isms-audit-expert by davila7/claude-code-templates
npx skills add https://github.com/davila7/claude-code-templates --skill isms-audit-expert具备专家级的信息安全管理体系审计能力,全面掌握 ISO 27001、安全审计方法学、安全控制评估和网络安全合规性验证知识。
设计和管理全面的 ISMS 审计项目,确保系统性的安全评估和持续改进。
ISMS 审计项目框架:
ISMS AUDIT PROGRAM MANAGEMENT
├── 安全审计规划
│ ├── 基于风险的审计排期
│ ├── 安全领域范围定义
│ ├── 技术审计员能力
│ └── 安全测试资源分配
├── 审计执行协调
│ ├── 技术安全评估
│ ├── 管理控制评估
│ ├── 物理安全验证
│ └── 安全文档审查
├── 安全发现项管理
│ ├── 安全差距识别
│ ├── 漏洞评估整合
│ ├── 基于风险的发现项优先级排序
│ └── 安全改进建议
└── ISMS 审计绩效
├── 安全审计有效性
├── 技术审计员发展
├── 安全方法学增强
└── 行业最佳实践采纳
基于信息安全风险、威胁态势和 ISMS 绩效制定战略性的安全审计计划。
安全审计风险评估:
信息安全风险评估
安全审计范围定义
广告位招租
在这里展示您的产品或服务
触达数万 AI 开发者,精准高效
技术安全测试整合
使用成熟的方法学进行系统性的 ISMS 审计,确保全面的安全评估。
ISMS 审计执行流程:
安全审计准备
安全审计实施
安全审计文档记录
执行全面的安全控制评估,确保安全措施的有效实施和运行。
安全控制评估框架:
ISO 27002 CONTROL ASSESSMENT
├── 组织安全控制
│ ├── 信息安全策略
│ ├── 信息安全组织
│ ├── 人力资源安全
│ └── 资产管理
├── 技术安全控制
│ ├── 访问控制系统
│ ├── 密码学实施
│ ├── 系统安全配置
│ ├── 网络安全控制
│ ├── 应用程序安全措施
│ └── 安全开发实践
├── 物理安全控制
│ ├── 物理安全边界
│ ├── 物理入口控制
│ ├── 设备保护
│ └── 安全处置程序
└── 运行安全控制
├── 运行程序
├── 变更管理
├── 容量管理
├── 系统隔离
├── 恶意软件防护
└── 备份与恢复
将技术安全评估与 ISMS 审计相结合,确保全面的安全验证。
技术安全评估:
漏洞评估整合
渗透测试协调
安全控制验证
执行专业的网络安全合规审计,满足法规和行业要求。
网络安全合规框架:
评估云安全实施,确保全面的云服务安全验证。
云安全审计方法:
云服务提供商评估
云配置评估
发展和维护安全审计员的技术能力,确保有效的安全评估能力。
安全审计员能力框架:
SECURITY AUDITOR COMPETENCY
├── 技术安全知识
│ ├── 网络安全和协议
│ ├── 系统安全和加固
│ ├── 应用程序安全和测试
│ ├── 密码学和密钥管理
│ └── 安全架构和设计
├── 安全评估技能
│ ├── 漏洞评估技术
│ ├── 渗透测试方法学
│ ├── 安全控制测试
│ └── 风险分析和评估
├── 合规与标准
│ ├── ISO 27001/27002 专业知识
│ ├── 法规要求知识
│ ├── 行业标准熟悉度
│ └── 审计方法学熟练度
└── 沟通与报告
├── 技术发现项记录
├── 风险沟通技能
├── 高管报告能力
└── 利益相关者参与
保持对安全审计工具和技术的熟练度,确保有效的技术评估。
安全审计工具类别:
为组织准备 ISO 27001 认证审计,确保成功认证和维护。
认证审计准备:
认证前准备
认证审计协调
为组织准备法规安全检查和合规性评估。
法规检查协调:
监控 ISMS 审计项目的有效性,确保持续的安全改进和合规性。
安全审计关键绩效指标:
通过方法学增强和技术整合,持续改进 ISMS 审计项目。
审计项目增强:
安全审计技术整合
安全审计方法学演进
isms-audit-scheduler.py:基于风险的 ISMS 审计规划和排期security-audit-prep.py:安全审计准备和检查清单自动化security-control-tester.py:自动化安全控制验证测试compliance-reporting.py:ISO 27001 和法规合规性报告iso27001-audit-methodology.md:完整的 ISO 27001 审计框架和程序security-control-testing-guide.md:技术安全控制评估方法学external-pentest-guide.md:外部渗透测试协调与监督cloud-security-audit-guide.md:云服务安全评估框架regulatory-security-compliance.md:多司法管辖区安全合规性要求isms-audit-templates/:ISMS 审计计划、检查清单和报告模板security-testing-tools/:安全评估和测试自动化脚本compliance-checklists/:ISO 27001 和法规合规性验证检查清单training-materials/:安全审计员培训和能力发展计划每周安装量
155
代码仓库
GitHub 星标数
23.4K
首次出现
2026年1月21日
安全审计
安装于
claude-code133
opencode125
cursor122
gemini-cli120
antigravity112
codex109
Expert-level Information Security Management System (ISMS) auditing with comprehensive knowledge of ISO 27001, security audit methodologies, security control assessment, and cybersecurity compliance verification.
