AMI Cyber Security Incident Response Guidelines

Size: px
Start display at page:

Download "AMI Cyber Security Incident Response Guidelines"

Transcription

1 AMI Cyber Security Incident Response Guidelines

2

3 AMI Cyber Security Incident Response Guidelines Technical Update, December 2012 EPRI Project Manager G. Rasche ELECTRIC POWER RESEARCH INSTITUTE 3420 Hillview Avenue, Palo Alto, California PO Box 10412, Palo Alto, California USA

4 DISCLAIMER OF WARRANTIES AND LIMITATION OF LIABILITIES THIS DOCUMENT WAS PREPARED BY THE ORGANIZATION(S) NAMED BELOW AS AN ACCOUNT OF WORK SPONSORED OR COSPONSORED BY THE ELECTRIC POWER RESEARCH INSTITUTE, INC. (EPRI). NEITHER EPRI, ANY MEMBER OF EPRI, ANY COSPONSOR, THE ORGANIZATION(S) BELOW, NOR ANY PERSON ACTING ON BEHALF OF ANY OF THEM: (A) MAKES ANY WARRANTY OR REPRESENTATION WHATSOEVER, EXPRESS OR IMPLIED, (I) WITH RESPECT TO THE USE OF ANY INFORMATION, APPARATUS, METHOD, PROCESS, OR SIMILAR ITEM DISCLOSED IN THIS DOCUMENT, INCLUDING MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, OR (II) THAT SUCH USE DOES NOT INFRINGE ON OR INTERFERE WITH PRIVATELY OWNED RIGHTS, INCLUDING ANY PARTY'S INTELLECTUAL PROPERTY, OR (III) THAT THIS DOCUMENT IS SUITABLE TO ANY PARTICULAR USER'S CIRCUMSTANCE; OR (B) ASSUMES RESPONSIBILITY FOR ANY DAMAGES OR OTHER LIABILITY WHATSOEVER (INCLUDING ANY CONSEQUENTIAL DAMAGES, EVEN IF EPRI OR ANY EPRI REPRESENTATIVE HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES) RESULTING FROM YOUR SELECTION OR USE OF THIS DOCUMENT OR ANY INFORMATION, APPARATUS, METHOD, PROCESS, OR SIMILAR ITEM DISCLOSED IN THIS DOCUMENT. REFERENCE HEREIN TO ANY SPECIFIC COMMERCIAL PRODUCT, PROCESS, OR SERVICE BY ITS TRADE NAME, TRADEMARK, MANUFACTURER, OR OTHERWISE, DOES NOT NECESSARILY CONSTITUTE OR IMPLY ITS ENDORSEMENT, RECOMMENDATION, OR FAVORING BY EPRI. THE FOLLOWING ORGANIZATION, UNDER CONTRACT TO EPRI, PREPARED THIS REPORT: Southwest Research Institute (SwRI) This is an EPRI Technical Update report. A Technical Update report is intended as an informal report of continuing research, a meeting, or a topical study. It is not a final EPRI technical report. NOTE For further information about EPRI, call the EPRI Customer Assistance Center at or askepri@epri.com. Electric Power Research Institute, EPRI, and TOGETHER SHAPING THE FUTURE OF ELECTRICITY are registered service marks of the Electric Power Research Institute, Inc. Copyright 2012 Electric Power Research Institute, Inc. All rights reserved.

5 ACKNOWLEDGMENTS The following organization, under contract to the Electric Power Research Institute (EPRI), prepared this report: Southwest Research Institute (SwRI) Automation and Data Systems Division 6220 Culebra Road, Building 68 San Antonio, TX , USA Principal Investigators T. Do G. Ragsdale W. Arensman This report describes research sponsored by EPRI. EPRI would like to thank the following organization for providing insight on the research problem and feedback on the report: UCAIug SG Security Working Group This publication is a corporate document that should be cited in the literature in the following manner: AMI Cyber Security Incident Response Guidelines. EPRI, Palo Alto, CA: iii

6

7 ABSTRACT This document is intended to be used by system and asset owners to assist in the preparation and response to AMI cyber security incidents. This document was developed by conducting interviews with EPRI members, AMI asset owners, and vendors, regarding practices involved in responding to AMI cyber security incidents and mapping the responses to requirements put forth by the Department of Homeland Security (DHS), National Institute of Standards and Technology (NIST), Open Smart Grid (Open-SG) Working Group, and Advanced Metering Infrastructure Security (AMI-SEC) working group. Keywords Cyber Security Incident Response Advanced Metering Infrastructure v

8

9 CONTENTS 1 INTRODUCTION Usage References REFERENCES AND BIBLIOGRAPHIES List of References Definition of Terms AMI INCIDENT RESPONSE PREPARATION GUIDELINES Incident Response Organization AMI Entity Identification and Oversight [9 SG.IR-1] Incident Response Program [9 SG.IR-1] AMI Incident Response Development Facility [9 SG.IR-3, SG.IR-4] Incident Response Roles and Responsibilities [9 SG.IR-2] Incident Response Planning Defining AMI Cyber Incident Response Requirements [3 4.1; 9 SG.IR-1, SG.AT-1] Incident Scenarios Identification [9 SG.IR-1, SG.AT-1] Establishing a Continuity of Operations Plan [ ; 9 SG.CP-2] Identifying Roles and Responsibilities for Continuity of Operations [9 SG.AT-6] Risk and Impact Assessment Identifying Internal Objectives and Functions AMI Incident Classification [3-2] Impact Ranking of AMI Functions [4-2.3] AMI Incident Impact Classification [4-2.3] AMI Incident Impact Analysis [4-2.3] Incident Response Training Incident Process Training [ ; ; 9 - SG.AT-6] Process Verification Testing [ ] AMI INCIDENT RESPONSE GUIDELINES Incident Management Process [9 SG.IR-5] Incident Identification Incident Remediation Incident Review CONCLUSION vii

10

11 LIST OF FIGURES Figure 3-1 AMI Incident Impact Analysis Flowchart Figure 4-1 AMI Incident Management Process ix

12

13 LIST OF TABLES Table 3-1 Scope of Impact Table 3-2 AMI Incident Impact Classification Table 3-3 Likelihood of Occurrence Table 3-4 Risk Rating Table 3-5 AMI Incident Type Table 4-1 Incident Scenario Description Table 4-2 Physical Incident Scenarios Table 4-3 Authentication Incident Scenarios Table 4-4 Communications Incident Scenarios Table 4-5 Software Incident Scenarios Table 4-6 Incident Remediation Strategies xi

14

15 1 INTRODUCTION The following document provides cyber security incident response guidelines and recommendations specific to Advanced Metering Infrastructure (AMI) systems. The document assumes that incident response guidelines and practices already exist for enterprise systems. The guidelines and practices described are specific to the unique components comprising the AMI system, hereafter referred to as the AMI logical architecture as defined in [3 4.2]. (See Sections 1.2 and 2.1 for reference descriptions.) AMI logical architectures are different from other energy-related system architectures in several regards. The AMI logical architecture exists within the distribution grid and is closely associated with the utility s customers. As the AMI is concerned with energy distribution and not transmission it does not fall under the scope of North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP), Independent System Operator (ISO), or other bulk energy controls. Instead, the AMI is more subject to mass media and customer scrutiny. The AMI also differs from other energy-related systems in that major components of the AMI, such as the AMI meter operate outside the fence lines of utilities in areas that are easily physically accessible as compared to traditional electrical distribution grid components (e.g., substations and transformers). In some instances, AMI meters and web portals interact directly with customer-provided appliances and energy management systems using well-understood protocols. This document is dedicated to addressing these differences to the extent that the differences relate to AMI incident response. The document does not address incident response within the AMI-associated business systems that are external to the AMI logical architecture as described in [3 4.2]. It is also assumed that the reader has access to and will become familiar with applicable standards cited in this document. The standards are included by citation only. The reader is encouraged to reference and become familiar with standards applicable to AMI systems. 1.1 Usage This format of this document closely follows that of the National Institute of Standards and Technology (NIST) Special Publication (SP) , Information Security document [5] and the U.S. Department of Homeland Security, Catalog of Control Systems Security: Recommendations for Standards Developers document [1]. This document adopts the convention of adding a supplemental guidance to each requirement from the Advanced Security Acceleration Project for Smart Grid (ASAP-SG) Security Profile 2.0 document [3]. In this document, the supplemental guidance section contains the identified industry guidelines for implementing the requirement. 1-1

