Connexus Energy Secures SCADA, ICS, and IT Environments with a Single Integrated Solution
The Check Point 1200R delivered ruggedization, comprehensive security, centralized visibility, and compliance best practices in one product. Its footprint is so small that it easily fit in every environment we needed to place it. -Melissa Kjendle, Cybersecurity and Senior Infrastructure Analyst
Based in Ramsey, Minnesota, Connexus Energy is Minnesota’s largest electric cooperative, providing electricity and services to member residents and businesses.
Standing Up Under Challenging Conditions
Connexus Energy serves more than 130,000 members across seven counties north of Minneapolis. Energy companies have become significant targets for cyberattackers and malicious nation-states that aim to disrupt vital services. Utilities have relied on Supervisory Control and Data Acquisition (SCADA) and Industrial Control System (ICS) networks for decades to control and monitor devices and data across their distribution networks. As smart grids, smart devices, and Internet of Things (IoT) devices become widely adopted, traditional SCADA and ICS systems often lack the same level of security controls needed to defend against sophisticated cyberattackers who can exploit their vulnerabilities to create widespread damage.
“We have some corporate devices that connect to an external network and we didn’t want them to introduce vulnerabilities to a network where there might also be servers,” says Arcopedico’s Information Technology Department Manager, Serafim Couto.
“Our SCADA system is our bread and butter,” said Jon Rono, Group Leader for Technology Services at Connexus Energy. “We wanted to make sure that it delivers power safely, securely, and without interruption in the face of increasingly malicious cyberattacks. We began looking for a better way to secure it and be alerted to any communication issues that might compromise service.”
Connexus Energy used many different security solutions from multiple vendors, such as Cisco, McAfee, and Palo Alto Networks. Each solution had specific management requirements, which consumed a lot of the team’s technical resources. Individual security team members responsible for cybersecurity, help desk, endpoint security, network security, and server security had to parse logs from different systems to identify issues and respond accurately.
“We wanted one management solution for all of our security needs,” said Rono. “We needed a single pane of glass that would work across all of our systems and streamline visibility.”
Finding a solution for protecting the SCADA system while delivering centralized visibility across the entire security environment was a challenge. Secure gateways for the SCADA system have to operate in extreme physical conditions. They must fit within constrained spaces or locations that are difficult to access. Environments are harsh, with dust, sub-zero temperatures in Minnesota winters, and high heat and humidity in summer months. Many of Connexus Energy’s existing security solutions were not ruggedized at all or only partially ruggedized. Simply keeping everything operating—and trying to make them work together—was consuming a lot of time without delivering the desired results.
Time for a Complete Change
The security team conducted a full RFP to evaluate solutions from existing vendors, as well as Check Point solutions. Only Check Point delivered the single-pane-of-glass management needed with a suite of integrated solutions and additional capabilities, such as historical logging and unified policy management.
Connexus Energy deployed Check Point 15400 Next Generation Security Gateways with high availability for its core security gateway. Check Point 5600 Security Appliances protect the SCADA network and Check Point 3200 Next Generation Security Gateways are deployed at multiple remote sites. Finally, Connexus Energy deployed Check Point 1200R rugged appliances with next-generation threat prevention for its ICS at all substations. A solid- state appliance, the Check Point 1200R protects all critical operational systems.
In addition to security protection, Check Point solutions provide Connexus Energy with a Compliance Software Blade. Based on a library of more than 300 security best practices, the Compliance Software Blade highlights configuration errors, identifies security weaknesses, and validates changes in real time. Not only does it enable real-time security policy audits, it ensures proper configuration and function of Firewall, Antivirus, IPS and Data Loss Prevention protections.
“The Check Point 1200R delivered ruggedization, comprehensive security, and centralized visibility in one product,” said Melissa Kjendle, Cybersecurity and Senior Infrastructure Analyst. “Its footprint is so small that it easily fit in every environment we needed to place it.”
Reliability Reclaims Time
In the past, the security team continually had to reboot substation security systems when they would go offline. The Check Point 1200R operates regardless of environmental conditions, which saves time for the team.
“The Check Point 1200R products have delivered tremendous reliability,” said Kjendle. “That’s huge, because we’re not spending time driving to remote sites to reboot systems. Even though those systems run over a relatively slow network, they give us a reliable tunnel and logs, which we never had before.”
End-to-End Productivity Gains
“Check Point delivered solutions that our entire security team uses, enabling them to manage security for everything down to individual devices and files,” said Rono. “I’m able to use our entire range of expertise much more effectively.”
Team members can view everything in the Check Point Unified Security Management console. In the past, team members had to orchestrate different views across multiple systems and try to correlate meaningful data. With Check Point they can see at a glance how many endpoints are compliant, ensure that all systems are updated, address any risks that have appeared, and push unified policy out to hundreds of devices in the field. Unified logging features accelerate troubleshooting and threat investigation. For example, Connexus Energy had incidents during which more than 30 endpoints were not responding. Within a week of deploying Check Point, that number was reduced to four. Check Point combined gateway and endpoint protections also enabled Connexus Energy to completely replace its previous desktop security solution.
“Bringing security and management under Check Point changed our focus from reacting to becoming proactive,” said Rono. “I don’t have to use resources to do all of the work that Check Point does automatically for us. One solution did it all and delivered higher value.”
Strategic Incident Response Planning
Board of Directors had launched an initiative to increase cyber awareness across all levels of the organization. When the company implemented Check Point solutions, it also engaged the Check Point Incident Response team to help them develop an incident response plan.
The Check Point team first analyzed the company’s existing strategies and policies. They shared best practices and documentation with the Connexus Energy security team and presented security best practices for employees.
They also met with the executive team to conduct a Check Point Services Table Top exercise, designed to help the company structure a comprehensive cyber incident response plan. Using a ransomware attack as a hypothetical situation, Check Point provided a response framework based on best practices, which Connexus Energy used to map out its incident response procedures and processes for stopping, mitigating, and remediating a cyber attack.
“Check Point not only delivered outstanding security solutions and effective management capabilities,” said Rono, “they have helped our entire company build a stronger security posture. That’s the kind of engagement we wanted to protect our systems, operations, and customers.”