regulatory-compliance
Use this skill when preparing for SOC 2, HIPAA, or PCI-DSS compliance, conducting audits, or implementing security controls. Triggers on SOC 2, HIPAA, PCI-DSS, compliance audit, security controls, risk assessment, control frameworks, and any task requiring regulatory compliance planning or audit preparation.
operations compliancesoc2hipaapci-dssauditcontrolsWhat is regulatory-compliance?
Use this skill when preparing for SOC 2, HIPAA, or PCI-DSS compliance, conducting audits, or implementing security controls. Triggers on SOC 2, HIPAA, PCI-DSS, compliance audit, security controls, risk assessment, control frameworks, and any task requiring regulatory compliance planning or audit preparation.
regulatory-compliance
regulatory-compliance is a production-ready AI agent skill for claude-code, gemini-cli, openai-codex. Preparing for SOC 2, HIPAA, or PCI-DSS compliance, conducting audits, or implementing security controls.
Quick Facts
| Field | Value |
|---|---|
| Category | operations |
| Version | 0.1.0 |
| Platforms | claude-code, gemini-cli, openai-codex |
| License | MIT |
How to Install
- Make sure you have Node.js installed on your machine.
- Run the following command in your terminal:
npx skills add AbsolutelySkilled/AbsolutelySkilled --skill regulatory-compliance- The regulatory-compliance skill is now available in your AI coding agent (Claude Code, Gemini CLI, OpenAI Codex, etc.).
Overview
A practitioner's framework for achieving and maintaining regulatory compliance. This skill covers SOC 2, HIPAA, and PCI-DSS - the three frameworks most commonly demanded by enterprise customers - with an emphasis on how to build a sustainable compliance program, not just pass a one-time audit.
Tags
compliance soc2 hipaa pci-dss audit controls
Platforms
- claude-code
- gemini-cli
- openai-codex
Related Skills
Pair regulatory-compliance with these complementary skills:
Frequently Asked Questions
What is regulatory-compliance?
Use this skill when preparing for SOC 2, HIPAA, or PCI-DSS compliance, conducting audits, or implementing security controls. Triggers on SOC 2, HIPAA, PCI-DSS, compliance audit, security controls, risk assessment, control frameworks, and any task requiring regulatory compliance planning or audit preparation.
How do I install regulatory-compliance?
Run npx skills add AbsolutelySkilled/AbsolutelySkilled --skill regulatory-compliance in your terminal. The skill will be immediately available in your AI coding agent.
What AI agents support regulatory-compliance?
This skill works with claude-code, gemini-cli, openai-codex. Install it once and use it across any supported AI coding agent.
Maintainers
Generated from AbsolutelySkilled
SKILL.md
Regulatory Compliance
A practitioner's framework for achieving and maintaining regulatory compliance. This skill covers SOC 2, HIPAA, and PCI-DSS - the three frameworks most commonly demanded by enterprise customers - with an emphasis on how to build a sustainable compliance program, not just pass a one-time audit.
When to use this skill
Trigger this skill when the user:
- Prepares for a SOC 2 Type I or Type II audit
- Implements HIPAA technical, administrative, or physical safeguards
- Works toward PCI-DSS compliance for payment card environments
- Conducts a risk assessment or gap analysis
- Builds or updates a controls matrix
- Automates evidence collection for ongoing compliance
- Manages an active audit with an external auditor
- Defines policies for data handling, access control, or incident response
Do NOT trigger this skill for:
- General security hardening not tied to a specific framework (use
backend-engineeringsecurity references instead) - Legal or attorney-client questions - always refer to qualified legal counsel for jurisdiction-specific obligations
Key principles
Compliance is continuous, not a project - Passing an audit is a snapshot in time. The goal is a living program with controls that operate daily. Scrambling for evidence two weeks before an audit means your controls are theater, not real.
Automate evidence collection - Manual evidence collection does not scale and creates audit fatigue. Instrument your systems to produce compliance artifacts automatically: access logs, change records, configuration exports, and training completions should all be captured without human intervention.
