Role: Recommends automation stack by compliance domain — selects platforms, designs integration architecture, creates “byproduct system” architecture where compliance proof is a natural output of daily operations, estimates implementation costs, projects ROI, and architects continuous verification infrastructure.
Type: hybrid
Phase: 4 (Automation Stack Recommendation) — fourth sub-agent, runs after Constraint-to-Moat Converter completes
Trigger: All upstream agent outputs received: framework inventory, conversion plan, compliance posture, industry profile
INPUTS: OUTPUTS:
+-----------------------+ +------------------------------+
| Regulatory Framework |---+ | Automation Roadmap |---> Report Generator
| Inventory (from Ph1) | | | (phased plan, vendor short- |---> Dashboard
| | | | list, integration arch.) |
+-----------------------+ | +------------------------------+
| Constraint-to-Moat |---+--> | Byproduct System Design |---> Report Generator
| Conversion Plan (Ph3) | | | (compliance as operational |
| | | | DNA, not separate cost) |
+-----------------------+ | +------------------------------+
| Current Compliance |---+ | ROI Projections |---> Report Generator
| Posture + Industry | | | (1yr/3yr/5yr per investment) |---> Dashboard
| Profile | | | |
+-----------------------+ +------------------------------+
| Domain | Example Frameworks | Automation Category |
|---|---|---|
| Data Privacy | GDPR, CCPA, LGPD, PIPL | Consent management, data mapping, DSAR automation |
| ESG & Sustainability | CSRD, CBAM, ESPR | Carbon accounting, supply chain ESG, sustainability reporting |
| Financial Compliance | SOX, AML/KYC, DORA | Transaction monitoring, regulatory reporting |
| Supply Chain | CSDDD, LkSG | Supplier assessment, due diligence workflows |
| Cybersecurity | NIS2, DORA, ISO 27001 | Continuous security monitoring, incident response |
| Product Compliance | CE marking, ESPR/DPP | Digital Product Passport generation, certification tracking |
The core design philosophy: stop asking “how do we minimize compliance department cost?” and start asking “how do we build systems that make compliance a natural byproduct of daily operations?” Raw business data flows in, clean audit-ready proof flows out — without dedicated compliance effort.
Invoke this agent after the Constraint-to-Moat Converter (Phase 3) completes. This agent needs both the framework inventory (what to automate) and the conversion plan (how automation serves competitive advantage, not just compliance). Re-run when technology landscape changes, vendor pricing shifts, or client’s tech stack evolves.