SlideShare une entreprise Scribd logo
1  sur  17
Télécharger pour lire hors ligne
Substation
Protection & Security
Zones IoT Group helps utilities conform to industry standards,
regulations and best practices through its Connected Grid Security
services for NERC CIPv5.
This service includes a readiness assessment plan to help electric
utilities prepare for compliance by identifying and remediating gaps to
meet regulatory NERC CIPv5 – 014 requirements.
2
CIP-003 Security Management Control
CIP-009 Recovery Plans for Critical Cyber Assets
CIP-011 Information Protection
CIP-008 Incident Reporting and Response Planning
CIP-005 Electronic
Security Perimeter
CIP-007 System
Security Mgmt.
CIP-006 Physical
Security Perimeter
CIP-004 Personal and Training
CIP-003 R5 Access Control
CIP-002 Critical Cyber Asset Identification
CIP-010 Configuration Change Management and Vulnerability
Assessments
CIP-014 Physical Security
4
NERC CIPv5 014
Solution Overview
Substation Protection & Security
CURRENT TRENDS
• Interruption to service results in huge economic damage and disruption to lives of millions
• Electric grid operators are required to maintain uninterrupted power for its customers under a threat of penalties
• Vandalism may cause interrupted service due to damages and down time
• Theft of copper and aluminum
• Interrupted service caused by cyber terrorism and attacks to SCADA systems
• Aging grid infrastructures are renewed by Smart Grid Technology
• Updating networks puts pressure on bottom line, requiring increased operational efficiency
• Increasing energy demands and capacity requirements of modern societies demands seamless, cost-effective
electricity system, end to end
Lower tolerance
for interrupted
service
Increased risk
of vandalism,
theft and
terrorism
Operate existing
system during
conversion to
Smart Grid
technology
CHALLENGES
Diverse technologies
needed
Difficult access, slow
response
Increased chance for
malfunctions
Tailor made solutions
are costly
Low tolerance for
errors
Elevated security risk
Diverse terrainSpread & remote
assets
Extreme
environmental
conditions
Varied site
characteristics
Critical dependencyPrime
target
ZONES VISION FOR SUBSTATION PROTECTION & SECURITY
Provide a holistic, integrated
and cost-effective solution for
unmanned substations
improving safety, security,
operations and maintenance.
Proposed solution is based on
advanced state of the art
technology including data
fusion, advanced analytics,
prediction and simulation.
Provide operators, managers
and decision-makers with
enhanced situational
awareness.
CONCEPTUAL SOLUTION
Regional
level
Sites
level
Central C&C
(HQ)
BI
Emergency Management
ELECTRICAL SUBSTATION PROTECTION - EXAMPLE
Safety
• CCTV
• Weather Station
• Lightning
• Intercom
• CCTV
• Intercom
• Access Control
• LPR Camera
Operations
• CCTV
• Smart & Virtual Fence
• Gunshot
• Laser Cross Line
• Lightning
Security
Smart Fence
The Smart Fence is a fence with added sensors
capable to detect attempts to climb, cut or
tamper with the physical boundary of the site.
Laser Cross Line Detector
The CLD is a high security sensor based on the
latest laser technology and is perfectly suited
for sites where Electro-Magnetic Interference is
an issue.
Virtual Fence
The Virtual Fence is part of the multi-layered solution
which adds another layer of detection without the
physical barrier. It is especially useful where
environmental or weather conditions like heavy snow
could dampen the detection capability of the physical
barriers.
ENTIRE PROCESS
Sensors
Environment
Other
Fuse PredictAnalyze Simulate
VisualizeAlert Recommend
Collaborate
Visual
Analytics
Data
Analytics
Analytics
Collect
A MULTI-AGENCY, MULTI-SENSOR PLATFORM THAT OFFERS ADVANCED ANLYTICS,
ADVANCED SAFETY, SECURITY AND MANAGEMENT SOLUTIONS
Detect
Correlate
Analyze
Collect
C&C Operators
Field Operators
FULLY SCALABLEINFORMATIONFLOW
Correlation
Analytics
Sensors
Environment
Remote Operators
OPERATIONAL WORKSTATION
CAPABILITIES HIGHLIGHTS
Proactive identification, assessment and mitigation of threats
Early detection, advanced classification and investigation tools
Hierarchal C&C enabling HQ with a Unified Situational Awareness Picture
Effective decision making promoting inter-agency collaboration
Smart response enabling minimized time from “detection-to-action”
Unified Solution Under a Single Platform
• Prevention of theft, vandalism
and unauthorized access
• Management and monitoring of
authorized entry
• Increased awareness of site
activities
Enhanced Security
• Faster detection of
maintenance issues
• Lower cost of maintenance
• Decreased manpower
• 24/7 monitoring
• Remote site operations
• Lower IT costs (distributed
computing on the edge)
Operational Efficiency
• Reduction of site injuries
• Reduction of potential safety
hazards around sites
• Monitoring of operational safety
activities
Improved Safety
MULTI DIMENSIONAL BENEFITS
IN CONCLUSION
Multi-layered solution providing a response to the risks and threats facing the operation of
remote, manned or unmanned substations, while improving operations
Site specific configuration of standard building blocks including physical barriers, CCTV
surveillance, access control, detection and analytics, as well as integration of data from other
site sensors
Centralized control center enabling safety, security and operational monitoring, control and
communications
THANK YOU

