Security
- Customer Password Policy
- Business Continuity Plan
- Process of Tracking and Managing Software and Hardware Vulnerabilities (with ISO 27001 standard)
- Patch Management Policy
- Flaws Tracking Policy
- Incident Response Policy and Training Program
- Policy for Managing Third-Party Vendors from Supply Chain Risks and Vulnerabilities
- Insider Threat Program
- Whistleblower Policy and Hotline
- Penetration Testing Protocol
- Employee Security Awareness Program
- Backup Policy
- Information Security Policy
- Access Control Policy