We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byCamila Wickwire
Modified about 1 year ago
© 2008 OSIsoft, Inc. | Company Confidential Gabriel Mazooz An Ultimate Security Solution for the PI Environment
3 © 2008 OSIsoft, Inc. | Company Confidential Presentation Agenda Israel Electric Corporation (IEC) –Some Facts and Figures Security Background –Cyber Security Threats Project Requirements –PI System Status –The Challenge Project Implementation –The Players –The Working Environment –The Process Project Summary
4 © 2008 OSIsoft, Inc. | Company Confidential Israel Electric Corporation (IEC)
5 © 2008 OSIsoft, Inc. | Company Confidential Nazareth, Church of the Annunciation
6 © 2008 OSIsoft, Inc. | Company Confidential The Israel Electric Corporation Ltd. The Israel Electric Corporation (IEC) - est % Government owned Generates, transmits and distributes practically all the electricity in the State of Israel IEC is the sole integrated electric utility in the State of Israel One of the largest industrial companies in Israel
7 © 2008 OSIsoft, Inc. | Company Confidential IEC – General Profile IEC – Main producer (99%) and distributor (100%) of electricity in Israel Generating capacity - ~11,000 MW Integrated Capabilities – IEC has full design and integration capabilities Largest company in Israel with 14,000 employees Current government policy calls for the privatization of IEC with competition introduction via Independent Power Producers (IPPs)
8 © 2008 OSIsoft, Inc. | Company Confidential The Israel Electric Corporation Ltd. Power plant Gas Turbines 1. On January 30, peak demand of 10,200 MW
9 © 2008 OSIsoft, Inc. | Company Confidential NATIONAL SYSTEM OVERVIEW Ovation Bailey MAX Control ABB Siemens
10 © 2008 OSIsoft, Inc. | Company Confidential Cyber Security – Main Points Critical National Infrastructures (CNIs) are prime targets for Cyber Terror Process control systems becoming more vulnerable: –Communication systems converge to IP based networks –Operating systems with known vulnerabilities are used –Systems are interlinked –Growing Worldwide threat environment (more tools, players) –Remote monitoring and maintenance becoming common –Interconnectivity with the administrative networks & Internet
11 © 2008 OSIsoft, Inc. | Company Confidential IEC Cyber Security – Main Points IEC is a major cyber-target IEC is an Electricity island Strict requirements on availability (essentially 100%) PI servers are widely in use –Most of IEC operational data is on PI
12 © 2008 OSIsoft, Inc. | Company Confidential IEC Cyber Security Policy 1.IEC has cyber security policies in effect: –Information Security Policy Q –Divisional Policy Q Cyber security policy is centrally managed by the head of the Generation Division and handled locally by the head of the Computers Dept. 3.The National Information Security Authority (NISA) regulates CNI’s networks architectures and cyber security practices & methodologies
13 © 2008 OSIsoft, Inc. | Company Confidential Production Division’s PI System The main information system supplying on-line and real-time data and information on elements and processes of the production division Used for making real-time operative decisions by units operators and PI systems users Integrated within a great many business process Over 500 users system wide All-time availability is strictly required
14 © 2008 OSIsoft, Inc. | Company Confidential Generation Division Headquarters 5,000 Haifa 20,000 Orot Rabin 30,000 Reading 5,000 Eshkol 10,000 Rutnberg 1-210,000 Rutnberg 3-420,000 Hadera Environment Association 1,000 Alon Tavor 2,000 Hagit 5,000 Ramat Hovav 2,000 Zafit 1,000 Gezer 2,000 National Dispatch 50,000 T & D 50,000 Test1, Sites PI Tags Distribution 214,000 Total Tags 214,000
15 © 2008 OSIsoft, Inc. | Company Confidential PI System Referent / Administrator Responsible for PI system- one at each IEC site Operates and maintains on-site PI system Develops local applications and displays Local Point of Contact for all PI related issues Generation Division convenes a PI Referent Forum
16 © 2008 OSIsoft, Inc. | Company Confidential Generation Overview - Units Status Working Derated Faulty Maint. Reserve Avail. Site Fault Reserv e Derate Avail. Maint. MW
17 © 2008 OSIsoft, Inc. | Company Confidential RT – PORTAL: Overview - Units Status
18 © 2008 OSIsoft, Inc. | Company Confidential Locally developed Application - Example
19 © 2008 OSIsoft, Inc. | Company Confidential PI System Expanding PI system being used for reporting on the move:
20 © 2008 OSIsoft, Inc. | Company Confidential The Challenge To arrive at a truly and absolutely protected PI system, while still enabling fully operational PI connectivity with the administrative network Quick and easy implementation – minimal downtime Minimal cost
21 © 2008 OSIsoft, Inc. | Company Confidential PI Security Project - Start to Finish : Less than a month !!!
