Beyond Compliance: Advanced SmartGrid Authentication Paul Miller Uniloc
UNILOC INTEGRITY AT THE NETS EDGE Paul Miller SVP Marketing
Agenda n SmartGrid authentication vulnerability n Beyond compliance advanced authentication n White List Authentication and the Trusted SmartGrid Network n Best practices and techniques
SmartGrid Authentication Vulnerability n Vulnerability: weak / compromised authentication mechanisms l Users n Passwords: can be easily cracked n Tokens: lost/stolen/broken n Digital certificates: management, key gen/storage n Attack: Device and or User spoofing l Rogue access to SmartGrid devices l Malware insertion to disrupt SmartGrid network availability n Result: Rogue user access to SmartGrid network.
Authentication Comparison
Beyond Compliance n Compliance good start n Control the edge with white-list authentication l Block all else n Strong authentication: Device Fingerprint l Machine to machine authentication n Hardware device fingerprint ensures device is genuine l Two factor authentication for edge users n User Password n Hardware device fingerprint Transparent/easy to use second factor for user
SmartGrid Device White List Maintain SmartGrid availability by only allowing SmartGrid users, their machines, and authorized devices access to SmartGrid network SmartGrid User Devices Smart Grid Device
SmartGrid Device White List Unauthorized Access Attempt ? SmartGrid User Devices Maintain SmartGrid availability by only allowing SmartGrid users, their machines and authorized devices access to SmartGrid network and block all other machines/devices Smart Grid Device Edge ID Appliance
Best Practices n Use device fingerprints to control edge device integrity l White-list machine to machine authentication l Device fingerprint is transparent second factor user authentication n Insure edge devices are clean of malware n Maintain perimeter security n Monitor network for abnormal traffic n Routinely assess & mitigate network vulnerabilities