Confidentiality
Last updated: Feb 20, 2026
This section includes the following confidentiality measures adopted by Fluid Attacks:
Recovery objective
Fluid Attacks maintains a strict recovery strategy with an RTO of 15 minutes and an RPO of 0, supported by a full backup schedule lasting up to 15 years.
Device (re)enrolling
Fluid Attacks manages device security via Okta and Jamf, following NIST and CIS hardening guidelines to ensure secure enrollment and remote data erasure.