SlideShare a Scribd company logo
1 of 23
Substation Remote Access
              Entergy Style




Chris Sistrunk, PE – RTU/SCADA SME
Sr. Engineer – T&D Technical Services
Entergy – Jackson, MS
9/26/2012
                                   8th Security Summit
                                    Portland, Oregon
Entergy SCADA
• Entergy has about 1600 substation RTUs
• 1500+ are “smart” microprocessor based
• Approximately 60 are “dumb” card file RTUs
• Approximately 500 Relay Communication
  Processors connected to the “smart” RTUs
• Many IED types with several protocols
• About 98% of substations are serial only

                               8th Security Summit
                                Portland, Oregon
1200 Baud to SCADAnet
• Most of Entergy’s RTU circuits are good ole’
  Analog Leased Lines running at 1200 Baud
• ‘Ma-Bell’ won’t support forever
• OPGW, Digital µWave, Wireless, Leased T1
• Can support 4-wire to SCADAnet with same
  telecom equipment
• SCADAnet uses hardened routers & switches

                                8th Security Summit
                                 Portland, Oregon
Engineering Truth
“Engineering isn't about perfect
solutions; it's about doing the
best you can with limited
resources.”
-Randy Pausch, The Last Lecture

                      8th Security Summit
                       Portland, Oregon
via Dezeen




             8th Security Summit
              Portland, Oregon
A New RTU Standard
• Comparison of the major Comm
  Processors/RTU/Gateways in 2008
• Management Directive: 1 BOX!!!
• Must be able to work with existing and future
  substation designs
• I led Entergy-wide team that selected new
  RTU standard in 2010
• KEY piece to moving toward IP connectivity
                                8th Security Summit
                                 Portland, Oregon
A Hybrid Approach to SA




                 8th Security Summit
                  Portland, Oregon
A Hybrid Approach to SA
• New RTU is a flexible and upgradeable
  solution that best met all of our requirements
• Migration path for existing RTU fleet
• HYBRID – more MPG for the Substation
  – Old Stuff: 80% legacy relays, copper protocol
  – New Stuff: SEL, IEDs, DNP, less copper
  – New RTU can work with both
  – Major building block for utilizing IP networks

                                     8th Security Summit
                                      Portland, Oregon
A Hybrid Approach to SA
                                             SCADAnet
                  DA
  Serial to                                   Router
  SCADA
                                               Switch


        RTU            RTU                              Terminal Server
                             New RTU
      New RTU

DNP
                                   SEL 351                    SEL 351
                       
                       
                       
                       
                      
                      
                       
       
       
       
        




                                                         
                                   SEL 3 1
                                        5                
                                                         
                                                         
                                                         
                                                         
                                                          
                       
                       
                       
                       
                      
                      
                       
       
       
       
        


                             
                             
                             
                             
                             
                             
                              




                                                              PMU
                       
                       
                       
                       
                      
                      
                       
       
       
       
        




  100% Serial                     BKR/XFMR
                                   Monitor



                                             8th Security Summit
                                              Portland, Oregon
Challenges of a SCADA Engineer




                    8th Security Summit
                     Portland, Oregon
SUBCIP Project
•   Started in fall of 2011
•   Secure remote access to IEDs in the substation
•   Old solution didn’t work – forced to roll trucks
•   Must meet NERC/CIP standards
•   Remember >>> Compliance != security
•   Use new RTU with enterprise IED access
    solution in a new remote access solution

                                   8th Security Summit
                                    Portland, Oregon
SUBCIP Project
• Implement NERC/CIP v3 at new sites by June
  30, 2012 for Phase 1 & Phase 2 by June 2013
• We know SCADAnet is the future, but routable
  protocols means locking cabinets or the entire
  control house, which is a challenge
• Using only serial communications for SCADA,
  engineering access, and file transfer will
  eliminate CIP002-R3 CCAs

                                8th Security Summit
                                 Portland, Oregon
8th Security Summit
 Portland, Oregon
SUBCIP Project: REAAP
• REAAP – Resilient External Access &
  Authentication Project
• Provides a solution to address the need to
  provide additional security controls for
  external and remote access to Entergy’s
  Energy Delivery process control environment
  (e.g., EMS/SCADA) using additional security
  controls for authorized employees and
  contractors.

