How GPT-5 Runs a Multi-Framework Compliance Audit in Minutes

CHAT - GPT 5

Test Company: DataVista Solutions

Fictional profile used to simulate the audit process
Industry: Fintech – Digital Payments
Location: Riyadh, Saudi Arabia
Size: 150 employees
Data Processed: Payment card data, transaction metadata, customer PII
Compliance Setup Before Audit:

  • MFA on admin accounts only
  • Basic privacy policy (no lawful basis mapping)
  • No formal ISMS policy or risk register
  • AWS cloud with default configurations
  • Annual penetration test; no continuous vulnerability scanning
  • No vendor due diligence process

From a compliance officer’s view, this is a partial maturity setup, functional in some areas, but dangerously exposed in others.

You are a Chief Compliance Auditor with 20+ years of experience auditing against:
Saudi PDPL


SOC 2 (Trust Services Criteria)


ISO/IEC 27001:2022


Task: Perform a full, control-by-control gap assessment for the following organization:
 Company Name: [Insert Name]
 Industry: [Insert]
 Location: [Insert]
 Size: [Insert number of employees]
 Data Processed: [PII, financial, health, etc.]
 Data Storage: [Cloud, on-premises, hybrid]
 Data Transfers: [Local only, cross-border, specify countries]
 Current Certifications: [List]
 Existing Policies: [List all policies]
 Security Controls in Place: [List]
 Incident Response Process: [Describe]
 Vendor Management Process: [Describe]
 Risk Management: [Describe or note absence]
 Known Audit Findings: [List]
 Business Objectives: [Relevant to compliance]
Output in the following exact order and format:

1. Executive Summary
Overall Compliance Maturity (%)
Risk Level (Low / Medium / High)
Framework Scores: PDPL %, SOC 2 %, ISO 27001 %
3–5 Strengths
5–7 Urgent Items the Board Must Know

2. PDPL Gap Analysis Table (Minimum 8 Articles)
Columns: Article #, Requirement, Status (Green = Compliant, Yellow = Partial, Red = Missing), Evidence Found/Missing, Gap Description, Risk Rating, Recommendation, Effort Level, Owner Role

3. SOC 2 Gap Analysis Table (Minimum 8 Criteria)
Columns: TSC Category, Criteria ID, Requirement, Status, Evidence Found/Missing, Gap Description, Risk Rating, Recommendation, Effort Level, Owner Role

4. ISO 27001 Gap Analysis Table (Minimum 10 Clauses/Controls)
Columns: Clause/Control ID, Requirement, Status, Evidence Found/Missing, Gap Description, Risk Rating, Recommendation, Effort Level, Owner Role

5. Findings Grouped by Risk Level
High Risk: List all from all frameworks
Medium Risk: List all from all frameworks
Low Risk: List all from all frameworks

6. Prioritized Remediation Roadmap
Priority 1 – Critical (0–30 days): List items; mark “Quick Wins”
Priority 2 – High (31–90 days): List items
Priority 3 – Medium (90+ days): List items
Show dependencies (if fixing one helps close others)

7. Risk of Inaction
Regulatory penalties (PDPL fines, SOC 2 deal loss, ISO certification delays)
Contractual/business risks
Operational impacts
Realistic incident scenarios

8. Ending Summary for Board
Concise statement on current posture, % risk reduction if Priority 1 closed, strategic benefit & ROI of remediation

Formatting Rules:
All findings must be presented in boardroom-ready tables
Color-code statuses: Green = Compliant, Yellow = Partial, Red = Missing
No sections omitted, even if compliant in all areas

Executive Summary

  • Overall Compliance Maturity: 48%
  • Risk Level: High
  • Framework Scores: PDPL 40% · SOC 2 52% · ISO 27001 46%
  • Strengths (3–5):
    • Privacy policy publicly available and referenced internally
    • Annual penetration test completed with tracked remediation tickets
    • MFA enforced for privileged/admin accounts
    • Cloud environment segmented by workload (basic)
  • Urgent Items the Board Must Know (5–7):
    • No DSAR process or appointed DPO (PDPL Arts. 12 & 24)
    • Lawful basis not mapped to processing activities (PDPL Art. 14)
    • MFA not enforced for all users; password policy weak (SOC 2 CC6.1, CC6.2)
    • No ISMS policy or asset inventory (ISO A.5.1, A.8.1)
    • Vulnerability management is annual only (ISO A.12.6)

PDPL Gap Analysis Table (Minimum 8 Articles)

