{"id":14324,"date":"2019-10-09T08:00:18","date_gmt":"2019-10-09T07:00:18","guid":{"rendered":"https:\/\/www.engineernewsnetwork.com\/blog\/?p=14324"},"modified":"2019-10-08T10:55:35","modified_gmt":"2019-10-08T09:55:35","slug":"the-importance-of-end-to-end-secure-communications-in-the-energy-sector","status":"publish","type":"post","link":"https:\/\/www.engineernewsnetwork.com\/blog\/the-importance-of-end-to-end-secure-communications-in-the-energy-sector\/","title":{"rendered":"The importance of end-to-end secure communications in the energy sector"},"content":{"rendered":"\n<p><strong>J\u00fcrgen Resch looks at end-to-end secure communications in the energy sector and the need for the IEC 62351 standard<\/strong><\/p>\n\n\n\n<p>Back in 2017, headlines reported that hackers had shut down monitoring systems for oil and gas pipelines across the United States.&nbsp;<\/p>\n\n\n\n<p>Alarmingly, insecure third-party systems in SCADA platforms were to blame.&nbsp;<\/p>\n\n\n\n<p>How can the energy industry prevent further attacks like this?&nbsp;<\/p>\n\n\n\n<p><strong>When things go wrong<\/strong><\/p>\n\n\n\n<p>Unfortunately, the <strong><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"http:\/\/tracking.vuelio.co.uk\/tracking\/click?d=3fT4UrGEBHT7M3-3POCbbX0_9kia1M9VjL-shc_WjEMTq6ayPMNhJQU0Zrc_f75Rx3wmdK8AHGWqYTkmterrDnjjSL6Qykvc8RnislJf74ei3xo-MlvyzDH425WBpTaqdO94KibGNyptwPSX0BjuDjEt825QtSPsiU9ri1JI08GmR6hRhn9bnlVyM0vOD8VUuFoCddguaInOHIW9hOkSKTM1\" target=\"_blank\">attacks on oil and gas pipelines<\/a><\/strong> case isn\u2019t a rare example. The following year, cybercriminals also gained access to the <strong>United Kingdom&#8217;s electricity system<\/strong>.\u00a0<\/p>\n\n\n\n<p>The group phished its way into energy systems using a phony word document CV for a man called \u2018Jacob Morrison\u2019.&nbsp;<\/p>\n\n\n\n<p>Once infiltrated, the group took screenshots of the system, leading experts to believe the hackers were spying to learn how every aspect of the system works.<\/p>\n\n\n\n<p>Attacks like this continue to be a huge concern for the energy sector, particularly if the hacker manipulates data.&nbsp;<\/p>\n\n\n\n<p>For example, a cybercriminal could hack a business\u2019s energy controller and change the threshold values of a reaction, or worse. They could maliciously lower the perceived voltage measurement of an energy customer, so the controller thinks the voltage is lower than what it really is.&nbsp;<\/p>\n\n\n\n<p>The controller would then increase the voltage at the customer site, exceeding tolerances and destroying power supplies.<\/p>\n\n\n\n<p>Where there is high risk, there needs to be high levels of protection.<\/p>\n\n\n\n<p><strong>Time for change<\/strong><\/p>\n\n\n\n<p>Many of the energy meters, switches and controls in power plants and substations were designed years ago and as such, only have basic password protection. Criminals know this, so the industry needs to react.<\/p>\n\n\n\n<p>Despite such high-profile attacks, energy security is a shockingly new topic for many in the sector. Even when LAN based technologies such as IEC 60870-5-104 or DNP3 TCP came into play in the late 1990s, concerns about data hacks or data protection were not prevalent.<\/p>\n\n\n\n<p>Today, these older communication protocols are out of date and must be retrofitted with security features that can prevent modern security threats.<\/p>\n\n\n\n<p>To make security even more challenging, the energy grid is no longer confined to its physical structure.&nbsp;<\/p>\n\n\n\n<p>The ever-developing smart grid takes energy systems into the cyber-physical world. With data sent trough and stored in the cloud, energy data could become even more vulnerable if security standards are not updated.<\/p>\n\n\n\n<p><strong>Enter, IEC 62351<\/strong><\/p>\n\n\n\n<p>IEC 62351 is the current standard for security in energy management systems and the exchange of energy-related data. It focuses on the major requirements for secure data communication and processing, including confidentiality, data integrity and authentication.<\/p>\n\n\n\n<p>The arrival of the IEC 62351 filled a huge void for energy security, bringing the existing non-secure communication protocols up to speed. The standard was defined by the IEC TC 57, the technical committee responsible for the development of standards for information exchange.<\/p>\n\n\n\n<p>By applying the IEC 62351 security standard to protocols 60870-5-101\/-104, DNP3 and IEC 61850 among others, it is possible to achieve end-to-end security for energy data systems. <\/p>\n\n\n\n<p>The standard series dictates the need for encryption and access control through authentication and authorisation. For example, Transport Layer Security (TLS) encryption is defined by IEC 62351-3.