×

Governance

Driving sustained excellence and long-term value

At Adani Energy Solutions, our governance framework is designed to uphold the highest standards of corporate responsibility and operational excellence. Rooted in our corporate governance tenets – Courage, Trust and Commitment, we ensure transparency and integrity towards our stakeholders.

Information Security Management System

Our systems are certified for ISO 27001:2022 (Information Security Management Systems) and ISO 22301:2019 (Business Continuity Management (BCM)). Our cybersecurity programme aligns with NIST Cyber Security Framework (NIST-CSF) and ISO 27001:2022 standards. We have implemented a systematic ‘Three Lines of Defence Model’ to manage our cybersecurity risks, with clear roles and responsibilities at each level, led by the Chief Information Security Officer (CISO).

Three Lines of Defence Model for Cyber Risk Management
First
Line of Defence
  • Cyber defence through SCADA (Supervisory Control and Data Acquisition) operations & Information Technology
  • Line managers identify potential cyber risks within their projects and operations
Second
Line of Defence
  • Cybersecurity function establishes policies, processes and controls for risk management at functional level
  • Responsible for updating the senior management about ongoing initiatives and progress
Third
Line of Defence
  • Involves assurance of risk management processes and policy compliance through internal audits, reviews from senior management and independent assurance providers

Cybersecurity Governance

  • Serves as a foundation to maintain integrity and confidentiality of information assets
Board-led Information Technology and Data Security Committee
  • Conducts half-yearly reviews on cybersecurity risk management and performance of cybersecurity programme
  • Evaluates emerging cyber trends and incidents across sectoral & non-sectoral players
Chief Information Security Officer (CISO)
  • Apprises the Board committee on Adani Energy Solutions' preparedness to respond to cybersecurity threats effectively

Technical Controls for Enhanced Security

  • Inventory and control of enterprise information assets, including those in remote and cloud environments
  • Secure configuration of enterprise assets and software to avoid misconfigurations and minimise the attack surface of assets
  • Multi-level security controls for malware defence
  • Application software security through in-depth assessments of CIA (Confidentiality/Integrity/ Availability) rating for all enterprise-level applications
  • Authorised software installation on enterprise information assets
  • Continuous technical vulnerability management solutions across all enterprise assets
  • Maintaining audit logs to detect, understand, or recover from attacks
  • Lifecycle management of user access across enterprise assets
  • Data protection mechanisms including endpoint encryption, monitoring and tracking of sensitive data transfers
  • Segmentation of enterprise network to control flow of traffic, enforce security policies and isolate infected assets
  • Email and internet access protections to monitor incoming and outgoing emails for phishing and spamming attacks

Trainings and Awareness

Adani Energy Solutions provides continuous cybersecurity education for employees to effectively manage emerging threats and vulnerabilities. The training and awareness programmes include:

  • Annual mandatory Adani Cyber Security Awareness Course fore all employees, including senior management
  • Regular campaigns, webinars and workshops on emerging cybersecurity threats, best practices and Adani Energy Solutions' incident response protocols
  • Specialised cybersecurity training for employees in operations and maintenance of ICT infrastructure
  • Access to online cybersecurity courses and certifications
  • Phishing exercises, drills and simulations to enhance employee readiness
  • Encouraging participation in cybersecurity communities and forums to stay updated
Cyber Hygiene Best Practices
  • Creating strong, unique passwords and update them regularly
  • Multifactor authentication (MFA) for an added layer of security
  • Keep software and systems updated with the latest security patches
  • Regularly backing up important data to secure locations
  • Recognising and reporting suspicious emails and links
Measuring Training Effectiveness
  • Regular assessments and quizzes to measure employees understanding
  • Tracking and analysing security breaches caused by human error
  • Gathering employee feedback on the training materials and sessions
  • Monitoring compliance with cybersecurity policies and procedures
Complaints related to Breach of Customer Data Privacy and Customer Data Loss
Indicators Number of Complaints
in FY 2024-25
Number of complaints received from the outside parties and substantiated by Adani Energy Solutions Zero
Number of complaints received from the regulatory bodies Zero
Total number of identified leaks, thefts, or losses of customer data Zero