Help for the Developers of Control System Cyber Security Standards
|
|
|
- Rodney Walsh
- 10 years ago
- Views:
Transcription
1 INL/CON PREPRINT Help for the Developers of Control System Cyber Security Standards 54 th International Instrumentation Symposium Robert P. Evans May 2008 This is a preprint of a paper intended for publication in a journal or proceedings. Since changes may be made before publication, this preprint should not be cited or reproduced without permission of the author. This document was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, or any of their employees, makes any warranty, expressed or implied, or assumes any legal liability or responsibility for any third party s use, or the results of such use, of any information, apparatus, product or process disclosed in this report, or represents that its use by such third party would not infringe privately owned rights. The views expressed in this paper are not necessarily those of the United States Government or the sponsoring agency.
2 Help for the Developers of Control System Cyber Security Standards Robert P. Evans Control System Security Program Idaho National Laboratory KEY WORDS: Process Control System, Cyber Security, Standards ABSTRACT A Catalog of Control Systems Security: Recommendations for Standards Developers (Catalog), aimed at assisting organizations to facilitate the development and implementation of control system cyber security standards, has been developed. This catalog contains requirements that can help protect control systems from cyber attacks and can be applied to the Critical Infrastructures and Key Resources of the United States and other nations. The requirements contained in the catalog are a compilation of practices or various industry bodies used to increase the security of control systems from both physical and cyber attacks. They should be viewed as a collection of recommendations to be considered and judiciously employed, as appropriate, when reviewing and developing cyber security standards for control systems. The recommendations in the Catalog are intended to be broad enough to provide any industry using control systems the flexibility needed to develop sound cyber security standards specific to their individual security requirements. INTRODUCTION Protecting critical infrastructure is essential to the security, public health and safety, economic vitality, and way of life for a nation s citizens. Fundamental to the protection of critical infrastructure is ensuring the security of the systems that control this infrastructure. Developing and applying robust security standards enables control systems to be secured. Development of security standards specific to critical infrastructure control systems is maturing, however, many standards lack the detailed guidance needed to ensure adequate protection from the emerging threats of cyber attacks on control systems. The Catalog of Control Systems Security: Recommendations for Standards Developers (Catalog) is specifically designed to provide various industry sectors the framework needed to develop sound security standards, guidelines, and best practices. These recommendations are not intended to replace the need for applying sound engineering judgment, best practices, and risk assessments. Decisions regarding when, where, and how these
3 standards should be used are best decided by the specific industry sectors. The objective of the Catalog is to provide those decision makers with a common framework from which to draw requirements for securing control systems. The term control systems, as used throughout the Catalog, includes Supervisory Control and Data Acquisition (SCADA) systems, Process Control Systems, Distributed Control Systems (DCS), and other control systems specific to any of the critical infrastructure industry sectors. Although there are differences in these systems, their similarities enable a common framework for discussing and defining security requirements. As such, control system security standards are currently being developed by a variety of standards development groups to meet the needs of different industry sectors and regulatory environments. However, the requirements developed for a specific sector may not always be consistent or comparable with similar requirements developed in another sector. These developing standards often have differing emphases and levels of detail concerning specific security requirements. The Catalog is intended to encompass these differences and provide a way to clarify security programs for control systems. Use of the Catalog is not limited to a specific industry sector. It should be viewed as a catalog of recommendations to be considered and judiciously employed, as appropriate, when reviewing and developing cyber security standards for control systems. Throughout the development of the Catalog, the following aspects of control systems were considered: Proprietary Control System Technology A large percentage of control system hardware and software is proprietary. However, some vendors are moving toward marketing products that utilize non-proprietary, off-the-shelf technologies. Control system networks may also use proprietary or industry-specific protocols. The proprietary nature of control systems also requires professionals with system-specific knowledge to operate them. Control System Equipment Life Cycle The life cycle for control system hardware is from 5 to 15 years (or more) as compared to the 2 to 3 year (or shorter) life cycle for information technology (IT) business systems. Building security into control system equipment has only started to appear. Legacy systems do not contain the standard security functionality as many IT systems such as encryption or logging. Real Time Operation The systems that control critical infrastructure operations are designed and constructed to be in operation continuously. Any interruption in service may have catastrophic results to human life