{"id":3360,"date":"2022-04-14T13:41:57","date_gmt":"2022-04-14T13:41:57","guid":{"rendered":"https:\/\/itegriti.com\/kw022024\/?p=3360"},"modified":"2022-09-12T12:30:52","modified_gmt":"2022-09-12T12:30:52","slug":"essential-frameworks-for-the-water-industry-awwa-guidance","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/essential-frameworks-for-the-water-industry-awwa-guidance\/","title":{"rendered":"Essential Frameworks for the Water Industry: AWWA Guidance"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\" style=\"--awb-text-transform:none;\"><p><a href=\"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/essential-frameworks-for-the-water-industry-water-isac\/\" target=\"_blank\" rel=\"noopener\">Water<\/a> powers energy. Energy powers water. Cybersecurity protects the energy powered by water \u2013 but not very well. Paper beats rock.<\/p>\n<p>It may seem complicated, but water is part and parcel of the energy industry \u2013 specifically the renewable energy industry. <a href=\"https:\/\/www.bbc.co.uk\/bitesize\/guides\/znn9q6f\/revision\/2\" target=\"_blank\" rel=\"noopener\">Renewable energy<\/a> is power generated from water, wind, solar and geothermal energy, and until 2019, hydropower was the <a href=\"https:\/\/www.eia.gov\/energyexplained\/hydropower\/\" target=\"_blank\" rel=\"noopener\">largest source of renewable energy<\/a> in the US. This is all great, except for the fact that the renewable energy sector is falling short in cyber awareness. &#8220;Cybersecurity poses a serious challenge for renewables operators,\u201d reads one <a href=\"https:\/\/www.accenture.com\/_acnmedia\/PDF-125\/Accenture-Cybersecurity-Renewables-Services.pdf\" target=\"_blank\" rel=\"noopener\">industry report<\/a>, and when water and renewable energy are so interconnectedly entwined, that poses a risk for both industries. We\u2019ll dig into the cybersecurity problems facing renewable energy, how water and energy are connected, and how cybersecurity guidelines from the <a href=\"https:\/\/www.awwa.org\/Resources-Tools\/Resource-Topics\/Risk-Resilience\/Cybersecurity-Guidance\" target=\"_blank\" rel=\"noopener\">American Water Works Association (AWWA)<\/a> can protect the entire chain.<\/p>\n<h2><strong>Cybersecurity challenges for renewable energy<\/strong><\/h2>\n<p>\u201cIn 2019, the renewable energy sector recorded its largest ever increase in installed capacity, with more than 200 GW added, outpacing net installations in fossil fuels and nuclear power combined,\u201d the <a href=\"https:\/\/www.accenture.com\/_acnmedia\/PDF-125\/Accenture-Cybersecurity-Renewables-Services.pdf\" target=\"_blank\" rel=\"noopener\">Accenture report<\/a> states. That\u2019s great for business \u2013 bad for cybersecurity. Renewable energy systems were born before the days of good cybersecurity; according to the report, \u201cmany of the systems currently in use were built prioritizing efficiency over security.\u201d<\/p>\n<p>This is like the early days of DevOps when hot apps were being delivered fast, but not safe. In came SecOps. In addition to lacking the natural security controls now built into the architecture, there\u2019s also the problem of too many hands in the pie. Accenture states, \u201crisk factors include the ecosystem of original equipment manufacturers and third-party operations and maintenance providers with access to their assets and networks.\u201d In other words, a lot of the manufacturing and ops guys that did work for these renewable energy plants still have access to their networks. Oops. And if that didn\u2019t double risk enough, the plants themselves used manual processes to onboard and permit these guys in the first place, so tracking them down will be \u2013 manual.<\/p>\n<p>These archaic measures create obvious technical gaps, which in turn leave the system more cyber-vulnerable. Some security factors to consider are:<\/p>\n<ul>\n<li>Within these systems, you\u2019ll be facing a <strong>lack of visibility <\/strong>into what devices and applications are on the network<\/li>\n<li>Legacy technologies are commonly used (most without security-by-design), so safeguards like <strong>network segmentation<\/strong> are key to preventing pivoting and lateral attacks<\/li>\n<li>Many renewables plants have <strong>limited to no monitoring capabilities<\/strong>, so you don\u2019t know who is accessing which device. This network blindness leaves you open to obvious threats.<\/li>\n<li>Basic security functions are<strong> not automated. <\/strong>If you\u2019re left to pull utilization reports by hand, can you imagine what you\u2019d do for threat monitoring?<\/li>\n<li>Security <strong>governance may not be well established<\/strong>, especially regarding IAM and patch management, and renewables plants may simply lack the resources needed to put better security controls in place.<\/li>\n<\/ul>\n<p>In addition to the problems inherited by legacy systems and processes, renewables face other threats from the outside. These threats are made even more dangerous by the fact that the sector is so ill-equipped to meet them. These threats include:<\/p>\n<ul>\n<li><strong>The growing Industrial Internet of Things (IIoT) <\/strong>increases the number of connected devices (and therefore exposed endpoints) within renewable energy facilities \u2013 and up the supply chain, to water. Now, there are two sectors (and their connected devices) to deal with, growing the attack surface while making cyber visibility more complex.<\/li>\n<li><strong>Geographically dispersed resources<\/strong> among the renewables industry, with many contributors working remotely or as distanced third parties. This leads to difficulties in alignment, communication, and speed of response.<\/li>\n<li><strong>Non-agile security tools <\/strong>are also a part of the problem and lead to lengthy, expensive installation processes, extensive training, and ultimately difficulty integrating with other tools that become necessary in a quickly evolving cyber climate. SaaS tools can help.<\/li>\n<li><strong>The IT\/OT mix <\/strong>is sifting out those who are prepared, and those who aren\u2019t. Industries with legacy OT (much like local utilities) bring the most insecure operational technology, making those vulnerabilities doubly dangerous as they all now connect to IT architecture.<\/li>\n<li><strong>A<\/strong> <strong>global cyber worker shortage <\/strong>is hitting the industry hard, and municipal agencies are struggling to keep up. \u201cThink of the criticality of what your local government does: water purification, waste treatment&#8230;public safety,\u201d <a href=\"https:\/\/www.cnn.com\/2021\/05\/28\/tech\/cybersecurity-labor-shortage\/index.html\" target=\"_blank\" rel=\"noopener\">said Mike Hamilton<\/a>, the chief information security officer at Critical Insight. \u201cBut Amazon is out there waving around bags of cash to protect their retail operation.\u201d Means: critical national infrastructure (CNI) agencies need cyber talent the most but can afford it the least.<\/li>\n<\/ul>\n<p>The renewable energy industry differs from typical utilities in cybersecurity, as they combine industries to get the job done, whereas typical sectors are siloed: water, coal, gas. Renewable energy sources combine water and electricity, wind and electricity, solar rays and electricity \u2013 and double their liabilities in the process. There are twice as many upstream attacks, supply-chain encounters, and potential threats lurking when you combine two systems as opposed to one. It\u2019s kind of like IT\/OT &#8211; if one isn\u2019t properly cybersecure, it\u2019s twice as much trouble for both. Which brings us to our next point.<\/p>\n<p><strong>Water, renewable energy, and cybersecurity<\/strong><br \/>\nSince water is a key part of the renewable energy industry, it\u2019s important to secure our \u201cliquid assets\u201d so no cyber liabilities travel upstream. The good news: \u201ccybersecurity is now a mission-critical function for water utilities,\u201d <a href=\"https:\/\/www.awwa.org\/Resources-Tools\/Resource-Topics\/Risk-Resilience\/Cybersecurity-Guidance\" target=\"_blank\" rel=\"noopener\">according to the AWWA<\/a>, and to prove it, they released a set of <a href=\"https:\/\/waterfm.com\/awwa-updates-cybersecurity-guidance-and-tools\/\" target=\"_blank\" rel=\"noopener\">cybersecurity guidelines and tools<\/a> centered largely around the electronic and automated systems within their water sector, and their security and network monitoring.<\/p>\n<p>The American Water Works Association has approximately 51,000 members and is the largest \u201cnonprofit, scientific and educational association dedicated to managing and treating water\u201d (or, as they aptly put it, \u201cthe world\u2019s most important resource\u201d). In line with this vision, their <a href=\"https:\/\/www.awwa.org\/Portals\/0\/AWWA\/ETS\/Resources\/AWWACybersecurityGuidance2019.pdf?ver=2019-09-09-111949-960\" target=\"_blank\" rel=\"noopener\">recommended cybersecurity guidelines for water<\/a> cover:<\/p>\n<ul>\n<li>Governance and Risk Management<\/li>\n<li>Business Continuity and Disaster Recovery<\/li>\n<li>Server and Workstation Hardening<\/li>\n<li>Access Control<\/li>\n<li>Application Security<\/li>\n<li>Encryption<\/li>\n<li>Data Security<\/li>\n<li>Telecommunications, Network Security, and Architecture<\/li>\n<li>Physical security of PCS equipment<\/li>\n<li>Service Level Agreements (SLA)<\/li>\n<li>Operations Security (OPSEC)<\/li>\n<li>Education<\/li>\n<li>Personnel Security<\/li>\n<li>Cyber-Informed Engineering<\/li>\n<\/ul>\n<p>Along with the above, the AWWA provides an <a href=\"https:\/\/www.waterisac.org\/portal\/awwa-updates-cybersecurity-guide-and-assessment-tool\" target=\"_blank\" rel=\"noopener\">assessment tool<\/a> to see if you are using the most effective security controls for your technology stack, and <a href=\"https:\/\/www.awwa.org\/Portals\/0\/AWWA\/ETS\/Resources\/Technical%20Reports\/WaterSectorCybersecurityRiskMgmt.pdf?ver=2022-03-17-102456-127\" target=\"_blank\" rel=\"noopener\">small systems guidance<\/a> to help rural communities improve their cybersecurity posture. And, these industry protections stretch far beyond making the water sector safe for renewables: maintaining a bullet-proof cyber status will enable water to be usable for industries such as manufacturing, agriculture, and <a href=\"https:\/\/www.getchemready.com\/water-facts\/the-facts-on-the-new-2022-water-treatment-standard-for-healthcare-facilities\/\" target=\"_blank\" rel=\"noopener\">healthcare<\/a>.