Protection of citizen data
Medical records, tax data, civil registries, information on vulnerable individuals. That trust cannot be lost.
We operate an Information Security Management System (ISMS) aligned with ISO/IEC 27001. The controls are already in place; certification completes the cycle. For our public sector clients, this means continuity, confidentiality, and auditable traceability from day one.
When we operate public systems, we handle data that affects rights, benefits, and strategic information for the country. Security is a contractual, legal, and ethical obligation—not a "nice-to-have."
Medical records, tax data, civil registries, information on vulnerable individuals. That trust cannot be lost.
Data protection laws, sector regulations and public procurement frameworks require demonstrable and traceable controls.
A security incident can halt an entire program. Managing risk is about protecting operations.
Our public procurement team and the court of auditors will ask questions. We provide auditable evidence, not statements of intent.
The ISMS doesn't begin with certification: certification validates it. Today we already operate with policies, controls, and governance—the formal ISO 27001 process completes the external assurance cycle.
Approved by management, communicated to 100% of staff, reviewed annually and aligned to ISO/IEC 27001.
Responsible with executive mandate, interdisciplinary committee and direct reporting to management.
Documented asset inventory, threat and vulnerability analysis, risk matrix, and treatment plan.
Access management, MFA, encryption in transit and at rest, network segmentation, tested backups, and vulnerability management.
Awareness campaigns, confidentiality agreements, specific technical training, and phishing drills.
Evaluation of critical suppliers, security contract clauses, and compliance monitoring.
Documented procedure, reporting channel, defined roles, internal SLAs, and customer communication protocol.
Business continuity plan, disaster recovery plan, offsite backups and regular testing.
First internal audit completed. Findings under treatment documented with deadlines and responsible parties.
AGESIC defines the cybersecurity framework that guides and regulates information security management for Uruguayan government agencies. Our ISMS is aligned with its categories and controls, ensuring that projects with Uruguayan public clients benefit from this compliance from day one.
We work with the same structure and terminology of the framework — based on NIST CSF and adapted to the Uruguayan public sector — so that the evidence, controls and reports of our ISMS are directly usable by the client.
Internal and external commitment: ISO/IEC 27001 certification in August 2026. Work plan structured in three operational stages plus the certification phase, with responsible parties, deliverables and auditable evidence.
Final review of ISMS documentation, closure of remaining internal audit findings, and preparation of the evidence file.
Document audit of the certifying body (Stage 1). Review of the ISMS, policies and statement of applicability. Adjustments based on observations.
On-site audit by the certifying body (Stage 2). Operational verification of controls. Action plan for minor non-conformities.
Formal closure of the process, publication of the certificate and availability of the documentation for public procurement files.
We work with the 93 controls of Annex A grouped into the 4 thematic clauses of the 2022 version. Below are representative examples by group.
ISO 27001 certification is based on a management system that is already certified for quality, environmental, and anti-bribery standards, as well as a CMMI-DEV ML3-appraised development maturity model.
Certified quality management system.
Environmental management system.
Anti-bribery management system.
Rated at Maturity Level 3.
Certification is scheduled for August 2026.