2-4 F60 FEEDER PROTECTION SYSTEM – INSTRUCTION MANUALSECURITY CHAPTER 2: PRODUCT DESCRIPTION2When entering a settings or command password via EnerVista or any serial interface, the user must enter thecorresponding connection password. If the connection is to the back of the F60, the remote password must be used. If theconnection is to the RS232 port of the front panel, the local password applies.Password access events are logged in the Event Recorder.2.2.0.3 CyberSentry securityCyberSentry embedded security is available using software options that provide advanced security services. When anoption is purchased, the basic password security is disabled automatically.CyberSentry provides security through the following features:• An Authentication, Authorization, Accounting (AAA) Remote Authentication Dial-In User Service (RADIUS) client that iscentrally managed, enables user attribution, provides accounting of all user activities, and uses secure standards-based strong cryptography for authentication and credential protection• A Role-Based Access Control (RBAC) system that provides a permission model that allows access to UR deviceoperations and configurations based on specific roles and individual user accounts configured on the AAA server (thatis, Administrator, Supervisor, Engineer, Operator, Observer roles)• Security event reporting through the Syslog protocol for supporting Security Information Event Management (SIEM)systems for centralized cybersecurity monitoring• Strong encryption of all access and configuration network messages between the EnerVista software and UR devicesusing the Secure Shell (SSH) protocol, the Advanced Encryption Standard (AES), and 128-bit keys in Galois CounterMode (GCM) as specified in the U.S. National Security Agency Suite B extension for SSH and approved by the NationalInstitute of Standards and Technology (NIST) FIPS-140-2 standards for cryptographic systemsCyberSentry user rolesCyberSentry user roles (Administrator, Engineer, Operator, Supervisor, Observer) limit the levels of access to various URdevice functions. This means that the EnerVista software allows for access to functionality based on the user’s logged inrole.Example: Administrative functions can be segmented away from common operator functions, or engineering type access,all of which are defined by separate roles (see figure) so that access of UR devices by multiple personnel within asubstation is allowed.One role of one type is allowed to be logged in at a time. For example, one Operator can be logged in but not a secondOperator at the same time. This prevents subsets of settings from being changed at the same time.Figure 2-2: CyberSentry user rolesThe table lists user roles and their corresponding capabilities.