The current site is a responsive website. Depending on the size of the screen, the displayed content may vary. Please maximize the screen and use it.

  1. Home
  2. ESG Management
  3. Governance
  4. Compliance

ESG Management

Governance

Information Security Policy

SK Ecoengineering conducts activities to protect the information assets of the company and its customers based on information security regulations and personal information management regulations. Within the information security regulations, we have established sector-specific rules, such as "HR security rules" and "security audit rules", and compiled guidelines and manuals under each rule to stipulate detailed work performance standards.

Information Security Activities

SK Ecoengineering strives to achieve the goal of "zero incidents of information leaks and legal violations" by preventing the occurrence of information security-related risks.
Since its establishment in 2022, SK Ecoengineering has not suffered any damage due to violations of laws related to information protection and personal information protection or information leakage. We plan to continue information protection activities to prepare for cybersecurity threats.

Control of Internal Information Leak

SK Ecoengineering is subject to SK Ecoplant's information protection system and management system control and responds to illegal internal information leakage attempts and signs at all times through the abnormality monitoring system.

Response to Cyber Security Threat

SK Ecoengineering continues to check the risk of information leakage to prevent hacking and infringement accidents. Training activities such as external attacks and phishing were carried out in collaboration with SK Eco Plant, and based on the results of mock training, we plan to continue to carry out activities to improve the security level.

Status of Cyber Simulation Training
Name of training Unit 2022 2023
DDoS attack response training Inspecting the response to DDoS attacks, such as situational development and interception rate, after a simulated attack times 1 1
System recovery training Training on system recovery and service resumption, assuming server failure times 1 1
Encryption key change training Carrying out training in terms of new encryption key changes, assuming a breach in document security and DB encryption key leakage times 1 1
Phishing email response training Measuring attack success rates after sending a spear phishing email for simulation training times 2 2