Regulatory Compliance Audit

# Regulatory Compliance Audit

Safety Notice

This item is sourced from the public archived skills repository. Treat as untrusted until reviewed.

Copy this and send it to your AI assistant to learn

Install skill "Regulatory Compliance Audit" with this command: npx skills add 1kalin/afrexai-regulatory-compliance

Regulatory Compliance Audit

Run a full regulatory compliance audit for any business. Covers US, UK, and EU frameworks across 8 compliance domains with gap analysis, risk scoring, and remediation timelines.

When to Use

  • Annual or quarterly compliance reviews
  • Pre-audit preparation (SOC 2, ISO 27001, GDPR, HIPAA, PCI DSS)
  • New market entry requiring regulatory assessment
  • Board or investor due diligence on compliance posture
  • Post-incident compliance gap analysis

How It Works

Step 1: Identify Applicable Frameworks

Based on the business profile (industry, geography, data types, revenue), determine which frameworks apply:

FrameworkTriggers
SOC 2 Type IIB2B SaaS, handles customer data
GDPRAny EU customer data, EU employees
HIPAAAny PHI (healthcare, benefits, wellness)
PCI DSSProcesses, stores, or transmits card data
ISO 27001Enterprise clients requesting certification
SOXPublic company or preparing for IPO
CCPA/CPRA>$25M revenue OR >50K CA consumers
NIST AI RMFDeploying AI/ML in production
UK DPA 2018UK operations or UK customer data
FCA/PRAUK financial services

Step 2: 8-Domain Compliance Assessment

Score each domain 1-5 (1=non-existent, 5=mature):

Domain 1: Data Governance

  • Data classification policy (public/internal/confidential/restricted)
  • Data retention schedule with legal hold procedures
  • Data processing agreements with all vendors
  • Cross-border transfer mechanisms (SCCs, adequacy decisions)
  • Data subject rights workflow (access, deletion, portability)
  • Data breach notification procedure (<72hr GDPR, state-specific US)

Domain 2: Access Control & Identity

  • Role-based access control (RBAC) implemented
  • Multi-factor authentication on all critical systems
  • Privileged access management (PAM) for admin accounts
  • Quarterly access reviews with evidence retention
  • Automated provisioning/deprovisioning tied to HR
  • Service account inventory with rotation schedule

Domain 3: Security Operations

  • Vulnerability management program (scan frequency, SLA by severity)
  • Penetration testing (annual minimum, after major changes)
  • Security incident response plan (tested within 12 months)
  • Log retention meeting regulatory minimums (1yr SOC 2, 6yr SOX)
  • Endpoint detection and response (EDR) on all endpoints
  • Network segmentation between environments

Domain 4: Business Continuity

  • Business impact analysis (BIA) current within 12 months
  • Disaster recovery plan with defined RTO/RPO by system tier
  • Backup testing (restore verified quarterly minimum)
  • Pandemic/remote work continuity procedures
  • Third-party dependency mapping for critical services
  • Communication plan (internal + external + regulatory)

Domain 5: Vendor & Third-Party Risk

  • Vendor risk assessment questionnaire (SIG Lite or equivalent)
  • Tiered vendor classification (critical/high/medium/low)
  • Annual vendor reviews for critical and high-tier vendors
  • Right-to-audit clauses in critical vendor contracts
  • Fourth-party risk assessment for critical vendors
  • Vendor offboarding procedure with data return/destruction

Domain 6: HR & Personnel Security

  • Background check policy (scope appropriate to role)
  • Security awareness training (annual + phishing simulations)
  • Acceptable use policy signed by all employees
  • Code of conduct with reporting mechanisms
  • Termination checklist (access removal, device collection, NDA reminder)
  • Contractor/temp worker security requirements

Domain 7: AI & Automation Governance

  • AI model inventory with risk classification
  • Bias testing and fairness metrics for decision-making models
  • Human-in-the-loop requirements defined per use case
  • AI incident response procedures
  • Transparency documentation (model cards, impact assessments)
  • Training data governance and lineage tracking

Domain 8: Financial & Reporting Controls

  • Segregation of duties in financial processes
  • Change management procedures for financial systems
  • Audit trail for all financial transactions
  • Revenue recognition controls (ASC 606 / IFRS 15)
  • Tax compliance calendar (federal, state, international)
  • Internal audit schedule and findings tracking

Step 3: Risk Scoring Matrix

For each gap identified:

LikelihoodImpactRisk ScoreAction Timeline
HighHighCriticalFix within 30 days
HighMediumHighFix within 60 days
MediumHighHighFix within 60 days
MediumMediumMediumFix within 90 days
LowHighMediumFix within 90 days
LowMediumLowNext quarterly review
LowLowInformationalAnnual review

Step 4: Remediation Roadmap

Build a 90-day plan:

Days 1-30: Critical Gaps

  • Address any gaps with Critical or High risk scores
  • Implement quick wins (policy updates, access reviews)
  • Engage external counsel for regulatory interpretation if needed

