Information Security / Cybersecurity & System Availability

Management Approach


Information Security & Cybersecurity Structure Committee

CP All Plc. and its subsidiaries (“the Company”) give importance to continuous development and strengthening of businesses, with the use of information technology and and cyber security technology. It is to increase effectiveness and efficiency of products and services, including internal work system improvements from the communication infrastructure both inside and outside organization, collecting and gathering data throughout the business chain, production and transportation planning, increasing productivity in factories, quality control of the production process, increasing the quality of service before and after the sale, maintenance, etc. Employees will have their own User Account in order to access the system and services of the organization according to the rights and necessities related to the operation and to ensure the use of information technology and cyber security. The organization has issued a policy regarding Information Technology Policy as a guideline for data usage, operations, development, and maintenance of information technology systems appropriately comply with laws and relevant security requirements for both employees, partners and customers The company has been certified to various international standards such as ISO/IEC 20000 for providing quality information technology services, ISO/IEC 27001 for managing secure information technology, ISO/IEC 27701 for managing personal data, and PCI/DSS V3.1 for payment data security, etc..

The Company has set up a management structure for integration from the center and business groups, with a central unit bearing and providing support the working groups consisting of the IT Governance Committee which is responsible for establishing policies and guidelines for the use of the monitoring system for information technology and cyber investment projects in the same direction and in accordance with business strategies.

Information Technology and Cyber Risk Management

The Company has adopted the risk management principles by having the risk monitoring committee and risk management team in managing information technology and cyber risk. In addition to assessing the risks from the Company’s activities, the Company also surveyed cyber threats of other organizations, both in the same and different industries, in order to learn and assess the potential risk that may occur to the organization and can also cause damage to customers, stakeholders, and business partners.

Cyber Security Management Goals

The Company is committed to developing and implementing information technology systems that are secure, maintain confidentiality, integrity, and availability of all information, and comply with important IT legal requirements, such as the Personal Data Protection Act B.E. 2562, etc., by operating with the following management principles and practices:

Principle

Cyber Security Management Measures of CP All Business Group

The company has adopted the NIST Cybersecurity Framework as a global cybersecurity framework and conducted risk assessments to lead to preventive, detective, response, remedial, and restorative measures to ensure that data and information are secure and ready for continuous service.

Identify

  • Asset Management
  • Identify Crown Jewels
  • Cyber Risk Assessment

Protect

  • Security by Designm
  • Secured Assess
  • Cyber Defense
  • Data Security
  • Policy & Procedures
  • Standards Certifications
  • Awareness & Trining

Detect

  • Continuous Security Monitoring
  • Vulnerability Management
  • Detection Technology
  • Incident Management

Respond

  • Cyber Incident Response (IR Plan)
  • Cyber Investigations
  • Cyber Improvements
  • Business Continuity Management

Recover

  • Cyber Communication
  • Recovery Testing
  • Disaster Recovery
  • Cyber Insurance

Personnel creating an organizational culture with safe cyber hygiene

The Company places great importance on building corporate culture and cyber threat awareness, dividing the target groups into 4 groups:

Giving importance and following up from top executives

Information and cyber security training and awareness raising

Motivating with clear rewards and punishments

Measurement improves measures and promotes a consistent safety culture

  • Reporting new threats to the Executive Committee and Risk Management Committee every quarter, presenting information and knowledge about cyber threats and CP ALL’s preventive measures to provide knowledge and receive feedback on additional governance approaches that the Board may have.
  • Organized a simulation of a cyber attack for CP ALL’s senior executives to familiarize them with and create a process for responding to cyber threats.
  • Create teaching materials for the Basic Organizational Learning Program (On-Boarding Program) with topics on information and cyber security in e-Learning format. All new employees are required to learn and pass this course as a foundation for taking care of and using information safely, including being aware of cyber threats or fraud from important criminals
  • Create media and publicize through various channels to provide knowledge about cyber threats during work, in different formats and contents each month, such as campaigns on the use of secure passwords, the use and care of secure data, or scams and fraud from criminals to be careful of, etc., both in the form of Infographic media and communication via email or other channels
  • Organize seminars and online games for employees and interested people to join in fun activities and gain knowledge at the same time. Invite external experts to share current cyber threats and important case studies
  • Create Security Tips, Security Alerts and other useful information about information and cyber security in a website format called ALLSECURE Portal for employees to easily understand, access and be aware of cyber threats, including notifications via email, CPALL Connect and Call Service 1500
  • Organized a Phishing Drill test by sending fake emails to CP ALL employees to test and create awareness, as well as to practice how to deal with fake emails in real situations on a regular basis. The test results showed that employees were more aware and careful in observing Phishing Mails
  • Establish cyber hygiene practices at both the operator and administrator levels, focusing on designing, implementing, and maintaining a secure system from the start, and ensuring that operators are careful and use the system correctly, and immediately notify when any abnormalities are found
  • Review and test cyber awareness and secure data usage through the annual CG testing activity, in which 100% of employees and executives must pass the review and test, which will make everyone aware of the threats and understand the importance of secure data usage throughout the organization
  • Provide knowledge and important warnings about safe online service use and protection against cyber threats such as phishing and social media scams to customers via social media channels, etc.
  • Establish a framework for cyber risk management practices and communicate it to CP ALL service providers or business partners to emphasize that CP ALL places importance on cyber security and risk management, including providing knowledge to CP ALL service providers and business partners about good practices.

Cybersecurity Management Guidelines

The company has managed cyber security with the goals set out above. by setting important guidelines And it is carried out through both promoting personnel at all levels to have safe cyber hygiene. Evaluating and controlling important work systems to meet the specified safety standards. and operations are carried out by a team of system administrators, both preventive, surveillance, and deterrence using appropriate technology Compatible with business environments And cyber threats constantly changing

Cyber Hygiene Culture

Cyber Assurance

Cyber Operation

The above activities are carried out through the following personnel, processes and technologies:

People

  • Define the responsibility of top management of CSO (Cyber Security Officer) in managing the report directly to executive committee or CIO
  • Establish the deportment of information technology security system management and the department of cyber security operations
  • Schedule training and testing for personnel at all levels to raise awareness of cyber threats such as Phishing Simulation Test & Cyber Awareness & Cyber War Game

Process

  • Establish the information security policy of CP All Newwork
  • Establish the department of information system service providers in the CP All network to manage the service using the standardized processes and procedures that have been approved by ISO20000 and ISO27001
  • Define response plans and manage cyber security incidents (Cyber Security Incident Response Plan)

Technology

  • Install technology systems that work preventive and comply with international safety guidelines called NIST Framework
  • Data systems are installed in the designated zone and store data in a private computer center or network of the company with control and monitoring to manage the device, systems, and data access as stipulated
  • Exchange threat technology with network service providers and make a suitable adjustment for new network and threats

Policy

The Company manages cyber security under the information security policies and practice guidelines which enforce CP All Plc. and its subsidiaries including directors, executives, employees, and authorized third-party service providers to access information at each level of everyone’s confidentiality.

Process

The Company has established a unit for information and cyber security operations and management, with a Chief Security Officer and a Data Protection Officer directly responsible. Information system and information security services are certified to international standards.

As follows: ISO/IEC 20000 Information Technology Service Standard, ISO/IEC 27001 Information Security Management Standard, ISO/IEC27701 Personal Data Management Standard, and PCI/DSS V3.1 Payment Security Standard, etc.

Technology

The Company has invested in a computer center that meets international standards, including a backup computer center that is ready to work immediately and requires storing important customer data and information within the said computer center under the design of zoning and access control for authorized persons only. For managing cyber threat risks, the Company has installed appropriate technologies to prevent, detect, stop, and alert as follows: Firewall, Intrusion Prevention System, Anti-Malware, Web & Mail Security, Threats Detect & Prevention System, Active Directory, Two-Factor Authentication, Privileged Access. Management, Patch Management, Security Information and Event Management (SIEM), including the making of Vulnerability Assessment and Penetration Testing in critical systems, either before services or when significant changes occur and in annually.

Personnel

There are trainings and testing to raise awareness and beware of Cyber Attack through Cyber Security Awareness and Cyber Drill for employees and executives at all levels. The Company also attaches importance to the security operation team by supporting and promoting training, testing to pass international standards certifications such as CISSP, CISA, CDPSE, C|HE (Certified Ethical Hacker) CompTIA Security+, as well as having a group of cyber practitioners, experts for advising, and business partners from both domestic and international that are engaged in working and overseeing related technical systems.

