SlideShare uma empresa Scribd logo
1 de 9
Baixar para ler offline
Securing the Smart Grid with
SafeNet HSMs
SafeNet
WH
WHITEPAPER
WHITEPAPER




Overview
The smart grid is the first major effort to modernize an energy infrastructure that has
remained largely unchanged over the past several decades. The smart grid creates a network
of links between customers and utility companies that provides increased insight into and
management of energy consumption, cost, and workload across the entire energy grid. At a
time when energy utilities play an increasingly important part of our everyday lives, smart
grid technologies introduce new security challenges that must be addressed. Implementing a
smart grid without proper security could result in grid instability, loss of private information,
utility fraud, and unauthorized access to energy consumption data.

Building a trusted smart grid will require robust security solutions, and interoperability from
multiple vendors, that can be easily deployed at the communication and application layers of
the smart grid infrastructure. In the first phase of smart grid deployments, traditional meters
will be replaced with meters that can be read remotely, called smart meters. The Advance
Metering Infrastructure (AMI) is the second phase of the smart grid and uses smart meters
to enable a two-way channel of communication between meters and the utility company.
Securing this two-way line of communication is imperative, and will require a solution for
Head End Trusted Identity authentication and Smart Meter device attestation to ensure the
integrity of the grid. Leveraging this integrity will allow utilities to both; issue trusted firmware
upgrades on deployed smart meters, and verify data from smart meters coming back to the
deployed Head End Systems. This system integrity will maintain security, and minimize cost
footprint of upgrades to the deployed smart meters.

A critical component of smart grid security is cryptography and key management, which will
ensure confidentiality, authenticity, and integrity of devices and communications within the
grid. Every cryptographic system needs strong protections for the top-level cryptographic
material used to provide the systems trust anchor. Typically, compromise of these top-level
keys results in complete or at least very broad system-wide compromise. This is where
hardware security modules offer significant trust value.




Securing the Smart Grid with SafeNet HSMs Whitepaper                                                   1
HSMs Role in the Smart Grid
Smart grid security solutions must be able to deploy on a large scale, with minimal effect
on applications. Securing the smart grid at the communication layer will require a system
to identify connected meters, to verify that these meters are configured correctly, and to
validate these meters for network access. The recommended solution for this authentication
process is an identity based model, often a Public Key Infrastructure (PKI). PKIs are ideal for
large-scale security deployments that require a high level of security with minimal impact
on performance. In a PKI environment, it is essential that private keys and certificates are
guarded with a reliable key management solution that protects against ever-evolving data
threats, such as hardware security modules (HSMs).

HSMs require secure interoperability with deployed Smart Grid infrastructures. For years,
various industries have relied on HSMs for securing the most sensitive PKI environments.
In fact, SFNT HSMs have a long standing history with large scale deployments in the
financial industry, working to define and implement industry standard based deployments,
and deployed to protect more financial transactions than any other HSM (more than a
trillion Dollars day) applications. SafeNet HSMs offer a cost-effective PKI solution for
easy deployment in smart grid infrastructures. With the SafeNet PKI Bundle, product and
maintenance costs are dramatically reduced by combining HSM functionality that usually
requires two or more HSMs into a single HSM “bundle” of modular functions. For CAs with
certificates and root keys, for example, rather than requiring separate HSMs for key generation
and key export for offline and online root CAs, the requirements can be fulfilled by one SafeNet
HSM that stores keys in hardware to achieve FIPS 140-2 L3 security. In addition, with high-
performance RSA, ECC, and AES cryptographic services, SafeNet HSMs are the only HSM in
the industry that can keep up with the performance requirements of even the most complex
advanced smart grid deployments.
                                                                                             Generation



                                                                          High Value
                                                                          Endpoints
               Suppliers

   Device ID                                    DR
     PKI                                        PKI



                               Provisioning
                                                              Head-End
                                    PKI
                                                              Messaging




                                Production
                               Code Signing
                                                                                                          HAN
       Utility Engineering



  Development
  Code Signing                           Utility Operations




                                                                                       PEV
End to End Security

HSMs Uses Related to Smart Grid Functions
Device Identities. A SafeNet HSM performs many vital security functions during the
manufacturing of smart grid devices. While issuing device identity certificates at the factory,
the SafeNet HSM can protect both a sub-ordinate CA and registration authority (RA) key
pairs, and secure signing key for any firmware or code loaded at manufacturing time. Hosting
a sub-ordinate CA at the each manufacturing site isolates the site both operationally and
cryptographically. HSM-supported RA functionality at the manufacturing site is important
as the HSM provides high entropy RNG seed material and FIPS 140-2 Level 3-certified key
generation for each device. The resource-constrained nature of smart grid devices makes

Securing the Smart Grid with SafeNet HSMs Whitepaper                                                            2
it critical to ensure devices are provisioned with FIPS Validated high entropy seed material.
Therefore, it is important to offer support for both CA and RA capabilities in the same HSM
Bundle—SafeNet HSMs support this through the PKI Bundle feature without compromising
security. Once manufactured with a trusted identity, a deployed device is expected to remain in
the field for a long period, during that period the HSM is used to securely sign all firmware or
Device ID updates in the field



                                                       Root CA
                          Vendor                                         DR CA Site




     Contract
   Manufacturers                                                 ……




              Utilities



Equipment vendors certifying device IDs at manufacturing


Device Provisioning. The same SafeNet HSM features and capabilities that support device
issuance, as described above, can also be used by utility companies to provision devices
within their infrastructures. In this case, deploying subordinate CAs at distribution centers,
where meters and other devices are accepted into the utility’s control. Of course, this may
be at a central office when provisioning is done during final installation at the site. Here, the
utility either re-certifies the key pair created by the device manufacturer or generates their
own completely new key pair and certificate. Device identities (certificates) are one part of
the provisioning, HSMs are also leveraged for firmware updates and code signing -an equally
important part of a secure end-to-end system. At this staging point, it is also critical to import
into each device a trust root database, informing the devices which head-end systems to trust.
Such device provisioning is required to maintain security, and minimize operational costs, in
the long life expectancy of smart meters once deployed.




Securing the Smart Grid with SafeNet HSMs Whitepaper                                                 3
Key
                                                                                     Manager



                                                                  Head
                                                                                               PKI                        Utility
                                                                  End



                             HSMs in
                          High Availability
         Device
                                                                                                           HSMs in
         Vendor                                                                                         High Availability



                                                 Device
                                                Manifests




                                                                   Device S/N
                                                                   Customer ID
                                                                                                     Create/Certify ID
                  Issue Device ID             Pre - provisioned                                      Issue Utility keys
                  Seed Device




                                                                                                                      End Point
                                                                         Installer




From factory to deployment


Device Re-Certification. It would certainly be tempting to issue device certificates with
very long lifecycles to avoid re-certification challenges altogether. However, this is not
practical given the realities of the infrastructure. Devices fail and are replaced, devices
require upgraded certificates, and the device firmware could get compromised—all leading
to potential point of weakness. Because of this, device certificates and firmware need to
have reasonable lifecycles and, therefore, utilities need the ability to re-certify the devices.
The same set of SafeNet HSMs used for device provisioning can support re-certification. Of
course, this is standard CA functionality but highlights another reason why utilities need their
own PKI.

Secure Message Processing. In smart grid infrastructures, the confidentiality, integrity, and
authenticity of messages are critical. Meters need to accept commands only from authentic
head-end systems, and the integrity and confidentiality of meter data must be assured. HSMs
are critical in protecting the high assurance trusted head-end system Identities. Endpoint
devices can use their certificates to sign and encrypt messages destined for the head-
end system. At the head-end messaging side, keys used to sign commands and messages
directed to the endpoint are obviously high-value keys. A compromise of these keys could also
compromise a substantial portion of the infrastructure. SafeNet HSM’s provide the security,
performance, and reliability, and cross vendor interoperability required to support this
function. SafeNet HSMs provide 5 9’s availability and high-performance RSA, ECC, and AES
cryptographic services capable of supporting a wide range of secure messaging architectures.
SafeNet HSMs are also capable of protecting very large quantities of keys, so it’s easy to
ensure keys are used for only one purpose and to devise schemes that cryptographically
segment a network into a large number of keys to provide further isolation within the
infrastructure.




Securing the Smart Grid with SafeNet HSMs Whitepaper                                                                                4
Distribution
                                                               Automation


     Meter Data
    Mgmt System       Head End




     HSMs in
                                                                      Meter Reading
  High Availability
                                                                                      Residential
                                                                                      Generation




                                                             Meter
                                                           Management

                                                                         Demand
                                                                        Management

                                           Pluggable
                                        Electric Vehicle
Digital envelope messaging

Device Authentication. Given the massive scale associated with many smart grid
deployments, utilities need to carefully manage their certificate policies. Without proper
segmentation and lifetimes, revocation schemes will quickly become overwhelmed.
Segmenting a utility’s equipment cryptographically as discussed above is one component
of the strategy. Another strategy is the use of On-Line Certificate Status responders.
Traditionally, a head-end system would check an OCSP responder directly while validating
a device’s certificate. However, a recommended approach has the end devices periodically
collecting their own certificate status. The devices cache the responses, and then supply it to
the head end with each message. This approach has the advantage of making the grid more
robust to equipment failures, but has the disadvantage of broadening the attack footprint.
A compromise of the OCSP responder key pair could then be used to supply fraudulent
certificate status. SafeNet HSMs provide the performance and FIPS 140-2 Level 3 protections-
protection of the OCSP responder private keys, offsetting the risk associated with caching
certificate statuses. The HSM partitioning capability means the utility does not need a
dedicated HSM to support the OCSP responder.




Securing the Smart Grid with SafeNet HSMs Whitepaper                                                5
DR
                                                                         PKI
         Device Vendor
                                                         Utility               Utility Root
                                                                                                    Federated
                                                                                                    Neighbors
                     ……
                                         Device ID




                                                                                  HSMs in
                                                                               High Availability



                                             Regional
                                             Sub Roots




                            West                                   Central                         East




Securing utilities segmented by domain

Infrastructure Trust Anchors. As utilities and smart grid vendors deploy PKIs within their
solutions, they often choose to set up their own private PKI, as opposed to basing it on a public
CA, however both are viable options. SafeNet HSMs are the market leader in both Enterprise
PKI, and hosted PKI Services options. An Enterprise PKI provides the policy controls and
assurance necessary that are not always available in a public CA. When deploying root CAs,
it is common to keep the root offline and use it under very strict controls on a rare basis. The
SafeNet HSM family includes small form factor, high security HSMs ideal for a root CA. These
devices are small enough to be stored in a safe, provide all the security demanded by root key
protection and, of course, interoperate with the rest of SafeNet’s HSM family.




Securing the Smart Grid with SafeNet HSMs Whitepaper                                                            6
Smart Grid
                                                                                                         Distributed
                                                                                                         Generation and Storage
                                             Utility                           Infrastructure             Consumer




                             Encrypted
                             Information




                                     PKI and Key
                                     Management




                                                        HSMs for
                                                        Root of Trust




HSMs are the secure root of trust for protecting the smart grid


Secure Management of Meters. Securely update the metering settings, configuration, security
credentials, and firmware of all devices in the smart grid system. Signing and encryption
of messages was discussed previously under the Secure Message Processing use case. In
addition, SafeNet HSMs can be used to protect code signing keys. These high-value keys are
used to sign firmware update images destined for endpoint devices. Compromise of these keys
can lead to fraudulent software loads on devices, so an HSM is a natural place to host these
keys.



       Utility Engineering




                                                                                                                  Secure over the air
                                                               Utility Operations                                  firmware update




Development
Code Signing
                               Production
                              Code Signing


                                                          HSMs in                                                                       HAN
                                                       High Availability

                 Suppliers                                                             HSMs in
                                                                                    High Availability

                                               Initial
                                             Production
                                              Firmware




                                                                           Provisioning
                                                                                                        Installer


Secure firmware management




Securing the Smart Grid with SafeNet HSMs Whitepaper                                                                                          7
HSMs Features Supporting Smart Grid Uses
Compliance and Certifications: SafeNet HSMs have been validated to FIPS 140-2 Level 3 and
Common Criteria EAL4+. They also facilitate compliance with PII, NIST, and NERC audits.

