Sunteți pe pagina 1din 4

Cyber Security in all details

Holistic solution for Energy Automation Systems with SIPROTEC and SICAM

Technical Article
A holistic approach to cyber security

Consistent cyber security in energy


automation for critical infrastructures
Cyber attacks on critical infrastructures are real and are regularly reported in the media. The risks
for critical infrastructures are also at the center of the German government's cyber security
legislation, which have been released on June 12, 2015 by the German Federal Parliament [1].
The government's cyber security bill obliges counteracting the real threats of a approach to determining and dealing with
the operators of critical infrastructures to potential attack and satisfying the legal the risks.This includes implementation of
protect their IT infrastructures against cyber requirements stipulated by the cyber a "management system for cyber security"
attacks. The definition of critical infrastructures security law. and appropriate protective measures
will follow in a subsequent ordinance. against threats to telecommunication
A holistic approach systems and electronic data processing
The operators of energy automation systems systems [1].
have to reconcile the goals of reaching their The legislative body is asking operators of
business targets, critical infrastructures to provide a holistic Product and system vendors of energy
automation systems also have to take a
holistic view of cyber security including
processes, communication, employees
and technologies. The first step is to root
cyber security in the organization by
defining the corresponding roles,
guidelines and processes.
This process has to be implemented by
corporate management. Next comes the
secure product development that satisfies
the most stringent demands on cyber
security and incorporates a secure
product architecture.
Product development includes the secure
implementation of software and
performing systematic cyber security
tests. Cyber security of the product
suppliers' infrastructure also plays a major
role. Internal design documentation and
the source code have to be protected
against unauthorized access and
tampering and the integrity needs to be
assured by means of revision control.
Processes ensuring the integrity of
Figure 1. challenge triangle of the operator non-proprietary software components
such as Open Source have to be in place.
The system integrator is responsible for
integrating products in a secure way.
This task, too, requires dedicated process
descriptions, guidelines and technical
Organizational Secure Secure Vulnerability descriptions to ensure secure integration.
Preparedness Development Integration and and Incident The system configuration is subsequently
Service Handling carried out according to the technical
descriptions. Security measures are
validated during the FAT (Factory
Secure System System Access Control Security Acceptance Test) and SAT (Site
Architecture Hardening and Account Logging/ Acceptance Test) based on defined test
cases.
Management Monitoring The system supplier's IT infrastructure has
to protect the project documentation and
Security Malware Backup and Secure Remote configuration data against unauthorized
Patching Protection Restore Access access. Secure processes need to be in
place to hand over the project
Data Privacy documentation, initial user names and
Protection and passwords to the operator.
Integrity
Figure 2. categorization of the cyber security aspects

Cyber Security with SIPROTEC and SICAM / Energy Automation – 08-2015


User manuals have to make sure that
systems can be operated securely. But
the responsibility of product and system
supplier extends beyond handing over
of the system to the operator. For the

operator, in order to keep the system
secure, the supplier has to provide a https
vulnerability management solution for
its products and deliver security patches.
Ideally, the supplier has its own CERT IPSec-enabled router
(Computer Emergency Response Team)
to discuss cyber security issues, publish IEC 60870-5-104
current warnings and inform about IEC 61850 Encryption
vulnerabilities and upgrades of products with IPSec
and solutions.
GPRS modem

The task of cyber security not only falls serial WIFI https
to a few specialists within product and
system suppliers. Rather, the integrated
approach calls for an awareness of cyber
security concerns by all employees in a
company. Among others, this also
 
