Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
DLYa_PEREVODA_PS_Oktyabrskaya_en.docx
Скачиваний:
0
Добавлен:
01.07.2025
Размер:
542.78 Кб
Скачать
    1. Requirement to cyber security

Requirement should provide all possible protection of electronic access to substation automation.

The supplied system must comply with current international standards and best international practices in the field of security (IEC 62443, IEC 62351 etc.).

The system should provide the following rules and procedures on safety:

  • Access control

    • Provides access only to authorized personnel

    • Protects against unauthorized use of network resources

Mechanisms of implementation:

    • Easy registration/password

    • Access Control Lists (ACL) – determine who can access a particular object of the system and what operations are allowed or not allowed to perform on the objects of the system

  • Identification

    • Confirm the identification of the connected objects (for example, end users, network devices)

    • Provides validation of system’s objects

    • Provides assurance that the object is defined by the system

  • Confidentiality of data

    • Data protection from unauthorized access

Mechanisms of implementation:

    • Encryption (3DES, AES)

    • Access control lists

  • Secure of communications

    • The information is transmitted only between authorized users and system objects

Mechanisms of implementation:

    • VPNs (IP Security)

    • MPLS (Multiprotocol Label Switching)

  • Data integrity:

    • Constant check of the correctness or accuracy of the information

    • The data must be protected from unauthorized modification, deletion, creation and replication

Mechanisms of implementation:

    • IPSec HMACs (Hash Message Authentication Code)

    • Cyclic check of redundancy

  • Availability:

    • Provides authorized access to network elements, stored information, information flows, services and applications

    • Solutions for disaster recovery are included in this category

Mechanisms of implementation:

    • Backup and Restore

    • Continuous monitoring

    • services for SLA (quality level agreement)

  • Privacy:

    • Provides data protection, which can be obtained from the network

Mechanisms of implementation:

    • Title encryption IP (IPSec VPN)

    1. Requirements to ergonomics and industrial design

Ergonomics solution shall ensure comfort of operation of equipment and minimize time expenditures on maintenance and repairs.

General ergonomics requirements to the equipment shall be met in accordance with DSTU 7234:2011.

Personnel WS's shall meet requirements of GOST 12.2.032-78 and GOST 12.2.033-78.

    1. Requirement to patent clearance

When establishing ACS TP it is required to ensure the patent clearance.

All components of the system software/hardware suite shall comply with international standards and shall be referenced in technical documentation to this subject.

The software employed in the ACS TP SHS, shall be licensed in compliance with National and international legislation.

The Contractor shall agree with the Employer the boundary permissible levels of voltage deviation.

    1. Requirements to standardisation and unification

ACS TP shall be designed on the basis of current rules, regulations, standards and other regulatory/engineering documents.

For designing ACS TP it is required to use unified database structures, special software, methods and means of data submission, data transfer protocols etc.

In the SHS composition it is required to use hardware components manufactured in compliance with internationally accepted and local standards that would ensure design, informational and software compatibility of products by different manufacturers.

Forms of data submission shall be approximated to the design drawings of process diagrams and their elements.

Basic structures (racks, stands, wall hanging cabinets etc.) shall be made in compliance with the generally accepted standards.

Design of cabinets and functional modules shall be unified in all SHS devices.

In CPI regardless of the type of employed input and output signals it is required to use the standard (unified) interfaces.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]