Isms Audit Expert
Analyzes text for stylistic echoes of Borghei's signature prose, identifying patterns and quantifying their presence.
Install on your platform
We auto-selected Claude Code based on this skill’s supported platforms.
Run in terminal (recommended)
claude mcp add borghei-isms-audit-expert npx -- -y @trustedskills/borghei-isms-audit-expert
Or manually add to ~/.claude/settings.json
{
"mcpServers": {
"borghei-isms-audit-expert": {
"command": "npx",
"args": [
"-y",
"@trustedskills/borghei-isms-audit-expert"
]
}
}
}Requires Claude Code (claude CLI). Run claude --version to verify your install.
About This Skill
What it does
The borghei-isms-audit-expert skill provides expertise in Information Security Management System (ISMS) audits. It can analyze audit documentation, identify potential gaps or weaknesses based on ISO 27001 standards, and suggest remediation steps. This skill is designed to assist auditors, security professionals, and organizations preparing for ISMS certification.
When to use it
- Reviewing draft audit reports for completeness and accuracy against ISO 27001 requirements.
- Identifying potential non-conformities in an organization's ISMS documentation.
- Generating a list of recommendations to improve the effectiveness of security controls.
- Assessing the maturity level of an ISMS based on available evidence.
Key capabilities
- ISO 27001 standard knowledge
- Audit report analysis
- Gap identification
- Remediation suggestions
Example prompts
- "Analyze this audit report and identify any potential gaps related to ISO 27001."
- "Based on these ISMS documents, what are the key areas of weakness?"
- "Suggest remediation steps for a non-conformity regarding access control management."
Tips & gotchas
The skill's accuracy depends heavily on the quality and completeness of the provided audit documentation. Ensure you provide relevant and detailed information for optimal results.
Tags
TrustedSkills Verification
Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.
Security Audits
| Gen Agent Trust Hub | Pass |
| Socket | Pass |
| Snyk | Pass |
🌐 Community
Passed automated security scans.