compliance-os
Compliance OS — meta-orchestrator that lets compliance teams CONFIGURE which frameworks apply, COMPUTE cross-framework control overlap, SIMULATE internal audits, and CONSOLIDATE evidence across multiple frameworks. Four decisions: (1) Given a company profile, which of the 12 supported frameworks apply (ISO 27001/13485/42001/14971, EU AI Act, MDR 745, GDPR, SOC 2, FDA QSR, NIST CSF 2.0, NIS2, HIPAA)? (2) Across selected frameworks, which controls overlap and how much evidence reuses? (3) For a given framework + scope, what does a realistic mock audit produce — drawing from the 205-scenario library? (4) Across selected frameworks, what's the unified evidence checklist with reuse map? Use when standing up a multi-framework program, planning the annual audit calendar, or preparing for certification stage 1. Does NOT replace per-framework skills (it orchestrates them).
下記のコマンドをコピーしてターミナル(Mac/Linux)または PowerShell(Windows)に貼り付けてください。 ダウンロード → 解凍 → 配置まで全自動。
mkdir -p ~/.claude/skills && cd ~/.claude/skills && curl -L -o compliance-os.zip https://jpskill.com/download/21752.zip && unzip -o compliance-os.zip && rm compliance-os.zip
$d = "$env:USERPROFILE\.claude\skills"; ni -Force -ItemType Directory $d | Out-Null; iwr https://jpskill.com/download/21752.zip -OutFile "$d\compliance-os.zip"; Expand-Archive "$d\compliance-os.zip" -DestinationPath $d -Force; ri "$d\compliance-os.zip"
完了後、Claude Code を再起動 → 普通に「動画プロンプト作って」のように話しかけるだけで自動発動します。
💾 手動でダウンロードしたい(コマンドが難しい人向け)
- 1. 下の青いボタンを押して
compliance-os.zipをダウンロード - 2. ZIPファイルをダブルクリックで解凍 →
compliance-osフォルダができる - 3. そのフォルダを
C:\Users\あなたの名前\.claude\skills\(Win)または~/.claude/skills/(Mac)へ移動 - 4. Claude Code を再起動
⚠️ ダウンロード・利用は自己責任でお願いします。当サイトは内容・動作・安全性について責任を負いません。
🎯 このSkillでできること
下記の説明文を読むと、このSkillがあなたに何をしてくれるかが分かります。Claudeにこの分野の依頼をすると、自動で発動します。
📦 インストール方法 (3ステップ)
- 1. 上の「ダウンロード」ボタンを押して .skill ファイルを取得
- 2. ファイル名の拡張子を .skill から .zip に変えて展開(macは自動展開可)
- 3. 展開してできたフォルダを、ホームフォルダの
.claude/skills/に置く- · macOS / Linux:
~/.claude/skills/ - · Windows:
%USERPROFILE%\.claude\skills\
- · macOS / Linux:
Claude Code を再起動すれば完了。「このSkillを使って…」と話しかけなくても、関連する依頼で自動的に呼び出されます。
詳しい使い方ガイドを見る →- 最終更新
- 2026-05-18
- 取得日時
- 2026-05-18
- 同梱ファイル
- 14
📖 Claude が読む原文 SKILL.md(中身を展開)
この本文は AI(Claude)が読むための原文(英語または中国語)です。日本語訳は順次追加中。
Compliance OS — Meta-Orchestrator
Multi-framework compliance program orchestration. Four decisions, no per-framework deep-dive:
- Which frameworks apply to this company? —
framework_selector.pyranks the 12 supported frameworks against a company profile (industry, geography, AI use, medical, financial, headcount, customers, healthcare-PHI, NIS2 essential/important entity, US gov contractor) and returns applicable ones with dependency graph - How much do selected frameworks overlap? —
cross_framework_mapper.pycomputes control-level overlap with confidence rating; outputs unified control matrix + evidence-reuse opportunities - What does a mock audit produce? —
audit_simulator.pygenerates 8–15 finding scenarios with severity distribution matching IIA expectations + interview questions per control - What's the unified evidence checklist? —
evidence_pool_generator.pyconsolidates evidence across enabled frameworks; outputs which artefact satisfies which controls across which frameworks
This skill is NOT a per-framework deep-dive. The per-framework skills (ra-qm-team/skills/iso42001-specialist/, compliance-team-eu-ai-act/, ra-qm-team/skills/gdpr-dsgvo-expert/, etc.) do the operational work. Compliance OS orchestrates them.
This skill is NOT a substitute for binding legal advice. Cross-framework mappings reflect published guidance (ISO standards, regulations, EDPB/Commission guidance, IIA / AICPA professional standards). Novel cross-walks should be reviewed with counsel.
