全球标准分享下载-全场2元
客服微信:1093451816,欢迎大家分享、下载!

高级计量标准蓝图报告

澳大利亚标准协会发布高级计量标准蓝图报告。

从2016年3月至6月,蓝图的制定耗时整整四个月,期间召开了一系列研讨会以及整个业界范围内的磋商。这使利益相关方意识到,他们应满足澳大利亚高级计量器械设施需达到的既定标准。

2016年6月,澳大利亚各利益相关方齐聚一堂,举行高级计量标准蓝图的最后一场论坛会。蓝图(包括含23项澳大利亚标准化制定在内的工作计划)会议当天即向与会人员公布。

该报告介绍了高级计量标准,详述了制定蓝图的过程。

“高级计量标准蓝图”的问世为利益相关方与澳大利亚标准协会的合作奠定了基础,二者共同为当时的澳大利亚标准协会的高级计量项目规划发展方案。

提议形式和标准制定活动是蓝图的首要任务,将在工作计划和优先工程中列出。但随后澳大利亚标准协会发现,蓝图只是导向,利益相关方最后也可不完全按照蓝图的计划来推进澳大利亚高级计量标准的发展。

澳大利亚标准协会对合作伙伴(Vector,兰吉尔仪表系统,EDMI有限公司,ENA和起源能源公司)向高级计量标准蓝图的发展所提供的帮助表示衷心的感谢。

同时澳大利亚标准协会也感谢来自产业、政府以及消费群体的所有利益相关方,感谢他们热心参与蓝图的制定并为其做出突出贡献。

 

Roadmap for Advanced Metering Standards – Report

Standards Australia is pleased to announce the publication of the Roadmap for Advanced Metering Standards – Report.

The development of the Roadmap over a four month period between March and June 2016 involved a series of forums and industry-wide consultations which allowed for stakeholders to consider the standards that would be necessary to support Australia’s advanced metering equipment infrastructure.

In June 2016 Australian stakeholders came together for the final forum in the Roadmap for Advanced Metering Standards. The Roadmap (including a Work Program involving the development of 23 Australian Standards) was released to stakeholders on the day.

This report provides a background on advanced metering standards and explains the process of developing the Roadmap.

The publication of this Roadmap for Advanced Metering Standards paves the way for stakeholders to work with Standards Australia to prepare and submit proposals for the development of contemporary Australian Standards for advanced metering.

The proposal forms and standards development activities will be informed by the work program and priority projects as set out in the Roadmap. However, Standards Australia recognises that this Roadmap only serves as a guide and that stakeholders may ultimately not seek to develop Australian Standards for advanced metering exactly in accordance with the Roadmap.

Standards Australia is grateful for the support provided by co-resourcing partners (Vector, Landis+Gyr, EDMI, ENA and Origin) to undertake the development of the Roadmap for Advanced Metering Standards.

Standards Australia also gratefully acknowledges the contributions and participation of stakeholders from industry, government and consumer groups in the development of the Roadmap.

 

 

企业标准公司英国标准协会已修订《BS 8555环境管理体系–分期实施–指南》

BSI作为商业标准公司已对BS 8555环境管理体系-分阶段实施-指南进行了修订。该项标准最初于2003年发布,就如何实施环境管理系统(环境管理体系)、如何使用分阶段法实施ISO 14001系列标准等问题向所有组织提供指导。现在BS 8555正处于公众评议期直至2016年9月截止。

BS 8555能够提供什么?

  • 逐步建立环境管理体系

组织可以通过一系列阶段开展工作,并可选择在任一阶段停止或完成工作为ISO 14001做准备

  • 为实施过程中的整合及环境绩效评估技术的利用提供建议;恰当协调环境管理体系与其他管理体系之间的关系
  • 已完成更新,以确保继续帮助组织改进业务流程,节省资金,并应对未来的环境挑战

经证实,环境管理体系标准能够帮助组织在业务不断发展的同时,降低环境对增长的影响,减少浪费并节约能源。该标准还能提高企业的创新能力,改进管理系统流程,满足相关监管要求,提高在投资者、客户和公众眼中的企业声誉。BS 8555可以帮助组织与环境领域的变化保持同步,确保其始终处于领先地位。

BS 8555帮助的对象是谁?

  • BS 8555为各种规模和领域的组织服务,只要该组织有意于环境管理系统开展工作
  • 对中小企业十分有益,中小企业需要工作框架,但也需要能够在5个阶段的任一阶段选择停止。该标准有助于中小企业达到监管要求,并向利益相关者证明其在考虑对环境影响的同时,能够管理资源,适应环境变化
  • 对大型多站点企业亦有益处,因为其提供了一个框架和步骤明确的方法,所有网站能够依此进行工作以实现ISO 14001

做了哪些修改?

  • 在控制风险方面具备稳健的方法,第2、3阶段符合法律要求
  • 各阶段已完成更新以反映BS EN ISO 14001:2015的变化,如理解组织的背景,更加注重领导力,改善环境绩效以及重新聚焦风险和机会
  • 第6阶段和相关指导已被删除,以简化标准,便于使用

David Fatscher是BSI可持续性和服务市场发展的主管,他指出:“一个成功的环境管理体系能够确保组织保持商业上的成功,且不会放弃履行其环境责任。然而,这样的项目有时似乎是艰巨的,管理可能无法投入所需的资源。无论业务本质是什么、地点在哪、或成熟度水平如何,所有组织都可以通过逐步实施BS 8555提高其环境绩效。”

BS 8555是采用合作和协商一致的方法制定的,获得来自建筑工业研究与情报协会(CIRIA)、国际环境业管理审核(IEMA)、英国皇家认可委员会(UKAS)、英国环境局(UK Environment Agency)等专家以及环境顾问的投入,其中一些人参与了近期ISO 14001的主要修订。

 

BSI, business standards company has revised BS 8555 Environmental management systems – Phased implementation – Guide. The standard was originally published in 2003, and provides guidance for all organizations on how to implement an environmental management system (EMS) or work towards ISO 14001 using a phased approach. BS 8555 is now at public comment stage until September 2016.

What does BS 8555 offer?
•A step by step approach to setting up an environmental management system• A series of stages that an organization can work through with the option to stop at any point or work through to become ISO 14001 ready
•Advice on the integration and use of environmental performance evaluation (EPE) techniques during the implementation process; and the coordination of such an EMS with other management systems, where appropriate
•It has been updated to ensure that it continues to help organizations improve business processes, save money and deal with future environmental challenges

EMS standards have been shown to help organizations develop their business whilst reducing the environmental impact of growth, decrease waste and save energy. They can help businesses become more innovative, improve management system process, meet regulatory requirements and enhance corporate reputation among investors, customers and the public. BS 8555 can help organizations stay abreast of the changes in the environmental arena, ensuring they remain ahead of the curve.

Who can BS 8555 help?
•BS 8555 is for all sizes and sectors of organization who want to start to work on their environmental management system
•It can be useful to small and medium sized enterprises (SMEs) who need a framework to work to, but who can choose to stop at any of the 5 stages. The standard helps SMEs to achieve regulatory requirements and demonstrate to stakeholders that they are giving consideration to environmental impacts whilst helping them to manage resources and changes in circumstances
•It is useful to large, multi-site companies because it provides a framework and step-wise approach that all sites can work to in order to implement ISO 14001

What has changed?
•A robust approach in terms of managing risk and compliance with legislation during phases 2 and 3
•Phases and stages have been updated to reflect changes in BS EN ISO 14001:2015, such as understanding the context of the organization, an increased focus on leadership, improvement in environmental performance and a new focus on risk and opportunity
•Phase 6 and the associated guidance has been removed in order to simplify the standard and make it easier for people to use

David Fatscher, Head of Market Development for Sustainability & Services at BSI, said: “A successful EMS helps organizations remain commercially successful without compromising their environmental responsibilities. However, such projects can sometimes seem daunting and management may be unable to commit the required resources. By phasing implementation with BS 8555, all organizations, regardless of the nature of the business activity undertaken, location, or level of maturity, can improve their environmental performance.”

