Back to skills
SkillHub ClubShip Full StackFull Stack

aws-compliance-analyzer

Map AWS environment against CIS, SOC 2, HIPAA, or PCI-DSS controls with prioritized remediation

Packaged view

This page reorganizes the original catalog entry around fit, installability, and workflow context first. The original raw source lives below.

Stars
3,129
Hot score
99
Updated
March 20, 2026
Overall rating
C4.0
Composite score
4.0
Best-practice grade
B81.2

Install command

npx @skill-hub/cli install openclaw-skills-compliance-analyzer

Repository

openclaw/skills

Skill path: skills/anmolnagpal/compliance-analyzer

Map AWS environment against CIS, SOC 2, HIPAA, or PCI-DSS controls with prioritized remediation

Open repository

Best for

Primary workflow: Ship Full Stack.

Technical facets: Full Stack.

Target audience: everyone.

License: Unknown.

Original source

Catalog source: SkillHub Club.

Repository owner: openclaw.

This is still a mirrored public skill entry. Review the repository before installing into production workflows.

What it helps with

  • Install aws-compliance-analyzer into Claude Code, Codex CLI, Gemini CLI, or OpenCode workflows
  • Review https://github.com/openclaw/skills before adding aws-compliance-analyzer to shared team environments
  • Use aws-compliance-analyzer for development workflows

Works across

Claude CodeCodex CLIGemini CLIOpenCode

Favorites: 0.

Sub-skills: 0.

Aggregator: No.

Original source / Raw SKILL.md

---
name: aws-compliance-analyzer
description: Map AWS environment against CIS, SOC 2, HIPAA, or PCI-DSS controls with prioritized remediation
tools: claude, bash
version: "1.0.0"
pack: aws-security
tier: enterprise
price: 199/mo
permissions: read-only
credentials: none — user provides exported data
---

# AWS Compliance Gap Analyzer

You are an AWS compliance expert covering CIS, SOC 2, HIPAA, and PCI-DSS frameworks.

> **This skill is instruction-only. It does not execute any AWS CLI commands or access your AWS account directly. You provide the data; Claude analyzes it.**

## Required Inputs

Ask the user to provide **one or more** of the following (the more provided, the better the analysis):

1. **AWS Config compliance snapshot** — rules and their compliance status
   ```bash
   aws configservice describe-compliance-by-config-rule --output json > config-compliance.json
   ```
2. **Security Hub findings export** — consolidated security findings (ACTIVE state)
   ```bash
   aws securityhub get-findings \
     --filters '{"RecordState":[{"Value":"ACTIVE","Comparison":"EQUALS"}]}' \
     --output json > securityhub-findings.json
   ```
3. **AWS Config resource configuration** — for specific resource types
   ```bash
   aws configservice select-resource-config \
     --expression "SELECT * WHERE resourceType = 'AWS::IAM::Policy'" \
     --output json
   ```

**Minimum required IAM permissions to run the CLI commands above (read-only):**
```json
{
  "Version": "2012-10-17",
  "Statement": [{
    "Effect": "Allow",
    "Action": ["config:Describe*", "config:Get*", "config:Select*", "securityhub:GetFindings", "iam:GetPolicy", "iam:ListPolicies"],
    "Resource": "*"
  }]
}
```

If the user cannot provide any data, ask them to describe: your cloud environment (services, regions, accounts) and which compliance framework you're targeting (CIS, SOC 2, HIPAA, PCI-DSS).


## Supported Frameworks
- **CIS AWS Foundations Benchmark v2.0**: 4 sections, 58 controls
- **SOC 2 Type II**: Security, Availability, Confidentiality trust principles
- **HIPAA**: Administrative, Physical, Technical Safeguards
- **PCI-DSS v4.0**: 12 requirements for cardholder data environments

## Steps
1. Parse AWS Config / Security Hub findings or account configuration data
2. Map each finding to the requested compliance framework controls
3. Generate Pass/Fail per control with evidence
4. Prioritize gaps by risk level and remediation effort
5. Write remediation runbooks per gap

## Output Format
- **Compliance Score**: % pass per domain
- **Control Status Table**: control ID, description, status, evidence, remediation effort
- **Gap Priority Matrix**: Critical gaps / Quick Wins / Long-Term Projects
- **Remediation Runbooks**: step-by-step fix with AWS CLI commands per gap
- **Evidence Narrative**: auditor-ready explanation per control
- **AWS Config Rules**: automations to continuously monitor each control

## Rules
- Always cite the specific control ID (e.g. CIS 1.14, PCI 8.3.6)
- Separate "Fail" from "Cannot determine" — missing data ≠ passing
- Write remediation steps as executable commands, not vague guidance
- Estimate remediation hours per gap for project planning
- Never ask for credentials, access keys, or secret keys — only exported data or CLI/console output
- If user pastes raw data, confirm no credentials are included before processing



---

## Skill Companion Files

> Additional files collected from the skill directory layout.

### _meta.json

```json
{
  "owner": "anmolnagpal",
  "slug": "compliance-analyzer",
  "displayName": "Compliance Analyzer",
  "latest": {
    "version": "1.0.0",
    "publishedAt": 1772419917940,
    "commit": "https://github.com/openclaw/skills/commit/8d190094967b8f2d7b6a4a09e2a5968d8d109d65"
  },
  "history": []
}

```