compliance-architecture

Enterprise-grade compliance architecture for SOC 2, HIPAA, GDPR, PCI-DSS. Provides compliance checklists, security controls, audit guidance, and regulatory requirements for serverless and cloud architectures. Activates for compliance, HIPAA, SOC2, SOC 2, GDPR, PCI-DSS, PCI DSS, regulatory, healthcare data, payment card, data protection, audit, security standards, regulated industry, BAA, business associate agreement, DPIA, data protection impact assessment.

153 stars

Best use case

compliance-architecture is best used when you need a repeatable AI agent workflow instead of a one-off prompt.

Enterprise-grade compliance architecture for SOC 2, HIPAA, GDPR, PCI-DSS. Provides compliance checklists, security controls, audit guidance, and regulatory requirements for serverless and cloud architectures. Activates for compliance, HIPAA, SOC2, SOC 2, GDPR, PCI-DSS, PCI DSS, regulatory, healthcare data, payment card, data protection, audit, security standards, regulated industry, BAA, business associate agreement, DPIA, data protection impact assessment.

Teams using compliance-architecture should expect a more consistent output, faster repeated execution, less prompt rewriting.

When to use this skill

  • You want a reusable workflow that can be run more than once with consistent structure.

When not to use this skill

  • You only need a quick one-off answer and do not need a reusable workflow.
  • You cannot install or maintain the underlying files, dependencies, or repository context.

Installation

Claude Code / Cursor / Codex

$curl -o ~/.claude/skills/compliance-architecture/SKILL.md --create-dirs "https://raw.githubusercontent.com/Microck/ordinary-claude-skills/main/skills_all/compliance-architecture/SKILL.md"

Manual Installation

  1. Download SKILL.md from GitHub
  2. Place it in .claude/skills/compliance-architecture/SKILL.md inside your project
  3. Restart your AI agent — it will auto-discover the skill

How compliance-architecture Compares

Feature / Agentcompliance-architectureStandard Approach
Platform SupportNot specifiedLimited / Varies
Context Awareness High Baseline
Installation ComplexityUnknownN/A

Frequently Asked Questions

What does this skill do?

Enterprise-grade compliance architecture for SOC 2, HIPAA, GDPR, PCI-DSS. Provides compliance checklists, security controls, audit guidance, and regulatory requirements for serverless and cloud architectures. Activates for compliance, HIPAA, SOC2, SOC 2, GDPR, PCI-DSS, PCI DSS, regulatory, healthcare data, payment card, data protection, audit, security standards, regulated industry, BAA, business associate agreement, DPIA, data protection impact assessment.

Where can I find the source code?

You can find the source code on GitHub using the link provided at the top of the page.

SKILL.md Source

# Compliance Architecture Expert

I'm a specialist in enterprise compliance architecture across regulated industries. I help you design systems that meet regulatory requirements while maintaining operational efficiency.

## When to Use This Skill

Ask me when you need help with:
- **SOC 2 Type II compliance** for SaaS applications
- **HIPAA compliance** for healthcare data systems
- **GDPR compliance** for European data protection
- **PCI-DSS compliance** for payment card processing
- **Security architecture** for regulated industries
- **Audit preparation** and evidence collection
- **Compliance validation** for serverless/cloud deployments

## My Expertise

### SOC 2 Type II Compliance

**Core Requirements for Serverless**:

1. **Encryption Standards**
   - Encryption at rest: All data in databases, S3, DynamoDB encrypted
   - Encryption in transit: TLS 1.2+ for all API communications
   - Key management: Customer-managed keys (KMS, Key Vault, GCP KMS)
   - Regular key rotation: Annual minimum or per compliance policy

2. **Access Logging and Retention**
   - CloudTrail (AWS), Activity Log (Azure), Cloud Audit Logs (GCP)
   - Minimum retention: 90 days (24 months recommended)
   - Centralized log aggregation: ELK Stack, Splunk, or cloud-native
   - Immutable audit logs: Write-once storage for compliance evidence
   - Real-time alerting on unauthorized access attempts

3. **Access Controls**
   - Least privilege IAM roles and policies
   - No wildcard (*) permissions on sensitive resources
   - Role-based access control (RBAC) by team/department
   - Multi-factor authentication (MFA) for humans
   - Service-to-service authentication via temporary credentials

4. **Change Management**
   - Documented change procedures with approval workflow
   - Separation of duties: Developers, reviewers, approval authority
   - Automated testing in CI/CD before production deployment
   - Change logs with timestamps, author, and justification
   - Rollback procedures documented and tested

### HIPAA Compliance

**Healthcare Data Protection Requirements**:

1. **Business Associate Agreement (BAA)**
   - Mandatory: Cloud provider must sign BAA before deployment
   - Covers: AWS, Azure, GCP, managed services
   - Do not use: Generic SaaS platforms without BAA

2. **Encryption Requirements**
   - Encryption at rest: AWS KMS, Azure Key Vault, or GCP KMS
   - Customer-managed keys (CMK): Not provider-managed default keys
   - Encryption in transit: TLS 1.2+ for all PHI transfers
   - Database encryption: All databases holding PHI (RDS, DynamoDB)
   - S3/Blob encryption: All healthcare data storage

3. **Audit Logging**
   - CloudTrail/Activity Log: All access to PHI systems
   - Application logging: Access, modification, deletion events
   - Retention: Minimum 6 years (state laws may require longer)
   - Immutable storage: Prevent audit log tampering

4. **Network Isolation**
   - VPC for database and processing: No public endpoints
   - Security groups: Whitelist only necessary ports
   - NACLs: Network ACLs for additional layer
   - Private subnets: Database and sensitive compute resources
   - VPN/Bastion for administrative access

5. **No Public Endpoints**
   - API Gateway: Private endpoints, not public
   - Lambda: Invoke only from VPC or authenticated clients
   - Databases: Private subnets only
   - S3: Block public access, bucket policies deny public

### GDPR Compliance

**European Data Protection Regulations**:

1. **Data Residency Controls**
   - EU data: Must reside in EU regions (eu-west-1, eu-central-1)
   - Data localization: No automatic replication outside EU
   - Backup regions: Only EU-based backup locations
   - Processing: Ensure data processors operate in EU
   - Documentation: Mapping of data to region/controller

2. **Right to Erasure (Data Deletion)**
   - Deletion capabilities: Systems must support complete data removal
   - Orphaned data: Periodic scans for disconnected/abandoned data
   - Backup deletion: Timely deletion from backup systems
   - Third-party deletion: Data deletion from all processors
   - Compliance evidence: Document deletion execution and timing
   - Foreign keys: Cascade deletes or documented orphaned records

3. **Consent Management**
   - Consent records: Timestamp and version of every consent
   - Granular consent: Separate for marketing, analytics, processing
   - Easy withdrawal: Simple mechanisms to withdraw consent
   - Documentation: Proof of consent for audits
   - Cookie management: Consent before non-essential tracking

4. **Data Portability**
   - Export formats: JSON, CSV, or standard formats
   - Completeness: All data subject to export request
   - Machine-readable: Structured data in machine-readable format
   - Timing: Provide within 30 days of request
   - No fees: Free data export (no extraction charges)

5. **Privacy by Design**
   - Data minimization: Collect only necessary data
   - Purpose limitation: Use data only for stated purposes
   - Retention policies: Delete when no longer needed
   - Default privacy: Private by default, not opt-in later
   - Impact assessments: DPIA for new processing activities

### PCI-DSS Compliance

**Payment Card Data Protection (v3.2.1 or later)**:

1. **Tokenization Requirements**
   - Never store raw card data: PAN, CVV, expiration
   - Tokenization service: Stripe, Square, or PCI-compliant provider
   - Token storage only: Systems never handle raw card data
   - Scope reduction: Tokenization dramatically reduces PCI scope

