Page 200 - 1-37
P. 200

TRANSFORMING         TRANSFORMING         TRANSFORMING
         SUSTAINABILITY REPORT  FY 2023                                                                                                                                     COMMUNITIES            THE PLANET        THE WORKPLACE
















         Information Security Policies and
         Certifications
         We have established an information security               a)  Internal Vulnerability Assessment and
         policy and data governance policy, covering                   Penetrating Testing (VAPT) Program                         Business                  ISO 27001           ISO 22301          ISO 31000         ISO 27701
                                                                                                                                                            implementation
                                                                                                                                                                                                                     implementation
                                                                                                                                                                                                   implementation
                                                                                                                                                                                implementation
                                                                                                                                  Unit/Group
         aspects such as information security, risk                    undertaken by BU Information Security                                                status              status             status            status
         management, disaster recovery, business                       Function (Through Third-Party Expert
         continuity management, and data privacy.                      Agency)                                                    Cairn                            √                  √                   √                 √
         These policies form an integral component
         of Vedanta's Information Security framework,              b)  External Vulnerability Assessment and                      HZL                              √                  √                   √                 √
         showcasing the Company’s dedication to                        Penetrating Testing (VAPT) Assessment
         robust management practices. Business                         through Group Management Assurance                         VZI                              √                  √                   √                 X
         continuity/contingency plans and incident                     System (Through Third-Party Expert
         response procedures are in place that are                     Agency)                                                    BALCO                            √                  √                   √                 X
         tested bi-annually. Regular trainings for our             c)  Red Teaming Exercise as part of point # 2
         employees on cybersecurity are conducted.                                                                                JSG                              √                  √                   √                 X
                                                                   d)  Surveillance Audit under ISO 27001, ISO
                                                                       22301, ISO 31000, and ISO 27701                            LAN                              √                  √                   √                 X
                                                                       Framework Requirements (Through
         Policies defined by Vedanta are categorised under
         the following areas:                                          Surveillance Audit Partner)                                TSPL                             √                  √                   √                 X
         •  Information Security                                   e)  Assessment of IT General Controls (ITGC)                   ESL                              √                  √                   √                 X
            Management Policies                                        by Statutory Auditor under
                                                                       Sarbanes-Oxley (SOX) Compliance                            IOB                              √                  √                   √                 √
         •  Data Governance & Privacy                                  Framework (Through Statutory Auditor)

            Policies
                                                                                                                                  FACOR                            √                  √                   √                 √
         •  Risk Management Policies
                                                                   These vulnerability assessments, including
         •  Business Continuity Management                         simulated hacker attacks are carried out on                    VGCB                             √                  √                   √                 √
            Policies                                               an annual basis by globally reputed and                        Nicomet                          √                  √                   √                 X
         •  Incident Response & Emergency                          recognised third-party agencies, including a

            Preparedness Plan                                      team of certified and qualified personnel in                   Sesa Coke                        √                  √                   √                 X
                                                                   various domains of cyber security and data
                                                                   governance.                                                    Gujrat NRE                       √                  √                   √                 X

         Vulnerability Assessment
                                                                   BUs have obtained ISO certifications and are                   Desai Cement                     √                  √                   √                 X
         Vulnerability identification, monitoring and              committed to establishing, implementing,
         tracking of mitigation actions and continuous             maintaining, and continuously improving their                  Sterlite Copper                  √                  √                   √                 √
         compliance level are being done through                   Integrated Management System (IMS) in
         various assessments. Vedanta carries out                  alignment with the standards set forth by ISO                  Fujairah Gold                    √                  √                   √                 X
         and undergoes the following assessments to                27001, ISO 27701, ISO 22301, and ISO
         identify vulnerabilities, threats,                        31000.  71.43 % of our IT infrastructure is
         short-comings, and the associated                         certified as per ISO 27001
         risk/impact:






                                                                                                                                                                                                                                    101
   195   196   197   198   199   200   201   202   203   204   205