Controls should serve the business - A control that creates so much friction that engineers route around it is worse than no control. Design controls that are least-privilege without being obstructive. If teams hate a control, find a more elegant implementation, not an exception.
Start with the framework that customers demand - Do not attempt all three frameworks simultaneously. Survey your enterprise customers and prospects. SOC 2 unblocks most B2B SaaS deals. HIPAA is required the moment you touch protected health information. PCI-DSS is mandatory if you store, process, or transmit cardholder data. Pick one, reach Type II, then expand.
Gap analysis before implementation - Never start writing policies or deploying tools without first mapping your current state to the required controls. A gap analysis reveals which controls are already satisfied (often 30-40%), which need tooling, and which need process changes. Skipping it wastes months building things you already have.
Core concepts
Control frameworks
A control framework is a structured set of requirements that an organization must satisfy to meet a compliance standard. The three major frameworks covered here:
| Framework | Owner | Core focus | Audit type | Who needs it |
|---|---|---|---|---|
| SOC 2 | AICPA | Trust Services Criteria (security, availability, confidentiality, privacy, processing integrity) | Third-party CPA audit | B2B SaaS, cloud services |
| HIPAA | U.S. HHS | Protected health information (PHI) privacy and security | Self-attestation + OCR enforcement | Healthcare, covered entities, business associates |
| PCI-DSS | PCI Security Standards Council | Cardholder data environment (CDE) protection | QSA audit (Level 1) or SAQ (Level 2-4) | Any entity storing/processing/transmitting card data |
Evidence types
Auditors require evidence that controls are designed correctly (Type I) and operating effectively over time (Type II). Evidence categories:
- Configuration exports - Screenshots or exports showing system settings (MFA enabled, encryption at rest, logging enabled)
- Access reviews - Periodic exports showing who has access to what, reviewed and signed off by a manager
- Policy documents - Written policies with version history and employee acknowledgment records
- Training records - Completion logs for security awareness and role-specific training
- Incident records - Log of security incidents with detection, response, and closure
- Vendor reviews - SOC 2 reports or security questionnaires for third-party vendors
- Change management records - Git history, PR approvals, deploy logs showing change control processes
Audit process
Gap Analysis -> Remediation -> Readiness Review -> Audit -> Report
| | | | |
4-8 weeks 3-12 months 4-6 weeks 4-8 weeks 2-4 weeks
Map controls Build controls Mock audit Evidence Final report
to current that are with auditor collection issued
state missing (optional)Type I audit: point-in-time snapshot that controls are designed appropriately. Type II audit: 6-12 month observation period proving controls operate continuously. Always target Type II - enterprise procurement teams reject Type I as insufficient.
Risk assessment
Risk assessment is the foundation of every compliance framework. It identifies threats to your systems and data, evaluates their likelihood and impact, and drives the prioritization of controls.
Risk score formula: Risk = Likelihood (1-5) x Impact (1-5)
| Score | Action |
|---|---|
| 20-25 | Critical - immediate remediation required |
| 12-19 | High - remediate within 30 days |
| 6-11 | Medium - remediate within 90 days |
| 1-5 | Low - accept with documented rationale or remediate in backlog |
Common tasks
Prepare for SOC 2 Type II
A realistic 12-18 month roadmap for a startup with no prior compliance program:
Months 1-2: Gap analysis and scoping
- Define the system boundary (what systems are in scope)
- Map all Trust Services Criteria to existing controls
- Identify gaps and assign remediation owners
- Select a compliance platform (Vanta, Drata, Secureframe, or manual)
Months 3-8: Remediation
- Implement missing technical controls (MFA everywhere, encryption at rest and in transit, logging and monitoring, vulnerability scanning, access reviews)
- Write required policies (security, access control, incident response, business continuity, vendor management, change management)
- Run employee security awareness training and document completion
- Conduct vendor reviews for all subprocessors handling customer data
Months 9-10: Observation period start
- All controls must be operating; the clock starts for the Type II period
- Automate evidence collection for operating controls
- Schedule quarterly access reviews and vulnerability scans
Months 11-12: Readiness and audit
- Conduct internal readiness review; fix any findings
- Engage auditor for fieldwork
- Respond to auditor requests within agreed SLAs
- Receive SOC 2 Type II report (6-month or 12-month observation period)
Choose the 6-month observation period for your first report. You can expand to 12-month on renewal. A 6-month report unblocks deals faster.
