@open-agreements/open-agreements 0.2.0 → 0.2.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (64) hide show
  1. package/README.md +10 -2
  2. package/content/templates/closing-checklist/metadata.yaml +6 -13
  3. package/content/templates/closing-checklist/template.docx +0 -0
  4. package/dist/cli/index.d.ts.map +1 -1
  5. package/dist/cli/index.js +47 -10
  6. package/dist/cli/index.js.map +1 -1
  7. package/dist/commands/checklist.d.ts +21 -1
  8. package/dist/commands/checklist.d.ts.map +1 -1
  9. package/dist/commands/checklist.js +175 -44
  10. package/dist/commands/checklist.js.map +1 -1
  11. package/dist/commands/recipe.js +3 -11
  12. package/dist/commands/recipe.js.map +1 -1
  13. package/dist/core/checklist/index.d.ts +22 -14
  14. package/dist/core/checklist/index.d.ts.map +1 -1
  15. package/dist/core/checklist/index.js +79 -39
  16. package/dist/core/checklist/index.js.map +1 -1
  17. package/dist/core/checklist/jsonl-stores.d.ts +3 -0
  18. package/dist/core/checklist/jsonl-stores.d.ts.map +1 -0
  19. package/dist/core/checklist/jsonl-stores.js +16 -0
  20. package/dist/core/checklist/jsonl-stores.js.map +1 -0
  21. package/dist/core/checklist/schemas.d.ts +2 -2
  22. package/dist/core/checklist/schemas.js +1 -1
  23. package/dist/core/checklist/schemas.js.map +1 -1
  24. package/dist/core/checklist/state-manager.d.ts +146 -0
  25. package/dist/core/checklist/state-manager.d.ts.map +1 -0
  26. package/dist/core/checklist/state-manager.js +147 -0
  27. package/dist/core/checklist/state-manager.js.map +1 -0
  28. package/dist/core/checklist/status-labels.d.ts +6 -0
  29. package/dist/core/checklist/status-labels.d.ts.map +1 -0
  30. package/dist/core/checklist/status-labels.js +29 -0
  31. package/dist/core/checklist/status-labels.js.map +1 -0
  32. package/dist/core/validation/recipe.d.ts.map +1 -1
  33. package/dist/core/validation/recipe.js +47 -61
  34. package/dist/core/validation/recipe.js.map +1 -1
  35. package/package.json +1 -1
  36. package/skills/cloud-service-agreement/SKILL.md +9 -0
  37. package/skills/data-privacy-agreement/SKILL.md +9 -0
  38. package/skills/edit-docx-agreement/CONNECTORS.md +20 -0
  39. package/skills/edit-docx-agreement/SKILL.md +77 -0
  40. package/skills/employment-contract/SKILL.md +9 -0
  41. package/skills/iso-27001-evidence-collection/CONNECTORS.md +23 -0
  42. package/skills/iso-27001-evidence-collection/SKILL.md +300 -0
  43. package/skills/iso-27001-evidence-collection/rules/api-exports.md +191 -0
  44. package/skills/iso-27001-evidence-collection/rules/evidence-types.md +107 -0
  45. package/skills/iso-27001-evidence-collection/rules/screenshot-guide.md +77 -0
  46. package/skills/iso-27001-internal-audit/CONNECTORS.md +23 -0
  47. package/skills/iso-27001-internal-audit/SKILL.md +272 -0
  48. package/skills/iso-27001-internal-audit/rules/access-control.md +191 -0
  49. package/skills/iso-27001-internal-audit/rules/business-continuity.md +94 -0
  50. package/skills/iso-27001-internal-audit/rules/change-management.md +211 -0
  51. package/skills/iso-27001-internal-audit/rules/encryption.md +93 -0
  52. package/skills/iso-27001-internal-audit/rules/incident-response.md +127 -0
  53. package/skills/iso-27001-internal-audit/rules/isms-management.md +164 -0
  54. package/skills/iso-27001-internal-audit/rules/logging-monitoring.md +96 -0
  55. package/skills/iso-27001-internal-audit/rules/people-controls.md +161 -0
  56. package/skills/iso-27001-internal-audit/rules/supplier-management.md +92 -0
  57. package/skills/nda/SKILL.md +9 -0
  58. package/skills/open-agreements/SKILL.md +9 -0
  59. package/skills/safe/SKILL.md +9 -0
  60. package/skills/services-agreement/SKILL.md +9 -0
  61. package/skills/soc2-readiness/CONNECTORS.md +23 -0
  62. package/skills/soc2-readiness/SKILL.md +289 -0
  63. package/skills/soc2-readiness/rules/trust-services.md +230 -0
  64. package/skills/venture-financing/SKILL.md +9 -0
@@ -0,0 +1,289 @@
1
+ ---
2
+ name: soc2-readiness
3
+ description: >-
4
+ Assess SOC 2 Type II readiness. Map Trust Services Criteria to controls,
5
+ identify gaps, and build a remediation plan. Uses NIST SP 800-53 (public
6
+ domain) as canonical reference with SOC 2 criterion cross-mapping.
