Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Contact Us
English (US)
US English (US)
CO Spanish (Colombia)
  • Home
  • Cibersecurity and Compliance

Is There an Updated Inventory of Information Assets, Classified by Criticality and Protected According to Risk Level?

Written by Jhon Bairon Figueroa

Updated at November 6th, 2025

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • wvx Digital Interaction
  • wvx Voice Interaction
  • wvx Conversational AI
  • wvx Control Interactions
  • wvx CRM
  • wvx Agent
  • wvx Studio
  • Cibersecurity and Compliance
  • Release
    wolkvox Manager release wolkvox Agent release wolkvox CRM release
+ More

Table of Contents

Description Features

Description

wolkvox maintains an up-to-date inventory of information assets, managed within its Information Security Management System (ISMS). This inventory includes all critical components of the wolkvox solution, such as servers, databases, applications, networks, and sensitive data. Each asset is classified and rated according to its level of criticality, allowing the implementation of security controls proportional to the risk it represents. This approach ensures that the most important resources receive appropriate protection, aligned with standards such as ISO/IEC 27001.

The classification and risk management process is carried out through a documented procedure, ensuring traceability and continuous improvement of security measures.

 

Features

Information Asset Inventory

  • Comprehensive coverage: The inventory includes all relevant assets, from cloud infrastructure (Google Cloud Platform) to local equipment and customer data.
  • Criticality classification: Assets are categorized based on their business impact (e.g., high, medium, low), considering factors such as confidentiality, integrity, and availability.
  • Periodic updates: The inventory is regularly reviewed and updated to reflect infrastructure changes or newly added assets.

 

Risk Management and Security Controls

  • Risk assessment: Each asset is analyzed to identify vulnerabilities and threats, assigning security controls based on its risk level.
  • Proportional controls: Highly critical assets receive robust measures such as advanced encryption, restricted access, and continuous monitoring.
  • Layered protection: Technical (e.g., firewalls, encryption), organizational (e.g., access policies), and physical (e.g., data center security) controls are implemented.

 

Documented Procedures

Clear methodology: The classification and risk management process follows a standardized procedure aligned with ISO 27001 and other best practices.
Defined responsibilities: Specific roles are assigned for inventory updates and control implementation, ensuring accountability and follow-up.
Internal audits: The inventory and associated controls are periodically reviewed through audits to validate their effectiveness.

 

 

risk levels information assets

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • Does Wolkvox Have an Information Security Management System (ISMS)?
  • Is Software Installation Restricted Solely to Authorized Personnel, with an Inventory of Approved Applications?
  • Are Documented Hardening Controls Aligned with Security Best Practices Applied in Wolkvox Solutions?

2025 Wolkvox

Information security policy | Privacy Policy

Expand