2-4
T35 TRANSFORMER PROTECTION SYSTEM – INSTRUCTION MANUAL
SECURITY
CHAPTER 2: PRODUCT DESCRIPTION
2
Password access events are logged in the Event Recorder.
2.2.0.3 CyberSentry security
CyberSentry embedded security is available using software options that provide advanced security services. When an
option is purchased, the basic password security is disabled automatically.
CyberSentry provides security through the following features:
•
An Authentication, Authorization, Accounting (AAA) Remote Authentication Dial-In User Service (RADIUS) client that is
centrally managed, enables user attribution, provides accounting of all user activities, and uses secure standards-
based strong cryptography for authentication and credential protection
•
A Role-Based Access Control (RBAC) system that provides a permission model that allows access to UR device
operations and configurations based on specific roles and individual user accounts configured on the AAA server (that
is, Administrator, Supervisor, Engineer, Operator, Observer roles)
•
Security event reporting through the Syslog protocol for supporting Security Information Event Management (SIEM)
systems for centralized cybersecurity monitoring
•
Strong encryption of all access and configuration network messages between the EnerVista software and UR devices
using the Secure Shell (SSH) protocol, the Advanced Encryption Standard (AES), and 128-bit keys in Galois Counter
Mode (GCM) as specified in the U.S. National Security Agency Suite B extension for SSH and approved by the National
Institute of Standards and Technology (NIST) FIPS-140-2 standards for cryptographic systems
CyberSentry user roles
CyberSentry user roles (Administrator, Engineer, Operator, Supervisor, Observer) limit the levels of access to various UR
device functions. This means that the EnerVista software allows for access to functionality based on the user’s logged in
role.
Example:
Administrative functions can be segmented away from common operator functions, or engineering type access,
all of which are defined by separate roles (see figure) so that access of UR devices by multiple personnel within a
substation is allowed.
One role of one type is allowed to be logged in at a time. For example, one Operator can be logged in but not a second
Operator at the same time. This prevents subsets of settings from being changed at the same time.
Figure 2-2: CyberSentry user roles
The table lists user roles and their corresponding capabilities.
Table 2-3: Permissions by user role for CyberSentry
Roles
Administrator
Engineer
Operator
Supervisor
Observer
Complete access Complete access
except for
CyberSentry
Security
Command
menu
Authorizes
writing
Default role
Device Definition
R
R
R
R
R
Settings
Содержание T35
Страница 9: ...TABLE OF CONTENTS T35 TRANSFORMER PROTECTION SYSTEM INSTRUCTION MANUAL ix ABBREVIATIONS INDEX ...
Страница 10: ...x T35 TRANSFORMER PROTECTION SYSTEM INSTRUCTION MANUAL TABLE OF CONTENTS ...
Страница 14: ...1 4 T35 TRANSFORMER PROTECTION SYSTEM INSTRUCTION MANUAL FOR FURTHER ASSISTANCE CHAPTER 1 INTRODUCTION 1 ...
Страница 202: ...4 88 T35 TRANSFORMER PROTECTION SYSTEM INSTRUCTION MANUAL FLEXLOGIC DESIGN USING ENGINEER CHAPTER 4 INTERFACES 4 ...
Страница 472: ...5 270 T35 TRANSFORMER PROTECTION SYSTEM INSTRUCTION MANUAL TESTING CHAPTER 5 SETTINGS 5 ...
Страница 500: ...6 28 T35 TRANSFORMER PROTECTION SYSTEM INSTRUCTION MANUAL PRODUCT INFORMATION CHAPTER 6 ACTUAL VALUES 6 ...
Страница 514: ...7 14 T35 TRANSFORMER PROTECTION SYSTEM INSTRUCTION MANUAL TARGETS MENU CHAPTER 7 COMMANDS AND TARGETS 7 ...
Страница 580: ...A 16 T35 TRANSFORMER PROTECTION SYSTEM INSTRUCTION MANUAL FLEXANALOG ITEMS APPENDIX A FLEXANALOG OPERANDS A ...
Страница 588: ...C 6 T35 TRANSFORMER PROTECTION SYSTEM INSTRUCTION MANUAL COMMAND LINE INTERFACE APPENDIX C COMMAND LINE INTERFACE C ...
Страница 596: ...iv T35 TRANSFORMER PROTECTION SYSTEM INSTRUCTION MANUAL ABBREVIATIONS ...