Skip to content
Visit CANiK at Eurosatory 2026 — Paris, June 2026
ISMS

Information Security Management System Policy

ISO 27001NATO AQAP-2110KVKK

SCOPE OF ISMS

Design & ManufacturingSupply ChainCustomer DataDefense ProgramsIT InfrastructurePersonnel Records

1. Purpose

This document has been created to ensure the security of information assets, to establish, operate, maintain and continually improve the ISMS, and to express the direction and support of management.

2. Scope

This document covers all personnel, information assets and relevant third parties.

3. Definitions

Senior ManagementManagement Representative
BGYSInformation Security Management System
ISO 27001TS ISO/IEC 27001:2013

4. Reference Documents

ISMS Manual, Job Descriptions, TS ISO/IEC 27001:2013 Information Technology - Security Techniques - Information Security Management Systems - Requirements

5. Information Security Policy

The main theme of the TS EN ISO 27001:2013 Information Security Management System has been determined to cover all physical and electronic information assets within the scope of Canik ARMS, including all software used, all hardware and software related to corporate business process management, all server system elements and end-user computers, and all support maintenance services.

Policy Objectives

  • Protecting Canik ARMS information assets against all threats from inside or outside, intentional or unintentional.
  • Ensuring accessibility of information as required by business processes.
  • Meeting legal and regulatory requirements.
  • Confidentiality: Preventing unauthorized access to important information.
  • Integrity: Demonstrating the accuracy and completeness of information.
  • Availability: Demonstrating accessibility to authorized personnel.
  • Providing Information Security Management training to all personnel.
  • Reporting all actual or suspected vulnerabilities to the ISMS Team.
  • Preparing, maintaining and testing business continuity plans.
  • Periodically assessing existing risks and reviewing action plans.
  • Preventing any disputes and conflicts of interest arising from contracts.

Management Commitment

Senior management is committed to continual improvement of the ISMS and ensuring adequate resources for information security. Annual management reviews assess the effectiveness of the system and identify opportunities for improvement.

ISO/IEC 27001:2013 · Last reviewed: March 2026