📄️ ISMS
Last updated by 28/05/2025
📄️ Gap Analysis
Last updated by 15/05/2024
📄️ cryptography
Last updated by 28/05/2025
📄️ DLP & Data Classification
Last updated by 15/05/2024
📄️ endpoint
Last updated by 30/05/2025
📄️ EASM
Last updated by 15/05/2024
📄️ Monitoring & Log Analytics
Monitoring & Log Analytics High-Level Guidelines for Redback Operations
📄️ Server Security Policy
Server Security High-Level Guidelines for Redback Operations
📄️ User-Awareness-Training
Last updated by 16/05/2025
📄️ Cyber Security Metrics
Last updated by 20/09/2024
📄️ Cloud Security Policy for Redback Operations
Document Creation 19 May 2025. Authors: Nathasha Liyanage.
📄️ Recommended Security Safeguards and Policies for Redback Operations ISMS
Redback Operations ISMS Supplementary Guidance