Contract – Managed Services – 1Plan – Flint Power
1Call – $300 Monthly exc GST (Up to 6 Devices) Home Letter of Offer Executive Summary Terms And Conditions Attachments Contract Details Service Price Contract Signatory Provision of IT Managed Services (Confidential) between: Flint Power Consulting Pty Ltd ABN 84 120 859 038 and: 1Cyber Pty Ltd ABN 67 634 546 857 Letter of Offer […]
Contract – Managed Services – Onsite – HUB ICT Pty Ltd – Law Firm
Onsite IT Services Agreement Home Letter of Offer Executive Summary Terms And Conditions Attachments Contract Details Service Price Contract Signatory Provision of Onsite IT Services (Confidential) between: HUB ICT Pty Ltd (Law Firm) ABN 12 663 639 343 and: 1Cyber Pty Ltd ABN 67 634 546 857 Letter of Offer 29 Aug 2024 Dear Danny […]
Contract – Managed Services – 1Cover – Private Fleet
1Cover Managed Services Agreement Home Letter of Offer Executive Summary Terms And Conditions Attachments Contract Details Service Price Contract Signatory Provision of IT Managed Services (Confidential) between: Private Fleet Group Pty Ltd ABN 92 680 621 309 and: 1Cyber Pty Ltd ABN 67 634 546 857 Letter of Offer L2, 9 Help St, Chatswood, NSW […]
Contract – Managed Services – 1Cover – Addsum Accountants Pty Ltd
1Cover Managed Services Agreement Home Letter of Offer Executive Summary Terms And Conditions Attachments Contract Details Service Price Contract Signatory Provision of IT Managed Services (Confidential) between: Addsum Accountants Pty Ltd ABN 66 072 644 912 and: 1Cyber Pty Ltd ABN 67 634 546 857 Letter of Offer Level 19/109 Pitt St, Sydney NSW 2000 […]
Project Planning – Sharepoint Migration – Living Textiles
PROJECT PLANNING MIGRATING TO ONEDRIVE AND SHAREPOINT (Confidential) between: Living Textiles Co ABN 48 642 527 259 and: 1Cyber Pty Ltd ABN 67 634 546 857 Home Letter of Offer 1. Discovery Phase 2. Setting Expectations 3. Preparation Phase 4. Migration Phase 5. Post Implementation Checks Agreement Details Service Price Terms and Conditions Agreement Signatory […]
REPO-Allara-Audit-Report-Guidelines-for-Data-Transfers
Guidelines for Data Transfers Data transfers (ISM: 14 Controls, Essential Eight: 0 Controls) Description of Controls Maturity Owner Data transfer processes and procedures Control: ISM-0663; Applicability: All; Essential Eight: N/A Data transfer processes, and supporting data transfer procedures, are developed, implemented and maintained. N.A. N.A. Control: ISM-1535; Applicability: S, TS; Essential Eight: N/A Processes, and […]
REPO-IExtend-Audit-Report-Guidelines-for-Data-Transfers
Guidelines for Data Transfers Data transfers (ISM: 14 Controls, Essential Eight: 0 Controls) Description of Controls Maturity Owner Data transfer processes and procedures Control: ISM-0663; Applicability: All; Essential Eight: N/A Data transfer processes, and supporting data transfer procedures, are developed, implemented and maintained. N.A. N.A. Control: ISM-1535; Applicability: S, TS; Essential Eight: N/A Processes, and […]
REPO-IExtend-Audit-Report-Guidelines-for-Gateways
Guidelines for Gateways Gateways (ISM: 19 Controls, Essential Eight: 0 Controls) Description of Controls Maturity Owner Implementing gateways Control: ISM-0628; Applicability: All; Essential Eight: N/A Gateways are implemented between networks belonging to different security domains. N.A. N.A. Control: ISM-0637; Applicability: All; Essential Eight: N/A Gateways implement a demilitarised zone if external parties require access to […]
REPO-Allara-Audit-Report-Guidelines-for-Gateways
Guidelines for Gateways Gateways (ISM: 19 Controls, Essential Eight: 0 Controls) Description of Controls Maturity Owner Implementing gateways Control: ISM-0628; Applicability: All; Essential Eight: N/A Gateways are implemented between networks belonging to different security domains. N.A. N.A. Control: ISM-0637; Applicability: All; Essential Eight: N/A Gateways implement a demilitarised zone if external parties require access to […]
REPO-Allara-Audit-Report-Guidelines-for-Cryptography
Guidelines for Cryptography Cryptographic fundamentals (ISM: 15 Controls, Essential Eight: 0 Controls) Description of Controls Maturity Owner Communications security doctrine Control: ISM-0499; Applicability: S, TS; Essential Eight: N/A Communications security doctrine produced by ASD for the management and operation of HACE is complied with. N.A. N.A. Approved High Assurance Cryptographic Equipment Control: ISM-1802; Applicability: S, […]
Contract – Managed Services – Onsite – HUB ICT Pty Ltd
Onsite IT Services Agreement Home Letter of Offer Executive Summary Terms And Conditions Attachments Contract Details Service Price Contract Signatory Provision of Onsite IT Services (Confidential) between: HUB ICT Pty Ltd (Gold Coast BRG) ABN 12 663 639 343 and: 1Cyber Pty Ltd ABN 67 634 546 857 Letter of Offer 29 Aug 2024 Dear […]
REPO-IExtend-Audit-Report-Guidelines-for-Cryptography
Guidelines for Cryptography Cryptographic fundamentals (ISM: 15 Controls, Essential Eight: 0 Controls) Description of Controls Maturity Owner Communications security doctrine Control: ISM-0499; Applicability: S, TS; Essential Eight: N/A Communications security doctrine produced by ASD for the management and operation of HACE is complied with. N.A. N.A. Approved High Assurance Cryptographic Equipment Control: ISM-1802; Applicability: S, […]
Contract – IT Auditing – Intellectual Disability Rights Service Inc
IT Audit Proposal Home Letter of Offer Executive Summary Scope of Work Work Plan Terms and Conditions Attachments Contract Details Service Price Contract Signatory Provision of IT Audit (Confidential) between: Intellectual Disability Rights Service Inc ABN 11 216 371 524 and: 1Cyber Pty Ltd ABN 67 634 546 857 Letter of Offer 29 Aug 2024 […]
Contract – Managed Services – 1Call – MCA Architects
1Cover Managed Services Agreement Home Letter of Offer Executive Summary Terms And Conditions Attachments Contract Details Service Price Contract Signatory Provision of IT Managed Services (Confidential) between: M C A Architects Pty Ltd ABN 22 122 549 624 and: 1Cyber Pty Ltd ABN 67 634 546 857 Letter of Offer 6 Sep 2024 Dear John […]
Contract – Managed Services – 1Plan – HUB ICT Pty Ltd
1Cover Managed Services Agreement Home Letter of Offer Executive Summary Terms And Conditions Attachments Contract Details Service Price Contract Signatory Provision of IT Managed Services (Confidential) between: HUB ICT Pty Ltd ABN 12 663 639 343 and: 1Cyber Pty Ltd ABN 67 634 546 857 Letter of Offer 29 Aug 2024 Dear Danny Jeong We […]
REPO-IExtend-Audit-Report-Guidelines-for-Networking
Guidelines for Networking Network design and configuration (ISM: 34 Controls, Essential Eight: 0 Controls) Description of Controls Maturity Owner Network documentation Control: ISM-0518; Applicability: All; Essential Eight: N/A Network documentation is developed, implemented and maintained. N.A. N.A. Control: ISM-0516; Applicability: All; Essential Eight: N/A Network documentation includes high-level network diagrams showing all connections into networks […]
REPO-Allara-Audit-Report-Guidelines-for-Networking
Guidelines for Networking Network design and configuration (ISM: 34 Controls, Essential Eight: 0 Controls) Description of Controls Maturity Owner Network documentation Control: ISM-0518; Applicability: All; Essential Eight: N/A Network documentation is developed, implemented and maintained. N.A. N.A. Control: ISM-0516; Applicability: All; Essential Eight: N/A Network documentation includes high-level network diagrams showing all connections into networks […]
REPO-IExtend-Audit-Report-Guidelines-for-Email
Guidelines for Email Email usage (ISM: 9 Controls, Essential Eight: 0 Controls) Description of Controls Maturity Owner Email usage policy Control: ISM-0264; Applicability: All; Essential Eight: N/A An email usage policy is developed, implemented and maintained. N.A. N.A. Webmail services Control: ISM-0267; Applicability: All; Essential Eight: N/A Access to non-approved webmail services is blocked. N.A. […]
REPO-Allara-Audit-Report-Guidelines-for-Email
Guidelines for Email Email usage (ISM: 9 Controls, Essential Eight: 0 Controls) Description of Controls Maturity Owner Email usage policy Control: ISM-0264; Applicability: All; Essential Eight: N/A An email usage policy is developed, implemented and maintained. N.A. N.A. Webmail services Control: ISM-0267; Applicability: All; Essential Eight: N/A Access to non-approved webmail services is blocked. N.A. […]
REPO-IExtend-Audit-Report-Guidelines-for-Database-Systems
Guidelines for Database Systems Database servers (ISM: 6 Controls, Essential Eight: 0 Controls) Description of Controls Maturity Owner Functional separation between database servers and web servers Control: ISM-1269; Applicability: All; Essential Eight: N/A Database servers and web servers are functionally separated. N.A. N.A. Communications between database servers and web servers Control: ISM-1277; Applicability: All; Essential […]
REPO-Allara-Audit-Report-Guidelines-for-Database-Systems
Guidelines for Database Systems Database servers (ISM: 6 Controls, Essential Eight: 0 Controls) Description of Controls Maturity Owner Functional separation between database servers and web servers Control: ISM-1269; Applicability: All; Essential Eight: N/A Database servers and web servers are functionally separated. N.A. N.A. Communications between database servers and web servers Control: ISM-1277; Applicability: All; Essential […]
REPO-Allara-Audit-Report-Guidelines-for-Software-Development
Guidelines for Software Development Application development (ISM: 19 Controls, Essential Eight: 0 Controls) Description of Controls Maturity Owner Development, testing and production environments Control: ISM-0400; Applicability: All; Essential Eight: N/A Development, testing and production environments are segregated. N.A. N.A. Control: ISM-1419; Applicability: All; Essential Eight: N/A Development and modification of software only takes place in […]
REPO-IExtend-Audit-Report-Guidelines-for-Software-Development
Guidelines for Software Development Application development (ISM: 19 Controls, Essential Eight: 0 Controls) Description of Controls Maturity Owner Development, testing and production environments Control: ISM-0400; Applicability: All; Essential Eight: N/A Development, testing and production environments are segregated. N.A. N.A. Control: ISM-1419; Applicability: All; Essential Eight: N/A Development and modification of software only takes place in […]
REPO-Allara-Audit-Report-Guidelines-for-System-Management
Guidelines for System Management System administration ISM: 12 Controls, Essential Eight: 6 Controls Description of Controls Maturity Owner System administration processes and procedures Control: ISM-0042; Applicability: All; Essential Eight: N/A System administration processes, and supporting system administration procedures, are developed, implemented and maintained. N.A. N.A. Control: ISM-1211; Applicability: All; Essential Eight: N/A System administrators document […]
REPO-IExtend-Audit-Report-Guidelines-for-System-Management
Guidelines for System Management System administration ISM: 12 Controls, Essential Eight: 6 Controls Description of Controls Maturity Owner System administration processes and procedures Control: ISM-0042; Applicability: All; Essential Eight: N/A System administration processes, and supporting system administration procedures, are developed, implemented and maintained. N.A. N.A. Control: ISM-1211; Applicability: All; Essential Eight: N/A System administrators document […]
REPO-Allara-Audit-Report-Guidelines-for-System-Monitoring
Guidelines for System Monitoring Event logging and monitoring (ISM: 11 Controls, Essential Eight: 5 Controls) Description of Controls Maturity Owner Event logging policy Control: ISM-0580; Applicability: All; Essential Eight: N/A An event logging policy is developed, implemented and maintained. Managing CSO Event log details Control: ISM-0585; Applicability: All; Essential Eight: N/A For each event logged, […]
REPO-IExtend-Audit-Report-Guidelines-for-System-Monitoring
Guidelines for System Monitoring Event logging and monitoring (ISM: 11 Controls, Essential Eight: 5 Controls) Description of Controls Maturity Owner Event logging policy Control: ISM-0580; Applicability: All; Essential Eight: N/A An event logging policy is developed, implemented and maintained. Managing CSO Event log details Control: ISM-0585; Applicability: All; Essential Eight: N/A For each event logged, […]
REPO-Allara-Audit-Report-Guidelines-for-System-Hardening
Guidelines for System Hardening Operating system hardening ISM: 46 Controls, Essential Eight: 18 Controls Description of Controls Maturity Owner Operating system selection Control: ISM-1743; Applicability: All; Essential Eight: N/A Operating systems are chosen from vendors that have demonstrated a commitment to secure-by-design and secure-by-default principles, use of memory-safe programming languages where possible, secure programming practices, […]
REPO-IExtend-Audit-Report-Guidelines-for-System-Hardening
Guidelines for System Hardening Operating system hardening ISM: 46 Controls, Essential Eight: 18 Controls Description of Controls Maturity Owner Operating system selection Control: ISM-1743; Applicability: All; Essential Eight: N/A Operating systems are chosen from vendors that have demonstrated a commitment to secure-by-design and secure-by-default principles, use of memory-safe programming languages where possible, secure programming practices, […]
REPO-Allara-Audit-Report-Guidelines-for-Media
Guidelines for Media Media usage ISM: 14 Controls, Essential Eight: 0 Controls Description of Controls Maturity Owner Media management policy Control: ISM-1549; Applicability: All; Essential Eight: N/A A media management policy is developed, implemented and maintained. Managing CSO Removable media usage policy Control: ISM-1359; Applicability: All; Essential Eight: N/A A removable media usage policy is […]
REPO-IExtend-Audit-Report-Guidelines-for-Media
Guidelines for Media Media usage ISM: 14 Controls, Essential Eight: 0 Controls Description of Controls Maturity Owner Media management policy Control: ISM-1549; Applicability: All; Essential Eight: N/A A media management policy is developed, implemented and maintained. Managing CSO Removable media usage policy Control: ISM-1359; Applicability: All; Essential Eight: N/A A removable media usage policy is […]
REPO-Allara-Audit-Report-Guidelines-for-ICT-Equipment
Guidelines for ICT Equipment ICT equipment usage ISM: 10 Controls, Essential Eight: 0 Controls Description of Controls Maturity Owner ICT equipment management policy Control: ISM-1551; Applicability: All; Essential Eight: N/A An ICT equipment management policy is developed, implemented and maintained. Managing CSO ICT equipment selection Control: ISM-1857; Applicability: All; Essential Eight: N/A ICT equipment is […]
REPO-IExtend-Audit-Report-Guidelines-for-ICT-Equipment
Guidelines for ICT Equipment ICT equipment usage ISM: 10 Controls, Essential Eight: 0 Controls Description of Controls Maturity Owner ICT equipment management policy Control: ISM-1551; Applicability: All; Essential Eight: N/A An ICT equipment management policy is developed, implemented and maintained. Managing CSO ICT equipment selection Control: ISM-1857; Applicability: All; Essential Eight: N/A ICT equipment is […]
REPO-IExtend-Audit-Report-Guidelines-for-Evaluated-Products
Guidelines for Evaluated Products Evaluated product procurement ISM: 3 Controls, Essential Eight: 0 Controls Description of Controls Maturity Owner Evaluated product selection Control: ISM-0280; Applicability: All; Essential Eight: N/A If procuring an evaluated product, a product that has completed a PP-based evaluation, including against all applicable PP modules, is selected in preference to one that […]
REPO-Allara-Audit-Report-Guidelines-for-Evaluated-Products
Guidelines for Evaluated Products Evaluated product procurement ISM: 3 Controls, Essential Eight: 0 Controls Description of Controls Maturity Owner Evaluated product selection Control: ISM-0280; Applicability: All; Essential Eight: N/A If procuring an evaluated product, a product that has completed a PP-based evaluation, including against all applicable PP modules, is selected in preference to one that […]
REPO-Allara-Audit-Report-Guidelines-for-Enterprise-Mobility
Guidelines for Enterprise Mobility Enterprise mobility ISM: 7 Controls, Essential Eight: 0 Controls Description of Controls Maturity Owner Privately-owned mobile devices and desktop computers Control: ISM-1297; Applicability: All; Essential Eight: N/A Legal advice is sought prior to allowing privately-owned mobile devices and desktop computers to access systems or data. Managing CSO Control: ISM-1400; Applicability: OS, […]
REPO-IExtend-Audit-Report-Guidelines-for-Enterprise-Mobility
Guidelines for Enterprise Mobility Enterprise mobility ISM: 7 Controls, Essential Eight: 0 Controls Description of Controls Maturity Owner Privately-owned mobile devices and desktop computers Control: ISM-1297; Applicability: All; Essential Eight: N/A Legal advice is sought prior to allowing privately-owned mobile devices and desktop computers to access systems or data. Managing CSO Control: ISM-1400; Applicability: OS, […]
REPO-Allara-Audit-Report-Guidelines-for-Communications-Systems
Guidelines for Communications Systems Telephone systems ISM: 9 Controls, Essential Eight: 0 Controls Description of Controls Maturity Owner Telephone system usage policy Control: ISM-1078; Applicability: All; Essential Eight: N/A A telephone system usage policy is developed, implemented and maintained. Managing CSO Personnel awareness Control: ISM-0229; Applicability: All; Essential Eight: N/A Personnel are advised of the […]
REPO-IExtend-Audit-Report-Guidelines-for-Communications-Systems
Guidelines for Communications Systems Telephone systems ISM: 9 Controls, Essential Eight: 0 Controls Description of Controls Maturity Owner Telephone system usage policy Control: ISM-1078; Applicability: All; Essential Eight: N/A A telephone system usage policy is developed, implemented and maintained. Managing CSO Personnel awareness Control: ISM-0229; Applicability: All; Essential Eight: N/A Personnel are advised of the […]
REPO-Allara-Audit-Report-Guidelines-for-Communications-Infrastructure
Guidelines for Communications Infrastructure Cabling infrastructure ISM: 46 Controls, Essential Eight: 0 Controls Description of Controls Maturity Owner Cabling infrastructure standards Control: ISM-0181; Applicability: All; Essential Eight: N/A Cabling infrastructure is installed in accordance with relevant Australian Standards, as directed by the Australian Communications and Media Authority. Managing CSO Use of fibre-optic cables Control: ISM-1111; […]
Project Planning – Sharepoint Migration – Specialist Access Scafolding
PROJECT PLANNING MIGRATING TO ONEDRIVE AND SHAREPOINT (Confidential) between: South Pacific IT (Australia) ABN 70 570 855 847 On behalf of Specialised Access And Scaffolding Pty Ltd ABN 48 642 527 259 and: 1Cyber Pty Ltd ABN 67 634 546 857 Home Letter of Offer 1. Discovery Phase 2. Setting Expectations 3. Preparation Phase 4. […]
Project Planning – Sharepoint Migration
PROJECT PLANNING MIGRATING TO ONEDRIVE AND SHAREPOINT (Confidential) between: Customer Business Name ABN xx xxx xxx xxx and: 1Cyber Pty Ltd ABN 67 634 546 857 Home Letter of Offer 1. Discovery Phase 2. Setting Expectations 3. Preparation Phase 4. Migration Phase 5. Post Implementation Checks Agreement Details Service Price Terms and Conditions Agreement Signatory […]
Contract – Managed Services – 1Call – Blaxland Law