Implement HIPAA safeguards
HIPAA requires three categories of safeguards for covered entities and business associates handling PHI:
Administrative safeguards (45 CFR 164.308)
- Conduct and document a security risk analysis annually
- Designate a Security Officer responsible for HIPAA compliance
- Implement workforce training with documented completion records
- Establish sanction policies for employees who violate HIPAA
- Define access authorization and management procedures
Physical safeguards (45 CFR 164.310)
- Control physical access to systems that contain PHI
- Implement workstation use and security policies
- Establish device and media controls (encryption, disposal procedures)
Technical safeguards (45 CFR 164.312)
- Unique user identification for all PHI access (no shared accounts)
- Automatic logoff after period of inactivity
- Encryption and decryption of PHI at rest and in transit
- Audit controls: hardware, software, and procedural mechanisms to log access to PHI
- Integrity controls: detect unauthorized PHI alteration or destruction
- Transmission security: TLS 1.2+ for all PHI in transit
Minimum Necessary standard - Access to PHI must be limited to the minimum necessary to perform a job function. Implement RBAC and log all PHI access.
Achieve PCI-DSS compliance
PCI-DSS v4.0 has 12 requirements organized around the cardholder data environment:
| Requirement | Focus | Key controls |
|---|---|---|
| 1-2 | Network security | Segmented CDE network, firewall rules, no defaults |
| 3-4 | Data protection | Do not store SAD; encrypt PAN at rest and in transit |
| 5-6 | Vulnerability management | Anti-malware, secure development, patching SLA |
| 7-8 | Access control | Need-to-know access, MFA for CDE access, unique IDs |
| 9 | Physical security | Physical access controls for CDE hardware |
| 10-11 | Monitoring and testing | Log all CDE access, quarterly scans, annual pen test |
| 12 | Policy | Security policy, incident response plan, vendor management |
The best PCI-DSS strategy is reducing scope. Use a PCI-compliant payment processor (Stripe, Braintree) with iframe/redirect tokenization. If cardholder data never touches your servers, you qualify for SAQ A (the simplest self-assessment questionnaire) rather than a full QSA audit.
Conduct a risk assessment
Follow NIST SP 800-30 or ISO 27005 for a defensible methodology:
- Identify assets - List all systems, data stores, and third-party services that store or process regulated data
- Identify threats - For each asset, enumerate threat actors (external attacker, malicious insider, accidental disclosure) and threat events (data breach, ransomware, misconfiguration)
- Identify vulnerabilities - What weaknesses could a threat exploit? (Unpatched software, weak passwords, no MFA, overly broad access)
- Calculate risk - Likelihood x Impact for each threat/vulnerability pair
- Identify controls - Existing controls that reduce likelihood or impact; proposed controls for unacceptable residual risk
- Document and accept - Risk owner signs off on residual risk. Risk register is reviewed annually and after significant changes
Build a controls matrix
A controls matrix maps each framework requirement to:
- The control (what you do)
- The control owner (who is responsible)
- The evidence type (what proves it)
- The evidence location (where to find it)
- The review frequency (how often it is checked)
See references/controls-matrix.md for a complete SOC 2 Trust Services Criteria
controls matrix you can adapt.
Automate compliance monitoring
Manual compliance creates point-in-time snapshots that drift. Automate:
| Evidence type | Automation approach |
|---|---|
| MFA enrollment | Query IdP API (Okta, Google Workspace) on schedule; alert on non-enrolled users |
| Access reviews | Export IAM group memberships quarterly; route to manager for sign-off via workflow |
| Vulnerability scans | Run Trivy or Snyk in CI; export results to compliance platform |
| Patch status | Query endpoint management API (Jamf, Intune); flag overdue patches |
| Security training | Pull completion data from training platform API |
| Change management | Git PR merge log automatically satisfies change control evidence |
| Logging enabled | IaC enforces CloudTrail/audit logging; drift detected by policy-as-code |
Compliance platforms like Vanta, Drata, and Secureframe automate most of this via integrations. Evaluate whether the platform cost (typically $15k-$40k/year) is justified by the hours saved vs. manual evidence collection.
Manage the audit process
A well-run audit avoids surprises. Follow this timeline:
T-8 weeks: Auditor kickoff
- Agree on scope, observation period dates, and fieldwork schedule
- Share the controls matrix and request the evidence request list (PBC list)
- Assign an internal point of contact for auditor questions
T-4 weeks: Evidence preparation
- Collect all requested evidence; organize by control number
- Review for gaps or anomalies before submission
- Do not submit evidence you have not reviewed
T-2 weeks: Fieldwork
- Respond to auditor questions within 24-48 hours
- Track open items in a shared log
- Escalate blockers immediately - do not let items age
T-0: Report delivery
- Review draft report carefully for factual errors before it is finalized
- Exceptions (qualified opinions) are negotiable if the evidence was misunderstood
- Attach a management response to any exceptions explaining remediation plans
An exception in a SOC 2 report is not automatically a deal-breaker. Customers read the management response. A clear remediation timeline with evidence of progress is often acceptable.
Anti-patterns
| Anti-pattern | Why it fails | What to do instead |
|---|---|---|
| Treating compliance as a one-time project | Controls decay, evidence gaps appear, audit fails or findings increase year-over-year | Build a continuous program with automated evidence and quarterly reviews |
| Scope creep - putting everything in scope | Larger scope = more controls = more cost and audit time | Define the tightest defensible scope; use network segmentation to exclude non-regulated systems |
| Writing policies nobody reads or follows | Policies without enforcement are paper compliance that auditors see through | Tie every policy to a technical control or an automated check; require annual acknowledgment |
| Buying a compliance platform before a gap analysis | Platform integrations cover generic controls; custom controls still need manual work | Complete the gap analysis first; then evaluate platforms against your specific control gaps |
| Using shared accounts to access regulated systems | Violates individual accountability requirements in every major framework | Enforce unique user IDs at the IdP level; fail pipelines that use shared credentials |
| Deferring the risk assessment until the last month | Risk assessment drives control selection; doing it late means controls may not address real risks | Complete risk assessment in the first gap analysis phase; repeat annually |
Gotchas
Starting SOC 2 Type II observation period before all controls operate - The observation clock starts when controls are running, not when you decide to pursue SOC 2. Auditors verify operating effectiveness over the claimed period. Any control that was not operating at the start of the period creates a gap finding. Don't declare the observation period started until every control is actually in place.
PCI-DSS scope assumed to be narrow before scoping exercise - Teams often assume they're out of scope because they "don't store card numbers." But processing or transmitting card data, or being on the same network segment as systems that do, puts you in scope. Conduct formal scope definition with a QSA before building any compliance program assumptions.
Compliance platform purchased before gap analysis - Vanta and Drata automate evidence for generic controls but cannot replace custom controls specific to your architecture. Buying the platform before knowing your gaps means paying for integrations that don't cover your actual exposures.
Exception in SOC 2 report treated as a deal-breaker - A qualified opinion with a management response showing a clear remediation plan is often acceptable to enterprise procurement. The response matters as much as the exception. Draft the management response carefully and include a concrete timeline with evidence of progress.
Risk assessment done once and never updated - A static risk assessment taken at the start of a compliance program becomes fiction within 6 months as systems change. Schedule annual reviews and trigger an unscheduled review after any significant architecture change, acquisition, or data classification change.
