@open-agreements/open-agreements 0.2.0 → 0.2.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +10 -2
- package/content/templates/closing-checklist/metadata.yaml +6 -13
- package/content/templates/closing-checklist/template.docx +0 -0
- package/dist/cli/index.d.ts.map +1 -1
- package/dist/cli/index.js +47 -10
- package/dist/cli/index.js.map +1 -1
- package/dist/commands/checklist.d.ts +21 -1
- package/dist/commands/checklist.d.ts.map +1 -1
- package/dist/commands/checklist.js +175 -44
- package/dist/commands/checklist.js.map +1 -1
- package/dist/commands/recipe.js +3 -11
- package/dist/commands/recipe.js.map +1 -1
- package/dist/core/checklist/index.d.ts +22 -14
- package/dist/core/checklist/index.d.ts.map +1 -1
- package/dist/core/checklist/index.js +79 -39
- package/dist/core/checklist/index.js.map +1 -1
- package/dist/core/checklist/jsonl-stores.d.ts +3 -0
- package/dist/core/checklist/jsonl-stores.d.ts.map +1 -0
- package/dist/core/checklist/jsonl-stores.js +16 -0
- package/dist/core/checklist/jsonl-stores.js.map +1 -0
- package/dist/core/checklist/schemas.d.ts +2 -2
- package/dist/core/checklist/schemas.js +1 -1
- package/dist/core/checklist/schemas.js.map +1 -1
- package/dist/core/checklist/state-manager.d.ts +146 -0
- package/dist/core/checklist/state-manager.d.ts.map +1 -0
- package/dist/core/checklist/state-manager.js +147 -0
- package/dist/core/checklist/state-manager.js.map +1 -0
- package/dist/core/checklist/status-labels.d.ts +6 -0
- package/dist/core/checklist/status-labels.d.ts.map +1 -0
- package/dist/core/checklist/status-labels.js +29 -0
- package/dist/core/checklist/status-labels.js.map +1 -0
- package/dist/core/validation/recipe.d.ts.map +1 -1
- package/dist/core/validation/recipe.js +47 -61
- package/dist/core/validation/recipe.js.map +1 -1
- package/package.json +1 -1
- package/skills/cloud-service-agreement/SKILL.md +9 -0
- package/skills/data-privacy-agreement/SKILL.md +9 -0
- package/skills/edit-docx-agreement/CONNECTORS.md +20 -0
- package/skills/edit-docx-agreement/SKILL.md +77 -0
- package/skills/employment-contract/SKILL.md +9 -0
- package/skills/iso-27001-evidence-collection/CONNECTORS.md +23 -0
- package/skills/iso-27001-evidence-collection/SKILL.md +300 -0
- package/skills/iso-27001-evidence-collection/rules/api-exports.md +191 -0
- package/skills/iso-27001-evidence-collection/rules/evidence-types.md +107 -0
- package/skills/iso-27001-evidence-collection/rules/screenshot-guide.md +77 -0
- package/skills/iso-27001-internal-audit/CONNECTORS.md +23 -0
- package/skills/iso-27001-internal-audit/SKILL.md +272 -0
- package/skills/iso-27001-internal-audit/rules/access-control.md +191 -0
- package/skills/iso-27001-internal-audit/rules/business-continuity.md +94 -0
- package/skills/iso-27001-internal-audit/rules/change-management.md +211 -0
- package/skills/iso-27001-internal-audit/rules/encryption.md +93 -0
- package/skills/iso-27001-internal-audit/rules/incident-response.md +127 -0
- package/skills/iso-27001-internal-audit/rules/isms-management.md +164 -0
- package/skills/iso-27001-internal-audit/rules/logging-monitoring.md +96 -0
- package/skills/iso-27001-internal-audit/rules/people-controls.md +161 -0
- package/skills/iso-27001-internal-audit/rules/supplier-management.md +92 -0
- package/skills/nda/SKILL.md +9 -0
- package/skills/open-agreements/SKILL.md +9 -0
- package/skills/safe/SKILL.md +9 -0
- package/skills/services-agreement/SKILL.md +9 -0
- package/skills/soc2-readiness/CONNECTORS.md +23 -0
- package/skills/soc2-readiness/SKILL.md +289 -0
- package/skills/soc2-readiness/rules/trust-services.md +230 -0
- package/skills/venture-financing/SKILL.md +9 -0
|
@@ -0,0 +1,96 @@
|
|
|
1
|
+
# Logging and Monitoring Rules
|
|
2
|
+
|
|
3
|
+
Per-control audit guidance for audit trails, log management, and security monitoring.
|
|
4
|
+
|
|
5
|
+
## A.8.15 — Logging
|
|
6
|
+
|
|
7
|
+
**Tier**: Critical | **NIST**: AU-1, AU-2, AU-3, AU-4, AU-5, AU-6, AU-9, AU-11, AU-12, SI-4
|
|
8
|
+
|
|
9
|
+
Produce, store, and protect logs that record activities, exceptions, faults, and security-relevant events. Logs should be centralized, tamper-evident, and retained for an adequate period.
|
|
10
|
+
|
|
11
|
+
**Auditor hints**:
|
|
12
|
+
- Auditors check FIVE things: (1) what is logged, (2) where logs go, (3) how long retained, (4) who can access/modify, (5) are they reviewed
|
|
13
|
+
- "We use CloudWatch/Stackdriver" is only half the answer — auditors want to know WHAT events trigger alerts
|
|
14
|
+
- Minimum logging: authentication events (success + failure), privilege escalation, data access, configuration changes, admin actions
|
|
15
|
+
- Log retention: 12 months minimum for ISO, 1 year for SOC 2 (some regulated industries: 7 years)
|
|
16
|
+
- Tamper protection: logs should be write-once or stored in a separate account with restricted access
|
|
17
|
+
|
|
18
|
+
**Evidence collection**:
|
|
19
|
+
```bash
|
|
20
|
+
# GCP: check audit logging configuration
|
|
21
|
+
gcloud projects get-iam-policy {project} --format=json | jq '.auditConfigs'
|
|
22
|
+
|
|
23
|
+
# GCP: list log sinks (centralization)
|
|
24
|
+
gcloud logging sinks list --format=json
|
|
25
|
+
|
|
26
|
+
# Azure: check diagnostic settings
|
|
27
|
+
az monitor diagnostic-settings list --resource {resource_id} --output json
|
|
28
|
+
|
|
29
|
+
# GitHub: audit log (org)
|
|
30
|
+
gh api orgs/{org}/audit-log?per_page=5 | jq '.[0:3]'
|
|
31
|
+
|
|
32
|
+
# AWS: CloudTrail status
|
|
33
|
+
# aws cloudtrail describe-trails --output json
|
|
34
|
+
# aws cloudtrail get-trail-status --name {trail_name}
|
|
35
|
+
```
|
|
36
|
+
|
|
37
|
+
**Startup pitfalls**:
|
|
38
|
+
- Logging enabled but never reviewed — logs without monitoring are just storage costs
|
|
39
|
+
- Log retention too short — default cloud retention is often 30-90 days, auditors want 12 months
|
|
40
|
+
- No centralization — logs scattered across services with no single pane of glass
|
|
41
|
+
- Sensitive data in logs — PII, passwords, tokens appearing in debug logs
|
|
42
|
+
|
|
43
|
+
---
|
|
44
|
+
|
|
45
|
+
## A.8.16 — Monitoring Activities
|
|
46
|
+
|
|
47
|
+
**Tier**: Critical | **NIST**: AU-6, CA-7, SI-4
|
|
48
|
+
|
|
49
|
+
Monitor networks, systems, and applications for anomalous behavior. Define what "anomalous" means for your environment and configure alerts accordingly.
|
|
50
|
+
|
|
51
|
+
**Auditor hints**:
|
|
52
|
+
- Auditors distinguish between LOGGING (passive) and MONITORING (active) — you need both
|
|
53
|
+
- They'll ask: "Show me your alert configuration" and "When was the last alert triggered?"