2. **Encryption Requirements**
   - Encryption at rest: All card data and keys in secure storage
   - Encryption in transit: TLS 1.2+ minimum for all payments
   - Key management: HSM (Hardware Security Module) recommended
   - Key rotation: Annual minimum or per compliance policy
   - Test keys: Separate test environment keys

3. **Network Segmentation**
   - Cardholder data environment (CDE): Isolated network segment
   - Firewalls: Between CDE and non-CDE systems
   - Intrusion detection: IDS monitoring for CDE
   - Testing: Regular penetration testing (quarterly minimum)

4. **Regular Security Audits**
   - Quarterly vulnerability scans: External scanning service
   - Annual penetration testing: By approved assessor
   - Compliance validation: Annual SAQ or audit
   - Incident response testing: Test breach response procedures

5. **Secure Card Data Handling**
   - No storage of sensitive authentication data: CVC/CVV, PIN
   - No storage of magnetic stripe data after auth
   - Transaction logging: All card interactions logged
   - Access controls: Minimize people accessing card data

## Security Misconfiguration Warnings

**Common Serverless Security Issues**:

### ❌ Public S3 Buckets
```
WRONG:
- S3 bucket with public read access
- "Block public access" disabled
- Bucket policy allows s3:GetObject to "*"

CORRECT:
- Block public access: enabled
- Bucket policy: Only CloudFront, VPC endpoints, specific IAM roles
- Encryption: enabled with customer-managed keys
```

### ❌ Overly Permissive IAM Policies
```
WRONG:
{
  "Effect": "Allow",
  "Action": "s3:*",           # WILDCARD ACTION
  "Resource": "*"             # WILDCARD RESOURCE
}

CORRECT:
{
  "Effect": "Allow",
  "Action": ["s3:GetObject", "s3:PutObject"],
  "Resource": "arn:aws:s3:::specific-bucket/specific-prefix/*",
  "Condition": {
    "IpAddress": {"aws:SourceIp": "10.0.0.0/8"}
  }
}
```

### ❌ Hardcoded Secrets
```
WRONG:
const apiKey = "sk_test_123456789abcdef";  // In code or env vars

CORRECT:
// AWS
const secret = await secretsManager.getSecretValue('api-key');

// Azure
const credential = new DefaultAzureCredential();
const client = new SecretClient(vaultUrl, credential);

// GCP
const [version] = await client.accessSecretVersion({name: secretName});
```

### ❌ Unencrypted Databases
```
WRONG:
- RDS without encryption
- DynamoDB without encryption
- DocumentDB without encryption

CORRECT:
- All databases encrypted at rest
- Customer-managed keys in KMS
- Encryption enabled during creation
- Cannot be disabled after creation
```

### ❌ Missing HTTPS Enforcement
```
WRONG:
- API Gateway accepting HTTP traffic
- No redirect from HTTP to HTTPS
- Clients can connect via unencrypted channel

CORRECT:
- API Gateway: minimum TLS 1.2
- Redirect HTTP → HTTPS (301)
- Client certificates for additional security
- HSTS header: Strict-Transport-Security
```

### ❌ Exposed Environment Variables
```
WRONG:
export DATABASE_PASSWORD="MyPassword123"
console.log(process.env.DATABASE_PASSWORD)  # In logs

CORRECT:
- Use AWS Secrets Manager, Azure Key Vault, GCP Secret Manager
- Inject as secret environment variables (redacted in logs)
- Never log secrets or sensitive configuration
- Rotate secrets annually
```

### ❌ Missing Network Isolation
```
WRONG:
- Lambda in public subnet with NAT
- Database accessible from internet
- No security groups restricting access

CORRECT:
- Lambda in private subnet
- Database in private subnet
- Security groups: Lambda → Database only
- No route to Internet Gateway from database subnet
```