16 Requirements are listed in the following format: Requirement Title Description Requirement Supplemental Guidance Requirements Enhancement Rationale This document is divided into two major sections: AMI Incident Response Preparation Guidelines and AMI Incident Response Guidelines. The AMI Incident Response Preparation Guidelines section lays the organizational groundwork for developing policies to respond to Advanced Metering Infrastructure (AMI) cyber security incidents. The AMI Incident Response Guidelines section provides guidance on how to best respond to identified AMI cyber security threats. 1.2 References References throughout this document adopt the following format [<Reference #> - <Section #>]. <Reference #> - Refers to the document source listed in the reference section <Section #> - Refers to the specific section within the reference source The absence of a <Section #> within the citation implicitly refers to the document in its entirety. 1-2

17 2 REFERENCES AND BIBLIOGRAPHIES 2.1 List of References 1. U.S. Department of Homeland Security, Catalog of Control Systems Security: Recommendations for Standards Developers, April U.S. Department of Commerce. National Institute of Standards and Technology, Computer Security Incident Handling Guide, Special Publication , Revision The Advanced Security Acceleration Project (ASAP-SG) - Security Profile For Advanced Metering Infrastructure, Version 2.0, June 22, AMI-SEC (Advanced Metering Infrastructure Security) Task Force - AMI Risk Assessment (draft document), AMI-SEC Risk Assessment v0.9a doc. 5. NIST Special Publication (SP) , Information Security, Revision 3, Updated 5/1/2010, final_updated-errata_ pdf. 6. UCAIUG: AMI SEC-ASAP AMI System Security Requirements V1.01, December 17, EPRI IECSA Volume II, Final Release, EPRI Use Case Repository, EPRI.com. 8. AMI Network V 3.0.doc, EPRI Use Case Repository, EPRI.com. 9. The Smart Grid Interoperability Panel (SGIP) Cyber Security Working Group (CSWG), NISTIR 7628 Guidelines for Smart Grid Cyber Security: Vol. 1, Smart Grid Cyber Security Strategy, Architecture and High-Level Requirements, August Definition of Terms AMI entity the owner and/or operator of the AMI logical architecture (e.g., cooperatives, municipal agency, or a corporate body). Use case a set of related activities and communications that render value in support of an AMI objective. AMI function a set of use cases supporting the achievement of a common AMI objective (e.g., billing). AMI component a subdivision of the AMI logical architecture primarily involved in one or more AMI use case communications or sequence of activities. AMI components may secondarily participate in non-ami use cases. AMI components are described in [3-4.2]. AMI system synonymous with AMI internal architecture are described in [3-4.2]. AMI-associated components are subdivisions of the AMI logical architecture external to the AMI internal architecture (e.g., Outage Management System, Customer Information System, and 2-1

18 Distribution Automation System). The AMI associated components are depicted as the AMI logical architecture external perspective in [3-4.2]. AMI logical architecture [3-4.2] In this document when the term AMI logical architecture is used, we are referring to the AMI logical architecture internal perspective. The components which are encompassed within the AMI logical architecture internal perspective are: AMI Meters Field Tools AMI Communications Network Devices AMI Head End Meter Data Management System AMI Network Management System AMI Meter Management System Level of effort is a measure of resources required to achieve an end (e.g., successful attack on an Advanced Metering Infrastructure (AMI) asset. Resources may include combinations of time, skill, money, and access to technology). Loss of Control The inability to exercise AMI control functions (e.g., remote disconnect). Loss of Communications The inability to communicate with the AMI (e.g., send/receive commands from a meter). Loss of Trust/Integrity The inability to verify the security of functions or data within the AMI (e.g., compromise of keys, integrity check failures, billing data compromise). Loss of Privacy The inability to protect the privacy of information (e.g., compromise of keys, loss of encryption functionality). Loss of Attribution The inability to attribute an AMI action (e.g., meter log on) to its actor. Natural Event An event which can be correlated with other situational awareness data (e.g., weather forecast, fires, earthquakes). These events are generally caused by acts of nature. Man-Made Event An event not caused by nature and is generally caused as a result of a manmade event. Malicious Event An event which has been caused with ill-intent. It generally occurs in the absence of natural or unintentional events. These events are identified by correlating the event with other situational awareness data (e.g., meter tampers, meter authentication attempts). Depending on the severity of the event, the AMI entity may need to notify law enforcement (e.g., local, federal).types of events malicious events include: AMI Cyber Attack Vandalism Energy Theft 2-2

19 Non-Malicious Event An event which has been caused unintentionally or as the result of operator or system design error. These events generally arise as a result of AMI operation, misconfiguration, or design errors. Objective a level of achievement necessary for a desired outcome or state of AMI entity business activity (e.g., customer communication). 2-3

20

21 3 AMI INCIDENT RESPONSE PREPARATION GUIDELINES The purpose of Section 3 and its subsections are to define the preparation guidelines for planning the incident response procedures defined in Section 4. The guidelines provide the organizational framework upon which incident response procedures are rationally created, validated, and justified. For this section, a subset of guidelines has been selected which pertain specifically to the unique aspects of the AMI such as: AMI meters operate in geographically distributed and easily physically accessible locations (e.g., homes, apartment buildings, and strip malls). AMI meters may contain remote connect/disconnect capabilities. AMI meter data may be used in organizational demand response programs. AMI systems often contain mesh communication networks allowing for the potential to leverage the network to attack a large number of meters. The guidelines in this section should be considered as a supplement to any existing organizational incident response plan and should be used to augment incident response approaches as applicable to AMI. This section is divided into four subsections: incident response organization, incident response planning, risk and impact assessment, and training. Please note that the requirements referenced in the following sections from the National Institute of Standards and Technology Interagency Report (NISTIR) are not specific to AMI. Supplemental guidance has been provided to tailor these requirements to AMI. 3.1 Incident Response Organization This subsection describes the requirements and provides guidance on how to organize an AMI incident response plan AMI Entity Identification and Oversight [9 SG.IR-1] The responsibility and accountability for AMI incidents fall to the AMI entity which has responsibility and authority over the entity s AMI logical architecture. An individual or a group of individuals responsible for the different domains within the AMI entity should be identified and charged with leading the development of the AMI incident response program. It is important for this individual leader, or collective group of leaders, to take responsibility for the planning and implementation of cyber security incident response processes and procedures. 3-1

22 Requirement An individual or a collective group of individuals with authority that encompasses all aspects of the AMI logical architecture should oversee the AMI incident response team and process. AMI entities may subdivide leadership of the AMI into different operational domains. Examples of such operational domains are: Business Processes Responsible for handling the business operations of the AMI logical architecture such as revenue assurance and billing. AMI Operations Responsible for day-to-day operation of the AMI internal architecture such as maintenance and implementation of the meter data management system. Information Technology (IT) Operations Responsible for overall management of the AMI associated components such as servers, backend appliances, and the organization s security information and event management system (SIEM). For each identified operational domain within the organization, a leader should be identified to coordinate the incident response process as it pertains to their domain Supplemental Guidance The designated leader within the AMI entity directs the formation of the incident response capability and governs the administration of the capability once it is operational. The AMI incident response designated leader has approval authority for incident plans, policies, and procedures [1-2.2, 2.3] Requirements Enhancement None Incident Response Program [9 SG.IR-1] The AMI logical architecture realizes use cases, thereby achieving business objectives specific to the automated collection of meter data, provisioning of power to a customer, and ensuring the integrity of the entity-customer relationship. AMI-specific use cases must be realized in a timely, reliable, and secure fashion for the entity s business objectives to be achieved. The purpose of the AMI incident response program is to sustain or restore the AMI use cases despite incidents that would otherwise disrupt operation of the AMI logical architecture. An AMI incident response program addresses the unique cyber security risks with a corresponding capability to continue or resume operations of an AMI system in the event of disruption of AMI use cases and objectives. 3-2