|
|
54
|
+
- If zero alerts have fired in the audit period, either monitoring is too loose or the environment is unusually quiet — auditors will probe which
|
|
55
|
+
- Monitoring should cover: failed authentication (brute force), privilege escalation, unusual data access patterns, configuration changes
|
|
56
|
+
- Response to alerts must be documented — "we saw the alert and investigated" needs a ticket or log entry
|
|
57
|
+
|
|
58
|
+
**Evidence collection**:
|
|
59
|
+
```bash
|
|
60
|
+
# GCP: alerting policies
|
|
61
|
+
gcloud monitoring policies list --format=json | jq '.[].displayName'
|
|
62
|
+
|
|
63
|
+
# Azure: alert rules
|
|
64
|
+
az monitor alert list --output json | jq '.[].{name, enabled, severity}'
|
|
65
|
+
|
|
66
|
+
# PagerDuty / Opsgenie: recent incidents
|
|
67
|
+
# curl -H "Authorization: Token token={key}" https://api.pagerduty.com/incidents?limit=5
|
|
68
|
+
```
|
|
69
|
+
|
|
70
|
+
---
|
|
71
|
+
|
|
72
|
+
## A.8.17 — Clock Synchronization
|
|
73
|
+
|
|
74
|
+
**Tier**: Relevant | **NIST**: AU-8
|
|
75
|
+
|
|
76
|
+
Synchronize clocks of all information processing systems to an approved time source. Consistent timestamps across systems are essential for incident investigation and evidence correlation.
|
|
77
|
+
|
|
78
|
+
**Auditor hints**:
|
|
79
|
+
- Cloud services handle this automatically (NTP synced) — auditors mainly check that you haven't overridden it
|
|
80
|
+
- On-premises servers or VMs need explicit NTP configuration
|
|
81
|
+
- Timestamps in logs should use UTC and ISO 8601 format for consistency
|
|
82
|
+
- If evidence timestamps from different systems don't align, auditors will question the integrity
|
|
83
|
+
|
|
84
|
+
**Evidence collection**:
|
|
85
|
+
```bash
|
|
86
|
+
# macOS: NTP status
|
|
87
|
+
sntp -d time.apple.com 2>&1 | head -5
|
|
88
|
+
|
|
89
|
+
# Linux: NTP sync status
|
|
90
|
+
timedatectl status | grep -E "NTP|synchronized"
|
|
91
|
+
|
|
92
|
+
# Docker containers: clock is synced with host (usually fine)
|
|
93
|
+
|
|
94
|
+
# GCP: instance time sync (automatic for Compute Engine)
|
|
95
|
+
# Azure: VM time sync (automatic for Azure VMs)
|
|
96
|
+
```
|
|
@@ -0,0 +1,161 @@
|
|
|
1
|
+
# People Controls Rules
|
|
2
|
+
|
|
3
|
+
Per-control audit guidance for HR security lifecycle.
|
|
4
|
+
|
|
5
|
+
## A.6.1 — Screening
|
|
6
|
+
|
|
7
|
+
**Tier**: Critical | **NIST**: PS-1, PS-2, PS-3
|
|
8
|
+
|
|
9
|
+
Conduct background verification checks on all candidates before employment, proportionate to the role's access to sensitive information. Re-screen at defined intervals for high-risk roles.
|
|
10
|
+
|
|
11
|
+
**Auditor hints**:
|
|
12
|
+
- Auditors sample employee files to verify background checks were completed BEFORE start date
|
|
13
|
+
- For startups: at minimum, verify identity and right to work; criminal background checks for roles with data access
|
|
14
|
+
- Contractor/vendor screening is often missed — if they access your systems, they need screening too
|
|
15
|
+
- Re-screening is recommended but not always required — document your policy either way
|
|
16
|
+
- International hires need jurisdiction-appropriate screening
|
|
17
|
+
|
|
18
|
+
**Evidence collection**:
|
|
19
|
+
- HR records showing background check completion dates vs. start dates
|
|
20
|
+
- Background check provider contract/agreement
|
|
21
|
+
- Screening policy document defining scope per role type
|
|
22
|
+
|
|
23
|
+
---
|
|
24
|
+
|
|
25
|
+
## A.6.2 — Terms and Conditions of Employment
|
|
26
|
+
|
|
27
|
+
**Tier**: Critical | **NIST**: PS-6
|
|
28
|
+
|
|
29
|
+
Employment agreements should include information security responsibilities, including confidentiality obligations, acceptable use, and consequences for non-compliance. These apply during and after employment.
