Smart Substation Security



Similar documents
Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

THE FUTURE OF SMART GRID COMMUNICATIONS

John M Shaw Presentation to UTC Region 7 February 19, 2009 jshaw@garrettcom.com

NERC CIP Substation Cyber Security Update. John M Shaw Presentation to UTC Region 7 February 19, 2009 jshaw@garrettcom.com

Secure Networking for Critical Infrastructure. Ilan Barda March 2014

CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.

RuggedCom Solutions for

8 Steps for Network Security Protection

8 Steps For Network Security Protection

INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

Level: 3 Credit value: 9 GLH: 80. QCF unit reference R/507/8351. This unit has 6 learning outcomes.

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

Building Secure Networks for the Industrial World

How To Configure L2TP VPN Connection for MAC OS X client

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

DNP Serial SCADA to SCADA Over IP: Standards, Regulations Security and Best Practices

Workflow Guide. Establish Site-to-Site VPN Connection using RSA Keys. For Customers with Sophos Firewall Document Date: November 2015

The Internet of Things (IoT) and Industrial Networks. Guy Denis Rockwell Automation Alliance Manager Europe 2015

IP Telephony Basics. Part of The Technology Overview Series for Small and Medium Businesses

Firewall Defaults and Some Basic Rules

Network Cyber Security. Presented by: Motty Anavi RFL Electronics

Utility Telecom Forum. Robert Sill, CEO & President Aegis Technologies February 4, 2008

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

How To Establish Site-to-Site VPN Connection. using Preshared Key. Applicable Version: onwards. Overview. Scenario. Site A Configuration

How To Configure Apple ipad for Cyberoam L2TP

SGTech Europe 2015 September 22 th Amsterdam. Pedro Gama, Head of SCADA & Telecom Department at EDP Distribuição, SA

Securing Distribution Automation

Network Security Guidelines. e-governance

Custom Integration Solutions

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Cybersecurity Risk Assessment in Smart Grids

How Much Cyber Security is Enough?

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

Network Virtualization Network Admission Control Deployment Guide

Dr. György Kálmán

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Ranch Networks for Hosted Data Centers

Colt IP VPN Services Colt Technology Services Group Limited. All rights reserved.

November Defining the Value of MPLS VPNs

Smart Solutions for Network IP Migration

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

The Protection Mission a constant endeavor

Virtual Privacy vs. Real Security

VPN Consortium Scenario 1: Gateway-to-Gateway with Preshared Secrets

Converged Optical Ethernet White Paper. OnSite OS-10 Multi-Services over SDH Provisioning

VPN Consortium Scenario 1: Gateway-to-Gateway with Preshared Secrets

V310 Support Note Version 1.0 November, 2011

!! "# $%!& $!$ +) * ', -./01.//1233/ "4, -./01.//12223 *, 565

Cisco Virtual Office Express

Secure Substation Automation for Operations & Maintenance

Network System Design Lesson Objectives

Best Practices for DanPac Express Cyber Security

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Solutions Guide. Secure Remote Access. Allied Telesis provides comprehensive solutions for secure remote access.

Update On Smart Grid Cyber Security

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

Convergence: The Foundation for Unified Communications

Network Security. Network Security. Protective and Dependable. > UTM Content Security Gateway. > VPN Security Gateway. > Multi-Homing Security Gateway

Scenario 1: One-pair VPN Trunk

PCN Cyber-security Considerations for Manufacturers. Based on Chevron Phillips Chemical Company PCN Architecture Design and Philosophy

VPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs.

Gigabit Multi-Homing VPN Security Router

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

Innovative Defense Strategies for Securing SCADA & Control Systems

IP Telephony Management

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Voice over IP Basics for IT Technicians

ethernet services for multi-site connectivity security, performance, ip transparency

Information Technology Cluster

Secure Access into Industrial Automation and Control Systems Industry Best Practice and Trends. Serhii Konovalov Venkat Pothamsetty Cisco

Application Note Secure Enterprise Guest Access August 2004

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Gigabit SSL VPN Security Router

What is Bitdefender BOX?

SSVVP SIP School VVoIP Professional Certification

Best Practices: Pass-Through w/bypass (Bridge Mode)

Using IPsec VPN to provide communication between offices

Gigabit Content Security Router

Lucent VPN Firewall Security in x Wireless Networks

ehealth Ontario EMR Connectivity Guidelines

OCR LEVEL 3 CAMBRIDGE TECHNICAL

Security appliances with integrated switch- Even more secure and more cost effective

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Is Your Network Ready for the ipad?

Campus LAN at NKN Member Institutions

Digi Connect WAN Application Guide Using the Digi Connect WAN and Digi Connect VPN with a Wireless Router/Access Point

How To Make A Cell Phone Converged Into A Cell Network

VLAN 802.1Q. 1. VLAN Overview. 1. VLAN Overview. 2. VLAN Trunk. 3. Why use VLANs? 4. LAN to LAN communication. 5. Management port

Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment

Enterprise Business Products 2014

SCADA. Supervisory Control and Data Acquisition. How to monitor and control your business operation in the most cost-effective way.

Cyber Security for the energy industry

VIA COLLAGE Deployment Guide

Transcription:

Smart Substation Security SmartSec Europe 2014 Amsterdam 29/01/2014

Agenda Context Elia Introduction to the substation environment in Elia Security design and measures in the substation Near and far future 2

About the Elia Group Introduction Among the five largest transmission system operators in Europe Frontrunner in grid integration of renewables since incorporation in 2001 Listed on Stock Exchange since 2005 1,950 employees 380 kv and 220kV (down to 30kV in Be) 870 substations Fully unbundled World experience in RES integration 3

About Elia Belgium Customers: 130 direct customers (connected to ELIA s net) Over 25 Distribution System Operators 1.250 employees 11 sites in Belgium 800 HV Substations Network : Mostly owned or leased Cu, Fo Some Leased Lines (local telecom provider) Tests with satellite communication 4

General Concept : Defence in Depth Defense in depth principle: Security threats are not mitigated by a single counter measure only but by implementing several complementary security techniques at multiple levels 5

What has changed the world (of the substations)? Point to point connections Security Old Access network technology with TDM, SDH Low bandwidth needs No online access needs to information Only telephony needed Assets maintained locally and limited information about their state Business A lot of interaction between devices Need for IP and more mainstream technologies (MPLS) High bandwidth needs Technicians on the field need online access to office space online access to information Assets maintained remotely from a normal PC 6

Example : Old situation RTU 7

Today : connections based on IEC104 (IP) MPLS 8

Example : Asset Control Center 9

Steps in the design exercise with impact on security Step 1 inventory of data flows and protocols and their criticality Step 2 Architectural design of network and channels (VPN/VLAN) Step 3 cyber risk identification and mitigation (acceptance or compensating controls) 10

NEEDS GENERALITY DATA FLOWS Remote-reading & data management : Metering, power quality files Remote-monitoring : equipment status (alarms, events, ) Remote-maintenance : action on equipment (parameterization, ) Remote-control : action on HV substation (RTU) Others : telephony, cameras, 29/01/2014 SmartSec Europe 2014 11

Some results of this excercise LAN and WAN high level design Hub and spoke model Jumpserver (gateway functionality) Network authentication and port security in the substation 29/01/2014 SmartSec Europe 2014 12

LAN and WAN high level design SASLAN SAS LAN based on 2 physical independent LANs GLAN SLAN GLAN for general applications of HV substation SLAN for protection, control and automation => IEC61850 (> 2018) Why? High cyber-security level protection = segregation General applications require medium and low level performances and are not critical for protection & control of HV Substation Protection, control and automation applications require high level performances and are critical for protection & control of HV substation 13

LAN and WAN high level design VLAN Switch LAN Router WAN Router WAN SBUSLAN VLAN VLAN IP/MPLS WAN SCADA Switch LAN VPN tunnels Firewall Office network VLAN GLAN VLAN VLAN Network Management SBUS-LAN and G-LAN Telephony Data ELIA/Wifi and guest wifi Data Elia wired Videosurveillance, access control SBUS-LAN Electricity Management (RTU, ) G-LAN Electricity Management (Perturbo, Counter, Qwave, ) 14

LAN and WAN high level design IP address plan reflecting functional communication planes Allows easy configuration of firewalls based on L3 IP address Configuration based on L2 MAC addresses is not manageable Prioritisation of traffic / QOS / Classification 29/01/2014 SmartSec Europe 2014 15

Hub and spoke model Substation Substation 1 Central firewall X WAN IP/MPLS substation 2 + Manageability + Easy to change technology + Logging - Agree to possibly lose a complete substation - Single point of failure? 29/01/2014 SmartSec Europe 2014 16

Jumpserver : Access to devices in the substation Substation SBUSLAN switch access to applications based on Active Directory groups Substationgateway/ Jumpserver WAN switch GLAN Router Router Office LAN 17

Network authentication and port security First choice : network authentication 802.1x (mostly GLAN) Second choice : port security (based on MAC) BUT : Difficult to find IED s that support proper network authentication 18

Specific constraints in TSO world Long lifetime of electricity assets We don t trust the embedded security features for the moment and choose to bolt on security where possible Harsh environment (ruggedized equipment) mainstream security equipment is not always suited Long decision process with European Tender for frame agreements Not easy to make quick choices (long time between writing a tender and decision) Availability is still number 1 priority for some devices stopping a false positive can do more damage than letting through a potential attack 19

What s still on our roadmap? shortterm blackbox implementations based on common mainstream technology : (e.g. windows embedded no antivirus, no patching, local admin, no lockdown) Blackout mitigation out of design scenario : Emergency preparedness exercise Cyberattack on realtime environment Regular contact with vendors, SPOC for security, security roadmaps Midterm Establishment of 24/7 Security Operation Center Next-gen industrial firewalls in monitoring mode longer Next gen industrial firewalls in blocking mode based on business transaction monitoring? Embedded security in devices?, IEC 62351? 29/01/2014 SmartSec Europe 2014 20

Questions? kris.hallaert@elia.be 29/01/2014 SmartSec Europe 2014 21