Map existing infrastructure controls, tools, and configurations to regulatory compliance framework requirements and generate audit-ready evidence matrices. Use this skill whenever the user wants to prepare for a compliance audit, map controls to requirements, identify compliance gaps, generate evidence documentation, or build a controls inventory against PCI DSS, SOC 2, NIST CSF, or CIS Benchmarks. Also trigger when the user mentions audit preparation, evidence collection, control mapping, compliance gaps, remediation planning, or regulatory readiness assessment. Supports multi-framework mapping where a single control satisfies requirements across multiple standards.
Map existing infrastructure controls, tools, and configurations to regulatory compliance framework requirements. Identify gaps, generate evidence matrices, and produce audit-ready documentation.
Takes an inventory of existing controls (tools, configurations, policies, processes) and maps them against one or more compliance frameworks. Produces:
The user provides a controls inventory describing what is currently in place. Accept this in any format: structured JSON, bullet list, prose description, or conversational. The skill normalizes it into a structured inventory for mapping.
Each control should capture:
| Field | Required | Description |
|---|---|---|
| Control name | Yes | What the control is (e.g., "S3 encryption at rest via KMS") |
| Category | Helpful | Grouping (e.g., encryption, access control, logging) |
| Tool/service | Helpful | Implementation technology (e.g., AWS KMS, CloudTrail, Terraform) |
| Evidence location | Optional | Where the evidence can be found (e.g., "Terraform repo", "CloudTrail console", "AWS Config rule") |
| Scope | Optional | What systems or environments the control covers |
| Owner | Optional | Team or individual responsible |
{
"organization": "Acme Financial Services",
"environment": "AWS Production - CDE",
"controls": [
{
"name": "S3 server-side encryption with customer-managed KMS keys",
"category": "Encryption at Rest",
"tool": "AWS KMS, Terraform",
"evidence": "Terraform modules in platform-infra repo, AWS Config rule s3-bucket-server-side-encryption-enabled",
"scope": "All S3 buckets in CDE accounts"
},
{
"name": "CloudTrail multi-region logging with log file validation",
"category": "Audit Logging",
"tool": "AWS CloudTrail",
"evidence": "CloudTrail console, Terraform configuration, CloudWatch alarms on trail status",
"scope": "All AWS accounts"
},
{
"name": "IAM roles with least-privilege policies enforced via Terraform",
"category": "Access Control",
"tool": "AWS IAM, Terraform",
"evidence": "IAM policy documents in Terraform repo, quarterly access reviews in ServiceNow",
"scope": "All CDE workloads"
}
]
}
The user can also provide controls conversationally:
We have KMS encryption on all S3 buckets and RDS instances in the CDE.
CloudTrail is enabled multi-region with log validation. IAM policies are
managed through Terraform with quarterly access reviews. VPC flow logs
are on in all CDE VPCs. We run Trivy scans in CI/CD and Qualys for
vulnerability management. Map this against PCI DSS for our upcoming audit.
Four framework reference files are available in references/. Load the relevant one(s) based on the user's request.
| Framework | File | Use When |
|---|---|---|
| PCI DSS v4.0 | references/pci-dss-v4.md | Payment card environments, cardholder data processing |
| SOC 2 Type II | references/soc2.md | Service organization controls, trust services criteria |
| NIST CSF 2.0 | references/nist-csf.md | General cybersecurity framework, federal alignment |
| CIS AWS Benchmarks | references/cis-aws.md | AWS-specific security configuration baselines |
Multiple frameworks can be mapped simultaneously. When doing so, generate the cross-framework coverage view showing where controls satisfy requirements across standards.
Parse the user's input into a structured controls list. For each control, identify:
Read the relevant framework reference file(s). Each requirement includes:
For each framework requirement, evaluate whether the controls inventory includes one or more controls that satisfy it. A requirement can be:
Important mapping principles:
Follow this output structure:
## Evidence Matrix: [Framework Name]
| Req ID | Requirement | Status | Control(s) | Evidence | Gap/Notes |
|--------|-------------|--------|------------|----------|-----------|
| X.X.X | [Title] | [Status] | [Mapped control(s)] | [Evidence location] | [If gap or partial] |
Status indicators:
- ✅ Satisfied
- ⚠️ Partially Satisfied
- ❌ Gap
- N/A Not Applicable
For each gap or partially satisfied requirement:
## Gap Analysis
### [PRIORITY] Gap: [Requirement ID] - [Requirement Title]
**Status**: [Gap | Partially Satisfied]
**Framework(s)**: [Which frameworks this gap affects]
**Risk**: [What exposure exists without this control]
**Remediation**:
- [Specific action to close the gap]
- [Tool or configuration to implement]
- [Evidence to collect once remediated]
**Estimated Effort**: [T-shirt size]
**Recommended Owner**: [Team or role]
Priority is based on:
When mapping against multiple frameworks, show where controls provide cross-framework coverage:
## Cross-Framework Coverage
| Control | PCI DSS | SOC 2 | NIST CSF | CIS AWS |
|---------|---------|-------|----------|---------|
| KMS encryption at rest | 3.5.1 | CC6.1 | PR.DS-1 | 2.1.1 |
| CloudTrail logging | 10.2.1 | CC7.2 | DE.CM-1 | 3.1 |
| IAM least privilege | 7.2.1 | CC6.3 | PR.AC-4 | 1.16 |
This view demonstrates to auditors and leadership that the controls investment serves multiple compliance obligations, which is valuable for justifying security spend.
A 3-5 paragraph prose summary suitable for:
The narrative should frame compliance posture in terms of coverage percentage, gap severity, remediation progress, and organizational risk rather than listing individual controls.
Write as a compliance advisor, not an auditor. The goal is to help the team prepare effectively, not to generate findings against them.
When writing the audit narrative, be honest about gaps but frame them with remediation context. "Three gaps were identified, two of which have remediation in progress with target completion before the audit window" is more useful than "Three gaps exist."