and property. This is another key difference between control systems and IT business systems and presents a unique challenge for securing these systems because security cannot compromise reliable operation. The goal of a control system security program is to balance availability of the control system with security while operating within resource limits. When developing a security policy to address control systems, these characteristics must be considered. Security is not meant to impede operation and should be as transparent as possible. The most successful security program is one that integrates seamlessly and becomes a common aspect of daily operation. The intent of this document is to help facilitate such a program. The Catalog was compiled by a team of cyber security professionals from several of the National Laboratories and the National Institute of Standards and Technology. The laboratories involved were
4 Argonne National Laboratory located in Argonne, Illinois, Idaho National Laboratory in Idaho Falls, Idaho, Oak Ridge National Laboratory in Oak Ridge Tennessee, Pacific Northwest National Laboratory located in Richland, Washington, and Sandia National Laboratories in Albuquerque, New Mexico. The National Institute of Standards and Technology is located in Gaithersburg, Maryland. This was not only a multi-laboratory effort but a multi-disciplinary effort. The contributors brought experience from many different backgrounds which strengthened the product. This was a multi-year effort requiring cooperation between the contributing organizations and the Department of Homeland Security. DOCUMENT OBJECTIVE The Catalog is intended to assist organizations to ease the development and implementation of control system cyber security standards. It contains requirements that can help protect control systems from cyber attacks and is designed to be applicable to all types of organizations that use control systems to control processes. The requirements contained in the Catalog should be viewed as a collection of recommendations to be considered and thoughtfully employed, as appropriate, when reviewing or developing cyber security standards for control systems. The recommendations are intended to be broad enough to provide any industry using control systems the flexibility needed to develop sound cyber security standards specific to their individual security requirements. The Catalog is a grouping of requirements. Individually they are requirements that can be selected or not, modified or not, for use by an organization in developing a control system cyber security standard. Although it is recommended that all of the requirements be considered in developing a standard, their use is up to the body developing the standard. INPUT DOCUMENT The Catalog was developed using information obtained from eighteen documents, including standards, guidelines, reports, or recommended practices. Not all of these documents were used equally in the development of the Catalog, but all were considered. In many cases, these documents were still in draft condition. They represented various industry sectors including chemical, oil and natural gas, electrical, Federal, information technology, and cross-sector. The documents are listed below: Chemical: Guidance for Addressing Cybersecurity in the Chemical Sector, Chemical Industry Data Exchange (CIDX) Oil and Natural Gas Cryptographic Protection of SCADA Communications, AGA12-1 and 2, American Gas Association Pipeline SCADA Security, API 1164, American Petroleum Institute
5 Security Guidelines for the Petroleum Industry, American Petroleum Institute Security Electrical Guide for Electric Power Substation Physical and Electronic Security, IEEE 1402, Institute of Electrical and Electronics Engineers Critical Infrastructure Protection, NERC CIP through CIP 009-1, North American Electric Reliability Council Security Guidelines for the Electricity Sector, North American Electric Reliability Council Federal Security Requirements for Cryptographic Modules, FIPS 140-2, Federal Information Processing Standards Publication Recommended Security Controls for Federal Information Systems, NIST SP800-53, National Institute of Standards and Technology Information Technology Code of Practice for Information Security Management, ISO/IEC 17799, International Organization for Standardization/ International Electrotechnical Commission Information Security Management Systems Requirements, ISO/IEC 27001, International Organization for Standardization/ International Electrotechnical Commission Cross-Sector Data and Communication Security, IEC 62351, International Electrotechnical Commission Security for Industrial Automation and Control Systems, ANSI/ISA and.02, American National Standards Institute/ Instrumentation, Systems, and Automation Society Security Technologies for Manufacturing and Control Systems, ANSI/ISA-TR , American National Standards Institute/ Instrumentation, Systems, and Automation Society Integrating Electronic Security into the Manufacturing and Control Systems Environment, ANSI/ISA , American National Standards Institute/ Instrumentation, Systems, and Automation Society The Catalog contains a cross-reference section which provides information on how the requirements in the Catalog relate to those in the other industry standards. DOCUMENT SCOPE The Catalog is intended to be a resource, not a standard. In many ways you could consider it a wish book. At one time, when the Sears Catalog would come at Christmas, the children would look at all the toys and maybe wish for the train, a doll, or the cowboy set and then making out your letter to Santa. This is much the same concept. The idea is that the Catalog provides a single source from which a list of recommendations can selected for use in preparing requirements for a standard, therefore an organization only needs to consult a single source rather than sifting through the large collection of industry standards themselves.
