Cyber Security in the Digital Substation and Beyond. Energy Management > Energy Automation
|
|
- Rosemary Jasmine Dixon
- 6 years ago
- Views:
Transcription
1 Cyber Security in the Digital Substation and Beyond Energy Management > Energy Automation siemens.com/gridsecurity
2 Cyber Security Offerings From Siemens Energy Management Integrated Security in our products Secure Substation Design Solution Page 2 April 13-17, 2015 siemens.com/gridsecurity Bisale/Kohl Energy Management
3 Security is a must for Digital Substations Business targets Are you prepared for Cyber Security? Achieve Power System Operator Organization Processes Infrastructure Mitigate Comply Cyber risks Cyber Regulations & Standards Page 3 April 13-17, 2015
4 Cyber Risks Examples from IT-Security Report: Austria: Malfunction of control in energy networks Dragon: Targeted attacks to production networks Advanced Persistent Threats (APT): Attack against industrial plants in Germany Bundesamt für Sicherheit in der Informationstechnik: blob=publicationfile Page 4 April 13-17, 2015 siemens.com/gridsecurity Bisale/Kohl Energy Management
5 Cyber Risks ICS-CERT Responses to sector specific cyber security threats across the critical infrastructure sectors in the U.S. in 2014 Percentages related to the total response for 2014 Number of incidents Percentage of incidents Source: The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Unrestricted Siemens AG 2015 All rights reserved. Page 5 April 13-17, 2015 siemens.com/gridsecurity Bisale/Kohl Energy Management
6 Cyber Regulations & Standards Regulation makes implementation of ISMS mandatory General Law Regulation Standard ISO/IEC Standard ISO/IEC ISO/IEC/TR BDEW Whitepaper EnWG 11 Abs. 1 angemessener Schutz BSI Gesetz ( ) IT Sicherheitsgesetz (open) BnetzA / Informationssicherheitskatalog Information Security Management System Implementation Guidelines for ISO Controls Guidelines for process control systems specific to the energy utility industry Requirements for secure process controls and telecommunication system Specific Requirements Organization IT/OT-Processes Process Control Systems Page 6 April 13-17, 2015
7 Cyber Regulations & Standards NERC CIP Critical Infrastructure Protection Standards North American Electric Reliability Corporation (NERC) = Non-Profit Organization in US Specifies the minimum security requirements to ensure the security of the electronic exchange of information for supporting the bulk power system Unified format (intro, rules, measures, compliance (or deviation), regional specifics and history) Scope Physical Security Video, Access Control, Media Management Cyber Security Authorization, Integrity, Segmentation Security Operations Authorization, Integrity, Segmentation Parts Sabotage Reporting BES Cyber System Categorization Security Management Controls Personnel and Training Electronic Security Physical Security Systems Security Management Incident Reporting and Response Planning Recovery Plans for BES Cyber Systems Configuration Change Management and Vulnerability Assestm. Information Protection Mandatory for operators of power systems in USA, Canada and Mexico by Energy Policy Act of 2005 (EPACT) à Compliance process based on self audit, which must be repeated yearly Verification through a local NERC auditor, correction within 30 days required. Page 7 April 13-17, 2015
8 Digital Substations are vulnerable to Cyber Attacks Control Center Level Connectivity brings the high risk of Cyber Threats Unauthorized Access Malware HMI Internet-based Attacks Substation Level Field Level Page 8 April 13-17, 2015
9 Digital Substations are vulnerable to Cyber Attacks Conditions Zone Control Center Level Remote Access Station Level Field Level Conditions: Critical Infrastructure 24 h Operation Windows and Linux standard components Interfaces to unsecure networks Interfaces to office networks Legacy components Proprietary technology Mix of components from different vendors with different technologies Page 9 April 13-17, 2015
10 Digital Substations are vulnerable to Cyber Attacks Possible Threats and Attackers Control Center Level Possible Attackers: States Remote Access Criminal Organizations Zone Misuse of access rights Attacks via internet Attacks via internet Misuse of access rights Malware Malware Station Level Script Kiddies Insider Malware Unauthorized access Unauthorized access Field Level Page 10 April 13-17, 2015
11 Security is a must for Digital Substations Regulatory Compliance is a must for Operators You need a trustworthy and competent partner who delivers secure products and solutions Products and Solutions Process Control Systems Organisation IT/OT- Processes Consulting Coming soon: TÜV SÜD certified secure solutions offered by SIEMENS Page 11 April 13-17, 2015
12 Security is a must for Digital Substations Siemens Covers all Cyber Security Aspects Policies, Processes and Procedures Organizational security, secure development and integration, vulnerability and incident handling Security Technologies Organizational Preparedness Secure System Architecture Secure Development System Hardening Secure Integration and Service Access Control and Account Management Vulnerability and Incident Handling Security Logging/ Monitoring Common security technologies need to be implemented and contribute to the overall secure system architecture Security Patching Malware Protection Backup and Restore Secure Remote Access Data Protection and Integrity Privacy Page 12 April 13-17, 2015
