Security
Meridian7 maintains a comprehensive security program aligned with SOC 2 Type II requirements. All documents below are synced from the governed m7-security repository.
Policies
Section titled “Policies”| Document | Last Reviewed | Classification | |
|---|---|---|---|
| Acceptable Use Policy | 2026-02-24 | Internal | Download |
| Access Control Policy | 2026-02-24 | Internal | Download |
| BYOD Endpoint Security Policy | 2026-03-05 | Internal | Download |
| Backup and Recovery Policy | 2026-02-18 | Internal | Download |
| Change Management Policy | 2026-02-18 | Internal | Download |
| Data Classification Policy | 2026-02-24 | Internal | Download |
| Governance and Organization Policy | 2026-02-19 | Internal | Download |
| Incident Response Plan | 2026-02-21 | Internal | Download |
| Information Security Policy | 2026-02-24 | Internal | Download |
| Risk Management Policy | 2026-02-19 | Internal | Download |
| Segregation of Duties Matrix | 2026-02-20 | Internal | Download |
| Vendor Management Policy | 2026-02-18 | Internal | Download |
Procedures
Section titled “Procedures”| Document | Last Reviewed | Classification | |
|---|---|---|---|
| Access Review Procedure | 2026-02-21 | Internal | Download |
| Change Management Runbook | 2026-02-20 | Internal | — |
| Incident Response Runbook | 2026-02-21 | Internal | Download |
| SOC 2 Operations Runbook | 2026-02-21 | Internal | Download |
| Policy Update Procedure | 2026-02-18 | Internal | Download |
| SOC 2 Type II Implementation Plan | 2026-02-21 | Internal | — |
Guides
Section titled “Guides”| Document | Last Reviewed | Classification | |
|---|---|---|---|
| Architecture Diagram Description | 2026-02-21 | Internal | — |
| Device Setup Guide | 2026-02-24 | Internal | — |
| Incident Response Process | 2026-02-21 | Confidential | — |
| Manual Remediation Checklist | 2026-02-21 | Internal | — |
| Monthly Access Review | 2026-02-21 | Internal | — |
| Offboarding Process | 2026-02-21 | Internal | — |
| Onboarding Process | 2026-03-06 | Internal | — |
| Policy Author Quick Start | 2026-02-20 | Internal | — |
| Vendor Register | 2026-02-21 | Internal | — |
| Vulnerability Management Process | 2026-02-21 | Confidential | — |
| Weekly Security Review | 2026-02-21 | Internal | — |
| Welcome Email Template | 2026-03-06 | Internal | — |