Loading...
Loading...
Audits a codebase or business process for regulatory compliance across GDPR, HIPAA, SOC2, CCPA, and PCI-DSS. Scans for PII handling, data retention, encryption, access controls, audit logging, consent management, and data transfer issues. Generates a structured compliance report with findings, gap analysis, remediation steps, and evidence requirements.
npx skill4agent add onewave-ai/claude-skills compliance-checker- Field names: email, phone, ssn, social_security, date_of_birth, dob, address, credit_card, card_number, cvv, pan, first_name, last_name, ip_address, device_id, location, latitude, longitude, biometric, health, diagnosis, prescription, medical
- Table/collection names: users, customers, patients, members, accounts, profiles, contacts, employees, cardholders, beneficiaries
- Code patterns: PII, PHI, personally_identifiable, protected_health, cardholder_data, sensitive_data
- File patterns: .env, .env.*, config.*, secrets.*, credentials.*, *.pem, *.key, *.cert- Keywords: retention, ttl, expire, expiry, expiration, purge, archive, delete_after, cleanup, data_lifecycle, retention_period, dispose, destroy
- Cron jobs or scheduled tasks related to data cleanup
- Database migration files that add or modify retention-related columns
- Configuration for log rotation and retention- Keywords: encrypt, decrypt, cipher, aes, rsa, tls, ssl, https, certificate, cert, key_management, kms, vault, secret, hash, bcrypt, scrypt, argon2, pbkdf2, md5, sha1, sha256, hmac, salt, iv, nonce, padding
- Configuration: ssl_mode, sslmode, require_ssl, force_ssl, min_tls_version, cipher_suite
- Files: *.pem, *.key, *.cert, *.crt, *.pfx, *.p12, *.jks, *.keystore- Keywords: auth, authenticate, authorize, permission, role, rbac, abac, acl, access_control, privilege, admin, superuser, root, sudo, service_account, api_key, token, session, jwt, oauth, saml, oidc, sso, mfa, 2fa, totp, password_policy, login, logout
- Configuration: cors, allowed_origins, allowed_hosts, csrf, rate_limit, throttle, brute_force
- Middleware/decorators: @auth, @login_required, @requires_permission, @admin_only, requireAuth, isAuthenticated, checkPermission- Keywords: audit, audit_log, audit_trail, event_log, activity_log, access_log, security_log, log_event, track, record_action, compliance_log, siem, splunk, datadog, cloudwatch, elastic
- Functions: logger, log.info, log.warn, log.error, audit.log, createAuditEntry, recordEvent, trackActivity
- Tables/collections: audit_logs, event_logs, activity_logs, access_logs, security_events- Keywords: consent, opt_in, opt_out, cookie_consent, cookie_banner, privacy_policy, terms_of_service, tos, gdpr_consent, marketing_consent, unsubscribe, preference, cookie_preference, purpose, legitimate_interest, dsar, data_subject, age_verification, parental_consent, double_opt_in
- Components/templates: CookieBanner, ConsentManager, PrivacyModal, OptOutForm, PreferenceCenter, UnsubscribeLink
- Database fields: consented_at, consent_version, marketing_opt_in, cookie_preferences, privacy_accepted- Keywords: transfer, export, share, third_party, subprocessor, vendor, analytics, tracking, pixel, beacon, cdn, region, jurisdiction, cross_border, scc, standard_contractual, adequacy, bcr, dpa, data_processing_agreement
- Services: google_analytics, segment, mixpanel, amplitude, hotjar, intercom, zendesk, stripe, twilio, sendgrid, mailchimp, aws_region, gcp_region, azure_region, cloudflare
- Configuration: region, availability_zone, data_residency, geo_restrictioncompliance-report.md# Compliance Audit Report
**Audit Date**: [Date of audit]
**Audit Scope**: [Description of what was audited]
**Auditor**: Claude Code Compliance Checker
**Frameworks Assessed**: [List of applicable frameworks]
---
## Executive Summary
[2-3 paragraph summary of overall compliance posture, key risks, and top priority actions. Include a summary table:]
| Framework | Status | Critical | High | Medium | Low | Info |
|-----------|--------|----------|------|--------|-----|------|
| GDPR | [status] | [n] | [n] | [n] | [n] | [n] |
| HIPAA | [status] | [n] | [n] | [n] | [n] | [n] |
| SOC 2 | [status] | [n] | [n] | [n] | [n] | [n] |
| CCPA | [status] | [n] | [n] | [n] | [n] | [n] |
| PCI-DSS | [status] | [n] | [n] | [n] | [n] | [n] |
**Overall Risk Rating**: [Critical / High / Medium / Low]
**Total Findings**: [N] ([breakdown by severity])
**Immediate Actions Required**: [count]
---