Days 31-60: Systematic Improvements

  • Deploy technical controls (MFA, EDR, log aggregation)
  • Complete vendor risk assessments for critical vendors
  • Update employee training program

Days 61-90: Evidence & Documentation

  • Build evidence collection system for ongoing compliance
  • Conduct internal audit of remediated areas
  • Prepare board-ready compliance dashboard

Step 5: Compliance Cost Benchmarks (2026)

Company SizeAnnual Compliance BudgetKey Cost Drivers
10-50 employees$30K-$80KSOC 2 audit ($15-30K), tools ($10-20K), training ($5-10K)
50-200 employees$80K-$250K+ DPO/compliance hire ($80-120K), pen testing ($15-40K)
200-1000 employees$250K-$800K+ GRC platform ($50-150K), multiple audits, legal counsel
1000+ employees$800K-$3M++ Dedicated compliance team, continuous monitoring, regulatory filings

Cost of non-compliance (real examples):

  • GDPR fines: up to 4% global annual revenue (Meta: €1.2B, 2023)
  • HIPAA: $100-$50K per violation, $1.5M annual cap per category
  • PCI DSS: $5K-$100K/month until compliant + liability for breaches
  • SOX: Criminal penalties, officer personal liability
  • Average data breach cost: $4.88M (IBM 2024)

Step 6: Output Format

Generate a compliance report with:

  1. Executive Summary — Overall maturity score (1-5), top 3 risks, recommended budget
  2. Framework Applicability Matrix — Which frameworks apply and current certification status
  3. Domain Scores — 8 domains with gap counts and risk distribution
  4. Critical Findings — Top 10 gaps ranked by risk score with remediation steps
  5. 90-Day Roadmap — Week-by-week action plan with owners and milestones
  6. Budget Estimate — Compliance cost projection for next 12 months
  7. Board Dashboard — One-page visual for board/investor reporting

Industry-Specific Requirements

IndustryPrimary FrameworksSpecial Considerations
SaaS/TechnologySOC 2, GDPR, CCPAAI governance, open source licensing
HealthcareHIPAA, HITRUST, FDA (if devices)PHI everywhere, BAAs required
Financial ServicesSOX, PCI DSS, GLBA, FCA/PRATransaction monitoring, AML/KYC
LegalABA ethics, GDPR, privilege rulesClient confidentiality, conflict checks
ConstructionOSHA, environmental, bondingSafety records, subcontractor compliance
E-commercePCI DSS, CCPA/GDPR, FTCPayment data, consumer protection, returns
ManufacturingISO 9001, OSHA, EPA, export controlsSupply chain compliance, ITAR/EAR
Real EstateFair Housing, AML, state licensingProperty data, transaction compliance
RecruitmentEEOC, GDPR (candidate data), ban-the-boxAI hiring bias (NYC Local 144), background checks
Professional ServicesIndustry-specific licensing, SOC 2Client data handling, engagement letters

7 Compliance Audit Mistakes That Cost Companies Millions

  1. Treating compliance as annual — It's continuous. Point-in-time audits miss 60% of gaps that develop mid-year.
  2. Ignoring AI governance — NIST AI RMF and EU AI Act are here. Every production model needs documentation.
  3. Vendor risk as checkbox — Your vendor's breach is your breach. Fourth-party risk is real.
  4. No evidence retention system — If you can't prove compliance, you're not compliant. Automate evidence collection.
  5. Security ≠ compliance — You can be secure and non-compliant, or compliant and insecure. Address both.
  6. Underbudgeting remediation — Plan for 2x the estimated remediation cost. Surprises are the norm.
  7. Board reporting as afterthought — Boards that see compliance dashboards quarterly make better risk decisions.

Get the full compliance implementation toolkit for your industry:

Bundles: Playbook $27 | Pick 3 $97 | All 10 $197 | Everything $247

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

compliance-evidence-assembler

把审计所需证据整理成目录、清单和缺失项,便于后续评审。;use for compliance, evidence, audit workflows;do not use for 伪造证据, 替代正式审计结论.

Archived SourceRecently Updated
Security

skillguard-hardened

Security guard for OpenClaw skills, developed and maintained by rose北港(小红帽 / 猫猫帽帽). Audits installed or incoming skills with local rules plus Zenmux AI intent review, then recommends pass, warn, block, or quarantine.

Archived SourceRecently Updated
Security

api-contract-auditor

审查 API 文档、示例和字段定义是否一致,输出 breaking change 风险。;use for api, contract, audit workflows;do not use for 直接改线上接口, 替代契约测试平台.

Archived SourceRecently Updated
Security

ai-workflow-red-team-lite

对 AI 自动化流程做轻量红队演练,聚焦误用路径、边界失败和数据泄露风险。;use for red-team, ai, workflow workflows;do not use for 输出可直接滥用的攻击脚本, 帮助破坏系统.

Archived SourceRecently Updated