How to keep your water data secure in a cloud-first world
When deploying advanced systems such as the virtual operator, with its increasing importance for our primary processes, we need to consider security from the beginning – the Security by Design approach.
International standards, like IEC 62443 & ISO 27001, and best practices, like OWASP, can be very helpful in securing the systems within the plant. However, security awareness – with everyone involved in the operation – and Security by Design, in all asset management processes, are crucial to
embed security into the architecture, code, processes and people.
This whitepaper aims to:
• Define the virtual operator as an ANSI/ISA 95 Layer III application and Gartner Systems of Differentiation (SOD) and emphasise the importance of security for such systems.
• Outline typical vulnerabilities of virtual operators on-premises and in the Cloud
• Explain different approaches to deal with these vulnerabilities
• Provide a checklist with points of attention when deploying such systems