<\/p>\n<p>Similar in intent to the guidelines released by WaterISAC, the AWWA framework seeks to provide the knowledge, guidance, and expertise needed to shore up water sector defenses to be at a safe operational standard \u2013 and give these pillars of <a href=\"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/working-with-cni-requires-your-employees-to-be-on-top-of-security\/\" target=\"_blank\" rel=\"noopener\">critical national infrastructure<\/a> the cybersecurity needed to fend off today\u2019s threats and support their energy partners in the renewables sector upstream.<\/p>\n<p>Essential water industry frameworks such as AWWA and ISAC provide crucial guidance for creating a solid security posture. ITEGRITI has the right people to get you up to par in the industry &#8211; and beyond &#8211; <a href=\"https:\/\/itegriti.com\/kw022024\/compliance\/\">if you are looking for support<\/a>.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Water powers energy. Energy powers water. Cybersecurity protects the energy powered by water \u2013 but not very well. Paper beats rock.<\/p>\n","protected":false},"author":53,"featured_media":3363,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2179],"tags":[2188,2195],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Essential Frameworks for the Water Industry: AWWA Guidance<\/title>\n<meta name=\"description\" content=\"Cybersecurity protects the energy powered by water \u2013 but not very well. Paper beats rock. Find out more in this piece:\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/essential-frameworks-for-the-water-industry-awwa-guidance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Essential Frameworks for the Water Industry: AWWA Guidance\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity protects the energy powered by water \u2013 but not very well. Paper beats rock. Find out more in this piece:\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/essential-frameworks-for-the-water-industry-awwa-guidance\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-14T13:41:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-12T12:30:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/04\/itegriti_89a_AWWA_water_industryjpg.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Katrina Thompson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@itegriti\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Katrina Thompson\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/essential-frameworks-for-the-water-industry-awwa-guidance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/essential-frameworks-for-the-water-industry-awwa-guidance\/\"},\"author\":{\"name\":\"Katrina Thompson\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/ff092b5c137e1b22bbdf945e338cb136\"},\"headline\":\"Essential Frameworks for the Water Industry: AWWA Guidance\",\"datePublished\":\"2022-04-14T13:41:57+00:00\",\"dateModified\":\"2022-09-12T12:30:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/essential-frameworks-for-the-water-industry-awwa-guidance\/\"},\"wordCount\":1474,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/essential-frameworks-for-the-water-industry-awwa-guidance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/04\/itegriti_89a_AWWA_water_industryjpg.jpg\",\"keywords\":[\"Cybersecurity\",\"Water Sector\"],\"articleSection\":[\"Compliance\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/essential-frameworks-for-the-water-industry-awwa-guidance\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/essential-frameworks-for-the-water-industry-awwa-guidance\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/essential-frameworks-for-the-water-industry-awwa-guidance\/\",\"name\":\"Essential Frameworks for the Water Industry: AWWA Guidance\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/essential-frameworks-for-the-water-industry-awwa-guidance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/essential-frameworks-for-the-water-industry-awwa-guidance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/04\/itegriti_89a_AWWA_water_industryjpg.jpg\",\"datePublished\":\"2022-04-14T13:41:57+00:00\",\"dateModified\":\"2022-09-12T12:30:52+00:00\",\"description\":\"Cybersecurity protects the energy powered by water \u2013 but not very well. Paper beats rock. Find out more in this piece:\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/essential-frameworks-for-the-water-industry-awwa-guidance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/essential-frameworks-for-the-water-industry-awwa-guidance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/essential-frameworks-for-the-water-industry-awwa-guidance\/#primaryimage\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/04\/itegriti_89a_AWWA_water_industryjpg.jpg\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/04\/itegriti_89a_AWWA_water_industryjpg.jpg\",\"width\":800,\"height\":450,\"caption\":\"water\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/essential-frameworks-for-the-water-industry-awwa-guidance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Essential Frameworks for the Water Industry: AWWA Guidance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/ff092b5c137e1b22bbdf945e338cb136\",\"name\":\"Katrina Thompson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/eb6922488ad3d43afcad125286ad0f16?