References
For detailed implementation guidance, read the relevant file from references/:
references/controls-matrix.md- SOC 2 Trust Services Criteria mapped to controls, evidence types, and review frequencies
References
controls-matrix.md
SOC 2 Controls Matrix
SOC 2 Trust Services Criteria (TSC) mapped to common controls, evidence types, owners, and review frequencies. Based on AICPA TSC 2017 (updated). Adapt column values to match your environment.
This matrix covers the Security (CC) criteria, which are required for all SOC 2 reports. Availability (A), Confidentiality (C), Processing Integrity (PI), and Privacy (P) criteria are additive if included in your audit scope.
How to use this matrix
- Copy this matrix into a spreadsheet (one row per control)
- Fill in Your Control with how your organization satisfies the requirement
- Fill in Evidence Location with the actual path, URL, or system
- Assign a Control Owner - the person accountable for operating the control
- Confirm Review Frequency is met and scheduled
- Share with your auditor as the control-mapping artifact (often called the RCM - Risk and Controls Matrix)
Common Criteria (CC) - Security
CC1: Control Environment
| Criteria ID | Requirement Summary | Control Type | Example Control | Evidence Type | Review Frequency |
|---|---|---|---|---|---|
| CC1.1 | Board/management demonstrates commitment to integrity and ethical values | Administrative | Code of conduct policy acknowledged annually by all employees | Policy + acknowledgment records | Annual |
| CC1.2 | Board oversees internal controls system | Administrative | Security committee charter; quarterly security reviews with leadership | Meeting minutes | Quarterly |
| CC1.3 | Management establishes structure and reporting lines | Administrative | Org chart with defined security ownership; RACI for security functions | Org chart + job descriptions | Annual |
| CC1.4 | Competent individuals are committed to compliance | Administrative | Security awareness training completion records | Training completion log | Annual (+ on hire) |
| CC1.5 | Accountability is enforced | Administrative | Documented sanctions policy; HR records of policy enforcement actions | Sanctions policy | Annual |
CC2: Communication and Information
| Criteria ID | Requirement Summary | Control Type | Example Control | Evidence Type | Review Frequency |
|---|---|---|---|---|---|
| CC2.1 | Entity obtains relevant quality information | Operational | Threat intelligence feeds; security mailing lists subscribed | Subscription records | Ongoing |
| CC2.2 | Internal communication supports control functioning | Administrative | Security policies distributed to all staff; intranet publication | Policy distribution records + acknowledgments | Annual |
| CC2.3 | Communication with external parties occurs | Administrative | Privacy policy published; responsible disclosure policy; vendor agreements with security terms | Policy documents + vendor contracts | Annual |
CC3: Risk Assessment
| Criteria ID | Requirement Summary | Control Type | Example Control | Evidence Type | Review Frequency |
|---|---|---|---|---|---|
| CC3.1 | Risk assessment objectives are specified | Administrative | Documented risk assessment methodology aligned to NIST SP 800-30 or ISO 27005 | Risk assessment methodology doc | Annual |
| CC3.2 | Risk identification and analysis | Administrative | Completed risk register with threat actors, vulnerabilities, likelihood, impact scores | Risk register + scoring documentation | Annual + after major changes |
| CC3.3 | Fraud risk is considered | Administrative | Risk register includes fraud scenarios (insider theft, account takeover, data manipulation) | Risk register | Annual |
| CC3.4 | Changes affecting internal controls are identified | Administrative | Change management process that triggers risk re-assessment for significant changes | Change log + impact assessment records | Per significant change |
CC4: Monitoring Activities
| Criteria ID | Requirement Summary | Control Type | Example Control | Evidence Type | Review Frequency |
|---|---|---|---|---|---|
| CC4.1 | Controls are monitored | Technical + Operational | Automated monitoring alerts; control effectiveness dashboards in compliance platform | Alert configurations + incident log | Ongoing |