BS 8555 was developed using a collaborative consensus-based approach with input from such experts as CIRIA, IEMA, UKAS, the UK Environment Agency, as well as environmental consultants, some of whom took part in the recent major revision of ISO 14001. Comment on the standard here.

 

城市可持续发展标准已发布

BSI(商业标准公司)发布了《BS ISO 37101:2016,城市可持续发展—可持续发展的管理体系—要求及使用指南》。

这个世界日新月异,对很多城市领导者来说,工作的重中之重是确保城市和社区适合于未来。对此,他们需要考虑的问题有:提供可持续能源供应、解决环境和气候变化等问题、建设且维护耐用持久的基础设施以及满足市民的需求与期待。BS ISO 3701的制定是为了帮助城市领导者设立其城市的可持续发展计划。

英国已经以BS 8904:2011社区可持续发展指南的形式制定了类似的指南。此项标准适用于当地的基层组织,为BS ISO 37101的制定做出贡献。

国际标准提出的要求和指南旨在借助包括智慧和恢复力在内的各种方法和工具实现可持续发展。它能够帮助城市在以下许多领域有所提升:

  • 形成全局综合的方法而不是单干(单干会阻碍可持续发展)
  • 促进社会和环境变化
  • 改善卫生和福利
  • 鼓励可靠的资源利用以及实现更优的管理

BSI可持续性与服务市场开发部负责人David Fatsche表示:“随着社会发展以及社区内人口密度增大,我们需要在这些城市的可持续发展上思考更多。一个城市面临的并不仅仅是人口规模的问题,也有经济、社会和环境的问题。之前的指南使得个人有能力从本地控制社区,通过改善社会经济机会来保护当地环境。不过,这一国际标准的视野更广阔。城市领导者能够在任何影响社区的决定中处于最前沿,并得到所需的指南来实现改变,以通过多种形式惠及环境。”

BS ISO 37101最初是由法国国家标准机构(AFNOR)提出,反映了建设和服务行业的利益。按照通常合作的国际标准化做法,每个国家向其国家代表提交自己的意见,代表将意见交由国家化标准组织委员会审议。全球城市指标设施和联合国环境计划署建立了外展与联络服务,包括国际标准化组织关于城市指标和智能基础设施的协调工作。

其他参与BS ISO 37101标准制定的国家有:奥地利、加拿大、中国、丹麦、法国、德国、日本、墨西哥、荷兰、俄罗斯、瑞典、斯里兰卡和美国。

BS ISO 37101能够帮助城市最高领导人、可持续发展官员、智能城市管理者、法规管理者、政策顾问、非政府组织工作人员及顾问为城市的长期可持续发展议程做出规划。

 

Sustainable development of communities standard is published

BSI, the business standards company has published BS ISO 37101:2016, Sustainable development in communities — Management system for sustainable development — Requirements with guidance for use.

In a fast-changing world, ensuring cities and communities are fit for the future is a key priority for many city leaders. Providing sustainable energy supplies, coping with environmental and climate changes, building and maintaining durable infrastructures and meeting the needs and expectations of citizens are just some of the considerations to be made. BS ISO 3701 has been developed to help city leaders set their city's sustainable development agenda.

The UK has already developed similar guidance in the shape of BS 8904:2011 Guidance for community sustainable development which is suited to local grass roots organizations, with this standard contributing towards the development of BS ISO 37101.

The international standard sets out requirements and guidance to attain sustainability with the support of methods and tools including smartness and resilience. It can help communities improve in a number of areas such as:
•Developing holistic and integrated approaches instead of working in silos (which can hinder sustainability)
•Fostering social and environmental changes
•Improving health and wellbeing
•Encouraging responsible resource use and achieving better governance

David Fatscher Head of Market Development for Sustainability and Services at BSI said: “As societies grow and populations within a community increase in density, more thought has to be put into the sustainable development of those communities. This is not just about population size but also the economic, social and environmental issues that a community faces. Whilst previous guidance has enabled individuals to take control of their communities locally, from improving social and economic opportunities to protecting the local environment, this international standard takes a broader view. City leaders can be at the forefront of any decisions that impact their communities and now have the guidance they need to implement changes to benefit their environment in multiple ways.”

BS ISO 37101 was first proposed by the French National Standards Body, Afnor to reflect the interests of the construction and services industries. In accordance with the normal collaborative ISO practices, each country submitted their comments to their country representative for consideration by the ISO committee. Outreach and liaison was established with the Global City Indicators Facility and the United Nations Environment Programme. This included harmonizing work being done in ISO on city indicators and smart infrastructure.

Some of the other countries involved in the development of BS ISO 37101 include: Austria, Canada, China, Denmark, France, Germany, Japan, Mexico, Netherlands, Russia, Sweden, Sri Lanka and USA.

BS ISO 37101 will be able to help city CEOs, sustainability officers, smart city managers and compliance managers, policy advisors, NGOs and consultants plan their city’s long term sustainability agenda.

 

 

预防潜在影响网络安全的噩梦

现在,网络空间安全对于工业生产设备的安全运行来说非常关键,但这些设备中许多装置的用户账户并没有得到妥善管理。中央用户账户管理结合基于角色的访问控制是集中有效地管理用户账户和权限的最佳途径,同时也是最先进的安全解决方案,这就消除了成百上千设备上有非托管用户账户的噩梦。

中央点操作员管理站,使用SDM600系统数据管理器控制台(照片来自于阿西亚布朗勃法瑞公司(ABB))

很多用户账户没有妥善管理

多数情况下,工厂默认工业设施设备中的用户帐户和密码是无人管理的,不会改变。共享和/或弱密码也是一个问题。

从网络空间安全的角度来看,当今世界互联互通,无论是工厂默认账户还是共享账户都存在巨大的风险,所以,二者都是不可接受的。除了考虑到网络安全问题,工厂默认账户和共享账户都会给系统控制人员带来控制系统管理方面的困扰。

修改配置会引发电力故障,但人们却无法确认是哪位员工更改了配置,因为无论是共享账户还是出厂设置账户都能进入系统进行操作。

另一种可能的情况和离开公司的员工有关。因为该员工知道公司的共享密码,这就需要公司重置大量设备和电脑的共享密码,来确保离职的员工无法登入公司系统。最后,同样重要的是,把新密码告诉在职的员工,这样,他们才能继续做自己的工作。

对于安全管理者和系统操作员来说,遗留流程、工具和技术会让他们很难改变系统来适应和抵御新的安全威胁。安全管理者需要通过标准化技术和现代工具提升安全水平。中央用户账户管理结合基于角色的访问控制(RBAC)是集中有效地管理用户帐户和用户权限的最佳途径,同时,它还是最先进的安全解决方案。它还消除了数以百计设备上有非托管用户帐户的噩梦。

技术变革可带来经营效益同时并存网络安全风险

变电站自动化、保护和控制系统在过去的十年里发生了重大变化。系统之间联系更加紧密,为终端用户提供更多信息,这就使依赖性增强,控制水平和生产效率提高。不同厂商产品和不同系统之间的互操作性已经通过利用符合公开标准,如从IEC 61850通信网络和电力系统自动化系列标准,或IEC 60870-5-104遥控设备和系统——第5-104部分 传输协议——IEC 60870-5-101使用标准的传输轮廓和利用现有的以太网技术访问网络。

从操作角度来讲,技术变革给操作带来巨大便利,但也容易给公用事业网络安全造成威胁,这也是传统企业系统多年来一直受到的困扰。网络安全是现代网络的基本要素,但网络设备上分散的访问策略会暴露关键漏洞。

粗心会导致系统易被侵入

自动化网络的异构性质会使任务变得复杂,比如撤销人员凭证或更改默认密码。出厂默认账户从制造商到消费者经常是保持不变的,它甚至可能在设备的整个生命周期都保持不变。这样,不变更出厂默认账户就为攻击者快速访问设备提供了方便,而且他们不需要有任何特殊的技能或知识。

此外,大多数控制和网络设备提供日志功能来记录用户做了什么,但如果所有操作执行都在出厂默认账户的保护下进行,登录信息和审计轨迹便分不清谁做了什么。

准备可能的解决方案

系统控制者和管理者欢迎针对下列问题给予合理答案,以确保系统的安全:

.你想容易地管理用户帐户吗?

