cyber security, water data

How to keep your water data secure in a cloud-first world

How to keep your water data secure in a cloud-first world

When deploying advanced systems such as the virtual operator, with its increasing importance for our primary processes, we need to consider security from the beginning – the Security by Design approach.

International standards, like IEC 62443 & ISO 27001, and best practices, like OWASP, can be very helpful in securing the systems within the plant. However, security awareness – with everyone involved in the operation – and Security by Design, in all asset management processes, are crucial to
embed security into the architecture, code, processes and people.

The 7 aspects of cyber security
The 7 aspects of cyber security

This whitepaper aims to:

• Define the virtual operator as an ANSI/ISA 95 Layer III application and Gartner Systems of Differentiation (SOD) and emphasise the importance of security for such systems.

• Outline typical vulnerabilities of virtual operators on-premises and in the Cloud

• Explain different approaches to deal with these vulnerabilities

• Provide a checklist with points of attention when deploying such systems

13 - 01 - 2021 Author: maha
SHARE: