Всемирный контактный поиск

Making cyber security

A certainty.


  • Security by design (Consideration of IT security even in the design phase of the ISM®)
  • External audits in accordance with BDEW
  • Secure development process
  • Involvement in standard and committee work


Security is the top priority in energy supply. This is especially true for the area of cyber security. That is why this was one of the most important aspects in the development of ETOS®. We offer a state-of-the-art solution – from the product architecture to support.


Product architecture

  • Pre-configured, integrated firewall in accordance with IEC 62443
    Availability through network segmentation and reduction of the attack area
  • SSL/TLS (HTTPS) encryption (256-bit) in accordance with BSI TR 02102
    Validation of authenticity, integrity and confidentiality of the communication (RSA and ECC in accordance with NIST)
  • Security log for saving security-related changes
    Login, logout, changing values and settings, import, export, configuration changes, event acknowledgement, etc.
  • "Role-Based Access Control (RBAC)" role-based user management in accordance with IEC 62351
    Integrity and confidentiality of the data on the device
    Need-to-know-principle and separation of duties
  • Password management in accordance with NERC-CIP
    Password complexity
    Encrypted password storage in accordance with FIPS-PUB 180-4
  • Defense in depth
    Hardened and rugged operating system (VxWorks 5)
    Interface control (Ability to deactivate hardware interfaces that are not necessary)
    Communication switch (Forwarding communication, redundancy (RSTP, PRP))
  • Integrity of firmware, software and data
    Each version of the ISM® firmware is created using cryptographic methods and checked for integrity during installation. This ensures that only released software versions can be used as protection against manipulation


  • Explicit customer interface for IT security
    Product security management by the CERT team
    Proactive management of security flaws
    Recommendations and support in case of IT security questions

Digitalization of transformers

Transformer Monitoring

статьи в IN·SIGHT