Skip to content

Open-source compliance automation toolkit for SOC 2, ISO 27001, and GDPR

Notifications You must be signed in to change notification settings

LowerPlane/compliance-toolkit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

7 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

LowerPlane Compliance Toolkit

Open-source compliance automation toolkit for SOC 2, ISO 27001, and GDPR

License: MIT Go Version Node Version Docker PRs Welcome GitHub Stars

Documentation Β· Website Β· Community Β· Blog


🎯 What is LowerPlane Compliance Toolkit?

A comprehensive collection of 50+ open-source tools designed to automate compliance workflows, collect evidence, and maintain continuous compliance for SOC 2, ISO 27001, GDPR, HIPAA, and other security frameworks.

Built by compliance practitioners who were tired of:

  • ❌ Manual screenshot collection
  • ❌ Spreadsheet-based evidence tracking
  • ❌ Last-minute audit scrambling
  • ❌ Expensive compliance consultants for basic tasks

LowerPlane Compliance Toolkit is:

  • βœ… Free & Open Source - MIT licensed
  • βœ… Production Ready - Used by companies managing $200M+ in deals
  • βœ… Framework Agnostic - Works with any compliance framework
  • βœ… Privacy First - Run everything locally or self-hosted
  • βœ… Integration Rich - 100+ integrations with cloud providers and SaaS tools

πŸš€ Quick Start

Option 1: Build from Source (Current)

# Clone the repository
git clone https://github.com/lowerplane/compliance-toolkit.git
cd compliance-toolkit

# Build all CLI tools using Makefile
make build-cli

# Or build individual tools
cd tools/cli/soc2-check
go build -o soc2-check ./cmd

cd ../mfa-status
go build -o mfa-status ./cmd

cd ../public-bucket
go build -o public-bucket ./cmd

# Or use the build script for all 33 CLI tools
./BUILD_ALL.sh

Option 2: Install via Homebrew (Coming Soon)

# macOS/Linux via Homebrew
brew tap lowerplane/tap
brew install lowerplane-toolkit

# Verify installation
soc2-check --version
mfa-status --version
public-bucket --version

Run Your First Scan

# Check SOC 2 readiness
./soc2-check --provider aws --region us-east-1

# Check MFA status across all services
./mfa-status --all

# Find public S3 buckets
./public-bucket --provider all

Start Cloud Tools (Docker)

# Start PolicyHub
cd tools/cloud/policy-hub
docker-compose up -d
# Frontend: http://localhost:5173
# Backend: http://localhost:3001

# Start AccessReview
cd tools/cloud/access-review
docker-compose up -d
# Backend: http://localhost:3002

# Start VendorRisk
cd tools/cloud/vendor-risk
docker-compose up -d
# Backend: http://localhost:3003

# Start CloudScanner
cd tools/cloud/cloud-scanner
docker-compose up -d
# Backend: http://localhost:3004

# All cloud tools available:
# - PolicyHub, AccessReview, VendorRisk, CloudScanner
# - FrameworkMapper, AuditTrail, TrainingTracker
# - ChangeLog, IncidentResponse, PentestPortal

πŸ“¦ What's Inside?

πŸ–₯️ CLI Tools (33 tools)

Tier 1: High-Impact Security Checks

Tool Description Use Case
soc2-check SOC 2 compliance scanner for AWS/GCP/Azure Pre-audit readiness assessment
mfa-status MFA coverage across all platforms Verify logical access controls
public-bucket Find publicly accessible cloud storage Prevent data breaches
compliance-ci CI/CD compliance checks Shift-left compliance
api-key-scanner Detect exposed secrets in code Prevent credential leaks

Tier 2: Evidence Collection

Tool Description Use Case
evidence-cli Automated evidence collection Continuous compliance
access-last-used Find stale accounts Access review automation
admin-access Audit privileged accounts Least privilege verification
audit-export Export audit-ready reports Auditor deliverables
evidence-hash Tamper-proof evidence Evidence integrity

Tier 3: Control Testing

Tool Description Use Case
password-policy Validate password requirements CC6.1 compliance
encrypt-check Verify encryption at rest/transit CC6.1 compliance
log-retention Check log retention periods CC7.2 compliance
backup-test Verify backup configurations CC7.5 compliance
ssl-expiry Monitor SSL certificates Prevent outages

Tier 4: Specialized Checks

Tool Description Use Case
email-security Verify SPF/DKIM/DMARC Email authentication
db-encryption Check database encryption Data protection
container-scan Scan containers for CVEs Supply chain security
firewall-rules Audit firewall changes Change management
patch-status Check system patch levels Vulnerability management

View All 33 CLI Tools β†’

🌐 Cloud/Web Tools (10 tools)

Tool Description Tech Stack
PolicyHub Security policy management with version control React/Node.js/PostgreSQL
AccessReview Automated quarterly access reviews React/Node.js/PostgreSQL
VendorRisk Third-party vendor risk assessment React/Node.js/PostgreSQL
CloudScanner Real-time cloud compliance monitoring React/Node.js/PostgreSQL
FrameworkMapper Map controls across compliance frameworks React/Node.js/PostgreSQL
AuditTrail Centralized audit logging React/Node.js/PostgreSQL
TrainingTracker Security awareness training management React/Node.js/PostgreSQL
ChangeLog Change management tracking React/Node.js/PostgreSQL
IncidentResponse Security incident management React/Node.js/PostgreSQL
PentestPortal Penetration testing management React/Node.js/PostgreSQL

View All Cloud Tools β†’

πŸ–₯️ Desktop Applications (7 tools)

Tool Description Platform
ComplianceDesktop Evidence collection agent Windows/macOS/Linux
SecureClipboard Compliance screenshot tool Windows/macOS/Linux
BackupVerifier Backup integrity testing Windows/macOS/Linux
EncryptionChecker Local encryption audit Windows/macOS/Linux
PasswordAuditor Password security auditor Windows/macOS/Linux
AssetInventory IT asset discovery Windows/macOS/Linux
ComplianceSync Background evidence sync Windows/macOS/Linux

View All Desktop Tools β†’


πŸŽ“ Documentation

Getting Started

User Guides

Framework Guides

Developer Guides


πŸ—οΈ Architecture

High-Level Overview

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚                     LowerPlane Compliance Toolkit                β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                                β”‚
                β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
                β”‚               β”‚               β”‚
        β”Œβ”€β”€β”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β”€β” β”Œβ”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β” β”Œβ”€β”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β”€β”
        β”‚   CLI Tools   β”‚ β”‚ Cloud Toolsβ”‚ β”‚Desktop Toolsβ”‚
        β”‚   (Go/Rust)   β”‚ β”‚(React/Node)β”‚ β”‚  (Electron) β”‚
        β””β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”˜ β””β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”˜ β””β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”˜
                β”‚               β”‚               β”‚
        β”Œβ”€β”€β”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β”€β”
        β”‚           Integration Layer (APIs)            β”‚
        β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                            β”‚
        β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β–Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
        β”‚    AWS β”‚ GCP β”‚ Azure β”‚ Okta β”‚ GitHub β”‚ ...    β”‚
        β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

Technology Stack

CLI Tools:

  • Language: Go 1.21+
  • Libraries: cobra, aws-sdk-go-v2, google-cloud-go
  • Distribution: Homebrew, apt, yum, winget

Cloud Tools:

  • Frontend: React 18, TypeScript, Tailwind CSS
  • Backend: Node.js 18, Express, TypeScript
  • Database: PostgreSQL 15
  • Container: Docker, Docker Compose

Desktop Tools:

  • Framework: Electron 28
  • Backend: Go (for system access)
  • Distribution: DMG (macOS), MSI (Windows), AppImage (Linux)

🚦 Quick Examples

Example 1: SOC 2 Pre-Audit Check

# Scan AWS infrastructure
soc2-check --provider aws --region us-east-1 --output report.html

# Result: Compliance score 67/100
# - 2 Critical issues (Root MFA, CloudTrail)
# - 8 High issues (S3 encryption, IAM)
# - 10 Medium issues

Example 2: MFA Coverage Report

# Check MFA across all services
mfa-status --all --output mfa-report.csv

# Result: 96.8% coverage across 222 users
# - AWS: 89.4% (5 users missing MFA)
# - Okta: 98.7% (2 users missing MFA)
# - GitHub: 100% βœ…

Example 3: Public Bucket Scan

# Find public S3/GCS/Azure buckets
public-bucket --provider all

# Result: Found 5 public buckets
# - 1 Critical (public write access)
# - 2 High (public read with data)
# - 2 Medium (public read, empty)

Example 4: CI/CD Integration

# .github/workflows/compliance.yml
name: Compliance Check
on: [push, pull_request]

jobs:
  compliance:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v3
      - name: Install LowerPlane CLI
        run: |
          curl -sSL https://get.lowerplane.com/install | bash
      - name: Run Compliance Checks
        run: |
          compliance-ci --config .compliance.yml
      - name: Upload Results
        uses: actions/upload-artifact@v3
        with:
          name: compliance-report
          path: compliance-report.html

Example 5: Docker Deployment

# Start PolicyHub
cd tools/cloud/policy-hub
docker-compose up -d

# Access at http://localhost:3001
# Create policies, track versions, manage approvals

🌟 Key Features

πŸ”’ Security First

  • Local Execution - No data leaves your environment
  • Self-Hosted - Deploy on your own infrastructure
  • Open Source - Audit the code yourself
  • No Phone-Home - Zero telemetry by default

🎯 Framework Coverage

  • βœ… SOC 2 Type I & II
  • βœ… ISO 27001
  • βœ… GDPR
  • βœ… HIPAA
  • βœ… PCI-DSS
  • βœ… NIST CSF
  • βœ… Custom frameworks

