The Vendor is required to provide intelligent electronic device (IEDs) management software and engineering support to establish and configure an expandable software solution on hydro's network.
- IEDs shall include but not be limited to: protection relays, programmable logic controllers (plc), remote terminal units (RTU), digital fault recorders (DFR), microprocessor-based meters, and voltage regulator controllers.
- Technical requirements
1. Secure remote access
• The solution shall provide secure remote maintenance and engineering access to IEDs.
• The solution shall provide role-based access control ("RBAC") on a per device basis.
• Access permissions shall be configurable by user role and device group.
• The solution shall maintain detailed, tamper evident audit logs of user
2. Password management
• The solution shall provide centralized devices.
• The solution shall allow automated passwords in accordance with configurable security policies.
• The solution shall enforce password complexity requirements and maintain a password
3. Configuration management
• The solution shall support automated scanning of IEDs to retrieve configuration files, device settings, and software and firmware version information.
• The solution shall perform baseline comparisons and detect any unauthorized or unplanned configuration changes, generating alerts upon detection.
• The current device configurations shall be stored within the solution to enable rollback and disaster recovery.
4. Event and DFR file retrieval
• The solution shall support automated scanning of IEDs to retrieve event files and digital fault recorder ("DFR") files.
• Retrieved stored in event their and original, DFR files unmodified shall be engineering analysis and compliance purposes.
5. Email notifications
• The solution shall support configurable email notifications to designated users or user groups
6. Virtual machine deployment and redundancy
• The solution shall support high availability and redundancy within the virtual infrastructure, including operation in a redundant or active passive failover configuration, to ensure continued system availability in the event of a VM or host failure.
7. Logging and monitoring
• The solution shall provide comprehensive logging and monitoring capabilities, including configurable dashboards and reporting tools for device access, system events, and user activities, etc.
• Configurable retention policies and shall be exportable in standard formats (e.g., csv, syslog).
Set up free email alerts and get notified when new government bids, tenders and procurement opportunities match your industry and location. Choose daily or weekly delivery.