home / skills / nickcrew / claude-cortex / compliance-audit

compliance-audit skill

/skills/compliance-audit

This skill automates regulatory compliance audits across GDPR, HIPAA, PCI DSS, SOC 2, and ISO, with evidence collection and gap analysis.

npx playbooks add skill nickcrew/claude-cortex --skill compliance-audit

Review the files below or copy the command above to add this skill to your agents.

Files (4)
SKILL.md
7.4 KB
---
name: compliance-audit
description: >-
  Regulatory compliance auditing across GDPR, HIPAA, PCI DSS, SOC 2, and ISO
  frameworks with automated evidence collection and gap analysis. Use when
  conducting compliance assessments, preparing for certifications, or
  implementing regulatory controls.
version: 1.0.0
tags: [compliance, audit, regulatory, security, privacy]
triggers:
  - compliance audit
  - regulatory assessment
  - GDPR compliance
  - HIPAA assessment
  - PCI DSS certification
  - SOC 2 readiness
  - ISO 27001 alignment
  - evidence collection
  - gap analysis
dependencies:
  skills: [secure-coding-practices, owasp-top-10]
  tools: [Read, Write, Bash, Grep, Glob]
token_estimate: ~3000
---

# Compliance Audit

Systematic regulatory compliance auditing with automated evidence collection, control mapping,
gap analysis, and remediation planning across major compliance frameworks.

## When to Use This Skill

- Conducting compliance assessments for GDPR, HIPAA, PCI DSS, SOC 2, or ISO 27001
- Preparing for external audits or certifications
- Building or validating compliance control frameworks
- Automating evidence collection and audit trail maintenance
- Performing gap analysis against regulatory requirements
- Creating remediation plans for compliance deficiencies
- Evaluating third-party vendor compliance posture

## Quick Reference

| Resource | Purpose | Load when |
|----------|---------|-----------|
| `references/frameworks.md` | Key requirements, control mappings, and certification paths for GDPR, HIPAA, PCI DSS, SOC 2, ISO 27001 | Scoping which regulations apply |
| `references/evidence-collection.md` | Automated evidence gathering, artifact organization, retention policies, audit trail patterns | Setting up or running evidence collection |
| `references/gap-analysis.md` | Control mapping methodology, gap identification, risk scoring, remediation planning | Analyzing compliance gaps |

---

## Workflow Overview

```
Phase 1: Scope       → Identify applicable regulations, data types, and geographical scope
Phase 2: Assess      → Map controls, review policies, analyze data flows, test implementations
Phase 3: Evidence    → Collect and organize audit artifacts automatically
Phase 4: Gap Analyze → Identify control gaps, score risks, prioritize findings
Phase 5: Remediate   → Create remediation plans, assign owners, set timelines
Phase 6: Report      → Generate audit-ready documentation and compliance dashboards
Phase 7: Monitor     → Establish continuous compliance monitoring and drift detection
```

---

## Phase 1: Scope the Audit

Determine the regulatory landscape before testing anything.

**Key questions:**
- What data types does the system process (PII, PHI, cardholder data)?
- What jurisdictions apply (EU, US states, industry-specific)?
- What existing controls and certifications are in place?
- What is the audit history and any prior findings?

**Applicability matrix:**

| Framework | Applies when |
|-----------|-------------|
| GDPR | Processing personal data of EU residents |
| HIPAA | Handling protected health information (PHI) |
| PCI DSS | Storing, processing, or transmitting cardholder data |
| SOC 2 | Providing services where trust principles matter |
| ISO 27001 | Organization wants certified ISMS |
| CCPA/CPRA | Collecting California consumer personal information |
| NIST CSF | Federal systems or voluntary cybersecurity framework adoption |

---

## Phase 2: Assess Current State

### Control Inventory

Map existing controls against the applicable framework requirements:

1. Enumerate all technical controls (encryption, access control, logging)
2. Enumerate all administrative controls (policies, training, procedures)
3. Enumerate all physical controls (facility access, media handling)
4. Map each control to specific framework requirements
5. Test control effectiveness through sampling and verification

### Data Flow Analysis

- Map data ingress, processing, storage, and egress points
- Identify data classification for each flow
- Document lawful basis for processing (GDPR)
- Verify data minimization and purpose limitation
- Review cross-border transfer mechanisms

### Policy Review

- Assess policy coverage against framework requirements
- Verify policy distribution and acknowledgment
- Check policy version control and update cadence
- Validate exception management processes

---

## Phase 3: Evidence Collection

Load `references/evidence-collection.md` for detailed patterns.

**Automation priorities:**
1. Configuration exports from cloud providers and infrastructure
2. Access control lists and permission matrices
3. Log retention and monitoring dashboards
4. Vulnerability scan results and patch status
5. Training completion records
6. Incident response test results

**Artifact organization:**

```
evidence/
  {framework}/
    {control-id}/
      artifact-{date}.{ext}
      metadata.yaml           # source, collection method, timestamp
```

---

## Phase 4: Gap Analysis

Load `references/gap-analysis.md` for the full methodology.