HSM Partitioning. A key challenge in a smart grid is the overall scale of the deployments. It is
not uncommon for a utility to have millions of endpoints. This leads to all sorts of challenges
in the cryptographic management system, including the impact of a key compromise
and management of the CRLs. One recommended strategy to address these issues is to
cryptographically segment the utility into regions or groups. Establishing subordinate
certificate authorities for each region or group limits the impact of any compromise. This
segmenting scheme also helps manage the size of CRLs since they will be issued on a per-
segment basis. SafeNet HSMs support this approach through a secure flexible partitioning
capability. A single physical HSM can be segmented into up to twenty logically separate
HSMs, referred to as partitions. This can be field upgradable to up to 100 partitions per HSM.
Keys stored within each partition are not just separated by thin access control lists, but
are fully cryptographically isolated from every other partition. Partitions can be mapped to
independent applications, assigned object limits per partition and, perhaps most importantly,
can be controlled by a separate group of users. This feature is not only useful to utilities,
but is also instrumental for device manufacturers. It provides the capability to run separate
subordinate CAs at the factory for each end customer, tailoring the manufacturing of devices
to specific customers. Through HSM partitioning, a device manufacturer can cryptographically
isolate its customers so that a compromise of one customer does not impact other customers.
It also enables the use of low-cost contract manufacturers without putting at risk security-
sensitive customers who may not be able to accept devices manufactured in certain countries.


 Meter Data                 Head End
                                                     Code Signing                 PKI Root   Key Manager
Mgmt System                 Messaging




                                                                      High Availability
                                   HSM                                      and
                                Root of Trust                         Load Balancing




                                                Automatic Key
           DR site                               Replication
          for HSMs




HSM partitioning for support of multiple applications in the smart grid


HSM Key Usage Controls. Smart grid devices can be manufactured all over the world and,
given the cost sensitivities; they are often manufactured in locations that have limited trust.
SafeNet HSMs provide key usage controls that allow a remote authority to manage how often
a particular key is used. With this capability, an organization can tightly control how many
devices each contract manufacturer produces—preventing the production of fraudulent
devices by manufacturing vendors.




Securing the Smart Grid with SafeNet HSMs Whitepaper                                                       8
Remote Activation. It is important to ensure the right people are in control of key material.
HSMs are not typically located in the same site as the highly trusted individuals responsible
for protecting an organization’s integrity. SafeNet’s Remote PED capability allows these highly
trusted individuals to control HSMs from anywhere in the world—saving the significant costs
of sending trust holders to multiple remote locations. SafeNet’s M of N capability ensures that
no single individual can compromise the keys within the HSM.

PKI Bundle. SafeNet’s PKI bundling allows a single set of HSMs to protect root and
intermediate CA keys with a pure keys-in-hardware approach, and provides secure key pair
generation and private key loading capability for smart meters, communication hubs, and
other grid devices. The PKI Bundle offering works with existing HSM infrastructure, offering a
flexible and cost effective option, configurable depending on the required deployment model.

ECC Integrated Encryption Standard. It’s becoming common to base smart grid secure
messaging systems on the ECC integrated encryption standard. Deploying ECIES with Suite
B curves provides high-assurance cryptography with minimal impact to the resources
within the constrained devices typical of the Smart Grid. ECC is being used as the secure
cryptographic messaging system between HSMs and other device end points in the Smart Grid
infrastructure. SafeNet’s HSMs provide high-performance ECDSA and ECDH cryptographic
services that enable solutions built around ECIES. Of course, SafeNet HSMs also offer high-
performance RSA and AES services – providing support for any cryptographic system.

Secure Shipping. While distributing HSMs to manufacturing or distribution sites, best
practices dictate the need to mitigate possible compromises during shipping. Working with
Multiple sites and potentially multiple operational owners of secure infrastructure devices
can be very operationally expensive – Secure Shipping allows units to be commissioned in a
secure central location, trusted during shipment, and trusted once deployed at distributed
target location, with secure features that can offer central control and trust while minimizing
operational costs. SafeNet HSMs provide a secure shipping capability that places the device
in a cryptographic locked down state. When a device arrives at its destination, the device’s
security authority is restored to an operational state and receives a cryptographic verification
of the device’s internal integrity.

True Keys In Hardware Management. SafeNet HSMs use a key management approach that
ensures keys are never stored anywhere except inside your HSMs. This is the only way you can
keep track, and audit of all copies of your keys. With SafeNet, every copy of a key always maps
to a physical entity—one of your HSMs. SafeNet HSMs ensure your High Assurance endpoints
within the Smart Grid infrastructure will be protected by an auditable trust anchor. And you
won’t be limited by the hardware—a single SafeNet HSM can hold up to more than a 100,000
ECC keys.

Availability, Reliability, and Scalability. The smart grid demands reliability and availability,
and SafeNet HSMs deliver. The devices are built with high quality components, including the
ability to replace failed power supplies and fans while in service. Furthermore, the HSMs
can be grouped into high availability N+1 clusters that provide linear performance scaling.
The clustering technology provides automatic key synchronization and allows for the re-
introduction of failed or new units without service interruption. SafeNet HSMs have been
evaluated by a 3rd party to offer 5 9’s availability uptime.




Contact Us: For all office locations and contact information, please visit www.safenet-inc.com
Follow Us: www.safenet-inc.com/connected
©2011 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet.
All other product names are trademarks of their respective owners. WP (EN)-03.11.11

Securing the Smart Grid with SafeNet HSMs Whitepaper                                                      9

Mais conteúdo relacionado

Mais procurados

Parking Managment Software presentation
Parking Managment Software presentationParking Managment Software presentation
Parking Managment Software presentationRahul Setia 🎯
 
Cp80 web binder-1
Cp80 web binder-1Cp80 web binder-1
Cp80 web binder-1NZJPG
 
Embedded devices - Big opportunities in tiny packages
Embedded devices - Big opportunities in tiny packagesEmbedded devices - Big opportunities in tiny packages
Embedded devices - Big opportunities in tiny packagesteam-WIBU
 
SmartTrust WIB 1.3
SmartTrust WIB 1.3SmartTrust WIB 1.3
SmartTrust WIB 1.3Julien SIMON
 
CellSIM OS Overview 1.0
CellSIM OS Overview 1.0CellSIM OS Overview 1.0
CellSIM OS Overview 1.0Vladimir Nagin
 