13 Migrating to a Secure Digital Substation Siemens Approach Customer Requirements Asset Inventory Network Topology Assessment Concept / Offer Regulatory Requirements Page 13 April 13-17, 2015
14 Migration to Secure Substation Current State Control Center Level Legend Account Mgmt. RBAC (Roll based Access Control) Malware Protection Remote Access VPN Firewall Trusted Zone Zone Station Level DMZ Untrusted Network Switch Router with Firewall IEDs (Protection Devices, Field Devices) Field Level Station Controller PC Control Center Hardening Measures Page 14 April 13-17, 2015
15 Migration to Secure Substation Secure Architecture Control Center Level Remote Access Zone Consideration of spatial distribution (Physical Security Perimeter) Operational management Used assets Zone I Service PC Station Level Zone II Field Level Page 15 April 13-17, 2015
16 Migration to Secure Substation Hardening Control Center Level Hardening in a heterogeneous environment Remote Access Zone Hardening of products and systems Zone I Service PC Station Level Siemens products 3rd party products Zone II Field Level Page 16 April 13-17, 2015
17 Migration to Secure Substation Access Control / Account Management (ACAM) Control Center Level Remote Access Zone ACAM for PC based systems ACAM for embedded systems Integration into installed systems Zone I Service PC Station Level Zone II Field Level Page 17 April 13-17, 2015
18 Migration to Secure Substation Malware Protection Control Center Level Malware protection for PC based systems Remote Access Zone Antivirus Solution Application Whitelisting Solution Zone I Service PC Station Level Malware protection for embedded devices Zone II Field Level Page 18 April 13-17, 2015
19 Migration to Secure Substation Security Logging / Secure Communication Control Center Level Remote Access Zone Security Logging, e.g. integration into existing infrastructure Secure communication, e.g. communication to control center Zone I Service PC Station Level Zone II Field Level Page 19 April 13-17, 2015
20 Migration to Secure Substation Secure Remote Access Control Center Level Remote Access Zone Secure remote access Secure remote access integration into installed infrastructure Zone I Service PC Station Level Zone II Field Level Page 20 April 13-17, 2015
21 Control Center Level Migration to Secure Substation Security Patching Delivery of a patched system Concept for Patch Management Zone I Station Level Remote Access Zone Service PC Field Level Zone II Page 21 April 13-17, 2015 siemens.com/gridsecurity Bisale/Kohl Energy Management
22 Control Center Level Migration to Secure Substation Backup and Restore Backup and Restore concept for the system Backup and Restore Concept as Remote Access Zone Zone I Station Level base for Patch Management Service PC Backup and Restore Concept as base for disaster recovery plan Field Level Zone II Page 22 April 13-17, 2015 siemens.com/gridsecurity Bisale/Kohl Energy Management
23 Migration to Secure Substation Secure Substation Control Center Level Legend Account Mgmt. RBAC (Roll based Access Control) Malware Protection VPN Remote Access Zone Firewall Zone I Station Level Trusted Zone Service PC DMZ Untrusted Network Switch Router with Firewall IEDs (Protection Devices, Field Devices) Field Level Zone II Station Controller PC Control Center Hardening Measures Page 23 April 13-17, 2015 siemens.com/gridsecurity Bisale/Kohl Energy Management
24 Security is a must for Digital Substations Secure Substation Control Center Level Legend Account Mgmt. RBAC (Roll based Access Control) Malware Protection Security Controls, e.g. Secure Architecture VPN Secure zoning concept Remote Access Zone Firewall Secure Hardening DMZ Malware Protection Untrusted Network Switch Zone I Service PC Station Level Trusted Zone Access Control Account Management Router with Firewall Security Patching IEDs (Protection Devices, Field Devices) Zone II Field Level Station Controller PC Control Center Hardening Measures Page 24 April 13-17, 2015 siemens.com/gridsecurity Bisale/Kohl Energy Management
25 BNetzA conformant Solutions with Out of Band Management Coming Soon: TÜV SÜD Certified Modules offered by Siemens Module: Secure System Components By end of 2015: Windows Security package as part of the Secure System Components module Module: sichere Fernwartung Module: secure maintenance processes Module: Sichere Netzwerkstruktur Processspanning modules Module: Backup und Restore Page 25 April 13-17, 2015 Module: Zentrale Benutzer und Rollenverwaltung Module: SIS4EA Logging
26 Security Patch Management Keeping the Substation Secure & Up-to-date VENDOR-SIDE SECURITY PATCH MANAGEMENT OPERATOR-SIDE SECURITY PATCH MANAGEMENT register notify Patch Information Patch from Vendor 2 Patch from Vendor 1 Patch from Vendor n Patches to apply in the substation Regulation: Challenges: Keep the security patch status of DSAS up-to-date High availability and reliability of operation have priority Patch Management must be scalable, secure and costefficient Automation can help to support the key requirements Page 26 April 13-17, 2015
