compliance-audit

Regulatory compliance auditing across GDPR, HIPAA, PCI DSS, SOC 2, and ISO frameworks with automated evidence collection and gap analysis. Use when conducting compliance assessments, preparing for certifications, or implementing regulatory controls.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "compliance-audit" with this command: npx skills add nickcrew/claude-ctx-plugin/nickcrew-claude-ctx-plugin-compliance-audit

Compliance Audit

Systematic regulatory compliance auditing with automated evidence collection, control mapping, gap analysis, and remediation planning across major compliance frameworks.

When to Use This Skill

  • Conducting compliance assessments for GDPR, HIPAA, PCI DSS, SOC 2, or ISO 27001
  • Preparing for external audits or certifications
  • Building or validating compliance control frameworks
  • Automating evidence collection and audit trail maintenance
  • Performing gap analysis against regulatory requirements
  • Creating remediation plans for compliance deficiencies
  • Evaluating third-party vendor compliance posture

Quick Reference

ResourcePurposeLoad when
references/frameworks.mdKey requirements, control mappings, and certification paths for GDPR, HIPAA, PCI DSS, SOC 2, ISO 27001Scoping which regulations apply
references/evidence-collection.mdAutomated evidence gathering, artifact organization, retention policies, audit trail patternsSetting up or running evidence collection
references/gap-analysis.mdControl mapping methodology, gap identification, risk scoring, remediation planningAnalyzing compliance gaps

Workflow Overview

Phase 1: Scope       → Identify applicable regulations, data types, and geographical scope
Phase 2: Assess      → Map controls, review policies, analyze data flows, test implementations
Phase 3: Evidence    → Collect and organize audit artifacts automatically
Phase 4: Gap Analyze → Identify control gaps, score risks, prioritize findings
Phase 5: Remediate   → Create remediation plans, assign owners, set timelines
Phase 6: Report      → Generate audit-ready documentation and compliance dashboards
Phase 7: Monitor     → Establish continuous compliance monitoring and drift detection

Phase 1: Scope the Audit

Determine the regulatory landscape before testing anything.

Key questions:

  • What data types does the system process (PII, PHI, cardholder data)?
  • What jurisdictions apply (EU, US states, industry-specific)?
  • What existing controls and certifications are in place?
  • What is the audit history and any prior findings?

Applicability matrix:

FrameworkApplies when
GDPRProcessing personal data of EU residents
HIPAAHandling protected health information (PHI)
PCI DSSStoring, processing, or transmitting cardholder data
SOC 2Providing services where trust principles matter
ISO 27001Organization wants certified ISMS
CCPA/CPRACollecting California consumer personal information
NIST CSFFederal systems or voluntary cybersecurity framework adoption

Phase 2: Assess Current State

Control Inventory

Map existing controls against the applicable framework requirements:

  1. Enumerate all technical controls (encryption, access control, logging)
  2. Enumerate all administrative controls (policies, training, procedures)
  3. Enumerate all physical controls (facility access, media handling)
  4. Map each control to specific framework requirements
  5. Test control effectiveness through sampling and verification

Data Flow Analysis

  • Map data ingress, processing, storage, and egress points
  • Identify data classification for each flow
  • Document lawful basis for processing (GDPR)
  • Verify data minimization and purpose limitation
  • Review cross-border transfer mechanisms

Policy Review

  • Assess policy coverage against framework requirements
  • Verify policy distribution and acknowledgment
  • Check policy version control and update cadence
  • Validate exception management processes

Phase 3: Evidence Collection

Load references/evidence-collection.md for detailed patterns.

Automation priorities:

  1. Configuration exports from cloud providers and infrastructure
  2. Access control lists and permission matrices
  3. Log retention and monitoring dashboards
  4. Vulnerability scan results and patch status
  5. Training completion records
  6. Incident response test results

Artifact organization:

evidence/
  {framework}/
    {control-id}/
      artifact-{date}.{ext}
      metadata.yaml           # source, collection method, timestamp

Phase 4: Gap Analysis

Load references/gap-analysis.md for the full methodology.

For each framework requirement:

  1. Map to existing controls (full, partial, or none)
  2. Assess implementation effectiveness
  3. Score the gap by risk impact and likelihood
  4. Categorize as documentation, process, technology, or training gap
  5. Prioritize based on risk score and remediation effort

Phase 5: Remediation Planning

For each identified gap:

FieldContent
Gap IDUnique identifier
Framework RequirementSpecific clause or control
Current StateWhat exists today
Target StateWhat compliance requires
Remediation ActionSpecific steps to close the gap
OwnerResponsible person/team
PriorityP0-P4 based on risk score
TimelineTarget completion date
DependenciesOther gaps or actions this depends on

Phase 6: Reporting

Generate audit-ready documentation:

  • Executive summary: Compliance posture, key risks, readiness score
  • Technical findings: Detailed control assessment results
  • Risk matrix: Heat map of gaps by severity and likelihood
  • Remediation roadmap: Prioritized timeline with owners
  • Evidence package: Organized artifacts indexed to controls
  • Compliance attestation: Framework-specific certification readiness

Phase 7: Continuous Monitoring

Establish ongoing compliance posture management:

  • Configure automated scanning for drift detection
  • Set alert thresholds for control degradation
  • Schedule periodic re-assessment cadence
  • Track remediation progress against timelines
  • Maintain metric dashboards (control coverage, evidence freshness, audit readiness)

Core Principles

  1. Evidence over assertion — every compliance claim must be backed by verifiable artifacts
  2. Automate first — manual evidence collection does not scale and introduces errors
  3. Risk-based prioritization — address the highest-risk gaps first
  4. Continuous posture — compliance is a state, not a one-time event
  5. Defense in depth — layer controls so single-point failures do not cause non-compliance

Anti-Patterns

  • Treating compliance as a checkbox exercise without testing control effectiveness
  • Collecting evidence manually when automation is available
  • Ignoring gaps because "we've always done it this way"
  • Waiting until audit season to gather evidence
  • Conflating compliance with security (compliance is a subset)
  • Skipping third-party/vendor compliance assessments

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

Agentshield Audit

Trust Infrastructure for AI Agents - Like SSL/TLS for agent-to-agent communication. 77 security tests, cryptographic certificates, and Trust Handshake Protoc...

Registry SourceRecently Updated
6600Profile unavailable
Security

Receipts Guard

ERC-8004 identity, x402 payments, and arbitration protocol for autonomous agent commerce. The three rails for the machine economy.

Registry SourceRecently Updated
1.8K1Profile unavailable
Security

SkillGuard Hardened

Security guard for OpenClaw skills, developed and maintained by rose北港(小红帽 / 猫猫帽帽). Audits installed or incoming skills with local rules plus Zenmux AI inten...

Registry SourceRecently Updated
910Profile unavailable
Security

JEP Guard

JEP Guard intercepts high-risk commands, requires user confirmation, issues temporary tokens, and logs actions with exportable audit receipts.

Registry SourceRecently Updated
1830Profile unavailable