6 The Catalog was designed to be applicable to all sectors. This is intended though to be control system specific. In order for the catalog to be useful to a wide variety of organizations, it of necessity must be very granular or general in nature. It is left to the organization to fill in specifics for their industry. The Catalog is intended to be a living document that will be updated as information becomes available. DOCUMENT STRUCTURE The 219 requirements contained in the Catalog are divided into 18 groups or families based on the nature of the requirements. These families are: Security Policy Personnel Security Organizational Security Physical and Environmental Security Risk Management and Assessment Information and Document Management Systems and Information Integrity Incident Response and Business Continuity Systems and Services Acquisition Planning Awareness and Training Access Control Monitoring and Reviewing Control System Monitoring Systems Configuration Management Systems and Communications Protection Media Protection Auditing and Accountability Maintenance Each family contains sufficient depth to be used in development of requirements. The families are not exclusive. There are requirements that could fall into several different families. In these cases the requirement, or a similar one, might appear in more than one family. The 219 requirements also contain a fair amount of depth, but because the Catalog is designed to address all sectors, they are not extremely specific. The intent of the Catalog to touch on a large number of topics, but only at a high level, therefore they will probably need to be modified for the specific industry. In most cases, the requirements should not be taken verbatim. The requirements contained in the Catalog were derived by reviewing the requirements contained in various standards. Where several standards contained similar requirements, the team considered each and then came up with a requirement that might be a combination of all or might use the requirement that best fit the need. In some cases, new requirements were developed based on the experience of the team members. Each requirement is divided into four parts: 1) the title of the requirement, 2) a statement of the requirement, normally a short description, 3) Supplemental Guidance which presents any additional information that might be helpful in understanding the intended scope of the requirement, and 4) Requirement Enhancement which is intended to give additional requirements should the system be considered critical. An example of one of the requirements is shown below:
7 Audit Reduction and Report Generation Requirement. The control system provides an audit reduction and report generation capability. Supplemental Guidance. Audit reduction, review, and reporting tools support after-thefact investigations of security incidents without altering original audit records. Audit record processing must not degrade the operational performance of the control system. In general, audit record processing is not performed on the control system. Requirement Enhancements. The control system provides the capability to automatically process audit records for events of interest based upon selectable event criteria. GLOSSARY Another important part of the Catalog is the Glossary. The Glossary identifies key terms used in cyber security and provides a listing of those terms with definitions. There are many other bodies, such as the Instrumentation, Systems and Automation Society, Institute of Electrical and Electronic Engineers, and Process Control Systems Forum, which also have lists of terms. No claim as to the strength of this glossary in comparison with the others. It does provide the terms in one location that can be easily used. Where these definitions were used from other sources, those sources are referenced. CROSS REFERENCE As indicated earlier in this paper, the Catalog also contains a cross-reference table showing how the requirements in the Catalog relate to requirements in other industry standard documents. Each of the requirements in the Catalog is listed and whether, in the viewpoint of the person providing information, other standards also address the requirement. Because of the way the analyses were performed, it is highly subjective in nature. These relationships have not been reviewed or approved by any of the standards bodies that created the standards. The cross reference still, however, gives an idea of the basic scope of the various standards that fed the Catalog and which requirements are of most concern to standards bodies. The Cross table, a sample of which is shown in Figure 1, consists of the Catalog requirements listed down one side of the table with the reference standards shown across the top. Where the reviewer believed that there was a correspondence, an X is placed in the table. This X then indicates that the referenced standard addresses, to some extent, the requirement in the Catalog. Because of how quickly the reference standards evolve, this table will need to be maintained and updated. Even with its drawbacks, the cross reference can be very useful. For example, a manufacture trying to satisfy as many standards as possible can look at this table and determine which requirements are of most concern to the control system community. These requirements can then be addressed in the product.
8 Position Categorization Personnel Screening Personnel Termination AGA12-1 AGA12-2 FIPS A API 1164PI 1164 Guidelines for the Petroleum Industry CIDX ISO ISO IEC IEEE 1402 ISA99-1 ISA99-2 NERC Security Guidelines X --- X X X X X X X X --- X X X --- X X X X X --- X --- X X --- X X X X X --- X X --- X X X X X X X X X X --- X X X X X X --- X X --- X X X --- X X X X X X X X X X X X X X X --- X X X X X X X X X X X X X X X --- X X NERC CIP NIST SP Figure 1. Sample of cross reference table. CATALOG USAGE The Catalog is not intended to be an exhaustive list of all requirements that could be associated with control system cyber security, but it can provide information to assist in developing a control system cyber security standard. The following are some ideas how the Catalog could be used to assist in standards development by providing: a checklist of items that should be considered in preparing a standard a single source for potential requirements a starting point for discussions on control system cyber security a glossary of terms that could be considered for inclusion in a standard.
9 The following paragraphs elaborate on each of the above items. When preparing a standard, it is very easy to forget to include some topics that should be covered by the standard. The catalog, though not exhaustive in the requirements covered, does address the general topics that should be in a standard for control system cyber security. By going through each of the topics listed in the Catalog, the developer is forced to consider whether or not that topic is germane to the infrastructure for which the standard is being developed. If not, then it does not need to be included but the developer has to make a conscience decision as to the applicability of the topic. If it is a subject that needs to be covered, then there are recommendations for requirements that could be included. This method speeds up the development process by reducing the amount of background work that needs to be done by the developer. The developer still must be aware of what the infrastructure for which the standard is intended and be able to make informed decisions as to what types of requirements are necessary. As discussed above, there are currently a great many documents in publication or in draft that present requirements aimed at protecting information technology or control systems from cyber intrusions. In order to determine what other organizations consider important in securing cyber systems, it would be necessary to go through each of these documents and look at each of the requirements or a person could use the Catalog which has essentially done the same thing. The Catalog contains a listing of requirements gleaned from the various documents and has combined those that are similar into a single requirement. In some cases, new requirements have been generated based on the authors knowledge and experience. Each of these requirements can be used, if the standards developer chooses, in a new standard. The standards development process begins with the key stakeholders in the organizations determining the scope of the standard. The families listed in the Catalog can provide a starting point for these discussions. By considering each of the families it can assist in helping determine which area the new standard should address. The glossary can be used directly in a new standard, can be modified for the scope of the new standard, or can be used as a discussion enhancer to assist in the development process. The above ideas are provided as a place to start and not an all-inclusive list of ways in which the Catalog can be used. As an organization considers the Catalog content, new methods of use will become clearer to the organization. SUMMARY AND CONCLUSIONS The catalog provides some basic ideas for an organization to consider in the development of cyber security standards for control systems. It is intended to be a resource for the development of standards and not a standard. It is envisioned that the Catalog can be used by both public and private sectors as a starting point to discuss and develop cyber security standards. It can be used to mitigate vulnerabilities that are identified by using the requirements. The catalog also covers organizational policies and procedures and can be used in setting up a control system management plan. It can also assist in training personnel.
10 It provides a shopping list of requirement for consideration in the development of a standard. Although not all of the requirements listed are applicable to all sectors, the Catalog still can provide a checklist of things to consider. By going through all of the requirements and asking does this apply to what we are trying to do? it will make for a more complete standard. The Catalog identifies and consolidates recommended practices from multiple cyber security standards into a set of uniform recommendations. It is intended to be a living document requiring regular updates. This work was funded by the United States Department of Homeland Security, through the Control System Security Program of the National Cyber Security Division. REFERENCES The following documents were used in the preparation of the Catalog. They are listed in alphabetical order. American Gas Association, Cryptographic Protection of SCADA Communications Part 1: Background, Policies and Test Plan (AGA 12, Part 1), March 14, American Gas Association, Cryptographic Protection of SCADA Communications Part 2: Retrofit link encryption for asynchronous serial communications (AGA 12, Part 2), March 31, American National Standards Institute/Instrumentation, Systems, and Automation Society Technical Report (ANSI/ISA-TR ), Security Technologies for Manufacturing and Control Systems, 11 March 2004 American National Standards Institute/Instrumentation, Systems, and Automation Society Technical Report (ANSI/ISA-TR ), Integrating Electronic Security into the Manufacturing and Control Systems Environment, 12 April 2004 American Petroleum Institute, API 1164: Pipeline SCADA Security, First Edition, September, American Petroleum Institute, Security Guidelines for the Petroleum Industry, April 2005 Chemical Industry Data Exchange, Guidance for Addressing Cybersecurity in the Chemical Sector, Version 2.1, May 2005 (Note: This document has been superseded by Guidance for Addressing Cybersecurity in the Chemical Sector, Version 3.0, Chemical Sector Cyber Security Program, May 2006). Federal Information Processing Standards Publication 140-2, Security Requirements for Cryptographic Modules, Issued May 25, 2001, Updated December 03, International Electrotechnical Commission 62351, Data and Communication Security, Draft.
11 Institute of Electrical and Electronics Engineers 1402, Guide for Electric Power Substation Physical and Electronic Security, January 30, Instrumentation, Systems, and Automation Society Standards Committee, DRAFT disa Manufacturing and Control Systems Security Part: Concepts, Models and Terminology Draft 2, Edit 3 October 2005 Instrumentation, Systems, and Automation Society Standards Committee, DRAFT disa Manufacturing and Control Systems Security Part 2: Establishing a Manufacturing and Control System Security Program, Draft 1, Edit 5 September 20, 2005 National Institute of Standards and Technology Special Publication , Recommended Security Controls for Federal Information Systems, Revision 1 Final Public Draft, October, North American Electric Reliability Council, Critical Infrastructure Protection (CIP through CIP 009-1), May North American Electric Reliability Council, Security Guidelines for the Electricity Sector, Version 1.0, June 14, 2002.