| CC4.2 | Deficiencies are communicated and corrected | Administrative | Issue tracking for control deficiencies; SLA for remediation by risk level | Deficiency log + remediation records | Per deficiency |
CC5: Control Activities
| Criteria ID | Requirement Summary | Control Type | Example Control | Evidence Type | Review Frequency |
|---|---|---|---|---|---|
| CC5.1 | Controls address risk mitigation | Administrative | Controls mapped to risk register entries; residual risk documented | Risk register + controls mapping | Annual |
| CC5.2 | Technology controls are implemented | Technical | IaC enforces required configurations; policy-as-code detects drift | IaC repo + policy scan results | Continuous |
| CC5.3 | Policies and procedures are deployed | Administrative | All policies in version-controlled policy management system with approval workflow | Policy version history + approval records | Annual review cycle |
CC6: Logical and Physical Access Controls
| Criteria ID | Requirement Summary | Control Type | Example Control | Evidence Type | Review Frequency |
|---|---|---|---|---|---|
| CC6.1 | Logical access to assets is managed | Technical | MFA enforced for all systems via IdP; SSO for all cloud services | IdP MFA enforcement config + user export | Quarterly |
| CC6.2 | New access is provisioned based on authorization | Administrative + Technical | Access request workflow with manager approval before provisioning; JIRA/ServiceNow tickets | Access request records | Per provisioning event |
| CC6.3 | Access is reviewed and removed | Administrative | Quarterly access reviews; off-boarding checklist with access revocation within 24h | Access review records + off-boarding tickets | Quarterly |
| CC6.4 | Physical access is managed | Physical | Badge access logs for data center / office; visitor log | Badge access export + visitor log | Quarterly |
| CC6.5 | Logical access is removed when no longer needed | Technical | Automated de-provisioning on HR termination trigger; IdP deactivation | Termination records cross-referenced with IdP | Per termination |
| CC6.6 | Logical access to external systems is managed | Administrative | Vendor inventory with access levels; annual vendor access review | Vendor register + access review records | Annual |
| CC6.7 | User authentication requires multiple factors | Technical | MFA enforced at IdP level for all users; hardware key required for privileged access | IdP policy screenshot + MFA enrollment export | Quarterly |
| CC6.8 | Infrastructure is protected from malware | Technical | EDR agent deployed on all endpoints; server anti-malware policies enforced | EDR coverage report; policy export | Monthly |
CC7: System Operations
| Criteria ID | Requirement Summary | Control Type | Example Control | Evidence Type | Review Frequency |
|---|---|---|---|---|---|
| CC7.1 | Infrastructure components are kept current | Technical | Patch management policy; automated OS patching; dependency scanning in CI | Patch status report + scan results | Monthly |
| CC7.2 | Monitoring detects and responds to incidents | Technical | SIEM with alert rules; on-call rotation; incident response runbooks | Alert rule configurations + on-call schedule | Quarterly review |
| CC7.3 | Security incidents are identified | Operational | Incident log with all security events; classification by severity | Incident register | Ongoing |
| CC7.4 | Security incidents are responded to | Operational | Incident response policy with defined roles, escalation paths, and SLAs | IR policy + post-mortems for incidents | Per incident |
| CC7.5 | Incident response includes recovery and communication | Operational | Post-mortem process; customer notification SLAs defined in IR policy | Post-mortem records + notification evidence | Per incident |
CC8: Change Management
| Criteria ID | Requirement Summary | Control Type | Example Control | Evidence Type | Review Frequency |
|---|---|---|---|---|---|
| CC8.1 | Changes to infrastructure and software are controlled | Technical + Administrative | All changes deployed via CI/CD; PRs require at least one approval; no direct production access | PR merge log + branch protection settings | Ongoing |
CC9: Risk Mitigation
| Criteria ID | Requirement Summary | Control Type | Example Control | Evidence Type | Review Frequency |
|---|---|---|---|---|---|
