@open-agreements/open-agreements 0.2.0 → 0.2.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +10 -2
- package/content/templates/closing-checklist/metadata.yaml +6 -13
- package/content/templates/closing-checklist/template.docx +0 -0
- package/dist/cli/index.d.ts.map +1 -1
- package/dist/cli/index.js +47 -10
- package/dist/cli/index.js.map +1 -1
- package/dist/commands/checklist.d.ts +21 -1
- package/dist/commands/checklist.d.ts.map +1 -1
- package/dist/commands/checklist.js +175 -44
- package/dist/commands/checklist.js.map +1 -1
- package/dist/commands/recipe.js +3 -11
- package/dist/commands/recipe.js.map +1 -1
- package/dist/core/checklist/index.d.ts +22 -14
- package/dist/core/checklist/index.d.ts.map +1 -1
- package/dist/core/checklist/index.js +79 -39
- package/dist/core/checklist/index.js.map +1 -1
- package/dist/core/checklist/jsonl-stores.d.ts +3 -0
- package/dist/core/checklist/jsonl-stores.d.ts.map +1 -0
- package/dist/core/checklist/jsonl-stores.js +16 -0
- package/dist/core/checklist/jsonl-stores.js.map +1 -0
- package/dist/core/checklist/schemas.d.ts +2 -2
- package/dist/core/checklist/schemas.js +1 -1
- package/dist/core/checklist/schemas.js.map +1 -1
- package/dist/core/checklist/state-manager.d.ts +146 -0
- package/dist/core/checklist/state-manager.d.ts.map +1 -0
- package/dist/core/checklist/state-manager.js +147 -0
- package/dist/core/checklist/state-manager.js.map +1 -0
- package/dist/core/checklist/status-labels.d.ts +6 -0
- package/dist/core/checklist/status-labels.d.ts.map +1 -0
- package/dist/core/checklist/status-labels.js +29 -0
- package/dist/core/checklist/status-labels.js.map +1 -0
- package/dist/core/validation/recipe.d.ts.map +1 -1
- package/dist/core/validation/recipe.js +47 -61
- package/dist/core/validation/recipe.js.map +1 -1
- package/package.json +1 -1
- package/skills/cloud-service-agreement/SKILL.md +9 -0
- package/skills/data-privacy-agreement/SKILL.md +9 -0
- package/skills/edit-docx-agreement/CONNECTORS.md +20 -0
- package/skills/edit-docx-agreement/SKILL.md +77 -0
- package/skills/employment-contract/SKILL.md +9 -0
- package/skills/iso-27001-evidence-collection/CONNECTORS.md +23 -0
- package/skills/iso-27001-evidence-collection/SKILL.md +300 -0
- package/skills/iso-27001-evidence-collection/rules/api-exports.md +191 -0
- package/skills/iso-27001-evidence-collection/rules/evidence-types.md +107 -0
- package/skills/iso-27001-evidence-collection/rules/screenshot-guide.md +77 -0
- package/skills/iso-27001-internal-audit/CONNECTORS.md +23 -0
- package/skills/iso-27001-internal-audit/SKILL.md +272 -0
- package/skills/iso-27001-internal-audit/rules/access-control.md +191 -0
- package/skills/iso-27001-internal-audit/rules/business-continuity.md +94 -0
- package/skills/iso-27001-internal-audit/rules/change-management.md +211 -0
- package/skills/iso-27001-internal-audit/rules/encryption.md +93 -0
- package/skills/iso-27001-internal-audit/rules/incident-response.md +127 -0
- package/skills/iso-27001-internal-audit/rules/isms-management.md +164 -0
- package/skills/iso-27001-internal-audit/rules/logging-monitoring.md +96 -0
- package/skills/iso-27001-internal-audit/rules/people-controls.md +161 -0
- package/skills/iso-27001-internal-audit/rules/supplier-management.md +92 -0
- package/skills/nda/SKILL.md +9 -0
- package/skills/open-agreements/SKILL.md +9 -0
- package/skills/safe/SKILL.md +9 -0
- package/skills/services-agreement/SKILL.md +9 -0
- package/skills/soc2-readiness/CONNECTORS.md +23 -0
- package/skills/soc2-readiness/SKILL.md +289 -0
- package/skills/soc2-readiness/rules/trust-services.md +230 -0
- package/skills/venture-financing/SKILL.md +9 -0
|
@@ -0,0 +1,289 @@
|
|
|
1
|
+
---
|
|
2
|
+
name: soc2-readiness
|
|
3
|
+
description: >-
|
|
4
|
+
Assess SOC 2 Type II readiness. Map Trust Services Criteria to controls,
|
|
5
|
+
identify gaps, and build a remediation plan. Uses NIST SP 800-53 (public
|
|
6
|
+
domain) as canonical reference with SOC 2 criterion cross-mapping.
|
|
7
|
+
license: MIT
|
|
8
|
+
compatibility: >-
|
|
9
|
+
Works with any AI agent. Enhanced with compliance MCP server for live
|
|
10
|
+
status data. Falls back to embedded reference material when no live data
|
|
11
|
+
available.
|
|
12
|
+
metadata:
|
|
13
|
+
author: open-agreements
|
|
14
|
+
version: "0.1.0"
|
|
15
|
+
frameworks:
|
|
16
|
+
- SOC 2 Type II
|
|
17
|
+
- NIST SP 800-53 Rev 5
|
|
18
|
+
- ISO 27001:2022
|
|
19
|
+
---
|
|
20
|
+
|
|
21
|
+
# SOC 2 Readiness Assessment
|
|
22
|
+
|
|
23
|
+
Assess readiness for a SOC 2 Type II audit. This skill walks through the Trust Services Criteria, identifies gaps, maps to NIST controls, and generates a prioritized remediation plan.
|
|
24
|
+
|
|
25
|
+
## Security Model
|
|
26
|
+
|
|
27
|
+
- **No scripts executed** — markdown-only procedural guidance
|
|
28
|
+
- **No secrets required** — works with reference checklists
|
|
29
|
+
- **IP-clean** — AICPA Trust Services Criteria are publicly cited; descriptions are original writing
|
|
30
|
+
- **Evidence stays local** — all collection outputs go to local filesystem
|
|
31
|
+
|
|
32
|
+
## When to Use
|
|
33
|
+
|
|
34
|
+
Activate this skill when:
|
|
35
|
+
|
|
36
|
+
1. **First SOC 2 preparation** — building controls from scratch for initial Type I or Type II
|
|
37
|
+
2. **Pre-audit readiness check** — 4-8 weeks before audit window opens
|
|
38
|
+
3. **Gap analysis after scope change** — new systems, services, or trust criteria added
|
|
39
|
+
4. **Remediation planning** — translating audit findings into actionable work items
|
|
40
|
+
5. **Dual-framework mapping** — already pursuing ISO 27001 and need SOC 2 overlap analysis
|
|
41
|
+
|
|
42
|
+
Do NOT use for:
|
|
43
|
+
- ISO 27001 internal audit — use `iso-27001-internal-audit`
|
|
44
|
+
- Evidence collection mechanics — use `iso-27001-evidence-collection`
|
|
45
|
+
- Contract review — use legal agreement skills
|
|
46
|
+
|
|
47
|
+
## Core Concepts
|
|
48
|
+
|
|
49
|
+
### Trust Services Criteria (TSC)
|
|
50
|
+
|
|
51
|
+
SOC 2 is organized around 5 Trust Services Categories. **Security (CC)** is always in scope; others are optional based on your service:
|
|
52
|
+
|
|
53
|
+
| Category | Criteria | When Required |
|
|
54
|
+
|----------|----------|---------------|
|
|
55
|
+
| **Security** (CC) | CC 1-9 (33 criteria) | Always required |
|
|
56
|
+
| **Availability** (A) | A 1.1-1.3 (3 criteria) | SaaS with uptime SLAs |
|
|
57
|
+
| **Processing Integrity** (PI) | PI 1.1-1.5 (4 criteria) | Data processing services |
|
|
58
|
+
| **Confidentiality** (C) | C 1.1-1.2 (2 criteria) | Handling confidential data |
|
|
59
|
+
| **Privacy** (P) | P 4-8 (7 criteria) | PII processing |
|
|
60
|
+
|
|
61
|
+
### SOC 2 vs. ISO 27001
|
|
62
|
+
|
|
63
|
+
| Dimension | SOC 2 | ISO 27001 |
|
|
64
|
+
|-----------|-------|-----------|
|
|
65
|
+
| Governing body | AICPA | ISO/IEC |
|
|
66
|
+
| Geography | Primarily US/Canada | Global |
|
|
67
|
+
| Type | Attestation report by CPA | Certification by audit body |
|
|
68
|
+
| Scope | Service-specific | Organization-wide ISMS |
|
|
69
|
+
| Controls | Flexible (you define) | 93 Annex A controls |
|
|
70
|
+
| Output | SOC 2 report (restricted/general use) | Certificate |
|
|
71
|
+
| Overlap | ~70% overlap with ISO 27001 Annex A | ~70% overlap with SOC 2 CC |
|
|
72
|
+
|
|
73
|
+
### Decision Tree: Scope Selection
|
|
74
|
+
|
|
75
|
+
```
|
|
76
|
+
What service are you getting audited on?
|
|
77
|
+
├── SaaS product → Security + Availability (+ Confidentiality if you handle sensitive data)
|
|
78
|
+
├── Data processing → Security + Processing Integrity + Confidentiality
|
|
79
|
+
├── Infrastructure → Security + Availability
|
|
80
|
+
├── API service → Security (+ PI if you transform data)
|
|
81
|
+
│
|
|
82
|
+
Do you handle PII?