## Table of Contents
1. [Audit Scope and Methodology](#audit-scope-and-methodology)
2. [Data Inventory](#data-inventory)
3. [Findings by Scan Category](#findings-by-scan-category)
3.1 [PII and Sensitive Data Handling](#pii-and-sensitive-data-handling)
3.2 [Data Retention](#data-retention)
3.3 [Encryption](#encryption)
3.4 [Access Controls](#access-controls)
3.5 [Audit Logging](#audit-logging)
3.6 [Consent Management](#consent-management)
3.7 [Data Transfer](#data-transfer)
4. [Gap Analysis by Framework](#gap-analysis-by-framework)
4.1 [GDPR Gap Analysis](#gdpr-gap-analysis)
4.2 [HIPAA Gap Analysis](#hipaa-gap-analysis)
4.3 [SOC 2 Gap Analysis](#soc-2-gap-analysis)
4.4 [CCPA Gap Analysis](#ccpa-gap-analysis)
4.5 [PCI-DSS Gap Analysis](#pci-dss-gap-analysis)
5. [Remediation Plan](#remediation-plan)
6. [Evidence Requirements for Certification](#evidence-requirements-for-certification)
7. [Appendices](#appendices)
---
## 1. Audit Scope and Methodology
### Scope
[Describe what was included in the audit: repositories, services, infrastructure, documentation]
### Methodology
[Describe the approach taken: automated scanning, manual code review, configuration review, documentation review]
### Limitations
[Describe any limitations: areas that could not be assessed, information that was unavailable, assumptions made]
### Framework Applicability Determination
[For each framework, explain why it is or is not applicable to this system]
---
## 2. Data Inventory
### Data Categories Identified
| Category | Data Elements | Storage Location(s) | Classification |
|----------|--------------|---------------------|----------------|
| [category] | [elements] | [locations] | [PII/PHI/CHD/Sensitive/Public] |
### Data Flow Summary
[Describe how regulated data flows through the system: ingestion points, processing steps, storage locations, output/transfer points, deletion]
---
## 3. Findings by Scan Category
### 3.1 PII and Sensitive Data Handling
#### Positive Findings (Evidence of Compliance)
[List controls and practices that support compliance, with file paths and line numbers]
#### Gaps and Issues
[For each gap, provide:]
**Finding [ID]: [Title]**
- **Severity**: [CRITICAL/HIGH/MEDIUM/LOW/INFO]
- **Location**: [File path and line numbers]
- **Description**: [What was found or what is missing]
- **Affected Frameworks**: [Which frameworks this impacts]
- **Evidence**: [Code snippet or configuration excerpt]
- **Risk**: [What could go wrong if not addressed]
[Repeat for each finding]
### 3.2 Data Retention
#### Positive Findings (Evidence of Compliance)
[List controls and practices that support compliance]
#### Gaps and Issues
[Same format as 3.1]
### 3.3 Encryption
#### Positive Findings (Evidence of Compliance)
[List controls and practices that support compliance]
#### Gaps and Issues
[Same format as 3.1]
### 3.4 Access Controls
#### Positive Findings (Evidence of Compliance)
[List controls and practices that support compliance]
#### Gaps and Issues
[Same format as 3.1]
### 3.5 Audit Logging
#### Positive Findings (Evidence of Compliance)
[List controls and practices that support compliance]
#### Gaps and Issues
[Same format as 3.1]
### 3.6 Consent Management
#### Positive Findings (Evidence of Compliance)
[List controls and practices that support compliance]
#### Gaps and Issues
[Same format as 3.1]
### 3.7 Data Transfer
#### Positive Findings (Evidence of Compliance)
[List controls and practices that support compliance]
#### Gaps and Issues
[Same format as 3.1]
---
## 4. Gap Analysis by Framework
### 4.1 GDPR Gap Analysis
| Article/Requirement | Description | Status | Severity | Finding Ref |
|---------------------|-------------|--------|----------|-------------|
| Art. 5(1)(a) | Lawfulness, fairness, transparency | [status] | [severity] | [ref] |
| Art. 5(1)(b) | Purpose limitation | [status] | [severity] | [ref] |
| Art. 5(1)(c) | Data minimisation | [status] | [severity] | [ref] |
| Art. 5(1)(d) | Accuracy | [status] | [severity] | [ref] |
| Art. 5(1)(e) | Storage limitation | [status] | [severity] | [ref] |
| Art. 5(1)(f) | Integrity and confidentiality | [status] | [severity] | [ref] |
| Art. 5(2) | Accountability | [status] | [severity] | [ref] |
| Art. 6 | Lawful basis for processing | [status] | [severity] | [ref] |
| Art. 7 | Conditions for consent | [status] | [severity] | [ref] |
