Governance & Docs #3
mrmoon0986
started this conversation in
Ideas
Replies: 1 comment 1 reply
-
|
@mrmoon0986 - Your auditor perspective is invaluable to this effort. You're describing the actual problem - it's not just technical controls, it's the literal entire governance-to-evidence chain. Phase 1 (keeping scope manageable):
Phase 2 (with community help):
Phase 3 (if successful):
I'm being cautious about liability with policy templates, but with proper disclaimers and community review, this could eliminate "Excel merge week" entirely. Would you be interested in contributing policy templates or reviewing our control mappings? Tracking this in #5 - let's start with the control mapping and evolve from there. |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Just to add some context, whilst you've explicitly mentioned that the tool is not supposed to cover policies and documentation related to it, I thought it might be useful to share my thoughts as an ex auditor. Auditors don’t just ask “did you scan?”, they ask “show me the policy, the standard, the procedure, and the evidence that it’s enforced.
Right now that lives in a mess of Google Docs, Confluence, and screenshots in most cases.
What if AuditKit didn’t just orchestrate scanners, but also generated a governance pack that maps your policies/standards/procedures directly to the same controls and evidence?
Policies (what we require) → e.g., Access Control, Logging & Monitoring, Encryption, Change Mgmt, Vendor Risk, Incident Response, DR/BCP.
Standards (how we do it) → e.g., “TLS ≥ 1.2 on all endpoints,” “90-day log retention,” “MFA for privileged roles.”
Procedures/SOPs (how to execute + capture evidence) → step-by-step with CLI/console paths.
Mapping: every paragraph tagged to SOC2 CC, PCI 4.0, ISO 27001… and to technical checks in the same report. This can be customised, depending on the scope, as in practice not every single requirement is relevant/applicable.
What it looks like in practice
As an addition (say, week 5 or week 10, depends), here is what can be potentially added to complement scans:
Policy templates: InfoSec Policy, Access Control, Encryption/KMS, Logging & Monitoring, Change Mgmt, SDLC/SAST/Secrets, Incident Response, Vendor Risk, DR/BCP, Data Classification.
Standards: concrete guardrails (e.g., “S3 BlockPublicAccess=on”, “TLS ≥ 1.2”, “Key rotation ≤ 365d”).
Procedures: evidence playbooks (portal paths + CLI + screenshots) auto-filled from scan results.
Traceability: autogenerated Control Matrix (SOC2 CC1–CC9, PCI, ISO) linking doc clauses to checks and artifacts.
CUECs & Assertions: generate Complementary User Entity Controls, management assertion boilerplate, and a System Description starter (auditors love this).
Concrete bits you can consider implementing (I can help with templates, placeholders, mapping, etc.):
Doc Packs (
/docpacks/soc2, /docpacks/pci, /docpacks/iso): Markdown + YAML front-matter with placeholders like{{ORG_NAME}}, {{IDP_NAME}}, {{LOG_RETENTION_DAYS}}.Mapping schema:
control_id(e.g.,CC6.3)doc_refs(policy/standard/section anchors)check_ids(scanner/adapters:AZU-STO-001, prowler:iam_1)evidence_refs(artifact IDs with hashes)Adapters:
adapters/scubagear, adapters/prowler, adapters/github, each emitting a normalizedFinding{ control_id, check_id, severity, resources[], evidence[] }.Binder:
auditkit report --unifiedwrites/binder/ControlMatrix.md, /binder/PBC_index.json, /binder/evidence/with checksums.As a result, a governance pack (policy/standard/procedure templates with placeholders) mapped to the same controls, so the unified report ties docs ⇄ checks ⇄ evidence. That kills the “Excel merge week.”
Beta Was this translation helpful? Give feedback.
All reactions