|
|
83
|
+
├── YES → Add Privacy category
|
|
84
|
+
├── NO → Skip Privacy
|
|
85
|
+
│
|
|
86
|
+
Do you have uptime SLAs?
|
|
87
|
+
├── YES → Include Availability
|
|
88
|
+
├── NO → Optional (but customers expect it for SaaS)
|
|
89
|
+
```
|
|
90
|
+
|
|
91
|
+
## Step-by-Step Workflow
|
|
92
|
+
|
|
93
|
+
### Step 1: Define Scope and Categories
|
|
94
|
+
|
|
95
|
+
1. **Identify the service** being audited (product name, description, boundaries)
|
|
96
|
+
2. **Select Trust Services Categories** using the decision tree above
|
|
97
|
+
3. **Define system boundaries**: infrastructure, software, people, procedures, data
|
|
98
|
+
4. **Document sub-service organizations** (cloud providers, payment processors, etc.)
|
|
99
|
+
5. **Determine audit type**: Type I (point-in-time) or Type II (period of time, usually 6-12 months)
|
|
100
|
+
|
|
101
|
+
### Step 2: Assess Current State
|
|
102
|
+
|
|
103
|
+
For each applicable Common Criterion (CC), assess whether controls are:
|
|
104
|
+
- **Designed** — control exists on paper
|
|
105
|
+
- **Implemented** — control is operating
|
|
106
|
+
- **Effective** — control achieves its objective (evidence exists)
|
|
107
|
+
|
|
108
|
+
```
|
|
109
|
+
# If compliance MCP is available:
|
|
110
|
+
check_compliance_status(framework="soc2")
|
|
111
|
+
```
|
|
112
|
+
|
|
113
|
+
### Step 3: Map Controls to Criteria
|
|
114
|
+
|
|
115
|
+
Each CC maps to specific NIST controls. Use this mapping to identify what you need:
|
|
116
|
+
|
|
117
|
+
#### CC 1 — Control Environment
|
|
118
|
+
|
|
119
|
+
| Criterion | Focus | NIST Controls | ISO Cross-Reference |
|
|
120
|
+
|-----------|-------|---------------|---------------------|
|
|
121
|
+
| CC 1.1 | Integrity and ethics | PS-1, PS-3, PS-6 | A.6.1, A.6.2, A.6.4 |
|
|
122
|
+
| CC 1.2 | Board oversight | PM-1, PM-2 | C.5.1, C.5.3 |
|
|
123
|
+
| CC 1.3 | Organizational structure | PM-2 | C.5.3 |
|
|
124
|
+
| CC 1.4 | Competence commitment | AT-2, PS-3 | A.6.1, A.6.3 |
|
|
125
|
+
| CC 1.5 | Accountability | PS-3, PS-4 | A.6.4, A.6.5 |
|
|
126
|
+
|
|
127
|
+
#### CC 2 — Communication and Information
|
|
128
|
+
|
|
129
|
+
| Criterion | Focus | NIST Controls | ISO Cross-Reference |
|
|
130
|
+
|-----------|-------|---------------|---------------------|
|
|
131
|
+
| CC 2.1 | Internal information | AU-2, SI-5 | C.7.5.1 |
|
|
132
|
+
| CC 2.2 | Internal communication | PM-2, AT-2 | C.7.4, A.6.3 |
|
|
133
|
+
| CC 2.3 | External communication | PM-1 | A.5.14 |
|
|
134
|
+
|
|
135
|
+
#### CC 3 — Risk Assessment
|
|
136
|
+
|
|
137
|
+
| Criterion | Focus | NIST Controls | ISO Cross-Reference |
|
|
138
|
+
|-----------|-------|---------------|---------------------|
|
|
139
|
+
| CC 3.1 | Risk objectives | PM-9, RA-1 | C.6.1.1 |
|
|
140
|
+
| CC 3.2 | Risk identification | RA-3 | C.6.1.2, C.8.2 |
|
|
141
|
+
| CC 3.3 | Fraud risk | RA-3 | C.6.1.2 |
|
|
142
|
+
| CC 3.4 | Change impact | RA-3, CM-4 | C.6.1.2, A.8.9 |
|
|
143
|
+
|
|
144
|
+
#### CC 4 — Monitoring Activities
|
|
145
|
+
|
|
146
|
+
| Criterion | Focus | NIST Controls | ISO Cross-Reference |
|
|
147
|
+
|-----------|-------|---------------|---------------------|
|
|
148
|
+
| CC 4.1 | Ongoing monitoring | CA-7, PM-6 | C.9.1 |
|
|
149
|
+
| CC 4.2 | Deficiency evaluation | CA-2 | C.9.2.1 |
|
|
150
|
+
|
|
151
|
+
#### CC 5 — Control Activities
|
|
152
|
+
|
|
153
|
+
| Criterion | Focus | NIST Controls | ISO Cross-Reference |
|
|
154
|
+
|-----------|-------|---------------|---------------------|
|
|
155
|
+
| CC 5.1 | Risk mitigation | AC-5 | A.5.3 |
|
|
156
|
+
| CC 5.2 | Technology controls | AC-1, IA-2 | A.5.15, A.8.5 |
|
|
157
|
