Presentation is loading. Please wait.

Presentation is loading. Please wait.

Beyond Compliance: Advanced SmartGrid Authentication Paul Miller Uniloc.

Similar presentations


Presentation on theme: "Beyond Compliance: Advanced SmartGrid Authentication Paul Miller Uniloc."— Presentation transcript:

1 Beyond Compliance: Advanced SmartGrid Authentication Paul Miller Uniloc

2 UNILOC INTEGRITY AT THE NETS EDGE Paul Miller SVP Marketing

3 Agenda n SmartGrid authentication vulnerability n Beyond compliance advanced authentication n White List Authentication and the Trusted SmartGrid Network n Best practices and techniques

4 SmartGrid Authentication Vulnerability n Vulnerability: weak / compromised authentication mechanisms l Users n Passwords: can be easily cracked n Tokens: lost/stolen/broken n Digital certificates: management, key gen/storage n Attack: Device and or User spoofing l Rogue access to SmartGrid devices l Malware insertion to disrupt SmartGrid network availability n Result: Rogue user access to SmartGrid network.

5 Authentication Comparison

6 Beyond Compliance n Compliance good start n Control the edge with white-list authentication l Block all else n Strong authentication: Device Fingerprint l Machine to machine authentication n Hardware device fingerprint ensures device is genuine l Two factor authentication for edge users n User Password n Hardware device fingerprint Transparent/easy to use second factor for user

7 SmartGrid Device White List Maintain SmartGrid availability by only allowing SmartGrid users, their machines, and authorized devices access to SmartGrid network SmartGrid User Devices Smart Grid Device

8 SmartGrid Device White List Unauthorized Access Attempt ? SmartGrid User Devices Maintain SmartGrid availability by only allowing SmartGrid users, their machines and authorized devices access to SmartGrid network and block all other machines/devices Smart Grid Device Edge ID Appliance

9 Best Practices n Use device fingerprints to control edge device integrity l White-list machine to machine authentication l Device fingerprint is transparent second factor user authentication n Insure edge devices are clean of malware n Maintain perimeter security n Monitor network for abnormal traffic n Routinely assess & mitigate network vulnerabilities


Download ppt "Beyond Compliance: Advanced SmartGrid Authentication Paul Miller Uniloc."

Similar presentations


Ads by Google