From compliance-checker
Audits Terraform, Kubernetes, and cloud configs against CIS, SOC 2, HIPAA using Checkov, tfsec, OPA. Generates compliance reports, remediation patches, and CI/CD gating steps.
npx claudepluginhub jeremylongshore/claude-code-plugins-plus-skills --plugin compliance-checkerThis skill is limited to using the following tools:
Audit infrastructure configurations against compliance frameworks (CIS Benchmarks, SOC 2, HIPAA, PCI-DSS, GDPR) using policy-as-code tools like Open Policy Agent (OPA), Checkov, and tfsec. Generate compliance reports, identify violations, and produce remediation plans for Terraform, Kubernetes, and cloud provider configurations.
Scans Infrastructure as Code for security misconfigurations and compliance violations using Checkov, supporting Terraform, CloudFormation, Kubernetes, Dockerfiles, and ARM templates.
Maps IaC files (Terraform, Kubernetes, CloudFormation, Pulumi, Ansible) to compliance controls (SOC 2, ISO 27001, NIST 800-53) and generates markdown evidence reports with status and recommendations.
Runs AWS compliance checks against CIS Foundations, PCI-DSS, HIPAA, and SOC 2 benchmarks using AWS CLI. Validates IAM, root accounts, MFA, logging, and networking for audits.
Share bugs, ideas, or general feedback.
Audit infrastructure configurations against compliance frameworks (CIS Benchmarks, SOC 2, HIPAA, PCI-DSS, GDPR) using policy-as-code tools like Open Policy Agent (OPA), Checkov, and tfsec. Generate compliance reports, identify violations, and produce remediation plans for Terraform, Kubernetes, and cloud provider configurations.
checkov, tfsec, opa, or kube-benchjq for parsing JSON policy outputscheckov -d . or tfsec . to detect misconfigurationsaws iam access-analyzer)| Error | Cause | Solution |
|---|---|---|
checkov: no Terraform files found | Scanner run from wrong directory | Specify path explicitly with -d path/to/terraform/ |
tfsec: failed to parse HCL | Syntax error in Terraform files | Run terraform validate first to fix HCL syntax before compliance scan |
False positive on compliance check | Rule too broad for the specific use case | Add inline skip comments (#checkov:skip=CKV_AWS_18:Reason) or create a .checkov.yml skip list |
OPA policy evaluation error | Rego syntax error or missing input data | Test policies with opa eval -d policy.rego -i input.json and validate Rego syntax |
Scan timeout on large codebase | Too many files or complex module references | Use --compact mode, scan directories individually, or increase timeout limits |