                               8th Security Summit
                                Portland, Oregon
SUBCIP Project: REAAP
• REAAP uses Two-Factor Authentication
  – Hardened passwords
  – Smart cards
• In addition to TFA, remote access is via a
  virtual desktop environment
  – Must use VPN if not on Corp network
  – Virtual machines have security & virus scanning
  – Short-term file storage for file transfers

                                    8th Security Summit
                                     Portland, Oregon
SUBCIP Project: REAAP
        ESP - Secure Environment




VPN




                 8th Security Summit
                  Portland, Oregon
SUBCIP Project                                          SUBSTATION
   REEAP
                                    Why oh why
                Corp/VPN             didn’t I
             RS-232
                                     take the
IED Access                          blue pill?          Switch
                                          RTU
Passwords    4-Wire                                     Sub LAN
Records                    Zmodem

  SCADA
                                            SEL 351




                                            SEL 3 1
                                                 5




                                      Terminal Server
                             RS-232                          
                                                             
                                                             
                                                             
                                                             
                                                             
                                                              




                                                             
                                                             
                                                             
                                                             
                                                             
                                             SEL 351         
                                                              




                                                             
                                                             
                                                             
                                            SEL 351          
                                                             
                                                             
                                                              




                                        8th Security Summit
                                         Portland, Oregon
8th Security Summit
 Portland, Oregon
SUBCIP Project: Substation (No CCAs)
• Remote serial connection from REAAP Enterprise
  system to RTU via channel banks
• 9600 Baud SCADA – 8X the bandwidth!
• Hardened Switch for SUB LAN & Future
• New RTU replaces old RTU and comm processors
• Relay techs only use serial in the Substation
  – Zmodem (old school!) for file xfers to RTU
• Open USB & Eth ports are physically locked

                                       8th Security Summit
                                        Portland, Oregon
…and it works…




            8th Security Summit
             Portland, Oregon
SUBCIP Project: Phase 3
• CIP v5 is on the horizon
• Some serial IEDs won’t be exempt anymore
  from becoming CCA/BES Cyber Assets
• Roll out SCADAnet to IEDs where serial isn’t
  sufficient or other requirements where IP is
  more beneficial
• Implement automatic IED password
  management & fault collection
                                 8th Security Summit
                                  Portland, Oregon
Final Thoughts
• SCADA Security isn’t easy
  – Doing the best we can with what we have
• SCADA, Relay, & Security Labs
  – Having a lab is so valuable for testing,
    troubleshooting, breaking & fixing stuff
  – Yes I have a fuzzer and I’m not afraid to use it
• DNP3/IP Secure Authentication v5
  – Please tell your vendors you want it

                                      8th Security Summit
                                       Portland, Oregon
Chris Sistrunk, PE
csistru@entergy.com
     Follow @chrissistrunk



                             8th Security Summit
                              Portland, Oregon

More Related Content

More from EnergySec

Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber DefenseGary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber DefenseEnergySec
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsEnergySec
 
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...EnergySec
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyEnergySec
 
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...EnergySec
 
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityDaniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityEnergySec
 
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change ManagementLessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change ManagementEnergySec
 
Explore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsExplore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsEnergySec
 
Wireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of ReachWireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of ReachEnergySec
 
Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!EnergySec
 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network ArchitecturesEnergySec
 
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleNERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleEnergySec
 
Industrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With ScissorsIndustrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With ScissorsEnergySec
 
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...EnergySec
 
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...EnergySec
 
Where Cyber Security Meets Operational Value
Where Cyber Security Meets Operational ValueWhere Cyber Security Meets Operational Value
Where Cyber Security Meets Operational ValueEnergySec
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?EnergySec
 
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...EnergySec
 
Industry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working TogetherIndustry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working TogetherEnergySec
 
What the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each OtherWhat the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each OtherEnergySec
 

More from EnergySec (20)

Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber DefenseGary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and Mitigations
 
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, Anecdotally
 
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
 
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityDaniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
 
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change ManagementLessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
 
Explore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsExplore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWs
 
Wireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of ReachWireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of Reach
 
Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!
 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network Architectures
 
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleNERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
 
Industrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With ScissorsIndustrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With Scissors
 
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
 
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
 
Where Cyber Security Meets Operational Value
Where Cyber Security Meets Operational ValueWhere Cyber Security Meets Operational Value
Where Cyber Security Meets Operational Value
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?
 
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
 
Industry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working TogetherIndustry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working Together
 
What the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each OtherWhat the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each Other
 

Recently uploaded

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Substation Remote Access - Entergy Style

