Meeting NERC CIP Access Control Standards. Presented on February 12, 2014



Similar documents
Meeting NERC CIP Requirements with CyberLock

Alberta Reliability Standard Cyber Security Physical Security of BES Cyber Systems CIP-006-AB-5

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Information Shield Solution Matrix for CIP Security Standards

Summary of CIP Version 5 Standards

NERC CIP Tools and Techniques

North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)

CIP Cyber Security Security Management Controls

Standard CIP 007 3a Cyber Security Systems Security Management

BSM for IT Governance, Risk and Compliance: NERC CIP

NERC Cyber Security Standards

LogRhythm and NERC CIP Compliance

NERC CIP VERSION 5 COMPLIANCE

Implementation Plan for Version 5 CIP Cyber Security Standards

Standard CIP Cyber Security Systems Security Management

FERC, NERC and Emerging CIP Standards

Cyber Security Compliance (NERC CIP V5)

GE Intelligent Platforms. Meeting NERC Change Control Requirements for HMI/SCADA and Control Systems

NERC CIP Compliance with Security Professional Services

Verve Security Center

Alberta Reliability Standard Cyber Security Configuration Change Management and Vulnerability Assessments CIP-010-AB-1

The first step in protecting Critical Cyber Assets is identifying them. CIP-002 focuses on this identification process.

NERC CIP Whitepaper How Endian Solutions Can Help With Compliance

SecFlow Security Appliance Review

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Standard CIP Cyber Security Security Management Controls

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

ReliabilityFirst CIP Evidence List CIP-002 through CIP-009 are applicable to RC, BA, IA, TSP, TO, TOP, GO, GOP, LSE, NERC, & RE

Alberta Reliability Standard Cyber Security Implementation Plan for Version 5 CIP Security Standards CIP-PLAN-AB-1

Standard CIP 004 3a Cyber Security Personnel and Training

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

Technology Solutions for NERC CIP Compliance June 25, 2015

How ByStorm Software enables NERC-CIP Compliance

TRIPWIRE NERC SOLUTION SUITE

Cyber Security Standards Update: Version 5

Automating NERC CIP Compliance for EMS. Walter Sikora 2010 EMS Users Conference

NovaTech NERC CIP Compliance Document and Product Description Updated June 2015

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards

Document ID. Cyber security for substation automation products and systems

Alberta Reliability Standard Cyber Security Personnel & Training CIP-004-AB-5.1

CIP Physical Security. Nate Roberts CIP Security Auditor I

Top Ten Compliance Issues for Implementing the NERC CIP Reliability Standard

CIP Cyber Security Electronic Security Perimeter(s)

NERC-CIP S MOST WANTED

Lessons Learned CIP Reliability Standards

Top 10 Compliance Issues for Implementing Security Programs

Alberta Reliability Standard Cyber Security System Security Management CIP-007-AB-5

Continuous Compliance for Energy and Nuclear Facility Cyber Security Regulations

ForeScout CounterACT and Compliance June 2012 Overview Major Mandates PCI-DSS ISO 27002

NERC Alert System Overview

Cyber Security for NERC CIP Version 5 Compliance

NERC CIP Compliance Gaining Oversight with ConsoleWorks

SYMMETRY WHITE PAPER. Support for Critical Infrastructure Protection (CIP) Cyber Security Standards. Adam Shane

How To Use Egnyte

SUPPLIER SECURITY STANDARD

RSA SecurID Two-factor Authentication

Intel Enhanced Data Security Assessment Form

Enterprise Security Solutions

Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc.

EnergySec Partnered Webinar with MetricStream Transitioning to NERC CIP Version 5: What Does it Mean for Electric Utilities JANUARY 28, 2015

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

Reclamation Manual Directives and Standards

Symphony Plus Cyber security for the power and water industries

Cloud Services MDM. ios User Guide

Cyber Security :: Insights & Recommendations for Secure Operations. N-Dimension Solutions, Inc.

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

White Paper Instant Messaging (IM) HIPAA Compliance

Physical Security Reliability Standard Implementation

Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance

This document has for purpose to elaborate on how Secomea have addressed all these topics with a solution consisting of the three components:

Information Technology Branch Access Control Technical Standard

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

Healthcare IT Compliance Service. Services > Overview MaaS360 Healthcare IT Compliance Service

Alberta Reliability Standard Cyber Security Security Management Controls CIP-003-AB-5

Plans for CIP Compliance

Regulatory Compliance Management for Energy and Utilities

152 FERC 61,054 UNITED STATES OF AMERICA FEDERAL ENERGY REGULATORY COMMISSION. 18 CFR Part 40. [Docket No. RM ]

Compliance Management, made easy

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

CG Automation Solutions USA

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Critical Infrastructure Security: The Emerging Smart Grid. Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn

InsightCloud. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?

How to Integrate NERC s Requirements in an Ongoing Automation and Integration Project Framework

Ovation Security Center Data Sheet

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA

Beyond passwords: Protect the mobile enterprise with smarter security solutions

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

Transcription:

Meeting NERC CIP Access Control Standards Presented on February 12, 2014

Presented By: CyberLock The leading supplier of key-centric access control systems Based in Corvallis, Oregon James T. McGowan Technology & security industry veteran Vice President of Sales & Marketing 2

Objective If you are involved in the physical security requirements needed for NERC CIP compliance this webinar is for you. 3

NERC North American Electric Reliability Corporation Originally a voluntary industry organization Focused on developing reliability standards Empowered with the Energy Policy Act of 2005 Became Electric Reliability Organization (ERO) Able to enforce standards and penalize non-compliance Mission: Ensure the reliability of the North American bulk power system 4

NERC CIP Critical Infrastructure Protection Originally 8 specific reliability standards Intended to protect BES* against cyber attacks Approved January 18, 2008 *BES = Bulk Electric System 5

www.nerc.com 6

NERC CIP www.nerc.com/pa/ci/pages/default.aspx Cri$cal Infrastructure 7

CIP Standards CIP Standards 8

NERC CIP Standards Original Eight: CIP-002-1 (BES Cyber System Categorization) CIP-003-1 (Security Management Controls) CIP-004-1 (Personnel & Training) CIP-005-1 (Electronic Security Perimeters) CIP-006-1 (Physical Security of BES Cyber Assets) CIP-007-1 (System Security Management) CIP-008-1 (Incident Reporting and Response Planning) CIP-009-1 (Recovery Plans for BES Cyber Systems) Recent Additions: CIP-010-1 (Configuration Change Management & Vulnerability Assessments) CIP-011-1 (Information Protection) 9

Sounds Easy to Follow? These are standards in motion: 8 = Number Subject to Enforcement 10 = Number Subject to Future Enforcement 3 = Number Pending Regulatory Filing 50 = Number Inactive 10

Why Comply? Helps protect the North American BES Critical Infrastructure cyber attacks are increasing Over 200 incidents reported between Oct 12 and May 13* 53% Energy related *Source = ICS-CERT Monitor April/May/June 2013 11

Why Comply? Avoid fines Possible fine, per day, for each day a violation continues. *Source = Sanction Guidelines of the NERC, Appendix 4B, December 20, 2012 12

CIP-003-3 Title: Cyber Security Security Management Controls Number: CIP-003-3 Purpose: Standard CIP-003-3 requires that Responsible Entities have minimum-security management controls in place to protect Critical Cyber Assets. Key Points: implement a program for managing access to protected Critical Cyber Asset information NOTE: Subject to Enforcement 13

CIP-005-5 Title: Cyber Security Electronic Security Perimeter(s) Number: CIP-005-5 Purpose: To manage electronic access to BES Cyber Systems by specifying a controlled Electronic Security Perimeter in support of protecting BES Cyber Systems against compromise that could lead to misoperation or instability in the BES. Key Points: access control model that denies access by default, such that explicit access permissions must be specified. entity shall review or otherwise assess access logs for attempts at or actual unauthorized accesses at least every ninety calendar days. NOTE: Subject to Enforcement 14

