Generate enterprise cybersecurity policies from 51 professional templates (SANS, CIS Controls) for ISO 27001, SOC 2, NIST, and CIS Controls compliance in Markdown, Word, HTML, and PDF formats.
Generate enterprise cybersecurity policies from 51 professional templates (SANS, CIS Controls) for ISO 27001, SOC 2, NIST, and CIS Controls compliance in Markdown, Word, HTML, and PDF formats.
/plugin marketplace add diegocconsolini/ClaudeSkillCollection/plugin install cybersecurity-policy-generator@security-compliance-marketplaceGenerate professional, framework-compliant cybersecurity policies using 51 industry-standard templates from SANS and CIS Controls. Creates complete policy documents customized for the organization in 4 formats: Markdown, Word, HTML, and PDF.
Key capabilities:
Use this skill when:
Do NOT use for:
Step 1 - Ask How Many Policies:
Use AskUserQuestion to ask:
If user selects "Custom number", they can specify via "Other" option.
Step 2 - Browse Available Policies:
Run browse_policies.py to show the 51 available policies. Optionally filter by user's industry or compliance needs:
# Show all policies with categories
python3 scripts/browse_policies.py
# Or filter by their compliance framework
python3 scripts/browse_policies.py --framework "ISO 27001"
Step 3 - Let User Select Specific Policies:
Use AskUserQuestion with multiSelect: true to let user choose policies:
Example for governance policies:
Repeat AskUserQuestion for different categories if generating multiple policies:
Alternative for 5/10 policy sets: If user selected pre-defined sets (like "5 foundational"), automatically select the appropriate policies without asking individually.
Recommended Policy Sets:
Use AskUserQuestion to ask about output preferences:
Question Set 1 - Output Formats:
Question Set 2 - Customization Level:
If user selects "Custom", ask follow-up questions:
Use the AskUserQuestion tool to collect organization-specific information with beautiful multiple-choice UI.
Question Set 1 - Organization Basics:
Use AskUserQuestion to ask:
Question Set 2 - Governance:
Use AskUserQuestion to ask:
Question Set 3 - Lifecycle:
Use AskUserQuestion to ask:
Question Set 4 - Compliance:
Use AskUserQuestion to ask (multiSelect: true):
Step 4: Save answers to customizations.json file:
{
"company_name": "Acme Corporation Inc.",
"industry": "Technology",
"organization_size": "50-500 employees",
"responsible_officer": "Chief Information Security Officer (CISO)",
"responsible_department": "Information Security Department",
"contact_email": "security@acme.com",
"effective_date": "2025-11-01",
"review_schedule": "Annually",
"version": "1.0",
"frameworks": ["ISO 27001", "SOC 2"],
"regulations": ["None"]
}
For EACH selected policy, follow this process:
Step 1 - Generate Markdown (Base Format):
Create professional Markdown .md file directly with:
Save as: output/markdown/{PolicyNumber}-{PolicyName}.md
Step 2 - Convert to Requested Formats:
Based on user's format selections from Phase 2, call specialized skills/agents for each format:
If Word (.docx) selected:
USE THE SKILL TOOL to call document conversion:
Skill(command: "word-converter")
OR
Skill(command: "docx")
OR
Task(subagent_type: "document-converter", prompt: "Convert markdown to Word...")
Pass the markdown file path and request:
If HTML (.html) selected:
USE THE SKILL TOOL to call HTML conversion:
Skill(command: "html-converter")
OR
Skill(command: "markdown-to-html")
Pass the markdown file and request:
If PDF (.pdf) selected:
USE THE SKILL TOOL to call PDF conversion:
Skill(command: "pdf")
OR
Skill(command: "pdf-converter")
OR
Task(subagent_type: "document-converter", prompt: "Convert markdown to PDF...")
Pass the markdown file and request:
IMPORTANT:
Step 3 - Apply Customization Options:
If user selected "Standard" branding:
If user selected "Custom" branding:
If user selected "Minimal" branding:
Step 4 - Organize Output Files:
Create organized output directory structure:
output/
├── markdown/
│ ├── 1-AcceptableUsePolicy.md
│ ├── 2-PasswordPolicy.md
│ └── ...
├── word/
│ ├── AcceptableUsePolicy.docx
│ ├── PasswordPolicy.docx
│ └── ...
├── html/
│ ├── AcceptableUsePolicy.html
│ ├── PasswordPolicy.html
│ └── ...
├── pdf/
│ ├── AcceptableUsePolicy.pdf
│ ├── PasswordPolicy.pdf
│ └── ...