| CC9.1 | Risk mitigation activities are identified | Administrative | Risk treatment plan aligned to risk register; accepted risks signed off by risk owner | Risk treatment plan + sign-off records | Annual |
| CC9.2 | Vendor and partner risks are managed | Administrative | Third-party risk management process; vendor SOC 2 reports or security questionnaires collected annually | Vendor register + collected reports/questionnaires | Annual |
Availability Criteria (A) - if in scope
| Criteria ID | Requirement Summary | Control Type | Example Control | Evidence Type | Review Frequency |
|---|---|---|---|---|---|
| A1.1 | Availability commitments are specified | Administrative | SLA documentation with uptime commitments; status page | SLA docs + status page | Annual |
| A1.2 | Environmental threats are addressed | Technical | Multi-AZ deployments; automated failover; disaster recovery runbooks | Architecture diagram + DR test results | Annual DR test |
| A1.3 | Recovery plans are tested | Operational | Annual DR test with documented RTO/RPO results | DR test report | Annual |
Confidentiality Criteria (C) - if in scope
| Criteria ID | Requirement Summary | Control Type | Example Control | Evidence Type | Review Frequency |
|---|---|---|---|---|---|
| C1.1 | Confidential information is identified | Administrative | Data classification policy with sensitivity labels (Public, Internal, Confidential, Restricted) | Data classification policy + data inventory | Annual |
| C1.2 | Confidential information is protected | Technical | Encryption at rest (AES-256) and in transit (TLS 1.2+); DLP controls for data egress | Encryption configuration exports + DLP policy | Quarterly |
Evidence Collection Checklist
Before submitting your controls matrix to an auditor, verify each row has:
- A specific, named control (not "we use best practices")
- An identified control owner by name or role
- At least one evidence artifact with a known location
- A confirmed review frequency that has actually been met
- Supporting documentation for the most recent review cycle
Common evidence gaps that delay audits
| Gap | Root cause | Prevention |
|---|---|---|
| Access review not completed for the observation period | Quarterly reviews were skipped | Schedule recurring calendar events with the control owner; automate reminders |
| Policy not acknowledged by all employees | New hires not enrolled in acknowledgment workflow | Automate policy acknowledgment in onboarding checklist |
| Vendor SOC 2 reports expired | Annual collection not tracked | Add vendor report expiry to risk register; automate renewal reminders |
| Patch status report not generated | No automated reporting | Connect endpoint management to compliance platform for automated exports |
| Change management evidence is informal | Engineers merged PRs without required approvals | Enforce branch protection rules at the repo level; auditors will check GitHub settings |
Quick reference: Criteria to common tooling
| TSC Area | Common tools that satisfy it |
|---|---|
| Identity and MFA (CC6.1, CC6.7) | Okta, Google Workspace, Azure AD, JumpCloud |
| Endpoint protection (CC6.8) | CrowdStrike, SentinelOne, Jamf Protect |
| Vulnerability scanning (CC7.1) | Snyk, Trivy, Wiz, Qualys |
| SIEM and monitoring (CC7.2) | Datadog, Splunk, Sumo Logic, AWS Security Hub |
| Change management (CC8.1) | GitHub with branch protection, GitLab, Jira with approval workflows |
| Vendor management (CC9.2) | SecurityScorecard, Whistic, Vanta vendor portal |
| Compliance automation | Vanta, Drata, Secureframe, Thoropass |
Frequently Asked Questions
What is regulatory-compliance?
Use this skill when preparing for SOC 2, HIPAA, or PCI-DSS compliance, conducting audits, or implementing security controls. Triggers on SOC 2, HIPAA, PCI-DSS, compliance audit, security controls, risk assessment, control frameworks, and any task requiring regulatory compliance planning or audit preparation.
How do I install regulatory-compliance?
Run npx skills add AbsolutelySkilled/AbsolutelySkilled --skill regulatory-compliance in your terminal. The skill will be immediately available in your AI coding agent.
What AI agents support regulatory-compliance?
regulatory-compliance works with claude-code, gemini-cli, openai-codex. Install it once and use it across any supported AI coding agent.