Use this skill when you need regulatory compliance strategy, framework gap analysis, audit preparation, policy management, or risk governance across SOC 2, NIST CSF, ISO 27001, HIPAA, SOX, GDPR, CCPA, EU AI Act, PCI-DSS, or industry-specific standards. Trigger for compliance program buildout, audit readiness, regulatory change management, or cross-framework harmonization.
npx claudepluginhub aviskaar/open-org --plugin compliance-governance# Compliance & Governance — VP Compliance & Governance ## Role VP Compliance & Governance owns the enterprise regulatory compliance posture, policy framework, audit lifecycle, and cross-framework control harmonization. This skill ensures the organization meets all mandatory obligations, anticipates regulatory change, and maintains audit-ready evidence at all times. --- ## Compliance Framework Universe ### Tier 1 — Mandatory (Legally Binding) | Framework | Applicability | Regulatory Body | |---|---|---| | GDPR | EU personal data processing | European Data Protection Board | | HIPAA/HIT...
/SKILLGuides implementation of defense-in-depth security architectures, compliance (SOC2, ISO27001, GDPR, HIPAA), threat modeling, risk assessments, SecOps, incident response, and SDLC security integration.
/SKILLEvaluates LLMs on 60+ benchmarks (MMLU, HumanEval, GSM8K) using lm-eval harness. Provides CLI commands for HuggingFace/vLLM models, task lists, and evaluation checklists.
/SKILLApplies systematic debugging strategies to track down bugs, performance issues, and unexpected behavior using checklists, scientific method, and testing techniques.
/SKILLSummarizes content from URLs, local files, podcasts, and YouTube videos. Extracts transcripts with --extract-only flag. Supports AI models, lengths, and JSON output.
/SKILLRuns `yarn extract-errors` on React project to detect new error messages needing codes, reports them, and verifies existing codes are up to date.
/SKILLManages major dependency upgrades via compatibility analysis, staged rollouts with npm/yarn, and testing for frameworks like React.
VP Compliance & Governance owns the enterprise regulatory compliance posture, policy framework, audit lifecycle, and cross-framework control harmonization. This skill ensures the organization meets all mandatory obligations, anticipates regulatory change, and maintains audit-ready evidence at all times.
| Framework | Applicability | Regulatory Body |
|---|---|---|
| GDPR | EU personal data processing | European Data Protection Board |
| HIPAA/HITECH | US healthcare PHI | HHS Office for Civil Rights |
| SOX | US public companies (financial reporting) | SEC / PCAOB |
| PCI-DSS v4.0 | Payment card data | PCI Security Standards Council |
| CCPA/CPRA | California consumer data | California AG / CPPA |
| EU AI Act | AI systems serving EU | EU AI Office |
| DORA | EU financial entities digital resilience | ESAs |
| Framework | Scope | Certification Body |
|---|---|---|
| SOC 2 Type II | Service organizations, trust principles | AICPA-licensed CPA |
| ISO 27001:2022 | ISMS certification | Accredited CB (BSI, DNV, etc.) |
| ISO 27017 | Cloud service controls | Accredited CB |
| ISO 27018 | Cloud PII protection | Accredited CB |
| ISO 42001 | AI management system | Accredited CB |
| NIST CSF 2.0 | Cybersecurity framework | Self-attested / third-party |
| NIST SP 800-53 Rev5 | Federal/FedRAMP | 3PAO |
| FedRAMP | US federal cloud | FedRAMP PMO |
industry-compliance)Inputs required:
| Input | Description |
|---|---|
| Organization profile | Jurisdictions, industries, customer types |
| Data inventory | Data types processed, stored, transmitted |
| Technology stack | Cloud providers, SaaS tools, data processors |
| Business activities | Payment processing, healthcare data, AI systems |
| Customer contracts | Enterprise agreements with compliance clauses |
Actions:
Output: Compliance Obligation Register + Harmonized Control Framework
Unified Control Library approach — map one control to multiple frameworks:
Example: Encryption at Rest
├── SOC 2: CC6.1 (Logical Access Controls)
├── ISO 27001: A.8.24 (Use of cryptography)
├── NIST CSF: PR.DS-1 (Data-at-rest protected)
├── HIPAA: §164.312(a)(2)(iv) (Encryption)
├── GDPR: Art. 32 (Appropriate technical measures)
└── PCI-DSS: Req 3.5 (Protect stored account data)
Control categories (NIST SP 800-53 aligned):
Trust Service Criteria (TSC) coverage:
| Criteria | Scope | Key Controls |
|---|---|---|
| Security (CC) | All audits | Access controls, encryption, monitoring, change mgmt |
| Availability (A) | SLA-critical systems | Uptime SLOs, DR, capacity planning |
| Processing Integrity (PI) | Data processing systems | Input/output validation, error handling |
| Confidentiality (C) | Sensitive data | Encryption, NDA, data classification |
| Privacy (P) | Personal data | Notice, consent, retention, subject rights |
SOC 2 audit readiness checklist:
Delegate to compliance-auditor for evidence collection and testing execution.
GDPR compliance requirements:
| Requirement | Implementation |
|---|---|
| Lawful basis | Document legal basis for each processing activity |
| Data Subject Rights | DSAR process: <30-day response, automated where possible |
| Data Minimization | PIA/DPIA for new systems; minimize collection |
| Retention Limits | Retention schedule enforced; automated deletion |
| Breach Notification | <72h to DPA; <30 days to affected individuals |
| DPA/SCCs | Executed for all data processors; SCCs for non-EU transfers |
| ROPA | Records of Processing Activities maintained current |
| DPO | Appointed where required; accessible contact |
CCPA/CPRA additional requirements:
EU AI Act obligations (by risk tier):
| AI Risk Tier | Requirements |
|---|---|
| Prohibited | No deployment (social scoring, real-time biometric surveillance) |
| High-Risk | Conformity assessment, CE marking, registration, human oversight |
| Limited Risk | Transparency obligations (chatbot disclosure) |
| Minimal Risk | Voluntary codes of practice |
Audit calendar management:
Q1: SOC 2 Type II observation period start; ISO 27001 surveillance
Q2: GDPR annual review; PCI-DSS self-assessment (SAQ)
Q3: Penetration test (application-security); SOC 2 interim testing
Q4: SOC 2 Type II audit fieldwork; ISO 27001 certification renewal
Ongoing: HIPAA privacy reviews; SOX controls testing (quarterly)
Pre-audit actions (90 days out):
compliance-auditor for gap assessment.During audit:
Post-audit:
Policy hierarchy:
Level 1: Security Policy (Board-approved, annual review)
Level 2: Standards (CISO-approved, semi-annual review)
Level 3: Procedures (Domain-owner approved, quarterly review)
Level 4: Guidelines (Advisory, team-level)
Mandatory policies (must exist and be current):
Policy lifecycle: Draft → Legal Review → CISO Approval → Board Ratification (Level 1) → Publish → Annual Review → Retire