Thirdwatch / README.md
austinsonger's picture
Update README.md
cc06108 verified
metadata
tags:
  - security

Addresses a critical and often cumbersome aspect of business operations—ensuring that third-party partners, suppliers, and service providers meet the necessary security and operational standards.

Table of Contents

Dataset Components

Dataset Component Description Data Type Example
Security Attestation Summary or key points from security attestation reports (e.g., SOC 2 Type 2). Unstructured "Encryption at rest and in transit, Multi-factor authentication implemented"
BCP Effectiveness Evaluation metrics or summaries highlighting the effectiveness of the Business Continuity Plan. Unstructured "BCP covers all critical operations, tested annually"
DRP Readiness Insights into the Disaster Recovery Plan's readiness and strategic approaches. Unstructured "RTO and RPO defined for all key services, DR drills conducted semi-annually"
Cybersecurity Maturity Assessment of the cybersecurity program's maturity level. Structured "Level 3 - Managed and Measurable"
Financial Health Key financial metrics indicating the company's financial stability. Structured "Current Ratio: 1.8, Debt to Equity Ratio: 0.3"
Contract Compliance Key points from contracts and SLAs, including compliance with specified security requirements. Unstructured "SLA includes 99.9% uptime guarantee, penalties for data breaches"

What I need to collect:

Security Attestation

  • [IN-PROGRESS] Key security controls implemented
  • Findings from the audit/assessment
  • Compliance status and areas of improvement
  • Summary of security measures like encryption, access controls, etc.
  • Any significant observations or exceptions noted in the report

BCP Effectiveness

  • Summary of BCP tests and exercises
  • Coverage of critical operations in the BCP
  • Frequency and results of BCP testing
  • Any identified gaps and improvements
  • Metrics like Recovery Time Objective (RTO) and Recovery Point Objective (RPO) achieved during tests

DRP Readiness

  • Summary of DRP and its strategic approaches
  • DR drills and testing frequency
  • Achieved RTO and RPO for critical services
  • Readiness status and any identified improvements
  • Key dependencies and risks identified in the DRP

Cybersecurity Maturity

  • Cybersecurity maturity model used (e.g., CMMI, NIST CSF)
  • Current maturity level and criteria met
  • Areas of strength and improvement
  • Specific scores or ratings for different cybersecurity domains
  • Summary of assessment findings

Financial Health

  • Key financial ratios (e.g., Current Ratio, Debt to Equity Ratio)
  • Financial stability indicators (e.g., Profit Margin, EBITDA)
  • Cash flow statements
  • Balance sheet summaries
  • Financial trends and forecasts

Contract Compliance

  • [IN-PROGRESS] Key compliance requirements from contracts and SLAs
  • [IN-PROGRESS] Security requirements and obligations
  • Uptime guarantees and penalties
  • Summary of compliance status
  • Any exceptions or non-compliance issues noted