πŸ”— Integration Rich

Cloud Providers: AWS, GCP, Azure, DigitalOcean, Linode

Identity: Okta, Azure AD, Google Workspace, Auth0, OneLogin

DevOps: GitHub, GitLab, BitBucket, Jenkins, CircleCI

Monitoring: CloudWatch, Stackdriver, DataDog, Splunk

More: Slack, Jira, PagerDuty, 1Password, and 50+ more

πŸ“Š Continuous Compliance

  • Automated evidence collection
  • Real-time monitoring
  • Drift detection
  • Scheduled scans
  • Webhook notifications

πŸ› οΈ Installation

Prerequisites

  • CLI Tools: Go 1.21+ (optional, pre-built binaries available)
  • Cloud Tools: Docker 24.0+, Docker Compose 2.0+
  • Desktop Tools: Node.js 18+ (for building from source)

Option 1: Homebrew (macOS/Linux)

# Add LowerPlane tap
brew tap lowerplane/tap

# Install CLI tools
brew install lowerplane-toolkit

# Install desktop apps
brew install --cask lowerplane-desktop
brew install --cask lowerplane-clipboard

Option 2: Direct Download

# Linux/macOS
curl -sSL https://get.lowerplane.com/install | bash

# Windows (PowerShell)
iwr -useb https://get.lowerplane.com/install.ps1 | iex

Option 3: Package Managers

# Debian/Ubuntu
wget -qO- https://apt.lowerplane.com/gpg.key | sudo apt-key add -
echo "deb https://apt.lowerplane.com stable main" | sudo tee /etc/apt/sources.list.d/lowerplane.list
sudo apt update && sudo apt install lowerplane-toolkit

# RHEL/CentOS
sudo yum-config-manager --add-repo https://yum.lowerplane.com/lowerplane.repo
sudo yum install lowerplane-toolkit

# Windows
winget install LowerPlane.ComplianceToolkit

Option 4: Docker

# Pull all cloud tools
docker pull lowerplane/policy-hub
docker pull lowerplane/access-review
docker pull lowerplane/vendor-risk

# Or use Docker Compose
git clone https://github.com/lowerplane/compliance-toolkit.git
cd compliance-toolkit
docker-compose up -d

Option 5: Build from Source

# Clone repository
git clone https://github.com/lowerplane/compliance-toolkit.git
cd compliance-toolkit

# Build CLI tools
make build-cli

# Build cloud tools
make build-cloud

# Build desktop tools
make build-desktop

# Install locally
make install

🎯 Use Cases

1. Pre-Audit Preparation

Problem: You have a SOC 2 audit in 3 months and don't know where you stand.

Solution:

# Run comprehensive scan
soc2-check --provider aws,gcp --output pre-audit-report.html

# Review findings
open pre-audit-report.html

# Fix critical issues
public-bucket --auto-fix
mfa-status --all --enforce

# Track progress
compliance-score --framework soc2

2. Continuous Compliance

Problem: Your compliance drifts between annual audits.

Solution:

# Set up continuous monitoring
compliance-ci --continuous --interval 24h --webhook https://slack.com/...

# Automated evidence collection
evidence-cli --schedule daily --export lowerplane

# Real-time alerts
cloud-scanner --monitor --alert critical,high

3. Access Reviews

Problem: Quarterly access reviews take 40+ hours of manual work.

Solution:

# Deploy AccessReview tool
cd tools/cloud/access-review
docker-compose up -d

# Connect integrations (AWS, Google Workspace, Okta)
# Generate access reports automatically
# Email managers for review
# Track approvals and revocations

4. Vendor Due Diligence

Problem: You need to vet 50+ vendors for security compliance.

Solution:

# Deploy VendorRisk tool
cd tools/cloud/vendor-risk
docker-compose up -d

# Send security questionnaires
# Collect SOC 2 reports
# Track certifications
# Generate risk scores

5. CI/CD Security Gates

Problem: Security issues reach production.

Solution:

# .github/workflows/security.yml
- name: Run Compliance Checks
  run: |
    compliance-ci --fail-on critical,high
    container-scan --image ${{ env.IMAGE }}
    api-key-scanner --path .

🀝 Contributing

We love contributions! LowerPlane Compliance Toolkit is built by the community, for the community.

Ways to Contribute

Development Setup

# Fork and clone
git clone https://github.com/YOUR_USERNAME/compliance-toolkit.git
cd compliance-toolkit

# Install dependencies
make deps

# Run tests
make test

# Build everything
make build

# Run locally
make dev

See CONTRIBUTING.md for detailed guidelines.


πŸ“Š Project Status

Release Schedule

  • v1.0.0 (Current) - Initial release with 50+ tools
  • v1.1.0 (Q2 2025) - Additional integrations, improved UI
  • v1.2.0 (Q3 2025) - Advanced reporting, AI-powered recommendations
  • v2.0.0 (Q4 2025) - Multi-tenant support, compliance automation engine

Roadmap

  • CLI tools for AWS/GCP/Azure
  • Cloud tools (PolicyHub, AccessReview, VendorRisk)
  • Desktop applications
  • Docker deployment
  • Kubernetes deployment
  • Terraform modules
  • Advanced reporting engine
  • AI-powered risk assessment
  • Mobile applications
  • Slack/Teams bots

View Full Roadmap β†’


πŸ“ˆ Stats

GitHub Stars GitHub Forks GitHub Issues GitHub Pull Requests

Used by 500+ companies to manage $200M+ in enterprise deals


πŸ† Who's Using LowerPlane?

