Security

Security of your data and operations is highest priority

Production systems

­Establish modular architecture to achieve efficiency and transparency in the separation and segmentation of systems for data collection from critical infrastructure and functionalities for business users. Control over what systems can access OT data integration zones and use data diodes if enhanced security is needed. Control business applications and users that can access sensitive OT data.

High availability

Keep uninterrupted operations of your production information delivery backbone and avoid SPOF – single point of failure – for each installed infrastructure component. Utilize modern approaches such as containerization, Kubernetes and microservice architecture to scale the performance and maintain high-availability of your software. Keep the whole installation always agnostic to underlying infrastructure and enable shifting load between cloud and on-premise installations whenever it is needed.

Safety guidelines

­HSSE, environmental impact and hazards, data security, regulations related to food & beverages sector they all require fulfillment of regulations, keeping right levels of data integrity and information safety. Configure access groups, on any levels of granularity, to any information asset related to operations like reports, machines, processes or events. Model security schemes for validations, approval chains and machine-data modifications. Track and document all the changes and be always prepared for all kinds of audits.

System security

­Setup proper design of IT infrastructure for critical infrastructure information processing. Keep the right levels of network segmentation of all the components, integrate SSO of your choice. Use modern approach to identity management (Keycloak) and unify access regardless of authentication standards. The feature may be, for example, especially useful if you want to give restricted access to your systems to third parties like suppliers or customers. Diversify privileges and roles in administration and business access to the system. Always track every action on the system.