Process Control System Cyber Security Standards an Overview
INL/CON-06-01317 PREPRINT Process Control System Cyber Security Standards an Overview 52nd International Instrumentation Symposium Robert P. Evans May 2006 This is a preprint of a paper intended for publication
ISACA rudens konference
ISACA rudens konference 8 Novembris 2012 Procesa kontroles sistēmu drošība Andris Lauciņš Ievads Kāpēc tēma par procesa kontroles sistēmām? Statistics on incidents Reality of the environment of industrial
CS 2 SAT: The Control Systems Cyber Security Self-Assessment Tool
INL/CON-07-12810 PREPRINT CS 2 SAT: The Control Systems Cyber Security Self-Assessment Tool ISA Expo 2007 Kathleen A. Lee January 2008 This is a preprint of a paper intended for publication in a journal
A Concise Model to Evaluate Security of SCADA Systems based on Security Standards
A Concise Model to Evaluate Security of SCADA Systems based on Security Standards Nasser Aghajanzadeh School of Electrical and Computer Engineering, Shiraz University, Shiraz, Iran Alireza Keshavarz-Haddad
DISCLAIMER This report was prepared as an account of work sponsored by an agency of the U.S. Government. Neither the U.S. Government nor any agency
DISCLAIMER This report was prepared as an account of work sponsored by an agency of the U.S. Government. Neither the U.S. Government nor any agency thereof, nor any employee, makes any warranty, expressed
This is a preview - click here to buy the full publication
TECHNICAL REPORT IEC/TR 62443-3-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 3 1: Security technologies for industrial automation and control systems
A Comparison of Oil and Gas Segment Cyber Security Standards
INEEL/EXT-04-02462 Revision 0 Control Systems Security and Test Center A Comparison of Oil and Gas Segment Cyber Security Standards Prepared by the Idaho National Engineering and Environmental Laboratory
Comparison Study of Industrial Control System Standards Against the Control Systems Protection Framework Cyber-Security Requirements
INL/EXT-05-00831 Version 3.2 Comparison Study of Industrial Control System Standards Against the Control Systems Protection Framework Cyber-Security Requirements Virgil B. Hammond Shabbir A. Shamsuddin
Rebecca Massello Energetics Incorporated
Cybersecurity Procurement Language for Energy Delivery Systems Rebecca Massello Energetics Incorporated NRECA TechAdvantage February 25, 2015 Talking Points What is this document? Who can use this document
ENERGY SECTOR CYBERSECURITY FRAMEWORK IMPLEMENTATION GUIDANCE
ENERGY SECTOR CYBERSECURITY FRAMEWORK IMPLEMENTATION GUIDANCE JANUARY 2015 U.S. DEPARTMENT OF ENERGY OFFICE OF ELECTRICITY DELIVERY AND ENERGY RELIABILITY Energy Sector Cybersecurity Framework Implementation
Roadmaps to Securing Industrial Control Systems
Roadmaps to Securing Industrial Control Systems Insert Photo Here Mark Heard Eastman Chemical Company Rockwell Automation Process Solutions User Group (PSUG) November 14-15, 2011 Chicago, IL McCormick
Secure SCADA Communication Protocol Performance Test Results
PNNL-17118 Secure SCADA Communication Protocol Performance Test Results M.D. Hadley K.A. Huston August 2007 Prepared for U.S. Department of Energy Office of Electricity Delivery and Energy Reliability
Control Systems Cyber Security Standards Support Activities
INL/EXT-09-15244 Control Systems Cyber Security Standards Support Activities Robert P. Evans January 2009 The INL is a U.S. Department of Energy National Laboratory operated by Battelle Energy Alliance
AUDIT REPORT. The Department of Energy's Implementation of Voice over Internet Protocol Telecommunications Networks
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT The Department of Energy's Implementation of Voice over Internet Protocol Telecommunications Networks
CSMS. Cyber Security Management System. Conformity Assessment Scheme
CSMS Cyber Security Management System Conformity Assessment Scheme for the CSMS Certification Criteria IEC 62443-2-1:2010 Cyber Security Management Syste 1 Purpose of the CSMS Conformity Assessment Scheme
NIST Cybersecurity Initiatives. ARC World Industry Forum 2014
NIST Cybersecurity Initiatives Keith Stouffer and Vicky Pillitteri NIST ARC World Industry Forum 2014 February 10-13, 2014 Orlando, FL National Institute of Standards and Technology (NIST) NIST s mission
Integrating Electronic Security into the Control Systems Environment: differences IT vs. Control Systems. Enzo M. Tieghi etieghi@visionautomation.
Integrating Electronic Security into the Control Systems Environment: differences IT vs. Control Systems Enzo M. Tieghi [email protected] Security IT & Control System Security: where are we?
