Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

A Certain Offshore Oil and Gas Field Industrial Control System Security Project

There are potential security vulnerabilities in the industrial control system (ICS) of a certain offshore oil and gas field. Based on the characteristics of production business, a security audit strategy is established. Various security threats are blocked through the combination of attack detection rules and business whitelist mode to ensure the safe operation of the production network.

Background

The industrial control system (ICS) of a certain offshore oil and gas field is the core support for production and operation, and its network security is directly related to production continuity and stability. At present, the system is facing multiple security threats such as intrusion attacks, unauthorized access, and abnormal instructions, and there is an urgent need for a targeted protection plan. Based on the characteristics of the oil and gas field's production business, it is necessary to establish a scientific business security audit strategy, adopt a combination of attack detection and business whitelisting to identify and block risks in advance, while meeting the requirements of relevant national standards and policies and improving the capability of security incident traceability.

Activity & Announcement
Requirement Analysis
01

Establish a security audit strategy adapted to the characteristics of production business, covering core business scenarios.

02

Accurately detect attack activities and aggressive traffic, and timely block various security threats.

03

Meet the requirements of national standards and policies, and improve the traceability capability of industrial control security incidents.

Solution Architecture
Solution Architecture

According to the production characteristics of the industrial control system (ICS) in offshore oil and gas fields, a three-in-one protection architecture of "detection + whitelist + audit" is constructed. With business security audit as the core, it integrates attack detection rules and business whitelist mechanisms, deploys detection and protection nodes in advance, conducts real-time monitoring and blocking of attack activities, unauthorized access, abnormal instructions, etc. in the industrial control network, synchronously retains security incident data, and forms a closed-loop protection of "threat early warning - real-time blocking - incident traceability", which adapts to the harsh production environment and business continuity requirements of oil and gas fields.

Value to Customers
Early Warning of Industrial Intrusion Attack Events

Through comprehensive and continuous monitoring of network security in the production control system, security detection rules conforming to industrial production sites are established to detect intrusion attack behaviors in a timely manner and notify security administrators, so as to reduce economic losses caused by security incidents.

Improve The Traceability Capability of Security Incidents

Through detailed recording and packet retention of security events such as network attack behaviors and non-compliant operation behaviors, users can conveniently reconstruct and trace the entire process of security incidents occurring in the industrial network when problems are identified.

Visualize Industrial Security Threats

Through detailed recording and packet retention of security events such as network attack behaviors and non-compliant operation behaviors, users can conveniently reconstruct and trace the entire process of security incidents occurring in the industrial network when problems are identified.