← Back to brief

reference vendor security posture

memory · reference_vendor_security_posture.md

Posture model

For each vendor, we track:

Risk register

Tier 1 — Critical (full PII access)

#### Cloudflare (Pages + KV + Workers)

#### Google Workspace (Gmail + Calendar + Drive)

#### HubSpot (Sales CRM)

Tier 2 — Important (PII + revenue data)

#### Track (PMS)

#### KeyData (Market analytics)

#### SmartLead (Cold outreach platform)

#### BeenVerified (Premium contact enrichment)

Tier 3 — Operational (no PII, low risk)

#### ntfy.sh

#### Anthropic API + Claude Code

#### iCloud (Quarterly backup mirror)

#### Operto / RiaMAze / PriceLabs / Rental Guardian

Vendor incident triggers

If any vendor announces a security incident OR Joseph receives a breach notification:

1. Within 1 hour: Read the incident notice. Identify which data was exposed.
2. Within 24 hours: Rotate all tokens/credentials for that vendor. Run python3 secrets.py rotate <account> <new>.
3. Within 72 hours: Audit operator data for compromise indicators (unexpected access, anomalous activity in vendor logs).
4. Within 7 days: Document the incident in ~/Desktop/SkyRun/audit/incidents/<date>_<vendor>_breach.md with: vendor, scope, data classes affected, mitigations applied, residual risk.
5. If L3 PII confirmed exposed: consider operator's notification obligations under state breach laws (CO Colorado Privacy Act applies to GC operations).

Annual vendor review

Joseph re-reviews this register every quarter (or sooner if relationships change):

Add new vendors to this register IMMEDIATELY when integrated.

Cross-references