27 Siemens Cyber Security Solutions help the power system operator We protect your infrastructure so you can focus on your core business Secure your business Mitigate Cyber Risks Comply to Regulations & Standards Page 27 April 13-17, 2015
28 Energy Automation Products at a Glance Protection Security Substation Automation Security Distribution Automation Security Page 28 April 13-17, 2015 siemens.com/gridsecurity Bisale/Kohl Energy Management
29 Protection SIPROTEC 5 Page 29 April 13-17, 2015 siemens.com/gridsecurity Bisale/Kohl Energy Management
30 Safety and Security inside SIPROTEC 5 Multi-level Security Engineering and Operation Encryption of the communication line between DIGSI 5 and the SIPROTEC 5 device Secure development Patch management Antivirus compatibility Connection password according to NERC-CIP and BDEW White Paper Recording of access attempts in a non-volatile security log and IEC messaging Confirmation codes for safety-critical operations Independent testing Secure development Digitally signed firmware Internal firewall Separation of process and management communication Crypto-chip for secure information storage Page 30 April 13-17, 2015
31 Substation Automation SICAM Product Range SICAM SCC HMI SICAM AK 3 Substation Automation SICAM PAS Substation Automation Page 31 April 13-17, 2015 siemens.com/gridsecurity Bisale/Kohl Energy Management
32 SICAM PAS - Substation Automation User Management and Authorization Restrictive Control of User Administration in SICAM PAS/PQS Role to rights assignment for configuration and operation tasks Predefined user groups User Group Manage Access Rights Read Configurati on Write Configurati on View Operations Manage Operations Administrator ü ü ü ü ü System Engineer ü ü ü ü Data Engineer ü ü ü Switch Operator ü ü ü Guest ü ü Page 32 April 13-17, 2015
33 SICAM PAS - Substation Automation Secure Communication Secure Communication in SICAM PAS Certificate management for TLS-based communication IEC conformance IEC conformance Secure IEC 104 slave Secure DNP 3.0i slave Secure DNP 3.0i master Page 33 April 13-17, 2015
34 SICAM RTUs - Substation Automation User Management and Authorization Restrictive Control of User Administration in SICAM TOOLBOX II Role to rights assignment for configuration and operation tasks Extensible user roles User Group Remote Operation Administrat ion Load Firmware Administrator Professional ü ü ü ü ü (Role based Access Control for Standard ü ü 40 operations in User Defined Role 1 ü ü total) User Defined Role n ü Page 34 April 13-17, 2015
35 SICAM RTUs - Substation Automation Secure Communication SICAM AK3 Secure default settings Deactivation of un-used ports (hardening) Whitelisting interface to 3rd party networks Available with IEC 104 and IEC 101 Defined set of classified data Fixed set of rules Limitation of data transfer rate Integrated switch a by hardware By parameter setting a by software Integrated crypto chip Certificates loaded in factory Secured communication (TLS) Random generator for cyclic exchange of session key Page 35 April 13-17, 2015 siemens.com/gridsecurity Bisale/Kohl Energy Management
36 SICAM AK3 Substation Automation Application Firewall Feature Office Zone Control Center Zone Site-to-Site VPN WAN HW based applica-on layer firewall For network segmenta-on To mi-gate the risk of DoS a?acks Integra-on of legacy systems Substation Zone mobile SICAM TOOLBOX II legacy Systems SICAM AK, AK 3, TM & 2 SM-2558 SICAM AK & SM-2556 SAT Ax, SK SICAM TM 1703ACPCP-6014 SICAM TM 1703 ACPCP-6014 SICAM TM & SM-2556 LAN Private messages (no IP) OSI-Stack NIP OSI-Stack NIP2 LAN SICAM MIC SICAM EMIC Page 36 April 13-17, 2015
37 SICAM SCC - HMI User Management and Authorization Flexible Control of Runtime User Administration in SICAM SCC (HMI) Page 37 April 13-17, 2015
38 Security in Substation Automation Security Logs SICAM TOOLBOX II SICAM PAS Page 38 April 13-17, 2015
39 Distribution Automation Product Range SICAM CMIC Distribution and Feeder Automation SICAM SGU SIPROTEC 7SC80 Page 39 April 13-17, 2015 siemens.com/gridsecurity Bisale/Kohl Energy Management
40 SICAM CMIC Distribution Automation Secure Communication & Operation! IEC IEC serial! https GPRS modem IPSec-enabled router WIFI Encryption with IPSec https! 1. Secure Engineering SICAM WEB SICAM TOOLBOX II with https 2. Secure communication with IPSec 3. Penetration testing during system test 4. Certificate Management Concept available Misuse of access rights Page 40 April 13-17, 2015
41 SICAM SGU Distribution Automation End-to-site Secure Cellular Communication Including ping echo to monitor the VPN tunnel VPN tunnel for all communication protocols : Redundant IEC HTTP web configuration Ping supervision IP Security (IPSec) Protocol Tunnel Authentication / Encryption Perfect Forward Secrecy Page 41 April 13-17, 2015
42 Cyber Security Rack RUGGEDCOM CrossBow Features & Benefits FEATURES Security Management Password Management for IEDs Firmware/Configuration monitoring Secure Remote Access (VPN/TLS) A single system can support or more field devices hundreds of users Installed Base Approximately 40 systems in service today primarily in North America Security Solution for legacy and new products BENEFITS Logging of Security Events Audit Log available (IED access, firmware changes, etc) Integrate with Existing User Management Systems Microsoft Active Directory support RSA Secure ID support NERC CIP, BDEW Whitepaper Compliance Access Control Integrity Protection Password Management One system for multiple vendors Siemens, GE, SEL, others Page 42 April 13-17, 2015
43 Cyber Security Rack CrossBow Integration ü Firmware Monitoring ü Configuration Monitoring HMI SICAM SCC CYBER SECURITY RACK RUGGEDCOM CROSSBOW SERVER IED CONFIGURATION DIGSI 5 DIGSI 4! Hosted on rack pc ü Access Control SICAM PAS STATION UNIT SIMATIC IPC RACK PC ü Firmware Monitoring ü Configuration Monitoring ü Password Management ü Firmware Monitoring ü Configuration Monitoring RX 1501 ROUTER ü Password Management ü Firmware Monitoring ü Configuration Monitoring SIPROTEC 5 ü Firmware Monitoring ü Configuration Monitoring SIPROTEC COMPACT Page 43 April 13-17, 2015
44 Cyber Security Rack Secure Communication CYBER SECURITY RACK SIEMENS NBGH HMI IED CONFIGURATION REMOTE SICAM SCC SICAM SCC RUGGEDCOM CROSSBOW SERVER DIGSI 5 DIGSI 4 REMOTE DESKTOP secure connection Remote Security Monitoring SICAM PAS STATION UNIT Hosted on rack pc SIMATIC IPC (RACK PC) RX 1501 ROUTER WIDE AREA NETWORK SCALANCE S ROUTER WIFI NETWORK SICAM CMIC SIPROTEC 5 SIPROTEC COMPACT SICAM SGU IEC 104 over IPSec CELLULAR NETWORK Secure Web Engineering cyber security event over IEC cyber security event over binary input IEC 104 over IPSec WIDE AREA NETWORK Page 44 April 13-17, 2015
45 Thank you for your attention! Chaitanya Bisale Product Lifecycle Manager Cyber Security & Substation Automation EM EA PRO LM2 Humboldtstr Nuremberg Phone: +49 (911) Mobile: +49 (172) Andreas Kohl Lifecycle Manager Cyber Security EM EA SYS LM-O Humboldtstr Nuremberg Phone: +49 (911) Mobile: +49 (172) siemens.com/gridsecurity Page 45 April 13-17, 2015
ДОБРО ПОЖАЛОВАТЬ SIEMENS AG ENERGY MANAGEMENT
ДОБРО ПОЖАЛОВАТЬ SIEMENS AG ENERGY MANAGEMENT ENERGY AUTOMATION - SMART GRID Restricted Siemens AG 20XX All rights reserved. siemens.com/answers Frederic Buchi, Energy Management Division, Siemens AG Cyber
More informationCyber security for digital substations. IEC Europe Conference 2017
Cyber security for digital substations IEC 61850 Europe Conference 2017 Unrestricted Siemens 2017 siemens.com/gridsecurity Substation Digitalization process From security via simplicity 1st generation:
More informationComprehensive Cyber Security Features in SIPROTEC & SICAM. SIPROTEC Dag 11. Mei 2017
Comprehensive Cyber Security Features in SIPROTEC & SICAM SIPROTEC Dag 11. Mei 2017 siemens.tld/keyword Changes to Substation Automation and Protection over Time Evolving Threat Landscape (tomorrow today...)
More informationi-pcgrid WORKSHOP 2016 INTERACTIVE REMOTE ACCESS
i-pcgrid WORKSHOP 2016 INTERACTIVE REMOTE ACCESS siemens.com/ruggedcom INTERACTIVE REMOTE ACCESS INTELLIGENT ELECTRONIC DEVICES Intelligent Electronic Devices (IEDs) Devices that can provide real-time
More informationGerhard Brndt, ABB AG, BU Power Generation Cyber Security and Compliance in Increasingly Distributed and Aging Power Generation Infrastructures
Gerhard Brndt, ABB AG, BU Power Generation Cyber Security and Compliance in Increasingly Distributed and Aging Power Generation Infrastructures ABB Group June 20, 2012 Slide 1 Situation of today The potential
More informationSecurity in grid control centers: Spectrum Power TM Cyber Security
Security in grid control centers: Spectrum Power TM Cyber Security Thomas Schmidt, Information Security Manager siemens.at/future-of-energy Spectrum Power TM 7 Historical Information System Table of content
More informationIndustrial Security - Protecting productivity. Industrial Security in Pharmaanlagen
- Protecting productivity Industrial Security in Pharmaanlagen siemens.com/industrialsecurity Security Trends Globally we are seeing more network connections than ever before Trends Impacting Security
More informationDigital Substation Unrestricted Siemens AG 2017 siemens.com/digital-substation
Digital Substation A Substation Why Should We Make It Digital? Adopt new business models Time to operation Quality assurance Business agility Avoid outages Investment security Ensuring grid availability
More informationHacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK
Hacker Academy Ltd COURSES CATALOGUE Hacker Academy Ltd. LONDON UK TABLE OF CONTENTS Basic Level Courses... 3 1. Information Security Awareness for End Users... 3 2. Information Security Awareness for
More informationDigital Grid Products At a Glance Protection, Substation Automation, Power Quality
Digital Grid Products At a Glance Protection, Substation Automation, Power Quality siemens.com/digitalgrid Digital Grid Products Broadest portfolio strong brands Substation Automation, RTU s Power Quality
More informationThe Common Controls Framework BY ADOBE
The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.
More informationFunctional. Safety and. Cyber Security. Pete Brown Safety & Security Officer PI-UK
Functional Safety and Cyber Security Pete Brown Safety & Security Officer PI-UK Setting the Scene 2 Functional Safety requires Security Consider just Cyber Security for FS Therefore Industrial Control
More informationIndustrial Cyber Security. ICS SHIELD Top-down security for multi-vendor OT assets
Industrial Cyber Security ICS SHIELD Top-down security for multi-vendor OT assets OT SECURITY NEED Industrial organizations are increasingly integrating their OT and IT infrastructures. The huge benefits
More informationIndustrial Security Co-Sourcing: Shifting from CapEx to OpEx Presented by Vinicius Strey Manufacturing in America 03/22-23/2017
Industrial Security Co-Sourcing: Shifting from CapEx to OpEx Presented by Vinicius Strey Manufacturing in America 03/22-23/2017 Unrestricted Siemens 2017 usa.siemens.com/mia Table of contents Industrial
More informationSICAM RTUs Ready for the Future
SICAM RTUs Ready for the Future, RC-AT EM DG PRO LM siemens.com SICAM RTUs News Overview SICAM A8000 Series SICAM Engineering SICAM AK3 Page 2 SICAM RTUs News Overview SICAM A8000 Series SICAM Engineering
More informationWatson Developer Cloud Security Overview
Watson Developer Cloud Security Overview Introduction This document provides a high-level overview of the measures and safeguards that IBM implements to protect and separate data between customers for
More informationSIPROTEC 5 V7.8 Protection, automation and monitoring for digital substations
SIPROTEC 5 V7.8 Protection, automation and monitoring for digital substations siemens.com/siprotec5 SIPROTEC 5 Table of content Introduction New functions of V7.8 SIPROTEC 5 - the core of Digital Substation
More informationCyber Security for Process Control Systems ABB's view
Kaspersky ICS Cybersecurity 2017, 2017-09-28 Cyber Security for Process Control Systems ABB's view Tomas Lindström, Cyber Security Manager, ABB Control Technologies Agenda Cyber security for process control
More informationNAVIGATING THE WATERS OF THE NEW EU NIS 2016/1148 CYBERSECURITY DIRECTIVE FOR ESSENTIAL SERVICE OPERATORS WHITE PAPER
NAVIGATING THE WATERS OF THE NEW EU NIS 2016/1148 CYBERSECURITY DIRECTIVE FOR ESSENTIAL SERVICE OPERATORS WHITE PAPER MAY 2018 2018 Radiflow, Ltd. All Rights reserved. The information in this document
More informationNERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS
NERC CIP VERSION 6 COMPLIANCE BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements
More informationTop 10 ICS Cybersecurity Problems Observed in Critical Infrastructure
SESSION ID: SBX1-R07 Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure Bryan Hatton Cyber Security Researcher Idaho National Laboratory In support of DHS ICS-CERT @phaktor 16 Critical
More informationLindström Tomas Cyber security from ABB System 800xA PA-SE-XA
Lindström Tomas 2013-09-02 Cyber security from ABB System 800xA PA-SE-XA-015963 Cyber Security solutions from ABB Agenda Cyber Security in ABB: general view, activities, organization How we work with Cyber
More informationSecurity Principles for Stratos. Part no. 667/UE/31701/004
Mobility and Logistics, Traffic Solutions Security Principles for Stratos Part no. THIS DOCUMENT IS ELECTRONICALLY APPROVED AND HELD IN THE SIEMENS DOCUMENT CONTROL TOOL. All PAPER COPIES ARE DEEMED UNCONTROLLED
More informationEasily configurable HMI system for power automation siemens.com/sicam
SICAM SCC Easily configurable HMI system for power automation siemens.com/sicam Small components big prospects: Your SICAM SCC station control Power grid operation is becoming more and more dynamic. To
More informationEnsuring Your Plant is Secure Tim Johnson, Cyber Security Consultant
Ensuring Your Plant is Secure Tim Johnson, Cyber Security Consultant 1 The Foxboro Evo TM Process Automation System Addressing the needs across your operation today and tomorrow. 2 Industrial Control Systems
More informationCCISO Blueprint v1. EC-Council
CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance
More informationIndustrial Security Getting Started
Industrial Security Getting Started Unrestricted Siemens A/S siemens.com/industrial-security Agenda 09:00 - Getting started. The Framework 10:00 - Coffee break 10:15 - Patch Management, Asset and Network
More informationFuture Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group
Future Challenges and Changes in Industrial Cybersecurity Sid Snitkin VP Cybersecurity Services ARC Advisory Group Srsnitkin@ARCweb.com Agenda Industrial Cybersecurity Today Scope, Assumptions and Strategies
More informationSEL-3620 ETHERNET SECURITY GATEWAY
ETHERNET SECURITY GATEWAY STRONG ACCESS CONTROL FOR YOUR ELECTRONIC SECURITY PERIMETER Firewall Ethernet WAN SEL-421 SEL Relays Serial Ethernet Security Gateway Real-Time Automation Controller (RTAC) SEL-3530
More informationIndustrial Control System Security white paper
Industrial Control System Security white paper The top 10 threats to automation and process control systems and their countermeasures with INSYS routers Introduction With the advent of M2M (machine to
More informationIPM Secure Hardening Guidelines
IPM Secure Hardening Guidelines Introduction Due to rapidly increasing Cyber Threats and cyber warfare on Industrial Control System Devices and applications, Eaton recommends following best practices for
More informationSecuring Industrial Control Systems
L OCKHEED MARTIN Whitepaper Securing Industrial Control Systems The Basics Abstract Critical infrastructure industries such as electrical power, oil and gas, chemical, and transportation face a daunting
More informationIC32E - Pre-Instructional Survey
Name: Date: 1. What is the primary function of a firewall? a. Block all internet traffic b. Detect network intrusions c. Filter network traffic d. Authenticate users 2. A system that monitors traffic into
More informationIEC A cybersecurity standard approaching the Rail IoT
IEC 62443 A cybersecurity standard approaching the Rail IoT siemens.com/communications-for-transportation Today s Siemens company structure focusing on several businesses Siemens AG Power and Gas (PG)
More informationTestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified
TestOut Network Pro - English 4.1.x COURSE OUTLINE Modified 2017-07-06 TestOut Network Pro Outline - English 4.1.x Videos: 141 (18:42:14) Demonstrations: 81 (10:38:59) Simulations: 92 Fact Sheets: 145
More informationCIP Cyber Security Configuration Change Management and Vulnerability Assessments
CIP-010-2 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:
More informationCIP Cyber Security Configuration Change Management and Vulnerability Assessments
Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed
More informationProtecting productivity with Industrial Security Services
Protecting productivity with Industrial Security Services Identify vulnerabilities and threats at an early stage. Take proactive measures. Achieve optimal long-term plant protection. usa.siemens.com/industrialsecurityservices
More informationCybersecurity Overview
Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where
More informationDigital Wind Cyber Security from GE Renewable Energy
Digital Wind Cyber Security from GE Renewable Energy BUSINESS CHALLENGES The impact of a cyber attack to power generation operations has the potential to be catastrophic to the renewables industry as well
More informationStandard Development Timeline
Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard is adopted by the NERC Board of Trustees (Board).
