Skip to content

Information Security Policy

Defines the framework for protecting the confidentiality, integrity, and availability of all information assets owned, controlled, or processed by Meridian Seven. Establishes security objectives, organizational responsibilities, and acceptable use standards governing employees, contractors, and third parties.

  • All employees, contractors, temporary staff, and third-party service providers
  • All systems, applications, and infrastructure that store, process, or transmit customer data
  • All devices used to access Meridian Seven systems (Meridian Seven operates a BYOD model; see BYOD Endpoint Security Policy)
  • All environments: production, staging, development, and disaster recovery

Systems In Scope:

  • Web Application: Next.js frontend and BFF API routes (GCP Cloud Run)
  • Agent Services: Python FastAPI agent service (GCP Cloud Run)
  • Database: PostgreSQL (Supabase)
  • Identity & Access: Google Workspace Enterprise Standard (IdP, MFA, MDM, DLP), Supabase Auth (application auth, OAuth, email/password), 1Password Business (credential management), Doppler (secrets)
  • Source Control: GitHub
  • Communication: Google Workspace, Slack
  • Monitoring: GCP Cloud Monitoring (uptime checks, alerting, notification channels), CrowdStrike (EDR)
  1. Confidentiality — Information accessible only to authorized individuals and systems
  2. Integrity — Accuracy and completeness of information and processing methods safeguarded
  3. Availability — Authorized users have reliable, timely access to information and assets
  4. Compliance — All applicable legal, regulatory, and contractual requirements met, including SOC 2 Type II
  5. Continuous Improvement — Controls regularly assessed and improved based on evolving threats
RoleResponsibilities
CTOExecutive sponsor; approves security budgets, staffing, and strategic initiatives; approves all policies annually
CISOOwns and maintains all policies and procedures; conducts risk assessments; manages incident response; reports security metrics to CTO; coordinates SOC 2 audit
Data OwnersClassify data per Data Classification Policy; approve access requests; report data-related incidents
Engineering TeamImplement security controls; follow Change Management Policy; report vulnerabilities; complete security training; maintain secure development practices
All PersonnelComply with all policies; protect credentials; report incidents and suspicious activity
  • Company systems and data used for authorized business purposes only
  • Users must not bypass or disable security controls
  • Users must not share credentials, tokens, or authentication secrets
  • Users must lock workstations when unattended
  • Users must not store company data on unauthorized personal devices or cloud services
  • Company email and Slack must not transmit Restricted or Confidential data without encryption; no automated forwarding to external addresses
  • Remote access to production requires a device meeting BYOD Endpoint Security Policy requirements (CrowdStrike, disk encryption, screen lock, MFA); WPA2/WPA3 home network required
  • Only approved software on company devices; no disabling CrowdStrike; no personal software or file storage

Compliance monitored through access reviews, endpoint management, and audit logging. Automated alerts configured for violations where technically feasible.

SeverityAction
First offense (minor)Verbal warning and mandatory re-training
Second offense (minor) / First offense (moderate)Written warning in personnel file
Repeated / serious offensesSuspension of access and formal disciplinary review
Willful or gross violationsTermination; legal action where applicable

Severity classification is at the CISO’s discretion in consultation with legal counsel. All personnel may report violations to the CISO or CTO without fear of retaliation.

All personnel must complete security awareness training within 30 days of hire and annually thereafter. Training covers: phishing and social engineering, password hygiene, data classification and handling, incident reporting, acceptable use, and device security.

Training completions are tracked in automation/config/training-log.yaml and reviewed during quarterly risk reviews. The CISO is responsible for maintaining training content and ensuring completion.

Annual review or upon significant changes to business, technology, or threat environment. CISO initiates; CTO approves all substantive changes.

Meridian Seven maintains the following data security commitments for all customer data:

ControlImplementation
Encryption at restAll customer data encrypted with AES-256. Sensitive credentials encrypted with AES-256-GCM via Doppler.
Encryption in transitTLS 1.2+ enforced on all communication channels. Cloudflare SSL strict mode for public endpoints.
Network isolationInternal services communicate over isolated private networks (GCP VPC networking) with no direct public internet exposure. All external access routed through Cloudflare Tunnels.
Tenant isolationPostgreSQL Row-Level Security enforces tenant data isolation at the database engine level. Isolation is not dependent on application logic. No client-initiated query path can access another organization’s records.
Third-party data sharingNo customer data shared with third parties without explicit written consent. Vendors processing data require a Data Processing Agreement (DPA).
Credential managementAll secrets managed through Doppler. No credentials in source code, environment files, or application configuration.
Access controlInternal access restricted to authorized personnel on a need-to-know basis per the Access Control Policy.
Incident notificationSecurity incident notification to affected customers within 72 hours of confirmed breach.
Data deletionCustomer data deleted within 30 days of written request, including database records, graph entities, embeddings, and backup copies within the retention window.
  • Governance and Organization Policy
  • Risk Management Policy
  • Access Control Policy
  • Incident Response Plan
  • Change Management Policy
  • Data Classification Policy
  • Acceptable Use Policy
  • BYOD Endpoint Security Policy
  • Vendor Management Policy
  • Backup and Recovery Policy

All personnel must acknowledge this policy within 30 days of hire and annually thereafter. Acknowledgment records maintained by the CISO and available for audit.


Meridian Seven — Confidential