Cybersecurity considerations for electrical distribution systems
Securing the Network Management Module – 192
•
•
•
•
5.1.6.2.1 Three-tier architecture for a secure control network
Above figure shows that the control networks are divided into layers or zones based on control functions, which are then
connected by conduits (connections between the zones) that provide security controls to:
Control access to zones
Resist denial of services (DOS) attacks or the transfer of malware
Shield other network systems
Protect the integrity and the confidentiality of network traffic
Beyond network segmentation, access control (both physical and logical) should be defined and implemented.
The key consideration when designing access control is defining the required interactions both within a given zone and between
zones. These interactions should be mapped out clearly and prioritized based on need. It is important to realize that every hole
poked in a firewall and each non-essential functionality that provides access or creates additional connectivity increases potential
exposure to attacks. A system then becomes only as secure as the devices connecting to it.
If mapped correctly, the potential adverse impact to control system reliability and functionality should be negligible. However, this
element introduces additional costs (in terms of firewall and other network infrastructure) and complexity to the environment.
Summary of Contents for Network-M2
Page 1: ...UPS Network Management Card Network M2 User s Guide English 10 15 2020 2 0 5 ...
Page 2: ......
Page 24: ...Configuring Modbus Installing the Network Management Module 24 ...
Page 25: ...Configuring Modbus Installing the Network Management Module 25 ...
Page 26: ...Configuring Modbus Installing the Network Management Module 26 ...
Page 38: ...Home Contextual help of the web interface 38 3 2 7 1 3 Battery mode 3 2 7 1 4 Off mode ...
Page 40: ...Home Contextual help of the web interface 40 3 2 7 2 3 Battery mode 3 2 7 2 4 Off mode ...
Page 42: ...Home Contextual help of the web interface 42 3 2 7 3 2 Bypass mode 3 2 7 3 3 Battery mode ...
Page 64: ...Protection Contextual help of the web interface 64 Example 2 Immediate OFF Example 4 Custom ...
Page 65: ...Protection Contextual help of the web interface 65 Settings 1 ...
Page 261: ...Acronyms and abbreviations Information 261 ...
Page 268: ......