7
+ license: MIT
8
+ compatibility: >-
9
+ Works with any AI agent. Enhanced with compliance MCP server for live
10
+ status data. Falls back to embedded reference material when no live data
11
+ available.
12
+ metadata:
13
+ author: open-agreements
14
+ version: "0.1.0"
15
+ frameworks:
16
+ - SOC 2 Type II
17
+ - NIST SP 800-53 Rev 5
18
+ - ISO 27001:2022
19
+ ---
20
+
21
+ # SOC 2 Readiness Assessment
22
+
23
+ Assess readiness for a SOC 2 Type II audit. This skill walks through the Trust Services Criteria, identifies gaps, maps to NIST controls, and generates a prioritized remediation plan.
24
+
25
+ ## Security Model
26
+
27
+ - **No scripts executed** — markdown-only procedural guidance
28
+ - **No secrets required** — works with reference checklists
29
+ - **IP-clean** — AICPA Trust Services Criteria are publicly cited; descriptions are original writing
30
+ - **Evidence stays local** — all collection outputs go to local filesystem
31
+
32
+ ## When to Use
33
+
34
+ Activate this skill when:
35
+
36
+ 1. **First SOC 2 preparation** — building controls from scratch for initial Type I or Type II
37
+ 2. **Pre-audit readiness check** — 4-8 weeks before audit window opens
38
+ 3. **Gap analysis after scope change** — new systems, services, or trust criteria added
39
+ 4. **Remediation planning** — translating audit findings into actionable work items
40
+ 5. **Dual-framework mapping** — already pursuing ISO 27001 and need SOC 2 overlap analysis
41
+
42
+ Do NOT use for:
43
+ - ISO 27001 internal audit — use `iso-27001-internal-audit`
44
+ - Evidence collection mechanics — use `iso-27001-evidence-collection`
45
+ - Contract review — use legal agreement skills
46
+
47
+ ## Core Concepts
48
+
49
+ ### Trust Services Criteria (TSC)
50
+
51
+ SOC 2 is organized around 5 Trust Services Categories. **Security (CC)** is always in scope; others are optional based on your service:
52
+
53
+ | Category | Criteria | When Required |
54
+ |----------|----------|---------------|
55
+ | **Security** (CC) | CC 1-9 (33 criteria) | Always required |
56
+ | **Availability** (A) | A 1.1-1.3 (3 criteria) | SaaS with uptime SLAs |
57
+ | **Processing Integrity** (PI) | PI 1.1-1.5 (4 criteria) | Data processing services |
58
+ | **Confidentiality** (C) | C 1.1-1.2 (2 criteria) | Handling confidential data |
59
+ | **Privacy** (P) | P 4-8 (7 criteria) | PII processing |
60
+
61
+ ### SOC 2 vs. ISO 27001
62
+
63
+ | Dimension | SOC 2 | ISO 27001 |
64
+ |-----------|-------|-----------|
65
+ | Governing body | AICPA | ISO/IEC |
66
+ | Geography | Primarily US/Canada | Global |
67
+ | Type | Attestation report by CPA | Certification by audit body |
68
+ | Scope | Service-specific | Organization-wide ISMS |
69
+ | Controls | Flexible (you define) | 93 Annex A controls |
70
+ | Output | SOC 2 report (restricted/general use) | Certificate |
71
+ | Overlap | ~70% overlap with ISO 27001 Annex A | ~70% overlap with SOC 2 CC |
72
+
73
+ ### Decision Tree: Scope Selection
74
+
75
+ ```
76
+ What service are you getting audited on?
77
+ ├── SaaS product → Security + Availability (+ Confidentiality if you handle sensitive data)
78
+ ├── Data processing → Security + Processing Integrity + Confidentiality
79
+ ├── Infrastructure → Security + Availability
80
+ ├── API service → Security (+ PI if you transform data)
81
+
82
+ Do you handle PII?
83
+ ├── YES → Add Privacy category
84
+ ├── NO → Skip Privacy
85
+
86
+ Do you have uptime SLAs?
87
+ ├── YES → Include Availability
88
+ ├── NO → Optional (but customers expect it for SaaS)
89
+ ```
90
+
91
+ ## Step-by-Step Workflow
92
+
93
+ ### Step 1: Define Scope and Categories
94
+
95
+ 1. **Identify the service** being audited (product name, description, boundaries)
96
+ 2. **Select Trust Services Categories** using the decision tree above
97
+ 3. **Define system boundaries**: infrastructure, software, people, procedures, data
98
+ 4. **Document sub-service organizations** (cloud providers, payment processors, etc.)
99
+ 5. **Determine audit type**: Type I (point-in-time) or Type II (period of time, usually 6-12 months)
100
+
101
+ ### Step 2: Assess Current State
102
+
103
+ For each applicable Common Criterion (CC), assess whether controls are:
104
+ - **Designed** — control exists on paper
105
+ - **Implemented** — control is operating
106
+ - **Effective** — control achieves its objective (evidence exists)
107
+
108
+ ```
109
+ # If compliance MCP is available:
110
+ check_compliance_status(framework="soc2")
111
+ ```
112
+
113
+ ### Step 3: Map Controls to Criteria
114
+
115
+ Each CC maps to specific NIST controls. Use this mapping to identify what you need:
116
+
117
+ #### CC 1 — Control Environment
118
+
119
+ | Criterion | Focus | NIST Controls | ISO Cross-Reference |
120
+ |-----------|-------|---------------|---------------------|
121
+ | CC 1.1 | Integrity and ethics | PS-1, PS-3, PS-6 | A.6.1, A.6.2, A.6.4 |
122
+ | CC 1.2 | Board oversight | PM-1, PM-2 | C.5.1, C.5.3 |
123
+ | CC 1.3 | Organizational structure | PM-2 | C.5.3 |
124
+ | CC 1.4 | Competence commitment | AT-2, PS-3 | A.6.1, A.6.3 |
125
+ | CC 1.5 | Accountability | PS-3, PS-4 | A.6.4, A.6.5 |
126
+
127
+ #### CC 2 — Communication and Information
128
+
129
+ | Criterion | Focus | NIST Controls | ISO Cross-Reference |
130
+ |-----------|-------|---------------|---------------------|
131
+ | CC 2.1 | Internal information | AU-2, SI-5 | C.7.5.1 |
132
+ | CC 2.2 | Internal communication | PM-2, AT-2 | C.7.4, A.6.3 |
133
+ | CC 2.3 | External communication | PM-1 | A.5.14 |
134
+
135
+ #### CC 3 — Risk Assessment
136
+
137
+ | Criterion | Focus | NIST Controls | ISO Cross-Reference |
138
+ |-----------|-------|---------------|---------------------|
139
+ | CC 3.1 | Risk objectives | PM-9, RA-1 | C.6.1.1 |
140
+ | CC 3.2 | Risk identification | RA-3 | C.6.1.2, C.8.2 |
141
+ | CC 3.3 | Fraud risk | RA-3 | C.6.1.2 |
142
+ | CC 3.4 | Change impact | RA-3, CM-4 | C.6.1.2, A.8.9 |
143
+
144
+ #### CC 4 — Monitoring Activities
145
+
146
+ | Criterion | Focus | NIST Controls | ISO Cross-Reference |
147
+ |-----------|-------|---------------|---------------------|
148
+ | CC 4.1 | Ongoing monitoring | CA-7, PM-6 | C.9.1 |
149
