Skip to main content
Back to Blog
complianceGDPRSOC 2regulatoryAI promptsprivacyrisk assessmentlegal AI

AI Prompts for Compliance: GDPR, SOC 2, and Regulatory Framework Analysis

AI prompt templates for compliance work — GDPR assessments, SOC 2 audit prep, privacy policy review, risk assessment, and gap analysis across regulatory frameworks.

SurePrompts Team
April 13, 2026
10 min read

TL;DR

Prompt templates for AI-assisted compliance work covering GDPR, SOC 2, privacy reviews, risk assessment, and regulatory gap analysis — practical tools for compliance professionals.

Compliance work is inherently systematic. Take a regulatory framework, compare it against organizational practices, identify gaps, build a plan to close them. That systematic nature makes compliance one of the strongest use cases for AI in legal and regulatory work.

AI cannot tell you whether you are compliant — that requires understanding actual operations, technical infrastructure, and organizational context. But it can accelerate every other part: mapping requirements, generating checklists, drafting policies, identifying documentation gaps, and preparing for audits.

Disclaimer: AI-assisted compliance analysis is a tool for professional teams, not a substitute for qualified legal counsel or certified auditors. Regulatory requirements change frequently, and compliance depends on facts specific to your organization. All AI-generated guidance should be validated by qualified professionals.

GDPR Compliance Prompts

Applicability Assessment

code
Assess GDPR applicability for:
- Entity: [e.g., US-based SaaS company]
- HQ: [COUNTRY], EU operations: [YES/NO]
- EU users: [APPROXIMATE NUMBER]
- Data collected: [LIST TYPES]
- Processing activities: [DESCRIBE]

Analyze: territorial scope (Art. 3), material scope (Art. 2),
our role (controller/processor/both), need for EU
representative (Art. 27), need for DPO (Art. 37).

Practical next steps based on the assessment.

Privacy Policy Review

code
Review this privacy policy for GDPR compliance.
Applicable regulations: [GDPR + any additional frameworks]

Check each Article 13/14 requirement:
- Controller identity and DPO contact
- Purposes and legal basis for each processing activity
- Legitimate interests (if relying on Art. 6(1)(f))
- Recipients, international transfers, retention periods
- Data subject rights (access, rectification, erasure,
  restriction, portability, objection)
- Right to withdraw consent and right to complain
- Automated decision-making/profiling (Art. 22)

For each: PRESENT / MISSING / INCOMPLETE with specific
language quoted if present, and suggested text for gaps.

Also assess readability, accuracy, and consistency.

[PASTE POLICY]

Data Protection Impact Assessment

code
Generate a DPIA framework for:
Activity: [DESCRIBE — e.g., AI-powered customer chatbot
processing queries and purchase history]
Data subjects: [WHO], Data types: [WHAT], Scale: [VOLUME]

Structure:
1. DESCRIPTION — nature, scope, context, purpose, data flows
2. NECESSITY — is processing necessary? could purpose be
   achieved with less data? legal basis? retention limits?
3. RISKS — for each: description, likelihood, severity,
   impact on data subjects' rights
4. MITIGATION — for each risk: measure, residual risk,
   responsibility, timeline
5. CONSULTATION — Art. 36 required? DPO consulted? Data
   subjects' views?
6. DECISION — proceed / modify / abandon, review schedule

DSAR Response Process

code
Develop a DSAR process for [ORGANIZATION TYPE]:

1. INTAKE: identity verification, acknowledgment template,
   timeline management (1-month deadline), extension criteria
2. SEARCH: systems to check, methodology, unstructured data,
   third-party processor coordination
3. RESPONSE: cover all Art. 15 requirements, structured data
   format, accompanying rights information
4. EXCEPTIONS: manifestly unfounded requests, third-party
   data, legal privilege, trade secrets
5. DOCUMENTATION: audit trail, retention, metrics

SOC 2 Audit Preparation Prompts

Readiness Assessment

code
SOC 2 Type II readiness assessment for:
Organization: [COMPANY TYPE], Hosting: [CLOUD PROVIDER]
Employees: [NUMBER], Trust Criteria in scope: [LIST]

Assess each Common Criteria (CC1-CC9):
- Control environment, communication, risk assessment,
  monitoring, control activities, access controls, system
  operations, change management, risk mitigation

For each: required evidence, common gaps for [COMPANY TYPE],
priority (must-fix / should-address / nice-to-have),
estimated implementation effort.

