MCP HubMCP Hub
スキル一覧に戻る

checking-hipaa-compliance

jeremylongshore
更新日 Today
60 閲覧
712
74
712
GitHubで表示
デザインdesigndata

について

このスキルは、医療アプリケーションのHIPAAコンプライアンス監査を自動化します。コードベースをスキャンして保護医療情報(PHI)に関連するセキュリティ脆弱性を検出し、hipaa-compliance-checkerプラグインを使用して問題を特定し、医療データセキュリティ要件への準拠を確保します。開発者は、ソフトウェアプロジェクトにおける医療データ保護の監査や検証を行う際に利用すべきです。

クイックインストール

Claude Code

推奨
プラグインコマンド推奨
/plugin add https://github.com/jeremylongshore/claude-code-plugins-plus
Git クローン代替
git clone https://github.com/jeremylongshore/claude-code-plugins-plus.git ~/.claude/skills/checking-hipaa-compliance

このコマンドをClaude Codeにコピー&ペーストしてスキルをインストールします

ドキュメント

Overview

This skill automates the process of identifying potential HIPAA compliance issues within a software project. By using the hipaa-compliance-checker plugin, it helps developers and security professionals proactively address vulnerabilities and ensure adherence to HIPAA guidelines.

How It Works

  1. Analyze Request: Claude identifies the user's intent to check for HIPAA compliance.
  2. Initiate Plugin: Claude activates the hipaa-compliance-checker plugin.
  3. Execute Checks: The plugin scans the specified codebase, configuration files, or documentation for potential HIPAA violations.
  4. Generate Report: The plugin generates a detailed report outlining identified issues and their potential impact on HIPAA compliance.

When to Use This Skill

This skill activates when you need to:

  • Evaluate a codebase for HIPAA compliance before deployment.
  • Identify potential HIPAA violations in existing systems.
  • Assess the HIPAA readiness of infrastructure configurations.
  • Verify that documentation adheres to HIPAA guidelines.

Examples

Example 1: Checking a codebase for HIPAA compliance

User request: "Check HIPAA compliance of the patient data API codebase."

The skill will:

  1. Activate the hipaa-compliance-checker plugin.
  2. Scan the specified API codebase for potential HIPAA violations.
  3. Generate a report listing any identified issues, such as insecure data storage or insufficient access controls.

Example 2: Assessing infrastructure configuration for HIPAA readiness

User request: "Assess the HIPAA readiness of our AWS infrastructure configuration."

The skill will:

  1. Activate the hipaa-compliance-checker plugin.
  2. Analyze the AWS infrastructure configuration files for potential HIPAA violations, such as misconfigured security groups or inadequate encryption.
  3. Generate a report outlining any identified issues and recommendations for remediation.

Best Practices

  • Specify Target: Always clearly specify the target (e.g., codebase, configuration file, documentation) for the HIPAA compliance check.
  • Review Reports: Carefully review the generated reports to understand the identified issues and their potential impact.
  • Prioritize Remediation: Prioritize the remediation of identified issues based on their severity and potential impact on HIPAA compliance.

Integration

This skill can be integrated with other security and compliance tools to provide a comprehensive view of a system's security posture. The generated reports can be used as input for vulnerability management systems and security information and event management (SIEM) platforms.

Prerequisites

  • Access to codebase and configuration files in {baseDir}/
  • Security scanning tools installed as needed
  • Understanding of security standards and best practices
  • Permissions for security analysis operations

Instructions

  1. Identify security scan scope and targets
  2. Configure scanning parameters and thresholds
  3. Execute security analysis systematically
  4. Analyze findings for vulnerabilities and compliance gaps
  5. Prioritize issues by severity and impact
  6. Generate detailed security report with remediation steps

Output

  • Security scan results with vulnerability details
  • Compliance status reports by standard
  • Prioritized list of security issues by severity
  • Remediation recommendations with code examples
  • Executive summary for stakeholders

Error Handling

If security scanning fails:

  • Verify tool installation and configuration
  • Check file and directory permissions
  • Validate scan target paths
  • Review tool-specific error messages
  • Ensure network access for dependency checks

Resources

  • Security standard documentation (OWASP, CWE, CVE)
  • Compliance framework guidelines (GDPR, HIPAA, PCI-DSS)
  • Security scanning tool documentation
  • Vulnerability remediation best practices

GitHub リポジトリ

jeremylongshore/claude-code-plugins-plus
パス: plugins/security/hipaa-compliance-checker/skills/hipaa-compliance-checker
aiautomationclaude-codedevopsmarketplacemcp

関連スキル

content-collections

メタ

This skill provides a production-tested setup for Content Collections, a TypeScript-first tool that transforms Markdown/MDX files into type-safe data collections with Zod validation. Use it when building blogs, documentation sites, or content-heavy Vite + React applications to ensure type safety and automatic content validation. It covers everything from Vite plugin configuration and MDX compilation to deployment optimization and schema validation.

スキルを見る

creating-opencode-plugins

メタ

This skill provides the structure and API specifications for creating OpenCode plugins that hook into 25+ event types like commands, files, and LSP operations. It offers implementation patterns for JavaScript/TypeScript modules that intercept and extend the AI assistant's lifecycle. Use it when you need to build event-driven plugins for monitoring, custom handling, or extending OpenCode's capabilities.

スキルを見る

polymarket

メタ

This skill enables developers to build applications with the Polymarket prediction markets platform, including API integration for trading and market data. It also provides real-time data streaming via WebSocket to monitor live trades and market activity. Use it for implementing trading strategies or creating tools that process live market updates.

スキルを見る

cloudflare-turnstile

メタ

This skill provides comprehensive guidance for implementing Cloudflare Turnstile as a CAPTCHA-alternative bot protection system. It covers integration for forms, login pages, API endpoints, and frameworks like React/Next.js/Hono, while handling invisible challenges that maintain user experience. Use it when migrating from reCAPTCHA, debugging error codes, or implementing token validation and E2E tests.

スキルを見る