+
| CC 5.3 | Policy deployment | PM-1, PL-1 | A.5.1, C.5.2 |
|
|
158
|
+
|
|
159
|
+
#### CC 6 — Logical and Physical Access
|
|
160
|
+
|
|
161
|
+
| Criterion | Focus | NIST Controls | ISO Cross-Reference |
|
|
162
|
+
|-----------|-------|---------------|---------------------|
|
|
163
|
+
| CC 6.1 | Access control | AC-2, AC-3, IA-2, SC-28 | A.5.15, A.8.5, A.8.24 |
|
|
164
|
+
| CC 6.2 | Access provisioning | AC-2, PS-4, PS-5 | A.5.18, A.6.5 |
|
|
165
|
+
| CC 6.3 | Access modification | AC-2, AC-6 | A.5.15, A.5.18 |
|
|
166
|
+
| CC 6.4 | Physical access | PE-2, PE-3, PE-6 | A.7.2, A.7.4 |
|
|
167
|
+
| CC 6.5 | Asset disposal | MP-6 | A.7.10, A.7.14 |
|
|
168
|
+
| CC 6.6 | Threat detection | RA-5, SI-4 | A.8.8, A.8.16 |
|
|
169
|
+
| CC 6.7 | Transmission security | SC-8 | A.5.14, A.8.24 |
|
|
170
|
+
| CC 6.8 | Malware prevention | SI-2, SI-3 | A.8.7, A.8.19 |
|
|
171
|
+
|
|
172
|
+
#### CC 7 — System Operations
|
|
173
|
+
|
|
174
|
+
| Criterion | Focus | NIST Controls | ISO Cross-Reference |
|
|
175
|
+
|-----------|-------|---------------|---------------------|
|
|
176
|
+
| CC 7.1 | Operational monitoring | CM-6, RA-5 | A.8.9, A.8.8 |
|
|
177
|
+
| CC 7.2 | Anomaly detection | AU-6, SI-4 | A.8.15, A.8.16 |
|
|
178
|
+
| CC 7.3 | Incident response | IR-4 | A.5.24, A.5.25 |
|
|
179
|
+
| CC 7.4 | Incident management | IR-5, IR-6 | A.5.25, A.5.26 |
|
|
180
|
+
| CC 7.5 | Recovery | CP-4, CP-9, CP-10 | A.5.30, A.8.13 |
|
|
181
|
+
|
|
182
|
+
#### CC 8 — Change Management
|
|
183
|
+
|
|
184
|
+
| Criterion | Focus | NIST Controls | ISO Cross-Reference |
|
|
185
|
+
|-----------|-------|---------------|---------------------|
|
|
186
|
+
| CC 8.1 | Change control | CM-3, CM-5, SA-3 | A.8.9, A.8.25, A.8.32 |
|
|
187
|
+
|
|
188
|
+
#### CC 9 — Risk Mitigation
|
|
189
|
+
|
|
190
|
+
| Criterion | Focus | NIST Controls | ISO Cross-Reference |
|
|
191
|
+
|-----------|-------|---------------|---------------------|
|
|
192
|
+
| CC 9.1 | Risk mitigation | CP-2, RA-7 | A.5.30, C.6.1.3 |
|
|
193
|
+
| CC 9.2 | Vendor management | AC-20, SA-9 | A.5.19, A.5.22 |
|
|
194
|
+
|
|
195
|
+
### Step 4: Generate Gap Analysis
|
|
196
|
+
|
|
197
|
+
For each criterion, document:
|
|
198
|
+
|
|
199
|
+
```markdown
|
|
200
|
+
## Gap: [CC x.x] — [Brief description]
|
|
201
|
+
|
|
202
|
+
**Current State**: [What exists today]
|
|
203
|
+
**Required State**: [What the auditor expects]
|
|
204
|
+
**Gap**: [What's missing]
|
|
205
|
+
**Remediation**:
|
|
206
|
+
1. [Specific action item]
|
|
207
|
+
2. [Specific action item]
|
|
208
|
+
**Priority**: Critical / High / Medium / Low
|
|
209
|
+
**Effort**: [Days/weeks to remediate]
|
|
210
|
+
**Owner**: [Person responsible]
|
|
211
|
+
**Evidence Needed**: [What to collect after fix]
|
|
212
|
+
```
|
|
213
|
+
|
|
214
|
+
### Step 5: Build Remediation Plan
|
|
215
|
+
|
|
216
|
+
Prioritize gaps by:
|
|
217
|
+
1. **Critical** — Audit will fail without this (CC 6.1, 6.2, 7.2, 7.5, 8.1)
|
|
218
|
+
2. **High** — Likely finding if not addressed (CC 1.4, 3.2, 6.6, 7.3)
|
|
219
|
+
3. **Medium** — Auditor will note but may not be a finding
|
|
220
|
+
4. **Low** — Best practice, not strictly required
|
|
221
|
+
|
|
222
|
+
### Step 6: Readiness Report
|
|
223
|
+
|
|
224
|
+
Generate a structured readiness assessment:
|
|
225
|
+
|
|
226
|
+
1. **Executive summary** — overall readiness percentage, estimated time to audit-ready
|
|
227
|
+
2. **Scope** — service description, trust categories, audit type
|
|
228
|
+
3. **Control matrix** — all applicable criteria with status (designed/implemented/effective)
|
|
229
|
+
4. **Gap analysis** — prioritized list of gaps with remediation plan
|
|
230
|
+
5. **Timeline** — remediation milestones leading to audit window
|
|
231
|
+
|
|
232
|
+
## Quick Reference: Top SOC 2 Failures
|
|
233
|
+
|
|
234
|
+
| # | Criterion | Common Failure | Fix |
|
|
235
|
+
|---|-----------|---------------|-----|
|
|
236
|
+
| 1 | CC 6.1 | MFA not universal | Enforce MFA on all systems with sensitive data |
|
|
237
|
+
| 2 | CC 6.2 | Access not revoked on termination | Automate deprovisioning; verify within 24h |
|
|
238
|
+
| 3 | CC 7.2 | No log monitoring | Configure alerts for auth failures, privilege changes |
|
|
239
|
+
| 4 | CC 8.1 | No change management | Require PR reviews; document deployment process |
|
|
240
|
+
| 5 | CC 7.5 | Backups never tested | Restore from backup quarterly; document results |
|
|
241
|
+
| 6 | CC 3.2 | No risk assessment | Conduct and document annual risk assessment |
|
|
242
|
+
| 7 | CC 6.6 | No vulnerability scanning | Deploy automated scanning; remediate criticals in 30d |
|
|
243
|
+
| 8 | CC 1.4 | Security training incomplete | Require annual training; track completion |
|
|
244
|
+
| 9 | CC 9.2 | Vendor risk not assessed | Maintain vendor register; collect SOC 2 reports |
|
|
245
|
+
| 10 | CC 7.3 | No incident response plan | Document plan; conduct tabletop exercise |
|
|
246
|
+
|
|
247
|
+
## DO / DON'T
|
|
248
|
+
|
|
249
|
+
### DO
|
|
250
|
+
- Start with Security (CC) criteria — they're always required and cover ~80% of effort
|
|
251
|
+
- Map to ISO 27001 if pursuing both frameworks — ~70% control overlap
|
|
252
|
+
- Collect evidence throughout the audit period, not just at audit time
|
|
253
|
+
- Include sub-service organizations in your description
|
|
254
|
+
- Define the audit period before starting evidence collection
|
|
255
|
+
|
|
256
|
+
### DON'T
|
|
257
|
+
- Include trust categories you can't support — better to pass on fewer than fail on more
|
|
258
|
+
- Assume Type I is "easy" — it requires all controls to be designed and implemented
|
|
259
|
+
- Forget the system description — auditors review this first and use it to scope their testing
|
|
260
|
+
- Use generic/template control descriptions — auditors expect your controls to match your actual environment
|
|
261
|
+
- Ignore complementary user entity controls (CUECs) — your customers need to know their responsibilities
|
|
262
|
+
|
|
263
|
+
## Troubleshooting
|
|
264
|
+
|
|
265
|
+
| Problem | Solution |
|
|
266
|
+
|---------|----------|
|
|
267
|
+
| First SOC 2, no existing controls | Start with CC 6 (access) and CC 8 (change management) — fastest to implement |
|
|
268
|
+
| Already have ISO 27001 | Map Annex A controls to SOC 2 CC; ~70% are already covered |
|
|
269
|
+
| Auditor requests evidence we don't have | Collect it now; document the process; note in description if control was implemented mid-period |
|
|
270
|
+
| Multiple environments (prod/staging/dev) | Only production environment needs to be in scope; document boundaries clearly |
|
|
271
|
+
| Sub-service org (AWS/GCP/Azure) | Use SOC 2 Type II report from the provider; document which controls they cover |
|
|
272
|
+
|
|
273
|
+
## Rules
|
|
274
|
+
|
|
275
|
+
For detailed SOC 2-specific guidance:
|
|
276
|
+
|
|
277
|
+
| File | Coverage |
|
|
278
|
+
|------|----------|
|
|
279
|
+
| `rules/trust-services.md` | Detailed per-criterion guidance for all 5 trust service categories |
|
|
280
|
+
|
|
281
|
+
## Attribution
|
|
282
|
+
|
|
283
|
+
SOC 2 criteria mapping and readiness procedures developed with [Internal ISO Audit](https://internalisoaudit.com) (Hazel Castro, ISO 27001 Lead Auditor, 14+ years, 100+ audits).
