CHAPTER 2: PRODUCT DESCRIPTION
SECURITY
D30 LINE DISTANCE PROTECTION SYSTEM – INSTRUCTION MANUAL
2-5
2
•
A Role-Based Access Control (RBAC) system that provides a permission model that allows access to UR device
operations and configurations based on specific roles and individual user accounts configured on the AAA server (that
is, Administrator, Supervisor, Engineer, Operator, Observer roles)
•
Security event reporting through the Syslog protocol for supporting Security Information Event Management (SIEM)
systems for centralized cybersecurity monitoring
•
Strong encryption of all access and configuration network messages between the EnerVista software and UR devices
using the Secure Shell (SSH) protocol, the Advanced Encryption Standard (AES), and 128-bit keys in Galois Counter
Mode (GCM) as specified in the U.S. National Security Agency Suite B extension for SSH and approved by the National
Institute of Standards and Technology (NIST) FIPS-140-2 standards for cryptographic systems
CyberSentry user roles
CyberSentry user roles (Administrator, Engineer, Operator, Supervisor, Observer) limit the levels of access to various UR
functions. This means that the EnerVista software allows for access to functionality based on the user’s logged in role.
Example:
Administrative functions can be segmented from common operator functions, or engineering type access, all of
which are defined by separate roles so that access of UR devices by multiple personnel within a substation is allowed.
One role of one type is allowed to be logged in at a time. For example, one Operator can be logged in but not a second
Operator at the same time. This prevents subsets of settings from being changed at the same time.
Figure 2-3: CyberSentry user roles
The table lists user roles and their corresponding capabilities.
Table 2-3: Permissions by user role for CyberSentry
Administrator
Engineer
Operator
Supervisor
Observer
Summary
Complete access Complete access
except for
CyberSentry
Security
Command
menu
Authorizes
writing
Default role
Device Definition
R
R
R
R
R
Settings
|---------- Product Setup
|--------------- Security
(CyberSentry)
RW
R
R
R
R
|--------------- Supervisory
See table notes
R
R
See table
notes
R
|--------------- Display Properties
RW
RW
R
R
R
|--------------- Clear Relay Records
(settings)
RW
RW
R
R
R
|--------------- Communications
RW
RW
R
R
R
|--------------- Modbus User Map
RW
RW
R
R
R
|--------------- Real Time Clock
RW
RW
R
R
R
Содержание D30 series
Страница 10: ...x D30 LINE DISTANCE PROTECTION SYSTEM INSTRUCTION MANUAL TABLE OF CONTENTS ...
Страница 14: ...1 4 D30 LINE DISTANCE PROTECTION SYSTEM INSTRUCTION MANUAL FOR FURTHER ASSISTANCE CHAPTER 1 INTRODUCTION 1 ...
Страница 52: ...2 38 D30 LINE DISTANCE PROTECTION SYSTEM INSTRUCTION MANUAL SPECIFICATIONS CHAPTER 2 PRODUCT DESCRIPTION 2 ...
Страница 534: ...5 324 D30 LINE DISTANCE PROTECTION SYSTEM INSTRUCTION MANUAL TESTING CHAPTER 5 SETTINGS 5 ...
Страница 564: ...6 30 D30 LINE DISTANCE PROTECTION SYSTEM INSTRUCTION MANUAL PRODUCT INFORMATION CHAPTER 6 ACTUAL VALUES 6 ...
Страница 578: ...7 14 D30 LINE DISTANCE PROTECTION SYSTEM INSTRUCTION MANUAL TARGETS MENU CHAPTER 7 COMMANDS AND TARGETS 7 ...
Страница 614: ...9 26 D30 LINE DISTANCE PROTECTION SYSTEM INSTRUCTION MANUAL FAULT LOCATOR CHAPTER 9 THEORY OF OPERATION 9 ...
Страница 654: ...A 10 D30 LINE DISTANCE PROTECTION SYSTEM INSTRUCTION MANUAL FLEXANALOG ITEMS APPENDIX A FLEXANALOG OPERANDS A ...
Страница 662: ...C 6 D30 LINE DISTANCE PROTECTION SYSTEM INSTRUCTION MANUAL COMMAND LINE INTERFACE APPENDIX C COMMAND LINE INTERFACE C ...
Страница 670: ...iv D30 LINE DISTANCE PROTECTION SYSTEM INSTRUCTION MANUAL ABBREVIATIONS ...
Страница 686: ...xvi D30 LINE DISTANCE PROTECTION SYSTEM INSTRUCTION MANUAL INDEX ...