An Ultimate Security Solution for the PI Environment

Slides:



Advertisements
Similar presentations
IBM SMB Software Group ® ibm.com/software/smb Maintain Hardware Platform Health An IT Services Management Infrastructure Solution.
Advertisements

0 © 2011 Silver Spring Networks. All rights reserved. Building the Smart Grid.
Backup and Disaster Recovery (BDR) A LOGICAL Alternative to costly Hosted BDR ELLEGENT SYSTEMS, Inc.
4.1.5 System Management Background What is in System Management Resource control and scheduling Booting, reconfiguration, defining limits for resource.
Cyber Security and the Smart Grid George W. Arnold, Eng.Sc.D. National Institute of Standards and Technology (NIST) U.S. Department of Commerce
Empowering Business in Real Time. © Copyright 2009, OSIsoft Inc. All rights Reserved. Virtualization and HA PI Systems: Three strategies to keep your PI.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
ISecurity Complete Product Series For System i. About Raz-Lee Internationally renowned System i solutions provider Founded in 1983; 100% focused on System.
1 Value now. Value over time. © Copyright 2009, OSIsoft Inc. All rights Reserved. Using OSIsoft to Become Compliant James Cosgrove, Northeast Utilities.
Iron Mountain’s Continuity Service ©2006 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered.
Background Current Status Future Plans. Agenda Background First Steps Current Status Future Plans Joomla Basics Questions 2.
Chapter 21 Successfully Implementing The Information System
8.
Chapter 5 Distributed Systems: The Overall Architecture Presented by: Matt Carver Amber Martin Jon Tucker.
Citrix Partner Update The Citrix Delivery Centre.
SmartMeter Program Overview Jana Corey Director, Energy Information Network Pacific Gas & Electric Company.
Improving Customer Satisfaction Through Advances in Remote Management Technology Greg Michel Product Manager Quintum Technologies Inc.
Presence Applications in the Real World Patrick Ferriter VP of Product Marketing.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Confidential Crisis Management Innovations, LLC. CMI CrisisPad TM Product Overview Copyright © 2011, Crisis Management Innovations, LLC. All Rights Reserved.
BMC Software confidential. BMC Performance Manager Will Brown.
Operational Excellence at Roche: PI Delivers Robert Fretz F. Hoffmann-La Roche Ltd. Basel, Switzerland.
Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over the Internet. Cloud is the metaphor for.
“web to wireless” Technology. A LEADER IN web to wireless ASSET MANAGEMENT ROM Communications Inc.
XA R7.8 Upgrade Process and Technical Overview Ruth Anne Pharr Sr. IT Consultant, CISTECH Inc.
What If You Could… …Automatically protect and secure your company’s most critical business information?... …Get more done with less by enabling employees.
ShopKeeper was designed from the ground up to manage your entire fleet maintenance operations … from 1 user to 100, including full security features that.
Business Data Communications, Stallings 1 Chapter 1: Introduction William Stallings Business Data Communications 6 th Edition.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Summary Device protocols tied intimately to applications. A need to significantly reduce critical data update times. Current network bandwidth consumption.
FirstEnergy / Jersey Central Power & Light Integrated Distributed Energy Resources (IDER) Joseph Waligorski FirstEnergy Grid-InterOp 2009 Denver, CO November.
Infrastructure & Cities Sector – Smart Grid Division © Siemens AG All rights reserved. October 2012Page 1 The Smart Grid by Siemens Constant energy.
Enterprise PI - How do I manage all of this? Robert Raesemann J Jacksonville, FL.
Next Generation Security Solutions Next Generation Controllers January 2013.
© 2008 OSIsoft, Inc. | Company Confidential Smart Grid, Smart Metering and DSM OSIsoft and Cisco systems Arjen Zwaag- Cisco Martin Otterson- OSIsoft.
1 Critical Mission Support Through Energy Security Susan Van Scoyoc Concurrent Technologies Corporation 16 August 2012 Energy Huntsville Meeting Huntsville,
Chapter © 2006 The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/ Irwin Chapter 7 IT INFRASTRUCTURES Business-Driven Technologies 7.
Sensitive Metric Collection and Reporting System Michael Aiello Hanning Gao Martin Goldberg Michael Sosonkin Jason Woloz.
Implementation - Part 2 CPS 181s March 18, Pieces of the Site-building Puzzle Page 180, figure 4.1.
AMI project for Israel Electricity Corporation
Using PI as a Transitioning Tool to RTPM A presentation by Calpine Geothermal for the 2004 OSI Users Conference A presentation by Calpine Geothermal for.
The ProactiveWatch Monitoring Service. Are These Problems For You? Your business gets disrupted when your IT environment has issues Your employee and.
Unit 5 CONTROL CENTERS AND POWER SYSTEM SECURITY.
Remote Access Using Citrix Presentation Server December 6, 2006 Matthew Granger IT665.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. PowerPoint to accompany Krar Gill Smid Technology of Machine.
Chapter 17 THE FUTURE OF BUSINESS Gitman & McDaniel 5 th Edition THE FUTURE OF BUSINESS Gitman & McDaniel 5 th Edition Chapter Using Technology to Manage.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
Information Technology Needs and Trends in the Electric Power Business Mladen Kezunovic Texas A&M University PS ERC Industrial Advisory Board Meeting December.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
6/23/2005 R. GARDNER OSG Baseline Services 1 OSG Baseline Services In my talk I’d like to discuss two questions:  What capabilities are we aiming for.
PI in a Modern Power Plant – American National Power, Inc. PI User Conference ‘03 Presented by: Brian M. Wood, American National Power, Inc More Uses Than.
Module 1: Overview of Microsoft Office SharePoint Server 2007.
How AEP is Approaching the Information Management Crisis by Leveraging OSIsoft’s Suite of Tools Bill Sigmon Sr. Vice President Fossil and Hydro Generation.
Evolution of PI in an Expanding Utility’s Strategy John L. Ragone KeySpan.
The European Gateway to TANKSAT The Ultimate Service for LPG Tank Telemetry MCS Europe Group Solutions.
STORAGE ARCHITECTURE/ MASTER): Where IP and FC Storage Fit in Your Enterprise Randy Kerns Senior Partner The Evaluator Group.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Simple, End-to-End Performance Management Application Performance.
Introduction to Networks. When Personal Computers first appeared in business, software programs were designed for a single user. However as computers.
Rohde & Schwarz Topex TOPEX IP Radio Gateway July 2011.
MICROSOFT AZURE APP BUILDER PROFILE: RAVERUS LTD. Raverus is a customer-driven company engaged in providing software applications designed to improve and.
Anytime, Anywhere Access Benefits Functionality Work Order Administration Dispatch Work Order Work Order Details New Work Order Additional Functionality.
Agenda Current Network Limitations New Network Requirements About Enterasys Security Branch Office Routers Overall Enterprise Requirements Proposed Solution.
Avtec Inc Virtualization - Securely Moving to the Cloud.
Chapter 6: Securing the Cloud
CCNET Managed Services
Cloud Consulting Services and Solutions
Cloud Computing LegalRun Solutions Why It’s Right for You!
Presentation transcript:

An Ultimate Security Solution for the PI Environment Gabriel Mazooz

Presentation Agenda Israel Electric Corporation (IEC) Some Facts and Figures Security Background Cyber Security Threats Project Requirements PI System Status The Challenge Project Implementation The Players The Working Environment The Process Project Summary

Israel Electric Corporation (IEC)

Nazareth, Church of the Annunciation

The Israel Electric Corporation Ltd. The Israel Electric Corporation (IEC) - est. 1923 99.85% Government owned Generates, transmits and distributes practically all the electricity in the State of Israel IEC is the sole integrated electric utility in the State of Israel One of the largest industrial companies in Israel

IEC – General Profile IEC – Main producer (99%) and distributor (100%) of electricity in Israel Generating capacity - ~11,000 MW Integrated Capabilities – IEC has full design and integration capabilities Largest company in Israel with 14,000 employees Current government policy calls for the privatization of IEC with competition introduction via Independent Power Producers (IPPs)

The Israel Electric Corporation Ltd. Power plant Gas Turbines 1. On January 30, 2008 - peak demand of 10,200 MW

NATIONAL SYSTEM OVERVIEW SCADA Control System Ovation Bailey MAX Control ABB Siemens 4 District Control Centers Generation District Marketing and Consumers Transformation Transmission Power Stations Switching Stations High Voltage Lines

Cyber Security – Main Points Critical National Infrastructures (CNIs) are prime targets for Cyber Terror Process control systems becoming more vulnerable: Communication systems converge to IP based networks Operating systems with known vulnerabilities are used Systems are interlinked Growing Worldwide threat environment (more tools, players) Remote monitoring and maintenance becoming common Interconnectivity with the administrative networks & Internet

IEC Cyber Security – Main Points IEC is a major cyber-target IEC is an Electricity island Strict requirements on availability (essentially 100%) PI servers are widely in use Most of IEC operational data is on PI

IEC Cyber Security Policy IEC has cyber security policies in effect: Information Security Policy Q1 2008 Divisional Policy Q2 2008 Cyber security policy is centrally managed by the head of the Generation Division and handled locally by the head of the Computers Dept. The National Information Security Authority (NISA) regulates CNI’s networks architectures and cyber security practices & methodologies

Production Division’s PI System The main information system supplying on-line and real-time data and information on elements and processes of the production division Used for making real-time operative decisions by units operators and PI systems users Integrated within a great many business process Over 500 users system wide All-time availability is strictly required 13

PI Tags Distribution Total Tags 214,000 Alon Tavor 2,000 Hagit 5,000 Ramat Hovav 2,000 Zafit 1,000 Gezer 2,000 National Dispatch 50,000 T & D 50,000 Test 1,000 Generation Division Headquarters 5,000 Haifa 20,000 Orot Rabin 30,000 Reading 5,000 Eshkol 10,000 Rutnberg 1-2 10,000 Rutnberg 3-4 20,000 Hadera Environment Association 1,000 Total Tags 214,000 15 Sites