+ | CC 4.2 | Deficiency evaluation | CA-2 | C.9.2.1 |
150
+
151
+ #### CC 5 — Control Activities
152
+
153
+ | Criterion | Focus | NIST Controls | ISO Cross-Reference |
154
+ |-----------|-------|---------------|---------------------|
155
+ | CC 5.1 | Risk mitigation | AC-5 | A.5.3 |
156
+ | CC 5.2 | Technology controls | AC-1, IA-2 | A.5.15, A.8.5 |
157
+ | CC 5.3 | Policy deployment | PM-1, PL-1 | A.5.1, C.5.2 |
158
+
159
+ #### CC 6 — Logical and Physical Access
160
+
161
+ | Criterion | Focus | NIST Controls | ISO Cross-Reference |
162
+ |-----------|-------|---------------|---------------------|
163
+ | CC 6.1 | Access control | AC-2, AC-3, IA-2, SC-28 | A.5.15, A.8.5, A.8.24 |
164
+ | CC 6.2 | Access provisioning | AC-2, PS-4, PS-5 | A.5.18, A.6.5 |
165
+ | CC 6.3 | Access modification | AC-2, AC-6 | A.5.15, A.5.18 |
166
+ | CC 6.4 | Physical access | PE-2, PE-3, PE-6 | A.7.2, A.7.4 |
167
+ | CC 6.5 | Asset disposal | MP-6 | A.7.10, A.7.14 |
168
+ | CC 6.6 | Threat detection | RA-5, SI-4 | A.8.8, A.8.16 |
169
+ | CC 6.7 | Transmission security | SC-8 | A.5.14, A.8.24 |
170
+ | CC 6.8 | Malware prevention | SI-2, SI-3 | A.8.7, A.8.19 |
171
+
172
+ #### CC 7 — System Operations
173
+
174
+ | Criterion | Focus | NIST Controls | ISO Cross-Reference |
175
+ |-----------|-------|---------------|---------------------|
176
+ | CC 7.1 | Operational monitoring | CM-6, RA-5 | A.8.9, A.8.8 |
177
+ | CC 7.2 | Anomaly detection | AU-6, SI-4 | A.8.15, A.8.16 |
178
+ | CC 7.3 | Incident response | IR-4 | A.5.24, A.5.25 |
179
+ | CC 7.4 | Incident management | IR-5, IR-6 | A.5.25, A.5.26 |
180
+ | CC 7.5 | Recovery | CP-4, CP-9, CP-10 | A.5.30, A.8.13 |
181
+
182
+ #### CC 8 — Change Management
183
+
184
+ | Criterion | Focus | NIST Controls | ISO Cross-Reference |
185
+ |-----------|-------|---------------|---------------------|
186
+ | CC 8.1 | Change control | CM-3, CM-5, SA-3 | A.8.9, A.8.25, A.8.32 |
187
+
188
+ #### CC 9 — Risk Mitigation
189
+
190
+ | Criterion | Focus | NIST Controls | ISO Cross-Reference |
191
+ |-----------|-------|---------------|---------------------|
192
+ | CC 9.1 | Risk mitigation | CP-2, RA-7 | A.5.30, C.6.1.3 |
193
+ | CC 9.2 | Vendor management | AC-20, SA-9 | A.5.19, A.5.22 |
194
+
195
+ ### Step 4: Generate Gap Analysis
196
+
197
+ For each criterion, document:
198
+
199
+ ```markdown
200
+ ## Gap: [CC x.x] — [Brief description]
201
+
202
+ **Current State**: [What exists today]
203
+ **Required State**: [What the auditor expects]
204
+ **Gap**: [What's missing]
205
+ **Remediation**:
206
+ 1. [Specific action item]
207
+ 2. [Specific action item]
208
+ **Priority**: Critical / High / Medium / Low
209
+ **Effort**: [Days/weeks to remediate]
210
+ **Owner**: [Person responsible]
211
+ **Evidence Needed**: [What to collect after fix]
212
+ ```
213
+
214
+ ### Step 5: Build Remediation Plan
215
+
216
+ Prioritize gaps by:
217
+ 1. **Critical** — Audit will fail without this (CC 6.1, 6.2, 7.2, 7.5, 8.1)
218
+ 2. **High** — Likely finding if not addressed (CC 1.4, 3.2, 6.6, 7.3)
219
+ 3. **Medium** — Auditor will note but may not be a finding
220
+ 4. **Low** — Best practice, not strictly required
221
+
222
+ ### Step 6: Readiness Report
223
+
224
+ Generate a structured readiness assessment:
225
+
226
+ 1. **Executive summary** — overall readiness percentage, estimated time to audit-ready
227
+ 2. **Scope** — service description, trust categories, audit type
228
+ 3. **Control matrix** — all applicable criteria with status (designed/implemented/effective)
229
+ 4. **Gap analysis** — prioritized list of gaps with remediation plan
230
+ 5. **Timeline** — remediation milestones leading to audit window
231
+
232
+ ## Quick Reference: Top SOC 2 Failures
233
+
234
+ | # | Criterion | Common Failure | Fix |
235
+ |---|-----------|---------------|-----|
236
+ | 1 | CC 6.1 | MFA not universal | Enforce MFA on all systems with sensitive data |
237
+ | 2 | CC 6.2 | Access not revoked on termination | Automate deprovisioning; verify within 24h |
238
+ | 3 | CC 7.2 | No log monitoring | Configure alerts for auth failures, privilege changes |
239
+ | 4 | CC 8.1 | No change management | Require PR reviews; document deployment process |
240
+ | 5 | CC 7.5 | Backups never tested | Restore from backup quarterly; document results |
241
+ | 6 | CC 3.2 | No risk assessment | Conduct and document annual risk assessment |
242
+ | 7 | CC 6.6 | No vulnerability scanning | Deploy automated scanning; remediate criticals in 30d |
243
+ | 8 | CC 1.4 | Security training incomplete | Require annual training; track completion |
244
+ | 9 | CC 9.2 | Vendor risk not assessed | Maintain vendor register; collect SOC 2 reports |
245
+ | 10 | CC 7.3 | No incident response plan | Document plan; conduct tabletop exercise |
246
+
247
+ ## DO / DON'T
248
+
249
+ ### DO
250
+ - Start with Security (CC) criteria — they're always required and cover ~80% of effort
251
+ - Map to ISO 27001 if pursuing both frameworks — ~70% control overlap
252
+ - Collect evidence throughout the audit period, not just at audit time
253
+ - Include sub-service organizations in your description
254
+ - Define the audit period before starting evidence collection
255
+
256
+ ### DON'T
257
+ - Include trust categories you can't support — better to pass on fewer than fail on more
258
+ - Assume Type I is "easy" — it requires all controls to be designed and implemented
259
+ - Forget the system description — auditors review this first and use it to scope their testing
260
+ - Use generic/template control descriptions — auditors expect your controls to match your actual environment
261
+ - Ignore complementary user entity controls (CUECs) — your customers need to know their responsibilities
262
+
263
+ ## Troubleshooting
264
+
265
+ | Problem | Solution |
266
+ |---------|----------|
267
+ | First SOC 2, no existing controls | Start with CC 6 (access) and CC 8 (change management) — fastest to implement |
268
+ | Already have ISO 27001 | Map Annex A controls to SOC 2 CC; ~70% are already covered |
269
+ | Auditor requests evidence we don't have | Collect it now; document the process; note in description if control was implemented mid-period |
270
+ | Multiple environments (prod/staging/dev) | Only production environment needs to be in scope; document boundaries clearly |
271