22 © 2008 OSIsoft, Inc. | Company Confidential IEC – Generation Division as the initiator and project leader Ludan Systems – Solution Developer and Integrator Waterfall Security Solutions – Solution Developer & Vendor The Main Players
23 © 2008 OSIsoft, Inc. | Company Confidential Ludan Software and Control Systems - Facts Ludan Software and Control Systems - subsidiary of Ludan – Tech Ltd. Company activities: Project design, integration, installation and execution of industrial IT and process control projects Vast experience in computerized systems and process control large scale projects Over 20 years experience integrating PI systems Visit
24 © 2008 OSIsoft, Inc. | Company Confidential Waterfall Security Solutions - Facts Privately owned security firm, based in Israel Spun-off in 2006, 25 employees, >110 installations worldwide Solutions based on unidirectional connectivity harnessed in patented technology integrating hardware and software modules Visit
25 © 2008 OSIsoft, Inc. | Company Confidential Overall Project Players Users Ludan Waterfall Management IEC PI Project Regulation Performers Customers
26 © 2008 OSIsoft, Inc. | Company Confidential Solution Concept – Main Points Segregate PI systems for maximum security Allow PI connectivity only via a strictly one- way communications solution (Waterfall One- Way™) Use the unidirectional connectivity to replicate PI server information on an external server Administrative PI users can only access the replicated PI server
27 © 2008 OSIsoft, Inc. | Company Confidential Waterfall Unidirectional Connectivity A novel approach to network and data security Deployment of physically based unidirectional gateways for external connections Leveraging the unidirectional logic of such connections for: Sending production information to the business network Sending status information to the remote monitoring network Receiving information from IP surveillance/remote devices Benefits of the approach - A Win-Win situation Enabling all business needs and requirements (“traditional approach”) Top security level – practical “physical segregation” (“strict approach“)
28 © 2008 OSIsoft, Inc. | Company Confidential Realizing absolute unidirectional connectivity in the optical domain: Making Truly Unidirectional Connections Hardware Based One-Way Data-Flow Gate Transmitter Receiver Laser Transmit Only Diode Receive Only
29 © 2008 OSIsoft, Inc. | Company Confidential PI System – Solution Components Innovative W.F. element
30 © 2008 OSIsoft, Inc. | Company Confidential WF-SME for PI I ndustrial Network Waterfall SME Business Network Replica PI Server Master PI Server PI Base Subsystem PI Snapshot Subsystem PI Archive Subsystem PI Base Subsystem PI Snapshot Subsystem PI Archive Subsystem Online - Points database replication (create/edit/delete tags) Online data replication (snapshot) Scheduled/On-demand history replication (archive) WF PI RX server Route for History WF-SME* PI System – Data Paths WF PI TX server * Scada Monitoring Enabler Route for On-Line
31 © 2008 OSIsoft, Inc. | Company Confidential PI System – Before (Insecure) Industrial Network Business Network Site ASite BSite CSite DSite N Master PI Server Internet Highly risky architecture Online bidirectional
32 © 2008 OSIsoft, Inc. | Company Confidential Industrial Network Site ASite BSite CSite DSite N Business Network Master PI Server Internet Online Unidirectional replication PI System – After (Secure) One way data flow
33 © 2008 OSIsoft, Inc. | Company Confidential Project Implementation Process I - Infrastructure Process II - Sand box installation Process III - Declaration Process IV - New server declared operational Process V – Monitoring
34 © 2008 OSIsoft, Inc. | Company Confidential Project Implementation - Process I Infrastructure: –Analysis –Design –Procurement
35 © 2008 OSIsoft, Inc. | Company Confidential Project Implementation - Process II Sand box installation: –Original system runs in parallel –Running 2 or 3 test clients in this period –Evaluation of performance –Database and application testing
36 © 2008 OSIsoft, Inc. | Company Confidential Project Implementation - Process III Move Date To New Topology: Declaration Alert all users & managers
37 © 2008 OSIsoft, Inc. | Company Confidential Project Implementation - Process IV New server declared operational Referent is coached regarding the new system Connection between networks is cut off Users are moved to the new system Applications and database are rigorously inspected
38 © 2008 OSIsoft, Inc. | Company Confidential Project Implementation - Process V Monitoring Servers Interfaces Data Users Displays Applications
39 © 2008 OSIsoft, Inc. | Company Confidential Performance - 50k tags – ~ 1 sec. latency end to end. Uptime 2 years and counting –0 downtime on all systems installed User experience –Seamless passage to the new system –100s of concurrent users nation wide –Support *POC is unchanged –*Point of contact Project Completion
40 © 2008 OSIsoft, Inc. | Company Confidential Project Management Timeline
41 © 2008 OSIsoft, Inc. | Company Confidential Future Prospects Future phases and improvements will include: –Install base increased to include more turbines: 1.Alon Tavor 2.Hagit 3.Gezer 4.Tzafit 5.Ramat Hovav –Allow for remote monitoring over unidirectional links: 1.Gezer 2.Hagit –And in the near future : 3.Alon Tavor 4.Eshkol
42 © 2008 OSIsoft, Inc. | Company Confidential State of the art security solution for the PI environment “Sleep well at night” Project timeline less than 1 month PI user experience is unchanged Performance is practically unaffected Negligible maintenance PI Availability is: –Stable –Reliable –Fully Secured Summary
43 © 2008 OSIsoft, Inc. | Company Confidential Question Time
44 © 2008 OSIsoft, Inc. | Company Confidential
Presentation for 04/2011. Crystal Gears® (CG as short) is a new next generation desktop digital recording system like no other before. By widely compatible.
