by GRCEngClub
Open-source GRC toolkit from the GRC Engineering Club. Claude Code plugins for evidence collection, SCF crosswalks, multi-framework gap reports, OSCAL workflows.
# Add to your Claude Code skills
git clone https://github.com/GRCEngClub/claude-grc-engineeringGuides for using ai agents skills like claude-grc-engineering.
https://github.com/user-attachments/assets/a83aa297-9fba-4a7d-b56c-06f962d1ec6b
Open-source GRC Engineering resource for Claude.
claude-grc-engineering turns technical evidence from cloud, SaaS, code, and security tools into framework-aligned findings, gap reports, remediation guidance, evidence packages, and OSCAL workflows.
It is built for the Claude ecosystem: Claude Code plugin installs first, with Claude Desktop and Claude Cowork usage supported through the same Markdown skills, command runbooks, schemas, and repository files.
It is maintained by the GRC Engineering Club for people who want compliance work to behave more like engineering work: repeatable, testable, versioned, and easy to extend.
Not affiliated with Anthropic. Claude, Anthropic, and related marks are property of their respective owners.
The toolkit is a Claude Code plugin marketplace. The same plugin skills and command runbooks are also useful in Claude Desktop and Claude Cowork when you add this repository as project context or a shared workspace. Install the pieces you need:
grc-engineer: the core automation hub for gap assessment, IaC scanning, evidence collection, remediation generation, policy generation, PR review, continuous monitoring, and multi-framework optimization.The common path is:
connectors collect evidence
↓
findings match schemas/finding.schema.json
↓
grc-engineer maps findings through SCF
↓
reports, remediation, evidence packages, OSCAL outputs
The Secure Controls Framework (SCF) crosswalk is used as the control backbone: 1,468 controls mapped to 249 frameworks. The toolkit references control IDs and implementation guidance; it does not reproduce copyrighted standards text.
Inside Claude Code:
/plugin marketplace add GRCEngClub/claude-grc-engineering
/plugin install grc-engineer@grc-engineering-suite
For a first run without cloud credentials, use GitHub as the evidence source:
/plugin install github-inspector@grc-engineering-suite
/plugin install soc2@grc-engineering-suite
/github-inspector:setup
/github-inspector:collect --scope=@me
/grc-engineer:gap-assessment SOC2 --sources=github-inspector
Full walkthrough: docs/QUICKSTART.md.
Using Claude Desktop or Claude Cowork instead of Claude Code? Start with docs/CLAUDE-COWORK.md. Anthropic's security and compliance posture is documented at trust.anthropic.com, and the Claude Cowork third-party platform guide is here: Use Claude Cowork with third-party platforms.
| Goal | Command |
|---|---|
| Run a gap assessment against one or more frameworks | /grc-engineer:gap-assessment |
| Scan Terraform, CloudFormation, or Kubernetes for compliance issues | /grc-engineer:scan-iac |
| Validate a control end to end | /grc-engineer:test-control |
| Generate remediation code, scripts, or policy | /grc-engineer:generate-implementation, /grc-engineer:generate-policy |
| Map one control across frameworks | /grc-engineer:map-controls-unified |
| Find conflicting requirements across frameworks | /grc-engineer:find-conflicts |
| Optimize a multi-framework control plan | /grc-engineer:optimize-multi-framework |
| Collect evidence from cloud/SaaS/code systems | connector-specific setup, collect, and status commands |
| Build audit workpapers or evidence packages | /grc-auditor:generate-workpaper, /grc-engineer:collect-evidence |
| Generate OSCAL SSP/SAP/SAR/POA&M outputs | /oscal:*, /fedramp-ssp:* |
| Draft leadership updates and automation coverage reports | /report:exec-summary, /report:automation-coverage |
| Create editable GRC diagrams | /grc-diagrams:drawio, /grc-diagrams:system-boundary, /grc-diagrams:evidence-flow, /grc-diagrams:control-map |
| Learn a framework, control, or GRC role | /teach-me:framework, /teach-me:control, /teach-me:role, /teach-me:quiz |
Every command has a reference page in its plugin's commands/ directory.
Use /grc-engineer:frameworks to discover framework coverage and plugin depth.
High-level categories:
| Category | Examples |
|---|---|
| Engineering hub | grc-engineer |
| Persona/workflow plugins | grc-auditor, grc-internal, grc-tprm, grc-reporter, grc-loop, teach-me |
| Diagram plugin | grc-diagrams for editable draw.io GRC diagrams |
| Framework plugins | soc2, nist-800-53, iso27001, fedramp-rev5, fedramp-20x, pci-dss, cmmc, hitrust, cis-controls, gdpr, dora, us-hipaa-security, and others |
| Connector plugins | aws-inspector, github-inspector, gcp-inspector, azure-inspector, okta-inspector, slack-inspector, datadog-inspector, crowdstrike-inspector, drata-inspector, splunk-inspector, tenable-inspector, snowflake-inspector |
| Bridges, dashboards, knowledge sources | vanta-bridge, compliance-posture-dashboard, gcp-docs |
| OSCAL/FedRAMP tooling | oscal, fedramp-ssp, POA&M automation plugins |
The marketplace manifest lives at .claude-plugin/marketplace.json.
Every connector emits Findings that match schemas/finding.schema.json. A Finding is one resource with one or more control evaluations.
That contract keeps connectors small: each connector only needs to collect and normalize evidence. grc-engineer handles framework expansion, reporting, remediation, and downstream workflows.
For the full architecture and schema example, see docs/ARCHITECTURE.md.
grc-data/ contracts for metrics, risks, vendors, exceptions, and policiesContributions are welcome from GRC practitioners, auditors, security engineers, platform teams, framework experts, and commercial GRC vendors.
The highest-value contributions are:
First-time contributors follow the issue → vouch → PR flow described in docs/CONTRIBUTING.md and GOVERNANCE.md.
Security-sensitive reports should use the private advisory process described in SECURITY.md.
Pre-1.0. The Finding schema is versioned, and breaking changes are documented in CHANGELOG.md.
No comments yet. Be the first to share your thoughts!