{"id":3153,"date":"2026-02-26T22:32:35","date_gmt":"2026-02-26T22:32:35","guid":{"rendered":"https:\/\/renewasoft.com.tr\/?p=3153"},"modified":"2026-02-28T01:20:56","modified_gmt":"2026-02-28T01:20:56","slug":"siber-guvenlik-ve-erisim-kontrolu-scada-ve-enerji-sistemlerinde-en-kritik-riskler","status":"publish","type":"post","link":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/siber-guvenlik-ve-erisim-kontrolu-scada-ve-enerji-sistemlerinde-en-kritik-riskler\/","title":{"rendered":"Siber G\u00fcvenlik ve Eri\u015fim Kontrol\u00fc: SCADA ve Enerji Sistemlerinde En Kritik Riskler"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text css=&#8221;&#8221;]<\/p>\n<h1>Siber G\u00fcvenlik ve Eri\u015fim Kontrol\u00fc: SCADA ve Enerji Sistemlerinde En Kritik Riskler<\/h1>\n<p><strong>Giri\u015f<\/strong><\/p>\n<p>Dijitalle\u015fme ile birlikte enerji tesisleri art\u0131k yaln\u0131zca fiziksel ekipmanlardan olu\u015fan yap\u0131lar de\u011fildir. SCADA sistemleri, uzaktan eri\u015fim altyap\u0131lar\u0131, bulut entegrasyonlar\u0131 ve veri analiti\u011fi platformlar\u0131 sayesinde operasyonlar daha verimli hale gelirken, ayn\u0131 zamanda tehdit y\u00fczeyi de geni\u015flemektedir. Geleneksel olarak izole \u00e7al\u0131\u015fan end\u00fcstriyel kontrol sistemleri (ICS), bug\u00fcn kurumsal a\u011flarla ve hatta internet ile entegre \u00e7al\u0131\u015fmaktad\u0131r [2][3]. Bu d\u00f6n\u00fc\u015f\u00fcm, enerji \u00fcretim ve da\u011f\u0131t\u0131m altyap\u0131lar\u0131n\u0131 siber sald\u0131r\u0131lara kar\u015f\u0131 daha g\u00f6r\u00fcn\u00fcr ve daha hassas hale getirmi\u015ftir.<\/p>\n<p>SCADA sistemlerine y\u00f6nelik bir g\u00fcvenlik ihlali yaln\u0131zca veri kayb\u0131 anlam\u0131na gelmez; operasyonel kesinti, fiziksel hasar ve hatta insan g\u00fcvenli\u011fi riski do\u011furabilir [1][2]. Bu nedenle enerji sekt\u00f6r\u00fcnde siber g\u00fcvenlik art\u0131k yaln\u0131zca IT departman\u0131n\u0131n de\u011fil, operasyonel s\u00fcreklili\u011fin temel bir bile\u015fenidir.<\/p>\n<p>Bu yaz\u0131da, enerji ve SCADA ortamlar\u0131nda en kritik g\u00fcvenlik risklerini; tehdit y\u00fczeyi geni\u015flemesi, kimlik ve eri\u015fim y\u00f6netimi (IAM), a\u011f segmentasyonu ve g\u00fcvenlik izleme perspektifinden ele alaca\u011f\u0131z. Ayr\u0131ca bu risklerin enerji tesislerinde nas\u0131l somutla\u015ft\u0131\u011f\u0131n\u0131 ve entegre bir g\u00fcvenlik yakla\u015f\u0131m\u0131n\u0131n nas\u0131l kurgulanabilece\u011fini de\u011ferlendirece\u011fiz.<\/p>\n<p><strong>TL;DR<\/strong><\/p>\n<ul>\n<li>SCADA ve ICS sistemleri art\u0131k izole yap\u0131lar de\u011fildir; IT ve internet entegrasyonu tehdit y\u00fczeyini geni\u015fletmi\u015ftir [2][3].<\/li>\n<li>Enerji tesislerinde siber bir ihlal, yaln\u0131zca veri kayb\u0131 de\u011fil; operasyonel kesinti ve fiziksel risk anlam\u0131na gelir [1][2].<\/li>\n<li>Kimlik ve eri\u015fim y\u00f6netimi (IAM), yetki y\u00fckseltme ve varsay\u0131lan kimlik bilgileri gibi zafiyetlere kar\u015f\u0131 kritik bir savunma katman\u0131d\u0131r [4][5].<\/li>\n<li>A\u011f segmentasyonu ve Purdue modeli yakla\u015f\u0131m\u0131, OT a\u011flar\u0131n\u0131n korunmas\u0131nda temel mimari prensiplerdir [3][5].<\/li>\n<li>Loglama, izleme ve anomali tespiti mekanizmalar\u0131 olmadan g\u00fcvenlik s\u00fcrd\u00fcr\u00fclebilir de\u011fildir [4][5].<\/li>\n<\/ul>\n<ol>\n<li><strong>Kavramlar ve Tehdit Y\u00fczeyi<\/strong><\/li>\n<\/ol>\n<p>End\u00fcstriyel Kontrol Sistemleri (ICS), fiziksel s\u00fcre\u00e7leri izleyen ve kontrol eden sistemlerin genel ad\u0131d\u0131r. Bu kapsamda Supervisory Control and Data Acquisition (SCADA) sistemleri, Distributed Control Systems (DCS) ve Programmable Logic Controllers (PLC) gibi bile\u015fenler yer al\u0131r [2][4]. Enerji \u00fcretim tesisleri, iletim ve da\u011f\u0131t\u0131m altyap\u0131lar\u0131, su ar\u0131tma sistemleri ve a\u011f\u0131r sanayi tesisleri bu sistemlere do\u011frudan ba\u011f\u0131ml\u0131d\u0131r.<\/p>\n<ul>\n<li><strong>IT\u2013OT Yak\u0131nsamas\u0131 ve Air-Gap Miti<\/strong><\/li>\n<\/ul>\n<p>Geleneksel olarak ICS ortamlar\u0131 \u201cair-gap\u201d yakla\u015f\u0131m\u0131yla, yani internetten fiziksel olarak izole edilmi\u015f mimarilerle tasarlanm\u0131\u015ft\u0131r. Ancak operasyonel verimlilik, uzaktan eri\u015fim ihtiyac\u0131 ve veri analiti\u011fi gereksinimleri nedeniyle bu izolasyon modeli b\u00fcy\u00fck \u00f6l\u00e7\u00fcde ortadan kalkm\u0131\u015ft\u0131r [2][3].<\/p>\n<p>ICS sistemlerinin kurumsal IT a\u011flar\u0131 ve hatta bulut altyap\u0131lar\u0131 ile entegre edilmesi, tehdit y\u00fczeyini ciddi \u015fekilde geni\u015fletmi\u015ftir [2]. Bu d\u00f6n\u00fc\u015f\u00fcm, enerji tesislerinde yeni sald\u0131r\u0131 vekt\u00f6rlerinin ortaya \u00e7\u0131kmas\u0131na neden olmu\u015ftur. Zay\u0131f s\u0131n\u0131r korumas\u0131 (boundary protection) ve eksik tan\u0131mlanm\u0131\u015f g\u00fcvenlik politikalar\u0131, g\u00fcn\u00fcm\u00fczde en s\u0131k istismar edilen zafiyetler aras\u0131nda yer almaktad\u0131r [3].<\/p>\n<ul>\n<li><strong>Tehdit Y\u00fczeyi (Attack Surface) Nedir?<\/strong><\/li>\n<\/ul>\n<p>Tehdit y\u00fczeyi, bir sistemde sald\u0131rgan\u0131n eri\u015febilece\u011fi t\u00fcm potansiyel giri\u015f noktalar\u0131n\u0131n toplam\u0131n\u0131 ifade eder. SCADA ve ICS ortamlar\u0131nda bu y\u00fczey \u015funlar\u0131 i\u00e7erebilir:<\/p>\n<ul>\n<li>Uzaktan eri\u015fim servisleri (VPN, RDP vb.)<\/li>\n<li>Web tabanl\u0131 SCADA aray\u00fczleri<\/li>\n<li>PLC ve RTU cihazlar\u0131na a\u00e7\u0131k portlar<\/li>\n<li>G\u00fcncellenmemi\u015f firmware ve yaz\u0131l\u0131mlar<\/li>\n<li>Varsay\u0131lan kullan\u0131c\u0131 ad\u0131 ve \u015fifreler<\/li>\n<\/ul>\n<p>SCADA sistemlerine y\u00f6nelik bir ihlal, yaln\u0131zca veri manip\u00fclasyonu ile s\u0131n\u0131rl\u0131 kalmaz. Enerji \u00fcretim sistemlerinde operasyonel kesinti, fiziksel ekipman hasar\u0131 ve g\u00fcvenlik riski do\u011furabilir [1][2]. Bu nedenle ICS g\u00fcvenli\u011fi, klasik bilgi g\u00fcvenli\u011finden farkl\u0131 olarak do\u011frudan fiziksel d\u00fcnyaya etki eder.<\/p>\n<ol start=\"2\">\n<li><strong>Kimlik ve Eri\u015fim Y\u00f6netimi (IAM) Riskleri<\/strong><\/li>\n<\/ol>\n<p>SCADA ve ICS ortamlar\u0131nda g\u00fcvenlik ihlallerinin \u00f6nemli bir b\u00f6l\u00fcm\u00fc, karma\u015f\u0131k s\u0131f\u0131r-g\u00fcn sald\u0131r\u0131lar\u0131ndan de\u011fil; zay\u0131f eri\u015fim kontrol\u00fc uygulamalar\u0131ndan kaynaklanmaktad\u0131r. Varsay\u0131lan kimlik bilgileri, payla\u015f\u0131lan kullan\u0131c\u0131 hesaplar\u0131 ve yetki ayr\u0131m\u0131n\u0131n yap\u0131lmamas\u0131 gibi temel hatalar, sald\u0131rganlar i\u00e7in do\u011frudan giri\u015f noktas\u0131 olu\u015fturur [4][5].<\/p>\n<ul>\n<li><strong>Varsay\u0131lan Kimlik Bilgileri ve Payla\u015f\u0131lan Hesaplar<\/strong><\/li>\n<\/ul>\n<p>Bir\u00e7ok end\u00fcstriyel cihaz, kurulum s\u0131ras\u0131nda varsay\u0131lan kullan\u0131c\u0131 ad\u0131 ve \u015fifrelerle gelir. Bu kimlik bilgilerinin de\u011fi\u015ftirilmemesi, ICS ortamlar\u0131nda en s\u0131k g\u00f6r\u00fclen zafiyetlerden biridir [4]. \u00d6zellikle PLC ve RTU cihazlar\u0131nda kullan\u0131lan ortak hesaplar (shared accounts), kimlik do\u011frulama ve izlenebilirlik (accountability) sorunlar\u0131na yol a\u00e7ar.<\/p>\n<p>Enerji tesislerinde bak\u0131m ekipleri, sistem entegrat\u00f6rleri ve \u00fc\u00e7\u00fcnc\u00fc taraf firmalar ayn\u0131 hesap \u00fczerinden eri\u015fim sa\u011flad\u0131\u011f\u0131nda, hangi i\u015flemin kim taraf\u0131ndan yap\u0131ld\u0131\u011f\u0131n\u0131n takibi zorla\u015f\u0131r. Bu durum, olay m\u00fcdahalesi ve adli analiz s\u00fcre\u00e7lerini karma\u015f\u0131k hale getirir.<\/p>\n<ul>\n<li><strong>Yetki Y\u00fckseltme (Privilege Escalation) Riski<\/strong><\/li>\n<\/ul>\n<p>Rol tabanl\u0131 eri\u015fim kontrol\u00fc (RBAC), end\u00fcstriyel ortamlarda yayg\u0131n olarak kullan\u0131lan bir modeldir. Ancak rollerin do\u011fru tan\u0131mlanmamas\u0131 veya geni\u015f yetkilerle yap\u0131land\u0131r\u0131lmas\u0131, yetki y\u00fckseltme riskini art\u0131r\u0131r [4].<\/p>\n<p>\u00d6rne\u011fin:<\/p>\n<ul>\n<li>Operat\u00f6r rol\u00fcndeki bir kullan\u0131c\u0131n\u0131n konfig\u00fcrasyon de\u011fi\u015ftirme yetkisine sahip olmas\u0131<\/li>\n<li>Bak\u0131m personelinin \u00fcretim parametrelerine m\u00fcdahale edebilmesi<\/li>\n<li>Uzaktan eri\u015fim hesab\u0131n\u0131n y\u00f6netici yetkileri ta\u015f\u0131mas\u0131<\/li>\n<\/ul>\n<p>Bu t\u00fcr yap\u0131land\u0131rma hatalar\u0131, sald\u0131rgan\u0131n sistem i\u00e7inde yatay ve dikey hareketini kolayla\u015ft\u0131r\u0131r.<\/p>\n<ul>\n<li><strong>Uzaktan Eri\u015fim ve VPN Riskleri<\/strong><\/li>\n<\/ul>\n<p>Enerji tesislerinde uzaktan eri\u015fim, operasyonel s\u00fcreklilik a\u00e7\u0131s\u0131ndan gereklidir. Ancak VPN, RDP veya web aray\u00fczleri \u00fczerinden sa\u011flanan eri\u015fim, tehdit y\u00fczeyinin en kritik bile\u015fenlerinden biridir [1][3].<\/p>\n<p>ICS sistemlerinin kurumsal a\u011flarla entegrasyonu sonras\u0131, boundary protection eksiklikleri ve zay\u0131f kimlik do\u011frulama mekanizmalar\u0131 ciddi g\u00fcvenlik a\u00e7\u0131klar\u0131na yol a\u00e7abilmektedir [3]. \u00c7ok fakt\u00f6rl\u00fc kimlik do\u011frulama (MFA) kullan\u0131lmayan ortamlarda, ele ge\u00e7irilen bir kullan\u0131c\u0131 parolas\u0131 t\u00fcm kontrol katman\u0131na eri\u015fim sa\u011flayabilir.<\/p>\n<p>IAM katman\u0131, SCADA g\u00fcvenli\u011finde ilk savunma hatt\u0131d\u0131r. Ancak eri\u015fim kontrol\u00fc tek ba\u015f\u0131na yeterli de\u011fildir. Kimli\u011fe dayal\u0131 g\u00fcvenlik \u00f6nlemleri, a\u011f mimarisi ile desteklenmedi\u011finde sald\u0131rgan\u0131n sistem i\u00e7inde ilerlemesini engellemek zorla\u015f\u0131r.<\/p>\n<div style=\"background: #f8f9fa;border-left: 6px solid #1f4e8c;padding: 25px;margin: 30px 0;border-radius: 8px;line-height: 1.7\"><strong style=\"font-size: 18px\">Teknik Not: ICS Ortam\u0131nda Minimum IAM Gereksinimleri (NIST SP 800-82)<\/strong><\/p>\n<ul style=\"margin-top: 10px;padding-left: 20px\">\n<li>Varsay\u0131lan kimlik bilgilerinin devre d\u0131\u015f\u0131 b\u0131rak\u0131lmas\u0131<\/li>\n<li>Rol tabanl\u0131 eri\u015fim kontrol\u00fc uygulanmas\u0131<\/li>\n<li>\u00c7ok fakt\u00f6rl\u00fc kimlik do\u011frulama (MFA)<\/li>\n<li>Ayr\u0131cal\u0131kl\u0131 hesaplar\u0131n s\u0131n\u0131rland\u0131r\u0131lmas\u0131<\/li>\n<li>Eri\u015fim kay\u0131tlar\u0131n\u0131n d\u00fczenli denetlenmesi<\/li>\n<\/ul>\n<p>(Kaynak: [5])<\/p>\n<\/div>\n<ol start=\"3\">\n<li><strong>A\u011f Segmentasyonu ve Purdue Modeli<\/strong><\/li>\n<\/ol>\n<p>Kimlik ve eri\u015fim kontrol\u00fc (IAM), kullan\u0131c\u0131 bazl\u0131 g\u00fcvenli\u011fi sa\u011flar. Ancak ICS ortamlar\u0131nda yaln\u0131zca kimlik do\u011frulama yeterli de\u011fildir. Sald\u0131rgan bir hesab\u0131 ele ge\u00e7irdi\u011finde, a\u011f i\u00e7inde serbest\u00e7e hareket edebiliyorsa (lateral movement), sistem b\u00fct\u00fcnl\u00fc\u011f\u00fc ciddi risk alt\u0131na girer. Bu nedenle a\u011f segmentasyonu ve katmanl\u0131 mimari yakla\u015f\u0131m\u0131, ICS g\u00fcvenli\u011finin temel yap\u0131 ta\u015flar\u0131ndan biridir [3][5].<\/p>\n<ul>\n<li><strong>Defense-in-Depth Yakla\u015f\u0131m\u0131<\/strong><\/li>\n<\/ul>\n<p>SCADA ve ICS g\u00fcvenli\u011finde \u201cdefense-in-depth\u201d yakla\u015f\u0131m\u0131 benimsenir. Bu yakla\u015f\u0131m, tek bir g\u00fcvenlik mekanizmas\u0131na g\u00fcvenmek yerine; birden fazla savunma katman\u0131 olu\u015fturmay\u0131 ifade eder [1][5].<\/p>\n<p>Enerji tesislerinde bu katmanlar genellikle \u015funlar\u0131 i\u00e7erir:<\/p>\n<ul>\n<li>Fiziksel g\u00fcvenlik<\/li>\n<li>A\u011f segmentasyonu<\/li>\n<li>G\u00fcvenlik duvarlar\u0131 ve DMZ<\/li>\n<li>Eri\u015fim kontrol\u00fc (IAM)<\/li>\n<li>\u0130zleme ve loglama sistemleri<\/li>\n<\/ul>\n<p>Bir katman ihlal edildi\u011finde, di\u011fer katmanlar\u0131n sald\u0131r\u0131y\u0131 s\u0131n\u0131rland\u0131rmas\u0131 beklenir.