Meeting NERC CIP Requirements with CyberLock



Similar documents
Meeting NERC CIP Access Control Standards. Presented on February 12, 2014

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

BSM for IT Governance, Risk and Compliance: NERC CIP

Document ID. Cyber security for substation automation products and systems

Standard CIP 007 3a Cyber Security Systems Security Management

NERC CIP VERSION 5 COMPLIANCE

Lessons Learned CIP Reliability Standards

GE Intelligent Platforms. Meeting NERC Change Control Requirements for HMI/SCADA and Control Systems

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards

Standard CIP Cyber Security Systems Security Management

CG Automation Solutions USA

NERC-CIP S MOST WANTED

How ByStorm Software enables NERC-CIP Compliance

North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)

ReliabilityFirst CIP Evidence List CIP-002 through CIP-009 are applicable to RC, BA, IA, TSP, TO, TOP, GO, GOP, LSE, NERC, & RE

LogRhythm and NERC CIP Compliance

Technology Solutions for NERC CIP Compliance June 25, 2015

Symphony Plus Cyber security for the power and water industries

Information Shield Solution Matrix for CIP Security Standards

RuggedCom Solutions for

Verve Security Center

Your Archiving Service

Cyber security measures in protection and control IEDs

Cloud Services MDM. ios User Guide

The first step in protecting Critical Cyber Assets is identifying them. CIP-002 focuses on this identification process.

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System

NERC CIP Compliance Gaining Oversight with ConsoleWorks

Open Enterprise Architectures for a Substation Password Management System

Standard CIP 004 3a Cyber Security Personnel and Training

NERC Cyber Security Standards

Kony Mobile Application Management (MAM)

Top Ten Compliance Issues for Implementing the NERC CIP Reliability Standard

NERC CIP Compliance with Security Professional Services

Best Practices in ICS Security for System Operators. A Wurldtech White Paper

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Global TAC Secure FTP Site Customer User Guide

NERC Alert System Overview

Reclamation Manual Directives and Standards

NERC CIP Tools and Techniques

FTP-Stream Module: InstantShare End User Guide

Good Shepherd Medical Center Device Connectivity Case Study

TRIPWIRE NERC SOLUTION SUITE

Energy Cybersecurity Regulatory Brief

NERC CIP Whitepaper How Endian Solutions Can Help With Compliance

LOCKS AND HIGH INSECURITY: PROTECTING CRITICAL INFRASTRUCTURE

Alberta Reliability Standard Cyber Security Physical Security of BES Cyber Systems CIP-006-AB-5

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Cyber Security. Smart Grid

The Importance of Cybersecurity Monitoring for Utilities

NERC CIP-007 v. 5 Patch Management: Factors for Success

Automating NERC CIP Compliance for EMS. Walter Sikora 2010 EMS Users Conference

Strategic Identity Management for Industrial Control Systems

Nice Situator for Electric Utilities and Nerc-Cip Compliance. Copyright 2013 NICE Systems Ltd. All rights reserved.

Challenges and Opportunities for Aligning the Power System Cybersecurity and Reliability Objectives

INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT

EnergySec Partnered Webinar with MetricStream Transitioning to NERC CIP Version 5: What Does it Mean for Electric Utilities JANUARY 28, 2015

CIP v5/v6 Implementation Plan CIP v5 Workshop. Tony Purgar October 2-3, 2014

Introduction to Stanford Box

Critical Infrastructure Security: The Emerging Smart Grid. Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn

Physical Security Reliability Standard Implementation

Notable Changes to NERC Reliability Standard CIP-005-5

A Small Business Approach to Big Business Cyber Security. Brent Bettis, CISSP 23 September, 2014

Information Technology Branch Access Control Technical Standard

Top 10 Compliance Issues for Implementing Security Programs

Summary of CIP Version 5 Standards

Manage Utility IEDs Remotely while Complying with NERC CIP

Waterfall for NERC-CIP Compliance

SNAMP Data Server Tutorial

Texas Health Care Network

Industrial Control Systems Security Guide

ForeScout CounterACT and Compliance June 2012 Overview Major Mandates PCI-DSS ISO 27002

Cyber Security Compliance (NERC CIP V5)

ONLINE EXPENSES PROCEDURE

ISACA rudens konference

ADDING STRONGER AUTHENTICATION for VPN Access Control

Mikogo User Guide Linux Version

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

FERC, NERC and Emerging CIP Standards

Substation Hardening, Security and Monitoring Strategies For Critical Asset Protection, a PNM Case Study Thursday, 7-8AM

How to Ensure IT Compliance Without Compromising Innovation. Nik Teshima, IBM Phil Odence, Black Duck

Making the Most of a Virtual Data Room to Complete Your Transaction. Mark Aiello 27 April, 2010

Biometrics in Physical Access Control Issues, Status and Trends White Paper

WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES

NetSuite OpenAir Mobile for Android User Guide Version 1.3

Cyber-Ark Software and the PCI Data Security Standard

Transcription:

Meeting NERC CIP Requirements with CyberLock Webinar: Tuesday, June 19 th, 2012 10:30 AM PDT https://www2.gotomeeting.com/join/660321522/106625297 Phone: +1 (646) 307-1723 Access Code: 252-474-215 By:

Today s Agenda Presented By US Power Grid NERC/CIP Key-Centric Access Control Case Study Summary Q&A 2

Presented By An industry leader in design & manufacturing: Access Control Data Collection Electrical Engineering Founded in 1979 Based in Corvallis, Oregon America s most innovative city* James T. McGowan High tech & security industry veteran Vice President of Sales and Marketing * Most patents per 100,000 people as measured by scale-adjusted metropolitan indicators from the online journal of the Public Library of Science. 3

United States Power Grid 500 companies manage over 186,000 miles of transmission lines that make up the contiguous United States power grid. 4

Objective The US Power Grid requires a comprehensive security system to protect both physical and cyber assets. If you are involved with the physical security of any of these power networks, this webinar is for you. 5

Securing the Grid US Power Grid Critical Infrastructure Matter of National Security Requires Protection Documented Security Standards + = Compliance 6

NERC Formed in 2006 Non-Profit Dates back to 1968 Mission To ensure the reliability of the North American bulk power system Responsibilities Develop Standards Ensure Compliance Assess Resources Education & Training Investigate Disruptions Critical Infrastructure Protection (NERC/CIP) 7

NERC CIP CIP (Critical Infrastructure Protection) A program that coordinates all of NERC s efforts to improve physical and cyber security for the power system of North America Collaborates with U.S. Department of Energy Department of Homeland Security Public Safety Canada 8

Compliance Where are the standards? www.nerc.com All things NERC www.nerc.com/page.php?cid=2%7c20 Standards page Click on Critical Infrastructure Protection (CIP) 9

www.nerc.com/page.php?cid=2%7c20 10

CIP-003-3 Title: Cyber Security Security Management Controls Number: CIP-003-3 Purpose: Standard CIP-003-3 requires that Responsible Entities have minimum-security management controls in place to protect Critical Cyber Assets. Key Point: implement a program for managing access to protected Critical Cyber Asset information 11

CIP-005-3a Title: Cyber Security Electronic Security Perimeter(s) Number: CIP-005-3a Purpose: Standard CIP-005-3 requires the identification and protection of the Electronic Security Perimeter(s) inside which all Critical Cyber Assets reside, as well as all access points on the perimeter. Standard CIP-005-3 should be read as part of a group of standards numbered Standards CIP-002-3 through CIP-009-3. Key Points: access control model that denies access by default, such that explicit access permissions must be specified. entity shall review or otherwise assess access logs for attempts at or actual unauthorized accesses at least every ninety calendar days. 12

CIP-006-3c Title: Cyber Security Physical Security of Critical Cyber Assets Number: CIP-006-3c Purpose: Standard CIP-006-3 is intended to ensure the implementation of a physical security program for the protection of Critical Cyber Assets. Standard CIP-006-3 should be read as part of a group of standards numbered Standards CIP-002-3 through CIP-009-3. Key Points: shall document and implement the operational and procedural controls to manage physical access at all access points to the Physical Security Perimeter(s) twenty-four hours a day, seven days a week. access shall document and implement the technical and procedural controls for monitoring physical access at all access points to the Physical Security Perimeter(s) twenty-four hours a day, seven days a week. 13

What s Needed? An Access Control System Realistic Proven Affordable Secure Traceable Compliant Key-Centric System 14

How Does It Work? Electronic cylinders are installed Smart keys are distributed System is programmed Audit trails are created 15

A Day In the Life 2 1 Schedules & permissions are set in software Key holders update permissions via Communicators 3 Updating permissions and downloading audit trails occur simultaneously Audit trails uploaded into software 5 4 Key holders access locks Key holders download activity via Communicators 16

Locks ecylinders Replace Existing Cylinders CIP-006 manage physical access to all access points Intelligent locks No power/wiring needed Power comes from key Lost key list Highly secure No pick-able keyway 17

Keys Smart Keys Distribute Smart Keys CIP-005 access control model that denies access by default, such that explicit access permissions must be specified Key energizes lock Validates credentials Schedule of permissions Remembers every touch Flexible uploads 18

Communicators Communication Devices Authorize Access CIP-006 Predefined electronic access rights uploaded to key Log access to physical security Communicators provide interface to software Updates Download audit trails Upload new system info 19

Software System Management View and Manage Access CIP-006 electronic access where the access rights are predefined in a computer database Intuitive GUI Browser-based system Protocol agnostic 20

CyberLock The Leader in Key-Centric Access Control Launched in 2000 1 million+ CyberLocks manufactured 290+ lock designs Multiple key options Stable, feature-rich software Expansion platform Lock-centric option 3 rd party integration Fulfills NERC CIP Access Control Requirements 21

ITC Holdings, Novi, Michigan Challenge: Meeting NERC/CIP requirements for physical assets that support power transmission for over 24 million people Solution: CyberLock Benefit: CyberLock restricts and audits access to physical and cyber facilities, eliminating key duplication issues; management is now able to track and control both employee and contractor access Case Study 22

Summary Deploy CyberLock to achieve NERC CIP Compliance Proven Affordable Secure Traceable Compliant 23

Next Steps How to learn more: On the web: www.cyberlock.com Via e-mail: sales@videx.com Via phone: 541-738-5500 24

Wrap Up Questions & Answers www.cyberlock.com 25