Cybersecurity Series: Joint Use Infrastructure Best Practices (Part 5/5)
With numerous cybersecurity threats discussed in the four previous posts, it is no wonder some leaders in the joint use space are questioning centralized, online systems.
Keeping up with evolving cyber threats is a struggle, but it is possible to improve operations and data management, while also maintaining strong cybersecurity programs. This post will review cybersecurity best practices within the joint use community.
Best Practices for Securing Joint Use Data
1. Maintaining Advanced Protections
At the application level, all joint use systems (whether internal or provided by a third-party) should offer advanced protections against various attacks including:
- SQL-injection attacks
- Attacks that compromise passwords, security tokens, and session keys
- XSS attacks
- Worms, Trojans, software vulnerabilities and other intrusions
- Cross-site request forgery
- Zero-day attacks
- Sensitive data exposure
- Data leakage between parties
- Blended threats that originate from multiple sources, operate at multiple layers and use multiple protocols
Security tools are required for to enforce advanced protections of any online system, such as:
- Standard authentication and authorization protocol
- Data validation, encoding, and escaping
- In-transit encryption
- Password protection and lockout capabilities
- Anti-virus and anti-spyware protection
- GeoIP filtering
- Network-based anti-malware
- Role-based access controls
The suggestions in #1 and #2 may seem like a bit of tall order. Our idea is to use a platform (that includes all joint use process capabilities) that already has these standards in place.
Not merely a database, a platform consolidates joint use asset data, yet allows users to take action within the platform to store necessary data, and create communication with other joint use partners. The platform allows users to store and act on:
- Permitting Applications (for multiple types of attachments)
- Joint Use Contracts
- Inspection Updates & Results
- Invoices & Billing (for entire billing cycles)
- Field visits
- Make Ready Work
- Violations in the Field
- Pole Transfers (from start to finish)
- Pole Loading (from start to finish)
- Any activities that occur within the joint use community
Platform technology provides a unified view of field assets, delivers the right data to each user in the context of his or her job, and can securely share specific, user-defined data with attachers, third-party contractors, and other key stakeholders. It keeps confidential data secure while streamlining necessary communications and coordination.
An asset management platform replaces multiple systems that may be insecure. The more systems in use, the greater the threat (especially when multiple systems are interconnected for daily operations). The more we can replace paper or email communications, which can be easily overlooked or overwhelming, platforms should be able to interface with other critical business applications such as GIS, work management systems (WMS), accounting, and tax systems. Joint use owners, attachers/renters, and other players can securely store and manage comprehensive joint use asset data.
Best Practices for Keeping a Platform Safe
- Platforms should be hosted in high-security datacenters. Physical access should only be granted through multi-factor authentications, which may include biometrics. Multiple ISP’s in a high-security data center should ensure servers always stay connected.
- Platforms must be protected by ICSA-certified gateway antivirus and anti-spyware. Network-based anti-malware with a cloud database of millions of malware signatures have deep security protection against advanced modern threats. Protection against worms, Trojans, software vulnerabilities, and other intrusions should always be enforced by scanning network traffic for malicious patterns.
- Platforms should have extra protection layers, like Capture Advanced Threat Protection to aid against unknown threats, such as zero-day attacks and ransomware.
- End-to-End encryption is important for any platform or software, and should use a 256bit cipher
- Up-to-date security certificates for SSL data transmission should be required, as this is vital to keeping data secure
In response to the constantly changing landscape of cyber threats, it is also critical to maintain continuous reviews of new attack measures, employ daily code reviews, and perform regular penetration testing. When any technology contains data that is tied into a utility’s enterprise systems, there is concern for security, and there is potential for cyber hackers to gain access. Security best practices should be applied to all layers in a technology stack.
Secure Data During the Rise of the IoT
The rapid growth of the Internet of Things means business and consumers are benefiting from greater efficiency, improved productivity, and access to data previously held in silos. The number of devices, technologies, and systems that connect to each other, the Internet, and the grid is increasing exponentially. Yet, as the IoT grows so does the number of threats. Comprehensive, advanced security measures must be in place for any data-sharing system.
Power, telecommunications, CATV, and broadband companies must work together to ensure the highest levels of security are in place. Technology that enables secure communication among joint use partners will help advance this goal. We work better when we work together.
To read the previous articles in this series, click the title below:
- Cybersecurity Series: Managing Risks in Critical Infrastructure
- Cybersecurity Series: What are Electric Power Companies Facing?
- Cybersecurity Series: What are Communications Companies Facing?
- Cybersecurity Series: What’s Happening in the CATV and Broadband Industries?
Share your thoughts about cybersecurity, or ask us questions, in the comment section below
Learn more about one joint use platform that ensures data security and streamlines joint use asset management.