StationGuard Brochure ENU
StationGuard Brochure ENU
StationGuard Brochure ENU
Certificate Number:
BSI-DSZ-BSZ-0006-2023
Valid to: 27.09.2025
Updates to: 27.09.2025
The StationGuard Solution
Visibility
Vulnerability Management
Asset Inventory
Functional Monitoring
2
StationGuard Sensors
Our innovative allow list (whitelist) approach
minimizes false alarms and enhances collaboration
between IT and OT engineers by providing actionable
alarm messages based on a deep understanding of
power utility automation system events.
p. 4–11
Functional Monitoring
StationGuard not only detects cyber threats and
prohibited actions in utility automation and SCADA
system networks; it also records and logs critical
events, such as device failures, configuration errors,
interoperability issues, and network problems for later
analysis.
p. 12–13
p. 14–21
Platform Options
Choose from three different platform options to
meet your specific needs. Whether mobile, virtual, or
stationary, we offer support to help you find the right
platform for your application.
p. 22–23
3
IT security in the power grid
Attack points
circumventing firewalls:
Remote access Testing PCs
for maintenance connected to
and control. the station bus.
4
Firewalls do not provide in-depth protection Defense-in-Depth
There are many ways of circumventing a firewall. Many sites The Defense-in-Depth principle, as set out in IEC 62443,
employ remote access for retrieving fault records or for not only recommends applying measures that „harden the
maintenance. These connections provide a route by which shell“ but also introduces several layers and fallback levels
malware can find its way into a substation’s devices. that help provide a zoned level of security.
Maintenance and testing PCs provide another attack One such measure is the provision of security updates for
vector. These PCs are connected to the entire network IEDs. However, the effort and cost involved are high, so
or directly connected to individual protection or control updates cannot always be installed quickly enough. Not
devices. being able to update Legacy devices is common if the
vendor is not providing updates.
Therefore, these systems must be monitored to ensure
that attacks are detected early, and their consequences are
minimized.
5
How Intrusion Detection Systems (IDS) work
6
StationGuard learns all the
communication paths by
3. The StationGuard approach
Power utility automation and SCADA systems are
deterministic, which means their behavior is clearly
evaluating the SCL files.
defined, even in exceptional situations, e.g., during
protection events.
By building on this feature, a completely new approach
can be applied for detecting cyber-attacks.
Since it knows the function of each device, StationGuard
creates a system model of the entire automation system
and then compares every single network packet with this
live system model. This corresponds with an allow
list (whitelist) approach, where all allowable behavior
is described and everything deviating from it sets off
an alarm. Completely new types of attacks can also be
detected when using this approach.
StationGuard’s allow list goes into detail at a granular
level. Even the signal values in the messages are evalu-
ated using the system model. This not only allows it to
detect cyber threats and prohibited activity, but issues in
the automation and SCADA functions can be detected as
well. This is why we named the combination of intrusion
detection and functional monitoring „Functional Secu-
rity Monitoring“. We’ve been researching this approach
since 2010. Combining power system and security
knowledge is what makes StationGuard so effective.
Benefits
> Low number of false alarms, as
StationGuard knows the processes in
energy systems
> Alarms are understandable without
protocol knowledge
> Reliable detection of unauthorized
actions
7
The allow list (whitelist) approach of StationGuard
8
MMS, IEC 60870-5-104 and DNP3
communication
StationGuard is aware of which data points control which
functions. For example, the same command may be used to
control a circuit breaker, a tap changer and to change the
test mode setting of a device. The effect in the substation
is markedly different in each case. StationGuard is able
to make this distinction and knows which device should
control what and in which situation. These fine-tuned
permissions are documented and can be reviewed in
StationGuard.
Other protocols
StationGuard performs deep packet inspections on
dozens of power systems and classical IT protocols. By
using this, StationGuard not only detects encoding viola-
tions in these protocols, but is also aware if port numbers
e.g., of remote connections are hijacked by unexpected
applications (port spoofing).
