{"id":3067,"date":"2026-02-26T22:30:29","date_gmt":"2026-02-26T22:30:29","guid":{"rendered":"https:\/\/renewasoft.com.tr\/?p=3067"},"modified":"2026-02-28T00:35:37","modified_gmt":"2026-02-28T00:35:37","slug":"software-security-in-critical-energy-facilities-secure-coding-cicd-and-supply-chain-risks","status":"publish","type":"post","link":"https:\/\/renewasoft.com.tr\/index.php\/en\/2026\/02\/26\/software-security-in-critical-energy-facilities-secure-coding-cicd-and-supply-chain-risks\/","title":{"rendered":"Software Security in Critical Energy Facilities Secure Coding, CICD and Supply Chain Risks"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text css=&#8221;&#8221;]<\/p>\n<h1>Software Security and SCADA Protection in Critical Energy Facilities<\/h1>\n<p><em>SSDLC, CI\/CD Security, Zero Trust and HYDROWISE Solution<\/em><br \/>\n<strong>Renewasoft | 2026<\/strong><\/p>\n<p><span class=\"level-badge\">Level: Advanced<\/span>\u00a0\u00a0 Audience: SCADA Engineer, HPP Operator, CTO, Infrastructure Investor<\/p>\n<h1>Introduction<\/h1>\n<p>As hydropower plants digitalize with SCADA and IIoT, automated systems optimize energy production; however, even a small security vulnerability in these systems can lead to physical damage, efficiency loss or operational disruptions. In the 2025 cyber attack on Norway&#8217;s Bremanger dam, valves were opened through the control system and excess water was released for four hours<sup>[1]<\/sup>. According to NIST, OT\/ICS environments carry high reliability, continuity and safety requirements<sup>[1]<\/sup>; therefore, layered defense and proactive security measures at both network and software layers are essential.<\/p>\n<p>This blog post covers end-to-end: SCADA\/OT architecture vulnerabilities, defense layers, software development security (SSDLC), CI\/CD pipeline security controls, supply chain attacks, risk scoring model and the solutions offered by Renewasoft&#8217;s HYDROWISE platform.<\/p>\n<p>\u25ba\u00a0<a href=\"https:\/\/renewasoft.com.tr\/index.php\/tr\/hizmetimiz\/\">https:\/\/renewasoft.com.tr\/index.php\/tr\/hizmetimiz\/<\/a><\/p>\n<h2>TL;DR &#8212; Executive Summary<\/h2>\n<div class=\"callout\">\n<ol>\n<li><strong>IT\/OT Separation:<\/strong>\u00a0HPPs prioritize real-time control and high continuity. Purdue model segmentation provides OT\/IT isolation<sup>[1]<\/sup>.<\/li>\n<li><strong>Attack Surface:<\/strong>\u00a0Legacy protocols like Modbus, DNP3, IEC-104 lack authentication or encryption. Open ports and engineering stations carry weak configuration risk<sup>[1][2]<\/sup>.<\/li>\n<li><strong>Defense Layers:<\/strong>\u00a0OT network is protected with DMZ, network segmentation, Zero Trust and deep packet inspection<sup>[1][2]<\/sup>.<\/li>\n<li><strong>SSDLC + CI\/CD:<\/strong>\u00a0Security integrated into software development; SAST, DAST, container scan, SBOM and signature verification<sup>[3][4]<\/sup>.<\/li>\n<li><strong>HYDROWISE:<\/strong>\u00a0Renewasoft&#8217;s AI-powered anomaly detection, network segmentation and secure software development principles for HPP protection<sup>[1]<\/sup>.<\/li>\n<\/ol>\n<\/div>\n<p><img decoding=\"async\" src=\"GORSEL_URL_1\" alt=\"HPP Software Security - Attack Surface, Defense Layers and SSDLC Pipeline\" \/><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3244\" src=\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-1-saldiri-savunma-ssdlc-1.png\" alt=\"\" width=\"1400\" height=\"900\" srcset=\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-1-saldiri-savunma-ssdlc-1.png 1400w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-1-saldiri-savunma-ssdlc-1-300x193.png 300w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-1-saldiri-savunma-ssdlc-1-1024x658.png 1024w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-1-saldiri-savunma-ssdlc-1-768x494.png 768w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-1-saldiri-savunma-ssdlc-1-350x225.png 350w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-1-saldiri-savunma-ssdlc-1-540x347.png 540w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-1-saldiri-savunma-ssdlc-1-778x500.png 778w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-1-saldiri-savunma-ssdlc-1-622x400.png 622w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-1-saldiri-savunma-ssdlc-1-600x386.png 600w\" sizes=\"auto, (max-width: 1400px) 100vw, 1400px\" \/><\/p>\n<p class=\"caption\" style=\"text-align: center\"><em>Infographic: HPP Software Security &#8212; Attack Surface, Defense Layers and SSDLC Pipeline [1][2][3]<\/em><\/p>\n<h1>Paradigm Shift: IT\/OT Separation Through the Purdue Model<\/h1>\n<p>The fundamental network architecture of industrial control systems is layered according to the Purdue model. In this model, levels 0-1 are physical process and PLC\/RTU layers; level 2 is the SCADA\/HMI\/DCS layer. Upper levels (3-5) include the control center and enterprise IT. This separation creates an air gap between OT\/IT, enabling effective access control<sup>[1]<\/sup>.