Contenu connexe

Tendances

Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMNetwork Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Jim Gilsinn
 
Technologies for Security and Compliance by Ken McIntyre, Ercot
Technologies for Security and Compliance by Ken McIntyre, ErcotTechnologies for Security and Compliance by Ken McIntyre, Ercot
Technologies for Security and Compliance by Ken McIntyre, Ercot
TheAnfieldGroup
 

Tendances (20)

Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443
 
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMNetwork Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
 
Practical Approaches to Securely Integrating Business and Production
Practical Approaches to Securely Integrating Business and ProductionPractical Approaches to Securely Integrating Business and Production
Practical Approaches to Securely Integrating Business and Production
 
Cybersecurity - Simple, Sustainable, Secure
Cybersecurity - Simple, Sustainable, SecureCybersecurity - Simple, Sustainable, Secure
Cybersecurity - Simple, Sustainable, Secure
 
Should I Patch My ICS?
Should I Patch My ICS?Should I Patch My ICS?
Should I Patch My ICS?
 
ICS Security from the Plant Floor Up - A Controls Engineers Approach to Secur...
ICS Security from the Plant Floor Up - A Controls Engineers Approach to Secur...ICS Security from the Plant Floor Up - A Controls Engineers Approach to Secur...
ICS Security from the Plant Floor Up - A Controls Engineers Approach to Secur...
 
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Effective Network Security Against Cyber Threats - Network Segmentation Techn...Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
 
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
 
Power System Cybersecurity: Barriers and Challenges
Power System Cybersecurity: Barriers and Challenges Power System Cybersecurity: Barriers and Challenges
Power System Cybersecurity: Barriers and Challenges
 
Efficient security to meet modern day challenges
Efficient security to meet modern day challengesEfficient security to meet modern day challenges
Efficient security to meet modern day challenges
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The Field
 
IEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkIEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel Talk
 
IEC and cyber security (June 2018)
IEC and cyber security (June 2018)IEC and cyber security (June 2018)
IEC and cyber security (June 2018)
 
Dragos & SRP, PI World 2019: Utilizing Operations Data for Enhanced Cyber Thr...
Dragos & SRP, PI World 2019: Utilizing Operations Data for Enhanced Cyber Thr...Dragos & SRP, PI World 2019: Utilizing Operations Data for Enhanced Cyber Thr...
Dragos & SRP, PI World 2019: Utilizing Operations Data for Enhanced Cyber Thr...
 
Integrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of StandardsIntegrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of Standards
 
Protecting Infrastructure from Cyber Attacks
Protecting Infrastructure from Cyber AttacksProtecting Infrastructure from Cyber Attacks
Protecting Infrastructure from Cyber Attacks
 
Cyber security of power grid
Cyber security of power gridCyber security of power grid
Cyber security of power grid
 
Nist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkNist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing Framework
 
S4xJapan Closing Keynote
S4xJapan Closing KeynoteS4xJapan Closing Keynote
S4xJapan Closing Keynote
 
Technologies for Security and Compliance by Ken McIntyre, Ercot
Technologies for Security and Compliance by Ken McIntyre, ErcotTechnologies for Security and Compliance by Ken McIntyre, Ercot
Technologies for Security and Compliance by Ken McIntyre, Ercot
 

Similaire à Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview -External v1.0

EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDFEMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
Faleh M.
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
Prime Infoserv
 
Cyber Security in Substation Automation (IEC 61850)
Cyber Security in Substation Automation (IEC 61850)Cyber Security in Substation Automation (IEC 61850)
Cyber Security in Substation Automation (IEC 61850)
Nikandrov Maxim
 

Similaire à Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview -External v1.0 (20)

SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
 
European smart grid cyber and scada security
European smart grid cyber and scada securityEuropean smart grid cyber and scada security
European smart grid cyber and scada security
 
Anti Hack Solution
Anti Hack Solution Anti Hack Solution
Anti Hack Solution
 
Panduit Enteprise Network Infrastructure Security Solution
Panduit Enteprise Network Infrastructure Security SolutionPanduit Enteprise Network Infrastructure Security Solution
Panduit Enteprise Network Infrastructure Security Solution
 
CyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoTCyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoT
 
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDFEMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-Sheet
 
Cyber security in Smart grid system
Cyber security in Smart grid systemCyber security in Smart grid system
Cyber security in Smart grid system
 
Cyber Security in Substation Automation (IEC 61850)
Cyber Security in Substation Automation (IEC 61850)Cyber Security in Substation Automation (IEC 61850)
Cyber Security in Substation Automation (IEC 61850)
 
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
 
02 ibm security for smart grids
02 ibm security for smart grids02 ibm security for smart grids
02 ibm security for smart grids
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability
 
Smart Operations
Smart OperationsSmart Operations
Smart Operations
 
Securing Industrial Control System
Securing Industrial Control SystemSecuring Industrial Control System
Securing Industrial Control System
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
 
BreakingPoint от Ixia
BreakingPoint от IxiaBreakingPoint от Ixia
BreakingPoint от Ixia
 
Hacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWHacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOW
 
10. industrial networks safety and security tom hammond
10. industrial networks safety and security   tom hammond10. industrial networks safety and security   tom hammond
10. industrial networks safety and security tom hammond
 
BRKIOT-2108.pdf
BRKIOT-2108.pdfBRKIOT-2108.pdf
BRKIOT-2108.pdf
 

Plus de David Sidhu

Litmus_Loop Edge_Handout
Litmus_Loop Edge_HandoutLitmus_Loop Edge_Handout
Litmus_Loop Edge_Handout
David Sidhu
 
Litmus Automation_Connected Car Solution
Litmus Automation_Connected Car SolutionLitmus Automation_Connected Car Solution
Litmus Automation_Connected Car Solution
David Sidhu
 
Loop Product Sheet
Loop Product SheetLoop Product Sheet
Loop Product Sheet
David Sidhu
 
Preparing for Growth
Preparing for GrowthPreparing for Growth
Preparing for Growth
David Sidhu
 
Smart Grid - Overview of Market Segment & Technology
Smart Grid - Overview of Market Segment & Technology Smart Grid - Overview of Market Segment & Technology
Smart Grid - Overview of Market Segment & Technology
David Sidhu
 
Grow From The Core - Adjacent Mark Moves
Grow From The Core - Adjacent Mark Moves Grow From The Core - Adjacent Mark Moves
Grow From The Core - Adjacent Mark Moves
David Sidhu
 
zones_intelligent_building_brochure
zones_intelligent_building_brochurezones_intelligent_building_brochure
zones_intelligent_building_brochure
David Sidhu
 
zones-iot-practice
zones-iot-practicezones-iot-practice
zones-iot-practice
David Sidhu
 

Plus de David Sidhu (8)

Litmus_Loop Edge_Handout
Litmus_Loop Edge_HandoutLitmus_Loop Edge_Handout
Litmus_Loop Edge_Handout
 
Litmus Automation_Connected Car Solution
Litmus Automation_Connected Car SolutionLitmus Automation_Connected Car Solution
Litmus Automation_Connected Car Solution
 
Loop Product Sheet
Loop Product SheetLoop Product Sheet
Loop Product Sheet
 
Preparing for Growth
Preparing for GrowthPreparing for Growth
Preparing for Growth
 
Smart Grid - Overview of Market Segment & Technology
Smart Grid - Overview of Market Segment & Technology Smart Grid - Overview of Market Segment & Technology
Smart Grid - Overview of Market Segment & Technology
 
