- Gap analysis by module
|
||||||
|
"""
|
||||||
|
__tablename__ = 'compliance_service_modules'
|
||||||
|
|
||||||
|
id = Column(String(36), primary_key=True, default=lambda: str(uuid.uuid4()))
|
||||||
|
name = Column(String(100), unique=True, nullable=False, index=True) # e.g., "consent-service"
|
||||||
|
display_name = Column(String(200), nullable=False) # e.g., "Go Consent Service"
|
||||||
|
description = Column(Text)
|
||||||
|
|
||||||
|
# Technical details
|
||||||
|
service_type = Column(Enum(ServiceTypeEnum), nullable=False)
|
||||||
|
port = Column(Integer) # Primary port (if applicable)
|
||||||
|
technology_stack = Column(JSON) # e.g., ["Go", "Gin", "PostgreSQL"]
|
||||||
|
repository_path = Column(String(500)) # e.g., "/consent-service"
|
||||||
|
docker_image = Column(String(200)) # e.g., "breakpilot-pwa-consent-service"
|
||||||
|
|
||||||
|
# Data categories handled
|
||||||
|
data_categories = Column(JSON) # e.g., ["personal_data", "consent_records"]
|
||||||
|
processes_pii = Column(Boolean, default=False) # Handles personally identifiable info?
|
||||||
|
processes_health_data = Column(Boolean, default=False) # Handles special category health data?
|
||||||
|
ai_components = Column(Boolean, default=False) # Contains AI/ML components?
|
||||||
|
|
||||||
|
# Status
|
||||||
|
is_active = Column(Boolean, default=True)
|
||||||
|
criticality = Column(String(20), default="medium") # "critical", "high", "medium", "low"
|
||||||
|
|
||||||
|
# Compliance aggregation
|
||||||
|
compliance_score = Column(Float) # Calculated score 0-100
|
||||||
|
last_compliance_check = Column(DateTime)
|
||||||
|
|
||||||
|
# Owner
|
||||||
|
owner_team = Column(String(100)) # e.g., "Backend Team"
|
||||||
|
owner_contact = Column(String(200)) # e.g., "backend@breakpilot.app"
|
||||||
|
|
||||||
|
# Timestamps
|
||||||
|
created_at = Column(DateTime, default=lambda: datetime.now(timezone.utc))
|
||||||
|
updated_at = Column(DateTime, default=lambda: datetime.now(timezone.utc), onupdate=lambda: datetime.now(timezone.utc))
|
||||||
|
|
||||||
|
# Relationships
|
||||||
|
regulation_mappings = relationship("ModuleRegulationMappingDB", back_populates="module", cascade="all, delete-orphan")
|
||||||
|
module_risks = relationship("ModuleRiskDB", back_populates="module", cascade="all, delete-orphan")
|
||||||
|
|
||||||
|
__table_args__ = (
|
||||||
|
Index('ix_module_type_active', 'service_type', 'is_active'),
|
||||||
|
)
|
||||||
|
|
||||||
|
def __repr__(self):
|
||||||
|
return f"<ServiceModule {self.name}: {self.display_name}>"
|
||||||
|
|
||||||
|
|
||||||
|
class ModuleRegulationMappingDB(Base):
|
||||||
|
"""
|
||||||
|
Maps services to applicable regulations with relevance level.
|
||||||
|
|
||||||
|
Enables filtering: "Show all GDPR requirements for consent-service"
|
||||||
|
"""
|
||||||
|
__tablename__ = 'compliance_module_regulations'
|
||||||
|
|
||||||
|
id = Column(String(36), primary_key=True, default=lambda: str(uuid.uuid4()))
|
||||||
|
module_id = Column(String(36), ForeignKey('compliance_service_modules.id'), nullable=False, index=True)
|
||||||
|
regulation_id = Column(String(36), ForeignKey('compliance_regulations.id'), nullable=False, index=True)
|
||||||
|
|
||||||
|
relevance_level = Column(Enum(RelevanceLevelEnum), nullable=False, default=RelevanceLevelEnum.MEDIUM)
|
||||||
|
notes = Column(Text) # Why this regulation applies
|
||||||
|
applicable_articles = Column(JSON) # List of specific articles that apply
|
||||||
|
|
||||||
|
# Timestamps
|
||||||
|
created_at = Column(DateTime, default=lambda: datetime.now(timezone.utc))
|
||||||
|
updated_at = Column(DateTime, default=lambda: datetime.now(timezone.utc), onupdate=lambda: datetime.now(timezone.utc))
|
||||||
|
|
||||||
|
# Relationships
|
||||||
|
module = relationship("ServiceModuleDB", back_populates="regulation_mappings")
|
||||||
|
regulation = relationship("RegulationDB")
|
||||||
|
|
||||||
|
__table_args__ = (
|
||||||
|
Index('ix_module_regulation', 'module_id', 'regulation_id', unique=True),
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
class ModuleRiskDB(Base):
|
||||||
|
"""
|
||||||
|
Service-specific risks aggregated from requirements and controls.
|
||||||
|
"""
|
||||||
|
__tablename__ = 'compliance_module_risks'
|
||||||
|
|
||||||
|
id = Column(String(36), primary_key=True, default=lambda: str(uuid.uuid4()))
|
||||||
|
module_id = Column(String(36), ForeignKey('compliance_service_modules.id'), nullable=False, index=True)
|
||||||
|
risk_id = Column(String(36), ForeignKey('compliance_risks.id'), nullable=False, index=True)
|
||||||
|
|
||||||
|
# Module-specific assessment
|
||||||
|
module_likelihood = Column(Integer) # 1-5, may differ from global
|
||||||
|
module_impact = Column(Integer) # 1-5, may differ from global
|
||||||
|
module_risk_level = Column(Enum(RiskLevelEnum))
|
||||||
|
|
||||||
|
assessment_notes = Column(Text) # Module-specific notes
|
||||||
|
|
||||||
|
# Timestamps
|
||||||
|
created_at = Column(DateTime, default=lambda: datetime.now(timezone.utc))
|
||||||
|
updated_at = Column(DateTime, default=lambda: datetime.now(timezone.utc), onupdate=lambda: datetime.now(timezone.utc))
|
||||||
|
|
||||||
|
# Relationships
|
||||||
|
module = relationship("ServiceModuleDB", back_populates="module_risks")
|
||||||
|
risk = relationship("RiskDB")
|
||||||
|
|
||||||
|
__table_args__ = (
|
||||||
|
Index('ix_module_risk', 'module_id', 'risk_id', unique=True),
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
__all__ = [
|
||||||
|
"ServiceTypeEnum",
|
||||||
|
"RelevanceLevelEnum",
|
||||||
|
"ServiceModuleDB",
|
||||||
|
"ModuleRegulationMappingDB",
|
||||||
|
"ModuleRiskDB",
|
||||||
|
]
|
||||||
Reference in New Issue
Block a user