Data Security, Data Integrity & Data Availability

<< Click to Display Table of Contents >>

Navigation:  Introduction to the Rotronic Monitoring System >

Data Security, Data Integrity & Data Availability

Data security, data integrity, data availability

These three terms play a central role in monitoring systems. The RMS reassuringly scores in all these fields.

 

Data Security

Data security means the data cannot be accessed by unauthorized persons. This is achieved through encryption during data transfer and storage. The data transmitted from the logger to the RMS server is AES128 encrypted. The data transmitted from the user PC to the RMS server is HTTPS encrypted.

 

Data Security in RMS

The monitoring system provides encryption of the data during transfer. This means the data can neither be tapped or manipulated by so-called retry attacks. The security of the stored database in RMS is ensured by the IT structure. The Rotronic Cloud is protected by certified IT datacenters. If the database is located in the customer’s server center, the customer defines the security infrastructure.

 

Audit Trail

When a monitoring system is commissioned, it is calibrated and validated. In this way, the operator assures his quality department that the system works correctly. During subsequent operation, all relevant changes must be recorded in full. The audit trail guarantees recording of all changes in the system such as, for example, change in measurement probes, user activities, battery change. This in turn ensures that all events can be tracked at a later date.

 

Data Integrity

Ensuring data integrity means guaranteeing secure transmission and storage. A measured value must not change during transmission because of disruptions. Data transmission and storage must therefore be safe from manipulation. This is achieved with CRC check sums and intermediate storage during data transmission. In this way, faulty data communication is recognized and the data stored in the buffer memory are sent again until the transmission has been finished.

 

All data in RMS are sent with CRC check sums and confirmed by the recipient after receipt. Faulty data transmission is thus ruled out. Should the data not arrive with the recipient, they are stored intermediately by the logger and can then be transmitted at a later point in time when the connection has been restored.

 

Data Availability

For some manufacturers’ systems, data availability can contradict data security because secure data are difficult to access. The user must authenticate themselves and use secure connections or verified platforms. Nevertheless, the trend is clearly moving towards worldwide data accessibility allowing platform-independent viewing and evaluation.

 

Password Encryption

Passwords are stored with the MS SQL database and are encrypted using hash algorithm MACTripleDES.