Governance Documentation 

this is the security policy hub! 

Dive into our repository to explore the policies and documentation that shape our resilient information security program. 

Here, we transparently share our strategies for mitigating risks, safeguarding data, and shielding our operations from cyber threats. Navigate through our structured, secure digital environment, understanding how we foster a safeguarded digital space for our operations and data. 

Leadership


Planning


Support


Operation


Performance evaluation


Performance evaluation


Improvement



Organizational controls  

People controls

Physical controls

Technological controls