From faos-ciso
<!-- AUTO-GENERATED by export-plugins.py — DO NOT EDIT -->
npx claudepluginhub frank-luongt/faos-skills-marketplace --plugin faos-cisoThis skill uses the workspace's default tool permissions.
Implements structured self-debugging workflow for AI agent failures: capture errors, diagnose patterns like loops or context overflow, apply contained recoveries, and generate introspection reports.
Designs and optimizes AI agent action spaces, tool definitions, observation formats, error recovery, and context for higher task completion rates.
Compares coding agents like Claude Code and Aider on custom YAML-defined codebase tasks using git worktrees, measuring pass rate, cost, time, and consistency.
Organizations operating in regulated industries or pursuing enterprise customers frequently face overlapping compliance requirements. A compliance crosswalk maps equivalent controls across multiple frameworks, enabling a "implement once, satisfy many" approach.
This skill covers the four most common frameworks for SaaS platforms:
| Framework | Scope | Governed By | Controls |
|---|---|---|---|
| SOC 2 Type II | Trust Service Criteria | AICPA | ~60 CC |
| ISO 27001:2022 | ISMS Annex A Controls | ISO/IEC | 93 |
| NIST CSF 2.0 | Cybersecurity Functions | NIST | 106 subcat |
| PCI-DSS v4.0 | Payment Card Data | PCI SSC | ~250 req |
By building a unified control library with crosswalk mappings, you can:
Choose the framework with the broadest control coverage or the one required by your most important customer/regulator. Common starting points:
| Starting Framework | Best When |
|---|---|
| SOC 2 | US SaaS company, enterprise sales, no payment data |
| ISO 27001 | International customers, EU market, broad ISMS |
| NIST CSF | US government contracts, federal requirements |
| PCI-DSS | Processing, storing, or transmitting cardholder data |
For FAOS, the recommended starting point is SOC 2 (primary customer requirement) with ISO 27001 as the secondary framework for international expansion.
For each control in your primary framework, identify equivalent controls in secondary frameworks. Use the mapping tables in the Examples section as a starting reference.
Key mapping principles:
Group mapped controls by implementation domain to find shared controls:
| Domain | Shared Control Description | Frameworks Satisfied |
|---|---|---|
| Access Control | Role-based access with MFA and access reviews | All 4 |
| Encryption | TLS 1.2+ in transit, AES-256 at rest | All 4 |
| Logging & Monitoring | Centralized logging with 90-day retention | All 4 |
| Incident Response | Documented IR plan with annual testing | All 4 |
| Change Management | Peer-reviewed changes with rollback capability | All 4 |
| Vulnerability Mgmt | Regular scanning with risk-based remediation | All 4 |
| Vendor Management | Third-party risk assessments | SOC 2, ISO, NIST |
| Data Classification | Asset inventory with sensitivity labels | ISO, NIST, PCI-DSS |
Create a structured control library that maps each implementation to all satisfied framework requirements:
# unified-control-library.yaml
controls:
- id: UCL-AC-001
title: "Multi-Factor Authentication"
description: "MFA is required for all user accounts accessing production systems"
owner: "Security Engineering"
implementation:
status: implemented
evidence_type: configuration_screenshot
automation: "Quarterly MFA compliance scan via IdP API"
mappings:
soc2:
- CC6.1 # Logical and physical access controls
- CC6.2 # Access credentials management
iso27001:
- A.8.5 # Secure authentication
nist_csf:
- PR.AA-01 # Identities and credentials managed
- PR.AA-03 # Users, services, and hardware authenticated
pci_dss:
- "8.4.2" # MFA for all access to CDE
- "8.4.3" # MFA for remote network access
For each unified control, define evidence collection procedures that produce artifacts satisfying all mapped frameworks:
Map evidence artifacts to control IDs for audit retrieval:
evidence:
- id: EVD-AC-001-Q1-2026
control_id: UCL-AC-001
type: automated_report
source: "Okta MFA compliance report"
collected_at: "2026-01-15T00:00:00Z"
satisfies:
- soc2: CC6.1
- iso27001: A.8.5
- nist_csf: PR.AA-03
- pci_dss: "8.4.2"
+-------------------+------------------+------------------+------------------+
| SOC 2 | ISO 27001:2022 | NIST CSF 2.0 | PCI-DSS v4.0 |
+-------------------+------------------+------------------+------------------+
| CC6.1 Logical & | A.5.15 Access | PR.AA-01 Identity| 7.1 Restrict |
| physical access | control | & credentials | access by need |
| | | managed | to know |
+-------------------+------------------+------------------+------------------+
| CC6.2 Credentials | A.8.5 Secure | PR.AA-03 Users | 8.2 User ID |
| management | authentication | authenticated | management |
+-------------------+------------------+------------------+------------------+
| CC6.3 Access | A.5.18 Access | PR.AA-05 Access | 7.2 Appropriate |
| authorization | rights | permissions | access control |
+-------------------+------------------+------------------+------------------+
| CC6.6 System | A.8.20 Network | PR.DS-01 Data at | 1.3 Network |
| boundaries | security | rest protected | access controls |
+-------------------+------------------+------------------+------------------+
| CC6.7 Data | A.8.24 Use of | PR.DS-02 Data in | 4.1 Strong |
| transmission | cryptography | transit protected| cryptography |
+-------------------+------------------+------------------+------------------+
| CC6.8 Unauthorized| A.8.16 Monitoring| DE.CM-01 Networks| 10.6 Review logs |
| access prevention | activities | monitored | and events |
+-------------------+------------------+------------------+------------------+
# Full unified control library structure
metadata:
version: "1.0.0"
last_updated: "2026-02-24"
frameworks:
- name: soc2
version: "2022"
source: "AICPA Trust Services Criteria"
- name: iso27001
version: "2022"
source: "ISO/IEC 27001:2022 Annex A"
- name: nist_csf
version: "2.0"
source: "NIST Cybersecurity Framework 2.0"
- name: pci_dss
version: "4.0"
source: "PCI-DSS v4.0"
domains:
- name: "Access Control"
controls:
- id: UCL-AC-001
title: "Multi-Factor Authentication"
description: >
MFA is required for all interactive user accounts accessing
production systems, administrative consoles, and cloud provider
management planes.
owner: "Security Engineering"
review_frequency: quarterly
implementation:
status: implemented
tool: "Okta Verify"
automation: true
evidence_artifacts:
- "Okta MFA enforcement policy export"
- "Quarterly MFA compliance scan results"
mappings:
soc2: [CC6.1, CC6.2]
iso27001: [A.8.5]
nist_csf: [PR.AA-01, PR.AA-03]
pci_dss: ["8.4.2", "8.4.3"]
- id: UCL-AC-002
title: "Role-Based Access Control"
description: >
Access to systems and data is granted based on job function
using predefined roles. Least privilege is enforced. Access
reviews are conducted quarterly.
owner: "IT Operations"
review_frequency: quarterly
implementation:
status: implemented
tool: "Okta + GCP IAM"
automation: partial
evidence_artifacts:
- "GCP IAM policy export"
- "Quarterly access review spreadsheet"
- "Role definition document"
mappings:
soc2: [CC6.1, CC6.3]
iso27001: [A.5.15, A.5.18]
nist_csf: [PR.AA-05]
pci_dss: ["7.1", "7.2"]
- id: UCL-AC-003
title: "Privileged Access Management"
description: >
Privileged accounts (admin, root, service accounts) are
inventoried, subject to enhanced monitoring, and require
additional approval for access.
owner: "Security Engineering"
review_frequency: monthly
implementation:
status: implemented
tool: "GCP IAM + Breakglass procedure"
automation: partial
evidence_artifacts:
- "Privileged account inventory"
- "Break-glass access logs"
- "Monthly privileged access review"
mappings:
soc2: [CC6.1, CC6.2, CC6.3]
iso27001: [A.8.2, A.8.5, A.8.18]
nist_csf: [PR.AA-01, PR.AA-05]
pci_dss: ["7.2", "8.6"]
- name: "Data Protection"
controls:
- id: UCL-DP-001
title: "Encryption at Rest"
description: >
All data at rest is encrypted using AES-256 or equivalent.
Cloud-managed encryption keys are used by default;
customer-managed keys (CMEK) available for enterprise tier.
owner: "Platform Engineering"
review_frequency: annual
implementation:
status: implemented
tool: "GCP Cloud KMS"
automation: true
evidence_artifacts:
- "GCP encryption configuration scan"
- "KMS key rotation policy"
mappings:
soc2: [CC6.7]
iso27001: [A.8.24]
nist_csf: [PR.DS-01]
pci_dss: ["3.5", "3.6"]