SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Downloaden Sie, um offline zu lesen
Creating a Reliable and
Secure Advanced Distribution
Management System
For Smart Grid Efficiency and Efficacy




Make the most of your energy             SM
Summary

Executive Summary . ................................................................................... p	 1

Introduction ................................................................................................. p 	4

The need for cyber security ......................................................................... p 	6

Security standards and regulatory concerns ................................................ p 	7

An ADMS security strategy .......................................................................... p 	10

NERC CIP ................................................................................................... p 	11

Solution characteristics . .............................................................................. p 	14

Conclusion................................................................................................... p 16
Creating a Reliable and Secure Advanced Distribution Management System




Executive summary

As public utilities strive to build an efficient distribution network, they are looking to
automated solutions. One such solution is the advanced Distribution Management
System (ADMS) that integrates SCADA, DMS and OMS technology, for optimum
performance efficiency. Instead of operating with proprietary protocols on isolated
networks, this approach applies open-system design – and makes security of the
SCADA system paramount.


In the U.S., the National Institute of Standards and Technology (NIST) is leading
the efforts toward establishment of security standards for SCADA networks that
process unclassified information. The North American Electric Reliability Council
(NERC), with oversight by the U.S. Federal Energy Regulatory Commission (FERC)
and governmental authorities in Canada, enforces mandatory cyber security
standards for the bulk power system in North America. Beyond North America,
the International Organization for Standardization (ISO) and the International
Electrotechnical Commission (IEC) maintain the ISO/IEC 27001 Information
Security Management System standard.


It is these standards that make possible the performance efficiency of an
interoperable ADMS open system while actually improving the security of older,
proprietary SCADA/DMS/OMS systems.


The NERC Critical Infrastructure Protection (CIP) guidelines establish best
practices for the minimal level of security required for safe and secure operations
of a modern ADMS solution. They fully describe the system’s security objectives
but leave to the user the choice of technology that best achieves these objectives
for the user’s network. These guidelines describe access control and event
logging, personnel training, maintenance of the electronic security perimeter,
incident reporting and response planning, and security auditing. The utility that
implements an ADMS solution that complies with these guidelines is positioned
not only for operational effectiveness and enterprise-wide efficiency but also
security of operations. It is recommended that the ADMS solution vendor be
actively involved in industry working groups, to support compliance with the latest
developments.


An open-architecture, fully configurable ADMS system meeting NERC CIP
guidelines will offer security at all operational levels, even as the network grows
and software upgrades are applied.




                                                                                                                                          White paper | 01
Creating a Reliable and Secure Advanced Distribution Management System




Introduction

Today, public utilities are looking to optimize distribution performance through
sophisticated Advanced Distribution Management System (ADMS) solutions that
inherently integrate an advanced-technology SCADA with a DMS and Outage
Management System (OMS) — a solution that enables a high-performance
network model and automated control of a very large number of critical resource
functions for efficient distribution. As such, SCADA/DMS/OMS technology
can be an attractive lure for hackers, cyber-criminals and cyber-terrorists; the
same supervisory control and data acquisition (SCADA) system functionality
used to control and manage an information network could be used to blind an
organization to attack, create confusion, provide false information, and prevent
required actions — and wreak havoc on the electric grid, water pumping plant or
oil pipeline.


The security of the SCADA employed in such a broad solution is paramount;
a proprietary, non-adaptable monitoring and control system not designed for
secure operation as part of a comprehensive technology solution is no longer an
unacceptable option.


In this paper, we discuss the security criteria that make a SCADA system —
and any network management solution incorporating the SCADA as a key
component — a secure and reliable control system. Compliance with these
security attributes also facilitates audit, system monitoring, certification and user
accreditation of the control system.




                                                                                                                                        White paper | 02
Creating a Reliable and
Secure Advanced Distribution
Management System
Creating a Reliable and Secure Advanced Distribution Management System




The need for cyber security

In the past, SCADA/DMS/OMS systems ran
proprietary protocols on isolated networks. While
this eliminated a number of potential threats, it also
limited the utility’s access to its own information
and increased the total cost of ownership of data
management. New SCADA/DMS/OMS solutions
embrace industry standards and open-system
design, allowing connection to corporate networks
that are, in turn, connected to the Internet. Access
and information is shared with applications and
authorized users across the entire enterprise —
significantly increasing the threat and vulnerabilities
that must be addressed through security controls.




                                                                                                                White paper | 04
Creating a Reliable and Secure Advanced Distribution Management System




Security standards and regulatory
concerns
Leading industry groups and standards organizations have taken up the cyber security challenge and are
creating guidelines, standards and certifications for the protection of critical IT systems. In many industries,
compliance will be mandatory and will require a signed certification of compliance by a corporate officer.


United States
                                                               certified by an independent third party. The first
The terrorist attacks of September 11th dramatically
                                                               Protection Profiles will apply to the entire SCADA
increased the level of effort, funding and pace of
                                                               community, but industry specific Protection Profiles
developing and implementing certified security
                                                               are likely to follow.
for U.S. industries relying on IT networks for core
functionality. The critical infrastructure industries also   • n October 2002, NIST issued Special Publication
                                                               I
have developed Information Sharing and Analysis                800-37, Guidelines for Security Certification and
Centers (ISACs) on the Internet, where industry                Accreditation of IT Systems. This document
members can securely share information dealing with            specifically mentions utility networks in Section
threats and vulnerabilities.                                   2.2.3, referring to “… utility distribution systems (for
                                                               example, water and electric distribution systems)”.
The National Institute of Standards and
                                                               The Guidelines define three security certification
Technology (NIST) is the U.S. government agency
                                                               levels and the appropriate management, technical
responsible for setting security standards for the
                                                               and operational security controls required to be
protection of unclassified information and networks.
                                                               certified at each level.
NIST, in association with the National Security Agency
(NSA), has formed a Process Control Security                 • n the spring of 2003, NIST issued Special
                                                               I
Requirements Forum to create security standards for            Publication 800-53, Minimum Security Controls
SCADA networks. The Forum includes government                  for Federal Information Technology Systems and
security experts, SCADA vendors and significant                Special Publication 800-53A, Techniques and
participants from the industries that use SCADA                Procedures for the Verification of Security Controls
systems.                                                       in Federal Information Technology Systems.

•  he Forum is following the ISO/IEC 15408
  T                                                          These three NIST endeavors will result in standard
  methodology and is writing Protection Profiles             processes that allow companies to certify and
  specific to SCADA networks. This methodology               accredit their SCADA systems to the appropriate
  provides a security target that can be tested and          security level.


Electric providers in North America
Because of the highly inter-dependent nature of              The North American Electric Reliability Council
the electric grid, a vulnerability at one utility has        (NERC) is the regulatory authority established to
the potential of cascading throughout the grid and           evaluate reliability of the bulk power system in
causing a massive failure. Therefore, the security           North America, subject to oversight by the U.S.
of the electric grid requires the cooperation and            Federal Energy Regulatory Commission (FERC)
vigilance of all participants.                               and governmental authorities in Canada. Among its
                                                             several functions, NERC has developed and enforces




                                                                                                                                            White paper | 05
Creating a Reliable and Secure Advanced Distribution Management System




a set of mandatory cyber security standards as well
as Security Guidelines for the Electricity Sector and a
Vulnerability Assessment Methodology. It participates
in education and training of industry personnel and
provides the compliance checklist allowing each utility
to complete self-certification.


International
Although the international security standards
organizations have developed a number of standards
that can be applied to IT systems, none relate
specifically to SCADA. The Common Criteria, ISO/
IEC 15408, is a very detailed standard that defines
a methodology for actually testing and certifying
system security at one of seven different security
levels. This methodology, rigorous and expensive, has     implement the standardization work requested by
influenced many of the recent IT-specific standards.      the European Commission mandate M/490 for
In 2003, the international Instrumentation, Systems,      standardization of Smart Grid implementation. The
and Automation Society (ISA) developed a SCADA-           following documents and international standards are
specific security standard, the SP-99.                    being analyzed for this group:

Published in October 2005 by the International            •  G2 Report: Report of the Task Force Smart
                                                            E
Organization for Standardization (ISO) and the             Grid Expert Group 2 on “Essential Regulatory
International Electrotechnical Commission (IEC), ISO/      Requirements and Recommendations for Data
IEC 27001 is an Information Security Management            Handling, Data Safety, and Consumer Protection.”
System (ISMS) standard that is part of the growing
ISO/IEC 27000 family of standards. It is officially       •  SO Joint Working Group Report: CEN/CENELEC/
                                                            E
named ISO/IEC 27001:2005 Information technology            ETSI Joint Working Group on standards for Smart
- Security techniques - Information security               Grid Report (chapter 5.1.5 Smart Grid Information
management systems - Requirements. As a formal             Security).
specification, the ISO/IEC 27001 standard mandates
specific requirements for achieving information           •  ISTIR-7628: US non-prescriptive
                                                            N
security under explicit management control.                recommendations for Smart Grid Cyber Security.
Organizations that claim to have adopted ISO/
IEC 27001 can, therefore, be formally audited and         •  ERC/CIP: mandatory standards issued by NERC
                                                            N
certified compliant with the standard.                     (North-American Electrical Reliability Corporation) to
                                                           protect critical infrastructures.
More recently, the Working group for Smart Grid
Information Security (WG SGIS), part of the Smart         • EC 62351: IEC 62351 defines explicit security
                                                            I
Grid coordination group, was established up by             measures in the context of energy automation, such
the European Standards Organizations (ESOs) to             as for IP-based and serial protocols.




                                                                                                                                    White paper | 06
Creating a Reliable and Secure Advanced Distribution Management System




• SO/IEC 27001: “Information technology – Security
  I
 techniques – Information security management
 systems – Requirements.”


• SO/IEC 27002: ISO/IEC 27002: “Information
  I
 technology – Security techniques – Code of
 practice for information security management,”
 which identifies best practices recommendations
 for information security management.




                                                                                                           White paper | 07
Creating a Reliable and Secure Advanced Distribution Management System




An ADMS security strategy

The modern ADMS must provide the cost,                     operating system, and the resulting knowledge,
performance and interoperability advantages of an          experience and security components can be
open system, while actually improving the security         extended to secure the SCADA/DMS/OMS network
offered by older, proprietary SCADA/DMS/OMS                and lower the total cost of ownership; see Figure 1.
systems. System administrators can implement               This security framework includes:
security standards that have passed a rigorous peer
review, such as IPSec, SSL, Kerberos, and X.509            •  ingle sign-on to improve user experience
                                                             S
digital certificates. Not only does this standardization
secure the system, eliminating the need to review a        •  trong authentication (Kerberos, RSA keys) to
                                                             S
complex, proprietary security protocol makes security        eliminate most of the scope of security password
audit, certification and accreditation much easier,          problems
and, consequently, more practical and effective.
                                                           •  ole-based access control for user authorization
                                                             R
Built on open standards and component flexibility, the
ADMS solution takes full advantage of the e-business       •  ighly granular Active Directory policy configuration,
                                                             H
era, elevates the integrated SCADA/DMS/OMS                   secured at installation
system to new levels of enterprise integration, and
readies the utility for tomorrow’s upgrades.               •  uthentication-everywhere model
                                                             A


A key part of the architecture of such a flexible and      •  ncrypted communications (IPSec, SSL) for data
                                                             E
extendable solution is the use of Windows Server™            confidentiality
integrated server software. This architecture provides
numerous tools and security options that security          •  ublic key infrastructure (PKI) to automate security
                                                             P
administrators are deploying for their internal network      management (X.509 digital certificates)



           Browser hosted                                                      Standalone
            applications                                                       applications

      Browser and IIS Security                                          DMS Common Security
     Application Pool Integrated          DMS Authentication Manager, DMS Principal Authorization Policy, DMS Identity,
           Authentication                      DMS Post Authentication and Post Authorization Request events

                         ASP .NET Security                              Windows Communication Foundation Security
            Windows Authentication, Access Control                       Windows Authentication, Access Control, Auditing

                                                      Common Language Runtime Security
                                                             Code Access Security

                                                        Core Operating System Security
                                               /GS Compilation, Windows API (Logon User, SSPI)


Figure 1 . ADMS security framework.


                                                                                                                                     White paper | 08
Creating a Reliable and Secure Advanced Distribution Management System




NERC CIP

The NERC Critical Infrastructure Protection (CIP)          •  hat CIP does not do. CIP does not prescribe or
                                                             W
guidelines, generally accepted by electric energy           specify the technologies to be deployed to meet
providers worldwide, describe how a modern ADMS             secure operational goals. It defines objectives,
solution must respond for safe and secure operation.        not how the user must achieve them. With the
First, let’s clarify the main objectives of these           responsibility of meeting secure operations
guidelines —                                                objectives, the user also has the choice of which
                                                            technology will best serve its needs in meeting
•  hat CIP does. CIP provides general security
  W                                                         those objectives.
  guidance toward achieving the minimal level of
  security required for safe and secure operations.



Brief description of CIP guidelines
The NERC CIP document addresses a broad range              •  ecurity of dial-up access
                                                             S
of Critical Cyber Asset (CCA) and Cyber Security
issues; here, we very briefly review six of the CIP        •  ccess denied by default
                                                             A
guidelines that apply to operation of control rooms
and electric network field devices. The full text of the   • 
                                                             Enabling and disabling ports or functions deemed
NERC CIP standard can be found at                           not needed
http://www.nerc.com.
                                                           •  ppropriate-use banner
                                                             A
CIP-003 Security Management Controls describes
the development of a cyber-security policy and             •  onitoring, logging and warnings for user access or
                                                             M
documentation of that policy in a way that it can be        attempted access
updated and that all staff is aware of the policy. It
also discusses management of personnel who have            CIP-006 Physical Security discusses physical
access to the CCAs and identification of users with        accessibility to equipment, including:
different privileges, roles and responsibilities.
                                                           • 
                                                             Mounting equipment in lockable enclosures
CIP-004 Personnel and Training identifies the
personnel training and awareness recommended               •  emote control of locks
                                                             R
for supporting security-related operations and
procedures. It cites CCA user identification lists that    •  ccess alarms indicating a door or gate is open
                                                             A

are reviewed periodically and can be modified to
                                                           •  ard keys, video cameras, etc.
                                                             C
change both users and user privileges.

                                                           •  ser logged in and failed login attempts
                                                             U
CIP-005 Electronic Security Perimeter(s) deals
with identification and protection of ESP access
points and communications. While encryption is not
identified specifically as a guideline for ESP access,
CIP-005 does speak to:




                                                                                                                                     White paper | 09
Creating a Reliable and Secure Advanced Distribution Management System




CIP-007 Systems Security Management deals                   •  nti-virus and malware protection — driven by the
                                                              A
with operating issues such as security patches,              operating system
virus protection, vendor releases and event logging.
References to device security reinforce CIP-005             CIP-008 Incident Reporting and Response
concepts:                                                   Planning relates to the managing and handling of
                                                            reports and logs. While collecting and storing logs for
•  bility to enable or disable unused or unneeded
  A                                                         historical reference is necessary, how that retention
 ports and services — or compensating factor that           is done is determined by the hardware and the
 will mitigate risk, such as physical security              organization’s capabilities.


•  ecurity patches and firmware upgrades
  S



NERC CIP alignment
Together, the CIP guidelines address eight different        •  dministrative access not required for typical
                                                              A
criteria related to a secure ADMS framework:                 operations — only for maintenance and
User Controls, Access Control, Electronic Security           modification
Perimeter, System Logging, Personnel Termination/
Privilege Changes, Security Software Management,              
                                                            • Passwords managed from a central location
Alerts and Notifications, and Training. The following
identifies the framework features that, working closely     Access Control. CIP-003, CIP-004 and CIP-
with the SCADA/DMS/OMS infrastructure, help meet            005 describe these characteristics related to user
these criteria and contribute to the ADMS security          authentication and account setup:
strategy described earlier.
                                                            •  ecure authentication (one or multi-factor)
                                                              S
User Controls. CIP-003, CIP-004 and CIP-007
identify characteristics of the permissions assigned        •  eparation of duties-based user model
                                                              S
to each user to perform certain functions within the
system:                                                     •  ighly configurable permissions structure
                                                              H


•  nique passwords for each user
  U                                                           
                                                            • No ‘back doors’ or maintenance channels


•  ole-based Access Controls
  R                                                           
                                                            • All default user accounts documented and provided
                                                              on request
• 
  Principle of Least Privilege (PoLP) architecture
                                                            •  ser access may be controlled based on time of
                                                              U
•  ranular audit capabilities
  G                                                           shift or isolated to only specific workstations


•  entralized user store
  C                                                         •  trong passwords enforced by the operating
                                                              S
                                                              system
•  pplication restrictions available on a per-user basis
  A
 and/or by console basis                                      
                                                            • Password change policies enforced


                                                            •  ser-configurable banners available
                                                              U




                                                                                                                                       White paper | 10
Creating a Reliable and Secure Advanced Distribution Management System




Electronic Security Perimeter. CIP-003, CIP-005           Personnel Termination/Privilege Changes. CIP-
and CIP-007 relate the issues to be considered for a      004 and CIP-007 speak to capabilities necessary
valid security perimeter around the CCA:                  regarding user accounts:


  
•  onitoring and logging of all access
  M                                                         
                                                          • User accounts can be revoked by administrator


•  apable of integrating with off-the-shelf access
  C                                                       •  ser accounts can be “downgraded” to lower
                                                            U
  control devices or VPNs to extend single-sign-on          authority


•  ncryption of communications with remote clients
  E                                                       Security Software Management. CIP-007 cites the
  or sites                                                features needed for operating system patches and
                                                          antivirus updates:
•  ingle-port communications through perimeter with
  S
  external systems                                          
                                                          • Security patch management program in place


•  oftware restrictions available for non-
  S                                                       •  S multiple patch management technologies
                                                            O
  administrative users                                      supported


•  ommunications inside the perimeter can be
  C                                                         
                                                          • Anti-virus/anti-malware applications supported on
  secured through signing end pervasive encryption          all platforms and hosts


•  onfigurable port usage
  C                                                       •  endor security testing performed on realistic
                                                            V
                                                            environments and system which accurately reflect
System Logging. CIP-003, CIP-004, CIP-007 and               real-world conditions
CIP-008 all refer to this function as it relates to the
audit requirements of the system:                         Alerts and Notifications. CIP-005, CIP-007 and
                                                          CIP-008 all refer to the detection of failed attempts to
  
• All access attempts securely logged through the         access the system:
  operating system
                                                            
                                                          • Unauthorized logon attempts logged
• ndividual privilege uses logged
  I
                                                          Training. CIP-004 describes specific training tasks
•  ser account management and change control in
  U                                                       during implementation and subsequent maintenance
  place and logged                                        of the system:

•
 Modifications to SCADA databases logged
                                                        •  ecurity concepts are covered in standard training
                                                            S
                                                            courses
•  bility to send logs to central server backup for
  A
 aggregation purposes                                       
                                                          • Security controls are highlighted and their use is
                                                            covered in standard training courses
•  onfigurable log lifetimes and log export
  C
  capabilities                                            •  CADA security-specific training is available for
                                                            S
                                                            additional depth of knowledge




                                                                                                                                    White paper | 11
Creating a Reliable and Secure Advanced Distribution Management System




Solution characteristics

The utility looking to establish a robust, secure and reliable ADMS solution that will meet both current and
future needs should target a system that —


Complies with NERC CIP and NISTIR 7628 guidelines
•  ccess control and event logging — A system
  A                                                          an operator’s access to only those devices that fall
  based on the Windows® operating system or other            under his or her jurisdiction.
  platform with inherent access control capabilities
  prevents accidental or malicious acts from affecting      
                                                          • Electronic Security Perimeter — Network Model
  the system. Only authorized personnel can access           Promotion in an established ESP environment
  services; and all file access, permission usage            allows secure update without threatening the
  and alterations to security policies are logged and        system’s operational capacity. The process includes
  can be tracked for auditing purposes. Host-based           thoroughly identifying access points, monitoring
  firewalls on every machine minimize the threat             transferred data and enforcing approval from
  surface.                                                   an authorized entity located in the operational
                                                             environment. This approach eliminates the
  Look for a system that locks down operator                 possibility of automatic updates with respect to the
  accounts to prevent any user access beyond                 established ESP.
  the control room user interface, as well as
  the installation of unauthorized software. VPN          •  ecurity Auditing — Each system should be
                                                            S
  connections allow users to securely access                 audited before deployment to assure every change
  the system network from the insecure public                in databases and network model is logged with
  and corporate infrastructure for management,               user, timestamp and console annotations.
  maintenance and operations.
                                                          Reflects ongoing vendor engagement with industry
  Also, highly granular asset-based access control        working groups like the Cyber Security Coordination
  supports all operational requirements while limiting    Task Group (SGIP) and Gridwise Alliance, to support
                                                          compliance with the latest industry developments.


Represents commitment to product security
•  usiness requirements and control system
  B                                                          The solution should remove all applications not
  requirements — IPSec encryption capability                 required for the successful operation of the SCADA
  preserves data integrity and confidentiality for           system.
  communications between servers and workstations
  without the need for altering operational               •  esign and architect with future requirements
                                                            D
  procedures.                                                in mind — The solution must reflect a dedication to
                                                             scalability and extensibility.
  Required ports open on servers should be
  screened from external access through the use of
  properly configured routers and network firewalls.




                                                                                                                                      White paper | 12
+
                                                        Creating a Reliable and Secure Advanced Distribution Management System




Offers out-of-the-box                                          Schneider Electric’s design for security
adaptable, secure systems                                      and reliability
  
• No back doors — The system should easily
 accept any major authentication technology, such
 as biometrics, persistent smartcards and access               The distributed architecture of Schneider Electric’s
                                                               ADMS solution and network model allows both
 tokens, and allow central access control at a user/
                                                               primary and redundant backup control centers with
 machine policy level so that an administrator can             full access to the assets, along with regional control
 make use of available tools.                                  centers with access to the assets in their respective
                                                               regions.
•  hard-coded passwords — A system with
  
  No
 full configurability allows strong, default password          This DistribuSys design enables flexible control
 complexity, a configurable ‘Failed Login’ threshold           strategies with deployment at zone levels:
                                                               •  ecure Zone or Production — used for real-time
                                                                 S
 and enforcement of password history. A feature
                                                                 operations, with access only by dispatchers,
 such as Single-Sign-On authentication technology                supervisors and administrators
 allows a user to access the system through a single           • 
                                                                 Decision Support Zone — used for monitoring,
 complex password at the system platform level,                  reporting and exhaustive “what if” analysis, with
 allowing administrators to make use of greater                  no impact on the real-time system.
 password complexity.                                          • 
                                                                 Test and Staging Zone — used for software
                                                                 update testing, network model staging and QA
                                                                 before deployment.
•  ecurity lifecycle management — A support
  S                                                            •  isaster Recovery — closely follows real time and
                                                                 D
 program that rapidly reviews, tests and approves                ready to take over in case of serious failure. This
 security updates will maximize system security while            zone is typically at a separate building.
 minimizing the risk of upgrade-induced issues. The
 solution should be configurable for industry-leading          DistribuSys architecture can limit access and
 anti-virus software packages.                                 control of the most critical assets to the primary
                                                               and backup control center, which often reflect more
                                                               robust physical access control, more staffing and
                                                               enhanced security monitoring. An administrator
                                                               can be prevented from configuring aspects of the
                                                               database at a regional control center, but allowed
                                                               to perform this action at the primary control center.
                                                               An operator at the primary control center can be
                                                               allowed to view the entire system, but allowed
                                                               to view only localized assets at a regional control
                                                               center.




                                                                                                             White paper | 13
Creating a Reliable and Secure Advanced Distribution Management System




Conclusion

The ‘security through obscurity’ argument supporting proprietary SCADA systems
never was the option of choice of security professionals. In today’s Smart Grid
environment requiring effective integration of SCADA with other information
management systems, open-architecture technology designed with appropriate
features is necessary not only for proper performance and enterprise efficiency,
but also for the security necessary at all levels to assure the safety of critical
infrastructure assets.




                                                                                                                                          White paper | 07
©2012 Schneider Electric. All rights reserved.




Schneider Electric USA, Inc.
   4701 Royal Vista Circle
   Fort Collins, CO 80528
   Phone:  -866-537-1091
           1
   	      + (34) 9-17-14-70-02
   Fax: 1-970-223-5577
   www.schneider-electric.com/us
                                   June 2012

Weitere ähnliche Inhalte

Was ist angesagt?

Maximize your business and machine performance
Maximize your business and machine performanceMaximize your business and machine performance
Maximize your business and machine performanceSchneider Electric
 
Understanding Open Protocols in Building Automation
Understanding Open Protocols in Building AutomationUnderstanding Open Protocols in Building Automation
Understanding Open Protocols in Building AutomationSchneider Electric
 
Measurement validation peak load reduction
Measurement validation peak load reductionMeasurement validation peak load reduction
Measurement validation peak load reductionSchneider Electric
 
Industrial Control System Cyber Security and the Employment of Industrial Fir...
Industrial Control System Cyber Security and the Employment of Industrial Fir...Industrial Control System Cyber Security and the Employment of Industrial Fir...
Industrial Control System Cyber Security and the Employment of Industrial Fir...Schneider Electric
 
Integrated Control and Safety - Assessing the Benefits; Weighing the Risks
Integrated Control and Safety - Assessing the Benefits; Weighing the RisksIntegrated Control and Safety - Assessing the Benefits; Weighing the Risks
Integrated Control and Safety - Assessing the Benefits; Weighing the RisksSchneider Electric
 
Preparing for the Future: How Asset Management Will Evolve in the Age of Smar...
Preparing for the Future: How Asset Management Will Evolve in the Age of Smar...Preparing for the Future: How Asset Management Will Evolve in the Age of Smar...
Preparing for the Future: How Asset Management Will Evolve in the Age of Smar...Schneider Electric
 
Essential Elements of Data Center Facility Operations
Essential Elements of Data Center Facility OperationsEssential Elements of Data Center Facility Operations
Essential Elements of Data Center Facility OperationsSchneider Electric
 
The Software-Defined Data Center and it’s impact on the physical infrastruc...
The Software-Defined Data  Center and it’s impact on the  physical infrastruc...The Software-Defined Data  Center and it’s impact on the  physical infrastruc...
The Software-Defined Data Center and it’s impact on the physical infrastruc...Schneider Electric
 
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...Schneider Electric
 
Security and smart grid what you need to know john chowdhury 2012 final
Security and smart grid what you need to know   john chowdhury 2012 finalSecurity and smart grid what you need to know   john chowdhury 2012 final
Security and smart grid what you need to know john chowdhury 2012 finalJohn Chowdhury
 
Smart Grid Security by Falgun Rathod
Smart Grid Security by Falgun RathodSmart Grid Security by Falgun Rathod
Smart Grid Security by Falgun RathodClubHack
 
Process Automation - The Future
Process Automation  - The FutureProcess Automation  - The Future
Process Automation - The FutureSchneider Electric
 
Cyber Security resilience - what's in a number? The real threat to industrial...
Cyber Security resilience - what's in a number? The real threat to industrial...Cyber Security resilience - what's in a number? The real threat to industrial...
Cyber Security resilience - what's in a number? The real threat to industrial...Schneider Electric
 
Essential Elements of Data Center Facility Operations
Essential Elements of Data Center Facility OperationsEssential Elements of Data Center Facility Operations
Essential Elements of Data Center Facility OperationsSchneider Electric
 
Critical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiCritical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiClubHack
 
Data center
Data centerData center
Data centergssmedia
 

Was ist angesagt? (20)

Maximize your business and machine performance
Maximize your business and machine performanceMaximize your business and machine performance
Maximize your business and machine performance
 
Understanding Open Protocols in Building Automation
Understanding Open Protocols in Building AutomationUnderstanding Open Protocols in Building Automation
Understanding Open Protocols in Building Automation
 
Ensuring your plant is secure
Ensuring your plant is secureEnsuring your plant is secure
Ensuring your plant is secure
 
DTN ProphetX® - At a Glance
DTN ProphetX® - At a GlanceDTN ProphetX® - At a Glance
DTN ProphetX® - At a Glance
 
Measurement validation peak load reduction
Measurement validation peak load reductionMeasurement validation peak load reduction
Measurement validation peak load reduction
 
Industrial Control System Cyber Security and the Employment of Industrial Fir...
Industrial Control System Cyber Security and the Employment of Industrial Fir...Industrial Control System Cyber Security and the Employment of Industrial Fir...
Industrial Control System Cyber Security and the Employment of Industrial Fir...
 
Integrated Control and Safety - Assessing the Benefits; Weighing the Risks
Integrated Control and Safety - Assessing the Benefits; Weighing the RisksIntegrated Control and Safety - Assessing the Benefits; Weighing the Risks
Integrated Control and Safety - Assessing the Benefits; Weighing the Risks
 
Preparing for the Future: How Asset Management Will Evolve in the Age of Smar...
Preparing for the Future: How Asset Management Will Evolve in the Age of Smar...Preparing for the Future: How Asset Management Will Evolve in the Age of Smar...
Preparing for the Future: How Asset Management Will Evolve in the Age of Smar...
 
Essential Elements of Data Center Facility Operations
Essential Elements of Data Center Facility OperationsEssential Elements of Data Center Facility Operations
Essential Elements of Data Center Facility Operations
 
The Software-Defined Data Center and it’s impact on the physical infrastruc...
The Software-Defined Data  Center and it’s impact on the  physical infrastruc...The Software-Defined Data  Center and it’s impact on the  physical infrastruc...
The Software-Defined Data Center and it’s impact on the physical infrastruc...
 
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
 
Security and smart grid what you need to know john chowdhury 2012 final
Security and smart grid what you need to know   john chowdhury 2012 finalSecurity and smart grid what you need to know   john chowdhury 2012 final
Security and smart grid what you need to know john chowdhury 2012 final
 
Smart Grid Security by Falgun Rathod
Smart Grid Security by Falgun RathodSmart Grid Security by Falgun Rathod
Smart Grid Security by Falgun Rathod
 
Process Automation - The Future
Process Automation  - The FutureProcess Automation  - The Future
Process Automation - The Future
 
Cyber Security resilience - what's in a number? The real threat to industrial...
Cyber Security resilience - what's in a number? The real threat to industrial...Cyber Security resilience - what's in a number? The real threat to industrial...
Cyber Security resilience - what's in a number? The real threat to industrial...
 
Essential Elements of Data Center Facility Operations
Essential Elements of Data Center Facility OperationsEssential Elements of Data Center Facility Operations
Essential Elements of Data Center Facility Operations
 
Critical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiCritical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh Belgi
 
Attom Micro Data Center Brochure
Attom Micro Data Center BrochureAttom Micro Data Center Brochure
Attom Micro Data Center Brochure
 
Data center
Data centerData center
Data center
 
SCADA of the Future
SCADA of the FutureSCADA of the Future
SCADA of the Future
 

Andere mochten auch

Using Advanced Weather Intelligence to Restore Power Faster
Using Advanced Weather Intelligence to Restore Power FasterUsing Advanced Weather Intelligence to Restore Power Faster
Using Advanced Weather Intelligence to Restore Power FasterSchneider Electric
 
Transform energy into an asset: Turning energy dilemmas into opportunities
Transform energy into an asset: Turning energy dilemmas into opportunitiesTransform energy into an asset: Turning energy dilemmas into opportunities
Transform energy into an asset: Turning energy dilemmas into opportunitiesSchneider Electric
 
[Case study] Benton Public Utility District: Reducing labor costs while impro...
[Case study] Benton Public Utility District: Reducing labor costs while impro...[Case study] Benton Public Utility District: Reducing labor costs while impro...
[Case study] Benton Public Utility District: Reducing labor costs while impro...Schneider Electric
 
Optimizing machine, line, and process efficiency in manufacturing operations
Optimizing machine, line, and process efficiency in manufacturing operationsOptimizing machine, line, and process efficiency in manufacturing operations
Optimizing machine, line, and process efficiency in manufacturing operationsSchneider Electric
 
Application Note: Maintenance Decision Support System (MDSS) for Winter Road ...
Application Note: Maintenance Decision Support System (MDSS) for Winter Road ...Application Note: Maintenance Decision Support System (MDSS) for Winter Road ...
Application Note: Maintenance Decision Support System (MDSS) for Winter Road ...Schneider Electric
 
Bringing Sustainable Efficiency to Wind Power
Bringing Sustainable Efficiency to Wind PowerBringing Sustainable Efficiency to Wind Power
Bringing Sustainable Efficiency to Wind PowerSchneider Electric
 
Effect on Substation Engineering Costs of IEC61850 & System Configuration Tools
Effect on Substation Engineering Costs of IEC61850 & System Configuration ToolsEffect on Substation Engineering Costs of IEC61850 & System Configuration Tools
Effect on Substation Engineering Costs of IEC61850 & System Configuration ToolsSchneider Electric
 
[Case study] DONG Energy: Improving the bottom line and getting better data q...
[Case study] DONG Energy: Improving the bottom line and getting better data q...[Case study] DONG Energy: Improving the bottom line and getting better data q...
[Case study] DONG Energy: Improving the bottom line and getting better data q...Schneider Electric
 
[Pipeline Support Solutions] Kenya Pipeline Company Case Study
[Pipeline Support Solutions] Kenya Pipeline Company Case Study[Pipeline Support Solutions] Kenya Pipeline Company Case Study
[Pipeline Support Solutions] Kenya Pipeline Company Case StudySchneider Electric
 
[FAQs] Best Practices for IT/OT Convergence
[FAQs] Best Practices for IT/OT Convergence[FAQs] Best Practices for IT/OT Convergence
[FAQs] Best Practices for IT/OT ConvergenceSchneider Electric
 
The Advanced Distribution Management System (ADMS)
The Advanced Distribution Management System (ADMS)The Advanced Distribution Management System (ADMS)
The Advanced Distribution Management System (ADMS)Schneider Electric
 
Oil and gas upstream solutions
Oil and gas upstream solutionsOil and gas upstream solutions
Oil and gas upstream solutionsSchneider Electric
 
[Webinar Slides] Advanced distribution management system integration of renew...
[Webinar Slides] Advanced distribution management system integration of renew...[Webinar Slides] Advanced distribution management system integration of renew...
[Webinar Slides] Advanced distribution management system integration of renew...Schneider Electric
 

Andere mochten auch (16)

Using Advanced Weather Intelligence to Restore Power Faster
Using Advanced Weather Intelligence to Restore Power FasterUsing Advanced Weather Intelligence to Restore Power Faster
Using Advanced Weather Intelligence to Restore Power Faster
 
Transform energy into an asset: Turning energy dilemmas into opportunities
Transform energy into an asset: Turning energy dilemmas into opportunitiesTransform energy into an asset: Turning energy dilemmas into opportunities
Transform energy into an asset: Turning energy dilemmas into opportunities
 
Electronic health records
Electronic health recordsElectronic health records
Electronic health records
 
[Case study] Benton Public Utility District: Reducing labor costs while impro...
[Case study] Benton Public Utility District: Reducing labor costs while impro...[Case study] Benton Public Utility District: Reducing labor costs while impro...
[Case study] Benton Public Utility District: Reducing labor costs while impro...
 
Optimizing machine, line, and process efficiency in manufacturing operations
Optimizing machine, line, and process efficiency in manufacturing operationsOptimizing machine, line, and process efficiency in manufacturing operations
Optimizing machine, line, and process efficiency in manufacturing operations
 
Application Note: Maintenance Decision Support System (MDSS) for Winter Road ...
Application Note: Maintenance Decision Support System (MDSS) for Winter Road ...Application Note: Maintenance Decision Support System (MDSS) for Winter Road ...
Application Note: Maintenance Decision Support System (MDSS) for Winter Road ...
 
Bringing Sustainable Efficiency to Wind Power
Bringing Sustainable Efficiency to Wind PowerBringing Sustainable Efficiency to Wind Power
Bringing Sustainable Efficiency to Wind Power
 
Effect on Substation Engineering Costs of IEC61850 & System Configuration Tools
Effect on Substation Engineering Costs of IEC61850 & System Configuration ToolsEffect on Substation Engineering Costs of IEC61850 & System Configuration Tools
Effect on Substation Engineering Costs of IEC61850 & System Configuration Tools
 
[Case study] DONG Energy: Improving the bottom line and getting better data q...
[Case study] DONG Energy: Improving the bottom line and getting better data q...[Case study] DONG Energy: Improving the bottom line and getting better data q...
[Case study] DONG Energy: Improving the bottom line and getting better data q...
 
[Pipeline Support Solutions] Kenya Pipeline Company Case Study
[Pipeline Support Solutions] Kenya Pipeline Company Case Study[Pipeline Support Solutions] Kenya Pipeline Company Case Study
[Pipeline Support Solutions] Kenya Pipeline Company Case Study
 
[FAQs] Best Practices for IT/OT Convergence
[FAQs] Best Practices for IT/OT Convergence[FAQs] Best Practices for IT/OT Convergence
[FAQs] Best Practices for IT/OT Convergence
 
The Value of Enterprise GIS
The Value of Enterprise GISThe Value of Enterprise GIS
The Value of Enterprise GIS
 
Business intelligence
Business intelligence Business intelligence
Business intelligence
 
The Advanced Distribution Management System (ADMS)
The Advanced Distribution Management System (ADMS)The Advanced Distribution Management System (ADMS)
The Advanced Distribution Management System (ADMS)
 
Oil and gas upstream solutions
Oil and gas upstream solutionsOil and gas upstream solutions
Oil and gas upstream solutions
 
[Webinar Slides] Advanced distribution management system integration of renew...
[Webinar Slides] Advanced distribution management system integration of renew...[Webinar Slides] Advanced distribution management system integration of renew...
[Webinar Slides] Advanced distribution management system integration of renew...
 

Ähnlich wie Create Secure ADMS for Smart Grid Efficiency

SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonPatricia M Watson
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilitiesNirmal Thaliyil
 
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...
Challenges and Solution to Mitigate the cyber-attack  on Critical Infrastruct...Challenges and Solution to Mitigate the cyber-attack  on Critical Infrastruct...
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...Abhishek Goel
 
Access Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance EssayAccess Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance EssayDotha Keller
 
White paper scada (2)
White paper scada (2)White paper scada (2)
White paper scada (2)Ivan Carmona
 
Industrial control systems cybersecurity.ppt
Industrial control systems cybersecurity.pptIndustrial control systems cybersecurity.ppt
Industrial control systems cybersecurity.pptDelforChacnCornejo
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of buildingCharles "Chuck" Speicher Jr.
 
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksCybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksGeorge Wainblat
 
Dr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational AwarenessDr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational AwarenessDr Dev Kambhampati
 
NIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesNIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesDr Dev Kambhampati
 
Project Topics on Network Security
Project Topics on Network SecurityProject Topics on Network Security
Project Topics on Network SecurityPhdtopiccom
 
Encryption Security in SCADA Networks
Encryption Security in SCADA NetworksEncryption Security in SCADA Networks
Encryption Security in SCADA NetworksIJRES Journal
 
IJSRED-V2I2P15
IJSRED-V2I2P15IJSRED-V2I2P15
IJSRED-V2I2P15IJSRED
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XPrime Infoserv
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of buildingChuck Speicher
 
Reports on Industrial Control Systems’ Cyber Security
Reports on Industrial Control Systems’ Cyber SecurityReports on Industrial Control Systems’ Cyber Security
Reports on Industrial Control Systems’ Cyber SecurityA. V. Rajabahadur
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelinesSrishti Ahuja
 

Ähnlich wie Create Secure ADMS for Smart Grid Efficiency (20)

SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilities
 
Cloud Security Solution Overview
Cloud Security Solution OverviewCloud Security Solution Overview
Cloud Security Solution Overview
 
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...
Challenges and Solution to Mitigate the cyber-attack  on Critical Infrastruct...Challenges and Solution to Mitigate the cyber-attack  on Critical Infrastruct...
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...
 
Access Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance EssayAccess Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance Essay
 
White paper scada (2)
White paper scada (2)White paper scada (2)
White paper scada (2)
 
Industrial control systems cybersecurity.ppt
Industrial control systems cybersecurity.pptIndustrial control systems cybersecurity.ppt
Industrial control systems cybersecurity.ppt
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of building
 
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksCybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA Networks
 
Dr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational AwarenessDr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational Awareness
 
NIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesNIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric Utilities
 
CyCron 2016
CyCron 2016CyCron 2016
CyCron 2016
 
Project Topics on Network Security
Project Topics on Network SecurityProject Topics on Network Security
Project Topics on Network Security
 
Encryption Security in SCADA Networks
Encryption Security in SCADA NetworksEncryption Security in SCADA Networks
Encryption Security in SCADA Networks
 
Utilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA NetworksUtilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA Networks
 
IJSRED-V2I2P15
IJSRED-V2I2P15IJSRED-V2I2P15
IJSRED-V2I2P15
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of building
 
Reports on Industrial Control Systems’ Cyber Security
Reports on Industrial Control Systems’ Cyber SecurityReports on Industrial Control Systems’ Cyber Security
Reports on Industrial Control Systems’ Cyber Security
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelines
 

Mehr von Schneider Electric

Secure Power Design Considerations
Secure Power Design ConsiderationsSecure Power Design Considerations
Secure Power Design ConsiderationsSchneider Electric
 
Digital International Colo Club: Attracting Investors
Digital International Colo Club: Attracting InvestorsDigital International Colo Club: Attracting Investors
Digital International Colo Club: Attracting InvestorsSchneider Electric
 
32 phaseo power supplies and transformers briefing
32 phaseo power supplies and transformers briefing 32 phaseo power supplies and transformers briefing
32 phaseo power supplies and transformers briefing Schneider Electric
 
Key Industry Trends, M&A Valuation Trends
Key Industry Trends, M&A Valuation TrendsKey Industry Trends, M&A Valuation Trends
Key Industry Trends, M&A Valuation TrendsSchneider Electric
 
EcoStruxure™ for Cloud & Service Providers
 EcoStruxure™ for Cloud & Service Providers EcoStruxure™ for Cloud & Service Providers
EcoStruxure™ for Cloud & Service ProvidersSchneider Electric
 
Zelio Time Electronic Relay Briefing
Zelio Time Electronic Relay BriefingZelio Time Electronic Relay Briefing
Zelio Time Electronic Relay BriefingSchneider Electric
 
Spacial, Thalassa, ClimaSys Universal enclosures Briefing
Spacial, Thalassa, ClimaSys Universal enclosures BriefingSpacial, Thalassa, ClimaSys Universal enclosures Briefing
Spacial, Thalassa, ClimaSys Universal enclosures BriefingSchneider Electric
 
Relay Control Zelio SSR Briefing
Relay Control Zelio SSR BriefingRelay Control Zelio SSR Briefing
Relay Control Zelio SSR BriefingSchneider Electric
 
Magelis HMI, iPC and software Briefing
Magelis HMI, iPC and software BriefingMagelis HMI, iPC and software Briefing
Magelis HMI, iPC and software BriefingSchneider Electric
 
Where will the next 80% improvement in data center performance come from?
Where will the next 80% improvement in data center performance come from?Where will the next 80% improvement in data center performance come from?
Where will the next 80% improvement in data center performance come from?Schneider Electric
 
EcoStruxure for Intuitive Industries
EcoStruxure for Intuitive IndustriesEcoStruxure for Intuitive Industries
EcoStruxure for Intuitive IndustriesSchneider Electric
 
Systems Integrator Alliance Program 2017
Systems Integrator Alliance Program 2017Systems Integrator Alliance Program 2017
Systems Integrator Alliance Program 2017Schneider Electric
 
EcoStruxure, IIoT-enabled architecture, delivering value in key segments.
EcoStruxure, IIoT-enabled architecture, delivering value in key segments.EcoStruxure, IIoT-enabled architecture, delivering value in key segments.
EcoStruxure, IIoT-enabled architecture, delivering value in key segments.Schneider Electric
 
It's time to modernize your industrial controls with Modicon M580
It's time to modernize your industrial controls with Modicon M580It's time to modernize your industrial controls with Modicon M580
It's time to modernize your industrial controls with Modicon M580Schneider Electric
 
A Practical Guide to Ensuring Business Continuity and High Performance in Hea...
A Practical Guide to Ensuring Business Continuity and High Performance in Hea...A Practical Guide to Ensuring Business Continuity and High Performance in Hea...
A Practical Guide to Ensuring Business Continuity and High Performance in Hea...Schneider Electric
 
Connected Services Study – Facility Managers Respond to IoT
Connected Services Study – Facility Managers Respond to IoTConnected Services Study – Facility Managers Respond to IoT
Connected Services Study – Facility Managers Respond to IoTSchneider Electric
 
Telemecanqiue Cabling and Accessories Briefing
Telemecanqiue Cabling and Accessories BriefingTelemecanqiue Cabling and Accessories Briefing
Telemecanqiue Cabling and Accessories BriefingSchneider Electric
 
Telemecanique Photoelectric Sensors Briefing
Telemecanique Photoelectric Sensors BriefingTelemecanique Photoelectric Sensors Briefing
Telemecanique Photoelectric Sensors BriefingSchneider Electric
 
Telemecanique Limit Switches Briefing
Telemecanique Limit Switches BriefingTelemecanique Limit Switches Briefing
Telemecanique Limit Switches BriefingSchneider Electric
 

Mehr von Schneider Electric (20)

Secure Power Design Considerations
Secure Power Design ConsiderationsSecure Power Design Considerations
Secure Power Design Considerations
 
Digital International Colo Club: Attracting Investors
Digital International Colo Club: Attracting InvestorsDigital International Colo Club: Attracting Investors
Digital International Colo Club: Attracting Investors
 
32 phaseo power supplies and transformers briefing
32 phaseo power supplies and transformers briefing 32 phaseo power supplies and transformers briefing
32 phaseo power supplies and transformers briefing
 
Key Industry Trends, M&A Valuation Trends
Key Industry Trends, M&A Valuation TrendsKey Industry Trends, M&A Valuation Trends
Key Industry Trends, M&A Valuation Trends
 
EcoStruxure™ for Cloud & Service Providers
 EcoStruxure™ for Cloud & Service Providers EcoStruxure™ for Cloud & Service Providers
EcoStruxure™ for Cloud & Service Providers
 
Magelis Basic HMI Briefing
Magelis Basic HMI Briefing Magelis Basic HMI Briefing
Magelis Basic HMI Briefing
 
Zelio Time Electronic Relay Briefing
Zelio Time Electronic Relay BriefingZelio Time Electronic Relay Briefing
Zelio Time Electronic Relay Briefing
 
Spacial, Thalassa, ClimaSys Universal enclosures Briefing
Spacial, Thalassa, ClimaSys Universal enclosures BriefingSpacial, Thalassa, ClimaSys Universal enclosures Briefing
Spacial, Thalassa, ClimaSys Universal enclosures Briefing
 
Relay Control Zelio SSR Briefing
Relay Control Zelio SSR BriefingRelay Control Zelio SSR Briefing
Relay Control Zelio SSR Briefing
 
Magelis HMI, iPC and software Briefing
Magelis HMI, iPC and software BriefingMagelis HMI, iPC and software Briefing
Magelis HMI, iPC and software Briefing
 
Where will the next 80% improvement in data center performance come from?
Where will the next 80% improvement in data center performance come from?Where will the next 80% improvement in data center performance come from?
Where will the next 80% improvement in data center performance come from?
 
EcoStruxure for Intuitive Industries
EcoStruxure for Intuitive IndustriesEcoStruxure for Intuitive Industries
EcoStruxure for Intuitive Industries
 
Systems Integrator Alliance Program 2017
Systems Integrator Alliance Program 2017Systems Integrator Alliance Program 2017
Systems Integrator Alliance Program 2017
 
EcoStruxure, IIoT-enabled architecture, delivering value in key segments.
EcoStruxure, IIoT-enabled architecture, delivering value in key segments.EcoStruxure, IIoT-enabled architecture, delivering value in key segments.
EcoStruxure, IIoT-enabled architecture, delivering value in key segments.
 
It's time to modernize your industrial controls with Modicon M580
It's time to modernize your industrial controls with Modicon M580It's time to modernize your industrial controls with Modicon M580
It's time to modernize your industrial controls with Modicon M580
 
A Practical Guide to Ensuring Business Continuity and High Performance in Hea...
A Practical Guide to Ensuring Business Continuity and High Performance in Hea...A Practical Guide to Ensuring Business Continuity and High Performance in Hea...
A Practical Guide to Ensuring Business Continuity and High Performance in Hea...
 
Connected Services Study – Facility Managers Respond to IoT
Connected Services Study – Facility Managers Respond to IoTConnected Services Study – Facility Managers Respond to IoT
Connected Services Study – Facility Managers Respond to IoT
 
Telemecanqiue Cabling and Accessories Briefing
Telemecanqiue Cabling and Accessories BriefingTelemecanqiue Cabling and Accessories Briefing
Telemecanqiue Cabling and Accessories Briefing
 
Telemecanique Photoelectric Sensors Briefing
Telemecanique Photoelectric Sensors BriefingTelemecanique Photoelectric Sensors Briefing
Telemecanique Photoelectric Sensors Briefing
 
Telemecanique Limit Switches Briefing
Telemecanique Limit Switches BriefingTelemecanique Limit Switches Briefing
Telemecanique Limit Switches Briefing
 

Kürzlich hochgeladen

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 

Kürzlich hochgeladen (20)

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 

Create Secure ADMS for Smart Grid Efficiency

  • 1. Creating a Reliable and Secure Advanced Distribution Management System For Smart Grid Efficiency and Efficacy Make the most of your energy SM
  • 2. Summary Executive Summary . ................................................................................... p 1 Introduction ................................................................................................. p 4 The need for cyber security ......................................................................... p 6 Security standards and regulatory concerns ................................................ p 7 An ADMS security strategy .......................................................................... p 10 NERC CIP ................................................................................................... p 11 Solution characteristics . .............................................................................. p 14 Conclusion................................................................................................... p 16
  • 3. Creating a Reliable and Secure Advanced Distribution Management System Executive summary As public utilities strive to build an efficient distribution network, they are looking to automated solutions. One such solution is the advanced Distribution Management System (ADMS) that integrates SCADA, DMS and OMS technology, for optimum performance efficiency. Instead of operating with proprietary protocols on isolated networks, this approach applies open-system design – and makes security of the SCADA system paramount. In the U.S., the National Institute of Standards and Technology (NIST) is leading the efforts toward establishment of security standards for SCADA networks that process unclassified information. The North American Electric Reliability Council (NERC), with oversight by the U.S. Federal Energy Regulatory Commission (FERC) and governmental authorities in Canada, enforces mandatory cyber security standards for the bulk power system in North America. Beyond North America, the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) maintain the ISO/IEC 27001 Information Security Management System standard. It is these standards that make possible the performance efficiency of an interoperable ADMS open system while actually improving the security of older, proprietary SCADA/DMS/OMS systems. The NERC Critical Infrastructure Protection (CIP) guidelines establish best practices for the minimal level of security required for safe and secure operations of a modern ADMS solution. They fully describe the system’s security objectives but leave to the user the choice of technology that best achieves these objectives for the user’s network. These guidelines describe access control and event logging, personnel training, maintenance of the electronic security perimeter, incident reporting and response planning, and security auditing. The utility that implements an ADMS solution that complies with these guidelines is positioned not only for operational effectiveness and enterprise-wide efficiency but also security of operations. It is recommended that the ADMS solution vendor be actively involved in industry working groups, to support compliance with the latest developments. An open-architecture, fully configurable ADMS system meeting NERC CIP guidelines will offer security at all operational levels, even as the network grows and software upgrades are applied. White paper | 01
  • 4. Creating a Reliable and Secure Advanced Distribution Management System Introduction Today, public utilities are looking to optimize distribution performance through sophisticated Advanced Distribution Management System (ADMS) solutions that inherently integrate an advanced-technology SCADA with a DMS and Outage Management System (OMS) — a solution that enables a high-performance network model and automated control of a very large number of critical resource functions for efficient distribution. As such, SCADA/DMS/OMS technology can be an attractive lure for hackers, cyber-criminals and cyber-terrorists; the same supervisory control and data acquisition (SCADA) system functionality used to control and manage an information network could be used to blind an organization to attack, create confusion, provide false information, and prevent required actions — and wreak havoc on the electric grid, water pumping plant or oil pipeline. The security of the SCADA employed in such a broad solution is paramount; a proprietary, non-adaptable monitoring and control system not designed for secure operation as part of a comprehensive technology solution is no longer an unacceptable option. In this paper, we discuss the security criteria that make a SCADA system — and any network management solution incorporating the SCADA as a key component — a secure and reliable control system. Compliance with these security attributes also facilitates audit, system monitoring, certification and user accreditation of the control system. White paper | 02
  • 5. Creating a Reliable and Secure Advanced Distribution Management System
  • 6. Creating a Reliable and Secure Advanced Distribution Management System The need for cyber security In the past, SCADA/DMS/OMS systems ran proprietary protocols on isolated networks. While this eliminated a number of potential threats, it also limited the utility’s access to its own information and increased the total cost of ownership of data management. New SCADA/DMS/OMS solutions embrace industry standards and open-system design, allowing connection to corporate networks that are, in turn, connected to the Internet. Access and information is shared with applications and authorized users across the entire enterprise — significantly increasing the threat and vulnerabilities that must be addressed through security controls. White paper | 04
  • 7. Creating a Reliable and Secure Advanced Distribution Management System Security standards and regulatory concerns Leading industry groups and standards organizations have taken up the cyber security challenge and are creating guidelines, standards and certifications for the protection of critical IT systems. In many industries, compliance will be mandatory and will require a signed certification of compliance by a corporate officer. United States certified by an independent third party. The first The terrorist attacks of September 11th dramatically Protection Profiles will apply to the entire SCADA increased the level of effort, funding and pace of community, but industry specific Protection Profiles developing and implementing certified security are likely to follow. for U.S. industries relying on IT networks for core functionality. The critical infrastructure industries also • n October 2002, NIST issued Special Publication I have developed Information Sharing and Analysis 800-37, Guidelines for Security Certification and Centers (ISACs) on the Internet, where industry Accreditation of IT Systems. This document members can securely share information dealing with specifically mentions utility networks in Section threats and vulnerabilities. 2.2.3, referring to “… utility distribution systems (for example, water and electric distribution systems)”. The National Institute of Standards and The Guidelines define three security certification Technology (NIST) is the U.S. government agency levels and the appropriate management, technical responsible for setting security standards for the and operational security controls required to be protection of unclassified information and networks. certified at each level. NIST, in association with the National Security Agency (NSA), has formed a Process Control Security • n the spring of 2003, NIST issued Special I Requirements Forum to create security standards for Publication 800-53, Minimum Security Controls SCADA networks. The Forum includes government for Federal Information Technology Systems and security experts, SCADA vendors and significant Special Publication 800-53A, Techniques and participants from the industries that use SCADA Procedures for the Verification of Security Controls systems. in Federal Information Technology Systems. • he Forum is following the ISO/IEC 15408 T These three NIST endeavors will result in standard methodology and is writing Protection Profiles processes that allow companies to certify and specific to SCADA networks. This methodology accredit their SCADA systems to the appropriate provides a security target that can be tested and security level. Electric providers in North America Because of the highly inter-dependent nature of The North American Electric Reliability Council the electric grid, a vulnerability at one utility has (NERC) is the regulatory authority established to the potential of cascading throughout the grid and evaluate reliability of the bulk power system in causing a massive failure. Therefore, the security North America, subject to oversight by the U.S. of the electric grid requires the cooperation and Federal Energy Regulatory Commission (FERC) vigilance of all participants. and governmental authorities in Canada. Among its several functions, NERC has developed and enforces White paper | 05
  • 8. Creating a Reliable and Secure Advanced Distribution Management System a set of mandatory cyber security standards as well as Security Guidelines for the Electricity Sector and a Vulnerability Assessment Methodology. It participates in education and training of industry personnel and provides the compliance checklist allowing each utility to complete self-certification. International Although the international security standards organizations have developed a number of standards that can be applied to IT systems, none relate specifically to SCADA. The Common Criteria, ISO/ IEC 15408, is a very detailed standard that defines a methodology for actually testing and certifying system security at one of seven different security levels. This methodology, rigorous and expensive, has implement the standardization work requested by influenced many of the recent IT-specific standards. the European Commission mandate M/490 for In 2003, the international Instrumentation, Systems, standardization of Smart Grid implementation. The and Automation Society (ISA) developed a SCADA- following documents and international standards are specific security standard, the SP-99. being analyzed for this group: Published in October 2005 by the International • G2 Report: Report of the Task Force Smart E Organization for Standardization (ISO) and the Grid Expert Group 2 on “Essential Regulatory International Electrotechnical Commission (IEC), ISO/ Requirements and Recommendations for Data IEC 27001 is an Information Security Management Handling, Data Safety, and Consumer Protection.” System (ISMS) standard that is part of the growing ISO/IEC 27000 family of standards. It is officially • SO Joint Working Group Report: CEN/CENELEC/ E named ISO/IEC 27001:2005 Information technology ETSI Joint Working Group on standards for Smart - Security techniques - Information security Grid Report (chapter 5.1.5 Smart Grid Information management systems - Requirements. As a formal Security). specification, the ISO/IEC 27001 standard mandates specific requirements for achieving information • ISTIR-7628: US non-prescriptive N security under explicit management control. recommendations for Smart Grid Cyber Security. Organizations that claim to have adopted ISO/ IEC 27001 can, therefore, be formally audited and • ERC/CIP: mandatory standards issued by NERC N certified compliant with the standard. (North-American Electrical Reliability Corporation) to protect critical infrastructures. More recently, the Working group for Smart Grid Information Security (WG SGIS), part of the Smart • EC 62351: IEC 62351 defines explicit security I Grid coordination group, was established up by measures in the context of energy automation, such the European Standards Organizations (ESOs) to as for IP-based and serial protocols. White paper | 06
  • 9. Creating a Reliable and Secure Advanced Distribution Management System • SO/IEC 27001: “Information technology – Security I techniques – Information security management systems – Requirements.” • SO/IEC 27002: ISO/IEC 27002: “Information I technology – Security techniques – Code of practice for information security management,” which identifies best practices recommendations for information security management. White paper | 07
  • 10. Creating a Reliable and Secure Advanced Distribution Management System An ADMS security strategy The modern ADMS must provide the cost, operating system, and the resulting knowledge, performance and interoperability advantages of an experience and security components can be open system, while actually improving the security extended to secure the SCADA/DMS/OMS network offered by older, proprietary SCADA/DMS/OMS and lower the total cost of ownership; see Figure 1. systems. System administrators can implement This security framework includes: security standards that have passed a rigorous peer review, such as IPSec, SSL, Kerberos, and X.509 • ingle sign-on to improve user experience S digital certificates. Not only does this standardization secure the system, eliminating the need to review a • trong authentication (Kerberos, RSA keys) to S complex, proprietary security protocol makes security eliminate most of the scope of security password audit, certification and accreditation much easier, problems and, consequently, more practical and effective. • ole-based access control for user authorization R Built on open standards and component flexibility, the ADMS solution takes full advantage of the e-business • ighly granular Active Directory policy configuration, H era, elevates the integrated SCADA/DMS/OMS secured at installation system to new levels of enterprise integration, and readies the utility for tomorrow’s upgrades. • uthentication-everywhere model A A key part of the architecture of such a flexible and • ncrypted communications (IPSec, SSL) for data E extendable solution is the use of Windows Server™ confidentiality integrated server software. This architecture provides numerous tools and security options that security • ublic key infrastructure (PKI) to automate security P administrators are deploying for their internal network management (X.509 digital certificates) Browser hosted Standalone applications applications Browser and IIS Security DMS Common Security Application Pool Integrated DMS Authentication Manager, DMS Principal Authorization Policy, DMS Identity, Authentication DMS Post Authentication and Post Authorization Request events ASP .NET Security Windows Communication Foundation Security Windows Authentication, Access Control Windows Authentication, Access Control, Auditing Common Language Runtime Security Code Access Security Core Operating System Security /GS Compilation, Windows API (Logon User, SSPI) Figure 1 . ADMS security framework. White paper | 08
  • 11. Creating a Reliable and Secure Advanced Distribution Management System NERC CIP The NERC Critical Infrastructure Protection (CIP) • hat CIP does not do. CIP does not prescribe or W guidelines, generally accepted by electric energy specify the technologies to be deployed to meet providers worldwide, describe how a modern ADMS secure operational goals. It defines objectives, solution must respond for safe and secure operation. not how the user must achieve them. With the First, let’s clarify the main objectives of these responsibility of meeting secure operations guidelines — objectives, the user also has the choice of which technology will best serve its needs in meeting • hat CIP does. CIP provides general security W those objectives. guidance toward achieving the minimal level of security required for safe and secure operations. Brief description of CIP guidelines The NERC CIP document addresses a broad range • ecurity of dial-up access S of Critical Cyber Asset (CCA) and Cyber Security issues; here, we very briefly review six of the CIP • ccess denied by default A guidelines that apply to operation of control rooms and electric network field devices. The full text of the • Enabling and disabling ports or functions deemed NERC CIP standard can be found at not needed http://www.nerc.com. • ppropriate-use banner A CIP-003 Security Management Controls describes the development of a cyber-security policy and • onitoring, logging and warnings for user access or M documentation of that policy in a way that it can be attempted access updated and that all staff is aware of the policy. It also discusses management of personnel who have CIP-006 Physical Security discusses physical access to the CCAs and identification of users with accessibility to equipment, including: different privileges, roles and responsibilities. • Mounting equipment in lockable enclosures CIP-004 Personnel and Training identifies the personnel training and awareness recommended • emote control of locks R for supporting security-related operations and procedures. It cites CCA user identification lists that • ccess alarms indicating a door or gate is open A are reviewed periodically and can be modified to • ard keys, video cameras, etc. C change both users and user privileges. • ser logged in and failed login attempts U CIP-005 Electronic Security Perimeter(s) deals with identification and protection of ESP access points and communications. While encryption is not identified specifically as a guideline for ESP access, CIP-005 does speak to: White paper | 09
  • 12. Creating a Reliable and Secure Advanced Distribution Management System CIP-007 Systems Security Management deals • nti-virus and malware protection — driven by the A with operating issues such as security patches, operating system virus protection, vendor releases and event logging. References to device security reinforce CIP-005 CIP-008 Incident Reporting and Response concepts: Planning relates to the managing and handling of reports and logs. While collecting and storing logs for • bility to enable or disable unused or unneeded A historical reference is necessary, how that retention ports and services — or compensating factor that is done is determined by the hardware and the will mitigate risk, such as physical security organization’s capabilities. • ecurity patches and firmware upgrades S NERC CIP alignment Together, the CIP guidelines address eight different • dministrative access not required for typical A criteria related to a secure ADMS framework: operations — only for maintenance and User Controls, Access Control, Electronic Security modification Perimeter, System Logging, Personnel Termination/ Privilege Changes, Security Software Management, • Passwords managed from a central location Alerts and Notifications, and Training. The following identifies the framework features that, working closely Access Control. CIP-003, CIP-004 and CIP- with the SCADA/DMS/OMS infrastructure, help meet 005 describe these characteristics related to user these criteria and contribute to the ADMS security authentication and account setup: strategy described earlier. • ecure authentication (one or multi-factor) S User Controls. CIP-003, CIP-004 and CIP-007 identify characteristics of the permissions assigned • eparation of duties-based user model S to each user to perform certain functions within the system: • ighly configurable permissions structure H • nique passwords for each user U • No ‘back doors’ or maintenance channels • ole-based Access Controls R • All default user accounts documented and provided on request • Principle of Least Privilege (PoLP) architecture • ser access may be controlled based on time of U • ranular audit capabilities G shift or isolated to only specific workstations • entralized user store C • trong passwords enforced by the operating S system • pplication restrictions available on a per-user basis A and/or by console basis • Password change policies enforced • ser-configurable banners available U White paper | 10
  • 13. Creating a Reliable and Secure Advanced Distribution Management System Electronic Security Perimeter. CIP-003, CIP-005 Personnel Termination/Privilege Changes. CIP- and CIP-007 relate the issues to be considered for a 004 and CIP-007 speak to capabilities necessary valid security perimeter around the CCA: regarding user accounts: • onitoring and logging of all access M • User accounts can be revoked by administrator • apable of integrating with off-the-shelf access C • ser accounts can be “downgraded” to lower U control devices or VPNs to extend single-sign-on authority • ncryption of communications with remote clients E Security Software Management. CIP-007 cites the or sites features needed for operating system patches and antivirus updates: • ingle-port communications through perimeter with S external systems • Security patch management program in place • oftware restrictions available for non- S • S multiple patch management technologies O administrative users supported • ommunications inside the perimeter can be C • Anti-virus/anti-malware applications supported on secured through signing end pervasive encryption all platforms and hosts • onfigurable port usage C • endor security testing performed on realistic V environments and system which accurately reflect System Logging. CIP-003, CIP-004, CIP-007 and real-world conditions CIP-008 all refer to this function as it relates to the audit requirements of the system: Alerts and Notifications. CIP-005, CIP-007 and CIP-008 all refer to the detection of failed attempts to • All access attempts securely logged through the access the system: operating system • Unauthorized logon attempts logged • ndividual privilege uses logged I Training. CIP-004 describes specific training tasks • ser account management and change control in U during implementation and subsequent maintenance place and logged of the system: • Modifications to SCADA databases logged • ecurity concepts are covered in standard training S courses • bility to send logs to central server backup for A aggregation purposes • Security controls are highlighted and their use is covered in standard training courses • onfigurable log lifetimes and log export C capabilities • CADA security-specific training is available for S additional depth of knowledge White paper | 11
  • 14. Creating a Reliable and Secure Advanced Distribution Management System Solution characteristics The utility looking to establish a robust, secure and reliable ADMS solution that will meet both current and future needs should target a system that — Complies with NERC CIP and NISTIR 7628 guidelines • ccess control and event logging — A system A an operator’s access to only those devices that fall based on the Windows® operating system or other under his or her jurisdiction. platform with inherent access control capabilities prevents accidental or malicious acts from affecting • Electronic Security Perimeter — Network Model the system. Only authorized personnel can access Promotion in an established ESP environment services; and all file access, permission usage allows secure update without threatening the and alterations to security policies are logged and system’s operational capacity. The process includes can be tracked for auditing purposes. Host-based thoroughly identifying access points, monitoring firewalls on every machine minimize the threat transferred data and enforcing approval from surface. an authorized entity located in the operational environment. This approach eliminates the Look for a system that locks down operator possibility of automatic updates with respect to the accounts to prevent any user access beyond established ESP. the control room user interface, as well as the installation of unauthorized software. VPN • ecurity Auditing — Each system should be S connections allow users to securely access audited before deployment to assure every change the system network from the insecure public in databases and network model is logged with and corporate infrastructure for management, user, timestamp and console annotations. maintenance and operations. Reflects ongoing vendor engagement with industry Also, highly granular asset-based access control working groups like the Cyber Security Coordination supports all operational requirements while limiting Task Group (SGIP) and Gridwise Alliance, to support compliance with the latest industry developments. Represents commitment to product security • usiness requirements and control system B The solution should remove all applications not requirements — IPSec encryption capability required for the successful operation of the SCADA preserves data integrity and confidentiality for system. communications between servers and workstations without the need for altering operational • esign and architect with future requirements D procedures. in mind — The solution must reflect a dedication to scalability and extensibility. Required ports open on servers should be screened from external access through the use of properly configured routers and network firewalls. White paper | 12
  • 15. + Creating a Reliable and Secure Advanced Distribution Management System Offers out-of-the-box Schneider Electric’s design for security adaptable, secure systems and reliability • No back doors — The system should easily accept any major authentication technology, such as biometrics, persistent smartcards and access The distributed architecture of Schneider Electric’s ADMS solution and network model allows both tokens, and allow central access control at a user/ primary and redundant backup control centers with machine policy level so that an administrator can full access to the assets, along with regional control make use of available tools. centers with access to the assets in their respective regions. • hard-coded passwords — A system with No full configurability allows strong, default password This DistribuSys design enables flexible control complexity, a configurable ‘Failed Login’ threshold strategies with deployment at zone levels: • ecure Zone or Production — used for real-time S and enforcement of password history. A feature operations, with access only by dispatchers, such as Single-Sign-On authentication technology supervisors and administrators allows a user to access the system through a single • Decision Support Zone — used for monitoring, complex password at the system platform level, reporting and exhaustive “what if” analysis, with allowing administrators to make use of greater no impact on the real-time system. password complexity. • Test and Staging Zone — used for software update testing, network model staging and QA before deployment. • ecurity lifecycle management — A support S • isaster Recovery — closely follows real time and D program that rapidly reviews, tests and approves ready to take over in case of serious failure. This security updates will maximize system security while zone is typically at a separate building. minimizing the risk of upgrade-induced issues. The solution should be configurable for industry-leading DistribuSys architecture can limit access and anti-virus software packages. control of the most critical assets to the primary and backup control center, which often reflect more robust physical access control, more staffing and enhanced security monitoring. An administrator can be prevented from configuring aspects of the database at a regional control center, but allowed to perform this action at the primary control center. An operator at the primary control center can be allowed to view the entire system, but allowed to view only localized assets at a regional control center. White paper | 13
  • 16. Creating a Reliable and Secure Advanced Distribution Management System Conclusion The ‘security through obscurity’ argument supporting proprietary SCADA systems never was the option of choice of security professionals. In today’s Smart Grid environment requiring effective integration of SCADA with other information management systems, open-architecture technology designed with appropriate features is necessary not only for proper performance and enterprise efficiency, but also for the security necessary at all levels to assure the safety of critical infrastructure assets. White paper | 07
  • 17. ©2012 Schneider Electric. All rights reserved. Schneider Electric USA, Inc. 4701 Royal Vista Circle Fort Collins, CO 80528 Phone: -866-537-1091 1 + (34) 9-17-14-70-02 Fax: 1-970-223-5577 www.schneider-electric.com/us June 2012