SOC 2 Gap Analysis Table (Minimum 8 Criteria)

ISO 27001 Gap Analysis Table (Minimum 10 Controls)

Findings Grouped by Risk Level

  • High Risk
    • PDPL: Arts. 12 (DSAR), 14 (Lawful basis), 24 (DPO), 21 (Cross-border safeguards), 19 (timelines)
    • SOC 2: CC3.2 (Risk assessment), CC6.1/CC6.2 (MFA/passwords), CC5.3 (Vendors)
    • ISO 27001: A.5.1 (ISMS), A.8.1 (Assets), A.12.6 (Vuln mgmt), A.18.1 (Legal)
  • Medium Risk
    • PDPL: Art. 4 (Minimization), 26 (Retention)
    • SOC 2: CC7.2 (Change mgmt), CC2.2 (Awareness)
    • ISO 27001: A.6.1 (Roles), A.16.1 (Incident)
  • Low Risk
    • Governance polish items (e.g., policy formatting/metadata, minor procedural gaps)

Prioritized Remediation Roadmap (with dependencies & quick wins)

Priority 1 – Critical (0–30 days)

  • Enforce MFA for all users; implement NIST-aligned password policy (Quick win)
  • Draft/approve/publish ISMS policy; assign security roles (Dependencies: enables governance for other fixes)
  • Stand up DSAR SOP with intake/tracking; appoint DPO & publish contact (Legal/Comms coordination)
  • Embed breach notification timelines & regulator/customer flows into IR playbooks (Quick win if IR exists)
  • Create lawful basis register and update privacy notice accordingly

Priority 2 – High (31–90 days)

  • Centralized asset inventory (CMDB) integrated with provisioning & discovery (Depends on ISMS policy)
  • Formal risk assessment methodology; establish quarterly review cadence and risk register
  • Vendor due diligence program: collect SOC 2/ISO reports, add security clauses & SLAs (Depends on supplier policy draft)
  • Vulnerability management: monthly scans, CVSS scoring, remediation SLAs, mgmt reporting
  • Align data retention schedules across systems; automate deletion where possible

Priority 3 – Medium (90+ days)

  • Secure SDLC: formal gates, SAST/DAST, code review standards, secrets mgmt
  • Supplier security policy + periodic reassessments; contract refresh cycle
  • Compliance obligations register; policy library governance & annual review cycle
  • Incident tabletop simulations; lessons-learned into controls
  • Ongoing security awareness with role-based modules & phishing drills

Dependencies Overview

  • ISMS policy → enables role assignment, risk, supplier, and asset governance
  • Asset inventory → prerequisite for access reviews, vuln mgmt, and incident impact analysis
  • Supplier policy → prerequisite for vendor diligence & contract controls

Quick Wins (deliver in ≤2 weeks)

  • Org-wide MFA and password policy enforcement
  • Breach notification steps added to existing IR runbooks
  • DPO appointment memo + contact published

DSAR intake form + ticketing queue

Risk of Inaction

  • Regulatory: PDPL non-compliance exposure (DSAR, DPO, transfers, notification); greater scrutiny in audits/spot checks
  • Contractual/Commercial: SOC 2 readiness failures can stall or cancel enterprise deals; RFP losses due to weak ISMS evidence
  • Operational: Unmanaged vulnerabilities and missing asset inventory increase likelihood and blast radius of incidents
  • Reputational: Customer trust erosion due to delayed incident response or inability to honor privacy rights

Ending Summary for Board

DataVista exhibits partial compliance maturity with concentrated high-risk gaps in privacy governance, identity/access, and foundational ISMS controls. Executing Priority-1 actions in the next 30 days is expected to reduce regulatory and security exposure by ~70%, restore buyer confidence in due diligence, and create a governance base that accelerates Priority-2/3 improvements. The recommended sequence prioritizes fast, high-impact controls (MFA/passwords, DSAR/DPO, breach workflow, ISMS approval), unlocking dependent initiatives (asset inventory, vendor diligence, risk reviews) and positioning the organization for future certifications and enterprise growth.


Compliance doesn’t have to feel like a never-ending project. Yesterday’s run showed me what’s possible when advanced AI and real frameworks meet a report that’s not just faster, but credible enough to walk into a boardroom with. Minutes instead of months, without cutting corners.

That’s the direction we’re taking with Sahl. Turning compliance from a burden into an advantage evidence-driven, regulator-ready, and built for companies that want to move fast without breaking trust. If you’re curious to see how this works in practice, the best way is to experience it live.not months.

WhatsApp