Skip to content

Governance and Organization Policy

Defines the governance structure, authority, oversight mechanisms, and accountability framework for Meridian Seven’s information security program. Satisfies Trust Services Criteria CC1.1–CC1.5 (Control Environment).

  • Organizational structure governing security decisions
  • All personnel involved in designing, implementing, operating, and overseeing security controls
  • All systems, processes, and data in scope per the Information Security Policy
  • Relationships with external parties regarding security governance
CEO
 |
 +-- CTO (Executive Sponsor — Information Security Program)
      |
      +-- CISO (Program Owner — Security Operations & Compliance)
      |    |
      |    +-- Security awareness and training
      |    +-- Risk assessment and risk register
      |    +-- Incident response coordination
      |    +-- SOC 2 audit evidence and readiness
      |    +-- Policy development and maintenance
      |    +-- Vendor security assessments
      |
      +-- Engineering Lead (Technical Implementation)
           |
           +-- Secure development practices
           +-- Infrastructure security controls
           +-- Access provisioning and deprovisioning
           +-- Change management execution
           +-- Monitoring and alerting operations
  • CISO reports to CTO with direct CEO escalation access where CTO involvement creates a conflict
  • CISO has authority to halt production deployments or revoke access when an active security threat is identified
  • Security audit findings reported independently of the engineering function being audited
  • External SOC 2 auditors have unrestricted access to evidence, logs, and personnel during the audit period
RoleSecurity Oversight Responsibilities
CEOUltimate accountability; approves security budget; receives quarterly risk briefings
CTOExecutive sponsor; approves policies, risk appetite, and strategic initiatives; accountable to CEO for program effectiveness
CISODay-to-day program ownership; risk assessments; incident management; reports metrics and compliance status to CTO
ReportFrequencyAuthorAudienceContent
Security Metrics DashboardMonthlyCISOCTOControl pass rate, open risks, incident count, evidence status
Risk Posture BriefingQuarterlyCISOCTO, CEORisk register review, trend analysis, treatment progress
SOC 2 Readiness AssessmentQuarterlyCISOCTOGap remediation progress, audit timeline
Annual Security ReviewAnnuallyCISOCTO, CEOYear-in-review, policy changes, program maturity, strategic plan
DecisionAuthorityEscalation
Accept Low or Medium riskCISON/A
Accept High riskCTO (with CISO recommendation)CEO if CTO disagrees
Accept Critical riskCTO + CEO jointlyN/A — both must approve
Approve new security policyCTON/A
Approve policy exceptionCTO (max 90 days)CEO for extensions beyond 90 days
Approve emergency accessCTO or CISODocumented within 24 hours
Halt production deploymentCISO (unilateral)Post-action review with CTO
  • CTO delegates day-to-day security program management to the CISO
  • CISO delegates technical implementation to the Engineering Lead and team
  • Delegation does not transfer accountability — the delegator remains accountable for outcomes
  • All delegations documented in role descriptions and acknowledged by the delegate
Function AFunction BRationale
Code authorCode reviewer/approverNo self-approval (enforced via GitHub branch protection)
Access requesterAccess approverNo self-provisioning (CISO or delegate approves)
Change implementerChange approverProduction deployments require separate approval
Incident responderIncident reviewerPost-incident reviews conducted by uninvolved party
Risk assessorRisk acceptorCISO assesses; CTO accepts High/Critical
Policy authorPolicy approverCISO drafts; CTO approves

SoD violations flagged during Monthly Access Reviews and resolved within 5 business days.

