首页> 外文会议>CIGRE Canada Conference >Access control: from default local device access levels to centralized managed role-based access control
【24h】

Access control: from default local device access levels to centralized managed role-based access control

机译:访问控制:从默认本地设备访问级别到集中管理的基于角色的访问控制

获取原文

摘要

With the introduction of Ethernet-based communication protocols in Substation Automation Systems (SAS), cyber security aspects became an additional critical part of the SAS design. Electrical Utilities in North America are today challenged with many diverse new requirements driven by the continuously evolving cyber security requirements and NERC-CIP standards. Today, cyber security related requirements are part of customer specifications and need to be considered during the complete life cycle of the SAS. Applying cyber security to any system has to be treated as a continuous process. Protecting a system against attacks, managing the system to ensure long-term stability and monitoring the system are the focus areas of any cyber security process. One of the most notable requirements out of the NERC-CIP standard is to implement access control for potentially any device installed as part of a protection, control and automation system. To implement, this requirement in a most efficient way without jeopardizing the level of security and transparency new standards and technologies support interoperable solutions. The security management can become complex, therefore security managers need software applications to be efficient. The Role Based Access Control System (RBAC) is the application supporting the NERC-CIP access control requirement as part of an overall cyber security solution. It allows management of the users and their roles from a central point even for many substations in different locations. Beside access control monitoring of not only the central user account related activities but also other essential user activity in the different system components need to be monitored. Central user activity logging will collect cyber security related events from the equipment and present this information to the responsible personnel. An efficient and user friendly approach is the key feature also for a monitoring application. Last but not least, tracking the deployed software versions is not only a maintenance or asset management issue but also an additional way to detect of potential hackers are attempting attacks. A firmware version of an embedded device should not change without having one of the service engineers assigned a task to do this. Being able to retrieve such version information automatically improves the overall efficiency in the cyber security management. The paper describes the benefits of centrally-managed role-based access control versus the legacy approach of using default access levels at device level and outlines a bridging solution including adjacent security measure to support a proper monitoring and reporting.
机译:随着在变电站自动化系统(SAS)中基于以太网的通信协议,网络安全方面成为SAS设计的额外关键部分。今天,北美的电气公用事业在持续不断发展的网络安全要求和NERC-CIP标准驱动的许多新要求挑战。如今,网络安全相关要求是客户规范的一部分,需要在SA的完整生命周期中考虑。将网络安全应用于任何系统必须被视为连续过程。保护系统免受攻击,管理系统以确保长期稳定性和监控系统是任何网络安全过程的焦点区域。 NERC-CIP标准中最值得注意的要求是为潜在的任何安装设备实现访问控制,作为保护,控制和自动化系统的一部分。要实现,这一要求以最有效的方式,无需危及安全性和透明度的新标准和技术支持可互操作的解决方案。安全管理可以变得复杂,因此安全管理人员需要软件应用程序效率。基于角色的访问控制系统(RBAC)是支持NERC-CIP访问控制要求的应用程序作为整体网络安全解决方案的一部分。它允许用户管理用户和它们的角色,即使在不同位置的许多变电站也是如此。除了访问控制监控之外,不仅是中央用户帐户相关的活动,还需要监视不同系统组件中的其他基本用户活动。中央用户活动日志记录将从设备中收集网络安全相关事件,并将此信息呈现给负责人员。高效和用户友好的方法是监视应用的关键特征。最后但并非最不重要的是,跟踪部署的软件版本不仅是维护或资产管理问题,而且还有一种检测潜在黑客的额外方法正在尝试攻击。嵌入式设备的固件版本不应更改,而无需其中一个服务工程师分配了任务来执行此操作。能够检索此类版本信息可自动提高网络安全管理的整体效率。本文介绍了基于集中管理的基于角色的访问控制的好处与使用设备级别的默认访问级别的传统方法,并概述了包括相邻安全措施的桥接解决方案,以支持适当的监视和报告。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号