โ† All skills
Tencent SkillHub ยท Security & Compliance

Compliance & Audit Readiness Engine

Guides startups and scale-ups through SOC 2, ISO 27001, GDPR, HIPAA, and PCI DSS compliance to achieve audit readiness without external consultants.

skill openclawclawhub Free
0 Downloads
0 Stars
0 Installs
0 Score
High Signal

Guides startups and scale-ups through SOC 2, ISO 27001, GDPR, HIPAA, and PCI DSS compliance to achieve audit readiness without external consultants.

โฌ‡ 0 downloads โ˜… 0 stars Unverified but indexed

Install for OpenClaw

Quick setup
  1. Download the package from Yavira.
  2. Extract the archive and review SKILL.md first.
  3. Import or place the package into your OpenClaw setup.

Requirements

Target platform
OpenClaw
Install method
Manual import
Extraction
Extract archive
Prerequisites
OpenClaw
Primary doc
SKILL.md

Package facts

Download mode
Yavira redirect
Package format
ZIP package
Source platform
Tencent SkillHub
What's included
README.md, SKILL.md

Validation

  • Use the Yavira download entry.
  • Review SKILL.md after the package is downloaded.
  • Confirm the extracted package contains the expected setup assets.

Install with your agent

Agent handoff

Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.

  1. Download the package from Yavira.
  2. Extract it into a folder your agent can access.
  3. Paste one of the prompts below and point your agent at the extracted folder.
New install

I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.

Upgrade existing

I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.

Trust & source

Release facts

Source
Tencent SkillHub
Verification
Indexed source record
Version
1.0.0

Documentation

ClawHub primary doc Primary doc: SKILL.md 37 sections Open source page

Compliance & Audit Readiness Engine

Your AI compliance officer. Guides startups and scale-ups through SOC 2, ISO 27001, GDPR, HIPAA, and PCI DSS โ€” from zero to audit-ready. No consultants needed.

Framework Selection Matrix

FrameworkWho Needs ItTriggerTimelineCost RangeSOC 2 Type IAny B2B SaaSEnterprise prospect asks3-6 months$20K-$80KSOC 2 Type IIEstablished SaaSAfter Type I, or direct6-12 months$30K-$100KISO 27001Global/EU-facing SaaSEU enterprise deals6-12 months$40K-$120KGDPRAnyone with EU usersDay 1 if EU data1-3 months$5K-$30KHIPAAHealth data handlersBefore first PHI3-6 months$20K-$60KPCI DSSPayment processorsBefore card data3-9 months$15K-$50KSOXPublic companiesIPO prep12-18 months$100K-$500K

Readiness Assessment Brief

company_profile: name: "" industry: "" employee_count: 0 annual_revenue: "" data_types_handled: - PII (names, emails, addresses) - Financial (payment cards, bank accounts) - Health (PHI, medical records) - Children (COPPA scope) - Biometric - Government/classified customer_segments: - SMB - Mid-market - Enterprise - Government geographic_scope: - US only - US + EU - Global current_state: existing_frameworks: [] security_team_size: 0 has_written_policies: false has_asset_inventory: false has_risk_assessment: false has_incident_response: false has_vendor_management: false previous_audits: [] known_gaps: [] drivers: - Customer requirement - Board/investor mandate - Regulatory obligation - Competitive advantage - Insurance requirement target_frameworks: [] target_date: "" budget_range: ""

Priority Decision Rules

Customer asking for SOC 2? โ†’ Start there (most requested in B2B SaaS) EU customers? โ†’ GDPR is non-negotiable, do it alongside SOC 2 Health data? โ†’ HIPAA first, then layer SOC 2 Payment data? โ†’ PCI DSS is legally required, do immediately Multiple frameworks? โ†’ Map common controls (40-60% overlap between SOC 2 and ISO 27001)

Trust Service Criteria (TSC)

SOC 2 is built on 5 categories. Security is mandatory. Others are optional but often expected. CC1 โ€” Control Environment (Foundation) Board/management oversight of security Organizational structure with clear security roles Code of conduct / acceptable use policy HR processes (background checks, onboarding, offboarding) Performance evaluations include security responsibilities CC2 โ€” Communication & Information Security policies documented and accessible to all employees External communication channels for security (status page, security@) Whistleblower / anonymous reporting mechanism Security awareness training program (annual + onboarding) System description document maintained CC3 โ€” Risk Assessment Annual risk assessment process documented Risk register maintained with likelihood ร— impact scoring Risk treatment plans for high/critical risks Risk appetite statement approved by management Changes in business/technology trigger risk re-assessment CC4 โ€” Monitoring Activities Continuous monitoring of controls (not just annual) Internal audit or self-assessment program Deficiency tracking and remediation Management review of monitoring results Penetration testing (annual minimum) CC5 โ€” Control Activities Logical access controls (RBAC, least privilege) Physical access controls (offices, data centers) Change management process System development lifecycle (SDLC) Data backup and recovery procedures CC6 โ€” Logical & Physical Access User provisioning and deprovisioning process MFA enforced on all critical systems Password policy (12+ chars, complexity, rotation) Access reviews (quarterly minimum) Physical access logs for sensitive areas Encryption at rest (AES-256) and in transit (TLS 1.2+) Firewall rules reviewed quarterly VPN or zero-trust network access CC7 โ€” System Operations Monitoring and alerting (uptime, errors, security events) Incident detection and response procedures Vulnerability management (scan weekly, patch critical <72h) Anti-malware / endpoint protection Capacity planning and performance monitoring CC8 โ€” Change Management Formal change request and approval process Separation of duties (dev โ‰  prod deploy) Testing before production deployment Rollback procedures documented Emergency change process with post-hoc approval CC9 โ€” Risk Mitigation (Vendors) Vendor risk assessment before onboarding Vendor inventory with criticality ratings Annual vendor reviews BAAs / DPAs with sub-processors Vendor offboarding process

Additional Criteria

Availability (A1): SLAs defined and monitored Disaster recovery plan tested annually Business continuity plan documented RTO/RPO defined for critical systems Redundancy for critical infrastructure Confidentiality (C1): Data classification scheme (Public, Internal, Confidential, Restricted) Handling procedures per classification level Confidentiality agreements (NDA) with employees and vendors Data retention and disposal policies DLP controls for sensitive data Processing Integrity (PI1): Input validation controls Processing completeness and accuracy checks Output reconciliation procedures Error handling and correction processes Privacy (P1): Privacy notice published Consent mechanisms for data collection Data subject rights procedures (access, deletion, portability) Privacy impact assessments for new features Data breach notification procedures

SOC 2 Project Plan (16-Week Sprint)

WeekPhaseKey Activities1-2ScopingDefine system boundaries, select TSC, choose auditor3-4Gap AssessmentAudit current state against TSC, document gaps5-6Policy WritingDraft all required policies (see policy list below)7-8Control ImplementationDeploy technical controls, configure tools9-10Process ImplementationEstablish operational processes, train team11-12Evidence CollectionGather evidence for all controls, test internally13-14Readiness AssessmentMock audit, remediate findings15-16Type I AuditAuditor fieldwork, management response, report

Required Policy Documents

Information Security Policy โ€” Master policy, scope, objectives Access Control Policy โ€” Authentication, authorization, reviews Change Management Policy โ€” SDLC, deployment, emergency changes Incident Response Policy โ€” Detection, response, notification Risk Management Policy โ€” Assessment methodology, treatment, appetite Data Classification Policy โ€” Levels, handling, retention, disposal Acceptable Use Policy โ€” Employee responsibilities, prohibited actions Vendor Management Policy โ€” Assessment, monitoring, offboarding Business Continuity / DR Policy โ€” Plans, testing, RTO/RPO HR Security Policy โ€” Background checks, onboarding, offboarding, training Encryption Policy โ€” Standards, key management, certificate handling Physical Security Policy โ€” Office access, visitor management, clean desk Logging & Monitoring Policy โ€” What to log, retention, alerting Password & Authentication Policy โ€” Standards, MFA requirements Backup & Recovery Policy โ€” Schedule, testing, retention