  • No individual may approve their own access elevation, expense, or policy exception
  • Production database access requires approval from both CTO and CISO
  • API keys with production write access provisioned only through Doppler with audit logging
  • Emergency “break glass” procedures require post-action review within 24 hours
RoleRequired CompetenciesValidation
CISORisk management, incident response, SOC 2 / ISO 27001 frameworks, vendor assessmentCISSP, CISM, or demonstrated equivalent experience
Engineering LeadSecure coding, infrastructure security, cloud security, identity managementCode review quality and architecture decisions
EngineersOWASP Top 10, secure SDLC, dependency management, secret handlingSecurity awareness training; code review participation
All PersonnelPhishing identification, password hygiene, data classification, incident reportingSecurity awareness training completion
TrainingAudienceFrequencyDeadline
Security awareness onboardingNew hiresWithin 30 days of startMandatory
Annual security awareness refresherAll personnelAnnuallyEnd of Q1
Secure development trainingEngineering teamAnnuallyEnd of Q1
Incident response tabletop exerciseCISO, Engineering Lead, on-callAnnuallyPer Incident Response Plan
Policy review acknowledgmentAll personnelUpon policy updateWithin 14 days

Non-completion escalated to CTO after deadline.

  • Security responsibilities included in all role descriptions
  • Incident handling quality considered in engineering performance reviews
  • Repeated failure to complete training or follow security procedures addressed per the Information Security Policy

7.1 Regulatory and Contractual Obligations

Section titled “7.1 Regulatory and Contractual Obligations”
RequirementApplicabilityMonitoring Mechanism
SOC 2 Type IICustomer contractual requirementAnnual audit; continuous compliance automation
GDPREU customer data processingData Classification Policy; DPA with sub-processors
CCPA/CPRACalifornia resident dataData Classification Policy; privacy notice; data subject request procedures
Customer contractsSecurity requirements in MSAs and DPAsVendor Management Policy; contract review by CISO
PCI DSSNot applicable — Stripe handles all payment processing (PCI Level 1 certified)N/A
  • CISO monitors regulatory changes via legal counsel advisories, industry associations, and customer notifications
  • Material changes trigger a targeted risk assessment within 30 days
  • Required policy updates implemented within 90 days
  • Customer security inquiries directed to the CISO
  • SOC 2 reports provided to customers under NDA upon request
  • Security incidents affecting customers communicated per Incident Response Plan notification procedures
  • Regulatory notifications managed by CISO with legal counsel
PolicyPrimary CC Coverage
Governance and Organization Policy (this document)CC1.1–CC1.5, CC2.1–CC2.3
Information Security PolicyCC1.1–CC1.3, CC4.1
Risk Management PolicyCC3.1–CC3.4, CC9.1–CC9.2
Access Control PolicyCC6.1–CC6.3, CC6.5
Change Management PolicyCC8.1
Incident Response PlanCC7.2–CC7.4
Backup and Recovery PolicyCC7.1, CC7.5
Data Classification PolicyCC6.7
Vendor Management PolicyCC9.1–CC9.2
Acceptable Use PolicyCC5.3, CC6.1, CC6.4
Segregation of Duties MatrixCC5.1–CC5.2
  1. Draft — CISO drafts or revises based on risk assessment, regulatory requirements, or operational needs
  2. Review — Reviewer evaluates for completeness, accuracy, and alignment
  3. Approval — CTO approves via pull request review in m7-security repository
  4. Publication — Merged to main and published via Git release with generated PDF
  5. Communication — Personnel notified and acknowledge receipt
  6. Review — Annual review; ad-hoc review upon triggering events
  • Exceptions requested in writing (GitHub issue in m7-security)
  • CTO approval required with documented business justification
  • All exceptions time-limited (maximum 90 days) with a defined remediation plan
  • Active exceptions reviewed at each quarterly risk posture briefing
  • Expired, unremediated exceptions treated as policy violations

Annual review or upon significant organizational, business, or regulatory changes. CISO initiates; CTO approves all substantive changes.

  • Information Security Policy
  • Risk Management Policy
  • Access Control Policy
  • Change Management Policy
  • Incident Response Plan
  • Data Classification Policy
  • Vendor Management Policy
  • Acceptable Use Policy
  • Backup and Recovery Policy

Meridian Seven — Confidential