Skip to main content

Last updated by: RamGcia, Last updated on: 16/05/2026

Statement of Applicability

Redback Operations – ISO27001:2022 ISMS

Document CodeRO – SOA – 001
Version1.0
Document OwnerEthics / GRC Team
ISO ReferenceISO/IEC 27001:2022 – Annex A
Prepared ByRamon Garcia – Ethics / GRC Team Lead

Purpose

This Statement of Applicability documents the 93 controls that are from Annex A, ISO: IEC27001:2022. It declares whether each control is applicable, partially applicable or not applicable to Redback Operations. It also provides a justification as to why that control is relevant / not relevant to the company. This is a mandatory document as per the ISO:IEC27001:2022 ISMS.

Scope

This SoA is applicable to all assets, systems and members of Redback Operations that is defined within the scope statement document (RO-ISMS-001).

ISMS Document Suite Relevance

The applicability decisions in this SoA are informed by the following Redback Operations ISMS documents:

  • RO-POL-001 – Information Security Policy
  • RO-POL-002 – Access Control Policy
  • RO-POL-003 – Acceptable Use Policy
  • RO-POL-004 – Incident Response Policy
  • RO-POL-005 – Secure Development Policy
  • RO-POL-006 – Data Handling Policy
  • RO-ISMS-001 – ISMS Scope Statement
  • RO-REG-001 – Asset Register
  • RO-REG-002 – Risk Register
  • RO-AUDIT-GIT-001 – GitHub Audit Report
  • RO-CL-001 – Onboarding & Offboarding Procedure

Applicability Summary

Applicable55
Partial11
Not Applicable27
Total Controls93

Status Legend

ApplicableControl is applicable and implemented or planned within this trimester.
PartialControl is applicable but only partially implemented; noted in Gap Analysis.
Not ApplicableControl does not apply to Redback Operations. Justification provided.