CONTROL SYSTEM VENDOR CYBER SECURITY TRENDS INTERIM REPORT
Energy Research and Development Division FINAL PROJECT REPORT CONTROL SYSTEM VENDOR CYBER SECURITY TRENDS INTERIM REPORT Prepared for: Prepared by: California Energy Commission KEMA, Inc. MAY 2014 CEC
RE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity
October 10, 2014 Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 RE: Experience with the Framework for Improving Critical Infrastructure
Penetration Testing of Industrial Control Systems
SF-1075-SUR (8-2005) SANDIA REPORT SAND2005-2846P Unlimited Release Printed March, 2005 Penetration Testing of Industrial Control Systems David P. Duggan Prepared by Sandia National Laboratories Albuquerque,
future data and infrastructure
White Paper Smart Grid Security: Preparing for the Standards-Based Future without Neglecting the Needs of Today Are you prepared for future data and infrastructure security challenges? Steve Chasko Principal
Cybersecurity Procurement Language for Energy Delivery Systems
Cybersecurity Procurement Language for Energy Delivery Systems April 2014 Energy Sector Control Systems Working Group (ESCSWG) For Questions or Comments Energy sector asset owners, operators, and suppliers
AUDIT REPORT. Follow-up on the Department of Energy's Acquisition and Maintenance of Software Licenses
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT Follow-up on the Department of Energy's Acquisition and Maintenance of Software Licenses DOE/IG-0920
How To Manage Risk On A Scada System
Risk Management for Industrial Control Systems (ICS) And Supervisory Control Systems (SCADA) Information For Senior Executives (Revised March 2012) Disclaimer: To the extent permitted by law, this document
Which cybersecurity standard is most relevant for a water utility?
Which cybersecurity standard is most relevant for a water utility? Don Dickinson 1 * 1 Don Dickinson, Phoenix Contact USA, 586 Fulling Mill Road, Middletown, Pennsylvania, USA, 17057 (*correspondence:
Facilitated Self-Evaluation v1.0
Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) Patricia Hoffman Facilitated Self-Evaluation v1.0 Assistant Secretary Office of Electricity Delivery and Energy Reliability U.S.
Best Practices in ICS Security for System Operators. A Wurldtech White Paper
Best Practices in ICS Security for System Operators A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
Feature. SCADA Cybersecurity Framework
Feature Samir Malaviya, CISA, CGEIT, CSSA, works with the Global Consulting Practice-GRC practice of Tata Consultancy Services and has more than 17 years of experience in telecommunications, IT, and operation
A Systems Approach to HVAC Contractor Security
LLNL-JRNL-653695 A Systems Approach to HVAC Contractor Security K. M. Masica April 24, 2014 A Systems Approach to HVAC Contractor Security Disclaimer This document was prepared as an account of work sponsored
TECHNICAL SPECIFICATION
TECHNICAL SPECIFICATION IEC/TS 62443-1-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 1-1: Terminology, concepts and models INTERNATIONAL ELECTROTECHNICAL
ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS
ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS Shirley Radack, Editor Computer Security Division Information
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
DOE Cyber Security Policy Perspectives
DOE Cyber Security Policy Perspectives Mike Smith Senior Cyber Policy Advisor to the Assistant Secretary Department of Energy Overview of DOE Cybersecurity Priorities Protecting the DOE Enterprise from
Cyber Security and Privacy - Program 183
Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology
NERC CIP Tools and Techniques
NERC CIP Tools and Techniques Supplemental Project - Introduction Webcast Scott Sternfeld, Project Manager Smart Grid Substation & Cyber Security Research Labs [email protected] (843) 619-0050 October
Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper
Best Practices in ICS Security for Device Manufacturers A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
IEEE-Northwest Energy Systems Symposium (NWESS)
IEEE-Northwest Energy Systems Symposium (NWESS) Paul Skare Energy & Environment Directorate Cybersecurity Program Manager Philip Craig Jr National Security Directorate Sr. Cyber Research Engineer The Pacific
Rethinking Cyber Security for Industrial Control Systems (ICS)
Rethinking Cyber Security for Industrial Control Systems (ICS) Bob Mick VP Emerging Technologies ARC Advisory Group [email protected] 1 Rethinking Cyber Security We Now Have Years of Experience - Security
April 8, 2013. Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899
Salt River Project P.O. Box 52025 Mail Stop: CUN204 Phoenix, AZ 85072 2025 Phone: (602) 236 6011 Fax: (602) 629 7988 [email protected] James J. Costello Director, Enterprise IT Security April 8,
GOOD PRACTICE GUIDE PROCESS CONTROL AND SCADA SECURITY
GOOD PRACTICE GUIDE PROCESS CONTROL AND SCADA SECURITY GUIDE 2. IMPLEMENT SECURE ARCHITECTURE This guide is designed to impart good practice for securing industrial control systems such as: process control,
PROTECTING CRITICAL CONTROL AND SCADA SYSTEMS WITH A CYBER SECURITY MANAGEMENT SYSTEM
PROTECTING CRITICAL CONTROL AND SCADA SYSTEMS WITH A CYBER SECURITY MANAGEMENT SYSTEM Don Dickinson Phoenix Contact USA P.O. Box 4100 Harrisburg, PA 17111 ABSTRACT Presidential Executive Order 13636 Improving
How to Integrate NERC s Requirements in an Ongoing Automation and Integration Project Framework
How to Integrate NERC s Requirements in an Ongoing Automation and Integration Project Framework Jacques Benoit, Cooper Power Systems Inc., Energy Automations Solutions - Cybectec Robert O Reilly, Cooper
GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems
GE Measurement & Control Top 10 Cyber Vulnerabilities for Control Systems GE Proprietary Information: This document contains proprietary information of the General Electric Company and may not be used
GOOD PRACTICE GUIDE PROCESS CONTROL AND SCADA SECURITY
GOOD PRACTICE GUIDE PROCESS CONTROL AND SCADA SECURITY GUIDE 5. MANAGE THIRD PARTY RISK This guide is designed to impart good practice for securing industrial control systems such as: process control,
WHAT IS SPECIAL ABOUT SCADA SYSTEM CYBER SECURITY?
WHAT IS SPECIAL ABOUT SCADA SYSTEM CYBER SECURITY? A COMPARISON BETWEEN EXISTING SCADA SYSTEM SECURITY STANDARDS AND ISO 17799 Jakob Nordlander Master Thesis Stockholm, Sweden 2009 XR-EE-ICS 2009:005 WHAT
Guidance for Addressing Cybersecurity in the Chemical Sector. Version 2.0 December 2004
Guidance for Addressing Cybersecurity in the Chemical Sector December 2004 Legal and Copyright Notice The Chemical Industry Data Exchange (CIDX) is a nonprofit corporation, incorporated in the State of
What Risk Managers need to know about ICS Cyber Security
What Risk Managers need to know about ICS Cyber Security EIM Risk Managers Conference February 18, 2014 Joe Weiss PE, CISM, CRISC, ISA Fellow (408) 253-7934 [email protected] ICSs What are they
Symphony Plus Cyber security for the power and water industries
Symphony Plus Cyber security for the power and water industries Symphony Plus Cyber Security_3BUS095402_(Oct12)US Letter.indd 1 01/10/12 10:15 Symphony Plus Cyber security for the power and water industries
STATEMENT OF PATRICIA HOFFMAN ACTING ASSISTANT SECRETARY FOR ELECTRICITY DELIVERY AND ENERGY RELIABILITY U.S. DEPARTMENT OF ENERGY BEFORE THE
STATEMENT OF PATRICIA HOFFMAN ACTING ASSISTANT SECRETARY FOR ELECTRICITY DELIVERY AND ENERGY RELIABILITY U.S. DEPARTMENT OF ENERGY BEFORE THE COMMITTEE ON ENERGY AND NATURAL RESOURCES UNITED STATES SENATE
Security Metrics for Process Control Systems
SANDIA REPORT SAND2007-2070P Unlimited Release September 2007 Security Metrics for Process Control Systems Annie McIntyre, Blair Becker, Ron Halbgewachs Prepared by Sandia National Laboratories Albuquerque,
Cybersecurity Guidance for Industrial Automation in Oil and Gas Applications
Cybersecurity Guidance for Industrial Automation in Oil and Gas Applications February 17, 2015 Agenda Agenda Introductions Agenda Introductions Discussion of the current state of Cybersecurity for Controls
GE Intelligent Platforms. Meeting NERC Change Control Requirements for HMI/SCADA and Control Systems
GE Intelligent Platforms Meeting NERC Change Control Requirements for HMI/SCADA and Control Systems Meeting NERC Change Control Requirements for HMI/SCADA and Control Systems Overview There is a lot of
CERIAS Tech Report 2012-15 Mapping Water Sector Cyber-Security Vulnerabilities by James H. Graham, Jeffrey L. Hieb and J. Chris Foreman Center for
CERIAS Tech Report 2012-15 Mapping Water Sector Cyber-Security Vulnerabilities by James H. Graham, Jeffrey L. Hieb and J. Chris Foreman Center for Education and Research Information Assurance and Security
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas
7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008
U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October
Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps
Agenda Introduction to SCADA Importance of SCADA security Recommended steps SCADA systems are usually highly complex and SCADA systems are used to control complex industries Yet.SCADA systems are actually
THE OFFICE OF THE NATIONAL COORDINATOR FOR HEALTH INFORMATION TECHNOLOGY S OVERSIGHT OF THE TESTING
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL THE OFFICE OF THE NATIONAL COORDINATOR FOR HEALTH INFORMATION TECHNOLOGY S OVERSIGHT OF THE TESTING AND CERTIFICATION OF ELECTRONIC HEALTH
IDC Reengineering Phase 2 & 3 US Industry Standard Cost Estimate Summary
SANDIA REPORT SAND2015-20815X Unlimited Release January 2015 IDC Reengineering Phase 2 & 3 US Industry Standard Cost Estimate Summary Version 1.0 James Mark Harris, Robert M. Huelskamp Prepared by Sandia
OCIE CYBERSECURITY INITIATIVE
Topic: Cybersecurity Examinations Key Takeaways: OCIE will be conducting examinations of more than 50 registered brokerdealers and registered investment advisers, focusing on areas related to cybersecurity.
Second Line of Defense Virtual Private Network Guidance for Deployed and New CAS Systems
PNNL-19266 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Second Line of Defense Virtual Private Network Guidance for Deployed and New CAS Systems SV Singh AI Thronas January
Advancing Access to Restricted Data: Regulations, Compliance, Continuous Monitoring. OH MY!!!
Advancing Access to Restricted Data: Regulations, Compliance, Continuous Monitoring. OH MY!!! Cornell Institute for Social and Economic Research and Cornell Restricted Access Data Center CISER s Mission:.anticipate
Logging In: Auditing Cybersecurity in an Unsecure World
About This Course Logging In: Auditing Cybersecurity in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that
SCADA Security Training
SCADA Security Training 1-Day Course Outline Wellington, NZ 6 th November 2015 > Version 3.1 web: www.axenic.co.nz phone: +64 21 689998 page 1 of 6 Introduction Corporate Background Axenic Ltd Since 2009,
CIP-010-2 Cyber Security Configuration Change Management and Vulnerability Assessments
CIP-010-2 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:
Department of Management Services. Request for Information
Department of Management Services Request for Information Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 Submitted By: Carlos Henley
Ernie Hayden CISSP CEH GICSP Executive Consultant www.securicon.com
Ernie Hayden CISSP CEH GICSP Executive Consultant www.securicon.com V1 10-7-14 This Presentation is Proprietary to Securicon, Inc. Any use of this document without express written approval from Securicon
NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice
NERC Cyber Security Compliance Consulting Services HCL Governance, Risk & Compliance Practice Overview The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to
HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY
Cybersecurity@RTD Program Overview and 2015 Outlook
Cybersecurity@RTD Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD Information Technology Department of Finance & Administration
Consulting International
NIST Cyber Security Working Group (CSWG) NISTIR 7628: NIST Guidelines for Smart Grid Cyber Security Frances Cleveland Xanthus Consulting International Xanthus Consulting International [email protected]
An Overview of Large US Military Cybersecurity Organizations
An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United
Effective Use of Assessments for Cyber Security Risk Mitigation
White Paper Effective Use of Assessments for Cyber Security Risk Mitigation Executive Summary Managing risk related to cyber security vulnerabilities is a requirement for today s modern systems that use
Building Security In:
#CACyberSS2015 Building Security In: Intelligent Security Design, Development and Acquisition Steve Caimi Industry Solutions Specialist, US Public Sector Cybersecurity September 2015 A Little About Me
Cyber Security Controls Assessment : A Critical Discipline of Systems Engineering
Cyber Controls : A Critical Discipline of Systems 14 th Annual NDIA Systems San Diego, CA October 24-28, 2011 Bharat Shah Lockheed Martin IS&GS [email protected] Purpose Provide an overview on integrating
NIST Cybersecurity Framework Manufacturing Implementation
NIST Cybersecurity Framework Manufacturing Implementation Keith Stouffer Project Leader, Cybersecurity for Smart Manufacturing Systems Engineering Lab, NIST Manufacturing Cybersecurity Research at NIST
CIP 010 1 Cyber Security Configuration Change Management and Vulnerability Assessments
CIP 010 1 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:
Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services
Cyber Risk Mitigation via Security Monitoring Enhanced by Managed Services Focus: Up to But Not Including Corporate and 3 rd Party Networks Level 4 Corporate and 3 rd Party/Vendor/Contractor/Maintenance
Meeting the Cybersecurity Standards of ANSI/ISA 62443 with Data Diodes
Meeting the Cybersecurity Standards of ANSI/ISA 62443 with Data Diodes Dennis Lanahan June 1, 2015 Securing the convergence of OT and IT with ST 1 Introduction to Owl US US Owned and & Operated Product
An International Perspective on Security and Compliance
UNIDIRECTIONAL SECURITY GATEWAYS An International Perspective on Security and Compliance ICSJWG Fall Conference 2014 Lior Frenkel, CEO and Co-Founder Waterfall Security Solutions Andrew Ginter, VP Industrial
Waterfall for NERC-CIP Compliance
Waterfall for NERC-CIP Compliance Using Waterfall s Unidirectional Security Solution to Achieve True Security & NERC-CIP Compliance Date: Jul. 2009 The material in this document is proprietary to Waterfall
