Badge
11,371 badges added since 01 January 2025
ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

The Army Act was enacted in parliament on the 10th of October 1949 which is recognized as the day, the Ceylon Army was raised. The Army was to be comprised of a Regular and a Volunteer force. In May 1972, when Ceylon became the Republic of Sri Lanka, all Army units were renamed accordingly Regimental Centres # SLAC- Sri Lanka Armoured Corps # SLA - Sri Lanka Artillery # SLE - Sri Lanka Engineers # SLSC - Sri Lanka Signals Corps # SLLI - Sri Lanka Light Infantry # SLSR - Sri Lanka Sinha RegimentM # GW - Gamunu Watch # GR - Gajaba Regiment # VIR - Vijayabahu Infantry Regiment # MIR- Mechanized Infantry Regiment # CDO - Commando Regiment # SF - Special Forces Regiment # MIC - Military Intelligence Corps # CES - Corps of Engineer Services # SLASC - Sri Lanka Army Service Corps # SLAMC - Sri Lanka Army Medical Corps # SLAOC - Sri Lanka Army Ordnance Corps # SLEME - Sri Lanka Electrical and Mechanical Engineers # SLCMP - Sri Lanka Corps of Military Police # SLAGSC - Sri Lanka Army General Service Corps # SLAWC - Sri Lanka Army Women's Corps # SLRC - Sri Lanka Riffle Corps # SLPC - Sri Lanka Army Pioneer Corps # SLNG - Sri Lanka National Guard

Sri Lanka Army A.I CyberSecurity Scoring

SLA

Company Details

Linkedin ID:

sri-lanka-army

Employees number:

10,001

Number of followers:

0

NAICS:

928

Industry Type:

Armed Forces

Homepage:

army.lk

IP Addresses:

0

Company ID:

SRI_6715515

Scan Status:

In-progress

AI scoreSLA Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/sri-lanka-army.jpeg
SLA Armed Forces
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreSLA Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/sri-lanka-army.jpeg
SLA Armed Forces
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

SLA Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

SLA Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for SLA

Incidents vs Armed Forces Industry Average (This Year)

No incidents recorded for Sri Lanka Army in 2026.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Sri Lanka Army in 2026.

Incident Types SLA vs Armed Forces Industry Avg (This Year)

No incidents recorded for Sri Lanka Army in 2026.

Incident History — SLA (X = Date, Y = Severity)

SLA cyber incidents detection timeline including parent company and subsidiaries

SLA Company Subsidiaries

SubsidiaryImage

The Army Act was enacted in parliament on the 10th of October 1949 which is recognized as the day, the Ceylon Army was raised. The Army was to be comprised of a Regular and a Volunteer force. In May 1972, when Ceylon became the Republic of Sri Lanka, all Army units were renamed accordingly Regimental Centres # SLAC- Sri Lanka Armoured Corps # SLA - Sri Lanka Artillery # SLE - Sri Lanka Engineers # SLSC - Sri Lanka Signals Corps # SLLI - Sri Lanka Light Infantry # SLSR - Sri Lanka Sinha RegimentM # GW - Gamunu Watch # GR - Gajaba Regiment # VIR - Vijayabahu Infantry Regiment # MIR- Mechanized Infantry Regiment # CDO - Commando Regiment # SF - Special Forces Regiment # MIC - Military Intelligence Corps # CES - Corps of Engineer Services # SLASC - Sri Lanka Army Service Corps # SLAMC - Sri Lanka Army Medical Corps # SLAOC - Sri Lanka Army Ordnance Corps # SLEME - Sri Lanka Electrical and Mechanical Engineers # SLCMP - Sri Lanka Corps of Military Police # SLAGSC - Sri Lanka Army General Service Corps # SLAWC - Sri Lanka Army Women's Corps # SLRC - Sri Lanka Riffle Corps # SLPC - Sri Lanka Army Pioneer Corps # SLNG - Sri Lanka National Guard

Loading...
similarCompanies

SLA Similar Companies

Defense Logistics Agency

As the nation’s logistics combat support agency, the DLA manages the end-to-end global defense supply chain – from raw materials to end user disposition – for the five military services, 11 combatant commands, other federal, state and local agencies and partner and allied nations. DLA’s mission is

Swedish Armed Forces

The Swedish Armed Forces is one of the biggest authorities in Sweden and is headed by a Supreme Commander. The deputy leader of the authority is the Director General. As the only authority permitted to engage in armed combat, the Swedish Armed Forces are Sweden’s ultimate security policy resource

Marine Corps Recruiting

This is the Official LinkedIn Page of Marine Corps Recruiting. We make Marines. We win our nation's battles. We develop quality citizens. These are the promises the Marine Corps makes to our nation and to our Marines. The core values that guide us, and the leadership skills that enable us, not on

Canadian Armed Forces | Forces armées canadiennes

A career in the Canadian Armed Forces is more than a way to make a living. It’s a passport to a whole-life experience that will change you and allow you to change the lives of others. Join an organization that offers more than 100 different trades and professions. Obtain world-class qualification

United States Marine Corps

The United States Marine Corps (USMC) is a branch of the United States Armed Forces responsible for providing power projection, using the mobility of the United States Navy, by Congressional mandate, to deliver rapidly, combined-arms task forces on land, at sea, and in the air. The U.S. Marine Corps

Saudi Arabian National Guard المهمة الأساسية للحرس الوطني هي : الحفاظ على الأمن، والاستقرار الداخلي للوطن، والدفاع عن مقدّساته ومكتسباته الحضارية . ومن مـهامه الأخرى ما يلي: •حماية المنشآت الحيوية، والإستراتيجية التي يُكَلَّف بها. • المشاركة في

