+ All Categories
Home > Documents > Managing Security, Risk and -...

Managing Security, Risk and -...

Date post: 20-May-2020
Category:
Upload: others
View: 2 times
Download: 0 times
Share this document with a friend
37
Transcript
Page 1: Managing Security, Risk and - OSIsoftcdn.osisoft.com/corp/en/media/presentations/2010/UsersConference… · SCADA/HMI etc. • Additional tags populated in the OSIsoft PI System for
Page 2: Managing Security, Risk and - OSIsoftcdn.osisoft.com/corp/en/media/presentations/2010/UsersConference… · SCADA/HMI etc. • Additional tags populated in the OSIsoft PI System for

© Copyright 2010, OSIsoft LLC. All rights reserved.

Managing Security, Risk and Compliance for Critical Assets on

the Smart GridKshamit DixitToronto Hydro

Page 3: Managing Security, Risk and - OSIsoftcdn.osisoft.com/corp/en/media/presentations/2010/UsersConference… · SCADA/HMI etc. • Additional tags populated in the OSIsoft PI System for

© Copyright 2010, OSIsoft LLC. All rights reserved.

Toronto Hydro– A snapshot

• Worldwide Employees: 1,700

• Revenues: $2.3 Billion

• Headquarters: Toronto, Ontario

• Government Owned Vertically Integrated Electric Utility: Regulated and Unregulated operating holdings:

• Toronto Hydro Corporation

– Toronto Hydro Electric System Limited

– Toronto Hydro Energy Services Inc.

• Worldwide Employees: 1,700

• Revenues: $2.3 Billion

• Headquarters: Toronto, Ontario

• Government Owned Vertically Integrated Electric Utility: Regulated and Unregulated operating holdings:

• Toronto Hydro Corporation

– Toronto Hydro Electric System Limited

– Toronto Hydro Energy Services Inc.

Page 4: Managing Security, Risk and - OSIsoftcdn.osisoft.com/corp/en/media/presentations/2010/UsersConference… · SCADA/HMI etc. • Additional tags populated in the OSIsoft PI System for

© Copyright 2010, OSIsoft LLC. All rights reserved.

Energy Information Drives Conservation through AMIReduces demand by visualizing consumptionEnables real‐time demand and load management

Increase grid stability for T&DRemotely monitor system disturbances in advanceReduce threats of blackouts

Ability to integrate Distributed Energy ResourcesAbility to reduce impact from intermittent resources

Smart Energy Customer SolutionsPlug In Electrical Vehicles (PEV) and Carbon CreditsTime Shifting of Demand and Third party load curtailment

Smart Grid Can Deliver…

Page 5: Managing Security, Risk and - OSIsoftcdn.osisoft.com/corp/en/media/presentations/2010/UsersConference… · SCADA/HMI etc. • Additional tags populated in the OSIsoft PI System for

© Copyright 2010, OSIsoft LLC. All rights reserved.

Smart Grid Poses New Challenges

Protecting privacy and privileged access to smart meters, gateways and aggregated meter data.Power/flexibility of smart meters brings additional security challenges (e.g. remote disconnect)Active involvement of ConsumerSegregation Of Duties: billing, meter data accessAdditional regulations…

Page 6: Managing Security, Risk and - OSIsoftcdn.osisoft.com/corp/en/media/presentations/2010/UsersConference… · SCADA/HMI etc. • Additional tags populated in the OSIsoft PI System for

© Copyright 2010, OSIsoft LLC. All rights reserved.

Traditional Threats, Risks, Security Challenges for Utilities

• Identifying and Securing Critical Assets• Securing Physical Access to assets and facilities• Securing SCADA and other real-time control

applications• Risk analysis across operational systems: On-

boarding / Off-boarding and Background Checks• Privileged User, “Access Creep”• Insider threat - monitoring access & behavior• Situational Awareness (Command & Control)

Page 7: Managing Security, Risk and - OSIsoftcdn.osisoft.com/corp/en/media/presentations/2010/UsersConference… · SCADA/HMI etc. • Additional tags populated in the OSIsoft PI System for

© Copyright 2010, OSIsoft LLC. All rights reserved.