<\/p>\n<p>However, with digitalization these layers are increasingly intertwined. Business processes have integrated with cloud, IoT and remote access. This has expanded the threat surface of OT networks. During the NotPetya attack, weak segmentation caused malware to spread to factory automation networks<sup>[5]<\/sup>. As NIST states, if ICS networks become unexpectedly accessible, control over physical processes can be rapidly lost<sup>[1]<\/sup>. Therefore, defense-in-depth strategy and Zero Trust approach are essential in HPPs.<\/p>\n<table>\n<tbody>\n<tr>\n<th>Level<\/th>\n<th>Layer<\/th>\n<th>Components<\/th>\n<th>Security Measure<\/th>\n<\/tr>\n<tr>\n<td><strong>0-1<\/strong><\/td>\n<td>Physical Process + PLC\/RTU<\/td>\n<td>Turbine, generator, sensor, PLC, RTU<\/td>\n<td>Micro-segmentation, physical access control<\/td>\n<\/tr>\n<tr>\n<td><strong>2<\/strong><\/td>\n<td>SCADA \/ HMI \/ DCS<\/td>\n<td>SCADA server, HMI terminal, historian<\/td>\n<td>DPI, ML baseline, session monitoring<\/td>\n<\/tr>\n<tr>\n<td><strong>3<\/strong><\/td>\n<td>Control Center<\/td>\n<td>Engineering workstation, patch server<\/td>\n<td>Jump server, MFA, patch management<\/td>\n<\/tr>\n<tr>\n<td><strong>3.5<\/strong><\/td>\n<td>OT DMZ<\/td>\n<td>Data diode, log broker, proxy<\/td>\n<td>Unidirectional data flow, SIEM integration<\/td>\n<\/tr>\n<tr>\n<td><strong>4-5<\/strong><\/td>\n<td>Enterprise IT \/ Cloud<\/td>\n<td>ERP, SOC\/SIEM, Hydrowise UI<\/td>\n<td>No direct OT access; through DMZ only<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p class=\"caption\">Table 1: Purdue Model Layers and Security Measures [1][2]<\/p>\n<p><img decoding=\"async\" src=\"GORSEL_URL_2\" alt=\"Purdue Model + IEC 62443 Security Zones\" \/><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3245\" src=\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-2-purdue-iec62443-1.png\" alt=\"\" width=\"1400\" height=\"900\" srcset=\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-2-purdue-iec62443-1.png 1400w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-2-purdue-iec62443-1-300x193.png 300w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-2-purdue-iec62443-1-1024x658.png 1024w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-2-purdue-iec62443-1-768x494.png 768w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-2-purdue-iec62443-1-350x225.png 350w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-2-purdue-iec62443-1-540x347.png 540w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-2-purdue-iec62443-1-778x500.png 778w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-2-purdue-iec62443-1-622x400.png 622w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-2-purdue-iec62443-1-600x386.png 600w\" sizes=\"auto, (max-width: 1400px) 100vw, 1400px\" \/><\/p>\n<p class=\"caption\" style=\"text-align: center\"><em>Infographic: Purdue Model + IEC 62443 Security Zones [1][2]<\/em><\/p>\n<h1>Attack Surface Mapping: HPP Vulnerabilities<\/h1>\n<p>OT devices and protocols in HPPs have historically been designed for functionality rather than security. As NIST emphasizes, several industrial protocols lack authentication<sup>[1]<\/sup>. Common protocols like Modbus TCP, DNP3 or IEC 60870-5-104 lack encryption, authentication or integrity controls<sup>[1]<\/sup>. These protocols can easily be manipulated by eavesdropping or replay attacks on the network.<\/p>\n<table>\n<tbody>\n<tr>\n<th>Protocol \/ Component<\/th>\n<th>Vulnerability<\/th>\n<th>Attack Vector<\/th>\n<th>Countermeasure<\/th>\n<\/tr>\n<tr>\n<td><strong>Modbus TCP (502)<\/strong><\/td>\n<td>No auth\/encryption<\/td>\n<td>Command injection, replay<\/td>\n<td>DPI + allowlist, TLS wrapper<\/td>\n<\/tr>\n<tr>\n<td><strong>DNP3 (20000)<\/strong><\/td>\n<td>Auth optional, rarely used<\/td>\n<td>Man-in-the-middle, spoof<\/td>\n<td>DNP3 Secure Auth, segmentation<\/td>\n<\/tr>\n<tr>\n<td><strong>IEC 60870-5-104<\/strong><\/td>\n<td>No encryption\/auth<\/td>\n<td>Fake commands, eavesdropping<\/td>\n<td>IEC 62351 TLS, VPN tunneling<\/td>\n<\/tr>\n<tr>\n<td><strong>HMI\/RTU (Windows)<\/strong><\/td>\n<td>Unpatched OS, default passwords<\/td>\n<td>Lateral movement, RCE<\/td>\n<td>Patch mgmt, application whitelisting<\/td>\n<\/tr>\n<tr>\n<td><strong>Engineering Workstation<\/strong><\/td>\n<td>USB, vendor SW, dual-homed<\/td>\n<td>PLC program manipulation<\/td>\n<td>PAM, jump host, USB control<\/td>\n<\/tr>\n<tr>\n<td><strong>Remote Access<\/strong><\/td>\n<td>Weak VPN, single factor<\/td>\n<td>Credential harvesting<\/td>\n<td>MFA + time-based + session recording<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p class=\"caption\">Table 2: HPP Attack Surface Map and Countermeasures [1][2]<\/p>\n<p>NIST warns: ICS components are problematic in terms of updates and patching; many devices run on legacy operating systems that are no longer supported<sup>[1]<\/sup>. Open ports, unauthorized remote access channels and untested third-party applications in the HPP network carry heavy risk<sup>[1]<\/sup>.