information-security-manager-iso27001 by alirezarezvani/claude-skills
npx skills add https://github.com/alirezarezvani/claude-skills --skill information-security-manager-iso27001实施和管理符合 ISO 27001:2022 及医疗保健法规要求的信息安全管理体系(ISMS)。
当您听到以下内容时使用此技能:
python scripts/risk_assessment.py --scope "patient-data-system" --output risk_register.json
python scripts/compliance_checker.py --standard iso27001 --controls-file controls.csv
python scripts/compliance_checker.py --standard iso27001 --gap-analysis --output gaps.md
广告位招租
在这里展示您的产品或服务
触达数万 AI 开发者,精准高效
遵循 ISO 27001 条款 6.1.2 方法的自动化安全风险评估。
用法:
# 完整风险评估
python scripts/risk_assessment.py --scope "cloud-infrastructure" --output risks.json
# 医疗保健专项评估
python scripts/risk_assessment.py --scope "ehr-system" --template healthcare --output risks.json
# 基于资产的快速评估
python scripts/risk_assessment.py --assets assets.csv --output risks.json
参数:
| 参数 | 必填 | 描述 |
|---|---|---|
--scope | 是 | 要评估的系统或区域 |
--template | 否 | 评估模板:general, healthcare, cloud |
--assets | 否 | 包含资产清单的 CSV 文件 |
--output | 否 | 输出文件(默认:stdout) |
--format | 否 | 输出格式:json, csv, markdown |
输出:
验证 ISO 27001/27002 控制措施的实施状态。
用法:
# 检查所有 ISO 27001 控制措施
python scripts/compliance_checker.py --standard iso27001
# 包含建议的差距分析
python scripts/compliance_checker.py --standard iso27001 --gap-analysis
# 检查特定控制域
python scripts/compliance_checker.py --standard iso27001 --domains "access-control,cryptography"
# 导出合规报告
python scripts/compliance_checker.py --standard iso27001 --output compliance_report.md
参数:
| 参数 | 必填 | 描述 |
|---|---|---|
--standard | 是 | 要检查的标准:iso27001, iso27002, hipaa |
--controls-file | 否 | 包含当前控制状态的 CSV 文件 |
--gap-analysis | 否 | 包含补救建议 |
--domains | 否 | 要检查的特定控制域 |
--output | 否 | 输出文件路径 |
输出:
步骤 1:定义范围与背景
记录组织背景和 ISMS 边界:
验证: 范围声明已由管理层审核批准。
步骤 2:执行风险评估
python scripts/risk_assessment.py --scope "full-organization" --template general --output initial_risks.json
验证: 风险登记册包含所有关键资产并分配了责任人。
步骤 3:选择并实施控制措施
将风险映射到 ISO 27002 控制措施:
python scripts/compliance_checker.py --standard iso27002 --gap-analysis --output control_gaps.md
控制类别:
验证: 适用性声明(SoA)记录了所有控制措施及其理由。
步骤 4:建立监控
定义安全指标:
验证: 仪表板显示实时合规状态。
步骤 1:资产识别
创建资产清单:
| 资产类型 | 示例 | 分类 |
|---|---|---|
| 信息 | 患者记录、源代码 | 机密 |
| 软件 | 电子健康记录系统、API | 关键 |
| 硬件 | 服务器、医疗设备 | 高 |
| 服务 | 云托管、备份 | 高 |
| 人员 | 管理员账户、开发人员 | 可变 |
验证: 所有资产均已分配责任人和分类。
步骤 2:威胁分析
按资产类别识别威胁:
| 资产 | 威胁 | 可能性 |
|---|---|---|
| 患者数据 | 未授权访问、泄露 | 高 |
| 医疗设备 | 恶意软件、篡改 | 中 |
| 云服务 | 配置错误、中断 | 中 |
| 凭据 | 钓鱼攻击、暴力破解 | 高 |
验证: 威胁模型涵盖行业前 10 大威胁。
步骤 3:漏洞评估