Grow From The Core - Adjacent Mark Moves
Grow From The Core - Adjacent Mark Moves Grow From The Core - Adjacent Mark Moves
Grow From The Core - Adjacent Mark Moves
 
zones_intelligent_building_brochure
zones_intelligent_building_brochurezones_intelligent_building_brochure
zones_intelligent_building_brochure
 
zones-iot-practice
zones-iot-practicezones-iot-practice
zones-iot-practice
 

Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview -External v1.0

  • 2. Zones IoT Group helps utilities conform to industry standards, regulations and best practices through its Connected Grid Security services for NERC CIPv5. This service includes a readiness assessment plan to help electric utilities prepare for compliance by identifying and remediating gaps to meet regulatory NERC CIPv5 – 014 requirements. 2
  • 3. CIP-003 Security Management Control CIP-009 Recovery Plans for Critical Cyber Assets CIP-011 Information Protection CIP-008 Incident Reporting and Response Planning CIP-005 Electronic Security Perimeter CIP-007 System Security Mgmt. CIP-006 Physical Security Perimeter CIP-004 Personal and Training CIP-003 R5 Access Control CIP-002 Critical Cyber Asset Identification CIP-010 Configuration Change Management and Vulnerability Assessments CIP-014 Physical Security
  • 6. CURRENT TRENDS • Interruption to service results in huge economic damage and disruption to lives of millions • Electric grid operators are required to maintain uninterrupted power for its customers under a threat of penalties • Vandalism may cause interrupted service due to damages and down time • Theft of copper and aluminum • Interrupted service caused by cyber terrorism and attacks to SCADA systems • Aging grid infrastructures are renewed by Smart Grid Technology • Updating networks puts pressure on bottom line, requiring increased operational efficiency • Increasing energy demands and capacity requirements of modern societies demands seamless, cost-effective electricity system, end to end Lower tolerance for interrupted service Increased risk of vandalism, theft and terrorism Operate existing system during conversion to Smart Grid technology
  • 7. CHALLENGES Diverse technologies needed Difficult access, slow response Increased chance for malfunctions Tailor made solutions are costly Low tolerance for errors Elevated security risk Diverse terrainSpread & remote assets Extreme environmental conditions Varied site characteristics Critical dependencyPrime target
  • 8. ZONES VISION FOR SUBSTATION PROTECTION & SECURITY Provide a holistic, integrated and cost-effective solution for unmanned substations improving safety, security, operations and maintenance. Proposed solution is based on advanced state of the art technology including data fusion, advanced analytics, prediction and simulation. Provide operators, managers and decision-makers with enhanced situational awareness.
  • 10. ELECTRICAL SUBSTATION PROTECTION - EXAMPLE Safety • CCTV • Weather Station • Lightning • Intercom • CCTV • Intercom • Access Control • LPR Camera Operations • CCTV • Smart & Virtual Fence • Gunshot • Laser Cross Line • Lightning Security Smart Fence The Smart Fence is a fence with added sensors capable to detect attempts to climb, cut or tamper with the physical boundary of the site. Laser Cross Line Detector The CLD is a high security sensor based on the latest laser technology and is perfectly suited for sites where Electro-Magnetic Interference is an issue. Virtual Fence The Virtual Fence is part of the multi-layered solution which adds another layer of detection without the physical barrier. It is especially useful where environmental or weather conditions like heavy snow could dampen the detection capability of the physical barriers.
  • 11. ENTIRE PROCESS Sensors Environment Other Fuse PredictAnalyze Simulate VisualizeAlert Recommend Collaborate Visual Analytics Data Analytics Analytics Collect
  • 12. A MULTI-AGENCY, MULTI-SENSOR PLATFORM THAT OFFERS ADVANCED ANLYTICS, ADVANCED SAFETY, SECURITY AND MANAGEMENT SOLUTIONS Detect Correlate Analyze Collect C&C Operators Field Operators FULLY SCALABLEINFORMATIONFLOW Correlation Analytics Sensors Environment Remote Operators
  • 14. CAPABILITIES HIGHLIGHTS Proactive identification, assessment and mitigation of threats Early detection, advanced classification and investigation tools Hierarchal C&C enabling HQ with a Unified Situational Awareness Picture Effective decision making promoting inter-agency collaboration Smart response enabling minimized time from “detection-to-action”
  • 15. Unified Solution Under a Single Platform • Prevention of theft, vandalism and unauthorized access • Management and monitoring of authorized entry • Increased awareness of site activities Enhanced Security • Faster detection of maintenance issues • Lower cost of maintenance • Decreased manpower • 24/7 monitoring • Remote site operations • Lower IT costs (distributed computing on the edge) Operational Efficiency • Reduction of site injuries • Reduction of potential safety hazards around sites • Monitoring of operational safety activities Improved Safety MULTI DIMENSIONAL BENEFITS
  • 16. IN CONCLUSION Multi-layered solution providing a response to the risks and threats facing the operation of remote, manned or unmanned substations, while improving operations Site specific configuration of standard building blocks including physical barriers, CCTV surveillance, access control, detection and analytics, as well as integration of data from other site sensors Centralized control center enabling safety, security and operational monitoring, control and communications