| Art. 12 | Transparent information | [status] | [severity] | [ref] |
| Art. 13 | Information at collection | [status] | [severity] | [ref] |
| Art. 14 | Information not obtained from data subject | [status] | [severity] | [ref] |
| Art. 15 | Right of access | [status] | [severity] | [ref] |
| Art. 16 | Right to rectification | [status] | [severity] | [ref] |
| Art. 17 | Right to erasure | [status] | [severity] | [ref] |
| Art. 18 | Right to restriction | [status] | [severity] | [ref] |
| Art. 20 | Right to data portability | [status] | [severity] | [ref] |
| Art. 21 | Right to object | [status] | [severity] | [ref] |
| Art. 22 | Automated decision-making | [status] | [severity] | [ref] |
| Art. 25 | Data protection by design/default | [status] | [severity] | [ref] |
| Art. 28 | Processor obligations | [status] | [severity] | [ref] |
| Art. 30 | Records of processing | [status] | [severity] | [ref] |
| Art. 32 | Security of processing | [status] | [severity] | [ref] |
| Art. 33 | Breach notification to authority | [status] | [severity] | [ref] |
| Art. 34 | Breach notification to data subjects | [status] | [severity] | [ref] |
| Art. 35 | Data protection impact assessment | [status] | [severity] | [ref] |
| Art. 37 | Data Protection Officer | [status] | [severity] | [ref] |
| Art. 44-49 | International transfers | [status] | [severity] | [ref] |
### 4.2 HIPAA Gap Analysis
| Standard | Requirement | Status | Severity | Finding Ref |
|----------|-------------|--------|----------|-------------|
| 164.308(a)(1) | Security Management Process | [status] | [severity] | [ref] |
| 164.308(a)(2) | Assigned Security Responsibility | [status] | [severity] | [ref] |
| 164.308(a)(3) | Workforce Security | [status] | [severity] | [ref] |
| 164.308(a)(4) | Information Access Management | [status] | [severity] | [ref] |
| 164.308(a)(5) | Security Awareness Training | [status] | [severity] | [ref] |
| 164.308(a)(6) | Security Incident Procedures | [status] | [severity] | [ref] |
| 164.308(a)(7) | Contingency Plan | [status] | [severity] | [ref] |
| 164.308(a)(8) | Evaluation | [status] | [severity] | [ref] |
| 164.310(a) | Facility Access Controls | [status] | [severity] | [ref] |
| 164.310(b) | Workstation Use | [status] | [severity] | [ref] |
| 164.310(c) | Workstation Security | [status] | [severity] | [ref] |
| 164.310(d) | Device and Media Controls | [status] | [severity] | [ref] |
| 164.312(a) | Access Control | [status] | [severity] | [ref] |
| 164.312(b) | Audit Controls | [status] | [severity] | [ref] |
| 164.312(c) | Integrity | [status] | [severity] | [ref] |
| 164.312(d) | Person or Entity Authentication | [status] | [severity] | [ref] |
| 164.312(e) | Transmission Security | [status] | [severity] | [ref] |
| 164.314(a) | Business Associate Contracts | [status] | [severity] | [ref] |
| 164.316(a) | Policies and Procedures | [status] | [severity] | [ref] |
| 164.316(b) | Documentation | [status] | [severity] | [ref] |
| 164.402-414 | Breach Notification | [status] | [severity] | [ref] |
### 4.3 SOC 2 Gap Analysis
| Criteria | Description | Status | Severity | Finding Ref |
|----------|-------------|--------|----------|-------------|
| CC1.1 | COSO Principle 1: Integrity and Ethics | [status] | [severity] | [ref] |
| CC1.2 | COSO Principle 2: Board Oversight | [status] | [severity] | [ref] |
| CC1.3 | COSO Principle 3: Management Structure | [status] | [severity] | [ref] |
| CC1.4 | COSO Principle 4: Competence Commitment | [status] | [severity] | [ref] |
| CC1.5 | COSO Principle 5: Accountability | [status] | [severity] | [ref] |
| CC2.1 | COSO Principle 13: Quality Information | [status] | [severity] | [ref] |
| CC2.2 | COSO Principle 14: Internal Communication | [status] | [severity] | [ref] |
| CC2.3 | COSO Principle 15: External Communication | [status] | [severity] | [ref] |
| CC3.1 | COSO Principle 6: Risk Objectives | [status] | [severity] | [ref] |
| CC3.2 | COSO Principle 7: Risk Identification | [status] | [severity] | [ref] |
| CC3.3 | COSO Principle 8: Fraud Risk | [status] | [severity] | [ref] |
| CC3.4 | COSO Principle 9: Change Impact | [status] | [severity] | [ref] |
| CC4.1 | COSO Principle 16: Monitoring | [status] | [severity] | [ref] |
| CC4.2 | COSO Principle 17: Deficiency Evaluation | [status] | [severity] | [ref] |
| CC5.1 | COSO Principle 10: Control Selection | [status] | [severity] | [ref] |
| CC5.2 | COSO Principle 11: Technology Controls | [status] | [severity] | [ref] |
| CC5.3 | COSO Principle 12: Control Deployment | [status] | [severity] | [ref] |
| CC6.1 | Logical and Physical Access - Security Software | [status] | [severity] | [ref] |
| CC6.2 | Logical and Physical Access - Credentials | [status] | [severity] | [ref] |
| CC6.3 | Logical and Physical Access - New Access | [status] | [severity] | [ref] |
| CC6.6 | Logical and Physical Access - External Threats | [status] | [severity] | [ref] |
| CC6.7 | Logical and Physical Access - Data Transmission | [status] | [severity] | [ref] |
| CC6.8 | Logical and Physical Access - Malicious Software | [status] | [severity] | [ref] |
| CC7.1 | System Operations - Vulnerability Detection | [status] | [severity] | [ref] |
| CC7.2 | System Operations - Anomaly Monitoring | [status] | [severity] | [ref] |
| CC7.3 | System Operations - Incident Evaluation | [status] | [severity] | [ref] |
| CC7.4 | System Operations - Incident Response | [status] | [severity] | [ref] |
| CC7.5 | System Operations - Incident Recovery | [status] | [severity] | [ref] |
| CC8.1 | Change Management - Authorization | [status] | [severity] | [ref] |
| CC9.1 | Risk Mitigation - Business Disruption | [status] | [severity] | [ref] |
| CC9.2 | Risk Mitigation - Vendor Management | [status] | [severity] | [ref] |
| A1.1 | Availability - Capacity Planning | [status] | [severity] | [ref] |
| A1.2 | Availability - Recovery Infrastructure | [status] | [severity] | [ref] |
| A1.3 | Availability - Recovery Testing | [status] | [severity] | [ref] |
| C1.1 | Confidentiality - Identification | [status] | [severity] | [ref] |
| C1.2 | Confidentiality - Disposal | [status] | [severity] | [ref] |
### 4.4 CCPA Gap Analysis
| Section | Requirement | Status | Severity | Finding Ref |
|---------|-------------|--------|----------|-------------|
| 1798.100(a) | Right to know categories | [status] | [severity] | [ref] |
| 1798.100(b) | Notice at collection | [status] | [severity] | [ref] |
| 1798.100(d) | Purpose limitation | [status] | [severity] | [ref] |
| 1798.100(e) | Data minimization | [status] | [severity] | [ref] |
| 1798.105 | Right to delete | [status] | [severity] | [ref] |
| 1798.106 | Right to correct | [status] | [severity] | [ref] |
| 1798.110 | Right to know specific pieces | [status] | [severity] | [ref] |
| 1798.115 | Right to know sale/sharing | [status] | [severity] | [ref] |
| 1798.120 | Right to opt-out of sale/sharing | [status] | [severity] | [ref] |
| 1798.121 | Right to limit sensitive PI use | [status] | [severity] | [ref] |
| 1798.125 | Non-discrimination | [status] | [severity] | [ref] |
| 1798.130 | Verification of requests | [status] | [severity] | [ref] |
| 1798.135 | Do Not Sell/Share link | [status] | [severity] | [ref] |
| 1798.140(v) | Service provider obligations | [status] | [severity] | [ref] |
| 1798.185 | Reasonable security | [status] | [severity] | [ref] |
### 4.5 PCI-DSS Gap Analysis
| Requirement | Description | Status | Severity | Finding Ref |
|-------------|-------------|--------|----------|-------------|
| 1.1 | Network security controls defined | [status] | [severity] | [ref] |
| 1.2 | Network security controls configured | [status] | [severity] | [ref] |
| 1.3 | Network access restricted | [status] | [severity] | [ref] |
| 1.4 | Network connections controlled | [status] | [severity] | [ref] |
| 1.5 | Risks to CDE mitigated | [status] | [severity] | [ref] |
| 2.1 | Secure configurations applied | [status] | [severity] | [ref] |
| 2.2 | System components configured securely | [status] | [severity] | [ref] |
| 2.3 | Wireless environments secured | [status] | [severity] | [ref] |
| 3.1 | Account data storage minimized | [status] | [severity] | [ref] |
| 3.2 | Sensitive authentication data not stored post-auth | [status] | [severity] | [ref] |
| 3.3 | PAN displayed securely (masked) | [status] | [severity] | [ref] |
| 3.4 | PAN secured when stored | [status] | [severity] | [ref] |
| 3.5 | PAN secured where stored | [status] | [severity] | [ref] |
| 3.6 | Cryptographic keys managed | [status] | [severity] | [ref] |
| 3.7 | Stored account data protected | [status] | [severity] | [ref] |
| 4.1 | Strong cryptography in transit | [status] | [severity] | [ref] |
| 4.2 | PAN secured in end-user messaging | [status] | [severity] | [ref] |
| 5.1 | Malware protection deployed | [status] | [severity] | [ref] |
| 5.2 | Malware prevention maintained | [status] | [severity] | [ref] |
| 5.3 | Anti-malware active and monitored | [status] | [severity] | [ref] |
| 5.4 | Anti-phishing mechanisms | [status] | [severity] | [ref] |
| 6.1 | Secure development processes | [status] | [severity] | [ref] |
| 6.2 | Bespoke software developed securely | [status] | [severity] | [ref] |
| 6.3 | Security vulnerabilities identified and addressed | [status] | [severity] | [ref] |
| 6.4 | Public-facing web apps protected | [status] | [severity] | [ref] |
| 6.5 | Changes managed securely | [status] | [severity] | [ref] |
| 7.1 | Access restricted by need to know | [status] | [severity] | [ref] |
| 7.2 | Access appropriately defined | [status] | [severity] | [ref] |
| 7.3 | Access control system configured | [status] | [severity] | [ref] |
| 8.1 | User identification management | [status] | [severity] | [ref] |
| 8.2 | User identification enforced | [status] | [severity] | [ref] |
| 8.3 | Strong authentication established | [status] | [severity] | [ref] |
| 8.4 | MFA implemented | [status] | [severity] | [ref] |
| 8.5 | MFA systems configured properly | [status] | [severity] | [ref] |
| 8.6 | Application/system accounts managed | [status] | [severity] | [ref] |
| 9.1 | Physical access restricted | [status] | [severity] | [ref] |
| 9.2 | Physical access controls manage entry | [status] | [severity] | [ref] |
| 9.3 | Physical access for personnel authorized | [status] | [severity] | [ref] |
| 9.4 | Media physically secured | [status] | [severity] | [ref] |
| 9.5 | POI devices protected | [status] | [severity] | [ref] |
| 10.1 | Logging mechanisms defined | [status] | [severity] | [ref] |
| 10.2 | Audit logs capture details | [status] | [severity] | [ref] |
| 10.3 | Audit logs protected | [status] | [severity] | [ref] |
| 10.4 | Audit logs reviewed | [status] | [severity] | [ref] |
| 10.5 | Audit log history retained | [status] | [severity] | [ref] |
| 10.6 | Time synchronization mechanisms | [status] | [severity] | [ref] |
| 10.7 | Detection of logging failures | [status] | [severity] | [ref] |
| 11.1 | Wireless access points detected | [status] | [severity] | [ref] |
| 11.2 | Wireless access points authorized | [status] | [severity] | [ref] |
| 11.3 | Vulnerabilities identified and addressed | [status] | [severity] | [ref] |
| 11.4 | Penetration testing performed | [status] | [severity] | [ref] |
| 11.5 | Network intrusions detected and responded | [status] | [severity] | [ref] |
| 11.6 | Unauthorized changes detected | [status] | [severity] | [ref] |
| 12.1 | Security policy established | [status] | [severity] | [ref] |
| 12.2 | Acceptable use policies | [status] | [severity] | [ref] |
| 12.3 | Risks formally identified | [status] | [severity] | [ref] |
| 12.4 | PCI-DSS responsibilities assigned | [status] | [severity] | [ref] |
| 12.5 | PCI-DSS scope documented | [status] | [severity] | [ref] |
| 12.6 | Security awareness program | [status] | [severity] | [ref] |
| 12.7 | Personnel screened | [status] | [severity] | [ref] |
| 12.8 | Third-party service provider risk managed | [status] | [severity] | [ref] |
| 12.9 | TPSPs acknowledge responsibilities | [status] | [severity] | [ref] |
| 12.10 | Incident response plan | [status] | [severity] | [ref] |
---
## 5. Remediation Plan
### Priority Matrix
| Priority | Finding ID | Title | Framework(s) | Severity | Effort | Owner |
|----------|-----------|-------|--------------|----------|--------|-------|
| 1 | [ID] | [title] | [frameworks] | [severity] | [XS-XL] | [TBD] |
### Detailed Remediation Steps
For each finding requiring remediation:
**[Finding ID]: [Title]**
- **Regulatory Reference**: [specific article/section/requirement]
- **Current State**: [what exists today]
- **Required State**: [what must be in place]
- **Remediation Steps**:
1. [Step 1 with specific technical or process action]
2. [Step 2]
3. [Step N]
- **Evidence Required**: [what documentation or artifacts to produce]
- **Estimated Effort**: [XS/S/M/L/XL]
- **Dependencies**: [other findings or external factors]
- **Suggested Timeline**: [specific date range based on severity]
---
## 6. Evidence Requirements for Certification
This section outlines the documentation and technical artifacts needed for each framework's certification or audit process.
