compliance-report-builder
Compare original and translation side by side
🇺🇸
Original
English🇨🇳
Translation
ChineseCompliance Report Builder
合规报告生成工具
Эксперт по регуляторной compliance документации и отчётности.
监管合规文档与报告专家。
Основные принципы
核心原则
Evidence-Based Documentation
Evidence-Based Documentation
- Контроли должны быть связаны с конкретными артефактами
- Audit trail с timestamps и ответственными
- Количественные метрики для preventive и detective мер
- 控制措施必须与具体工件关联
- 带有时间戳和责任人的审计追踪
- 预防性和检测性措施的量化指标
Risk-Oriented Approach
Risk-Oriented Approach
- Приоритизация high-risk областей
- Mapping контролей к threat vectors
- Документирование residual risk
- 高风险领域优先排序
- 控制措施与威胁向量映射
- 剩余风险记录
Regulatory Alignment
Regulatory Alignment
- Привязка требований к конкретным статьям регуляций
- Guidance для неоднозначных стандартов
- Compensating controls документация
- 要求与法规具体条款绑定
- 模糊标准的指导说明
- 补偿性控制措施文档
Executive Summary Template
Executive Summary Template
markdown
undefinedmarkdown
undefinedCompliance Status Report
Compliance Status Report
Period: Q4 2024
Prepared: 2024-12-10
Classification: Confidential
Period: Q4 2024
Prepared: 2024-12-10
Classification: Confidential
Overall Status: 🟡 YELLOW
Overall Status: 🟡 YELLOW
Coverage Summary
Coverage Summary
| Framework | Controls | Compliant | Gaps | Coverage |
|---|---|---|---|---|
| SOC 2 | 85 | 79 | 6 | 93% |
| GDPR | 42 | 40 | 2 | 95% |
| ISO 27001 | 114 | 108 | 6 | 95% |
| Framework | Controls | Compliant | Gaps | Coverage |
|---|---|---|---|---|
| SOC 2 | 85 | 79 | 6 | 93% |
| GDPR | 42 | 40 | 2 | 95% |
| ISO 27001 | 114 | 108 | 6 | 95% |
Key Findings
Key Findings
| Priority | Count | Trend |
|---|---|---|
| Critical | 0 | ⬇️ |
| High | 3 | ➡️ |
| Medium | 8 | ⬆️ |
| Low | 12 | ➡️ |
| Priority | Count | Trend |
|---|---|---|
| Critical | 0 | ⬇️ |
| High | 3 | ➡️ |
| Medium | 8 | ⬆️ |
| Low | 12 | ➡️ |
Action Items
Action Items
- [CRITICAL] None
- [HIGH] Complete MFA rollout by Jan 15
- [HIGH] Update data retention policy
- [HIGH] Implement logging for System X
undefined- [CRITICAL] None
- [HIGH] Complete MFA rollout by Jan 15
- [HIGH] Update data retention policy
- [HIGH] Implement logging for System X
undefinedControl Assessment Framework
Control Assessment Framework
yaml
Control:
ID: AC-001
Title: Access Control Policy
Framework: SOC 2, ISO 27001
Category: Security
Implementation:
Status: Implemented
Owner: Security Team
Last Review: 2024-12-01
Testing:
Method: Inspection + Inquiry
Frequency: Quarterly
Last Test: 2024-11-15
Result: Effective
Evidence:
- Policy document v2.3
- Access review logs
- Training completion records
Gaps:
- None identified
Recommendations:
- Automate quarterly access reviewsyaml
Control:
ID: AC-001
Title: Access Control Policy
Framework: SOC 2, ISO 27001
Category: Security
Implementation:
Status: Implemented
Owner: Security Team
Last Review: 2024-12-01
Testing:
Method: Inspection + Inquiry
Frequency: Quarterly
Last Test: 2024-11-15
Result: Effective
Evidence:
- Policy document v2.3
- Access review logs
- Training completion records
Gaps:
- None identified
Recommendations:
- Automate quarterly access reviewsSOC 2 Trust Services
SOC 2 Trust Services
markdown
undefinedmarkdown
undefinedSecurity (Common Criteria)
Security (Common Criteria)
CC1: Control Environment
CC1: Control Environment
| Control | Description | Status | Evidence |
|---|---|---|---|
| CC1.1 | Board oversight | ✅ | Board minutes |
| CC1.2 | Management philosophy | ✅ | Policy docs |
| CC1.3 | Organizational structure | ✅ | Org chart |
| CC1.4 | HR practices | ✅ | HR policies |
| Control | Description | Status | Evidence |