Annex A Controls

Control IDControl NameStatusJustification & Implementation Evidence
5 – Organisational Controls
5.1Policies for information securityApplicableRedback Operations operates on a rotational basis every trimester, continuity is necessity for Redback Operations' security posture, therefore policies are established and maintained. Information Security Policy is present and available to all Redback Operations Members. The Acceptable Use Policy, Secure Development Policy, Access Control Policy and Data Handling Policy is present in the ISMS suite as well.
5.2Information security roles and responsibilitiesApplicableStudents' roles change per trimester, therefore, the role they are assigned needs to have established responsibilities. Roles are defined across the ISMS suite. Ethics / GRC, Blue Team, SecDevOps, Team Leads and their corresponding team members are defined. Their responsibilities are documented in the Access Control Policy and Incident Response Policy.
5.3Segregation of dutiesApplicableDifferent students have different responsibilities as per their role in Redback Operations. Separation of duties is documented in the Access Control Policy. No single student controls an entire system.
5.4Management responsibilitiesApplicableDeakin staff are the leading figures in Redback Operations due to it being a student-driven company needing supervision whilst the Ethics / GRC team holds ISMS ownership. The tutor and unit chair are established as individuals for escalation. Defined in the Incident Response Policy.
5.5Contact with authoritiesPartialDeakin staff such as the tutor or unit chair are the escalation points. There is no formal external authority contact procedure.
5.6Contact with special interest groupsNot ApplicableRedback Operations is a student capstone company; they do not engage with external groups.
5.7Threat intelligenceNot ApplicableNo formal threat intelligence system is defined. Not applicable to Redback Operations it is out of scope and not at that maturity level.
5.8Information security in project managementApplicableThis control applies to Redback Operations specifically as we have publicly facing repositories and a rotational nature with students. Policies include principles such as Secure by design and Need to Know, policies are established since there are no 'long-time' developers in the company.
5.9Inventory of information and other associated assetsApplicableAsset Register is established with classification, ownerships, risks and controls across all of Redback Operations. Control is applicable to Redback Operations as the company handles physical and digital assets and also important to track assets that are handled by Deakin but utilised by Redback.
5.10Acceptable use of information and other assetsApplicableRedback Operations handles sensitive information and controls publicly facing repositories. Utilisation of an Acceptable Use Policy (RO – POL – 001) is present in the ISMS suite in order to state appropriate use of Redback's systems and assets.
5.11Return of assetsApplicableOffboarding Procedure ( RO – CL – 001) requires handover and deletion of local data from personal devices. Applicable to Redback due to their rotational nature, emphasising the necessity for offboarding.
5.12Classification of informationApplicableIn Data Handling Policy and Asset Register, information is categorised into Confidential, Internal and Public and what each criteria means. Applicable to Redback due to handling sensitive information and having to maintain security awareness of data across all students, across all trimesters.
5.13Labelling of informationPartialClassifications levels are defined and applied in Asset Register however there are no formal labelling conventions on systems, assets and repositories. Suggestion for next cohort.
5.14Information transferApplicableData Handling Policy establishes the restrictions for transferring sensitive data via communication channels. Acceptable Use Policy restricts sharing of credentials and confidential information. Applicable to Redback as we primarily use Microsoft Teams or email secondarily, under Deakin student accounts.
5.15Access controlApplicableAccess Control Policy covers least privilege, need-to-know, MFA and system specific controls. Team-based ownership is also present in policies. Applicable to Redback as the company does not have a centralised access control management system but is instead delegating responsibilities to Team leaders. Established in ROCII as implementing streamlined process for next cohort.
5.16Identity managementApplicableGitHub is managed per trimester. Onboarding and Offboarding Procedure establishes standards for access and revocation of systems. Applicable to Redback due to its rotational nature, leaving potential for shadow identities and accounts maintaining access.
5.17Authentication informationApplicableMFA is mandatory in Access Control Policy. Credentials are not to be shared or hardcoded, Personal Access Tokens are managed in Access Control Policy and Secure Development Policy.
5.18Access rightsApplicableAccess onboarding and offboarding management in RO-CL-001. Access review is established as having to be done at the start of each trimester, present in Access Control Policy. Applicable to Redback specifically as rotational nature leaves potential for unnecessary stale access.
5.19Information security in supplier relationshipsNot ApplicableRedback Operations does not engage with formal suppliers. Tools are open-source or licensed through Deakin.