|
|
284
|
+
|
|
285
|
+
## Runtime Detection
|
|
286
|
+
|
|
287
|
+
1. **Compliance MCP server available** (best) — Live SOC 2 status, test pass/fail data, evidence gaps
|
|
288
|
+
2. **Local compliance data available** (good) — Reads `compliance/` directory with SOC 2 test metadata
|
|
289
|
+
3. **Reference only** (baseline) — Uses embedded criteria mapping and checklists
|
|
@@ -0,0 +1,230 @@
|
|
|
1
|
+
# Trust Services Criteria — Detailed Guidance
|
|
2
|
+
|
|
3
|
+
Per-criterion guidance for SOC 2 audits. Covers all 5 trust service categories.
|
|
4
|
+
|
|
5
|
+
## Security (Common Criteria) — Always Required
|
|
6
|
+
|
|
7
|
+
### CC 6.1 — Logical Access Security
|
|
8
|
+
|
|
9
|
+
**Priority**: Critical | **NIST**: AC-2, AC-3, IA-2, SC-28 | **ISO**: A.5.15, A.8.5, A.8.24
|
|
10
|
+
|
|
11
|
+
The entity implements logical access security software, infrastructure, and architectures over protected information assets to protect them from security events.
|
|
12
|
+
|
|
13
|
+
**What auditors test**:
|
|
14
|
+
- Sample user accounts: verify access is appropriate for role
|
|
15
|
+
- Check MFA enforcement on all systems with sensitive data
|
|
16
|
+
- Verify encryption at rest and in transit
|
|
17
|
+
- Test that unauthorized access attempts are blocked and logged
|
|
18
|
+
|
|
19
|
+
**Evidence to prepare**:
|
|
20
|
+
```bash
|
|
21
|
+
# User access list with roles
|
|
22
|
+
gam print users fields primaryEmail,name,orgUnitPath,isAdmin,isEnforcedIn2Sv
|
|
23
|
+
|
|
24
|
+
# GitHub: org access settings
|
|
25
|
+
gh api orgs/{org} | jq '{two_factor_requirement_enabled, default_repository_permission}'
|
|
26
|
+
|
|
27
|
+
# Encryption: TLS check
|
|
28
|
+
openssl s_client -connect {host}:443 -tls1_2 < /dev/null 2>&1 | grep "Protocol"
|
|
29
|
+
```
|
|
30
|
+
|
|
31
|
+
---
|
|
32
|
+
|
|
33
|
+
### CC 6.2 — Access Provisioning and Deprovisioning
|
|
34
|
+
|
|
35
|
+
**Priority**: Critical | **NIST**: AC-2, PS-4, PS-5 | **ISO**: A.5.18, A.6.5
|
|
36
|
+
|
|
37
|
+
New access requests require authorization. Access is removed promptly when no longer needed.
|
|
38
|
+
|
|
39
|
+
**What auditors test**:
|
|
40
|
+
- Sample 5-10 new hires: verify access was authorized before provisioning
|
|
41
|
+
- Sample 5-10 terminations: verify access was revoked within 24-48 hours
|
|
42
|
+
- Check for orphaned accounts (active accounts with no corresponding employee)
|
|
43
|
+
|
|
44
|
+
**Evidence to prepare**:
|
|
45
|
+
- HR-to-IT onboarding workflow documentation
|
|
46
|
+
- Termination checklist with IT steps
|
|
47
|
+
- Cross-reference: termination dates vs. last-active dates in systems
|
|
48
|
+
|
|
49
|
+
---
|
|
50
|
+
|
|
51
|
+
### CC 7.2 — Anomaly Detection and Monitoring
|
|
52
|
+
|
|
53
|
+
**Priority**: Critical | **NIST**: AU-6, SI-4 | **ISO**: A.8.15, A.8.16
|
|
54
|
+
|
|
55
|
+
The entity monitors system components and anomalies that indicate malicious acts, natural disasters, and errors.
|
|
56
|
+
|
|
57
|
+
**What auditors test**:
|
|
58
|
+
- Alert configuration: what triggers alerts?
|
|
59
|
+
- Sample alerts: show a recent alert and the response
|
|
60
|
+
- Log retention: are logs kept for the full audit period?
|
|
61
|
+
- Log centralization: is there a single view of security events?
