[{"id":"ci_fea8e9b9aa010fe6193f50106f2d0c903dd8f3a968d65440a221b6b3f121afae","title":"Gobierno de la seguridad","path":"/es/trust-center/v1/gobierno-de-la-seguridad","children":[{"id":"ci_09eccded73cc1cafed1605eece95ab28b2602da6a44fd7e1d79f4a0a01af9c4d","title":"Nuestra filosofía de seguridad","path":"/es/trust-center/v1/nuestra-filosofia-de-seguridad","children":[]}]},{"id":"ci_50e067a1c504bba774acbb487236c5c0f3860cc88235a2ed0a254bf04b01c5a7","title":"Compliance y gestión de riesgos","path":"/es/trust-center/v1/compliance-y-gestion-de-riesgos","children":[{"id":"ci_b862dbc0d9e8f21ea2a77beffc73c133c2742a04832649ba5bd863d55d5bda10","title":"Certificaciones y cumplimiento normativo","path":"/es/trust-center/v1/certificaciones-y-cumplimiento-normativo","children":[]},{"id":"ci_d4b71a1d4477642e3d38b7dc9370a3fd2f28e98df89246f6d3d4f5252b16d903","title":"Encargados de tratamiento de Datos Personales","path":"/es/trust-center/v1/subencargados-de-tratamiento","children":[]},{"id":"ci_6d10f80c6d8032e7a026fe354242c13e73e77d723b4d2d75cc3c926507e88e56","title":"Política y gestión de riesgos","path":"/es/trust-center/v1/politica-y-gestion-de-riesgos","children":[]}]},{"id":"ci_eab9fe1b30a80f9b306db55b04df2aa195352fe308b81ec15bb258c126ab077c","title":"Infraestructura Cloud","path":"/es/trust-center/v1/infraestructura-cloud","children":[{"id":"ci_9abba548a41e8df6218763f34828d7dfc1e8e26bac2cdb09cc108250339bd249","title":"Arquitectura Multi-Tenant","path":"/es/trust-center/v1/arquitectura-multi-tenant","children":[]},{"id":"ci_3df9d01be6e51a1a9c9d96580a53b9db90a9afa0238ed3a5d67f09f6eb211e9d","title":"Seguridad en la red","path":"/es/trust-center/v1/seguridad-en-la-red","children":[]},{"id":"ci_37b20f0172d030c3d055dfb80893c76ec15d2a6554218e0770c0c9a922bf7364","title":"Continuidad de negocio","path":"/es/trust-center/v1/continuidad-de-negocio","children":[]}]},{"id":"ci_97ad9cd2b22ac3f51e5cdb43b6864396f9f43364f423099360b55146086a223f","title":"Protegiendo nuestra infraestructura","path":"/es/trust-center/v1/protegiendo-nuestra-infraestructura","children":[{"id":"ci_c09f8ac35ef32ede8efb769816d0c2b7e79b2c89a973788d89fa21a1972313ca","title":"Descripción general de la infraestructura","path":"/es/trust-center/v1/descripcion-general-de-la-infraestructura","children":[]},{"id":"ci_db510222bfd614300b8a40f279db6c4fcf0a84463a11a7a9e7bd9931eb7dd964","title":"Gestión del dato","path":"/es/trust-center/v1/gestion-del-dato","children":[]},{"id":"ci_572eb60d6ae9318f0459581bd62168e3d717caced62a127daf9599f84ee755b1","title":"Gestión de incidentes","path":"/es/trust-center/v1/gestion-de-incidentes","children":[]},{"id":"ci_632287152b7bae9fbd39c73fa6577c236ddf4b896171327aa08180bffd93cc59","title":"Seguridad física","path":"/es/trust-center/v1/seguridad-fisica","children":[]},{"id":"ci_920b7b9fe65d36eef47ef72535cc6451e9190e099573ea8f3c03ab198109bca7","title":"Cifrado","path":"/es/trust-center/v1/cifrado","children":[]},{"id":"ci_db25cb8b16e03f7987667a6ee2205ef240b50d100cc5cce38ca4cf25afb2ce45","title":"Gestión de acceso","path":"/es/trust-center/v1/gestion-de-acceso","children":[]},{"id":"ci_a4119c7203c1c3d18fc5f02c922fddd09286d9175169eb827ad2aea4c3f093a2","title":"Gestión de vulnerabilidades","path":"/es/trust-center/v1/gestion-de-vulnerabilidades","children":[]}]},{"id":"ci_bf0b27d1d0e0182f2ef235e0fe0a74de869359bf032a4bce6f8f6a12c0aa3d9b","title":"Protegiendo nuestras personas","path":"/es/trust-center/v1/protegiendo-nuestras-personas","children":[]},{"id":"ci_73001d8b3b2eb2c206c1af24831e3fa473af27fbbc9f3acc87aa8c1c265cbc5b","title":"Protegiendo nuestros productos","path":"/es/trust-center/v1/protegiendo-nuestros-productos","children":[]}]