While we can't name all our users (NDAs!), our toolkit is used by:

  • πŸš€ Startups - Getting SOC 2 compliant to close enterprise deals
  • 🏒 Scale-ups - Maintaining compliance as they grow
  • 🏭 Enterprises - Automating compliance across hundreds of systems
  • πŸŽ“ Educational Institutions - Teaching compliance best practices
  • πŸ›οΈ Government Agencies - Meeting NIST and FedRAMP requirements

Add Your Company β†’


πŸ’‘ Why Open Source?

Compliance shouldn't be locked behind enterprise paywalls.

We believe that:

  • 🌍 Security is a right - Every company deserves good security
  • πŸ”“ Transparency builds trust - Open source = auditable
  • 🀝 Community drives innovation - Best ideas come from practitioners
  • πŸ“š Knowledge should be shared - Help the next generation

πŸ”— Links


πŸ“œ License

LowerPlane Compliance Toolkit is open source software licensed under the MIT License.

MIT License

Copyright (c) 2025 LowerPlane, Inc.

Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.

πŸ™ Acknowledgments

Built with ❀️ by the LowerPlane team and contributors worldwide.

Special thanks to:

  • Our amazing open source contributors
  • The compliance and security community
  • Companies who trusted us early
  • Everyone who gave feedback and reported issues

πŸ“ž Support

Community Support (Free)

Commercial Support (Paid)

  • 🎯 Priority support
  • πŸ“ž Phone & video support
  • 🏒 Custom integrations
  • πŸ“Š Training & onboarding
  • πŸ” Security consulting