Policy Template

  • # [Policy Name]
  • **Version:** 1.0
  • **Owner:** [Name, Title]
  • **Approved by:** [Name, Title]
  • **Effective date:** [Date]
  • **Next review:** [Date + 1 year]
  • **Classification:** Internal
  • ## 1. Purpose
  • [Why this policy exists โ€” 2-3 sentences]
  • ## 2. Scope
  • [Who and what this policy applies to]
  • ## 3. Policy Statements
  • [Numbered, actionable requirements โ€” not aspirational]
  • ### 3.1 [Topic]
  • SHALL [requirement]
  • SHALL NOT [prohibition]
  • SHOULD [recommendation]
  • ## 4. Roles & Responsibilities
  • | Role | Responsibility |
  • |------|---------------|
  • | [Role] | [What they must do] |
  • ## 5. Exceptions
  • [Process for requesting exceptions โ€” who approves, how long, documentation]
  • ## 6. Enforcement
  • [Consequences of non-compliance]
  • ## 7. Definitions
  • [Technical terms used in the policy]
  • ## 8. Related Documents
  • [Links to related policies, standards, procedures]
  • ## 9. Revision History
  • | Version | Date | Author | Changes |
  • |---------|------|--------|---------|
  • | 1.0 | [Date] | [Author] | Initial release |

ISMS Implementation Roadmap

Clause 4 โ€” Context of the Organization Define ISMS scope and boundaries Identify interested parties and their requirements Determine internal and external issues Document scope statement Clause 5 โ€” Leadership Management commitment statement Information security policy (signed by CEO/CTO) Assign ISMS roles and responsibilities Allocate resources (budget, people, tools) Clause 6 โ€” Planning Risk assessment methodology (ISO 27005 or custom) Risk assessment execution Risk treatment plan Statement of Applicability (SoA) โ€” map all 93 Annex A controls Information security objectives (measurable, time-bound) Clause 7 โ€” Support Determine required competencies Security awareness program Internal and external communication plan Document control process Clause 8 โ€” Operation Execute risk treatment plan Implement controls from SoA Manage operational changes Conduct risk assessments on changes Clause 9 โ€” Performance Evaluation Monitoring and measurement program Internal audit schedule and execution Management review (at least annually) Corrective action tracking Clause 10 โ€” Improvement Nonconformity and corrective action process Continual improvement program Lessons learned integration

ISO 27001:2022 Annex A Control Categories

CategoryControlsKey AreasA.5 Organizational37Policies, roles, threat intel, asset mgmt, access, supplierA.6 People8Screening, T&C, awareness, disciplinary, terminationA.7 Physical14Perimeters, entry, offices, monitoring, utilities, cablingA.8 Technological34Endpoints, access rights, auth, malware, vuln mgmt, logging, crypto, SDLC

SOC 2 โ†” ISO 27001 Control Mapping (Save 40-60% effort)

SOC 2 TSCISO 27001 Annex AOverlapCC1 Control EnvironmentA.5.1-5.6 (Org controls)~80%CC2 CommunicationA.5.1, A.6.3 (Awareness)~70%CC3 Risk AssessmentClause 6.1, A.5.7 (Threat intel)~90%CC5 Control ActivitiesA.8 (Technological)~75%CC6 AccessA.5.15-5.18, A.8.1-8.5~85%CC7 OperationsA.8.7-8.16 (Monitoring)~80%CC8 Change MgmtA.8.25-8.33 (SDLC)~70%CC9 VendorsA.5.19-5.23 (Supplier)~85% Strategy: Build for one framework, extend to the other. SOC 2 first (faster) โ†’ ISO 27001 (adds clauses 4-10 management system).

12 Core Requirements

Lawful Basis for Processing โ€” Document legal basis for each data processing activity Consent | Contract | Legal obligation | Vital interest | Public task | Legitimate interest Data processing register (Article 30) Legitimate Interest Assessments (LIAs) where applicable Data Subject Rights โ€” Respond within 30 days Right of access (SAR) process Right to rectification Right to erasure ("right to be forgotten") Right to data portability (machine-readable export) Right to restrict processing Right to object Automated decision-making opt-out Privacy by Design & Default โ€” Build privacy into products Privacy Impact Assessment (PIA/DPIA) template Data minimization review for each feature Default privacy settings (opt-in, not opt-out) Data Protection Officer (DPO) โ€” Required if: Public authority, OR Large-scale systematic monitoring, OR Large-scale processing of special category data Consent Management Granular consent mechanisms (not bundled) Easy withdrawal (as easy as giving consent) Consent records with timestamp, version, scope Cookie consent banner (ePrivacy) Data Processing Agreements (DPAs) DPA template for sub-processors Article 28 requirements checklist Sub-processor notification process Sub-processor register International Transfers Transfer mechanism (SCCs, adequacy decision, BCRs) Transfer Impact Assessment Supplementary measures where needed Breach Notification 72-hour notification to supervisory authority "Undue delay" notification to affected individuals Breach register with risk assessment Breach response team and escalation path Records of Processing Activities (ROPA) processing_activity: name: "" purpose: "" lawful_basis: "" data_categories: [] data_subjects: [] recipients: [] retention_period: "" transfers_outside_eea: false transfer_mechanism: "" technical_measures: [] organizational_measures: [] dpia_required: false last_reviewed: "" Privacy Notice โ€” Must include: Identity of controller DPO contact (if applicable) Purposes and lawful basis Categories of data Recipients / transfers Retention periods Data subject rights Right to complain to supervisory authority Whether providing data is statutory/contractual requirement Data Retention Schedule Data TypeRetention PeriodLegal BasisDisposal MethodCustomer PIIDuration + 3 yearsContract + legitimate interestAutomated deletionEmployee recordsDuration + 7 yearsLegal obligationSecure shredFinancial records7 yearsLegal obligationSecure shredServer logs90 daysLegitimate interestAutomated rotationMarketing consentUntil withdrawnConsentDatabase purgeSupport tickets2 years after resolutionLegitimate interestAutomated deletion Training & Awareness Mandatory GDPR training for all employees (annual) Role-specific training (developers, support, marketing, HR) Training records with completion tracking

HIPAA Security Rule โ€” 3 Safeguard Categories

Administrative Safeguards Security Management Process (risk analysis, risk management) Assigned Security Responsibility (HIPAA Security Officer) Workforce Security (authorization, clearance, termination) Information Access Management (access authorization, establishment, modification) Security Awareness Training (reminders, malware, login monitoring, password mgmt) Security Incident Procedures (response, reporting) Contingency Plan (backup, DR, emergency mode, testing) Evaluation (periodic technical/non-technical) BAAs with all business associates Physical Safeguards Facility Access Controls (contingency ops, facility security plan, access control, maintenance records) Workstation Use (policies, restrictions) Workstation Security (physical safeguards) Device and Media Controls (disposal, re-use, accountability, data backup) Technical Safeguards Access Control (unique user ID, emergency access, automatic logoff, encryption) Audit Controls (hardware, software, procedural mechanisms) Integrity Controls (authentication of ePHI, transmission security) Person or Entity Authentication (verify identity) Transmission Security (integrity controls, encryption)

HIPAA Breach Rule

โ‰ค500 individuals: Annual batch notification to HHS (within 60 days of year end) >500 individuals: Notify HHS within 60 days + media notification All breaches: Notify affected individuals without unreasonable delay (โ‰ค60 days) Penalties: $100-$50,000 per violation, up to $1.5M per year per category

