SCADA security best practices

IBM can help ensure you have no disruption of service and provide online security of your SCADA networks and process management systems.

The online security of SCADA (Supervisory Control and Data Acquisition) networks and process management systems is critical for utility organisations to ensure that there is no disruption of service, process redirection, or manipulation of operational data that could result in serious disruption to the nation's critical infrastructure.



Service detail

Service details

The U.S. Department of Energy states that "actions are required by all organisations, government or commercial, to secure their SCADA networks as part of the effort to adequately protect the nation's critical infrastructure." In fact, online threats to SCADA systems may pose as much risk for potentially significant failure within a power generation system as a physical attack.

IBM Internet Security Systems is prepared to help.

As one of the world leaders in products and services that protect online assets, ISS has demonstrated continued success helping utility organisations achieve security best practices to protect their process management systems.

The ISS approach to security best practices

In order to streamline security and help achieve security best practices for SCADA systems, ISS has developed a five-step process covering the complete security management lifecycle, including phases for Assessment, Design, Deployment, Management and Education (ADDME). The ADDME process identifies and analyses gaps in the current security state compared to requirements for security best practices. It then designs and implements solutions to close those gaps and ensure ongoing conformity.

Learn more about ADDME.

Related resources

Find studies, papers and briefs on this topic

NOTE: JavaScript is disabled in your browser. SSI information is only available when JavaScript is enabled.

Ask an IBMer

Got questions? We're here to help.