
Cybersecurity for Cold Chain Facilities
How to Add Energy Intelligence Without Opening Attack Surfaces
Connecting your facility systems to an energy platform raises legitimate security questions.
- Your operations team wants the energy visibility.
- Your sustainability lead wants the reporting.
- Your CFO wants the demand charge savings.
But your IT security team wants to know exactly what you're plugging into your OT network before any of that happens.
They're right to ask. Industrial facilities run complex, interdependent systems (refrigeration, SCADA, building controls, metering infrastructure) and the consequences of a compromised OT environment aren't abstract. They're production downtime, food safety failures, and equipment damage. The question isn't whether to take security seriously. It's how to evaluate whether a given platform handles it correctly.
Why OT/IT Security Concerns About Energy Platforms Are Legitimate
The growth of industrial IoT has created a real attack surface problem. Every new connection into an OT environment is a potential entry point. Legacy SCADA systems and PLCs were designed for reliability and uptime, not for internet-connected architectures, and many were deployed before modern cybersecurity frameworks existed.
Energy management platforms sit at the intersection of IT and OT: they need operational data from facility systems to do their job, and that data access has to be structured carefully. A platform that establishes bidirectional connections with production equipment (the ability to both read data and send commands) carries fundamentally different risk than one that only receives data.
This distinction matters especially in regulated environments. FDA-regulated cold chain facilities, facilities with air-gapped OT networks, and sites under strict IT/OT segmentation policies face compliance requirements that many IoT platforms simply cannot accommodate. When evaluating any energy management vendor, the first question shouldn't be "what's your encryption standard?" It should be "what does the connection actually look like, and what can it do?"
Read-Only vs. Read-Write Connections: What the Difference Means for Risk
The most important architectural question in industrial IoT cybersecurity is directionality: can the platform send commands back to your equipment, or does data flow only one way?
Ndustrial collects data through passive, read-only connections. The platform receives sensor data, meter readings, and equipment telemetry, but has no pathway to send commands back to production systems, refrigeration equipment, or building controls.
This isn't a configuration setting or a software permission that can be changed. It is an architectural constraint, not a software toggle. There is no administrative override that allows the platform to issue control commands to customer equipment.
For facilities with existing metering or SCADA infrastructure, Ndustrial integrates via read-only data feeds or API connections. In all cases, data flows one direction: from your systems to ours.
For sensor-equipped deployments, the architecture goes further. LoRaWAN sensors transmit over dedicated sub-GHz radio frequencies that are independent of the facility's Wi-Fi and wired networks. This means Ndustrial sensor deployments do not require firewall exceptions or IT network access.
The risk profile of a read-only connection is categorically different from a read-write one. A compromised read-only platform can expose operational data. A compromised read-write platform can issue commands to equipment. That's a different category of risk entirely, and one that read-only architecture eliminates by design.
What SOC2 Certification Covers
SOC2 has become a common vendor credential, and it's worth understanding what it actually verifies.
SOC2 Type 1 certifies that security controls are designed correctly at a point in time. SOC2 Type 2 goes further: it verifies that those controls were operating effectively over an extended audit period. The difference matters. A Type 2 audit isn't a snapshot. It's evidence of sustained operational security practice.
Ndustrial has completed a SOC2 Type 2 audit conducted by Prescient Assurance, an independent AICPA-accredited CPA firm specializing in information security audits. The audit verified logical access controls, multi-factor authentication enforcement, change management processes, risk assessment procedures, incident response capabilities, and system availability commitments.
What SOC2 doesn't cover is everything. Certification confirms that described controls work as designed — it doesn't guarantee zero vulnerabilities or zero risk. No honest vendor will tell you their platform is impenetrable. What SOC2 Type 2 does provide is independent third-party verification that security is not self-reported. Controls are monitored and tested throughout the year, and the audit cycle is managed to ensure there is no gap in coverage between periods.
When evaluating a vendor's security posture, ask for the audit summary, not just the certification badge. The report will tell you which trust service criteria were in scope, what the audit period covered, and whether any exceptions were noted.
Edge Computing: How Local Data Processing Limits Cloud Exposure
One underappreciated element of a secure energy platform architecture is where data processing happens. Transmitting raw operational data, like full sensor resolution from every asset in your facility, to the cloud continuously creates both a larger attack surface and a larger data exposure if something goes wrong.
Ndustrial deploys edge computing hardware that processes and filters data locally before transmission. Raw operational data at full sensor resolution can remain on-premises, with only processed metrics and alerts transmitted to the Nsight platform. This limits the volume of sensitive operational data in transit and reduces cloud exposure.
Local processing also means resilience against connectivity interruptions. If cloud connectivity is temporarily interrupted, edge devices continue collecting and buffering data locally. When connectivity is restored, buffered data is transmitted automatically. No data is lost during network interruptions.
For security-conscious IT teams, edge computing architecture addresses a common concern: the idea that connecting to an energy platform means streaming sensitive operational data off-site in real time. With edge processing, the facility retains granular operational data on-premises. What leaves the building is processed output (energy intensity metrics, power quality indicators, demand signals) not raw equipment telemetry.
Deployment in Regulated Environments
Regulated facilities, particularly those operating under FDA food safety requirements, face security constraints that many IoT platforms can't accommodate. OT networks in these environments are often air-gapped or strictly segmented from IT networks by design, and any platform requiring bidirectional connectivity or firewall exceptions may simply be off the table.
For facilities operating under FDA food safety requirements, air-gapped OT networks, or strict IT/OT segmentation policies, Ndustrial's read-only design eliminates a category of risk that bidirectional platforms cannot.
The LoRaWAN sensor architecture is specifically relevant here. Because sensors transmit over sub-GHz radio frequencies independent of the facility's existing networks, deployment doesn't require touching the OT network or creating firewall exceptions. It's an additive layer, not an integration into existing network infrastructure.
On the cloud side, Nsight runs on AWS within a Virtual Private Cloud (VPC), with network segmentation isolating production systems from development and staging environments. Customer data is stored and processed in AWS us-west-2 (Oregon). Customers with specific data residency requirements should verify this region against their applicable compliance obligations.
For data ownership, the position is contractual: customer data belongs to the customer. Ndustrial acts on customer instructions and within the scope of the service agreement, and does not analyze, share, or monetize customer data for any purpose outside of delivering the contracted service.
Questions to Ask Any Energy Management Vendor Before Connecting Systems
Use this list before any vendor conversation or security review:
On architecture and data flow
- Is the connection read-only or read-write? What prevents command issuance to facility equipment — configuration or architecture?
- Does deployment require firewall exceptions or IT network access?
- Where is data processed: at the edge, in transit, or only in the cloud?
On access controls
- Who at the vendor organization can access our data, and under what conditions?
- Is multi-factor authentication required for privileged infrastructure access, or optional?
- How are access rights provisioned and revoked: by the customer, or by the vendor?
On certification and audit
- Is the vendor SOC2 Type 1 or Type 2 certified? What was the audit period?
- Which trust service criteria were in scope?
- Is an independent audit summary available?
On incident response
- What is the vendor's defined process for notifying customers in the event of a security incident?
- What are the defined recovery time and recovery point objectives?
On data ownership and retention
- Who owns the operational data collected from your facility?
- How long is data retained after contract termination, and how is deletion confirmed?
These questions won't guarantee a perfect vendor evaluation, but they'll quickly separate vendors who have thought carefully about industrial cybersecurity from those who are treating it as a compliance checkbox.
The Right Frame for This Decision
Adding energy intelligence to your facility operations should not mean accepting new security risk. Better visibility into energy performance and a defensible OT security posture are actually compatible objectives. The architecture just has to be designed to support both.
No platform eliminates risk entirely. What you're evaluating is how risk is managed: through architectural constraints, not just policies; through independent verification, not just claims; and through access controls that your team administers, not the vendor's.
When those conditions are in place, the security conversation with IT becomes straightforward.







