Simpliscada™ Security Architecture & Controls

Simpliscada™ Security Architecture & Controls


Simpliscada™ Security Architecture & Controls

Revised 02/09/2026


Simpliscada™ Security Architecture & Controls

Technical Security Overview for Government & Critical Infrastructure Customers 




1. Executive Summary 

Simpliscada™ is a cloud-native, defense-in-depth SCADA platform designed for critical infrastructure environments including water/wastewater, energy, utilities, and municipal systems. The platform was architected from the ground up with security, resilience, and least-privilege access as core principles.

Simpliscada leverages:

  1. Mutual authentication and device-level identity
  2. End-to-end encryption
  3. Network segmentation and zero-trust principles
  4. Multi-region redundancy and immutable backups
  5. Strict separation between data ingestion, control, and user access

The architecture aligns with best practices from NIST, CISA, and ISA/IEC-62443 guidance for industrial control systems.

2. Architectural Security Model (High-Level)

Simpliscada uses a four-tier security boundary:

  1. Field / Edge Layer (OT)
  2. Cloud Control Plane (VPC-isolated)
  3. Distributed event driven micro-services
  4. User Access Layer (IT / Application)


Each tier is isolated, authenticated independently, and communicates only through controlled, encrypted interfaces.


    3. Field & Edge Security (OT Layer)

3.1 Physical & Network Connectivity

Simpliscada supports secure connectivity over:
    • Cellular (private APN)
    • Satellite
    • Ethernet
    • Optional site-to-site VPN


 No inbound ports are required on customer networks. All connections are outbound-initiated, eliminating common attack vectors.

    3.2 Device Identity & Authentication

    Each Simpliscada edge device (SimpliLink or equivalent gateway) uses:
      •    Unique X.509 certificates per device
      • Certificates are revocable, rotatable, and non-shared
      •    Device identity is validated before any data or control exchange

 

This prevents:
    • Device impersonation
    • Unauthorized cloning
    • Lateral movement between devices



3.3 Secure Transport

 All device communication uses:

    • WSS (WebSocket Secure)
    • TLS-encrypted channels
    • Mutual authentication (device  cloud)


Data is encrypted in transit at all times, including telemetry, alarms, and control acknowledgements.


3.4 Data & Control Separation

 Simpliscada enforces strict topic-level authorization:

    • Devices can only publish or subscribe to their own permissioned MQTT topics
    • Control messages are explicitly authorized and logged
    • No broadcast or shared command channels


This ensures a compromised device cannot affect other sites or assets.


4. Cloud Infrastructure Security (Control Plane)

4.1 Isolated Virtual Private Cloud (VPC)

 All Simpliscada core services run inside a private, segmented VPC:

    • No direct public access to databases or internal services
    • Distributed micro services limit
    • Ingress limited to hardened gateways
    • East-west traffic restricted by service-level IAM policies


4.2 Message Queuing & Processing

 Incoming data flows through:

    • Secure message queues
    • Stateless processing workers
    • Event-driven services


 This architecture:
    • Prevents direct device-to-database access
    • Limits blast radius of any single component
    • Enables controlled scaling without exposure


4.3 Data Storage & Integrity
  1.    Multi-regional databases (est. Q2-2026)
  2.    Automated daily snapshots
  3.    Backups are immutable and stored separately from live systems

 This provides:

    • High availability
    • Disaster recovery readiness
    • Protection against ransomware and data corruption


5. User Access & Application Security (IT Layer)

5.1 Authentication & Authorization

 All user access requires:

    • HTTPS encrypted sessions
    • Username/password authentication
    • Multi-Factor Authentication (MFA)


 Role-based access control (RBAC) ensures users can only:

    • View authorized systems
    • Execute permitted actions
    • Access approved data sets


5.2 Application Security

 The Simpliscada web and mobile applications provide:

    • Live HMI and trending
    • Reporting and analytics
    • Control actions (when permitted)


  All actions are:

    • Authenticated
    • Authorized
    • Logged for audit purposes


5.3 Mobile & Biometric Controls

 After initial MFA authentication, optional device-level protections include:

    • Biometric authentication (fingerprint / facial recognition)
    • PIN-based access controls
    • OS-level secure enclaves (where supported)


6. Network Segmentation & Zero-Trust Design

Simpliscada follows zero-trust principles:
    • No implicit trust between layers
    • Every request is authenticated
    • Every action is authorized
    • No shared credentials
    • No flat networks


Compromise of any single component does not grant access to others.