### GDPR Evidence Pack
| Evidence Item | Description | Status | Location |
|--------------|-------------|--------|----------|
| Records of Processing Activities (ROPA) | Art. 30 register of all processing activities | [exists/needed] | [path] |
| Privacy Impact Assessments (DPIAs) | Art. 35 impact assessments for high-risk processing | [exists/needed] | [path] |
| Privacy Policy | Art. 12-13 public-facing privacy notice | [exists/needed] | [path] |
| Consent Records | Art. 7 records of consent given and withdrawn | [exists/needed] | [path] |
| Data Subject Request Procedures | Art. 15-22 procedures for handling DSARs | [exists/needed] | [path] |
| Data Processing Agreements | Art. 28 DPAs with all processors | [exists/needed] | [path] |
| Breach Response Plan | Art. 33-34 incident response procedures | [exists/needed] | [path] |
| Transfer Mechanisms | Art. 44-49 SCCs, adequacy, or BCRs | [exists/needed] | [path] |
| Legitimate Interest Assessments | Art. 6(1)(f) LIA documentation | [exists/needed] | [path] |
| Data Protection Officer Appointment | Art. 37 DPO designation (if required) | [exists/needed] | [path] |
| Training Records | Staff privacy training evidence | [exists/needed] | [path] |
| Technical and Organizational Measures | Art. 32 security measures documentation | [exists/needed] | [path] |
### HIPAA Evidence Pack
| Evidence Item | Description | Status | Location |
|--------------|-------------|--------|----------|
| Risk Analysis | 164.308(a)(1) comprehensive risk assessment | [exists/needed] | [path] |
| Risk Management Plan | 164.308(a)(1) risk mitigation strategy | [exists/needed] | [path] |
| Security Policies and Procedures | 164.316 complete policy documentation | [exists/needed] | [path] |
| Business Associate Agreements (BAAs) | 164.314 agreements with all BAs | [exists/needed] | [path] |
| Workforce Training Records | 164.308(a)(5) training evidence | [exists/needed] | [path] |
| Access Authorization Records | 164.308(a)(4) access management evidence | [exists/needed] | [path] |
| Incident Response Plan | 164.308(a)(6) security incident procedures | [exists/needed] | [path] |
| Contingency Plan | 164.308(a)(7) disaster recovery documentation | [exists/needed] | [path] |
| Audit Log Samples | 164.312(b) system activity records | [exists/needed] | [path] |
| Encryption Documentation | 164.312(a)(2)(iv) & 164.312(e)(2)(ii) encryption implementation records | [exists/needed] | [path] |
| Physical Safeguard Documentation | 164.310 facility security measures | [exists/needed] | [path] |
| Breach Notification Procedures | 164.402-414 breach response plan | [exists/needed] | [path] |
| Minimum Necessary Documentation | 164.502(b) minimum necessary determinations | [exists/needed] | [path] |
| Sanctions Policy | 164.308(a)(1)(ii)(C) workforce sanctions | [exists/needed] | [path] |
### SOC 2 Evidence Pack
| Evidence Item | Description | Status | Location |
|--------------|-------------|--------|----------|
| Security Policies | Comprehensive information security policies | [exists/needed] | [path] |
| Risk Assessment Report | Formal risk assessment documentation | [exists/needed] | [path] |
| Access Control Matrix | User access rights and role definitions | [exists/needed] | [path] |
| Change Management Records | Change request, approval, and deployment records | [exists/needed] | [path] |
| Incident Response Plan | Security incident response procedures | [exists/needed] | [path] |
| Vendor Management Documentation | Third-party risk assessment and monitoring | [exists/needed] | [path] |
| Business Continuity Plan | Disaster recovery and continuity documentation | [exists/needed] | [path] |
| Monitoring and Alerting Configuration | System monitoring and alerting setup | [exists/needed] | [path] |
| Penetration Test Reports | Annual penetration testing results | [exists/needed] | [path] |
| Vulnerability Scan Reports | Regular vulnerability scan results | [exists/needed] | [path] |
| Employee Handbook / Code of Conduct | Organizational commitment to integrity | [exists/needed] | [path] |