Benefits
> Every single packet is compared to the
system model (allow list)
> Functional and communication
problems are detected in addition to
cyber threats
> StationGuard supervises the secure
function of all communication in the
substation and SCADA system
9
Faster responses with understandable alert messages
To set up, operate, and maintain conventional Intrusion Detection Systems (IDS), IT specialists and automation and control
engineers are required. Both types of specialists must be on call around the clock to help analyze the cause of alarms. The
costs involved with this are unacceptable for many utilities. StationGuard offers utilities a new, low maintenance alternative.
StationGuard is aware of the typical functions in substations and how the IT equipment, such as engineering PCs and test
PCs, are expected to be used. As all this information is automatically available, StationGuard is set up quickly and ready to
protect the network – no learning phase is required.
Clearly understandable
alarm messages
attributed to events in
the plant.
10
Normal operation Maintenance and commissioning
StationGuard analyzes all communication and knows Testing and maintenance is important and must not result
precisely which information may or may not be transmitted in any false alarms, yet a high level of security still has to be
at any given moment. Which devices are allowed to be ensured. To satisfy these requirements, StationGuard offers
active now? Which control commands are permitted and a „maintenance mode“. Maintenance and testing activity
does the response to them make sense? Which measured will only be permitted when this mode is activated.
values are being transmitted? Is the timing of the messages In many attack scenarios, vulnerabilities in vendor protocol
correct? This enables any likely problems with the IEDs or or web interfaces are exploited. Therefore, StationGuard
the network to be detected at an early stage, even before can issue an alarm if communication with manufacturer’s
they fail. tools occurs during normal operation and only permit it
This comprehensive functional and security monitoring is while in maintenance mode. The engineering PCs and test
unique and offers advantages that go well beyond those sets can be registered in StationGuard before they are
normally expected of an intrusion detection system (IDS). used so that authorized tasks can be performed without
The graphical user interface allows protection and control triggering false alarms.
engineers to quickly get to grips with StationGuard, as it This has no adverse impact on the security while testing: If
matches the documentation diagrams and the event view an infected testing PC communicates suspiciously, an alarm
in the station controllers. will be raised.
Advantages
> Alarms are understood by IT
security officers as well as SCADA &
protection engineers
> Fewer false alarms during routine
testing while maintaining a high
level of security
> No learning phase, immediate
protection
11
Detecting malfunctions and configuration errors
Functional Monitoring
StationGuard not only detects cyber threats and prohibited actions in utility automation and SCADA networks; it also
notifies you of critical events and malfunctions, such as failures of intelligent electronic devices (IEDs), configuration errors,
and network issues, and then logs them for later analysis. In addition, all file transfers are logged with file names, for
example, when disturbance records are downloaded.
In the following, there are some examples of functional issues that can be detected:
Configuration errors
If a device’s configuration is incorrect, StationGuard raises an alarm. It will detect mistakes immediately.
StationGuard continuously compares the IEC 61850 configuration parameters with the specifications of your prior
input or SCL files.
Typical misconfigurations like incorrect VLAN configuration, erroneous GOOSE parameters, or incorrect datasets are
detected.
12
Network and time synchronization problems
StationGuard detects slowed down (GOOSE) message transmissions and failed time synchronization.
StationGuard measures the transmission time of messages by comparing sender timestamps with packet arrival
timestamps. An alarm is triggered if this measurement reveals an error.
In most cases time synchronization issues cause such alarms. Using the same method, StationGuard also detects
if an IED’s response time is slowed down due to overload, a denial-of-service-attack, or due to the network being
unreasonably slow.
StationGuard detects and records failed control commands and interoperability issues.
StationGuard logs all IEC 60870-5-104 and MMS control commands. If a command fails, it creates warnings and
records network traces for later analysis. Furthermore, it detects protocol and interoperability issues in MMS, IEC
60870-5-104, DNP3, Modbus, Synchrophasor, and many more.
