EcoStruxure Cybersecurity Commitment to ISA/IEC 62443
EcoStruxure Cybersecurity provides end-to-end cybersecurity solutions across all layers from Connected Products and Edge Control to the Apps, Analytics, and Services layer, which includes guidance from expert service advisors.
EcoStruxure Power embeds this concept into all of its system architectures.
Connected Products and Edge Control Software
Connected products and Edge Control software are developed in accordance with ISA/IEC 62443-4-2. See the following product certifications.
-
EcoStruxure Power Monitoring Expert ISA/IEC 62443-4-1 and 4-2 certification
-
EcoStruxure Power Operation ISA/IEC 62443-4-1 and 4-2 certification
-
PowerLogic P5 ISA/IEC 62443-4-1 and 4-2 certification
System Level
Schneider Electric also integrates and validates the cybersecurity requirements for the communicating system including connected products and Edge Control software. This system architecture is validated and certified by a third party according to the requirements of ISA/IEC 62443-3–3. For more information, visit the cybersecurity for EcoStruxure Power webpage: https://www.se.com/ww/en/work/solutions/cybersecurity/power-cybersecurity.jsp.
EcoStruxure Cybersecurity Admin Expert
In order to help secure the system in a consistent and efficient manner, Schneider Electric also offers free EcoStruxure Cybersecurity Admin Expert software for configuring and deploying the cybersecurity policy to EcoStruxure Power Connected Products and Edge Control Software.
It provides a comprehensive and intuitive cybersecurity policy configuration tool for centralized user and password administration:
-
Security policies definition
-
Security parameters configuration
-
Security logs retrieval and display
-
Centralized administration of user accounts and roles
For more information on Cybersecurity Admin Expert, visit our website: https://www.se.com/ww/en/product-range/63515-ecostruxure-cybersecurity-admin-expert/#overview.
EcoStruxure Cybersecurity Application Platform
EcoStruxure Power provides a system cybersecurity management layer offering visibility and management of cybersecurity controls, allowing operations teams to manage and maintain their cybersecurity control points.
It helps to provide security management capabilities with real-time monitoring of cyberthreats to help mitigate operational risks. This enables the system to meet ISA/IEC 62443 standards as well as NIST/NERC-CIP requirements for central management functionalities.
The security platform offers modules that can be added as required, as shown below:
Cybersecurity OT Dashboard (COTD) |
Enables centralized cybersecurity monitoring of OT assets, offering visibility of the current system security status via dashboards.. |
Anomaly Detection |
Continuously and passively monitors the system network for anomalous behavior against a known system baseline helping users to detect, characterize, and report security breaches in a timely manner. The module records all activity for future playback and diagnosis as required for incident detection and response. |
Secure Remote Access |
Single interface that helps provide secure remote connectivity to external users for testing, maintenance, and support of the system. Security administrators have full visibility and control over third party and employee access. |
Backup and Restore |
Helps to minimize data loss and reduce downtime due to a component failure or cyber-attack (such as ransomware) through automated backups and provides disaster recovery through rapid restoration. |
Schneider Electric Cybersecurity Services
Schneider Electric offers unique expertise in cybersecurity for operational technology systems with consulting, design, implementation, monitoring, and response services to support the entire life cycle of a connected system.
Schneider Electric’s Cybersecurity Services provide support for new systems, existing or legacy systems, and integration of IT and OT networks. Cybersecurity service engineers are experienced and skilled in adapting the consultative approach to the end user’s existing IT policies, risk tolerance, and budget.
These services are based on the four categories below:
Permit |
Manage access to operations systems and information through network and physical controls. |
Protect |
Implement specific controls as part of the operations systems to help provide ongoing protection. |
Detect |
Monitor the operating environment to detect and communicate threats. |
Respond |
Develop procedures and systems to help ensure a rapid response to cyber incidents to contain and mitigate attacks. |
Learn more about Cybersecurity Services on our website: https://www.se.com/us/en/work/solutions/cybersecurity/.