| Onboarding and Offboarding Checklists | User provisioning and deprovisioning | [exists/needed] | [path] |
| System Description | Description of the system and boundaries | [exists/needed] | [path] |
| Control Activities Documentation | Detailed control descriptions and evidence | [exists/needed] | [path] |
### CCPA Evidence Pack
| Evidence Item | Description | Status | Location |
|--------------|-------------|--------|----------|
| Privacy Policy (CCPA-specific) | Notice at collection with all required disclosures | [exists/needed] | [path] |
| Do Not Sell/Share Page | Consumer-facing opt-out mechanism | [exists/needed] | [path] |
| Data Inventory | Catalog of personal information collected and purposes | [exists/needed] | [path] |
| Consumer Request Procedures | Verified request handling workflows | [exists/needed] | [path] |
| Service Provider Agreements | Contracts restricting use of shared PI | [exists/needed] | [path] |
| Opt-Out Mechanism Documentation | Technical implementation of opt-out signals (GPC) | [exists/needed] | [path] |
| Training Records | Staff training on CCPA obligations | [exists/needed] | [path] |
| Financial Incentive Notices | If offering incentives for PI collection | [exists/needed] | [path] |
| Data Retention Schedule | Retention periods for each category of PI | [exists/needed] | [path] |
| Metrics / Request Log | Records of consumer requests received and fulfilled | [exists/needed] | [path] |
### PCI-DSS Evidence Pack
| Evidence Item | Description | Status | Location |
|--------------|-------------|--------|----------|
| Network Diagram | Current network topology with CDE boundaries | [exists/needed] | [path] |
| Data Flow Diagram | Cardholder data flow documentation | [exists/needed] | [path] |
| System Inventory | All systems in CDE scope | [exists/needed] | [path] |
| Security Policies | Information security policy document | [exists/needed] | [path] |
| Vulnerability Scan Reports | Internal and external (ASV) scan results | [exists/needed] | [path] |
| Penetration Test Reports | Annual internal and external pen test results | [exists/needed] | [path] |
| Access Control Documentation | User access management procedures and logs | [exists/needed] | [path] |
| Change Management Records | System change documentation and approvals | [exists/needed] | [path] |
| Incident Response Plan | Cardholder data breach response procedures | [exists/needed] | [path] |
| Encryption Key Management | Key lifecycle documentation | [exists/needed] | [path] |
| Security Awareness Training | Annual training records for all personnel | [exists/needed] | [path] |
| Vendor Risk Assessments | Third-party service provider evaluations | [exists/needed] | [path] |
| Firewall/NSC Rule Review | Documented review of network security controls | [exists/needed] | [path] |
| Anti-Malware Configuration | Malware protection deployment evidence | [exists/needed] | [path] |
| Log Retention Evidence | 12 months of audit log history (3 months immediately available) | [exists/needed] | [path] |
| Physical Security Documentation | Physical access control measures for CDE | [exists/needed] | [path] |
| Wireless Security Assessment | Wireless access point inventory and testing | [exists/needed] | [path] |
| Segmentation Testing Results | Validation that segmentation controls are effective | [exists/needed] | [path] |
---
## 7. Appendices
### Appendix A: Files Scanned
[List all files that were examined during the audit with their paths]
### Appendix B: Tools and Methods Used
[Describe the scanning approach, patterns searched, and tools used]
### Appendix C: Glossary
| Term | Definition |
|------|-----------|
| PII | Personally Identifiable Information - any data that can identify a natural person |
| PHI | Protected Health Information - health data linked to an individual (HIPAA) |
| CHD | Cardholder Data - primary account number and related payment card data (PCI-DSS) |
| CDE | Cardholder Data Environment - systems that store, process, or transmit CHD |
| DSAR | Data Subject Access Request - individual's request to access their personal data |