Contact: enterprise@lowerplane.com


⭐ If you find this project useful, please consider giving it a star! ⭐

Made with ❀️ by LowerPlane

```

🚧 Implementation Status

βœ… Completed

  • Project structure and folder organization
  • All 33 CLI tools implementation with Go
  • All 10 cloud tools with Express/TypeScript backends
  • All 7 desktop applications with Electron
  • PolicyHub React frontend
  • Shared Go packages (logger, config, reporter, background)
  • Docker Compose setup for all cloud tools
  • Basic documentation for all tools
  • .gitignore and development setup
  • Makefile with build targets

πŸ”¨ In Progress

  • Integration testing
  • CI/CD pipelines
  • Cloud tool React frontends (except PolicyHub)

πŸ“… Planned

  • Homebrew tap setup
  • Package distributions (deb, rpm, msi)
  • Documentation website
  • Example configurations
  • Video tutorials
  • Kubernetes deployment
  • Real cloud provider integrations (AWS/GCP/Azure SDKs)

Complete Repository Structure

compliance-toolkit/
β”œβ”€β”€ .github/
β”‚   β”œβ”€β”€ workflows/
β”‚   β”‚   β”œβ”€β”€ ci.yml                          # CI/CD pipeline
β”‚   β”‚   β”œβ”€β”€ release.yml                     # Release automation
β”‚   β”‚   β”œβ”€β”€ security.yml                    # Security scanning
β”‚   β”‚   └── docs.yml                        # Documentation deployment
β”‚   β”œβ”€β”€ ISSUE_TEMPLATE/
β”‚   β”‚   β”œβ”€β”€ bug_report.md
β”‚   β”‚   β”œβ”€β”€ feature_request.md
β”‚   β”‚   └── question.md
β”‚   β”œβ”€β”€ PULL_REQUEST_TEMPLATE.md
β”‚   β”œβ”€β”€ CODEOWNERS
β”‚   └── dependabot.yml
β”‚
β”œβ”€β”€ docs/
β”‚   β”œβ”€β”€ assets/
β”‚   β”‚   β”œβ”€β”€ logo.png
β”‚   β”‚   β”œβ”€β”€ screenshots/
β”‚   β”‚   └── diagrams/
β”‚   β”œβ”€β”€ frameworks/
β”‚   β”‚   β”œβ”€β”€ SOC2.md
β”‚   β”‚   β”œβ”€β”€ ISO27001.md
β”‚   β”‚   β”œβ”€β”€ GDPR.md
β”‚   β”‚   β”œβ”€β”€ HIPAA.md
β”‚   β”‚   └── NIST.md
β”‚   β”œβ”€β”€ guides/
β”‚   β”‚   β”œβ”€β”€ getting-started.md
β”‚   β”‚   β”œβ”€β”€ deployment.md
β”‚   β”‚   β”œβ”€β”€ integrations.md
β”‚   β”‚   └── best-practices.md
β”‚   β”œβ”€β”€ INSTALLATION.md
β”‚   β”œβ”€β”€ QUICK_START.md
β”‚   β”œβ”€β”€ CLI_TOOLS.md
β”‚   β”œβ”€β”€ CLOUD_TOOLS.md
β”‚   β”œβ”€β”€ DESKTOP_TOOLS.md
β”‚   β”œβ”€β”€ ARCHITECTURE.md
β”‚   β”œβ”€β”€ ARCHITECTURE_DEEP_DIVE.md
β”‚   β”œβ”€β”€ API.md
β”‚   β”œβ”€β”€ FAQ.md
β”‚   β”œβ”€β”€ TROUBLESHOOTING.md
β”‚   └── USERS.md
β”‚
β”œβ”€β”€ tools/
β”‚   β”œβ”€β”€ cli/
β”‚   β”‚   β”œβ”€β”€ soc2-check/
β”‚   β”‚   β”‚   β”œβ”€β”€ cmd/
β”‚   β”‚   β”‚   β”‚   └── soc2-check/
β”‚   β”‚   β”‚   β”‚       └── main.go
β”‚   β”‚   β”‚   β”œβ”€β”€ pkg/
β”‚   β”‚   β”‚   β”‚   β”œβ”€β”€ scanner/
β”‚   β”‚   β”‚   β”‚   β”‚   β”œβ”€β”€ aws.go
β”‚   β”‚   β”‚   β”‚   β”‚   β”œβ”€β”€ gcp.go
β”‚   β”‚   β”‚   β”‚   β”‚   └── azure.go
β”‚   β”‚   β”‚   β”‚   β”œβ”€β”€ checks/
β”‚   β”‚   β”‚   β”‚   β”‚   β”œβ”€β”€ encryption.go
β”‚   β”‚   β”‚   β”‚   β”‚   β”œβ”€β”€ access.go
β”‚   β”‚   β”‚   β”‚   β”‚   └── logging.go
β”‚   β”‚   β”‚   β”‚   └── report/
β”‚   β”‚   β”‚   β”‚       └── report.go
β”‚   β”‚   β”‚   β”œβ”€β”€ internal/
β”‚   β”‚   β”‚   β”‚   └── models/
β”‚   β”‚   β”‚   β”œβ”€β”€ configs/
β”‚   β”‚   β”‚   β”œβ”€β”€ go.mod
β”‚   β”‚   β”‚   β”œβ”€β”€ go.sum
β”‚   β”‚   β”‚   β”œβ”€β”€ README.md
β”‚   β”‚   β”‚   β”œβ”€β”€ Makefile
β”‚   β”‚   β”‚   └── Dockerfile
β”‚   β”‚   β”‚
β”‚   β”‚   β”œβ”€β”€ mfa-status/
β”‚   β”‚   β”‚   β”œβ”€β”€ cmd/
β”‚   β”‚   β”‚   β”œβ”€β”€ pkg/
β”‚   β”‚   β”‚   β”œβ”€β”€ internal/
β”‚   β”‚   β”‚   β”œβ”€β”€ go.mod
β”‚   β”‚   β”‚   β”œβ”€β”€ README.md
β”‚   β”‚   β”‚   └── Makefile
β”‚   β”‚   β”‚
β”‚   β”‚   β”œβ”€β”€ public-bucket/
β”‚   β”‚   β”‚   β”œβ”€β”€ cmd/
β”‚   β”‚   β”‚   β”œβ”€β”€ pkg/
β”‚   β”‚   β”‚   β”œβ”€β”€ internal/
β”‚   β”‚   β”‚   β”œβ”€β”€ go.mod
β”‚   β”‚   β”‚   β”œβ”€β”€ README.md
β”‚   β”‚   β”‚   └── Makefile
β”‚   β”‚   β”‚
β”‚   β”‚   β”œβ”€β”€ compliance-ci/
β”‚   β”‚   β”œβ”€β”€ evidence-cli/
β”‚   β”‚   β”œβ”€β”€ password-policy/
β”‚   β”‚   β”œβ”€β”€ ssl-expiry/
β”‚   β”‚   β”œβ”€β”€ log-retention/
β”‚   β”‚   β”œβ”€β”€ training-status/
β”‚   β”‚   β”œβ”€β”€ email-security/
β”‚   β”‚   β”œβ”€β”€ access-last-used/
β”‚   β”‚   β”œβ”€β”€ admin-access/
β”‚   β”‚   β”œβ”€β”€ encrypt-check/
β”‚   β”‚   β”œβ”€β”€ backup-test/
β”‚   β”‚   β”œβ”€β”€ api-key-scanner/
β”‚   β”‚   β”œβ”€β”€ firewall-rules/
β”‚   β”‚   β”œβ”€β”€ patch-status/
β”‚   β”‚   β”œβ”€β”€ network-scan/
β”‚   β”‚   β”œβ”€β”€ gdpr-check/
β”‚   β”‚   β”œβ”€β”€ vendor-cert/
β”‚   β”‚   β”œβ”€β”€ policy-version/
β”‚   β”‚   β”œβ”€β”€ incident-time/
β”‚   β”‚   β”œβ”€β”€ db-encryption/
β”‚   β”‚   β”œβ”€β”€ container-scan/
β”‚   β”‚   β”œβ”€β”€ dns-security/
β”‚   β”‚   β”œβ”€β”€ session-timeout/
β”‚   β”‚   β”œβ”€β”€ data-classification/
β”‚   β”‚   β”œβ”€β”€ compliance-score/
β”‚   β”‚   β”œβ”€β”€ control-test/
β”‚   β”‚   β”œβ”€β”€ risk-calculator/
β”‚   β”‚   β”œβ”€β”€ audit-prep/
β”‚   β”‚   β”œβ”€β”€ evidence-hash/
β”‚   β”‚   └── audit-export/
β”‚   β”‚
β”‚   β”œβ”€β”€ cloud/
β”‚   β”‚   β”œβ”€β”€ policy-hub/
β”‚   β”‚   β”‚   β”œβ”€β”€ frontend/
β”‚   β”‚   β”‚   β”‚   β”œβ”€β”€ src/
β”‚   β”‚   β”‚   β”‚   β”‚   β”œβ”€β”€ components/
β”‚   β”‚   β”‚   β”‚   β”‚   β”œβ”€β”€ pages/
β”‚   β”‚   β”‚   β”‚   β”‚   β”œβ”€β”€ hooks/
β”‚   β”‚   β”‚   β”‚   β”‚   β”œβ”€β”€ utils/
β”‚   β”‚   β”‚   β”‚   β”‚   β”œβ”€β”€ types/
β”‚   β”‚   β”‚   β”‚   β”‚   β”œβ”€β”€ App.tsx
β”‚   β”‚   β”‚   β”‚   β”‚   └── main.tsx
β”‚   β”‚   β”‚   β”‚   β”œβ”€β”€ public/
β”‚   β”‚   β”‚   β”‚   β”œβ”€β”€ package.json
β”‚   β”‚   β”‚   β”‚   β”œβ”€β”€ tsconfig.json
β”‚   β”‚   β”‚   β”‚   β”œβ”€β”€ vite.config.ts
β”‚   β”‚   β”‚   β”‚   └── tailwind.config.js
β”‚   β”‚   β”‚   β”œβ”€β”€ backend/
β”‚   β”‚   β”‚   β”‚   β”œβ”€β”€ src/
β”‚   β”‚   β”‚   β”‚   β”‚   β”œβ”€β”€ controllers/
β”‚   β”‚   β”‚   β”‚   β”‚   β”œβ”€β”€ models/
β”‚   β”‚   β”‚   β”‚   β”‚   β”œβ”€β”€ routes/
β”‚   β”‚   β”‚   β”‚   β”‚   β”œβ”€β”€ middleware/
β”‚   β”‚   β”‚   β”‚   β”‚   β”œβ”€β”€ services/
β”‚   β”‚   β”‚   β”‚   β”‚   β”œβ”€β”€ utils/
β”‚   β”‚   β”‚   β”‚   β”‚   └── server.ts
β”‚   β”‚   β”‚   β”‚   β”œβ”€β”€ migrations/
β”‚   β”‚   β”‚   β”‚   β”œβ”€β”€ seeds/
β”‚   β”‚   β”‚   β”‚   β”œβ”€β”€ package.json
β”‚   β”‚   β”‚   β”‚   β”œβ”€β”€ tsconfig.json
β”‚   β”‚   β”‚   β”‚   └── .env.example
β”‚   β”‚   β”‚   β”œβ”€β”€ docker-compose.yml
β”‚   β”‚   β”‚   β”œβ”€β”€ Dockerfile.frontend
β”‚   β”‚   β”‚   β”œβ”€β”€ Dockerfile.backend
β”‚   β”‚   β”‚   β”œβ”€β”€ README.md
β”‚   β”‚   β”‚   └── Makefile
β”‚   β”‚   β”‚
β”‚   β”‚   β”œβ”€β”€ access-review/
β”‚   β”‚   β”‚   β”œβ”€β”€ frontend/
β”‚   β”‚   β”‚   β”œβ”€β”€ backend/
β”‚   β”‚   β”‚   β”œβ”€β”€ docker-compose.yml
β”‚   β”‚   β”‚   └── README.md
β”‚   β”‚   β”‚
β”‚   β”‚   β”œβ”€β”€ vendor-risk/
β”‚   β”‚   β”œβ”€β”€ cloud-scanner/
β”‚   β”‚   β”œβ”€β”€ framework-mapper/
β”‚   β”‚   β”œβ”€β”€ audit-trail/
β”‚   β”‚   β”œβ”€β”€ training-tracker/
β”‚   β”‚   β”œβ”€β”€ change-log/
β”‚   β”‚   β”œβ”€β”€ incident-response/
β”‚   β”‚   └── pentest-portal/
β”‚   β”‚
β”‚   └── desktop/
β”‚       β”œβ”€β”€ compliance-desktop/
β”‚       β”‚   β”œβ”€β”€ src/
β”‚       β”‚   β”‚   β”œβ”€β”€ main/
β”‚       β”‚   β”‚   β”‚   β”œβ”€β”€ main.ts              # Electron main process
β”‚       β”‚   β”‚   β”‚   β”œβ”€β”€ preload.ts           # Preload scripts
β”‚       β”‚   β”‚   β”‚   └── ipc/                 # IPC handlers
β”‚       β”‚   β”‚   β”œβ”€β”€ renderer/
β”‚       β”‚   β”‚   β”‚   β”œβ”€β”€ components/
β”‚       β”‚   β”‚   β”‚   β”œβ”€β”€ pages/
β”‚       β”‚   β”‚   β”‚   β”œβ”€β”€ hooks/
β”‚       β”‚   β”‚   β”‚   β”œβ”€β”€ App.tsx
β”‚       β”‚   β”‚   β”‚   └── index.tsx
β”‚       β”‚   β”‚   └── shared/
β”‚       β”‚   β”‚       β”œβ”€β”€ types/
β”‚       β”‚   β”‚       └── utils/
β”‚       β”‚   β”œβ”€β”€ assets/
β”‚       β”‚   β”œβ”€β”€ package.json
β”‚       β”‚   β”œβ”€β”€ electron-builder.yml
β”‚       β”‚   β”œβ”€β”€ tsconfig.json
β”‚       β”‚   └── README.md
β”‚       β”‚
β”‚       β”œβ”€β”€ secure-clipboard/
β”‚       β”œβ”€β”€ backup-verifier/
β”‚       β”œβ”€β”€ encryption-checker/
β”‚       β”œβ”€β”€ password-auditor/
β”‚       β”œβ”€β”€ asset-inventory/
β”‚       └── compliance-sync/
β”‚
β”œβ”€β”€ shared/
β”‚   β”œβ”€β”€ go/
β”‚   β”‚   β”œβ”€β”€ auth/                            # Shared authentication
β”‚   β”‚   β”œβ”€β”€ config/                          # Configuration management
β”‚   β”‚   β”œβ”€β”€ logger/                          # Logging utilities
β”‚   β”‚   β”œβ”€β”€ errors/                          # Error handling
β”‚   β”‚   └── utils/                           # Common utilities
β”‚   β”œβ”€β”€ typescript/
β”‚   β”‚   β”œβ”€β”€ types/                           # Shared TypeScript types
β”‚   β”‚   β”œβ”€β”€ utils/                           # Shared utilities
β”‚   β”‚   β”œβ”€β”€ components/                      # Shared React components
β”‚   β”‚   └── hooks/                           # Shared React hooks
β”‚   └── docker/
β”‚       β”œβ”€β”€ postgres/
β”‚       β”œβ”€β”€ nginx/
β”‚       └── redis/
β”‚
β”œβ”€β”€ scripts/
β”‚   β”œβ”€β”€ install.sh                           # Installation script
β”‚   β”œβ”€β”€ install.ps1                          # Windows installation
β”‚   β”œβ”€β”€ build-cli.sh                         # Build all CLI tools
β”‚   β”œβ”€β”€ build-cloud.sh                       # Build cloud tools
β”‚   β”œβ”€β”€ build-desktop.sh                     # Build desktop tools
β”‚   β”œβ”€β”€ test-all.sh                          # Run all tests
β”‚   β”œβ”€β”€ release.sh                           # Create release
β”‚   └── setup-dev.sh                         # Development setup
β”‚
β”œβ”€β”€ configs/
β”‚   β”œβ”€β”€ soc2-controls.yaml                   # SOC 2 control definitions
β”‚   β”œβ”€β”€ iso27001-controls.yaml               # ISO 27001 controls
β”‚   β”œβ”€β”€ gdpr-requirements.yaml               # GDPR requirements
β”‚   └── integrations.yaml                    # Integration configs
β”‚
β”œβ”€β”€ deployments/
β”‚   β”œβ”€β”€ kubernetes/
β”‚   β”‚   β”œβ”€β”€ policy-hub/
β”‚   β”‚   β”œβ”€β”€ access-review/
β”‚   β”‚   └── vendor-risk/
β”‚   β”œβ”€β”€ terraform/
β”‚   β”‚   β”œβ”€β”€ aws/
β”‚   β”‚   β”œβ”€β”€ gcp/
β”‚   β”‚   └── azure/
β”‚   └── ansible/
β”‚       └── playbooks/
β”‚
β”œβ”€β”€ tests/
β”‚   β”œβ”€β”€ cli/
β”‚   β”‚   β”œβ”€β”€ soc2-check_test.go
β”‚   β”‚   β”œβ”€β”€ mfa-status_test.go
β”‚   β”‚   └── public-bucket_test.go
β”‚   β”œβ”€β”€ cloud/
β”‚   β”‚   β”œβ”€β”€ policy-hub.test.ts
β”‚   β”‚   └── access-review.test.ts
β”‚   β”œβ”€β”€ integration/
β”‚   β”‚   └── e2e/
β”‚   └── fixtures/
β”‚       β”œβ”€β”€ aws-mocks/
β”‚       └── test-data/
β”‚
β”œβ”€β”€ homebrew/
β”‚   └── Formula/
β”‚       β”œβ”€β”€ lowerplane-toolkit.rb
β”‚       β”œβ”€β”€ soc2-check.rb
β”‚       └── mfa-status.rb
β”‚
β”œβ”€β”€ packages/
β”‚   β”œβ”€β”€ deb/
β”‚   β”‚   └── control
β”‚   β”œβ”€β”€ rpm/
β”‚   β”‚   └── spec
β”‚   └── msi/
β”‚       └── config.xml
β”‚
β”œβ”€β”€ .gitignore
β”œβ”€β”€ .gitattributes
β”œβ”€β”€ .editorconfig
