feat(rag): Applicability Notes UI + Branchen-Review
- Matrix-Zeilen aufklappbar: Klick zeigt Branchenrelevanz-Erklaerung, Beschreibung und Gueltigkeitsdatum - 27 Branchen-Zuordnungen korrigiert: - OWASP/NIST/CISA/SBOM-Standards → alle (Kunden entwickeln Software) - BSI-TR-03161 → leer (DiGA, nicht Zielmarkt) - BSI 200-4, ENISA Supply Chain → alle (CRA/NIS2-Pflicht) - EAA/BFSG → +automotive (digitale Interfaces) - 264 horizontal, 42 sektorspezifisch, 14 nicht zutreffend Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
This commit is contained in:
@@ -484,13 +484,14 @@
|
||||
"industries": [
|
||||
"handel",
|
||||
"konsumgueter",
|
||||
"elektrotechnik"
|
||||
"elektrotechnik",
|
||||
"automotive"
|
||||
],
|
||||
"in_rag": true,
|
||||
"rag_collection": "bp_compliance_ce",
|
||||
"effective_date": "28. Juni 2025",
|
||||
"sort_order": 4,
|
||||
"applicability_note": "Sektorspezifisch: Handel, Konsumgueter, Elektrotechnik. Barrierefreiheitsanforderungen fuer Produkte und digitale Dienstleistungen."
|
||||
"applicability_note": "Sektorspezifisch: Handel, Konsumgueter, Elektrotechnik, Automotive. Barrierefreiheitsanforderungen fuer Produkte und Dienstleistungen mit digitalen Schnittstellen."
|
||||
},
|
||||
{
|
||||
"code": "E_COMMERCE_RL",
|
||||
@@ -837,11 +838,13 @@
|
||||
"industries": [
|
||||
"handel",
|
||||
"konsumgueter",
|
||||
"elektrotechnik"
|
||||
"elektrotechnik",
|
||||
"automotive"
|
||||
],
|
||||
"in_rag": true,
|
||||
"rag_collection": "bp_compliance_gesetze",
|
||||
"sort_order": 7
|
||||
"sort_order": 7,
|
||||
"applicability_note": "Sektorspezifisch: Handel, Konsumgueter, Elektrotechnik, Automotive. Deutsches Umsetzungsgesetz des EAA — betrifft Produkte mit digitalen Interfaces."
|
||||
},
|
||||
{
|
||||
"code": "DE_BGB_AGB",
|
||||
@@ -1767,13 +1770,12 @@
|
||||
"full_name": "BSI Standard 200-4 Business Continuity Management",
|
||||
"doc_type": "bsi_standard",
|
||||
"industries": [
|
||||
"energie",
|
||||
"transport",
|
||||
"chemie"
|
||||
"all"
|
||||
],
|
||||
"in_rag": true,
|
||||
"rag_collection": "bp_compliance_gesetze",
|
||||
"sort_order": 1
|
||||
"sort_order": 1,
|
||||
"applicability_note": "Gilt fuer alle Branchen. Business Continuity Management ist fuer jedes produzierende Unternehmen relevant."
|
||||
},
|
||||
{
|
||||
"code": "BSI-TR-03161-1",
|
||||
@@ -1781,14 +1783,12 @@
|
||||
"full_name": "BSI TR-03161 Teil 1 — Sicherheitsanforderungen DiGA — Mobile Anwendungen",
|
||||
"doc_type": "bsi_standard",
|
||||
"description": "Deutsche Technische Richtlinie fuer die Sicherheit mobiler Gesundheits-Apps (DiGA). Definiert Pruefverfahren und Sicherheitsanforderungen fuer die DiGA-Zulassung.",
|
||||
"industries": [
|
||||
"elektrotechnik"
|
||||
],
|
||||
"industries": [],
|
||||
"in_rag": true,
|
||||
"rag_collection": "bp_compliance_gesetze",
|
||||
"effective_date": "Version 1.0: 2020",
|
||||
"sort_order": 2,
|
||||
"applicability_note": "Sektorspezifisch: Elektrotechnik. Sicherheitsanforderungen fuer mobile Anwendungen anwendbar auf App-Entwicklung in der Digitalindustrie."
|
||||
"applicability_note": "Nicht zutreffend fuer produzierende Industrie. Spezifisch fuer Digitale Gesundheitsanwendungen (DiGA)."
