In addition, the company should implement such types of systems, which increase the performance of the company and secure their assets from different risks. Discussion and analysis 4 2.1 Information security risk management 4 2.1.1 Identify – Data Risk Analysis 6 2.1.2 Protection system – Asset Management 7 2.1.3 Implementation 7 2.1.4 Security Control Assessment 8 2.1.5 Information Security System Authorizations 8 2.1.6 Risk Monitoring solution 9 2.2 Information security certification and accreditation 9 Conclusion 10 References 11 1. It is necessary