Skip to content

Vendor Management

Overview

MenoTime relies on third-party vendors and cloud services to deliver its platform. All vendors that handle PHI or have access to sensitive systems must be rigorously assessed and managed according to HIPAA requirements and MenoTime's security standards.

Golden Rule: A vendor's security is part of MenoTime's security. Never grant access to sensitive systems without proper due diligence.

Vendor Categories

1. Cloud Services (AWS)

Vendor: Amazon Web Services Relationship: Infrastructure provider (IaaS) PHI Access: YES (stores encrypted PHI) BAA Status: SIGNED ✓ Risk Level: Critical (foundational infrastructure)

Key Protections: - Business Associate Agreement in place - Data encrypted at rest and in transit - AWS shared responsibility model documented - Annual third-party audit (SOC 2 Type II) - AWS compliance certifications (ISO 27001, HIPAA, FedRAMP)

AWS-Specific Requirements: - All data encrypted with customer-managed KMS keys - VPC isolation for MenoTime infrastructure - No third-party access to MenoTime data - AWS maintains comprehensive audit logs - Data breach notification requirement in BAA

2. SaaS Tools

Examples: Slack, GitHub, Datadog, Okta

Tool Purpose PHI Access BAA Approved Risk Level
Slack Communication NO Not needed ✓ Yes Low
GitHub Enterprise Source control NO (code only) Not needed ✓ Yes Medium
Datadog Monitoring/logs Partial* Signed ✓ Yes Medium
Okta Identity mgmt NO (auth metadata only) Not needed ✓ Yes Medium
AWS Infrastructure YES Signed ✓ Yes Critical

*Datadog sees log data, but NOT in plaintext (encrypted before transmission)

3. Email Service

Vendor: AWS SES (Simple Email Service) Relationship: Email delivery (transactional, no sensitive content) PHI Access: NO (no PHI in email) BAA Status: Covered under AWS BAA ✓ Risk Level: Low

Rules: - Never send PHI via email (this is a HIPAA rule, not SES-specific) - Secure file links or download tokens instead of attachments - Use encryption for any sensitive non-PHI data - No credentials, API keys, or secrets in email

4. Development and Testing Tools

Examples: Auth0, Stripe (for testing), SendGrid

Assessment Requirements: - Does it handle PHI? (YES = BAA required) - Data residency (where is data stored?) - Encryption standards - Security certifications (SOC 2, ISO 27001, etc.) - Data breach notification terms - Subprocessor disclosure

Vendor Assessment Process

Step 1: Initial Risk Assessment

Before engaging any vendor, complete a risk assessment:

Questionnaire:

VENDOR SECURITY ASSESSMENT
Vendor Name: _____________________
Category: ☐ Cloud ☐ SaaS ☐ Professional Services ☐ Hardware ☐ Other

1. DOES THIS VENDOR HANDLE PHI?
   ☐ No (PHI not accessed) → LOW risk, no BAA required
   ☐ Yes (PHI access required) → MEDIUM/HIGH risk, BAA required

2. DATA PROTECTION
   ☐ Encryption at rest (AES-256 or equivalent)
   ☐ Encryption in transit (TLS 1.2+)
   ☐ Customer-managed encryption keys
   ☐ Data residency in US only
   ☐ No third-party access to customer data

3. SECURITY CERTIFICATIONS
   ☐ SOC 2 Type II (most recent audit)
   ☐ ISO 27001
   ☐ HIPAA compliance certification
   ☐ FedRAMP (for federal systems)
   ☐ Other: _________________

4. OPERATIONAL SECURITY
   ☐ Incident response procedures documented
   ☐ Breach notification within 60 days
   ☐ Security event logging
   ☐ Access controls and MFA
   ☐ Regular security updates

5. DATA HANDLING
   ☐ Minimal data collection (principle of least data)
   ☐ No data sharing with third parties
   ☐ Data deletion upon contract termination
   ☐ Data portability (can export data)
   ☐ No automated decision-making on PHI

6. CONTRACTUAL TERMS
   ☐ Data Processing Agreement available
   ☐ Subprocessor notification required
   ☐ Audit rights granted to customer
   ☐ Data protection terms aligned with HIPAA
   ☐ Liability and indemnification clauses

ASSESSMENT RESULT:
☐ APPROVED (all major items checked)
☐ CONDITIONAL (missing items must be resolved before use)
☐ DENIED (too risky; use alternative vendor)

Approved by: _________________ Date: __________

For vendors with PHI access, Legal team must:

  1. Review vendor's Data Processing Agreement (DPA)
  2. Does it meet HIPAA requirements?
  3. Is PHI handling adequately protected?
  4. Are subprocessors identified?
  5. Are audit rights granted?

  6. Negotiate Business Associate Agreement (BAA)

  7. Standard HIPAA BAA language required
  8. MenoTime customizations (if any)
  9. Data breach notification procedures (60-day requirement)
  10. Data destruction upon termination
  11. Permissible uses and disclosures

  12. Document Subprocessors

  13. Does vendor use third parties? (e.g., cloud hosting)
  14. Does subprocessor handle PHI?
  15. Is subprocessor BAA'd?
  16. Notification process if subprocessor changes

Step 3: Technical Verification

Security team verifies technical claims:

For Cloud/Infrastructure Vendors: - Verify encryption algorithms (AES-256, TLS 1.2+) - Review data center physical security - Confirm ISO 27001 or SOC 2 audit - Validate disaster recovery and backup procedures - Review incident response capabilities

For SaaS Vendors: - Review security documentation and audit reports - Confirm data residency and retention policies - Verify API security (authentication, rate limiting) - Test access controls and permission models - Review subprocessor list

Example: Okta Security Verification

# Verify Okta SOC 2 compliance
curl -s https://www.okta.com/trust/ | grep -i "soc 2"

# Review Okta security posture
curl -s https://api.okta.com/.well-known/openid-configuration | jq .

# Verify TLS version support
openssl s_client -tls1_2 -connect okta.com:443 < /dev/null

Step 4: Contract Execution

Before any vendor is used:

  1. ✓ Security assessment complete and approved
  2. ✓ Legal review complete
  3. ✓ BAA signed (if PHI access)
  4. ✓ DPA signed (if data processing)
  5. ✓ Vendor added to approved vendor list
  6. ✓ Subprocessor list documented
  7. ✓ Access control provisioning complete

Approved Vendor List

Critical Infrastructure (PHI Access)

Vendor Service BAA Risk Level Review Date
AWS Cloud hosting ✓ Signed Critical 2024-01-15

SaaS and Services (No PHI)

Vendor Service DPA Certifications Risk Level Review Date
GitHub Enterprise Source control ✓ Signed SOC 2 Type II Medium 2024-01-15
Okta Identity/MFA ✓ Signed SOC 2 Type II, ISO 27001 Medium 2024-01-15
Datadog Monitoring ✓ Signed SOC 2 Type II Medium 2024-01-15
Slack Communication ✓ Signed SOC 2 Type II Low 2024-01-15

Unapproved Vendors

Vendor Service Reason Alternative
Dropbox (personal) File sync No SOC 2, unclear encryption AWS S3
Personal email Communication Unencrypted, retention unknown Company email
Zoom (free) Conferencing Limited security features Zoom paid plan

Subprocessor Management

Subprocessor Definition

A subprocessor is a vendor that handles data on behalf of the primary vendor. For example: - AWS uses third-party data centers (regions/AZs) - Okta may use AWS or other cloud providers - GitHub uses Microsoft Azure

Subprocessor Notification

MenoTime must:

  1. Maintain subprocessor list (documented)
  2. Notify customers if subprocessor changes
  3. Require subprocessor BAA (contract flow-down)
  4. Audit subprocessor compliance (annually)

Subprocessor Disclosure Process:

  1. Vendor provides list of subprocessors
  2. Legal reviews subprocessor terms
  3. Security team assesses risk
  4. If risky: negotiate removal or replacement
  5. Document final subprocessor list

Example AWS Subprocessor Identification:

# AWS publishes list of subcontractors
curl -s https://d0.awsstatic.com/legal/operationalrisks/index.html
# Lists AWS regions, data centers, and any AWS-owned subprocessors

Vendor Data Access and Controls

Access Levels

Level 1: No Data Access - Read documentation only - No system access - Examples: Consultant, vendor rep