Policy Documentation

code
Generate a [POLICY NAME — e.g., Information Security Policy /
Access Control Policy / Incident Response Policy] outline.

Organization: [TYPE], Size: [EMPLOYEES], Stack: [KEY SYSTEMS]

Structure: purpose, scope, definitions, policy statements
(specific enough to be auditor-testable), roles and
responsibilities, procedures, compliance and enforcement,
related policies, revision history.

NOTE: Customize to reflect actual practices. Auditors verify
documented controls match implemented controls.

Evidence Collection Checklist

code
Evidence collection checklist for SOC 2 Type II audit
covering [DATE RANGE]. Criteria in scope: [LIST].

For each control area: required evidence (what it
demonstrates, format, time period), collection instructions
(where to get it, how to export, privacy redactions), and
common rejection reasons.

Organize by: entity-level, IT general controls, application-
level, vendor controls. Include a backward timeline from
evidence request deadline.

Gap Remediation Plan

code
Create a remediation plan for these SOC 2 gaps:
[LIST — e.g., no access review process, no documented
incident response, informal change management, no vendor
risk program, untested backups]

For each: SOC 2 criteria affected, risk if unresolved, audit
impact, remediation steps, evidence to generate, minimum
operating period before Type II audit, resources needed,
priority, and target completion date.

Present as a project plan with milestones and owners.

Risk Assessment and Gap Analysis Prompts

Regulatory Risk Matrix

code
Create a regulatory risk matrix for:
Organization: [TYPE AND INDUSTRY]
Jurisdictions: [WHERE YOU OPERATE]
Activities: [DESCRIBE]

For each applicable regulation: citation, regulatory body,
applicability basis, enforcement likelihood (1-5), penalty
severity (1-5), overall risk score, trend, current compliance
level, known gaps, and priority actions.

Matrix format, then narrative prioritization.

Note: formal risk assessments should include input from counsel
familiar with current enforcement in your industry.

Compliance Gap Analysis

code
Gap analysis for [FRAMEWORK — e.g., GDPR / HIPAA / PCI DSS /
ISO 27001 / NIST CSF]:

Current state: [DESCRIBE posture]
Recent changes: [NEW PRODUCTS, MARKETS, ORG CHANGES]

For each requirement: citation, what compliance looks like,
current state, gap description, severity (critical / major /
minor), root cause (policy / process / technology / awareness),
remediation actions, evidence requirements.

Summary: total assessed, met/partial/not met, compliance %,
top 10 priorities, timeline and budget estimate.

Third-Party Risk Assessment

code
Third-party risk assessment template for [VENDOR TYPE]:

What data they access: [TYPES]
What systems they connect to: [DESCRIBE]
Applicable regulations: [LIST]
Criticality: [LOW/MEDIUM/HIGH/CRITICAL]

Assessment areas with 5-10 questions each:
1. Security posture (certs, policies, encryption, incident
   response)
2. Data handling (locations, sub-processors, retention,
   breach notification)
3. Business continuity (DR, SLAs, financial stability)
4. Regulatory compliance (status, audit reports, enforcement)
5. Contractual protections (DPA, liability, audit rights)

Scoring methodology and approval threshold.

Multi-Framework Control Mapping

code
Map controls across: [e.g., SOC 2 + GDPR + ISO 27001]

For each control domain (access control, encryption, incident
response, etc.): specific requirement from each framework,
common control satisfying all, where requirements diverge,
most stringent requirement to implement, and evidence
satisfying each framework's audit.

Matrix format. Goal: implement once, comply with many.

Note: validate mappings with professionals certified in each
framework.

Cross-Framework Compliance Prompts

Compliance Program Maturity Assessment

code
Assess compliance program maturity (5 levels: Ad Hoc,
Developing, Defined, Managed, Optimizing) across:

1. Governance  2. Risk assessment  3. Policies  4. Training
5. Monitoring  6. Incident management  7. Third-party mgmt
8. Regulatory change mgmt  9. Documentation  10. Automation

Current state: [DESCRIBE]

For each: current level with justification, realistic target
for [ORG TYPE], actions to advance one level, resources,
timeline, quick wins.