|
||||
},
|
||||
{
|
||||
"code": "BSI-TR-03161-2",
|
||||
@@ -1796,14 +1796,12 @@
|
||||
"full_name": "BSI TR-03161 Teil 2 — Sicherheitsanforderungen DiGA — Web-Anwendungen",
|
||||
"doc_type": "bsi_standard",
|
||||
"description": "Technische Richtlinie fuer die Sicherheit von Web-Anwendungen im Gesundheitswesen.",
|
||||
"industries": [
|
||||
"elektrotechnik"
|
||||
],
|
||||
"industries": [],
|
||||
"in_rag": true,
|
||||
"rag_collection": "bp_compliance_gesetze",
|
||||
"effective_date": "Version 1.0: 2020",
|
||||
"sort_order": 3,
|
||||
"applicability_note": "Sektorspezifisch: Elektrotechnik. Sicherheitsanforderungen fuer Web-Anwendungen anwendbar auf die Digitalindustrie."
|
||||
"applicability_note": "Nicht zutreffend fuer produzierende Industrie. Spezifisch fuer Digitale Gesundheitsanwendungen (DiGA)."
|
||||
},
|
||||
{
|
||||
"code": "BSI-TR-03161-3",
|
||||
@@ -1811,14 +1809,12 @@
|
||||
"full_name": "BSI TR-03161 Teil 3 — Sicherheitsanforderungen DiGA — Hintergrundsysteme",
|
||||
"doc_type": "bsi_standard",
|
||||
"description": "Technische Richtlinie fuer Backend-Systeme von Gesundheitsanwendungen. Deckt Server, APIs, Datenbanken und Cloud-Infrastruktur ab.",
|
||||
"industries": [
|
||||
"elektrotechnik"
|
||||
],
|
||||
"industries": [],
|
||||
"in_rag": true,
|
||||
"rag_collection": "bp_compliance_gesetze",
|
||||
"effective_date": "Version 1.0: 2020",
|
||||
"sort_order": 4,
|
||||
"applicability_note": "Sektorspezifisch: Elektrotechnik. Sicherheitsanforderungen fuer Backend-Systeme anwendbar auf die Digitalindustrie."
|
||||
"applicability_note": "Nicht zutreffend fuer produzierende Industrie. Spezifisch fuer Digitale Gesundheitsanwendungen (DiGA)."
|
||||
},
|
||||
{
|
||||
"code": "EDPB_ACCESS_01_2022",
|
||||
@@ -3525,15 +3521,13 @@
|
||||
"doc_type": "nist_standard",
|
||||
"description": "NIST-Framework fuer sichere Softwareentwicklung. Definiert Praktiken und Aufgaben in vier Gruppen: Prepare, Protect, Produce, Respond.",
|
||||
"industries": [
|
||||
"automotive",
|
||||
"maschinenbau",
|
||||
"elektrotechnik"
|
||||
"all"
|
||||
],
|
||||
"in_rag": true,
|
||||
"rag_collection": "bp_compliance_ce",
|
||||
"effective_date": "3. Februar 2022",
|
||||
"sort_order": 3,
|
||||
"applicability_note": "Sektorspezifisch: Automotive, Maschinenbau, Elektrotechnik. Framework fuer sichere Softwareentwicklung relevant fuer Unternehmen mit Software-Produkten."
|
||||
"applicability_note": "Gilt fuer alle Branchen. Jedes Unternehmen das Software entwickelt — ob Maschinensteuerung, Fahrzeug-Firmware oder Kunden-Portal."
|
||||
},
|
||||
{
|
||||
"code": "NISTIR_8259A",
|
||||
@@ -3541,13 +3535,12 @@
|
||||
"full_name": "NISTIR 8259A — IoT Device Cybersecurity Capability Core Baseline",
|
||||
"doc_type": "nist_standard",
|
||||
"industries": [
|
||||
"elektrotechnik",
|
||||
"maschinenbau",
|
||||
"automotive"
|
||||
"all"
|
||||
],
|
||||
"in_rag": true,
|
||||
"rag_collection": "bp_compliance_datenschutz",
|
||||
"sort_order": 4
|
||||
"sort_order": 4,
|
||||
"applicability_note": "Gilt fuer alle Branchen. IoT-Sicherheitsbaseline fuer jeden Hersteller vernetzter Geraete."
