Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

Information security project for a hydropower plant production control system

Power plant is the key infrastructure of a country. To meet the general security planning requirements of a power company, upgrade the industrial control cyber security protection system of the secondary system for the power plant according to Regulations on Security Protection of Electric Power Monitoring System (National Development and Reform Commission [2014] No. 14), Overall Plan for Security Protection of Electric Power Monitoring System (National Energy Administration [2015] No. 36), State Grid Corporation on Accelerating Promoting Electric Power Monitoring System (State Grid Regulation [2017] No. 1084).

Background

A water conservancy project located in Hubei is the world's largest low-head, large-flow, runoff hydropower station. The power plant has comprehensive benefits such as power generation and waterway improvement. To meet the national network security construction requirements and effectively improve the network security protection capability of power plants, two phases of security system construction goals are planned. The first phase is to set up a dispatching network with network security monitoring devices as the backbone and set up the network device security information transmission system. The second phase is to build the industrial control network security protection system for secondary system of power plant, eliminate the defects that do not meet the requirements of classified protection, and improve the safety classified protection level of the production control system.

Activity & Announcement
Requirement analysis
01

In preliminary on-site investigation and communication, it was found that in some control areas of the power plant, some mobile storage devices or personal PCs were connected to the control system, which easily lead to network virus infection.

02

Install TopIHS on hosts to prohibit applications unrelated to production and operation and malicious operations, implement security management and control on hosts, and reduce the impact of malicious codes and virus Trojans on production control.

Solution architecture

Power plant is the key infrastructure of a country. To meet the general security planning requirements of a power company, upgrade the industrial control network security protection system of the secondary system for the power plant according to "Regulations on Security Protection of Electric Power Monitoring System" (National Development and Reform Commission [2014] No. 14), "Overall Plan for Security Protection of Electric Power Monitoring System" (National Energy Administration [2015] No. 36), "State Grid Corporation on Accelerating Promoting Electric Power Monitoring System (State Grid Regulation [2017] No. 1084).

In preliminary on-site investigation and communication, it was found that in some control areas of the power plant, some mobile storage devices or personal PCs were connected to the control system, which easily lead to network virus infection. Install TopIHS on hosts to prohibit applications unrelated to production and operation and malicious operations, implement security management and control on hosts, and reduce the impact of malicious codes and virus Trojans on production control.

Value to customer
Ensure the stable operation of industrial production

By using whitelist technology, effectively defense the attacks and destructive behaviors from viruses, Trojans, and malware on the operator station and engineer station in the production control area, and ensure the stable and continuous operation of production.

Improve the management and control capabilities of host peripherals

Manage and control the peripheral interfaces of industrial hosts and servers, such as USB mobile storage devices, optical drives, wireless network cards, and printers, restrict access of illegal peripherals, and block the spread of viruses.

Quickly maintain an inventory of industrial host assets

Automatically identify the basic information of industrial host software and hardware, quickly count the host assets in the industrial network, realize unified maintenance of asset attributes, and reduce management costs.