23 The AMI incident response program entails the preparation, testing, and maintenance of AMIspecific policies, procedures, processes, systems, and skill sets. The program enables the AMI entity to restore the AMI system s operational status after the occurrence of a disruption. Disruptions can come from natural disasters, such as earthquakes, tornados, floods, or from manmade events like riots, terrorism, or vandalism. The ability for the AMI system to function after such an event is directly dependent on implementing a program prior to incidents using the organization s planning process. [1-2.12] Requirement The AMI entity establishes an AMI incident response program as an identifiable and recognized organizational function Supplemental Guidance The official establishment and visibility of the AMI incident response program as a formal and unique activity is important to its adoption and support within the AMI entity Requirements Enhancement None AMI Incident Response Development Facility [9 SG.IR-3, SG.IR-4] AMI logical architectures are complex internal and associated components satisfying AMI entity goals including reliability, integrity, and functionality. Like other systems, it is desirable to develop and verify incident response programs without risk to an operational AMI logical architecture. Therefore, it is good practice to use an AMI incident response development facility separate from the production AMI system Requirement A facility exists as a development and test vehicle for the creation, maintenance, and verification of AMI incident response policies, procedures, training, processes, and components Supplemental Guidance AMI systems have distinct differences from enterprise systems often found within an AMI entity and compose of systems such as: Electric Meters RF, Wireless, Wired, and Cellular Communications Networks Signing and Encryption Appliances Meter Data Management Systems (MDMS) Additionally, many components of the AMI system operate in potentially harsh and physically unsecured environments. The facility should, to the extent possible, replicate the unique aspects of the AMI system and its environment. The facility may consist of functional test beds used in development to test configurations of meters and systems prior to wide-scale deployments. 3-3

24 Requirements Enhancement None Incident Response Roles and Responsibilities [9 SG.IR-2] The skill sets required to develop, test, and execute an AMI incident response program are many and in many cases unique to the AMI logical architecture. Likewise, the duties to be performed within the program are often unique to the AMI system. For example, the understanding of the AMI meter and its communications networks (e.g., wide-area and neighborhood area) is a skill set different from a typical IP-based enterprise system. The designated roles to respond to a meter intrusion or an AMI network denial-of-service attack are also different as a meter technician may require training in non-ip communication protocols, AMI hardware configuration parameters, AMI diagnostic techniques, and cyber security methods Requirement The duties, skill sets, and responsibilities of roles within the AMI incident response program are clearly defined and communicated within the AMI entity Supplemental Guidance Each organization may subdivide its AMI leadership into different functional domains. The AMI incident response team should consist of members from each of these functional domains and should include representatives from domains relating to the AMI-associated components. The following groups should be considered in the formation of a cross-functional team that plans for and responds to AMI incidents: Business (e.g., Legal, Accounting, Human Resources, Public Relations) Charged with responding to the business impacts of the AMI incident. AMI Operations Charged with responding to the operational impacts of the AMI incident. Information Technology (IT) Operations Charged with responding to the impacts of the AMI incident as it relates to the IT system. The cross-functional team may be adjusted depending on the scope of impact of the AMI incident Requirement Enhancement The AMI framework is an integral part of the larger organizational framework. The organizational framework includes AMI incident response roles with well-defined skills, accountability, and responsibilities. 3-4

25 3.2 Incident Response Planning This section provides requirements and guidance on how to plan and prepare for an AMI incident Defining AMI Cyber Incident Response Requirements [3 4.1; 9 SG.IR-1, SG.AT-1] The AMI system is implemented to satisfy a set of AMI-specific use cases and derive business value. Typical use cases can be found within the Advanced Security Acceleration Project (ASAP-SG) - Security Profile for Advanced Metering Infrastructure, Version 2.0, document [3 4.1]. The document provides traceability of AMI requirements to business use cases and associated business objectives supported by the AMI system. The goal of the AMI incident response program is to satisfy AMI requirements associated with data integrity, reliability, timeliness, privacy, and accessibility when incidents disrupt the realization of AMI use cases. A thorough understanding of AMI requirements is necessary for the proper formulation of policies, procedures, training, and resources comprising the AMI incident response program Requirement The AMI incident response program satisfies as set of clearly defined and articulated requirements traceable to the AMI system use cases and business objectives Supplemental Guidance The AMI use cases produce a set of business objectives when successfully achieved or a set of business impacts when disrupted by an incident. AMI incident response requirements should be considered in light of the business objectives and impacts associated with a given incident scenario Requirement Enhancements None Incident Scenarios Identification [9 SG.IR-1, SG.AT-1] A proactive stance toward AMI incidents requires the AMI program should anticipate incidents before they are encountered. The incident scenario analysis considers the impacts upon use cases and business objectives caused by benign or malicious attacks on the AMI meters, communication devices, head end, forecasting system, meter management system, network, management system, and other AMI components as defined in [3-4.3] Requirement The AMI incident response program identifies AMI incident scenarios and the possible causes for those AMI incidents. The incident scenarios should identify forensic evidence required for detection of the AMI incident. The AMI incident response program should anticipate AMI incident scenarios which may not yet occurred. 3-5

26 Supplemental Guidance In order to proactively identify AMI incidents, it is important that the organization develop an overall AMI incident response plan that provides a process for responding to AMI security incidents regarding vulnerabilities which have been identified and have not yet been remediated, as well as vulnerabilities for which the organization has accepted the risk. The AMI incident response plan should include methods for assigning incident impact and assetvalue metrics (e.g., monetary or objective-oriented). The AMI incident plan should include practices for: Reviewing and updating incident response procedures How to respond to newly released vulnerabilities Metrics for determining the impact of newly identified vulnerabilities Methods for determining the type of AMI incident (e.g., malicious, non-malicious, natural) The risk analysis described in Section should be applied to scenarios after the plausibility of the scenario has been adequately established through examination or actual occurrence. Additionally, the AMI incident response plan should include: Risk mitigation strategies Policies and procedures for responding to incidents based on the impact and type of AMI incident Requirement Enhancement None Establishing a Continuity of Operations Plan [ ; 9 SG.CP-2] A continuity of operations plan ensures the resumptions of services in the event of an AMI incident Requirement The organization should develop, test, and implement a continuity of operations plan dealing with the overall issue of maintaining or re-establishing operation of the AMI system in case of an undesirable interruption. The plan should address roles, responsibilities, points of contact, and activities associated with restoring system operations after a disruption or failure. Designated officials within the organization review and approve the continuity of operations plan. Individuals responsible for the systems covered by the continuity of operations plan should be trained on the implementation and execution of the continuity of operations plan. 3-6

27 Supplemental Guidance A continuity of operations plan addresses both business continuity planning and recovery of all vital AMI system operations Requirements Enhancement The continuity of operations plan may include: Verification of communications with all AMI meters, collectors, and relays The restoration of disconnect switches to known states Verification of the integrity of meter firmware Verification of the integrity of meter data The continuity of operations plan should also address: Unintentional AMI cyber security incidents (e.g., operator error, accidents) Natural events (e.g., high velocity winds, flooding, earthquakes) Intentional incidents as a result of: Disgruntled current and past employees Hackers Rationale Experience demonstrates that systems fail and mistakes occur. An AMI continuity of operations plan allow for an orderly recovery from such situations. Critical analysis of a system often brings weaknesses to light, thereby giving the AMI incident response program opportunities to design additional safeguards into the AMI system necessary for an orderly recovery Identifying Roles and Responsibilities for Continuity of Operations [9 SG.AT-6] The organization s continuity of operations plan should define and communicate the specific roles and responsibilities for each part of the plan in relation to various types of disruptions to the operation of the AMI system Requirement The organization s continuity of operations plan defines and communicates the specific roles and responsibilities for each part of the plan in relation to various types of AMI incidents. [ ] Supplemental Guidance An AMI incident continuity of operations plan defines the roles and responsibilities of the various employees and contractors in the event of an incident. The plan identifies responsible personnel to lead the recovery and response effort if an incident occurs. The following roles and responsibilities are representative of the organizational domains involved with AMI and, as a result, they should be considered within the continuity of operations plan: 3-7

28 Incident Coordinator Responsible for organizing, dispatching, and coordinating the incident response team Trained in the incident response policies, procedures, roles, responsibilities, and goals AMI Operations Lead Responsible for the day-to-day operations of AMI system within the organization Assists in identifying key personnel within the AMI operations group to assist in the incident response process Leads efforts to quantify and categorize incident impacts Trained in the AMI functions, use cases, goals, metrics, and incident response procedures IT Operations Lead Responsible for the day-to-day operations of information systems within the organization Assists in identifying key personnel within the IT operations group to assist in the incident response process Assists the AMI Operations lead in the quantification and categorization of incident impacts Trained in information technology and enterprise cyber security Business Operations Lead Responsible for the day-to-day business operations within the organization Assists in contacting the affected business entities within the organization Assists the AMI lead in the quantification and categorization of incident impacts Leads the mapping of the AMI entity's organizational objectives into cyber security metrics Trained in the AMI entity s planning and budgeting Public Relations Lead Responsible for correspondence with the media, regulators, and other external groups Trained in the legal entity s external communications, reporting, and marketing policies and practices Legal Lead Responsible for liaising with law enforcement and regulatory agencies regarding planning and responding to AMI cyber security incidents Trained in judicial evidentiary data collection and custodial control requirements, external reporting procedures and policies, and regulation governing cyber security incidents These generic categories were compiled from the interviews conducted with EPRI members, AMI asset owners, and vendors regarding the practices involved for responding to AMI cyber security incidents. Each organization may have different titles and categories for these roles and should make their best determination in mapping the provided categories to their organization. 3-8

29 Requirements Enhancement None Rationale Specific roles and responsibilities within continuity plans help alleviate confusion in the event of a significant incident. This clarification can ease the process and better focus the organization when recovering from a disruption. 3.3 Risk and Impact Assessment This section provides requirements and guidance on how to perform a risk and impact assessment with the goal of assisting the AMI entity in prioritizing incident response efforts Identifying Internal Objectives and Functions AMI entity objectives should be considered as part of the risk and impact assessment. Methods and use cases for those objectives should identify the tangible and intangible benefits to the AMI entity Requirements The organization identifies AMI entity objectives and the use cases implemented to achieve those goals Supplemental Guidance An AMI entity should identify internal objectives and functions that would be affected by an AMI incident and should consider those objectives when assigning a risk and impact rating to the identified incidents. Examples of AMI entity internal objectives that may be affected by AMI incidents are: Real-Time Pricing (RTP) Top Level [7 D19] Remote Connect/Disconnect [ ] Demand Response Utility Commanded Load Control [7 D12] AMI Network (Moving Data Elements from the AMI Head-End to Smart Meter and from the Smart Meter to the AMI Head-End) [8] Firmware Updates [ ] Requirements Enhancement AMI entity objectives and use cases are impacted by AMI incidents in varying degrees. Use cases affected by AMI cyber-security incidents are identified and associated with organizational objectives AMI Incident Classification [3-2] The AMI program should define common methods, vernacular, and criteria for describing a given AMI incident. Incidents may be classified according to common incident characteristics (e.g., failure mechanisms, mitigation methods, resource requirements, impact assessment ranking). Categorizing incidents facilitates better planning, organization, and uniformity within the incident response program. 3-9

30 Requirement AMI incidents are subdivided into categories and classified according scope of impact, likelihood of occurrence, and incident type Supplemental Guidance The following criteria should be used to describe AMI incidents: Scope of Impact: A classification based on the number of systems affected by the AMI incident. Scope of impact ratings can be used to determine an incident s severity and impact on the operation of the AMI logical architecture. Likelihood of Occurrence: A classification based on the current threat environment of how likely the AMI incident is to occur. Likelihood of occurrence ratings can be used to reprioritize responses to AMI incidents. Type: A classification based on the intent of the perpetrator of the AMI incident (e.g., natural, manmade, malicious, or non-malicious) Requirements Enhancement None Impact Ranking of AMI Functions [4-2.3] The AMI program should assess the level of AMI entity concern associated with the loss of an AMI function Requirement AMI incident impact rankings are assigned to assets, functions, or use cases according to the consequence and severity of an incident that disrupts portions or all of the functional capability Supplemental Guidance AMI incident impact rankings should be developed through threat assessment exercises. The threat assessment exercise should enumerate all components of the AMI logical architecture, enumerate the components interactions with external systems, assess the potential vulnerabilities within each component and component interface, and evaluate the impact (e.g., organizational and operational) of the vulnerability being exercised. Example impact ranking definitions are provided below in Table

31 Table 3-1 Scope of Impact Scope of Impact 1 Low 2 Medium 3 High The incident has a low impact limited to a single unit (e.g., Electric Meter). Measures should be taken to address the threat related to the single unit. The incident has a medium impact limited to units in a single grouping of AMI logical architecture components (e.g., a meter cell). Measures should be taken to identify the root cause of the threat and remediate the threat across all affected systems. The incident has a high impact and the effects span the entire AMI logical architecture (e.g., meter, routers, head end). Measures should be taken to immediately contain the threat and a crossfunctional team of AMI operators, IT system operators, AMI vendor, and business representatives should be formed to remediate the threat. The scope of impact ratings listed here is provided as an example. Scope of impact for vulnerabilities should be determined on a case-by-case basis depending on the function and number of devices impacted Requirements Enhancement None AMI Incident Impact Classification [4-2.3] The AMI incident response program should classify AMI incidents based upon the impact of the AMI incident to AMI entity objectives Requirement Incidents are assigned an impact classification according to the AMI entity objective impacted by an incident Supplemental Guidance Table 3-2 provides an example mapping of AMI incidents to impact classifications based upon incident s scope of impact. It is recommended that the reader formulate their own classification of AMI incidents and tailor it based on the unique aspects of their AMI deployment (e.g., usage of C12.18 keys) and their organization s AMI objectives. 3-11

32 Table 3-2 AMI Incident Impact Classification ID AMI Incident Classification Description 1 Theft of Energy An attacker attempts to steal energy by modifying the meter and/or the metering data. 2 Theft of C12.18 Logon Credentials 3 Bypass of Security Controls 4 Failed Communications Integrity An attacker has stolen the C12.18 login credentials from a single meter. An attacker has bypassed security controls on the meter. An integrity check failure has occurred on the meter. Impact Classification Low The attack is associated with a single occurrence of energy theft and has negligible impact. Medium The attack is associated with multiple occurrences of energy theft and has a direct monetary impact. High The attack is associated with a largescale theft of energy and can have both monetary and functional impacts Low The C12.18 credentials are different for each meter and have a minimal impact. Medium The C12.18 credentials are by multiple meters but are limited due to the physical requirement for exploitation. High The C12.18 credentials are in use by multiple meters and also have a high scope of impact due to the ability to perform the attack wirelessly or remotely. Low The bypass of security credentials only affects a single device at a time and has a limited impact. Medium The bypass of security controls affects multiple devices but has limited impact in terms of control. High The bypass of security controls affects multiple devices and allows full bypass of security controls on the affected devices. Low The integrity check failure occurs in a limited number of instances and affects a limited number of meters. Medium The integrity check failure occurs on a large scale and may affect the quality of data being received from the meters. High The integrity check failure occurs across all data being received from the meters. Thresholds on number of meters affected should be defined by each organization to rank the impact of the incident. 3-12

