Cloud-based computer technology system is a technology that makes the Internet as a central server for managing data and user applications. This technology allows users to run the program without the installation and allow users to access their data through a computer with internet access. Cloud technology offers flexibility with ease of access to data, whenever and wherever we are with a note that the user (users) connected to the Internet. Additionally, users can easily increase or decrease the data storage capacity without the need to purchase additional equipment such as hard drives.
Currently one of the SCADA applications are already using this technology to reduce costs, gain efficiencies and improve reliability. This system is still new so it is relatively safe from cyber attacks on cloud-based SCADA system, however, we must remain vigilant that the attack on the cloud-based SCADA applications can be more dangerous because all data is stored in a server that is connected globally through the Internet.
Currently one of the SCADA applications are already using this technology to reduce costs, gain efficiencies and improve reliability. This system is still new so it is relatively safe from cyber attacks on cloud-based SCADA system, however, we must remain vigilant that the attack on the cloud-based SCADA applications can be more dangerous because all data is stored in a server that is connected globally through the Internet.
Benefits and Risks of Using SCADA systems in the cloud
Although the technology is relatively new and profitable for business, you need to consider the risks of cyber attacks that may occur before switch to this system. Some of the advantages that there can be take with these systems is cost reduction and increased efficiency performance control. The drawback is the need tighter supervision which the organization must establish risk tolerance should approach zero through the internal IT infrastructure hosting.Management Security for SCADA systems in the cloud
If you have decided to migrate to SCADA systems in the cloud then you should start identification concerned with cyber attacks that systems in the cloud must be able to meet the requirements of security controls. SCADA applications in the cloud need to consider the following 9 checklist of security as below:- Data separation Ensure segregation customers’ data and applications from each other can be done well
- Infrastructure control Make sure that there is to know the number of clients should be alerted when updates to the back-end infrastructure and connections are initiated
- Encryption Consider that cloud provider should have data to encrypt at rest.
- Patching Ability to automatically patch known vulnerabilities at a rate consistent is mandatory to be done as part of organizational policy.
- Reporting Standard and ad hoc reports have to do after process done to satisfy business needs.
- Continuous monitoring Continuous monitoring capability either automated or manual should be ensured to guarantee the effectiveness of security controls.
- Situational awareness Capturing capability and analysis of real-time detection data should be done on a regular basis.
- Remediation Corrective action of all vulnerabilities identified should be joint commitment between provider and user.
- Staffing Availability of sufficiently trained, dedicated security staff routinely.
Conclusion
The most effective way to ensure your cloud-based SCADA application is safe from the threat of cyber attacks is discipline to exercise control over the check list. This system is relatively new and need careful in the running process so that your action in increased savings and efficiencies do not sacrifice security risk uncontrolled system might experience a loss in bulk at a later time.
Labels:
SCADA Articles
SCADA Articles