Level 2: Limited Read-Only - Can view logs/metrics (non-PHI) - Cannot access application data - Examples: Monitoring tools, log analysis

Level 3: Application Data (No PHI) - Can access source code, test data - Explicit prohibition on PHI access - Examples: GitHub (code repository)

Level 4: Production Access (Non-PHI) - Full production access (metrics, logs, infrastructure) - Encrypted logs, no PHI visibility - Examples: AWS, Datadog (monitoring)

Level 5: PHI Access (Rare) - Can access or process PHI - Requires HIPAA BAA and strict controls - Examples: AWS infrastructure (encrypted PHI at rest)

Controlling Vendor Access

AWS IAM for Vendor Access:

{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Sid": "VendorReadOnly",
      "Effect": "Allow",
      "Action": [
        "ec2:Describe*",
        "rds:Describe*",
        "logs:GetLogEvents"
      ],
      "Resource": "*",
      "Condition": {
        "StringEquals": {
          "aws:username": "vendor-monitoring-tool"
        }
      }
    },
    {
      "Sid": "ProhibitPHIAccess",
      "Effect": "Deny",
      "Action": [
        "rds-db:connect",
        "s3:GetObject"
      ],
      "Resource": [
        "arn:aws:rds-db:*:ACCOUNT_ID:dbuser:*/menotime_app",
        "arn:aws:s3:::menotime-prod-data/*"
      ]
    }
  ]
}

Time-Limited Access:

# terraform/vendor-access.tf
resource "aws_iam_user" "vendor_monitoring" {
  name = "vendor-datadog"
}

# Access expires after 1 year
resource "aws_iam_policy" "vendor_monitoring_policy" {
  name = "vendor-datadog-policy"

  policy = jsonencode({
    Version = "2012-10-17"
    Statement = [
      {
        Effect = "Allow"
        Action = [
          "cloudwatch:GetMetricStatistics",
          "logs:GetLogEvents"
        ]
        Resource = "*"
        Condition = {
          DateGreaterThan = {
            "aws:CurrentTime" = "2024-01-01T00:00:00Z"
          }
          DateLessThan = {
            "aws:CurrentTime" = "2025-01-01T00:00:00Z"
          }
        }
      }
    ]
  })
}

Annual Vendor Review

Review Schedule

Every vendor is reviewed annually to ensure:

  1. Compliance status (certifications still valid)
  2. Contractual obligations (BAA/DPA still in force)
  3. Security incidents (did vendor have a breach?)
  4. Access usage (is vendor still needing access?)
  5. Cost and value (is vendor still necessary?)
  6. SLA performance (is vendor meeting performance targets?)

Annual Review Checklist

VENDOR ANNUAL REVIEW
Vendor: _____________________ Review Date: __________

COMPLIANCE:
☐ SOC 2/ISO 27001 certification still valid? (expiration date: ___)
☐ No known security breaches in past year?
☐ Compliant with HIPAA/GDPR requirements?
☐ Signed BAA/DPA current and in force?

CONTRACTUAL:
☐ Contract not expired? (expiration date: ___)
☐ Pricing terms competitive?
☐ SLA terms being met?
☐ Data breach notification procedure tested?

SECURITY:
☐ No unauthorized access incidents?
☐ No data exposure or compromise?
☐ Subprocessor list unchanged?
☐ Security controls functioning?

OPERATIONAL:
☐ Vendor still needed for business function?
☐ Utilization level adequate (cost-benefit)?
☐ No viable replacement available?
☐ Performance/uptime acceptable?

DECISION:
☐ CONTINUE (vendor meets all requirements)
☐ CONDITIONAL (must address items below before renewal)
☐ TERMINATE (replace with alternative vendor)

Issues to address:
- _______________________________________________
- _______________________________________________

Reviewed by: _________________ Date: __________
Approved by: _________________ Date: __________

Vendor Offboarding

Termination Procedures

When a vendor relationship ends:

Immediate (Day 1): 1. Revoke all access credentials 2. Disable API keys and tokens 3. Remove from AWS IAM 4. Confirm access is blocked (test login)

Short-Term (Days 1-7): 1. Retrieve any data vendor has (if applicable) 2. Verify data deletion from vendor systems 3. Confirm no outstanding backup access 4. Remove from documentation and runbooks

