Global economic commerce has become almost wholly dependent upon constant, reliable availability of electricity. This is nowhere more true than in the interconnected Internet world, which drives global commerce and has become deeply enmeshed in modern society. Paradoxically, the capabilities of an interconnected world have created a great vulnerability point in ensuring uninterrupted flow of electric powerCONTROL ENGINEERING China版权所有, and have raised
As of June 30CONTROL ENGINEERING China版权所有, 2009CONTROL ENGINEERING China版权所有, all high voltage electric transmission and distribution (T&D) operators in the bulk electric system have to be in compliance with regulations specified by version 2 of the North American Electric Reliability Council’s Cyber Security Standard (NERC CIP). And they must begin collecting and logging data to become auditably compliant by July 1控制工程网版权所有, 2010. The power generation owner and operator deadlines follow these dates by six months. This is a major milestone in moving toward securing critical cyber assets (CCAs) in the electric utility infrastructure of North America. It also offers lessons for other industries.
‘Each responsible entity has to start with having a good cyber policy in place. Outside of IT, this hasn’t existed before.’ —Roger Pan, Emerson Process Management
In generalCONTROL ENGINEERING China版权所有, the NERC CIP regulations have tasked operators to: comprehensively identify CCAs; develop security management controls; have personnel training in place; have detection and prevention measures in force; and have response plan, and notification and recovery procedure