Keywords
compliance orchestration, multi-framework compliance, compliance OS, cross-framework mapping, control overlap, evidence pool, evidence reuse, audit simulation, mock audit, internal audit programme, GRC, governance risk compliance, framework selector, compliance program, integrated compliance, ISO 19011, IIA IPPF, AICPA AT-C, NIST CSF profile, multi-cert program, SOC 2 + ISO 27001, ISO 27001 + ISO 42001, ISO 13485 + MDR 745, AI Act + ISO 42001, GDPR + ISO 27001, compliance officer, compliance team workflow, certification readiness
Quick Start
# Decision A: Which frameworks apply for the company?
python scripts/framework_selector.py # embedded mid-stage AI SaaS sample
python scripts/framework_selector.py path/to/profile.json
# Decision B: Compute cross-framework overlap
python scripts/cross_framework_mapper.py # embedded ISO 27001 + SOC 2 sample
python scripts/cross_framework_mapper.py path/to/control_libs.json
# Decision C: Simulate an audit
python scripts/audit_simulator.py # embedded ISO 27001 sample
python scripts/audit_simulator.py path/to/audit_scope.json
# Decision D: Consolidate evidence checklist across frameworks
python scripts/evidence_pool_generator.py # embedded 3-framework sample
python scripts/evidence_pool_generator.py path/to/program.json
Key Questions (ask these first)
- Have you named every applicable framework? Forgetting one means rebuilding the audit program later. Run
framework_selector.pywith your profile. - What's the most certificate / regulation your company already operates? That's your reuse anchor. Map every new framework against it.
- What's the audit calendar? A multi-framework program means surveillance audits stacked through the year — plan auditor independence + capacity.
- Where is evidence stored? Multi-framework programs collapse when evidence lives in one team's drive without an index. Run
evidence_pool_generator.pyto surface the reuse opportunities. - What's the management-review cadence across frameworks? Each framework wants its own management review, but a single integrated review (per ISO Annex SL) typically satisfies all of them with one calendar slot.
- Who owns the meta-program? If no single accountable role, the program fragments.
Core Responsibilities
1. Framework Selection
The framework: company-profile JSON in → applicable-framework list out with dependency graph.
Deterministic logic:
- Medical device → ISO 13485 + ISO 14971 + (EU MDR 745 if EU market) + (FDA QSR if US market)
- Customer-facing AI → ISO 42001 + EU AI Act (if EU users) + GDPR (if personal data)
- B2B SaaS with enterprise customers → SOC 2 + ISO 27001 (often required for procurement)
- EU customers + personal data → GDPR mandatory
- Highly regulated industry (financial, health) → additional sectoral overlays
Run framework_selector.py to apply the decision rules.
2. Cross-Framework Control Mapping
The framework: for each selected framework, parse its control library; compute overlap with other selected frameworks.
Per merged-control output:
- Mapping confidence (HIGH / MEDIUM / LOW)
- Evidence-reuse opportunity (single artefact satisfies N controls)
- Per-framework citation
- Implementation guidance reusable across frameworks
Densest known overlap: ISO 27001 Annex A ↔ SOC 2 Trust Services Criteria — historically ~75% control coverage shared. Adding ISO 42001 brings AI-specific controls; adding GDPR brings privacy-specific.
Run cross_framework_mapper.py with framework control libraries.
3. Audit Simulation
The framework: generate a realistic mock internal audit per ISO 19011 + IIA IPPF standards.
Per audit output:
- 8–15 finding scenarios per ISO 19011 typical depth
- Severity distribution: ≥ 40% observations/OFI, ≤ 15% critical/major (IIA expectation for healthy programs)
- Interview questions per scoped control (3–5 questions per control)
- Document-review request list
- Walk-through requests where applicable
Run audit_simulator.py with framework + scope.
4. Evidence Pool
The framework: consolidate evidence requirements across enabled frameworks; identify reuse opportunities.
Output:
- Evidence artefact list (e.g., access-review log, supplier risk register, incident log)
- Per artefact: list of (framework, control) tuples it satisfies
- Reuse-leverage score (artefact A satisfies N controls across M frameworks)
- Acquisition cost estimate (effort to produce + maintain)
Run evidence_pool_generator.py with program config.
Workflows
Workflow 1: Program Bootstrap (multi-framework, 4–8 weeks)
Goal: stand up a compliance program covering 2–4 frameworks simultaneously.
# 1. Run framework selector with company profile
python scripts/framework_selector.py profile.json
# 2. For each applicable framework, identify the per-framework skill and run its gap analysis
# 3. Run cross-framework mapper to identify reuse opportunities
python scripts/cross_framework_mapper.py control_libs.json
# 4. Run evidence pool generator to consolidate
python scripts/evidence_pool_generator.py program.json
# 5. Cross-check with cs-compliance-officer agent
# 6. Output: prioritized program backlog with owners + dates
Workflow 2: Annual Audit Calendar (yearly)
Goal: plan internal audit cycles covering all applicable frameworks.
# 1. Refresh framework selector if profile changed
python scripts/framework_selector.py profile.json
# 2. For each framework, run its internal-audit-plan tool
# (e.g., aims_audit_scheduler.py for ISO 42001; isms_audit_scheduler.py for ISO 27001)
# 3. Coordinate the audit calendar across frameworks (auditor independence + capacity)
# 4. Run audit simulator for each framework to prep auditors
python scripts/audit_simulator.py scope.json
# 5. Output: integrated audit calendar with owners + auditor assignments
Workflow 3: Pre-Certification Readiness (per new framework, 6–12 weeks)
Goal: prepare for an external certification audit.
