Centralized cyber security management and monitoring applications based on open standards Summary

Size: px
Start display at page:

Download "Centralized cyber security management and monitoring applications based on open standards Summary"

Transcription

1 Centralized cyber security management and monitoring applications based on open standards ichael brist, Frank Hohlbaum ABB Switzerland, Ltd Steven Kunsman, José Ruiz, Bharadwaj Vasudevan ABB Substation Automation Raleigh, NC Summary With the introduction of Ethernet based communication protocols in Substation Automation Systems (SAS), cyber security aspects became an additional part of the SAS design. Today cyber security related requirements are part of customer specifications and need to be considered during the complete life cycle of the SAS. Applying cyber security to any system has to be treated as a continuous process. Protecting a system against attacks, managing the system to ensure long term stability and monitoring the system are the focus areas of the described cyber security process. Protecting a SAS starts by using only components that are designed cyber security compliant. Extensive testing of cyber security relevant aspects during the development cycles of all system components such as IEDs are essential. But to harden the individual component is not enough. Likewise in the system design adequate levels of cyber security protection have to be applied. The required protection level can be different for individual stations and should be based on a risk assessment or threat analysis, international standards as well as best practices. The security management can become complex, therefore security managers need software applications to be efficient. A Role Based Access Control System (RBAC) is such an application. It allows to manage the users and their roles from a central point even for many substations in different locations. Last but not least access and other user activity in the different system components need to be monitored. Central user activity logging will collect cyber security related events from the equipment and present this information to the responsible personnel. An efficient and user friendly approach is the key feature also for a monitoring application. Tracking the deployed software versions is not only a maintenance or asset management issue but also an additional way to detect potential attacks. A firmware version of an embedded device should not change without having one of the service engineers assigned a task to do this. Being able to retrieve such version information automatically improves the overall efficiency in the cyber security management. This paper describes the benefits of centralized cyber security related functions such as Role Based Access Control (RBAC), User Activity Logging (UAL) and software version tracking. The paper also highlights how these new tasks can been implemented in an interoperable and user friendly way.

2 Introduction With the introduction of mainstream communication means like Ethernet based communication protocols in Substation Automation Systems (SAS), cyber security aspects became an additional part of the SAS design. Today cyber security related applications and functionalities are part of customer specifications and have to be considered during the design of the SAS. Cyber security is not a static one time installation of a product, but needs to be followed up on a regular basis during the complete life cycle of the SAS. Cyber security process Applying cyber security to any system has to be treated as a continuous process. Protecting the SA system against an attack, managing the system to ensure long term stability and monitoring security related events in the system are the focus areas of the described cyber security process. Figure 1 : The described cyber security process Protect Protecting a SAS starts by using only components that are designed cyber security compliant. Extensive testing of security relevant aspects during the development cycles of all system components such as IEDs are essential. But to harden the individual component is not enough. Likewise in the system design adequate levels of cyber security protection have to be applied. The required protection level may be different for individual substations and should be based on a risk assessment, threat analysis referring to international standards as well as to best practices. anage The protected system needs to be managed to ensure a sustainable solution. anaging a system means to keep its protection always up to date. The management of cyber security aspects can become complex, therefore security managers need support from software applications to be efficient. Applying a Role Based Access Control System (RBAC) is such an application. It allows the responsible person to manage users and their roles consistently from a central point - even for many substations in different locations.

3 onitor Finally, security related events like access and other user activities in the different system components need to be monitored to identify potential attacks and to optimize the protection. Central user activity logging will collect cyber security related events from the equipment and present the information to the responsible personnel. An efficient and user friendly approach such as automatically recognizing event patterns and bursts are key features of such a monitoring application. ulti-vendor environments To ensure consistent cyber security related functionality and protection in heterogeneous installations it is fundamental to follow international standards as much as possible. nly by implementing and using standardized mechanisms, the same level of protection can be achieved for many SAS systems, even when delivered from different vendors. Cyber security standards and regulations relevant for SAS In addition to government driven efforts, the increased importance of cyber security for power systems has also lead to various standard bodies and working groups taking on this challenging topic. The focus, level of detail and maturity of the standards made is quite broad. Each of them is covering and focusing on different areas or parts of the overall system, thus leaving many gaps in between. The following picture shows an overview about standards and regulations relevant for substation automation systems and products: Figure 2: Cyber Security standards relevant for substation automation

4 NERC CIP The NERC CIP regulations have had the biggest impact on electric utilities so far and been the focal point of most security programs. The regulation makes a clear statement that the main responsibility for securing the electric grid lies with the utilities and that it is not just about technology but also about processes. There are some shortcomings of the current version, i.e. the exclusion of serial protocols or the focus on a single electronic security perimeter. An additional area for improvement is the definition of critical assets and critical cyber assets. While the definition of what is deemed critical and what is not has been made a bit clearer with version 4, protection of critical (cyber) assets is still done in an all or nothing fashion. If a cyberasset is classified as critical all NERC CIP requirements apply, if it is not classified as critical then it must not be protected at all (unless it is within the electronic security perimeter). This all or nothing approach does not take into account different levels of criticality and does not allow for different levels of security, which is a common best practice for security of computer based systems. However, the current ongoing revision is looking at different levels of criticality, which will hopefully lead to a more realistic and more granular approach to cyber security. ISA/IEC (formerly ISA-99) ISA/IEC is a series of standards, technical reports, and related information that define procedures for implementing electronically secure Industrial Automation and Control Systems (IACS). This guidance applies to end-users (i.e. asset owner), system integrators, security practitioners, and control systems manufacturers responsible for manufacturing, designing, implementing, or managing industrial automation and control systems. All ISA standards and technical reports are organized into four general categories called General, Policies and Procedures, System, and Component. 1. The first category includes common or foundational information such as concepts, models and terminology. Also included are work products that describe security metrics and security life cycles for IACS. 2. The second category of work products targets the Asset wner. These address various aspects of creating and maintaining an effective IACS security program. 3. The third category includes work products that describe system design guidance and requirements for the secure integration of control systems. Core in this is the zone and conduit design model. 4. The fourth category includes work products that describe the specific product development and technical requirements of control system products. This is primarily intended for control product vendors, but can be used by integrator and asset owners for to assist in the procurement of secure products. IEEE C Jointly within IEEE PES Substations and PSRC, this standard is based on the applicability and the technical implementation of the NERC CIP and NIST Smart Grid security efforts for substation automation, protection and control systems. The standard on Cyber Security Requirements for Substation Automation, Protection and Control Systems provides technical requirements for substation cyber security. It presents sound engineering practices that can be applied to achieve high levels of cyber security of automation, protection and control systems independent of voltage level or criticality of cyber assets. Cyber security includes trust and assurance of data in motion, data at rest and incident response. IEC IEC is a technical security standard that aims to secure power system specific communication protocols such as IEC or IEC While most parts of the standard have been released in 2009 more work is needed before systems compliant to IEC can be put on the market. First of all the affected communication standards must be changed to support IEC In addition there are some technical challenges with securing real time traffic that must be addressed by the working group of IEC IEEE 1686 Security of intelligent electronic devices is the scope of IEEE The document defines in technical detail security requirements for IED s, e.g. for user authentication or security event logging. The standard very nicely points out that a) adherence to the standard does not ensure adequate cyber security, i.e. that adherence to the standard is only one piece in the overall puzzle, and that b) adherence to every clause in

5 the standard may not be required for every cyber security program. With this the standard gives vendors clear technical requirements for product features but at the same time leaves room for specific, tailored system solutions at the customer site. The standards applicable for substation automation system consist of different parts, which are in different phases. Some parts have been finalized and are released, some are still under development. For instance, the IEC standard, which secures all TC 57 protocols, has many parts which are still under development. Part 8 of the IEC [3] is finalized and was published in It defines the role-based access control (RBAC) for power systems. This is not a new concept, it is in fact part of best practices in many IT systems. The use of RBAC in power systems allows to reduce the number of permissions that have to be assigned to certain users such that they only have the permissions they need to perform their duties. This reduces the risk to the power system as permissions are only assigned when they are actually needed, according to the principle of least privileges. The standard also defines a list of pre-defined roles (e.g., VIEWER, PERATR, etc.), and of pre-defined rights (e.g., View, Read, Control, etc.). In addition, the standard also defines two different models (i.e., push and pull) for authorization mechanisms, and provides more information on how to handle sessions. ther IEC62351 parts are being revised because implementations based on the first versions have turned out to be difficult. The published IEC Part 6 has been proven not to be feasible for practical implementation and a second edition is under preparation. Several important areas like security for XL files, or key handling have just been started and need some time until they are finalized. ne important part of standardisation is interoperability. IEC has just started to address this topic and is going to extend each part with conformance testing. As long as conformance testing is not introduced, interoperability can t be guaranteed. Centralized cyber security management and monitoring applications Role Based Access Control Not everybody needs to be a system administrator. A common sense approach in cyber security management is to grant the least possible privileges to every user. anaging users and their privileges individually on a per device approach is error prone and very inefficient. Using a centralized Role Based Access Control (RBAC) system according IEC allows the security responsible person of a company to manage users and assign roles to those users at a central level. The installed devices within various substations may be of different age, hence another key aspect is the ability to integrate IEDs and network equipment with different capabilities. odern, new IEDs might support centralized RBAC out of the box, but legacy devices lack this functionality. The access to those IEDs can be restricted by applying configuration policies on the computer hosting their configuration software. Either the software provides the functionality to restrict access to certain functionality based on a user authentication (login) or the computer operating system has to be configured in such a way that only certain users have access or are allowed to start the configuration software. Adding features to the configuration software can in general be expected as more easy than updating the firmware of many IEDs. Updating or changing the configuration of an IED usually results in re-testing of the main functionality (e.g. protection or control). Assuming that the access control is applied, the central RBAC server can be used easily for adding or removing users, or changing the role of a specific user. Removing a user will result immediately, since the authentication is done on the server. The proposed design assumes that at least one RBAC server is available in each substation to guarantee high availability. To complement the RBAC system, a master server is required at a higher level to allow the utility to consistently manage their users for all substations from the same place. The RBAC is not just a vendor initiative. It could be a very useful way to accomplish current regulations. As an example, the North American Electric Reliability Corporation (NERC) has taken this into consideration on the standard CIP

6 Figure 3 : Simple role based access control (RBAC) Event logging The security of a system can t be optimized without knowing what is going on. Two potential strategies on how to obtain the information exist. First by receiving the information spontaneously from the devices, or secondly, polling the devices for the information. The optimal solution will be a combination of both to collect the information online from devices and in case of re initialization after a communication breakdown to poll the devices for historical events that are stored in their internal memory. In both cases also the security related events have to be always time tagged. The memory in the devices is limited, therefore a communication (or reachability) supervision is essential. nce the communication to a device is interrupted, maintenance personnel has to check the situation on site and re-establish the communication. When polling the IEDs, the central cyber security logging application has to ensure that events are not duplicated. In other words the application has to ignore security related and all other events in the local storage that have already be transferred to its database. The integrity of the data retrieved from the IED has to be validated and in case of suspicious data a user, usually the cyber security responsible, has to be alerted. The identification of suspicious data can be based on received events, or on the fact that expected events are missing. A common problem in logging is that there are currently no international standards describing the semantics of the individual events. The Syslog protocol [4] describes a way to exchange notification messages in a more or less free-form way which makes it hard to identify semantically equal messages. For example one device could send User Bob successfully logged in whereas another device would send User: Bob; Log-In; K. Both events mean the same and it is relatively easy for a human to interpret it in this way. But to automatically process and convey statistical information out of all cyber security event by an application this approach is not optimal. Hence the central logging application needs a standardized event definition to which all non-standardized incoming events are translated. In the previous example both incoming syslog messages would be translated into Event:ID=1110, UserInformation:Name=Bob. The application has to save both, the original message and the translated one, in their storage to ensure not to lose original firsthand information. To make this translation more efficient it is desirable that a common standardized message format with semantics will be based on international standards in the future.

7 The security events exposed to users are always the translated events, which can as additional benefit also easily be localized. f course all evolved functions like statistics, evaluations and interpretations are based on this common format. Syslog does not allow to query a device for all possible messages, thus a logging system cannot be considered as maintenance free. Event texts that have never been received by the system have to be translated into the common format over time. This translation or event mapping is not a hard requirement, as a first step one could also use the raw original event data for monitoring. The amount of security related events can become huge. Providing efficient management of this data requires automatic pre-processing and categorization. A central security logging application has to remove time consuming filtering and searching for specific events. It rather shall help the user to identify certain patterns that need to be analyzed closer. Such pattern shall trigger an internal alarm and subscribed users shall automatically be notified. Figure 4 : Central cyber security event logging Version Tracking Knowing what software and configuration versions are used within the system is an important monitoring task not only for maintenance and asset management but also cyber security. Even hardened components might become vulnerable to newly discovered or exposed attacks. Vendors publish device vulnerabilities and firmware patches on their websites, but without a time consuming manual inventory of the system it is impossible to identify where and which devices require new firmware patches. Sometimes it is enough to update the device configuration to eliminate a certain vulnerability. As a consequence also configuration updates need to be documented manually. Therefore, a centralized version tracking system can assist end users to easily accomplish this task in an automated way. Especially if the NERC CIP requirements are taken into consideration. Devices implementing IEC [5] provide access to firmware, software and configuration version information based on a standardized and therefore interoperable data model. As an example, the IEC standard on its withdrawn edition 1 [6] and current edition 2 [7] considers to be mandatory, denoted by on the tables below, the IED vendor name and software version (swrev) on the logical node name plate.

8 Logical node name plate (LPL) common data class specification: Attribute //C Attribute vendor vendor swrev swrev d d du du configrev AC_LN0_ configrev ldns AC_LN0_EX paramrev lnns AC_DLD_ valrev cdcns AC_DLNDA_ ldns cdcname AC_DLNDA_ lnns datans AC_DLN_ cdcns cdcname Table 1 : LPL from IEC Ed.1 datans //C AC_LN0_ AC_LN0_EX AC_DLD_ AC_DLNDA_ AC_DLNDA_ AC_DLN_ Table 2 : LPL from IEC Ed.2 But the amount of information that can be retried from an IED for tracking purposes is not limited to the two above tables. The IEC leaves to the IED vendors some optional information to be included on the device name plate, such as the relay serial number (sernum), model, and so on. Device name plate (DPL) common data class specification: Attribute //C Attribute vendor vendor hwrev hwrev swrev swrev sernum sernum model model location location cdcns AC_DLNDA_ name cdcname AC_DLNDA_ owner datans AC_DLN_ epsname primeper Table 3 : LPL from IEC Ed.1 secondper latitude longitude altitude mrid d du cdcns cdcname datans //C AC_DLNDA_ AC_DLNDA_ AC_DLN_ Table 4 :LPL from IEC Ed.2 This allows central applications to collect and track this kind of information automatically. Such automatic version tracking allows the end user to locate the equipment that requires a firmware patch released by a vendor much more efficient. nly such devices have a future in SAS.

9 The NERC CIP group of standard provides a framework for the entitled utility to identify and protect their cyber critical asset to support reliable operation of their bulk electric system. They provide a general guideline for the utilities to document and monitor these assets for the utility [7]. In NERC CIP [7], the basic requirement for security management controls for critical assets is elucidated. The need for a cyber security policy, information protection, access control are a part of this standard. Adherence and compliance to these NERC CIP requirements has always been a challenge, which requires continuous auditing and documentation. To come up with maximum compliance at minimal effort, utilities will have to take a holistic approach for a solution. Tool based approach, like an enterprise level software that can perform a range of security related management like access control, asset management etc. provides a standard platform to adhere to the NERC-CIP requirements. In addition to this, new strict policies are to be implemented to secure and maintain all cyber critical assets. ne advantage of using standards based tools is that they provide a methodology to create these policies. For example, today's tools can provide a platform to implement a 90- day automatic password change policy. Awareness of security risks, strong policy implementation, asset monitoring and maximum visibility of the installed base, these are a driving force to meet NERC-CIP compliance requirements. Conclusion When we look at the organizations involved in maintaining utility system security - vendors, integrators, end users - it s fair to say that security is everybody s business. To the extent these groups cooperate with one another throughout the system lifecycle, security will be enhanced. At the same time, perhaps the most important aspect of security for the various players to keep in mind is that it is a journey and not a destination. There will always be new threats. Likewise, there will be new methods and technologies for meeting those threats. Vigilance, cooperation and technical expertise, when applied in unison, offer the best defense. Fear is usually results from a lack of information or even misinformation compounded by the massive liability of non-compliance and this supports our human behavior is to resist. This is the main motivation that is to embrace the cyber security requirements as enablers to allow critical data that can help higher level control system have situational awareness and proactively make decisions. Information being available at a mouse click facilitates reliability improvements and contingency / scenario engagement. If the fear of cyber security prevents this real time information access from our data sources in the substations, then we have failed. Technology advances require infrastructure changes and the faster we embrace and enable, the quicker we will realize the untapped potential of the modern systems. Central cyber security applications are key functions to efficiently manage and monitor modern protected Substation Automation Systems (SAS). It provides users with at-a-glance status reports and highlight important events without losing crucial details needed to make correct decisions. Releasing users from cumbersome and error prone manual tasks allows them to focus on further optimizations of the cyber security. Proprietary cyber security implementations should be avoided for seamless integration of multi vendors systems even if some aspects are not properly addressed by individual standards today. IEC based substation automation systems make these tasks much easier.

10 References [1] Cigré SC B5 Colloquium Nanjing 2015 Paper PS1-105 Centralized cyber security management and monitoring applications [2] PacWorld Americas 2014, Replacing Fear with Knowledge - Cyber Security for Substation Automation, Protection and Control Systems [3] IEC Power systems management and associated information exchange Data and communications security Role-based access control [4] RFC 5424 The Syslog Protocol [5] IEC Communication networks and systems for power utility automation [6] IEC Edition 1.0: Basic communication structure for substation and feeder equipment Common data classes [7] IEC Edition 2.0: Basic communication structure for substation and feeder equipment Common data classes [8] NERC CIP Standards ( Authors Information ichael brist Global Product anager, ABB Switzerland Ltd. - Substation Automation Products ichael is working for ABB s Power Systems - Network anager Business Unit based in Baden, Switzerland. At ABB, ichael is a Product anager and responsible for Software Products in the IEC domain. He spent nearly 20 years at ABB working across commissioning, R&D and Product anagement within Substation Automation. ichael holds a PET degree in information technology and a master of advanced studies in software engineering. He is member of the Cigré WG B5.51. Frank Hohlbaum - Global Security anager, ABB Switzerland Ltd. - Substation Automation Frank is globally responsible for all aspects of cyber security within ABB s Substation Automation System and drives the security activities in this business unit. He is an active member of the Power System Security Council and represents the business unit Substations Automation. Frank Hohlbaum joined ABB Inc. in 1996 and has 19 years of experience in Substation Automation. He graduated from University in Furtwangen (Germany) with Bachelor of Sciences concentrated in software and electrical technologies. Additionally he did post graduate studies in business administration at the University in Zurich (Switzerland). Steven A. Kunsman - Vice-President Business Development and arketing, ABB Power Systems - Substation Automation North America Steve joined ABB Inc. in 1984 and has 31 years of experience in Substation Automation, Protection and Control. He graduated from Lafayette College with a BS in Electrical Engineering and Lehigh University with an BA concentrated in anagement of Technology. Today, Steve is responsible for ABB North American Power Systems Substation Automation business. He is an active member of the IEEE Power Engineering Society PSRC including working group chairperson for H13, an IEC TC57 US delegate in the development of the IEC61850 communication standard and UCA International Users Group Executive Committee co-chairperson.

11 Jose L. Ruiz - Protection Application Engineer, ABB Power Systems - Substation Automation North America Jose joined ABB as a post graduate student. During his graduate study, he learned and tested IEC with different vendor relays. In his current role with ABB, Jose shares his expertise in IEC with customers in the power industry in trainings, projects, and providing technical support. Jose received his.s. degree (2012) in Electrical Engineering from the University of Tennessee at Chattanooga. He is a member of the IEEE PES. Bharadwaj Vasudevan - Application Engineer, ABB Power Systems - Substation Automation North America Bharadwaj graduated from North Carolina State University with a aster of Science degree in Electrical Engineering. During his school days, he worked as a Research Assistant in the FREED Systems Center, designing and maintaining the labs automation infrastructure. He began his career with Areva T&D Ltd in New Delhi, India as a Power Systems Engineer. He has worked on various EHV substation design projects throughout India. Bharadwaj started at ABB as a consulting engineer for the Power systems group. With a strong background in real time power system modelling, he got to work on developing transient system models for a couple of transmission planning projects under the group. He is currently working as an application engineer with the Power Systems Automation group for North America market. He supports all transmission level Relion relay products from Raleigh, NC. He is a member of the IEEE power system relay committee and contributes to various working groups in the relay communications subcommittees.

Document ID. Cyber security for substation automation products and systems

Document ID. Cyber security for substation automation products and systems Document ID Cyber security for substation automation products and systems 2 Cyber security for substation automation systems by ABB ABB addresses all aspects of cyber security The electric power grid has

More information

Cyber Security for Substation Automation, Protection and Control Systems

Cyber Security for Substation Automation, Protection and Control Systems Cyber Security for Substation Automation, Protection and Control Systems Steven Kunsman, Markus Braendle ABB Inc. steven.a.kunsman@us.abb.com USA 1. Introduction Substation automation, protection and control

More information

Symphony Plus Cyber security for the power and water industries

Symphony Plus Cyber security for the power and water industries Symphony Plus Cyber security for the power and water industries Symphony Plus Cyber Security_3BUS095402_(Oct12)US Letter.indd 1 01/10/12 10:15 Symphony Plus Cyber security for the power and water industries

More information

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors March 25-27, 2014 Steven A. Kunsman i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors ABB Inc. March 26, 2015 Slide 1 Cyber Security for Substation

More information

NERC CIP VERSION 5 COMPLIANCE

NERC CIP VERSION 5 COMPLIANCE BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements that are the basis for maintaining

More information

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System Purpose CIP-005-5 R2 is focused on ensuring that the security of the Bulk Energy System is not compromised

More information

Cyber security measures in protection and control IEDs

Cyber security measures in protection and control IEDs Cyber security measures in protection and control IEDs K. Hagman 1, L.Frisk 1, J. Menezes 1 1 ABB AB, Sweden krister.hagman@se.abb.com Abstract: The electric power grids and power systems are critical

More information

North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)

North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5) Whitepaper North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5) NERC-CIP Overview The North American Electric Reliability Corporation (NERC) is a

More information

Cyber Security Practical considerations for implementing IEC 62351

Cyber Security Practical considerations for implementing IEC 62351 1. Introduction Cyber Security Practical considerations for implementing IEC 62351 Frank Hohlbaum, Markus Braendle, Fernando Alvarez ABB frank.hohlbaum@ch.abb.com Switzerland Two trends are currently changing

More information

Secure Remote Substation Access Solutions

Secure Remote Substation Access Solutions Secure Remote Substation Access Solutions Supplemental Project - Introduction Webcast October 16, 2013 Scott Sternfeld, Project Manager Smart Grid Substation & Cyber Security Research Labs ssternfeld@epri.com

More information

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample

More information

Secure Remote Substation Access Interest Group Part 3: Review of Top Challenges, CIPv5 mapping, and looking forward to 2014!

Secure Remote Substation Access Interest Group Part 3: Review of Top Challenges, CIPv5 mapping, and looking forward to 2014! Secure Remote Substation Access Interest Group Part 3: Review of Top Challenges, CIPv5 mapping, and looking forward to 2014! October 3, 2013 Scott Sternfeld, Project Manager Smart Grid Substation & Cyber

More information

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards SCADA Compliance Tools For NERC-CIP The Right Tools for Bringing Your Organization in Line with the Latest Standards OVERVIEW Electrical utilities are responsible for defining critical cyber assets which

More information

Security in the smart grid

Security in the smart grid Security in the smart grid Security in the smart grid It s hard to avoid news reports about the smart grid, and one of the media s favorite topics is security, cyber security in particular. It s understandable

More information

NERC CIP Tools and Techniques

NERC CIP Tools and Techniques NERC CIP Tools and Techniques Supplemental Project - Introduction Webcast Scott Sternfeld, Project Manager Smart Grid Substation & Cyber Security Research Labs ssternfeld@epri.com (843) 619-0050 October

More information

Best Practices in ICS Security for System Operators. A Wurldtech White Paper

Best Practices in ICS Security for System Operators. A Wurldtech White Paper Best Practices in ICS Security for System Operators A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security

More information

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014 Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security

More information

RUGGEDCOM CROSSBOW. Secure Access Management Solution. siemens.com/ruggedcom. Edition 10/2014. Brochure

RUGGEDCOM CROSSBOW. Secure Access Management Solution. siemens.com/ruggedcom. Edition 10/2014. Brochure RUGGEDCOM CROSSBOW Secure Access Management Solution Brochure Edition 10/2014 siemens.com/ruggedcom Siemens RUGGEDCOM CROSSBOW Secure Access Manager and Station Access Controller Siemens RUGGEDCOM CROSSBOW

More information

INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT

INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT Utilities WHITE PAPER May 2013 INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT Table of Contents Introduction...3 Problem Statement...4 Solution Requirements...5 Components of an Integrated

More information

Summary of CIP Version 5 Standards

Summary of CIP Version 5 Standards Summary of CIP Version 5 Standards In Version 5 of the Critical Infrastructure Protection ( CIP ) Reliability Standards ( CIP Version 5 Standards ), the existing versions of CIP-002 through CIP-009 have

More information

Cyber Security Seminar KTH 2011-04-14

Cyber Security Seminar KTH 2011-04-14 Cyber Security Seminar KTH 2011-04-14 Defending the Smart Grid erik.z.johansson@se.abb.com Appropriate Footer Information Here Table of content Business Drivers Compliance APT; Stuxnet and Night Dragon

More information

Dr. Markus Braendle, Head of Cyber Security, ABB Group 10 Steps on the Road to a Successful Cyber Security Program Asia Pacific ICS Security SUMMIT

Dr. Markus Braendle, Head of Cyber Security, ABB Group 10 Steps on the Road to a Successful Cyber Security Program Asia Pacific ICS Security SUMMIT Dr. Markus Braendle, Head of Cyber Security, ABB Group 10 Steps on the Road to a Successful Cyber Security Program Asia Pacific ICS Security SUMMIT December 3, 2013 slide 1 A global leader in power and

More information

NovaTech NERC CIP Compliance Document and Product Description Updated June 2015

NovaTech NERC CIP Compliance Document and Product Description Updated June 2015 NovaTech NERC CIP Compliance Document and Product Description Updated June 2015 This document describes the NovaTech Products for NERC CIP compliance and how they address the latest requirements of NERC

More information

Cyber Security Compliance (NERC CIP V5)

Cyber Security Compliance (NERC CIP V5) Cyber Security Compliance (NERC CIP V5) Ray Wright NovaTech, LLC Abstract: In December 2013, the Federal Energy Regulatory Commission (FERC) issued Order No. 791 which approved the Version 5 CIP Reliability

More information

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

More information

How To Secure Your System From Cyber Attacks

How To Secure Your System From Cyber Attacks TM DeltaV Cyber Security Solutions A Guide to Securing Your Process A long history of cyber security In pioneering the use of commercial off-the-shelf technology in process control, the DeltaV digital

More information

ISACA rudens konference

ISACA rudens konference ISACA rudens konference 8 Novembris 2012 Procesa kontroles sistēmu drošība Andris Lauciņš Ievads Kāpēc tēma par procesa kontroles sistēmām? Statistics on incidents Reality of the environment of industrial

More information

TRIPWIRE NERC SOLUTION SUITE

TRIPWIRE NERC SOLUTION SUITE CONFIDENCE: SECURED SOLUTION BRIEF TRIPWIRE NERC SOLUTION SUITE TAILORED SUITE OF PRODUCTS AND SERVICES TO AUTOMATE NERC CIP COMPLIANCE u u We ve been able to stay focused on our mission of delivering

More information

future data and infrastructure

future data and infrastructure White Paper Smart Grid Security: Preparing for the Standards-Based Future without Neglecting the Needs of Today Are you prepared for future data and infrastructure security challenges? Steve Chasko Principal

More information

CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.

CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A. 21, rue d Artois, F-75008 PARIS D2-102 CIGRE 2012 http : //www.cigre.org CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS Massimo Petrini (*), Emiliano Casale

More information

Monitoring Windows Event Logs

Monitoring Windows Event Logs Monitoring Windows Event Logs Monitoring Windows Event Logs Using OpManager The Windows event logs are files serving as a placeholder of all occurrences on a Windows machine. This includes logs on specific

More information

SapphireIMS 4.0 Asset Management Feature Specification

SapphireIMS 4.0 Asset Management Feature Specification SapphireIMS 4.0 Asset Management Feature Specification v1.4 All rights reserved. COPYRIGHT NOTICE AND DISCLAIMER No parts of this document may be reproduced in any form without the express written permission

More information

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk Industrial Cyber Security Risk Manager Proactively Monitor, Measure and Manage Cyber Security Risk With Today s Cyber Threats, How Secure is Your Control System? Today, industrial organizations are faced

More information

Cyber Security and Privacy - Program 183

Cyber Security and Privacy - Program 183 Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

ForeScout CounterACT and Compliance June 2012 Overview Major Mandates PCI-DSS ISO 27002

ForeScout CounterACT and Compliance June 2012 Overview Major Mandates PCI-DSS ISO 27002 ForeScout CounterACT and Compliance An independent assessment on how network access control maps to leading compliance mandates and helps automate GRC operations June 2012 Overview Information security

More information

The first step in protecting Critical Cyber Assets is identifying them. CIP-002 focuses on this identification process.

The first step in protecting Critical Cyber Assets is identifying them. CIP-002 focuses on this identification process. CIPS Overview Introduction The reliability of the energy grid depends not only on physical assets, but cyber assets. The North American Electric Reliability Corporation (NERC) realized that, along with

More information

Cyber Security focus in ABB: a Key issue. 03 Luglio 2014, Roma 1 Conferenza Nazionale Cyber Security Marco Biancardi, ABB SpA, Power System Division

Cyber Security focus in ABB: a Key issue. 03 Luglio 2014, Roma 1 Conferenza Nazionale Cyber Security Marco Biancardi, ABB SpA, Power System Division Cyber Security focus in ABB: a Key issue 03 Luglio 2014, Roma 1 Conferenza Nazionale Cyber Security Marco Biancardi, ABB SpA, Power System Division Cyber Security in ABB Agenda ABB introduction ABB Cyber

More information

April 28, 2009. Dear Mr. Chairman:

April 28, 2009. Dear Mr. Chairman: April 28, 2009 The Honorable Edward J. Markey Chairman Subcommittee on Energy and Environment Committee on Energy and Commerce U.S. House of Representatives Washington, D.C. 20515 Dear Mr. Chairman: I

More information

Manage Utility IEDs Remotely while Complying with NERC CIP

Manage Utility IEDs Remotely while Complying with NERC CIP Manage Utility IEDs Remotely while Complying with NERC CIP Disclaimer and Copyright The information regarding the products and solutions in this document are subject to change without notice. All statements,

More information

Securing Distribution Automation

Securing Distribution Automation Securing Distribution Automation Jacques Benoit, Cooper Power Systems Serge Gagnon, Hydro-Québec Luc Tétreault, Hydro-Québec Western Power Delivery Automation Conference Spokane, Washington April 2010

More information

Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, 28.09.2015 CASE: Implementation of Cyber Security for Yara Glomfjord

Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, 28.09.2015 CASE: Implementation of Cyber Security for Yara Glomfjord Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, 28.09.2015 CASE: Implementation of Cyber Security for Yara Glomfjord Implementation of Cyber Security for Yara Glomfjord Speaker profile Olav Mo ABB

More information

How to Integrate NERC s Requirements in an Ongoing Automation and Integration Project Framework

How to Integrate NERC s Requirements in an Ongoing Automation and Integration Project Framework How to Integrate NERC s Requirements in an Ongoing Automation and Integration Project Framework Jacques Benoit, Cooper Power Systems Inc., Energy Automations Solutions - Cybectec Robert O Reilly, Cooper

More information

BSM for IT Governance, Risk and Compliance: NERC CIP

BSM for IT Governance, Risk and Compliance: NERC CIP BSM for IT Governance, Risk and Compliance: NERC CIP Addressing NERC CIP Security Program Requirements SOLUTION WHITE PAPER Table of Contents INTRODUCTION...................................................

More information

RuggedCom Solutions for

RuggedCom Solutions for RuggedCom Solutions for NERC CIP Compliance Rev 20080401 Copyright RuggedCom Inc. 1 RuggedCom Solutions Hardware Ethernet Switches Routers Serial Server Media Converters Wireless Embedded Software Application

More information

NERC CIP Compliance Gaining Oversight with ConsoleWorks

NERC CIP Compliance Gaining Oversight with ConsoleWorks NERC CIP Compliance Gaining Oversight with ConsoleWorks The current challenge for many Utility companies is finding efficient ways to gain oversight and control over NERC CIP regulation compliance. NERC

More information

LogRhythm and NERC CIP Compliance

LogRhythm and NERC CIP Compliance LogRhythm and NERC CIP Compliance The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to ensure that the bulk electric system in North America is reliable, adequate

More information

EXECUTIVE SUMMARY THE STATE OF BEHAVIORAL ANALYSIS

EXECUTIVE SUMMARY THE STATE OF BEHAVIORAL ANALYSIS EXECUTIVE SUMMARY Behavioral Analysis is becoming a huge buzzword in the IT and Information Security industries. With the idea that you can automatically determine whether or not what s going on within

More information

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security

More information

Data Security Concerns for the Electric Grid

Data Security Concerns for the Electric Grid Data Security Concerns for the Electric Grid Data Security Concerns for the Electric Grid The U.S. power grid infrastructure is a vital component of modern society and commerce, and represents a critical

More information

Facilitated Self-Evaluation v1.0

Facilitated Self-Evaluation v1.0 Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) Patricia Hoffman Facilitated Self-Evaluation v1.0 Assistant Secretary Office of Electricity Delivery and Energy Reliability U.S.

