1 / 2

SG Security – Key Accomplishments

SG Security – Key Accomplishments. Examination of technical approaches State machine analysis CERT Resilience Management Model Vulnerability handling and disclosure Review of progress on key documents Secure Device Profile Section assignments and volunteer needs

damian
Download Presentation

SG Security – Key Accomplishments

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SG Security – Key Accomplishments • Examination of technical approaches • State machine analysis • CERT Resilience Management Model • Vulnerability handling and disclosure • Review of progress on key documents • Secure Device Profile • Section assignments and volunteer needs • Distribution Management Security Profile • Review of comments received during ratification vote • Wide Area Monitoring, Protection, & Control (Synchrophasor) Security Profile • Completion of review and recommendation by Usability Analysis Task Force • Substation Automation Security Profile • Review of proposed abstract communications architecture and security principles • Demand-Response Security Profile (OpenADR) • Identification of outstanding tasks for completion • Discussion of technical questions

  2. SG Security – Next Steps • Documents • Secure Device Profile • Solicit volunteers, get the work done  • Distribution Management Security Profile • Propose minor modifications to address comments • Wide Area Monitoring, Protection, & Control (Synchrophasor) Security Profile • Call for Working Group review and consideration of a vote • Substation Automation Security Profile • First full draft anticipated in April • Demand-Response Security Profile (OpenADR) • Solicit team to complete control-use case mapping • Next webinar • Monday, March 12, 3-4pm EDT

More Related