Skip to content

Manual Remediation Checklist

Current compliance state is tracked by automated verification:

doppler run -p m7-security -c prd -- python3 automation/scripts/runner.py --mode verify

Nightly verification runs via system-verify.yml at 05:00 UTC and commits results to automation/reports/status.json.


#SystemCheckResolution
1GitHuborg_2fa_requiredEnabled org-wide 2FA
2GitHubpush_protection_enabledAccepted risk — requires GHAS/Enterprise. Compensating: Claude Security Review workflow, secret scanning, Doppler-only secrets
3Slackrequired_channels#security-alerts and #incidents created, bot added
4Cloudflaressl_strict (3 zones)Bootstrap enforced Full (strict) on all zones
5Cloudflarehttps_redirect (3 zones)Bootstrap enforced Always Use HTTPS on all zones
6Cloudflarewaf_active (3 zones)WAF managed rulesets active on all zones
7Cloudflarerate_limiting (3 zones)Accepted risk — requires Pro plan. Compensating: WAF + DDoS + GCP Cloud Monitoring
8Google Workspacepassword_policyMin length 12, strong, enforce at login
9Google Workspacemfa_enforcementOrg-level 2FA enforcement enabled
10Google Workspaceorg_unit_structureEngineering, Operations, Finance, Leadership OUs created
11Google Workspacevault_accessVault API enabled, 1yr retention rules for Email/Drive/Chat
12Google Workspacemanaged_devices3 devices enrolled and approved (BYOD — company-owned only)
13Google Workspacedlp_rules_activeDLP rules configured and triggering
14Google Workspacecontext_aware_accessCEL-based CAA policy active on Admin Console and Vault
151Passwordvault_structureEvents API confirms active vaults with usage
16Supabasepitr_enabledAccepted risk — compensated by daily B2 backups + 365-day retention
17BackblazeAll checksBuckets private, lifecycle rules set, keys scoped
18DopplerAll checksProject exists, env separation (dev/stg/prd), tokens scoped
19GCP Cloud Monitoringalert_policies_enabledAlert policies configured with Slack notification channel
#SystemCheckStatusOwner
1Google Workspacemfa_enrollmentFAIL — 3 users (gavin, mihai, sara) in enrollment grace periodUsers
2Supabaserls_enforcedFAIL — 3 tables missing RLS: org_charts, org_chart_nodes, org_chart_snapshotsCTO

Formally documented in automation/config/accepted-risks.yaml. Review date: 2026-08-20.

RiskControlCompensating Controls
Supabase PITR offCC7.5Daily B2 backups, 365-day retention
GitHub push protection offCC5.3Claude Security Review workflow, secret scanning, Doppler-only secrets
Cloudflare rate limiting (3 zones)CC6.6WAF, DDoS protection, GCP Cloud Monitoring

Do not manually edit resolved items — they are confirmed by system-verify.yml.