Expanding Internet Security
✓ Apart from protecting customer data, the main objective of information security is to maintain United Internet’s ability to do business and to reduce negative impacts on its business operations.
Customer trust in the measures we take to ensure information security is the basis for them trusting us both with personal digital information such as photos, documents, and e-mails, and with business data (e.g., when running applications in the cloud).
The information that we have to protect comprises not only customer data but also employee and business data. It is processed in our internal systems using business processes that are in turn part of products. We aim to protect information against unauthorized access and misuse throughout the entire, complex product environment. We use technical and organizational measures to actively manage information security so as to meet our goals of confidentiality, availability, and integrity. The measures we take to protect our product landscape against unauthorized access and misuse are derived from the requirements of our security guidelines . Our security strategy aims to use specific security management measures to achieve and continuously enhance our protective goals throughout the Group at an appropriate and uniform level.
We base our activities here on internationally recognized standards. For example, our information security management system (ISMS) is certified as complying with ISO 27001. Establishing and expanding our effective, scalable security organization is particularly important here. In addition, planning and achieving information security objectives is a key part of implementing and maintaining our ISMS. ✓
✓ The ISMS for the Consumer Access, Consumer Applications, and Business Applications segments is managed by the TechOps Information Security unit in line with the business strategy for the participating companies. Among other things, the unit is responsible for managing information security guidelines, developing security instructions, training staff, communicating with government authorities about security issues, and performing information security risk management. The Technical Security & Abuse Management department provides advice in relation to security architectures and applications, systems, and network security. This unit trains employees how to ensure secure development and operations, performs security tests, and handles any security incidents together with the departments concerned.
The Head of Information Security is also one of the Group’s telecommunications security officers under the German Telecommunications Act (Telekommunikationsgesetz – TKG) and reports regularly to the Chief Technology Officers in the relevant segments. Reporting covers the information security risk portfolio, any relevant security incidents that have occurred, the specific measures taken, the results of security audits, and key security trends. Security architects and experts from the TechOps Information Security department support the Head of Information Security in designing and implementing wide-ranging security enhancements across individual segments.
Senior management at the Business Access Segment is responsible for information security there. This responsibility is delegated to the Head of Information Security and his team, who are therefore responsible for implementing the security measures and managing the segment’s ISMS. The Information Security Guidelines are the top-level policy here.
Information security there is structured using the “three lines of defense” (TLoD) model. The Information Security Management department is an important component of this model. Among other things, it develops and resolves guidelines and work instructions that serve as the basis for security measures, requirements, and activities. These are then implemented by the staff responsible in the various departments. The Head of Information Security is also the segment’s Telecommunications Security Officer under the TKG and reports regularly to the CFO. ✓
✓ The Federal Office for Information Security describes the threat from cyberspace as “higher than ever” (1) . United Internet uses telecommunications technology and information technology to provide services as part of business processes whose availability could be endangered by threats from the internet or from internal sources. In addition to availability risk, there is a risk that hack attacks could, for example, result in customer data being read, deleted, or misused. Measured in terms of their potential impact, potential threats from the internet represent one of the largest risk groups facing United Internet. Vulnerabilities can have far-reaching consequences, both for United Internet’s reputation and for customers.
United Internet has taken the following technical and organizational security measures, among others, to contain such risks. No sanctions in the form of fines were imposed on the United Internet Group in the 2022 reporting period for security violations or other security-related incidents. ✓
See United Internet AG’s “Risk, Opportunity and Forecast Report“
(1) Source: BSI report, The State of IT Security in Germany 2022, October 25, 2022 (German only)
✓ We perform a thorough review of existing technical and organizational information security measures before entering into business combinations with other companies, and at key points in the integration process that follows. A maturity analysis based on international standards is used for this. Information Security then supplements the level of maturity established in this way by conducting a risk assessment and recommending actions. A range of integration measures are then resolved and implemented, depending on the results and our business strategy. Acquired companies are included in United Internet’s Information Security Management System (ISMS) where this is considered sensible. The goal is to establish an appropriate, Group-wide security standard. In 2022, we22 GmbH and World4You Internet Services GmbH were integrated with TechOps Information Security’s Group ISMS. Additional companies are already at an advanced stage of the merger process. ✓
Links
Downloads