  • 1. Substation Remote Access Entergy Style Chris Sistrunk, PE – RTU/SCADA SME Sr. Engineer – T&D Technical Services Entergy – Jackson, MS 9/26/2012 8th Security Summit Portland, Oregon
  • 2. Entergy SCADA • Entergy has about 1600 substation RTUs • 1500+ are “smart” microprocessor based • Approximately 60 are “dumb” card file RTUs • Approximately 500 Relay Communication Processors connected to the “smart” RTUs • Many IED types with several protocols • About 98% of substations are serial only 8th Security Summit Portland, Oregon
  • 3. 1200 Baud to SCADAnet • Most of Entergy’s RTU circuits are good ole’ Analog Leased Lines running at 1200 Baud • ‘Ma-Bell’ won’t support forever • OPGW, Digital µWave, Wireless, Leased T1 • Can support 4-wire to SCADAnet with same telecom equipment • SCADAnet uses hardened routers & switches 8th Security Summit Portland, Oregon
  • 4. Engineering Truth “Engineering isn't about perfect solutions; it's about doing the best you can with limited resources.” -Randy Pausch, The Last Lecture 8th Security Summit Portland, Oregon
  • 5. via Dezeen 8th Security Summit Portland, Oregon
  • 6. A New RTU Standard • Comparison of the major Comm Processors/RTU/Gateways in 2008 • Management Directive: 1 BOX!!! • Must be able to work with existing and future substation designs • I led Entergy-wide team that selected new RTU standard in 2010 • KEY piece to moving toward IP connectivity 8th Security Summit Portland, Oregon
  • 7. A Hybrid Approach to SA 8th Security Summit Portland, Oregon
  • 8. A Hybrid Approach to SA • New RTU is a flexible and upgradeable solution that best met all of our requirements • Migration path for existing RTU fleet • HYBRID – more MPG for the Substation – Old Stuff: 80% legacy relays, copper protocol – New Stuff: SEL, IEDs, DNP, less copper – New RTU can work with both – Major building block for utilizing IP networks 8th Security Summit Portland, Oregon
  • 9. A Hybrid Approach to SA SCADAnet DA Serial to Router SCADA Switch RTU RTU Terminal Server New RTU New RTU DNP SEL 351 SEL 351                SEL 3 1 5                            PMU               100% Serial BKR/XFMR Monitor 8th Security Summit Portland, Oregon
  • 10. Challenges of a SCADA Engineer 8th Security Summit Portland, Oregon
  • 11. SUBCIP Project • Started in fall of 2011 • Secure remote access to IEDs in the substation • Old solution didn’t work – forced to roll trucks • Must meet NERC/CIP standards • Remember >>> Compliance != security • Use new RTU with enterprise IED access solution in a new remote access solution 8th Security Summit Portland, Oregon
  • 12. SUBCIP Project • Implement NERC/CIP v3 at new sites by June 30, 2012 for Phase 1 & Phase 2 by June 2013 • We know SCADAnet is the future, but routable protocols means locking cabinets or the entire control house, which is a challenge • Using only serial communications for SCADA, engineering access, and file transfer will eliminate CIP002-R3 CCAs 8th Security Summit Portland, Oregon
  • 13. 8th Security Summit Portland, Oregon
  • 14. SUBCIP Project: REAAP • REAAP – Resilient External Access & Authentication Project • Provides a solution to address the need to provide additional security controls for external and remote access to Entergy’s Energy Delivery process control environment (e.g., EMS/SCADA) using additional security controls for authorized employees and contractors. 8th Security Summit Portland, Oregon
  • 15. SUBCIP Project: REAAP • REAAP uses Two-Factor Authentication – Hardened passwords – Smart cards • In addition to TFA, remote access is via a virtual desktop environment – Must use VPN if not on Corp network – Virtual machines have security & virus scanning – Short-term file storage for file transfers 8th Security Summit Portland, Oregon
  • 16. SUBCIP Project: REAAP ESP - Secure Environment VPN 8th Security Summit Portland, Oregon
  • 17. SUBCIP Project SUBSTATION REEAP Why oh why Corp/VPN didn’t I RS-232 take the IED Access blue pill? Switch RTU Passwords 4-Wire Sub LAN Records Zmodem SCADA SEL 351 SEL 3 1 5 Terminal Server RS-232             SEL 351      SEL 351     8th Security Summit Portland, Oregon
  • 18. 8th Security Summit Portland, Oregon
  • 19. SUBCIP Project: Substation (No CCAs) • Remote serial connection from REAAP Enterprise system to RTU via channel banks • 9600 Baud SCADA – 8X the bandwidth! • Hardened Switch for SUB LAN & Future • New RTU replaces old RTU and comm processors • Relay techs only use serial in the Substation – Zmodem (old school!) for file xfers to RTU • Open USB & Eth ports are physically locked 8th Security Summit Portland, Oregon
  • 20. …and it works… 8th Security Summit Portland, Oregon
  • 21. SUBCIP Project: Phase 3 • CIP v5 is on the horizon • Some serial IEDs won’t be exempt anymore from becoming CCA/BES Cyber Assets • Roll out SCADAnet to IEDs where serial isn’t sufficient or other requirements where IP is more beneficial • Implement automatic IED password management & fault collection 8th Security Summit Portland, Oregon
  • 22. Final Thoughts • SCADA Security isn’t easy – Doing the best we can with what we have • SCADA, Relay, & Security Labs – Having a lab is so valuable for testing, troubleshooting, breaking & fixing stuff – Yes I have a fuzzer and I’m not afraid to use it • DNP3/IP Secure Authentication v5 – Please tell your vendors you want it 8th Security Summit Portland, Oregon
  • 23. Chris Sistrunk, PE csistru@entergy.com Follow @chrissistrunk 8th Security Summit Portland, Oregon