14.08.2013 Views

PI System and NERC CIP Security PART II - OSIsoft

PI System and NERC CIP Security PART II - OSIsoft

PI System and NERC CIP Security PART II - OSIsoft

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Part I Deployment Patterns<br />

• <strong>PI</strong> <strong>and</strong> <strong>NERC</strong> <strong>CIP</strong> Essentials (May 7th,2009)<br />

http://www.osisoft.com/resources/webinars/Webinars_On_Dem<strong>and</strong>.aspx<br />

<strong>CIP</strong>-002 Critical<br />

Cyber Assets<br />

<strong>PI</strong> Interface Node<br />

or<br />

OEM with <strong>PI</strong>-to-<strong>PI</strong><br />

Data Only Conduit<br />

(No User Connections)<br />

Originator<br />

ESP<br />

10 © Copyright 2010, <strong>OSIsoft</strong> LLC All rights Reserved.<br />

DMZ<br />

<strong>PI</strong> Server<br />

Business User<br />

Domain<br />

Desktops <strong>and</strong><br />

Data Access<br />

Servers

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!