From: GCN
By Patrick D. Howard, (ISC)2 Government Advisory Council Executive Writers Bureau
Given the critical nature of operations that supervisory control and data acquisition (SCADA) systems manage, an article containing the words “cloud,” “SCADA” and “vulnerabilities” together should raise the hair on the necks of information security professionals.
Traditionally, SCADA applications used to control critical infrastructure have been hosted within an organization’s IT infrastructure and have relied on the protection offered inside the infrastructure perimeter. In some cases, organizations have “air gapped” their SCADA applications from the broader network and particularly from the Internet.