UA
EN
Search

Services

services

"AVTOR" LLC provides a comprehensive range of services for the authorization of security systems in accordance with the Law of Ukraine "On Information Protection in Information and Communication Systems"; the Procedure for Security Authorization of information, electronic communication, information and communication, and technological systems (approved by the Cabinet of Ministers of Ukraine Resolution No. 712 dated June 18, 2025); and the Minimum Requirements for the protection of information, electronic communication, information and communication, and technological systems (approved by the Cabinet of Ministers of Ukraine Resolution No. 373 dated March 29, 2006, as amended by Resolution No. 1531 dated November 26, 2025).

The company ensures professional support at all stages — from initial analysis to the inclusion of the information and communication system into the list of authorized security systems by the State Service of Special Communications and Information Protection of Ukraine.

We conduct expert assessments of compliance with the target security profile requirements. As part of this service, we provide:

  • Analysis of system architecture and composition;
  • Assessment of the completeness and correctness of information security measures implemented within information and communication systems;
  • Development of conclusions and recommendations for the remediation of non-compliances.
  • The final deliverable is a substantiated assessment report on compliance with the target security profile requirements for security authorization purposes.

We conduct expert assessments of compliance with the system’s target security profile. As part of this service, we provide:

  • System architecture and composition analysis;
  • Assessment of the completeness and correctness of information security measures implemented within information and communication systems;
  • Formulation of conclusions and recommendations for the remediation of non-compliances.
  • The engagement results in a substantiated assessment report on compliance with the target security profile requirements, specifically for security authorization purposes.
Back to top