Regulatory Change Management

code
Design a regulatory change management process for
[INDUSTRY] in [JURISDICTIONS]:

1. MONITORING — sources, frequency, tools, responsible role
2. ASSESSMENT — impact determination criteria, template, who
   is involved, assessment timeline
3. IMPLEMENTATION — policy updates, technical changes,
   training, communication plan
4. DOCUMENTATION — audit trail, reporting
5. VERIFICATION — confirm implementation, testing, post-
   implementation review

Provide templates: notification form, impact worksheet,
tracking spreadsheet, leadership report.

Compliance Training Prompts

Training Needs Assessment

code
Develop a compliance training program for [ORG TYPE AND SIZE]
subject to [REGULATIONS].

For each role category (executive, manager, general staff,
IT, developer, customer-facing, new hire):
- Required training topics and regulatory mandates
- Training frequency and delivery method
- Assessment requirements
- Completion tracking for audit evidence

Priority modules based on regulatory risk. Include metrics
and KPIs for measuring program effectiveness.

Compliance Awareness Content

code
Create [FORMAT — e.g., a 10-question quiz / a one-page
reference card / a lunch-and-learn outline] on [TOPIC —
e.g., data handling best practices / phishing awareness /
GDPR data subject rights].

Audience: [ROLE TYPE] at a [COMPANY TYPE].
Tone: practical and engaging, not lecturing.
Include real-world scenarios relevant to their daily work.

The content should be audit-evidenceable — something we can
show an auditor as part of our training program documentation.

What AI Does and Does Not Do for Compliance

AI strengths

  • Framework interpretation: translating dense regulatory text into practical requirements
  • Checklist generation: comprehensive coverage of every requirement
  • Policy drafting: first drafts of policies and procedures
  • Gap identification: comparing current state against framework requirements
  • Control mapping: identifying overlaps across frameworks
  • Training content: compliance training materials and assessments

AI limitations

  • Cannot verify actual compliance: it analyzes descriptions, not your systems
  • Cannot provide legal opinions: compliance determinations require legal judgment
  • Cannot replace auditors: external auditors test controls and apply professional judgment
  • Has training cutoffs: regulations change; verify against current sources
  • Lacks your context: risk profile, architecture, and business context are essential
  • May misinterpret nuanced requirements: some regulations depend on context, enforcement history, and regulator guidance that AI may not fully capture

Building Your Compliance Prompt Library

Compliance work is repetitive — the same assessments run annually, the same policies need review, the same evidence is collected each audit. Save customized prompts in SurePrompts' Template Builder for reuse across cycles. Refine based on what auditors accept and how regulations evolve. The AI prompt generator builds custom compliance prompts for specific frameworks.

Getting Started

  • Highest-risk framework first. Gap analysis prompt against your most important regulation.
  • Map your controls. Multi-framework mapping early to avoid building duplicate controls.
  • Draft policies. Use documentation prompts, then customize to match actual practices.
  • Prepare for audit. Evidence collection and readiness prompts to fill gaps before auditors arrive.
  • Build ongoing processes. Regulatory change management and training prompts for sustainable operations.

For related guidance, see AI prompts for lawyers, AI contract analysis, and legal research with AI.

FAQ

What compliance frameworks work best with AI?

Prescriptive frameworks with enumerable controls — SOC 2 Trust Service Criteria, ISO 27001 Annex A, PCI DSS, NIST CSF — work best because AI can systematically assess against specific requirements. Principles-based frameworks like GDPR work well for documentation and assessment, though legal interpretation requires human expertise. Frameworks requiring heavy industry context benefit less from AI automation.

How do I convince leadership to invest in compliance proactively?

Use AI to generate a regulatory risk assessment showing financial exposure from non-compliance — concrete penalty ranges and enforcement trends give leadership calculable numbers. Frame investment as risk reduction: the cost of building a program versus potential penalties, litigation costs, and business disruption from a compliance failure. Reference general enforcement trends in your industry without fabricating specific cases.

Can I reuse the same prompts across different frameworks?

Many structures transfer: gap analysis, risk assessment, policy drafting, and evidence collection follow similar patterns regardless of framework. The key differences are specific requirements and terminology. Start with cross-framework control mapping to identify commonalities, then customize for each framework's unique requirements.

Try it yourself

Build expert-level prompts from plain English with SurePrompts — 350+ templates with real-time preview.

Open Prompt Builder

AI prompts built for legal professionals

Skip the trial and error. Our curated prompt collection is designed specifically for legal professionals — ready to use in seconds.

See Legal professionals Prompts