<\/p>\n\n\n\n<p>However, applying IEC 62351 is not a one-time task. Once implemented, the security mechanisms need to be maintained and updated continuously, in line with changing security threats.<\/p>\n\n\n\n<p><strong>Building readiness<\/strong><\/p>\n\n\n\n<p>Engineers can now create energy automation applications in accordance with IEC 62351, using the zenon software platform for energy automation. COPA-DATA is continuously implementing the standard step by step in its software platform zenon, and it is already possible to harden the communication by TLS.<\/p>\n\n\n\n<p>Improved security doesn\u2019t change the user experience of the fully secured zenon application, although additional password changes and certificate renewal will be required &#8211; a small price to pay for optimal security.<\/p>\n\n\n\n<p>J\u00fcrgen Resch is Energy Industry Manager at <strong><a href=\"http:\/\/tracking.vuelio.co.uk\/tracking\/click?d=5VC32VWvx-ljdWIg2i49n6xWKSDvW19iIUQJDMwR97b-3qzHw7dZpHeGOZLf5qVcNhR5bDGT63yXkpBi7Ythg6uITFYnUbrXAQ_iBKxeht6V9J31L6VGS-QvLgkOy9Y8bECFiKJ8pHEKiH7GfgR-Tz8Mpu0FJoxugx4zrxGvrRtSTUTTQkDS6jjrsnP51uJjnA2\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">COPA-DATA<\/a><\/strong>. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>J\u00fcrgen Resch looks at end-to-end secure communications in the energy sector and the need for the IEC 62351 standard Back in 2017, headlines reported that hackers had shut down monitoring systems for oil and gas pipelines across the United States.&nbsp; Alarmingly, insecure third-party systems in SCADA platforms were to blame.&nbsp; How can the energy industry &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[107],"tags":[524,3478,7261,3671,7260,183],"class_list":["post-14324","post","type-post","status-publish","format-standard","","category-power","tag-copa-data","tag-hackers","tag-iec-62351","tag-secure-communications","tag-security-in-energy-systems","tag-zenon"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The importance of end-to-end secure communications in the energy sector - Engineer News Network<\/title>\n<meta name=\"description\" content=\"J\u00fcrgen Resch looks at end-to-end secure communications in the energy sector and the need for the IEC 62351 standard\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.engineernewsnetwork.com\/blog\/the-importance-of-end-to-end-secure-communications-in-the-energy-sector\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The importance of end-to-end secure communications in the energy sector - Engineer News Network\" \/>\n<meta property=\"og:description\" content=\"J\u00fcrgen Resch looks at end-to-end secure communications in the energy sector and the need for the IEC 62351 standard\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.engineernewsnetwork.com\/blog\/the-importance-of-end-to-end-secure-communications-in-the-energy-sector\/\" \/>\n<meta property=\"og:site_name\" content=\"Engineer News Network\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-09T07:00:18+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/the-importance-of-end-to-end-secure-communications-in-the-energy-sector\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/the-importance-of-end-to-end-secure-communications-in-the-energy-sector\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#\\\/schema\\\/person\\\/4477342aea8e299c6a21761e513ea8e1\"},\"headline\":\"The importance of end-to-end secure communications in the energy sector\",\"datePublished\":\"2019-10-09T07:00:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/the-importance-of-end-to-end-secure-communications-in-the-energy-sector\\\/\"},\"wordCount\":649,\"keywords\":[\"COPA-DATA\",\"hackers\",\"IEC 62351\",\"secure communications\",\"Security in energy systems\",\"zenon\"],\"articleSection\":[\"Power\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/the-importance-of-end-to-end-secure-communications-in-the-energy-sector\\\/\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/the-importance-of-end-to-end-secure-communications-in-the-energy-sector\\\/\",\"name\":\"The importance of end-to-end secure communications in the energy sector - Engineer News Network\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#website\"},\"datePublished\":\"2019-10-09T07:00:18+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#\\\/schema\\\/person\\\/4477342aea8e299c6a21761e513ea8e1\"},\"description\":\"J\u00fcrgen Resch looks at end-to-end secure communications in the energy sector and the need for the IEC 62351 