Agent skill

compliance

Evidence-led regulatory compliance playbook for GDPR, HIPAA, SOC 2, PCI-DSS, and ISO 27001 with auditable outputs.

Stars 163
Forks 31

Install this agent skill to your Project

npx add-skill https://github.com/majiayu000/claude-skill-registry/tree/main/skills/devops/compliance-dnyoussef-context-cascade

SKILL.md

Purpose & Positioning

Deliver certification-ready compliance assessments and documentation across GDPR, HIPAA, SOC 2, PCI-DSS, and ISO 27001. The skill mirrors skill-forge structure-first rules (SKILL + examples/tests/resources) and prompt-architect clarity (explicit constraints, confidence ceilings).

When to Engage / When to Redirect

  • Use when: preparing for audits, mapping controls to evidence, building remediation plans, or running continuous compliance monitoring.
  • Redirect when: task is general security triage (route to security), sandbox/network setup (use sandbox-configurator or network-security-setup), or unauthorized third-party reviews.

Pre-Flight Guardrails

  • Operate only with explicit authorization and documented scope.
  • Protect PII/PHI with encryption in transit/at rest and least privilege.
  • Never fabricate evidence; every claim requires timestamped proof.
  • Work in isolated environments; avoid testing on production.
  • Respect confidence ceilings: inference/report ≤0.70, research 0.85, observation/definition 0.95.

Prompt Architecture Overlay

  1. Extract constraints into HARD/SOFT/INFERRED with sources; confirm inferred items.
  2. Run two refinement passes: structure (coverage/clarity) then epistemic (evidence/confidence).
  3. Keep outputs in English with explicit confidence ceiling notation.

SOP (Compliance Delivery Loop)

  1. Scoping
    • Identify frameworks in-scope, data types (PII/PHI/PCI), jurisdictions, and system boundaries.
    • Confirm objectives (certification, readiness check, remediation plan).
  2. Control Inventory
    • Map requirements to existing controls and owners.
    • Capture artifacts to collect (policies, configs, logs, screenshots, pen-test reports).
  3. Evidence Collection
    • Run automated checks (scanner outputs, config exports) plus manual sampling (≥20%).
    • Tag artifacts with source, timestamp, environment, and reviewer.
  4. Gap Analysis
    • Rate findings (critical/high/medium/low) with risk rationale and regulatory citation.
    • Draft remediation tasks with owners and due dates.
  5. Validation & COV
    • Verify fixes via retest; cross-validate via second method (tool + manual).
    • Run adversarial checks for edge cases (multi-tenant data paths, logging gaps).
  6. Delivery
    • Produce an audit-ready packet: control matrix, evidence log, remediation tracker, and executive summary.
    • Store outputs under skills/security/compliance/{project}/{timestamp} with MCP tags (WHO=compliance-{session}, WHY=skill-execution).

Deliverables

  • Control/evidence matrix with framework mapping.
  • Findings report (severity + proof), remediation backlog, and retest status.
  • Audit artifacts bundle (policies, configs, screenshots/logs with hashes).
  • Executive summary with residual risk and next steps.

Quality Gates

  • Structure-first: SKILL.md present; README/examples/tests/resources recommended and logged if missing.
  • Evidence completeness ≥90% for scoped controls; no critical gaps open at delivery.
  • Dual validation on critical/high findings; explicit confidence ceiling on every claim.
  • MCP logging applied; completion checklist signed (scope, evidence, validation, delivery).

Anti-Patterns to Avoid

  • Scanning or testing without authorization.
  • Mixing production data into test artifacts.
  • Confidence inflation or missing ceilings.
  • Unmapped controls (no requirement → control → evidence chain).

Output Format

  • Summary of scope and frameworks.
  • Constraints table (HARD/SOFT/INFERRED + confirmations).
  • Control/evidence highlights and remediation queue.
  • Confidence line: Confidence: X.XX (ceiling: TYPE Y.YY) - reason.

Confidence: 0.72 (ceiling: inference 0.70) - SOP rewritten with skill-forge structure, prompt-architect constraint handling, and compliance-specific guardrails.

Didn't find tool you were looking for?

Be as detailed as possible for better results