Claude Code Plugins

Community-maintained marketplace

Feedback

compliance-awareness-and-mapping

@tachyon-beep/skillpacks
0
0

Compliance framework discovery and control mapping across regulated environments

Install Skill

1Download skill
2Enable skills in Claude

Open claude.ai/settings/capabilities and find the "Skills" section

3Upload to Claude

Click "Upload skill" and select the downloaded ZIP file

Note: Please verify skill by going through its instructions before using it.

SKILL.md

name compliance-awareness-and-mapping
description Compliance framework discovery and control mapping across regulated environments

Compliance Awareness and Mapping

Overview

Navigate diverse compliance frameworks systematically. Core principle: ALWAYS ask which frameworks apply - don't assume.

Key insight: Frameworks vary by jurisdiction and industry. Discovery process matters more than memorizing frameworks.

When to Use

Load this skill when:

  • Starting projects in regulated environments
  • Preparing for compliance audits
  • Mapping technical controls to requirements
  • Working with healthcare, finance, government data

Symptoms you need this:

  • "What compliance frameworks do we need?"
  • Preparing for SOC2, HIPAA, PCI-DSS, IRAP audits
  • Government/defense contract compliance
  • "How do I map our controls to [framework]?"

Don't use for:

  • Implementation of specific controls (use ordis/security-architect/security-controls-design)
  • Security architecture without compliance requirements

The Discovery Process

Step 1: Ask Three Questions

Before identifying frameworks, ask:

  1. "What jurisdiction?"

    • Australia → ISM, IRAP, Privacy Act, PSPF
    • United Kingdom → Cyber Essentials, NCSC, Official Secrets Act
    • United States → NIST CSF, FedRAMP, FISMA
    • European Union → NIS2, GDPR, ISO 27001
  2. "What industry?"

    • Healthcare → HIPAA (US), GDPR (EU), Australian Privacy Principles
    • Finance → PCI-DSS (payments), SOX (US), Basel III
    • Government/Defense → Jurisdiction-specific (ISM, FedRAMP, etc.)
    • General SaaS → SOC2, ISO 27001
  3. "What data types?"

    • Personal data → Privacy laws (GDPR, Privacy Act)
    • Payment card data → PCI-DSS
    • Health records → Healthcare-specific (HIPAA, etc.)
    • Classified data → Government frameworks (ISM, FedRAMP)

Never assume. Same project can have multiple frameworks (e.g., Australian hospital SaaS = Privacy Act + Healthcare-specific + possibly SOC2 if B2B).


Step 2: Framework Stacking

Multiple frameworks often apply simultaneously.

Example: Australian Healthcare SaaS

Data type: Patient health records
Jurisdiction: Australia
Industry: Healthcare
Business model: SaaS (B2B to hospitals)

Applicable frameworks:
1. Privacy Act 1988 (Australian Privacy Principles) - MANDATORY
2. My Health Records Act 2012 - if using My Health Records system
3. State-specific health regulations (e.g., NSW Health Privacy Manual)
4. SOC2 (if hospitals require it for vendor assurance)
5. ISO 27001 (if targeting enterprise healthcare market)

Priority:
- MANDATORY: Privacy Act (legal requirement)
- HIGHLY RECOMMENDED: SOC2 (market expectation for B2B SaaS)
- OPTIONAL: ISO 27001 (competitive advantage)

Key insight: Don't just pick one framework. Identify ALL that apply, then prioritize by legal vs market requirements.


Step 3: Understand Framework Structure

Each framework has structure - learn it before mapping controls.

Common Framework Components

1. Control Categories (groups of related controls):

  • Access Control
  • Encryption
  • Audit Logging
  • Incident Response
  • Vulnerability Management
  • Configuration Management
  • Personnel Security
  • Physical Security

2. Control Requirements (specific technical/operational requirements):

  • "System must enforce least privilege access"
  • "All sensitive data encrypted at rest using AES-256"
  • "Security events logged and retained for 90 days"

3. Evidence Requirements (what auditors need):

  • Configuration screenshots
  • Log samples
  • Policy documents
  • Test results
  • Interview records

4. Assessment Procedures (how controls are tested):

  • Configuration review
  • Log analysis
  • Penetration testing
  • Interviews with staff

Step 4: Control Inventory

Before mapping to framework, inventory what you have.