1Call – $300 Monthly exc GST (Up to 5 Devices) Home Letter of Offer Executive Summary Terms And Conditions Attachments Agreement Details Service Price Agreement Signatory Provision of IT Managed Services (Confidential) between: Blaxland Law Pty Ltd ABN 89 651 202 452 and: 1Cyber Pty Ltd ABN 67 634 546 857 Letter of Offer Suite […]
REPO-IExtend-Audit-Report-Guidelines-for-Communications-Infrastructure
Guidelines for Communications Infrastructure Cabling infrastructure ISM: 46 Controls, Essential Eight: 0 Controls Description of Controls Maturity Owner Cabling infrastructure standards Control: ISM-0181; Applicability: All; Essential Eight: N/A Cabling infrastructure is installed in accordance with relevant Australian Standards, as directed by the Australian Communications and Media Authority. Managing CSO Use of fibre-optic cables Control: ISM-1111; […]
REPO-Allara-Audit-Report-Guidelines-for-Personnel-Security
Guidelines for Personnel Security Cyber security awareness training (ISM: 8 Controls, Essential Eight: 0 Controls) Description of Controls Maturity Owner Providing cyber security awareness training Control: ISM-0252; Applicability: All; Essential Eight: N/A Cyber security awareness training is undertaken annually by all personnel and covers: the purpose of the cyber security awareness training security appointments and […]
REPO-IExtend-Audit-Report-Guidelines-for-Personnel-Security
Guidelines for Personnel Security Cyber security awareness training (ISM: 8 Controls, Essential Eight: 0 Controls) Description of Controls Maturity Owner Providing cyber security awareness training Control: ISM-0252; Applicability: All; Essential Eight: N/A Cyber security awareness training is undertaken annually by all personnel and covers: the purpose of the cyber security awareness training security appointments and […]
REPO-Allara-Audit-Report-Guidelines-for-Physical-Security
Guidelines for Physical Security Facilities and systems (ISM: 10 Controls, Essential Eight: 0 Controls) Description of Controls Maturity Owner Physical access to systems Control: ISM-0810; Applicability: OS, P, S, TS; Essential Eight: N/A Systems are secured in facilities that meet the requirements for a security zone suitable for their classification. Managing CSO Physical access to […]
REPO-Allara-Audit-Report-Guidelines-for-Security-Documentation
Guidelines for Security Documentation Development and maintenance of security documentation (ISM: 5 Controls, Essential Eight: 0 Controls) Description of Controls Maturity Owner Cyber security strategy Control: ISM-0039; Applicability: All; Essential Eight: N/A A cyber security strategy is developed, implemented and maintained. Developing CSO Approval of security documentation Control: ISM-0047; Applicability: All; Essential Eight: N/A Organisational-level […]
REPO-Allara-Audit-Report-Guidelines-for-Procurement-and-Outsourcing
Guidelines for Procurement and Outsourcing Cyber supply chain risk management (ISM: 15 Controls, Essential Eight: 0 Controls) Description of Controls Maturity Owner Cyber supply chain risk management activities Control: ISM-1631; Applicability: All; Essential Eight: N/A Suppliers of applications, ICT equipment and services associated with systems are identified. Developing CSO Control: ISM-1452; Applicability: All; Essential Eight: […]
REPO-Allara-Audit-Report-Guidelines-for-Cyber-Security-Incidents
Guidelines for Cyber Security Incidents Managing cyber security incidents (ISM: 11 Controls, Essential Eight: 0 Controls) Description of Controls Maturity Owner Cyber security incident management policy Control: ISM-0576; Applicability: All; Essential Eight: N/A A cyber security incident management policy, and associated cyber security incident response plan, is developed, implemented and maintained. Developing 1Cyber Control: ISM-1784; […]
REPO-Allara-Audit-Report-Guidelines-for-Cyber-Security-Roles
Guidelines for Cyber Security Roles Chief Information Security Officer (ISM: 15 Controls, Essential Eight: 0 Controls) Description of Controls Maturity Owner Providing cyber security leadership and guidance Control: ISM-0714; Applicability: All; Essential Eight: N/A A CISO is appointed to provide cyber security leadership and guidance for their organisation. Managing CSO Overseeing the cyber security program […]
REPO-Audit-Report-Introduction
REPO-Allara-Dashboard
IT Security and Confidential Data Policies Item Description Status Document a Security Policies – Copyright Infringement Policy Reviewing View b Security Policies – Data Classification Reviewing View c Security Policies – Data Loss Prevention Reviewing View d Security Policies – Device Encryption Reviewing View e Security Policies – Email Security Reviewing View f Security Policies […]
REPO-IExtend-Audit-Report-Guidelines-for-Security-Documentation
Guidelines for Security Documentation Development and maintenance of security documentation (ISM: 5 Controls, Essential Eight: 0 Controls) Description of Controls Maturity Owner Cyber security strategy Control: ISM-0039; Applicability: All; Essential Eight: N/A A cyber security strategy is developed, implemented and maintained. Developing CSO Approval of security documentation Control: ISM-0047; Applicability: All; Essential Eight: N/A Organisational-level […]
REPO-IExtend-Audit-Report-Guidelines-for-Procurement-and-Outsourcing
Guidelines for Procurement and Outsourcing Cyber supply chain risk management (ISM: 15 Controls, Essential Eight: 0 Controls) Description of Controls Maturity Owner Cyber supply chain risk management activities Control: ISM-1631; Applicability: All; Essential Eight: N/A Suppliers of applications, ICT equipment and services associated with systems are identified. Developing CSO Control: ISM-1452; Applicability: All; Essential Eight: […]
REPO-IExtend-Audit-Report-Guidelines-for-Cyber-Security-Incidents
Guidelines for Cyber Security Incidents Managing cyber security incidents (ISM: 11 Controls, Essential Eight: 2 Controls) Description of Controls Maturity Owner Cyber security incident management policy Control: ISM-0576; Applicability: All; Essential Eight: N/A A cyber security incident management policy, and associated cyber security incident response plan, is developed, implemented and maintained. Developing 1Cyber Control: ISM-1784; […]
REPO-IExtend-Audit-Report-Guidelines-for-Cyber-Security-Roles
Guidelines for Cyber Security Roles Chief Information Security Officer (ISM: 15 Controls, Essential Eight: 0 Controls) Description of Controls Maturity Owner Providing cyber security leadership and guidance Control: ISM-0714; Applicability: All; Essential Eight: N/A A CISO is appointed to provide cyber security leadership and guidance for their organisation. Managing CSO Overseeing the cyber security program […]
REPO-IExtend-Audit-Report-Guidelines-for-Physical-Security
Guidelines for Physical Security Facilities and systems (ISM: 10 Controls, Essential Eight: 0 Controls) Description of Controls Maturity Owner Physical access to systems Control: ISM-0810; Applicability: OS, P, S, TS; Essential Eight: N/A Systems are secured in facilities that meet the requirements for a security zone suitable for their classification. Managing CSO Physical access to […]
Contract – Managed Services – 1Call – The Planning Room
1Call – $300 Monthly exc GST (Up to 5 Devices) Home Letter of Offer Executive Summary Terms And Conditions Attachments Contract Details Service Price Contract Signatory Provision of IT Managed Services (Confidential) between: The Planning Room Pty Ltd ABN 64 158 621 991 and: 1Cyber Pty Ltd ABN 67 634 546 857 Letter of Offer […]
Contract – Managed Services – 1Cover – Allara Global
1Cover Managed Services Agreement Home Letter of Offer Executive Summary Terms And Conditions Attachments Contract Details Service Price Contract Signatory Provision of IT Managed Services (Confidential) between: Allara Global Pty Limited ABN 66 652 022 010 and: 1Cyber Pty Ltd ABN 67 634 546 857 Letter of Offer Suite 19.02, Level 19 227 Elizabeth Street, […]
REPO-IExtend-Dashboard
IT Security and Confidential Data Policies Item Description Status Document a Security Policies – Copyright Infringement Policy Reviewing View b Security Policies – Data Classification Reviewing View c Security Policies – Data Loss Prevention Reviewing View d Security Policies – Device Encryption Reviewing View e Security Policies – Email Security Reviewing View f Security Policies […]
Contract – Managed Services – 1Plan – Christopher Esber
1Plan Plus – $2000 Monthly exc GST (Up to 40 Devices) Home Letter of Offer Executive Summary Terms And Conditions Attachments Contract Details Service Price Contract Signatory Provision of IT Managed Services (Confidential) between: CE IP Holding Pty Ltd (Christopher Esber) ABN 95 145 034 715 and: 1Cyber Pty Ltd ABN 67 634 546 857 […]
Contract – Managed Services – 1Plan – Envoy Golf
1Call – $300 Monthly exc GST (Up to 6 Devices) Home Letter of Offer Executive Summary Terms And Conditions Attachments Contract Details Service Price Contract Signatory Provision of IT Managed Services (Confidential) between: Envoy Group Pty Ltd ABN 60 644 632 066 and: 1Cyber Pty Ltd ABN 67 634 546 857 Letter of Offer 80 […]
Contract – Managed Services – 1Plan – Mauncia Pty Ltd
1Plan Plus – $700 Monthly exc GST (Up to 10 Devices) Home Letter of Offer Executive Summary Terms And Conditions Attachments Contract Details Service Price Contract Signatory Provision of IT Managed Services (Confidential) between: Mauncia Pty Ltd ABN 78 002 823 743 and: 1Cyber Pty Ltd ABN 67 634 546 857 Letter of Offer Suite […]
Contract – Managed Services – 1Plan – Manson Financial Services
1Plan Plus – $500 Monthly exc GST (Up to 10 Devices) Home Letter of Offer Executive Summary Terms And Conditions Attachments Contract Details Service Price Contract Signatory Provision of IT Managed Services (Confidential) between: Manson Financial Services Pty Ltd ABN 76 631 430 736 and: 1Cyber Pty Ltd ABN 67 634 546 857 Letter of […]
Contract – Managed Services – 1Plan – Bonafei
1Plan Plus – $500 Monthly exc GST (Up to 10 Devices) Home Letter of Offer Executive Summary Terms And Conditions Attachments Contract Details Service Price Contract Signatory Provision of IT Managed Services (Confidential) between: Bonafei Pty Ltd ABN 74 640 294 195 and: 1Cyber Pty Ltd ABN 67 634 546 857 Letter of Offer 60 […]
Contract – Managed Services – 1Plan – Ciao Beauty
1Plan Plus – $700 Monthly exc GST (Up to 12 Devices) over 2 sites Home Letter of Offer Executive Summary Terms And Conditions Attachments Contract Details Service Price Contract Signatory Provision of IT Managed Services (Confidential) between: Ciao Beauty ABN 71 602 487 810 and: 1Cyber Pty Ltd ABN 67 634 546 857 Letter of […]
Contract – Managed Services – 1Cover – National Art School
1Cover Managed Services Agreement Home Letter of Offer Executive Summary Terms And Conditions Attachments Contract Details Service Price Contract Signatory Provision of IT Managed Services (Confidential) between: National Art School ABN 89 140 179 111 and: 1Cyber Pty Ltd ABN 67 634 546 857 Letter of Offer Forbes St Darlinghurst NSW 2010 27/10/2022 Dear Violet […]
Contract – Managed Services – 1Plan – Dome Gold Mines Ltd
1Plan – $150 Monthly exc GST Home Letter of Offer Executive Summary Terms And Conditions Attachments Contract Details Service Price Contract Signatory Provision of IT Managed Services (Confidential) between: Dome Gold Mines Ltd ABN 49 151 996 566 and: 1Cyber Pty Ltd ABN 67 634 546 857 Letter of Offer Level 46, 680 George Street, […]
Contract – Managed Services – 1Call – Bare Energy
1Plan – $650 Monthly exc GST (Up to 12 Devices) Home Letter of Offer Executive Summary Terms And Conditions Attachments Contract Details Service Price Contract Signatory Provision of IT Managed Services (Confidential) between: Bare Energy Pty Limited ABN 14 660 377 908 and: 1Cyber Pty Ltd ABN 67 634 546 857 Letter of Offer C2/15 […]
Contract – Standard Website Build – House of Millennium
Home Letter of Offer Introduction Benefits Contract Details Service Price Terms And Conditions Contract Signatory Web Design Proposal We shape perceptions through building your online prescence. (Confidential) https://1cdn.com.au/wp-content/uploads/2023/01/Web-Design-Video-1.mp4 Letter of Offer 81-83 Campbell Street Surry HILLS NSW 2010 20/02/2023 Dear Customer We are please to present to you our Web Design Proposal enclosed. This proposal […]
Contract – Managed Services – 1Plan – Outdoor Living Direct
1Plan – $300 Monthly Home Letter of Offer Executive Summary Terms And Conditions Attachments Contract Details Service Price Contract Signatory Provision of IT Managed Services (Confidential) between: Outdoor Living Direct ABN 19 155 694 465 and: 1Cyber Pty Ltd ABN 67 634 546 857 Letter of Offer 28/03/2023 Dear Amy Lawton We are please to […]
TERMS AND CONDITIONS
PRIVATE AND CONFIDENTIAL CONTRACT FOR SERVICES (the Contract) BETWEEN 1Cyber Pty Ltd having its registered office at 140 Diagonal Road, Warradale SA 5046 (hereafter, “1Cyber”, “We” or “Us”) AND Subcontractor (hereafter the “Subcontractor”, or “You”) OUR CONTRACT WITH YOU These terms and conditions shall govern the relationship between 1Cyber and the Subcontractor and shall apply […]
Subcontractor Agreement
SUBCONTRACTOR AGREEMENT A Welcome Statement We are excited to welcome you as a Subcontractor to 1Cyber Pty Ltd. This form is to assist you in understanding our company’s policies and procedures in working with us and also to facilitate information collection for timely payment of your services. Our Subcontractor relationships is extremely important to 1Cyber. […]
Contract – Standard Website Build – Outdoor Living Direct
Standard Build Price – $2345.16 Home Letter of Offer Introduction Benefits Contract Details Service Price Terms And Conditions Contract Signatory Web Design Proposal We shape perceptions through building your online prescence. (Confidential) https://1cdn.com.au/wp-content/uploads/2023/01/Web-Design-Video-1.mp4 Letter of Offer 81-83 Campbell Street Surry HILLS NSW 2010 20/02/2023 Dear Customer We are please to present to you our Web […]
Contract – Managed Services – 1Plan – Outdoor Living Direct
1Plan – $300 Monthly Home Letter of Offer Executive Summary Terms And Conditions Attachments Contract Details Service Price Contract Signatory Provision of IT Managed Services (Confidential) between: Outdoor Living Direct ABN 19 155 694 465 and: 1Cyber Pty Ltd ABN 67 634 546 857 Letter of Offer 28/03/2023 Dear Amy Lawton We are please to […]
Contract – eCommerce Add-On – adelaidecleans.com.au
Standard Build Price – $2345.16 Home Letter of Offer Introduction Benefits Contract Details Service Price Terms And Conditions Contract Signatory Web Design Proposal We shape perceptions through building your online prescence. (Confidential) https://1cdn.com.au/wp-content/uploads/2023/01/Web-Design-Video-1.mp4 Letter of Offer 81-83 Campbell Street Surry HILLS NSW 2010 20/02/2023 Dear Customer We are please to present to you our Web […]
Contract – Standard Website Build – livingbalancekinesiology.com.au
Standard Build Price – $2345.16 Home Letter of Offer Introduction Benefits Contract Details Service Price Terms And Conditions Contract Signatory Web Design Proposal We shape perceptions through building your online prescence. (Confidential) https://1cdn.com.au/wp-content/uploads/2023/01/Web-Design-Video-1.mp4 Letter of Offer 81-83 Campbell Street Surry HILLS NSW 2010 20/02/2023 Dear Customer We are please to present to you our Web […]
Contact Us – Outside of Australia
CONTACT US REACH OUT TO US TODAY AND LET US HELP YOU. You’re not going to hit a ridiculously long phone menu when you call us. Your email isn’t going to the inbox abyss, never to be seen or heard from again. At 1Cyber, we provide the exceptional service we want to experience ourselves! […]
Contract – Managed Services – 1Plan – Australian Teacher Aide
1Plan – $300 Monthly (Up to 10 Devices) Home Letter of Offer Executive Summary Terms And Conditions Attachments Contract Details Service Price Contract Signatory Provision of IT Managed Services (Confidential) between: Australian Teacher Aide ABN 22 642 378 934 and: 1Cyber Pty Ltd ABN 67 634 546 857 Letter of Offer 28/03/2023 Dear Mandy Bell […]
Contract – Managed Services – 1Plan – Henbon Australia Pty Ltd
1Plan – $600 Monthly exc GST (Up to 10 Devices + Web Maintenance) Home Letter of Offer Executive Summary Terms And Conditions Attachments Contract Details Service Price Contract Signatory Provision of IT Managed Services (Confidential) between: Henbon Australia Pty Ltd ABN 91 636 711 647 and: 1Cyber Pty Ltd ABN 67 634 546 857 Letter […]
Contract – Standard Website Build
Standard Build Price – $2345.16 Home Letter of Offer Introduction Benefits Contract Details Service Price Terms And Conditions Contract Signatory Web Design Proposal We shape perceptions through building your online prescence. (Confidential) https://1cdn.com.au/wp-content/uploads/2023/01/Web-Design-Video-1.mp4 Letter of Offer 81-83 Campbell Street Surry HILLS NSW 2010 20/02/2023 Dear Customer We are please to present to you our Web […]
Section F – General
PRIVATE AND CONFIDENTIAL Section F – General Relationship with Customer and Third Parties General The Contractor acknowledges that other Providers provide services to the Customer. The Contractor shall at all times cooperate with other Providers in the course of or in connection with fulfilling its obligations under the Contract (including as required in the Transition […]
Section E – Payments and Invoicing
PRIVATE AND CONFIDENTIAL Section E – Payments and Invoicing Charges and Payment General All Charges payable by the Customer under or in connection with the Contract and the Services are as specified in Attachment “Charges”. Except where the Contract expressly provides otherwise, the performance of any obligation imposed on the Contractor under the Contract is […]
Section D – Consultancy and Enhancements
PRIVATE AND CONFIDENTIAL Section D – Consultancy and Enhancements Provision of Consultancy and Enhancements In addition to any Services and Products provided by the Contractor under the Contract, the Customer may require the Contractor to provide Consultancy and Enhancement Services. If the Customer wishes to procure the Contractor to provide Consultancy and Enhancement Services under […]
Section C – Hosting Services
PRIVATE AND CONFIDENTIAL Section C – Hosting Services Application and Scope Application If the Contract Details specify that the Contractor is to provide Hosting Services, the Contractor will provide the Customer with the Hosting Services set out in Attachment “Hosting Services” in accordance with this Section C of the Contract. Scope of Hosting Services In […]
Section B – Maintenance Services
PRIVATE AND CONFIDENTIAL Section B – Maintenance Services Application and Scope Application If the Contract Details specify that the Contractor is to provide Maintenance Services, the Contractor will provide the Customer with the Maintenance Services set out in Attachment “Maintenance Services” in accordance with this Section B of the Contract. Scope of Maintenance Services In […]
Section A – Definitions and Scope
PRIVATE AND CONFIDENTIAL Section A – Definitions and Scope Definitions and Interpretation Definitions In the Contract, unless the contrary intention appears: Acceptance means sign off by the Customer in acknowledgment that Acceptance Tests and/or agreed alternative acceptance formalities have been completed in respect of a Service or Product; Acceptance Tests means the categories or classes of tests […]
Contract – Managed Services – 1Plan – Chatswood Foot Clinic
1Plan – $300 Monthly exc GST (Up to 10 Devices) Home Letter of Offer Executive Summary Terms And Conditions Attachments Contract Details Service Price Contract Signatory Provision of IT Managed Services (Confidential) between: Sydney City Podiatry Pty Ltd ABN 53 090 419 051 and: 1Cyber Pty Ltd ABN 67 634 546 857 Letter of Offer […]
Contract – Standard Website Build – Original
Dear Customer, We are pleased to present to this Web Design Proposal. This proposal will contain all necessary information that will answer your basic queries presented in our discussions. We have included in this proposal all the aspects of our web hosting, design and support services. We also provide information about 1CYBER in general, which […]
Attachment – Security Requirements
PRIVATE AND CONFIDENTIAL Attachment – Security Requirements Refer to separate document Attachment – Policies, Procedures and Standards. Adoption of security policies and confidential data policies. The conformance of the above policies will provide an extensive cyber security coverage for all IT services. Adoption of Antivirus Service is highly recommended to prevent all computing devices from […]
Attachment – Disaster Recovery
Attachment – Disaster Recovery NOT APPLICABLE
Confidential Data Policies – PCI Policy
PRIVATE AND CONFIDENTIAL (This policy serves as a guide for managed services that do not have a corresponding policy) Confidential Data Policies – PCI Policy Policy Statement Business is committed to developing, adopting, and maintaining appropriate information security policies, standards, and procedures to ensure integration of information security with Business’s mission, business strategy, risk posture, […]
Confidential Data Policies – Administrative Security
PRIVATE AND CONFIDENTIAL (This policy serves as a guide for managed services that do not have a corresponding policy) Confidential Data Policies – Administrative Security Policy Statement In accordance with the Business “Security Policies – Data Classification Policy”, all information systems that create, receive, store, or transmit data classified as ‘Confidential’ must adhere to the […]
Confidential Data Policies – Authentication and Authorization
PRIVATE AND CONFIDENTIAL (This policy serves as a guide for managed services that do not have a corresponding policy) Confidential Data Policies – Authentication and Authorization Policy Statement In accordance with the Business “Security Policies – Data Classification Policy”, all information systems that create, receive, store, or transmit data classified as ‘Confidential’ must adhere to […]
Confidential Data Policies – Physical Security
PRIVATE AND CONFIDENTIAL (This policy serves as a guide for managed services that do not have a corresponding policy) Confidential Data Policies – Physical Security Policy Statement In accordance with the Business “Security Policy – Data Classification policy”, all information systems that create, receive, store, or transmit data classified as ‘Confidential’ must adhere to the […]
Confidential Data Policies – Integrity Policy
PRIVATE AND CONFIDENTIAL (This policy serves as a guide for managed services that do not have a corresponding policy) Confidential Data Policies – Integrity Policy Policy Statement In accordance with the “Business Security Policies – Data Classification Policy”, all information systems that create, receive, store, or transmit data classified as ‘Confidential’ must adhere to the integrity […]
Security Policies – Identity and Access Management
PRIVATE AND CONFIDENTIAL (This policy serves as a guide for managed services that do not have a corresponding policy) Security Policies – Identity and Access Management Policy Statement Business employs a number of administrative and technical controls in support of identity and access management. All Business Users are expected to comply with these standards for […]
Security Policies – Password Policy and Guidelines
PRIVATE AND CONFIDENTIAL (This policy serves as a guide for managed services that do not have a corresponding policy) Security Policies – Password Policy and Guidelines Policy Statement All Business Users are responsible for safeguarding their system access login and password credentials and must comply with the password parameters and standards identified in this policy. […]
Security Policies – Email Security
PRIVATE AND CONFIDENTIAL (This policy serves as a guide for managed services that do not have a corresponding policy) Security Policies – Email Security Policy Statement All members of Business are responsible for protecting the confidentiality, integrity, and availability of data created, received, stored, transmitted, or otherwise used by Business. Business reserves the right to […]
Security Policies – Restricting Network Access for Insecure Systems
PRIVATE AND CONFIDENTIAL (This policy serves as a guide for managed services that do not have a corresponding policy) Security Policies – Restricting Network Access for Insecure Systems Policy Statement The Information Technologies & Services (ITS) Security & Identity Management team at Business must take appropriate action to assess, evaluate, and mitigate any threats that […]
Security Policies – Requirements for Securing Information Systems
PRIVATE AND CONFIDENTIAL (This policy serves as a guide for managed services that do not have a corresponding policy) Security Policies – Requirements for Securing Information Systems Policy Statement Information systems must be secured according to a set of standards and principles in order to prevent unauthorized access to Business data and applications. Reason for […]
Security Policies – Web Proxy
PRIVATE AND CONFIDENTIAL (This policy serves as a guide for managed services that do not have a corresponding policy) Security Policies – Web Proxy Policy Statement Business is recommended to implemented a Web proxy on the business network to have the ability to enforce security policies such as Data Loss Prevention and Copyright Infringement Policy. […]
Security Policies – Data Loss Prevention
PRIVATE AND CONFIDENTIAL (This policy serves as a guide for managed services that do not have a corresponding policy) Security Policies – Data Loss Prevention Policy Statement All members of the Business are responsible for protecting the confidentiality, integrity, and availability of data created, received, stored, transmitted, or otherwise used by the Business. Business reserves […]
Security Policies – Use of Email
PRIVATE AND CONFIDENTIAL (This policy serves as a guide for managed services that do not have a corresponding policy) Security Policies – Use of Email Policy Statement Business provides a centrally-managed email service to employees, subcontractors, partners and affiliates for the purpose of conducting business. While incidental and occasional personal use of email is permissible, […]
Security Policies – Copyright Infringement Policy
PRIVATE AND CONFIDENTIAL (This policy serves as a guide for managed services that do not have a corresponding policy) Security Policies – Copyright Infringement Policy Policy Statement Upon formal notification or due to detection, and in accordance with “Security Policies – Responsible Use of Information Technology Resources”, Business will take all necessary means, including but […]
Security Policies – Device Encryption
PRIVATE AND CONFIDENTIAL (This policy serves as a guide for managed services that do not have a corresponding policy) Security Policies – Device Encryption Policy Statement All users of desktops, laptops, tablets, and mobile devices (whether Information Technologies & Services [ITS] tagged or untagged) must take care to protect confidential data. All devices tagged by […]
Security Policies – Security and Privacy Incident Response Plan
PRIVATE AND CONFIDENTIAL (This policy serves as a guide for managed services that do not have a corresponding policy) Security Policies – Security and Privacy Incident Response Plan Policy Statement All members of Business are responsible for protecting the confidentiality, integrity, and availability of data created, received, stored, transmitted, or otherwise used, irrespective of the […]
Security Policies – Guest Wireless Network
PRIVATE AND CONFIDENTIAL (This policy serves as a guide for managed services that do not have a corresponding policy) Security Policies – Guest Wireless Network Policy Statement Business supports the need for guests of the medical center to have access to IT resources, including the Internet. Reason for Policy This policy ensures guest networks are […]
Security Policies – Data Classification
PRIVATE AND CONFIDENTIAL (This policy serves as a guide for managed services that do not have a corresponding policy) Security Policies – Data Classification Policy Statement In order to protect the security and integrity of Business data, as well as to comply with applicable state and federal laws and regulations where appropriate, all Business data […]
Security Policies – Privacy of the Network
PRIVATE AND CONFIDENTIAL (This policy serves as a guide for managed services that do not have a corresponding policy) Security Policies – Privacy of the Network Policy Statement Business provides computer, email, network, internet, and telephone access to users for the purpose for conducting business only. While incidental and occasional personal use of such systems […]
Security Policies – Responsible Use of Information Technology Resources
PRIVATE AND CONFIDENTIAL (This policy serves as a guide for managed services that do not have a corresponding policy) Security Policies – Responsible Use of Information Technology Resources Policy Statement All users are responsible for protecting the confidentiality, integrity, and availability of data created, received, stored, transmitted, or otherwise used by the business, irrespective of […]
Attachment – Policies, Procedures and Standards
PRIVATE AND CONFIDENTIAL Attachment – Policies, Procedures and Standards Acceptable Use Policy for Communications and Technology (ICT) Systems The purpose of these policies are to ensure that all use of the Customer’s Information, Communications and Technology (ICT) systems is legal, ethical and consistent with the aims, values and objectives of the Customer. The Customer’s Systems […]
Attachment – Changes
Attachment – Changes Application For the purposes of this Attachment, the definitions set out in the Contract apply unless stated otherwise. In addition, the following definition applies in this Attachment: ‘Charges’ means the amounts payable under Attachment Charges; ‘Critical Path’ means the series of tasks that dictates the calculated finish date of the project. ‘ticketing […]
Attachment – Deed of Confidentiality
PRIVATE AND CONFIDENTIAL Attachment – Deed of Confidentiality General Deed if Agreement between the Contractor and the Customer specified in the Contract Details. The Contractor provides the undertakings set out below in respect of work to be performed, and information to be acquired, directly or indirectly in connection with the Customer. Interpretation Definition ‘Information’ means […]
Attachment – Reports
PRIVATE AND CONFIDENTIAL Attachment – Reports Reports for Maintenance Services Server Management Service Atera – Documentation & Reporting Options. JumpCloud – Documentation & Reporting Options. Solarwinds – Documentation & Reporting Options. Desktop Management Service Atera – Documentation & Reporting Options. JumpCloud – Documentation & Reporting Options. Solarwinds – Documentation & Reporting Options. Kandji – Documentation & Reporting Options. Network Management Service Broadcom […]
Attachment – Charges
Attachment – Charges Charges for Maintenance Services Server Management Service Adhoc – Managed Services – 0 Devices. Remote support: Monday to Friday: $75.00 per hour block including GST (Minimum charge is 1 hr) Saturday and Sunday: $112.50 per hour block including GST (Minimum charge is 1 hr) Onsite support: Monday to Friday: $150.00 per hour […]
Attachment – Service Levels
PRIVATE AND CONFIDENTIAL Attachment – Service Levels General 1Cyber provides a comprehensive list of services as per: Attachments “Maintenance Services” Attachments “Hosting Services” Attachments “Consultancy and Enhancement”. The Service Levels commitments for each service is defined by the Service Plans subscribed by the Customer. For Maintenance Services, the Service Plans includes subscribing one option as […]
Attachment – Transition Plan
PRIVATE AND CONFIDENTIAL Attachment – Transition Plan General Transition project plan: Focuses on successfully: Transferring existing services from the existing managed service provider. Transferring documentation of design and configuration to the existing services. Handing over the administrative credentials for management of the service. Handing over outstanding issues and challenges for each service. Ensuring uninterrupted continuity […]
Attachment – Applications
PRIVATE AND CONFIDENTIAL Attachment – Applications Applications hosted by Customer (On-Premises) Server Management Access to the server will be required for management Active Directory Domain Admin Account (where applicable) Local Administrator Account Application Admin Account Server Rack Key Access RDP Access Application Management Application knowledge based should be provided by Application Provider Application APIs should […]