Information Security Management System for Cloud Services

As Kredi Kayıt Bürosu, we consider it a strategic priority to ensure the highest level of information security in the cloud computing services we offer to our customers. In today's technological infrastructure, protecting the data processed and stored through cloud services is not only a technical necessity; it also forms the basis of our trust-based service approach.

Within this scope, we take a systematic approach to the management of cloud services in line with the ISO/IEC 27017 standard; we are committed to full compliance with the requirements of legal obligations and international standards in all processes carried out to ensure information security. We believe that information security can be ensured not only by systems and technologies, but also by organizational awareness, corporate culture and continuous managerial determination.

As senior management, we allocate the necessary resources to ensure the secure provision of cloud services and support our employees to raise awareness on information security. Through our risk management processes, we anticipate threats that may arise in cloud environments and develop proactive and sustainable security measures against these threats. In line with our service continuity and data privacy-oriented approach, we accept it as a corporate responsibility to protect the integrity and accessibility of our customers' data under all circumstances.

Data processing and storage processes are based on transparency, auditability and trust; the security of our cloud infrastructures is regularly reviewed and necessary improvements are implemented. With this approach, which is based on the security of all our users, stakeholders and employees, we see information security as a living management system and we work resolutely to ensure the continuity of this structure.

As Kredi Kayıt Bürosu, we are committed as the senior management to manage the security of the cloud services we offer in a sustainable manner, to exhibit a transparent and accountable information security approach to all stakeholders, and to provide all necessary support to ensure that this policy is adopted by all employees.