Forget your password?
Fields marked with an asterisk (*) are mandatory
As substations become increasingly digital and huge quantities of data are transmitted in real time, utilities are becoming vulnerable to cyber-attack. Consequently, up-to-date cybersecurity defences are crucial to the health and reliability of the digital substation.
Most of today’s substations were commissioned at a time when the only communications link was a private control line using proprietary protocols. Since then, technology has moved on. So, in tandem, have the needs of transmission and distribution system operators for increased connectivity to the substation. “In an effort to improve network operation and, at the same time, reduce costs, utilities set up a second communication link used to download disturbance-recording files and upload relay settings,” explains Jérôme Arnaud, Upstream Marketing Engineer at Alstom Grid. “Once this remote access is established, it opens a whole new world of possibilities: supervision, asset management, troubleshooting, etc. But it also opens the doors to attack.”
1A bot is a software application that runs automated repetitive tasks over the Internet. The largest use of legitimate bots is in web spidering to index content.
2The Stuxnet worm reportedly ruined almost one-fifth of Iran's nuclear enrichment centrifuges in 2009-2010.
“The chosen solutions must therefore restrict remote access to the substation to authorised users and deny malware propagation without changing the substation automation software while, at the same time, minimising the management overhead. This can be done with a series of security layers that combine into a ‘defence-in-depth’ strategy,” says Arnaud. “This layered arsenal is capable of withstanding or minimising the impact of a failure in any one layer,” he adds.
After hardening the operating system, security layers can be added on top. The second step (or second security layer) is to protect the system from malware. Traditionally, antiviruses are used. They rely on a “blacklist” of malware signatures to prevent malware execution. However, they have drawbacks: the blacklist must be updated whenever new malware is discovered, and this update may break the system by triggering a “false positive”, i.e. identifying a legitimate software component as malware. “A more appropriate approach is whitelisting. This relies on a list of authorised executable files (the whitelist). This kind of software is particularly well adapted to a substation automation system because, since the system is stable, the whitelist seldom changes,” says Arnaud. The result is that malware processes cannot execute on the protected system. Also, whereas an antivirus is constantly scanning disks and memory, a whitelisting technology uses resources only during the starting phase of a process, and so consumes negligible system resources during runtime.
To further improve system security, configuration and settings files have also been secured. “While application whitelisting focuses on executable files, file integrity controls monitors, alerts and/or prevents all file changes,” explains Arnaud. “The integrity control software is set up to prevent any automation system configuration and settings files from being modified except by an authorised process. This guarantees that the only way new configuration files and settings can be deployed is by the expected process.” Installing McAfee Embedded Control on both the substation system and the remote engineering workstation combined with the installation of file integrity control on the substation system represent efficient protection against malware such as Stuxnet.
Forgot your password? Click here
Don't have an account? Sign up
Fields marked with an asterisk (*) are mandatory