Boundary Protection for Transmission Facilities
By Jeff Pack, POWER Engineers
This paper discusses the requirements and cybersecurity architecture and controls associated with protecting the network boundary for transmission facilities. Most of these cybersecurity controls are commonly deployed, but boundary protection is still the leading issue identified by the National Cybersecurity and Communications Integration Center’s (NCCIC) Industrial Control Systems Cyber Emergency Readiness Team (ICS-CERT) . This paper explores why boundary protection is difficult to perform correctly and consistently, as well as areas to check when assessing a boundary protection system. Several examples of boundary protection devices and configurations are presented, analyzed and updated to address issues.