List of Procedures
We maintain a comprehensive set of internal procedures to ensure consistent and secure operations. Below is a list of key documented procedures that govern our platform and services.
Information Security Management System
P-01 | Context of the organization
P-02 | Leadership
P-03 | Planning
P-04 | Support
P-05 | Operation
P-06 | Evaluation of operational effects
P-07 | Improvement
Security Management
P-08 | Risk management
P-09 | Information classification
P-10 | Physical security
P-11 | Clean desk and screen
P-12 | Management of information processing devices
P-13 | Management of system authorizations
P-14 | User responsibility
P-15 | Cryptographic controls
P-16 | Data carrier security
P-17 | Protection against malware
P-18 | Data archiving
P-19 | Logging and monitoring
P-20 | System configuration
P-21 | Technical vulnerability management
P-22 | Network security
P-23 | Data transmission
P-24 | Secure development
P-25 | Third-party services
P-26 | Information security incident management
Business Continuity Management
P-27 | Business continuity
P-28 | Redundancy
Personal Data Protection
P-29 | Personal data protection
P-30 | Data subjects' rights
P-31 | Data retention
Last updated