1. Executive Summary
Simpliscada™ is a cloud-native, defense-in-depth SCADA platform designed for critical infrastructure environments including water/wastewater, energy, utilities, and municipal systems. The platform was architected from the ground up with security, resilience, and least-privilege access as core principles.
Simpliscada leverages:
- Mutual authentication and device-level identity
- End-to-end encryption
- Network segmentation and zero-trust principles
- Multi-region redundancy and immutable backups
- Strict separation between data ingestion, control, and user access
The architecture aligns with best practices from NIST, CISA, and ISA/IEC-62443 guidance for industrial control systems.
2. Architectural Security Model (High-Level)
Simpliscada uses a four-tier security boundary:
- Field / Edge Layer (OT)
- Cloud Control Plane (VPC-isolated)
- Distributed event driven micro-services
- User Access Layer (IT / Application)
Each tier is isolated, authenticated independently, and communicates only through controlled, encrypted interfaces.
3. Field & Edge Security (OT Layer)
3.1 Physical & Network Connectivity
Simpliscada supports secure connectivity over:
- Cellular (private APN)
- Satellite
- Ethernet
- Optional site-to-site VPN
No inbound ports are required on customer networks. All connections are outbound-initiated, eliminating common attack vectors.
3.2 Device Identity & Authentication
Each Simpliscada edge device (SimpliLink or equivalent gateway) uses:
- Unique X.509 certificates per device
- Certificates are revocable, rotatable, and non-shared
- Device identity is validated before any data or control exchange
This prevents:
- Device impersonation
- Unauthorized cloning
- Lateral movement between devices
3.3 Secure Transport
All device communication uses:
- WSS (WebSocket Secure)
- TLS-encrypted channels
- Mutual authentication (device ↔ cloud)
Data is encrypted in transit at all times, including telemetry, alarms, and control acknowledgements.
3.4 Data & Control Separation
Simpliscada enforces strict topic-level authorization:
- Devices can only publish or subscribe to their own permissioned MQTT topics
- Control messages are explicitly authorized and logged
- No broadcast or shared command channels
This ensures a compromised device cannot affect other sites or assets.
4. Cloud Infrastructure Security (Control Plane)
4.1 Isolated Virtual Private Cloud (VPC)
All Simpliscada core services run inside a private, segmented VPC:
- No direct public access to databases or internal services
- Distributed micro services limit
- Ingress limited to hardened gateways
- East-west traffic restricted by service-level IAM policies
4.2 Message Queuing & Processing
Incoming data flows through:
- Secure message queues
- Stateless processing workers
- Event-driven services
This architecture:
- Prevents direct device-to-database access
- Limits blast radius of any single component
- Enables controlled scaling without exposure
4.3 Data Storage & Integrity
- Multi-regional databases (est. Q2-2026)
- Automated daily snapshots
- Backups are immutable and stored separately from live systems
This provides:
- High availability
- Disaster recovery readiness
- Protection against ransomware and data corruption
5. User Access & Application Security (IT Layer)
5.1 Authentication & Authorization
All user access requires:
- HTTPS encrypted sessions
- Username/password authentication
- Multi-Factor Authentication (MFA)
Role-based access control (RBAC) ensures users can only:
- View authorized systems
- Execute permitted actions
- Access approved data sets
5.2 Application Security
The Simpliscada web and mobile applications provide:
- Live HMI and trending
- Reporting and analytics
- Control actions (when permitted)
All actions are:
- Authenticated
- Authorized
- Logged for audit purposes
5.3 Mobile & Biometric Controls
After initial MFA authentication, optional device-level protections include:
- Biometric authentication (fingerprint / facial recognition)
- PIN-based access controls
- OS-level secure enclaves (where supported)
6. Network Segmentation & Zero-Trust Design
Simpliscada follows zero-trust principles:
- No implicit trust between layers
- Every request is authenticated
- Every action is authorized
- No shared credentials
- No flat networks
Compromise of any single component does not grant access to others.
7. Monitoring, Auditing & Incident Response
- Continuous monitoring of device connections
- Centralized logging of authentication, data flow, and control actions
- Certificate revocation can immediately disable a device
- Rapid isolation of affected assets without platform downtime
8. Compliance & Best-Practice Alignment
Simpliscada’s security architecture aligns with:
- NIST SP 800-53 / 800-82
- CISA Cross-Sector Cybersecurity Performance Goals
- ISA/IEC-62443 defense-in-depth guidance Cloud shared-responsibility security models
9. Security by Design Philosophy
Simpliscada was built with the assumption that:
- Networks will be hostile
- Credentials may be exposed
- Devices may be physically accessible
- Users may make mistakes
Security controls are layered so that failure of one control does not result in system compromise.
10. Reliability, Redundancy & Operational Resilience
10.1 Design Objective
Simpliscada is engineered to support continuous operation of critical infrastructure systems. The platform is designed so that the failure of individual components, services, or infrastructure elements does not result in loss of visibility, control capability, or data integrity.
Reliability and availability are treated as core system requirements, not optional features.
10.2 Distributed, Cloud-Native Architecture
Simpliscada uses a distributed, cloud-native architecture rather than relying on a single server or centralized control node.
Key characteristics include:
- No single point of failure
- Independent scaling of services
- Fault isolation between components
If one service instance fails, others continue operating without user intervention.
10.3 Multi-Region Deployment (est. Q2-2026)
Simpliscada operates across multiple geographic regions:
- Data is replicated across regions
- Services can operate independently in different regions
- Regional failures do not result in platform-wide outages
This design protects against:
- Data center outages
- Regional network disruptions
- Natural disasters affecting a single location
10.4 Redundant Data Ingestion & Processing
Field data ingestion is designed for resilience:
- Devices maintain persistent outbound connections
- Message queues buffer incoming data
- Processing workers can restart or scale without data loss
Temporary interruptions in processing do not result in lost telemetry or alarms.
10.5 High Availability of User Access
User-facing services (web and mobile applications) are deployed redundantly:
- Load-balanced application services
- Automatic failover between service instances
- No reliance on a single application server
10.6 Maintenance Without Downtime
Simpliscada supports:
- Rolling updates
- Service-level restarts
- Infrastructure maintenance without customer downtime
This allows security patches and platform updates to be applied without disrupting operations.
10.7 Operational Resilience Summary
Simpliscada’s reliability strategy ensures that:
- No single failure disables the platform
- Regional outages are isolated
- Maintenance activities do not disrupt service
- Data remains recoverable under adverse conditions
11. Scalability & Growth Readiness
11.1 Design Objective
Simpliscada is designed to scale seamlessly from small, single-site deployments to large,
multi-region, multi-tenant critical infrastructure systems without requiring architectural changes or system redesign.
Scalability is built into the platform so that growth in:
- Number of sites
- Number of devices
- Number of Tags (data points)
- Volume of data
- Number of users
Does not degrade performance, reliability, or security.
11.2 Cloud-Native, Elastic Architecture
Simpliscada uses a cloud-native, elastic architecture that dynamically scales based on demand. Key characteristics include:
- Automatic scaling of services
- Independent scaling of ingestion, processing, storage, and user access layers
- No fixed server limits or static capacity constraints
This allows the platform to grow in real time as operational needs increase.
11.3 Horizontal Scaling Model
Rather than relying on vertical scaling (larger servers), Simpliscada scales horizontally:
- Additional service instances are added as load increases
- No single service becomes a bottleneck
- Scaling events do not interrupt operations
This model supports predictable performance under increasing load.
11.4 Scalable Device & Site Expansion
Adding new assets does not require reconfiguration of existing systems:
- New devices are onboarded independently
- Certificates and permissions are assigned per device
- No impact to existing sites during expansion
- Cloning and Templates make is easy to grow and scale
Organizations can add:
- New remote sites
- Additional PLCs and RTUs
- Add Tags
- Temporary or seasonal assets
Without downtime or re-architecture or the need for complex engineering
11.5 High-Volume Data Handling
Simpliscada is designed to handle:
- High-frequency telemetry
- Burst alarm traffic
- Large historical datasets
- Large quantities of assets and tags
- Long-term trending and analytics
Message queues and event-driven processing prevent spikes in data volume from overwhelming the system.
11.6 Scalable User Access
User access scales independently of device load:
- Additional users do not impact device communication
- Role-based permissions maintain security at scale
- Web and mobile access are load-balanced automatically
This supports growth in operational, engineering, management, and external stakeholder access.
11.7 Multi-Tenant & Organizational Scaling
Simpliscada supports:
- Multiple departments
- Multiple agencies
- Regional or statewide deployments
- Logical separation between organizational units
Each organization’s data, permissions, and access controls remain isolated while operating on the same platform.
11.8 Performance Consistency at Scale
The platform is designed so that:
- Performance remains consistent as systems grow
- No manual tuning is required for normal growth
- Scaling does not introduce security shortcuts
Growth does not require tradeoffs between usability and protection.
11.9 Scalability Without Complexity
Unlike traditional SCADA systems, scaling Simpliscada does not require:
- Adding on-prem servers
- Rebuilding network architectures
- Increasing operational IT overhead
This reduces long-term cost and administrative burden while supporting future growth.
11.10 Scalability Summary
Simpliscada’s scalability ensures that:
- Small deployments can grow without rework
- Large deployments remain manageable
- Performance remains predictable
- Security and reliability controls remain intact
- The platform is future-ready
12. Summary
Simpliscada provides a modern, cloud-native SCADA platform with security controls that meet or exceed the expectations of government, municipal, and critical infrastructure operators.
Key strengths include:
- Device-level identity and authentication
- End-to-end encryption
- Strict segmentation between OT, IT, and cloud services
- Multi-region resilience and immutable backups
- Zero-trust, least-privilege design
Simpliscada™ Security FAQ
For Government, Municipal, and Critical Infrastructure Customers
What is Simpliscada?
Simpliscada is a secure, cloud-based SCADA platform designed for critical infrastructure such as water, wastewater, energy, and municipal systems. It allows organizations to safely monitor and control remote assets while meeting modern cybersecurity expectations.
Is Simpliscada secure enough for government and critical infrastructure?
Yes. Simpliscada was designed specifically for security-sensitive environments. The platform uses multiple layers of protection so that even if one layer were compromised, others remain in place to prevent system-wide impact.
This approach is commonly referred to as defense-in-depth.
Does Simpliscada require opening firewall ports or inbound connections?
No.
Simpliscada does not require inbound firewall ports at customer facilities.
All field devices initiate outbound, encrypted connections to the Simpliscada cloud. This significantly reduces exposure to external attacks.
How does Simpliscada prevent unauthorized devices from connecting?
Each Simpliscada device has:
- Its own unique digital certificate
- A verified device identity
- The ability to be instantly revoked if compromised or decommissioned
Only approved devices can connect. Devices cannot impersonate each other.
Is data encrypted?
Yes. Data is encrypted:
- In transit (while moving between devices and the cloud)
- At rest (while stored in databases and backups)
Encryption is always enabled and cannot be turned off.
Can one compromised device affect other systems?
No. Devices are strictly isolated from each other. Each device is only allowed to send and receive data for its own authorized assets.
A problem with one site cannot spread to other sites or customers.
Who can access our system data?
Only authorized users with approved credentials can access data. Access is controlled using:
- User accounts
- Role-based permissions
- Multi-factor authentication (MFA)
Users can only see and do what they are explicitly allowed to do.
Does Simpliscada support multi-factor authentication?
Yes. All user access supports multi-factor authentication, such as:
This greatly reduces the risk of account compromise.
Is mobile access secure?
Yes. Mobile access uses the same security controls as desktop access and can include:
- Encrypted connections
- Biometric authentication (fingerprint or facial recognition)
- Device-level protections provided by the operating system
Where is our data stored?
Data is stored in secure, multi-regional cloud environments designed for high availability and resilience.
- Data is replicated across regions
- Daily backups are automatically created
- Backups are protected from tampering or deletion
What happens if a server or data center fails?
Simpliscada is designed to continue operating even if individual components fail.
- Redundant systems are used
- Data is replicated across regions
- No single server failure results in data loss
Can Simpliscada be used with private cellular or VPN networks?
Yes. Simpliscada supports:
- VPN connectivity (optional)
- Satellite and wired networks
Organizations can choose the connectivity model that meets their security policies.
Are control actions protected?
Yes. Control commands are:
- Encrypted
- Authenticated
- Permission-restricted
- Logged for auditing
Only authorized users and systems can issue control actions.
Is activity logged and auditable?
Yes. Simpliscada logs:
- User logins
- Device connections
- Data activity
- Control actions
These logs support auditing, troubleshooting, and incident response.
What standards does Simpliscada align with?
Simpliscada follows best practices aligned with:
- NIST cybersecurity guidance
- CISA recommendations for critical infrastructure
- ISA/IEC-62443 defense-in-depth principles
While Simpliscada is not a compliance “checkbox product,” it is designed to support regulated environments.
What happens if a device is lost or stolen?
The device can be:
- Immediately disabled
- Its certificate revoked
- Prevented from reconnecting
No other devices or systems are affected.
Can Simpliscada be isolated from other customers?
Yes. Customer data is logically isolated. One customer cannot see or access another customer’s systems or data.
Who is responsible for security?
Security is a shared responsibility:
- Simpliscada secures the platform, infrastructure, and communications
- Customers control user access, permissions, and field device placement
This model is consistent with modern cloud security standards.
Why is Simpliscada safer than traditional SCADA systems?
Traditional SCADA systems often:
- Require inbound firewall ports
- Use shared credentials
- Rely on flat networks
- Require VPN or other network penetration to access SCADA software remotely. Simpliscada uses a push method for access vs a pull method like most SCADA software.
Simpliscada uses:
- Zero-trust principles
- Device-level identity
- Encrypted, outbound-only communication
- Modern cloud security practices
How does Simpliscada stay operational if part of the system fails?
Simpliscada is designed so there is no single point of failure. Core services run in a distributed, redundant cloud environment. If one server, service, or data center becomes unavailable, other components automatically continue operating without user intervention.
This allows the system to remain available even during infrastructure failures or maintenance events.
What happens if network connectivity is temporarily lost at a site?
Simpliscada field devices reconnect securely automatically. If connectivity is interrupted, our edge device automatically connects once the connection is restored.
This prevents data loss and ensures historical records remain complete.
How is our data protected from loss or corruption?
Data is protected through multiple layers:
- Redundant, multi-region storage
- Automated daily backups
Backups are designed to be immutable, protecting against accidental deletion, corruption, or ransomware-related events.
Can Simpliscada be maintained or updated without downtime?
Yes. Simpliscada supports rolling updates and maintenance. Security patches and platform updates can be applied without taking the system offline or interrupting customer operations.
Can Simpliscada scale from a small system to a large deployment?
Yes. Simpliscada is designed to scale from a single site to hundreds or thousands of sites without architectural changes. Growth does not require replacing hardware, rebuilding networks, or migrating platforms.
What happens to performance as more devices or users are added?
Performance remains consistent as the system grows. Simpliscada uses an elastic, cloud-native architecture that automatically scales resources based on demand, preventing slowdowns as devices, data volume, or users increase.
Can multiple departments or agencies use the same platform securely?
Yes. Simpliscada supports multi-tenant and multi-organization deployments. Each organization’s data and access permissions are logically isolated while operating on the same platform, supporting regional, statewide, or multi-agency use cases.
Does scaling introduce additional security risk?
No. Scalability is built into the platform without weakening security controls. Device authentication, encryption, access controls, and isolation remain enforced regardless of system size.
Bottom Line
Simpliscada was built for organizations that cannot afford security shortcuts. Its layered security design, strong authentication, and modern cloud architecture make it well-suited for government, municipal, and critical infrastructure deployments.