7. Monitoring, Auditing & Incident Response

    • Continuous monitoring of device connections
    • Centralized logging of authentication, data flow, and control actions
    • Certificate revocation can immediately disable a device
    • Rapid isolation of affected assets without platform downtime


8. Compliance & Best-Practice Alignment

Simpliscada’s security architecture aligns with:

    • NIST SP 800-53 / 800-82
    • CISA Cross-Sector Cybersecurity Performance Goals
    • ISA/IEC-62443 defense-in-depth guidance Cloud shared-responsibility security models


9. Security by Design Philosophy

    Simpliscada was built with the assumption that:
    • Networks will be hostile
    • Credentials may be exposed
    • Devices may be physically accessible
    • Users may make mistakes


Security controls are layered so that failure of one control does not result in system compromise.



10. Reliability, Redundancy & Operational Resilience

10.1 Design Objective

Simpliscada is engineered to support continuous operation of critical infrastructure systems. The platform is designed so that the failure of individual components, services, or infrastructure elements does not result in loss of visibility, control capability, or data integrity.

Reliability and availability are treated as core system requirements, not optional features.


10.2 Distributed, Cloud-Native Architecture

Simpliscada uses a distributed, cloud-native architecture rather than relying on a single server or centralized control node.

Key characteristics include:

    • No single point of failure
    • Independent scaling of services
    • Fault isolation between components


If one service instance fails, others continue operating without user intervention.


10.3 Multi-Region Deployment (est. Q2-2026)

Simpliscada operates across multiple geographic regions:

    • Data is replicated across regions
    • Services can operate independently in different regions
    • Regional failures do not result in platform-wide outages


This design protects against:

    • Data center outages
    • Regional network disruptions
    • Natural disasters affecting a single location


10.4 Redundant Data Ingestion & Processing

Field data ingestion is designed for resilience:

    • Devices maintain persistent outbound connections
    • Message queues buffer incoming data
    • Processing workers can restart or scale without data loss

Temporary interruptions in processing do not result in lost telemetry or alarms.


10.5 High Availability of User Access

User-facing services (web and mobile applications) are deployed redundantly:

    • Load-balanced application services
    • Automatic failover between service instances
    • No reliance on a single application server


10.6 Maintenance Without Downtime

Simpliscada supports:

    • Rolling updates
    • Service-level restarts
    • Infrastructure maintenance without customer downtime

This allows security patches and platform updates to be applied without disrupting operations.


10.7 Operational Resilience Summary

Simpliscada’s reliability strategy ensures that:

    • No single failure disables the platform
    • Regional outages are isolated
    • Maintenance activities do not disrupt service
    • Data remains recoverable under adverse conditions

11. Scalability & Growth Readiness

11.1 Design Objective

Simpliscada is designed to scale seamlessly from small, single-site deployments to large,

multi-region, multi-tenant critical infrastructure systems without requiring architectural changes or system redesign.

Scalability is built into the platform so that growth in:

    • Number of sites
    • Number of devices
    • Number of Tags (data points)
    • Volume of data
    • Number of users


Does not degrade performance, reliability, or security.


11.2 Cloud-Native, Elastic Architecture

Simpliscada uses a cloud-native, elastic architecture that dynamically scales based on demand. Key characteristics include:

    • Automatic scaling of services
    • Independent scaling of ingestion, processing, storage, and user access layers
    • No fixed server limits or static capacity constraints

This allows the platform to grow in real time as operational needs increase.


11.3 Horizontal Scaling Model

Rather than relying on vertical scaling (larger servers), Simpliscada scales horizontally:

    • Additional service instances are added as load increases
    • No single service becomes a bottleneck
    • Scaling events do not interrupt operations

This model supports predictable performance under increasing load.


11.4 Scalable Device & Site Expansion

Adding new assets does not require reconfiguration of existing systems:

    • New devices are onboarded independently
    • Certificates and permissions are assigned per device
    • No impact to existing sites during expansion
    • Cloning and Templates make is easy to grow and scale

Organizations can add:

    • New remote sites
    • Additional PLCs and RTUs
    • Add Tags
    • Temporary or seasonal assets

Without downtime or re-architecture or the need for complex engineering


11.5 High-Volume Data Handling

Simpliscada is designed to handle:

    • High-frequency telemetry
    • Burst alarm traffic
    • Large historical datasets
    • Large quantities of assets and tags
    • Long-term trending and analytics


Message queues and event-driven processing prevent spikes in data volume from overwhelming the system.


11.6 Scalable User Access

User access scales independently of device load:

    • Additional users do not impact device communication
    • Role-based permissions maintain security at scale
    • Web and mobile access are load-balanced automatically


This supports growth in operational, engineering, management, and external stakeholder access.


11.7 Multi-Tenant & Organizational Scaling

Simpliscada supports:

    • Multiple departments
    • Multiple agencies
    • Regional or statewide deployments
    • Logical separation between organizational units

Each organization’s data, permissions, and access controls remain isolated while operating on the same platform.


11.8 Performance Consistency at Scale

The platform is designed so that:

    • Performance remains consistent as systems grow
    • No manual tuning is required for normal growth
    • Scaling does not introduce security shortcuts


Growth does not require tradeoffs between usability and protection.


11.9 Scalability Without Complexity

Unlike traditional SCADA systems, scaling Simpliscada does not require:

    • Adding on-prem servers
    • Rebuilding network architectures
    • Increasing operational IT overhead


This reduces long-term cost and administrative burden while supporting future growth.


11.10 Scalability Summary

Simpliscada’s scalability ensures that:

    • Small deployments can grow without rework
    • Large deployments remain manageable
    • Performance remains predictable
    • Security and reliability controls remain intact
    • The platform is future-ready




12. Summary

Simpliscada provides a modern, cloud-native SCADA platform with security controls that meet or exceed the expectations of government, municipal, and critical infrastructure operators.

Key strengths include:

    • Device-level identity and authentication
    • End-to-end encryption
    • Strict segmentation between OT, IT, and cloud services
    • Multi-region resilience and immutable backups
    • Zero-trust, least-privilege design


Simpliscada™ Security FAQ

For Government, Municipal, and Critical Infrastructure Customers

What is Simpliscada?

Simpliscada is a secure, cloud-based SCADA platform designed for critical infrastructure such as water, wastewater, energy, and municipal systems. It allows organizations to safely monitor and control remote assets while meeting modern cybersecurity expectations.

Is Simpliscada secure enough for government and critical infrastructure?

Yes. Simpliscada was designed specifically for security-sensitive environments. The platform uses multiple layers of protection so that even if one layer were compromised, others remain in place to prevent system-wide impact.

This approach is commonly referred to as defense-in-depth.

Does Simpliscada require opening firewall ports or inbound connections?

No.

Simpliscada does not require inbound firewall ports at customer facilities.

All field devices initiate outbound, encrypted connections to the Simpliscada cloud. This significantly reduces exposure to external attacks.

How does Simpliscada prevent unauthorized devices from connecting?

Each Simpliscada device has:

    • Its own unique digital certificate
    • A verified device identity
    • The ability to be instantly revoked if compromised or decommissioned


Only approved devices can connect. Devices cannot impersonate each other.

Is data encrypted?

Yes. Data is encrypted:

    • In transit (while moving between devices and the cloud)
    • At rest (while stored in databases and backups)


Encryption is always enabled and cannot be turned off.

Can one compromised device affect other systems?

No. Devices are strictly isolated from each other. Each device is only allowed to send and receive data for its own authorized assets.

A problem with one site cannot spread to other sites or customers.

Who can access our system data?

Only authorized users with approved credentials can access data. Access is controlled using:

    • User accounts
    • Role-based permissions
    • Multi-factor authentication (MFA)


Users can only see and do what they are explicitly allowed to do.

Does Simpliscada support multi-factor authentication?

Yes. All user access supports multi-factor authentication, such as:

    • Password + one-time code

This greatly reduces the risk of account compromise.

Is mobile access secure?

Yes. Mobile access uses the same security controls as desktop access and can include:

    • Encrypted connections
    • Biometric authentication (fingerprint or facial recognition)
    • Device-level protections provided by the operating system

Where is our data stored?

Data is stored in secure, multi-regional cloud environments designed for high availability and resilience.

    • Data is replicated across regions
    • Daily backups are automatically created
    • Backups are protected from tampering or deletion


What happens if a server or data center fails?

Simpliscada is designed to continue operating even if individual components fail.

    • Redundant systems are used
    • Data is replicated across regions
    • No single server failure results in data loss


Can Simpliscada be used with private cellular or VPN networks?

Yes. Simpliscada supports:

    • Private cellular APNs
    • VPN connectivity (optional)
    • Satellite and wired networks


Organizations can choose the connectivity model that meets their security policies.

Are control actions protected?

Yes. Control commands are:

  1.    Encrypted
  2. Authenticated
  1. Permission-restricted
  2. Logged for auditing


Only authorized users and systems can issue control actions.

Is activity logged and auditable?

Yes. Simpliscada logs:

    • User logins
    • Device connections
    • Data activity
    • Control actions


These logs support auditing, troubleshooting, and incident response.

What standards does Simpliscada align with?

Simpliscada follows best practices aligned with:

    • NIST cybersecurity guidance
    • CISA recommendations for critical infrastructure
    • ISA/IEC-62443 defense-in-depth principles

While Simpliscada is not a compliance “checkbox product,” it is designed to support regulated environments.

What happens if a device is lost or stolen?

The device can be:

    • Immediately disabled
    • Its certificate revoked
    • Prevented from reconnecting


No other devices or systems are affected.

Can Simpliscada be isolated from other customers?

Yes. Customer data is logically isolated. One customer cannot see or access another customer’s systems or data.

Who is responsible for security?

Security is a shared responsibility:

    • Simpliscada secures the platform, infrastructure, and communications
    • Customers control user access, permissions, and field device placement


This model is consistent with modern cloud security standards.

Why is Simpliscada safer than traditional SCADA systems?

Traditional SCADA systems often:

    • Require inbound firewall ports
    • Use shared credentials
    • Rely on flat networks
    •    Require VPN or other network penetration to access SCADA software remotely. Simpliscada uses a push method for access vs a pull method like most SCADA software.

Simpliscada uses:

    • Zero-trust principles
    • Device-level identity
    • Encrypted, outbound-only communication
    • Modern cloud security practices


How does Simpliscada stay operational if part of the system fails?

Simpliscada is designed so there is no single point of failure. Core services run in a distributed, redundant cloud environment. If one server, service, or data center becomes unavailable, other components automatically continue operating without user intervention.

This allows the system to remain available even during infrastructure failures or maintenance events.

What happens if network connectivity is temporarily lost at a site?

Simpliscada field devices reconnect securely automatically. If connectivity is interrupted, our edge device automatically connects once the connection is restored.

This prevents data loss and ensures historical records remain complete.

How is our data protected from loss or corruption?

Data is protected through multiple layers:

    • Redundant, multi-region storage
    • Automated daily backups

Backups are designed to be immutable, protecting against accidental deletion, corruption, or ransomware-related events.

Can Simpliscada be maintained or updated without downtime?

Yes. Simpliscada supports rolling updates and maintenance. Security patches and platform updates can be applied without taking the system offline or interrupting customer operations.

Can Simpliscada scale from a small system to a large deployment?

Yes. Simpliscada is designed to scale from a single site to hundreds or thousands of sites without architectural changes. Growth does not require replacing hardware, rebuilding networks, or migrating platforms.

What happens to performance as more devices or users are added?

Performance remains consistent as the system grows. Simpliscada uses an elastic, cloud-native architecture that automatically scales resources based on demand, preventing slowdowns as devices, data volume, or users increase.

Can multiple departments or agencies use the same platform securely?

Yes. Simpliscada supports multi-tenant and multi-organization deployments. Each organization’s data and access permissions are logically isolated while operating on the same platform, supporting regional, statewide, or multi-agency use cases.


Does scaling introduce additional security risk?

No. Scalability is built into the platform without weakening security controls. Device authentication, encryption, access controls, and isolation remain enforced regardless of system size.


Bottom Line

Simpliscada was built for organizations that cannot afford security shortcuts. Its layered security design, strong authentication, and modern cloud architecture make it well-suited for government, municipal, and critical infrastructure deployments.


    • Related Articles

    • Getting to know your SimpliLink Hub

      About your SimpliLink Hub: - The SimpliLink Hub is an industrial-grade minicomputer designed for small/medium facilities. It can handle up to 900 PLCs and 15,000 tags. It is designed to seamlessly connect your entire operation to the SimpliScada ...
    • Getting Started - Understanding The SimpliScada HMI Design Editor

      The SimpliScada Design Studio is a fully web-based editor that requires no installation. Simply log into the web application to begin designing your HMI screens. The Design Studio editor is divided into three main areas: Main Canvas (Center): ...
    • Working with the DNP3 Protocol

      Simpliscada DNP3 standards and practices Communication setup: TCP/IP addressing: Standard ip address practices apply. Port: 20000 is the default DNP3 port. If the PLC uses the standard port, it doesn’t need to be specified when setting the address in ...
    • Alert Thresholds - Setting High (HH H) or Low (LL L) for a Sensor Tag

      What is an Alert Threshold? An Alert Threshold is a defined limit that tells the system: “If this value gets too high or too low, generate an alert.” The SimpliLink Hub continuously monitors tag values across your project (such as tank levels, ...
    • Latest Over-the-Air Firmware Changelog

      Alpha Version 2.0.72 - Offline Historian - 30 day local storage on simpliLink Hub to backlog data incase of controller down state - Will automatically restore missing data when cloud connection re-established - Local HMI additions. Sqlite/docker, ...