33 Table 3-2 (continued) AMI Incident Impact Classification ID AMI Incident Classification Description 5 Power Outage An AMI incident results in a power outage. 6 Software Error An AMI incident results in a software error occurring on the meter. Impact Classification Low A limited number of customers are affected (e.g., single household or business). Medium Multiple customers are affected but the effects are limited and isolated to a specific geographical area (e.g., neighborhood). High A large-scale power outage occurs affecting a significant portion of the AMI deployment (e.g., city or state). High impact outages may also include life and safety critical services (e.g., hospitals and emergency first responders). Low The software error occurs in a limited number of devices and has a low impact (e.g., causes a reset or reboot). Medium The software error occurs in multiple meters and has a high impact (e.g., toggling of disconnect switch, denial of service) High The software error occurs a significant portion of the AMI deployment (e.g., city or state) and has a high impact (e.g., toggling of disconnect of switch) Requirements Enhancement None AMI Incident Impact Analysis [4-2.3] Define the methods for assessing the value of the AMI function to an AMI entity in terms that can also be used to quantify incident impact if part or all of the AMI logical architecture are rendered ineffective Requirement The AMI incident impact metrics assigned to the AMI incidents quantify incident response risk exposure Supplemental Guidance The AMI entity should identify the AMI functions and use cases to be included in the incident impact analysis. The following methodology shown in Figure 3-1 may be adopted in assigning risk rankings to AMI assets. 3-13

34 Figure 3-1 AMI Incident Impact Analysis Flowchart First, an impact ranking is assigned to AMI assets using a methodology such as that defined in the Table 3-1. Next, an exercise is performed where AMI incidents are defined and categorized. AMI incidents are assigned a scope of impact ranking based on the number AMI assets they affect. Finally, a likelihood of occurrence rating is assigned to the AMI incident based on historical evidence of similar types of incidents. An example of likelihood of occurrence ratings to be used is provided below in Table 3-3. The likelihood of occurrence table provided is a simplified version based off of the AMI-SEC likelihood interpretation policy [ ]. Table 3-3 Likelihood of Occurrence Likelihood of Occurrence 1 Low Not expected to occur, or may occur in exceptional circumstances. 2 Medium Could occur at some time. 3 High Will probably occur in most circumstances. Once the AMI incidents have been defined, categorized, and assigned an impact and likelihood of occurrence rating, a risk rating can be determined by using a matrix such as shown in Table

35 Table 3-4 Risk Rating Risk Rating Likelihood of Occurrence Scope of Impact Low Medium High Low Low Medium Medium 2 Medium Low Medium High 3 High Medium High High The risk ratings help to guide planning, budgeting, and resource allocation processes to address the issues of highest concern and impact. Additional metrics may be included in the risk rating in the event of an incident response such as the type of AMI incident. The following type classification in Table 3-5 has been provided as an example: Table 3-5 AMI Incident Type Type 1 Malicious 2 Non- Malicious 3 Natural The incident has been determined to have been caused by a malicious actor. Additional measures may be taken to contain the threat until the threat has been remediated. The incident has been determined to have been caused by a non-malicious actor such as an operational error. Depending on the severity of the error, measures may be taken to contain the incident impact. The incident has been determined to have been caused by a natural event such as an earthquake or storm. Normal operational procedures should be utilized to contain and remediate the incident. Such ratings are dynamic and may not be able to be determined prior to an incident occurring; however, it may be used in adjusting the incident response in the course of investigating an AMI incident Requirements Enhancement None 3-15

36 3.4 Incident Response Training This section provides requirements and guidance on how to develop and assess incident response training Incident Process Training [ ; ; 9 - SG.AT-6] The AMI incident response program should identify the types of training and materials required to prepare the AMI entity, its personnel, and those affected by AMI incidents Requirement The program includes training on the creation and implementation of the AMI incident response plans for employees, contractors, and stakeholders. The program provides refresher training annually. The training covers employees, contractors, and stakeholders in the implementation of the continuity of operations plan Supplemental Guidance Training needs to be provided to individuals in the AMI community so that all understand the content, purpose, and implementation of the incident response plans. Different levels of incident response training may be prepared for personnel with different levels of AMI responsibility. Refer to for the different AMI incident response roles and responsibilities and recommended training Requirements Enhancement None Process Verification Testing [ ] Regular testing helps to determine the effectiveness of the AMI incident response plans Requirement The program regularly tests AMI incident response plans to validate the efficacy of the program Supplemental Guidance Following the preparation of the AMI incident response plans, a schedule is developed to review and test each of the plans to ensure that it continues to meet its AMI objectives Requirements Enhancement None 3-16

37 4 AMI INCIDENT RESPONSE GUIDELINES This section focuses on guidelines for responding to AMI incidents. This section introduces the AMI incident management process and provides specific guidance regarding incident detection, remediation, and review. 4.1 Incident Management Process [9 SG.IR-5] A phased approach can greatly streamline the incident notification and mobilization process. An example of one such approach is provided. The organization may tailor the approach to best fit their organization. 1) Incident Identification a. Incident is identified through an automated process such as an SIEM or reported manually through another source. b. Evidence such as alarms, events, and situational awareness data is collected and preserved. c. Potential incident scenarios are classified and identified based on available evidence and the incident response teams are notified. 2) Remediation a. If a remediation does not exist, the incident response team will develop a remediation strategy which may involve a root cause analysis of the incident. b. The applicable remediation strategy is applied based on the identified scenario. 3) Review a. If necessary, regression testing is performed in order to verify that the vulnerability or exploit has been remediated. b. A review of the incident is performed in order to determine if the incident response strategy was effective and whether additional training for incident responders is necessary or if the incident detection rule sets need to be fine-tuned. Figure 4-1 provides a detailed view of the AMI incident management process. 4-1

38 Figure 4-1 AMI Incident Management Process The following sections provide guidance for the incident management process Incident Identification Incident identification is the first step in the incident management process. Identification of AMI incidents involves the collection of forensic evidence (e.g., alarms, events, and situational awareness data) in order to determine the incident scenario. Identification of AMI incidents and the incident scenario allows for the AMI entity to determine the appropriate next steps, such as developing a remediation strategy or accepting the risk of a similar incident occurring Security Information and Event Management Systems [9 SG.IR-6] Security Information and Event Management (SIEM) systems allow an organization to organize and correlate live situational awareness data from multiple systems, including non-ami systems, to detect security events or incidents Guidance Organizations should develop AMI-specific rule sets for their SIEM systems. SIEM rule sets may include situational awareness data to assist in the detection of AMI incidents and incident scenarios. The SIEM should be configured to collect alarms and events from all components of the AMI logical architecture. Once the rule sets have been developed and the SIEM s have been configured, the organization should fine tune the rule sets in such a way that they do not result in an unacceptable number of false positive AMI incident detections. 4-2

