ДОБРО ПОЖАЛОВАТЬ SIEMENS AG ENERGY MANAGEMENT

Similar documents
Cyber security for digital substations. IEC Europe Conference 2017

Cyber Security in the Digital Substation and Beyond. Energy Management > Energy Automation

Comprehensive Cyber Security Features in SIPROTEC & SICAM. SIPROTEC Dag 11. Mei 2017

Industrial Security - Protecting productivity. Industrial Security in Pharmaanlagen

Security in grid control centers: Spectrum Power TM Cyber Security

i-pcgrid WORKSHOP 2016 INTERACTIVE REMOTE ACCESS

Cyber Security Standards Developments

Security analysis and assessment of threats in European signalling systems?

Functional. Safety and. Cyber Security. Pete Brown Safety & Security Officer PI-UK

Cyber Security for Process Control Systems ABB's view

Security Challenges in Smart Distribution

CCISO Blueprint v1. EC-Council

Digital Substation Unrestricted Siemens AG 2017 siemens.com/digital-substation

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Mike Spear, Ops Leader Greg Maciel, Cyber Director INDUSTRIAL CYBER SECURITY PROGRAMS

The Common Controls Framework BY ADOBE

COMPASS FOR THE COMPLIANCE WORLD. Asia Pacific ICS Security Summit 3 December 2013

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

_isms_27001_fnd_en_sample_set01_v2, Group A

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Smart Grid vs. The NERC CIP

Addressing NERC-CIP Compliance Challenge for Utilities through IT Service Management. Patrik Ringqvist Principal Solution Consultant

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

Standard CIP Cyber Security Systems Security Management

Industrial Defender ASM. for Automation Systems Management

Smart Grid Security: Current and Future Issues

K12 Cybersecurity Roadmap

External Supplier Control Obligations. Cyber Security

Presenter Jakob Drescher. Industry. Measures used to protect assets against computer threats. Covers both intentional and unintentional attacks.

ISO/IEC TR TECHNICAL REPORT

LESSONS LEARNED IN SMART GRID CYBER SECURITY

IC32E - Pre-Instructional Survey

AUTHORITY FOR ELECTRICITY REGULATION

Securing Industrial Control Systems

Protection Levels, Holistic Approach. ISA-99 WG 3 TG 3 Protection Levels

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

Cyber Security. June 2015

Security in Power System Automation Status and Application of IEC Steffen Fries, Siemens Corporate Technology, June 13 th, 2017

Internet of Things. Internet of Everything. Presented By: Louis McNeil Tom Costin

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

SECURITY & PRIVACY DOCUMENTATION

Cyber Security For Utilities Risks, Trends & Standards. IEEE Toronto March 22, Doug Westlund Senior VP, AESI Inc.

Industrial Cyber Security. ICS SHIELD Top-down security for multi-vendor OT assets

Standard Development Timeline

Technical Reference [Draft] DRAFT CIP Cyber Security - Supply Chain Management November 2, 2016

Ensuring Your Plant is Secure Tim Johnson, Cyber Security Consultant

Standard CIP Cyber Security Systems Security Management

TEL2813/IS2820 Security Management

Standard CIP 007 3a Cyber Security Systems Security Management

Gujarat Forensic Sciences University

Critical Infrastructure Protection for the Energy Industries. Building Identity Into the Network

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

May 14, :30PM to 2:30PM CST. In Plain English: Cybersecurity and IT Exam Expectations

SOC-2 Requirement Solution Brief. EventTracker 8815 Centre Park Drive, Columbia MD SOC-2

Standard CIP 007 4a Cyber Security Systems Security Management

Objectives of the Security Policy Project for the University of Cyprus

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

A company built on security

Addressing Cyber Threats in Power Generation and Distribution

Guide to cyber security/cip specifications and requirements for suppliers. September 2016

Cybersecurity Auditing in an Unsecure World

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

SIPROTEC 5 New features of V7.5

An Overview of ISA-99 & Cyber Security for the Water or Wastewater Specialist

Electric Sector Security & Privacy Plans for 2011

locuz.com SOC Services

Recommendations for Implementing an Information Security Framework for Life Science Organizations

Industrial Security Getting Started

Measuring and Evaluating Cyber Risk in ICS Components, Products and Systems

A New Cyber Defense Management Regulation. Ophir Zilbiger, CRISC, CISSP SECOZ CEO

Procurement Language for Supply Chain Cyber Assurance

Smart Grid Standards and Certification

Hvordan kommer man i gang med et Industrial Security-koncept?

Cybersecurity Overview

Security Architecture

Interactive Remote Access FERC Remote Access Study Compliance Workshop October 27, Eric Weston Compliance Auditor Cyber Security.

Lindström Tomas Cyber security from ABB System 800xA PA-SE-XA

Security Principles for Stratos. Part no. 667/UE/31701/004

Managing SCADA Security. NISTIR 7628 and the NIST/SGIP CSWG. Xanthus. May 25, Frances Cleveland

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:

TABLE OF CONTENTS. Section Description Page

Cyber Security Solutions for Industrial Controls

NW NATURAL CYBER SECURITY 2016.JUNE.16

CIP Cyber Security Security Management Controls. A. Introduction

Cyber security - why and how

13th Florence Rail Forum: Cyber Security in Railways Systems. Immacolata Lamberti Andrea Pepato

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Protecting productivity with Industrial Security Services

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

Industrial Security Co-Sourcing: Shifting from CapEx to OpEx Presented by Vinicius Strey Manufacturing in America 03/22-23/2017

QuickBooks Online Security White Paper July 2017

ABB ABILITY NETWORK MANAGER X. SCADA for rail Operational confidence.