|
|
30
|
+
|
|
31
|
+
**Auditor hints**:
|
|
32
|
+
- Auditors check that EVERY employee has a signed agreement with security clauses — even founders
|
|
33
|
+
- The agreement must cover: confidentiality, IP assignment, acceptable use, and post-termination obligations
|
|
34
|
+
- Contractors need equivalent agreements (often separate NDAs)
|
|
35
|
+
- Auditors sample 3-5 employee files to verify signatures exist
|
|
36
|
+
|
|
37
|
+
**Evidence collection**:
|
|
38
|
+
- Template employment agreement (showing security clauses)
|
|
39
|
+
- Sample of signed agreements (redacted as needed)
|
|
40
|
+
- Contractor NDA/security agreement template
|
|
41
|
+
|
|
42
|
+
---
|
|
43
|
+
|
|
44
|
+
## A.6.3 — Information Security Awareness, Education, and Training
|
|
45
|
+
|
|
46
|
+
**Tier**: Relevant | **NIST**: AT-1, AT-2
|
|
47
|
+
|
|
48
|
+
Ensure all personnel receive appropriate security awareness training at onboarding and regular intervals. Training should cover the organization's security policies, incident reporting, and role-specific threats.
|
|
49
|
+
|
|
50
|
+
**Auditor hints**:
|
|
51
|
+
- Auditors want COMPLETION RECORDS, not just "we have a training program"
|
|
52
|
+
- Annual refresher training is the minimum expected cadence
|
|
53
|
+
- Phishing simulation results count as evidence of awareness training effectiveness
|
|
54
|
+
- Role-specific training (developers get secure coding, admins get privilege management) earns extra credit
|
|
55
|
+
- New hire training should happen within first 30 days — auditors check dates
|
|
56
|
+
|
|
57
|
+
**Evidence collection**:
|
|
58
|
+
- Training completion records (export from LMS or training platform)
|
|
59
|
+
- Training content outline/syllabus
|
|
60
|
+
- Phishing simulation results (if applicable)
|
|
61
|
+
- New hire onboarding checklist showing training step
|
|
62
|
+
|
|
63
|
+
---
|
|
64
|
+
|
|
65
|
+
## A.6.4 — Disciplinary Process
|
|
66
|
+
|
|
67
|
+
**Tier**: Relevant | **NIST**: PS-8
|
|
68
|
+
|
|
69
|
+
Establish a formal disciplinary process for personnel who commit security policy violations. The process should be communicated to all employees and applied consistently.
|
|
70
|
+
|
|
71
|
+
**Auditor hints**:
|
|
72
|
+
- Auditors check that a policy EXISTS and is communicated — they won't ask for examples of disciplinary actions
|
|
73
|
+
- The policy should be referenced in the employee handbook or security policy
|
|
74
|
+
- It should cover: escalation levels, investigation process, possible sanctions
|
|
75
|
+
- For startups: having this documented in the employee handbook is sufficient
|
|
76
|
+
|
|
77
|
+
---
|
|
78
|
+
|
|
79
|
+
## A.6.5 — Responsibilities After Termination or Change of Employment
|
|
80
|
+
|
|
81
|
+
**Tier**: Critical | **NIST**: PS-4, PS-5
|
|
82
|
+
|
|
83
|
+
Define and enforce information security responsibilities that remain valid after employment ends or changes. Promptly revoke access when employment terminates.
