Third Party Minimum Security Standards
In order to maintain the confidentiality, availability and integrity of Bramble classified data, this minimum security standards guide was developed. This guide is applicable to any Third Party with an inherent risk score of Moderate or High as determined by the first phase of the Third Party Risk Management procedure.
Roles and Responsibilities
Role | Responsibilities |
---|---|
Security Risk Team | Maintain Third Party Minimum Security Standards |
Review provided evidence as part of the Third Party Risk Management activities | |
Communicate observations and advise in remediation | |
Conduct additional risk-based reviews, as applicable | |
Business Owner (requester) | Participate in the initial Inherent Risk determination process |
Provide Minimum Standards guide to the Third Party | |
Act as liaison with Third Party and Security Risk team, as needed, to complete assessment | |
At the end of the engagement, ensure all data is destroyed or returned | |
Participate in periodic access reviews, as applicable |
Standards
The following standards will be reviewed during the Third Party Risk Management procedure.
Third Parties Providing Applications (Free or Paid)
- Third Party must provide a copy of an annual independent audit (example: SOC1, SOC2 or similar) and any applicable bridge letters
- Third Party must provide a copy of an annual independent audit of physical security controls for any in-scope facilities
- Third Party must provide a copy of an annual Penetration Test report and status of any open Critical or High vulnerabilities
- Third Party must have dedicated Security and Risk Management team(s) and documented procedures to support Security and Risk Management Activities
- Third Party access controls must meet or exceed Bramble’s account and password standards and Bramble’s least privilege policy
- Application must meet or exceed Bramble’s application authentication standards
- Application must meet or exceed Bramble’s systems monitoring controls and have the ability to integrate with Bramble’s SIEM
- Third Party endpoints must meet or exceed Bramble’s endpoint security standards
- Third Party endpoints must meet or exceed Bramble’s minimum encryption standards
- Third Party must meet or exceed Bramble’s Human Resources security standards including background checks, security awareness training, and signing confidentiality agreements.
- Third Party must provide data flow diagram, types of data, and storage locations of any Bramble data and, if applicable, any in-scope infrastructure. If the application is hosted on AWS, S3 bucket configurations must be allowed.
- Third Party must provide an attestation of immediate data destruction upon request or when the specific need for that data no longer exists (whichever comes first)
- Third Party must maintain data and infrastructure redundancy to support high availability
- Third Party must provide the last 12 months of uptime data
- Third Party must have a BitSight score of 650 or above
- Third Party must provide a list of any applicable Complementary User Entity Controls (CUECs)
- High Inherent Risk Third Parties must undergo a technical assessment by Bramble’s Security Engineering and Research team.
This information is collected by sending an automated questionnaire from ZenGRC. This questionnaire asks the Third Party to provide:
- A SOC1, SOC2 Type 2 Report (or similar) and any applicable bridge letters. If there are any control deviations identified in that report, we also ask that they provide us with a status.
- A Penetration Test summary report and status of any findings or vulnerabilities.
- Uptime report for the prior 12 months
- Data flow diagram or information on where Bramble data will be stored
- Attestation of data desctruction policy
- Documentation on the Application’s technical securtiy configurations
Third Parties who can not meet these standards will be asked to provide evidence of compensating controls through a more detailed questionnaire that is also sent through ZenGRC.
Third Parties Providing Services
Professional Services Organizations, Resellers, Partners, Alliances, Mergers and Acquisitions
- Third Party must sign Bramble’s Master Partner and SubContractor Agreement or similar contract that includes a provision for confidentiality
- Third Party must provide information on their security and risk management practices and, if applicable, provide a copy of an annual independent audit (example: SOC1, SOC2 or similar) and any applicable bridge letters
- Third Party access controls must meet or exceed Bramble’s account and password standards and Bramble’s least privilege policy
- Third Party endpoints must meet or exceed Bramble’s minimum encryption standards and Bramble’s endpoint security standards.
- Third Party must meet or exceed Bramble’s Human Resources security standards including background checks, security awareness training, and signing confidentiality agreements.
- Third Party must provide data flow diagram, types of data, and storage locations of any Bramble data.
- Third Party must provide an attestation of immediate data destruction upon request or when the specific need for that data no longer exists (whichever comes first)
- Third Party access requests must follow the profesional services access request process.
This information is collected by sending an automated questionnaire from ZenGRC. This questionnaire asks the Third Party to provide:
- A SOC1, SOC2 Type 2 Report (or similar) and any applicable bridge letters. If there are any control deviations identified in that report, we also ask that they provide us with a status.
- Attestation that they can meet or exceed the minimum security standards listed on this page
- Information on where Bramble data will be stored
Individual Contractors
- The Third Party contract must include a provision for confidentiality and/or the Third Party must sign a Non-Disclosure Agreement
- Third Party must undergo the Contractor Onboarding process which includes, at a minimum, security awareness training and review and acknowledgement of the code of conduct.
- Third Party access controls must meet or exceed Bramble’s account and password standards and Bramble’s least privilege policy
- Third Party endpoints must meet or exceed Bramble’s minimum encryption standards and Bramble’s endpoint security standards.
- Third Party access requests must follow the profesional services access request process.