Cyber Hygiene: A Baseline Set of Practices

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

Why Should You Care About Control System Cybersecurity. Tim Conway ICS.SANS.ORG

SIPROTEC 5 V7.8 Protection, automation and monitoring for digital substations

Altius IT Policy Collection Compliance and Standards Matrix

Cyber Security Requirements for Electronic Safety and Security

Gerhard Brndt, ABB AG, BU Power Generation Cyber Security and Compliance in Increasingly Distributed and Aging Power Generation Infrastructures

Transcription:

ДОБРО ПОЖАЛОВАТЬ SIEMENS AG ENERGY MANAGEMENT ENERGY AUTOMATION - SMART GRID Restricted Siemens AG 20XX All rights reserved. siemens.com/answers

Frederic Buchi, Energy Management Division, Siemens AG Cyber Security in Energy Networks siemens.com/answers

Digital Substations are vulnerable to Cyber Attacks Control Center Level Connectivity increases the exposure to Cyber Threats Unauthorized Access Malware HMI Internet-based Attacks Substation Level Field Level Page 3

Cyber Security in Energy Management Our Offerings Secure Products: Example SIPROTEC 5 Protection Devices Encryption of the communication line between DIGSI 5 and the SIPROTEC 5 device Secure development Patch management Antivirus compatibility Connection password according to NERC-CIP and BDEW White Paper Recording of access attempts in a non-volatile security log and IEC 61850 messaging Confirmation codes for safety-critical operations Page 4 Independent testing Secure development Digitally signed firmware Internal firewall Separation of process and management communication Crypto-chip for secure information storage

Cyber Security over the lifecycle of a system Project Management From Product Security to Operational Security Offer Threat and Risk Analysis Secure System Architecture User Authentication Planning Secure Coding Access Control Access & Account Control and Management Account Management Secure Communication Protocols Security Logging / Monitoring Backup and Restore Implementation (FAT) Installation (SAT) System Hardening and Secure Network Configuration System Hardening Backup & Restore Test Manuals Vulnerability Management & Malware protection Malware Protection Secure Remote Access Page 5

Cyber Security need a Holistic Approach A holistic approach is crucial People Awareness and understanding of cyber security. Products Support of CIA criteria (Confidentiality, Integrity, Availability) Complying with industry standards Processes Covering the whole product life-cycle Fostering solution and operational requirements. Page 6

Vendor Categorization of Security Standards / Guidelines Guideline Requirement BDEW Whitepaper Ausführungshinweise NIST SP800-82 Guide to Industrial Control - Systems (ICS) Security NISTIR 7628 Guidelines for SmartGrid Cyber Security BDEW Whitepaper DIN SPEC 27009 - Annex B WIB Report M2784-X-10 IEC 62443-2-4 Req. for IACS Suppliers (and integrators) IEC 62443-3-3 System Sec. Req. + Security Assurance Levels IEC 62443-4-1 Embedded Devices IEC 62443-4-2 Host Devices IEC 62351 Data and communication security Realization Standard(s) Matter(s) Operator Integrator NERC-CIP ISO/IEC 27019 IEC 62443-2-1 Establish IACS Sec. Program IEC 62443-2-2 Operating IACS Sec. Program Page 7

Cyber Security from Operator Perspective Business targets Achieve Are you prepared? Power System Operator Organization Processes Infrastructure Mitigate Comply Cyber risks Cyber Regulations & Standards Page 8

Siemens Solution Migration concept to secure electrical substations An approach for making existing substations more secure Asset Inventory Network Topology Assessment Concept / Offer Page 9

Field Level Station Level Control Center Level Siemens Solution Secure Substation Blueprint Defining a standardized architecture Remote Access Zone Example Siemens Secure Substation Blueprint Substation Control Zone I Service PC Substation Control Zone II Page 10

Siemens Solution Categories of Cyber Security Controls Implementing security controls, always a mix of: Processes and Policies Organizational Preparedness Secure System Architecture Security Patching Secure Development System Hardening Malware Protection Secure Integration and Service Access Control and Account Management Backup and Restore Vulnerability and Incident Handling Security Logging /Monitoring Secure Remote Access Security Technologies Data Protection and Integrity Privacy Page 11

Siemens Solution Categories of Cyber Security Controls Zoom In Security Patching Implementing security controls, always a mix of: Processes and Policies Organizational Preparedness Secure System Architecture Security Patching Secure Development System Hardening Malware Protection Secure Integration and Service Access Control and Account Management Backup and Restore Vulnerability and Incident Handling Security Logging/Monitorin g Secure Remote Access Security Technologies Data Protection and Integrity Privacy Page 12

Security Patching Keeping the Substation Secure & Up-to-date VENDOR-SIDE SECURITY PATCH MANAGEMENT OPERATOR-SIDE SECURITY PATCH MANAGEMENT register notify Patch Information Patch from Vendor 2 Patch from Vendor 1 Patch from Vendor n Patches to apply in the substation Regulation: Challenges: Keep the security patch status of DSAS up-to-date High availability and reliability of operation have priority Patch Management must be scalable, secure and costefficient Page 13 CERT: Computer Emergency Response Team

Cyber Security in Energy Management Our Offerings Consulting Security Assessments for existing infrastructure, e.g. Hardening BDEW white paper or NERC CIP compliance audit Consultancy for secure integration of Siemens products and systems Holistic Security Consultancy via Smart Grid Compass Siemens Offerings Today Penetration Tests Products & Solutions Network penetration tests at customer infrastructure (simulating external and internal cyber attacks) Centralized Access Control and Password Management Secure Substation, e.g. migration to a secure substation BDEW white paper compliance modules and products Services Cyber Security Training Security Patch Management Page 14

Thank You Frederic Buchi Cyber Security Promoter Siemens Energy Management E-mail: frederic.buchi@siemens.com siemens.com/answers Page 15