+ | Sub-service org (AWS/GCP/Azure) | Use SOC 2 Type II report from the provider; document which controls they cover |
272
+
273
+ ## Rules
274
+
275
+ For detailed SOC 2-specific guidance:
276
+
277
+ | File | Coverage |
278
+ |------|----------|
279
+ | `rules/trust-services.md` | Detailed per-criterion guidance for all 5 trust service categories |
280
+
281
+ ## Attribution
282
+
283
+ SOC 2 criteria mapping and readiness procedures developed with [Internal ISO Audit](https://internalisoaudit.com) (Hazel Castro, ISO 27001 Lead Auditor, 14+ years, 100+ audits).
284
+
285
+ ## Runtime Detection
286
+
287
+ 1. **Compliance MCP server available** (best) — Live SOC 2 status, test pass/fail data, evidence gaps
288
+ 2. **Local compliance data available** (good) — Reads `compliance/` directory with SOC 2 test metadata
289
+ 3. **Reference only** (baseline) — Uses embedded criteria mapping and checklists
@@ -0,0 +1,230 @@
1
+ # Trust Services Criteria — Detailed Guidance
2
+
3
+ Per-criterion guidance for SOC 2 audits. Covers all 5 trust service categories.
4
+
5
+ ## Security (Common Criteria) — Always Required
6
+
7
+ ### CC 6.1 — Logical Access Security
8
+
9
+ **Priority**: Critical | **NIST**: AC-2, AC-3, IA-2, SC-28 | **ISO**: A.5.15, A.8.5, A.8.24
10
+
11
+ The entity implements logical access security software, infrastructure, and architectures over protected information assets to protect them from security events.
12
+
13
+ **What auditors test**:
14
+ - Sample user accounts: verify access is appropriate for role
15
+ - Check MFA enforcement on all systems with sensitive data
16
+ - Verify encryption at rest and in transit
17
+ - Test that unauthorized access attempts are blocked and logged
18
+
19
+ **Evidence to prepare**:
20
+ ```bash
21
+ # User access list with roles
22
+ gam print users fields primaryEmail,name,orgUnitPath,isAdmin,isEnforcedIn2Sv
23
+
24
+ # GitHub: org access settings
25
+ gh api orgs/{org} | jq '{two_factor_requirement_enabled, default_repository_permission}'
26
+
27
+ # Encryption: TLS check
28
+ openssl s_client -connect {host}:443 -tls1_2 < /dev/null 2>&1 | grep "Protocol"
29
+ ```
30
+
31
+ ---
32
+
33
+ ### CC 6.2 — Access Provisioning and Deprovisioning
34
+
35
+ **Priority**: Critical | **NIST**: AC-2, PS-4, PS-5 | **ISO**: A.5.18, A.6.5
36
+
37
+ New access requests require authorization. Access is removed promptly when no longer needed.
38
+
39
+ **What auditors test**:
40
+ - Sample 5-10 new hires: verify access was authorized before provisioning
41
+ - Sample 5-10 terminations: verify access was revoked within 24-48 hours
42
+ - Check for orphaned accounts (active accounts with no corresponding employee)
43
+
44
+ **Evidence to prepare**:
45
+ - HR-to-IT onboarding workflow documentation
46
+ - Termination checklist with IT steps
47
+ - Cross-reference: termination dates vs. last-active dates in systems
48
+
49
+ ---
50
+
51
+ ### CC 7.2 — Anomaly Detection and Monitoring
52
+
53
+ **Priority**: Critical | **NIST**: AU-6, SI-4 | **ISO**: A.8.15, A.8.16
54
+
55
+ The entity monitors system components and anomalies that indicate malicious acts, natural disasters, and errors.
