Table of contents
Section 1 Introduction.......................................................................3
This manual........................................................................................ 3
Document revision history.................................................................. 3
Section 2 Security in Substation Automation................................... 5
General security in Substation Automation........................................ 5
Section 3 Secure system setup........................................................7
Physical interfaces..............................................................................7
IP ports............................................................................................... 7
FTP access with TLS, FTPACCS.......................................................9
Encryption algorithms....................................................................... 10
Denial of service............................................................................... 10
Certificate handling...........................................................................11
Section 4 Managing user roles and user accounts ....................... 13
Authorization.....................................................................................13
Predefined user roles....................................................................... 14
Password policies.............................................................................16
IED User management..................................................................... 17
Starting IED user management................................................... 18
General settings.......................................................................... 18
User profile management............................................................ 19
Adding new users...................................................................19
Adding users to new user roles.............................................. 22
Deleting existing users........................................................... 23
Changing password................................................................25
User role management................................................................ 26
Adding new users to user roles.............................................. 27
Deleting existing User from user roles................................... 27
Reusing user accounts...........................................................27
Writing user management settings to the IED............................. 28
Reading user management settings from the IED.......................29
Saving user management settings.............................................. 29
Section 5 User activity logging....................................................... 31
Activity logging ACTIVLOG.............................................................. 31
Generic security application AGSAL................................................ 32
Security alarm SECALARM..............................................................32
About Security events.......................................................................33
Table of contents
GMS600 1.3 1
Cyber security deployment guideline