Table of contents
Section 1 Introduction.......................................................................3
Section 2 Security in Substation Automation................................... 5
General security in Substation Automation........................................ 5
Section 3 Secure system setup........................................................7
Physical interfaces..............................................................................7
IP ports............................................................................................... 7
FTP access with TLS, FTPACCS.......................................................9
Encryption algorithms....................................................................... 10
Denial of service............................................................................... 10
Certificate handling...........................................................................11
Section 4 Managing user roles and user accounts ....................... 13
Authorization.....................................................................................13
Predefined user roles....................................................................... 14
Password policies.............................................................................16
IED User management..................................................................... 17
Starting IED user management................................................... 18
General settings.......................................................................... 18
User profile management............................................................ 19
Adding new users...................................................................19
Adding users to new user roles.............................................. 22
Deleting existing users........................................................... 23
Changing password................................................................25
User role management................................................................26
Writing user management settings to the IED.............................28
Reading user management settings from the IED.......................29
Saving user management settings.............................................. 29
Section 5 User activity logging....................................................... 31
Activity logging ACTIVLOG.............................................................. 31
Generic security application AGSAL................................................ 32
Security alarm SECALARM..............................................................32
About Security events.......................................................................33
Table of contents
GMS600 1.3
1
Cyber security deployment guideline