风险准备就绪 - 开源 GRC 平台,带有 MCP 网关和人工批准的变更。
RiskReady-open-source GRC platform with MCP gateway and human-approved mutations

原始链接: https://github.com/riskreadyeu/riskready-community

## RiskReady 社区:AI 驱动的 GRC 平台概要 RiskReady 是一个开源的 GRC(治理、风险和合规)平台,利用 AI 来简化安全评估和合规任务。它通过 254 个集成工具连接到一个合规数据库,涵盖风险、控制、策略、事件等。 该平台利用一个由专业代理(风险分析师、审计员等)组成的“AI 委员会”来分析查询并生成报告,始终需要人工审查和批准*之后*才能进行任何数据库更改。这确保了安全性和控制。 **主要特点:** * **模块:** 涵盖风险管理、控制、策略、事件、审计、证据、ITSM 和组织治理。 * **连接模式:** 提供 Web 应用、MCP 代理(推荐给团队,利用用户自己的 Claude 订阅)和直接模式。 * **安全性:** 采用 8 点代理安全审计,包括身份控制、内存管理和输出验证。 * **演示数据:** 预先填充了虚构金融科技公司(ClearStream Payments Ltd)的数据,以便立即探索(登录:[email protected] / password123)。 **部署:** 需要 Docker 24+,并可以使用 `docker compose up -d` 轻松部署。它采用 AGPL-3.0 许可,并积极鼓励贡献。

对不起。
相关文章

原文
git clone https://github.com/riskreadyeu/riskready-community.git
cd riskready-community
cp .env.example .env        # edit: POSTGRES_PASSWORD, JWT_SECRET, ADMIN_EMAIL, ADMIN_PASSWORD
docker compose up -d         # first run ~3 minutes
open http://localhost:9380   # log in as [email protected] / password123

Requires Docker 24+ with Compose v2. Linux, macOS, or Windows (WSL2).


9 MCP servers expose 254 tools that connect Claude directly to your compliance database — risks, controls, policies, incidents, audits, evidence, ITSM, and organisation governance.

Every AI mutation is proposed, not executed. A human reviews and approves each action before it touches the database. This holds for interactive chat, scheduled runs, and autonomous workflows.

You:    "Give me a full security posture assessment."
Agent:  Convenes AI Council → 6 specialists analyse in parallel → CISO synthesises
        → structured report with consensus, dissents, and prioritised actions
Cost:   $0.19 on Haiku. $10 on Opus. 96% token reduction via tool search.

Mode How it works AI cost to you Security
Web App Built-in chat UI with streaming, council, scheduled workflows You pay per token 8.1/10
MCP Proxy Claude Desktop connects remotely via API key — one endpoint, all 254 tools $0 8.9/10
Direct 9 stdio servers on your machine for local development $0 2.3/10

The MCP Proxy is the recommended mode for teams. Each user brings their own Claude subscription. You provide the tools and the security layer. Connection modes compared →


Module What it covers
Risk Management Risk register, scenarios, KRIs, tolerance statements, treatment plans
Controls Control library, assessments, Statement of Applicability, gap analysis
Policies Document lifecycle, version control, change requests, reviews, exceptions
Incidents Tracking, classification, response workflows, lessons learned
Audits Internal audit planning, nonconformity tracking, corrective actions
Evidence Collection, file storage, linking to controls, risks, and incidents
ITSM IT asset register, change management, capacity planning
Organisation Structure, departments, locations, committees, key personnel
Screenshots (click to expand)

Risk Dashboard Risk Register Control Command Center Controls Library Policy Management Incident Management Evidence Center Audit Management ITSM Dashboard Organisation AI Action Queue


Complex questions convene 6 specialist agents:

Agent Domain
Risk Analyst Risk register, scenarios, KRIs, tolerance, treatments
Controls Auditor Control effectiveness, SOA, assessments, gap analysis
Compliance Officer Policies, frameworks (ISO 27001, DORA, NIS2), governance
Incident Commander Incident patterns, response metrics, lessons learned
Evidence Auditor Evidence coverage, audit readiness, nonconformities
CISO Strategist Cross-domain synthesis — produces the final report

Each member queries the database independently, then the CISO synthesises. All reasoning is preserved for audit. Benchmarks →


Every AI mutation goes through human approval. No exceptions, no auto-approve, not even for scheduled runs.

The 8-point agent security audit covers:

  1. Identity & Authorization — per-user API keys with per-tool permission scoping
  2. Memory — 90-day TTL, injection scanning, org-scoped recall
  3. Tool Trust — 254 first-party tools, Zod-validated, no third-party MCP servers
  4. Blast Radius — zero HTTP outbound, rate limiting, scoped API keys
  5. Human Checkpoints — tiered severity (low/medium/high/critical) on all mutations
  6. Output Validation — credential scanning, PII redaction, grounding guard
  7. Cost Controls — token budgets, turn caps, council rate limits
  8. Observability — tool call logging, behavioral anomaly detection, source tracking

First deploy auto-seeds ClearStream Payments Ltd — a fictional European fintech regulated under DORA and NIS2: 15 risks, 30 scenarios, 40 controls, 12 policies, 8 incidents, 20 assets, 5 nonconformities, 20 evidence records, and 6 months of trend data.

Log in as [email protected] / password123 for the most complete view.


Guide
AI Platform Guide MCP servers, gateway, council, scheduler, workflows, approval pipeline
Deployment Docker setup, env vars, production TLS, troubleshooting
User Guide Web app walkthrough for all 8 GRC modules
Connection Modes Web App vs MCP Proxy vs Direct — feature comparison
Agent Security Audit 8-point framework with per-mode scoring and code references
MCP Server Reference All 254 tools with parameters and examples
API Reference REST endpoints, request/response formats
Administration Backup, monitoring, updates, security hardening

docker compose up db -d
cd apps/server && npm install && cp .env.example .env
npx prisma db push --schema=prisma/schema && npm run prisma:seed
npm run dev                              # backend :4000
cd ../web && npm install && npm run dev  # frontend :5173

Additional modules for larger organisations: Risk Appetite Cascade, Loss Magnitude (FAIR), Supply Chain Risk, BCM/BIA, Vulnerability Management, Application Security Posture, External Requirements Mapping.


Contributing · Security · License: AGPL-3.0

联系我们 contact @ memedata.com