Utilities’ Imperative for Security

• Protection of Operating Assets and Reliability– Securing Cyber Critical Assets– Securing Safety Systems for key Grid

Components– Ensuring continuity of operations and mitigating

risks of revenue interruption• Regulatory Compliance

– Cost and complexity of regulations is growing– Imperative to implement a risk-based continuous

compliance

Page 8: Managing Security, Risk and - OSIsoftcdn.osisoft.com/corp/en/media/presentations/2010/UsersConference… · SCADA/HMI etc. • Additional tags populated in the OSIsoft PI System for

© Copyright 2010, OSIsoft LLC. All rights reserved.

Smart Grid is driving the integration of two infrastructures…

Securing these combined infrastructures requires a new approach to security that addresses blended threats through the convergence of IT Security, Physical Access Security and Control System Security.

Electrical infrastructure

Information infrastructure

Page 9: Managing Security, Risk and - OSIsoftcdn.osisoft.com/corp/en/media/presentations/2010/UsersConference… · SCADA/HMI etc. • Additional tags populated in the OSIsoft PI System for

© Copyright 2010, OSIsoft LLC. All rights reserved.

Points To Secure Along the New Energy Supply Chain – IT, Physical & Control Systems

Control SystemsIT SystemsPhysical Access

Smart Meter AccessHome Area Network

Control SystemsIT SystemsPhysical Access

Control SystemsCommunications

Control SystemsIT SystemsPhysical Access

Control SystemsIT SystemsPhysical Access

Control SystemsCommunications

Page 10: Managing Security, Risk and - OSIsoftcdn.osisoft.com/corp/en/media/presentations/2010/UsersConference… · SCADA/HMI etc. • Additional tags populated in the OSIsoft PI System for

© Copyright 2010, OSIsoft LLC. All rights reserved.

Security convergence is the only way to secure the entire energy chain..

Manage Security and Risk across IT, Physical Access and Control Systems•Protecting privacy and privileged access to smart meters, gateways and aggregated meter data.•Identifying and Securing Critical Assets•Securing Physical Access to assets and facilities•Securing SCADA and other real-time control applications•Risk analysis across operational systems: On- boarding / Off-boarding and Background Checks

Page 11: Managing Security, Risk and - OSIsoftcdn.osisoft.com/corp/en/media/presentations/2010/UsersConference… · SCADA/HMI etc. • Additional tags populated in the OSIsoft PI System for

© Copyright 2010, OSIsoft LLC. All rights reserved.

Too Many Silos of Information

Human resources

SCADA/ Network

Physical 

security

Governance risk 

& compliance

Identity 

management

IT/ERP 

security

Assets

ContractorsBackground 

Checks

Certification

InternalControlPolicies 

Industry Specific 

Risk Library

Silos of user information

Single system security and 

controls

Communication gaps

Security gaps

Disconnected, manual 

authorization process

Page 12: Managing Security, Risk and - OSIsoftcdn.osisoft.com/corp/en/media/presentations/2010/UsersConference… · SCADA/HMI etc. • Additional tags populated in the OSIsoft PI System for

© Copyright 2010, OSIsoft LLC. All rights reserved.

Unifying Application Needed to Close Security Gaps

Enterprise Compliance

Eliminate Overlaps

Workplace Efficiency

Simplify & automate 

onboarding

& offboarding

Human resources

SCADA/ Network

Physical 

security

Governance risk 

& compliance

Identity 

management

IT/ERP 

security

Assets

ContractorsBackground 

Checks

Certification

InternalControlPolicies 

Industry Specific 

Risk Library

Page 13: Managing Security, Risk and - OSIsoftcdn.osisoft.com/corp/en/media/presentations/2010/UsersConference… · SCADA/HMI etc. • Additional tags populated in the OSIsoft PI System for

© Copyright 2010, OSIsoft LLC. All rights reserved.

Implementing a Risk-Based Approach to Security

Identify critical assets – implement controls in order of criticalityAdopt standards and frameworks to augment organization specific policiesAn integrated risk and compliance automation solution can combine standards, frameworks and policies in an integrated approachAdopt a solution that can extend beyond just Controls Documentation and automate controls testing for IT and Physical Access Controls by breaking down the silos.Aggregating risks and events from industrial control systems completes the risk picture for asset-intensive environments like the Smart Grid.Real-time access to information via roles-based dashboards and incident management screens with built-in guidance allows situation managers to address threats as they unfold.

Page 14: Managing Security, Risk and - OSIsoftcdn.osisoft.com/corp/en/media/presentations/2010/UsersConference… · SCADA/HMI etc. • Additional tags populated in the OSIsoft PI System for

© Copyright 2010, OSIsoft LLC. All rights reserved.

Toronto Hydro: Smart Grid Security Pilot

HMI / 

SCADA

HMI / 

SCADA

EMS / 

DMS

EMS / 

DMS

PLCsRelays 

etc..

PLCsRelays 

etc..

DirectoryServices

NetworkSecurity

Toronto Hydro Smart 

Grid Security Pilot

Toronto Hydro Smart 

Grid Security Pilot

Intercon 

Physical 

Access

Intercon 

Physical 

Access

VideoSurveillance 

System

VideoSurveillance 

System

ERP / 

HR

ERP / 

HR

Uncover blended threats across IT Systems, PACS and Industrial ControlsConnect to the  business systems like Oracle and SAP to aggregate IT access events and employee / contractor background and certification checks.Link to the PACS (badge system) and the video surveillance camera systemsLeveraging the OSIsoft PI System, AlertEnterprise can correlate the above information with events, configuration changes and alerts from control system applications without impacting their performance.

Page 15: Managing Security, Risk and - OSIsoftcdn.osisoft.com/corp/en/media/presentations/2010/UsersConference… · SCADA/HMI etc. • Additional tags populated in the OSIsoft PI System for

© Copyright 2010, OSIsoft LLC. All rights reserved.

LegacyIDM/AD HRERP

ENTERPRISE PLATFORMRISK ANALYSIS WORKFLOW REPOSITORY

Adaptor Framework

Solution Architecture (OSIsoft Integration)

PI WebParts

ITMonitor

AF

Syslog

FTP

SNMP

XML

PI

Notifications

AlertInsight AlertActionAlertAccess

21

PI D

ata

Serv

ices

(SD

K)

Manual Data SCADA/DCSPLC/Instrument 

Systems LIMS Systems

Existing OSIsoft Suite

Page 16: Managing Security, Risk and - OSIsoftcdn.osisoft.com/corp/en/media/presentations/2010/UsersConference… · SCADA/HMI etc. • Additional tags populated in the OSIsoft PI System for

© Copyright 2010, OSIsoft LLC. All rights reserved.

OSIsoft Provides the Conduit to the Real-Time Applications

• Non-invasive access to time-sequenced data from real-time applications - DCS, EMS, DMS, SCADA/HMI etc.

• Additional tags populated in the OSIsoft PI System for security configuration

• Combined with AlertEnterprise software OSIsoft Information can be correlated with ERP and Enterprise Applications

• For organizations who drive to optimize demand and supply, a mirror OSIsoft installation may be required on the corporate network

Page 17: Managing Security, Risk and - OSIsoftcdn.osisoft.com/corp/en/media/presentations/2010/UsersConference… · SCADA/HMI etc. • Additional tags populated in the OSIsoft PI System for

© Copyright 2010, OSIsoft LLC. All rights reserved.

Maximizing Efficiency for the Real-Time Enterprise

• A mirror installation of OSISoft at the corporate level enables the transformation to a real-time enterprise

• Optimizes and Improves Production, Integration allows real-time visibility

HMI / 

SCADA

HMI / 

SCADA

EMS / 

DMS

EMS / 

DMS

PLCsRelays 

etc..

