Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
51 changes: 38 additions & 13 deletions compliance-practices/sprint_compliance_log.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# Sprint-by-Sprint Compliance Log

**Last Updated**: 2026-03-18
**Last Updated**: 2026-03-22
**Purpose**: Track what compliance-relevant measures were implemented in each sprint

---
Expand Down Expand Up @@ -112,17 +112,40 @@ Sprint 6 was the **compliance hardening sprint**. The CI pipeline gained three c

---

## Sprint 7: Intelligence Layer (Apr 1-14, 2026) — PLANNED
## Sprint 7: Intelligence Layer (Mar 14-18, 2026) — COMPLETE

### Compliance Measures Implemented

| Measure | Regulation | Description |
|---------|-----------|-------------|
| Compliance practices documentation | All | 7 documents in `compliance-practices/` covering DSGVO, CRA, EU AI Act |
| Recursive completeness audit | CRA Art. 13 | Task 7.29 PASSED — all code tested, documented, gap-free |
| Vision alignment check | CRA Art. 10(6) | Sprints 1-7 verified on-mission — no drift detected |
| Updated execution plan | CRA Art. 13 | Sprint 6 marked complete, Sprint 7 current, architecture updated |
| CHANGELOG update | CRA Art. 13 | v2026.03.1 release notes with all Sprint 7 features |
| 62 new tests (204 total) | CRA Annex I | Event clustering, burst detection, risk scoring, events API tests |
| Risk scoring interpretability | EU AI Act Art. 50 | 4-signal decomposition; analysts see which signals drive each risk score |

### Key Decision
Sprint 7 is the first sprint where all compliance measures were **documented before implementation** via this compliance-practices folder. This folder now serves as a reusable reference for any formal regulatory assessment.

---

## Sprint 8: Topic Mode & Supply Chain Security (Apr 15-28, 2026) — PLANNED

### Planned Compliance Measures

| Measure | Regulation | Description |
|---------|-----------|-------------|
| Compliance practices documentation | All | This folder — documenting all practices for reuse |
| Recursive completeness audit | CRA Art. 13 | Final sprint task verifies all code tested and documented |
| Vision alignment check | CRA Art. 10(6) | Verify project hasn't drifted from stated purpose |
| Updated execution plan | CRA Art. 13 | Documentation reflects current state |
| CHANGELOG update | CRA Art. 13 | Release notes for v1.7.0 |
| **SBOM generation in CI** | CRA Art. 13(15) | CycloneDX `sbom.json` generated on every push to main/development; formally satisfies SBOM requirement |
| **Dependency vulnerability scanning** | CRA Art. 10(4) | pip-audit in CI; blocks merge on HIGH/CRITICAL CVEs; exceptions require documented review |
| **User-facing AI disclosure panel** | EU AI Act Art. 50 | Persistent panel on every briefing view: names Gemini as AI model, instructs analyst review |
| **Topic Mode transparency** | EU AI Act Art. 50 | Divergence scores are deterministic and inspectable; methodology documented in DEVELOPER.md |
| **Compliance log update** | CRA Art. 13 | This document updated at sprint close |
| **≥18 new tests** | CRA Annex I | Topic pipeline, topic API, NetworkGraph coverage |

### Key Decision
Sprint 8 completes the CRA Art. 13(15) SBOM requirement that has been "SBOM-ready" since Sprint 6 (pinned requirements.txt). Generating the actual artifact closes the gap between readiness and compliance.