56
+
57
+ **What auditors test**:
58
+ - Alert configuration: what triggers alerts?
59
+ - Sample alerts: show a recent alert and the response
60
+ - Log retention: are logs kept for the full audit period?
61
+ - Log centralization: is there a single view of security events?
62
+
63
+ **Evidence to prepare**:
64
+ ```bash
65
+ # GCP: alerting policies
66
+ gcloud monitoring policies list --format=json | jq '.[].displayName'
67
+
68
+ # GCP: log sinks
69
+ gcloud logging sinks list --format=json
70
+
71
+ # Azure: alert rules
72
+ az monitor alert list --output json | jq '.[].{name, enabled}'
73
+ ```
74
+
75
+ ---
76
+
77
+ ### CC 7.5 — Recovery Operations
78
+
79
+ **Priority**: Critical | **NIST**: CP-4, CP-9, CP-10 | **ISO**: A.5.30, A.8.13
80
+
81
+ The entity identifies, develops, and implements activities to recover from identified security incidents.
82
+
83
+ **What auditors test**:
84
+ - Backup configuration: are backups automated and encrypted?
85
+ - Backup testing: has a restore been tested in the audit period?
86
+ - DR plan: does it exist and has it been tested?
87
+ - RTO/RPO: are they defined and achievable?
88
+
89
+ **Evidence to prepare**:
90
+ ```bash
91
+ # GCP: backup configuration
92
+ gcloud sql backups list --instance={instance} --format=json | jq '.[0:5]'
93
+
94
+ # Backup restore test documentation (manual)
95
+ ```
96
+
97
+ ---
98
+
99
+ ### CC 8.1 — Change Management
100
+
101
+ **Priority**: Critical | **NIST**: CM-3, CM-5, SA-3 | **ISO**: A.8.9, A.8.25, A.8.32
102
+
103
+ Changes to infrastructure, data, software, and procedures are authorized, designed, developed, configured, documented, tested, approved, and implemented.
104
+
105
+ **What auditors test**:
106
+ - Sample 10-15 production changes: verify each had authorization, testing, and approval
107
+ - Emergency change process: how are hotfixes handled?
108
+ - Segregation: developers can't push directly to production
109
+ - Rollback: can changes be reverted?
110
+
111
+ **Evidence to prepare**:
112
+ ```bash
113
+ # GitHub: merged PRs with review status
114
+ gh pr list --state merged --limit 20 --json number,title,author,reviewDecision,mergedAt,mergedBy
115
+
116
+ # GitHub: branch protection
117
+ gh api repos/{owner}/{repo}/branches/main/protection | jq '{
118
+ required_reviews: .required_pull_request_reviews.required_approving_review_count,
119
+ enforce_admins: .enforce_admins.enabled
120
+ }'
121
+ ```
122
+
123
+ ---
124
+
125
+ ## Availability — For SaaS and Infrastructure
126
+
127
+ ### A 1.1 — System Availability Monitoring
128
+
129
+ **Priority**: High | **NIST**: SC-5, SI-4 | **ISO**: A.8.6, A.8.16
130
+
131
+ Monitor capacity and availability to meet commitments.
132
+
133
+ **What auditors test**:
134
+ - Uptime monitoring: is there a system monitoring availability?
135
+ - Capacity planning: is there a process for scaling?
136
+ - Status page: is availability communicated to customers?
137
+
138
+ ---
139
+
140
+ ### A 1.2 — Recovery Planning
141
+
142
+ **Priority**: High | **NIST**: CP-2, CP-6, CP-7 | **ISO**: A.5.30, A.8.14
143
+
144
+ Environmental protections and recovery infrastructure support availability commitments.