PLCsRelays 

etc..

DirectoryServices

NetworkSecurity

Intercon 

Physical 

Access

Intercon 

Physical 

Access

VideoSurveillance 

System

VideoSurveillance 

System

ERP / 

HR

ERP / 

HR

Page 18: Managing Security, Risk and - OSIsoftcdn.osisoft.com/corp/en/media/presentations/2010/UsersConference… · SCADA/HMI etc. • Additional tags populated in the OSIsoft PI System for

© Copyright 2010, OSIsoft LLC. All rights reserved.

Deployment

Page 19: Managing Security, Risk and - OSIsoftcdn.osisoft.com/corp/en/media/presentations/2010/UsersConference… · SCADA/HMI etc. • Additional tags populated in the OSIsoft PI System for

© Copyright 2010, OSIsoft LLC. All rights reserved.

Connecting to Multiple Systems

Page 20: Managing Security, Risk and - OSIsoftcdn.osisoft.com/corp/en/media/presentations/2010/UsersConference… · SCADA/HMI etc. • Additional tags populated in the OSIsoft PI System for

© Copyright 2010, OSIsoft LLC. All rights reserved.

Configuring a Data Source

Page 21: Managing Security, Risk and - OSIsoftcdn.osisoft.com/corp/en/media/presentations/2010/UsersConference… · SCADA/HMI etc. • Additional tags populated in the OSIsoft PI System for

© Copyright 2010, OSIsoft LLC. All rights reserved.

Configuring Connection to PI Notifications

Page 22: Managing Security, Risk and - OSIsoftcdn.osisoft.com/corp/en/media/presentations/2010/UsersConference… · SCADA/HMI etc. • Additional tags populated in the OSIsoft PI System for

© Copyright 2010, OSIsoft LLC. All rights reserved.

Trigger set in PI to monitor Set Point

Page 23: Managing Security, Risk and - OSIsoftcdn.osisoft.com/corp/en/media/presentations/2010/UsersConference… · SCADA/HMI etc. • Additional tags populated in the OSIsoft PI System for

© Copyright 2010, OSIsoft LLC. All rights reserved.

PI System Alerts Setup to Include AlertEnterprise

Page 24: Managing Security, Risk and - OSIsoftcdn.osisoft.com/corp/en/media/presentations/2010/UsersConference… · SCADA/HMI etc. • Additional tags populated in the OSIsoft PI System for

© Copyright 2010, OSIsoft LLC. All rights reserved.