---

Expand All @@ -141,9 +164,11 @@ Sprint 5 ─── Operational Maturity (metrics, export, documentation)
Sprint 6 ─── CI Compliance Pipeline (secret scan, docs drift, branch policy, SECURITY.md)
Sprint 7 ─── Documentation & Audit (compliance practices, recursive verification)
Sprint 7 ─── Documentation & Audit (compliance practices, recursive verification) ✓ COMPLETE
Sprint 8 ─── SBOM artifact, vulnerability scanning, AI disclosure UI ← CURRENT
Sprint 8+ ── SBOM, auth, vulnerability scanning, formal assessment
Sprint 9+ ── User auth, formal assessment, CDDBS-Edge governance artifacts
```

---
Expand All @@ -152,10 +177,10 @@ Sprint 8+ ── SBOM, auth, vulnerability scanning, formal assessment

| Metric | Value |
|--------|-------|
| Sprints with compliance measures | 7/7 (100%) |
| Automated CI compliance checks | 4 (secret scan, docs drift, branch policy, linting) |
| Test count | ~197 (and growing) |
| Documentation pages | 10+ production docs, 12+ sprint docs, 5 blog posts, 7 compliance docs |
| Sprints with compliance measures | 8/8 (100%) |
| Automated CI compliance checks | 4 now, 6 planned (+ SBOM, pip-audit in Sprint 8) |
| Test count | 204 (Sprint 7 complete) |
| Documentation pages | 10+ production docs, 14+ sprint docs, 5 blog posts, 7 compliance docs |
| Security-specific files | SECURITY.md, CODEOWNERS, detect_secrets.py, secret-scan.yml |
| DSGVO measures | 6 (BYOK, minimization, purpose limitation, no tracking, secret protection, webhook signing) |
| CRA measures | 8 (secret scan, docs drift, branch policy, SBOM-ready, SECURITY.md, documentation, version tags, change control) |
Expand Down
68 changes: 40 additions & 28 deletions docs/cddbs_execution_plan.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
**Project**: Cyber Disinformation Detection Briefing System (CDDBS)
**Start Date**: February 3, 2026
**Delivery Model**: 2-week sprints
**Last Updated**: 2026-03-18
**Last Updated**: 2026-03-22

---

Expand Down Expand Up @@ -90,35 +90,41 @@ CDDBS is a system for analyzing media outlets and social media accounts for pote
- **Compliance**: Major compliance sprint — secret scanning CI, docs drift detection, branch policy, SECURITY.md, CODEOWNERS
- See [docs/sprint_6_backlog.md](sprint_6_backlog.md) for details

### Sprint 7: Intelligence Layer & Compliance Hardening (Apr 1-14, 2026) — CURRENT
**Target**: v1.7.0 | **Status**: Planning
### Sprint 7: Intelligence Layer & Compliance Hardening (Mar 14-18, 2026) — COMPLETE
**Target**: v1.7.0 | **Status**: Done

- TF-IDF event clustering pipeline (agglomerative clustering)
- Z-score burst detection on keyword frequency
- TF-IDF event clustering pipeline (agglomerative clustering, distance_threshold=0.6)
- Z-score burst detection (24h baseline, 1h window, threshold=3.0)
- Narrative risk scoring (4-signal composite: source concentration, burst magnitude, timing sync, narrative match)
- `/events` API endpoints (list, detail, map, bursts)
- Frontend: EventClusterPanel, BurstTimeline, EventDetailDialog
- Enhanced GlobalMap with event cluster markers
- Compliance practices documentation (DSGVO, CRA, EU AI Act)
- Recursive completeness audit (verify all Sprint 7 work implemented, tested, documented)
- Vision alignment check (Sprints 1-7 against project mission)
- Frontend: EventClusterPanel, BurstTimeline, EventDetailDialog, enhanced GlobalMap
- Compliance practices documentation (7 documents: DSGVO, CRA, EU AI Act)
- Recursive completeness audit PASSED — 204 tests, all CI green
- **Compliance**: Full compliance documentation folder, recursive audit, vision alignment verification
- See [docs/sprint_7_backlog.md](sprint_7_backlog.md) for details
- See [docs/sprint_7_backlog.md](sprint_7_backlog.md) | [retrospectives/sprint_7.md](../retrospectives/sprint_7.md)

### Sprint 8: Collaborative Features & SBOM (Apr-May 2026)
- User authentication and authorization
### Sprint 8: Topic Mode & Supply Chain Security (Apr 15-28, 2026) — CURRENT
**Target**: v1.8.0 | **Status**: Planning

- **Topic Mode**: Topic-centric multi-outlet comparative analysis (divergence scoring, amplification detection, outlet ranking)
- **NetworkGraph.tsx**: Outlet relationship graph — carried from Sprint 5→6→7
- **SBOM generation in CI**: CycloneDX format on every release build
- **Dependency vulnerability scanning**: pip-audit in CI, blocks on HIGH/CRITICAL CVEs