145
+
146
+ **What auditors test**:
147
+ - Multi-AZ or multi-region deployment for production
148
+ - Auto-scaling configuration
149
+ - Failover testing records
150
+
151
+ ---
152
+
153
+ ### A 1.3 — Recovery Testing
154
+
155
+ **Priority**: High | **NIST**: CP-4 | **ISO**: A.5.30
156
+
157
+ Recovery plans are tested periodically.
158
+
159
+ **What auditors test**:
160
+ - DR test records (date, scope, results)
161
+ - Actual recovery time vs. RTO target
162
+
163
+ ---
164
+
165
+ ## Processing Integrity — For Data Processing Services
166
+
167
+ ### PI 1.1-1.3 — Processing Completeness, Accuracy, and Timeliness
168
+
169
+ **Priority**: Medium | **NIST**: SI-10, SI-11 | **ISO**: A.8.28
170
+
171
+ System processing is complete, valid, accurate, and timely.
172
+
173
+ **What auditors test**:
174
+ - Input validation controls
175
+ - Error handling and exception reporting
176
+ - Reconciliation processes for data accuracy
177
+ - SLA monitoring for timeliness
178
+
179
+ ---
180
+
181
+ ## Confidentiality — For Sensitive Data
182
+
183
+ ### C 1.1 — Confidential Information Protection
184
+
185
+ **Priority**: High | **NIST**: AC-21, SC-28 | **ISO**: A.5.14, A.8.24
186
+
187
+ Confidential information is protected during processing and storage.
188
+
189
+ **What auditors test**:
190
+ - Data classification scheme
191
+ - Encryption at rest for confidential data
192
+ - Access restrictions based on classification
193
+
194
+ ### C 1.2 — Confidential Information Disposal
195
+
196
+ **Priority**: Medium | **NIST**: MP-6, SI-12 | **ISO**: A.7.14, A.8.10
197
+
198
+ Confidential information is disposed of when no longer needed.
199
+
200
+ **What auditors test**:
201
+ - Data retention policy
202
+ - Evidence of data disposal (deletion records, media destruction)
203
+
204
+ ---
205
+
206
+ ## Privacy — When Processing PII
207
+
208
+ ### P 4.2 — Privacy Notice
209
+
210
+ **Priority**: Medium | **ISO**: A.5.34
211
+
212
+ Privacy notice is provided and accessible.
213
+
214
+ ### P 6.1-6.6 — Data Subject Rights and Incident Response
215
+
216
+ **Priority**: Medium (if PII in scope)
217
+
218
+ Data subject requests are handled. Privacy incidents are reported.
219
+
220
+ **What auditors test**:
221
+ - Privacy policy on website
222
+ - Process for data subject access requests (DSARs)
223
+ - Privacy incident notification process
224
+ - Data processing agreements with sub-processors
225
+
226
+ ### P 8.1 — Quality Assurance
227
+
228
+ **Priority**: Low
229
+
230
+ Data quality procedures are in place.
@@ -167,3 +167,12 @@ Use `list_templates` (MCP) or `list --json` (CLI) for the latest inventory and f
167
167
  - NVCA model documents are licensed under CC-BY-4.0
168
168
  - These documents are typically used together as a suite for a priced equity round
169
169
  - This tool does not provide legal advice — consult an attorney
170
+
171
+ ## Bespoke edits (beyond template fields)
172
+
173
+ If you need to edit boilerplate or add custom language that is not exposed as a template field,
174
+ use the `edit-docx-agreement` skill to surgically edit the generated DOCX and produce a
175
+ tracked-changes output for review. This requires a separately configured Safe Docx MCP server.
176
+
177
+ Note: templates licensed under CC-BY-ND-4.0 (e.g., YC SAFEs) can be filled for your own use
178
+ but must not be redistributed in modified form.