Cybersentry Security; Cybersentry User Roles - GE T60 Instruction Manual

Transformer protection system ur series
Hide thumbs Also See for T60:
Table of Contents

Advertisement

2 PRODUCT DESCRIPTION
Clearing the data logger
Clearing the user-programmable pushbutton states
The following operations are under setting password supervision:
Changing any setting
Test mode operation
The T60 supports password entry from a local or remote connection. Local access is defined as any access to settings or
commands via the faceplate interface. This includes both keypad entry and the through the faceplate RS232 port. Remote
access is defined as any access to settings or commands via any rear communications port. This includes both Ethernet
and RS485 connections. Any changes to the local or remote passwords enables this functionality.
When entering a settings or command password via EnerVista or any serial interface, the user must enter the correspond-
ing connection password. If the connection is to the back of the T60, the remote password must be used. If the connection
is to the RS232 port of the faceplate, the local password applies.
Password access events are logged in the Event Recorder.
c) CYBERSENTRY SECURITY
CyberSentry Embedded Security is a software option that provides advanced security services. When this option is pur-
chased, the basic password security is disabled automatically.
CyberSentry provides security through the following features:
An Authentication, Authorization, Accounting (AAA) Remote Authentication Dial-In User Service (RADIUS) client that
is centrally managed, enables user attribution, provides accounting of all user activities, and uses secure standards-
based strong cryptography for authentication and credential protection.
A Role-Based Access Control (RBAC) system that provides a permission model that allows access to UR device oper-
ations and configurations based on specific roles and individual user accounts configured on the AAA server (that is,
Administrator, Supervisor, Engineer, Operator, Observer).
Security event reporting through the Syslog protocol for supporting Security Information Event Management (SIEM)
systems for centralized cybersecurity monitoring.
Strong encryption of all access and configuration network messages between the EnerVista software and UR devices
using the Secure Shell (SSH) protocol, the Advanced Encryption Standard (AES), and 128-bit keys in Galois Counter
Mode (GCM) as specified in the U.S. National Security Agency Suite B extension for SSH and approved by the
National Institute of Standards and Technology (NIST) FIPS-140-2 standards for cryptographic systems.
Example: Administrative functions can be segmented away from common operator functions, or engineering type access,
all of which are defined by separate roles, as shown in the following figure, so that access of UR devices by multiple per-
sonnel within a substation is allowed. Permission for each role are outlined in the next section.
There are two types of authentication supported by CyberSentry that can be used to access the UR device:
Device Authentication (local UR device authenticates)
Server Authentication (RADIUS server authenticates)
GE Multilin
Figure 2–2: CYBERSENTRY USER ROLES
T60 Transformer Protection System
2.1 INTRODUCTION
2
2-5

Advertisement

Table of Contents
loading

Table of Contents