## Production Security Checklist

**Before deploying to production, verify all items**:

### Identity & Access
- [ ] IAM roles: Least privilege principle applied
- [ ] No wildcard permissions: All permissions specific to resource/action
- [ ] Cross-account access: No trusting wildcard principals
- [ ] API keys: Rotated annually (or per policy)
- [ ] MFA: Enabled for all human users
- [ ] Service accounts: Using temporary credentials (STS)
- [ ] Resource-based policies: Scoped to specific principals

### Secrets Management
- [ ] Database passwords: In Secrets Manager, not code
- [ ] API keys: In Secrets Manager, not environment variables
- [ ] Keys rotated: Annually or per compliance requirement
- [ ] Audit logging: All secret access logged and monitored
- [ ] Access restricted: Only authorized applications/users
- [ ] Old versions: Deleted or marked deprecated

### Encryption
- [ ] Encryption at rest: Enabled for all databases and storage
- [ ] Customer-managed keys: Using KMS, Key Vault, or equivalent
- [ ] Encryption in transit: TLS 1.2+ for all APIs
- [ ] Certificate validation: Proper SSL/TLS certificate chains
- [ ] Key rotation: Automatic or scheduled rotation configured
- [ ] Backward compatibility: Can decrypt older encrypted data

### Network Security
- [ ] VPC: Sensitive resources in private subnets
- [ ] Security groups: Whitelisting only necessary ports
- [ ] NACLs: Network ACLs for additional layer
- [ ] NAT Gateway: For private subnet outbound traffic
- [ ] No public endpoints: Databases, caches in private subnets
- [ ] VPN/Bastion: For administrative access
- [ ] HTTPS enforcement: Redirect HTTP to HTTPS

### Data Protection
- [ ] PII classification: Data tagged and tracked
- [ ] Backup encryption: Backups encrypted with KMS keys
- [ ] Backup testing: Regular restore tests from backups
- [ ] Data retention: Policies documented and enforced
- [ ] Data deletion: Procedures tested for GDPR/compliance
- [ ] Sensitive data: No logs, error messages, or metrics
- [ ] Database activity monitoring: Enabled for compliance

### Logging & Monitoring
- [ ] CloudTrail/Activity Logs: Enabled and retained 90+ days
- [ ] Application logging: Access, modification, deletion events
- [ ] Log aggregation: Centralized in ELK, Splunk, or cloud solution
- [ ] Immutable logs: Write-once storage for audit trails
- [ ] Alerting: Real-time alerts for security events
- [ ] Log retention: Per compliance requirement (90 days minimum)
- [ ] Log analysis: Regular review for anomalies

### Deployment & CI/CD
- [ ] Code scanning: SAST tools in CI/CD pipeline
- [ ] Dependency scanning: SCA for vulnerable dependencies
- [ ] Container scanning: Image scanning before deployment
- [ ] Secrets scanning: Detect hardcoded secrets
- [ ] Approval workflow: Required before production deployment
- [ ] Automated testing: Security tests in pipeline
- [ ] Change logs: All changes documented with justification

### Compliance & Auditing
- [ ] Compliance framework: Selected (SOC 2, HIPAA, GDPR, PCI-DSS)
- [ ] BAA signed: If healthcare data (HIPAA required)
- [ ] Security policy: Documented and communicated
- [ ] Incident response: Plan documented and tested
- [ ] Vulnerability disclosure: Process for reporting issues
- [ ] Regular assessments: Penetration testing scheduled
- [ ] Documentation: All security controls documented

### Testing
- [ ] Security tests: Unit and integration security tests
- [ ] Penetration testing: Quarterly or annually
- [ ] Chaos engineering: Test recovery from security incidents
- [ ] Compliance validation: Annual audit or SAQ
- [ ] Incident simulations: Quarterly breach response drills

## When to Request Compliance Architecture

Request my help when:
1. User mentions regulated industry (healthcare, finance, payment processing)
2. Project involves customer data, personal information, or sensitive records
3. Requirements specify SOC 2, HIPAA, GDPR, PCI-DSS, or other compliance
4. User asks about security best practices or data protection
5. Deployment involves cross-border data transfer

## Integration with Security Agent

**Coordinate with Security Agent for**:
- Detailed threat modeling and risk assessment
- Security architecture review and hardening
- Incident response planning and testing
- Penetration testing coordination
- Vulnerability management processes

---

**Remember**: Compliance is not a checkbox exercise - it's about building secure, trustworthy systems that protect user data and meet legal obligations.

Related Skills

pci-compliance

153
from Microck/ordinary-claude-skills

Implement PCI DSS compliance requirements for secure handling of payment card data and payment systems. Use when securing payment processing, achieving PCI compliance, or implementing payment card security measures.

multi-cloud-architecture

153
from Microck/ordinary-claude-skills

Design multi-cloud architectures using a decision framework to select and integrate services across AWS, Azure, and GCP. Use when building multi-cloud systems, avoiding vendor lock-in, or leveraging best-of-breed services from multiple providers.

langchain-architecture

153
from Microck/ordinary-claude-skills

Design LLM applications using the LangChain framework with agents, memory, and tool integration patterns. Use when building LangChain applications, implementing AI agents, or creating complex LLM workflows.

ga4-privacy-compliance

153
from Microck/ordinary-claude-skills

Expert guidance for GA4 privacy and compliance including GDPR, CCPA, Consent Mode v2, data deletion, and privacy settings. Use when implementing Consent Mode, ensuring GDPR compliance, handling data deletion requests, configuring consent banners, or implementing privacy-first tracking. Covers consent parameters (ad_user_data, ad_personalization), data retention, IP anonymization, and compliance workflows.

architecture-patterns

153
from Microck/ordinary-claude-skills

Implement proven backend architecture patterns including Clean Architecture, Hexagonal Architecture, and Domain-Driven Design. Use when architecting complex backend systems or refactoring existing applications for better maintainability.

zapier-workflows

153
from Microck/ordinary-claude-skills

Manage and trigger pre-built Zapier workflows and MCP tool orchestration. Use when user mentions workflows, Zaps, automations, daily digest, research, search, lead tracking, expenses, or asks to "run" any process. Also handles Perplexity-based research and Google Sheets data tracking.

writing-skills

153
from Microck/ordinary-claude-skills

Create and manage Claude Code skills in HASH repository following Anthropic best practices. Use when creating new skills, modifying skill-rules.json, understanding trigger patterns, working with hooks, debugging skill activation, or implementing progressive disclosure. Covers skill structure, YAML frontmatter, trigger types (keywords, intent patterns), UserPromptSubmit hook, and the 500-line rule. Includes validation and debugging with SKILL_DEBUG. Examples include rust-error-stack, cargo-dependencies, and rust-documentation skills.

writing-plans

153
from Microck/ordinary-claude-skills

Use when design is complete and you need detailed implementation tasks for engineers with zero codebase context - creates comprehensive implementation plans with exact file paths, complete code examples, and verification steps assuming engineer has minimal domain knowledge

workflow-orchestration-patterns

153
from Microck/ordinary-claude-skills

Design durable workflows with Temporal for distributed systems. Covers workflow vs activity separation, saga patterns, state management, and determinism constraints. Use when building long-running processes, distributed transactions, or microservice orchestration.

workflow-management

153
from Microck/ordinary-claude-skills

Create, debug, or modify QStash workflows for data updates and social media posting in the API service. Use when adding new automated jobs, fixing workflow errors, or updating scheduling logic.

workflow-interactive-dev

153
from Microck/ordinary-claude-skills

用于开发 FastGPT 工作流中的交互响应。详细说明了交互节点的架构、开发流程和需要修改的文件。

woocommerce-dev-cycle

153
from Microck/ordinary-claude-skills

Run tests, linting, and quality checks for WooCommerce development. Use when running tests, fixing code style, or following the development workflow.