Identify

We consider these controls as foundational for effective information security and privacy.

Understanding the business context, resources that support critical functions, and the related information security risks, we focus our efforts and resources to properly secure the network and cloud resources. We focus on the following categories:

  • Business context;
  • Resources that support critical functions; and
  • Related information security risks.