Const_man.png - 1817 Bytes

Secure Interfacing of IT and Automation and Control Systems

Shield1.png - 1817 Bytes

It is essential for business reasons to connect IT and ACS networks. However, these interfaces may create vulnerabilities that threaten the security and safety of production facilities.

The following MLM discusses practical ways to make and maintain secure IT to ACS interfaces:


While the basic requirement is to make and maintain secure IT to ACS interfaces, other types of networks may be added including:


OT networks


IoT and IIoT networks (future)

  • MLM-014C: IoT and IIoT Definitions - discusses terminology and concepts for use of IoT and IIoT networks and devices to supplement or replace ACS.

  • MLM-014D: IoT and IIoT Tradeoffs - discusses use of IoT and IIoT networks and devices to supplement or replace ACS.


  • Cloud SCADA networks (future)

  • MLM-014E: Cloud SCADA network Definitions - discusses terminology and concepts for use of Cloud SCADA networks to supplement or replace ACS.

  • MLM-014F: Cloud SCADA network Tradeoffs - discusses use of IoT and IIoT networks to supplement or replace ACS.


  • by Gary Rathwell

    Back to PERA Home Page