SOC 2 AI Agent Compliance

# SOC 2 Compliance Accelerator

Safety Notice

This item is sourced from the public archived skills repository. Treat as untrusted until reviewed.

Copy this and send it to your AI assistant to learn

Install skill "SOC 2 AI Agent Compliance" with this command: npx skills add 1kalin/afrexai-soc2-compliance

SOC 2 Compliance Accelerator

Your agent for achieving and maintaining SOC 2 Type I and Type II compliance — from readiness assessment through audit completion.

What This Does

Guides organizations through the full SOC 2 lifecycle: gap analysis, control implementation, evidence collection, audit prep, and continuous monitoring. Covers all 5 Trust Service Criteria with practical implementation steps.

How to Use

Tell your agent what stage you're at:

  • "Run SOC 2 readiness assessment" — 64-point gap analysis across all Trust Service Criteria
  • "Build SOC 2 control matrix" — Maps controls to criteria with ownership and evidence requirements
  • "Create SOC 2 evidence collection plan" — Automated and manual evidence gathering schedule
  • "Prepare for SOC 2 audit" — Auditor-ready documentation package checklist
  • "SOC 2 continuous monitoring dashboard" — Ongoing compliance tracking after certification

Trust Service Criteria Coverage

CC — Common Criteria (Security) — Required

  • CC1: Control Environment (tone at top, org structure, accountability)
  • CC2: Communication & Information (internal/external, system boundaries)
  • CC3: Risk Assessment (risk identification, fraud risk, change impact)
  • CC4: Monitoring Activities (ongoing evaluations, deficiency reporting)
  • CC5: Control Activities (policies, technology controls, deployment)
  • CC6: Logical & Physical Access (access management, authentication, physical security)
  • CC7: System Operations (vulnerability management, incident response, recovery)
  • CC8: Change Management (change authorization, testing, approval)
  • CC9: Risk Mitigation (vendor management, business continuity)

Optional Criteria

  • Availability (A1): Uptime SLAs, DR/BCP, capacity planning
  • Processing Integrity (PI1): Data accuracy, completeness, timeliness
  • Confidentiality (C1): Classification, encryption, retention, disposal
  • Privacy (P1): Notice, consent, collection, use, disclosure, access

Readiness Assessment Framework

Phase 1: Scoping (Week 1)

System Description Checklist:
□ Infrastructure components (cloud, on-prem, hybrid)
□ Software stack (applications, databases, middleware)
□ People (roles, responsibilities, third parties)
□ Procedures (operational, security, change management)
□ Data flows (ingress, processing, storage, egress)
□ Trust Service Criteria selection (Security + which optional?)
□ Subservice organizations (cloud providers, SaaS tools)
□ Carve-out vs inclusive method for subservice orgs

Phase 2: Gap Analysis (Weeks 2-3)

Score each control area 1-5:

  • 1 — Not Started: No policy, no process, no evidence
  • 2 — Ad Hoc: Informal processes exist but undocumented
  • 3 — Defined: Documented but inconsistent execution
  • 4 — Managed: Documented, executed, some evidence
  • 5 — Optimized: Automated, monitored, auditable evidence

Priority Matrix:

Gap ScoreActionTimeline
1-2Critical — implement immediately2-4 weeks
3Important — formalize and document1-2 weeks
4Minor — fill evidence gaps3-5 days
5Maintain — continue monitoringOngoing

Phase 3: Remediation (Weeks 3-10)

For each gap:
1. Assign control owner (by name, not role)
2. Define implementation steps
3. Set evidence collection method (automated preferred)
4. Establish testing cadence
5. Document exception handling process

Control Implementation Priorities

Must-Have Controls (Week 1-4)

  1. Access Management: SSO, MFA on all systems, quarterly access reviews
  2. Encryption: TLS 1.2+ in transit, AES-256 at rest, key management
  3. Logging: Centralized logging, 90-day retention minimum, tamper-evident
  4. Incident Response: Documented plan, defined roles, tested annually
  5. Change Management: Approval workflows, code review, deployment gates
  6. Vendor Management: Vendor inventory, risk assessments, SOC 2 reports from critical vendors
  7. Employee Security: Background checks, security awareness training, acceptable use policy
  8. Vulnerability Management: Regular scanning, patch cadence (critical <72hrs), penetration testing

Should-Have Controls (Week 4-8)