- **User-facing AI disclosure panel**: EU AI Act Art. 50 compliance at UI layer
- **Compliance**: SBOM artifact, vulnerability scanning, AI disclosure, compliance log update
- See [docs/sprint_8_backlog.md](sprint_8_backlog.md) for details

### Sprint 9: User Authentication & Collaboration (May-Jun 2026)
- User authentication and authorization (JWT, role model)
- Shared analysis workspaces
- Analyst annotations and comments on briefings
- Formal SBOM generation in CI (CycloneDX/SPDX)
- Automated dependency vulnerability scanning
- User-facing AI disclosure in frontend UI
- CDDBS-Edge Phase 0: Swap Gemini → Ollama, benchmark briefing quality

### Sprints 9-12: Advanced Features (May-Jul 2026)
### Sprints 10-12: Advanced Features (Jun-Aug 2026)
- Machine learning model fine-tuning
- Automated monitoring schedules
- API for third-party integration
- Multi-language support
- NetworkGraph.tsx production implementation
- Currents API collector integration

---
Expand Down Expand Up @@ -167,12 +173,17 @@ Demonstrates resilience, digital sovereignty, access equity, and privacy-preserv
- Batch analysis and export (JSON/CSV/PDF)
- Operational metrics and trend endpoints

### Target Architecture (v1.7.0+)
- Event clustering and burst detection (Sprint 7)
- Narrative risk scoring composite (Sprint 7)
- Events API and frontend visualization (Sprint 7)
- User authentication (Sprint 8)
- SBOM and vulnerability scanning (Sprint 8)
### Achieved Architecture (v1.7.0)
- Event clustering and burst detection (TF-IDF agglomerative + z-score)
- Narrative risk scoring composite (4-signal: source_concentration, burst_magnitude, timing_sync, narrative_match)
- Events API and frontend visualization (EventClusterPanel, BurstTimeline, GlobalMap overlay)
- 204 tests, 3 CI workflows, 7 compliance documents

### Target Architecture (v1.8.0+)
- Topic Mode: topic-centric outlet discovery and divergence scoring (Sprint 8)
- Outlet relationship NetworkGraph (Sprint 8)
- SBOM generation and dependency vulnerability scanning in CI (Sprint 8)
- User authentication and shared workspaces (Sprint 9)

---

Expand All @@ -198,7 +209,7 @@ Production code flows through the `development` branch as a staging/integration

---

## Vision Alignment Check (as of Sprint 7 Planning)
## Vision Alignment Check (as of Sprint 8 Planning)

| Sprint | Contribution to Vision | On Track? |
|--------|----------------------|-----------|
Expand All @@ -208,13 +219,14 @@ Production code flows through the `development` branch as a staging/integration
| 4 | Production integration — making research usable | Yes |
| 5 | Operational maturity — production-grade features | Yes |
| 6 | Event intelligence — proactive monitoring capability | Yes |
| 7 | Intelligence layer — automated event detection | Yes |
| 7 | Intelligence layer — automated event detection | Yes ✓ |
| 8 | Topic Mode — proactive outlet discovery by narrative divergence | Yes |

**Drift assessment**: No significant drift from project vision. All sprints serve the core mission of "analyzing media outlets and social media accounts for potential disinformation activity." The addition of event intelligence (Sprints 6-7) expands the system from reactive (analyst-initiated analysis) to proactive (automated event detection), which is a natural evolution of the core mission.
**Drift assessment**: No significant drift from project vision. All sprints serve the core mission of "analyzing media outlets and social media accounts for potential disinformation activity." Sprint 8's Topic Mode is a direct expression of the mission: given a topic, automatically discover which outlets diverge from neutral coverage — operationally more powerful than waiting for an analyst to know which outlet to analyze.

**Potential drift risks**:
- CDDBS-Edge is a parallel track that could divert focus — mitigated by keeping it separate and experiment-phase only
- Collaborative features (Sprint 8) could drift toward general-purpose workspace — must stay focused on analyst collaboration for disinformation analysis
- Collaborative features (Sprint 9) could drift toward general-purpose workspace — must stay focused on analyst collaboration for disinformation analysis
- Compliance documentation is valuable but must not become the primary focus — it supports engineering quality, not the other way around

---
Expand Down
Loading
Loading