SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
©2016 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non-confidential content. March 17, 2016
Check Point and RAD | Solution Brief
1
Benefits
• Enable compliance with NERC-
CIP directives
• Protect OT networks by eliminating
RTU and SCADA equipment
vulnerabilities
• Deep visibility and control of
ICS/SCADA communications
• Secure remote access into OT
networks
INSIGHTS
Industrial Control Systems (ICS) and protocols in power utility control networks – also
known as operational technology (OT) networks – were primarily designed with
operational safety and reliability in mind. Security was not considered a top priority
and, at best, any defense employed followed the “Security by Obscurity” philosophy.
These days, however, critical infrastructure networks become smarter, automated and
more connected – and are more susceptible than ever to cyber threats. They are
subjected to hundreds, sometimes thousands of cyber-attacks per day. With so much
on the line, even the smallest breach in security could spell disaster. As a result, the
security of critical networks is at the center of attention of industry and government
regulators alike. The first binding regulation was the set of requirements for critical
infrastructure protection (CIP), which was introduced in 2008 by the North American
Electric Reliability Council (NERC). Since then, the NERC CIP set of requirements
have been constantly evolving to make sure power utilities are well equipped to meet
new threats.
BOOST YOUR NERC-CIP COMPLIANCE
Check Point and RAD offer a joint end-to-end cyber security solution that protects any
utility OT network by eliminating RTU and SCADA equipment vulnerabilities, as well
as defends against cyber-attacks on the network’s control and data planes. The
solution meets the following NERC-CIP requirements:
1) Malicious Communications Detection (CIP-005-5, CIP-007-5)
2) Device Connection Control (CIP-007-5)
3) Secure Interactive Remote Access – Intermediate System (CIP-005-5)
4) Patch management (CIP-007-5)
5) ”Man in the Middle” (MITM) attack prevention (expected in NERC-CIP v6)
6) Logging (CIP-007-5)
The solution integrates Check Point’s ICS Security Gateway within RAD’s secure-by-
design multiservice networking equipment and consists of various building blocks as
described in Figure 1:
CHECK POINT + RAD
ROBUST CYBER SECURITY FOR
POWER UTILITIES
©2016 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non-confidential content. March 17, 2016
Check Point and RAD | Solution Brief
2
Figure 1: building blocks of the Check Point-RAD cyber security solution
• Overlay solution, adds a cyber security layer (NERC-CIP-compliant) to any existing ICS/SCADA OT network.
• RAD’s secure-by design multiservice networking platforms handle various SCADA protocols, serial and TCP-based, from
different SCADA devices. Serial to TCP protocol conversion is optional, depending on the utility’s current and future
topologies and needs. RAD’s networking equipment employ Device Connection Control (802.1x) with the option to disable
all unused ports to prevent connection of rogue devices or unauthorized users.
• Check Point’s ICS Security Gateway software is fully integrated in RAD’s Megaplex-4 multiservice platform and can be
installed in any substation/”tail site” or control center, in distributed or centralized topologies. The ICS Security Gateway
includes firewall, application control (APCL), intrusion prevention (IPS), and VPN software blades and provides deep
packet inspection (DPI) for SCADA communications, virtual patching and logging for inbound and outbound traffic.
• An Intermediate System for Interactive Remote Access is uniquely combined with a built-in terminal server, allowing
secure control of IP and serial (RS-232/RS-485) SCADA devices. This powerful combination further includes tunneling,
data encryption, multi-factor user authentication, and authorization to manage only predefined SCADA devices.
• An integral part of RAD’s end-to-end cyber security solution is network encryption, allowing the utility to protect from “Man-
in-the-Middle” attacks using IPsec (Layer 3 encryption) and MACsec (Layer 2 encryption) tunnels, depending on the OT
network.
• Check Point’s logging server (SmartEvent), as well as a Syslog server collect and logs events from the Intermediate
System and from the ICS Security Gateway.
• Network management is performed by the RADview and Check Point systems. Management of the security features is
separated from that of the networking features, providing discrete administrative authority to technicians and other relevant
personnel.
©2016 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non-confidential content. March 17, 2016
Check Point and RAD | Solution Brief
3
CONCLUSION
The joint Check Point-RAD cyber security solution for power utilities’ OT networks provides the ultimate, multi-tier protection to
enable optimal compliance with the new NERC-CIP directives. It is strategically located to securely manage all electronic access to
the substation’s electronic security perimeter (ESP) and to protect the cyber assets within it from external and internal attacks.
Power utilities are provided a full suite of cyber security defenses, including encryption, authentication, intrusion prevention,
anomaly detection, integrity verification, and more.
ABOUT CHECK POINT
Check Point Software Technologies Ltd.
(www.checkpoint.com), is the largest pure-play security
vendor globally, provides industry-leading solutions, and
protects customers from cyberattacks with an unmatched
catch rate of malware and other types of attacks. Check
Point offers a complete security architecture defending
enterprises’ networks to mobile devices, in addition to the
most comprehensive and intuitive security management.
Check Point protects over 100,000 organizations of all sizes.
At Check Point, we secure the future.
ABOUT RAD
RAD (www.rad.com) is a leader in secure communications
solutions for the critical infrastructure of power utilities and
other segments of the energy industry. Our Service Assured
Networking solutions include best-of-breed tools for cyber
security and mission-critical communications, as well as for
seamless migration to modern packet switched networks and
applications. RAD provides field-proven solutions for
operational WAN, ruggedized substation LAN, automation
backhaul, Tele-protection, wireless PTP/PTMP, and
broadband mobility. Founded in 1981, RAD has an installed
base of more than 14 million units and is a member of the
$1.25 billion RAD Group of companies, a world leader in
communications solutions.
Worldwide Headquarters | 5 Ha’Solelim Street, Tel Aviv 67897, Israel | Tel: 972-3-753-4555 | Fax: 972-3-624-1100 | Email: info@checkpoint.com
U.S. Headquarters | 959 Skyway Road, Suite 300, San Carlos, CA 94070 | Tel: 800-429-4391; 650-628-2000 | Fax: 650-654-4233 | www.checkpoint.com

Weitere ähnliche Inhalte

Was ist angesagt?

SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
Patricia M Watson
 
Guide scada and_industrial_control_systems_security
Guide scada and_industrial_control_systems_securityGuide scada and_industrial_control_systems_security
Guide scada and_industrial_control_systems_security
Deepakraj Sahu
 

Was ist angesagt? (20)

SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
Hacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS securityHacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS security
 
Scada security presentation by Stephen Miller
Scada security presentation by Stephen MillerScada security presentation by Stephen Miller
Scada security presentation by Stephen Miller
 
IT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOsIT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOs
 
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
 
The journey to ICS - Extended
The journey to ICS - Extended The journey to ICS - Extended
The journey to ICS - Extended
 
Build Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-SegmentationBuild Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-Segmentation
 
SCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber GriefSCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber Grief
 
Industrial Control System Security Overview
Industrial Control System Security OverviewIndustrial Control System Security Overview
Industrial Control System Security Overview
 
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
 
Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)
 
Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015 Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015
 
Should I Patch My ICS?
Should I Patch My ICS?Should I Patch My ICS?
Should I Patch My ICS?
 
The Future of ICS Security Products
The Future of ICS Security ProductsThe Future of ICS Security Products
The Future of ICS Security Products
 
Guide scada and_industrial_control_systems_security
Guide scada and_industrial_control_systems_securityGuide scada and_industrial_control_systems_security
Guide scada and_industrial_control_systems_security
 
Cybersecurity for modern industrial systems
Cybersecurity for modern industrial  systemsCybersecurity for modern industrial  systems
Cybersecurity for modern industrial systems
 
ICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep Singh
 
Securing SCADA
Securing SCADA Securing SCADA
Securing SCADA
 
Cyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICSCyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICS
 
DEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICSDEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICS
 

Ähnlich wie Robust Cyber Security for Power Utilities

Sb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetSb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinet
Ivan Carmona
 
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
IJCNCJournal
 
SCADA Systems Vulnerabilities and Blockchain Technology
SCADA Systems Vulnerabilities and Blockchain TechnologySCADA Systems Vulnerabilities and Blockchain Technology
SCADA Systems Vulnerabilities and Blockchain Technology
ijtsrd
 

Ähnlich wie Robust Cyber Security for Power Utilities (20)

ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
 
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksCybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA Networks
 
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...
Challenges and Solution to Mitigate the cyber-attack  on Critical Infrastruct...Challenges and Solution to Mitigate the cyber-attack  on Critical Infrastruct...
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
 
Cloud Security Solution Overview
Cloud Security Solution OverviewCloud Security Solution Overview
Cloud Security Solution Overview
 
Sb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetSb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinet
 
Security Issues in SCADA based Industrial Control Systems
Security Issues in SCADA based Industrial Control Systems Security Issues in SCADA based Industrial Control Systems
Security Issues in SCADA based Industrial Control Systems
 
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
 
SCADAShield-Datasheet
SCADAShield-DatasheetSCADAShield-Datasheet
SCADAShield-Datasheet
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber Security
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilities
 
Securing Industrial Control System
Securing Industrial Control SystemSecuring Industrial Control System
Securing Industrial Control System
 
White paper scada (2)
White paper scada (2)White paper scada (2)
White paper scada (2)
 
Securing SCADA
Securing SCADASecuring SCADA
Securing SCADA
 
SCADA Systems Vulnerabilities and Blockchain Technology
SCADA Systems Vulnerabilities and Blockchain TechnologySCADA Systems Vulnerabilities and Blockchain Technology
SCADA Systems Vulnerabilities and Blockchain Technology
 
Operational Technology Security Solution for Utilities
Operational Technology Security Solution for UtilitiesOperational Technology Security Solution for Utilities
Operational Technology Security Solution for Utilities
 
Software Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for ShopfloorSoftware Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for Shopfloor
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
Io t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cIo t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425c
 

Mehr von Nir Cohen

Accelerating lte-a-deployments
Accelerating lte-a-deploymentsAccelerating lte-a-deployments
Accelerating lte-a-deployments
Nir Cohen
 
Ce the cio perspective part ii v2 3 21-6-11
Ce the cio perspective part ii v2 3 21-6-11Ce the cio perspective part ii v2 3 21-6-11
Ce the cio perspective part ii v2 3 21-6-11
Nir Cohen
 

Mehr von Nir Cohen (19)

Power Utilities Migration Solutions
Power Utilities Migration SolutionsPower Utilities Migration Solutions
Power Utilities Migration Solutions
 
What is-twamp
What is-twampWhat is-twamp
What is-twamp
 
Accelerating lte-a-deployments
Accelerating lte-a-deploymentsAccelerating lte-a-deployments
Accelerating lte-a-deployments
 
V cpe deployment-best-practices-presentation
V cpe deployment-best-practices-presentationV cpe deployment-best-practices-presentation
V cpe deployment-best-practices-presentation
 
Megaplex nerc-cip-compliance
Megaplex nerc-cip-complianceMegaplex nerc-cip-compliance
Megaplex nerc-cip-compliance
 
Distributed NFV: Ensuring that the Benefits of Virtualization Exceed the Costs
Distributed NFV: Ensuring that the Benefits of Virtualization Exceed the CostsDistributed NFV: Ensuring that the Benefits of Virtualization Exceed the Costs
Distributed NFV: Ensuring that the Benefits of Virtualization Exceed the Costs
 
Carrier ethernet vs-mpls-power-utility-communications
Carrier ethernet vs-mpls-power-utility-communicationsCarrier ethernet vs-mpls-power-utility-communications
Carrier ethernet vs-mpls-power-utility-communications
 
Time distribution strategies in cellular networks
Time distribution strategies in cellular networksTime distribution strategies in cellular networks
Time distribution strategies in cellular networks
 
Mobile backhaul solution guide
Mobile backhaul solution guideMobile backhaul solution guide
Mobile backhaul solution guide
 
Carrier ethernet-for-power-utilities-presentation
Carrier ethernet-for-power-utilities-presentationCarrier ethernet-for-power-utilities-presentation
Carrier ethernet-for-power-utilities-presentation
 
Carrier grade ethernet for power utilities - solution paper
Carrier grade ethernet for power utilities - solution paperCarrier grade ethernet for power utilities - solution paper
Carrier grade ethernet for power utilities - solution paper
 
Ethernet vs-mpls-tp-in-the-access-presentation
Ethernet vs-mpls-tp-in-the-access-presentationEthernet vs-mpls-tp-in-the-access-presentation
Ethernet vs-mpls-tp-in-the-access-presentation
 
Timing over packet demarcation
Timing over packet demarcationTiming over packet demarcation
Timing over packet demarcation
 
23077 carrier ethernet-trends-challenges
23077 carrier ethernet-trends-challenges23077 carrier ethernet-trends-challenges
23077 carrier ethernet-trends-challenges
 
Teleprotection over packet f 30 8-11
Teleprotection over packet f 30 8-11Teleprotection over packet f 30 8-11
Teleprotection over packet f 30 8-11
 
Ethernet OAM evolution
Ethernet OAM evolutionEthernet OAM evolution
Ethernet OAM evolution
 
Ce the cio perspective part iii v2 1 9-6-11
Ce the cio perspective part iii v2 1 9-6-11Ce the cio perspective part iii v2 1 9-6-11
Ce the cio perspective part iii v2 1 9-6-11
 
Ce the cio perspective part ii v2 3 21-6-11
Ce the cio perspective part ii v2 3 21-6-11Ce the cio perspective part ii v2 3 21-6-11
Ce the cio perspective part ii v2 3 21-6-11
 
Ce the cio perspective part ii v2 3 21-6-11
Ce the cio perspective part ii v2 3 21-6-11Ce the cio perspective part ii v2 3 21-6-11
Ce the cio perspective part ii v2 3 21-6-11
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 

Robust Cyber Security for Power Utilities

  • 1. ©2016 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non-confidential content. March 17, 2016 Check Point and RAD | Solution Brief 1 Benefits • Enable compliance with NERC- CIP directives • Protect OT networks by eliminating RTU and SCADA equipment vulnerabilities • Deep visibility and control of ICS/SCADA communications • Secure remote access into OT networks INSIGHTS Industrial Control Systems (ICS) and protocols in power utility control networks – also known as operational technology (OT) networks – were primarily designed with operational safety and reliability in mind. Security was not considered a top priority and, at best, any defense employed followed the “Security by Obscurity” philosophy. These days, however, critical infrastructure networks become smarter, automated and more connected – and are more susceptible than ever to cyber threats. They are subjected to hundreds, sometimes thousands of cyber-attacks per day. With so much on the line, even the smallest breach in security could spell disaster. As a result, the security of critical networks is at the center of attention of industry and government regulators alike. The first binding regulation was the set of requirements for critical infrastructure protection (CIP), which was introduced in 2008 by the North American Electric Reliability Council (NERC). Since then, the NERC CIP set of requirements have been constantly evolving to make sure power utilities are well equipped to meet new threats. BOOST YOUR NERC-CIP COMPLIANCE Check Point and RAD offer a joint end-to-end cyber security solution that protects any utility OT network by eliminating RTU and SCADA equipment vulnerabilities, as well as defends against cyber-attacks on the network’s control and data planes. The solution meets the following NERC-CIP requirements: 1) Malicious Communications Detection (CIP-005-5, CIP-007-5) 2) Device Connection Control (CIP-007-5) 3) Secure Interactive Remote Access – Intermediate System (CIP-005-5) 4) Patch management (CIP-007-5) 5) ”Man in the Middle” (MITM) attack prevention (expected in NERC-CIP v6) 6) Logging (CIP-007-5) The solution integrates Check Point’s ICS Security Gateway within RAD’s secure-by- design multiservice networking equipment and consists of various building blocks as described in Figure 1: CHECK POINT + RAD ROBUST CYBER SECURITY FOR POWER UTILITIES
  • 2. ©2016 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non-confidential content. March 17, 2016 Check Point and RAD | Solution Brief 2 Figure 1: building blocks of the Check Point-RAD cyber security solution • Overlay solution, adds a cyber security layer (NERC-CIP-compliant) to any existing ICS/SCADA OT network. • RAD’s secure-by design multiservice networking platforms handle various SCADA protocols, serial and TCP-based, from different SCADA devices. Serial to TCP protocol conversion is optional, depending on the utility’s current and future topologies and needs. RAD’s networking equipment employ Device Connection Control (802.1x) with the option to disable all unused ports to prevent connection of rogue devices or unauthorized users. • Check Point’s ICS Security Gateway software is fully integrated in RAD’s Megaplex-4 multiservice platform and can be installed in any substation/”tail site” or control center, in distributed or centralized topologies. The ICS Security Gateway includes firewall, application control (APCL), intrusion prevention (IPS), and VPN software blades and provides deep packet inspection (DPI) for SCADA communications, virtual patching and logging for inbound and outbound traffic. • An Intermediate System for Interactive Remote Access is uniquely combined with a built-in terminal server, allowing secure control of IP and serial (RS-232/RS-485) SCADA devices. This powerful combination further includes tunneling, data encryption, multi-factor user authentication, and authorization to manage only predefined SCADA devices. • An integral part of RAD’s end-to-end cyber security solution is network encryption, allowing the utility to protect from “Man- in-the-Middle” attacks using IPsec (Layer 3 encryption) and MACsec (Layer 2 encryption) tunnels, depending on the OT network. • Check Point’s logging server (SmartEvent), as well as a Syslog server collect and logs events from the Intermediate System and from the ICS Security Gateway. • Network management is performed by the RADview and Check Point systems. Management of the security features is separated from that of the networking features, providing discrete administrative authority to technicians and other relevant personnel.
  • 3. ©2016 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non-confidential content. March 17, 2016 Check Point and RAD | Solution Brief 3 CONCLUSION The joint Check Point-RAD cyber security solution for power utilities’ OT networks provides the ultimate, multi-tier protection to enable optimal compliance with the new NERC-CIP directives. It is strategically located to securely manage all electronic access to the substation’s electronic security perimeter (ESP) and to protect the cyber assets within it from external and internal attacks. Power utilities are provided a full suite of cyber security defenses, including encryption, authentication, intrusion prevention, anomaly detection, integrity verification, and more. ABOUT CHECK POINT Check Point Software Technologies Ltd. (www.checkpoint.com), is the largest pure-play security vendor globally, provides industry-leading solutions, and protects customers from cyberattacks with an unmatched catch rate of malware and other types of attacks. Check Point offers a complete security architecture defending enterprises’ networks to mobile devices, in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes. At Check Point, we secure the future. ABOUT RAD RAD (www.rad.com) is a leader in secure communications solutions for the critical infrastructure of power utilities and other segments of the energy industry. Our Service Assured Networking solutions include best-of-breed tools for cyber security and mission-critical communications, as well as for seamless migration to modern packet switched networks and applications. RAD provides field-proven solutions for operational WAN, ruggedized substation LAN, automation backhaul, Tele-protection, wireless PTP/PTMP, and broadband mobility. Founded in 1981, RAD has an installed base of more than 14 million units and is a member of the $1.25 billion RAD Group of companies, a world leader in communications solutions. Worldwide Headquarters | 5 Ha’Solelim Street, Tel Aviv 67897, Israel | Tel: 972-3-753-4555 | Fax: 972-3-624-1100 | Email: info@checkpoint.com U.S. Headquarters | 959 Skyway Road, Suite 300, San Carlos, CA 94070 | Tel: 800-429-4391; 650-628-2000 | Fax: 650-654-4233 | www.checkpoint.com