Pipeline Project Technical Documents Control and Compliance

Author(s):  
Carolina Pecanha ◽  
Terry Jansen ◽  
Jon Lind ◽  
Tatiana Fontes

This paper presents an overview of Pipeline Project Technical Documents, along with Control Room Management and Compliance Issues, Challenges and Processes in the Oil & Gas Industry. It will be based on the work that the authors have developed between 2010 and 2015. With an overwhelming number of standards, norms, and best practices, operational and security requirements needs to be well implemented and documented. Any compliance issues have the potential to cause serious repercussions to an organization as an incident or an audit failure could result in significant financial loss. This review is especially critical to the industry as it highlights the advantages of taking a broad approach to obtain and maintain compliance in today’s Oil & Gas regulatory environment. The focus will be on pipeline monitoring regulations - Department of Transportation (DOT) - Pipeline and Hazardous Materials Safety Administration (PHMSA) and American Petroleum Institute (API) recommended practices: API 1164 (Supervisory Control and Data Acquisition System - SCADA Security), API 1165 (SCADA Displays), API 1167 (SCADA Alarm Management) and API 1168 (Control Room Management). Regarding Supervisory Control and Data Acquisition Systems (SCADA) security, this includes not only IT infrastructure such as computers and network related appliances, but also other equipment such as programmable logic controllers (PLCs) and Remote Terminal Units (RTUs) depending on the system architecture. The cyber-security threat has become a real issue related to critical infrastructure protection, and physical or human-risk issues. Understanding the systems vulnerabilities that could impact the availability of the control system and the facilities it controls is key. On the Control Room Management side, current PHMSA regulatory framework, a human factors plan is required to ensure control systems match human capabilities and limitations. Pipeline operators are since required to inform controllers of their roles and responsibilities, and carefully assess the implications on each of the following SCADA areas: alarm management, documentation and procedures, HMI displays, shift handover, fatigue management, change management and training. Therefore with the pipeline industry facing increasing regulatory scrutiny and ever-increasing cyber-threats, it’s more important than ever for companies to improve their plans, documentation, and processes. Companies around the globe are converging and prioritizing Security and Control, establishing long-term strategy to meet and sustain regulatory compliance to remain competitive, increase efficiency and productivity. The authors, working jointly with the client and industry leaders, have developed compliance methods and procedures to deal with these challenges. After applying these methods and procedures, the observed results were translated into smoother transitions to a centralized SCADA control center, which not only meet regulatory safety guidelines and PHMSA regulation, but also added value and efficiency to the control center operations.

Author(s):  
M. Agus Syamsul Arifin ◽  
Susanto Susanto ◽  
Deris Stiawan ◽  
Mohd Yazid Idris ◽  
Rahmat Budiarto

<p>Supervisory control and data acquisition (SCADA) has an important role in communication between devices in strategic industries such as power plant grid/network. Besides, the SCADA system is now open to any external heterogeneous networks to facilitate monitoring of industrial equipment, but this causes a new vulnerability in the SCADA network system. Any disruption on the SCADA system will give rise to a dangerous impact on industrial devices. Therefore, deep research and development of reliable intrusion detection system (IDS) for SCADA system/network is required. Via a thorough literature review, this paper firstly discusses current security issues of SCADA system and look closely benchmark dataset and SCADA security holes, followed by SCADA traffic anomaly recognition using artificial intelligence techniques and visual traffic monitoring system. Then, touches on the encryption technique suitable for the SCADA network. In the end, this paper gives the trend of SCADA IDS in the future and provides a proposed model to generate a reliable IDS, this model is proposed based on the investigation of previous researches. This paper focuses on SCADA systems that use IEC 60870-5-104 (IEC 104) protocol and distributed network protocol version 3 (DNP3) protocol as many SCADA systems use these two protocols.</p>


2014 ◽  
Vol 933 ◽  
pp. 789-793 ◽  
Author(s):  
Wei Jin Zhuang ◽  
Hai Bing Zhu ◽  
Jia Qing Zhao ◽  
Yong Gang Zhang ◽  
Ming Yang Sun

This paper proposes the construction mode of a two-level distributed alarming system, in which alarms are coordinately processed by substations and control center. In substation side, we classify alarms into several grades according to the degree of their importance and send the extracted key alarms to control center, thus reduce the amount of alarm passing and ensure the transmission reliability and speed; meanwhile, we carry out alarm verification and pretreatment through information redundancy to validate alarm correctness. In control center side, we integrate the data of ordinary Supervisory Control and Data Acquisition (SCADA) and the alarms received directly from substations, and carry out comprehensive fault reasoning and correctness verification. In order to illustrate the feasibility of the substation-control center distributed alarming system, the overall structure, substation smart alarm (SSA), control center smart alarm (CCSA) and cooked data transmission of this construction mode will be discussed in detail.


Author(s):  
Gabriel Escalona Franco

Resumen La Domótica aplicada a inmuebles como los hoteles es una disciplina que se pone en práctica cada día más en las sociedades actuales, para lograr mejores servicios de gestión energética, seguridad, bienestar y comunicación en estas instalaciones. El uso de los Sistemas de Control Supervisorio y Adquisición de Datos, SCADA, es uno de los pilares fundamentales en la aplicación de las técnicas modernas de automatización en el área de los edificios inteligentes. Una de las principales funcionalidades que debe brindar un SCADA es el Sistema de Alarmas. El presente trabajo propone la definición de las alarmas con sus atributos del módulo de Gestión de Alarmas para un SCADA aplicado a la domótica en un hotel. Palabras ClaveAtributos de Alarmas, Gestión de Alarmas, SCADA, Domótica en hoteles.   Abstract Domotics (Home Automation) applied to buildings such as hotels is a discipline that is put into practice every day in today's society, for better energy management services, safety, welfare and communication in these facilities. The use of Supervisory Control Systems and Data Acquisition, SCADA, is one of the cornerstones in the application of modern techniques in the field of automation of intelligent buildings. One of the main features that should make a SCADA is the Alarms System. This paper proposes the definition of the attributes of alarms Alarm Management Module for SCADA automation applied to a hotel.Keywords Alarm Attributes, Alarm Management, SCADA, Domotics in hotels.


2013 ◽  
Vol 33 (2) ◽  
pp. 567-570
Author(s):  
Zeping YANG ◽  
Deqiang LIU ◽  
Qian WANG ◽  
Qiangming XIANG

Sign in / Sign up

Export Citation Format

Share Document