|
||||
},
|
||||
{
|
||||
"code": "NIST_AI_RMF",
|
||||
@@ -3603,13 +3596,17 @@
|
||||
"full_name": "NIST SP 800-82 Rev. 3 — Guide to OT Security",
|
||||
"doc_type": "nist_standard",
|
||||
"industries": [
|
||||
"energie",
|
||||
"maschinenbau",
|
||||
"chemie"
|
||||
"automotive",
|
||||
"elektrotechnik",
|
||||
"chemie",
|
||||
"energie",
|
||||
"metall"
|
||||
],
|
||||
"in_rag": true,
|
||||
"rag_collection": "bp_compliance_ce",
|
||||
"sort_order": 9
|
||||
"sort_order": 9,
|
||||
"applicability_note": "Sektorspezifisch: Branchen mit Operational Technology (OT) — Maschinenbau, Automotive, Elektrotechnik, Chemie, Energie, Metall."
|
||||
},
|
||||
{
|
||||
"code": "NIST_SP_800_160",
|
||||
@@ -3629,13 +3626,12 @@
|
||||
"full_name": "NIST SP 800-207 — Zero Trust Architecture",
|
||||
"doc_type": "nist_standard",
|
||||
"industries": [
|
||||
"energie",
|
||||
"maschinenbau",
|
||||
"chemie"
|
||||
"all"
|
||||
],
|
||||
"in_rag": true,
|
||||
"rag_collection": "bp_compliance_datenschutz",
|
||||
"sort_order": 11
|
||||
"sort_order": 11,
|
||||
"applicability_note": "Gilt fuer alle Branchen. Zero-Trust-Architektur als Sicherheitskonzept fuer alle Unternehmensnetzwerke."
|
||||
},
|
||||
{
|
||||
"code": "OWASP_TOP10_2021",
|
||||
@@ -3643,13 +3639,12 @@
|
||||
"full_name": "OWASP Top 10 (2021)",
|
||||
"doc_type": "owasp_standard",
|
||||
"industries": [
|
||||
"automotive",
|
||||
"maschinenbau",
|
||||
"elektrotechnik"
|
||||
"all"
|
||||
],
|
||||
"in_rag": true,
|
||||
"rag_collection": "bp_compliance_datenschutz",
|
||||
"sort_order": 1
|
||||
"sort_order": 1,
|
||||
"applicability_note": "Gilt fuer alle Branchen. Jedes Unternehmen das Webanwendungen oder SaaS-Produkte betreibt muss die OWASP Top 10 beachten."
|
||||
},
|
||||
{
|
||||
"code": "OWASP_API_SECURITY_2023",
|
||||
@@ -3657,9 +3652,7 @@
|
||||
"full_name": "OWASP API Security Top 10 (2023)",
|
||||
"doc_type": "owasp_standard",
|
||||
"industries": [
|
||||
"automotive",
|
||||
"maschinenbau",
|
||||
"elektrotechnik"
|
||||
"all"
|
||||
],
|
||||
"in_rag": true,
|
||||
"rag_collection": "bp_compliance_datenschutz",
|
||||
@@ -3671,9 +3664,7 @@
|
||||
"full_name": "OWASP Application Security Verification Standard (ASVS)",
|
||||
"doc_type": "owasp_standard",
|
||||
"industries": [
|
||||
"automotive",
|
||||
"maschinenbau",
|
||||
"elektrotechnik"
|
||||
"all"
|
||||
],
|
||||
"in_rag": true,
|
||||
"rag_collection": "bp_compliance_datenschutz",
|
||||
@@ -3685,9 +3676,7 @@
|
||||
"full_name": "OWASP Mobile Application Security Verification Standard (MASVS)",
|
||||
"doc_type": "owasp_standard",
|
||||
"industries": [
|
||||
"automotive",
|
||||
"maschinenbau",
|
||||
"elektrotechnik"
|
||||
"all"
|
||||
],
|
||||
"in_rag": true,
|
||||
"rag_collection": "bp_compliance_datenschutz",
|
||||
@@ -3699,9 +3688,7 @@
|
||||
"full_name": "OWASP Mobile Top 10",
|
||||
"doc_type": "owasp_standard",
|
||||
"industries": [
|
||||
"automotive",
|
||||
"maschinenbau",
|
||||
"elektrotechnik"
|
||||
"all"
|
||||
],
|
||||
"in_rag": true,
|
||||
"rag_collection": "bp_compliance_datenschutz",
|
||||
@@ -3713,9 +3700,7 @@
|
||||
"full_name": "OWASP Software Assurance Maturity Model (SAMM)",
|
||||
"doc_type": "owasp_standard",
|
||||
"industries": [
|
||||
"automotive",
|
||||
"maschinenbau",
|
||||
"elektrotechnik"
|
||||
"all"
|
||||
],
|
||||
"in_rag": true,
|
||||
"rag_collection": "bp_compliance_datenschutz",
|
||||
@@ -3727,13 +3712,12 @@
|
||||
"full_name": "CISA Secure by Design — Principles and Approaches",
|
||||
"doc_type": "enisa_guidance",
|
||||
"industries": [
|
||||
"automotive",
|
||||
"maschinenbau",
|
||||
"elektrotechnik"
|
||||
"all"
|
||||
],
|
||||
"in_rag": true,
|
||||
"rag_collection": "bp_compliance_ce",
|
||||
"sort_order": 1
|
||||
"sort_order": 1,
|
||||
"applicability_note": "Gilt fuer alle Branchen. Secure-by-Design-Prinzipien betreffen jeden Hersteller von Produkten mit digitalen Elementen."
