soc2-compliance-expert

SOC 2 Compliance Expert

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "soc2-compliance-expert" with this command: npx skills add borghei/claude-skills/borghei-claude-skills-soc2-compliance-expert

SOC 2 Compliance Expert

SOC 2 Type I and Type II compliance management covering all Trust Services Criteria (TSC), infrastructure security validation, evidence collection, and end-to-end audit preparation.

SOC 2 Overview

Type I vs Type II

Aspect Type I Type II

Scope Design of controls at a point in time Design AND operating effectiveness over a period

Duration Single date (snapshot) Observation period (3-12 months, typically 6-12)

Cost $20K-$60K (first audit) $40K-$150K (first audit)

Timeline 1-3 months 6-15 months (includes observation period)

Customer Preference Early-stage acceptable Enterprise customers require

Start with Type I to validate control design, then transition to Type II within 6 months.

Trust Services Criteria Summary

Category Focus Controls

CC1-CC5 Common Criteria (COSO-based) Control environment, communication, risk, monitoring, control activities

CC6 Logical and Physical Access Authentication, authorization, physical security, encryption

CC7 System Operations Vulnerability management, monitoring, incident response, BCP

CC8 Change Management Authorization, testing, deployment controls

CC9 Risk Mitigation Vendor management, business disruption, risk transfer

A1 Availability Capacity planning, DR, recovery testing

PI1 Processing Integrity Data validation, error handling, reconciliation

C1 Confidentiality Classification, encryption, disposal

P1 Privacy Notice, consent, data subject rights, retention

For detailed control requirements per category, see REFERENCE.md.

Readiness Assessment Workflow

The agent guides organizations through SOC 2 readiness from gap analysis through audit completion.

Workflow: Phase 1 -- Gap Analysis (Weeks 1-4)

  • Define scope -- determine which TSC categories to include (Security is mandatory), define system boundaries, identify subservice organizations (carve-out vs. inclusive), document principal service commitments.

  • Assess current state -- inventory existing policies and procedures, map current controls to TSC requirements, interview process owners and control operators.

  • Run automated gap analysis using scripts/soc2_readiness_checker.py .

  • Document gaps -- missing controls, controls lacking evidence, controls not operating effectively.

  • Prioritize gaps by risk level and remediation effort.

  • Validation checkpoint: Gap analysis covers all in-scope TSC categories; each gap has severity rating and remediation owner assigned.

Workflow: Phase 2 -- Remediation (Weeks 5-16)

  • Develop/update policies -- information security policy, supporting procedures per control domain, policy review and approval workflows.

  • Implement technical controls -- configure IdP with SSO/MFA enforcement, deploy endpoint security (MDM, EDR, disk encryption), implement SIEM logging and monitoring, configure backup and DR, harden cloud infrastructure.

  • Establish processes -- access review procedures, change management workflow, incident response procedures, vendor management program, security awareness training.

  • Set up evidence collection -- configure automated collection, establish repository structure, define refresh cadence per TSC category.

  • Validation checkpoint: All identified gaps remediated; technical controls verified via scripts/soc2_infrastructure_auditor.py ; evidence collection producing artifacts.

Workflow: Phase 3 -- Pre-Audit (Weeks 17-20)

  • Conduct internal readiness assessment -- mock audit against all in-scope TSC, validate evidence completeness and quality, run infrastructure auditor for technical validation.

  • Remediate pre-audit findings -- address remaining gaps, strengthen evidence.

  • Select and engage CPA firm -- negotiate scope, timeline, fees; schedule kickoff; prepare system description draft.

  • Validation checkpoint: Mock audit passes with no critical gaps; system description reviewed; auditor engaged.

Workflow: Phase 4 -- Audit Execution

  • Type I audit (if applicable) -- auditor reviews control design; management provides assertions; address findings before Type II.

  • Type II observation period (3-12 months) -- controls operate consistently, evidence collected continuously, quarterly self-assessments, regular auditor check-ins.

  • Fieldwork (2-4 weeks) -- auditor selects samples, tests controls, interviews personnel; draft report review; final report issuance.

  • Validation checkpoint: Clean opinion received; any findings have management response and remediation plan.

Evidence Collection Framework

Evidence by TSC Category

TSC Evidence Type Collection Method Refresh

CC1 Code of conduct acknowledgments HR system export Annual

CC2 Security awareness training records LMS export Ongoing

CC3 Risk assessment report, risk register GRC platform Annual/Quarterly

CC4 Penetration test reports, vulnerability scans Third-party/scanner Annual/Monthly

CC5 Policy documents with version history Policy management Annual review

CC6 Access reviews, MFA enrollment, offboarding IAM/IdP/HRIS Quarterly/Per event

CC7 Vulnerability remediation, incident records Ticketing/ITSM Ongoing

CC8 Change tickets with approvals, code reviews ITSM/Git Per change

CC9 Vendor risk assessments, vendor SOC 2 reports GRC platform Annual

A1 Uptime reports, DR tests, backup logs Monitoring/backup Monthly/Semi-annual

PI1 Data validation/reconciliation reports Application logs Per process

C1 Data classification inventory, encryption configs Manual/automated Annual/Quarterly

P1 PIAs, DSR response tracking Privacy tool Per event

Example: Evidence Collection Command

Generate evidence checklist for all TSC categories

python scripts/evidence_collector.py --generate-checklist --categories all

Track evidence status

python scripts/evidence_collector.py --status evidence-tracker.json

Update specific evidence item

python scripts/evidence_collector.py --update evidence-tracker.json
--item CC6.1-MFA --status collected

Generate readiness dashboard

python scripts/evidence_collector.py --dashboard evidence-tracker.json

Export for auditor review

python scripts/evidence_collector.py --export evidence-tracker.json --format json

Automation Strategies

GRC Platforms: Vanta, Drata, Secureframe, Laika, AuditBoard -- automated evidence collection via API integrations, continuous control monitoring, auditor collaboration portals.