CIP-006-3c Title: Cyber Security Physical Security of Critical Cyber Assets Number: CIP-006-3c Purpose: Standard CIP-006-3 is intended to ensure the implementation of a physical security program for the protection of Critical Cyber Assets. Key Points: shall document and implement the operational and procedural controls to manage physical access at all access points to the Physical Security Perimeter(s) twenty-four hours a day, seven days a week. access shall document and implement the technical and procedural controls for monitoring physical access at all access points to the Physical Security Perimeter(s) twenty-four hours a day, seven days a week. NOTE: Subject to Enforcement 15

CIP-006-5 Title: Cyber Security Physical Security of BES Cyber Systems Number: CIP-006-5 Purpose: : To manage physical access to BES Cyber Systems by specifying a physical security plan in support of protecting BES Cyber Systems against compromise that could lead to misoperation or instability in the BES. Key Points: Utilize at least one physical access control to allow unescorted physical access into each applicable Physical Security Perimeter to only those individuals who have authorized unescorted physical access. Where technically feasible, utilize two or more different physical access controls (this does not require two completely independent physical access control systems) to collectively allow unescorted physical access into Physical Security Perimeters to only those individuals who have authorized unescorted physical access. NOTE: Subject to Future Enforcement (7/1/15) 16

Summary of the Solution Cost effective, practical solution that: Manages access to protected critical cyber assets Denies access by default Records physical access attempts Manages physical access to facility perimeter(s) Controls access for only authorized personnel Provides a secondary physical access control solution 17

Access Control Options Mechanical Solution Master Key System Lock-Centric Solution Key Card System Key-Centric Solution Electronic Locks & Smart Keys 18

What is Key-Centric? Electronic access control to locks without power: Intelligent cylinders that replace mechanical cylinders Smart keys that hold permissions, store usage information, and energize the lock Access control management software that drives the system 19

Key-Centric In Action 2 1 Schedules & permissions are set in so:ware Key holders upload schedules and permissions via downloaders 3 Updating permissions and downloading audit trails occur simultaneously Audit trails uploaded into so:ware 5 4 Key holders access locks Key holders download access ac$vity via downloaders 20

Practical Applications: Manage access to protected critical cyber assets: Install key-centric cam locks on cabinets Deny access by default: Key-centric locks can only be opened by authorized users 21

Practical Applications: Manage physical access to facility perimeter(s): Install key-centric padlocks on perimeter fences Control access for only authorized personnel: Set permissions in management software 22

Electronic Locks Install locks Fit into existing hardware No power/wiring needed Install anywhere Highly secure No pick-able keyway CIP-006 manage physical access to all access points 23

Programmable Keys Program and distribute keys Key has user information Schedules Permissions Remembers every touch Battery energizes lock CIP-005 access control model that denies access by default, such that explicit access permissions must be specified 24

Downloading Stations Download/upload information Install in convenient locations Employee entrances Break rooms Interface with software Download audit trails Upload new system info CIP-006 Predefined electronic access rights uploaded to key Log access activity to physical security 25

Management Software Manage System Hierarchy of Administrators Browser-based access Intuitive GUI CIP-006 electronic access where the access rights are predefined in a computer database 26

Which System? The Leader in Key-Centric Access Control: CyberLock Field Proven Introduced in 2000 1 Million + CyberLock cylinders deployed Flexible 300+ Lock Designs Multiple Key & Downloading Options Feature-rich software Stable, Linux-based Access via off-the-shelf browsers Expansion options Lock-Centric capabilities 3 rd party integration Fulfills NERC CIP Access Control Requirements 27

Summary Meet NERC CIP Access Control Standards with CyberLock: Proven Affordable Practical Scalable Supports compliance: CIP-003-3 CIP-005-5 CIP-006-3c CIP-006-5 28

For More Information sales@cyberlock.com 541-738-5500 29