Security and Compliance

Advanced Security Protection for Connected Systems

SCADA systems are imperative in municipal and industrial markets that manage remote or unattended water and wastewater sites. However, with increased connectivity comes a greater risk to the safety and protection of these systems. It is crucial to implement strong security measures to prevent unauthorized access and protect against potential cyberattacks. The consequences of a breach could be catastrophic, causing significant financial loss, operational disruption and even physical harm.

security tips with water drop, aqavx telemetry and laptop
Security Tips for Day-to-Day Operations
remoteiq water security on technology screen background
RemoteIQ™ Water Security Overview
remoteiq security on technology screen background
RemoteIQ™ Security Overview

SCADA Solutions Security and Compliance

RemoteIQ™ applications that use MQTT protocol have these added security measures in place.

Service Organization Control 2 (SOC-2)

SOC 2, or Service Organization Control 2, is a framework to establish and ensure the security, availability, processing integrity, confidentiality, and privacy of information within a service organization. For a SCADA system to achieve SOC 2 compliance, it needs to adhere to a set of criteria known as the Trust Service Criteria.

  • TRUST SERVICE CRITERIA
  • SECURITY – The system must implement measures to protect against unauthorized access (both physical and logical) and secure data from potential breaches.
  • AVAILABILITY – The system must be available for operation and use as committed or agreed upon, ensuring that SCADA services are consistently accessible.
  • PROCESSING INTEGRITY – The system processes must be complete, valid, accurate, timely, and authorized to ensure the integrity of the data and system operations.
  • CONFIDENTIALITY – Information designated as confidential must be protected from unauthorized access and disclosure.
  • PRIVACY – The system must manage personal information in accordance with the organization’s privacy policies and comply with relevant privacy regulations.

Transport Layer Security (TLS)

Transport Layer Security (TLS) is a cryptographic protocol that ensures secure communication over a computer network, such as the Internet.

Security Socket Layer (SSL)

SSL (Secure Sockets Layer) for SCADA ensures secure communication by encrypting data exchanged between Supervisory Control and Data Acquisition devices, safeguarding sensitive information and preventing unauthorized access.

Multi-Factor Authentication (MFA)

Multi-factor authentication (MFA) is a security mechanism that requires users to provide two or more distinct forms of identification before granting access, enhancing account security by adding an extra layer beyond traditional passwords.