python scripts/risk_assessment.py --scope "network-infrastructure" --output vuln_risks.json
记录漏洞:
验证: 漏洞扫描结果已映射到风险登记册。
步骤 4:风险评估与处理
计算风险:风险 = 可能性 × 影响
| 风险等级 | 评分 | 处理 |
|---|---|---|
| 关键 | 20-25 | 需要立即行动 |
| 高 | 15-19 | 30 天内制定处理计划 |
| 中 | 10-14 | 90 天内制定处理计划 |
| 低 | 5-9 | 接受或监控 |
| 最小 | 1-4 | 接受 |
验证: 所有高/关键风险均已制定批准的处理计划。
步骤 1:检测与报告
事件类别:
验证: 事件在检测后 15 分钟内记录。
步骤 2:分类与分级
| 严重性 | 标准 | 响应时间 |
|---|---|---|
| 关键 | 数据泄露、系统宕机 | 立即 |
| 高 | 活跃威胁、重大风险 | 1 小时 |
| 中 | 已遏制威胁、有限影响 | 4 小时 |
| 低 | 轻微违规、无影响 | 24 小时 |
验证: 已分配严重性等级,并在需要时触发升级。
步骤 3:遏制与根除
立即行动:
验证: 已确认遏制,无持续危害。
步骤 4:恢复与经验总结
事后活动:
验证: 事后报告在 5 个工作日内完成。
references/iso27001-controls.md
references/risk-assessment-guide.md
references/incident-response.md
| 阶段 | 检查点 | 所需证据 |
|---|---|---|
| 范围 | 范围已批准 | 已签署的范围文件 |
| 风险 | 登记册完整 | 包含责任人的风险登记册 |
| 控制措施 | SoA 已批准 | 适用性声明 |
| 运行 | 指标活跃 | 仪表板截图 |
| 审计 | 内部审计完成 | 审计报告 |
第一阶段审计前:
第二阶段审计前:
运行定期检查:
# 月度合规检查
python scripts/compliance_checker.py --standard iso27001 --output monthly_$(date +%Y%m).md
# 季度差距分析
python scripts/compliance_checker.py --standard iso27001 --gap-analysis --output quarterly_gaps.md
场景: 评估患者数据管理系统的安全风险。
python scripts/risk_assessment.py --scope "patient-data-system" --template healthcare
资产清单输出:
| 资产 ID | 资产 | 类型 | 责任人 | 分类 |
|---|---|---|---|---|
| A001 | 患者数据库 | 信息 | DBA 团队 | 机密 |
| A002 | EHR 应用 | 软件 | 应用团队 | 关键 |
| A003 | 数据库服务器 | 硬件 | 基础设施团队 | 高 |
| A004 | 管理员凭据 | 访问 | 安全团队 | 关键 |
风险登记册输出:
| 风险 ID | 资产 | 威胁 | 漏洞 | 可能性 | 影响 | 评分 |
|---|---|---|---|---|---|---|
| R001 | A001 | 数据泄露 | 弱加密 | 3 | 5 | 15 |
| R002 | A002 | SQL 注入 | 输入验证缺失 | 4 | 4 | 16 |
| R003 | A004 | 凭据窃取 | 无 MFA | 4 | 5 | 20 |
| 风险 | 处理方案 | 控制措施 | 时间线 |
|---|---|---|---|
| R001 | 缓解 | 实施 AES-256 加密 | 30 天 |
| R002 | 缓解 | 添加输入验证、WAF | 14 天 |
| R003 | 缓解 | 对所有管理员强制执行 MFA | 7 天 |
python scripts/compliance_checker.py --controls-file implemented_controls.csv
验证输出:
Control Implementation Status
=============================
Cryptography (A.8.24): IMPLEMENTED
- AES-256 at rest: YES
- TLS 1.3 in transit: YES
Access Control (A.8.5): IMPLEMENTED
- MFA enabled: YES
- Admin accounts: 100% coverage
Application Security (A.8.26): PARTIAL
- Input validation: YES
- WAF deployed: PENDING
Overall Compliance: 87%
每周安装量
172
仓库
GitHub 星标数
2.8K
首次出现
2026年1月20日
安全审计
安装于
claude-code153
opencode131
gemini-cli128
codex120
cursor113
github-copilot105
Implement and manage Information Security Management Systems (ISMS) aligned with ISO 27001:2022 and healthcare regulatory requirements.
