Arm’s Commitment to Security
Our commitment to security extends beyond continuously improving and innovating security in our technology. It’s reflected in how we respond to vulnerabilities, engage with our partners, and even train our staff.
Arm Security Program
Arm has built an effective security program that centers around technical controls and empowering our people to be our best line of defense.
Identify
Arm’s security program manages cybersecurity risks that are identified within our organization, including our people, systems, or assets.
Protect
Arm deploys the appropriate safeguards to protect our systems, people, and infrastructure to ensure that critical services are available in the case of a potential event.
Detect and Respond
Arm’s response plan is designed and equipped to detect and respond to potential cybersecurity incidents in a timely manner. Teams contain events, conducting analysis and creating impact reports that are used to mitigate and resolve the incident.
Recovery
Arm has established steps and processes for recovery if a potential cybersecurity event occurs. In addition to the business continuity plan (BCP) and communications plan, steps are taken to compile data and act on it as appropriate to help ensure that the risk of a potential incident is further prevented.