.你想从中央点管理公司新员工的访问和权限吗?

.当员工离职后,你想快速从中央位置删除或撤销其用户凭证吗?

.你想把对中央位置的改变立即有效地对公司来自不同供应商的所有产品起作用吗?

.你想消除对于默认用户帐户在非托管的本地设备上活跃的担忧吗?

行业反击战

按照北美电力可靠性协会——关键基础设施保护(NERC CIP)标准的要求,以及许多其他网络安全需求,工业正在走一条共同的未来之路:IEC TS 62351 – 8:电力系统管理和相关信息交换——数据和通信安全——第8部分:基于角色的访问控制。本技术规范规定了供应商应该如何为客户群实施和提供基于角色的访问控制和中央用户帐号管理。

自IEC TS 62351 – 82001年发布以来,用户已经能够用一个特定的用户名和密码在公司所有设备所有网络验证自己身份。此外,添加或删除用户可以集中完成,一键解决。

这种技术不仅能够集中管理用户名和密码,而且可以集中管理用户权限,根据用户在公司的职责将角色分配给他们。(RBAC基于角色的访问控制)

解决噩梦的可能途径

控制系统需要进行管理,以确保基础设施的可持续性。管理系统意味着不断地更新设备。

网络安全策略的管理可能会变得复杂,因此,为了提高效率,安全管理者需要应用软件的支持。基于角色的访问控制系统就是这样一款应用软件。它允许负责人从中央点长期管理用户和他们的角色——甚至从不同位置的多个控制系统。

不是每个人都需要成为系统管理员。网络安全管理最普通的方法是尽可能少地授予每个用户特权。以IEC TS 62351 – 8为基础的基于角色的访问控制系统,能够让公司的安全负责人为整个系统管理用户,并将角色从同一个地方分配给那些用户。

IEC 62351是技术安全的系列国际标准,其目的是确保电力系统专用通信协议如IEC 61850和IEC 60870-5-104的可行性。虽然该系列标准中的大部分已经出台,在符合IEC 62351标准的系统投放市场前仍需做更多的工作。IEC 62351 – 8是于2011年完成并出版,为电力系统定义了基于角色的访问控制。这不是一个新概念,它实际上是许多信息技术系统里最佳实践的一部分。电力系统的基于角色的访问控制,可以减少必须分配给特定用户权限的人数,这些用户只有他们需要履行职责的权限。这就降低了电力系统的风险,因为根据最少特权的原则,只有实际需要时才会分配权限。这套标准还定义了一组预定义的角色(如,浏览器,操作者等)和预定义的权利。

尽可能遵守国际标准

要确保多样的设备网络安全功能的可靠性和高品质,最基本的是尽可能地遵守国际标准。高水平的网络安全仅来自于那些经得起考验的、已经被证实的、标准化的技术和方法,特别是当安装设备来自不同的供应商时。那些不走这条聪明路的公用事业会发现自己沉溺于单一的供货商,听从他们专有解决方案的摆布。

想要优化网络安全,必须要完全了解这个系统。和安全相关的事件,如需要监测不同系统组件的访问和不同系统组件其他用户的活动,来识别潜在的攻击和优化保护。中央用户活动日志从系统设备收集网络安全相关事件,并向负责人员提供信息。一个有效的、用户友好的方式,如自动识别事件模式,就是这种监测程序的重要特征。

基于国际标准(如IEC TS 62351 – 8)的最先进的网络安全产品,使得多厂家的控制系统的基于角色的访问控制的用户账户管理很有效率。这些产品为公用事业提供实时可见的与系统安全相关的用户活动。

专有网络安全的实现应该避免多厂家控制系统的无缝集成。根据IEC TS 62351 – 8,采用互操作的解决方案,会使操作任务更加容易。

 

Preventing a potential cybersecurity nightmare

Unmanaged user accounts in industrial environments present significant cybersecurity risks

Cybersecurity is now central to the safe operation of industrial installations, but user accounts for many devices used in these installations are not properly managed. Central user account management combined with Role Based Access Control is the perfect solution for managing user accounts and permissions efficiently and centrally while still providing a state of the art security solution. This eliminates the nightmare of having unmanaged user accounts on hundreds of devices.

Too many user accounts are not properly managed

In many cases the factory default user accounts and passwords used in devices in industrial installations are unmanaged and remain unchanged. Shared and / or weak passwords are also an issue.

From a cybersecurity perspective, in today’s interconnected world, both factory default accounts and shared accounts represent a huge cybersecurity risk and are unacceptable. Besides cybersecurity concerns, both factory default and shared accounts can make control system management a nightmare for control system owners.

Consider the case in which a power outage occurs as a result of a changed configuration, but it cannot be established which employee actually changed the configuration because a shared account or a factory default account was used to access the system and make the change.

Another possible scenario is connected with a single employee leaving an organization. Since this member of staff knows a password that is shared by several other employees, a huge effort is required to change this shared password in a number of devices and locations, to ensure that the departing employee can no longer access the system. Last but not least, the remaining employees must also be informed of the new password, so that they can continue to carry out their work.

Legacy processes, tools and technologies can make it hard for security managers and system operators to change systems so as to adapt to and defend against new security threats. Security managers need proven standardized technologies and modern tools to move to the next level. Central user account management combined with Role Based Access Control (RBAC) is the perfect solution for managing user accounts and user permissions centrally and efficiently, while still providing a state of the art security solution. It also eliminates the nightmare of having unmanaged user accounts on hundreds of devices.

Technological change has brought both operational benefits and cybersecurity risks

Substation automation, protection and control systems have changed significantly in the past decade. Systems have become more interconnected and provide end users with much more information, resulting in higher reliability, increased levels of control and higher productivity. Interoperability between different vendor products and systems has been achieved by deploying products and solutions based on open standards such as publications from the IEC 61850 series, Communication networks and systems for power utility automation, or IEC 60870-5-104, Telecontrol equipment and systems – Part 5-104: Transmission protocols – Network access for IEC 60870-5-101 using standard transport profiles, and by leveraging proven Ethernet technology.

This change in technology has brought huge benefits from an operational point of view, but it has also exposed utilities to the kind of cybersecurity threats that have been confronting traditional enterprise systems for years. Cybersecurity is an essential component of modern networks, but fragmented access policies across network devices risk exposing critical vulnerabilities.

Careless practices make system access easy

The heterogeneous nature of automation networks has complicated tasks such as revoking staff credentials, or changing default passwords. Factory default accounts often remain unchanged after handover from manufacturer to customer, and may even remain unchanged on devices for their entire lifetime. Such practices and unchanged factory default accounts make it easy for an attacker to access devices rapidly and without needing to possess any special skills or knowledge.

Furthermore, most control and network devices provide logging capabilities to record what users have done, but if all actions are performed under the umbrella of a factory default account, then the logged information and audit trail say nothing about who has really performed which actions.

Setting the stage for a possible solution

Control system owners and managers would probably welcome positive answers to the following questions to ensure the security of their systems:

  • Would you like to manage user accounts easily?
  • Would you to like to administer new employees’ access and permissions in your company from a central point?
  • Would you like to be able to remove or disable user credentials quickly from a single central location when an employee leaves your company?
  • Would you like the changes you made in the central location to be immediately effective on all products from different vendors throughout your organization?
  • Would you like to eliminate worry about default user accounts remaining active on unmanaged local devices?