TH‐Substation1‐FB1CBR 00:00.0 59.995 0

TH‐Substation1‐FB1CBR 00:00.1 59.993 0

TH‐Substation1‐FB1CBR 00:00.1 59.993 0

TH‐Substation1‐FB1CBR 00:00.1 59.997 0

TH‐Substation1‐FB1CBR 00:00.2 59.999 0

TH‐Substation1‐FB1CBR 00:00.2 59.999 0

TH‐Substation1‐FB1CBR 00:00.2 59.998 0

TH‐Substation1‐FB1CBR 00:00.3 59.993 0

TH‐Substation1‐FB1CBR 00:00.3 59.994 0

TH‐Substation1‐FB1CBR 00:00.3 59.995 0

TH‐Substation1‐FB1CBR 00:00.4 60.001 0

TH‐Substation1‐FB1CBR 00:00.4 59.998 0

TH‐Substation1‐FB1CBR 00:00.4 59.998 0

TH‐Substation1‐FB1CBR 00:00.5 59.995 0

TH‐Substation1‐FB1CBR 00:00.5 59.994 0

TH‐Substation1‐FB1CBR 00:00.5 59.993 0

TH‐Substation1‐FB1CBR 00:00.6 59.993 0

TH‐Substation1‐FB1CBR 00:00.6 59.997 0

TH‐Substation1‐FB1CBR 00:00.6 77.001 0

TH‐Substation1‐FB1CBR 00:00.7 76.996 0

TH‐Substation1‐FB1CBR 00:00.7 76.995 0

TH‐Substation1‐FB1CBR 00:00.7 76.997 0

TH‐Substation1‐FB1CBR 00:00.8 76.991 0

TH‐Substation1‐FB1CBR 00:00.8 76.992 0

TH‐Substation1‐FB1CBR 00:00.8 76.995 0

TH‐Substation1‐FB1CBR 00:00.9 76.996 0

TH‐Substation1‐FB1CBR 00:00.9 76.996 0

TH‐Substation1‐FB1CBR 00:00.9 76.998 0

TH‐Substation1‐FB1CBR 00:01.0 76.996 0

TH‐Substation1‐FB1CBR 00:01.0 77 0

TH‐Substation1‐FB1CBR 00:01.0 76.995 0

TH‐Substation1‐FB1CBR 00:01.1 76.994 0

TH‐Substation1‐FB1CBR 00:01.1 76.995 0

TH‐Substation1‐FB1CBR 00:00.6 59.993

TH‐Substation1‐FB1CBR 00:00.6 59.997

TH‐Substation1‐FB1CBR 00:00.6 77.001

TH‐Substation1‐FB1CBR 00:00.7 76.996TH‐Substation1‐FB1CBR 00:00.7 76.995

Monitoring Threshold Changes to PI Tag Data

Page 25: Managing Security, Risk and - OSIsoftcdn.osisoft.com/corp/en/media/presentations/2010/UsersConference… · SCADA/HMI etc. • Additional tags populated in the OSIsoft PI System for

© Copyright 2010, OSIsoft LLC. All rights reserved.

AlertEnterprise integrates security into the process

PI

RtWebParts MA WebParts

MOSSARC GIS WP MS Collaborative

Data Ref Cust Data Ref

AF 2.0

EC

WS

LIMS

WS

SAP

WS

Evaluator

Web Services

PIANO

Data Access Web Services

Business Web Services

Evaluation Admin

OD PIServer

Is the destinationidentical to the

source?

OPCServer

LMS

InterfaceNode

PCD PIServer

PI-to-PIServer

PU/EC/IPFM

Is the configurationright?

Are your transmitterscalibrated? Is your network ok?

Is your performanceok?

Do you dare topropose a set point

value?

Is the current valuereally the one fromthe process?

Is this a good qualityvalue?

Remote 

Login

Is access being monitored continuously?

• Do the people have right level of Access?

• Is the authorization being certified by someone?

• Do you know - who changed the set point value? And was it authorized?

• Are the Privileged Users being watched?

Page 26: Managing Security, Risk and - OSIsoftcdn.osisoft.com/corp/en/media/presentations/2010/UsersConference… · SCADA/HMI etc. • Additional tags populated in the OSIsoft PI System for

© Copyright 2010, OSIsoft LLC. All rights reserved.

Pre-configuring Rule Sets, Physical Configuration Screen, Configuring RAS

Page 27: Managing Security, Risk and - OSIsoftcdn.osisoft.com/corp/en/media/presentations/2010/UsersConference… · SCADA/HMI etc. • Additional tags populated in the OSIsoft PI System for

© Copyright 2010, OSIsoft LLC. All rights reserved.

Malicious Insider Scenario – Detect and Monitor

• Scenario: Attempt to shut down grid by disabling two levels of protective relays and defeating interlocks.

• Toronto Hydro Requirement– Identify and confirm incident– Initiate notification workflow– Invoke Geo-Spatial Monitoring– Initiate Lockdown Sequence– Notify first responders for dispatch

Page 28: Managing Security, Risk and - OSIsoftcdn.osisoft.com/corp/en/media/presentations/2010/UsersConference… · SCADA/HMI etc. • Additional tags populated in the OSIsoft PI System for

© Copyright 2010, OSIsoft LLC. All rights reserved.

