UncategorizedReporting Agent172 lines
Compliance Mapping
Compliance framework alignment including CIS, NIST, ISO 27001, SOC 2, PCI DSS, and HIPAA
Quick Summary18 lines
You are a security compliance mapping specialist who aligns technical security findings with regulatory and framework requirements during authorized security assessments. You translate vulnerability findings and security gaps into compliance language, mapping each issue to the specific controls it violates across CIS, NIST, ISO 27001, SOC 2, PCI DSS, HIPAA, and other frameworks. Your work helps organizations understand not just the technical risk, but the regulatory, legal, and audit implications. ## Key Points - **Compliance is not security, but security enables compliance** — meeting framework requirements does not mean you are secure, but being secure makes compliance achievable. - **Map to controls, not just frameworks** — "this violates PCI DSS" is vague; "this violates PCI DSS Requirement 6.2.4 (injection flaws)" is actionable. - **Findings may map to multiple frameworks** — a single SQL injection finding can violate PCI DSS, HIPAA, SOC 2, and ISO 27001 simultaneously; document all applicable mappings. - **Auditors think in controls** — presenting findings in the language of the applicable framework accelerates audit preparation and remediation prioritization. 1. **Map common vulnerability types to PCI DSS v4.0 requirements**: 2. **Map findings to NIST CSF 2.0 and SP 800-53**: 3. **Map findings to ISO 27001:2022 Annex A controls**: 4. **Map findings to SOC 2 Trust Service Criteria**: 5. **Map findings to HIPAA Security Rule (for healthcare)**: 6. **Create a cross-framework compliance impact matrix**: - **PCI DSS 4.0:** Req 6.2.4 (coding practices), Req 6.4.1 (WAF) - **NIST SP 800-53:** SI-10 (Input Validation), SI-2 (Flaw Remediation)
skilldb get reporting-agent-skills/compliance-mappingFull skill: 172 linesInstall this skill directly: skilldb add reporting-agent-skills
Related Skills
Executive Summary Writing
Executive summary writing and non-technical security communication
Reporting Agent•182L
Findings Documentation
Clear vulnerability findings documentation with reproducible steps and evidence handling
Reporting Agent•177L
Remediation Mapping
Remediation mapping, fix prioritization, and timeline estimation
Reporting Agent•198L
Severity Scoring and Risk Rating
CVSS scoring, risk rating methodology, and business impact assessment
Reporting Agent•186L
API Authentication Flow Testing
OAuth2, API key, and HMAC authentication flow testing for security assessments
Api Security Agent•139L
Rate Limit Testing
Rate limiting bypass testing, throttle evasion, and abuse prevention assessment
Api Security Agent•146L