Adroit Air delivers selected alarms and process data to mobile devices via the internet. This raises concerns around exposing servers and sensitive data to the internet. While the architecture was designed to minimize exposure, there are additional measures that can provide even more peace of mind.
Your firewall is the first line of defense. Since Adroit Air communicates to a known collection of endpoints it is easy enough to whitelist these destinations on your firewall Required URLs.pdf (57.8 KB). For an added layer of security, the Adroit Air datasource can be set up on a standalone SmartUI Server running in a DMZ. This SmartUI Server can access Agent Servers on your SCADA network by opening specific TCP ports on the internal firewall. The perimeter firewall still only whitelists the predefined URLS. We have also allowed use of a specified authenticated proxy for outbound communications.
While Adroit Air does store basic account information on the cloud, all SCADA data is delivered directly onto Google’s push notification fabric, destined only for app instances that have been explicitly granted access by our 2-step verification onboarding procedure.
Lastly, it is easy to manage user access to push notifications from the Air datasource configuration window. Access can be removed when a user no longer requires, or is no longer permitted to view certain data.
This can also be automated by using the domain crosscheck feature. For this feature to function correctly, all users must use their corporate domain email address when registering their Adroit Air account on the app. Then, while the domain crosschecking feature is enabled, the Adroit Air datasource will only communicate to Adroit Air users who’s email addresses are active on the domain where the Air datasource is running. In this way, if a user’s employment is terminated (and their corporate email suspended as part of an HR process) they will automatically stop receiving notifications from the Air datasource.