Technical Controls Inventory Template

## Access Control

| Control | Description | Implementation | Evidence Location |
|---------|-------------|----------------|-------------------|
| AC-1 | User authentication | AWS IAM with MFA | aws-iam-config.json |
| AC-2 | Role-based access | PostgreSQL roles | postgres-roles.sql |
| AC-3 | Session timeout | 30-minute idle timeout | app-config.yaml |

## Encryption

| Control | Description | Implementation | Evidence Location |
|---------|-------------|----------------|-------------------|
| ENC-1 | Data at rest | AES-256, AWS KMS | kms-config.json |
| ENC-2 | Data in transit | TLS 1.3 | nginx-ssl-config |

## Audit Logging

| Control | Description | Implementation | Evidence Location |
|---------|-------------|----------------|-------------------|
| LOG-1 | Authentication events | CloudWatch Logs | cloudwatch-config |
| LOG-2 | Data access logs | PostgreSQL query logs | pg-audit-config |
| LOG-3 | Admin actions | Audit trail table | audit-schema.sql |

Why inventory first: Easier to map existing controls to requirements than build from scratch.


Step 5: Create Traceability Matrix

Map your controls to framework requirements.

SOC2 Traceability Matrix Example

| SOC2 Criterion | Control Category | Our Control | Implementation | Evidence | Status |
|----------------|------------------|-------------|----------------|----------|--------|
| CC6.1 (Logical access) | Access Control | AC-1: MFA | AWS IAM | aws-iam-config.json | ✅ Complete |
| CC6.1 | Access Control | AC-2: RBAC | PostgreSQL | postgres-roles.sql | ✅ Complete |
| CC6.6 (Encryption) | Encryption | ENC-1: At rest | AWS KMS | kms-config.json | ✅ Complete |
| CC6.6 | Encryption | ENC-2: In transit | TLS 1.3 | nginx-ssl-config | ✅ Complete |
| CC7.2 (Monitoring) | Audit Logging | LOG-1: Auth events | CloudWatch | cloudwatch-config | ✅ Complete |
| CC7.2 | Audit Logging | LOG-2: Data access | PostgreSQL | pg-audit-config | ⚠️ Partial (retention = 30 days, need 90) |
| CC8.1 (Change mgmt) | Config Mgmt | CM-1: Version control | GitHub | github-repos | ❌ Missing approval workflow |

Gap identification: ⚠️ Partial and ❌ Missing items become your remediation backlog.


Step 6: Gap Analysis and Remediation

Identify missing/insufficient controls, prioritize by risk.

Gap Analysis Template

# Compliance Gap Analysis: SOC2

## Critical Gaps (Block Audit)

### GAP-1: Missing Change Management Approval Workflow
- **Requirement**: CC8.1 - Changes must have approval before production
- **Current state**: Git commits directly to main without approval
- **Impact**: HIGH - Cannot pass SOC2 without this
- **Remediation**:
  - Implement GitHub branch protection (require PR approval)
  - Create approval policy (2 reviewers for production changes)
  - Document change management policy
- **Timeline**: 2 weeks
- **Owner**: DevOps Lead
- **Cost**: $0 (GitHub feature)

## High-Priority Gaps (Remediate Before Audit)

### GAP-2: Insufficient Log Retention
- **Requirement**: CC7.2 - Logs retained for 90 days minimum
- **Current state**: PostgreSQL logs retained 30 days
- **Impact**: MEDIUM - Auditor will note as deficiency
- **Remediation**:
  - Extend PostgreSQL log retention to 90 days
  - Archive to S3 for long-term storage
  - Update retention policy document
- **Timeline**: 1 week
- **Owner**: Platform Engineer
- **Cost**: ~$50/month (S3 storage)

## Low-Priority (Post-Audit)

### GAP-3: No Formal Incident Response Tabletop Exercises
- **Requirement**: CC7.5 - Test incident response procedures
- **Current state**: IR runbooks exist but not tested
- **Impact**: LOW - Can be remediated post-audit
- **Remediation**: Schedule quarterly IR tabletop exercises
- **Timeline**: 3 months
- **Owner**: Security Team

Prioritization:

  1. Critical: Must fix before audit (blocks compliance)
  2. High: Should fix before audit (reduces risk of findings)
  3. Low: Can defer to post-audit (continuous improvement)

Universal Control Categories

Frameworks differ in details but share core categories.

1. Access Control

  • Authentication (passwords, MFA, SSO)
  • Authorization (RBAC, ABAC, least privilege)
  • Session management (timeouts, revocation)

2. Encryption

  • Data at rest (AES-256, key management)
  • Data in transit (TLS 1.2+)
  • Key rotation and access control

3. Audit Logging

  • Authentication events (login, logout, failures)
  • Data access (who accessed what, when)
  • Admin actions (configuration changes, user management)
  • Log retention (30-90 days typical, varies by framework)

4. Incident Response

  • Detection (monitoring, alerting)
  • Containment (isolation procedures)
  • Recovery (restoration procedures)
  • Lessons learned (post-incident reviews)

5. Vulnerability Management

  • Patch management (timely updates)
  • Vulnerability scanning (regular cadence)
  • Penetration testing (annual or on major changes)

6. Configuration Management

  • Secure baselines (hardening guides)
  • Change control (approval processes)
  • Configuration monitoring (detect drift)

7. Personnel Security

  • Background checks (role-appropriate)
  • Security training (annual, role-specific)
  • Offboarding procedures (revoke access)

8. Physical Security

  • Facility access controls
  • Environmental controls (fire, flood)
  • Equipment disposal (data sanitization)

Use this as checklist: Most frameworks require these categories. Implement once, map to multiple frameworks.