39 The fine tuning of SIEM rule sets is a time-consuming process as it may take some time to set the appropriate alarming thresholds and integrate the AMI system into the overall organizational process. Additionally, periodic software updates, hardware changes, and software changes may result in the need to adjust existing SIEM rules. The AMI entity should be cognizant of these needs and treat fine tuning of SIEM rule sets as a necessary continuous process Data Mining Data mining allows an organization to analyze archives of past security logs to identify intrusions Guidance Organizations should archive, for an organizationally defined period of time, AMI-related SIEM alarms, events, and situational awareness data. Data mining solutions may then be used to allow for a forensic investigation to detect signs of current or past intrusions and fine-tune AMI SIEM rule sets to detect intrusions and reduce the number of false positive AMI incident detections Log Message Integrity Integrity checks on log messages can be used to determine if messages have been tampered with or modified from acquisition to analysis, transmission, and storage. Additionally, integrity checks should be used to allow for preservation of forensic evidence for legal purposes Guidance Organizations should utilize integrity checks such as cryptographic signatures to detect tamper or modification of log messages during transmission. Modification to data in transit may indicate a cyber-security intrusion. Organizations should also employ integrity checks to preserve SIEM data for forensic and legal purposes Incident Scenarios [9 SG.IR-8] This section provides guidance on how to identify specific AMI incidents. The following fields in Table 4-1 are used to describe each of the incident scenarios listed in the sections below. After the incident scenario has been determined, the incident classification field in Table 4-6 is used to determine the appropriate remediation strategy to employ. Table 4-1 Incident Scenario Description ID Incident Scenario Alarms and Events Situational Awareness Data Incident Classification Identifier for the incident scenario Description of the incident scenario Alarms and events associated with the incident scenario Evidence to support that the incident has occurred Classification of the incident to allow the incident response team to determine an appropriate remediation strategy to employ Physical The following incident scenarios shown in Table 4-2 occur as a result of a physical action being taken upon the meter. 4-3

Cyber Security and Privacy - Program 183

Cyber Security and Privacy - Program 183 Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology

More information

future data and infrastructure

future data and infrastructure White Paper Smart Grid Security: Preparing for the Standards-Based Future without Neglecting the Needs of Today Are you prepared for future data and infrastructure security challenges? Steve Chasko Principal

More information

Security in the smart grid

Security in the smart grid Security in the smart grid Security in the smart grid It s hard to avoid news reports about the smart grid, and one of the media s favorite topics is security, cyber security in particular. It s understandable

More information

The Importance of Cybersecurity Monitoring for Utilities

The Importance of Cybersecurity Monitoring for Utilities The Importance of Cybersecurity Monitoring for Utilities www.n-dimension.com Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive

More information

Ohio Supercomputer Center

Ohio Supercomputer Center Ohio Supercomputer Center IT Business Continuity Planning No: Effective: OSC-13 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original

More information

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System Purpose CIP-005-5 R2 is focused on ensuring that the security of the Bulk Energy System is not compromised

More information

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808 cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808

More information

PROJECT BOEING SGS. Interim Technology Performance Report 1. Company Name: The Boeing Company. Contract ID: DE-OE0000191

PROJECT BOEING SGS. Interim Technology Performance Report 1. Company Name: The Boeing Company. Contract ID: DE-OE0000191 Interim Techlogy Performance Report 1 PROJECT BOEING SGS Contract ID: DE-OE0000191 Project Type: Revision: V2 Company Name: The Boeing Company December 10, 2012 1 Interim Techlogy Performance Report 1

More information

Managing IT Security with Penetration Testing

Managing IT Security with Penetration Testing Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to

More information

High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe

High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe 2/1/2012 Assessor: J. Doe Disclaimer This report is provided as is for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information

More information

Cyber Security & State Energy Assurance Plans

Cyber Security & State Energy Assurance Plans Cyber Security & State Energy Assurance Plans Michigan Cyber Summit 2011 Friday, October 7, 2011 Jeffrey R. Pillon, Director of Energy Assurance National Association of State Energy Officials What is Energy

More information

This is a preview - click here to buy the full publication

This is a preview - click here to buy the full publication TECHNICAL REPORT IEC/TR 62443-3-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 3 1: Security technologies for industrial automation and control systems

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

GE Measurement & Control. Cyber Security for NEI 08-09

GE Measurement & Control. Cyber Security for NEI 08-09 GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

SECURITY. Risk & Compliance Services

SECURITY. Risk & Compliance Services SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize

More information

ISO 27001 Controls and Objectives

ISO 27001 Controls and Objectives ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements

More information

Network & Information Security Policy

Network & Information Security Policy Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk

More information

A Systems Approach to HVAC Contractor Security

A Systems Approach to HVAC Contractor Security LLNL-JRNL-653695 A Systems Approach to HVAC Contractor Security K. M. Masica April 24, 2014 A Systems Approach to HVAC Contractor Security Disclaimer This document was prepared as an account of work sponsored

More information

INCIDENT RESPONSE CHECKLIST

INCIDENT RESPONSE CHECKLIST INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Business Continuity Management Standard for IT Systems This standard is applicable to all VCU School of Medicine

More information

Enterprise Security Tactical Plan

Enterprise Security Tactical Plan Enterprise Security Tactical Plan Fiscal Years 2011 2012 (July 1, 2010 to June 30, 2012) Prepared By: State Chief Information Security Officer The Information Security Council State of Minnesota Enterprise

More information

FACT SHEET: Ransomware and HIPAA

FACT SHEET: Ransomware and HIPAA FACT SHEET: Ransomware and HIPAA A recent U.S. Government interagency report indicates that, on average, there have been 4,000 daily ransomware attacks since early 2016 (a 300% increase over the 1,000

More information

Data Security Incident Response Plan. [Insert Organization Name]

Data Security Incident Response Plan. [Insert Organization Name] Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security

More information

Information Security Services

Information Security Services Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual

More information

Empowering intelligent utility networks with visibility and control

Empowering intelligent utility networks with visibility and control IBM Software Energy and Utilities Thought Leadership White Paper Empowering intelligent utility networks with visibility and control IBM Intelligent Metering Network Management software solution 2 Empowering

More information

The Business Case for Security Information Management

The Business Case for Security Information Management The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un

More information

Summary of CIP Version 5 Standards

Summary of CIP Version 5 Standards Summary of CIP Version 5 Standards In Version 5 of the Critical Infrastructure Protection ( CIP ) Reliability Standards ( CIP Version 5 Standards ), the existing versions of CIP-002 through CIP-009 have

More information

FDA Releases Final Cybersecurity Guidance for Medical Devices

FDA Releases Final Cybersecurity Guidance for Medical Devices FDA Releases Final Cybersecurity Guidance for Medical Devices By Jean Marie R. Pechette and Ken Briggs Overview and General Principles On October 2, 2014, the Food and Drug Administration ( FDA ) finalized

More information

ISO27001 Controls and Objectives

ISO27001 Controls and Objectives Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the

More information

Alcatel-Lucent Services

Alcatel-Lucent Services SOLUTION DESCRIPTION Alcatel-Lucent Services Security Introduction Security is a sophisticated business and technical challenge, and it plays an important role in the success of any network, service or

More information

PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE0000191

PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE0000191 Interim Techlogy Performance Report 3 PROJECT BOEING SGS Contract ID: DE-OE0000191 Project Type: Revision: V1 Company Name: The Boeing Company November 19, 2013 1 Interim Techlogy Performance Report 3

More information

North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)

North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5) Whitepaper North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5) NERC-CIP Overview The North American Electric Reliability Corporation (NERC) is a

More information

Module 1: Introduction to Designing Security

Module 1: Introduction to Designing Security Module 1: Introduction to Designing Security Table of Contents Module Overview 1-1 Lesson 1: Overview of Designing Security for Microsoft Networks 1-2 Lesson 2: Introducing Contoso Pharmaceuticals: A Case

More information

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief RSA Solution Brief RSA envision Platform Real-time Actionable Information, Streamlined Incident Handling, Effective Measures RSA Solution Brief The job of Operations, whether a large organization with

More information

EFFECTIVE APPROACHES TO CYBERSECURITY FOR UTILITIES TERRY M. JARRETT HEALY & HEALY ATTORNEYS AT LAW, LLC OCTOBER 24, 2013

EFFECTIVE APPROACHES TO CYBERSECURITY FOR UTILITIES TERRY M. JARRETT HEALY & HEALY ATTORNEYS AT LAW, LLC OCTOBER 24, 2013 EFFECTIVE APPROACHES TO CYBERSECURITY FOR UTILITIES TERRY M. JARRETT HEALY & HEALY ATTORNEYS AT LAW, LLC OCTOBER 24, 2013 1 AGENDA Why Cybersecurity? A Few Helpful Cybersecurity Concepts Developing Expertise:

More information

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Boeing Defense, Space & Security Ventures Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Tristan Glenwright - Boeing BOEING is a trademark of Boeing Management Company. The

More information

CIP 010 1 Cyber Security Configuration Change Management and Vulnerability Assessments

CIP 010 1 Cyber Security Configuration Change Management and Vulnerability Assessments CIP 010 1 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:

More information

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model--- ---Information Technology (IT) Specialist (GS-2210) IT Security Model--- TECHNICAL COMPETENCIES Computer Forensics Knowledge of tools and techniques pertaining to legal evidence used in the analysis of

More information

FFIEC Cybersecurity Assessment Tool

FFIEC Cybersecurity Assessment Tool Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,

More information

SAMPLE HIPAA/HITECH POLICIES AND PROCEDURES MANUAL FOR THE SECURITY OF ELECTRONIC PROTECTED HEALTH INFORMATION

SAMPLE HIPAA/HITECH POLICIES AND PROCEDURES MANUAL FOR THE SECURITY OF ELECTRONIC PROTECTED HEALTH INFORMATION SAMPLE HIPAA/HITECH POLICIES AND PROCEDURES MANUAL FOR THE SECURITY OF ELECTRONIC PROTECTED HEALTH INFORMATION Please Note: 1. THIS IS NOT A ONE-SIZE-FITS-ALL OR A FILL-IN-THE BLANK COMPLIANCE PROGRAM.

More information

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards

More information

Help for the Developers of Control System Cyber Security Standards

Help for the Developers of Control System Cyber Security Standards INL/CON-07-13483 PREPRINT Help for the Developers of Control System Cyber Security Standards 54 th International Instrumentation Symposium Robert P. Evans May 2008 This is a preprint of a paper intended

More information

LogRhythm and NERC CIP Compliance

LogRhythm and NERC CIP Compliance LogRhythm and NERC CIP Compliance The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to ensure that the bulk electric system in North America is reliable, adequate

More information

Computer Security Incident Response Plan. Date of Approval: 23- FEB- 2015

Computer Security Incident Response Plan. Date of Approval: 23- FEB- 2015 Name of Approver: Mary Ann Blair Date of Approval: 23- FEB- 2015 Date of Review: 22- FEB- 2015 Effective Date: 23- FEB- 2015 Name of Reviewer: John Lerchey Table of Contents Table of Contents... 2 Introduction...

More information

HIPAA Security. 6 Basics of Risk Analysis and Risk Management. Security Topics

HIPAA Security. 6 Basics of Risk Analysis and Risk Management. Security Topics HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service Business Case Outsourcing Information Security: The Benefits of a Managed Security Service seccuris.com (866) 644-8442 Contents Introduction... 3 Full- Time Experts vs. a Part- Time In- House Staff...

More information

North American Electric Reliability Corporation (NERC) Cyber Security Standard

North American Electric Reliability Corporation (NERC) Cyber Security Standard North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation

More information

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

REGULATIONS FOR THE SECURITY OF INTERNET BANKING REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY

More information

CIP-010-2 Cyber Security Configuration Change Management and Vulnerability Assessments

CIP-010-2 Cyber Security Configuration Change Management and Vulnerability Assessments CIP-010-2 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:

More information

How To Manage Security On A Networked Computer System

How To Manage Security On A Networked Computer System Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy

More information

Guide to Developing a Cyber Security and Risk Mitigation Plan

Guide to Developing a Cyber Security and Risk Mitigation Plan NRECA / Cooperative Research Network Smart Grid Demonstration Project Guide to Developing a Cyber Security and Risk Mitigation Plan DOE Award No: DE-OE0000222 National Rural Electric Cooperative Association,

More information

Standard: Information Security Incident Management

Standard: Information Security Incident Management Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of

More information

Navigate Your Way to NERC Compliance

Navigate Your Way to NERC Compliance Navigate Your Way to NERC Compliance NERC, the North American Electric Reliability Corporation, is tasked with ensuring the reliability and safety of the bulk power system in North America. As of 2010,

More information

Solution Brief for ISO 27002: 2013 Audit Standard ISO 27002. Publication Date: Feb 6, 2015. EventTracker 8815 Centre Park Drive, Columbia MD 21045

Solution Brief for ISO 27002: 2013 Audit Standard ISO 27002. Publication Date: Feb 6, 2015. EventTracker 8815 Centre Park Drive, Columbia MD 21045 Solution Brief for ISO 27002: 2013 Audit Standard Publication Date: Feb 6, 2015 8815 Centre Park Drive, Columbia MD 21045 ISO 27002 About delivers business critical software and services that transform

More information

VMware vcloud Air HIPAA Matrix

VMware vcloud Air HIPAA Matrix goes to great lengths to ensure the security and availability of vcloud Air services. In this effort VMware has completed an independent third party examination of vcloud Air against applicable regulatory

More information

Best Practices in ICS Security for System Operators. A Wurldtech White Paper

Best Practices in ICS Security for System Operators. A Wurldtech White Paper Best Practices in ICS Security for System Operators A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security

More information

Information Bulletin

Information Bulletin Public Policy Division Impact of NIST Guidelines for Cybersecurity Prepared by UTC Staff 1. Introduction... 3 2. Cybersecurity Landscape... 3 3. One Likely Scenario... 5 4. Draft NISTIR 7628, Guidelines

More information

Continuity Planning and Disaster Recovery

Continuity Planning and Disaster Recovery Responsible Officer: AVP - Information Technology Services & UC Chief Information Officer Responsible Office: IT - Information Technology Services Issuance Date: 7/27/2007 Effective Date: 7/27/2007 Scope:

More information

GAO. IT SUPPLY CHAIN Additional Efforts Needed by National Security- Related Agencies to Address Risks

GAO. IT SUPPLY CHAIN Additional Efforts Needed by National Security- Related Agencies to Address Risks GAO For Release on Delivery Expected at 10:00 a.m. EDT Tuesday, March 27, 2012 United States Government Accountability Office Testimony Before the Subcommittee on Oversight and Investigations, Committee

More information

Defending Against Data Beaches: Internal Controls for Cybersecurity

Defending Against Data Beaches: Internal Controls for Cybersecurity Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity

More information

Best Practices for Log File Management (Compliance, Security, Troubleshooting)

Best Practices for Log File Management (Compliance, Security, Troubleshooting) Log Management: Best Practices for Security and Compliance The Essentials Series Best Practices for Log File Management (Compliance, Security, Troubleshooting) sponsored by Introduction to Realtime Publishers

More information

Guideline on Vulnerability and Patch Management

Guideline on Vulnerability and Patch Management CMSGu2014-03 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Vulnerability and Patch Management National Computer Board

More information

SOFTWARE ASSET MANAGEMENT Continuous Monitoring. September 16, 2013

SOFTWARE ASSET MANAGEMENT Continuous Monitoring. September 16, 2013 SOFTWARE ASSET MANAGEMENT Continuous Monitoring September 16, 2013 Tim McBride National Cybersecurity Center of Excellence timothy.mcbride@nist.gov David Waltermire Information Technology Laboratory david.waltermire@nist.gov

More information

GEARS Cyber-Security Services

GEARS Cyber-Security Services Florida Department of Management Services Division of State Purchasing Table of Contents Introduction... 1 About GEARS... 2 1. Pre-Incident Services... 3 1.1 Incident Response Agreements... 3 1.2 Assessments

More information

Ovation Security Center Data Sheet

Ovation Security Center Data Sheet Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations

More information

Preparing for the HIPAA Security Rule

Preparing for the HIPAA Security Rule A White Paper for Health Care Professionals Preparing for the HIPAA Security Rule Introduction The Health Insurance Portability and Accountability Act (HIPAA) comprises three sets of standards transactions

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

ARTICLE 10. INFORMATION TECHNOLOGY

ARTICLE 10. INFORMATION TECHNOLOGY ARTICLE 10. INFORMATION TECHNOLOGY I. Virtual Private Network (VPN) The purpose of this policy is to provide guidelines for Virtual Private Network (VPN) connections to Education Division s resources.