<\/p>\n<h1>Defense Layers and Zero Trust: Never Trust, Always Verify<\/h1>\n<p>Protection in HPPs is primarily achieved through multi-layered defense. Traffic to the OT network is separated into layers and different measures are applied at each level. A DMZ is established between the control network and the corporate network to limit access. Industrial firewalls only permit required SCADA traffic. Within the internal ICS network, zone\/conduit segmentation isolates plant sections<sup>[1][2]<\/sup>.<\/p>\n<p>In the Zero Trust model, users, devices and applications are never automatically trusted; access is tested and restricted each time. For example, an engineer requesting PLC access is first subjected to identity verification (MFA). Network traffic is continuously monitored; immediate isolation occurs upon detecting abnormal activity. ISA\/IEC 62443 standards also envision this layered architecture<sup>[2]<\/sup>.<\/p>\n<table>\n<tbody>\n<tr>\n<th>Layer<\/th>\n<th>Technical Function<\/th>\n<th>HPP Implementation<\/th>\n<\/tr>\n<tr>\n<td><strong>Perimeter FW<\/strong><\/td>\n<td>deny-all \/ permit-by-exception; stateful + DPI [1]<\/td>\n<td>NGFW: Modbus FC, DNP3, OPC UA parser for command filtering<\/td>\n<\/tr>\n<tr>\n<td><strong>DMZ<\/strong><\/td>\n<td>Blocks direct access from corporate network to OT [1]<\/td>\n<td>Hydrowise OT gateway, log broker, time sync proxy<\/td>\n<\/tr>\n<tr>\n<td><strong>Jump Server<\/strong><\/td>\n<td>Routes OT access through a single controlled hop point [1]<\/td>\n<td>MFA + time-based + session recording; split tunneling disabled<\/td>\n<\/tr>\n<tr>\n<td><strong>Micro-Segmentation<\/strong><\/td>\n<td>Cell\/area-based segments; least privilege via PEP [2]<\/td>\n<td>SCADA, sensor, PLC groups as separate secure zones<\/td>\n<\/tr>\n<tr>\n<td><strong>Data Diode<\/strong><\/td>\n<td>OT\u2192DMZ unidirectional data flow; physical C2 block [1]<\/td>\n<td>All reverse flow blocked except critical telemetry<\/td>\n<\/tr>\n<tr>\n<td><strong>IDS\/IPS + SIEM<\/strong><\/td>\n<td>Traffic anomaly detection, log correlation, playbook [1]<\/td>\n<td>Deterministic baselining + ML anomaly scoring<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p class=\"caption\">Table 3: Defense Layers and HPP Implementation [1][2]<\/p>\n<h1>Secure Software Development (SSDLC) and CI\/CD Security<\/h1>\n<p>Security integrated into the software development process is critically important. The NIST SSDF guide strongly recommends static analysis and secret scanning<sup>[4]<\/sup>. IEC\/ISA 62443-4-1 defines secure product development principles for industrial products<sup>[2]<\/sup>.<\/p>\n<table>\n<tbody>\n<tr>\n<th>#<\/th>\n<th>Phase<\/th>\n<th>Security Activity<\/th>\n<th>Tools \/ Standard<\/th>\n<\/tr>\n<tr>\n<td><strong>1<\/strong><\/td>\n<td><strong>Design<\/strong><\/td>\n<td>Threat modeling, security requirements, architecture review<\/td>\n<td>STRIDE, cyber-HAZOP, IEC 62443-3-3<\/td>\n<\/tr>\n<tr>\n<td><strong>2<\/strong><\/td>\n<td><strong>Development<\/strong><\/td>\n<td>Code review, static analysis, dependency scanning, secret detection<\/td>\n<td>SAST (SonarQube, Semgrep), Snyk, GitLeaks<\/td>\n<\/tr>\n<tr>\n<td><strong>3<\/strong><\/td>\n<td><strong>Test<\/strong><\/td>\n<td>Dynamic analysis, penetration testing, fuzzing, performance test<\/td>\n<td>DAST (OWASP ZAP, Burp), fuzzer, load test<\/td>\n<\/tr>\n<tr>\n<td><strong>4<\/strong><\/td>\n<td><strong>Deployment<\/strong><\/td>\n<td>Container vulnerability scan, signature verification, SBOM generation<\/td>\n<td>Trivy, Cosign, SBOM (CycloneDX\/SPDX)<\/td>\n<\/tr>\n<tr>\n<td><strong>5<\/strong><\/td>\n<td><strong>Monitoring<\/strong><\/td>\n<td>Runtime anomaly detection, log auditing, SIEM integration<\/td>\n<td>Falco, ELK\/Splunk, Hydrowise AI<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p class=\"caption\">Table 4: SSDLC Pipeline Phases and Security Controls [2][4]<\/p>\n<p>Renewasoft applies these SSDLC measures when developing HYDROWISE: every software component is packaged in containers and passed through vulnerability scanning systems; every step in the CI\/CD pipeline goes through security controls. No unsigned software is accepted into the production line<sup>[2]<\/sup>.<\/p>\n<h2>Supply Chain Attacks and Protection<\/h2>\n<p>A supply chain attack targets third-party components or update channels rather than the software developer to infiltrate a system. In the 2020 SolarWinds incident, attackers injected malicious code into the legitimate Orion management software, gaining access to thousands of organizations using this software<sup>[5]<\/sup>. In energy infrastructure, a similar situation could occur through infiltrating the control system with a fake PLC firmware update.<\/p>\n<div class=\"callout-green\">\n<p><strong>\ud83d\udd12 Supply Chain Protection Checklist<\/strong><\/p>\n<p><strong>SBOM (Software Bill of Materials):<\/strong>\u00a0Inventory of all dependencies maintained; CycloneDX or SPDX format.<\/p>\n<p><strong>Dependency Signing:<\/strong>\u00a0Cryptographic signature of every library verified; dependency hijacking prevented.<\/p>\n<p><strong>Version Pinning:<\/strong>\u00a0Dependency versions pinned in CI\/CD; unexpected updates prevented.<\/p>\n<p><strong>Firmware Verification:<\/strong>\u00a0PLC\/RTU firmware updates done with manufacturer certificate + hash verification.<\/p>\n<p><strong>Secure Channel:<\/strong>\u00a0Updates only from encrypted, authenticated channels (TLS + mutual auth).<\/p>\n<\/div>\n<h1>Technical Risk Scoring Model<\/h1>\n<p>Risk analysis in energy facilities must be quantitative. The common model:<\/p>\n<div class=\"risk-formula\">Risk = Threat \u00d7 Vulnerability \u00d7 Impact<br \/>\nThreat = Actor capability\/intent \u00a0|\u00a0 Vulnerability = Gap severity \u00a0|\u00a0 Impact = Operational loss, hardware damage, safety breach<\/div>\n<p>Impact criteria in hydropower projects include production loss, equipment failure or environmental damage. Heluany et al. proposed a detailed risk assessment using the cyber-HAZOP method for HPPs<sup>[5]<\/sup>. Each control element is assigned a 0-100 risk score so that investment and security resources are prioritized toward highest-risk areas.<\/p>\n<table>\n<tbody>\n<tr>\n<th>Asset \/ Scenario<\/th>\n<th>Threat<\/th>\n<th>Vuln.<\/th>\n<th>Impact<\/th>\n<th>Risk Score<\/th>\n<\/tr>\n<tr>\n<td><strong>SCADA Server (unpatched)<\/strong><\/td>\n<td>0.8<\/td>\n<td>0.9<\/td>\n<td>0.9<\/td>\n<td><strong>0.648 \u2192 Critical<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>PLC (Modbus, no auth)<\/strong><\/td>\n<td>0.7<\/td>\n<td>0.8<\/td>\n<td>0.9<\/td>\n<td><strong>0.504 \u2192 High<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>Engineering WS (dual-homed)<\/strong><\/td>\n<td>0.6<\/td>\n<td>0.7<\/td>\n<td>0.8<\/td>\n<td><strong>0.336 \u2192 Medium-High<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>Hydrowise Gateway (DMZ, TLS)<\/strong><\/td>\n<td>0.5<\/td>\n<td>0.2<\/td>\n<td>0.7<\/td>\n<td><strong>0.070 \u2192 Low<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p class=\"caption\">Table 5: HPP Asset-Based Risk Scoring Example [1][5]<\/p>\n<h1>Case Study: Real Scenarios<\/h1>\n<div class=\"callout-red\">\n<p><strong>\ud83d\udca5 Evidence-Based Background<\/strong><\/p>\n<p><strong>Bowman Avenue Dam (2013, USA):<\/strong>\u00a0Iranian-origin hackers were found to have infiltrated the dam&#8217;s SCADA system. No physical damage occurred but access was confirmed<sup>[5]<\/sup>.<\/p>\n<p><strong>Bremanger\/Risevatnet Dam (2025, Norway):<\/strong>\u00a0Control system compromised through a weak password; attackers fully opened valves, increasing water discharge 497 L\/s above normal for four hours<sup>[1]<\/sup>.<\/p>\n<p><strong>NotPetya (2017):<\/strong>\u00a0Spread through supply chain; weak segmentation caused infection of factory automation networks<sup>[5]<\/sup>.<\/p>\n<p><strong>SolarWinds (2020):<\/strong>\u00a0Malicious code injected into legitimate Orion software provided access to thousands of organizations<sup>[5]<\/sup>.<\/p>\n<\/div>\n<p>A typical HPP attack scenario: The attacker gains access to the engineering workstation via phishing, captures PLC credentials and modifies flow control commands with incorrect data. Result: sudden turbine trip, energy production disruption and mechanical damage from sudden load changes. Early warning and anomaly detection systems with rapid response capability are vital.<\/p>\n<h1>Hydrowise Security Architecture: Renewasoft&#8217;s Solution<\/h1>\n<p>Renewasoft&#8217;s HYDROWISE platform is designed to address all the issues described above. With a cloud-based, scalable architecture, HYDROWISE collects all operational data including SCADA, IoT sensors and meteorological data in a centralized platform. Advanced AI algorithms run in this unified layer: production forecasts, predictive maintenance scenarios and early warnings are automatically generated<sup>[1]<\/sup>.<\/p>\n<table>\n<tbody>\n<tr>\n<th>Security Layer<\/th>\n<th>HYDROWISE Implementation<\/th>\n<th>Reference Standard<\/th>\n<\/tr>\n<tr>\n<td><strong>Network Security<\/strong><\/td>\n<td>Network segmentation, TLS encryption, DMZ positioning<\/td>\n<td>NIST SP 800-82, IEC 62443<\/td>\n<\/tr>\n<tr>\n<td><strong>Software Security<\/strong><\/td>\n<td>SSDLC, SAST\/DAST, container scan, SBOM, signature verification<\/td>\n<td>NIST SSDF, IEC 62443-4-1<\/td>\n<\/tr>\n<tr>\n<td><strong>Access Control<\/strong><\/td>\n<td>RBAC, MFA, session recording, PAM integration<\/td>\n<td>Zero Trust, IEC 62443-3-3<\/td>\n<\/tr>\n<tr>\n<td><strong>AI Anomaly Detection<\/strong><\/td>\n<td>Real-time anomaly scoring, early warning, action recommendation<\/td>\n<td>NIST SP 800-82, MITRE ICS<\/td>\n<\/tr>\n<tr>\n<td><strong>Log \/ Audit<\/strong><\/td>\n<td>All operations logged, SIEM integration, forensic support<\/td>\n<td>IEC 62443, SOC 2<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p class=\"caption\">Table 6: HYDROWISE Security Layers and Reference Standards [1][2][4]<\/p>\n<div class=\"callout\">\n<p><strong>\ud83d\udd0d Hydrowise AI Capabilities<\/strong><\/p>\n<p><strong>Water Flow Prediction:<\/strong>\u00a0ML model with meteorological data + watershed parameters + historical flow records. 72-hour forecast window.<\/p>\n<p><strong>Production Forecasting:<\/strong>\u00a0Integrated forecast combining reservoir level + water flow + turbine efficiency + market price signals.<\/p>\n<p><strong>Predictive Maintenance:<\/strong>\u00a0Multi-variable anomaly scoring from turbine vibration, bearing temperature, oil quality, winding insulation resistance.<\/p>\n<p><strong>EPIAS Integration:<\/strong>\u00a0Optimization with DAM\/IDM price signals. Automated bidding, imbalance risk analysis.<\/p>\n<\/div>\n<h1>Frequently Asked Questions (FAQ)<\/h1>\n<p><strong>Q1: Why is energy plant software considered more critical than other sectors?<\/strong><br \/>\nEnergy plants require real-time control and high reliability due to their uninterrupted power supply mission. According to NIST, ICS\/OT systems are subject to instant response times and continuous operation demands. A software error can affect physical processes and lead to serious financial losses<sup>[1]<\/sup>.<\/p>\n<p><strong>Q2: What are the security weaknesses of common ICS protocols in HPPs?<\/strong><br \/>\nLegacy protocols like Modbus, DNP3, IEC-104 lack authentication and encryption. Data can be easily eavesdropped or fake commands can be sent. SCADA devices use standard ports; if left uncontrolled, they allow command injection<sup>[1][2]<\/sup>.<\/p>\n<p><strong>Q3: How is Zero Trust implemented in HPPs?<\/strong><br \/>\nThe OT network is divided into segments, transitions between segments are restricted by firewalls. Access to critical devices is verified with MFA. Network traffic is continuously monitored; upon anomaly detection, the system is immediately isolated. ISA\/IEC 62443 envisions this layered architecture<sup>[2]<\/sup>.<\/p>\n<p><strong>Q4: How is technical risk scoring applied?<\/strong><br \/>\nRisk = Threat \u00d7 Vulnerability \u00d7 Impact formula is used. Each asset&#8217;s risk is scored (0-100). Cyber-HAZOP creates detailed scenarios. Investment is prioritized to highest-risk areas<sup>[1][5]<\/sup>.<\/p>\n<p><strong>Q5: What security measures should be taken in SSDLC and CI\/CD?<\/strong><br \/>\nCode review, SAST, dependency scanning, DAST, container scan, SBOM and signature verification are applied. NIST SSDF recommends static analysis and secret scanning. No unsigned software enters production<sup>[3][4]<\/sup>.<\/p>\n<p><strong>Q6: How to protect against supply chain attacks?<\/strong><br \/>\nMaintain SBOM, sign dependencies, pin versions, verify firmware certificates and use secure update channels. SolarWinds showed that even legitimate update channels can be attack vectors<sup>[5]<\/sup>.<\/p>\n<h1>Conclusion<\/h1>\n<p>Security in critical energy facilities determines operational continuity as much as competitive advantage. This article covered SCADA\/OT architecture vulnerabilities, defense layers, risk analysis methods, software development security and supply chain protection. A problem-solution focused approach was adopted at every stage<sup>[1][2][4]<\/sup>.[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text css=&#8221;&#8221;] Software Security and SCADA Protection in Critical Energy Facilities SSDLC, CI\/CD Security, Zero Trust and HYDROWISE Solution Renewasoft | 2026 Level: Advanced\u00a0\u00a0 Audience: SCADA Engineer, HPP Operator, CTO, Infrastructure Investor Introduction As hydropower plants digitalize with SCADA and IIoT, automated systems optimize energy production; however, even a small security vulnerability in these systems [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1855],"tags":[423,429,427,425,473,471],"class_list":["post-3067","post","type-post","status-publish","format-standard","hentry","category-critical-infrastructure-cybersecurity-and-industrial-systems-security","tag-energy-plant-security","tag-hydrowise","tag-ot-security","tag-scada-protocols","tag-ssdlc-en","tag-zero-trust-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Software Security in Critical Energy Facilities Secure Coding, CICD and Supply Chain Risks - Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e<\/title>\n<meta name=\"description\" content=\"OT\/IT integration in HPPs increases security risks. SCADA vulnerabilities, layered defense, risk scoring and Renewasoft HYDROWISE solutions are covered.