The industry strikes back

Following demands from the North American Electric Reliability Corporation – Critical Infrastructure Protection (NERC-CIP) Standards, and many other cybersecurity requirements, the industry is adopting a common path to the future: IEC TS 62351-8: Power systems management and associated information exchange – Data and communications security – Part 8: Role-based access control. This Technical Specification sets out how vendors should implement and provide RBAC and central user account management to their customer base.

Since the arrival of IEC TS 62351-8 in 2011, users have been able to authenticate themselves across their organization to all devices in all networks, with a user-specific and unique user-id and password. Moreover, the addition or removal of users is done centrally, in a single step.

This technology offers not only the central management of user-ids and passwords, but also the management of user permissions by assigning roles to users, depending on their job roles in the organization (RBAC).

Possible solution for a nightmare scenario

Control systems need to be managed to ensure sustainable infrastructures. Managing a system means continually keeping its devices up-to-date.

The management of a cybersecurity policy can become complex; therefore to be efficient, security managers need support from software applications. A Role Based Access Control system is such an application. RBAC allows responsible persons to be able to manage users and their roles consistently from a central point – even for multiple control systems in different locations.

Not everybody needs to be a system administrator. A common sense approach in cybersecurity management is to grant the fewest possible privileges to every user. A RBAC system based on IEC TS 62351-8 enables the person responsible for security in a company to manage users for the entire system and assign roles to those users from one place.

IEC 62351 is a series of technical security International Standards that aims to secure power system-specific communication protocols such as IEC 61850 or IEC 60870-5-104. While most parts of the series have been released, more work is needed before systems compliant to IEC 62351 can be put on the market. IEC 62351-8, finalized and published in 2011, defines RBAC for power systems. This is not a new concept; it is in fact part of best practice in many IT systems. The use of RBAC in power systems makes it possible to reduce the number of permissions that have to be assigned to certain users so that these users have only the permissions they need to perform their duties. This reduces the risk to the power system, as permissions are only assigned when they are actually needed, according to the principle of fewest privileges. The standard also defines a list of pre-defined roles (e.g., Viewer, Operator, etc.) and of pre-defined rights.

Adhering to International Standards as closely as possible

To ensure high quality and dependable cybersecurity functionality in heterogeneous installations, it is fundamental to adhere to International Standards as far as possible. A high level of cybersecurity can only be achieved by deploying and using reviewed, approved and standardized technologies and methods, especially when installing devices from different vendors. Utilities not following such a wise path can find themselves locked in to a single supplier offering proprietary solutions.

Cybersecurity cannot be optimized without knowing everything that is going on in the system. Security related events, like access and other user activities in different system components, need to be monitored to identify potential attacks and to optimize protection. Central user activity logs collect cybersecurity related events from the system devices and make the information available to responsible personnel. An efficient and user-friendly approach, such as automatic recognition of event patterns, is a key feature of such monitoring applications.

State of the art cybersecurity products based on International Standards such as IEC TS 62351-8 enable efficient RBAC management of user accounts in multi-vendor control systems. They provide utilities with real-time visibility of the security-relevant user activity within their systems.

Proprietary cybersecurity implementations should be avoided for seamless integration of multi-vendor control systems. The adoption of interoperable solutions that accord to IEC TS 62351-8 makes performing these tasks much easier.

About the authors

Frank Hohlbaum – Security Manager Grid Automation,ABB Switzerland Ltd.

Frank is globally responsible for all aspects of cybersecurity within ABB’s Power System Substations and drives the security activities in this business unit. He is an active member of the Power System Security Council and represents the business unit Power System Substations. Frank Hohlbaum joined ABB in 1996 and has 20 years’ experience in substation automation. Frank is a Member of IEC Technical Committee (TC) 57/Working Group (WG) 3: Telecontrol protocols.

Bart de Wijs – Head of Cybersecurity for ABB's Power Grids Division.

Bart represents this division in the ABB Group Cybersecurity Council, which is a cross-disciplinary team staffed with resources from various corporate functions. Additionally, he is a member of the ABB Cybersecurity Response Team, handling vulnerabilities and incidents. Within the division he leads a team of cybersecurity specialists dealing with the different aspects of all the security-related concerns that could affect ABB customers. He is a member of various cybersecurity expert groups. Between 2007 and 2010 Bart was responsible for cybersecurity in ABB’s Power Generation business unit.

Fernando Alvarez – Cybersecurity Technical Product Manager,ABB Switzerland Ltd.

Fernando is responsible for supporting the development of different cybersecurity technologies in ABB products and for managing and tracking ABB’s cybersecurity intellectual property. He is also an active member of IEC TC57/WG15: Data and communication security, the IEC group working on the IEC 62351 series of International Standards for power systems management and associated information exchange. Previously Fernando worked on securing the internal IT infrastructure of banks and on securing military communications.

 

 

预防潜在影响网络安全的噩梦

现在,网络空间安全对于工业生产设备的安全运行来说非常关键,但这些设备中许多装置的用户账户并没有得到妥善管理。中央用户账户管理结合基于角色的访问控制是集中有效地管理用户账户和权限的最佳途径,同时也是最先进的安全解决方案,这就消除了成百上千设备上有非托管用户账户的噩梦。

中央点操作员管理站,使用SDM600系统数据管理器控制台(照片来自于阿西亚布朗勃法瑞公司(ABB))

很多用户账户没有妥善管理

多数情况下,工厂默认工业设施设备中的用户帐户和密码是无人管理的,不会改变。共享和/或弱密码也是一个问题。

从网络空间安全的角度来看,当今世界互联互通,无论是工厂默认账户还是共享账户都存在巨大的风险,所以,二者都是不可接受的。除了考虑到网络安全问题,工厂默认账户和共享账户都会给系统控制人员带来控制系统管理方面的困扰。

修改配置会引发电力故障,但人们却无法确认是哪位员工更改了配置,因为无论是共享账户还是出厂设置账户都能进入系统进行操作。

另一种可能的情况和离开公司的员工有关。因为该员工知道公司的共享密码,这就需要公司重置大量设备和电脑的共享密码,来确保离职的员工无法登入公司系统。最后,同样重要的是,把新密码告诉在职的员工,这样,他们才能继续做自己的工作。

对于安全管理者和系统操作员来说,遗留流程、工具和技术会让他们很难改变系统来适应和抵御新的安全威胁。安全管理者需要通过标准化技术和现代工具提升安全水平。中央用户账户管理结合基于角色的访问控制(RBAC)是集中有效地管理用户帐户和用户权限的最佳途径,同时,它还是最先进的安全解决方案。它还消除了数以百计设备上有非托管用户帐户的噩梦。

技术变革可带来经营效益同时并存网络安全风险

变电站自动化、保护和控制系统在过去的十年里发生了重大变化。系统之间联系更加紧密,为终端用户提供更多信息,这就使依赖性增强,控制水平和生产效率提高。不同厂商产品和不同系统之间的互操作性已经通过利用符合公开标准,如从IEC 61850通信网络和电力系统自动化系列标准,或IEC 60870-5-104遥控设备和系统——第5-104部分 传输协议——IEC 60870-5-101使用标准的传输轮廓和利用现有的以太网技术访问网络。

从操作角度来讲,技术变革给操作带来巨大便利,但也容易给公用事业网络安全造成威胁,这也是传统企业系统多年来一直受到的困扰。网络安全是现代网络的基本要素,但网络设备上分散的访问策略会暴露关键漏洞。

粗心会导致系统易被侵入

自动化网络的异构性质会使任务变得复杂,比如撤销人员凭证或更改默认密码。出厂默认账户从制造商到消费者经常是保持不变的,它甚至可能在设备的整个生命周期都保持不变。这样,不变更出厂默认账户就为攻击者快速访问设备提供了方便,而且他们不需要有任何特殊的技能或知识。

此外,大多数控制和网络设备提供日志功能来记录用户做了什么,但如果所有操作执行都在出厂默认账户的保护下进行,登录信息和审计轨迹便分不清谁做了什么。

准备可能的解决方案

系统控制者和管理者欢迎针对下列问题给予合理答案,以确保系统的安全:

.你想容易地管理用户帐户吗?