5.20Addressing security within supplier agreementsNot ApplicableRedback Operations does not engage with formal suppliers and thus does not need to evaluate security within agreements as there are none.
5.21Managing security in the ICT supply chainNot ApplicableNo ICT supply chain is managed by Redback. No formal third-party suppliers to assess security risks and mitigations.
5.22Monitoring, review and change management of supplier servicesNot ApplicableSupplier services are out of scope for Redback Operations, therefore no necessity for this control.
5.23Information security for use of cloud servicesPartialPersonal cloud storage is prohibited for confidential data as defined in the Data Handling Policy. Cloud storage classifications are defined in the DHP. No formal baseline for cloud services and its security.
5.24Information security incident management planning and preparationApplicableIncident Response Policy defines severity levels, roles, escalation paths and a response procedure. Incident Register template is included.
5.25Assessment and decision on information security eventsApplicableIn Incident Response Policy, classification framework is defined. Critical /High /Medium and Low.
5.26Response to information security incidentsApplicableSix-phase incident response procedure (Identification, Logging, Containment, Investigation, Remediation, Lessons Learned) is defined in the Incident Response Policy.
5.27Learning from information security incidentsApplicableLessons Learned Phase is mandated in the IRP as Phase 6. Findings are shared with teams and Incident Register is updated for continuity.
5.28Collection of evidenceApplicableEvidence preservation is required as documented in the Incident Response Policy. Commit History, access logs, Wazuh Logs, Screenshots and communications must be preserved during incidents as per the IRP.
5.29Information security during disruptionNot ApplicableBusiness continuity / disaster recovery planning is outside the scope for Redback Operations. No production systems operated.
5.30ICT readiness for business continuityNot ApplicableNo business continuity programme maintained. Redback Operations does not operate critical production infrastructure.
5.31Legal, statutory, regulatory and contractual requirementsApplicableInformation Security Policy commits to adherence to Victorian Law and Deakin University policies. Acceptable Use Policy references licensing compliance for software. Applicable to Redback due handling information and under Deakin University as a capstone company.
5.32Intellectual property rightsApplicableAcceptable Use Policy prohibits sharing of confidential source code and documentation externally. Repositories default to private as per the Access Control Policy. AUP mandates the use of only open-source or licensed software. D2L Modules outline education on IP.
5.33Protection of recordsApplicableISMS Documents are shared in GitHub Repository or Docusaurus wiki. Incident and Asset Registers are maintained by Ethics / GRC Team. Data Handling Policy defines retention requirements. Applicable to Redback as ISMS suite covers registers that the company has sensitive information on.
5.34Privacy and protection of PIIApplicablePII is classified as confidential in Asset Register and Data Handling Policy. IRP includes specific scenarios for PII exposure in repositories. Secure Development Policy prohibits hardcoded PII. Applicable to Redback Operations due to its presence of PII from individuals who participate in the testing of Redback's projects.
5.35Independent review of information securityPartialGitHub audit was conducted (RO – AUDIT – GIT – 001). Internal audit checklist is planned for next cohort. Independent external audit is not feasible for Redback Operations.
5.36Compliance with policies, rules and standardsApplicableNon-compliance consequences defined in all policies. Escalation to unit chair and tutors are documented. Applicable to Redback specifically as Deakin Staff are supervising students, ensuring no harm is done to Redback Operations' systems and assets.
5.37Documented operating proceduresApplicableOnboarding and Offboarding Procedure provides step-by-step checklist. Applicable to Redback specifically due to its trimester-based rotation.
6 – People Controls
6.1ScreeningNot ApplicableStudent enrolment and background screening is managed by Deakin University, Redback Operations does not handle or have the authority to conduct student screening.
6.2Terms and conditions of employmentApplicableMember acknowledgement form required at onboarding as per the Acceptable Use Policy. Members acknowledge and accept ISMS policies before access is granted.
6.3Information security awareness, education and trainingApplicablePolicy briefing is mandated at onboarding. Security awareness / Ethics modules referenced on D2L. Applicable to Redback due to not all students having a security background.
6.4Disciplinary processApplicableNon-compliance repercussions are defined across all policies. Formal disciplinary authority is held by Deakin University.
6.5Responsibilities after termination or change of employmentApplicableOffboarding Procedure dictates deletion of local data and revocation of all access during conclusion of enrolment. AUP prohibits retention of data after enrolment.
6.6Confidentiality or non-disclosure agreementsPartialMember acknowledgment form covers policy acceptance. There are no formal NDA in place.
6.7Remote workingApplicableAcceptable Use Policy governs personal device use for remote work for Redback Operations. Members required to use updated devices with anti-virus whilst not having local storage of sensitive information. Applicable to Redback Operations since there is no on-site premises to utilise company computers, students utilise their own devices.
6.8Information security event reportingApplicableAll members are required to report incidents to the Ethics / GRC team via Microsoft Teams. Reporting obligations are defined in the Incident Response Policy. Applicable to Redback Operations since a clear policy on how to report incidents is needed to ensure that the same procedure is followed per trimester.
7 – Physical Controls
7.1Physical security perimetersNot ApplicablePhysical environment is out of scope per the Scope Statement. Redback Operations is not responsible for the control or management of the physical premises used by members.
7.2Physical entryNot ApplicablePhysical entry controls are managed by Deakin University, outside of scope of Redback operations.
7.3Securing offices, rooms and facilitiesNot ApplicableRedback Operations does not manage or own facilities.
7.4Physical security monitoringNot ApplicableRedback Operations does not have any physical security monitoring devices or controls. If accessing VM stored at Deakin University, Deakin University is responsible for physical monitoring.
7.5Protecting against physical and environmental threatsNot ApplicableEnvironmental controls are managed by Deakin University.
7.6Working in secure areasNot ApplicableNo dedicated secure areas operated by Redback Operations.
7.7Clear desk and clear screenApplicableAcceptable Use Policy requires members to operate personal devices in a secure manner. This entails sharing screens when working on Redback Operations and leaving your device locked whilst unattended.
7.8Equipment siting and protectionApplicablePhysical hardware handling guidelines are established in the AUP. Safe use, storage and reporting of loss or damage. Applicable to Redback Operations as projects have physical hardware such as bikes and Wahoo equipment.
7.9Security of assets off-premisesApplicableAcceptable Use Policy addresses personal device security for off-campus access. Applicable to Redback as every student has their own personal device.
7.10Storage mediaApplicableData Handling Policy defines storage requirements aligned with classification. Storage of sensitive information on the cloud or local is prohibited. Physical media containing sensitive information must not be retained after offboarding.
7.11Supporting utilitiesNot ApplicablePower and utility infrastructure is managed by Deakin University. Outside Redback Operations' scope.
7.12Cabling securityNot ApplicableNetwork cabling infrastructure is managed by Deakin University. Outside Redback Operations' scope.
7.13Equipment maintenanceApplicableAcceptable Use Policy requires hardware to be utilised safely. Loss or damage must be reported to the Ethics / GRC team. Incident Response Policy also defines what to do when physical hardware loss or theft is an incident. Applicable to Redback Operations as multiple teams have physical assets such as Metaverse VR headset and Raspberry PI modules.
7.14Secure disposal or re-use of equipmentPartialE-Waste Battery Extraction team handles hardware disposal as a project focus. Formal secure disposal procedure for Redback-managed equipment is not documented.
8 – Technological Controls
8.1User end point devicesApplicableAcceptable Use Policy requires end point devices to be installed with anti-virus and updated regularly. Any misuse is reported to the Ethics / GRC team. Confidential data cannot be stored locally. Applicable to Redback Operations as personal devices are the only form of devices used to access Redback systems.
8.2Privileged access rightsApplicableAdmin access and tutors are the only ones with admin rights on GitHub. Privileged access is audited each trimester as per the access control policy. Applicable to Redback Operations as students belonging to certain sub-teams are the only ones responsible for GitHub management and Entra ID access management.
8.3Information access restrictionApplicableMembers are restricted to team repository only for editing as per the Access Control Policy. Need-to-know principle is enforced. Applicable to Redback Operations as students in Project Orion does not need access to Wazuh Logs.
8.4Access to source codeApplicableRepository access is only restricted to team members. However public viewing is available. Branch protection is active with PRs needing reviews before merge. No student can approve their own request. Applicable to Redback Operations due to its reliance on GitHub and SecDevOps team reviewing pull requests.
8.5Secure authenticationApplicableMFA is compulsory across GitHub, Entra ID and HiveMQ as per the Access Control Policy. MFA has to be enabled within 5 days of enrolment as per the enrolment as per the policy. Applicable to Redback Operations due to its trimester based rotation, findings of stale accounts mandate MFA.
8.6Capacity managementNot ApplicableInfrastructure capacity is not managed by Redback Operations. It is managed by Deakin University IT.
8.7Protection against malwareApplicableAcceptable Use Policy requires anti-virus on personal devices. The policy also restricts installation of malware. Malware is treated as critical as per the IRP.