Documentation: 1. Document data deletion confirmation 2. Record termination date and reason 3. Archive vendor assessment documents 4. Update approved vendor list

Example: Slack Offboarding

# Revoke bot token
curl -X POST https://slack.com/api/auth.revoke \
  -H "Authorization: Bearer xoxb-TOKEN" \
  -d "token=xoxb-TOKEN"

# Remove workspace application
# (Manual step in Slack workspace settings)

# Export workspace data (if needed)
aws s3 sync slack-export/ s3://menotime-exports/slack/

Vendor Security Incident Response

If Vendor Has a Breach

If a vendor experiences a security breach:

  1. Immediate (< 1 hour)
  2. Notify MenoTime Security Officer
  3. Determine scope (what MenoTime data was exposed?)
  4. Assess if MenoTime PHI was compromised

  5. Day 1

  6. Vendor must provide breach notification
  7. Review vendor's incident response report
  8. Assess impact on MenoTime systems
  9. Determine if customer notification required

  10. Days 1-60

  11. Investigate vendor's incident (audit logs, access patterns)
  12. Determine if re-attestation or remediation needed
  13. Document findings
  14. Notify customers if MenoTime PHI was exposed

  15. Decision

  16. Continue vendor with enhanced controls?
  17. Terminate vendor immediately?
  18. Require security improvements before continuing?

Vendor Security Incident Checklist

VENDOR BREACH ASSESSMENT
Vendor: _____________________ Incident Date: __________
Breach Notification Received: ________________

INITIAL ASSESSMENT:
☐ What data was exposed? (describe)
☐ Does MenoTime data fall in scope?
☐ Was PHI compromised? (YES/NO)
☐ How many MenoTime records affected? ______

IMPACT DETERMINATION:
☐ Confidentiality impact? (data disclosure)
☐ Integrity impact? (data modification)
☐ Availability impact? (system downage)
☐ Regulatory impact? (HIPAA breach? YES/NO)

RESPONSE ACTIONS:
☐ Notify affected customers (if PHI exposed)
☐ Rotate MenoTime credentials in vendor
☐ Review vendor's incident response
☐ Increase monitoring of vendor access
☐ Assess continued vendor relationship

DECISION:
☐ CONTINUE (incident contained, vendor acceptable)
☐ CONDITIONAL (require vendor remediation plan)
☐ TERMINATE (breach unacceptable, replace vendor)

Decision made by: _________________ Date: __________

Vendor Compliance Reporting

Quarterly Vendor Summary

Quarterly report to executive leadership:

VENDOR COMPLIANCE REPORT - Q1 2024

VENDOR STATUS:
- Total active vendors: 8
- Vendors with PHI access: 1 (AWS)
- Vendors with signed BAA: 1
- Vendors with SOC 2 certification: 7/8

SECURITY INCIDENTS:
- Vendor-related incidents: 0
- Vendor access violations: 0
- Unauthorized access attempts: 0

ACTIONS TAKEN:
- Annual reviews completed: 3
- New vendor onboarding: 1 (GitHub Enterprise)
- Vendor offboarding: 1 (old monitoring tool)
- Security assessments: 2

UPCOMING:
- AWS BAA renewal: Q2 2024
- Datadog SOC 2 review: Q2 2024
- Okta annual audit: Q3 2024

RISKS:
- No high-risk vendors identified
- All BAAs current and valid
- No compliance gaps identified

Compliance Checklist

  • ✓ All vendors with PHI access have signed BAA
  • ✓ All vendors with data processing have signed DPA
  • ✓ Annual security assessments completed for all vendors
  • ✓ Subprocessor list maintained and reviewed annually
  • ✓ Vendor access controls implemented (least privilege)
  • ✓ Vendor access monitored and logged
  • ✓ Time-limited access for vendors (automatic revocation)
  • ✓ Data deletion procedures documented and tested
  • ✓ Vendor incident response procedures established
  • ✓ Quarterly vendor compliance reports generated
  • ✓ Approved vendor list maintained and updated
  • ✓ Unapproved vendors banned from access

Questions? Contact the Security Officer at security@timelessbiotech.com or the Privacy Officer at privacy@timelessbiotech.com.