PI System Referent / Administrator Responsible for PI system- one at each IEC site Operates and maintains on-site PI system Develops local applications and displays Local Point of Contact for all PI related issues Generation Division convenes a PI Referent Forum

Generation Overview - Units Status Site MW Fault Derate Reserve Avail. Maint. Avail. Reserve Maint. Faulty Derated Working

RT – PORTAL: Overview - Units Status

Locally developed Application - Example

PI System Expanding PI system being used for reporting on the move:

The Challenge To arrive at a truly and absolutely protected PI system, while still enabling fully operational PI connectivity with the administrative network Quick and easy implementation – minimal downtime Minimal cost

PI Security Project - Start to Finish : Less than a month !!!

The Main Players IEC – Generation Division as the initiator and project leader Ludan Systems – Solution Developer and Integrator Waterfall Security Solutions – Solution Developer & Vendor

Ludan Software and Control Systems - Facts Ludan Software and Control Systems - subsidiary of Ludan – Tech Ltd. Company activities: Project design, integration, installation and execution of industrial IT and process control projects Vast experience in computerized systems and process control large scale projects Over 20 years experience integrating PI systems Visit us @: www.ludansy.co.il

Waterfall Security Solutions - Facts Privately owned security firm, based in Israel Spun-off in 2006, 25 employees, >110 installations worldwide Solutions based on unidirectional connectivity harnessed in patented technology integrating hardware and software modules Visit us @: www.waterfall-security.com

Overall Project Players Performers Users Ludan Waterfall Management IEC PI Project Regulation Customers

Solution Concept – Main Points Segregate PI systems for maximum security Allow PI connectivity only via a strictly one-way communications solution (Waterfall One-Way™) Use the unidirectional connectivity to replicate PI server information on an external server Administrative PI users can only access the replicated PI server

Waterfall Unidirectional Connectivity A novel approach to network and data security Deployment of physically based unidirectional gateways for external connections Leveraging the unidirectional logic of such connections for: Sending production information to the business network Sending status information to the remote monitoring network Receiving information from IP surveillance/remote devices Benefits of the approach - A Win-Win situation Enabling all business needs and requirements (“traditional approach”) Top security level – practical “physical segregation” (“strict approach“)

Making Truly Unidirectional Connections Realizing absolute unidirectional connectivity in the optical domain: Transmitter Receiver Hardware Based One-Way Data-Flow Gate Diode Receive Only Laser Transmit Only

PI System – Solution Components Innovative W.F. element

WF-SME* PI System – Data Paths WF-SME for PI Business Network Industrial Network Waterfall SME Route for On-Line WF PI RX server Route for History WF PI TX server Replica PI Server Master PI Server Online - Points database replication (create/edit/delete tags) PI Base Subsystem PI Base Subsystem PI Snapshot Subsystem Online data replication (snapshot) PI Snapshot Subsystem PI Archive Subsystem PI Archive Subsystem Scheduled/On-demand history replication (archive) * Scada Monitoring Enabler

PI System – Before (Insecure) Highly risky architecture Business Network Industrial Network PI Server Master Site A Site B Site C Online bidirectional Site D Site N Internet 31

PI System – After (Secure) One way data flow Business Network Industrial Network PI Server Master Site A Site B Site C Online Unidirectional replication Site D Site N Internet 32

Project Implementation Process I - Infrastructure Process II - Sand box installation Process III - Declaration Process IV - New server declared operational Process V – Monitoring 33

Project Implementation - Process I Infrastructure: Analysis Design Procurement

Project Implementation - Process II Sand box installation: Original system runs in parallel Running 2 or 3 test clients in this period Evaluation of performance Database and application testing

Project Implementation - Process III Move Date To New Topology: Declaration Alert all users & managers

Project Implementation - Process IV New server declared operational Referent is coached regarding the new system Connection between networks is cut off Users are moved to the new system Applications and database are rigorously inspected

Project Implementation - Process V Monitoring Servers Interfaces Data Users Displays Applications 38

Project Completion Performance - 50k tags Uptime 2 years and counting ~ 1 sec. latency end to end. Uptime 2 years and counting 0 downtime on all systems installed User experience Seamless passage to the new system 100s of concurrent users nation wide Support *POC is unchanged *Point of contact

Project Management Timeline Done 40

Future Prospects Future phases and improvements will include: Install base increased to include more turbines: Alon Tavor Hagit Gezer Tzafit Ramat Hovav Allow for remote monitoring over unidirectional links: And in the near future: Eshkol

Summary State of the art security solution for the PI environment “Sleep well at night” Project timeline less than 1 month PI user experience is unchanged Performance is practically unaffected Negligible maintenance PI Availability is: Stable Reliable Fully Secured

Question Time