|
||||
},
|
||||
{
|
||||
"code": "ENISA_ICS_SCADA",
|
||||
@@ -3741,14 +3725,17 @@
|
||||
"full_name": "ENISA ICS/SCADA Kommunikationsnetzwerk-Abhaengigkeiten",
|
||||
"doc_type": "enisa_guidance",
|
||||
"industries": [
|
||||
"energie",
|
||||
"transport",
|
||||
"maschinenbau",
|
||||
"elektrotechnik"
|
||||
"elektrotechnik",
|
||||
"automotive",
|
||||
"chemie",
|
||||
"energie",
|
||||
"transport"
|
||||
],
|
||||
"in_rag": true,
|
||||
"rag_collection": "bp_compliance_ce",
|
||||
"sort_order": 2
|
||||
"sort_order": 2,
|
||||
"applicability_note": "Sektorspezifisch: Alle Branchen mit industrieller Steuerungstechnik — Maschinenbau, Elektrotechnik, Automotive, Chemie, Energie, Transport."
|
||||
},
|
||||
{
|
||||
"code": "ENISA_SUPPLY_CHAIN",
|
||||
@@ -3757,16 +3744,13 @@
|
||||
"doc_type": "enisa_guidance",
|
||||
"description": "ENISA-Analyse der Bedrohungslandschaft fuer Supply-Chain-Angriffe. Beschreibt Angriffsvektoren, Taxonomie und Empfehlungen zur Absicherung von Software-Lieferketten.",
|
||||
"industries": [
|
||||
"energie",
|
||||
"transport",
|
||||
"maschinenbau",
|
||||
"elektrotechnik"
|
||||
"all"
|
||||
],
|
||||
"in_rag": true,
|
||||
"rag_collection": "bp_compliance_ce",
|
||||
"effective_date": "2021",
|
||||
"sort_order": 3,
|
||||
"applicability_note": "Sektorspezifisch: Energie, Transport, Maschinenbau, Elektrotechnik. ENISA-Empfehlungen zur Absicherung von Software-Lieferketten."
|
||||
"applicability_note": "Gilt fuer alle Branchen. Lieferkettensicherheit ist im Rahmen von CRA und NIS2 fuer alle Hersteller relevant."
|
||||
},
|
||||
{
|
||||
"code": "ENISA_THREAT_LANDSCAPE",
|
||||
@@ -3774,10 +3758,7 @@
|
||||
"full_name": "ENISA Threat Landscape fuer Supply Chain Attacks",
|
||||
"doc_type": "enisa_guidance",
|
||||
"industries": [
|
||||
"energie",
|
||||
"transport",
|
||||
"maschinenbau",
|
||||
"elektrotechnik"
|
||||
"all"
|
||||
],
|
||||
"in_rag": true,
|
||||
"rag_collection": "bp_compliance_ce",
|
||||
@@ -3789,10 +3770,7 @@
|
||||
"full_name": "ENISA Bericht zum Stand der Cybersicherheit in der EU 2024",
|
||||
"doc_type": "enisa_guidance",
|
||||
"industries": [
|
||||
"energie",
|
||||
"transport",
|
||||
"maschinenbau",
|
||||
"elektrotechnik"
|
||||
"all"
|
||||
],
|
||||
"in_rag": true,
|
||||
"rag_collection": "bp_compliance_ce",
|
||||
@@ -3804,13 +3782,12 @@
|
||||
"full_name": "CVSS v4.0 — Common Vulnerability Scoring System",
|
||||
"doc_type": "international",
|
||||
"industries": [
|
||||
"automotive",
|
||||
"maschinenbau",
|
||||
"elektrotechnik"
|
||||
"all"
|
||||
],
|
||||
"in_rag": true,
|
||||
"rag_collection": "bp_compliance_ce",
|
||||
"sort_order": 1
|
||||
"sort_order": 1,
|
||||
"applicability_note": "Gilt fuer alle Branchen. Schwachstellenbewertung ist Pflicht im Rahmen des CRA fuer alle Hersteller vernetzter Produkte."