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/renewasoft.com.tr\/index.php\/en\/2026\/02\/26\/software-security-in-critical-energy-facilities-secure-coding-cicd-and-supply-chain-risks\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Software Security in Critical Energy Facilities Secure Coding, CICD and Supply Chain Risks - Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e\" \/>\n<meta property=\"og:description\" content=\"OT\/IT integration in HPPs increases security risks. SCADA vulnerabilities, layered defense, risk scoring and Renewasoft HYDROWISE solutions are covered.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/renewasoft.com.tr\/index.php\/en\/2026\/02\/26\/software-security-in-critical-energy-facilities-secure-coding-cicd-and-supply-chain-risks\/\" \/>\n<meta property=\"og:site_name\" content=\"Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-26T22:30:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-28T00:35:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-1-saldiri-savunma-ssdlc-1.png\" \/>\n<meta name=\"author\" content=\"Bayram Kamus\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bayram Kamus\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 dakika\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/renewasoft.com.tr\/index.php\/en\/2026\/02\/26\/software-security-in-critical-energy-facilities-secure-coding-cicd-and-supply-chain-risks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/renewasoft.com.tr\/index.php\/en\/2026\/02\/26\/software-security-in-critical-energy-facilities-secure-coding-cicd-and-supply-chain-risks\/\"},\"author\":{\"name\":\"Bayram Kamus\",\"@id\":\"https:\/\/renewasoft.com.tr\/#\/schema\/person\/34e2b2ece2456ef9b7617d547b7f46ba\"},\"headline\":\"Software Security in Critical Energy Facilities Secure Coding, CICD and Supply Chain Risks\",\"datePublished\":\"2026-02-26T22:30:29+00:00\",\"dateModified\":\"2026-02-28T00:35:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/renewasoft.com.tr\/index.php\/en\/2026\/02\/26\/software-security-in-critical-energy-facilities-secure-coding-cicd-and-supply-chain-risks\/\"},\"wordCount\":1959,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/renewasoft.com.tr\/#organization\"},\"image\":{\"@id\":\"https:\/\/renewasoft.com.tr\/index.php\/en\/2026\/02\/26\/software-security-in-critical-energy-facilities-secure-coding-cicd-and-supply-chain-risks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-1-saldiri-savunma-ssdlc-1.png\",\"keywords\":[\"energy plant security\",\"Hydrowise\",\"OT security\",\"SCADA protocols\",\"SSDLC\",\"Zero Trust\"],\"articleSection\":[\"Critical Infrastructure Cybersecurity and Industrial Systems Security\"],\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/renewasoft.com.tr\/index.php\/en\/2026\/02\/26\/software-security-in-critical-energy-facilities-secure-coding-cicd-and-supply-chain-risks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/renewasoft.com.tr\/index.php\/en\/2026\/02\/26\/software-security-in-critical-energy-facilities-secure-coding-cicd-and-supply-chain-risks\/\",\"url\":\"https:\/\/renewasoft.com.tr\/index.php\/en\/2026\/02\/26\/software-security-in-critical-energy-facilities-secure-coding-cicd-and-supply-chain-risks\/\",\"name\":\"Software Security in Critical Energy Facilities Secure Coding, CICD and Supply Chain Risks - Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e\",\"isPartOf\":{\"@id\":\"https:\/\/renewasoft.com.tr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/renewasoft.com.tr\/index.php\/en\/2026\/02\/26\/software-security-in-critical-energy-facilities-secure-coding-cicd-and-supply-chain-risks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/renewasoft.com.tr\/index.php\/en\/2026\/02\/26\/software-security-in-critical-energy-facilities-secure-coding-cicd-and-supply-chain-risks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-1-saldiri-savunma-ssdlc-1.png\",\"datePublished\":\"2026-02-26T22:30:29+00:00\",\"dateModified\":\"2026-02-28T00:35:37+00:00\",\"description\":\"OT\/IT integration in HPPs increases security risks. SCADA vulnerabilities, layered defense, risk scoring and Renewasoft HYDROWISE solutions are covered.\",\"breadcrumb\":{\"@id\":\"https:\/\/renewasoft.com.tr\/index.php\/en\/2026\/02\/26\/software-security-in-critical-energy-facilities-secure-coding-cicd-and-supply-chain-risks\/#breadcrumb\"},\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/renewasoft.com.tr\/index.php\/en\/2026\/02\/26\/software-security-in-critical-energy-facilities-secure-coding-cicd-and-supply-chain-risks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/renewasoft.com.tr\/index.php\/en\/2026\/02\/26\/software-security-in-critical-energy-facilities-secure-coding-cicd-and-supply-chain-risks\/#primaryimage\",\"url\":\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-1-saldiri-savunma-ssdlc-1.png\",\"contentUrl\":\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-1-saldiri-savunma-ssdlc-1.png\",\"width\":1400,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/renewasoft.com.tr\/index.php\/en\/2026\/02\/26\/software-security-in-critical-energy-facilities-secure-coding-cicd-and-supply-chain-risks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Anasayfa\",\"item\":\"https:\/\/renewasoft.com.tr\/index.php\/tr\/ana-sayfa\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Software