|---|---|---|---|
| CC1.1 | Board oversight | ✅ | Board minutes |
| CC1.2 | Management philosophy | ✅ | Policy docs |
| CC1.3 | Organizational structure | ✅ | Org chart |
| CC1.4 | HR practices | ✅ | HR policies |
CC2: Communication and Information
CC2: Communication and Information
| Control | Description | Status | Evidence |
|---|---|---|---|
| CC2.1 | Information quality | ✅ | Data governance |
| CC2.2 | Internal communication | ✅ | Slack, email logs |
| CC2.3 | External communication | ✅ | Customer portal |
| Control | Description | Status | Evidence |
|---|---|---|---|
| CC2.1 | Information quality | ✅ | Data governance |
| CC2.2 | Internal communication | ✅ | Slack, email logs |
| CC2.3 | External communication | ✅ | Customer portal |
CC3: Risk Assessment
CC3: Risk Assessment
| Control | Description | Status | Evidence |
|---|---|---|---|
| CC3.1 | Risk identification | ✅ | Risk register |
| CC3.2 | Risk analysis | ✅ | Risk assessment |
| CC3.3 | Fraud risk | ✅ | Fraud controls |
| CC3.4 | Change management | ⚠️ | Partial automation |
undefined| Control | Description | Status | Evidence |
|---|---|---|---|
| CC3.1 | Risk identification | ✅ | Risk register |
| CC3.2 | Risk analysis | ✅ | Risk assessment |
| CC3.3 | Fraud risk | ✅ | Fraud controls |
| CC3.4 | Change management | ⚠️ | Partial automation |
undefinedGDPR Checklist
GDPR Checklist
yaml
Article 30 - Records of Processing:
- [ ] Processing purposes documented
- [ ] Data categories listed
- [ ] Recipient categories identified
- [ ] Transfer safeguards documented
- [ ] Retention periods defined
- [ ] Security measures described
Article 13/14 - Privacy Notices:
- [ ] Controller identity stated
- [ ] DPO contact provided
- [ ] Purposes explained
- [ ] Legal basis identified
- [ ] Rights information included
- [ ] Complaint procedure described
Article 17 - Right to Erasure:
- [ ] Process documented
- [ ] Timeframes defined (30 days)
- [ ] Exceptions listed
- [ ] Verification procedure
- [ ] Third-party notification
Article 33 - Breach Notification:
- [ ] Detection procedures
- [ ] Assessment criteria
- [ ] 72-hour notification process
- [ ] DPA contact established
- [ ] Subject notification criteriayaml
Article 30 - Records of Processing:
- [ ] Processing purposes documented
- [ ] Data categories listed
- [ ] Recipient categories identified
- [ ] Transfer safeguards documented
- [ ] Retention periods defined
- [ ] Security measures described
Article 13/14 - Privacy Notices:
- [ ] Controller identity stated
- [ ] DPO contact provided
- [ ] Purposes explained
- [ ] Legal basis identified
- [ ] Rights information included
- [ ] Complaint procedure described
Article 17 - Right to Erasure:
- [ ] Process documented
- [ ] Timeframes defined (30 days)
- [ ] Exceptions listed
- [ ] Verification procedure
- [ ] Third-party notification
Article 33 - Breach Notification:
- [ ] Detection procedures
- [ ] Assessment criteria
- [ ] 72-hour notification process
- [ ] DPA contact established
- [ ] Subject notification criteriaRisk Assessment Matrix
Risk Assessment Matrix
javascript
const riskMatrix = {
likelihood: {
rare: 1, // < 5%
unlikely: 2, // 5-25%
possible: 3, // 25-50%
likely: 4, // 50-75%
certain: 5 // > 75%
},
impact: {
negligible: 1, // < $10k
minor: 2, // $10k-$100k
moderate: 3, // $100k-$1M
major: 4, // $1M-$10M
severe: 5 // > $10M
},
calculateRisk(likelihood, impact) {
const score = likelihood * impact;
if (score >= 15) return 'Critical';
if (score >= 10) return 'High';
if (score >= 5) return 'Medium';
return 'Low';
}
};javascript
const riskMatrix = {
likelihood: {
rare: 1, // < 5%