|
||||
},
|
||||
{
|
||||
"code": "CYCLONEDX_1_6",
|
||||
@@ -3818,13 +3795,12 @@
|
||||
"full_name": "CycloneDX 1.6 — SBOM Standard (ECMA-424)",
|
||||
"doc_type": "international",
|
||||
"industries": [
|
||||
"automotive",
|
||||
"maschinenbau",
|
||||
"elektrotechnik"
|
||||
"all"
|
||||
],
|
||||
"in_rag": true,
|
||||
"rag_collection": "bp_compliance_ce",
|
||||
"sort_order": 2
|
||||
"sort_order": 2,
|
||||
"applicability_note": "Gilt fuer alle Branchen. SBOM-Standard — der CRA verlangt von allen Herstellern eine Software-Stueckliste."
|
||||
},
|
||||
{
|
||||
"code": "FDA_HFE",
|
||||
@@ -3858,8 +3834,7 @@
|
||||
"full_name": "OpenTelemetry Specification — Observability Framework",
|
||||
"doc_type": "international",
|
||||
"industries": [
|
||||
"elektrotechnik",
|
||||
"automotive"
|
||||
"all"
|
||||
],
|
||||
"in_rag": true,
|
||||
"rag_collection": "bp_compliance_ce",
|
||||
@@ -3871,13 +3846,12 @@
|
||||
"full_name": "SLSA v1.0 — Supply-chain Levels for Software Artifacts",
|
||||
"doc_type": "international",
|
||||
"industries": [
|
||||
"automotive",
|
||||
"maschinenbau",
|
||||
"elektrotechnik"
|
||||
"all"
|
||||
],
|
||||
"in_rag": true,
|
||||
"rag_collection": "bp_compliance_ce",
|
||||
"sort_order": 6
|
||||
"sort_order": 6,
|
||||
"applicability_note": "Gilt fuer alle Branchen. Supply-Chain-Integritaet fuer alle Unternehmen die Software bauen und ausliefern."
|
||||
},
|
||||
{
|
||||
"code": "SPDX_3",
|
||||
@@ -3885,13 +3859,12 @@
|
||||
"full_name": "SPDX 3.0.1 — Software Package Data Exchange",
|
||||
"doc_type": "international",
|
||||
"industries": [
|
||||
"automotive",
|
||||
"maschinenbau",
|
||||
"elektrotechnik"
|
||||
"all"
|
||||
],
|
||||
"in_rag": true,
|
||||
"rag_collection": "bp_compliance_ce",
|
||||
"sort_order": 7
|
||||
"sort_order": 7,
|
||||
"applicability_note": "Gilt fuer alle Branchen. SBOM-Standard fuer Software-Lizenz- und Abhaengigkeitsdokumentation."
|
||||
},
|
||||
{
|
||||
"code": "BFDI_VVT",
|
||||
@@ -4347,16 +4320,13 @@
|
||||
"doc_type": "enisa_guidance",
|
||||
"description": "ENISA-Leitfaden fuer sichere Softwareentwicklung. Beschreibt Best Practices fuer Security by Design, sichere Entwicklungsprozesse und Schwachstellenmanagement.",
|
||||
"industries": [
|
||||
"energie",
|
||||
"transport",
|
||||
"maschinenbau",
|
||||
"elektrotechnik"
|
||||
"all"
|
||||
],
|
||||
"in_rag": true,
|
||||
"rag_collection": "bp_compliance_ce",
|
||||
"effective_date": "2023",
|
||||
"sort_order": 6,
|
||||
"applicability_note": "Sektorspezifisch: Energie, Transport, Maschinenbau, Elektrotechnik. ENISA-Leitfaden fuer sichere Softwareentwicklung."
|
||||
"applicability_note": "Gilt fuer alle Branchen. Sichere Softwareentwicklung betrifft jeden Hersteller digitaler Produkte."
|
||||
}
|
||||
]
|
||||
}
|
||||
Reference in New Issue
Block a user