Use this skill when you hear:
python scripts/risk_assessment.py --scope "patient-data-system" --output risk_register.json
python scripts/compliance_checker.py --standard iso27001 --controls-file controls.csv
python scripts/compliance_checker.py --standard iso27001 --gap-analysis --output gaps.md
Automated security risk assessment following ISO 27001 Clause 6.1.2 methodology.
Usage:
# Full risk assessment
python scripts/risk_assessment.py --scope "cloud-infrastructure" --output risks.json
# Healthcare-specific assessment
python scripts/risk_assessment.py --scope "ehr-system" --template healthcare --output risks.json
# Quick asset-based assessment
python scripts/risk_assessment.py --assets assets.csv --output risks.json
Parameters:
| Parameter | Required | Description |
|---|---|---|
--scope | Yes | System or area to assess |
--template | No | Assessment template: general, healthcare, cloud |
--assets | No | CSV file with asset inventory |
--output |
Output:
Verify ISO 27001/27002 control implementation status.
Usage:
# Check all ISO 27001 controls
python scripts/compliance_checker.py --standard iso27001
# Gap analysis with recommendations
python scripts/compliance_checker.py --standard iso27001 --gap-analysis
# Check specific control domains
python scripts/compliance_checker.py --standard iso27001 --domains "access-control,cryptography"
# Export compliance report
python scripts/compliance_checker.py --standard iso27001 --output compliance_report.md
Parameters:
| Parameter | Required | Description |
|---|---|---|
--standard | Yes | Standard to check: iso27001, iso27002, hipaa |
--controls-file | No | CSV with current control status |
--gap-analysis | No | Include remediation recommendations |
--domains |
Output:
Step 1: Define Scope and Context
Document organizational context and ISMS boundaries:
Validation: Scope statement reviewed and approved by management.
Step 2: Conduct Risk Assessment
python scripts/risk_assessment.py --scope "full-organization" --template general --output initial_risks.json
Validation: Risk register contains all critical assets with assigned owners.
Step 3: Select and Implement Controls
Map risks to ISO 27002 controls:
python scripts/compliance_checker.py --standard iso27002 --gap-analysis --output control_gaps.md
Control categories:
Validation: Statement of Applicability (SoA) documents all controls with justification.
Step 4: Establish Monitoring
Define security metrics:
Validation: Dashboard shows real-time compliance status.
Step 1: Asset Identification
Create asset inventory:
| Asset Type | Examples | Classification |
|---|---|---|
| Information | Patient records, source code | Confidential |
| Software | EHR system, APIs | Critical |
| Hardware | Servers, medical devices | High |
| Services | Cloud hosting, backup | High |
| People | Admin accounts, developers | Varies |
Validation: All assets have assigned owners and classifications.
Step 2: Threat Analysis
Identify threats per asset category:
| Asset | Threats | Likelihood |
|---|---|---|
| Patient data | Unauthorized access, breach | High |
| Medical devices | Malware, tampering | Medium |
| Cloud services | Misconfiguration, outage | Medium |
| Credentials | Phishing, brute force | High |
Validation: Threat model covers top-10 industry threats.
Step 3: Vulnerability Assessment
python scripts/risk_assessment.py --scope "network-infrastructure" --output vuln_risks.json
Document vulnerabilities:
Validation: Vulnerability scan results mapped to risk register.
