Skip to content

Annual Security Policy Review

Purpose

This policy defines RunWhen’s scope of annual security policy reviews.


User Credentials

  • Reconcile user credentials for Google Workspace here with active employees/contractors.
  • Reconcile user credentials for GitHub here with active employees/contractors.

Endpoint Security (macOS Fleet)

  • All Macs enrolled in MDM (Jamf/Kandji/Mosyle).
  • FileVault enabled and keys escrowed.
  • Firewall enabled.
  • Automatic OS updates enforced.
  • Auto-lock after ≤15 minutes inactivity (screenshot or MDM report).
  • USB storage devices blocked by policy.
  • Verify MDM compliance reports available for audit.

Data Protection

  • Data Retention & Deletion Policy reviewed and updated.
  • Verify scheduled deletion jobs (Google Workspace, GitHub, databases, logs).
  • Spot-check 1–2 customer offboarding cases for data deletion evidence.
  • Verify backups are encrypted and tested for restoration.

Cloud & SaaS Security

  • Review IAM permissions for all individuals and groups in GCP.
  • Review GCP audit logs for any unexplained access.
  • Verify MFA enabled for cloud admin accounts.
  • Review GitHub org-level security settings (branch protection, code scanning).
  • All production firewall rules and change requests should be reviewed for accuracy.
  • Confirm monitoring/logging tools are enabled (GCP audit logs).

Policies & Procedures

  • Review all policy documents here, including:
    • Data Deletion Policy reviewed and approved.
    • Access Control Policy reviewed and approved.
    • Incident Response Plan tested with at least one tabletop exercise.
    • Business Continuity Plan reviewed, disaster recovery tested.
  • Security awareness training delivered to all employees.

Vendor & Third-Party Risk

  • Review list of active vendors with any API keys stored in vault.
  • Ensure vendor contracts include data protection/security terms.
  • Reassess critical vendors (cloud providers, SaaS tools, contractors).

Audit Evidence

  • Collect and archive screenshots, compliance reports, and logs.
  • Store evidence in secure internal drive with date-stamps.
  • Document remediation for any failed checks.

Governance

This policy is jointly owned by the Head of Engineering and Head of Security/Compliance, and it is reviewed at least annually or whenever practices evolve significantly.

For any questions or clarifications regarding this policy, please contact the Security or Engineering leadership team.