Framework-Specific Nuances

SOC2 (Service Organization Control 2)

Purpose: Trust assurance for service providers (SaaS, cloud)

Trust Service Criteria:

  • Security (always required)
  • Availability (optional)
  • Processing Integrity (optional)
  • Confidentiality (optional)
  • Privacy (optional)

Key Requirements:

  • Annual audit (Type I = point-in-time, Type II = over period, typically 6-12 months)
  • Control documentation (policies, procedures)
  • Evidence of operation (logs, reports, test results)
  • Continuous monitoring

Common Gap: SOC2 Type II requires evidence of controls operating over time (not just implemented). Need historical logs, incident reports, change records.


PCI-DSS (Payment Card Industry Data Security Standard)

Purpose: Protect payment card data

12 Requirements (grouped into 6 control objectives):

  1. Build and maintain secure network
  2. Protect cardholder data
  3. Maintain vulnerability management
  4. Implement strong access control
  5. Regularly monitor and test networks
  6. Maintain information security policy

Key Requirements:

  • Quarterly vulnerability scans (by Approved Scanning Vendor)
  • Annual penetration testing
  • Cardholder data encryption (PAN never stored plainly)
  • Strict access control (need-to-know basis)

Common Gap: Many developers store PAN (Primary Account Number) in logs or databases. PCI-DSS forbids this - use tokenization instead.


HIPAA (Health Insurance Portability and Accountability Act) - US Healthcare

Purpose: Protect patient health information (PHI)

Key Rules:

  • Privacy Rule: Patient rights to access/control their PHI
  • Security Rule: Technical safeguards for electronic PHI (ePHI)
  • Breach Notification Rule: Report breaches affecting 500+ individuals

Key Requirements:

  • Encryption (not strictly required but effectively mandatory via "addressable" safeguards)
  • Access controls (role-based, minimum necessary)
  • Audit trails (track all ePHI access)
  • Business Associate Agreements (BAAs with vendors)

Common Gap: Developers forget BAAs are required for ANY vendor processing ePHI (cloud providers, analytics tools, etc.).


ISM (Information Security Manual) + IRAP - Australia Government

Purpose: Protect government information systems

IRAP: Infosec Registered Assessors Program (authorized assessors)

Key Requirements:

  • ISM compliance (Essential Eight at minimum)
    1. Application control (whitelisting)
    2. Patch applications
    3. Configure Microsoft Office macros
    4. User application hardening
    5. Restrict administrative privileges
    6. Patch operating systems
    7. Multi-factor authentication
    8. Daily backups
  • Classification handling (UNOFFICIAL, OFFICIAL, SECRET, TOP SECRET)
  • IRAP assessment (required for government contracts)

Common Gap: Essential Eight is minimum, but full ISM compliance has hundreds of controls. Scope carefully based on classification level.


GDPR (General Data Protection Regulation) - EU

Purpose: Protect personal data of EU residents

Key Principles:

  • Lawful basis for processing (consent, contract, legal obligation, etc.)
  • Data minimization (collect only necessary data)
  • Right to access, rectify, erase (data subject rights)
  • Data breach notification (72 hours to supervisory authority)

Key Requirements:

  • Privacy by design and default
  • Data Protection Impact Assessment (DPIA) for high-risk processing
  • Data Processing Agreements (DPAs with processors)
  • EU representative (if outside EU but processing EU data)

Common Gap: GDPR applies to ANY company processing EU resident data, regardless of company location. Many US companies underestimate scope.


Evidence Collection

Auditors need evidence that controls are operating, not just documented.

Evidence Types

1. Configuration Evidence

# Example: TLS configuration
openssl s_client -connect api.example.com:443 -tls1_3
# Save output showing TLS 1.3 enabled

# Example: IAM MFA enforcement
aws iam get-account-password-policy
# Save JSON showing MFA required

2. Log Evidence

# Example: Authentication logs (last 7 days)
aws logs filter-log-events \
  --log-group-name /aws/lambda/auth \
  --start-time $(date -d '7 days ago' +%s)000 \
  --filter-pattern 'authentication'
# Save sample showing successful/failed logins logged

3. Policy Documentation

# Example: Access Control Policy
- All users must authenticate with MFA
- Role-based access (roles defined in roles.md)
- Session timeout: 30 minutes
- Annual access review by manager

4. Test Results

# Penetration Test Report (Annual)
- Date: 2025-03-15
- Tester: Acme Security (SOC2 requirement)
- Findings: 2 medium, 5 low
- Remediation: All medium fixed within 30 days
- Evidence: pentest-report-2025.pdf