.你想从中央点管理公司新员工的访问和权限吗?

.当员工离职后,你想快速从中央位置删除或撤销其用户凭证吗?

.你想把对中央位置的改变立即有效地对公司来自不同供应商的所有产品起作用吗?

.你想消除对于默认用户帐户在非托管的本地设备上活跃的担忧吗?

行业反击战

按照北美电力可靠性协会——关键基础设施保护(NERC CIP)标准的要求,以及许多其他网络安全需求,工业正在走一条共同的未来之路:IEC TS 62351 – 8:电力系统管理和相关信息交换——数据和通信安全——第8部分:基于角色的访问控制。本技术规范规定了供应商应该如何为客户群实施和提供基于角色的访问控制和中央用户帐号管理。

自IEC TS 62351 – 82001年发布以来,用户已经能够用一个特定的用户名和密码在公司所有设备所有网络验证自己身份。此外,添加或删除用户可以集中完成,一键解决。

这种技术不仅能够集中管理用户名和密码,而且可以集中管理用户权限,根据用户在公司的职责将角色分配给他们。(RBAC基于角色的访问控制)

解决噩梦的可能途径

控制系统需要进行管理,以确保基础设施的可持续性。管理系统意味着不断地更新设备。

网络安全策略的管理可能会变得复杂,因此,为了提高效率,安全管理者需要应用软件的支持。基于角色的访问控制系统就是这样一款应用软件。它允许负责人从中央点长期管理用户和他们的角色——甚至从不同位置的多个控制系统。

不是每个人都需要成为系统管理员。网络安全管理最普通的方法是尽可能少地授予每个用户特权。以IEC TS 62351 – 8为基础的基于角色的访问控制系统,能够让公司的安全负责人为整个系统管理用户,并将角色从同一个地方分配给那些用户。

IEC 62351是技术安全的系列国际标准,其目的是确保电力系统专用通信协议如IEC 61850和IEC 60870-5-104的可行性。虽然该系列标准中的大部分已经出台,在符合IEC 62351标准的系统投放市场前仍需做更多的工作。IEC 62351 – 8是于2011年完成并出版,为电力系统定义了基于角色的访问控制。这不是一个新概念,它实际上是许多信息技术系统里最佳实践的一部分。电力系统的基于角色的访问控制,可以减少必须分配给特定用户权限的人数,这些用户只有他们需要履行职责的权限。这就降低了电力系统的风险,因为根据最少特权的原则,只有实际需要时才会分配权限。这套标准还定义了一组预定义的角色(如,浏览器,操作者等)和预定义的权利。

尽可能遵守国际标准

要确保多样的设备网络安全功能的可靠性和高品质,最基本的是尽可能地遵守国际标准。高水平的网络安全仅来自于那些经得起考验的、已经被证实的、标准化的技术和方法,特别是当安装设备来自不同的供应商时。那些不走这条聪明路的公用事业会发现自己沉溺于单一的供货商,听从他们专有解决方案的摆布。

想要优化网络安全,必须要完全了解这个系统。和安全相关的事件,如需要监测不同系统组件的访问和不同系统组件其他用户的活动,来识别潜在的攻击和优化保护。中央用户活动日志从系统设备收集网络安全相关事件,并向负责人员提供信息。一个有效的、用户友好的方式,如自动识别事件模式,就是这种监测程序的重要特征。

基于国际标准(如IEC TS 62351 – 8)的最先进的网络安全产品,使得多厂家的控制系统的基于角色的访问控制的用户账户管理很有效率。这些产品为公用事业提供实时可见的与系统安全相关的用户活动。

专有网络安全的实现应该避免多厂家控制系统的无缝集成。根据IEC TS 62351 – 8,采用互操作的解决方案,会使操作任务更加容易。

 

Preventing a potential cybersecurity nightmare

Unmanaged user accounts in industrial environments present significant cybersecurity risks

Cybersecurity is now central to the safe operation of industrial installations, but user accounts for many devices used in these installations are not properly managed. Central user account management combined with Role Based Access Control is the perfect solution for managing user accounts and permissions efficiently and centrally while still providing a state of the art security solution. This eliminates the nightmare of having unmanaged user accounts on hundreds of devices.

Too many user accounts are not properly managed

In many cases the factory default user accounts and passwords used in devices in industrial installations are unmanaged and remain unchanged. Shared and / or weak passwords are also an issue.

From a cybersecurity perspective, in today’s interconnected world, both factory default accounts and shared accounts represent a huge cybersecurity risk and are unacceptable. Besides cybersecurity concerns, both factory default and shared accounts can make control system management a nightmare for control system owners.

Consider the case in which a power outage occurs as a result of a changed configuration, but it cannot be established which employee actually changed the configuration because a shared account or a factory default account was used to access the system and make the change.

Another possible scenario is connected with a single employee leaving an organization. Since this member of staff knows a password that is shared by several other employees, a huge effort is required to change this shared password in a number of devices and locations, to ensure that the departing employee can no longer access the system. Last but not least, the remaining employees must also be informed of the new password, so that they can continue to carry out their work.

Legacy processes, tools and technologies can make it hard for security managers and system operators to change systems so as to adapt to and defend against new security threats. Security managers need proven standardized technologies and modern tools to move to the next level. Central user account management combined with Role Based Access Control (RBAC) is the perfect solution for managing user accounts and user permissions centrally and efficiently, while still providing a state of the art security solution. It also eliminates the nightmare of having unmanaged user accounts on hundreds of devices.

Technological change has brought both operational benefits and cybersecurity risks

Substation automation, protection and control systems have changed significantly in the past decade. Systems have become more interconnected and provide end users with much more information, resulting in higher reliability, increased levels of control and higher productivity. Interoperability between different vendor products and systems has been achieved by deploying products and solutions based on open standards such as publications from the IEC 61850 series, Communication networks and systems for power utility automation, or IEC 60870-5-104, Telecontrol equipment and systems – Part 5-104: Transmission protocols – Network access for IEC 60870-5-101 using standard transport profiles, and by leveraging proven Ethernet technology.

This change in technology has brought huge benefits from an operational point of view, but it has also exposed utilities to the kind of cybersecurity threats that have been confronting traditional enterprise systems for years. Cybersecurity is an essential component of modern networks, but fragmented access policies across network devices risk exposing critical vulnerabilities.

Careless practices make system access easy

The heterogeneous nature of automation networks has complicated tasks such as revoking staff credentials, or changing default passwords. Factory default accounts often remain unchanged after handover from manufacturer to customer, and may even remain unchanged on devices for their entire lifetime. Such practices and unchanged factory default accounts make it easy for an attacker to access devices rapidly and without needing to possess any special skills or knowledge.

Furthermore, most control and network devices provide logging capabilities to record what users have done, but if all actions are performed under the umbrella of a factory default account, then the logged information and audit trail say nothing about who has really performed which actions.

Setting the stage for a possible solution

Control system owners and managers would probably welcome positive answers to the following questions to ensure the security of their systems:

  • Would you like to manage user accounts easily?
  • Would you to like to administer new employees’ access and permissions in your company from a central point?
  • Would you like to be able to remove or disable user credentials quickly from a single central location when an employee leaves your company?
  • Would you like the changes you made in the central location to be immediately effective on all products from different vendors throughout your organization?
  • Would you like to eliminate worry about default user accounts remaining active on unmanaged local devices?

The industry strikes back

Following demands from the North American Electric Reliability Corporation – Critical Infrastructure Protection (NERC-CIP) Standards, and many other cybersecurity requirements, the industry is adopting a common path to the future: IEC TS 62351-8: Power systems management and associated information exchange – Data and communications security – Part 8: Role-based access control. This Technical Specification sets out how vendors should implement and provide RBAC and central user account management to their customer base.

Since the arrival of IEC TS 62351-8 in 2011, users have been able to authenticate themselves across their organization to all devices in all networks, with a user-specific and unique user-id and password. Moreover, the addition or removal of users is done centrally, in a single step.

