Compliant Security of Control Systems for emergency power supply

ARE YOU AN OWNER OR INTEGRATOR OF SYSTEMS FOR CRITICAL INFRASTRUCTURES?

Critical infrastructures (CRITIS) are organizations and facilities of major importance to the state community and security of supply, such as large hospitals, data centers, utilities and independent power producers.

According to the BSI (German federal office for information security), effective cyber security measures must be implemented and periodically verified not only for critical infrastructures, but also for facilities of public interest. Due to the rapidly increasing number of attacks even on companies and facilities, that do not directly belong to these categories, such as smaller hospitals, the self-interest of those companies and facilities in cyber security increased significantly.

NEED OF TECHNICAL & ORGANIZATIONAL MEASURES

Emergency power systems are an essential part of reliable power supply and exposed to an increased risk of cyber attacks through

  • cyber ​​attacks on control systems with remote access resp. remote monitoring
  • malware infection caused by infected devices accessing the system locally or remotely
  • faulty operation by unauthorized persons or persons with restricted authorization through local and remote access
  • acts of sabotage

DO YOUR SYSTEMS COMPLY WITH THE CURRENT CYBER SECURITY STANDARDS?

EU Cyber Security Act:

Establishment of a secure, cyber security-compliant environment (for manufacturers, integrators and asset owners / operators) concerning Industry 4.0 products and systems

IEC 62443:

Rules and guidelines for mandatory security in OT environments (for manufacturers, integrators and asset owners / operators)

IT- Security Law 2.0:

The 2nd German Security Act to increase the security of IT systems for the protection of the federal administration, critical infrastructures and companies of public interest.

WE MAKE YOUR EMERGENCY POWER SYSTEM CYBER SECURE!

As a specialist for emergency power systems in critical infrastructures we offer you Cyber Security Kits for new systems as well as a Cyber Security Check for your existing emergency power systems.

We analyze weak points and determine optimization potential to protect your applications against cyber attacks and to ensure maximum availability.

We would be happy to support you in an advisory capacity with the certification of your organization and processes according to the guidelines of the Cyber ​​Security Standard IEC 62443-2-4.
 

Our Cyber Security Kits for emergency power systems at a glance:

KUHSE CYBER SECURITY PREMIUM KIT

for Emergency Power Systems with extended cyber security requirements

Technical Measures

  • Network architecture & enhanced network security by means of suitable network devices
  • Cloud-based central management of user accounts, access and permissions
  • User authentication via two-factor-authentication
  • Minimizing the physical and logical accessibility and thus points for potential attacks
  • Hardening and strengthening of the control system (hardware, software, services, cloud)
  • Logging of logins, login attempts and respective violations
  • Backup/restore and disaster recovery tools and procedures

Service Measures

  • Process manual for operation, maintenance and dealing with cyber attacks
  • Training of the owner‘s operators and service personnel
  • Repeating tests for ensuring the effectiveness of technical measures and implemented procedures
  • Updates for network and security devices, relevant control system components and implemented security tools (patching, anti-malware, application whitelisting, digital certificates)

KUHSE CYBER SECURITY BASIC KIT

for Emergency Power Systems with basic cyber security requirements

Technical Measures

  • Network architecture & basic network security by means of suitable network devices
  • Cloud-based central management of user group accounts, accesses and permissions
  • User authentication via two-factor-authentication
  • Limitation of physical and logical accessibility and thus points of potential attacks
  • Hardening of the Kuhse Gateway and the Cloud environment
  • Logging of logins and login attempts
  • System backup after delivery and commissioning

Service Measures

  • Process manual for operation and maintenance
  • Regular updates of security mechanisms of the Cloud environment

Mehr Informationen zum Download:

Your contact

Kuhse News

We would be pleased to inform you about current products and developments from our company with our topic-specific newsletters.