Sustainability Report 2022

104 O N E R E P O R T 2 0 2 2 OVERVIEW BUSINESS OVERVIEW AND PERFORMANCE CORPORATE GOVERNANCE FINANCIAL INFORMATION SUSTAINABLE BUSINESS DEVELOPMENT 3. Cyber Threat and Cyber-Attack Warning Procedure The cyber threat warning procedure requires Information Security to classify the threat, draft a remedial plan, trigger the warning system and undertake a process to contain the threat against impacting operations. Information Security Incident Response Guideline In the event of an incident or information security threat, any witness or the ICT office must file a report with Information Security using the Internal Service Request (ISR) platform. Once Information Security has received the report, Security Operations will classify the issue, assign it a level of severity and carry out an assessment procedure while notifying all related offices. Further steps will be containment, isolation of the threatened system, recovery of affected systems and the launching of a backup system. Incident Occur Report Through Email IT security Team will raise ISR Learning from Incident Incident Criticality Prioritization End Incident Investigation Process Containment/ Notification Incident Recovery Process Raise ISR (log a new incident) Incident Response Workflow TAA ICT/User TAA ICT/Group Servicedesk Group Infosec Incident Handling Group Infosec Documentation

RkJQdWJsaXNoZXIy ODEyMzQ3