信息安全研究 ›› 2024, Vol. 10 ›› Issue (5): 481-.

• 技术应用 • 上一篇    

电力监控网安设备策略统一管理体系及其实践

冯陈佳朱江朱寅严威李雪妍张宇袁倩倩   

  1. (国网上海市电力公司市北供电公司上海200072)
  • 出版日期:2024-05-20 发布日期:2024-05-15
  • 通讯作者: 冯陈佳 硕士,工程师.主要研究方向为电力监控系统网络安全. chenjiafeng1995@foxmail.com
  • 作者简介:冯陈佳 硕士,工程师.主要研究方向为电力监控系统网络安全. chenjiafeng1995@foxmail.com 朱江 硕士,高级工程师.主要研究方向为电力监控系统网络安全、电力系统及其自动化、电网安全运行稳定性. zhu.jiang@sh.sgcc.com.cn 朱寅 工程师.主要研究方向为电力监控系统网络安全. zhu.yin@sh.sgcc.com.cn 严威 工程师.主要研究方向为电力监控系统网络安全. yanw@sh.sgcc.com.cn 李雪妍 助理工程师.主要研究方向为电力监控系统网络安全. li_xy@sh.sgcc.com.cn 张宇 硕士,工程师.主要研究方向为电力监控系统网络安全. zhangyu_@sh.sgcc.com.cn 袁倩倩 硕士,助理工程师.主要研究方向为电力监控系统网络安全. yuanqq@sh.sgcc.com.cn

Unified Management Architecture and Practice of Power Monitoring Network Security Equipment

Feng Chenjia, Zhu Jiang, Zhu Yin, Yan Wei, Li Xueyan, Zhang Yu, and Yuan Qianqian   

  1. (Shibei Power Supply Company, State Grid Shanghai Electric Power Company, Shanghai 200072)
  • Online:2024-05-20 Published:2024-05-15

摘要: 随着电力监控系统建设不断完善,部署在其中的网络、安全设备和业务应用场景不断增多,相关的网络边界安全策略也愈加繁杂,往往跨越多个供应商、多个设备厂商以及多个物理位置,运维难度大,依赖于“人”以及传统“手动”的安全管理方式准确率低,极大增加了公司重要业务和核心数据资产遭受网络攻击的风险.因此,迫切需要加强网络边界安全策略管理体系的建设.结合电力监控系统的网络安全设备特性,提出一套基于网络安全设备资产分析、电力监控系统路由拓扑分析以及信息安全设备策略分析的安全边界策略统一管理体系,并开发了相应软件平台,在资产探测、路由策略采集、防护策略采集的基础上进行网络安全策略计算,实现了安全边界的策略统一管理.研究以及实践部署表明,该体系可以有效提升运维效率和系统安全性,对于电力监控系统具有较好的针对性、实用性和先进性.


关键词: 电力监控系统, 安全边界策略, 统一管理体系, 风险监测, 策略优化

Abstract: With the continuous improvement of  power monitoring system, the deployment  of networks, security devices, and business applications within them has been increasing.  Consequently, the associated network boundary security strategies have become increasingly complex, often spanning multiple suppliers, equipment manufacturers, and physical locations.This complexity leads to challenges for operation and maintenance, and reliance on manual security management methods results in low accuracy, significantly increasing risk of network attacks on the company’s important business and core data assets. Therefore, there is an urgent need to enhance the construction of a network boundary security strategy management system. This article proposes a unified management system for security boundary strategies based on network security device asset analysis, power monitoring system routing topology analysis, and information security device strategy analysis, taking into account the characteristics of network security devices in power monitoring systems. Corresponding software platforms have been developed to calculate network security strategies based on asset detection, routing strategy collection, and protection strategy collection, which have implemented unified policy management of security boundaries. The research and practical deployment have shown that the system effectively improves operational efficiency and system security, demonstrating good relevance, practicality and advancement for the power monitoring system.


Key words: power monitoring system, Security Boundary Strategy, Unified Management Architecture, risk monitoring, strategy optimization

中图分类号: