1.3 KiB
1.3 KiB
name, description
| name | description |
|---|---|
| procurement-playbook | Use to manage legal, security, and procurement workflows for complex deals. |
Procurement Playbook Skill
When to Use
- Enterprise deals entering security/privacy review or contract negotiation.
- RFP/RFI responses requiring coordinated SME input.
- Situations with heavy exception requests, custom terms, or compliance evidence.
Framework
- Requirement Intake – capture questionnaires, policy docs, and mandatory deliverables.
- Workstream Mapping – assign internal SMEs (legal, security, privacy, finance) with timelines.
- Evidence Library – maintain templates for SOC2, penetration tests, insurance, data flows, DPIA.
- Exception Management – document asks, approvals, fallback positions, and decision owners.
- Closeout – log final concessions, expirations, and follow-up obligations.
Templates
- Procurement workback plan (deliverable, owner, due date, status).
- Security questionnaire index with sourcing notes.
- Exception request log with approval layers.
Tips
- Keep source-of-truth links updated; expired certifications stall reviews.
- Coordinate with
cxo-briefing-kitfor executive escalations. - Pair with
risk-registerto surface procurement blockers early.