Towards the Development of an LLM-Based Methodology for Automated Security Profiling in Compliance with Ukrainian Cybersecurity Regulations
arXiv cs.AI / 4/10/2026
💬 OpinionIdeas & Deep AnalysisTools & Practical UsageModels & Research
Key Points
- The paper examines how Ukraine can integrate international cybersecurity best practices (ISO/IEC 27001 and the NIST Cybersecurity Framework) into national regulatory compliance, emphasizing a shift toward risk-based compliance models.
- It outlines a proposed workflow to automate the creation of “target security profiles” by using LLMs augmented with Retrieval-Augmented Generation (RAG).
- The approach relies on a vector database built from Ukrainian regulations and organizational policies to help generate security guidance that maps technical controls to legal requirements.
- The authors argue that the RAG-based advisor can reduce manual effort and complexity, minimize human error, and improve consistency with compliance obligations under high-intensity hybrid threat environments.
- The work is positioned as an AI-assisted cybersecurity management methodology for organizations needing structured, regulation-aligned control profiling.