|
|
62
|
+
|
|
63
|
+
**Evidence to prepare**:
|
|
64
|
+
```bash
|
|
65
|
+
# GCP: alerting policies
|
|
66
|
+
gcloud monitoring policies list --format=json | jq '.[].displayName'
|
|
67
|
+
|
|
68
|
+
# GCP: log sinks
|
|
69
|
+
gcloud logging sinks list --format=json
|
|
70
|
+
|
|
71
|
+
# Azure: alert rules
|
|
72
|
+
az monitor alert list --output json | jq '.[].{name, enabled}'
|
|
73
|
+
```
|
|
74
|
+
|
|
75
|
+
---
|
|
76
|
+
|
|
77
|
+
### CC 7.5 — Recovery Operations
|
|
78
|
+
|
|
79
|
+
**Priority**: Critical | **NIST**: CP-4, CP-9, CP-10 | **ISO**: A.5.30, A.8.13
|
|
80
|
+
|
|
81
|
+
The entity identifies, develops, and implements activities to recover from identified security incidents.
|
|
82
|
+
|
|
83
|
+
**What auditors test**:
|
|
84
|
+
- Backup configuration: are backups automated and encrypted?
|
|
85
|
+
- Backup testing: has a restore been tested in the audit period?
|
|
86
|
+
- DR plan: does it exist and has it been tested?
|
|
87
|
+
- RTO/RPO: are they defined and achievable?
|
|
88
|
+
|
|
89
|
+
**Evidence to prepare**:
|
|
90
|
+
```bash
|
|
91
|
+
# GCP: backup configuration
|
|
92
|
+
gcloud sql backups list --instance={instance} --format=json | jq '.[0:5]'
|
|
93
|
+
|
|
94
|
+
# Backup restore test documentation (manual)
|
|
95
|
+
```
|
|
96
|
+
|
|
97
|
+
---
|
|
98
|
+
|
|
99
|
+
### CC 8.1 — Change Management
|
|
100
|
+
|
|
101
|
+
**Priority**: Critical | **NIST**: CM-3, CM-5, SA-3 | **ISO**: A.8.9, A.8.25, A.8.32
|
|
102
|
+
|
|
103
|
+
Changes to infrastructure, data, software, and procedures are authorized, designed, developed, configured, documented, tested, approved, and implemented.
|
|
104
|
+
|
|
105
|
+
**What auditors test**:
|
|
106
|
+
- Sample 10-15 production changes: verify each had authorization, testing, and approval
|
|
107
|
+
- Emergency change process: how are hotfixes handled?
|
|
108
|
+
- Segregation: developers can't push directly to production
|
|
109
|
+
- Rollback: can changes be reverted?
|
|
110
|
+
|
|
111
|
+
**Evidence to prepare**:
|
|
112
|
+
```bash
|
|
113
|
+
# GitHub: merged PRs with review status
|
|
114
|
+
gh pr list --state merged --limit 20 --json number,title,author,reviewDecision,mergedAt,mergedBy
|
|
115
|
+
|
|
116
|
+
# GitHub: branch protection
|
|
117
|
+
gh api repos/{owner}/{repo}/branches/main/protection | jq '{
|
|
118
|
+
required_reviews: .required_pull_request_reviews.required_approving_review_count,
|
|
119
|
+
enforce_admins: .enforce_admins.enabled
|
|
120
|
+
}'
|
|
121
|
+
```
|
|
122
|
+
|
|
123
|
+
---
|
|
124
|
+
|
|
125
|
+
## Availability — For SaaS and Infrastructure
|
|
126
|
+
|
|
127
|
+
### A 1.1 — System Availability Monitoring
|
|
128
|
+
|
|
129
|
+
**Priority**: High | **NIST**: SC-5, SI-4 | **ISO**: A.8.6, A.8.16
|
|
130
|
+
|
|
131
|
+
Monitor capacity and availability to meet commitments.
|
|
132
|
+
|
|
133
|
+
**What auditors test**:
|
|
134
|
+
- Uptime monitoring: is there a system monitoring availability?
|
|
135
|
+
- Capacity planning: is there a process for scaling?
|
|
136
|
+
- Status page: is availability communicated to customers?
|
|
137
|
+
|
|
138
|
+
---
|
|
139
|
+
|
|
140
|
+
### A 1.2 — Recovery Planning
|
|
141
|
+
|
|
142
|
+
**Priority**: High | **NIST**: CP-2, CP-6, CP-7 | **ISO**: A.5.30, A.8.14
|
|
143
|
+
|
|
144
|
+
Environmental protections and recovery infrastructure support availability commitments.
|
|
145
|
+
|
|
146
|
+
**What auditors test**:
|
|
147
|
+
- Multi-AZ or multi-region deployment for production
|
|
148
|
+
- Auto-scaling configuration
|
|
149
|
+
- Failover testing records
|
|
150
|
+
|
|
151
|
+
---
|
|
152
|
+
|
|
153
|
+
### A 1.3 — Recovery Testing
|
|
154
|
+
|
|
155
|
+
**Priority**: High | **NIST**: CP-4 | **ISO**: A.5.30
|
|
156
|
+
|
|
157
|
+
Recovery plans are tested periodically.