unlikely: 2, // 5-25%
possible: 3, // 25-50%
likely: 4, // 50-75%
certain: 5 // > 75%
},
impact: {
negligible: 1, // < $10k
minor: 2, // $10k-$100k
moderate: 3, // $100k-$1M
major: 4, // $1M-$10M
severe: 5 // > $10M
},
calculateRisk(likelihood, impact) {
const score = likelihood * impact;
if (score >= 15) return 'Critical';
if (score >= 10) return 'High';
if (score >= 5) return 'Medium';
return 'Low';
}
};Finding Classification
Finding Classification
yaml
Critical:
Response: 24-48 hours
Escalation: Executive + Board
Examples:
- Active data breach
- Regulatory violation with penalties
- System-wide security failure
High:
Response: 1-2 weeks
Escalation: Senior Management
Examples:
- Missing critical controls
- Significant gaps in coverage
- Failed audit controls
Medium:
Response: 30-60 days
Escalation: Department Head
Examples:
- Incomplete documentation
- Process inefficiencies
- Minor policy violations
Low:
Response: 90 days
Escalation: Control Owner
Examples:
- Optimization opportunities
- Documentation updates
- Training gapsyaml
Critical:
Response: 24-48 hours
Escalation: Executive + Board
Examples:
- Active data breach
- Regulatory violation with penalties
- System-wide security failure
High:
Response: 1-2 weeks
Escalation: Senior Management
Examples:
- Missing critical controls
- Significant gaps in coverage
- Failed audit controls
Medium:
Response: 30-60 days
Escalation: Department Head
Examples:
- Incomplete documentation
- Process inefficiencies
- Minor policy violations
Low:
Response: 90 days
Escalation: Control Owner
Examples:
- Optimization opportunities
- Documentation updates
- Training gapsGap Analysis Template
Gap Analysis Template
markdown
undefinedmarkdown
undefinedGap Analysis: [Control Area]
Gap Analysis: [Control Area]
Current State
Current State
[Description of current implementation]
[Description of current implementation]
Required State
Required State
[Regulatory requirement or best practice]
[Regulatory requirement or best practice]
Gap Description
Gap Description
[Specific gaps identified]
[Specific gaps identified]
Risk Assessment
Risk Assessment
- Likelihood: [1-5]
- Impact: [1-5]
- Risk Score: [calculated]
- Risk Level: [Critical/High/Medium/Low]
- Likelihood: [1-5]
- Impact: [1-5]
- Risk Score: [calculated]
- Risk Level: [Critical/High/Medium/Low]
Remediation Plan
Remediation Plan
| Action | Owner | Due Date | Status |
|---|---|---|---|
| Action 1 | Name | Date | In Progress |
| Action 2 | Name | Date | Pending |
| Action | Owner | Due Date | Status |
|---|---|---|---|
| Action 1 | Name | Date | In Progress |
| Action 2 | Name | Date | Pending |
Success Metrics
Success Metrics
- Metric 1
- Metric 2
undefined- Metric 1
- Metric 2
undefinedAudit Sampling
Audit Sampling
python
def calculate_sample_size(population: int, confidence: float = 0.95,
margin_error: float = 0.05) -> int:
"""
Calculate statistical sample size for audit testing.
Args:
population: Total population size
confidence: Confidence level (default 95%)
margin_error: Acceptable margin of error (default 5%)
Returns:
Required sample size
"""
import math
# Z-score for confidence level
z_scores = {0.90: 1.645, 0.95: 1.96, 0.99: 2.576}
z = z_scores.get(confidence, 1.96)
# Assume 50% response distribution for max sample
p = 0.5
# Sample size formula
n = (z**2 * p * (1-p)) / (margin_error**2)
# Finite population correction
if population < 10000:
n = n / (1 + (n - 1) / population)
return math.ceil(n)python
def calculate_sample_size(population: int, confidence: float = 0.95,
margin_error: float = 0.05) -> int:
"""
Calculate statistical sample size for audit testing.
Args:
population: Total population size
confidence: Confidence level (default 95%)
margin_error: Acceptable margin of error (default 5%)
Returns:
Required sample size
"""
import math
# Z-score for confidence level
z_scores = {0.90: 1.645, 0.95: 1.96, 0.99: 2.576}
z = z_scores.get(confidence, 1.96)
# Assume 50% response distribution for max sample
p = 0.5
# Sample size formula
n = (z**2 * p * (1-p)) / (margin_error**2)
# Finite population correction
if population < 10000:
n = n / (1 + (n - 1) / population)
return math.ceil(n)Example usage
Example usage
population=1000, 95% confidence, 5% margin
population=1000, 95% confidence, 5% margin
Result: ~278 samples needed
Result: ~278 samples needed
undefinedundefinedContinuous Monitoring
Continuous Monitoring
yaml
Real-time Dashboards:
- Control effectiveness scores
- Compliance coverage %
- Open findings count
- Risk heat map
Automated Alerts:
Critical:
- Failed security controls
- Unauthorized access attempts
- Data breach indicators
Warning:
- Controls approaching expiry
- Overdue remediations
- Anomaly detection triggers
Reporting Cadence:
Daily: Critical events
Weekly: Status summary
Monthly: Detailed report
Quarterly: Executive review
Annually: Full assessmentyaml
Real-time Dashboards:
- Control effectiveness scores
- Compliance coverage %
- Open findings count
- Risk heat map
Automated Alerts:
Critical:
- Failed security controls
- Unauthorized access attempts
- Data breach indicators
Warning:
- Controls approaching expiry
- Overdue remediations
- Anomaly detection triggers
Reporting Cadence:
Daily: Critical events
Weekly: Status summary
Monthly: Detailed report
Quarterly: Executive review
Annually: Full assessmentReport Templates
Report Templates
Finding Report
Finding Report
markdown
undefinedmarkdown
undefinedFinding Report
Finding Report
ID: FND-2024-042
Date: 2024-12-10
Severity: High
ID: FND-2024-042
Date: 2024-12-10
Severity: High
Summary
Summary
[One-sentence description]
[One-sentence description]
Background
Background
[Context and relevant history]
[Context and relevant history]
Finding Details
Finding Details
[Technical details of the issue]
[Technical details of the issue]
Impact Assessment
Impact Assessment
- Business Impact: [description]
- Regulatory Impact: [description]
- Reputational Impact: [description]
- Business Impact: [description]
- Regulatory Impact: [description]
- Reputational Impact: [description]
Root Cause
Root Cause
[Why this happened]
[Why this happened]
Recommendation
Recommendation
[Specific remediation steps]
[Specific remediation steps]
Management Response
Management Response
[Owner's response and commitment]
[Owner's response and commitment]
Timeline
Timeline
| Milestone | Date | Status |
|---|---|---|
| Finding identified | 2024-12-10 | Complete |
| Remediation plan | 2024-12-15 | Pending |
| Implementation | 2024-01-15 | Pending |
| Verification | 2024-01-30 | Pending |
undefined| Milestone | Date | Status |
|---|---|---|
| Finding identified | 2024-12-10 | Complete |
| Remediation plan | 2024-12-15 | Pending |
| Implementation | 2024-01-15 | Pending |
| Verification | 2024-01-30 | Pending |
undefinedЛучшие практики
最佳实践
- Evidence first — каждый контроль должен иметь доказательства
- Risk-based prioritization — фокус на high-risk областях
- Continuous monitoring — не ждите годового аудита
- Clear ownership — каждый контроль имеет ответственного
- Regular testing — проверяйте effectiveness, не только design
- Documentation discipline — версионирование и audit trail
- 证据优先 — 每项控制措施都必须有证据支持
- 基于风险的优先级排序 — 聚焦高风险领域
- 持续监控 — 不要等到年度审计
- 明确的责任人 — 每项控制措施都有对应的负责人
- 定期测试 — 不仅要检查设计,还要验证有效性
- 文档规范 — 版本控制与审计追踪