Security in Critical Energy Facilities Secure Coding, CICD and Supply Chain Risks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/renewasoft.com.tr\/#website\",\"url\":\"https:\/\/renewasoft.com.tr\/\",\"name\":\"Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/renewasoft.com.tr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/renewasoft.com.tr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"tr\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/renewasoft.com.tr\/#organization\",\"name\":\"Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e\",\"url\":\"https:\/\/renewasoft.com.tr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/renewasoft.com.tr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2025\/03\/images.jpg\",\"contentUrl\":\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2025\/03\/images.jpg\",\"width\":225,\"height\":225,\"caption\":\"Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e\"},\"image\":{\"@id\":\"https:\/\/renewasoft.com.tr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/renewasoft\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/renewasoft.com.tr\/#\/schema\/person\/34e2b2ece2456ef9b7617d547b7f46ba\",\"name\":\"Bayram Kamus\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/renewasoft.com.tr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5dc034653d3652a594cbe48c6b4c7bd9794d8e11f0bc0d2219fb266b54ce0149?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5dc034653d3652a594cbe48c6b4c7bd9794d8e11f0bc0d2219fb266b54ce0149?s=96&d=mm&r=g\",\"caption\":\"Bayram Kamus\"},\"url\":\"https:\/\/renewasoft.com.tr\/index.php\/author\/bayram\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Software Security in Critical Energy Facilities Secure Coding, CICD and Supply Chain Risks - Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e","description":"OT\/IT integration in HPPs increases security risks. SCADA vulnerabilities, layered defense, risk scoring and Renewasoft HYDROWISE solutions are covered.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/renewasoft.com.tr\/index.php\/en\/2026\/02\/26\/software-security-in-critical-energy-facilities-secure-coding-cicd-and-supply-chain-risks\/","og_locale":"tr_TR","og_type":"article","og_title":"Software Security in Critical Energy Facilities Secure Coding, CICD and Supply Chain Risks - Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e","og_description":"OT\/IT integration in HPPs increases security risks. SCADA vulnerabilities, layered defense, risk scoring and Renewasoft HYDROWISE solutions are covered.","og_url":"https:\/\/renewasoft.com.tr\/index.php\/en\/2026\/02\/26\/software-security-in-critical-energy-facilities-secure-coding-cicd-and-supply-chain-risks\/","og_site_name":"Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e","article_published_time":"2026-02-26T22:30:29+00:00","article_modified_time":"2026-02-28T00:35:37+00:00","og_image":[{"url":"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-1-saldiri-savunma-ssdlc-1.png","type":"","width":"","height":""}],"author":"Bayram Kamus","twitter_card":"summary_large_image","twitter_misc":{"Yazan:":"Bayram Kamus","Tahmini okuma s\u00fcresi":"13 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/renewasoft.com.tr\/index.php\/en\/2026\/02\/26\/software-security-in-critical-energy-facilities-secure-coding-cicd-and-supply-chain-risks\/#article","isPartOf":{"@id":"https:\/\/renewasoft.com.tr\/index.php\/en\/2026\/02\/26\/software-security-in-critical-energy-facilities-secure-coding-cicd-and-supply-chain-risks\/"},"author":{"name":"Bayram Kamus","@id":"https:\/\/renewasoft.com.tr\/#\/schema\/person\/34e2b2ece2456ef9b7617d547b7f46ba"},"headline":"Software Security in Critical Energy Facilities Secure Coding, CICD and Supply Chain Risks","datePublished":"2026-02-26T22:30:29+00:00","dateModified":"2026-02-28T00:35:37+00:00","mainEntityOfPage":{"@id":"https:\/\/renewasoft.com.tr\/index.php\/en\/2026\/02\/26\/software-security-in-critical-energy-facilities-secure-coding-cicd-and-supply-chain-risks\/"},"wordCount":1959,"commentCount":0,"publisher":{"@id":"https:\/\/renewasoft.com.tr\/#organization"},"image":{"@id":"https:\/\/renewasoft.com.tr\/index.php\/en\/2026\/02\/26\/software-security-in-critical-energy-facilities-secure-coding-cicd-and-supply-chain-risks\/#primaryimage"},"thumbnailUrl":"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-1-saldiri-savunma-ssdlc-1.png","keywords":["energy plant security","Hydrowise","OT security","SCADA protocols","SSDLC","Zero Trust"],"articleSection":["Critical Infrastructure Cybersecurity and Industrial Systems Security"],"inLanguage":"tr","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/renewasoft.com.tr\/index.php\/en\/2026\/02\/26\/software-security-in-critical-energy-facilities-secure-coding-cicd-and-supply-chain-risks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/renewasoft.com.tr\/index.php\/en\/2026\/02\/26\/software-security-in-critical-energy-facilities-secure-coding-cicd-and-supply-chain-risks\/","url":"https:\/\/renewasoft.com.tr\/index.php\/en\/2026\/02\/26\/software-security-in-critical-energy-facilities-secure-coding-cicd-and-supply-chain-risks\/","name":"Software Security in Critical Energy Facilities Secure Coding, CICD and Supply Chain Risks - Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e","isPartOf":{"@id":"https:\/\/renewasoft.com.tr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/renewasoft.com.tr\/index.php\/en\/2026\/02\/26\/software-security-in-critical-energy-facilities-secure-coding-cicd-and-supply-chain-risks\/#primaryimage"},"image":{"@id":"https:\/\/renewasoft.com.tr\/index.php\/en\/2026\/02\/26\/software-security-in-critical-energy-facilities-secure-coding-cicd-and-supply-chain-risks\/#primaryimage"},"thumbnailUrl":"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-1-saldiri-savunma-ssdlc-1.png","datePublished":"2026-02-26T22:30:29+00:00","dateModified":"2026-02-28T00:35:37+00:00","description":"OT\/IT integration in HPPs increases security risks. SCADA vulnerabilities, layered defense, risk scoring and Renewasoft HYDROWISE solutions are covered.","breadcrumb":{"@id":"https:\/\/renewasoft.com.tr\/index.php\/en\/2026\/02\/26\/software-security-in-critical-energy-facilities-secure-coding-cicd-and-supply-chain-risks\/#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/renewasoft.com.tr\/index.php\/en\/2026\/02\/26\/software-security-in-critical-energy-facilities-secure-coding-cicd-and-supply-chain-risks\/"]}]},{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/renewasoft.com.tr\/index.php\/en\/2026\/02\/26\/software-security-in-critical-energy-facilities-secure-coding-cicd-and-supply-chain-risks\/#primaryimage","url":"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-1-saldiri-savunma-ssdlc-1.png","contentUrl":"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/yazilim-gorsel-1-saldiri-savunma-ssdlc-1.png","width":1400,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/renewasoft.com.tr\/index.php\/en\/2026\/02\/26\/software-security-in-critical-energy-facilities-secure-coding-cicd-and-supply-chain-risks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Anasayfa","item":"https:\/\/renewasoft.com.tr\/index.php\/tr\/ana-sayfa\/"},{"@type":"ListItem","position":2,"name":"Software Security in Critical Energy Facilities Secure Coding, CICD and Supply Chain Risks"}]},{"@type":"WebSite","@id":"https:\/\/renewasoft.com.tr\/#website","url":"https:\/\/renewasoft.com.tr\/","name":"Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e","description":"","publisher":{"@id":"https:\/\/renewasoft.com.tr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/renewasoft.com.tr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"tr"},{"@type":"Organization","@id":"https:\/\/renewasoft.com.tr\/#organization","name":"Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e","url":"https:\/\/renewasoft.com.tr\/","logo":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/renewasoft.com.tr\/#\/schema\/logo\/image\/","url":"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2025\/03\/images.jpg","contentUrl":"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2025\/03\/images.jpg","width":225,"height":225,"caption":"Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e"},"image":{"@id":"https:\/\/renewasoft.com.tr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/renewasoft\/"]},{"@type":"Person","@id":"https:\/\/renewasoft.com.tr\/#\/schema\/person\/34e2b2ece2456ef9b7617d547b7f46ba","name":"Bayram Kamus","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/renewasoft.com.tr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5dc034653d3652a594cbe48c6b4c7bd9794d8e11f0bc0d2219fb266b54ce0149?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5dc034653d3652a594cbe48c6b4c7bd9794d8e11f0bc0d2219fb266b54ce0149?s=96&d=mm&r=g","caption":"Bayram Kamus"},"url":"https:\/\/renewasoft.com.tr\/index.php\/author\/bayram\/"}]}},"_links":{"self":[{"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/posts\/3067","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/comments?post=3067"}],"version-history":[{"count":2,"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/posts\/3067\/revisions"}],"predecessor-version":[{"id":3246,"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/posts\/3067\/revisions\/3246"}],"wp:attachment":[{"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/media?parent=3067"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/categories?post=3067"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/tags?post=3067"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}