
Protection for your power grids according EnWG
Network control centres belong to the category “safety-critical infrastructures”. In order to eliminate the dangers of outages, and to avoid manipulations of the system’s operability or even interventions into processes by unauthorised persons, you have to make continuous and targeted improvements of you control centre’s IT security.
As a specialist for telecontrol, control and automation systems as well as a supplier of turnkey plants, VIVAVIS AG is happy to support you on the basis of its many years of know-how in consulting and implementing measures to enhance your IT security. With regard to IT security, we support you in the introduction of the security catalog and offer you ready-made solutions to meet the measures required therein in accordance with DIN ISO/IEC 27002 and 27019.
Request nowFunctions and features
System Hardening
Basic hardening of all servers and desktop computers (versions including and later than Windows 2008 Server R2/Solaris 10 and Windows 7, respectively)Basic hardening of all network components (deactivation of unused ports, port security)
Setting up a redundant server for domain controller/AD server (AD = Active Directory)
Patch management for operating systems, network components, applications and 3rd-party products
Security Checks
Review of the network structure and network segmentation, preparation of a network structure plan, e.g. setting up of different protection zones, definition of rules and communication routes, redundant firewall and network architectures etc.Penetration Testing
Penetration test: Documentation of network security according to the state of the art; BSI-listed test tool; a wide range of attack scenarios with more than 80,000 tests etc.Back-up and Recovery
Development of data security concepts, such as 3-2-1 procedure, preparation of technical documentation, preparation of system description/back-up procedureImplementation of a reliable back-up strategy
Plans for disaster recovery: Definition of different scenarios (hardware failure, virus attack etc.), development and documentation of the recovery process, in consideration of time and financial aspects.
Installation of a virus scanner with current signatures, concept creation and implementation, for servers and end devices in the ICS network; update and reporting process
Logging and Monitoring
Log management: Logging and auditing conceptInstallation of central LOG servers that centrally consolidate the log files of all systems.
Utilisation of monitoring systems for supervision of the network communication