|
|
84
|
+
|
|
85
|
+
**Auditor hints**:
|
|
86
|
+
- This is the #1 people control that fails — auditors cross-reference termination dates with access revocation dates
|
|
87
|
+
- "48-hour rule": access should be revoked within 24-48 hours of termination, ideally same-day
|
|
88
|
+
- Role changes should trigger access review — people accumulate permissions over time
|
|
89
|
+
- Departing employees should return all company equipment and confirm data deletion from personal devices
|
|
90
|
+
- Exit interviews should include security reminders (ongoing confidentiality obligations)
|
|
91
|
+
|
|
92
|
+
**Evidence collection**:
|
|
93
|
+
```bash
|
|
94
|
+
# Cross-reference: get list of terminated users, check against active accounts
|
|
95
|
+
# Google Workspace: suspended users (should correlate with terminations)
|
|
96
|
+
gam print users fields primaryEmail,suspended,suspensionReason | grep "True"
|
|
97
|
+
|
|
98
|
+
# GitHub: check for org members who should have been removed
|
|
99
|
+
gh api orgs/{org}/members --paginate | jq '.[].login'
|
|
100
|
+
|
|
101
|
+
# Compare against HR termination list (manual step)
|
|
102
|
+
```
|
|
103
|
+
|
|
104
|
+
---
|
|
105
|
+
|
|
106
|
+
## A.6.6 — Confidentiality or Non-Disclosure Agreements
|
|
107
|
+
|
|
108
|
+
**Tier**: Relevant | **NIST**: PS-6
|
|
109
|
+
|
|
110
|
+
Identify and document confidentiality requirements, and ensure agreements are signed by personnel and external parties who access organizational information.
|
|
111
|
+
|
|
112
|
+
**Auditor hints**:
|
|
113
|
+
- Auditors verify that NDAs/confidentiality agreements cover: employees, contractors, vendors, and any third party with system access
|
|
114
|
+
- The agreement should define: what's confidential, duration of obligation, consequences of breach
|
|
115
|
+
- For startups: confidentiality clause in the employment agreement + separate NDA for contractors
|
|
116
|
+
- Auditors sample files to verify signatures — electronic signatures are acceptable
|
|
117
|
+
|
|
118
|
+
---
|
|
119
|
+
|
|
120
|
+
## A.6.7 — Remote Working
|
|
121
|
+
|
|
122
|
+
**Tier**: Relevant | **NIST**: AC-17, PE-17
|
|
123
|
+
|
|
124
|
+
Define security requirements for remote working, including endpoint protection, network security, physical security of work environment, and data handling.
|
|
125
|
+
|
|
126
|
+
**Auditor hints**:
|
|
127
|
+
- With remote-first startups, this control is increasingly important
|
|
128
|
+
- Auditors check: VPN/zero-trust access, endpoint encryption, screen lock policy, acceptable use for home networks
|
|
129
|
+
- Physical security of home office is hard to verify — document the policy and self-attestation
|
|
130
|
+
- Wi-Fi security: employees should not work on public networks without VPN
|
|
131
|
+
|
|
132
|
+
**Evidence collection**:
|
|
133
|
+
```bash
|
|
134
|
+
# macOS: verify FileVault encryption
|
|
135
|
+
fdesetup status
|
|
136
|
+
|
|
137
|
+
# macOS: verify screen lock
|
|
138
|
+
system_profiler SPConfigurationProfileDataType | grep -A5 "maxInactivity"
|
|
139
|
+
|
|
140
|
+
# MDM: endpoint compliance status (depends on your MDM tool)
|
|
141
|
+
```
|
|
142
|
+
|
|
143
|
+
---
|
|
144
|
+
|
|
145
|
+
## A.6.8 — Information Security Event Reporting
|
|
146
|
+
|
|
147
|
+
**Tier**: Relevant | **NIST**: IR-4, IR-6
|
|
148
|
+
|
|
149
|
+
All personnel should know how to identify and report security events through defined channels. The organization should make reporting easy and ensure no negative consequences for good-faith reporting.
|
|
150
|
+
|
|
151
|
+
**Auditor hints**:
|
|
152
|
+
- Auditors will ask random employees: "How would you report a security incident?"
|
|
153
|
+
- The answer should be consistent (same channel/process) — if it varies, training is inadequate
|
|
154
|
+
- False positive reports are GOOD — they show the system is working and people are vigilant
|
|
155
|
+
- No-retaliation policy should be explicit in the security policy
|
|
156
|
+
|
|
157
|
+
**Evidence collection**:
|
|
158
|
+
- Incident reporting procedure document
|
|
159
|
+
- Training records confirming reporting awareness
|
|
160
|
+
- Reporting channel configuration (Slack channel, email alias, ticketing system)
|
|
161
|
+
- Sample of reported events (even false positives)
|
|
@@ -0,0 +1,92 @@
|
|
|
1
|
+
# Supplier Management Rules
|
|
2
|
+
|
|
3
|
+
Per-control audit guidance for third-party and supply chain risk.
|
|
4
|
+
|
|
5
|
+
## A.5.19 — Information Security in Supplier Relationships
|
|
6
|
+
|
|
7
|
+
**Tier**: Relevant | **NIST**: AC-20, SA-4, SA-9, SR-1, SR-3
|
|
8
|
+
|
|
9
|
+
Define and implement processes to manage security risks associated with supplier relationships. Establish security requirements in supplier agreements and monitor compliance.
|
|
10
|
+
|
|
11
|
+
**Auditor hints**:
|
|
12
|
+
- Auditors want a VENDOR INVENTORY — a list of all suppliers who access your data or systems
|
|
13
|
+
- Each vendor should have: a contract with security clauses, a risk assessment, and periodic review
|
|
14
|
+
- SOC 2 Type II reports from vendors are the gold standard evidence — request annually
|
|
15
|
+
- For SaaS tools: the vendor's security page or trust center is a starting point, but not sufficient alone
|
|
16
|
+
|
|
17
|
+
**Evidence collection**:
|
|
18
|
+
- Vendor inventory/register with risk classification
|
|
19
|
+
- Vendor security agreements or contract clauses
|
|
20
|
+
- SOC 2 / ISO 27001 reports from critical vendors
|
|
21
|
+
- Vendor risk assessment records
|
|
22
|
+
|
|
23
|
+
---
|
|
24
|
+
|
|
25
|
+
## A.5.20 — Addressing Information Security Within Supplier Agreements
|
|
26
|
+
|
|
27
|
+
**Tier**: Relevant | **NIST**: PS-7, SR-3, SR-8
|
|
28
|
+
|
|
29
|
+
Include information security requirements in agreements with suppliers and service providers. Agreements should address access controls, incident notification, audit rights, and data handling.
|
|
30
|
+
|
|
31
|
+
**Auditor hints**:
|
|
32
|
+
- Auditors sample 3-5 vendor contracts to verify security clauses exist
|
|
33
|
+
- Key clauses to check: data protection, incident notification timeline, right to audit, sub-processor controls
|
|
34
|
+
- For cloud providers: Data Processing Agreements (DPAs) should be in place if handling PII
|
|
35
|
+
- "We use their standard terms" — auditors want to see you REVIEWED those terms for security adequacy
|
|
36
|
+
|
|
37
|
+
---
|
|
38
|
+
|
|
39
|
+
## A.5.21 — Managing Information Security in the ICT Supply Chain
|
|
40
|
+
|
|
41
|
+
**Tier**: Relevant | **NIST**: AC-20, SA-4, SA-9, SR-2, SR-3
|
|
42
|
+
|
|
43
|
+
Address information security risks in the ICT supply chain. Assess risks from third-party components, open-source dependencies, and outsourced development.
|
|
44
|
+
|
|
45
|
+
**Auditor hints**:
|
|
46
|
+
- For startups: this is primarily about dependency management — what open-source libraries do you use and how do you track vulnerabilities?
