BDEW White Paper in Practice: IT Security in The Secondary Systems
BDEW White Paper in Practice: IT Security in The Secondary Systems
Summary / Abstract
The extensive use of automation systems for monitoring / controlling hundreds of thousands of devices for the produc-
tion, transport and distribution of energy is a result of the growth of the renewable energy sector in Germany. Exchange
of data between field units and central control centers will be carried out on IP-based infrastructure. Those units are a
new part of the critical infrastructure in terms of IT security.
This paper provides a practical insight into the implementation of IT security mechanisms for remote terminal units and
SCADA systems (secondary equipment) in accordance with the BDEW white paper "Requirements for Secure Control
and Telecommunication Systems" [1]. It also presents an evaluation of a variety of tools, protocols and procedures in
terms of technical and organizational feasibility.
7.2 Public key infrastructure Figure 2 Layers of security for secure communication
During the implementation of the various security func-
In particular, the main tasks of device security and com-
tions for the auditing of SCADA and telecontrol compo-
munications security could be implemented with stan-
nents, it quickly became clear that the use of crypto-
dardized and available methods. There are open questions
graphic certification material was an unavoidable neces-
in the field of data security, since no common standards
sity. Although it is true that several protocols provide
are available and questions about the provability of proc-
mechanisms for the authentication of communication
ess actions (e.g. command output to switchgear) are to be
partners without certification material, they require, on
expected in the future.
the whole, more costs and effort for the administration
and storage of authentication information. Moreover, it is
possible to archive a number of security requirements for 9 References
data security on the basis of certificates.
[1] White Paper "Requirements for Secure Control and
Therefore – and despite the complexity of certificate-
Telecommunication Systems", BDEW - Federal As-
based systems – it was decided to prefer the aforemen-
sociation of Energy and Water Industries, Berlin,
tioned authentication approaches. For this purpose, X.509
06/2008
was selected as a suitable certification standard because it
[2] ISO / IEC TR 27019 - Information technology - Se-
is supported by several authentication methods (e.g.
curity techniques - Information security management
HTTPS, IPsec/IKE, OpenVPN, TLS) and because there
guidelines based on ISO / IEC 27002 for process
are commercial providers for certificates and the neces-
control systems specific to the energy industry
sary administration software. (DRAFT), Geneva / Switzerland: Bureau Central de
Unfortunately, an analysis of existing providers for X.509 la Commission International Electrotechnical
certificates has shown that the certificates offered by them
[3] Execution instructions on use of the BDEW White
are not suitable for telecontrol systems. Apart from the
Papers "requirements for safe control and telecom-
costs, the main point of criticism is the short validity pe- munication systems" in the field of protection and
riod of a public X.509 certificate. This period covers only control systems, Dortmund: Amprion GmbH, 2010
a few years and is in conflict with the planned product
[4] Testing Guide for BDEW white paper "requirements
lifecycle of telecontrol systems. Whereas an exchange of
for safe control and telecommunication systems" in
the existing certification material every 24 months might the field of protection and control systems, Dort-
be acceptable for central control system components, this mund: Amprion GmbH, 08/2010
is absolutely not feasible with regard to distributed RTUs,
[5] RFC 4301 - "Security Architecture for the Internet
both with regard to time and costs.
Protocol", IETF, 12/2005
An alternative would be to use of certificates provided by
[6] RFC 5246 - "The Transport Layer Security (TLS)
a self-operated certificate authority or to choose a special
Protocol Version 1.2", IETF, 08/2008
certificate provider who offers suitable certification mate-
rial with a sufficiently long validity period. The operation [7] ISO / IEC TS 62351:2007 - Power systems man-
of one’s own certification infrastructure, however, causes agement and associated information exchange –
Data and communications security, Geneva / Swit-
considerable problems, particularly for the owners of
zerland: Bureau Central de la Commission Interna-
small-scale telecontrol systems.
tional Electrotechnical