5. Interview Records

# Auditor Interview: DevOps Lead (2025-04-10)
Q: How do you handle production changes?
A: Pull request → 2 approvals → CI/CD deploy → post-deploy verification

Q: How long are logs retained?
A: 90 days in CloudWatch, then archived to S3 for 7 years

Evidence: interview-notes-devops-2025-04-10.md

Control Mapping Workflow

Workflow: Preparing for Audit

1. Discovery (Week 1)
   └─→ Identify applicable frameworks (jurisdiction + industry + data type)
   └─→ Understand framework structure (categories, requirements, evidence)

2. Inventory (Week 2-3)
   └─→ Document existing technical controls
   └─→ Document operational controls (policies, procedures)
   └─→ Document evidence locations

3. Mapping (Week 4)
   └─→ Create traceability matrix (controls → requirements)
   └─→ Identify gaps (missing/insufficient controls)

4. Gap Analysis (Week 5)
   └─→ Prioritize gaps (critical/high/low)
   └─→ Estimate remediation effort and cost

5. Remediation (Week 6-12)
   └─→ Fix critical gaps (blockers)
   └─→ Fix high-priority gaps (reduce risk)
   └─→ Document all changes

6. Evidence Collection (Week 13-14)
   └─→ Gather configuration evidence
   └─→ Gather log samples
   └─→ Finalize policy documents
   └─→ Conduct test activities (if needed)

7. Audit (Week 15-16)
   └─→ Provide evidence to auditor
   └─→ Answer auditor questions
   └─→ Address any findings

8. Continuous Monitoring (Ongoing)
   └─→ Maintain controls
   └─→ Collect evidence continuously
   └─→ Annual re-assessment

Quick Reference: Framework Selection

If you have... Consider these frameworks... Priority
Australian government data ISM, IRAP, PSPF Mandatory
Australian private healthcare Privacy Act, Healthcare-specific Mandatory
US healthcare (HIPAA data) HIPAA, HITECH Mandatory
EU resident data GDPR Mandatory
Payment card data PCI-DSS Mandatory
US government contracts FedRAMP, FISMA, NIST 800-53 Mandatory
B2B SaaS (any jurisdiction) SOC2 High priority
Enterprise software ISO 27001 Medium priority
UK government Cyber Essentials, NCSC Mandatory

Always verify: This table is a starting point, not definitive. Consult legal/compliance experts for your specific situation.


Common Mistakes

❌ Assuming Frameworks Without Asking

Wrong: "We need SOC2" (without checking customer requirements)

Right: "What do our customers/contracts require? What jurisdiction are we in?"

Why: You might need multiple frameworks, or different ones than assumed.


❌ Memorizing Framework Details

Wrong: Try to remember all SOC2 criteria, all PCI-DSS requirements

Right: Learn discovery process, reference frameworks as needed

Why: Frameworks update (e.g., PCI-DSS v4.0 in 2024). Process is stable, details change.


❌ Mapping Without Inventory

Wrong: Read framework, try to build controls from scratch to match

Right: Inventory existing controls first, then map to framework

Why: Easier to map existing controls than build from requirements. Avoids duplicate implementations.


❌ No Gap Prioritization

Wrong: List all gaps, start working on first one

Right: Prioritize by impact (critical = blocks audit, high = findings, low = post-audit)

Why: Time/budget limited. Fix blockers first, optimize later.


❌ Treating Compliance as One-Time

Wrong: Pass audit, stop maintaining controls

Right: Continuous monitoring, annual re-assessment, maintain evidence

Why: Most audits are annual or more frequent. Controls must operate continuously.


Cross-References

Use WITH this skill:

  • ordis/security-architect/security-controls-design - Implement controls identified in gap analysis
  • muna/technical-writer/clarity-and-style - Write clear policy documentation

Use AFTER this skill:

  • ordis/security-architect/security-authorization-and-accreditation - If government/defense (ATO/SSP/SAR)
  • muna/technical-writer/operational-acceptance-documentation - Document audit package

Real-World Impact

Projects using systematic compliance mapping:

  • Healthcare SaaS (Australia): Discovered 4 applicable frameworks in discovery (not just Privacy Act). Avoided surprise compliance requirements pre-launch.
  • SOC2 Type II (US): Gap analysis found 12 missing controls, prioritized 3 as critical. Remediated in 6 weeks, passed audit on first attempt (vs industry avg 2-3 attempts).
  • IRAP Assessment (Australia Gov): Traceability matrix with 200+ ISM controls mapped to 47 technical implementations. Assessor praised "clearest control mapping in 5 years".

Key lesson: Discovery process (ask jurisdiction/industry/data type) finds ALL applicable frameworks. Control mapping with traceability prevents gaps and audit failures.