Skip to content

Security by Design

Learn about the security architecture built into PowerSYSTEM Center and our commitment to protecting critical infrastructure.

Our Security Framework

Defense-in-Depth Security

Every connection, user, and device is verified before accessing critical systems. We implement multi-factor authentication, session monitoring, and just-in-time access controls.

End-to-End Encryption

All data in transit and at rest is encrypted using industry-standard algorithms. We maintain secure key management and regular rotation policies.

Compliance Standards

SUBNET's security practices are guided by leading industry standards for critical infrastructure protection:

  • NERC CIP (Critical Infrastructure Protection) standards
  • IEC 62443 (Industrial Automation and Control Systems Security)
  • NIST Cybersecurity Framework
  • ISO 27001 information security management principles
  • SOC 2 security principles

Vulnerability Management

We maintain a comprehensive vulnerability management program including:

  • Regular security assessments and penetration testing
  • Automated vulnerability scanning and remediation
  • We welcome responsible security vulnerability reports
  • Security monitoring and incident response procedures

Reporting Security Issues

If you discover a security vulnerability, please report it responsibly:

Email: cybersecurity@SUBNET.com

PGP Key: Available upon request

We commit to acknowledging reports within 24 hours and providing regular updates on remediation progress.

Questions About Security?

Contact our security team for more information about our practices and compliance.

Contact Security Team