For each framework requirement:
1. Map to existing controls (full, partial, or none)
2. Assess implementation effectiveness
3. Score the gap by risk impact and likelihood
4. Categorize as documentation, process, technology, or training gap
5. Prioritize based on risk score and remediation effort

---

## Phase 5: Remediation Planning

For each identified gap:

| Field | Content |
|-------|---------|
| Gap ID | Unique identifier |
| Framework Requirement | Specific clause or control |
| Current State | What exists today |
| Target State | What compliance requires |
| Remediation Action | Specific steps to close the gap |
| Owner | Responsible person/team |
| Priority | P0-P4 based on risk score |
| Timeline | Target completion date |
| Dependencies | Other gaps or actions this depends on |

---

## Phase 6: Reporting

Generate audit-ready documentation:

- **Executive summary**: Compliance posture, key risks, readiness score
- **Technical findings**: Detailed control assessment results
- **Risk matrix**: Heat map of gaps by severity and likelihood
- **Remediation roadmap**: Prioritized timeline with owners
- **Evidence package**: Organized artifacts indexed to controls
- **Compliance attestation**: Framework-specific certification readiness

---

## Phase 7: Continuous Monitoring

Establish ongoing compliance posture management:

- Configure automated scanning for drift detection
- Set alert thresholds for control degradation
- Schedule periodic re-assessment cadence
- Track remediation progress against timelines
- Maintain metric dashboards (control coverage, evidence freshness, audit readiness)

---

## Core Principles

1. **Evidence over assertion** — every compliance claim must be backed by verifiable artifacts
2. **Automate first** — manual evidence collection does not scale and introduces errors
3. **Risk-based prioritization** — address the highest-risk gaps first
4. **Continuous posture** — compliance is a state, not a one-time event
5. **Defense in depth** — layer controls so single-point failures do not cause non-compliance

## Anti-Patterns

- Treating compliance as a checkbox exercise without testing control effectiveness
- Collecting evidence manually when automation is available
- Ignoring gaps because "we've always done it this way"
- Waiting until audit season to gather evidence
- Conflating compliance with security (compliance is a subset)
- Skipping third-party/vendor compliance assessments

Overview

This skill provides systematic regulatory compliance auditing across GDPR, HIPAA, PCI DSS, SOC 2, and ISO frameworks with automated evidence collection, gap analysis, and remediation planning. It is designed to streamline assessments, prepare organizations for audits and certifications, and maintain continuous compliance posture. The skill emphasizes automation, risk-based prioritization, and evidence-backed findings.

How this skill works

The skill scopes applicable regulations and maps system data types and jurisdictions to frameworks, then inventories controls and analyzes data flows. It automates evidence collection (config exports, logs, training records), runs gap analysis with risk scoring, and produces remediation plans and audit-ready reports. Continuous monitoring features detect drift, surface control degradation, and track remediation progress.

When to use it

  • Preparing for external audits or certification (GDPR, HIPAA, PCI DSS, SOC 2, ISO 27001)
  • Conducting compliance assessments or periodic control reviews
  • Automating evidence collection and building an auditable artifact repository
  • Performing gap analysis and prioritizing remediation work
  • Evaluating vendor or third-party compliance posture

Best practices

  • Start by scoping data types, jurisdictions, and in-scope systems before testing controls
  • Automate evidence collection and store artifacts with metadata for traceability
  • Map every control to specific framework clauses and test effectiveness, not just existence
  • Score gaps by impact and likelihood to prioritize remediation by risk
  • Maintain continuous monitoring and scheduled re-assessments to prevent last-minute audit rushes

Example use cases

  • Run a full pre-audit assessment for ISO 27001 certification and generate an evidence package for auditors
  • Assess cloud infrastructure against PCI DSS controls, collect configuration exports, and identify missing protections
  • Perform a HIPAA readiness review: map PHI flows, review policies, and produce a prioritized remediation roadmap
  • Implement continuous monitoring to detect control drift and alert when evidence becomes stale
  • Evaluate an external vendor’s SOC 2 posture by mapping supplied artifacts to control requirements and scoring gaps

FAQ

Which frameworks are supported?

GDPR, HIPAA, PCI DSS, SOC 2, ISO 27001 (plus guidance for regional laws like CCPA/CPRA and frameworks such as NIST CSF).

How does evidence collection work?

Evidence collection automates exports (cloud configs, ACLs, logs, scan results, training records) and stores artifacts with metadata (source, timestamp, collection method) organized per framework and control.

Can this produce audit-ready reports?

Yes. It generates executive summaries, detailed technical findings, a risk matrix, remediation roadmaps, and an indexed evidence package ready for auditors.