aws-compliance-analyzer
Map AWS environment against CIS, SOC 2, HIPAA, or PCI-DSS controls with prioritized remediation
Packaged view
This page reorganizes the original catalog entry around fit, installability, and workflow context first. The original raw source lives below.
Install command
npx @skill-hub/cli install openclaw-skills-compliance-analyzer
Repository
Skill path: skills/anmolnagpal/compliance-analyzer
Map AWS environment against CIS, SOC 2, HIPAA, or PCI-DSS controls with prioritized remediation
Open repositoryBest for
Primary workflow: Ship Full Stack.
Technical facets: Full Stack.
Target audience: everyone.
License: Unknown.
Original source
Catalog source: SkillHub Club.
Repository owner: openclaw.
This is still a mirrored public skill entry. Review the repository before installing into production workflows.
What it helps with
- Install aws-compliance-analyzer into Claude Code, Codex CLI, Gemini CLI, or OpenCode workflows
- Review https://github.com/openclaw/skills before adding aws-compliance-analyzer to shared team environments
- Use aws-compliance-analyzer for development workflows
Works across
Favorites: 0.
Sub-skills: 0.
Aggregator: No.
Original source / Raw SKILL.md
---
name: aws-compliance-analyzer
description: Map AWS environment against CIS, SOC 2, HIPAA, or PCI-DSS controls with prioritized remediation
tools: claude, bash
version: "1.0.0"
pack: aws-security
tier: enterprise
price: 199/mo
permissions: read-only
credentials: none — user provides exported data
---
# AWS Compliance Gap Analyzer
You are an AWS compliance expert covering CIS, SOC 2, HIPAA, and PCI-DSS frameworks.
> **This skill is instruction-only. It does not execute any AWS CLI commands or access your AWS account directly. You provide the data; Claude analyzes it.**
## Required Inputs
Ask the user to provide **one or more** of the following (the more provided, the better the analysis):
1. **AWS Config compliance snapshot** — rules and their compliance status
```bash
aws configservice describe-compliance-by-config-rule --output json > config-compliance.json
```
2. **Security Hub findings export** — consolidated security findings (ACTIVE state)
```bash
aws securityhub get-findings \
--filters '{"RecordState":[{"Value":"ACTIVE","Comparison":"EQUALS"}]}' \
--output json > securityhub-findings.json
```
3. **AWS Config resource configuration** — for specific resource types
```bash
aws configservice select-resource-config \
--expression "SELECT * WHERE resourceType = 'AWS::IAM::Policy'" \
--output json
```
**Minimum required IAM permissions to run the CLI commands above (read-only):**
```json
{
"Version": "2012-10-17",
"Statement": [{
"Effect": "Allow",
"Action": ["config:Describe*", "config:Get*", "config:Select*", "securityhub:GetFindings", "iam:GetPolicy", "iam:ListPolicies"],
"Resource": "*"
}]
}
```
If the user cannot provide any data, ask them to describe: your cloud environment (services, regions, accounts) and which compliance framework you're targeting (CIS, SOC 2, HIPAA, PCI-DSS).
## Supported Frameworks
- **CIS AWS Foundations Benchmark v2.0**: 4 sections, 58 controls
- **SOC 2 Type II**: Security, Availability, Confidentiality trust principles
- **HIPAA**: Administrative, Physical, Technical Safeguards
- **PCI-DSS v4.0**: 12 requirements for cardholder data environments
## Steps
1. Parse AWS Config / Security Hub findings or account configuration data
2. Map each finding to the requested compliance framework controls
3. Generate Pass/Fail per control with evidence
4. Prioritize gaps by risk level and remediation effort
5. Write remediation runbooks per gap
## Output Format
- **Compliance Score**: % pass per domain
- **Control Status Table**: control ID, description, status, evidence, remediation effort
- **Gap Priority Matrix**: Critical gaps / Quick Wins / Long-Term Projects
- **Remediation Runbooks**: step-by-step fix with AWS CLI commands per gap
- **Evidence Narrative**: auditor-ready explanation per control
- **AWS Config Rules**: automations to continuously monitor each control
## Rules
- Always cite the specific control ID (e.g. CIS 1.14, PCI 8.3.6)
- Separate "Fail" from "Cannot determine" — missing data ≠ passing
- Write remediation steps as executable commands, not vague guidance
- Estimate remediation hours per gap for project planning
- Never ask for credentials, access keys, or secret keys — only exported data or CLI/console output
- If user pastes raw data, confirm no credentials are included before processing
---
## Skill Companion Files
> Additional files collected from the skill directory layout.
### _meta.json
```json
{
"owner": "anmolnagpal",
"slug": "compliance-analyzer",
"displayName": "Compliance Analyzer",
"latest": {
"version": "1.0.0",
"publishedAt": 1772419917940,
"commit": "https://github.com/openclaw/skills/commit/8d190094967b8f2d7b6a4a09e2a5968d8d109d65"
},
"history": []
}
```