standard\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/the-importance-of-end-to-end-secure-communications-in-the-energy-sector\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/the-importance-of-end-to-end-secure-communications-in-the-energy-sector\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/the-importance-of-end-to-end-secure-communications-in-the-energy-sector\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The importance of end-to-end secure communications in the energy sector\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/\",\"name\":\"Engineer News Network\",\"description\":\"The ultimate online news and information resource for today's engineer\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#\\\/schema\\\/person\\\/4477342aea8e299c6a21761e513ea8e1\",\"name\":\"admin\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The importance of end-to-end secure communications in the energy sector - Engineer News Network","description":"J\u00fcrgen Resch looks at end-to-end secure communications in the energy sector and the need for the IEC 62351 standard","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.engineernewsnetwork.com\/blog\/the-importance-of-end-to-end-secure-communications-in-the-energy-sector\/","og_locale":"en_GB","og_type":"article","og_title":"The importance of end-to-end secure communications in the energy sector - Engineer News Network","og_description":"J\u00fcrgen Resch looks at end-to-end secure communications in the energy sector and the need for the IEC 62351 standard","og_url":"https:\/\/www.engineernewsnetwork.com\/blog\/the-importance-of-end-to-end-secure-communications-in-the-energy-sector\/","og_site_name":"Engineer News Network","article_published_time":"2019-10-09T07:00:18+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/the-importance-of-end-to-end-secure-communications-in-the-energy-sector\/#article","isPartOf":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/the-importance-of-end-to-end-secure-communications-in-the-energy-sector\/"},"author":{"name":"admin","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1"},"headline":"The importance of end-to-end secure communications in the energy sector","datePublished":"2019-10-09T07:00:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/the-importance-of-end-to-end-secure-communications-in-the-energy-sector\/"},"wordCount":649,"keywords":["COPA-DATA","hackers","IEC 62351","secure communications","Security in energy systems","zenon"],"articleSection":["Power"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/the-importance-of-end-to-end-secure-communications-in-the-energy-sector\/","url":"https:\/\/www.engineernewsnetwork.com\/blog\/the-importance-of-end-to-end-secure-communications-in-the-energy-sector\/","name":"The importance of end-to-end secure communications in the energy sector - Engineer News Network","isPartOf":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#website"},"datePublished":"2019-10-09T07:00:18+00:00","author":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1"},"description":"J\u00fcrgen Resch looks at end-to-end secure communications in the energy sector and the need for the IEC 62351 standard","breadcrumb":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/the-importance-of-end-to-end-secure-communications-in-the-energy-sector\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.engineernewsnetwork.com\/blog\/the-importance-of-end-to-end-secure-communications-in-the-energy-sector\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/the-importance-of-end-to-end-secure-communications-in-the-energy-sector\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.engineernewsnetwork.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The importance of end-to-end secure communications in the energy sector"}]},{"@type":"WebSite","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#website","url":"https:\/\/www.engineernewsnetwork.com\/blog\/","name":"Engineer News Network","description":"The ultimate online news and information resource for today's engineer","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.engineernewsnetwork.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1","name":"admin","url":"https:\/\/www.engineernewsnetwork.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/14324","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/comments?post=14324"}],"version-history":[{"count":1,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/14324\/revisions"}],"predecessor-version":[{"id":14325,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/14324\/revisions\/14325"}],"wp:attachment":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/media?parent=14324"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/categories?post=14324"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/tags?post=14324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}