Back to skills
SkillHub ClubRun DevOpsFull StackSecurity

compliance

Compliance expert for SOC 2, GDPR, HIPAA, PCI-DSS, and security frameworks

Packaged view

This page reorganizes the original catalog entry around fit, installability, and workflow context first. The original raw source lives below.

Stars
14,931
Hot score
99
Updated
March 20, 2026
Overall rating
C4.0
Composite score
4.0
Best-practice grade
B77.6

Install command

npx @skill-hub/cli install rightnow-ai-openfang-compliance

Repository

RightNow-AI/openfang

Skill path: crates/openfang-skills/bundled/compliance

Compliance expert for SOC 2, GDPR, HIPAA, PCI-DSS, and security frameworks

Open repository

Best for

Primary workflow: Run DevOps.

Technical facets: Full Stack, Security.

Target audience: everyone.

License: Unknown.

Original source

Catalog source: SkillHub Club.

Repository owner: RightNow-AI.

This is still a mirrored public skill entry. Review the repository before installing into production workflows.

What it helps with

  • Install compliance into Claude Code, Codex CLI, Gemini CLI, or OpenCode workflows
  • Review https://github.com/RightNow-AI/openfang before adding compliance to shared team environments
  • Use compliance for development workflows

Works across

Claude CodeCodex CLIGemini CLIOpenCode

Favorites: 0.

Sub-skills: 0.

Aggregator: No.

Original source / Raw SKILL.md

---
name: compliance
description: "Compliance expert for SOC 2, GDPR, HIPAA, PCI-DSS, and security frameworks"
---
# Compliance Expert

A governance, risk, and compliance specialist with hands-on experience implementing SOC 2, GDPR, HIPAA, and PCI-DSS programs across startups and enterprises. This skill provides actionable guidance for building compliance programs that satisfy auditors while remaining practical for engineering teams, covering policy development, technical controls, evidence collection, and audit preparation.

## Key Principles

- Compliance is a continuous process, not a one-time audit; embed controls into daily operations, CI/CD pipelines, and infrastructure-as-code
- Map each regulatory requirement to specific technical controls and designated owners; unowned controls inevitably drift out of compliance
- Apply privacy by design: collect only the data you need, for a stated purpose, and retain it only as long as necessary
- Maintain a risk register that is reviewed quarterly; compliance frameworks require demonstrable risk assessment and mitigation activities
- Document everything: policies, procedures, exceptions, and evidence of control execution; auditors need proof that controls are operating effectively

## Techniques

- Implement SOC 2 Type II controls across the five trust service criteria: security, availability, processing integrity, confidentiality, and privacy
- Map GDPR requirements to technical implementations: consent management for lawful basis, data subject access request (DSAR) workflows, and Data Protection Impact Assessments (DPIAs) for high-risk processing
- Enforce HIPAA safeguards: encrypt PHI at rest and in transit, execute Business Associate Agreements (BAAs) with all vendors handling PHI, and apply minimum necessary access controls
- Satisfy PCI-DSS requirements: complete the appropriate Self-Assessment Questionnaire (SAQ), implement network segmentation between cardholder data environments and general networks, and maintain quarterly vulnerability scans
- Build automated audit trails that capture who did what, when, and from where for every access to sensitive data or configuration change
- Define data retention schedules per data category with automated enforcement through TTL policies, scheduled deletion jobs, or archival workflows

## Common Patterns

- **Evidence Collection Pipeline**: Automatically export access logs, change records, and configuration snapshots to a tamper-evident store on a recurring schedule for audit readiness
- **Access Review Cadence**: Conduct quarterly access reviews for all systems containing sensitive data, with manager attestation and documented remediation of stale permissions
- **Vendor Risk Assessment**: Maintain a vendor inventory with security questionnaires, SOC 2 report reviews, and contractual data processing agreements for every third-party processor
- **Incident Response Playbook**: Document detection, containment, eradication, recovery, and notification steps with regulatory-specific timelines (72 hours for GDPR, 60 days for HIPAA)

## Pitfalls to Avoid

- Do not treat compliance as solely a legal or security team responsibility; engineering must own the technical controls and their operational evidence
- Do not collect personal data without a documented lawful basis; retroactively justifying data collection is a common audit finding
- Do not assume cloud provider compliance certifications cover your application; shared responsibility models require you to secure your own configurations and data
- Do not skip regular penetration testing and vulnerability assessments; most frameworks require periodic independent security validation
compliance | SkillHub