Skip to content

Vendor Management Policy

Defines requirements for evaluating, onboarding, monitoring, and offboarding third-party vendors that process, store, or access Meridian Seven data or systems.

All third-party vendors, service providers, and contractors that:

  • Process or store Meridian Seven or customer data
  • Have access to Meridian Seven systems or infrastructure
  • Provide services critical to business operations
  • Handle Confidential or Restricted data per the Data Classification Policy
TierCriteriaExamplesReview Frequency
CriticalProcesses customer data, core infrastructure, or single point of failureSupabase, Google Cloud (Cloud Run, Cloud Monitoring), Cloudflare, Google Workspace, CrowdStrike, Supabase AuthQuarterly
StandardAccesses internal data, supports development/operations, not a single point of failureGitHub, 1Password, Doppler, Slack, GCP Cloud Monitoring, Backblaze, AnthropicAnnually
Low-RiskNo sensitive data access; easily replaceable; limited scopeAnalytics tools, design tools, documentation platformsAnnually

Categorization factors: data access level, system access, criticality, replaceability, data residency.

The CISO maintains a Vendor Register listing all active vendors. Each entry includes: vendor name, service, data classification handled, SOC 2 status, risk tier, last review date, and contract renewal date. The register is updated whenever a vendor is added, removed, or changed.

CriterionCriticalStandardLow-Risk
SOC 2 Type II reportRequiredRequiredPreferred
Security questionnaireRequiredRequiredNot required
Penetration test resultsRequiredPreferredNot required
Data encryption (transit + rest)RequiredRequiredRequired (transit)
MFA supportRequiredRequiredPreferred
Incident notification SLARequiredRequiredNot required
Business continuity planRequiredPreferredNot required
Data residency documentationRequiredRequiredNot required

Before onboarding, document: what data the vendor accesses, its classification, storage location, transmission encryption, retention policy, and destruction procedure at relationship end.

SOC 2 Type II reports collected annually for all Critical and Standard tier vendors. CISO reviews for: qualified/adverse opinions, auditor exceptions, Complementary User Entity Controls (CUECs) Meridian Seven must implement, and coverage period alignment.

If a vendor has no SOC 2, obtain alternative evidence: ISO 27001 certification, completed SIG questionnaire, or independent penetration test results. Collection status and findings tracked in the Vendor Register.

Before granting access to any Meridian Seven systems or data:

  • Risk tier assigned
  • Security assessment completed per Section 5
  • SOC 2 report or alternative evidence obtained and reviewed
  • Data Processing Agreement (DPA) executed if vendor processes personal data
  • Service agreement reviewed for: breach notification (≤72 hours), data handling/deletion obligations, audit rights, subprocessor notification, liability and indemnification
  • Access provisioned using least-privilege principle
  • Vendor added to Vendor Register
  • Review date scheduled per risk tier

CISO conducts reviews per cadence in Section 3:

  1. Collect current SOC 2 report or alternative evidence
  2. Review security incidents involving the vendor in the past year
  3. Assess whether risk tier has changed
  4. Verify contractual security obligations are being met
  5. Confirm data access is still necessary and appropriate
  6. Update Vendor Register with review date and findings
OutcomeAction
SatisfactoryUpdate review date; continue relationship
Concerns identifiedDocument concerns; request remediation plan; schedule follow-up
Unacceptable riskEscalate to CTO; initiate vendor replacement planning

A DPA must be in place with any vendor processing personal data on behalf of Meridian Seven or its customers. DPAs must address: processing scope, data categories, retention, security measures, subprocessors, breach notification, data subject rights, and data deletion. DPAs reviewed and updated when vendor relationships or processing activities change.

When a vendor relationship ends:

  1. Revoke all system access within 24 hours
  2. Rotate any shared credentials or API keys
  3. Request written confirmation of data deletion
  4. Update Vendor Register to reflect termination
  5. Archive vendor documentation for the retention period
  • Vendor Register
  • Data Classification Policy
  • Information Security Policy
  • Access Control Policy

Meridian Seven — Confidential