Security Best Practices for SCADA Systems Made SimpleThe online security of SCADA networks and process management systems is critical for utility organizations to ensure that there is no disruption of service, process redirection, or manipulation of operational data that could result in serious disruption to the nation's critical infrastructure.
The U.S. Department of Energy states that "actions are required by all organizations, government or commercial, to secure their SCADA networks as part of the effort to adequately protect the nation's critical infrastructure." In fact, online threats to SCADA systems may pose as much risk for potentially significant failure within a power generation system as a physical attack.
Internet Security Systems is prepared to help.
As a world leader in products and services that protect online assets, Internet Security Systems, Inc. (ISS) has demonstrated continued success helping utility organizations quickly and simply achieve security best practices to protect their process management systems.
The ISS Approach to Security Best PracticesIn order to streamline security and help achieve security best practices for SCADA systems, ISS has developed a five-step process covering the complete security management lifecycle, including phases for Assessment, Design, Deployment, Management and Education (ADDME). The ADDME process identifies and analyzes gaps in the current security state compared to requirements for security best practices. It then designs and implements solutions to close those gaps and ensure ongoing conformity.
- SCADA Protection Brochure
- SCADA Security Datasheet
- SCADA and Process Control Systems White Paper
- ISS Solutions for SCADA Protection with ISO-17799
- ISS Solutions for SCADA Protection with COSO
- ISS Solutions for SCADA Protection with NERC
- Comparison of Security Standards for Utilities
- Solution Packages for SCADA Security Compliance