📄️ ISMS
Redback Operations ISMS Guide
📄️ Gap Analysis
Redback Operations Policy
📄️ Cryptography Policy
Redback Operations Cryptography Policy
📄️ DLP & Data Classification
Redback Operations Policy
📄️ Endpoint Security
Redback Operations Policy
📄️ EASM
Redback Operations Policy
📄️ Monitoring & Log Analytics
Monitoring & Log Analytics High-Level Guidelines for Redback Operations
📄️ Server Security Policy
Server Security High-Level Guidelines for Redback Operations
📄️ Cybersecurity User Awareness Training Policy
Redback Operations Cybersecurity User Awareness Training Policy
📄️ Cyber Security Metrics
Below are the 7 metrics listed in the ISMS in more detail