12 Requirements Summary

#RequirementKey Controls1Install/maintain network security controlsFirewalls, network segmentation2Apply secure configurationsNo vendor defaults, CIS benchmarks3Protect stored account dataEncryption, masking, key mgmt4Encrypt transmission over open networksTLS 1.2+, no SSL/early TLS5Protect from malicious softwareAnti-malware, regular updates6Develop secure systemsSDLC, vuln mgmt, WAF7Restrict access by business needRBAC, least privilege8Identify users and authenticateMFA, password standards9Restrict physical accessBadges, cameras, visitor logs10Log and monitor all accessCentralized logging, review11Test security regularlyVuln scans, pen tests, IDS12Support security with policiesPolicies, training, incident response

Scope Reduction Strategy

Use tokenization โ€” Replace card data with tokens (Stripe, Braintree handle PCI for you) Use hosted payment pages โ€” Never touch raw card data (SAQ A instead of SAQ D) Network segmentation โ€” Isolate cardholder data environment Cloud provider compliance โ€” Leverage AWS/GCP/Azure PCI certifications SAQ Decision: Fully outsourced (Stripe Checkout) โ†’ SAQ A (22 controls, simplest) API-based (Stripe Elements) โ†’ SAQ A-EP (~140 controls) You store/process card data โ†’ SAQ D (300+ controls, avoid this)

Essential Tools by Category

CategoryBudget OptionMid-RangeEnterpriseGRC PlatformNotion/SheetsVanta, DrataServiceNow, OneTrustPolicy MgmtGoogle Docs + versioningVanta policiesHyperproofVulnerability ScanningOWASP ZAP, TrivyQualys, TenableRapid7SIEM/LoggingELK Stack, WazuhDatadog, Sumo LogicSplunkEndpoint ProtectionCrowdStrike Falcon GoSentinelOneCrowdStrike EnterpriseIdentity/AccessGoogle Workspace + OktaJumpCloudAzure AD P2TrainingKnowBe4 FreeKnowBe4ProofpointPen TestingHackerOne CommunityCobaltBishop FoxBackupNative cloud backupsVeeamCommvault

Automation-First Compliance

What to automate (saves 70%+ of audit prep): Evidence collection (screenshots of configs โ†’ API pulls) Access reviews (quarterly manual โ†’ continuous monitoring) Vulnerability scanning (manual โ†’ scheduled + auto-ticket) Policy acknowledgment (email โ†’ onboarding workflow) Vendor assessments (spreadsheets โ†’ intake forms with scoring) Training tracking (manual โ†’ LMS with auto-reminders)

Compliance-as-Code Patterns

  • # Infrastructure compliance
  • Terraform with Sentinel policies (enforce encryption, tagging)
  • OPA/Rego for Kubernetes admission control
  • AWS Config Rules / Azure Policy for cloud compliance
  • GitHub branch protection rules as change management evidence
  • # Application compliance
  • Automated dependency scanning in CI (Snyk, Dependabot)
  • SAST in PR pipeline (Semgrep, CodeQL)
  • Container scanning (Trivy, Grype)
  • License compliance (FOSSA, Licensee)

90-Day Audit Prep Checklist

Days 90-60: Foundation Confirm audit scope with auditor Complete system description document Verify all policies are current (reviewed within 12 months) Confirm all employees completed security training Run vulnerability scan and remediate critical/high findings Schedule penetration test (results needed before audit) Days 60-30: Evidence Gathering Collect evidence for each control (organized by TSC/clause) Access review documentation (screenshots of reviews, action items) Change management evidence (sample of tickets showing approval flow) Incident response test evidence (tabletop exercise minutes) DR test evidence (recovery test results, RTO achieved) Vendor review evidence (assessment records, DPAs) Risk assessment and treatment plan (current year) Board/management meeting minutes discussing security Days 30-0: Final Prep Internal mock audit โ€” walk through every control Remediate any mock audit findings Brief team on auditor interviews (what to expect, who answers what) Prepare management assertion letter Set up auditor access (read-only to evidence repository) Confirm all monitoring/alerting is functioning Verify offboarding was completed for all departed employees

Evidence Organization

/compliance-evidence/ /SOC2-2026/ /CC1-control-environment/ org-chart.pdf code-of-conduct-signed.pdf background-check-process.pdf /CC2-communication/ security-training-completion.csv security-policy-acknowledgments.pdf /CC3-risk-assessment/ risk-assessment-2026.xlsx risk-treatment-plan.pdf /CC6-access/ access-review-Q1.pdf access-review-Q2.pdf mfa-enforcement-screenshot.png offboarding-checklist-samples/ /CC7-operations/ vulnerability-scan-reports/ pentest-report-2026.pdf incident-log-2026.csv /CC8-change-management/ sample-change-tickets/ deployment-pipeline-config.png /CC9-vendors/ vendor-inventory.xlsx vendor-assessments/ dpas-and-baas/

Auditor Interview Prep

Common questions and who should answer: QuestionBest RespondentKey Points"Walk me through your risk assessment process"CISO/Security LeadMethodology, frequency, treatment"How do you manage access to production?"Engineering LeadRBAC, approval flow, reviews"Describe your change management process"Engineering LeadPR review, testing, deployment"How do you handle security incidents?"Security LeadDetection, response, communication"How do you evaluate vendors?"Security/ProcurementAssessment, monitoring, contracts"Describe your backup and recovery process"Infrastructure LeadSchedule, testing, RTO/RPO"How do you track and remediate vulnerabilities?"Security LeadScanning, SLAs, patching"Walk me through employee onboarding/offboarding"HR + ITChecklist, timing, verification

Monthly Compliance Dashboard

compliance_dashboard: month: "" control_health: total_controls: 0 controls_passing: 0 controls_failing: 0 controls_not_tested: 0 health_percentage: 0 action_items: open: 0 overdue: 0 closed_this_month: 0 key_metrics: mean_time_to_patch_critical: "" access_reviews_completed: "X/X" security_training_completion: "" incidents_this_month: 0 vendor_reviews_due: 0 policies_due_for_review: 0 risk_register: high_risks: 0 risks_without_treatment: 0 new_risks_identified: 0 upcoming: next_pen_test: "" next_dr_test: "" next_audit: "" next_access_review: ""

Compliance Calendar

FrequencyActivityWeeklyReview security alerts, patch critical vullnMonthlyControl testing sample, metrics dashboard, policy exception reviewQuarterlyAccess reviews, vendor risk check, risk register update, tabletop exerciseSemi-annualVulnerability scan (external), BCP/DR test, security training refreshAnnualFull risk assessment, penetration test, policy review cycle, SOC 2/ISO audit, security awareness training, management review

Compliance Debt Tracker

compliance_debt: - id: "CD-001" framework: "SOC 2" control: "CC6.1" finding: "MFA not enforced on staging environment" severity: "High" identified: "2026-01-15" owner: "" target_remediation: "2026-02-15" status: "In Progress" compensating_control: "VPN + IP allowlisting"

When Controls Fail

Severity-based response: SeverityResponse TimeActionsCritical24 hoursImmediate remediation, notify management, consider if breach occurredHigh7 daysRemediation plan, compensating control if needed, risk acceptance by CISOMedium30 daysAdd to sprint, track in compliance debtLow90 daysBatch with next review cycle

Common Control Framework (CCF)

Build controls ONCE, map to MULTIPLE frameworks: control: id: "CCF-AC-001" title: "Multi-Factor Authentication" description: "MFA required for all access to production systems and sensitive data" owner: "Security Team" framework_mapping: soc2: ["CC6.1", "CC6.6"] iso27001: ["A.8.5"] gdpr: ["Article 32"] hipaa: ["ยง164.312(d)"] pci_dss: ["Req 8.4"] evidence: - type: "Configuration screenshot" source: "Okta MFA policy" frequency: "Quarterly" - type: "Access review" source: "Okta user report" frequency: "Quarterly" test_procedure: "Verify MFA policy is enforced, test with non-MFA login attempt" last_tested: "" result: "" next_test: ""

