cybersecurity
Microsegmentation + Zero Trust Architecture for Secure Edge Based Battery Access


PROTOCOL-AGNOSTIC ISOLATION
Remote users connect via encrypted HTTPS/443-only sessions, while industrial protocols (Modbus, DNP3) remain confined within trusted zones. Operational data is transmitted as encrypted streams, eliminating direct exposure of raw OT traffic to untrusted networks.

ZERO TRUST ENFORCEMENT
Every session requires continuous multi-factor authentication, with granular role-based permissions reviewed in real time by our real-time Security Operations Center (SOC). No “always-on” access exists-connections terminate automatically after 15 minutes of inactivity.

GATEWAY AS SECURITY BOUNDARY
Jinko's solution offers a secure gateway which acts as a protocol breakpoint, inspecting and sanitizing all data flows between untrusted (IT/Internet) and trusted (OT) zones. Industrial protocols never traverse the boundary; instead, operators interact with an encrypted proxy interface to the BMS/DAS for warranty and maintenance purposes.
Security Operations Center (SOC)

Integrated Cyber Assurance
Area | Description |
---|---|
IEC 62443-2-4 program scope | Security requirements for IACS service providers |
Main Objective | Ensure secure integration, maintenance, and support of battery storage systems |
Key Requirements, Approach | Documented policies, risk management, lifecycle security, personnel training |
Alignment | Supports battery storage systems and battery management system component security |
Certification | Enables assessment and certification of battery storage service provider security programs |
Dedicated BESS Deployment focused Cyber Team
The BESS deployment security personnel for Jinko US’s battery energy storage operations features a dedicated SOC Manager with decades of US government experience overseeing all security activities and coordinating with customers BESS Site Safety Manager responsible for facility operations. Supporting these leaders is a specialized Jinko US security team comprising Network Analysts, who design and maintain the plant’s security architecture; Lead Security Analysts, who serve as first responders to cybersecurity threats or incidents; and Threat Hunters, who focus on identifying and mitigating emerging threats. This layered approach ensures comprehensive protection and rapid response to security challenges across the facility.

Product Incident Response Management
All product-related cybersecurity incidents and vulnerabilities should be promptly reported so they can be addressed swiftly and effectively.
Prompt reporting enables our team to quickly investigate and resolve potential threats, helping to protect customers, maintain operational reliability, and strengthen the overall security of our products.
To report an incident or vulnerability, please contact: cyberna@jinkosolar.com
Please include the following information to help us process your submission efficiently:
Please include the following details in your report:

REPORTER INFORMATION
Your name, organization, and contact details (or specify if anonymity is preferred)

VULNERABILITY DETAILS
Type of vulnerability and estimated severity

IMPACT ASSESSMENT
Potential consequences if exploited

REPRODUCTION STEPS
Clear instructions to verify the issue, including proof of concept if available