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/eb6922488ad3d43afcad125286ad0f16?s=96&d=mm&r=g\",\"caption\":\"Katrina Thompson\"},\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/kthompson\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Essential Frameworks for the Water Industry: AWWA Guidance","description":"Cybersecurity protects the energy powered by water \u2013 but not very well. Paper beats rock. Find out more in this piece:","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/essential-frameworks-for-the-water-industry-awwa-guidance\/","og_locale":"en_US","og_type":"article","og_title":"Essential Frameworks for the Water Industry: AWWA Guidance","og_description":"Cybersecurity protects the energy powered by water \u2013 but not very well. Paper beats rock. Find out more in this piece:","og_url":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/essential-frameworks-for-the-water-industry-awwa-guidance\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_published_time":"2022-04-14T13:41:57+00:00","article_modified_time":"2022-09-12T12:30:52+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/04\/itegriti_89a_AWWA_water_industryjpg.jpg","type":"image\/jpeg"}],"author":"Katrina Thompson","twitter_card":"summary_large_image","twitter_creator":"@itegriti","twitter_site":"@itegriti","twitter_misc":{"Written by":"Katrina Thompson"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/essential-frameworks-for-the-water-industry-awwa-guidance\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/essential-frameworks-for-the-water-industry-awwa-guidance\/"},"author":{"name":"Katrina Thompson","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/ff092b5c137e1b22bbdf945e338cb136"},"headline":"Essential Frameworks for the Water Industry: AWWA Guidance","datePublished":"2022-04-14T13:41:57+00:00","dateModified":"2022-09-12T12:30:52+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/essential-frameworks-for-the-water-industry-awwa-guidance\/"},"wordCount":1474,"commentCount":0,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/essential-frameworks-for-the-water-industry-awwa-guidance\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/04\/itegriti_89a_AWWA_water_industryjpg.jpg","keywords":["Cybersecurity","Water Sector"],"articleSection":["Compliance"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/itegriti.com\/kw022024\/2022\/compliance\/essential-frameworks-for-the-water-industry-awwa-guidance\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/essential-frameworks-for-the-water-industry-awwa-guidance\/","url":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/essential-frameworks-for-the-water-industry-awwa-guidance\/","name":"Essential Frameworks for the Water Industry: AWWA Guidance","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/essential-frameworks-for-the-water-industry-awwa-guidance\/#primaryimage"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/essential-frameworks-for-the-water-industry-awwa-guidance\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/04\/itegriti_89a_AWWA_water_industryjpg.jpg","datePublished":"2022-04-14T13:41:57+00:00","dateModified":"2022-09-12T12:30:52+00:00","description":"Cybersecurity protects the energy powered by water \u2013 but not very well. Paper beats rock. Find out more in this piece:","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/essential-frameworks-for-the-water-industry-awwa-guidance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2022\/compliance\/essential-frameworks-for-the-water-industry-awwa-guidance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/essential-frameworks-for-the-water-industry-awwa-guidance\/#primaryimage","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/04\/itegriti_89a_AWWA_water_industryjpg.jpg","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/04\/itegriti_89a_AWWA_water_industryjpg.jpg","width":800,"height":450,"caption":"water"},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/essential-frameworks-for-the-water-industry-awwa-guidance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"Essential Frameworks for the Water Industry: AWWA Guidance"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/ff092b5c137e1b22bbdf945e338cb136","name":"Katrina Thompson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/eb6922488ad3d43afcad125286ad0f16?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/eb6922488ad3d43afcad125286ad0f16?s=96&d=mm&r=g","caption":"Katrina Thompson"},"url":"https:\/\/itegriti.com\/kw022024\/author\/kthompson\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3360"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/53"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=3360"}],"version-history":[{"count":3,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3360\/revisions"}],"predecessor-version":[{"id":3567,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3360\/revisions\/3567"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media\/3363"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=3360"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=3360"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=3360"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}