Access cloud-based solutions
- Last UpdatedFeb 18, 2025
- 1 minute read
Many AVEVA applications are now being made available through the Cloud, as both hosted and hybrid solutions. One of the main risks associated with accessing cloud-based applications is unauthorized access. Connecting ICS software to Cloud solutions must be done in a secure manner and needs to use secure protocols such as Transport Layer Security (TLS).
Always maintain data integrity.
-
By definition, data integrity is the assurance that your enterprise's data is accurate, complete and consistent at any point in its lifecycle.
-
Maintain data integrity by safeguarding your data against loss, leaks and corrupting influences.
-
Use data classification to identify data that is sensitive and data that can be made public.
-
Secure computers, storage, and networking to secure the data that is stored and transmitted.
-
Work with your Cloud Service Provider (CSP) to configure users, assign access levels and monitor and control access.