Design and manage comprehensive ISMS audit programs ensuring systematic security evaluation and continuous improvement.
ISMS Audit Program Framework:
ISMS AUDIT PROGRAM MANAGEMENT
├── Security Audit Planning
│ ├── Risk-based audit scheduling
│ ├── Security domain scope definition
│ ├── Technical auditor competency
│ └── Security testing resource allocation
├── Audit Execution Coordination
│ ├── Technical security assessment
│ ├── Administrative control evaluation
│ ├── Physical security verification
│ └── Security documentation review
├── Security Finding Management
│ ├── Security gap identification
│ ├── Vulnerability assessment integration
│ ├── Risk-based finding prioritization
│ └── Security improvement recommendations
└── ISMS Audit Performance
├── Security audit effectiveness
├── Technical auditor development
├── Security methodology enhancement
└── Industry best practice adoption
Develop strategic security audit plans based on information security risks, threat landscape, and ISMS performance.
Security Audit Risk Assessment:
Information Security Risk Evaluation
Security Audit Scope Definition
Technical Security Testing Integration
Conduct systematic ISMS audits using proven methodologies ensuring comprehensive security assessment.
ISMS Audit Execution Process:
Security Audit Preparation
Security Audit Conduct
Security Audit Documentation
Conduct comprehensive security control assessments ensuring effective security implementation and operation.
Security Control Assessment Framework:
ISO 27002 CONTROL ASSESSMENT
├── Organizational Security Controls
│ ├── Information security policies
│ ├── Information security organization
│ ├── Human resource security
│ └── Asset management
├── Technical Security Controls
│ ├── Access control systems
│ ├── Cryptography implementation
│ ├── Systems security configuration
│ ├── Network security controls
│ ├── Application security measures
│ └── Secure development practices
├── Physical Security Controls
│ ├── Physical security perimeters
│ ├── Physical entry controls
│ ├── Equipment protection
│ └── Secure disposal procedures
└── Operational Security Controls
├── Operational procedures
├── Change management
├── Capacity management
├── System segregation
├── Malware protection
└── Backup and recovery
Integrate technical security assessments with ISMS auditing ensuring comprehensive security verification.
Technical Security Assessment:
Vulnerability Assessment Integration
Penetration Testing Coordination
Security Control Verification
Conduct specialized cybersecurity compliance audits addressing regulatory and industry requirements.
Cybersecurity Compliance Framework:
Assess cloud security implementations ensuring comprehensive cloud service security verification.
Cloud Security Audit Approach:
Cloud Service Provider Assessment
Cloud Configuration Assessment
Develop and maintain security auditor technical competency ensuring effective security assessment capabilities.
Security Auditor Competency Framework:
SECURITY AUDITOR COMPETENCY
├── Technical Security Knowledge
│ ├── Network security and protocols
│ ├── System security and hardening
│ ├── Application security and testing
│ ├── Cryptography and key management
│ └── Security architecture and design
├── Security Assessment Skills
│ ├── Vulnerability assessment techniques
│ ├── Penetration testing methodologies
│ ├── Security control testing
│ └── Risk assessment and analysis
├── Compliance and Standards
│ ├── ISO 27001/27002 expertise
│ ├── Regulatory requirement knowledge
│ ├── Industry standard familiarity
│ └── Audit methodology proficiency
└── Communication and Reporting
├── Technical finding documentation
├── Risk communication skills
├── Executive reporting capabilities
└── Stakeholder engagement
Maintain proficiency with security audit tools and technologies ensuring effective technical assessment.
Security Audit Tool Categories:
Prepare organization for ISO 27001 certification audits ensuring successful certification and maintenance.
Certification Audit Preparation:
Pre-certification Readiness
Certification Audit Coordination
Prepare organization for regulatory security inspections and compliance assessments.
Regulatory Inspection Coordination:
Monitor ISMS audit program effectiveness ensuring continuous security improvement and compliance.
Security Audit KPIs:
Continuously improve ISMS audit program through methodology enhancement and technology integration.
Audit Program Enhancement:
Security Audit Technology Integration
Security Audit Methodology Evolution
isms-audit-scheduler.py: Risk-based ISMS audit planning and schedulingsecurity-audit-prep.py: Security audit preparation and checklist automationsecurity-control-tester.py: Automated security control verification testingcompliance-reporting.py: ISO 27001 and regulatory compliance reportingiso27001-audit-methodology.md: Complete ISO 27001 audit framework and proceduressecurity-control-testing-guide.md: Technical security control assessment methodologiesexternal-pentest-guide.md: External penetration testing coordination and oversightcloud-security-audit-guide.md: Cloud service security assessment frameworksregulatory-security-compliance.md: Multi-jurisdictional security compliance requirementsisms-audit-templates/: ISMS audit plan, checklist, and report templatessecurity-testing-tools/: Security assessment and testing automation scriptscompliance-checklists/: ISO 27001 and regulatory compliance verification checkliststraining-materials/: Security auditor training and competency development programsWeekly Installs
155
Repository
GitHub Stars
23.4K
First Seen
Jan 21, 2026
Security Audits
Gen Agent Trust HubPassSocketPassSnykPass
Installed on
claude-code133
opencode125
cursor122
gemini-cli120
antigravity112
codex109
Lark Mail CLI 使用指南:邮件管理、安全规则与自动化工作流
37,000 周安装