Who We Are Integral Systems builds satellite ground systems for command and control, integration and test, data processing, and simulation. We’ve provided.
STRATEGY FOR SIMATIC® PCS7/505 MIGRATION TO zenon® SCADA © NAPA INTERNATIONAL FRANCE.
Abstract Cloud Computing is being projected by several major IT companies such as IBM, Google, Yahoo, Amazon and others as fifth utility where clients.
L ON W ORKS Network Design Overview. Welcome! 1-2.
UNIT I FUNDAMENTAL OF E-COMMERCE 1.1INTRODUCTION TO E-COMMERCE 1.2 DRIVING FORCES OF E-COMMERCE 1.3 BENEFITS AND LIMITATIONS OF E-COMMERCE 1.4 DATA MINING.
What happened to IPv5? and other oft asked IPv6 questions The Internet Society, IPv6 and You Susan Estrada.
Empowering Business in Real Time. © Copyright 2009, OSIsoft, LLC. All rights Reserved. Critical Facilities Update Regional Seminar Series Orlando Robert.
Microsoft Dynamics AX Name Title Microsoft Corporation Industrial Equipment Manufacturing.
Presented to: SOA Brown Bag #12 By: Paul Caron, SWIM T&E Lead Date: December 13, 2011 Federal Aviation Administration System Wide Information Management.
Distributed Computing Dr. Eng. Ahmed Moustafa Elmahalawy Computer Science and Engineering Department.
1 Services. 2 Agenda Overview –Managing the Transitions of The Networked Learning Environment Blackboard Consulting –Who We Are and What We Do Blackboard.
Types of Information systems BY, Ikhlaq Ikhlaq. IS ACTIVE DIFFERENT LEVELS Operational-level systems Operational-level systems Support operational managers.
ERP and E-Business- An Overview Based on the book Enterprise Resource Planning Solutions and Management by Flona Fui-Hoon Nah, Idea Group Publishing 2001.
PRISM ® : Intelligent Fraud Monitoring Presentation to Retail Decisions, Inc
Copyright 2002, Computer Associates International, Inc CA Products for z/VM – Old Dogs with New Tricks Yvonne DeMeritt Sr. Sustaining Engineer CA.
© 2011 VMware Inc. All rights reserved VMware Sales Byte Net New Customer Improve Business Continuity and Disaster Recovery (BCDR) with Managed Virtualization.
Copyright 2011 John Wiley & Sons, Inc Business Data Communications and Networking 11th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons, Inc.
Federal Aviation Administration NAS Enterprise Information System Security (NEISS) Vic Patel, FAA ICAP, ACP WG-I May 28 th – 30 th 1.
High availability and Disaster Recovery in a Multi-Site Virtual Environment using virtualization Henk Den Baes Technology Advisor Microsoft BeLux.
1 Blackboard Sales Presentation. 2 Agenda Introduction –The Company and the Community Why Blackboard –Product Strategy What Blackboard Provides –Product.
When Should the NERC CIP be Applied to Smart Grid Projects? Tobias Whitney The Structure Group
Copyright © 2004 Pearson Education, Inc. Slide 4-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
Copyright 2011 John Wiley & Sons, Inc Business Data Communications and Networking 11th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons,
Field TDM Deck Optimize and Secure Your Core Infrastructure for Midsize Businesses.
Copyright © 2005 SOA Software, Inc. All Rights Reserved. Specifications Subject to Change Without Notice. Overcoming the SOA Network Fallacy Roberto Medrano.
© 2016 SlidePlayer.com Inc. All rights reserved.