This technology offers not only the central management of user-ids and passwords, but also the management of user permissions by assigning roles to users, depending on their job roles in the organization (RBAC).

Possible solution for a nightmare scenario

Control systems need to be managed to ensure sustainable infrastructures. Managing a system means continually keeping its devices up-to-date.

The management of a cybersecurity policy can become complex; therefore to be efficient, security managers need support from software applications. A Role Based Access Control system is such an application. RBAC allows responsible persons to be able to manage users and their roles consistently from a central point – even for multiple control systems in different locations.

Not everybody needs to be a system administrator. A common sense approach in cybersecurity management is to grant the fewest possible privileges to every user. A RBAC system based on IEC TS 62351-8 enables the person responsible for security in a company to manage users for the entire system and assign roles to those users from one place.

IEC 62351 is a series of technical security International Standards that aims to secure power system-specific communication protocols such as IEC 61850 or IEC 60870-5-104. While most parts of the series have been released, more work is needed before systems compliant to IEC 62351 can be put on the market. IEC 62351-8, finalized and published in 2011, defines RBAC for power systems. This is not a new concept; it is in fact part of best practice in many IT systems. The use of RBAC in power systems makes it possible to reduce the number of permissions that have to be assigned to certain users so that these users have only the permissions they need to perform their duties. This reduces the risk to the power system, as permissions are only assigned when they are actually needed, according to the principle of fewest privileges. The standard also defines a list of pre-defined roles (e.g., Viewer, Operator, etc.) and of pre-defined rights.

Adhering to International Standards as closely as possible

To ensure high quality and dependable cybersecurity functionality in heterogeneous installations, it is fundamental to adhere to International Standards as far as possible. A high level of cybersecurity can only be achieved by deploying and using reviewed, approved and standardized technologies and methods, especially when installing devices from different vendors. Utilities not following such a wise path can find themselves locked in to a single supplier offering proprietary solutions.

Cybersecurity cannot be optimized without knowing everything that is going on in the system. Security related events, like access and other user activities in different system components, need to be monitored to identify potential attacks and to optimize protection. Central user activity logs collect cybersecurity related events from the system devices and make the information available to responsible personnel. An efficient and user-friendly approach, such as automatic recognition of event patterns, is a key feature of such monitoring applications.

State of the art cybersecurity products based on International Standards such as IEC TS 62351-8 enable efficient RBAC management of user accounts in multi-vendor control systems. They provide utilities with real-time visibility of the security-relevant user activity within their systems.

Proprietary cybersecurity implementations should be avoided for seamless integration of multi-vendor control systems. The adoption of interoperable solutions that accord to IEC TS 62351-8 makes performing these tasks much easier.

About the authors

Frank Hohlbaum – Security Manager Grid Automation,ABB Switzerland Ltd.

Frank is globally responsible for all aspects of cybersecurity within ABB’s Power System Substations and drives the security activities in this business unit. He is an active member of the Power System Security Council and represents the business unit Power System Substations. Frank Hohlbaum joined ABB in 1996 and has 20 years’ experience in substation automation. Frank is a Member of IEC Technical Committee (TC) 57/Working Group (WG) 3: Telecontrol protocols.

Bart de Wijs – Head of Cybersecurity for ABB's Power Grids Division.

Bart represents this division in the ABB Group Cybersecurity Council, which is a cross-disciplinary team staffed with resources from various corporate functions. Additionally, he is a member of the ABB Cybersecurity Response Team, handling vulnerabilities and incidents. Within the division he leads a team of cybersecurity specialists dealing with the different aspects of all the security-related concerns that could affect ABB customers. He is a member of various cybersecurity expert groups. Between 2007 and 2010 Bart was responsible for cybersecurity in ABB’s Power Generation business unit.

Fernando Alvarez – Cybersecurity Technical Product Manager,ABB Switzerland Ltd.

Fernando is responsible for supporting the development of different cybersecurity technologies in ABB products and for managing and tracking ABB’s cybersecurity intellectual property. He is also an active member of IEC TC57/WG15: Data and communication security, the IEC group working on the IEC 62351 series of International Standards for power systems management and associated information exchange. Previously Fernando worked on securing the internal IT infrastructure of banks and on securing military communications.

 

 

ANSI标准化工作

ANSI通过对标准制定组织(SDOs)认可程序推动美国国家标准(ANS)的制定,这些标准制定组织致力于共同制定国家自愿性协商一致标准。

ANSI认可表明,参与美国国家标准制定的标准制定组织所采用的程序都符合ANSI开放、平衡、协商一致和程序正当的基本要求。

人们经常向ANSI询问美国标准(和标准制定组织)的总数。据估,美国目前有数百个“传统”的标准制定组织 — 90%的标准由20个最大的标准制定组织(SDOs)制定 – 还有数百个“非传统”的标准制定机构,比如财团等。可以看出,美国的标准制定参与程度很高,因为标准制定组织本身所包含的各个委员会中的专家可以用他们的专业技能来满足这些标准的技术要求。

截至2015年,ANSI认可了240多个标准制定机构,制定了11,000多项美国国家标准(ANS)。

根据NIST专有出版物806— 《美国组织的标准活动》(1996年出版,作者罗伯特.B.托特)提供的数据显示,美国制定了93000多个标准,有近700 [1]个组织将制定标准作为自己的活动领域。其中,联邦政府是最大的标准制定者和使用者(制定和使用44000多个标准);而美国私营部门总共拥有约49,000个标准。

然而,随着1995年《国家技术转让与推动法案》(NTTAA)(公法104-113)的批准,美国开始鼓励联邦机构在可行情况下利用自愿协商一致标准,并适当参与自愿协商一致的标准制定工作。被批准为美国国家标准的标准是满足NTTAA的所有要求。

ANS的过程是经得起推敲的,它保护了所有参与者的权益。实质上, ANS加快了市场接受产品的速度,同时阐明了提高这些产品安全性的途径,从而实现对消费者的保护。

ANS的过程特征包括:

由利益相关方代表组成的团体或“协商一致团体”对所建议的标准达成共识;

对标准草案进行广泛的公开评审

考虑有关协商一致的投票成员和公众评论者所提交的意见并给予回应;

将批准的修改意见纳入标准草案中;

任何参与者若认为标准制定过程不符合ANSI的标准制定正当程序原则,有权提起上诉。

综上所述,为了维护ANSI的认可工作,要求标准制定者始终遵循一套管理协商一致的标准制定协程的要求或程序。这些要求在《ANSI基本要求:美国国家标准制定的正当程序要求》(ANSI Essential Requirements: Due process requirements for American National Standards.)这一文件中有所体现,另外还有一系列指导文件对这些程序进行了进一步阐释。这些指导性文件内容翔实,有助于ANSI认证标准的制定者和参与者了解ANS的制定过程及其影响。

正当程序是确保ANS标准得以在公平、可获得和回应各利益相关者要求的环境中制定的关键。ANS标准和制定过程秉承公开、公正的理念,确保所有的利害相关方都有机会参与到标准的制定中。同时,通过认证的标准制定者必须遵循ANSI的基本要求和其他正当程序保障,从而使公共利益也得到了适当的保障。

数据截至1996年,新的统计数据不可用。欲浏览美国的标准制定者名单,请于ANSI网站的国家标准系统网络(NSSN):全球标准化资料库(A National Resource for Global Standards)搜索标准制定者的可用目录。

 

 

ANSI成员用标准支持美国“儿童眼部健康安全月”

每年八月是美国“儿童眼部健康安全月”,每年到了这个时候,人们会密切关注任何有可能威胁儿童眼睛健康的因素。通过利用ANSI成员制定的眼部健康标准, ANSI积极支持儿童眼部健康安全呵护活动,并对自己的积极行为表示自豪。

你知道吗?每100名学龄儿童中,就有近25名儿童有眼部健康问题。而定期进行眼部检查则是保障眼部安全的初步措施,通过眼部检查,可排除各种潜在的眼睛健康问题,如色盲症、眼部感染和视力不佳。而视力不佳或将引起头痛、弱视等健康问题。

国际标准化组织为视力不佳人员推出了一套标准: ISO 14534:2011眼科光学——隐形眼镜和隐形眼镜护理产品——基本要求。 该项标准对隐形眼镜、隐形眼镜护理产品及其他配件的提出了安全和性能要求。之所以会针对隐形眼镜做标准化规定,是因为隐形眼镜现如今非常流行,是镜框眼镜的常见替代品。该项标准由ISO/TC 172/SC7眼科光学及仪器分技术委员会,以及美国电光学标准理事会制定的,该理事会为ANSI认可的作为美国技术顾问组(TAG)管理机构。

眼镜或隐形眼镜虽不是人人所需,但目前离炎热夏日结束尚有一月有余,佩戴保护型太阳镜保护眼部则对每个人都至关重要。ANSI Z80.3,眼镜科学-非处方眼镜和时尚眼镜基本要求,适用于一切非处方眼镜和时尚眼镜的标准。人们通常出于休闲、服饰搭配和娱乐等目的,佩戴非处方眼镜和时尚眼镜。这项全美通用的眼镜产品标准是由ANSI认可的Z80标准委员会制定。美国视力理事会是Z80秘书处管理部门。

尽管暑期护眼利于避免出现长期眼部健康问题,但在相关标准支持下,相关护目产品能够在孩子开学返校后的各种场合下,如高强度体育活动中保护孩子的眼睛。ASTM F803-1特定体育活动下护目镜标准规范是由ANSI成员和认可的组织ASTM International制定的。该项标准规范里涉及各种类型的护目镜,这些护目镜可极大减少外部环境对眼睛的伤害。

另外,美国防盲协会还为广大父母提供了有关婴儿视力发展的相关信息以及儿童在成长学习过程中的视力发展须知。

 

DIN发起创新项目资助计划

DIN and DKE(DIN 和 VDE的德国电气、电子和信息技术协会)共同发起了一项全新的创新理念资助计划。它通过称为“DIN Connect的标准化项目,为创新理念或项目提供资金支持。该项目计划既可加大人们在创新领域的研发力度,同时又可加快创新成果市场化应用进程。任何创新理念或创新活动的成功都离不开民众的信任和市场的欢迎,而民众的信任和市场的欢迎也离不开各类标准的规范作用。凭借自身广泛的国际关系和成熟的基础设施,DIN and DKE为全球范围内潜在客户及合作伙伴们提供了一个参与渠道。创业公司、知名企业、研发组织及各学术机构都受邀提交各自的创新理念或项目。

预计该项目将持续一到两年,每年的项目运营管理成本达35000欧元。而项目目标是,制定一项或多项DIN规范(DIN SPECs)和/或VDE应用指南 (VDE Application Guides)或其他初步的标准化工作成果。

2016年10月31日前是提交创新新理念或项目的截止时间。DIN将根据各创新项目的创新程度、与标准化的相关度以及对德国产业发展效益的提升度等标准,择优选取。待对提交的项目进行内部评估后,DIN拟于2016年11月邀请最优项目的申请人员前往德国进行项目资金申请,并于12月宣布创新项目入围者名单,选定的项目预计于2017年年初启动。

 

DIN launches innovation funding programme

Innovative ideas can be submitted up to 31 October 2016

DIN and DKE (German Association for Electrical, Electronic & Information Technologies in DIN and VDE) have launched a new funding programme for supporting innovative ideas through standardization called "DIN Connect". The programme will promote R&D in innovative areas and will make it easier to bring results to the market. Standards create trust and market acceptance, which innovations need in order to be successful. With their extensive international contacts and mature infrastructures, DIN and DKE can provide access to global networks of potential customers and partners. Start-ups, established companies, research organizations and academic institutions are invited to submit their ideas.

Projects will last one to two years and will be funded with up to € 35,000 per year for the project management. The objective is to draw up one or more DIN SPECs and/or VDE Application Guides, or other preliminary standardization work results.

Ideas should be submitted by 31 October 2016. Projects will be selected based on their degree of innovation, the benefits for German industry and relevance for standardization. After the submitted project has been reviewed internally by DIN, the applicants with the best ideas will be invited in November to make a full application for funding. The winners will be announced in December and the projects can be initiated at the start of 2017.

 

 

信息技术安全-欧洲制造

2016年6月30日,DIN-信息技术安全协调办公室(KITS)在德国柏林举行了第三届信息技术安全协调会议。在会上,欧盟委员会增长总司( DG GROWTH)单一市场政策、法规及实施处主任克斯汀•罗娜(Kerstin Jorna)表示:“互联网安全是实现数字化的基础和前提”。

会议的口号是:“使数字化更加安全”。本届KITS会议有来自工商企业、政界及科研机构的70余人参加,再次取得巨大成功。主题发言和小组讨论涉及信息技术安全的方方面面。与会嘉宾指出,由于该议题相当复杂,若要实现市场透明之目标,我们必须采取特别措施。另外,基于标准和规范的标签和认证也能为此目标提供助力。“信息技术安全—欧洲制造”品牌效应同样也能为信息技术安全定下正确的基调。

不过,大家都有这样一个共识:包括专业用户、消费者等各类市场经济主体的携手共同努力才是实现信息技术安全的唯一途径。要想实现信息技术安全之目标,不仅需要基于协商一致的标准,也需要得到诸如DIN-信息技术安全协调办公室(KITS)这样的跨行业组织的协助。

会上讨论的其它主题包括欧洲安全市场分化现象以及全新的欧洲资金规划等,同时也强调通过具体的保护文件来评估信息技术安全状况。但问题是,目前这种保护文件缺乏相关基础,因此急需信息技术安全这样的标准。而且,为制定出一套缜密并且可供多方使用的信息技术安全标准,必须更加有效地将“信息技术安全设计”理念付诸实施。对此,与会专家一致认为,急需一批专业知识过硬的信息技术安全专家,还讨论了信息技术安全在教育和培训行业面临的多种挑战。感谢美国思科集团、德国itWatch GmbH公司和Siemens的大力支持,本次会议这才顺利召开。

专家们无不热切盼望明年再次召开该会议,预计明年的会议同样将取得巨大成功。关于2017年会议相关信息以及历届会议精彩回顾,敬请访问:www.kits-konferenz.de.

 

IT security "Made in Europe"

2016 KITS Conference

"Cybersecurity is the foundation upon which digitalization is being built" said Kerstin Jorna, Director of the European Commission's Single Market Policy, Regulation and Implementation, DG GROWTH, at the third Conference held by DIN's IT Security Coordination Office (KITS) on 30 June 2016 in Berlin.

The motto of the conference was "Make digitalization more secure!". This year's KITS conference was again a resounding success, with over 70 participants from industry, politics and research. Lectures and panels covered various aspects of IT security. The participants pointed out that because this topic is so complex, special efforts will have to be taken to achieve the necessary transparency on the market. Labels and certificates based on standards and specifications can help, and an "IT Security – Made in Europe" branding can help set the right tone.

But everyone agreed on one thing:  IT security can only be achieved with the help of all economic players, including professional users and consumers. This requires consensus-based standards and the assistance of cross-sectoral organizations such as DIN's IT Security Coordination Office (KITS).

Other topics addressed at the conference include the fragmentation of the European security market and new European funding programmes. It was stressed that it must be possible to measure IT security on the basis of concrete protection profiles. But there is currently no basis for such profiles, and thus standards are desperately needed. Also, the concept of "IT security by design" needs to be implemented more effectively to achieve a thorough, interoperable IT security. Experts agreed that there is a great need for competent specialists, and they discussed the challenges of including IT security in training and education. The conference was made possible by contributions from CISCO, itWatch GmbH and Siemens.

Experts are looking forward to next year's conference, which should be just as successful as this year's.   Information on the 2017 KITS Conference 2017 and impressions of past conferences can be found at www.kits-konferenz.de.