|
|
47
|
+
- Auditors check: dependency scanning tool (Dependabot, Snyk), process for responding to critical CVEs
|
|
48
|
+
- Software Bill of Materials (SBOM) is increasingly expected but not yet universally required
|
|
49
|
+
- Container image provenance — know where your base images come from
|
|
50
|
+
|
|
51
|
+
**Evidence collection**:
|
|
52
|
+
```bash
|
|
53
|
+
# GitHub: Dependabot alerts
|
|
54
|
+
gh api repos/{owner}/{repo}/dependabot/alerts?state=open | jq 'length'
|
|
55
|
+
|
|
56
|
+
# GitHub: Dependabot configuration
|
|
57
|
+
gh api repos/{owner}/{repo}/contents/.github/dependabot.yml 2>/dev/null | jq '.content' -r | base64 -d
|
|
58
|
+
|
|
59
|
+
# npm: audit
|
|
60
|
+
# npm audit --json
|
|
61
|
+
|
|
62
|
+
# Python: pip-audit
|
|
63
|
+
# pip-audit --format=json
|
|
64
|
+
```
|
|
65
|
+
|
|
66
|
+
---
|
|
67
|
+
|
|
68
|
+
## A.5.22 — Monitoring, Review, and Change Management of Supplier Services
|
|
69
|
+
|
|
70
|
+
**Tier**: Relevant | **NIST**: AC-20, SA-9, SR-2, SR-5, SR-6
|
|
71
|
+
|
|
72
|
+
Regularly monitor, review, and manage changes to supplier services. Track supplier security posture and assess impact of supplier-side changes.
|
|
73
|
+
|
|
74
|
+
**Auditor hints**:
|
|
75
|
+
- Auditors want to see PERIODIC REVIEW of vendor security — not just at onboarding
|
|
76
|
+
- Annual review of critical vendor SOC 2 reports is the minimum expectation
|
|
77
|
+
- Track vendor security incidents — sign up for vendor status pages and security advisories
|
|
78
|
+
- Change management: when a vendor changes their service (new features, infrastructure migration), assess security impact
|
|
79
|
+
|
|
80
|
+
---
|
|
81
|
+
|
|
82
|
+
## A.5.23 — Information Security for Use of Cloud Services
|
|
83
|
+
|
|
84
|
+
**Tier**: Checkbox | **NIST**: SA-9
|
|
85
|
+
|
|
86
|
+
Define and manage information security requirements for cloud service usage. Establish processes for cloud service acquisition, operation, monitoring, and exit.
|
|
87
|
+
|
|
88
|
+
**Auditor hints**:
|
|
89
|
+
- Auditors check that you have a CLOUD SECURITY POLICY or that cloud usage is addressed in your general security policy
|
|
90
|
+
- For cloud-native startups: demonstrate that you've reviewed your cloud provider's shared responsibility model
|
|
91
|
+
- Data residency and jurisdictional requirements should be documented (where is data stored?)
|
|
92
|
+
- Cloud exit strategy: what happens if you need to migrate away? Is data exportable?
|
package/skills/nda/SKILL.md
CHANGED
|
@@ -151,3 +151,12 @@ Use `list_templates` (MCP) or `list --json` (CLI) for the latest inventory and f
|
|
|
151
151
|
- All templates produce Word DOCX files preserving original formatting
|
|
152
152
|
- Templates are licensed by their respective authors (CC-BY-4.0 or CC0-1.0)
|
|
153
153
|
- This tool does not provide legal advice — consult an attorney
|
|
154
|
+
|
|
155
|
+
## Bespoke edits (beyond template fields)
|
|
156
|
+
|
|
157
|
+
If you need to edit boilerplate or add custom language that is not exposed as a template field,
|
|
158
|
+
use the `edit-docx-agreement` skill to surgically edit the generated DOCX and produce a
|
|
159
|
+
tracked-changes output for review. This requires a separately configured Safe Docx MCP server.
|
|
160
|
+
|
|
161
|
+
Note: templates licensed under CC-BY-ND-4.0 (e.g., YC SAFEs) can be filled for your own use
|
|
162
|
+
but must not be redistributed in modified form.
|
|
@@ -180,3 +180,12 @@ Templates are discovered dynamically — always use `list_templates` (MCP) or `l
|
|
|
180
180
|
- Templates are licensed by their respective authors (CC-BY-4.0, CC0-1.0, or CC-BY-ND-4.0)
|
|
181
181
|
- External templates (CC-BY-ND-4.0, e.g. YC SAFEs) can be filled for your own use but must not be redistributed in modified form
|
|
182
182
|
- This tool does not provide legal advice — consult an attorney
|
|
183
|
+
|
|
184
|
+
## Bespoke edits (beyond template fields)
|
|
185
|
+
|
|
186
|
+
If you need to edit boilerplate or add custom language that is not exposed as a template field,
|
|
187
|
+
use the `edit-docx-agreement` skill to surgically edit the generated DOCX and produce a
|
|
188
|
+
tracked-changes output for review. This requires a separately configured Safe Docx MCP server.
