From grc-engineer
Generate policy-as-code from natural language requirements
npx claudepluginhub rifh2000/claude-grc-engineering. --plugin grc-engineer# Generate Policy Converts natural language compliance requirements into executable policy code. ## Arguments - `$1` - Requirement description (required, in quotes) - `$2` - Output format (optional, defaults to rego) ## Supported Formats - rego - Open Policy Agent (OPA) Rego - sentinel - HashiCorp Sentinel - aws-config - AWS Config Rule (Python) - terraform - Terraform policy module - checkov - Checkov YAML policy ## Instructions 1. Run the generate-policy script: 2. The script generates policy code in the specified format. 3. Review and integrate the policy into your CI/CD pi...
/generate-policyGenerates policy-as-code from natural language compliance requirements in Rego (OPA), Sentinel, AWS Config (Python), Terraform, or Checkov formats.
Converts natural language compliance requirements into executable policy code.
$1 - Requirement description (required, in quotes)$2 - Output format (optional, defaults to rego)Run the generate-policy script:
node scripts/generate-policy.js "$ARGUMENTS"
The script generates policy code in the specified format.
Review and integrate the policy into your CI/CD pipeline.
# Generate OPA policy for S3 bucket security
/grc:generate-policy "Ensure no S3 buckets are public and all must have a 'Department' tag" rego
# Generate PCI-DSS Requirement 3 policy (protect stored data)
/grc:generate-policy "All databases storing cardholder data must use encryption at rest" aws-config
# Generate network segmentation policy for PCI-DSS Requirement 1
/grc:generate-policy "Cardholder data environment must be isolated via network segmentation" sentinel
# Generate HIPAA encryption policy
/grc:generate-policy "All PHI storage must use AES-256 encryption" terraform