Security documentation

Security documentation

Intel-Plan creates the necessary security documentation reconciled with client's needs, laws and regulations. Security documentation features the following documents: Security Policy, Vulnerability Assessment, Security Plan, Operational Protection and Salvation Plan, Security Study, and Integrated Technical Security Systems Project.

  • Security Policy
    We make, apply, and test the personalized Security Policy and supervise its implementation. Security Policy is the basic security management document, which Intel-Plan operates by, establishes a basic set of tools for maintaining general security levels, and determines the duration, coverage, and focus of implementing levels of high security. Security Policy features basic principles of sub-policies for personal, property and business processes safety.
  • Vulnerability Assessment
    Vulnerability Assessment is a process of predicting events, which are considered threatening to people, objects, business processes, money and valuables. The primary aim of this assessment is to recognize the source and type of threat, identify its cause, determine the risk event probability and level, predict its frequency, and decide on the neutralization by applying means of protection and raising the defense capacity.
    The purpose of Vulnerability Assessment is to determine the rational use of limited protection and defense resources, while its goal is to find out the probability of risk event occurrence, and the damage it would cause.
    Security Plan, Operational Protection and Salvation Plan, and Security Study are based on Vulnerability Assessment.

Najnovije vijesti