|
|
189
|
+
|
|
190
|
+
Note: templates licensed under CC-BY-ND-4.0 (e.g., YC SAFEs) can be filled for your own use
|
|
191
|
+
but must not be redistributed in modified form.
|
package/skills/safe/SKILL.md
CHANGED
|
@@ -159,3 +159,12 @@ Use `list_templates` (MCP) or `list --json` (CLI) for the latest inventory and f
|
|
|
159
159
|
- YC SAFE templates are licensed under CC-BY-ND-4.0 — you can fill them for your own use but must not redistribute modified versions of the template itself
|
|
160
160
|
- SAFEs are not debt instruments — they convert to equity in a future priced round
|
|
161
161
|
- This tool does not provide legal advice — consult an attorney
|
|
162
|
+
|
|
163
|
+
## Bespoke edits (beyond template fields)
|
|
164
|
+
|
|
165
|
+
If you need to edit boilerplate or add custom language that is not exposed as a template field,
|
|
166
|
+
use the `edit-docx-agreement` skill to surgically edit the generated DOCX and produce a
|
|
167
|
+
tracked-changes output for review. This requires a separately configured Safe Docx MCP server.
|
|
168
|
+
|
|
169
|
+
Note: templates licensed under CC-BY-ND-4.0 (e.g., YC SAFEs) can be filled for your own use
|
|
170
|
+
but must not be redistributed in modified form.
|
|
@@ -154,3 +154,12 @@ Use `list_templates` (MCP) or `list --json` (CLI) for the latest inventory and f
|
|
|
154
154
|
- All templates produce Word DOCX files preserving original formatting
|
|
155
155
|
- Templates are licensed by their respective authors (CC-BY-4.0 or CC0-1.0)
|
|
156
156
|
- This tool does not provide legal advice — consult an attorney
|
|
157
|
+
|
|
158
|
+
## Bespoke edits (beyond template fields)
|
|
159
|
+
|
|
160
|
+
If you need to edit boilerplate or add custom language that is not exposed as a template field,
|
|
161
|
+
use the `edit-docx-agreement` skill to surgically edit the generated DOCX and produce a
|
|
162
|
+
tracked-changes output for review. This requires a separately configured Safe Docx MCP server.
|
|
163
|
+
|
|
164
|
+
Note: templates licensed under CC-BY-ND-4.0 (e.g., YC SAFEs) can be filled for your own use
|
|
165
|
+
but must not be redistributed in modified form.
|
|
@@ -0,0 +1,23 @@
|
|
|
1
|
+
# Connectors
|
|
2
|
+
|
|
3
|
+
## How tool references work
|
|
4
|
+
|
|
5
|
+
This skill uses `~~category` placeholders for optional integrations. The skill works without any connectors configured — they enhance the experience when available.
|
|
6
|
+
|
|
7
|
+
## Connectors for this skill
|
|
8
|
+
|
|
9
|
+
| Category | Placeholder | Recommended server | Other options |
|
|
10
|
+
|----------|-------------|-------------------|---------------|
|
|
11
|
+
| Compliance data | `~~compliance` | Compliance MCP server (planned — not yet available) | Local `compliance/` directory files |
|
|
12
|
+
|
|
13
|
+
### Local compliance data (current default)
|
|
14
|
+
|
|
15
|
+
If the `compliance/` directory exists with SOC 2 test metadata, the skill reads those directly. No MCP server needed.
|
|
16
|
+
|
|
17
|
+
### Compliance MCP server (planned)
|
|
18
|
+
|
|
19
|
+
A dedicated compliance MCP server with live SOC 2 test pass/fail data and readiness scores is planned but not yet available. When released, it will be installable as a standard MCP server. Until then, the skill operates in local-data or reference-only mode.
|
|
20
|
+
|
|
21
|
+
### Fallback: Reference only
|
|
22
|
+
|
|
23
|
+
Without any connector, the skill uses embedded criteria mapping and checklists. No organization-specific status data is available in this mode.
|