13
Alert analysis and threat investigation
14
Control Center SOC
Data Center
Purdue Level
Grid Level
StationGuard Sensor GridOps
3
RBX1
Station Level
Purdue Level
2
RBX1 RBX1
Purdue Level
Bay Level
1
16
2 Station network diagram
Diving one level deeper allows you to observe the networks using our unique view which com-
bines aspects of the Purdue Model diagram with single line diagrams well known to protection
and SCADA engineers. This combination enables optimal collaboration between both worlds.
These diagrams can be generated automatically from SCL engineering files. They can also be
improved manually and plant documentation spreadsheets can even be imported to improve
equipment names.
17
Automatically collect data for enhanced vulnerability detection
An asset inventory database with precise details about each Receive detailed information about your assets
protection and control IED is crucial to successful vulner-
Using this aggregation of passively observed information
ability and risk management. The more information you
with imported engineering files and spreadsheets, gives
have about each asset, the more accurate your vulnerability
you the most precise asset information possible. It includes
analysis and prioritization will be. Our StationGuard solution
engineering descriptions, type, hardware configuration,
supports you throughout the entire workflow from creating
product ordering codes, and firmware version.
and updating the asset inventory to vulnerability and risk
management. You can export the inventory and import it into asset and
configuration management systems, ERP systems, and
StationGuard automatically discovers all assets in the
spreadsheets. By importing spreadsheets (CSV-files) into
network, creates a global asset inventory database, and
StationGuard, you can close the loop and synchronize it
alerts you to new assets in your networks. It collects
with any other source. You can optionally enable Station-
accurate information for each asset by combining network
Guard’s Active Asset Identification to automatically read
analysis with imported SCL engineering files and plant
device configuration and firmware version information on
documentation spreadsheets. The asset inventory can be
the network.
updated by importing information from external sources.
As a result, our StationGuard solution compiles an asset
inventory with in-depth information from multiple sources
to provide the best possible foundation for vulnerability
management.
18
Vulnerability Management
Security regulations for critical systems, such as the EU NIS directive and NERC-CIP, stipulate vulnerability management as a
vital aspect of any cybersecurity program for the power grid. Only with an optimal vulnerability management in place, you
can determine and implement an appropriate mitigation strategy by mapping officially known vulnerabilities to your system
infrastructure.
You can only protect, what you see
Our vulnerabilities dashboard gives you a better understanding of the network’s critical points and your overall security
vulnerability exposure. It also informs users about recently discovered vulnerabilities by continuously auditing these assets
for any potential threats. The more information users have about each asset, the more accurate the detection, analysis, and
prioritization will be.
A decisive advantage: Users may only look at the vulnerabilities which are relevant to them. It only takes a few clicks – using
OMICRON’s custom-built vulnerability database for power grid automation and network devices. The system quickly
identifies which assets are vulnerable to a particular CVE (Common Vulnerability Exposure).
Additionally, the compilation of comprehensive and meaningful reports for management, auditors, and regulators for
assisting in risk prioritization and mitigation is simpler than ever before. Stakeholders will welcome increased visibility and
the system’s highlighted security posture and risk.
19
Beneficial integrations and partnerships
The StationGuard Solution provides plugins for ticketing Simple integration into your network
systems, like ServiceNow, for automatically creating work
An effortless way to integrate StationGuard sensors into
tickets that respond to IDS alerts. By importing the asset
legacy systems is by using the binary outputs from the
inventory from StationGuard, tickets are automatically
RBX1 platform. The presence of an unacknowledged alarm
assigned to the engineer responsible for the asset or site
is signaled in the binary outputs, which can be wired to
involved in the alert.
an RTU (Remote Terminal Units) and integrated into the
SCADA signal list.
Access control for protecting data and networks
Integration into LDAP/ ActiveDirectory can be configured Alternatively, our easy-to-understand alert messages
via the central management system. It has different user can also be forwarded using the syslog protocol. Various
roles for controlling access to the various functions for plugins are available for integrating StationGuard sensors
viewing and configuring your StationGuard instances. For into security information and event management (SIEM)
example, only authorized users can change the configura- systems and ticketing systems of different vendors.
tion or activate the Maintenance Mode. If all networks are
down, StationGuard sensors can also be accessed individu-
ally using the StationGuard local client user interface.