 

 

欧盟委员会与相关企业就网络安全签署协议,积极应对网络安全威胁

今日,欧盟委员会建立了一项新的公私合作伙伴关系,这项公私合作关系有望在2020年之前带来18亿欧元的投资。该合作关系是一系列改善欧洲反网络攻击基础设施和加强欧洲网络安全领域的竞争力的新倡议中的一部分。

一项近期的调查显示,去年至少有超过80%的欧洲公司经历过至少一起网络安全事件,2015年全球各行业所遭遇的网络安全事件上升38%。这对众多大小型欧洲公司造成损害,同时这个威胁也让欧洲电子经济领域的信誉受损。作为欧洲数字化单一市场策略的一部分,委员会想加强跨境合作以及与在网络安全方面积极行动的行业和部门之间的合作,旨在在欧盟范围内帮助开发既具有创新性又有安全性的技术、产品和服务。

数字化一体市场副委员长安德鲁斯.安西普说道:“没有信任和安全,就没有数字化一体市场。欧洲必须准备好应对日益严峻且跨境流动的网络安全威胁。我们正在计划具体措施来加强欧洲应对这类攻击的快速恢复能力,保证建设和扩大电子经济的能力。”

数字经济与社会委员会委员京特•H•厄廷格说:“欧洲需要高质量,经济和彼此协作的网络安全的产品和服务。对于欧洲的网络安全产业来说,现在有一个很好的机遇使我们能在快速发展的全球市场中竞争。我们呼吁成员国和所有网络安全相关市场主体加强合作,凝聚知识、信息专业技能,以此来提高欧洲网络弹性。今日签订的网络安全伙伴关系对于该领域来说也是一大进步,具有里程碑式的意义。

如今的行动计划包括第一个欧洲公私网络安全合作伙伴关系的确立。欧盟将在其研究和创新项目计划“地平线2000”下,对此项合作投资4.5亿欧元。以欧洲网络安全组织 (ECSO)为代表的欧洲网络安全市场主体的投资金额有望达到其三倍。该合作伙伴关系同时也将包括来自各国、各地区以及地方的公共管理机构、研究中心和学术界人士,旨在促进研究和创新早期阶段的合作,为能源、卫生、交通和金融等领域的网络安全问题提供解决方案。厄廷格委员今日与ECSO在斯特拉斯堡签署了这项伙伴关系。(照片和视频将于中欧时间12点公布)

欧盟委员会还制定不同措施来解决欧盟网络安全市场分化的问题。目前一个通信技术公司可能要通过不同的认证程序才能向一些成员国销售它的产品和服务。因此委员会将研究针对信息通信技术安全产品建立一个可行的欧洲认证框架。

大量的欧洲创新型中小企业在利基市场(如密码学)和存在新型商业模式的完善市场(如杀毒软件)涌现,但是他们往往无法扩大业务规模。欧盟委员会希望能够减轻网络安全领域小型企业的融资问题,并将在欧盟投资计划下探索不同的融资途径。

欧洲议会拟批准《网络和信息安全指令》,欧盟依据该指令已经建立了一个计算机安全事件应对小组,以快速回应网络安全威胁和事故。同时各成员国之间还将建立“合作小组”,支持并促进战略合作和信息互换,提升信任和信心。欧盟委员会还呼吁各成员国充分利用这些新的机制,尽可能加强协调配合。欧盟委员会将提出方法加强大型网络安全事件中的跨境合作。鉴于网络安全领域的发展速度,委员会也将对欧盟网络和信息安全局进行评估。此项评估包括欧盟网络和信息安全局的授权范围和能力是否足以完成其职责,即是否可以协助成员国提升其网络应对能力。委员会还将对如何不同经济部门之间的加强和简化网络安全合作进行研究,其中就包括网络安全培训和教育。

背景:

行动计划的根据主要来自2015年《数字化单一市场策略》,2013年《欧盟网络安全策略》,以及即将确定的《网络和信息安全指令》,是基于欧洲安全议程对话以及《打击混合威胁》提出的。

 

European Commission – Press release

Commission signs agreement with industry on cybersecurity and steps up efforts to tackle cyber-threats

Brussels, 5 July 2016

The Commission today launches a new public-private partnership on cybersecurity that is expected to trigger €1.8 billion of investment by 2020. This is part of a series of new initiatives to better equip Europe against cyber-attacks and to strengthen the competitiveness of its cybersecurity sector.

According to a recent survey, at least 80% of European companies have experienced at least one cybersecurity incident over the last year and the number of security incidents across all industries worldwide rose by 38% in 2015. This damages European companies, whether they are big or small, and threats to undermine trust in the digital economy. As part of its Digital Single Market strategy the Commission wants to reinforce cooperation across borders, and between all actors and sectors active in cybersecurity, and to help develop innovative and secure technologies, products and services throughout the EU.

Andrus Ansip, Vice-President for the Digital Single Market, said: "Without trust and security, there can be no Digital Single Market. Europe has to be ready to tackle cyber-threats that are increasingly sophisticated and do not recognise borders. Today, we are proposing concrete measures to strengthen Europe's resilience against such attacks and secure the capacity needed for building and expanding our digital economy."

Günther H. Oettinger, Commissioner for the Digital Economy and Society, said: "Europe needs high quality, affordable and interoperable cybersecurity products and services. There is a major opportunity for our cybersecurity industry to compete in a fast-growing global market. We call on Member States and all cybersecurity bodies to strengthen cooperation and pool their knowledge, information and expertise to increase Europe's cyber resilience. The milestone partnership on cybersecurity signed today with the industry is a major step ."

Today's action plan includes the launch of the first European public private partnership on cybersecurity. The EU will invest €450 millionin this partnership, under its research and innovation programme Horizon 2020. Cybersecurity market players, represented by the European Cyber Security Organisation (ECSO), are expected to invest three times more. This partnership will also include members from national, regional and local public administrations, research centres and academia. The aim of the partnership is to foster cooperation at early stages of the research and innovation process and to build cybersecurity solutions for various sectors, such as energy, health, transport and finance. Commissioner Oettinger today signs the partnership with the ECSO in Strasbourg (photos and videos to be available at around 12.00 CET).

The Commission also sets out different measures to tackle the fragmentation of the EU cybersecurity market. Currently an ICT company might need to undergo different certification processes to sell its products and services in several Member States. The Commission will therefore look into a possible European certification framework for ICT security products.

A myriad of innovative European SMEs have emerged in niche markets (e.g. cryptography) and in well-established markets with new business models (e.g. antivirus software), but they are often unable to scale up their operations. The Commission wants to ease access to finance for smaller businesses working in the field of cybersecurity and will explore different options under the EU investment plan.

The Network and Information Security Directive, which is expected to be adopted by the European Parliament tomorrow, already creates a network of Computer Security Incident Response Teams across the EU in order to rapidly react to cyber threats and incidents. It also establishes a ‘Cooperation Group’ between Member States, to support and facilitate strategic cooperation as well as the exchange of information, and to develop trust and confidence. The Commission today calls on Member States to make the most of these new mechanisms and to strengthen coordination when and where possible. The Commission will propose how to enhance cross-border cooperation in case of a major cyber-incident. Given the speed with which the cybersecurity landscape is evolving, the Commission will also bring forward its evaluation of the European Union Agency for Network and Information Security (ENISA).This evaluation will assess whether ENISA's mandate and capabilities remain adequate to achieve its mission of supporting EU Member States in boosting their own cyber resilience. The Commission also examines how to strengthen and streamline cybersecurity cooperation across different sectors of the economy, including in cybersecurity training and education.

Background

Today's action plan finds its main roots in the 2015 Digital Single Market strategy, the 2013 EU Cybersecurity strategy and the forthcomingNetwork and Information Security (NIS) Directive. It builds on the recent Communications on Delivering the European Agenda on Security andCountering Hybrid Threats.

 

最全最新的标准分享平台

客服微信:1093451816返回首页