# 1. Run gap analysis for the new framework
# (ISO 42001: aims_gap_analyzer.py; ISO 27001: compliance_checker.py; SOC 2: gap_analyzer.py)
# 2. Run cross-framework mapper against already-certified frameworks
python scripts/cross_framework_mapper.py control_libs.json
# 3. Reuse evidence for HIGH-confidence mappings; build new for MEDIUM/LOW
# 4. Run audit simulator to dry-run the certification audit
python scripts/audit_simulator.py scope.json
# 5. Close remaining gaps before external auditor stage 1
Workflow 4: Evidence Pool Consolidation (quarterly)
Goal: keep the unified evidence pool fresh + reusable.
# 1. Refresh evidence pool generator
python scripts/evidence_pool_generator.py program.json
# 2. Identify HIGH-reuse-leverage artefacts (1 evidence -> 5+ controls)
# 3. Confirm evidence freshness (within retention requirement per framework)
# 4. Audit the evidence pool itself (no orphan controls, no stale evidence)
Output Standards
**Bottom Line:** [one sentence — what's the multi-framework picture + biggest reuse opportunity]
**The Decision:** [one of: framework-set | overlap-map | audit-plan | evidence-consolidation]
**The Evidence:** [framework names + control IDs from the tool, not adjectives]
**How to Act:** [3 concrete next steps with owners + dates]
**Your Decision:** [the call only the compliance officer can make — which frameworks to pursue, audit cycle priority, evidence-reuse policy]
Adjacent Skills
../../ra-qm-team/skills/iso42001-specialist/— ISO 42001 deep-dive (paired with compliance-team-iso42001 plugin)../../ra-qm-team/skills/eu-ai-act-specialist/— EU AI Act deep-dive (paired with compliance-team-eu-ai-act plugin)../../ra-qm-team/skills/information-security-manager-iso27001/— ISO 27001 ISMS deep-dive../../ra-qm-team/skills/quality-manager-qms-iso13485/— ISO 13485 QMS deep-dive../../ra-qm-team/skills/gdpr-dsgvo-expert/— GDPR deep-dive../../ra-qm-team/skills/soc2-compliance/— SOC 2 deep-dive../../ra-qm-team/skills/fda-consultant-specialist/— FDA QSR deep-dive../../ra-qm-team/skills/mdr-745-specialist/— EU MDR 745 deep-dive../../ra-qm-team/skills/risk-management-specialist/— ISO 14971 deep-dive../../c-level-advisor/chief-ai-officer-advisor/— Executive AI risk decisions (build-vs-buy, model selection)../../c-level-advisor/skills/general-counsel-advisor/— Legal review for novel cases
References
- compliance_os_pattern.md — The meta-framework architecture (configure → map → simulate → consolidate → review); when to use vs not
- cross_framework_overlap.md — The 9-framework × control-family overlap table with mapping confidence (Phase 3 expands to 12 frameworks via
cross_framework_mapper.py) - audit_simulation_methodology.md — ISO 19011 + IIA IPPF + AICPA AT-C audit-simulation principles + severity distribution heuristics
- evidence_management.md — Evidence pool design + retention + freshness + reuse-leverage scoring
- multi_framework_audit_playbook.md — Integrated audit programme for 2+ frameworks (Phase 2)
- evidence_artifact_reuse_index.md — Empirically-derived reuse-leverage ranking across all 12 frameworks (Phase 3)
Phase 3 Asset: Mock Audit Scenario Library
assets/mock_audit_library.json — 205 pre-built finding scenarios spanning 12 frameworks + 26 themes + 4 severity levels (34 critical, 88 major, 54 minor, 29 observation). Each scenario tags applicable frameworks; cross-reference scripts/cross_framework_mapper.py merged-controls catalogue to resolve framework-specific control IDs. Use as input to enrich audit_simulator.py mock audits, as a training resource for new internal auditors, or as the seed for finding-pattern detection across multi-framework programmes.
Version: 1.2.0 Status: Production Ready
同梱ファイル
※ ZIPに含まれるファイル一覧。`SKILL.md` 本体に加え、参考資料・サンプル・スクリプトが入っている場合があります。
- 📄 SKILL.md (13,218 bytes)
- 📎 assets/company_profile_template.json (747 bytes)
- 📎 assets/control_library_template.json (483 bytes)
- 📎 assets/mock_audit_library.json (88,795 bytes)
- 📎 references/audit_simulation_methodology.md (8,270 bytes)
- 📎 references/compliance_os_pattern.md (9,505 bytes)
- 📎 references/cross_framework_overlap.md (7,071 bytes)
- 📎 references/evidence_artifact_reuse_index.md (11,363 bytes)
- 📎 references/evidence_management.md (8,475 bytes)
- 📎 references/multi_framework_audit_playbook.md (9,298 bytes)
- 📎 scripts/audit_simulator.py (16,126 bytes)
- 📎 scripts/cross_framework_mapper.py (22,062 bytes)
- 📎 scripts/evidence_pool_generator.py (13,748 bytes)
- 📎 scripts/framework_selector.py (13,474 bytes)