|
|
158
|
+
|
|
159
|
+
**What auditors test**:
|
|
160
|
+
- DR test records (date, scope, results)
|
|
161
|
+
- Actual recovery time vs. RTO target
|
|
162
|
+
|
|
163
|
+
---
|
|
164
|
+
|
|
165
|
+
## Processing Integrity — For Data Processing Services
|
|
166
|
+
|
|
167
|
+
### PI 1.1-1.3 — Processing Completeness, Accuracy, and Timeliness
|
|
168
|
+
|
|
169
|
+
**Priority**: Medium | **NIST**: SI-10, SI-11 | **ISO**: A.8.28
|
|
170
|
+
|
|
171
|
+
System processing is complete, valid, accurate, and timely.
|
|
172
|
+
|
|
173
|
+
**What auditors test**:
|
|
174
|
+
- Input validation controls
|
|
175
|
+
- Error handling and exception reporting
|
|
176
|
+
- Reconciliation processes for data accuracy
|
|
177
|
+
- SLA monitoring for timeliness
|
|
178
|
+
|
|
179
|
+
---
|
|
180
|
+
|
|
181
|
+
## Confidentiality — For Sensitive Data
|
|
182
|
+
|
|
183
|
+
### C 1.1 — Confidential Information Protection
|
|
184
|
+
|
|
185
|
+
**Priority**: High | **NIST**: AC-21, SC-28 | **ISO**: A.5.14, A.8.24
|
|
186
|
+
|
|
187
|
+
Confidential information is protected during processing and storage.
|
|
188
|
+
|
|
189
|
+
**What auditors test**:
|
|
190
|
+
- Data classification scheme
|
|
191
|
+
- Encryption at rest for confidential data
|
|
192
|
+
- Access restrictions based on classification
|
|
193
|
+
|
|
194
|
+
### C 1.2 — Confidential Information Disposal
|
|
195
|
+
|
|
196
|
+
**Priority**: Medium | **NIST**: MP-6, SI-12 | **ISO**: A.7.14, A.8.10
|
|
197
|
+
|
|
198
|
+
Confidential information is disposed of when no longer needed.
|
|
199
|
+
|
|
200
|
+
**What auditors test**:
|
|
201
|
+
- Data retention policy
|
|
202
|
+
- Evidence of data disposal (deletion records, media destruction)
|
|
203
|
+
|
|
204
|
+
---
|
|
205
|
+
|
|
206
|
+
## Privacy — When Processing PII
|
|
207
|
+
|
|
208
|
+
### P 4.2 — Privacy Notice
|
|
209
|
+
|
|
210
|
+
**Priority**: Medium | **ISO**: A.5.34
|
|
211
|
+
|
|
212
|
+
Privacy notice is provided and accessible.
|
|
213
|
+
|
|
214
|
+
### P 6.1-6.6 — Data Subject Rights and Incident Response
|
|
215
|
+
|
|
216
|
+
**Priority**: Medium (if PII in scope)
|
|
217
|
+
|
|
218
|
+
Data subject requests are handled. Privacy incidents are reported.
|
|
219
|
+
|
|
220
|
+
**What auditors test**:
|
|
221
|
+
- Privacy policy on website
|
|
222
|
+
- Process for data subject access requests (DSARs)
|
|
223
|
+
- Privacy incident notification process
|
|
224
|
+
- Data processing agreements with sub-processors
|
|
225
|
+
|
|
226
|
+
### P 8.1 — Quality Assurance
|
|
227
|
+
|
|
228
|
+
**Priority**: Low
|
|
229
|
+
|
|
230
|
+
Data quality procedures are in place.
|
|
@@ -167,3 +167,12 @@ Use `list_templates` (MCP) or `list --json` (CLI) for the latest inventory and f
|
|
|
167
167
|
- NVCA model documents are licensed under CC-BY-4.0
|
|
168
168
|
- These documents are typically used together as a suite for a priced equity round
|
|
169
169
|
- This tool does not provide legal advice — consult an attorney
|
|
170
|
+
|
|
171
|
+
## Bespoke edits (beyond template fields)
|
|
172
|
+
|
|
173
|
+
If you need to edit boilerplate or add custom language that is not exposed as a template field,
|
|
174
|
+
use the `edit-docx-agreement` skill to surgically edit the generated DOCX and produce a
|
|
175
|
+
tracked-changes output for review. This requires a separately configured Safe Docx MCP server.
|
|
176
|
+
|
|
177
|
+
Note: templates licensed under CC-BY-ND-4.0 (e.g., YC SAFEs) can be filled for your own use
|
|
178
|
+
but must not be redistributed in modified form.
|