Execute automate SOC 2 audit preparation including evidence gathering, control assessment, and compliance gap identification. Use when you need to prepare for SOC 2 audits, assess Trust Service Criteria compliance, document security controls, or generate readiness reports. Trigger with phrases like "SOC 2 audit preparation", "SOC 2 readiness assessment", "collect SOC 2 evidence", or "Trust Service Criteria compliance".
Automates SOC 2 audit preparation by gathering evidence, assessing controls, and identifying compliance gaps against Trust Service Criteria. Trigger with phrases like "SOC 2 readiness assessment" or "collect SOC 2 evidence" to generate audit-ready reports.
/plugin marketplace add jeremylongshore/claude-code-plugins-plus-skills/plugin install soc2-audit-helper@claude-code-plugins-plusThis skill is limited to using the following tools:
assets/README.mdreferences/README.mdreferences/errors.mdreferences/examples.mdreferences/implementation.mdreferences/readiness-by-trust-service-category.mdscripts/README.mdscripts/evidence_gathering_automation.pyscripts/generate_soc2_report.pyscripts/identify_compliance_gaps.pyscripts/suggest_remediation_steps.pyThis skill provides automated assistance for the described functionality.
Before using this skill, ensure:
See {baseDir}/references/implementation.md for detailed implementation guide.
The skill produces:
Primary Output: SOC 2 readiness report saved to {baseDir}/soc2-audit/readiness-report-YYYYMMDD.md
Report Structure:
# SOC 2 Readiness Assessment
## Error Handling
See `{baseDir}/references/errors.md` for comprehensive error handling.
## Examples
See `{baseDir}/references/examples.md` for detailed examples.
## Resources
- AICPA Trust Service Criteria: https://www.aicpa.org/interestareas/frc/assuranceadvisoryservices/trustdataintegritytaskforce.html
- SOC 2 Compliance Checklist: https://secureframe.com/hub/soc-2/checklist
- CIS Controls: https://www.cisecurity.org/controls/
- NIST Cybersecurity Framework: https://www.nist.gov/cyberframework
- Drata: SOC 2 compliance automation
Master authentication and authorization patterns including JWT, OAuth2, session management, and RBAC to build secure, scalable access control systems. Use when implementing auth systems, securing APIs, or debugging security issues.