More informationSIPROTEC. Feeder Protection 7SC80. Preface. Contents. Goal/Purpose 1. System Overview 2. Hardening 3 V4.20. Malware Protection 4. Disaster Recovery 5
Preface SIPROTEC Feeder Protection 7SC80 V4.20 Security Guide Contents Goal/Purpose 1 System Overview 2 Hardening 3 Malware Protection 4 Disaster Recovery 5 Patch and Update Information 6 Logging 7 Literature
More informationPresenter Jakob Drescher. Industry. Measures used to protect assets against computer threats. Covers both intentional and unintentional attacks.
Presenter Jakob Drescher Industry Cyber Security 1 Cyber Security? Measures used to protect assets against computer threats. Covers both intentional and unintentional attacks. Malware or network traffic
More informationEducation Network Security
Education Network Security RECOMMENDATIONS CHECKLIST Learn INSTITUTE Education Network Security Recommendations Checklist This checklist is designed to assist in a quick review of your K-12 district or
More informationCIP Cyber Security Configuration Change Management and Vulnerability Assessments
CIP-010-2 3 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:
More informationT22 - Industrial Control System Security
T22 - Industrial Control System Security PUBLIC Copyright 2017 Rockwell Automation, Inc. All Rights Reserved. 1 Holistic Approach A secure application depends on multiple layers of protection and industrial
More informationAUTHORITY FOR ELECTRICITY REGULATION
SULTANATE OF OMAN AUTHORITY FOR ELECTRICITY REGULATION SCADA AND DCS CYBER SECURITY STANDARD FIRST EDITION AUGUST 2015 i Contents 1. Introduction... 1 2. Definitions... 1 3. Baseline Mandatory Requirements...
More informationSiemens AG All rights reserved.
SICAM Substation ti Automation ti Smart Substation Automation Panels DC PW SUPPLY DC PW SUPPLY GPS ARBITER SCALANCE X324 MONITOR RSG2100 RSG416 MONITOR GE UR T60 MUX GARD8000 7UT633 7SL87 7SL87 RACK PC
More informationAddressing Cyber Threats in Power Generation and Distribution
Addressing Cyber Threats in Power Generation and Distribution VEO, Asko Tuomela o Bachelor of Science in Electrical Power Engineering o Over 6 years experience in power projects, PLCs and supervision systems
More informationStandard CIP Cyber Security Systems Security Management
A. Introduction 1. Title: Cyber Security Systems Security Management 2. Number: CIP-007-1 3. Purpose: Standard CIP-007 requires Responsible Entities to define methods, processes, and procedures for securing
More informationAn Overview of ISA-99 & Cyber Security for the Water or Wastewater Specialist
An Overview of ISA-99 & Cyber Security for the Water or Wastewater Specialist Standards Certification Education & Training Publishing Conferences & Exhibits Speakers: Bryan L. Singer, CISM, CISSP, CAP
More informationCloud Security Whitepaper
Cloud Security Whitepaper Sep, 2018 1. Product Overview 3 2. Personally identifiable information (PII) 3 Using Lookback without saving any PII 3 3. Security and privacy policy 4 4. Personnel security 4
More informationRUGGEDCOM CROSSBOW. Secure Access Management Solution. Brochure 10/2017. siemens.com/ruggedcom
RUGGEDCOM CROSSBOW Secure Access Management Solution Brochure 10/2017 siemens.com/ruggedcom RUGGEDCOM CROSSBOW Contents RUGGEDCOM CROSSBOW is a proven Secure Access Management solution designed to provide
More informationStandard CIP Cyber Security Critical Cyber Asset Identification
Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed
More informationISO/IEC TR TECHNICAL REPORT
TECHNICAL REPORT ISO/IEC TR 27019 First edition 2013-07-15 Information technology Security techniques Information security management guidelines based on ISO/IEC 27002 for process control systems specific
More informationTABLE OF CONTENTS. Section Description Page
GPA Cybersecurity TABLE OF CONTENTS Section Description Page 1. Cybersecurity... 1 2. Standards... 1 3. Guides... 2 4. Minimum Hardware/Software Requirements For Secure Network Services... 3 4.1. High-Level
More informationStandard CIP Cyber Security Critical Cyber Asset Identification
Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed
More informationCritical Cyber Asset Identification Security Management Controls
Implementation Plan Purpose On January 18, 2008, FERC (or Commission ) issued Order. 706 that approved Version 1 of the Critical Infrastructure Protection Reliability Standards, CIP-002-1 through CIP-009-1.
