Regulatory authorities overseeing Critical Infrastructures and Utilities have shown a growing concern regarding Cyber Terror and Cyber Crime. As a direct result, regulations, policies and requirements (from NRC, NERC, NIST and others) are becoming stricter and more rigorous.
One area addressed by all of the various regulations and policies is connections of critical (e.g.: SCADA, DCS, Production, Industrial) networks and external (business, third party, public) networks. All of the regulations urge industrial users to keep their critical assets totally segregated from external networks in order to protect against cyber terror and cyber attacks. Users, however, need to achieve this level of segregation yet still provide staff access to industrial and operational data.