The online security of SCADA (Supervisory Control and Data Acquisition) networks and process management systems is critical for utility organisations to ensure that there is no disruption of service, process redirection, or manipulation of operational data that could result in serious disruption to the nation's critical infrastructure.
The U.S. Department of Energy states that "actions are required by all organisations, government or commercial, to secure their SCADA networks as part of the effort to adequately protect the nation's critical infrastructure." In fact, online threats to SCADA systems may pose as much risk for potentially significant failure within a power generation system as a physical attack.
IBM Internet Security Systems is prepared to help.
As one of the world leaders in products and services that protect online assets, ISS has demonstrated continued success helping utility organisations achieve security best practices to protect their process management systems.
The ISS approach to security best practices
In order to streamline security and help achieve security best practices for SCADA systems, ISS has developed a five-step process covering the complete security management lifecycle, including phases for Assessment, Design, Deployment, Management and Education (ADDME). The ADDME process identifies and analyses gaps in the current security state compared to requirements for security best practices. It then designs and implements solutions to close those gaps and ensure ongoing conformity.
Learn more about ADDME.