8.8Management of technical vulnerabilitiesApplicableDependabot mandatory across all repositories as per the Secure Development policy. Trivy scanner required as well. GitHub Audit document found open vulnerabilities. OWASP TOP 10 is in code review checklist.
8.9Configuration managementPartialSecure-by-default principle is documented in Secure Development Policy. GitHub repository defaults defined in Access Control Policy. Formal configuration baseline is not present within Redback Operations yet. Applicable to Redback Operations as there Orion utilises FastAPI and security management tools.
8.10Information deletionApplicableOffboarding procedures mandates the deletion of local data derived from Redback Operations on personal devices.
8.11Data maskingNot ApplicableNo publicly facing production systems with live personal data is present. Data masking is not required.
8.12Data leakage preventionPartialPush protection is necessary in Incident Response Policy for credential exposure incidents. However, there are no formal DLP tools utilised. Applicable to the company as we utilise publicly facing repositories.
8.13Information backupPartialISMS is stored in GitHub or Docusaurus. Data Warehouse team utilises Restic for backups of their lakehouse architecture. No formal back up policy.
8.14Redundancy of information processing facilitiesNot ApplicableRedback Operations does not have any information processing facilities.
8.15LoggingApplicableGitHub activity logs and Wazuh security logs are established as evidence in the Incident Response Policy. Evidence preservation requirements are established in the IRP as well.
8.16Monitoring activitiesApplicableAcceptable Use Policy defines reviewing GitHub activity logs and security scanning results whilst Blue Team manages Wazuh monitoring.
8.17Clock synchronisationNot ApplicableClock synchronisation is per personal device and Deakin IT manages university supervised hardware.
8.18Use of privileged utility programsApplicableAccess to security tooling is only to Blue Team as per the Acceptable Use Policy. Workflow file changes are reviewed by SecDevOp through PRs as per the Acceptable Use Policy.
8.19Installation of software on operational systemsApplicableAcceptable Use Policy mandates only open-source or licensed software must be utilised for Redback operations systems. Dependency sources need to be official as per the Secure Development Policy.
8.20Networks securityNot ApplicableNetwork security is handled by the Deakin IT team for VMs and Deakin managed software. Network is managed by ISPs for personal devices.
8.21Security of network servicesNot ApplicableNetwork services are managed by Deakin University IT for devices on network premises. Redback Operations does not manage security of network services.
8.22Segregation of networksNot ApplicableNetwork segregation is managed by Deakin University IT Team for devices on university premises and ISPs for personal devices.
8.23Web filteringNot ApplicableWeb filtering is managed by ISPs and by Deakin University IT staff for devices on university premises.
8.24Use of cryptographyApplicableThe Data Handling Policy mandates encryption at rest and in transit for data that is given the Confidential classification.
8.25Secure development lifecycleApplicableThe SDP lists security by design, secure by default, defense in depth and least privilege to be practiced in Redback Operations. The OWASP 10 and a PR checklist is also in the review process.
8.26Application security requirementsApplicableInput validation, error handling and OWASP Top 10 are checked in code reviews as per the Secure Development Policy. This is applicable to projects developing, such as Garmin Smartwatch.
8.27Secure system architecture and engineering principlesApplicableDefense-in-depth and security-by-design principles are listed in the Secure Development Policy.
8.28Secure codingApplicableLanguage specific coding standards are defined for Python, Monkey C and C# in the Secure Development Policy. PR Checklist for reviews also mandates secure coding.
8.29Security testing in development and acceptanceApplicableTrivy scanner and Dependabot is mandatory for all repositories. OWASP TOP10 review is required.
8.30Outsourced developmentNot ApplicableAll development is done by the students in Redback Operations.
8.31Separation of development, test and production environmentsPartialMain branch protection rules are defined in the Access Control Policy and Secure Development Policy. However, there are no formal separation processes of dev/test/prod environments.
8.32Change managementApplicablePull request review process mandatres review before any code is merged into the repository. Workflow file changes is to be reviewed by SecDevOps and signed off. Policy changes are also version-controlled and dated.
8.33Test informationNot ApplicableNo production data is used in testing environments. Test data is synthetic or project generated.
8.34Protection of information systems during audit testingPartialGitHub audit is conducted. A formal audit procedure company wide is not documented, next cohort should communicate with tutors on how to do so.

Document Review

The Statement of Applicability must be reviewed at the start of each trimester by the Ethics / GRC team. Any changes to the ISMS document suite, scope or systems will require the SoA to be revised. All changes must be version-controlled and dated.