Infrastructure-as-Evidence: Cloud configuration snapshots (AWS Config, Azure Policy, GCP Org Policies), Terraform state as configuration evidence, Git history as change management evidence, CI/CD pipeline logs as deployment control evidence.

Infrastructure Security Validation

The agent validates infrastructure configurations against SOC 2 requirements.

Quick Reference: Infrastructure Checks

Domain Key Checks SOC 2 Mapping

Cloud (AWS/Azure/GCP) Encryption, IAM, logging, network, backup, secrets CC6, CC7, A1, C1

DNS SPF, DKIM, DMARC, DNSSEC, CAA CC6.6, CC2.2

TLS/SSL TLS 1.2+, AEAD ciphers, HSTS, auto-renewal CC6.7

Endpoint MDM, disk encryption, EDR, patching, screen lock CC6.1, CC6.8, CC7.1

Network Segmentation, WAF, DDoS, VPN/ZTNA, egress filtering CC6.6, A1.1

Container Image scanning, minimal base, no privileged, RBAC CC6.1, CC7.1

CI/CD Signed commits, branch protection, SAST/DAST, SBOM CC7.1, CC8.1

Secrets Vault storage, rotation policies, git scanning CC6.1

For detailed per-provider control mappings, see REFERENCE.md.

Example: Infrastructure Audit Command

Full infrastructure audit

python scripts/soc2_infrastructure_auditor.py --config infra-config.json

Audit specific domains only

python scripts/soc2_infrastructure_auditor.py --config infra-config.json
--domains dns tls cloud

JSON output with severity ratings

python scripts/soc2_infrastructure_auditor.py --config infra-config.json --format json

Generate sample configuration template

python scripts/soc2_infrastructure_auditor.py --generate-template

Audit Timeline

Typical Timeline (First SOC 2)

Phase Duration Activities

Scoping 2-4 weeks Define TSC, system boundaries, auditor selection

Gap Analysis 2-4 weeks Assess current controls, identify gaps

Remediation 8-16 weeks Implement missing controls, policies, procedures

Type I Audit 2-4 weeks Point-in-time control design assessment

Type II Observation 3-12 months Controls operate, evidence collected continuously

Type II Fieldwork 2-4 weeks Auditor testing, evidence review, interviews

Report Issuance 2-4 weeks Draft review, management response, final report

Annual Renewal

  • Begin renewal planning 3 months before observation period ends

  • Maintain continuous compliance between audit periods

  • Address prior-year findings before new observation period

  • Bridge letters available for gaps between reports

Incident Response Requirements

IRP Structure

  • Preparation -- IR team defined, communication channels established, runbooks for common incidents, legal/PR contacts on retainer.

  • Detection and Analysis -- monitoring/alerting coverage, severity classification (SEV1-SEV4), triage procedures, escalation matrix.

  • Containment, Eradication, Recovery -- isolate affected systems, preserve evidence, identify root cause, restore and validate.

  • Post-Incident -- blameless post-mortem within 5 business days, lessons learned, control improvements, notification assessment (MTTD, MTTR, MTTC tracking).

For severity level definitions and breach notification timelines, see REFERENCE.md.

Tools

SOC 2 Readiness Checker

Full readiness assessment

python scripts/soc2_readiness_checker.py --config org-controls.json

JSON output for programmatic use

python scripts/soc2_readiness_checker.py --config org-controls.json --format json

Check specific TSC categories

python scripts/soc2_readiness_checker.py --config org-controls.json
--categories security availability

Include cloud provider control mapping

python scripts/soc2_readiness_checker.py --config org-controls.json --cloud-mapping

Evidence Collector

Generate checklist and track status

python scripts/evidence_collector.py --generate-checklist --categories all python scripts/evidence_collector.py --status evidence-tracker.json python scripts/evidence_collector.py --dashboard evidence-tracker.json

Infrastructure Auditor

Validate infrastructure against SOC 2 requirements

python scripts/soc2_infrastructure_auditor.py --config infra-config.json python scripts/soc2_infrastructure_auditor.py --config infra-config.json --format json

References

Document Description

REFERENCE.md Detailed TSC controls, infrastructure checks, access control specs, vendor management, training, IRP, BC/DR

Trust Services Criteria Guide Complete TSC reference with control objectives and audit questions

Infrastructure Security Controls Cloud, DNS, TLS, endpoint, container, CI/CD security configurations

Audit Preparation Playbook End-to-end audit prep guide with timelines, checklists, cost estimation

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

General

product-designer

No summary provided by upstream source.

Repository SourceNeeds Review
2.2K-borghei
General

business-intelligence

No summary provided by upstream source.

Repository SourceNeeds Review
General

brand-strategist

No summary provided by upstream source.

Repository SourceNeeds Review
General

senior-mobile

No summary provided by upstream source.

Repository SourceNeeds Review