└── SUMMARY.md (generation summary with all policies listed)
Step 5 - Present Results:
Show user:
Example Output Summary:
✅ 5 Policies Generated for [Company Name]
Generated Policies:
1. Acceptable Use Policy (Governance) - 2,100 words
2. Password Policy (Identity & Access) - 1,800 words
3. Data Classification Policy (Data Protection) - 2,700 words
4. Data Recovery Policy (Resilience) - 2,400 words
5. Information Security Policy (Governance) - 3,200 words
Formats Created:
✓ Markdown (.md) - 5 files
✓ Microsoft Word (.docx) - 5 files
✓ HTML (.html) - 5 files
✓ PDF (.pdf) - 5 files
Output Location: /path/to/output/
Total Size: ~15 MB
Next Steps:
1. Review policies for accuracy
2. Submit to legal counsel for review
3. Obtain executive approval
4. Distribute to employees
5. Schedule annual policy review
Primary References:
references/policies.json - 51 complete policy templates (320KB, SANS + CIS)references/buildingBlocks.json - 169 reusable policy clausesreferences/framework_mappings.md - Complete guide to ISO 27001, SOC 2, NIST, CIS, GDPR mappingsreferences/policy_categories.md - Descriptions of all 15 policy categories (51 policies organized)Supporting Materials:
references/customization_guide.md - Advanced customization techniques and best practicesGenerated Policy Document Structure:
# [Policy Title]
**Company:** [Organization Name]
**Version:** 1.0
**Effective Date:** [Date]
**Review Schedule:** [Frequency]
**Responsible Officer:** [Executive]
**Department:** [Department Name]
**Contact:** [Email]
---
## Purpose
[Customized purpose statement explaining why this policy exists]
## Scope
[Customized scope defining who and what this policy applies to]
## Policy
[Detailed policy content with organization-specific requirements]
### [Subsection 1]
[Policy details...]
### [Subsection 2]
[Policy details...]
## Compliance
This policy supports compliance with:
- ISO 27001: [Specific controls]
- SOC 2: [Trust Service Criteria]
- [Other applicable frameworks]
## Management Support
[Executive commitment statement]
## Review Schedule
This policy will be reviewed [frequency] by [responsible party].
## Exceptions
[Exception handling process]
## Responsibility
[Roles and responsibilities for policy enforcement]
---
**Approved by:** [Responsible Officer]
**Approval Date:** [Date]
**Next Review:** [Date]
Additional Formats:
This skill generates defensive security policy documentation:
All policies encourage responsible security practices, data protection, and compliance with regulations.
Scripts (Python 3.8+):
scripts/browse_policies.py - Browse, filter, search 51 policy templatesscripts/apply_customizations.py - Replace placeholders with organization valuesscripts/generate_markdown.py - Create Markdown policy documentscripts/generate_docx_html_pdf.py - Create Word, HTML, PDF documentsAll scripts analyze static template files only and do NOT:
User: "I'm a startup and need security policies for SOC 2 compliance"
Claude (using this skill):
1. Runs browse_policies.py --framework "SOC 2"
2. Shows 36 SANS policies that support SOC 2
3. Recommends starting with 5 foundational policies
4. Uses AskUserQuestion to collect company info
5. Generates all 5 policies in 4 formats each
6. Explains these form the foundation for SOC 2
User: "I need an Incident Response Policy for ISO 27001"
Claude (using this skill):
1. Runs browse_policies.py --search "incident"
2. Shows Incident Response Management Policy (CIS)
3. Explains it covers ISO 27001 A.16 and CIS Control 17
4. Uses AskUserQuestion for customization
5. Generates policy in all 4 formats
6. Suggests related policies (Audit Log, Data Recovery)
User: "What policies do I need for CIS Controls?"
Claude (using this skill):
1. Runs browse_policies.py --source CIS
2. Shows all 15 CIS policies mapped to CIS Controls v8
3. References framework_mappings.md for control details
4. Helps prioritize by Implementation Group (IG1/IG2/IG3)
5. Generates policies in priority order
6. Provides framework compliance documentation
For Security Program Foundation (Priority 1):
For Compliance Projects:
By Category: Governance (13), Identity and Access (8), Application (7), Compute (6), Network (4), Data Protection (2), and 9 others
When to consult professionals: Legal review, compliance certification, custom requirements, industry-specific regulations, multi-jurisdictional compliance
Designs feature architectures by analyzing existing codebase patterns and conventions, then providing comprehensive implementation blueprints with specific files to create/modify, component designs, data flows, and build sequences