More information

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance GE Oil & Gas Cyber Security for NERC CIP Versions 5 & 6 Compliance Cyber Security for NERC CIP Versions 5 & 6 Compliance 2 Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security

More information

Security Incident Response Process. Category: Information Security and Privacy. The Commonwealth of Pennsylvania

Security Incident Response Process. Category: Information Security and Privacy. The Commonwealth of Pennsylvania Security Incident Response Process Category: Information Security and Privacy The Commonwealth of Pennsylvania Executive Summary The Commonwealth of Pennsylvania is a trusted steward of citizen information.

More information

Information Security Incident Management Guidelines

Information Security Incident Management Guidelines Information Security Incident Management Guidelines INFORMATION TECHNOLOGY SECURITY SERVICES http://safecomputing.umich.edu Version #1.0, June 21, 2006 Copyright 2006 by The Regents of The University of

More information

CPNI VIEWPOINT CYBER SECURITY ASSESSMENTS OF INDUSTRIAL CONTROL SYSTEMS

CPNI VIEWPOINT CYBER SECURITY ASSESSMENTS OF INDUSTRIAL CONTROL SYSTEMS CPNI VIEWPOINT CYBER SECURITY ASSESSMENTS OF INDUSTRIAL CONTROL SYSTEMS MARCH 2011 Acknowledgements This Viewpoint is based upon the Cyber Security Assessments of Industrial Control Systems Good Practice

More information

CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS

CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS MARCH 2011 Acknowledgements This Viewpoint is based upon the Recommended Practice: Configuring and Managing Remote Access

More information

CYBERSECURITY TESTING & CERTIFICATION SERVICE TERMS

CYBERSECURITY TESTING & CERTIFICATION SERVICE TERMS CYBERSECURITY TESTING & CERTIFICATION SERVICE TERMS These Cybersecurity Testing and Certification Service Terms ( Service Terms ) shall govern the provision of cybersecurity testing and certification services

More information

How To Evaluate A Cooperative For Safety

How To Evaluate A Cooperative For Safety NARUC 2013 Cyber Security Risk Assessment & Risk Mitigation Plan Review for the Kentucky Public Service Commission NARUC Grants & Research December 2013 The National Association of Regulatory Utility Commissioners

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

Draft Information Technology Policy

Draft Information Technology Policy Draft Information Technology Policy Version 3.0 Draft Date June 2014 Status Draft Approved By: Table of Contents 1.0 Introduction... 6 Background... 6 Purpose... 6 Scope... 6 Legal Framework... 6 2.0 Software

More information

Information Security Program Management Standard

Information Security Program Management Standard State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES

More information

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT OVERVIEW The National Institute of Standards of Technology Framework for Improving Critical Infrastructure Cybersecurity (The NIST Framework) is a

More information

Consulting International

Consulting International NIST Cyber Security Working Group (CSWG) NISTIR 7628: NIST Guidelines for Smart Grid Cyber Security Frances Cleveland Xanthus Consulting International Xanthus Consulting International fcleve@xanthus-consulting.com

More information

Breach Found. Did It Hurt?

Breach Found. Did It Hurt? ANALYST BRIEF Breach Found. Did It Hurt? INCIDENT RESPONSE PART 2: A PROCESS FOR ASSESSING LOSS Authors Christopher Morales, Jason Pappalexis Overview Malware infections impact every organization. Many

More information

Panel Session: Lessons Learned in Smart Grid Cybersecurity

Panel Session: Lessons Learned in Smart Grid Cybersecurity PNNL-SA-91587 Panel Session: Lessons Learned in Smart Grid Cybersecurity TCIPG Industry Workshop Jeff Dagle, PE Chief Electrical Engineer Advanced Power and Energy Systems Pacific Northwest National Laboratory

More information

With the large number of. How to Avoid Disaster: RIM s Crucial Role in Business Continuity Planning. Virginia A. Jones, CRM, FAI RIM FUNDAMENTALS

With the large number of. How to Avoid Disaster: RIM s Crucial Role in Business Continuity Planning. Virginia A. Jones, CRM, FAI RIM FUNDAMENTALS How to Avoid Disaster: RIM s Crucial Role in Business Continuity Planning The world has experienced a great deal of natural and man-made upheaval and destruction in the past few years, including tornadoes,

More information

Information Technology Branch Access Control Technical Standard

Information Technology Branch Access Control Technical Standard Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,

More information

Naperville Smart Grid Initiative

Naperville Smart Grid Initiative Naperville Smart Grid Initiative Business Case Fundamentals Updated on 9/7/2010 Summary The NGSI program delivers an excellent ROI by increasing network reliability, operational efficiencies, reducing

More information

White Paper An Enterprise Security Program and Architecture to Support Business Drivers

White Paper An Enterprise Security Program and Architecture to Support Business Drivers White Paper An Enterprise Security Program and Architecture to Support Business Drivers seccuris.com (866) 644-8442 Contents Introduction... 3 Information Assurance... 4 Sherwood Applied Business Security

More information

Teradata and Protegrity High-Value Protection for High-Value Data

Teradata and Protegrity High-Value Protection for High-Value Data Teradata and Protegrity High-Value Protection for High-Value Data 03.16 EB7178 DATA SECURITY Table of Contents 2 Data-Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper

Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper Regulatory Compliance Solutions for Microsoft Windows IT Security Controls Supporting DHS HIPAA Final Security Rules Health Insurance Portability and Accountability Act Enterprise Compliance Auditing &

More information

Retention & Destruction

Retention & Destruction Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of

More information

IBM SECURITY QRADAR INCIDENT FORENSICS

IBM SECURITY QRADAR INCIDENT FORENSICS IBM SECURITY QRADAR INCIDENT FORENSICS DELIVERING CLARITY TO CYBER SECURITY INVESTIGATIONS Gyenese Péter Channel Sales Leader, CEE IBM Security Systems 12014 IBM Corporation Harsh realities for many enterprise

More information

Logging In: Auditing Cybersecurity in an Unsecure World

Logging In: Auditing Cybersecurity in an Unsecure World About This Course Logging In: Auditing Cybersecurity in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that

More information

Risk Assessment Guide

Risk Assessment Guide KirkpatrickPrice Assessment Guide Designed Exclusively for PRISM International Members KirkpatrickPrice. innovation. integrity. delivered. KirkpatrickPrice Assessment Guide 2 Document Purpose The Assessment

More information

IBM Security QRadar Risk Manager

IBM Security QRadar Risk Manager IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Collect network security device configuration data to

More information

TRIPWIRE NERC SOLUTION SUITE

TRIPWIRE NERC SOLUTION SUITE CONFIDENCE: SECURED SOLUTION BRIEF TRIPWIRE NERC SOLUTION SUITE TAILORED SUITE OF PRODUCTS AND SERVICES TO AUTOMATE NERC CIP COMPLIANCE u u We ve been able to stay focused on our mission of delivering

More information

Symphony Plus Cyber security for the power and water industries

Symphony Plus Cyber security for the power and water industries Symphony Plus Cyber security for the power and water industries Symphony Plus Cyber Security_3BUS095402_(Oct12)US Letter.indd 1 01/10/12 10:15 Symphony Plus Cyber security for the power and water industries

More information

Enabling the SmartGrid through Cloud Computing

Enabling the SmartGrid through Cloud Computing Enabling the SmartGrid through Cloud Computing April 2012 Creating Value, Delivering Results 2012 eglobaltech Incorporated. Tech, Inc. All rights reserved. 1 Overall Objective To deliver electricity from

More information

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS Read the Marsh Risk Management Research Briefing: Cyber Risks Extend Beyond Data and Privacy Exposures To access the report, visit www.marsh.com.

More information