| Checklist (mandatory) | Open Source + Self-Maintained: What You Need to Prepare | Redis Enterprise: What You Want to Validate |
| 1) Service Level and Liability Attribution (SLA/OLA) | 24×7 on-call, upgrade window, fault classification (SEV1/2/3), average response/repair time, written to internal OLAs | Vendor Support SLAs, Upgrade and Rollback Programs, Critical Incident RCA Delivery Rhythms |
| 2) Incident Evidence and Auditability | Cluster/node operation logs, configuration change logs, and permission operation logs should be saved and queried centrally. | Can you incorporate audit information from vendor tools/platforms into your internal SIEM/audit process? |
| 3) Security baseline: encryption, access control, network isolation | You have to define your own TLS, certificate rotation, ACL/authority minimization, segment isolation; and prove that you've landed | How the encryption/permissions/segregation capabilities provided by Authentication Enterprise Edition are configured and audited |
| 4) High Availability and Disaster Preparedness (RTO/RPO) | Sentinel/Cluster Design, Cross-AZ/Cross-Room, Backup Strategies and Exercise Reports | Enterprise HA/DR Capabilities, Cross-Region Synchronization Strategies, Exercise Support and Deliverable Reports |
| 5) Capacity Planning and Performance SLO (p99 Delay) | Pressure Measurement Methods, Capacity Modeling, Spike Protection (Current Limit/Stage Reduction), Performance Regression Testing | Whether Enterprise Edition can achieve SLOs in your deployment topology, and whether scaling is predictable |
| 6) Change and Version Governance (with CVE Response) | Vulnerability Notification, Remediation Pacing, Compatibility Testing, Gray Scale/Rollback Processes; Need for 'People' and 'Systems' | Vendor Version Lifecycle, Patch SLAs, Escalation Tools and Risk Management Approach |
| 7) Third party reliance and exit strategies (vendor/lock-in) | You need to demonstrate that there is a documented runbook and handover in place even if there is a turnover of personnel, and that it can be resumed in a reasonable amount of time. | You'll want to spell out in the contract: data portability, termination/withdrawal support, handover information and timelines (one of HKMA's core concerns for third-party risk) |
| 8) Whether the cost model includes 'hidden costs' or not | Labor (SRE/DBA), Shifts, Drills, Incident Costs, Tool Chain Costs (Monitoring/Backup/Automation) | License fee + Support fee + Infrastructure fee + Execution service fee, does it really reduce the risk of labor and downtime? |