Section 1
Introduction
1.1
This manual
The cyber security deployment guideline describes the process for handling cyber
security when communicating with the protection relay. The cyber security
deployment guideline provides information on how to secure the system on which
the protection relay is installed. The guideline can be used as a technical reference
during the engineering phase, installation and commissioning phase, and during
normal service.
1.2
Intended audience
This guideline is intended for the system engineering, commissioning, operation
and maintenance personnel handling cybersecurity during the product lifecycle.
The personnel is expected to have general knowledge about topics related to
cybersecurity.
•
Protection and control devices, gateways and workstations
•
Networking, including Ethernet and TCP/IP with its concept of ports and
services
•
Security policies
•
Firewalls
•
Antivirus protection
•
Application whitelisting
•
Secure remote communication
2NGA000818 A
Section 1
Introduction
REX610
3
Cyber Security Deployment Guideline
Summary of Contents for Relion REX610
Page 1: ...RELION PROTECTION AND CONTROL REX610 Cyber Security Deployment Guideline...
Page 2: ......
Page 8: ...Section 8 Glossary 27 Table of contents 2 REX610 Cyber Security Deployment Guideline...
Page 12: ...6...
Page 14: ...8...
Page 20: ...14...
Page 30: ...24...
Page 34: ...28...
Page 35: ...29...