Framework Expansion Strategy

Year 1: SOC 2 Type I โ†’ establishes baseline Year 1-2: SOC 2 Type II โ†’ proves sustained operation Year 2: + GDPR โ†’ covers EU expansion Year 2-3: + ISO 27001 โ†’ international credibility As needed: + HIPAA / PCI DSS โ†’ industry-specific

Audit Fatigue Prevention

Single evidence repository โ€” collect once, map to all frameworks Continuous monitoring โ€” evidence auto-collected, not scrambled at audit time Control owner accountability โ€” each control has ONE owner, not "security team" Compliance sprints โ€” 2-week sprints dedicated to compliance work, not crammed before audit Auditor relationship โ€” same firm for multiple frameworks if possible (they know your environment)

Compliance Readiness Score (0-100)

DimensionWeightScore 0-10Policy Coverage โ€” All required policies exist, reviewed, approved15%Technical Controls โ€” Security tools deployed and configured20%Process Maturity โ€” Operational processes followed consistently20%Evidence Quality โ€” Complete, organized, recent evidence15%Training & Awareness โ€” All employees trained, records maintained10%Vendor Management โ€” All critical vendors assessed and contracted10%Risk Management โ€” Current assessment, treatment plans, monitoring10% Scoring guide: 0-2: Not started / major gaps 3-4: In progress / significant gaps 5-6: Partially implemented / some gaps 7-8: Implemented / minor improvements needed 9-10: Mature / audit-ready Interpretation: < 40: Not ready โ€” significant work needed (3-6 months) 40-60: Getting there โ€” focus on gaps (1-3 months) 60-80: Nearly ready โ€” polish and evidence gathering (2-6 weeks) 80+: Audit-ready โ€” schedule the audit

Startup with Zero Compliance

Start with security basics (MFA, encryption, access control, backups) before any framework Use a GRC platform from Day 1 (Vanta/Drata cost $10-15K/yr but save 100+ hours) Don't wait for perfect โ€” "documented and improving" beats "undocumented and perfect" Budget $20-40K for first SOC 2 Type I (auditor + tools + time)

Multi-Cloud / Hybrid Infrastructure

Map shared responsibility model for each provider Ensure consistent controls across environments Consider cloud-specific compliance tools (AWS Audit Manager, Azure Compliance Manager) Network segmentation especially important

Acquired Company Integration

Conduct compliance gap assessment within 30 days of close Identify highest-risk gaps (access control, data handling) 90-day integration plan to bring to baseline Don't assume their compliance posture matches claims

International (Multi-Jurisdiction)

Map all jurisdictions where you operate or store data GDPR applies if you have EU users โ€” not just EU office Data residency requirements (Russia, China, India, Brazil) Consider local DPA registrations

Regulated Industries (FinTech, HealthTech)

Layer industry regulations ON TOP of SOC 2/ISO FinTech: SOC 2 + PCI DSS + potentially banking regs (state MTLs, FinCEN) HealthTech: SOC 2 + HIPAA + potentially FDA (SaMD) EdTech: SOC 2 + FERPA + COPPA (if under 13)

Natural Language Commands

CommandWhat It Does"Assess our compliance readiness"Run readiness assessment, score, identify gaps"Create SOC 2 project plan"Generate 16-week implementation timeline"Write [policy name] policy"Generate policy from template with your context"Map controls across frameworks"Build common control framework mapping"Prepare for audit"Generate 90-day audit prep checklist with evidence needs"Review our GDPR compliance"Check all 12 GDPR requirements against current state"Score our compliance posture"Run 7-dimension scoring rubric"Generate evidence checklist"List all evidence needed for specific framework"Build vendor assessment"Create vendor risk assessment for a specific vendor"Plan framework expansion"Recommend next framework based on business needs"Track compliance debt"Review and prioritize open compliance items"Run monthly compliance review"Update dashboard, check deadlines, identify actions

Category context

Identity, auth, scanning, governance, audit, and operational guardrails.

Source: Tencent SkillHub

Largest current source with strong distribution and engagement signals.

Package contents

Included in package
2 Docs
  • SKILL.md Primary doc
  • README.md Docs