The main objective of information security is to protect the data being processed and hence to reduce negative impacts on the Company, its employees, and its customers. Customer trust in the information security measures taken is the bedrock for them entrusting United Internet with their business data and personal information (digital data such as photos, documents, and e-mails).
Expanding Internet Security
The personal and non-personal information requiring protection comprises not only customer data but also the United Internet Group’s employee and business data. This is partially processed within internal business processes or used to create products and services. United Internet’s goal is to protect this information against unauthorized access and misuse throughout the entire, complex product environment.
The individual segments’ security strategies aim to achieve the security goals of confidentiality, availability, and integrity throughout the Group. Security management in the segments is based on highly targeted technical and organizational measures. These are derived from the security guideline requirements, which in turn are based on the following criteria:
The measures taken to protect the product landscape against unauthorized access and misuse are constantly upgraded. United Internet’s information security management system (ISMS) is based on international standards such as ISO 27001, BSI IT-Grundschutz, and BSI C5. Building on this, as an assessment is made as to whether an appropriate, risk-based, effective approach to information security challenges exists – from security management down to implementation of the security requirements in the operating security units. In addition, planning and achieving information security objectives is a key part of implementing and maintaining the ISMS.
The ISMS for the Consumer Access, Consumer Applications , and Business Applications segments is managed by the TechOps Information Security unit in line with the individual business strategies. Among other things, the department is responsible for policy management and performs information security risk management. In addition, it develops security instructions and employee training courses, and is responsible for communication with public authorities, e.g., in the case of reportable security incidents. The Technical Security & Abuse Management department provides advice on security architectures and applications, systems, and network security. It trains employees how to ensure secure development and operations, performs security tests, and handles any security incidents together with other departments. The department also develops and operates systems that are used in abuse management processes. These processes ensure that support is provided to customers in security incidents for which they themselves are responsible, helping them to use United Internet’s products securely again.
The Head of Information Security is also one of the telecommunications security officers under the TKG for the Consumer Access, Consumer Applications, and Business Applications segments. He reports regularly to the segments’ chief technology officers. Reporting covers the information security risk portfolio, any relevant security incidents that have occurred, the specific measures taken, the results of security audits, and key security trends. Security architecture experts, among others, support the Head of Information Security in designing and implementing wide-ranging security enhancements across individual segments.
Senior management at the Business Access Segment is ultimately responsible for information security there. It commissions the Head of Information Security and his department to operate and continuously improve the ISMS. This establishes structured and focused security management. Information security in the Business Access Segment is organized using the “three lines of defense” (TLoD) model. Information Security Management represents the second line of defense under this model.
Among other things, the department develops and resolves policies and work instructions that serve as the basis for operational security measures, requirements, and activities. These are then implemented by the staff responsible in the various departments, the first line of defense. A Security Operations Center works 24 x 7 to identify, target, and remedy security attacks. The Head of Information Security is also the Business Access Segment’s Telecommunications Security Officer under the TKG and reports regularly to the Management Board.
Germany’s Federal Office for Information Security (BSI) describes the threat from cyberspace as “higher than ever” (1) . United Internet uses telecommunications technology and information technology to provide services in the context of business processes whose availability and proper functioning could be endangered by threats from the internet or from internal sources. In addition to availability risk, there is a risk that hack attacks could, for example, result in customer data being read, deleted, or misused. Potential threats from the internet represent one of the largest risk groups facing United Internet, measured in terms of their impact. Vulnerabilities could have far-reaching consequences, both for United Internet’s reputation and for employees and customers.
United Internet has taken the technical and organizational security measures described below, among others, to contain such risks. No sanctions in the form of fines were imposed on the United Internet Group in the 2023 reporting period for security violations or other security-related incidents.
See United Internet AG’s “Risk, Opportunity and Forecast Report“
Source: BSI report, The State of IT Security in Germany 2023, November 2, 2023
United Internet performs a thorough review of existing technical and organizational information security measures before entering into business combinations with other companies, and at key points in the integration process that follows. A maturity analysis based on international standards is used for this. The level of maturity established in this way is supplemented by a risk assessment complete with recommended actions. A range of integration measures are then resolved and implemented, depending on the results and the business strategy. Acquired companies are integrated with United Internet’s Information Security Management System (ISMS) where this is considered sensible. The goal is to establish an appropriate, Group-wide security standard. In 2023, home.pl and United Domains were integrated with the Group ISMS. Additional companies are already at an advanced stage of the merger process.
Links
Downloads