More informationSecurity+ SY0-501 Study Guide Table of Contents
Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators
More informationNERC CIP: Fundamental Security Requirements of an Electronic Access Control and Monitoring System (EACMS) Requirements Mapping to ConsoleWorks
NERC CIP: Fundamental Security Requirements of an Electronic Access Control and Monitoring System (EACMS) Requirements Mapping to ConsoleWorks NERC Standard Requirement Requirement Text Measures ConsoleWorks
More informationCyber Security Standards Developments
INTERNATIONAL ELECTROTECHNICAL COMMISSION Cyber Security Standards Developments Bart de Wijs Head of Cyber Security Power Grids Division ABB b.v. Frédéric Buchi Sales&Consulting Cyber Security Siemens
More informationService. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution
Service SM Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution Product Protecting sensitive data is critical to being
More informationPeter Kreutzer, PSSAM/Automation Power World 2011 New Delhi, Secure and reliable Redundant communication network and cyber security
Peter Kreutzer, PSSAM/Automation Power World 2011 New Delhi, 2011-09-20 Secure and reliable Redundant communication network and cyber security Content Reliable Substation communication networks Introduction
More informationStandard CIP 007 4a Cyber Security Systems Security Management
A. Introduction 1. Title: Cyber Security Systems Security Management 2. Number: CIP-007-4a 3. Purpose: Standard CIP-007-4 requires Responsible Entities to define methods, processes, and procedures for
More informationStandard CIP Cyber Security Systems Security Management
A. Introduction 1. Title: Cyber Security Systems Security Management 2. Number: CIP-007-4 3. Purpose: Standard CIP-007-4 requires Responsible Entities to define methods, processes, and procedures for securing
More informationGDPR Update and ENISA guidelines
GDPR Update and ENISA guidelines 2016 [Type text] There are two topics that should be uppermost in every CISO's mind, how to address the growing demand for Unified Communications (UC) and how to ensure
More informationData Security and Privacy Principles IBM Cloud Services
Data Security and Privacy Principles IBM Cloud Services 2 Data Security and Privacy Principles: IBM Cloud Services Contents 2 Overview 2 Governance 3 Security Policies 3 Access, Intervention, Transfer
More informationTestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified
TestOut Network Pro - English 5.0.x COURSE OUTLINE Modified 2018-03-06 TestOut Network Pro Outline - English 5.0.x Videos: 130 (17:10:31) Demonstrations: 78 (8:46:15) Simulations: 88 Fact Sheets: 136 Exams:
More informationSecurity analysis and assessment of threats in European signalling systems?
Security analysis and assessment of threats in European signalling systems? New Challenges in Railway Operations Dr. Thomas Störtkuhl, Dr. Kai Wollenweber TÜV SÜD Rail Copenhagen, 20 November 2014 Slide
More informationGo beyond... IEC Leverage the full potential with leading-edge expertise. Answers for infrastructure and cities.
Go beyond... IEC 61850 Leverage the full potential with leading-edge expertise www.siemens.com/iec61850 HSR, PRP integrated Certified according to IEC 61850 Edition 2 Answers for infrastructure and cities.
More informationStandard CIP 007 3a Cyber Security Systems Security Management
A. Introduction 1. Title: Cyber Security Systems Security Management 2. Number: CIP-007-3a 3. Purpose: Standard CIP-007-3 requires Responsible Entities to define methods, processes, and procedures for
More informationConnectivity 101 for Remote Monitoring Systems
Connectivity 101 for Remote Monitoring Systems Paul Wacker Moxa, Inc. Manager - Edge Connectivity Ariana Drivdahl Moxa, Inc. Product Marketing Manager Pain Points of Remote Monitoring Pressure to enhance
More informationDefense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation
Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client
More informationCyber security - why and how
Cyber security - why and how Frankfurt, 14 June 2018 ACHEMA Cyber Attack Continuum Prevent, Detect and Respond Pierre Paterni Rockwell Automation, Connected Services EMEA Business Development Manager PUBLIC
More informationMark Littlejohn June 23, 2016 DON T GO IT ALONE. Achieving Cyber Security using Managed Services
Mark Littlejohn June 23, 2016 DON T GO IT ALONE Achieving Cyber Security using Managed Services Speaker: Mark Littlejohn 1 Mark is an industrial technology professional with over 30 years of experience
More informationSICAM Products and Solutions for Energy Automation
SICAM Products and Solutions for Energy Automation Manfred Haslinger, Product Lifecycle Manager SICAM RTUs Josef Müllner, Product Lifecycle Manager SICAM TOOLBOX II siemens.at/future-of-energy SICAM Products
More informationCyber Security Solutions for Industrial Controls
Cyber Security Solutions for Industrial Controls bhge.com OVERVIEW In a complex world of ever-changing technologies, Baker Hughes, a GE company realizes the importance of having an experienced partner
More informationIntroduction. Deployment Models. IBM Watson on the IBM Cloud Security Overview
IBM Watson on the IBM Cloud Security Overview Introduction IBM Watson on the IBM Cloud helps to transform businesses, enhancing competitive advantage and disrupting industries by unlocking the potential
More informationIndustrial Defender ASM. for Automation Systems Management
Industrial Defender ASM for Automation Systems Management INDUSTRIAL DEFENDER ASM FOR AUTOMATION SYSTEMS MANAGEMENT Industrial Defender ASM is a management platform designed to address the overlapping