Cybersecurity Management Performance Results for 2023

  • People
Topic Target Number of target groups Percentage
Cybersecurity Awareness Training Store Employee, Office 94,934 Persons 100%
Cybersecurity Engineer Training Security Administrator 31 Persons 100%
Cyber Drill Test Office 14,484 Persons 100%
Incident Response Plan drill Executive CMC, BIRT, CSIRT Team 100%
  • Process
Topic Industry average Score
Cybersecurity Self-Assessment By CPG 88% 89%
Cybersecurity Resilience Survey By SET 2.01 (1.0 – 5.0) 4.43
Security Rating By BitSight Service 730 (100 – 900) 800
  • Technology and improvements according to the NIST Cybersecurity Framework

The Company has conducted a cyber risk assessment based on the NIST Framework and has taken action to enhance its outstanding cyber security in 2023 as follows:

No. Process Outstanding Information Security and Cyber Security Projects in 2023
1 Identify The Company assessed its IT security system against international standards (Cybersecurity Gap Analysis) according to NIST standards in 2023. The assessment results are summarized as the following main issues:
  • Enhance the security assessment of trading partners and include providing awareness and guidelines to trading partners when they have to work or use the company’s information.
  • Assess the risks from major cyber threats, including Phishing, Ransomware, DDoS, 3rd Party Data Loss, and lead to a Cybersecurity Roadmap for appropriate actions that are consistent with business strategies
  • Follow up and develop cyber security systems, including applying modern technology to continually support new threats
2 Protect The company has improved the process of accessing important systems by introducing the technology of personal authentication (Privilege Assessment Management & 2FA) and encryption at the user level (Disk Encryption) to increase security, reduce the risk of data theft and comply with the enforcement of the Personal Data Protection Act B.E. 2562 by operating as follows:
  • Assess technology potential in access security systems for critical systems
  • Improve data confidentiality policies
  • Communicate and develop guidelines for managing corporate data and personal information
  • Install Privilege Assessment Management
  • Install 2-Factor Authentication for email systems, authentication systems, and critical corporate systems
3 Detect The company has taken steps to upgrade the Cyber Security Monitoring Center (Security Operation Center) by improving surveillance, storage, and analysis of security breach events. that works on centralized technology And there is a team to keep watch all the time
4 Respond The company is continuously preparing for unusual situations by conducting drills to simulate attacks on major IT systems, ransomware attacks, and personal data breaches, as well as testing employees on how to respond to phishing emails (Phishing Simulations Test)
5 Recover The company arranges data recovery testing for the Backup & Recovery system 2 times a year and is able to recover according to the target

Related Policy and Guideline

Information Security Policy Download

เว็บไซต์ cpall.co.th มีการเก็บคุกกี้ซึ่งเป็นการจัดการข้อมูลส่วนบุคคลและช่วยเพิ่มประสิทธิภาพการใช้งานเว็บไซต์ คุณสามารถอ่านข้อมูลเพิ่มเติมได้ที่หน้า นโยบายการใช้คุกกี้

Privacy Preferences

Allow All
Manage Consent Preferences
  • คุกกี้ที่จำเป็น
    Always Active

    ประเภทของคุกกี้มีความจำเป็นสำหรับการทำงานของเว็บไซต์ เพื่อให้คุณสามารถใช้ได้อย่างเป็นปกติ และเข้าชมเว็บไซต์ คุณไม่สามารถปิดการทำงานของคุกกี้นี้ในระบบเว็บไซต์ของเราได้

  • คุกกี้ในส่วนวิเคราะห์

    คุกกี้ประเภทนี้จะทำการเก็บข้อมูลการใช้งานเว็บไซต์ของคุณ เพื่อเป็นประโยชน์ในการวัดผล ปรับปรุง และพัฒนาประสบการณ์ที่ดีในการใช้งานเว็บไซต์ ถ้าหากท่านไม่ยินยอมให้เราใช้คุกกี้นี้ เราจะไม่สามารถวัดผล ปรับปรุงและพัฒนาเว็บไซต์ได้

Save