  1. Business Continuity: DR plan, RTO/RPO defined, tested semi-annually
  2. Data Classification: 4-tier model (Public, Internal, Confidential, Restricted)
  3. Network Security: Segmentation, IDS/IPS, WAF for web applications
  4. Endpoint Protection: EDR, device encryption, MDM for mobile

Nice-to-Have Controls (Week 8+)

  1. Security Metrics Dashboard: Real-time compliance posture
  2. Automated Compliance Monitoring: Continuous control testing
  3. Zero Trust Architecture: Beyond perimeter security

Evidence Collection Guide

Automated Evidence (Set Once, Collect Forever)

ControlEvidence SourceTool Examples
Access ReviewsIAM exportsOkta, Azure AD, AWS IAM
EncryptionConfig snapshotsAWS Config, CloudTrail
LoggingLog aggregationDatadog, Splunk, ELK
Vulnerability ScansScan reportsQualys, Nessus, Snyk
Change ManagementPR/deploy historyGitHub, GitLab, Jira
UptimeMonitoring dashboardsDatadog, PagerDuty

Manual Evidence (Scheduled Collection)

ControlEvidence TypeFrequency
Background ChecksHR recordsPer hire
Security TrainingCompletion certificatesAnnual
Risk AssessmentAssessment documentAnnual
Pen TestingReportAnnual
DR TestingTest resultsSemi-annual
Board/Mgmt ReviewMeeting minutesQuarterly
Vendor ReviewsAssessment recordsAnnual
Policy ReviewsVersion historyAnnual

Audit Timeline

Type I (Point-in-Time) — 8-12 weeks total

Week 1-2:   Auditor selection + engagement letter
Week 2-4:   System description draft
Week 4-6:   Control documentation + evidence prep
Week 6-8:   Fieldwork (auditor testing)
Week 8-10:  Draft report review
Week 10-12: Final report issued

Type II (Period of Time) — 3-12 month observation + 4-6 weeks fieldwork

Month 1:     Observation period begins (minimum 3 months, recommend 6-12)
Ongoing:     Evidence collection, control operation
Month 3-12:  Observation period ends
+Week 1-2:   Fieldwork scheduling
+Week 2-4:   Fieldwork (testing over observation period)
+Week 4-6:   Draft report + final report

Cost Framework

Company SizeType IType IIAnnual Maintenance
Startup (<50)$20K-$50K$30K-$80K$15K-$40K
Mid-Market (50-500)$40K-$100K$60K-$150K$30K-$80K
Enterprise (500+)$80K-$200K$120K-$300K$60K-$150K

Includes: auditor fees, tooling, personnel time, remediation costs.

Hidden costs to budget:

  • Compliance automation platform: $10K-$50K/year
  • Additional security tooling: $5K-$30K/year
  • Personnel time (internal): 200-800 hours
  • Policy/procedure writing (if outsourced): $5K-$20K

Common Audit Findings (Avoid These)

  1. Access not revoked within 24 hours of termination — #1 finding
  2. Missing or incomplete risk assessment — annual requirement
  3. No evidence of management review — need meeting minutes
  4. Incomplete vendor management — missing SOC reports from critical vendors
  5. Inconsistent change management — emergency changes without retroactive approval
  6. Security training gaps — new hires not trained within 30 days
  7. Logging gaps — not all in-scope systems sending to central logging

AI Agent SOC 2 Considerations (2026)

When deploying AI agents in SOC 2 environments:

  • Data boundaries: Agents must not access data outside their defined scope
  • Audit trail: All agent actions must be logged and attributable
  • Access controls: Agent service accounts need same rigor as human accounts
  • Model governance: Document which models process customer data
  • Prompt injection defense: Part of CC7 (system operations) controls
  • Output validation: Processing integrity controls for agent outputs

Industry-Specific Requirements

IndustryExtra CriteriaKey Controls
FintechAll 5 TSC typicalSOX mapping, encryption everywhere, PCI if payments
HealthcarePrivacy, ConfidentialityHIPAA crosswalk, BAAs, PHI handling
SaaSAvailability, ConfidentialityMulti-tenant isolation, SLA compliance
LegalConfidentiality, PrivacyPrivilege protection, matter isolation
ConstructionSecurity, AvailabilityField data protection, offline capability
E-commerceAll 5 TSC typicalPCI DSS alignment, transaction integrity