IP Centric Conferencing IP Centric Conferencing IP Centric ...
IP Centric Conferencing IP Centric Conferencing IP Centric ...IP Centric Conferencing IP Centric Conferencing IP Centric ...
IP Centric Conferencing IP Centric Conferencing IP Centric ...Videoguy
 
Triton brochure-new ft7000
Triton brochure-new ft7000Triton brochure-new ft7000
Triton brochure-new ft7000ATMGALARY
 
Cryptomach_En
Cryptomach_EnCryptomach_En
Cryptomach_Ende77
 
Hardware assisted Virtualization in Embedded
Hardware assisted Virtualization in EmbeddedHardware assisted Virtualization in Embedded
Hardware assisted Virtualization in EmbeddedThe Linux Foundation
 
Vindicator Overview
Vindicator OverviewVindicator Overview
Vindicator Overviewdp3b58
 
ACR100 product presentation by Advanced Card Systems Ltd.
ACR100 product presentation by Advanced Card Systems Ltd.ACR100 product presentation by Advanced Card Systems Ltd.
ACR100 product presentation by Advanced Card Systems Ltd.Advanced Card Systems Ltd.
 
Embedded Development Systems-WearberryTec-Linked
Embedded Development Systems-WearberryTec-LinkedEmbedded Development Systems-WearberryTec-Linked
Embedded Development Systems-WearberryTec-LinkedAnil Kumar
 
Meeting SEP 2.0 Compliance: Developing Power Aware Embedded Systems for the M...
Meeting SEP 2.0 Compliance: Developing Power Aware Embedded Systems for the M...Meeting SEP 2.0 Compliance: Developing Power Aware Embedded Systems for the M...
Meeting SEP 2.0 Compliance: Developing Power Aware Embedded Systems for the M...mentoresd
 

Mais procurados (20)

Parking Managment Software presentation
Parking Managment Software presentationParking Managment Software presentation
Parking Managment Software presentation
 
Cp80 web binder-1
Cp80 web binder-1Cp80 web binder-1
Cp80 web binder-1
 
Embedded devices - Big opportunities in tiny packages
Embedded devices - Big opportunities in tiny packagesEmbedded devices - Big opportunities in tiny packages
Embedded devices - Big opportunities in tiny packages
 
SmartTrust WIB 1.3
SmartTrust WIB 1.3SmartTrust WIB 1.3
SmartTrust WIB 1.3
 
CellSIM OS Overview 1.0
CellSIM OS Overview 1.0CellSIM OS Overview 1.0
CellSIM OS Overview 1.0
 
IP Centric Conferencing IP Centric Conferencing IP Centric ...
IP Centric Conferencing IP Centric Conferencing IP Centric ...IP Centric Conferencing IP Centric Conferencing IP Centric ...
IP Centric Conferencing IP Centric Conferencing IP Centric ...
 
Wireless Terminal
Wireless TerminalWireless Terminal
Wireless Terminal
 
SmartWorld- What we Do!
SmartWorld- What we Do!SmartWorld- What we Do!
SmartWorld- What we Do!
 
Rp15 rp40 rpk40_ds_en
Rp15 rp40 rpk40_ds_enRp15 rp40 rpk40_ds_en
Rp15 rp40 rpk40_ds_en
 
Triton brochure-new ft7000
Triton brochure-new ft7000Triton brochure-new ft7000
Triton brochure-new ft7000
 
E zcall all_spec_sheets
E zcall all_spec_sheetsE zcall all_spec_sheets
E zcall all_spec_sheets
 
Polycom
PolycomPolycom
Polycom
 
Cryptomach_En
Cryptomach_EnCryptomach_En
Cryptomach_En
 
Hardware assisted Virtualization in Embedded
Hardware assisted Virtualization in EmbeddedHardware assisted Virtualization in Embedded
Hardware assisted Virtualization in Embedded
 
Vindicator Overview
Vindicator OverviewVindicator Overview
Vindicator Overview
 
Iclass r series_c_ds_en
Iclass r series_c_ds_enIclass r series_c_ds_en
Iclass r series_c_ds_en
 
ACR100 product presentation by Advanced Card Systems Ltd.
ACR100 product presentation by Advanced Card Systems Ltd.ACR100 product presentation by Advanced Card Systems Ltd.
ACR100 product presentation by Advanced Card Systems Ltd.
 
Embedded Development Systems-WearberryTec-Linked
Embedded Development Systems-WearberryTec-LinkedEmbedded Development Systems-WearberryTec-Linked
Embedded Development Systems-WearberryTec-Linked
 
Meeting SEP 2.0 Compliance: Developing Power Aware Embedded Systems for the M...
Meeting SEP 2.0 Compliance: Developing Power Aware Embedded Systems for the M...Meeting SEP 2.0 Compliance: Developing Power Aware Embedded Systems for the M...
Meeting SEP 2.0 Compliance: Developing Power Aware Embedded Systems for the M...
 
4gfxs
4gfxs4gfxs
4gfxs
 

Semelhante a Securing the Smart Grid with SafeNet HSMs

Signify Software Tokens
Signify Software TokensSignify Software Tokens
Signify Software Tokenspjpallen
 
Signify Software Tokens
Signify Software TokensSignify Software Tokens
Signify Software Tokenskate_holden
 
SmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketSmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketOKsystem
 
SmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseSmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseOKsystem
 
Rsa Secur Id From Signify
Rsa Secur Id From SignifyRsa Secur Id From Signify
Rsa Secur Id From Signifykate_holden
 
Rsa Secur Id From Signify
Rsa Secur Id From SignifyRsa Secur Id From Signify
Rsa Secur Id From Signifypjpallen
 
PIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environmentPIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environmentRamesh Nagappan
 
Securing Digital Identities and Transactions in the Cloud Security Guide
Securing Digital Identities and Transactions in the Cloud Security GuideSecuring Digital Identities and Transactions in the Cloud Security Guide
Securing Digital Identities and Transactions in the Cloud Security GuideSafeNet
 
10695 sidtfa sb_0210
10695 sidtfa sb_021010695 sidtfa sb_0210
10695 sidtfa sb_0210Hai Nguyen
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep securityTrend Micro
 
WISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationWISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationCreus Moreira Carlos
 
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
PKI in DevOps: How to Deploy Certificate Automation within CI/CDPKI in DevOps: How to Deploy Certificate Automation within CI/CD
PKI in DevOps: How to Deploy Certificate Automation within CI/CDDevOps.com
 
The Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdfThe Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdfSavinder Puri
 
SmartCard Forum 2008 - Gemalto
SmartCard Forum 2008 - GemaltoSmartCard Forum 2008 - Gemalto
SmartCard Forum 2008 - GemaltoOKsystem
 
2p Mta Data Sheet V1.7 X1a
2p Mta Data Sheet V1.7 X1a2p Mta Data Sheet V1.7 X1a
2p Mta Data Sheet V1.7 X1aalwayson
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsHoneywell
 
App viewx cert+
App viewx  cert+App viewx  cert+
App viewx cert+AppViewX
 

Semelhante a Securing the Smart Grid with SafeNet HSMs (20)

Key2 share moosecon
Key2 share mooseconKey2 share moosecon
Key2 share moosecon
 
Signify Software Tokens
Signify Software TokensSignify Software Tokens
Signify Software Tokens
 
Signify Software Tokens
Signify Software TokensSignify Software Tokens
Signify Software Tokens
 
SmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketSmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication market
 
SmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseSmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterprise
 
Rsa Secur Id From Signify
Rsa Secur Id From SignifyRsa Secur Id From Signify
Rsa Secur Id From Signify
 
Rsa Secur Id From Signify
Rsa Secur Id From SignifyRsa Secur Id From Signify
Rsa Secur Id From Signify
 
PIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environmentPIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environment
 
Securing Digital Identities and Transactions in the Cloud Security Guide
Securing Digital Identities and Transactions in the Cloud Security GuideSecuring Digital Identities and Transactions in the Cloud Security Guide
Securing Digital Identities and Transactions in the Cloud Security Guide
 
10695 sidtfa sb_0210
10695 sidtfa sb_021010695 sidtfa sb_0210
10695 sidtfa sb_0210
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
WISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationWISekey IoT Technologies Presentation
WISekey IoT Technologies Presentation
 
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
PKI in DevOps: How to Deploy Certificate Automation within CI/CDPKI in DevOps: How to Deploy Certificate Automation within CI/CD
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
 
The Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdfThe Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdf
 
SmartCard Forum 2008 - Gemalto
SmartCard Forum 2008 - GemaltoSmartCard Forum 2008 - Gemalto
SmartCard Forum 2008 - Gemalto
 
Beam datasheet final 7 28-12
Beam datasheet final 7 28-12Beam datasheet final 7 28-12
Beam datasheet final 7 28-12
 
2p Mta Data Sheet V1.7 X1a
2p Mta Data Sheet V1.7 X1a2p Mta Data Sheet V1.7 X1a
2p Mta Data Sheet V1.7 X1a
 
PKI-In-A-Box
PKI-In-A-BoxPKI-In-A-Box
PKI-In-A-Box
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 
App viewx cert+
App viewx  cert+App viewx  cert+
App viewx cert+
 

Mais de SafeNet

eIDAS Reference Guide
eIDAS Reference GuideeIDAS Reference Guide
eIDAS Reference GuideSafeNet
 
Whose Cloud is It Anyway - Data Security in the Cloud
Whose Cloud is It Anyway - Data Security in the CloudWhose Cloud is It Anyway - Data Security in the Cloud
Whose Cloud is It Anyway - Data Security in the CloudSafeNet
 
Whose Cloud Is It Anyway: Exploring Data Security Ownership and Control
Whose Cloud Is It Anyway: Exploring Data Security Ownership and ControlWhose Cloud Is It Anyway: Exploring Data Security Ownership and Control
Whose Cloud Is It Anyway: Exploring Data Security Ownership and ControlSafeNet
 
Cyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative WorldCyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative WorldSafeNet
 
Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility
Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and MobilityNot Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility
Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and MobilitySafeNet
 
ProtectV - Data Security for the Cloud
ProtectV - Data Security for the CloudProtectV - Data Security for the Cloud
ProtectV - Data Security for the CloudSafeNet
 
Cloud Monetization: A Step-by-Step Guide to Optimizing Your SaaS Business Model
Cloud Monetization: A Step-by-Step Guide to Optimizing Your SaaS Business ModelCloud Monetization: A Step-by-Step Guide to Optimizing Your SaaS Business Model
Cloud Monetization: A Step-by-Step Guide to Optimizing Your SaaS Business ModelSafeNet
 
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...SafeNet
 
A Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsA Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsSafeNet
 
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...SafeNet
 
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...SafeNet
 
Cloud Computing and the Federal Government: Maximizing Trust Supporting the M...
Cloud Computing and the Federal Government: Maximizing Trust Supporting the M...Cloud Computing and the Federal Government: Maximizing Trust Supporting the M...
Cloud Computing and the Federal Government: Maximizing Trust Supporting the M...SafeNet
 
Hardware Security Modules: Critical to Information Risk Management
Hardware Security Modules: Critical to Information Risk ManagementHardware Security Modules: Critical to Information Risk Management
Hardware Security Modules: Critical to Information Risk ManagementSafeNet
 
Strong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling BusinessStrong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling BusinessSafeNet
 
Building Trust into eInvoicing: Key Requirements and Strategies
Building Trust into eInvoicing: Key Requirements and StrategiesBuilding Trust into eInvoicing: Key Requirements and Strategies
Building Trust into eInvoicing: Key Requirements and StrategiesSafeNet
 
A Question of Trust: How Service Providers Can Attract More Customers by Deli...
A Question of Trust: How Service Providers Can Attract More Customers by Deli...A Question of Trust: How Service Providers Can Attract More Customers by Deli...
A Question of Trust: How Service Providers Can Attract More Customers by Deli...SafeNet
 
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNetPayment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNetSafeNet
 
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...SafeNet
 
SafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server EncryptionSafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server EncryptionSafeNet
 
Building Trust into DNS: Key Strategies
Building Trust into DNS: Key StrategiesBuilding Trust into DNS: Key Strategies
Building Trust into DNS: Key StrategiesSafeNet
 

Mais de SafeNet (20)

eIDAS Reference Guide
eIDAS Reference GuideeIDAS Reference Guide
eIDAS Reference Guide
 
Whose Cloud is It Anyway - Data Security in the Cloud
Whose Cloud is It Anyway - Data Security in the CloudWhose Cloud is It Anyway - Data Security in the Cloud
Whose Cloud is It Anyway - Data Security in the Cloud
 
Whose Cloud Is It Anyway: Exploring Data Security Ownership and Control
Whose Cloud Is It Anyway: Exploring Data Security Ownership and ControlWhose Cloud Is It Anyway: Exploring Data Security Ownership and Control
Whose Cloud Is It Anyway: Exploring Data Security Ownership and Control
 
Cyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative WorldCyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative World
 
Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility
Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and MobilityNot Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility
Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility
 
ProtectV - Data Security for the Cloud
ProtectV - Data Security for the CloudProtectV - Data Security for the Cloud
ProtectV - Data Security for the Cloud
 
Cloud Monetization: A Step-by-Step Guide to Optimizing Your SaaS Business Model
Cloud Monetization: A Step-by-Step Guide to Optimizing Your SaaS Business ModelCloud Monetization: A Step-by-Step Guide to Optimizing Your SaaS Business Model
Cloud Monetization: A Step-by-Step Guide to Optimizing Your SaaS Business Model
 
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
 
A Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsA Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise Applications
 
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
 
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
 
Cloud Computing and the Federal Government: Maximizing Trust Supporting the M...
Cloud Computing and the Federal Government: Maximizing Trust Supporting the M...Cloud Computing and the Federal Government: Maximizing Trust Supporting the M...
Cloud Computing and the Federal Government: Maximizing Trust Supporting the M...
 
Hardware Security Modules: Critical to Information Risk Management
Hardware Security Modules: Critical to Information Risk ManagementHardware Security Modules: Critical to Information Risk Management
Hardware Security Modules: Critical to Information Risk Management
 
Strong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling BusinessStrong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling Business
 
Building Trust into eInvoicing: Key Requirements and Strategies
Building Trust into eInvoicing: Key Requirements and StrategiesBuilding Trust into eInvoicing: Key Requirements and Strategies
Building Trust into eInvoicing: Key Requirements and Strategies
 
A Question of Trust: How Service Providers Can Attract More Customers by Deli...
A Question of Trust: How Service Providers Can Attract More Customers by Deli...A Question of Trust: How Service Providers Can Attract More Customers by Deli...
A Question of Trust: How Service Providers Can Attract More Customers by Deli...
 
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNetPayment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
 
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
 
SafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server EncryptionSafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server Encryption
 
Building Trust into DNS: Key Strategies
Building Trust into DNS: Key StrategiesBuilding Trust into DNS: Key Strategies
Building Trust into DNS: Key Strategies
 

Securing the Smart Grid with SafeNet HSMs

  • 1. Securing the Smart Grid with SafeNet HSMs SafeNet WH WHITEPAPER WHITEPAPER Overview The smart grid is the first major effort to modernize an energy infrastructure that has remained largely unchanged over the past several decades. The smart grid creates a network of links between customers and utility companies that provides increased insight into and management of energy consumption, cost, and workload across the entire energy grid. At a time when energy utilities play an increasingly important part of our everyday lives, smart grid technologies introduce new security challenges that must be addressed. Implementing a smart grid without proper security could result in grid instability, loss of private information, utility fraud, and unauthorized access to energy consumption data. Building a trusted smart grid will require robust security solutions, and interoperability from multiple vendors, that can be easily deployed at the communication and application layers of the smart grid infrastructure. In the first phase of smart grid deployments, traditional meters will be replaced with meters that can be read remotely, called smart meters. The Advance Metering Infrastructure (AMI) is the second phase of the smart grid and uses smart meters to enable a two-way channel of communication between meters and the utility company. Securing this two-way line of communication is imperative, and will require a solution for Head End Trusted Identity authentication and Smart Meter device attestation to ensure the integrity of the grid. Leveraging this integrity will allow utilities to both; issue trusted firmware upgrades on deployed smart meters, and verify data from smart meters coming back to the deployed Head End Systems. This system integrity will maintain security, and minimize cost footprint of upgrades to the deployed smart meters. A critical component of smart grid security is cryptography and key management, which will ensure confidentiality, authenticity, and integrity of devices and communications within the grid. Every cryptographic system needs strong protections for the top-level cryptographic material used to provide the systems trust anchor. Typically, compromise of these top-level keys results in complete or at least very broad system-wide compromise. This is where hardware security modules offer significant trust value. Securing the Smart Grid with SafeNet HSMs Whitepaper 1
  • 2. HSMs Role in the Smart Grid Smart grid security solutions must be able to deploy on a large scale, with minimal effect on applications. Securing the smart grid at the communication layer will require a system to identify connected meters, to verify that these meters are configured correctly, and to validate these meters for network access. The recommended solution for this authentication process is an identity based model, often a Public Key Infrastructure (PKI). PKIs are ideal for large-scale security deployments that require a high level of security with minimal impact on performance. In a PKI environment, it is essential that private keys and certificates are guarded with a reliable key management solution that protects against ever-evolving data threats, such as hardware security modules (HSMs). HSMs require secure interoperability with deployed Smart Grid infrastructures. For years, various industries have relied on HSMs for securing the most sensitive PKI environments. In fact, SFNT HSMs have a long standing history with large scale deployments in the financial industry, working to define and implement industry standard based deployments, and deployed to protect more financial transactions than any other HSM (more than a trillion Dollars day) applications. SafeNet HSMs offer a cost-effective PKI solution for easy deployment in smart grid infrastructures. With the SafeNet PKI Bundle, product and maintenance costs are dramatically reduced by combining HSM functionality that usually requires two or more HSMs into a single HSM “bundle” of modular functions. For CAs with certificates and root keys, for example, rather than requiring separate HSMs for key generation and key export for offline and online root CAs, the requirements can be fulfilled by one SafeNet HSM that stores keys in hardware to achieve FIPS 140-2 L3 security. In addition, with high- performance RSA, ECC, and AES cryptographic services, SafeNet HSMs are the only HSM in the industry that can keep up with the performance requirements of even the most complex advanced smart grid deployments. Generation High Value Endpoints Suppliers Device ID DR PKI PKI Provisioning Head-End PKI Messaging Production Code Signing HAN Utility Engineering Development Code Signing Utility Operations PEV End to End Security HSMs Uses Related to Smart Grid Functions Device Identities. A SafeNet HSM performs many vital security functions during the manufacturing of smart grid devices. While issuing device identity certificates at the factory, the SafeNet HSM can protect both a sub-ordinate CA and registration authority (RA) key pairs, and secure signing key for any firmware or code loaded at manufacturing time. Hosting a sub-ordinate CA at the each manufacturing site isolates the site both operationally and cryptographically. HSM-supported RA functionality at the manufacturing site is important as the HSM provides high entropy RNG seed material and FIPS 140-2 Level 3-certified key generation for each device. The resource-constrained nature of smart grid devices makes Securing the Smart Grid with SafeNet HSMs Whitepaper 2
  • 3. it critical to ensure devices are provisioned with FIPS Validated high entropy seed material. Therefore, it is important to offer support for both CA and RA capabilities in the same HSM Bundle—SafeNet HSMs support this through the PKI Bundle feature without compromising security. Once manufactured with a trusted identity, a deployed device is expected to remain in the field for a long period, during that period the HSM is used to securely sign all firmware or Device ID updates in the field Root CA Vendor DR CA Site Contract Manufacturers …… Utilities Equipment vendors certifying device IDs at manufacturing Device Provisioning. The same SafeNet HSM features and capabilities that support device issuance, as described above, can also be used by utility companies to provision devices within their infrastructures. In this case, deploying subordinate CAs at distribution centers, where meters and other devices are accepted into the utility’s control. Of course, this may be at a central office when provisioning is done during final installation at the site. Here, the utility either re-certifies the key pair created by the device manufacturer or generates their own completely new key pair and certificate. Device identities (certificates) are one part of the provisioning, HSMs are also leveraged for firmware updates and code signing -an equally important part of a secure end-to-end system. At this staging point, it is also critical to import into each device a trust root database, informing the devices which head-end systems to trust. Such device provisioning is required to maintain security, and minimize operational costs, in the long life expectancy of smart meters once deployed. Securing the Smart Grid with SafeNet HSMs Whitepaper 3
  • 4. Key Manager Head PKI Utility End HSMs in High Availability Device HSMs in Vendor High Availability Device Manifests Device S/N Customer ID Create/Certify ID Issue Device ID Pre - provisioned Issue Utility keys Seed Device End Point Installer From factory to deployment Device Re-Certification. It would certainly be tempting to issue device certificates with very long lifecycles to avoid re-certification challenges altogether. However, this is not practical given the realities of the infrastructure. Devices fail and are replaced, devices require upgraded certificates, and the device firmware could get compromised—all leading to potential point of weakness. Because of this, device certificates and firmware need to have reasonable lifecycles and, therefore, utilities need the ability to re-certify the devices. The same set of SafeNet HSMs used for device provisioning can support re-certification. Of course, this is standard CA functionality but highlights another reason why utilities need their own PKI. Secure Message Processing. In smart grid infrastructures, the confidentiality, integrity, and authenticity of messages are critical. Meters need to accept commands only from authentic head-end systems, and the integrity and confidentiality of meter data must be assured. HSMs are critical in protecting the high assurance trusted head-end system Identities. Endpoint devices can use their certificates to sign and encrypt messages destined for the head- end system. At the head-end messaging side, keys used to sign commands and messages directed to the endpoint are obviously high-value keys. A compromise of these keys could also compromise a substantial portion of the infrastructure. SafeNet HSM’s provide the security, performance, and reliability, and cross vendor interoperability required to support this function. SafeNet HSMs provide 5 9’s availability and high-performance RSA, ECC, and AES cryptographic services capable of supporting a wide range of secure messaging architectures. SafeNet HSMs are also capable of protecting very large quantities of keys, so it’s easy to ensure keys are used for only one purpose and to devise schemes that cryptographically segment a network into a large number of keys to provide further isolation within the infrastructure. Securing the Smart Grid with SafeNet HSMs Whitepaper 4
  • 5. Distribution Automation Meter Data Mgmt System Head End HSMs in Meter Reading High Availability Residential Generation Meter Management Demand Management Pluggable Electric Vehicle Digital envelope messaging Device Authentication. Given the massive scale associated with many smart grid deployments, utilities need to carefully manage their certificate policies. Without proper segmentation and lifetimes, revocation schemes will quickly become overwhelmed. Segmenting a utility’s equipment cryptographically as discussed above is one component of the strategy. Another strategy is the use of On-Line Certificate Status responders. Traditionally, a head-end system would check an OCSP responder directly while validating a device’s certificate. However, a recommended approach has the end devices periodically collecting their own certificate status. The devices cache the responses, and then supply it to the head end with each message. This approach has the advantage of making the grid more robust to equipment failures, but has the disadvantage of broadening the attack footprint. A compromise of the OCSP responder key pair could then be used to supply fraudulent certificate status. SafeNet HSMs provide the performance and FIPS 140-2 Level 3 protections- protection of the OCSP responder private keys, offsetting the risk associated with caching certificate statuses. The HSM partitioning capability means the utility does not need a dedicated HSM to support the OCSP responder. Securing the Smart Grid with SafeNet HSMs Whitepaper 5
  • 6. DR PKI Device Vendor Utility Utility Root Federated Neighbors …… Device ID HSMs in High Availability Regional Sub Roots West Central East Securing utilities segmented by domain Infrastructure Trust Anchors. As utilities and smart grid vendors deploy PKIs within their solutions, they often choose to set up their own private PKI, as opposed to basing it on a public CA, however both are viable options. SafeNet HSMs are the market leader in both Enterprise PKI, and hosted PKI Services options. An Enterprise PKI provides the policy controls and assurance necessary that are not always available in a public CA. When deploying root CAs, it is common to keep the root offline and use it under very strict controls on a rare basis. The SafeNet HSM family includes small form factor, high security HSMs ideal for a root CA. These devices are small enough to be stored in a safe, provide all the security demanded by root key protection and, of course, interoperate with the rest of SafeNet’s HSM family. Securing the Smart Grid with SafeNet HSMs Whitepaper 6
  • 7. Smart Grid Distributed Generation and Storage Utility Infrastructure Consumer Encrypted Information PKI and Key Management HSMs for Root of Trust HSMs are the secure root of trust for protecting the smart grid Secure Management of Meters. Securely update the metering settings, configuration, security credentials, and firmware of all devices in the smart grid system. Signing and encryption of messages was discussed previously under the Secure Message Processing use case. In addition, SafeNet HSMs can be used to protect code signing keys. These high-value keys are used to sign firmware update images destined for endpoint devices. Compromise of these keys can lead to fraudulent software loads on devices, so an HSM is a natural place to host these keys. Utility Engineering Secure over the air Utility Operations firmware update Development Code Signing Production Code Signing HSMs in HAN High Availability Suppliers HSMs in High Availability Initial Production Firmware Provisioning Installer Secure firmware management Securing the Smart Grid with SafeNet HSMs Whitepaper 7
  • 8. HSMs Features Supporting Smart Grid Uses Compliance and Certifications: SafeNet HSMs have been validated to FIPS 140-2 Level 3 and Common Criteria EAL4+. They also facilitate compliance with PII, NIST, and NERC audits. HSM Partitioning. A key challenge in a smart grid is the overall scale of the deployments. It is not uncommon for a utility to have millions of endpoints. This leads to all sorts of challenges in the cryptographic management system, including the impact of a key compromise and management of the CRLs. One recommended strategy to address these issues is to cryptographically segment the utility into regions or groups. Establishing subordinate certificate authorities for each region or group limits the impact of any compromise. This segmenting scheme also helps manage the size of CRLs since they will be issued on a per- segment basis. SafeNet HSMs support this approach through a secure flexible partitioning capability. A single physical HSM can be segmented into up to twenty logically separate HSMs, referred to as partitions. This can be field upgradable to up to 100 partitions per HSM. Keys stored within each partition are not just separated by thin access control lists, but are fully cryptographically isolated from every other partition. Partitions can be mapped to independent applications, assigned object limits per partition and, perhaps most importantly, can be controlled by a separate group of users. This feature is not only useful to utilities, but is also instrumental for device manufacturers. It provides the capability to run separate subordinate CAs at the factory for each end customer, tailoring the manufacturing of devices to specific customers. Through HSM partitioning, a device manufacturer can cryptographically isolate its customers so that a compromise of one customer does not impact other customers. It also enables the use of low-cost contract manufacturers without putting at risk security- sensitive customers who may not be able to accept devices manufactured in certain countries. Meter Data Head End Code Signing PKI Root Key Manager Mgmt System Messaging High Availability HSM and Root of Trust Load Balancing Automatic Key DR site Replication for HSMs HSM partitioning for support of multiple applications in the smart grid HSM Key Usage Controls. Smart grid devices can be manufactured all over the world and, given the cost sensitivities; they are often manufactured in locations that have limited trust. SafeNet HSMs provide key usage controls that allow a remote authority to manage how often a particular key is used. With this capability, an organization can tightly control how many devices each contract manufacturer produces—preventing the production of fraudulent devices by manufacturing vendors. Securing the Smart Grid with SafeNet HSMs Whitepaper 8
  • 9. Remote Activation. It is important to ensure the right people are in control of key material. HSMs are not typically located in the same site as the highly trusted individuals responsible for protecting an organization’s integrity. SafeNet’s Remote PED capability allows these highly trusted individuals to control HSMs from anywhere in the world—saving the significant costs of sending trust holders to multiple remote locations. SafeNet’s M of N capability ensures that no single individual can compromise the keys within the HSM. PKI Bundle. SafeNet’s PKI bundling allows a single set of HSMs to protect root and intermediate CA keys with a pure keys-in-hardware approach, and provides secure key pair generation and private key loading capability for smart meters, communication hubs, and other grid devices. The PKI Bundle offering works with existing HSM infrastructure, offering a flexible and cost effective option, configurable depending on the required deployment model. ECC Integrated Encryption Standard. It’s becoming common to base smart grid secure messaging systems on the ECC integrated encryption standard. Deploying ECIES with Suite B curves provides high-assurance cryptography with minimal impact to the resources within the constrained devices typical of the Smart Grid. ECC is being used as the secure cryptographic messaging system between HSMs and other device end points in the Smart Grid infrastructure. SafeNet’s HSMs provide high-performance ECDSA and ECDH cryptographic services that enable solutions built around ECIES. Of course, SafeNet HSMs also offer high- performance RSA and AES services – providing support for any cryptographic system. Secure Shipping. While distributing HSMs to manufacturing or distribution sites, best practices dictate the need to mitigate possible compromises during shipping. Working with Multiple sites and potentially multiple operational owners of secure infrastructure devices can be very operationally expensive – Secure Shipping allows units to be commissioned in a secure central location, trusted during shipment, and trusted once deployed at distributed target location, with secure features that can offer central control and trust while minimizing operational costs. SafeNet HSMs provide a secure shipping capability that places the device in a cryptographic locked down state. When a device arrives at its destination, the device’s security authority is restored to an operational state and receives a cryptographic verification of the device’s internal integrity. True Keys In Hardware Management. SafeNet HSMs use a key management approach that ensures keys are never stored anywhere except inside your HSMs. This is the only way you can keep track, and audit of all copies of your keys. With SafeNet, every copy of a key always maps to a physical entity—one of your HSMs. SafeNet HSMs ensure your High Assurance endpoints within the Smart Grid infrastructure will be protected by an auditable trust anchor. And you won’t be limited by the hardware—a single SafeNet HSM can hold up to more than a 100,000 ECC keys. Availability, Reliability, and Scalability. The smart grid demands reliability and availability, and SafeNet HSMs deliver. The devices are built with high quality components, including the ability to replace failed power supplies and fans while in service. Furthermore, the HSMs can be grouped into high availability N+1 clusters that provide linear performance scaling. The clustering technology provides automatic key synchronization and allows for the re- introduction of failed or new units without service interruption. SafeNet HSMs have been evaluated by a 3rd party to offer 5 9’s availability uptime. Contact Us: For all office locations and contact information, please visit www.safenet-inc.com Follow Us: www.safenet-inc.com/connected ©2011 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet. All other product names are trademarks of their respective owners. WP (EN)-03.11.11 Securing the Smart Grid with SafeNet HSMs Whitepaper 9