Multi-framework compliance program orchestration. Four decisions, no per-framework deep-dive:
framework_selector.py ranks the 12 supported frameworks against a company profile (industry, geography, AI use, medical, financial, headcount, customers, healthcare-PHI, NIS2 essential/important entity, US gov contractor) and returns applicable ones with dependency graphcross_framework_mapper.py computes control-level overlap with confidence rating; outputs unified control matrix + evidence-reuse opportunitiesaudit_simulator.py generates 8–15 finding scenarios with severity distribution matching IIA expectations + interview questions per controlevidence_pool_generator.py consolidates evidence across enabled frameworks; outputs which artefact satisfies which controls across which frameworksThis skill is NOT a per-framework deep-dive. The per-framework skills (ra-qm-team/skills/iso42001-specialist/, compliance-team-eu-ai-act/, ra-qm-team/skills/gdpr-dsgvo-expert/, etc.) do the operational work. Compliance OS orchestrates them.
This skill is NOT a substitute for binding legal advice. Cross-framework mappings reflect published guidance (ISO standards, regulations, EDPB/Commission guidance, IIA / AICPA professional standards). Novel cross-walks should be reviewed with counsel.
compliance orchestration, multi-framework compliance, compliance OS, cross-framework mapping, control overlap, evidence pool, evidence reuse, audit simulation, mock audit, internal audit programme, GRC, governance risk compliance, framework selector, compliance program, integrated compliance, ISO 19011, IIA IPPF, AICPA AT-C, NIST CSF profile, multi-cert program, SOC 2 + ISO 27001, ISO 27001 + ISO 42001, ISO 13485 + MDR 745, AI Act + ISO 42001, GDPR + ISO 27001, compliance officer, compliance team workflow, certification readiness
# Decision A: Which frameworks apply for the company?
python scripts/framework_selector.py # embedded mid-stage AI SaaS sample
python scripts/framework_selector.py path/to/profile.json
# Decision B: Compute cross-framework overlap
python scripts/cross_framework_mapper.py # embedded ISO 27001 + SOC 2 sample
python scripts/cross_framework_mapper.py path/to/control_libs.json
# Decision C: Simulate an audit
python scripts/audit_simulator.py # embedded ISO 27001 sample
python scripts/audit_simulator.py path/to/audit_scope.json
# Decision D: Consolidate evidence checklist across frameworks
python scripts/evidence_pool_generator.py # embedded 3-framework sample
python scripts/evidence_pool_generator.py path/to/program.json
framework_selector.py with your profile.evidence_pool_generator.py to surface the reuse opportunities.The framework: company-profile JSON in → applicable-framework list out with dependency graph.
Deterministic logic:
Run framework_selector.py to apply the decision rules.
The framework: for each selected framework, parse its control library; compute overlap with other selected frameworks.
Per merged-control output:
Densest known overlap: ISO 27001 Annex A ↔ SOC 2 Trust Services Criteria — historically ~75% control coverage shared. Adding ISO 42001 brings AI-specific controls; adding GDPR brings privacy-specific.
Run cross_framework_mapper.py with framework control libraries.
The framework: generate a realistic mock internal audit per ISO 19011 + IIA IPPF standards.
Per audit output:
Run audit_simulator.py with framework + scope.
The framework: consolidate evidence requirements across enabled frameworks; identify reuse opportunities.
Output:
Run evidence_pool_generator.py with program config.
Goal: stand up a compliance program covering 2–4 frameworks simultaneously.
# 1. Run framework selector with company profile
python scripts/framework_selector.py profile.json
# 2. For each applicable framework, identify the per-framework skill and run its gap analysis
# 3. Run cross-framework mapper to identify reuse opportunities
python scripts/cross_framework_mapper.py control_libs.json
# 4. Run evidence pool generator to consolidate
python scripts/evidence_pool_generator.py program.json
# 5. Cross-check with cs-compliance-officer agent
# 6. Output: prioritized program backlog with owners + dates
Goal: plan internal audit cycles covering all applicable frameworks.
# 1. Refresh framework selector if profile changed
python scripts/framework_selector.py profile.json
# 2. For each framework, run its internal-audit-plan tool
# (e.g., aims_audit_scheduler.py for ISO 42001; isms_audit_scheduler.py for ISO 27001)
# 3. Coordinate the audit calendar across frameworks (auditor independence + capacity)
# 4. Run audit simulator for each framework to prep auditors
python scripts/audit_simulator.py scope.json
# 5. Output: integrated audit calendar with owners + auditor assignments
Goal: prepare for an external certification audit.
# 1. Run gap analysis for the new framework
# (ISO 42001: aims_gap_analyzer.py; ISO 27001: compliance_checker.py; SOC 2: gap_analyzer.py)
# 2. Run cross-framework mapper against already-certified frameworks
python scripts/cross_framework_mapper.py control_libs.json
# 3. Reuse evidence for HIGH-confidence mappings; build new for MEDIUM/LOW
# 4. Run audit simulator to dry-run the certification audit
python scripts/audit_simulator.py scope.json
# 5. Close remaining gaps before external auditor stage 1
Goal: keep the unified evidence pool fresh + reusable.
# 1. Refresh evidence pool generator
python scripts/evidence_pool_generator.py program.json
# 2. Identify HIGH-reuse-leverage artefacts (1 evidence -> 5+ controls)
# 3. Confirm evidence freshness (within retention requirement per framework)
# 4. Audit the evidence pool itself (no orphan controls, no stale evidence)
**Bottom Line:** [one sentence — what's the multi-framework picture + biggest reuse opportunity]
**The Decision:** [one of: framework-set | overlap-map | audit-plan | evidence-consolidation]
**The Evidence:** [framework names + control IDs from the tool, not adjectives]
**How to Act:** [3 concrete next steps with owners + dates]
**Your Decision:** [the call only the compliance officer can make — which frameworks to pursue, audit cycle priority, evidence-reuse policy]
../../ra-qm-team/skills/iso42001-specialist/ — ISO 42001 deep-dive (paired with compliance-team-iso42001 plugin)../../ra-qm-team/skills/eu-ai-act-specialist/ — EU AI Act deep-dive (paired with compliance-team-eu-ai-act plugin)../../ra-qm-team/skills/information-security-manager-iso27001/ — ISO 27001 ISMS deep-dive../../ra-qm-team/skills/quality-manager-qms-iso13485/ — ISO 13485 QMS deep-dive../../ra-qm-team/skills/gdpr-dsgvo-expert/ — GDPR deep-dive../../ra-qm-team/skills/soc2-compliance/ — SOC 2 deep-dive../../ra-qm-team/skills/fda-consultant-specialist/ — FDA QSR deep-dive../../ra-qm-team/skills/mdr-745-specialist/ — EU MDR 745 deep-dive../../ra-qm-team/skills/risk-management-specialist/ — ISO 14971 deep-dive../../c-level-advisor/chief-ai-officer-advisor/ — Executive AI risk decisions (build-vs-buy, model selection)../../c-level-advisor/skills/general-counsel-advisor/ — Legal review for novel casescross_framework_mapper.py)assets/mock_audit_library.json — 205 pre-built finding scenarios spanning 12 frameworks + 26 themes + 4 severity levels (34 critical, 88 major, 54 minor, 29 observation). Each scenario tags applicable frameworks; cross-reference scripts/cross_framework_mapper.py merged-controls catalogue to resolve framework-specific control IDs. Use as input to enrich audit_simulator.py mock audits, as a training resource for new internal auditors, or as the seed for finding-pattern detection across multi-framework programmes.
Version: 1.2.0 Status: Production Ready