Sunday, September 13, 2015

The Top 9 Checklist of Security for SCADA Systems in the Cloud




Cloud-based computer technology system is a technology that makes the Internet as a central server for managing data and user applications. This technology allows users to run the program without the installation and allow users to access their data through a computer with internet access. Cloud technology offers flexibility with ease of access to data, whenever and wherever we are with a note that the user (users) connected to the Internet. Additionally, users can easily increase or decrease the data storage capacity without the need to purchase additional equipment such as hard drives.
Currently one of the SCADA applications are already using this technology to reduce costs, gain efficiencies and improve reliability. This system is still new so it is relatively safe from cyber attacks on cloud-based SCADA system, however, we must remain vigilant that the attack on the cloud-based SCADA applications can be more dangerous because all data is stored in a server that is connected globally through the Internet.

Benefits and Risks of Using SCADA systems in the cloud

Although the technology is relatively new and profitable for business, you need to consider the risks of cyber attacks that may occur before switch to this system. Some of the advantages that there can be take with these systems is cost reduction and increased efficiency performance control. The drawback is the need tighter supervision which the organization must establish risk tolerance should approach zero through the internal IT infrastructure hosting.

Checklist of Security for SCADA Systems in the Cloud

Management Security for SCADA systems in the cloud

If you have decided to migrate to SCADA systems in the cloud then you should start identification concerned with cyber attacks that systems in the cloud must be able to meet the requirements of security controls. SCADA applications in the cloud need to consider the following 9 checklist of security as below:

  1. Data separation
  2. Ensure segregation customers’ data and applications from each other can be done well

  3. Infrastructure control
  4. Make sure that there is to know the number of clients should be alerted when updates to the back-end infrastructure and connections are initiated

  5. Encryption
  6. Consider that cloud provider should have data to encrypt at rest.

  7. Patching
  8. Ability to automatically patch known vulnerabilities at a rate consistent is mandatory to be done as part of organizational policy.

  9. Reporting
  10. Standard and ad hoc reports have to do after process done to satisfy business needs.

  11. Continuous monitoring
  12. Continuous monitoring capability either automated or manual should be ensured to guarantee the effectiveness of security controls.

  13. Situational awareness
  14. Capturing capability and analysis of real-time detection data should be done on a regular basis.

  15. Remediation
  16. Corrective action of all vulnerabilities identified should be joint commitment between provider and user.

  17. Staffing
  18. Availability of sufficiently trained, dedicated security staff routinely.

Conclusion

The most effective way to ensure your cloud-based SCADA application is safe from the threat of cyber attacks is discipline to exercise control over the check list. This system is relatively new and need careful in the running process so that your action in increased savings and efficiencies do not sacrifice security risk uncontrolled system might experience a loss in bulk at a later time.


Labels:

Newer Post Older Post Home

You may also like these ebook:

Get Free PLC eBook directly sent to your email,
and email subscription to program-plc.blogspot.com




We hate SPAM. Your information is never sold or shared with anyone.

Your Email Will Be 100% Secured !