British Army

Joining the British Army, you’ll get much more from life than you ever would with a civilian career – you’ll have the opportunity to do something that really matters, with a team that are like family to you. The sense of belonging in the Army is next level: when you’ve trained with each other and ov

Israel Defense Forces

The Israel Defense Forces (IDF) is the military of the State of Israel, responsible for the nation's defense and security. Founded in 1948, the IDF ranks among the most battle-tested armed forces in the world, having had to defend the country in six major wars. At the age of 18, men and women are

U.S. Air Force Reserve

The Air Force Reserve is an integral component of our Nation's air defense and military support network. Reservists bring knowledge, skills and expertise from their civilian experiences to support critical missions and training around the globe, while working alongside their Active Duty Air Force me

newsone

SLA CyberSecurity News

December 13, 2025 08:00 AM
Pakistan army chief issues ultimatum to Afghan Taliban

Pakistan's newly appointed armed forces chief asked Afghanistan's Taliban government this week to choose between sustaining ties with...

December 12, 2025 08:00 AM
OpenAI Flags “High” Cybersecurity Threat From Next-Gen AI Models

OpenAI has issued one of its strongest warnings yet about the risks posed by rapidly advancing artificial intelligence, cautioning on...

December 07, 2025 08:00 AM
Op Sagar Bandhu: Indian Army's Field Hospital treats over 1250 people in Sri Lanka

As India's rescue and relief efforts continue in full swing in Sri Lanka, the Indian Army shared that its field hospital has treated over...

December 05, 2025 08:00 AM
Kaspersky advocates proactive cybersecurity shift for Sri Lanka amid rising threats

Sri Lanka's rapid adoption of digital technologies has ushered in tremendous opportunities for economic growth and innovation,...

November 18, 2025 08:00 AM
International cooperation on cybersecurity vital for global competitiveness

November 18, 2025 1:30 am. DHARMA SRI ABEYRATNE. Deputy Minister of Digital Economy Eranga Weeraratne addressing the 16th National Cyber...

November 01, 2025 07:00 AM
2 Army personnel sentenced to life imprisonment for sexual assault of 4-year-old child

Two Army personnel have been sentenced to life imprisonment by a special Pocso court in Berhampur for the sexual assault of a four-year-old...

October 16, 2025 07:00 AM
Defence Cyber Command Conducts Cybersecurity Awareness for State Institutions

The Defence Cyber Command conducted a Cybersecurity Awareness Programme for officers of the Ministry of Public Security,...

September 05, 2025 07:00 AM
Kaspersky urges Sri Lanka to establish clear cybersecurity guidelines as mobile financial threats mount

Global cybersecurity giant Kaspersky is calling on Sri Lankan regulators to establish clear cybersecurity guidelines for mobile financial...

September 02, 2025 07:00 AM
Cyber security loophole plaguing Commercial Bank customers?

Two customers of Commercial Bank have lodged complaints with the Negombo Divisional Crime Investigation Bureau, alleging unauthorized...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

SLA CyberSecurity History Information

Official Website of Sri Lanka Army

The official website of Sri Lanka Army is http://www.army.lk.

Sri Lanka Army’s AI-Generated Cybersecurity Score

According to Rankiteo, Sri Lanka Army’s AI-generated cybersecurity score is 768, reflecting their Fair security posture.

How many security badges does Sri Lanka Army’ have ?

According to Rankiteo, Sri Lanka Army currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has Sri Lanka Army been affected by any supply chain cyber incidents ?

According to Rankiteo, Sri Lanka Army has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.

Does Sri Lanka Army have SOC 2 Type 1 certification ?

According to Rankiteo, Sri Lanka Army is not certified under SOC 2 Type 1.

Does Sri Lanka Army have SOC 2 Type 2 certification ?

According to Rankiteo, Sri Lanka Army does not hold a SOC 2 Type 2 certification.

Does Sri Lanka Army comply with GDPR ?

According to Rankiteo, Sri Lanka Army is not listed as GDPR compliant.

Does Sri Lanka Army have PCI DSS certification ?

According to Rankiteo, Sri Lanka Army does not currently maintain PCI DSS compliance.

Does Sri Lanka Army comply with HIPAA ?

According to Rankiteo, Sri Lanka Army is not compliant with HIPAA regulations.

Does Sri Lanka Army have ISO 27001 certification ?

According to Rankiteo,Sri Lanka Army is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Sri Lanka Army

Sri Lanka Army operates primarily in the Armed Forces industry.

Number of Employees at Sri Lanka Army

Sri Lanka Army employs approximately 10,001 people worldwide.

Subsidiaries Owned by Sri Lanka Army

Sri Lanka Army presently has no subsidiaries across any sectors.

Sri Lanka Army’s LinkedIn Followers

Sri Lanka Army’s official LinkedIn profile has approximately 0 followers.

Sri Lanka Army’s Presence on Crunchbase

No, Sri Lanka Army does not have a profile on Crunchbase.

Sri Lanka Army’s Presence on LinkedIn

Yes, Sri Lanka Army maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/sri-lanka-army.

Cybersecurity Incidents Involving Sri Lanka Army

As of January 22, 2026, Rankiteo reports that Sri Lanka Army has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

Sri Lanka Army has an estimated 819 peer or competitor companies worldwide.

Sri Lanka Army CyberSecurity History Information

How many cyber incidents has Sri Lanka Army faced ?

Total Incidents: According to Rankiteo, Sri Lanka Army has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at Sri Lanka Army ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g.,  execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).

Risk Information
cvss3
Base: 8.1
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=sri-lanka-army' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge