Security by Design
Learn about the security architecture built into PowerSYSTEM Center and our commitment to protecting critical infrastructure.
Our Security Framework
Defense-in-Depth Security
Every connection, user, and device is verified before accessing critical systems. We implement multi-factor authentication, session monitoring, and just-in-time access controls.
End-to-End Encryption
All data in transit and at rest is encrypted using industry-standard algorithms. We maintain secure key management and regular rotation policies.
Compliance Standards
SUBNET's security practices are guided by leading industry standards for critical infrastructure protection:
- NERC CIP (Critical Infrastructure Protection) standards
- IEC 62443 (Industrial Automation and Control Systems Security)
- NIST Cybersecurity Framework
- ISO 27001 information security management principles
- SOC 2 security principles
Vulnerability Management
We maintain a comprehensive vulnerability management program including:
- Regular security assessments and penetration testing
- Automated vulnerability scanning and remediation
- We welcome responsible security vulnerability reports
- Security monitoring and incident response procedures
Reporting Security Issues
If you discover a security vulnerability, please report it responsibly:
Email: cybersecurity@SUBNET.com
PGP Key: Available upon request
We commit to acknowledging reports within 24 hours and providing regular updates on remediation progress.
Questions About Security?
Contact our security team for more information about our practices and compliance.
Contact Security Team