<\/p>\n<ul>\n<li><strong>Purdue Modeli ve Katmanl\u0131 Mimariler<\/strong><\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-3154\" src=\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/75d6e6a0-e96e-452e-a9d6-2e65ef5582b2-300x205.png\" alt=\"\" width=\"300\" height=\"205\" srcset=\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/75d6e6a0-e96e-452e-a9d6-2e65ef5582b2-300x205.png 300w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/75d6e6a0-e96e-452e-a9d6-2e65ef5582b2-768x526.png 768w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/75d6e6a0-e96e-452e-a9d6-2e65ef5582b2-350x240.png 350w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/75d6e6a0-e96e-452e-a9d6-2e65ef5582b2-540x370.png 540w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/75d6e6a0-e96e-452e-a9d6-2e65ef5582b2-730x500.png 730w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/75d6e6a0-e96e-452e-a9d6-2e65ef5582b2-584x400.png 584w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/75d6e6a0-e96e-452e-a9d6-2e65ef5582b2-600x411.png 600w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/75d6e6a0-e96e-452e-a9d6-2e65ef5582b2.png 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>(\u015eekil 1. Purdue modeli, IT ve OT katmanlar\u0131n\u0131 ayr\u0131\u015ft\u0131rarak sald\u0131r\u0131 y\u00fczeyini s\u0131n\u0131rland\u0131ran referans mimariyi g\u00f6sterir.)<\/p>\n<p>Purdue Enterprise Reference Architecture modeli, end\u00fcstriyel a\u011flar\u0131n katmanl\u0131 \u015fekilde tasarlanmas\u0131n\u0131 \u00f6nerir. Bu modelde:<\/p>\n<ul>\n<li>Seviye 0\u20131: Fiziksel s\u00fcre\u00e7 ve sens\u00f6rler<\/li>\n<li>Seviye 2: Kontrol sistemleri (PLC, HMI)<\/li>\n<li>Seviye 3: Operasyon y\u00f6netimi<\/li>\n<li>Seviye 4\u20135: Kurumsal IT sistemleri<\/li>\n<\/ul>\n<p>IT ve OT a\u011flar\u0131n\u0131n mant\u0131ksal olarak ayr\u0131lmas\u0131, sald\u0131r\u0131lar\u0131n \u00fcst katmandan alt katmana do\u011frudan ge\u00e7mesini engeller [5]. ICS ortamlar\u0131nda zay\u0131f s\u0131n\u0131r korumas\u0131 ve yanl\u0131\u015f yap\u0131land\u0131r\u0131lm\u0131\u015f a\u011f ge\u00e7i\u015fleri, en s\u0131k istismar edilen zafiyetler aras\u0131ndad\u0131r [3].<\/p>\n<ul>\n<li><strong>Segmentasyon Olmadan Ne Olur?<\/strong><\/li>\n<\/ul>\n<p>Segmentasyonun olmad\u0131\u011f\u0131 bir enerji tesisinde \u015fu senaryo m\u00fcmk\u00fcnd\u00fcr:<\/p>\n<ol>\n<li>Kurumsal e-posta sistemine s\u0131zma<\/li>\n<li>Ayn\u0131 a\u011f segmentinde bulunan SCADA sunucusuna eri\u015fim<\/li>\n<li>PLC ileti\u015fim protokollerinin manip\u00fclasyonu<\/li>\n<li>Operasyonel kesinti<\/li>\n<\/ol>\n<p>ICS sistemlerinin IT a\u011flar\u0131 ile kontrols\u00fcz entegrasyonu, tehdit y\u00fczeyini art\u0131rmakta ve sald\u0131r\u0131 zincirini k\u0131saltmaktad\u0131r [2][3].<\/p>\n<p>A\u011f segmentasyonu, sald\u0131rgan\u0131n ilerleme h\u0131z\u0131n\u0131 azalt\u0131r ve g\u00fcvenlik olay\u0131n\u0131n etki alan\u0131n\u0131 s\u0131n\u0131rlar. Ancak segmentasyonun etkin olabilmesi i\u00e7in a\u011f trafi\u011finin izlenmesi ve anomalilerin tespit edilmesi gerekir.<\/p>\n<div style=\"background: #f8f9fa;border-left: 6px solid #b02a37;padding: 25px;margin: 30px 0;border-radius: 8px;line-height: 1.7\"><strong style=\"font-size: 18px\">Risk Kart\u0131: Zay\u0131f Segmentasyonun Sonu\u00e7lar\u0131<\/strong><\/p>\n<ul style=\"margin-top: 10px;padding-left: 20px\">\n<li>IT a\u011f\u0131ndan OT a\u011f\u0131na do\u011frudan eri\u015fim<\/li>\n<li>PLC ve RTU cihazlar\u0131na yetkisiz eri\u015fim<\/li>\n<li>G\u00fcvenlik ihlalinin t\u00fcm tesise yay\u0131lmas\u0131<\/li>\n<li>Operasyonel kesinti ve fiziksel hasar riski<\/li>\n<\/ul>\n<p>(Kaynak: [3][5])<\/p>\n<\/div>\n<ol start=\"4\">\n<li><strong>Loglama ve G\u00fcvenlik \u0130zleme (Monitoring &amp; Detection)<\/strong><\/li>\n<\/ol>\n<p>ICS ve SCADA ortamlar\u0131nda g\u00fcvenlik yaln\u0131zca eri\u015fimi s\u0131n\u0131rland\u0131rmak veya a\u011flar\u0131 b\u00f6lmekle sa\u011flanamaz. G\u00fcvenli\u011fin s\u00fcrd\u00fcr\u00fclebilir olmas\u0131 i\u00e7in sistemde neler olup bitti\u011finin s\u00fcrekli izlenmesi gerekir. Loglama ve g\u00fcvenlik izleme mekanizmalar\u0131, sald\u0131r\u0131lar\u0131n erken tespiti ve etkisinin s\u0131n\u0131rland\u0131r\u0131lmas\u0131 a\u00e7\u0131s\u0131ndan kritik rol oynar [4][5].<\/p>\n<ul>\n<li><strong>Neden Loglama Kritik?<\/strong><\/li>\n<\/ul>\n<p>End\u00fcstriyel ortamlarda bir\u00e7ok g\u00fcvenlik ihlali, haftalar hatta aylar boyunca fark edilmeden kalabilmektedir. Bunun temel nedeni, OT a\u011flar\u0131nda yeterli log toplama ve merkezi izleme sistemlerinin bulunmamas\u0131d\u0131r [3][4].<\/p>\n<p>Enerji tesislerinde \u015fu olaylar\u0131n loglanmas\u0131 gerekir:<\/p>\n<ul>\n<li>Ba\u015far\u0131s\u0131z ve ba\u015far\u0131l\u0131 oturum a\u00e7ma denemeleri<\/li>\n<li>Yetki de\u011fi\u015fiklikleri<\/li>\n<li>Konfig\u00fcrasyon g\u00fcncellemeleri<\/li>\n<li>PLC program de\u011fi\u015fiklikleri<\/li>\n<li>Uzaktan eri\u015fim ba\u011flant\u0131lar\u0131<\/li>\n<\/ul>\n<p>Bu kay\u0131tlar olmadan olay m\u00fcdahalesi ve k\u00f6k neden analizi yapmak neredeyse imk\u00e2ns\u0131zd\u0131r.<\/p>\n<ul>\n<li><strong>IDS, Anomali Tespiti ve Makine \u00d6\u011frenmesi<\/strong><\/li>\n<\/ul>\n<p>ICS g\u00fcvenli\u011finde geleneksel imza tabanl\u0131 sald\u0131r\u0131 tespit sistemleri (IDS) tek ba\u015f\u0131na yeterli olmayabilir. \u00c7\u00fcnk\u00fc bir\u00e7ok sald\u0131r\u0131, me\u015fru protokoller \u00fczerinden ger\u00e7ekle\u015ftirilir. Bu nedenle a\u011f trafi\u011fi analizi ve anomali tespiti yakla\u015f\u0131mlar\u0131 \u00f6nem kazanm\u0131\u015ft\u0131r [4].<\/p>\n<p>Makine \u00f6\u011frenmesi tabanl\u0131 sistemler:<\/p>\n<ul>\n<li>Normal operasyonel davran\u0131\u015f\u0131 modelleyebilir<\/li>\n<li>Ola\u011fan d\u0131\u015f\u0131 PLC komutlar\u0131n\u0131 tespit edebilir<\/li>\n<li>Anormal trafik yo\u011funlu\u011funu belirleyebilir<\/li>\n<\/ul>\n<p>Ancak bu sistemler, temel g\u00fcvenlik kontrollerinin yerini tutmaz; tamamlay\u0131c\u0131 savunma katmanlar\u0131d\u0131r [4][5].<\/p>\n<ul>\n<li><strong>Loglama Olmadan Ne Kaybedilir?<\/strong><\/li>\n<\/ul>\n<p>Enerji tesisinde varsay\u0131msal bir senaryo d\u00fc\u015f\u00fcnelim:<\/p>\n<ul>\n<li>Bir uzaktan eri\u015fim hesab\u0131 ele ge\u00e7irilir.<\/li>\n<li>Sald\u0131rgan PLC parametrelerinde k\u00fc\u00e7\u00fck de\u011fi\u015fiklikler yapar.<\/li>\n<li>\u00dcretim verimlili\u011fi d\u00fc\u015fer ancak fiziksel ar\u0131za olu\u015fmaz.<\/li>\n<\/ul>\n<p>E\u011fer merkezi loglama ve alarm sistemi yoksa, bu de\u011fi\u015fiklikler uzun s\u00fcre fark edilmeyebilir. Sonu\u00e7 olarak operasyonel kay\u0131p artar ve olay\u0131n kayna\u011f\u0131 belirlenemez.<\/p>\n<p>Loglama ve izleme mekanizmalar\u0131, sald\u0131r\u0131y\u0131 tamamen engellemeyebilir; ancak etkisini s\u0131n\u0131rlar ve m\u00fcdahale s\u00fcresini k\u0131salt\u0131r. Enerji tesislerinde bu s\u00fcre, operasyonel kay\u0131p ile do\u011frudan ili\u015fkilidir.<\/p>\n<div style=\"background: #f8f9fa;border-left: 6px solid #1f4e8c;padding: 25px;margin: 30px 0;border-radius: 8px;line-height: 1.7\"><strong style=\"font-size: 18px\">Teknik Not: ICS Ortam\u0131nda \u0130zleme \u0130\u00e7in Minimum Gereksinimler (NIST SP 800-82)<\/strong><\/p>\n<ul style=\"margin-top: 10px;padding-left: 20px\">\n<li>Merkezi log toplama sistemi<\/li>\n<li>Kritik olaylar i\u00e7in ger\u00e7ek zamanl\u0131 alarm \u00fcretimi<\/li>\n<li>Yetkili hesap aktivitelerinin d\u00fczenli denetimi<\/li>\n<li>A\u011f trafi\u011fi izleme ve segment bazl\u0131 analiz<\/li>\n<li>Olay m\u00fcdahale plan\u0131n\u0131n tan\u0131mlanmas\u0131<\/li>\n<\/ul>\n<p>(Kaynak: [5])<\/p>\n<\/div>\n<ol start=\"5\">\n<li><strong>Enerji Tesisi Senaryosu: Katmanl\u0131 G\u00fcvenlik Olmadan Ne Olur?<\/strong><\/li>\n<\/ol>\n<p>Bir hidroelektrik santral (HES) ortam\u0131n\u0131 d\u00fc\u015f\u00fcnelim.<\/p>\n<p>Tesis;<\/p>\n<ul>\n<li>SCADA \u00fczerinden izleniyor,<\/li>\n<li>Bak\u0131m ekipleri VPN ile uzaktan eri\u015fim sa\u011fl\u0131yor,<\/li>\n<li>Kurumsal a\u011f ile veri payla\u015f\u0131m\u0131 yap\u0131yor.<\/li>\n<\/ul>\n<p><strong>Ad\u0131m 1 \u2014 Zay\u0131f IAM<\/strong><\/p>\n<p>Uzaktan eri\u015fim i\u00e7in kullan\u0131lan bir bak\u0131m hesab\u0131, yaln\u0131zca kullan\u0131c\u0131 ad\u0131 ve parola ile korunmaktad\u0131r. \u00c7ok fakt\u00f6rl\u00fc kimlik do\u011frulama (MFA) uygulanmam\u0131\u015ft\u0131r. Bu hesap ayn\u0131 zamanda geni\u015f yetkilere sahiptir.<\/p>\n<p>Parola bir kimlik av\u0131 (phishing) sald\u0131r\u0131s\u0131 sonucu ele ge\u00e7irilir.<\/p>\n<p>Bu t\u00fcr zay\u0131f eri\u015fim kontrolleri, ICS ortamlar\u0131nda s\u0131k g\u00f6r\u00fclen zafiyetler aras\u0131ndad\u0131r [4][5].<\/p>\n<p><strong>Ad\u0131m 2 \u2014 Segmentasyon Eksikli\u011fi<\/strong><\/p>\n<p>Kurumsal a\u011f ile OT a\u011f\u0131 aras\u0131nda yeterli segmentasyon bulunmamaktad\u0131r. VPN ba\u011flant\u0131s\u0131 do\u011frudan SCADA sunucusuna eri\u015fim sa\u011flamaktad\u0131r.<\/p>\n<p>Sald\u0131rgan:<\/p>\n<ol>\n<li>SCADA sunucusuna ba\u011flan\u0131r.<\/li>\n<li>PLC haberle\u015fme trafi\u011fini g\u00f6zlemler.<\/li>\n<li>Operasyonel parametrelerde k\u00fc\u00e7\u00fck de\u011fi\u015fiklikler yapar.<\/li>\n<\/ol>\n<p>Zay\u0131f s\u0131n\u0131r korumas\u0131 ve yanl\u0131\u015f yap\u0131land\u0131r\u0131lm\u0131\u015f a\u011f ge\u00e7i\u015fleri, ICS ortamlar\u0131nda yayg\u0131n istismar noktalar\u0131d\u0131r [3].<\/p>\n<p><strong>Ad\u0131m 3 \u2014 Loglama ve \u0130zleme Yetersizli\u011fi<\/strong><\/p>\n<p>Sistemde merkezi log toplama ve ger\u00e7ek zamanl\u0131 alarm mekanizmas\u0131 bulunmamaktad\u0131r. Yap\u0131lan parametre de\u011fi\u015fiklikleri an\u0131nda fark edilmez.<\/p>\n<p>Sonu\u00e7:<\/p>\n<ul>\n<li>T\u00fcrbin verimlili\u011fi d\u00fc\u015fer<\/li>\n<li>Enerji \u00fcretim kapasitesi azal\u0131r<\/li>\n<li>Operasyonel maliyet artar<\/li>\n<li>Olay\u0131n kayna\u011f\u0131 tespit edilemez<\/li>\n<\/ul>\n<p>SCADA sistemlerine y\u00f6nelik bir ihlal, yaln\u0131zca veri g\u00fcvenli\u011fi de\u011fil; operasyonel s\u00fcreklilik ve fiziksel g\u00fcvenlik riski do\u011furabilir [1][2].<\/p>\n<ul>\n<li><strong>Katmanl\u0131 Yakla\u015f\u0131m Olsayd\u0131 Ne Olurdu?<\/strong><\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-3155\" src=\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/f10b2ee7-474a-435f-a331-be34faac602e-263x300.png\" alt=\"\" width=\"263\" height=\"300\" srcset=\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/f10b2ee7-474a-435f-a331-be34faac602e-263x300.png 263w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/f10b2ee7-474a-435f-a331-be34faac602e-899x1024.png 899w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/f10b2ee7-474a-435f-a331-be34faac602e-768x875.png 768w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/f10b2ee7-474a-435f-a331-be34faac602e-230x262.png 230w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/f10b2ee7-474a-435f-a331-be34faac602e-356x405.png 356w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/f10b2ee7-474a-435f-a331-be34faac602e-439x500.png 439w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/f10b2ee7-474a-435f-a331-be34faac602e-351x400.png 351w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/f10b2ee7-474a-435f-a331-be34faac602e-600x683.png 600w, https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/f10b2ee7-474a-435f-a331-be34faac602e.png 1024w\" sizes=\"auto, (max-width: 263px) 100vw, 263px\" \/><\/p>\n<p>(<strong>\u015eekil 2.<\/strong> IT&#8217;den OT katman\u0131na do\u011fru uygulanan katmanl\u0131 g\u00fcvenlik mimarisini ve temel savunma ad\u0131mlar\u0131n\u0131 g\u00f6stermektedir.)<\/p>\n<p>E\u011fer ayn\u0131 tesiste:<\/p>\n<ul>\n<li>MFA uygulanm\u0131\u015f olsayd\u0131,<\/li>\n<li>IT ve OT a\u011flar\u0131 segmentlere ayr\u0131lm\u0131\u015f olsayd\u0131,<\/li>\n<li>Yetkiler rol bazl\u0131 ve s\u0131n\u0131rl\u0131 tan\u0131mlanm\u0131\u015f olsayd\u0131,<\/li>\n<li>Ger\u00e7ek zamanl\u0131 log analizi yap\u0131lm\u0131\u015f olsayd\u0131,<\/li>\n<\/ul>\n<p>sald\u0131rgan\u0131n ilerlemesi erken a\u015famada tespit edilebilir ve etki alan\u0131 s\u0131n\u0131rland\u0131r\u0131labilirdi.<\/p>\n<p>Bu senaryo, ICS g\u00fcvenli\u011finde IAM, segmentasyon ve izleme katmanlar\u0131n\u0131n birlikte \u00e7al\u0131\u015fmas\u0131n\u0131n neden kritik oldu\u011funu g\u00f6stermektedir.<\/p>\n<ol start=\"6\">\n<li><strong>Renewasoft G\u00fcvenlik Yakla\u015f\u0131m\u0131: Entegre ve Katmanl\u0131 Mimari<\/strong><\/li>\n<\/ol>\n<p>Enerji tesislerinde siber g\u00fcvenlik, tek bir \u00fcr\u00fcn ya da tek bir g\u00fcvenlik bile\u015feni ile sa\u011flanamaz. SCADA ve OT ortamlar\u0131; eri\u015fim kontrol\u00fc, a\u011f mimarisi, izleme sistemleri ve operasyonel s\u00fcre\u00e7lerin birlikte ele al\u0131nd\u0131\u011f\u0131 entegre bir yakla\u015f\u0131m gerektirir.<\/p>\n<p>Renewasoft yakla\u015f\u0131m\u0131, g\u00fcvenli\u011fi ayr\u0131 bir katman olarak de\u011fil; operasyonel mimarinin do\u011fal bir par\u00e7as\u0131 olarak ele al\u0131r.<\/p>\n<ul>\n<li><strong>Kimlik ve Eri\u015fim Kontrol\u00fcnde Yap\u0131sal Yakla\u015f\u0131m<\/strong><\/li>\n<\/ul>\n<p>Enerji tesislerinde:<\/p>\n<ul>\n<li>Rol bazl\u0131 yetkilendirme<\/li>\n<li>Ayr\u0131cal\u0131kl\u0131 hesap y\u00f6netimi<\/li>\n<li>Uzaktan eri\u015fim kontrol\u00fc<\/li>\n<li>Kritik i\u015flem kay\u0131tlar\u0131n\u0131n izlenmesi<\/li>\n<\/ul>\n<p>gibi temel IAM prensipleri, sistem mimarisine entegre edilmelidir.<\/p>\n<p>Bu yakla\u015f\u0131m, yaln\u0131zca kullan\u0131c\u0131 do\u011frulama de\u011fil; yetki s\u0131n\u0131rland\u0131rma ve izlenebilirlik sa\u011flar. B\u00f6ylece privilege escalation riskleri minimize edilir [4][5].<\/p>\n<ul>\n<li><strong>Segmentasyon ve Operasyonel Ayr\u0131m<\/strong><\/li>\n<\/ul>\n<p>Renewasoft mimarisinde:<\/p>\n<ul>\n<li>IT ve OT katmanlar\u0131 mant\u0131ksal olarak ayr\u0131\u015ft\u0131r\u0131l\u0131r<\/li>\n<li>SCADA veri ak\u0131\u015f\u0131 kontroll\u00fc ge\u00e7i\u015f noktalar\u0131ndan sa\u011flan\u0131r<\/li>\n<li>Kritik kontrol katmanlar\u0131na do\u011frudan d\u0131\u015f eri\u015fim engellenir<\/li>\n<\/ul>\n<p>Bu yap\u0131, defense-in-depth prensibine uygun olarak sald\u0131r\u0131 y\u00fczeyini s\u0131n\u0131rlar [1][5].<\/p>\n<ul>\n<li><strong>Loglama, \u0130zleme ve Operasyonel G\u00f6r\u00fcn\u00fcrl\u00fck<\/strong><\/li>\n<\/ul>\n<p>Enerji tesislerinde g\u00fcvenlik, yaln\u0131zca \u00f6nleme de\u011fil; g\u00f6r\u00fcn\u00fcrl\u00fck meselesidir.<\/p>\n<p>Merkezi log toplama, alarm \u00fcretimi ve operasyonel veri analizi sayesinde:<\/p>\n<ul>\n<li>Yetki de\u011fi\u015fiklikleri izlenebilir<\/li>\n<li>\u015e\u00fcpheli ba\u011flant\u0131lar tespit edilebilir<\/li>\n<li>Anormal davran\u0131\u015flar erken a\u015famada belirlenebilir<\/li>\n<\/ul>\n<p>Bu yakla\u015f\u0131m, g\u00fcvenlik ve operasyonel performans verisini birlikte de\u011ferlendirmeye olanak tan\u0131r.<\/p>\n<ul>\n<li><strong>G\u00fcvenlik ve Operasyonun Birle\u015fti\u011fi Nokta<\/strong><\/li>\n<\/ul>\n<p>SCADA g\u00fcvenli\u011fi yaln\u0131zca bir IT konusu de\u011fildir. T\u00fcrbin verimlili\u011fi, enerji \u00fcretim kapasitesi ve bak\u0131m planlamas\u0131 ile do\u011frudan ili\u015fkilidir.<\/p>\n<p>G\u00fcvenli bir mimari:<\/p>\n<ul>\n<li>Plans\u0131z duru\u015f riskini azalt\u0131r<\/li>\n<li>Yetkisiz m\u00fcdahale ihtimalini d\u00fc\u015f\u00fcr\u00fcr<\/li>\n<li>Operasyonel karar destek sistemlerini daha g\u00fcvenilir hale getirir<\/li>\n<\/ul>\n<p>Bu nedenle siber g\u00fcvenlik, enerji tesislerinde operasyonel s\u00fcreklili\u011fin bir bile\u015fenidir; ayr\u0131 bir proje de\u011fil.<\/p>\n<ol start=\"7\">\n<li><strong>Sonu\u00e7 ve De\u011ferlendirme<\/strong><\/li>\n<\/ol>\n<p>Enerji tesislerinde siber g\u00fcvenlik, art\u0131k yaln\u0131zca bilgi g\u00fcvenli\u011fi meselesi de\u011fildir; operasyonel s\u00fcreklilik, fiziksel g\u00fcvenlik ve ekonomik s\u00fcrd\u00fcr\u00fclebilirlik ile do\u011frudan ili\u015fkilidir. SCADA ve ICS sistemlerinin IT a\u011flar\u0131 ve internet ile entegre \u00e7al\u0131\u015ft\u0131\u011f\u0131 g\u00fcn\u00fcm\u00fczde, tehdit y\u00fczeyi ka\u00e7\u0131n\u0131lmaz olarak geni\u015flemi\u015ftir [2][3]. Bu geni\u015fleme, eri\u015fim kontrol\u00fc zafiyetleri, zay\u0131f segmentasyon ve yetersiz izleme mekanizmalar\u0131 ile birle\u015fti\u011finde kritik riskler do\u011furur.<\/p>\n<p>Kimlik ve eri\u015fim y\u00f6netimi (IAM), sald\u0131r\u0131n\u0131n ilk temas noktas\u0131n\u0131 kontrol eder. A\u011f segmentasyonu, sald\u0131r\u0131n\u0131n yay\u0131lmas\u0131n\u0131 s\u0131n\u0131rlar. Loglama ve g\u00fcvenlik izleme ise ihlalin erken tespit edilmesini sa\u011flar. Bu katmanlar\u0131n birlikte uygulanmad\u0131\u011f\u0131 ortamlarda, bir g\u00fcvenlik ihlali operasyonel kesinti ve fiziksel hasar riski yaratabilir [1][5].<\/p>\n<p>Enerji tesislerinde g\u00fcvenlik yakla\u015f\u0131m\u0131, tekil bir \u00fcr\u00fcn veya kontrol mekanizmas\u0131na indirgenemez. Katmanl\u0131 ve entegre bir mimari, yaln\u0131zca sald\u0131r\u0131y\u0131 \u00f6nlemek i\u00e7in de\u011fil; etkisini s\u0131n\u0131rlamak ve m\u00fcdahale s\u00fcresini k\u0131saltmak i\u00e7in gereklidir.<\/p>\n<p><strong>Bir sonraki ad\u0131m olarak<\/strong>, enerji tesislerinde mevcut SCADA ve OT mimarisinin \u015fu \u00fc\u00e7 ba\u015fl\u0131k alt\u0131nda de\u011ferlendirilmesi \u00f6nerilir:<\/p>\n<ul>\n<li>Eri\u015fim kontrol\u00fc ve ayr\u0131cal\u0131kl\u0131 hesap y\u00f6netimi<\/li>\n<li>IT\u2013OT segmentasyon seviyesi<\/li>\n<li>Loglama ve olay m\u00fcdahale kapasitesi<\/li>\n<\/ul>\n<p>Bu de\u011ferlendirme, yaln\u0131zca teknik bir kontrol listesi de\u011fil; operasyonel risk haritas\u0131n\u0131n \u00e7\u0131kar\u0131lmas\u0131 anlam\u0131na gelir.<\/p>\n<ol start=\"8\">\n<li><strong>S\u0131k Sorulan Sorular<\/strong><\/li>\n<\/ol>\n<p><strong>1- SCADA sistemleri neden klasik IT g\u00fcvenli\u011fi ile korunamaz?<\/strong><br \/>\nICS ve SCADA sistemleri, fiziksel s\u00fcre\u00e7leri kontrol etti\u011fi i\u00e7in g\u00fcvenlik ihlalleri do\u011frudan operasyonel ve fiziksel sonu\u00e7lara yol a\u00e7abilir [1][2]. Ayr\u0131ca bir\u00e7ok ICS protokol\u00fc, g\u00fcvenlik odakl\u0131 de\u011fil; performans ve s\u00fcreklilik odakl\u0131 tasarlanm\u0131\u015ft\u0131r. Bu nedenle IT g\u00fcvenlik yakla\u015f\u0131m\u0131 tek ba\u015f\u0131na yeterli de\u011fildir.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>2- Air-gap h\u00e2l\u00e2 ge\u00e7erli bir g\u00fcvenlik y\u00f6ntemi midir?<\/strong><br \/>\nModern enerji tesislerinde tam izolasyon pratikte m\u00fcmk\u00fcn de\u011fildir. Uzaktan eri\u015fim, veri analiti\u011fi ve entegrasyon ihtiya\u00e7lar\u0131 nedeniyle ICS sistemleri kurumsal a\u011flarla ba\u011flant\u0131l\u0131d\u0131r [2][3]. Bu nedenle segmentasyon ve eri\u015fim kontrol\u00fc, air-gap\u2019in yerini alm\u0131\u015ft\u0131r.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>3- En kritik g\u00fcvenlik katman\u0131 hangisidir: IAM mi, segmentasyon mu, izleme mi?<\/strong><br \/>\nBu katmanlardan biri eksik oldu\u011funda risk artar. IAM kimlik do\u011frulama sa\u011flar; segmentasyon sald\u0131r\u0131n\u0131n yay\u0131lmas\u0131n\u0131 s\u0131n\u0131rlar; izleme ise ihlalin fark edilmesini sa\u011flar [3][5]. G\u00fcvenlik, bu katmanlar\u0131n birlikte \u00e7al\u0131\u015fmas\u0131yla sa\u011flan\u0131r.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>4- K\u00fc\u00e7\u00fck \u00f6l\u00e7ekli enerji tesislerinde de bu \u00f6nlemler gerekli midir?