name: compliance
description: Regulatory compliance validation and documentation for GDPR, HIPAA, SOC
2, PCI-DSS, and ISO 27001. Use when implementing compliance controls, conducting
compliance audits, or preparing for certification. Provides automated compliance
checks and evidence collection.
version: 1.0.0
category: security
tags:
- security
- compliance
- safety
author: ruv
When to Use This Skill
Use this skill when conducting compliance audits, implementing regulatory controls, preparing for certification audits, validating GDPR/HIPAA/SOC2/PCI-DSS/ISO27001 adherence, or documenting security and privacy practices for regulated industries.
When NOT to Use This Skill
Do NOT use for non-regulated applications, internal tools without compliance requirements, proof-of-concept projects, or general security audits (use security-analyzer instead). Avoid using for unauthorized compliance testing of third-party systems.
Success Criteria
- All applicable regulatory requirements identified with evidence mapping
- Compliance gaps documented with severity ratings (critical/high/medium/low)
- Controls implemented with validation tests (automated where possible)
- Evidence collection automated with audit trail timestamps
- Remediation plans created for all gaps with assigned owners
- Compliance score >90% for target framework
- Zero critical violations remaining before certification
Edge Cases & Challenges
- Multi-jurisdiction compliance (GDPR + CCPA + local regulations)
- Legacy systems without compliance documentation
- Third-party services requiring BAA/DPA agreements
- Encrypted data requiring key escrow for compliance
- Real-time compliance monitoring vs periodic audits
- Conflicting requirements between frameworks
- Continuous compliance vs point-in-time certification
Guardrails (CRITICAL SECURITY RULES)
- NEVER implement compliance controls on unauthorized systems
- NEVER collect or store PII/PHI without proper encryption and access controls
- NEVER bypass security controls to achieve compliance scores
- NEVER generate false compliance evidence or documentation
- ALWAYS document evidence collection methods with timestamps
- ALWAYS validate controls through independent testing
- ALWAYS obtain legal review for compliance interpretations
- ALWAYS maintain audit trails for all compliance activities
- ALWAYS use encryption at rest and in transit for sensitive data
- ALWAYS implement least-privilege access for compliance tools
Evidence-Based Validation
All compliance findings MUST be validated through:
- Automated scanning - Use compliance scanning tools with documented results
- Manual verification - Independent review of at least 20% of automated findings
- Evidence collection - Screenshots, logs, configurations with timestamps
- Cross-validation - Multiple methods confirm same finding (tool + manual + audit)
- Expert review - Compliance specialist validates critical findings
- Remediation testing - Verify fixes resolve violations without introducing new gaps
Compliance - Regulatory Standards Validation
Comprehensive compliance validation and documentation for major regulatory frameworks.
When to Use This Skill
Use when implementing compliance controls for regulated industries, preparing for compliance audits or certifications, documenting security and privacy practices, or validating adherence to regulatory standards.
Supported Compliance Frameworks
GDPR (General Data Protection Regulation)
- Data privacy and protection
- Right to erasure and portability
- Consent management
- Data breach notification
- Privacy by design
HIPAA (Health Insurance Portability and Accountability Act)
- Protected Health Information (PHI) safeguards
- Administrative, physical, technical safeguards
- Business Associate Agreements (BAA)
- Audit controls and logging
- Breach notification
SOC 2 (Service Organization Control 2)
- Trust Services Criteria (Security, Availability, Confidentiality)
- Control documentation
- Evidence collection
- Continuous monitoring
- Independent auditor reports
PCI-DSS (Payment Card Industry Data Security Standard)
- Cardholder data protection
- Network security controls
- Access control mechanisms
- Regular security testing
- Security policy maintenance
ISO 27001 (Information Security Management)
- Information Security Management System (ISMS)
- Risk assessment and treatment
- 114 security controls across 14 domains
- Continuous improvement process
- Certification preparation
Process
-
Identify compliance requirements
- Determine applicable regulations
- Map business processes to controls
- Identify data flows and storage
- Assess current compliance gaps
-
Implement controls
- Technical controls (encryption, access management)
- Administrative controls (policies, procedures)
- Physical controls (facility security)
- Documentation and evidence
-
Validate compliance
- Automated compliance scanning
- Manual control testing
- Evidence collection and review
- Gap analysis and remediation
-
Maintain compliance
- Continuous monitoring
- Regular audits and assessments
- Update controls for regulatory changes
- Train personnel
-
Prepare for audits
- Organize compliance documentation
- Conduct pre-audit assessments
- Engage external auditors
- Implement findings
Automated Compliance Checks
- Access Control: IAM policies, least privilege
- Encryption: Data at rest and in transit
- Logging: Audit trails and monitoring
- Network Security: Firewalls, segmentation
- Incident Response: Breach notification procedures