β”œβ”€β”€ .dockerignore
β”œβ”€β”€ README.md
β”œβ”€β”€ LICENSE
β”œβ”€β”€ CONTRIBUTING.md
β”œβ”€β”€ CODE_OF_CONDUCT.md
β”œβ”€β”€ SECURITY.md
β”œβ”€β”€ CHANGELOG.md
β”œβ”€β”€ ROADMAP.md
β”œβ”€β”€ Makefile
β”œβ”€β”€ docker-compose.yml                       # Start all cloud tools
β”œβ”€β”€ docker-compose.dev.yml                   # Development setup
└── go.work                                  # Go workspace file

Additional Key Files

CONTRIBUTING.md

# Contributing to LowerPlane Compliance Toolkit

Thank you for your interest in contributing! This document provides guidelines and instructions.

## Code of Conduct

Please read and follow our [Code of Conduct](CODE_OF_CONDUCT.md).

## How to Contribute

### Reporting Bugs
- Use GitHub Issues
- Include reproduction steps
- Provide system information

### Feature Requests
- Start a GitHub Discussion
- Describe the use case
- Explain the value

### Pull Requests
1. Fork the repository
2. Create a feature branch
3. Make your changes
4. Add tests
5. Submit a PR

## Development Setup

See [DEVELOPMENT.md](docs/DEVELOPMENT.md)

## Coding Standards

- **Go**: Follow [Effective Go](https://golang.org/doc/effective_go)
- **TypeScript**: Use ESLint + Prettier
- **Commits**: Use [Conventional Commits](https://www.conventionalcommits.org/)

## License

By contributing, you agree that your contributions will be licensed under the MIT License.

SECURITY.md

# Security Policy

## Reporting a Vulnerability

**Please do not report security vulnerabilities through public GitHub issues.**

Instead, email: security@lowerplane.com

Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)

## Response Timeline

- Acknowledgment: Within 24 hours
- Initial assessment: Within 72 hours
- Fix timeline: Depends on severity

## Supported Versions

| Version | Supported          |
| ------- | ------------------ |
| 1.x.x   | :white_check_mark: |
| < 1.0   | :x:                |

CODE_OF_CONDUCT.md

# Contributor Covenant Code of Conduct

## Our Pledge

We pledge to make participation in our community a harassment-free experience for everyone.

## Our Standards

Examples of behavior that contributes to a positive environment:
- Using welcoming and inclusive language
- Being respectful of differing viewpoints
- Gracefully accepting constructive criticism
- Focusing on what is best for the community

## Enforcement

Instances of abusive behavior may be reported to conduct@lowerplane.com.

Makefile

.PHONY: help install build test clean deps

help: ## Show this help
	@grep -E '^[a-zA-Z_-]+:.*?## .*$$' $(MAKEFILE_LIST) | sort | awk 'BEGIN {FS = ":.*?## "}; {printf "\033[36m%-30s\033[0m %s\n", $$1, $$2}'

deps: ## Install dependencies
	@echo "Installing Go dependencies..."
	@go mod download
	@echo "Installing Node.js dependencies..."
	@cd tools/cloud && npm install

build-cli: ## Build all CLI tools
	@echo "Building CLI tools..."
	@./scripts/build-cli.sh

build-cloud: ## Build cloud tools
	@echo "Building cloud tools..."
	@./scripts/build-cloud.sh

build-desktop: ## Build desktop tools
	@echo "Building desktop tools..."
	@./scripts/build-desktop.sh

build: build-cli build-cloud build-desktop ## Build everything

test: ## Run all tests
	@echo "Running tests..."
	@./scripts/test-all.sh

install: ## Install all tools locally
	@echo "Installing..."
	@./scripts/install.sh

clean: ## Clean build artifacts
	@echo "Cleaning..."
	@rm -rf dist/
	@rm -rf build/
	@go clean -cache

dev: ## Start development environment
	@docker-compose -f docker-compose.dev.yml up

release: ## Create a release
	@./scripts/release.sh

About

Open-source compliance automation toolkit for SOC 2, ISO 27001, and GDPR

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •