FERC, NERC and Emerging CIP Standards
|
|
|
- Leslie James
- 10 years ago
- Views:
Transcription
1 Protecting Critical Infrastructure and Cyber Assets in Power Generation and Distribution Embracing standards helps prevent costly fines and improves operational efficiency Bradford Hegrat, CISSP, Principal Security Consultant Clark Case, Logix Software Product Manager, Rockwell Automation With access to power namely electricity considered as one of the basic requirements for modern society, it s hard to believe that there once was a time when access to electricity was a luxury reserved only for the wealthy. Access to consistent, reliable power is so important that the U.S. Government has made it a priority to assure that it s protected from physical and cyber threats natural or intentional. Regulations put in place by the Federal Energy Regulatory Commission (FERC) are quickly moving toward final adoption, and they have farreaching implications for companies involved in power generation and distribution. Staying ahead of these regulations can prevent costly fines, but the silver lining is that preparing for them can help identify ways to improve operational efficiency. Rockwell Automation takes a blended approach to helping companies embrace and comply with these new standards through a combination of advanced control and information systems, and industry experience and consultation. FERC, NERC and Emerging CIP Standards The Federal Energy Regulatory Commission (FERC) regulates the interstate transmission of electricity, natural gas, and oil. One of those regulatory responsibilities is to ensure the reliability of high-voltage interstate transmission systems. Formed in 1968, the North American Electric Reliability Corporation (NERC) is a voluntary consortium of power companies that takes the reliability standards set by FERC and helps companies execute plans to ensure the reliability and availability at a regional level. FERC sets reliability standards for all types of energy while NERC helps member electric companies translate how those standards apply to them.
2 2 Protecting Critical Infrastructure and Cyber Assets in Power Generation and Distribution While power companies have had safeguards to protect physical and human assets in place for some time, the emergence of new technologies that allow for long-distance control and information sharing within the power infrastructure has created the possibility of threats coming from the Internet rather than the physical world. In order to continue its mission, NERC developed a set of enforceable reliability standards that must be followed by companies responsible for the reliability and availability of the Bulk Electric System (BES) in North America. The standards specifically pertaining to the identification and protection of Cyber Critical Assets are known as the NERC Critical Infrastructure Protection (CIP) standards, more commonly referred to as NERC CIP standards. Cyber Critical Assets are the devices used to support the day-to-day operation of Critical Assets and the distribution of electricity to the BES. A Critical Asset is one which is necessary to maintain the reliability of the BES, such as a generating unit with blackstart capacity (i.e. a unit that does not require a secondary power source for initial startup purposes). Guidelines for identifying Cyber Critical Assets are contained in the NERC CIP standard CIP A broad majority of companies do not recognize that they own or operate Critical Assets, at least when it comes to complying with the NERC CIP standards. When NERC completed its 2009 self-certification compliance survey for CIP-002-1, it found that less than one-third of generation owners and operators had identified at least one Critical Asset within their facilities. The primary reason for the low number of Cyber Critical Assets identified by generation owners is the ambiguous language used in NERC-CIP This is currently under review and revision by NERC and FERC. Investments to meet NERC CIP standards could significantly increase operating budgets which in turn will drive costs and power prices upward. This is a real concern for generation owners as their market evolves toward a Smart Grid requiring them to be the low cost power provider. However, sanctions for noncompliance to the NERC CIP standards are also significant, with fines reaching up to $1 million per day. Finding a clear path amidst the confusion is critical for generation owners. The end result will reach beyond simply checking off another box in a long regulatory checklist. Reaching an appropriate balance of the investment needed to be competitive while simultaneously complying with NERC CIP is essential and will dramatically influence the growth or loss of the generation owner s customer base. A brief overview of NERC CIP There are key resources, which can be publicly or privately controlled, that are essential to the minimal operations of the economy and government. These are collectively known as the Critical Infrastructure. The power generation and distribution system makes up an important part of the Critical Infrastructure. In order to protect this portion of the Critical Infrastructure, NERC developed the NERC CIP standards. The primary objective of the NERC CIP standards is to help assess the reliability of each facet within the power infrastructure, evaluate power companies preparedness in the face of an attack or unplanned interruption of operations, and to continue education and awareness for employees of these companies. As defined by NERC, Critical Infrastructure Protection covers the assets, systems and networks, whether physical or virtual, considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, public health or safety, or any combination thereof.
3 3 Protecting Critical Infrastructure and Cyber Assets in Power Generation and Distribution The NERC regulations boil down to eight standards. At Rockwell Automation, we ve found greater simplicity and speed in the compliance process by dividing these eight standards into three groups. Plan to protect your Cyber Critical Assets. CIP-003-1, , , and all offer guidance on how to secure individual assets within a system. These standards include requirements for identifying the owners of cyber critical assets and for documenting exceptions to those cyber critical assets. They also have requirements for applying standards that protect the information associated with those assets and similarly include an annual evaluation of managing these security controls. Maintaining these security standards is also defined within this set of four standards, as are guidelines for reporting and responding to a system threat and recovery recommendations in the event that a company loses access to an asset. Know what you ve got and where it is With CIP and , the most important step companies can take is to understand what Critical Assets exist within a system, and what cyber critical assets are essential to the operation of those Critical Assets. Examples can include systems and facilities at master and remote sites that provide monitoring and control, real-time power system modeling, and real-time inter-utility data exchange. With those assets identified, companies must then ensure and document that every cyber critical asset resides within an electronic security perimeter. This perimeter needs to include electronically monitored access control, as well as an annual review of the perimeter s cyber vulnerability. Tend to the physical security of your assets. While many already have addressed physical security, CIP and standards direct companies how to create and maintain a physical security plan that complements the cyber security measures already in place, with requirements for documenting physical access controls. Additionally, these standards address the need to ensure that companies have proper screening processes in place for hiring personnel, and that all employees are aware of the security measures used and are trained on how to use them. Implications of NERC CIP noncompliance In an industry that s already regulated, the introduction of new standards always prompts a review of how these standards will affect or change current operating systems. From an operations standpoint, these standards mean more systems testing and more paperwork unwelcome news to companies operating with margins that are already stretched thin. In addition, the standards also will have an impact on how control systems are put together to ensure compliance is maintained during system upgrades or expansions. Yet, the imperative for understanding how compliance applies, and documenting how systems are in compliance, is clear in how violations are reported and sanctions are meted. Once an incident of noncompliance is confirmed by NERC, it is posted to a public forum where it is widely accessible. Companies found in noncompliance are required to submit a mitigation plan detailing how it will be brought back into full compliance. Fines are then assessed to the company based on calculations involving the timeframe of the violation; whether repetitive violations were recorded; any failure to comply with compliance directives; if the violation was intentional or if company representatives attempted to conceal the violation; how cooperative the company was during the investigation; any self-disclosure or voluntary corrective actions undertaken by the company; and other extenuating circumstances. Fines start at $1000 per day, and can go up to $1,000,000 per day for the most blatant and egregious violations.
4 4 Protecting Critical Infrastructure and Cyber Assets in Power Generation and Distribution As is the case with many regulatory standards, compliance can be both a burden and a boon. Generally speaking, it s sound business sense to regularly evaluate your systems, identify potential weaknesses within those systems, and take steps to strengthen those areas. While avoiding fines may motivate some, there are other business benefits to consider. For example, while power companies design their systems to optimize efficiencies and maintain continuous operations, these standards reinforce a sound practice of regularly reviewing critical systems for any potential vulnerabilities and addressing them before they create an interruption of service or are used as an inroad for some malicious act. This encourages operations directors to reduce the number of unknowns that can compromise the stability of a power control system. Avoiding system downtime means avoiding the costs associated with bringing the system back up and compensating for the interruption of service. Rockwell Automation Can Help Having taken that critical first step in defining your cyber critical assets, finding the most efficient way to achieve and document your company s compliance and avoid NERC sanctions is the next. At Rockwell Automation, we already offer the solutions and services that help you fulfill the NERC requirements. Rockwell Automation Network & Security Services can help companies at any point in their progress toward NERC CIP compliance. Our converged team made up of manufacturing engineers and IT professionals collaborate with you to help manage the differences between manufacturing and IT enterprises and their associated risks. This can be done not only through technology, but also through policies, procedures and behavior allowing you to achieve your production and business goals. Our consultants consider where you are in your control system or security lifecycle, and develop a plan to help improve system reliability and increase overall equipment effectiveness. From a product perspective, two system-oriented offerings in particular can help you meet NERC CIP requirements Rockwell Automation FactoryTalk Security and FactoryTalk AssetCentre. The FactoryTalk Services Platform is embedded in all control and information products from Rockwell Automation including RSLogix, PlantPAx, FactoryTalk View, FactoryTalk Historian, FactoryTalk Asset Centre. The FactoryTalk Services platform provides a centralized role based access control system through a software service called FactoryTalk Security. The FactoryTalk Security architecture is similar to that of Microsoft Windows and provides many of the same capabilities, plus additional features customized specifically for the needs of automation systems. FactoryTalk Security controls user access to applications and devices and provides user authentication and authorization. Using FactoryTalk Security can help you address several of the NERC CIP requirements. For example: CIP R4.2 calls for revoking access to Cyber Critical Assets within 24 hours for personnel that have been terminated. With FactoryTalk Security, an administrator can revoke access to software products and devices immediately. CIP R5 contains several requirements in the area of Account Management. With FactoryTalk Security, you can meet all of these requirements.
5 5 Protecting Critical Infrastructure and Cyber Assets in Power Generation and Distribution FactoryTalk AssetCentre provides you with a set of asset-centric focused tools to securely and centrally manage your factory and process automation production environments by tracking users' actions, managing asset configuration files, and providing backup and recovery of operating asset configurations. With these capabilities, compliance with many CIP requirements is much easier. For example: CIP R6 requires a comprehensive change control and configuration management process. FactoryTalk AssetCentre can be a key technical part of such a process. FactoryTalk AssetCentre has add-ons which support Calibration Management and Process Device Configuration. The Calibration Management capability allows for a paperless calibration solution: managing calibration requirements, specifications, schedules, calibration results and reporting. Process Device Configuration allows you to access instrument parameters, aids in configuration and commissioning process devices and helps with diagnostics. Acting as a host system, or frame application, it gives you the ability to work with multiple vendors instruments in one common platform. CIP R4 calls for a recovery plan to restore Cyber Critical Assets to operation. Configuration backup and recovery is a core feature of FactoryTalk AssetCentre, and can help make this plan much easier to execute. FactoryTalk AssetCentre provides control system backup that is integrated with source control to provide reliable and easy access to the latest control system configuration file. Both Rockwell Automation and third-party assets are supported. Rockwell Automation provides information and solutions that help you meet other requirements as well. A list of TCP and UDP ports used by Rockwell Automation products is maintained on our Knowledgebase, helping you meet CIP R2, Ports and Services. All TechConnect SM subscribers can access results of the Rockwell Automation Patch Qualification process, in which Microsoft operating system patches are tested for compatibility with Rockwell Automation software products. Using this service can help you meet CIP-007-1, Security Patch Management. Make the most of compliance measures The companies who move the fastest to meet compliance will not only avoid sanctions and fines, but also offer customers the added assurance that comes with regular security reviews. They can help ensure the reliability and availability of the power needed to serve homes and businesses throughout the country. Partnering with Rockwell Automation can help you protect your ability to generate and distribute the valuable energy resource. Additionally, Rockwell Automation can simultaneously help you comply with key government standards and regulations designed specifically to protect critical assets on which the United States critical infrastructure relies. To learn more about Rockwell Automation s capabilities to address your compliance needs, visit HUhttp:// Here you will find information regarding our security products and services, including a link to our HNetwork & Security ServicesH consultancy. Publication ENET-WP020A-EN-P July 2010 Copyright 2010 Rockwell Automation, Inc. All Rights Reserved. Printed in USA.
TRIPWIRE NERC SOLUTION SUITE
CONFIDENCE: SECURED SOLUTION BRIEF TRIPWIRE NERC SOLUTION SUITE TAILORED SUITE OF PRODUCTS AND SERVICES TO AUTOMATE NERC CIP COMPLIANCE u u We ve been able to stay focused on our mission of delivering
Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions
Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample
Standard CIP 007 3a Cyber Security Systems Security Management
A. Introduction 1. Title: Cyber Security Systems Security Management 2. Number: CIP-007-3a 3. Purpose: Standard CIP-007-3 requires Responsible Entities to define methods, processes, and procedures for
North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)
Whitepaper North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5) NERC-CIP Overview The North American Electric Reliability Corporation (NERC) is a
Summary of CIP Version 5 Standards
Summary of CIP Version 5 Standards In Version 5 of the Critical Infrastructure Protection ( CIP ) Reliability Standards ( CIP Version 5 Standards ), the existing versions of CIP-002 through CIP-009 have
NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice
NERC Cyber Security Compliance Consulting Services HCL Governance, Risk & Compliance Practice Overview The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to
Standard CIP 007 3 Cyber Security Systems Security Management
A. Introduction 1. Title: Cyber Security Systems Security Management 2. Number: CIP-007-3 3. Purpose: Standard CIP-007-3 requires Responsible Entities to define methods, processes, and procedures for securing
Document ID. Cyber security for substation automation products and systems
Document ID Cyber security for substation automation products and systems 2 Cyber security for substation automation systems by ABB ABB addresses all aspects of cyber security The electric power grid has
LogRhythm and NERC CIP Compliance
LogRhythm and NERC CIP Compliance The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to ensure that the bulk electric system in North America is reliable, adequate
SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards
SCADA Compliance Tools For NERC-CIP The Right Tools for Bringing Your Organization in Line with the Latest Standards OVERVIEW Electrical utilities are responsible for defining critical cyber assets which
Implementation Plan for Version 5 CIP Cyber Security Standards
Implementation Plan for Version 5 CIP Cyber Security Standards April 10September 11, 2012 Prerequisite Approvals All Version 5 CIP Cyber Security Standards and the proposed additions, modifications, and
AURORA Vulnerability Background
AURORA Vulnerability Background Southern California Edison (SCE) September 2011-1- Outline What is AURORA? Your Responsibility as a Customer Sectors Impacted by AURORA Review of Regulatory Agencies History
Information Shield Solution Matrix for CIP Security Standards
Information Shield Solution Matrix for CIP Security Standards The following table illustrates how specific topic categories within ISO 27002 map to the cyber security requirements of the Mandatory Reliability
North American Electric Reliability Corporation (NERC) Cyber Security Standard
North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation
CIP-003-5 Cyber Security Security Management Controls
A. Introduction 1. Title: Cyber Security Security Management Controls 2. Number: CIP-003-5 3. Purpose: To specify consistent and sustainable security management controls that establish responsibility and
Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper
Best Practices in ICS Security for Device Manufacturers A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
NERC CIP Tools and Techniques
NERC CIP Tools and Techniques Supplemental Project - Introduction Webcast Scott Sternfeld, Project Manager Smart Grid Substation & Cyber Security Research Labs [email protected] (843) 619-0050 October
Meeting NERC CIP Access Control Standards. Presented on February 12, 2014
Meeting NERC CIP Access Control Standards Presented on February 12, 2014 Presented By: CyberLock The leading supplier of key-centric access control systems Based in Corvallis, Oregon James T. McGowan Technology
Cyber Security for NERC CIP Version 5 Compliance
GE Measurement & Control Cyber Security for NERC CIP Version 5 Compliance imagination at work Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security Management Controls...
Cyber Security Compliance (NERC CIP V5)
Cyber Security Compliance (NERC CIP V5) Ray Wright NovaTech, LLC Abstract: In December 2013, the Federal Energy Regulatory Commission (FERC) issued Order No. 791 which approved the Version 5 CIP Reliability
The first step in protecting Critical Cyber Assets is identifying them. CIP-002 focuses on this identification process.
CIPS Overview Introduction The reliability of the energy grid depends not only on physical assets, but cyber assets. The North American Electric Reliability Corporation (NERC) realized that, along with
NERC Cyber Security Standards
SANS January, 2008 Stan Johnson Manager of Situation Awareness and Infrastructure Security [email protected] 609-452-8060 Agenda History and Status of Applicable Entities Definitions High Level of
CIP-010-2 Cyber Security Configuration Change Management and Vulnerability Assessments
CIP-010-2 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:
Regulatory Compliance Management for Energy and Utilities
Regulatory Compliance Management for Energy and Utilities The Energy and Utility (E&U) sector is transforming as enterprises are looking for ways to replace aging infrastructure and create clean, sustainable
Top 10 Compliance Issues for Implementing Security Programs
www.dyonyx.com Top 10 Compliance Issues for Implementing Security Programs This White Paper articulates the top ten issues that we have encountered in the design and implementation of comprehensive Security
GE Intelligent Platforms. Meeting NERC Change Control Requirements for HMI/SCADA and Control Systems
GE Intelligent Platforms Meeting NERC Change Control Requirements for HMI/SCADA and Control Systems Meeting NERC Change Control Requirements for HMI/SCADA and Control Systems Overview There is a lot of
NERC CIP Compliance with Security Professional Services
NERC CIP Compliance with Professional Services The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to ensure that the bulk electric system in North America is
Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc.
Cyber Security Presentation Ontario Energy Board Smart Grid Advisory Committee Doug Westlund CEO, N-Dimension Solutions Inc. October 1, 2013 Cyber Security Protection for Critical Infrastructure Assets
Simplifying the Transition to Virtualization TS17
Simplifying the Transition to Virtualization TS17 Name Sandeep Redkar Title Manager Process Solutions Date 11 th February 2015 Agenda Overview & Drivers Virtualization for Production Rockwell Automation
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
White Paper. April 2006. Security Considerations for Utilities Utilities Tap Into the Power of SecureWorks
White Paper April 2006 Security Considerations for Utilities Utilities Tap Into the Power of SecureWorks According to a recent Harris Interactive survey, the country s leading business executives consider
EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project
EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies
Lessons Learned CIP Reliability Standards
Evidence for a requirement was not usable due to a lack of identifying information on the document. An entity should set and enforce a "quality of evidence" standard for its compliance documentation. A
Plans for CIP Compliance
Testing Procedures & Recovery Plans for CIP Compliance DECEMBER 16, 2009 Developed with: Presenters Bart Thielbar, CISA Senior Research hanalyst Sierra Energy Group, a Division of Energy Central Primer
NERC CIP VERSION 5 COMPLIANCE
BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements that are the basis for maintaining
Supporting our customers with NERC CIP compliance. James McQuiggan, CISSP
Supporting our customers with NERC CIP compliance James, CISSP Siemens Energy Sector Energy products and solutions - in 6 Divisions Oil & Gas Fossil Power Generation Renewable Energy Service Rotating Equipment
NERC-CIP S MOST WANTED
WHITE PAPER NERC-CIP S MOST WANTED The Top Three Most Violated NERC-CIP Standards What you need to know to stay off the list. www.alertenterprise.com NERC-CIP s Most Wanted AlertEnterprise, Inc. White
Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, 28.09.2015 CASE: Implementation of Cyber Security for Yara Glomfjord
Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, 28.09.2015 CASE: Implementation of Cyber Security for Yara Glomfjord Implementation of Cyber Security for Yara Glomfjord Speaker profile Olav Mo ABB
Symphony Plus Cyber security for the power and water industries
Symphony Plus Cyber security for the power and water industries Symphony Plus Cyber Security_3BUS095402_(Oct12)US Letter.indd 1 01/10/12 10:15 Symphony Plus Cyber security for the power and water industries
Alberta Reliability Standard Cyber Security System Security Management CIP-007-AB-5
A. Introduction 1. Title: 2. Number: 3. Purpose: To manage system security by specifying select technical, operational, and procedural requirements in support of protecting BES cyber systems against compromise
BSM for IT Governance, Risk and Compliance: NERC CIP
BSM for IT Governance, Risk and Compliance: NERC CIP Addressing NERC CIP Security Program Requirements SOLUTION WHITE PAPER Table of Contents INTRODUCTION...................................................
Top Ten Compliance Issues for Implementing the NERC CIP Reliability Standard
Top Ten Compliance Issues for Implementing the NERC CIP Reliability Standard The North American Electric Reliability Corporation 1 s (NERC) CIP Reliability Standard is the most comprehensive and pervasive
How to Integrate NERC s Requirements in an Ongoing Automation and Integration Project Framework
How to Integrate NERC s Requirements in an Ongoing Automation and Integration Project Framework Jacques Benoit, Cooper Power Systems Inc., Energy Automations Solutions - Cybectec Robert O Reilly, Cooper
The Next Generation of Security Leaders
The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish
Five keys to a more secure data environment
Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational
GE Measurement & Control. Cyber Security for NERC CIP Compliance
GE Measurement & Control Cyber Security for NERC CIP Compliance GE Proprietary Information: This document contains proprietary information of the General Electric Company and may not be used for purposes
Verve Security Center
Verve Security Center Product Features Supports multiple control systems. Most competing products only support a single vendor, forcing the end user to purchase multiple security systems Single solution
Industrial Security Solutions
Industrial Security Solutions Building More Secure Environments From Enterprise to End Devices You have assets to protect. Control systems, networks and software can all help defend against security threats
GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance
GE Oil & Gas Cyber Security for NERC CIP Versions 5 & 6 Compliance Cyber Security for NERC CIP Versions 5 & 6 Compliance 2 Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security
Completed. Document Name. NERC CIP Requirements CIP-002 Critical Cyber Asset Identification R1 Critical Asset Identifaction Method
NERC CIP Requirements CIP-002 Critical Cyber Asset Identification R1 Critical Asset Identifaction Method R2 Critical Asset Identification R3 Critical Cyber Asset Identification Procedures and Evaluation
Alberta Reliability Standard Cyber Security Configuration Change Management and Vulnerability Assessments CIP-010-AB-1
A. Introduction 1. Title: 2. Number: 3. Purpose: To prevent and detect unauthorized changes to BES cyber systems by specifying configuration change management and vulnerability assessment requirements
NovaTech NERC CIP Compliance Document and Product Description Updated June 2015
NovaTech NERC CIP Compliance Document and Product Description Updated June 2015 This document describes the NovaTech Products for NERC CIP compliance and how they address the latest requirements of NERC
How to Choose the Right Industrial Firewall: The Top 7 Considerations. Li Peng Product Manager
How to Choose the Right Industrial Firewall: The Top 7 Considerations Li Peng Product Manager The right industrial firewall can strengthen the safety and reliability of control systems Central to industrial
Effective Use of Assessments for Cyber Security Risk Mitigation
White Paper Effective Use of Assessments for Cyber Security Risk Mitigation Executive Summary Managing risk related to cyber security vulnerabilities is a requirement for today s modern systems that use
Computer System Security Updates
Why patch? If you have already deployed a network architecture, such as the one recommended by Rockwell Automation and Cisco in the Converged Plantwide Ethernet Design and Implementation Guide (http://www.ab.com/networks/architectures.html),
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
BPA Policy 434-1 Cyber Security Program
B O N N E V I L L E P O W E R A D M I N I S T R A T I O N BPA Policy Table of Contents.1 Purpose & Background...2.2 Policy Owner... 2.3 Applicability... 2.4 Terms & Definitions... 2.5 Policy... 5.6 Policy
Information Technology Security Review April 16, 2012
Information Technology Security Review April 16, 2012 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing
Critical Infrastructure Security: The Emerging Smart Grid. Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn
Critical Infrastructure Security: The Emerging Smart Grid Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn Overview Assurance & Evaluation Security Testing Approaches
Written Statement of Richard Dewey Executive Vice President New York Independent System Operator
Written Statement of Richard Dewey Executive Vice President New York Independent System Operator Senate Standing Committee on Veterans, Homeland Security and Military Affairs Senator Thomas D. Croci, Chairman
Standard CIP 003 1 Cyber Security Security Management Controls
A. Introduction 1. Title: Cyber Security Security Management Controls 2. Number: CIP-003-1 3. Purpose: Standard CIP-003 requires that Responsible Entities have minimum security management controls in place
Automating NERC CIP Compliance for EMS. Walter Sikora 2010 EMS Users Conference
Automating NERC CIP Compliance for EMS Walter Sikora 2010 EMS Users Conference What do we fear? Thieves / Extortionists Enemies/Terrorists Stuxnet Malware Hacker 2025 Accidents / Mistakes 9/21/2010 # 2
CONTROL SYSTEM VENDOR CYBER SECURITY TRENDS INTERIM REPORT
Energy Research and Development Division FINAL PROJECT REPORT CONTROL SYSTEM VENDOR CYBER SECURITY TRENDS INTERIM REPORT Prepared for: Prepared by: California Energy Commission KEMA, Inc. MAY 2014 CEC
PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PATCH MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Ease Server Support With Pre-Configured Virtualization Systems
Ease Server Support With Pre-Configured Virtualization Systems Manufacturers and industrial production companies are increasingly challenged with supporting the complex server environments that host their
Need to be PCI DSS compliant and reduce the risk of fraud?
Need to be PCI DSS compliant and reduce the risk of fraud? NCR Security lessens your PCI compliance burden and protects the integrity of your network An NCR White Paper Experience a new world of interaction
NERC CIP Whitepaper How Endian Solutions Can Help With Compliance
NERC CIP Whitepaper How Endian Solutions Can Help With Compliance Introduction Critical infrastructure is the backbone of any nations fundamental economic and societal well being. Like any business, in
Best Practices in ICS Security for System Operators. A Wurldtech White Paper
Best Practices in ICS Security for System Operators A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
CIP 010 1 Cyber Security Configuration Change Management and Vulnerability Assessments
CIP 010 1 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:
Technology Solutions for NERC CIP Compliance June 25, 2015
Technology Solutions for NERC CIP Compliance June 25, 2015 2 Encari s Focus is providing NERC CIP Compliance Products and Services for Generation and Transmission Utilities, Municipalities and Cooperatives
CG Automation Solutions USA
CG Automation Solutions USA (Formerly QEI Inc.) Automation Products and Solutions CG Automation Works for You INDUSTRY SOLUTIONS Electric T&D Utilities Renewable Energy Transit Authorities Public Power
Decrease your HMI/SCADA risk
Decrease your HMI/SCADA risk Key steps to minimize unplanned downtime and protect your organization. Are you running your plant operations with serious risk? Most industrial applications lack recommended
HP Security Solutions for Microsoft
HP Security Solutions for the Microsoft Environment Achieving a secure adaptive enterprise How secure is your Microsoft environment? Enterprise boundaries are expanding, creating the need for faster, easier
Keeping the Lights On
Keeping the Lights On Fundamentals of Industrial Control Risks, Vulnerabilities, Mitigating Controls, and Regulatory Compliance Learning Goals o Understanding definition of industrial controls o Understanding
Patching & Malicious Software Prevention CIP-007 R3 & R4
Patching & Malicious Software Prevention CIP-007 R3 & R4 Scope Compliance Assessment Summary Introspection & Analysis Program-In Review Maturity Model review Control Design review Process Components of
Leveraging a Maturity Model to Achieve Proactive Compliance
Leveraging a Maturity Model to Achieve Proactive Compliance White Paper: Proactive Compliance Leveraging a Maturity Model to Achieve Proactive Compliance Contents Introduction............................................................................................
Voluntary Cybersecurity Initiatives in Critical Infrastructure. Nadya Bartol, CISSP, SGEIT, [email protected]. 2014 Utilities Telecom Council
Voluntary Cybersecurity Initiatives in Critical Infrastructure Nadya Bartol, CISSP, SGEIT, [email protected] 2014 Utilities Telecom Council Utility cybersecurity environment is full of collaborations
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
NSERC SSHRC AUDIT OF IT SECURITY Corporate Internal Audit Division
AUDIT OF IT SECURITY Corporate Internal Audit Division Natural Sciences and Engineering Research Council of Canada Social Sciences and Humanities Research Council of Canada September 20, 2012 Corporate
FACTS Customer Service. Your uptime insurance ABB FACTS Care
FACTS Customer Your uptime insurance ABB FACTS Care FACTS provides more stability and quality in existing and new power networks, with minimal environmental impact. With a complete solutions portfolio,
Alberta Reliability Standard Cyber Security Implementation Plan for Version 5 CIP Security Standards CIP-PLAN-AB-1
External Consultation Draft Version 1.0 December 12, 2013 1. Purpose The purpose of this reliability standard is to set the effective dates for the Version 5 CIP Cyber Security reliability standards and
ABB s approach concerning IS Security for Automation Systems
ABB s approach concerning IS Security for Automation Systems Copyright 2006 ABB. All rights reserved. Stefan Kubik [email protected] The problem Most manufacturing facilities are more connected (and
SCADA Security: Challenges and Solutions
SCADA Security: Challenges and Solutions June 2011 / White paper by Metin Ozturk, Philip Aubin Make the most of your energy Summary Executive Summary... p 2 Protecting Critical Infrastructure Includes
Avoiding the Top 5 Vulnerability Management Mistakes
WHITE PAPER Avoiding the Top 5 Vulnerability Management Mistakes The New Rules of Vulnerability Management Table of Contents Introduction 3 We ve entered an unprecedented era 3 Mistake 1: Disjointed Vulnerability
GE Measurement & Control. Cyber Security for Industrial Controls
GE Measurement & Control Cyber Security for Industrial Controls Contents Overview...3 Cyber Asset Protection (CAP) Software Update Subscription....4 SecurityST Solution Options...5 Centralized Account
ISACA rudens konference
ISACA rudens konference 8 Novembris 2012 Procesa kontroles sistēmu drošība Andris Lauciņš Ievads Kāpēc tēma par procesa kontroles sistēmām? Statistics on incidents Reality of the environment of industrial
Alberta Reliability Standard Cyber Security Security Management Controls CIP-003-AB-5
A. Introduction 1. Title: 2. Number: 3. Purpose: To specify consistent and sustainable security management controls that establish responsibility and accountability to protect BES cyber systems against
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
Standard CIP 004 3a Cyber Security Personnel and Training
A. Introduction 1. Title: Cyber Security Personnel & Training 2. Number: CIP-004-3a 3. Purpose: Standard CIP-004-3 requires that personnel having authorized cyber or authorized unescorted physical access