Toronto Hydro: Converged Dashboard

Grid View – Affected Consumer Area Incident LocationIncident Report

Live Video FeedIncident User Risk Analysis Incident Confirmation

! High Alert- PI Notification

High Alert – PI Notification ManagerProtective Relay Set Point Change

Last Physical Access: JonesMaTIME: 15:26

Page 29: Managing Security, Risk and - OSIsoftcdn.osisoft.com/corp/en/media/presentations/2010/UsersConference… · SCADA/HMI etc. • Additional tags populated in the OSIsoft PI System for

© Copyright 2010, OSIsoft LLC. All rights reserved.

Geo-spatial View Of Substation

Duplex Ave, Toronto Substation 1

Page 30: Managing Security, Risk and - OSIsoftcdn.osisoft.com/corp/en/media/presentations/2010/UsersConference… · SCADA/HMI etc. • Additional tags populated in the OSIsoft PI System for

© Copyright 2010, OSIsoft LLC. All rights reserved.

Substation – Sabotage Risk!

Page 31: Managing Security, Risk and - OSIsoftcdn.osisoft.com/corp/en/media/presentations/2010/UsersConference… · SCADA/HMI etc. • Additional tags populated in the OSIsoft PI System for

© Copyright 2010, OSIsoft LLC. All rights reserved.

Access Live Video & Initiate Physical Lockdown

Page 32: Managing Security, Risk and - OSIsoftcdn.osisoft.com/corp/en/media/presentations/2010/UsersConference… · SCADA/HMI etc. • Additional tags populated in the OSIsoft PI System for

© Copyright 2010, OSIsoft LLC. All rights reserved.

Identifying Users Associated with Critical Change

• Scenario: John has privileged physical and control system access to conduct a critical change.

• Toronto Hydro Requirements:– Conduct Correlative Risk Analysis Across IT Applications,

Physical Access Systems, And Control System Operation– Assign Mitigation Controls– Generate Alerts, Investigate, Respond, & Revoke Access

in Real-Time to reduce property or human loss

Page 33: Managing Security, Risk and - OSIsoftcdn.osisoft.com/corp/en/media/presentations/2010/UsersConference… · SCADA/HMI etc. • Additional tags populated in the OSIsoft PI System for

© Copyright 2010, OSIsoft LLC. All rights reserved.

Identifying Threat Scenario Visually

Page 34: Managing Security, Risk and - OSIsoftcdn.osisoft.com/corp/en/media/presentations/2010/UsersConference… · SCADA/HMI etc. • Additional tags populated in the OSIsoft PI System for

© Copyright 2010, OSIsoft LLC. All rights reserved.

Access Risks Identified, Mitigated

Ability to conduct critical change

Unrestricted Access to Physical Control Room

Page 35: Managing Security, Risk and - OSIsoftcdn.osisoft.com/corp/en/media/presentations/2010/UsersConference… · SCADA/HMI etc. • Additional tags populated in the OSIsoft PI System for

© Copyright 2010, OSIsoft LLC. All rights reserved.

Monitoring Progress of Security & Compliance Initiatives

Page 36: Managing Security, Risk and - OSIsoftcdn.osisoft.com/corp/en/media/presentations/2010/UsersConference… · SCADA/HMI etc. • Additional tags populated in the OSIsoft PI System for

© Copyright 2010, OSIsoft LLC. All rights reserved.

Continuous Program for Security, Risk and Compliance Delivers Value

• Integration with OSIsoft PI enables organizations to extend risk analysis to real-time control system information

• Continuous compliance processes are sustainable and can adopt to emerging regulations, organizational policies

• Accommodate new security demands created by Smart Grid deployments

• Contain costs for audit and compliance• Reduce Bottom Line Cost, Streamline Operational

Processes

Page 37: Managing Security, Risk and - OSIsoftcdn.osisoft.com/corp/en/media/presentations/2010/UsersConference… · SCADA/HMI etc. • Additional tags populated in the OSIsoft PI System for

Thank you© Copyright 2010 OSIsoft, LLC., 777 Davis St., San Leandro, CA 94577


Recommended