Governance
SK Ecoengineering conducts activities to protect the information assets of the company and its customers based on information security regulations and personal information management regulations. Within the information security regulations, we have established sector-specific rules, such as "HR security rules" and "security audit rules", and compiled guidelines and manuals under each rule to stipulate detailed work performance standards.
SK Ecoengineering strives to achieve the goal of "zero incidents of information leaks and legal violations" by preventing the occurrence of information security-related risks.
Since its establishment in 2022, SK Ecoengineering has not suffered any damage due to violations of laws related to information protection and personal information protection or information leakage. We plan to continue information protection activities to prepare for cybersecurity threats.
SK Ecoengineering is subject to SK Ecoplant's information protection system and management system control and responds to illegal internal information leakage attempts and signs at all times through the abnormality monitoring system.
Response to Cyber Security ThreatSK Ecoengineering continues to check the risk of information leakage to prevent hacking and infringement accidents. Training activities such as external attacks and phishing were carried out in collaboration with SK Eco Plant, and based on the results of mock training, we plan to continue to carry out activities to improve the security level.
Status of Cyber Simulation TrainingName of training | Unit | 2022 | 2023 |
---|---|---|---|
DDoS attack response training Inspecting the response to DDoS attacks, such as situational development and interception rate, after a simulated attack | times | 1 | 1 |
System recovery training Training on system recovery and service resumption, assuming server failure | times | 1 | 1 |
Encryption key change training Carrying out training in terms of new encryption key changes, assuming a breach in document security and DB encryption key leakage | times | 1 | 1 |
Phishing email response training Measuring attack success rates after sending a spear phishing email for simulation training | times | 2 | 2 |