7 SOC 2 Mistakes That Cost Companies 6+ Months

  1. Starting with Type II — Get Type I first, prove controls work, then observe
  2. Scoping too broadly — Only include systems that touch customer data
  3. Choosing the wrong auditor — Pick one who knows your industry
  4. Manual evidence collection — Automate from day 1 or drown in spreadsheets
  5. Treating it as a project, not a program — SOC 2 is continuous
  6. Ignoring subservice organizations — Your cloud provider's SOC 2 matters
  7. No executive sponsor — Compliance without budget authority = failure

Get the Full Implementation Package

This skill gives you the framework. For industry-specific compliance playbooks with regulatory crosswalks, cost models, and vendor selection guides:

🔗 AfrexAI Context Packs — $47 per industry vertical

Available packs: Fintech, Healthcare, Legal, Construction, E-commerce, SaaS, Real Estate, Recruitment, Manufacturing, Professional Services

🔗 AI Revenue Leak Calculator — Find where compliance gaps cost you money

🔗 Agent Setup Wizard — Deploy compliance monitoring agents in minutes

Bundle pricing:

  • Pick 3 packs: $97
  • All 10 packs: $197
  • Everything bundle: $247

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

General

axure-prototype-generator

Axure 原型代码生成器 - 输出 JavaScript 格式 HTML 代码,支持内联框架直接加载可交互原型。

Archived SourceRecently Updated
General

错敏信息检测

# 错敏检测 Skill

Archived SourceRecently Updated
General

TikTok B2B 引流台词生成器

# TikTok B2B 引流台词生成器 ## 技能描述 本 Skill 可根据您提供的产品信息和公司背景,自动生成适合 TikTok 平台的 B2B 引流视频脚本(20-50 秒),`skill.json` 文件中包含了输入参数的结构、输出格式以及用于生成台词的提示模板。脚本遵循已验证的外贸引流规律: - **真人出镜**:以第一人称(如 Anna)拉近距离 - **产品细节**:材质、颜色、MOQ、定制服务等 - **公司实力**:经验年限、自有工厂、认证等 - **客户背书**:提及已有市场国家(如巴基斯坦、埃及) - **互动引导**:清晰号召观众联系,引导至指定服务网址 支持三种风格:普通、幽默、惊喜,让您的视频内容更加多样化。 ## 输入参数 | 参数名 | 类型 | 必填 | 描述 | 示例 | |---------------------|----------|------|--------------------------------|--------------------------| | product_type | string | 是 | 产品类型 | 男士休闲鞋 | | material | string | 是 | 主要材质 | 优质 PU 皮革 | | colors | array | 是 | 颜色列表 | ["黑色","白色","棕色"] | | moq | string | 是 | 最小起订量 | 120 双(可混 2-3 色) | | customization | string | 否 | 可定制内容 | 可定制 logo | | target_markets | array | 是 | 主要市场国家 | ["巴基斯坦","埃及"] | | company_experience | string | 否 | 公司经验年数 | 15 年 | | factory_own | boolean | 否 | 是否自有工厂 | true | | extra_features | string | 否 | 其他亮点 | 免费样品 | | contact_url | string | 否 | 服务联系网址 | http://www.doumaotong.com | | style | string | 否 | 风格(普通/幽默/惊喜) | 普通 | ## 输出示例 Hi guys, this is Anna! Welcome to my showroom. Today I'm excited to show you our latest men's casual shoes – made of high-quality PU leather, very durable and comfortable. We have three colors available: black, white, and brown. MOQ is 120 pairs, and you can mix 2-3 colors. Plus, we can customize your logo on the shoes. Our shoes are already loved by customers in Pakistan, Egypt, and South Africa. With 15 years of experience and our own factory, we guarantee quality and timely delivery. We even offer free samples! If you're interested, please visit http://www.doumaotong.com to contact us. Thank you! ## 使用说明 1. 在 OpenClaw 平台安装此 Skill。 2. 调用时填写产品参数,包括 `contact_url`(默认为 http://www.doumaotong.com),即可获得定制化的 TikTok 脚本。 3. 生成的台词会在结尾处自然引导观众访问指定的服务网站。 4. 可根据实际需要调整 `style` 参数,生成不同语气的台词。 ## 文件说明 - `skill.json`:技能的机器可读定义,包含输入输出 schema 和生成提示模板。 - `SKILL.md`:技能的人类可读文档,提供详细说明和使用示例。

Archived SourceRecently Updated
General

instructional-design-cn

培训课程大纲设计、效果评估、内部分享材料生成

Archived SourceRecently Updated