requires role-specific training in
companies. The following technical Figure 3. example for a secure tele communication
aspects are of key importance:
 Secure System Architecture During production, the firmware is fitted with The investment security of products is
 System Hardening a digital signature which the device uses to another key aspect.Product suppliers need to
 Access Control and Account authenticate. The device enables a physical assure that state-of-the-art security features
Management separation of process and management can be retrofitted for a long period of time by
 Security Logging/Monitoring communication. Moreover, devices means of software updates.
 Security Patching communicating outside of a physically
 Malware Protection protected zone have to satisfy higher Migration strategy
 Backup and Restore communication security requirements than
 Secure Remote Access. devices communicating within a physically A great part of the existing energy
protected area. automation systems and facilities are
Products End-to-site or end-to-end encryption is potentially insecure and have to be
mandatory in these cases with the device overhauled to meet cyber security standards.
Secure energy automation products are presenting the terminal point of the Since a complete and immediate overhaul is
the foundation of a secure energy encryption chain. The product supplier has to not advantageous economically, a migration
automation system. Cyber security make sure that regular installations of OS strategy has to be adopted in order to make
requirements for the products depend security patches and virus patterns do not systems secure.
on various factors including the affect the availability of energy automation
intended function (protection, control, functions.
operation and monitoring) and the
spatial layout of the products.
Security functions in modern energy Secure development
Encryption of the communication line
automation products follow the general Patch management
between DIGSI 5 and the SIPROTEC 5 device
goals of cyber security: availability, Antivirus compatibility
integrity and confidentiality.
State-of-the-art protection devices are Connection password according to
capable of satisfying these needs. NERC-CIP and BDEW White Paper
Secure communication between the
operating software and the device
Recording of access attempts in a non-volatile
comes first. The encrypted connection is
security log and IEC 61850 messaging
only established after mutual
authentication. A connection password
is used and managed in this process that Confirmation codes for
complies with the BDEW Whitepaper and safety-critical operations
Independent testing
NERC CIP recommendations (North
Secure development
American Electric Reliability Corporation
- Critical Infrastructure Protection) [2]. Digitally signed firmware
All security-relevant events are logged in Internal firewall
a non-erasable security log.
Separation of process and
The protection device is equipped with a
management communication
crypto chip that assures the
cryptographic functions including an Crypto-chip for secure information storage
integrity check of the device firmware.
Figure 4. security features of a state of the art protection device

Cyber Security with SIPROTEC and SICAM / Energy Automation – 08-2015


Legend
Account Mgmt.
RBAC (Roll based
Access Control)
Control Center
Level Malware Protection

VPN

Remote Access Zone


Firewall

Trusted Zone

Station Level
DMZ

Service PC Untrusted Network

Switch

Substation Control
Router with Firewall
Zone I

IEDs
(Protection Devices,
Substation Control Field Devices)
Zone II
Station Controller

Field Level
PC

Control Center

Hardening Measures

Figure 5. topology of a secure substation

The migration strategy must The analysis accounts for the impact Outlook
account for the special boundary of damages of critical operating
conditions that apply to the information and of the protection The threat posed by cyber attacks and regulatory
operation of energy automation requirements of the corresponding requirements will have operators of critical infrastructures
systems. Availability is the top goal IT assets. Also, the analysis has to deal intensively with the necessary security precautions
for protecting energy automation allow for the functional and processes and install them. Secure products and
systems. The system's uninterrupted requirements of the operator and solutions will be used on a wide scale. Operators will
operation is expected 24/7. The the local regulatory stipulations. establish these measures as crucial constituents of their
components used combine quality process to be free to deal with their actual core
Windows or Linux based systems A secure system architecture is the business.
and proprietary systems. There are basis of all subsequent cyber
links to insecure networks and to the security measures. The secure
operator's office IT. Some older architecture splits the system into References
components are still in use that secure zones with identical
cannot be replaced yet due to protection requirements. A [1] Entwurf eines Gesetzes zur Erhöhung der Sicherheit
economical and functional aspects. particularly secure zone can be used informationstechnischer Systeme (IT-Sicherheitsgesetz).
http://dip21.bundestag.de/dip21/btd/18/040/1804096.pdf
Additionally, proprietary to continue operating technically
technologies are part of the mix. outdated products for a certain [2] Bundesverband der Energie- und Wasserwirtschaft e. V. (BDEW):
Hence, an energy automation period of time without reducing the Whitepaper-Anforderungen an sichere Steuerungs und
system is frequently made up of level of protection of the other Telekommunikationssysteme. Überarbeitete Version 1.1, März
various components from different zones. A demilitarized zone (DMZ) is 2015, www.bdew.de
vendors, different technologies and set up that accommodates all
different technological generations. engineering tools required for the
Many of the established office IT components inside the secure zone. Authors
measures prioritize protection goals These zones are protected by
Dipl. Inf.
differently or inadequately account firewalls. The cyber security Chaitanya Bisale,
for the special boundary conditions. measures are implemented on top Product Lifecycle Manager,
This calls for the implementation of of this. The boundary conditions Cyber Securtiy & Substation Automation,
strategies tailored to the needs of described above have to be Energy Management Division,
energy automation. observed in the process. For Energy Automation,
The first step of migration is to take instance, this means that Siemens AG, Nuremberg
stock of all assets of the system. The components from third-party
Dipl. Ing. Andreas Kohl,
architecture of the communication vendors have to be hardened. All Lifecycle Manager Cyber Securtiy,
network and the physical expansion cyber security measures basically Energy Management Division,
of the system are documented. The follow the design principles of Energy Autoamtion,
status quo then becomes the basis defense-in-depth and need-to-know. Siemens AG, Nuremberg
of a risk assessment carried out in [2].
collaboration with the plant
operator.

Cyber Security with SIPROTEC and SICAM / Energy Automation – 08-2015

S-ar putea să vă placă și