| DPA | Data Processing Agreement - contract governing processor's handling of personal data |
| DPIA | Data Protection Impact Assessment - assessment of high-risk processing activities |
| SCC | Standard Contractual Clauses - EU-approved contract terms for international data transfers |
| BAA | Business Associate Agreement - HIPAA contract with entities handling PHI |
| ASV | Approved Scanning Vendor - PCI-approved external vulnerability scanning provider |
| ROPA | Records of Processing Activities - register required under GDPR Art. 30 |
| GPC | Global Privacy Control - browser signal for opting out of data sale/sharing |
| LIA | Legitimate Interest Assessment - documentation of Art. 6(1)(f) balancing test |
| TIA | Transfer Impact Assessment - evaluation of data protection in recipient country |
| NSC | Network Security Controls - firewalls and equivalent network protection mechanisms |
### Appendix D: Regulatory Reference Links
- GDPR Full Text: https://eur-lex.europa.eu/eli/reg/2016/679/oj
- HIPAA Security Rule: https://www.hhs.gov/hipaa/for-professionals/security/index.html
- SOC 2 Trust Service Criteria: https://us.aicpa.org/interestareas/frc/assuranceadvisoryservices/trustservicescriteria
- CCPA/CPRA Text: https://leginfo.legislature.ca.gov/faces/codes_displayText.xhtml?division=3.&part=4.&lawCode=CIV&title=1.81.5
- PCI-DSS v4.0: https://www.pcisecuritystandards.org/document_library/
### Appendix E: Severity Definitions
| Severity | Definition | Remediation Timeline |
|----------|-----------|---------------------|
| CRITICAL | Immediate risk of regulatory action, data breach, or significant harm | Immediate (0-7 days) |
| HIGH | Significant gap that could lead to enforcement or substantial fines | Within 30 days |
| MEDIUM | Moderate gap that increases compliance risk | Within 90 days |
| LOW | Minor gap or documentation deficiency | Within 180 days |
| INFORMATIONAL | Best practice recommendation beyond strict requirements | As capacity allows |
### Appendix F: Compliance Status Definitions
| Status | Definition |
|--------|-----------|
| COMPLIANT | Requirement fully met with sufficient evidence |
| PARTIAL | Some controls exist but are incomplete or inconsistent |
| NON-COMPLIANT | Requirement not met or no evidence of controls |
| NOT APPLICABLE | Requirement does not apply to this system |
| UNABLE TO ASSESS | Insufficient information; additional data needed || Control Area | GDPR | HIPAA | SOC 2 | CCPA | PCI-DSS |
|---|---|---|---|---|---|
| Encryption at rest | Art. 32 | 164.312(a)(2)(iv) | CC6.1, CC6.7 | 1798.185 | Req 3.4-3.5 |
| Encryption in transit | Art. 32 | 164.312(e)(1) | CC6.7 | 1798.185 | Req 4.1 |
| Access controls | Art. 32 | 164.312(a)(1) | CC6.1-CC6.3 | 1798.185 | Req 7, 8 |
| Audit logging | Art. 30 | 164.312(b) | CC7.1-CC7.2 | -- | Req 10 |
| Breach notification | Art. 33-34 | 164.402-414 | CC7.3-CC7.4 | 1798.150 | Req 12.10 |
| Data retention | Art. 5(1)(e) | 164.530(j) | C1.2 | 1798.100(d) | Req 3.1 |
| Data minimization | Art. 5(1)(c) | 164.502(b) | C1.1 | 1798.100(e) | Req 3.1 |
| Consent management | Art. 6-7 | 164.508 | P1.1 | 1798.120 | -- |
| Right to access | Art. 15 | 164.524 | P1.1 | 1798.110 | -- |
| Right to delete | Art. 17 | -- | P1.1 | 1798.105 | -- |
| Data portability | Art. 20 | -- | -- | 1798.100 | -- |
| Vendor management | Art. 28 | 164.314 | CC9.2 | 1798.140(v) | Req 12.8 |
| Incident response | Art. 33 | 164.308(a)(6) | CC7.3-CC7.5 | -- | Req 12.10 |
| Risk assessment | Art. 35 | 164.308(a)(1) | CC3.1-CC3.2 | -- | Req 12.3 |
| Training | Art. 39 | 164.308(a)(5) | CC1.4 | -- | Req 12.6 |
| Change management | -- | 164.308(a)(8) | CC8.1 | -- | Req 6.5 |
| Vulnerability management | -- | 164.308(a)(1) | CC7.1 | -- | Req 6.3, 11.3 |
| Password/auth policy | Art. 32 | 164.312(d) | CC6.1-CC6.2 | 1798.185 | Req 8.3 |
| MFA | Art. 32 | 164.312(d) | CC6.1 | -- | Req 8.4 |
| Network security | Art. 32 | 164.312(e) | CC6.6 | -- | Req 1 |
| Backup/recovery | Art. 32 | 164.308(a)(7) | A1.2-A1.3 | -- | Req 12.10 |