Insider threats can be reduced and even eliminated using
RBAC (Role-Base Access Control). It improves the security
of the system and networks. It also enhances efficiency by
minimizing the need for password changes and human
error in privilege assignment.
ServiceNow integration
FortiSIEM integration
20
Our Partners for secure power grids
Technology partners
Fortinet
Fortinet’s Open Fabric Ecosystem provides you with integrated solutions
for comprehensive end-to-end security.
Splunk
Splunk captures, indexes, and correlates real-time data in a searchable
repository from which it generates graphs, reports, alerts, interfaces, and
visualizations.
ALSEC
Their cybersecurity experts support you with proficient and individual
services: Starting with training, the development of processes and
evaluation of products to their implementation.
https://www.omicronenergy.com/en/cybersecurity-partners/
21
Three different platform options
The StationGuard sensors are available on three different platforms. Depending on your needs, you can choose to use
StationGuard on the RBX or MBX hardware platform or on a virtual machine (VBX). Since all of StationGuard’s intelligence is
contained in the sensors, the sensors run autonomously - a permanent connection to a central server is not required.
The RBX comes with unmatched security features like full disk
encryption, an ISO/IEC 11889 compliant cryptoprocessor chip
and a customized secure (UEFI BIOS). It also includes Binary
outputs that easily integrate IDS alerts into the SCADA signal list.
Like the hardware platforms, the virtual variant can also run
completely independently, recording and logging events even
without a permanent connection to the central server. Please
note that on virtual machines, there may be technical limitations
when it comes to functional monitoring of process bus
applications, compared with StationGuard on the RBX and MBX
platforms.
Performance
Secure cryptoprocessor
Binary outputs
Passive cooling
8 outputs in 2
potential groups Quad-core processor
250 V / 8 A with 16 GB ECC memory
512 GB storage
(~450 GB free)
Network Supply
4x 1 Gbit/s SFP + RJ45 as combo ports 100 ... 240 V DC and AC (±10%)
4x 1 Gbit/s SFP Display 48 ... 60 V DC (± 10 %)
Supports hardware time stamping for IEEE 1588 PTP 1x HDMI (redundant supply opt.)
USB Network
4x USB 3.0 1x 1 Gbit/s RJ45
Supports hardware time
stamping for IEEE 1588 PTP
23
We create customer value through ...
Quality
We always want you to be able to rely on our
testing solutions. This is why our products
have been developed with experience, passion
and care and are continually setting ground-
breaking standards in our industry sector.
ISO 9001
72
hours burn-in tests
before delivery
More than
30.000
automated software ISO 9001
tests executed 24/7 TÜV & EMAS
ISO 14001
OHSAS 18001
70%
of time
More than in set-up and operation
200
developers keep
our solutions up-to-date
I need...
15%
of our annual sales is
reinvested in research and
development
We create customer value through ...
Support
When rapid assistance is required, we’re
always right at your side. Our highly-qualified
technicians are always reachable to ensure
minimized downtimes.
25
offices worldwide for local
contact and support
300
???
Free
access
to thousands of technical
papers and application notes
Extensive expertise in
commissioning and
consulting
OMICRON is an international company that works passionately on ideas for making electric power systems safe and
reliable. Our pioneering solutions are designed to meet our industry’s current and future challenges. We always go
the extra mile to empower our customers: we react to their needs, provide extraordinary local support, and share
our expertise.
Within the OMICRON group, we research and develop innovative technologies for all fields in electric power
systems. When it comes to electrical testing for medium- and high-voltage equipment, protection testing, digital
substation testing solutions, and cybersecurity solutions, customers all over the world trust in the accuracy, speed,
and quality of our user-friendly solutions.
Founded in 1984, OMICRON draws on their decades of profound expertise in the field of electric power engineering.
A dedicated team of more than 1.100 employees provides solutions with 24/7 support at 24 locations worldwide
and serves customers in more than 170 countries.