<\/strong><br \/>\nEvet. Sald\u0131r\u0131lar \u00f6l\u00e7ek g\u00f6zetmez. K\u00fc\u00e7\u00fck tesislerde bile uzaktan eri\u015fim, varsay\u0131lan \u015fifreler ve zay\u0131f segmentasyon ciddi risk olu\u015fturabilir [4][5].<\/p>\n<p>&nbsp;<\/p>\n<p><strong>5- Makine \u00f6\u011frenmesi ICS g\u00fcvenli\u011finde tek ba\u015f\u0131na yeterli midir?<\/strong><br \/>\nHay\u0131r. Makine \u00f6\u011frenmesi tabanl\u0131 anomali tespiti faydal\u0131d\u0131r; ancak temel eri\u015fim kontrol\u00fc, segmentasyon ve loglama mekanizmalar\u0131n\u0131n yerini tutmaz [4][5]. Savunma katmanl\u0131 olmal\u0131d\u0131r.[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text css=&#8221;&#8221;] Siber G\u00fcvenlik ve Eri\u015fim Kontrol\u00fc: SCADA ve Enerji Sistemlerinde En Kritik Riskler Giri\u015f Dijitalle\u015fme ile birlikte enerji tesisleri art\u0131k yaln\u0131zca fiziksel ekipmanlardan olu\u015fan yap\u0131lar de\u011fildir. SCADA sistemleri, uzaktan eri\u015fim altyap\u0131lar\u0131, bulut entegrasyonlar\u0131 ve veri analiti\u011fi platformlar\u0131 sayesinde operasyonlar daha verimli hale gelirken, ayn\u0131 zamanda tehdit y\u00fczeyi de geni\u015flemektedir. Geleneksel olarak izole \u00e7al\u0131\u015fan end\u00fcstriyel [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":3295,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1863],"tags":[1674,1696,1684,1704,1672,1668,1713,1706,1676,1698,449,1682,1724,1680,1686,1689,1722,1708,1718,1692,433,1712,1670,1716,1701,1710,1720,1693,1700,1688],"class_list":["post-3153","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kritik-altyapi-siber-guvenligi-ve-endustriyel-sistem-guvenligi","tag-ag-segmentasyonu-ot","tag-boundary-protection","tag-defense-in-depth","tag-endustriyel-ids","tag-endustriyel-kontrol-sistemleri-guvenligi","tag-enerji-sistemlerinde-siber-guvenlik","tag-enerji-tesislerinde-operasyonel-sureklilik","tag-guvenlik-izleme-ve-anomali-tespiti","tag-iam-endustriyel-sistemler","tag-ics-loglama","tag-ics-siber-guvenlik","tag-it-ot-ayrimi","tag-katmanli-guvenlik-mimarisi","tag-kimlik-ve-erisim-yonetimi","tag-kritik-altyapi-guvenligi","tag-mfa-cok-faktorlu-kimlik-dogrulama","tag-nist-sp-800-82","tag-ot-ag-guvenligi","tag-plc-guvenligi","tag-privilege-escalation-riski","tag-purdue-modeli","tag-rtu-guvenligi","tag-scada-guvenligi","tag-scada-izleme-sistemi","tag-scada-saldiri-yuzeyi","tag-siber-fiziksel-sistem-guvenligi","tag-siber-risk-yonetimi","tag-uzaktan-erisim-guvenligi","tag-varsayilan-sifre-zafiyeti","tag-vpn-guvenlik-riski"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Siber G\u00fcvenlik ve Eri\u015fim Kontrol\u00fc: SCADA ve Enerji Sistemlerinde En Kritik Riskler - Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e<\/title>\n<meta name=\"description\" content=\"SCADA ve enerji sistemlerinde siber g\u00fcvenlik riskleri nelerdir? IAM, a\u011f segmentasyonu ve loglama temelli katmanl\u0131 g\u00fcvenlik rehberi.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/siber-guvenlik-ve-erisim-kontrolu-scada-ve-enerji-sistemlerinde-en-kritik-riskler\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Siber G\u00fcvenlik ve Eri\u015fim Kontrol\u00fc: SCADA ve Enerji Sistemlerinde En Kritik Riskler - Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e\" \/>\n<meta property=\"og:description\" content=\"SCADA ve enerji sistemlerinde siber g\u00fcvenlik riskleri nelerdir? IAM, a\u011f segmentasyonu ve loglama temelli katmanl\u0131 g\u00fcvenlik rehberi.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/siber-guvenlik-ve-erisim-kontrolu-scada-ve-enerji-sistemlerinde-en-kritik-riskler\/\" \/>\n<meta property=\"og:site_name\" content=\"Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-26T22:32:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-28T01:20:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/siber_guvenlik_scada_optimized.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ihsan Yoruk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ihsan Yoruk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"15 dakika\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/siber-guvenlik-ve-erisim-kontrolu-scada-ve-enerji-sistemlerinde-en-kritik-riskler\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/siber-guvenlik-ve-erisim-kontrolu-scada-ve-enerji-sistemlerinde-en-kritik-riskler\/\"},\"author\":{\"name\":\"Ihsan Yoruk\",\"@id\":\"https:\/\/renewasoft.com.tr\/#\/schema\/person\/f05685cd62b29f0d064e5f59d387054a\"},\"headline\":\"Siber G\u00fcvenlik ve Eri\u015fim Kontrol\u00fc: SCADA ve Enerji Sistemlerinde En Kritik Riskler\",\"datePublished\":\"2026-02-26T22:32:35+00:00\",\"dateModified\":\"2026-02-28T01:20:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/siber-guvenlik-ve-erisim-kontrolu-scada-ve-enerji-sistemlerinde-en-kritik-riskler\/\"},\"wordCount\":3183,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/renewasoft.com.tr\/#organization\"},\"image\":{\"@id\":\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/siber-guvenlik-ve-erisim-kontrolu-scada-ve-enerji-sistemlerinde-en-kritik-riskler\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/siber_guvenlik_scada_optimized.jpg\",\"keywords\":[\"a\u011f segmentasyonu OT\",\"boundary protection\",\"defense in depth\",\"end\u00fcstriyel IDS\",\"end\u00fcstriyel kontrol sistemleri g\u00fcvenli\u011fi\",\"enerji sistemlerinde siber g\u00fcvenlik\",\"enerji tesislerinde operasyonel s\u00fcreklilik\",\"g\u00fcvenlik izleme ve anomali tespiti\",\"IAM end\u00fcstriyel sistemler\",\"ICS loglama\",\"ICS siber guvenlik\",\"IT-OT ayr\u0131m\u0131\",\"katmanl\u0131 g\u00fcvenlik mimarisi\",\"kimlik ve eri\u015fim y\u00f6netimi\",\"kritik altyap\u0131 g\u00fcvenli\u011fi\",\"MFA \u00e7ok fakt\u00f6rl\u00fc kimlik do\u011frulama\",\"NIST SP 800-82\",\"OT a\u011f g\u00fcvenli\u011fi\",\"PLC g\u00fcvenli\u011fi\",\"privilege escalation riski\",\"Purdue modeli\",\"RTU g\u00fcvenli\u011fi\",\"SCADA g\u00fcvenli\u011fi\",\"SCADA izleme sistemi\",\"SCADA sald\u0131r\u0131 y\u00fczeyi\",\"siber fiziksel sistem g\u00fcvenli\u011fi\",\"siber risk y\u00f6netimi\",\"uzaktan eri\u015fim g\u00fcvenli\u011fi\",\"varsay\u0131lan \u015fifre zafiyeti\",\"VPN g\u00fcvenlik riski\"],\"articleSection\":[\"Kritik Altyap\u0131 Siber G\u00fcvenli\u011fi ve End\u00fcstriyel Sistem G\u00fcvenli\u011fi\"],\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/siber-guvenlik-ve-erisim-kontrolu-scada-ve-enerji-sistemlerinde-en-kritik-riskler\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/siber-guvenlik-ve-erisim-kontrolu-scada-ve-enerji-sistemlerinde-en-kritik-riskler\/\",\"url\":\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/siber-guvenlik-ve-erisim-kontrolu-scada-ve-enerji-sistemlerinde-en-kritik-riskler\/\",\"name\":\"Siber G\u00fcvenlik ve Eri\u015fim Kontrol\u00fc: SCADA ve Enerji Sistemlerinde En Kritik Riskler - Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e\",\"isPartOf\":{\"@id\":\"https:\/\/renewasoft.com.tr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/siber-guvenlik-ve-erisim-kontrolu-scada-ve-enerji-sistemlerinde-en-kritik-riskler\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/siber-guvenlik-ve-erisim-kontrolu-scada-ve-enerji-sistemlerinde-en-kritik-riskler\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/siber_guvenlik_scada_optimized.jpg\",\"datePublished\":\"2026-02-26T22:32:35+00:00\",\"dateModified\":\"2026-02-28T01:20:56+00:00\",\"description\":\"SCADA ve enerji sistemlerinde siber g\u00fcvenlik riskleri nelerdir? IAM, a\u011f segmentasyonu ve loglama temelli katmanl\u0131 g\u00fcvenlik rehberi.\",\"breadcrumb\":{\"@id\":\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/siber-guvenlik-ve-erisim-kontrolu-scada-ve-enerji-sistemlerinde-en-kritik-riskler\/#breadcrumb\"},\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/siber-guvenlik-ve-erisim-kontrolu-scada-ve-enerji-sistemlerinde-en-kritik-riskler\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/siber-guvenlik-ve-erisim-kontrolu-scada-ve-enerji-sistemlerinde-en-kritik-riskler\/#primaryimage\",\"url\":\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/siber_guvenlik_scada_optimized.jpg\",\"contentUrl\":\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/siber_guvenlik_scada_optimized.jpg\",\"width\":1536,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/siber-guvenlik-ve-erisim-kontrolu-scada-ve-enerji-sistemlerinde-en-kritik-riskler\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Anasayfa\",\"item\":\"https:\/\/renewasoft.com.tr\/index.php\/tr\/ana-sayfa\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Siber G\u00fcvenlik ve Eri\u015fim Kontrol\u00fc: SCADA ve Enerji Sistemlerinde En Kritik Riskler\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/renewasoft.com.tr\/#website\",\"url\":\"https:\/\/renewasoft.com.tr\/\",\"name\":\"Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/renewasoft.com.tr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/renewasoft.com.tr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"tr\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/renewasoft.com.tr\/#organization\",\"name\":\"Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e\",\"url\":\"https:\/\/renewasoft.com.tr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/renewasoft.com.tr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2025\/03\/images.jpg\",\"contentUrl\":\"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2025\/03\/images.jpg\",\"width\":225,\"height\":225,\"caption\":\"Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e\"},\"image\":{\"@id\":\"https:\/\/renewasoft.com.tr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/renewasoft\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/renewasoft.com.tr\/#\/schema\/person\/f05685cd62b29f0d064e5f59d387054a\",\"name\":\"Ihsan Yoruk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/renewasoft.com.tr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d05934273e42a909e98befa3e449196c40c7edd504a1699027f85cf206f7c1e7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d05934273e42a909e98befa3e449196c40c7edd504a1699027f85cf206f7c1e7?s=96&d=mm&r=g\",\"caption\":\"Ihsan Yoruk\"},\"url\":\"https:\/\/renewasoft.com.tr\/index.php\/author\/ihsan\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Siber G\u00fcvenlik ve Eri\u015fim Kontrol\u00fc: SCADA ve Enerji Sistemlerinde En Kritik Riskler - Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e","description":"SCADA ve enerji sistemlerinde siber g\u00fcvenlik riskleri nelerdir? IAM, a\u011f segmentasyonu ve loglama temelli katmanl\u0131 g\u00fcvenlik rehberi.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/siber-guvenlik-ve-erisim-kontrolu-scada-ve-enerji-sistemlerinde-en-kritik-riskler\/","og_locale":"tr_TR","og_type":"article","og_title":"Siber G\u00fcvenlik ve Eri\u015fim Kontrol\u00fc: SCADA ve Enerji Sistemlerinde En Kritik Riskler - Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e","og_description":"SCADA ve enerji sistemlerinde siber g\u00fcvenlik riskleri nelerdir? IAM, a\u011f segmentasyonu ve loglama temelli katmanl\u0131 g\u00fcvenlik rehberi.","og_url":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/siber-guvenlik-ve-erisim-kontrolu-scada-ve-enerji-sistemlerinde-en-kritik-riskler\/","og_site_name":"Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e","article_published_time":"2026-02-26T22:32:35+00:00","article_modified_time":"2026-02-28T01:20:56+00:00","og_image":[{"width":1536,"height":1024,"url":"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/siber_guvenlik_scada_optimized.jpg","type":"image\/jpeg"}],"author":"Ihsan Yoruk","twitter_card":"summary_large_image","twitter_misc":{"Yazan:":"Ihsan Yoruk","Tahmini okuma s\u00fcresi":"15 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/siber-guvenlik-ve-erisim-kontrolu-scada-ve-enerji-sistemlerinde-en-kritik-riskler\/#article","isPartOf":{"@id":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/siber-guvenlik-ve-erisim-kontrolu-scada-ve-enerji-sistemlerinde-en-kritik-riskler\/"},"author":{"name":"Ihsan Yoruk","@id":"https:\/\/renewasoft.com.tr\/#\/schema\/person\/f05685cd62b29f0d064e5f59d387054a"},"headline":"Siber G\u00fcvenlik ve Eri\u015fim Kontrol\u00fc: SCADA ve Enerji Sistemlerinde En Kritik Riskler","datePublished":"2026-02-26T22:32:35+00:00","dateModified":"2026-02-28T01:20:56+00:00","mainEntityOfPage":{"@id":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/siber-guvenlik-ve-erisim-kontrolu-scada-ve-enerji-sistemlerinde-en-kritik-riskler\/"},"wordCount":3183,"commentCount":0,"publisher":{"@id":"https:\/\/renewasoft.com.tr\/#organization"},"image":{"@id":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/siber-guvenlik-ve-erisim-kontrolu-scada-ve-enerji-sistemlerinde-en-kritik-riskler\/#primaryimage"},"thumbnailUrl":"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/siber_guvenlik_scada_optimized.jpg","keywords":["a\u011f segmentasyonu OT","boundary protection","defense in depth","end\u00fcstriyel IDS","end\u00fcstriyel kontrol sistemleri g\u00fcvenli\u011fi","enerji sistemlerinde siber g\u00fcvenlik","enerji tesislerinde operasyonel s\u00fcreklilik","g\u00fcvenlik izleme ve anomali tespiti","IAM end\u00fcstriyel sistemler","ICS loglama","ICS siber guvenlik","IT-OT ayr\u0131m\u0131","katmanl\u0131 g\u00fcvenlik mimarisi","kimlik ve eri\u015fim y\u00f6netimi","kritik altyap\u0131 g\u00fcvenli\u011fi","MFA \u00e7ok fakt\u00f6rl\u00fc kimlik do\u011frulama","NIST SP 800-82","OT a\u011f g\u00fcvenli\u011fi","PLC g\u00fcvenli\u011fi","privilege escalation riski","Purdue modeli","RTU g\u00fcvenli\u011fi","SCADA g\u00fcvenli\u011fi","SCADA izleme sistemi","SCADA sald\u0131r\u0131 y\u00fczeyi","siber fiziksel sistem g\u00fcvenli\u011fi","siber risk y\u00f6netimi","uzaktan eri\u015fim g\u00fcvenli\u011fi","varsay\u0131lan \u015fifre zafiyeti","VPN g\u00fcvenlik riski"],"articleSection":["Kritik Altyap\u0131 Siber G\u00fcvenli\u011fi ve End\u00fcstriyel Sistem G\u00fcvenli\u011fi"],"inLanguage":"tr","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/siber-guvenlik-ve-erisim-kontrolu-scada-ve-enerji-sistemlerinde-en-kritik-riskler\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/siber-guvenlik-ve-erisim-kontrolu-scada-ve-enerji-sistemlerinde-en-kritik-riskler\/","url":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/siber-guvenlik-ve-erisim-kontrolu-scada-ve-enerji-sistemlerinde-en-kritik-riskler\/","name":"Siber G\u00fcvenlik ve Eri\u015fim Kontrol\u00fc: SCADA ve Enerji Sistemlerinde En Kritik Riskler - Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e","isPartOf":{"@id":"https:\/\/renewasoft.com.tr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/siber-guvenlik-ve-erisim-kontrolu-scada-ve-enerji-sistemlerinde-en-kritik-riskler\/#primaryimage"},"image":{"@id":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/siber-guvenlik-ve-erisim-kontrolu-scada-ve-enerji-sistemlerinde-en-kritik-riskler\/#primaryimage"},"thumbnailUrl":"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/siber_guvenlik_scada_optimized.jpg","datePublished":"2026-02-26T22:32:35+00:00","dateModified":"2026-02-28T01:20:56+00:00","description":"SCADA ve enerji sistemlerinde siber g\u00fcvenlik riskleri nelerdir? IAM, a\u011f segmentasyonu ve loglama temelli katmanl\u0131 g\u00fcvenlik rehberi.","breadcrumb":{"@id":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/siber-guvenlik-ve-erisim-kontrolu-scada-ve-enerji-sistemlerinde-en-kritik-riskler\/#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/siber-guvenlik-ve-erisim-kontrolu-scada-ve-enerji-sistemlerinde-en-kritik-riskler\/"]}]},{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/siber-guvenlik-ve-erisim-kontrolu-scada-ve-enerji-sistemlerinde-en-kritik-riskler\/#primaryimage","url":"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/siber_guvenlik_scada_optimized.jpg","contentUrl":"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2026\/02\/siber_guvenlik_scada_optimized.jpg","width":1536,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/renewasoft.com.tr\/index.php\/tr\/2026\/02\/26\/siber-guvenlik-ve-erisim-kontrolu-scada-ve-enerji-sistemlerinde-en-kritik-riskler\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Anasayfa","item":"https:\/\/renewasoft.com.tr\/index.php\/tr\/ana-sayfa\/"},{"@type":"ListItem","position":2,"name":"Siber G\u00fcvenlik ve Eri\u015fim Kontrol\u00fc: SCADA ve Enerji Sistemlerinde En Kritik Riskler"}]},{"@type":"WebSite","@id":"https:\/\/renewasoft.com.tr\/#website","url":"https:\/\/renewasoft.com.tr\/","name":"Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e","description":"","publisher":{"@id":"https:\/\/renewasoft.com.tr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/renewasoft.com.tr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"tr"},{"@type":"Organization","@id":"https:\/\/renewasoft.com.tr\/#organization","name":"Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e","url":"https:\/\/renewasoft.com.tr\/","logo":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/renewasoft.com.tr\/#\/schema\/logo\/image\/","url":"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2025\/03\/images.jpg","contentUrl":"https:\/\/renewasoft.com.tr\/wp-content\/uploads\/2025\/03\/images.jpg","width":225,"height":225,"caption":"Renewasoft Enerji ve Yaz\u0131l\u0131m A.\u015e"},"image":{"@id":"https:\/\/renewasoft.com.tr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/renewasoft\/"]},{"@type":"Person","@id":"https:\/\/renewasoft.com.tr\/#\/schema\/person\/f05685cd62b29f0d064e5f59d387054a","name":"Ihsan Yoruk","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/renewasoft.com.tr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d05934273e42a909e98befa3e449196c40c7edd504a1699027f85cf206f7c1e7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d05934273e42a909e98befa3e449196c40c7edd504a1699027f85cf206f7c1e7?s=96&d=mm&r=g","caption":"Ihsan Yoruk"},"url":"https:\/\/renewasoft.com.tr\/index.php\/author\/ihsan\/"}]}},"_links":{"self":[{"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/posts\/3153","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/comments?post=3153"}],"version-history":[{"count":4,"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/posts\/3153\/revisions"}],"predecessor-version":[{"id":3331,"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/posts\/3153\/revisions\/3331"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/media\/3295"}],"wp:attachment":[{"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/media?parent=3153"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/categories?post=3153"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/renewasoft.com.tr\/index.php\/wp-json\/wp\/v2\/tags?post=3153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}