首页> 外文会议>POWID Symposium >CYBER SECURITY PROCUREMENT METHODOLOGY FOR DIGITAL INSTRUMENTATION AND CONTROL SYSTEMS
【24h】

CYBER SECURITY PROCUREMENT METHODOLOGY FOR DIGITAL INSTRUMENTATION AND CONTROL SYSTEMS

机译:数字仪表和控制系统网络安全采购方法

获取原文

摘要

Cyber security standards have been produced as a result of continual threats to business and process control networks. In recent years, electric utilities have established cyber security programs to ensure compliance with critical infrastructure protection (CIP) standards requirements of the North American Electric Reliability Corporation (NERC), Nuclear Regulatory Commission (NRC) Regulatory Guide 5.71, and related requirements in the international community. Determining how to apply cyber security requirements for new I&C systems requires cyber security experts, I&C engineers, and procurement organizations to work together with vendors to implement and maintain cyber security controls. Improper or incomplete implementation of controls due to lack of proper requirements and/or division of responsibilities between the utility and vendor can often result in costly backfit to meet the requirements. This paper reports on phase 2 and 3 of an ongoing EPRI cross sector project to develop a methodology and several worked examples (application of the methodology in a sample procurement) for procuring digital I&C systems with the necessary cyber security controls. The methodology facilitates addressing cyber security related issues early in the lifecycle of an I&C system in order to fit within and support the other key requirements. This is especially useful in the procurement phase, so utilities and vendors have a common understanding of cyber security requirements and capabilities. The methodology is based on understanding the cyber security requirements for the system, and defining the boundary between those that are the responsibility of the utility and of the vendor.
机译:由于对业务和过程控制网络的持续威胁而产生网络安全标准。近年来,电力公司已经建立了网络安全计划,以确保遵守北美电力可靠性公司(NERC),核监管委员会(NRC)监管指南5.71以及国际相关要求的北美电力可靠性公司(NERC)标准的遵守情况社区。确定如何应用新I&C系统的网络安全要求需要网络安全专家,I&C工程师,以及采购组织与供应商共同努力实施和维护网络安全控制。由于缺乏适当的要求和/或公用事业和供应商之间的责任分工,控制不当或不完整的控制可能往往导致昂贵的Backfit以满足要求。本文关于正在进行的EPRI交叉部门项目的第2阶段和第3阶段,以制定方法和几个工作的例子(在样本采购中的应用程序),用于采购具有必要网络安全控制的数字I&C系统。该方法有助于早期在I&C系统的生命周期提前解决网络安全相关问题,以适应其内部并支持其他关键要求。这在采购阶段特别有用,因此公用事业和供应商对网络安全需求和能力共同了解。该方法基于了解系统的网络安全要求,并定义那些责任和供应商的人之间的边界。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号