Per CIP-007-5, all ports should be secured or disabled

July 22, 2014Comments Off

By Pam Johnson Pam Johnson Headshot

Per CIP-007-5, all ports should be either secured or disabled. This obviously includes configuration ports. However, most substation devices do not allow the disabling of these ports nor should these ports be disabled as they serve important purposes, including being the primary configuration or emergency access port.

Instead, these ports must be secured.

Virtually all electronic devices with communication capability have configuration ports. For modern servers, baseboard management controllers that are networkable are the common configuration port technology. Older servers, routers, switches, firewalls, IED’s, RTU’s, etc. have serial privileged configuration ports, often network-enabled with terminal servers.

Configuration ports exist on almost every device used in Utility operations.  Control systems and control devices have configuration ports. Virtually every PLC, RTU, and IED has a configuration port (usually a privileged serial port with command and control access to the device‘s core program and operating system functions). In remote locations, such as substations and endpoints (poles), there are found many devices that have configuration ports.

From the control room to the sub-station to the pole, these physical ports provide a special level of privileged access that can be used to:

  1. Change Configuration
  2. Upgrade Firmware or BIOS
  3. Build-out devices that have components (like servers)
  4. Perform a variety of Administrative functions
  5. Perform emergency repair or failure recovery when no other port is accessible

Configuration Management’s Impact on Security & Operations

July 15, 2014Comments Off

By Pam Johnson Pam Johnson Headshot

TDi Technologies’ advancements in configuration management technology provides the much needed managerial visibility and control over unintended or unapproved changes to IT devices, eliminating the major sources of human error or nefarious activity that can impact overall security and operations.

There are a number of areas where Configuration Management adds significant value to both Security and Operations:

  • Better visibility and accountability of the configuration of devices on a network
  • Minimized trouble shooting time for downtimes caused by configuration issues
  • Reduced downtime with time alerts, alarms on identification of unauthorized configuration changes
  • Adherence to device configuration standards, software versions, and hardware
  • Proof of compliance to cyber security regulatory standards

Additional information is available on the ConsoleWorks Baseline Configuration Management solution at this link.

ConsoleWorks 4.8 Focus on Information Assurance & Security

June 1, 2014Comments Off

By Pam Johnson Pam Johnson Headshot

Available now, the latest release of ConsoleWok, Version 4.8, addresses Federal Compliance requirements for Information Assurance & Security. With an expansion of Federal Government customers as well as Industry focus on NERC CIP Version 5, PCI DSS, HIPAA Meaningful Use and the new NIST Framework, TDi added a number of enhancements for Auditing, Change History, Encryption, Password Management and overall usability in ConsoleWorks 4.8.

ConsoleWorks 4.8 includes the following valuable enhancements:

      • Configuration Change Control Audit
      • Secure Logging
      • New Password Rule
      • Old Password Required for Password Changes
      • Last Login Enhanced with Connection Information
      • Enhanced Logs Purpose-build for Audits
      • Time-based Access Control Rules
      • CW Scripts Enhanced with Interactive Prompts

For more information on the new capabilities of ConsoleWorks 4.8, check out this link.

Page 1 of 4612345»102030...Last »
Google Analytics Alternative