Step 4: Risk Evaluation and Treatment
Calculate risk: Risk = Likelihood × Impact
| Risk Level | Score | Treatment |
|---|---|---|
| Critical | 20-25 | Immediate action required |
| High | 15-19 | Treatment plan within 30 days |
| Medium | 10-14 | Treatment plan within 90 days |
| Low | 5-9 | Accept or monitor |
| Minimal | 1-4 | Accept |
Validation: All high/critical risks have approved treatment plans.
Step 1: Detection and Reporting
Incident categories:
Validation: Incident logged within 15 minutes of detection.
Step 2: Triage and Classification
| Severity | Criteria | Response Time |
|---|---|---|
| Critical | Data breach, system down | Immediate |
| High | Active threat, significant risk | 1 hour |
| Medium | Contained threat, limited impact | 4 hours |
| Low | Minor violation, no impact | 24 hours |
Validation: Severity assigned and escalation triggered if needed.
Step 3: Containment and Eradication
Immediate actions:
Validation: Containment confirmed, no ongoing compromise.
Step 4: Recovery and Lessons Learned
Post-incident activities:
Validation: Post-incident report completed within 5 business days.
references/iso27001-controls.md
references/risk-assessment-guide.md
references/incident-response.md
| Phase | Checkpoint | Evidence Required |
|---|---|---|
| Scope | Scope approved | Signed scope document |
| Risk | Register complete | Risk register with owners |
| Controls | SoA approved | Statement of Applicability |
| Operation | Metrics active | Dashboard screenshots |
| Audit | Internal audit done | Audit report |
Before Stage 1 audit:
Before Stage 2 audit:
Run periodic checks:
# Monthly compliance check
python scripts/compliance_checker.py --standard iso27001 --output monthly_$(date +%Y%m).md
# Quarterly gap analysis
python scripts/compliance_checker.py --standard iso27001 --gap-analysis --output quarterly_gaps.md
Scenario: Assess security risks for a patient data management system.
python scripts/risk_assessment.py --scope "patient-data-system" --template healthcare
Asset inventory output:
| Asset ID | Asset | Type | Owner | Classification |
|---|---|---|---|---|
| A001 | Patient database | Information | DBA Team | Confidential |
| A002 | EHR application | Software | App Team | Critical |
| A003 | Database server | Hardware | Infra Team | High |
| A004 | Admin credentials | Access | Security | Critical |
Risk register output:
| Risk ID | Asset | Threat | Vulnerability | L | I | Score |
|---|---|---|---|---|---|---|
| R001 | A001 | Data breach | Weak encryption | 3 | 5 | 15 |
| R002 | A002 | SQL injection | Input validation | 4 | 4 | 16 |
| R003 | A004 | Credential theft | No MFA | 4 | 5 | 20 |
| Risk | Treatment | Control | Timeline |
|---|---|---|---|
| R001 | Mitigate | Implement AES-256 encryption | 30 days |
| R002 | Mitigate | Add input validation, WAF | 14 days |
| R003 | Mitigate | Enforce MFA for all admins | 7 days |
python scripts/compliance_checker.py --controls-file implemented_controls.csv
Verification output:
Control Implementation Status
=============================
Cryptography (A.8.24): IMPLEMENTED
- AES-256 at rest: YES
- TLS 1.3 in transit: YES
Access Control (A.8.5): IMPLEMENTED
- MFA enabled: YES
- Admin accounts: 100% coverage
Application Security (A.8.26): PARTIAL
- Input validation: YES
- WAF deployed: PENDING
Overall Compliance: 87%
Weekly Installs
172
Repository
GitHub Stars
2.8K
First Seen
Jan 20, 2026
Security Audits
Gen Agent Trust HubPassSocketPassSnykPass
Installed on
claude-code153
opencode131
gemini-cli128
codex120
cursor113
github-copilot105
OpenClaw 安全 Linux 云部署指南:私有优先、SSH隧道、Podman容器化
33,700 周安装
| No |
| Output file (default: stdout) |
--format | No | Output format: json, csv, markdown |
| No |
| Specific control domains to check |
--output | No | Output file path |