NOTE: If the Contractor is being provided with a Bramble issued endpoint, no information is required from the Contractor to complete the Security Assessment. However, if the Contractor will be using their own device, an automated questionnaire is sent from ZenGRC. This questionnaire asks the Third Party to provide:
- Attestation that they can meet or exceed the minimum security standards listed on this page
- Information on where Bramble data will be stored
Third Parties Providing Physical Services (Field Marketing)
- Third Party must gain consent for any use of personal information
- Third Party must utilize a secured method for receiving personal data such as sharing through a document controlled by Bramble where access can be revoked once completed.
- Third Party endpoints must meet or exceed Bramble’s Security standards
- Third Party endpoints must meet or exceed Bramble’s minimum encryption standards
- Third Party must provide an attestation of immediate data destruction upon request or when the specific need for that data no longer exists (whichever comes first)
Exceptions
- Bramble may engage with a Professional Services Organization that provides a variety of services against multiple Statements of Work. In these cases, the Third Party will undergo a Security Assessment at the time of contract signing and annually thereafter. With each individual engagement, the contractors will follow the procurement contractor process and orientation process for external consultants. Security Assessments will not be conducted for each Statement of Work.
- If a Third Party does not provide the requested documents and/or completed questionnaires within 10 business days, each outstanding item will be rated based on Bramble’s Observation Risk Rating methodology and follow up activity will occur based on the risk.
- If a Third Party cannot meet one of the standards noted on this page, and cannot provide any evidence of a countermeasure, each outstanding item will be rated based on Bramble’s Observation Risk Rating methodology and follow up activity will occur based on the risk. NOTE that in some cases, if the exception is a high enough risk to the organization, it will require a Risk Treatment plan through the Security Operational Risk Management program.
Guidance to sharing data externally
Before sending data outside of Bramble should review the following guidance:
Team members should review the Data Classification Standard. For data that is classified as Yellow or above:Data Classification
Consent for Use
For data that is classified as Yellow or above must have documented consent prior to sharing with Third Parties. Examples include:
For data that is classified as Yellow or above, the following guidelines should be used:Methods of Sharing Data
Bramble’s Tools
Instructions and Controls
Bramble
- Create a new private project dedicated to the engagement with external users.
- Do not create an issue in an existing private project as the Guest level member will not be able to see the issue if private.
- Add the external user with Reporter permissions.
- Open an issue to share the non-public data in the description of the issue and mark it confidential.
- Do not attach documents with the data as the attachment can be accessed unauthenticated with the direct link.
- Include the disclaimer below in the description along with the data.
- Remove the user from the project once done and delete the issue.
Google Workspace
- Create a dedicated folder for External Sharing and a subfolder for the external party.
- Upload the data to a document or sheet and verify the considerations in Step 2 before sending the invite to the external users.
- Include the disclaimer below in the document.
- Share the document to the intended party with the appropriate access level.
- Grant Editor access only if they need to collaborate in order to limit their ability to change permissions or invite others to the sheet.
- Viewer or Commenter access will allow the party to download, print or copy so this is the preference if they do not need to edit the document.
Company email
- Consult the Security Assurance team to validate any additional steps that are needed for the type of data shared.
- Encrypt the document or sheet and password protect. An easy way to accomplish this is by creating a file and encrypting it with the Mac built-in Disk Utility capability.
- Choose a random password generator with at least 60 characters. KeePassXC provides a generator tool where you can adjust the length.
- Add the disclaimer below in the document or create a separate sheet in the workbook.
- When sending the encrypted file, Gmail may prompt you to store it in G-Drive if the size is over 25MB. You should allow this even if your recipient doesn’t have a Google account; the direct link shouldn’t require it.
- Send the password in a separate email to the recipient outside a different channel than the encrypted document sent. For example, if the document was sent via email the password can be shared by a text message, phone call or a different email account.
- Ask the recipient to confirm deletion of the emails once successfully opened, and the document when no longer needed.
For data that is classified as Yellow or above: Disclaimer THIS DOCUMENT IS DISCLOSED ONLY TO THE RECIPIENT TO WHOM THIS DOCUMENT IS ADDRESSED AND IS PURSUANT TO A RELATIONSHIP OF CONFIDENTIALITY UNDER WHICH THE RECIPIENT HAS OBLIGATIONS OF CONFIDENTIALITY. THIS DOCUMENT MAY CONTAIN CONFIDENTIAL INFORMATION, PROPRIETARY INFORMATION AND/OR TRADE SECRETS (COLLECTIVELY “CONFIDENTIAL INFORMATION”) BELONGING TO GITLAB INC. AND/OR ITS AFFILIATES AND/OR SUBSIDIARIES. THE CONFIDENTIAL INFORMATION IS TO BE USED BY THE RECIPIENT ONLY FOR THE PURPOSE FOR WHICH THIS DOCUMENT IS SUPPLIED. THE CONTENTS OF THIS DOCUMENT ARE PROVIDED IN COMMERCIAL CONFIDENCE, SOLELY FOR THE PURPOSE, THIS DOCUMENT IS SUPPLIED TO THE RECIPIENT, BY GITLAB. ANY INFORMATION THAT GITLAB CONSIDERS TO BE A CONFIDENTIAL INFORMATION WILL NOT BE SUBJECT TO DISCLOSURE UNDER ANY PUBLIC RECORDS ACT. ANY DATA LOCALLY STORED MUST BE RETURNED AND/OR DISPOSED UPON COMPLETION OR NO LONGER NEEDED. PLEASE CONFIRM IN THIS DOCUMENT ONCE THE DISPOSAL IS DONE.Additional Tips