In order to ensure the continuous development of our information security management system within our organization:
Identifying information assets, addressing the business impact of these assets: the cost of replacing the asset, the confidentiality of information, its effect on image, and the damage it will cause in terms of legal and legal obligations,
Threat probability: identifying, assessing, and assessing risks to the confidentiality, integrity, and access of information, by addressing the multiplicity of vulnerabilities and how well existing controls can cover those weaknesses, the motivation of the attacker, the attractiveness of information to competitors, vulnerabilities in access controls, and threats to information integrity. to implement the necessary controls for all assets, to measure the performance of information security processes, to produce targets from these data, to minimize our weaknesses and threats with infrastructure, working environment, hardware, software and training investments, to meet the security requirements of our business, our customers and legal conditions,
We are committed.