More informationStandard Req # Requirement D20MX Security Mechanisms D20ME II and Predecessors Security Mechanisms
GE Digital Energy D20MX - NERC - CIP Response Product Bulletin Date: May 6th, 2013 Classification: GE Information NERC Critical Infrastructure Protection Response Overview The purpose of this document
More informationPCI DSS and VNC Connect
VNC Connect security whitepaper PCI DSS and VNC Connect Version 1.2 VNC Connect security whitepaper Contents What is PCI DSS?... 3 How does VNC Connect enable PCI compliance?... 4 Build and maintain a
More informationCOMPASS FOR THE COMPLIANCE WORLD. Asia Pacific ICS Security Summit 3 December 2013
COMPASS FOR THE COMPLIANCE WORLD Asia Pacific ICS Security Summit 3 December 2013 THE JOURNEY Why are you going - Mission Where are you going - Goals How will you get there Reg. Stnd. Process How will
More informationWho Goes There? Access Control in Water/Wastewater Siemens AG All Rights Reserved. siemens.com/ruggedcom
WEAT Webinar Who Goes There? Access Control in Water/Wastewater Siemens AG 2018. siemens.com/ruggedcom ACCESS CONTROL WEBINAR TABLE OF CONTENTS TOPIC Why Access Control? Risks If Not Used Factors of Authentication
More informationISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002
ISO 27002 COMPLIANCE GUIDE How Rapid7 Can Help You Achieve Compliance with ISO 27002 A CONTENTS Introduction 2 Detailed Controls Mapping 3 About Rapid7 8 rapid7.com ISO 27002 Compliance Guide 1 INTRODUCTION
More informationNo Industry 4.0 without Security
24-04-2017 No Industry 4.0 without Security 24-04-2017 Introduction to Atos and Industry 4.0 Who is Atos? At a glance Revenue 2016 (M EUR) * Employees 2016 (Global) Employees 2016 (Germany) Countries 12,000
More informationCybersecurity for the Electric Grid
Cybersecurity for the Electric Grid Electric System Regulation, CIP and the Evolution of Transition to a Secure State A presentation for the National Association of Regulatory Utility Commissioners March
More informationCourse overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)
Overview This course is intended for those wishing to qualify with CompTIA Security+. CompTIA's Security+ Certification is a foundation-level certificate designed for IT administrators with 2 years' experience
More informationNEN The Education Network
NEN The Education Network School e-security Checklist This checklist sets out 20 e-security controls that, if implemented effectively, will help to ensure that school networks are kept secure and protected
More informationCyber Criminal Methods & Prevention Techniques. By
Cyber Criminal Methods & Prevention Techniques By Larry.Boettger@Berbee.com Meeting Agenda Trends Attacker Motives and Methods Areas of Concern Typical Assessment Findings ISO-17799 & NIST Typical Remediation
More informationCyber Security For Utilities Risks, Trends & Standards. IEEE Toronto March 22, Doug Westlund Senior VP, AESI Inc.
Cyber Security For Utilities Risks, Trends & Standards IEEE Toronto March 22, 2017 Doug Westlund Senior VP, AESI Inc. Agenda Cyber Security Risks for Utilities Trends & Recent Incidents in the Utility
More informationSIPROTEC 5 New features of V7.5
SIPROTEC 5 New features of V7.5 siemens.com/siprotec5 New Features for SIPROTEC 5 Release 7.50 Feeder Protection Ground Fault Detection (Pulse Detection, Harmonic Detection) Automatic Load Shedding Vector
More informationLESSONS LEARNED IN SMART GRID CYBER SECURITY
LESSONS LEARNED IN SMART GRID CYBER SECURITY Lynda McGhie CISSP, CISM, CGEIT Quanta Technology Executive Advisor Smart Grid Cyber Security and Critical Infrastructure Protection lmcghie@quanta-technology.com
More information1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010
Standard CIP 011 1 Cyber Security Protection Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes
More informationIndustrial Network Trends & Technologies
Industrial Network Trends & Technologies EtherNet/IP on the Plant Floor PUBLIC INFORMATION 5058-CO900F IHS Technology Industrial Internet of Things 2014, April 2014 PUBLIC INFORMATION Forecasts tremendous
More informationlocuz.com SOC Services
locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security
More informationCIP V5 Implementation Study SMUD s Experience
CIP V5 Implementation Study SMUD s Experience Tim Kelley October 16, 2014 Powering forward. Together. SMUD Fast Facts General Information SMUD employs approximately 2,000 individuals Service area of 900
More informationKenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V3.0, MAY 2017 Multiple Layers of Protection Overview Password Salted-Hash Thank you
More informationNetworks - Technical specifications of the current networks features used vs. those available in new networks.
APPENDIX V TECHNICAL EVALUATION GUIDELINES Where applicable, the following guidelines will be applied in evaluating the system proposed by a service provider: TABLE 1: HIGH LEVEL COMPONENTS Description
More informationCritical Infrastructure Protection for the Energy Industries. Building Identity Into the Network
Critical Infrastructure Protection for the Energy Industries Building Identity Into the Network Executive Summary Organizations in the oil, gas, and power industries are under increasing pressure to implement
More informationStandard CIP 005 2a Cyber Security Electronic Security Perimeter(s)
A. Introduction 1. Title: Cyber Security Electronic Security Perimeter(s) 2. Number: CIP-005-2a 3. Purpose: Standard CIP-005-2 requires the identification and protection of the Electronic Security Perimeter(s)
More information