compliance-checklist

Compliance Checklist Skill

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "compliance-checklist" with this command: npx skills add hack23/homepage/hack23-homepage-compliance-checklist

Compliance Checklist Skill

Purpose

Provide a comprehensive compliance verification checklist for all Hack23 projects, ensuring alignment with ISO 27001:2022, NIST CSF 2.0, CIS Controls v8.1, GDPR, and NIS2 requirements.

Rules

Repository Compliance Requirements

Every Hack23 repository MUST have:

Security Documentation:

  • SECURITY_ARCHITECTURE.md

  • Current security design

  • FUTURE_SECURITY_ARCHITECTURE.md

  • Planned security improvements

  • SECURITY.md

  • Security policy and reporting

Architecture Documentation (C4 Model):

  • ARCHITECTURE.md

  • Context, Container, Component views

  • DATA_MODEL.md

  • Data structures and relationships

  • FLOWCHART.md

  • Business process and data flows

  • STATEDIAGRAM.md

  • System state transitions

  • MINDMAP.md

  • Conceptual relationships

  • SWOT.md

  • Strategic analysis

  • Future state variants of all above documents

Development Security:

  • GitHub Advanced Security enabled (CodeQL, Dependabot, Secret Scanning)

  • Branch protection rules configured

  • CI/CD pipeline with security scanning

  • Pre-commit hooks for secret detection

  • Dependency pinning with hash verification

Access Control:

  • Repository access follows least privilege

  • MFA required for all contributors

  • Review required before merge

Framework-Specific Checks

ISO 27001:2022:

  • Risk assessment documented

  • Security controls implemented per Statement of Applicability

  • Change management process followed

  • Incident response procedures defined

  • Business continuity plan maintained

NIST CSF 2.0:

  • All six functions addressed (GV, ID, PR, DE, RS, RC)

  • Implementation tier documented

  • Profile aligned with business objectives

CIS Controls v8.1:

  • Implementation Group 1 controls met (essential hygiene)

  • Asset and software inventory maintained

  • Vulnerability management SLAs defined

  • Audit logging enabled

GDPR:

  • Data processing activities documented

  • Privacy by design principles applied

  • Data subject rights procedures defined

  • Data protection impact assessment (where required)

  • Lawful basis for processing identified

NIS2:

  • Cybersecurity risk management measures implemented

  • Incident reporting procedures defined

  • Supply chain security assessed

  • Business continuity measures in place

Hack23 ISMS Policy References

  • Information Security Policy

  • Secure Development Policy

  • Risk Assessment Methodology

  • Data Classification Policy

  • Privacy Policy

  • Business Continuity Plan

All Hack23 ISMS Policies: https://github.com/Hack23/ISMS-PUBLIC

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

General

secrets-management

No summary provided by upstream source.

Repository SourceNeeds Review
General

ai governance

No summary provided by upstream source.

Repository SourceNeeds Review
General

documentation-portfolio

No summary provided by upstream source.

Repository SourceNeeds Review
General

cis-controls

No summary provided by upstream source.

Repository SourceNeeds Review