More information

CG Automation Solutions USA

CG Automation Solutions USA CG Automation Solutions USA (Formerly QEI Inc.) Automation Products and Solutions CG Automation Works for You INDUSTRY SOLUTIONS Electric T&D Utilities Renewable Energy Transit Authorities Public Power

More information

GE Intelligent Platforms. Meeting NERC Change Control Requirements for HMI/SCADA and Control Systems

GE Intelligent Platforms. Meeting NERC Change Control Requirements for HMI/SCADA and Control Systems GE Intelligent Platforms Meeting NERC Change Control Requirements for HMI/SCADA and Control Systems Meeting NERC Change Control Requirements for HMI/SCADA and Control Systems Overview There is a lot of

More information

Cloud Security. Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation

Cloud Security. Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation Cloud Security Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs peterjopling 2011 IBM Corporation Cloud computing impacts the implementation of security in fundamentally new ways

More information

The Value of Vulnerability Management*

The Value of Vulnerability Management* The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda

More information

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities Identity and Access Management Integration with PowerBroker Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 4 BeyondTrust

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

Industrial Security Solutions

Industrial Security Solutions Industrial Security Solutions Building More Secure Environments From Enterprise to End Devices You have assets to protect. Control systems, networks and software can all help defend against security threats

More information

System Stability through technology

System Stability through technology System Stability through technology 1 Smart Grid Design Goals More increased capabilities More capabilities at the edge and enterprise, pervasive automation Better faster, more reliable & secure The electric

More information

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE PRODUCT BRIEF uugiven today s environment of sophisticated security threats, big data security intelligence solutions and regulatory compliance demands, the need for a log intelligence solution has become

More information

Dr. György Kálmán gyorgy@mnemonic.no

Dr. György Kálmán gyorgy@mnemonic.no COMMUNICATION AND SECURITY IN CURRENT INDUSTRIAL AUTOMATION Dr. György Kálmán gyorgy@mnemonic.no Agenda Connected systems historical overview Current trends, concepts, pre and post Stuxnet Risks and threats

More information

This webinar brought to you by the Relion product family Advanced protection and control from ABB

This webinar brought to you by the Relion product family Advanced protection and control from ABB This webinar brought to you by the Relion product family Advanced protection and control from ABB Relion. Thinking beyond the box. Designed to seamlessly consolidate functions, Relion relays are smarter,

More information

Information Bulletin

Information Bulletin Public Policy Division Impact of NIST Guidelines for Cybersecurity Prepared by UTC Staff 1. Introduction... 3 2. Cybersecurity Landscape... 3 3. One Likely Scenario... 5 4. Draft NISTIR 7628, Guidelines

More information

Consolidating HFC Device and Network Management and Monitoring under SCTE HMS SNMP

Consolidating HFC Device and Network Management and Monitoring under SCTE HMS SNMP Consolidating HFC Device and Network Management and Monitoring under SCTE HMS SNMP NuDesign OEM Product Family The SCTE HMS subcommitte has devised an extensive set of standards for outside and inside

More information

GE Measurement & Control. Cyber Security for NERC CIP Compliance

GE Measurement & Control. Cyber Security for NERC CIP Compliance GE Measurement & Control Cyber Security for NERC CIP Compliance GE Proprietary Information: This document contains proprietary information of the General Electric Company and may not be used for purposes

More information

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices The Payment Card Industry (PCI) Data Security Standard (DSS) provides an actionable framework for developing a robust payment card data security process. The Payment Application Data Security Standard

More information

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005 State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology

More information

The Importance of Cybersecurity Monitoring for Utilities

The Importance of Cybersecurity Monitoring for Utilities The Importance of Cybersecurity Monitoring for Utilities www.n-dimension.com Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive

More information

CIP-010-2 Cyber Security Configuration Change Management and Vulnerability Assessments

CIP-010-2 Cyber Security Configuration Change Management and Vulnerability Assessments CIP-010-2 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:

More information

Verve Security Center

Verve Security Center Verve Security Center Product Features Supports multiple control systems. Most competing products only support a single vendor, forcing the end user to purchase multiple security systems Single solution

More information

Patch and Vulnerability Management Program

Patch and Vulnerability Management Program Patch and Vulnerability Management Program What is it? A security practice designed to proactively prevent the exploitation of IT vulnerabilities within an organization To reduce the time and money spent

More information

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network WP 1004HE Part 5 1. Cyber Security White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network Table of Contents 1. Cyber Security... 1 1.1 What

More information

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER Introduction A decade or more ago, logs of events recorded by firewalls, intrusion detection systems and other network devices were

More information

Top 10 Compliance Issues for Implementing Security Programs

Top 10 Compliance Issues for Implementing Security Programs www.dyonyx.com Top 10 Compliance Issues for Implementing Security Programs This White Paper articulates the top ten issues that we have encountered in the design and implementation of comprehensive Security

More information

WHITE PAPER CYBER SECURITY AND ELECTRIC UTILITY COMMUNICATIONS WHAT NERC/CIP MEANS FOR YOUR MICROWAVE

WHITE PAPER CYBER SECURITY AND ELECTRIC UTILITY COMMUNICATIONS WHAT NERC/CIP MEANS FOR YOUR MICROWAVE CYBER SECURITY AND ELECTRIC UTILITY COMMUNICATIONS WHAT NERC/CIP MEANS FOR YOUR MICROWAVE MAY 2011 TABLE OF CONTENTS 1.0 INTRODUCTION... 3 2.0 MODERN ELECTRIC UTILITY COMMUNICATIONS... 4 2.1 DOMAINS AND

More information

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM) ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM) CONTENT Introduction 2 Overview of Continuous Diagnostics & Mitigation (CDM) 2 CDM Requirements 2 1. Hardware Asset Management 3 2. Software

More information

GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems

GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems GE Measurement & Control Top 10 Cyber Vulnerabilities for Control Systems GE Proprietary Information: This document contains proprietary information of the General Electric Company and may not be used

More information

RUGGEDCOM NMS. Monitor Availability Quick detection of network failures at the port and

RUGGEDCOM NMS. Monitor Availability Quick detection of network failures at the port and RUGGEDCOM NMS is fully-featured enterprise grade network management software based on the OpenNMS platform. Specifically for the rugged communications industry, RNMS provides a comprehensive platform for

More information

Proven deployments across different Industry verticals; Being used by leading brands

Proven deployments across different Industry verticals; Being used by leading brands What is SapphireIMS? Comprehensive IT Service Management Suite consisting of IT Service desk certified as per ITIL 3.0 (ITSM) IT Asset management (ITAM) Business Service Monitoring (BSM) IT Automation

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

The SIEM Evaluator s Guide

The SIEM Evaluator s Guide Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,

More information

Regulatory Compliance Management for Energy and Utilities

Regulatory Compliance Management for Energy and Utilities Regulatory Compliance Management for Energy and Utilities The Energy and Utility (E&U) sector is transforming as enterprises are looking for ways to replace aging infrastructure and create clean, sustainable

More information

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services Managing Vulnerabilities for PCI Compliance White Paper Christopher S. Harper Managing Director, Agio Security Services PCI STRATEGY Settling on a PCI vulnerability management strategy is sometimes a difficult

More information

Utility Modernization Cyber Security City of Glendale, California

Utility Modernization Cyber Security City of Glendale, California Utility Modernization Cyber Security City of Glendale, California Cyber Security Achievements Cyber Security Achievements (cont) 1. Deploying IT Security Awareness training program Q4 2012 2. Purchased

More information

Network Instruments white paper

Network Instruments white paper Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features

More information

North American Electric Reliability Corporation (NERC) Cyber Security Standard

North American Electric Reliability Corporation (NERC) Cyber Security Standard North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation

More information

eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life

eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life Executive s Guide to Windows Server 2003 End of Life Facts About Windows Server 2003 Introduction On July 14, 2015 Microsoft will end support for Windows Sever 2003 and Windows Server 2003 R2. Like Windows

More information

Session 14: Functional Security in a Process Environment

Session 14: Functional Security in a Process Environment Abstract Session 14: Functional Security in a Process Environment Kurt Forster Industrial IT Solutions Specialist, Autopro Automation Consultants In an ideal industrial production security scenario, the

More information

GE Measurement & Control. Cyber Security for NEI 08-09

GE Measurement & Control. Cyber Security for NEI 08-09 GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4

More information

Identity & Access Management in the Cloud: Fewer passwords, more productivity

Identity & Access Management in the Cloud: Fewer passwords, more productivity WHITE PAPER Strategic Marketing Services Identity & Access Management in the Cloud: Fewer passwords, more productivity Cloud services are a natural for small and midsize businesses, with their ability

More information

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323

More information

Cyber security. Protecting critical infrastructure in a changing world

Cyber security. Protecting critical infrastructure in a changing world Cyber security Protecting critical infrastructure in a changing world Sebastian Obermeier, Sascha Stoeter, Ragnar Schierholz, Markus Braendle Twenty years ago, the cyber security of systems and devices

More information

A Rackspace White Paper Spring 2010

A Rackspace White Paper Spring 2010 Achieving PCI DSS Compliance with A White Paper Spring 2010 Summary The Payment Card Industry Data Security Standard (PCI DSS) is a global information security standard defined by the Payment Card Industry

More information

Utility Telecom Forum. Robert Sill, CEO & President Aegis Technologies February 4, 2008

Utility Telecom Forum. Robert Sill, CEO & President Aegis Technologies February 4, 2008 Utility Telecom Forum Robert Sill, CEO & President Aegis Technologies February 4, 2008 1 Agenda Asked to describe his job, Mike Selves, director of Emergency Management and Homeland Security in Johnson

More information

The Four-Step Guide to Understanding Cyber Risk

The Four-Step Guide to Understanding Cyber Risk Lifecycle Solutions & Services The Four-Step Guide to Understanding Cyber Risk Identifying Cyber Risks and Addressing the Cyber Security Gap TABLE OF CONTENTS Introduction: A Real Danger It is estimated

More information

Digi Device Cloud: Security You Can Trust

Digi Device Cloud: Security You Can Trust Digi Device Cloud: Security You Can Trust Abstract Historically, security has oftentimes been an afterthought or a bolt-on to any engineering product. In today s markets, however, security is taking a

More information

Cyber Security for NERC CIP Version 5 Compliance

Cyber Security for NERC CIP Version 5 Compliance GE Measurement & Control Cyber Security for NERC CIP Version 5 Compliance imagination at work Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security Management Controls...

More information

TORNADO Solution for Telecom Vertical

TORNADO Solution for Telecom Vertical BIG DATA ANALYTICS & REPORTING TORNADO Solution for Telecom Vertical Overview Last decade has see a rapid growth in wireless and mobile devices such as smart- phones, tablets and netbook is becoming very

More information

This is a preview - click here to buy the full publication

This is a preview - click here to buy the full publication TECHNICAL REPORT IEC/TR 62443-3-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 3 1: Security technologies for industrial automation and control systems

More information

Consulting International

Consulting International NIST Cyber Security Working Group (CSWG) NISTIR 7628: NIST Guidelines for Smart Grid Cyber Security Frances Cleveland Xanthus Consulting International Xanthus Consulting International fcleve@xanthus-consulting.com

More information