Information Security Management System (ISMS) audit expert for ISO 27001 compliance verification, security control assessment, and certification support. Use when the user mentions ISO 27001, ISMS audit, Annex A controls, Statement of Applicability (SOA), gap analysis, nonconformity management, internal audit, surveillance audit, or security certification preparation. Helps review control implementation evidence, document audit findings, classify nonconformities, generate risk-based audit plans, map controls to Annex A requirements, prepare Stage 1 and Stage 2 audit documentation, and support corrective action workflows.
92
85%
Does it follow best practices?
Impact
97%
1.25xAverage score across 6 eval scenarios
Passed
No known issues
Quality
Discovery
100%Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.
This is an excellent skill description that clearly defines a specific domain (ISO 27001 ISMS auditing), lists comprehensive concrete actions, and includes an explicit 'Use when...' clause with rich, natural trigger terms. The description is well-structured, uses third-person voice appropriately, and occupies a distinct niche that minimizes conflict risk with other skills.
| Dimension | Reasoning | Score |
|---|---|---|
Specificity | Lists multiple specific concrete actions: review control implementation evidence, document audit findings, classify nonconformities, generate risk-based audit plans, map controls to Annex A requirements, prepare Stage 1 and Stage 2 audit documentation, and support corrective action workflows. | 3 / 3 |
Completeness | Clearly answers both 'what' (audit expert for compliance verification, security control assessment, certification support, plus detailed action list) and 'when' (explicit 'Use when...' clause with comprehensive trigger terms). | 3 / 3 |
Trigger Term Quality | Excellent coverage of natural terms a user would say: ISO 27001, ISMS audit, Annex A controls, Statement of Applicability (SOA), gap analysis, nonconformity management, internal audit, surveillance audit, security certification preparation. These are all terms practitioners naturally use. | 3 / 3 |
Distinctiveness Conflict Risk | Highly distinctive niche focused specifically on ISO 27001 ISMS auditing. The domain-specific terminology (Annex A, SOA, Stage 1/Stage 2 audits, nonconformities) makes it very unlikely to conflict with other skills. | 3 / 3 |
Total | 12 / 12 Passed |
Implementation
70%Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.
This is a well-structured ISMS audit skill with strong workflow clarity and good progressive disclosure to reference files. Its main weakness is that much of the content is process guidance rather than directly actionable instructions with executable artifacts—the finding template and script examples are good but most sections read more like an audit handbook than a tool Claude can immediately execute against. Some sections (metrics, competency requirements) could be trimmed for conciseness.
Suggestions
Add more concrete output examples—e.g., show a completed finding document or a sample audit plan JSON output so Claude knows exactly what to produce.
Trim or move the Audit Performance Metrics and Auditor Competency Requirements sections to a reference file, as they are informational rather than actionable for Claude's task execution.
| Dimension | Reasoning | Score |
|---|---|---|
Conciseness | The content is generally well-structured and avoids explaining basic concepts Claude would know (like what ISO 27001 is), but includes some sections that could be tightened—auditor competency requirements, audit performance metrics, and the surveillance audit cycle table add moderate value but feel like padding. The table of contents is unnecessary overhead for a skill file. | 2 / 3 |
Actionability | The skill provides structured checklists, templates, and classification tables which are useful, but most guidance is procedural/process-oriented rather than executable. The finding documentation template is a good concrete artifact, but the audit steps are largely descriptive workflows rather than specific commands or code. The only executable content is the bash script examples, which reference scripts that may or may not exist. | 2 / 3 |
Workflow Clarity | Multi-step processes are clearly sequenced with numbered steps, and nearly every workflow includes an explicit validation checkpoint at the end. The corrective action workflow includes a feedback loop (root cause analysis → implementation → verification → closure). The audit execution steps are well-ordered with clear phases. | 3 / 3 |
Progressive Disclosure | The skill provides a clear overview with well-organized sections and appropriately references detailed content in separate files (security-control-testing.md, iso27001-audit-methodology.md, cloud-security-audit.md). References are one level deep and clearly signaled in a references table. The table of contents aids navigation. | 3 / 3 |
Total | 10 / 12 Passed |
Validation
90%Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.
Validation — 10 / 11 Passed
Validation for skill structure
| Criteria | Description | Result |
|---|---|---|
frontmatter_unknown_keys | Unknown frontmatter key(s) found; consider removing or moving to metadata | Warning |
Total | 10 / 11 Passed | |
f567c61
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.