A

Advisor Security Auditor

Enterprise-grade agent for agent, conducting, comprehensive, security. Includes structured workflows, validation checks, and reusable patterns for security.

AgentClipticssecurityv1.0.0MIT
0 views0 copies

Advisor Security Auditor

Conducts systematic security assessments, compliance audits, and risk evaluations with actionable findings and remediation roadmaps.

When to Use This Agent

Choose this agent when you need to:

  • Perform comprehensive security control assessments against frameworks like SOC 2, ISO 27001, HIPAA, or PCI DSS
  • Evaluate vulnerability exposure across network, application, and infrastructure layers with risk-scored findings
  • Generate audit reports with prioritized remediation recommendations, evidence documentation, and compliance gap analysis

Consider alternatives when:

  • You need active penetration testing or exploit development rather than audit-focused control evaluation
  • Your requirement is limited to a single application scan, which a dedicated DAST or SAST tool handles more efficiently

Quick Start

Configuration

name: advisor-security-auditor type: agent category: security

Example Invocation

claude agent:invoke advisor-security-auditor "Audit our SaaS platform against SOC 2 Type II trust service criteria"

Example Output

Security Audit Report: SaaS Platform - SOC 2 Type II

Scope: 347 controls across 5 trust service categories
Duration: Full assessment cycle

Results Summary:
  Controls Reviewed:    347
  Findings Identified:   52
  Critical Issues:        8
  High Risk:             14
  Medium Risk:           19
  Observations:          11
  Compliance Score:      87%

Critical Findings:
  [C-01] Unencrypted PII in database backup storage
  [C-02] Service accounts with excessive IAM privileges
  [C-03] Missing MFA on administrative API endpoints
  ...

Remediation Roadmap:
  Phase 1 (0-30 days): Address 8 critical findings
  Phase 2 (30-60 days): Resolve 14 high-risk items
  Phase 3 (60-90 days): Close remaining gaps
  Projected compliance: 100% within 90 days

Core Concepts

Audit Methodology Overview

AspectDetails
Planning PhaseScope definition, compliance mapping, stakeholder alignment, resource allocation, and tool preparation
Fieldwork PhaseControl testing, evidence collection, personnel interviews, configuration review, and vulnerability scanning
Analysis PhaseFinding classification (critical/high/medium/low), risk scoring, cross-referencing against framework requirements
Reporting PhaseExecutive summary, detailed findings with evidence, remediation roadmap, and compliance scorecards
Follow-Up PhaseRemediation validation, residual risk assessment, continuous monitoring setup, and knowledge transfer

Audit Workflow Architecture

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”    β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”    β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚   Planning   │───>β”‚  Fieldwork   │───>β”‚   Analysis   β”‚
β”‚              β”‚    β”‚              β”‚    β”‚              β”‚
β”‚ Scope        β”‚    β”‚ Test Controlsβ”‚    β”‚ Classify     β”‚
β”‚ Map Controls β”‚    β”‚ Collect Logs β”‚    β”‚ Score Risks  β”‚
β”‚ Prep Tools   β”‚    β”‚ Interview    β”‚    β”‚ Map Gaps     β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜    β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜    β””β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”˜
                                               β”‚
β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”    β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”           β”‚
β”‚  Follow-Up   β”‚<───│  Reporting   β”‚<β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
β”‚              β”‚    β”‚              β”‚
β”‚ Validate Fix β”‚    β”‚ Exec Summary β”‚
β”‚ Residual Riskβ”‚    β”‚ Remediation  β”‚
β”‚ Monitor      β”‚    β”‚ Evidence Pkg β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜    β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

Configuration

ParameterTypeDefaultDescription
complianceFrameworkstring"soc2"Target compliance standard: soc2, iso27001, hipaa, pcidss, nist800-53, or gdpr
findingSeveritystring"all"Minimum severity to report: critical, high, medium, low, or all
auditScopestring"full"Assessment scope: full, network, application, access-control, or data-security
evidenceCollectionbooleantrueAttach supporting evidence (logs, configs, screenshots) to each finding
remediationDetailstring"actionable"Remediation guidance level: summary, actionable, or step-by-step with timelines

Best Practices

  1. Define Scope Boundaries Before Fieldwork Begins - Ambiguous audit scope leads to either incomplete coverage or unbounded effort. Document exactly which systems, data flows, and compliance criteria are in scope, and obtain stakeholder sign-off. Scope creep during fieldwork compromises both audit quality and timeline commitments.

  2. Collect Evidence Systematically With Chain of Custody - Every finding must be traceable to specific evidence: configuration files, log entries, screenshots, or interview notes. Maintain a structured evidence repository with timestamps and source attribution so findings withstand scrutiny during external auditor review or regulatory examination.

  3. Score Risks Using Both Likelihood and Impact - A critical vulnerability on an isolated test server differs materially from the same vulnerability on a production payment gateway. Risk scores that combine exploitation likelihood with business impact produce prioritized remediation roadmaps that direct limited security resources toward the highest-value fixes first.

  4. Separate Observations from Findings - Not every deviation warrants a formal finding. Observations note areas for improvement that do not currently violate compliance requirements or create material risk. This distinction prevents finding inflation that desensitizes stakeholders and obscures genuinely critical issues requiring immediate attention.

  5. Deliver Remediation Guidance, Not Just Problem Descriptions - Findings without actionable remediation steps create frustration and delays. Each finding should include the specific control gap, the risk it introduces, concrete steps to resolve it, compensating controls available in the interim, and a realistic timeline for full remediation aligned with organizational change management capacity.

Common Issues

  1. Compliance Checkbox Mentality - Organizations that treat audits as checkbox exercises achieve paper compliance while leaving real vulnerabilities unaddressed. Auditors must test controls operationally, not just verify documentation exists. A password policy document means nothing if the system permits single-character passwords in practice.

  2. Stale Findings Persisting Across Audit Cycles - When remediation from prior audits remains incomplete, recurring findings erode stakeholder confidence and auditor credibility. Implement a formal finding lifecycle tracker that escalates unresolved items, assigns ownership with deadlines, and ties remediation progress to executive reporting dashboards.

  3. Insufficient Access for Complete Assessment - Auditors granted read-only access to a subset of systems produce incomplete findings that create false confidence. Negotiate appropriate access levels during the planning phase, document any scope limitations imposed by access restrictions, and clearly flag areas where assessment coverage is incomplete due to access constraints.

Community

Reviews

Write a review

No reviews yet. Be the first to review this template!

Similar Templates