Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

A Certain Metro Integrated Supervisory and Control System (ISCS) Industrial Control System (ICS) Security Project

The network of the metro integrated supervisory and control system (ISCS) suffers from issues including lack of logical isolation and insufficient protection of critical facilities, making it vulnerable to security threats such as unauthorized intrusion and computer viruses. Boundary protection measures shall be deployed to ensure business continuity and meet compliance requirements.

Background

The metro integrated supervisory and control system (ISCS) serves as the core support for ensuring metro operations. Its network architecture presents prominent security shortcomings: logical isolation between zones is not implemented, and critical facilities lack targeted protection. Such defects can readily trigger a variety of security incidents, including intrusion attacks, virus infections, unauthorized access, malicious operations and misoperations, posing a major hazard to the stable operation of the system. To sustain uninterrupted business continuity and steadily advance informatization construction, targeted security protection measures shall be deployed at the perimeter of the Control Center and the network boundaries of stations and depots, so as to defend against both internal and external security threats.

Activity & Announcement
Requirement Analysis
01

Implement logical isolation among all zones, provide targeted protection for critical facilities, and eliminate potential hazards to system operation.

02

Deploy protection devices at core network perimeters to accurately defend against all categories of internal and external security threats.

03

Ensure business availability, continuity and real-time performance, and fully comply with industry-specific compliance requirements.

Solution Architecture
Solution Architecture

In consideration of the operational characteristics of metro industrial control systems, a hierarchical protection system shall be established. Specialized industrial control security protection equipment shall be deployed at the perimeter of the Control Center and the network boundaries of stations and depots, focusing on internal risk isolation and external threat blocking. Adopting the model of "perimeter protection plus key control", the design accommodates the real-time performance requirements of industrial control environments, forming a security-controllable and business-adapted protection architecture to build a solid security barrier for the integrated supervisory and control system (ISCS).

Value to Customers
Security Zoning with Targeted Protection

In accordance with industrial operational requirements, the production network zones shall be rationally partitioned. Targeted protection shall be implemented for core production zones to prevent the lateral penetration of attacks and malware infections across different zones, thereby ensuring the secure and stable operation of core industrial control system (ICS) devices and business systems.

Comprehensive Defense to Eliminate Threats

A "whitelist + blacklist" security protection strategy shall be adopted. Starting from the demands of industrial control operational scenarios, security issues are identified from multiple dimensions to block all categories of cyber security risks. This comprehensively enhances the capability of the industrial production network to defend against intrusions and various cyber-attacks, and guarantees the stable operation of equipment.

Streamlined Security Management for Reduced Burden

Abundant management functionalities, a user-friendly interface and humanized statistical reports are provided, which greatly improve the efficiency of enterprise industrial security management, simplify industrial security governance for enterprises, and reduce the overall operation and maintenance (O&M) costs.