Skip to content

Risk Management Policy

Defines the framework for identifying, assessing, treating, and monitoring information security risks at Meridian Seven. Satisfies Trust Services Criteria CC3.1–CC3.4 (Risk Assessment) and CC9.1–CC9.2 (Risk Mitigation).

  • All systems, applications, and infrastructure in the Information Security Policy
  • All business processes that create, store, process, or transmit customer or company data
  • All employees, contractors, and third-party service providers
  • All environments: production, staging, development, and disaster recovery
RoleResponsibility
CTOApproves risk appetite and tolerance; accepts/rejects risks exceeding CISO authority; quarterly risk review
CISOOwns risk management program; conducts assessments; maintains risk register; reports posture to leadership
Engineering LeadIdentifies and reports technical risks; implements assigned treatment actions; validates remediation
Data OwnersIdentify data-related risks; participate in assessments for owned systems
All PersonnelReport potential risks, threats, and vulnerabilities to the CISO

Meridian Seven has a low risk appetite for threats to customer data confidentiality, system integrity, and service availability:

  • No risk of unencrypted customer data at rest or in transit
  • No risk of production access without MFA
  • Low risk for service unavailability (target: 99.9% uptime)
  • Moderate risk for non-production disruptions that do not affect customer data

Risk acceptance exceeding these thresholds requires written CTO approval.

TypeFrequencyTrigger
ComprehensiveAnnuallyQ1 calendar-driven
TargetedAs neededNew system, significant architecture change, incident, or regulatory change
Continuous monitoringOngoingAutomated via compliance verification framework

Threat categories:

  1. External — Unauthorized access, malware, phishing, supply chain compromise, DDoS
  2. Internal — Insider misuse, accidental data exposure, misconfiguration, credential compromise
  3. Environmental — Cloud provider outages, third-party failures, natural disasters
  4. Compliance — Regulatory changes, contractual changes, audit findings
  5. Operational — Key person dependency, process failures, inadequate change management
  6. Fraud (CC3.3) — Management override of controls, unauthorized data exfiltration, misrepresentation of compliance posture

Fraud risk is explicitly assessed during each risk assessment cycle. Fraud risks are documented in the risk register (automation/config/risk-register.yaml) with specific mitigation actions including segregation of duties, audit logging, automated compliance verification, and DLP controls.

Sources: automated compliance results (automation/reports/status.json), GCP Cloud Monitoring alert data, CrowdStrike alerts, Dependabot/secret scanning alerts, vendor SOC reports, CISA advisories, OWASP Top 10, internal post-mortems.

Likelihood:

ScoreRatingDefinition
1RareLess than once per year
2UnlikelyOnce per year; occurred in similar organizations
3PossibleOnce per quarter; known industry trend
4LikelyOnce per month; active threat with demonstrated capability
5Almost CertainWeekly or more; ongoing active exploitation

Impact:

ScoreRatingDefinition
1NegligibleNo customer impact; internal inconvenience only
2MinorLimited disruption; no data exposure; resolved within SLA
3ModerateCustomer-facing service degradation; potential compliance finding
4MajorData breach affecting limited customers; regulatory notification required
5CriticalLarge-scale breach; extended outage; material business impact; legal action

Risk Rating = Likelihood × Impact:

RatingScoreTreatment Required
Critical16–25Immediate remediation; CTO approval to accept
High10–15Remediation within 30 days; CTO approval required to accept
Medium5–9Remediation within 90 days; tracked in risk register
Low1–4Accept or remediate opportunistically; reviewed annually
StrategyDescriptionWhen to Use
MitigateImplement controls to reduce likelihood or impactRisk is within organizational capability to address
TransferShift risk to a third party (insurance, vendor SLA)Risk is better managed by a specialized party
AcceptAcknowledge and monitor without further actionResidual risk is within appetite after analysis
AvoidEliminate the activity or system creating the riskRisk exceeds appetite and cannot be adequately mitigated

Risk acceptance requires documented justification, CISO approval (Medium and below) or CTO approval (High and Critical), and a defined review date (max 12 months). Accepted risks are recorded in the risk register (automation/config/risk-register.yaml).

Maintained at automation/config/risk-register.yaml. Each entry contains:

FieldDescription
idUnique identifier (RISK-001, RISK-002, …)
titleBrief description
categoryexternal / internal / environmental / compliance / operational
cc_controlsApplicable TSC codes
likelihoodScore 1–5
impactScore 1–5
ratingCritical / High / Medium / Low
treatmentMitigate / Transfer / Accept / Avoid
ownerPerson responsible for treatment
mitigation_actionsSpecific reduction actions
statusOpen / In Progress / Mitigated / Accepted
target_dateTreatment completion date
review_dateNext review date
notesAdditional context or justification
  • CISO updates register after each assessment
  • New risks added within 5 business days of identification
  • Closed or mitigated risks retained for audit trail
  • Full register reviewed at each quarterly risk review
SystemRisk SignalFrequency
Compliance verification frameworkControl failures (FAIL/ERROR/WARN)Nightly
CrowdStrike FalconEndpoint threats and detectionsReal-time
GCP Cloud MonitoringService availability and uptime checksReal-time
GitHub DependabotDependency vulnerabilitiesOn push
GitHub Secret ScanningExposed credentials in codeOn push
Claude Security ReviewAI-powered security reviewOn PR
CloudflareWAF events and rate limitingReal-time
ReportAudienceFrequencyContent
Weekly Security ReviewCISO, EngineeringWeeklyNew risks, control failures, incident summary
Risk Posture SummaryCTOQuarterlyRegister status, trend analysis, treatment progress
Annual Risk Assessment ReportCTO, BoardAnnuallyComprehensive risk landscape, year-over-year comparison

Escalate when:

  • A new Critical-rated risk is identified
  • A treatment action misses its target date by more than 30 days
  • An accepted risk’s conditions change materially
  • Multiple related Medium risks collectively represent High or Critical exposure

Escalation path: Engineering Lead → CISO → CTO.

ProcessIntegration Point
Incident ResponsePost-incident risk assessment; register updates after incidents
Change ManagementRisk evaluation for significant changes; new system risk assessment
Vendor ManagementThird-party risk assessment during onboarding and annual review
Access ControlRisk-based access decisions; privileged access risk tracking
Business ContinuityRecovery priority based on risk rating; DR testing informed by risk assessment

Annual review or upon significant changes to business, technology, or threat environment. CISO initiates; CTO approves all substantive changes.

  • Information Security Policy
  • Incident Response Plan
  • Change Management Policy
  • Vendor Management Policy
  • Backup and Recovery Policy
  • Access Control Policy
  • Data Classification Policy

Meridian Seven — Confidential