Cyber Security. Global solutions for energy automation. Benefit from certified products, system solutions. www.siemens.

Similar documents
/ gridsecurity Cyber Security Global solutions for energy automation Answers for infrastructure and cities.

Siemens ENEAS solutions for substation automation and protection

Document ID. Cyber security for substation automation products and systems

Security all around. Industrial security for your plant at all levels. siemens.com/industrialsecurity. Answers for industry.

GE Measurement & Control. Cyber Security for Industrial Controls

SICAM PAS - the Key to Success Power Automation compliant with IEC and your existing system

Answers for energy. The competitive edge in power network services

Protecting productivity with Plant Security Services

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards

SIPROTEC. Feeder Automation Controller 7SC80. Preface. Contents. Goal/Purpose 1. System Overview 2. Hardening 3 V4.0. Malware Protection 4

Symphony Plus Cyber security for the power and water industries

Transmission and distribution service level agreements

Monitoring and diagnostics

siemens.com/scada SIMATIC SCADA Systems Efficient to a new level Answers for industry.

Security in the smart grid

TRIPWIRE NERC SOLUTION SUITE

Monitoring, diagnostics, and cable services

PREMIER SERVICES MAXIMIZE PERFORMANCE AND REDUCE RISK

Changing locations every day. Can service be as mobile as a locomotive?

Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, CASE: Implementation of Cyber Security for Yara Glomfjord

The Next Generation of Security Leaders

RUGGEDCOM CROSSBOW. Secure Access Management Solution. siemens.com/ruggedcom. Edition 10/2014. Brochure

INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT

Bellevue University Cybersecurity Programs & Courses

Smart Grids Part 3. Renewable Energy and Cyber Security

Siemens Hybrid Power Solutions. Cost and emission reduction by integrating renewables into diesel plants

Decrease your HMI/SCADA risk

GE Measurement & Control. Cyber Security for NEI 08-09

Power network telecommunication

CG Automation Solutions USA

A favorable investment in solar power

Security for. Industrial. Automation. Considering the PROFINET Security Guideline

Smarten up your last mile

Cyber Security for NERC CIP Version 5 Compliance

Industry Software from Siemens

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

Market Data + Services. Advanced outsourcing solutions. IT Hosting and Managed Services

SIPROTEC 5 Application Note

Windows Server 2003 migration: Your three-phase action plan to reach the finish line

joint Resource Optimization and Scheduler

Services the Next Level. How Industry Services from Siemens help you discover a new source of competitive advantage. siemens.com/industry-services

ABB s approach concerning IS Security for Automation Systems

Industrial Security for Process Automation

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

GE Measurement & Control. Cyber Security for NERC CIP Compliance

SPPA-T3000 Control System The Benchmark in Controls

Cyber Security and Privacy - Program 183

PSS SINCAL efficient planning software for electricity and pipe networks. Siemens PTI Software Solutions. Answers for energy.

Realize your full potential with the new version of SIMATIC PCS 7

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture

A full range of monitoring solutions for surge arresters Answers for energy.

The first step in protecting Critical Cyber Assets is identifying them. CIP-002 focuses on this identification process.

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

System approach to archiving and reporting

FACTS Customer Service. Your uptime insurance ABB FACTS Care

GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

Cisco Advanced Services for Network Security

Power Island. Industrial Power Plants. / energy

Best Practices in ICS Security for System Operators. A Wurldtech White Paper

Industrial Cyber Security. Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities

SIMATIC PCS 7 takes you beyond the limits. SIMATIC PCS 7. Answers for industry.

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less

Easy. Modular. Universal. Laboratory automation with SIMATIC PCS 7 LAB SIMATIC PCS 7. Answers for industry.

BoardNox. Secure file sharing solution for Executive Committees and Boards of Directors.

Payment Card Industry Data Security Standard

A Systems Approach to Protecting the U.S. Air Traffic Control System Against Cyber-Terrorism

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System

Securing Distribution Automation

Business Continuity Policy

ISACA rudens konference

Industrial Security Solutions

White Paper Secure Reverse Proxy Server and Web Application Firewall

Information Security Services

:: MANAGING YOUR AGENCY :: STAY COMPETITIVE WITH APPLIED DORIS

Enhanced calibration High quality services from your global instrumentation partner

Radia Cloud. User Guide. For the Windows operating systems Software Version: Document Release Date: June 2014

Network Test Labs (NTL) Software Testing Services for igaming

IBX Business Network Platform Information Security Controls Document Classification [Public]

CSMS. Cyber Security Management System. Conformity Assessment Scheme

Emerson s Smart Wireless and WIB Requirements

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

PKI Certificate Renewal Guide. How to Install Medicare Australia's Public Certificate

BMC s Security Strategy for ITSM in the SaaS Environment

PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD

Brainloop Cloud Security

Automation Unit TM 1703 ACP Flexible automation and telecontrol

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

William Hery Research Professor, Computer Science and Engineering NYU-Poly

Preparing for the HIPAA Security Rule

Microsoft s cybersecurity commitment

HP Security Solutions for Microsoft

Transcription:

Benefit from certified products, system solutions Cyber Security Global solutions for energy automation WIB Certification www.siemens.com/gridsecurity

Cyber Security: Security from the very start More and more, we are networking our systems and standardizing communication protocols and operating systems. And although these trends simplify processes and ensure efficiency in operation, they also leave our networks vulnerable. How can we effectively protect the power supply against attacks? First and foremost, by planning security ahead of time. For a network to be secure, security must already be regarded as an integral part of network planning and design. The best way to arrive at a complete, cost-effective system solution is by making security an integral part of the earliest planning stages. Such a solution integrates security into all phases of the development process. In the end, it includes precisely those security features that are absolutely necessary no more and no less thereby eliminating the need for expensive and timeconsuming upgrades. Siemens offers products, systems and solutions that are specially designed for energy automation. Right from the start, they meet the highest security requirements including those of the BDEW white paper (German Association of Energy and Water Industries) and NERC CIP (North American Electric Reliability Corporation, Critical Infrastructure Protection).

Siemens Energy Automation: Security on every level Our products: integrated security Software and firmware integrity protection Encryption and secure communication Centralized user management support for station automation and local operator terminals Compliance with the IEC 62351 security standard Our systems and solutions: end-to-end security Tested security architectures Recommendations for network components Security updates Virus protection Our expertise and services: for security into the future Standardized patch management Contribution in the creation of international security standards such as IEC 62351 Participation in national and international panels on security in the Smart Grid Secure development process Consulting services for everything relating to cyber security

Secure authentication in DIGSI 5 Encrypted communication with SICAM PAS Encryption and secure communication Siemens systematically integrates information security into all automation and networking. Confidential data such as passwords are always stored in an encrypted form. We also protect communication using, for example, SIPROTEC 5 and DIGSI 5 parameterization software. The latest authentication methods ensure that protection devices accept only encrypted connections coming directly from DIGSI 5. In the other direction, the software unambiguously identifies the devices by a certificate. Nothing could be more secure. From station automation to the control center and bay controllers we also offer encryption to IEC 62351 for other communication channels in the power supply system. For example, in the case of SICAM PAS, the automation system optionally encrypted information via the IEC 60870-5-104 and DNP3i protocols. Firmware, software, and data integrity Firmware files for SIPROTEC 5 or SIPROTEC 7SC80 contain a digital signature that the device checks each time a new firmware version is loaded. Thus Siemens ensures that only approved firmware versions are run and effectively protects against manipulated or defective software. you on current topics such as remote access to your plant. Here again, forward-looking security concepts are of primary importance. Convenient user management for SICAM SCC Operational security How to reduce security risks in daily plant operation? With a centralized approach, using the principle of least privilege to keep plant access to an absolute minimum. Siemens supports you in implementing a suitable user management system. Tailored consulting How effective are your security technologies? Have individual components become outdated? What measures would make your plant more secure? Check your plant for security vulnerabilities on a regular basis. Siemens supports you in this and in redesigning or reconfiguring your IT security. Dependable services Whether your automation and IT infrastructure is wellestablished or newly designed, it is unique. Siemens always plans and carefully evaluates the integration of a product from start to finish. To guarantee operational security over the long term as well, we offer a software and firmware update service. We also actively inform you as soon as we learn of new security vulnerabilities and security updates that are available for you. Business continuity and disaster recovery Arm yourself against the unexpected: The redundancy concepts of Siemens products and solutions guarantee that your plant will continue to operate when individual components or subsystems fail. We also assist you in developing disaster and recovery plans. Getting your plant up and running as soon as possible after a security incident occurs that is our goal.

Products, systems, and expertise: Security in every detail Our products: integrated security Strict guidelines have been established in the industry to increase security in energy automation systems. Siemens products support the implementation of these guidelines with effective and appropriate security functions that are integrated right from the start. Access control If you already have centralized user management with Microsoft Active Directory, you can simply integrate HMI systems such as SICAM SCC or station automation systems like SICAM PAS. You can quickly grant authorizations and modify or revoke them at any time, thus ensuring that only authorized persons can access your plant. Our systems and solutions: end-to-end security The more comprehensively IT security in energy automation systems is viewed, the more efficient and cost-effective the solutions will be. Siemens offers global concepts for an efficient security architecture in your plant. Secure system design Thanks to many years of experience and worldwide expertise, our components, architectures, and safeguards have been thoroughly tried and tested. You can rely on our guidelines for securely expanding your infrastructure, or for hardening your system in other words, eliminating all components that are not absolutely necessary. Last but not least, we advise Our expertise and services: for security into the future In order to stay ahead of the game in the field of IT security, Siemens employees undergo regular training. This means that the latest requirements are always taken into account in development. You can rely on our decades of experience. Secure standards Siemens shapes the industry. Our experts serve on national and international committees, drafting regulations and developing standards. This is where we bring our expertise to bear for example, in the International Electrotechnical Commission (IEC) or the EU s Smart Grid Taskforce.

Published by and copyright 2015: Siemens AG Energy Management Humboldtstr. 59 90459 Nuremberg Germany www.siemens.com/gridsecurity For more information, please contact our Customer Support Center. Phone: +49 180 524 84 37 Fax: +49 180 524 24 71 (Charges depending on the provider) E-mail: support.energy@siemens.com Order No. IC1000-G220-A164-X-4A00 Printed in Germany AL=N ECCN=N Dispo 6200 HL 14119579 WS 01131.0_07141.0 03.2015, Siemens AG Printed on elementary chlorine-free bleached paper. All rights reserved. Trademarks mentioned in this document are the property of Siemens AG, its affiliates, or their respective owners. Subject to change without prior notice. The information in this document contains general descriptions of the technical options available, which may not apply in all cases. The required technical options should therefore be specified in the contract. For all products using security features of OpenSSL, the following shall apply: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (www.openssl.org) This product includes cryptographic software written by Eric Young. (eay@cryptsoft.com)