Cyber Security Standards Update: Version 5 with Revisions



Similar documents
Cyber Security Standards Update: Version 5

Summary of CIP Version 5 Standards

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

CIP Cyber Security Security Management Controls

NERC Cyber Security Standards

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

When this standard has received ballot approval, the text boxes will be moved to the Guidelines and Technical Basis section of the Standard.

NB Appendix CIP NB-1 - Cyber Security Personnel & Training

CIP Cyber Security Electronic Security Perimeter(s)

Cyber Security Compliance (NERC CIP V5)

Cyber Security Standards: Version 5 Revisions. Security Reliability Program 2015

Implementation Plan for Version 5 CIP Cyber Security Standards

Alberta Reliability Standard Cyber Security Configuration Change Management and Vulnerability Assessments CIP-010-AB-1

152 FERC 61,054 UNITED STATES OF AMERICA FEDERAL ENERGY REGULATORY COMMISSION. 18 CFR Part 40. [Docket No. RM ]

Alberta Reliability Standard Cyber Security Personnel & Training CIP-004-AB-5.1

North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)

Alberta Reliability Standard Cyber Security Physical Security of BES Cyber Systems CIP-006-AB-5

Alberta Reliability Standard Cyber Security System Security Management CIP-007-AB-5

NERC CIP Tools and Techniques

E-Commerce Security Perimeter (ESP) Identification and Access Control Process

CIP v5/v6 Implementation Plan CIP v5 Workshop. Tony Purgar October 2-3, 2014

Alberta Reliability Standard Cyber Security Security Management Controls CIP-003-AB-5

Standard CIP 007 3a Cyber Security Systems Security Management

KEY CONSIDERATIONS FOR MIGRATING TO THE VERSION 5 NERC CIP CYBER SECURITY STANDARDS

NERC CIP VERSION 5 COMPLIANCE

Notable Changes to NERC Reliability Standard CIP-005-5

CIP Physical Security. Nate Roberts CIP Security Auditor I

Standard CIP Cyber Security Systems Security Management

Reclamation Manual Directives and Standards

Alberta Reliability Standard Cyber Security Implementation Plan for Version 5 CIP Security Standards CIP-PLAN-AB-1

3. Purpose: To improve the reliability of the Bulk Electric System by requiring the reporting of events by Responsible Entities.

Notable Changes to NERC Reliability Standard CIP-010-3

The North American Electric Reliability Corporation ( NERC ) hereby submits

LogRhythm and NERC CIP Compliance

ReliabilityFirst CIP Evidence List CIP-002 through CIP-009 are applicable to RC, BA, IA, TSP, TO, TOP, GO, GOP, LSE, NERC, & RE

EnergySec Partnered Webinar with MetricStream Transitioning to NERC CIP Version 5: What Does it Mean for Electric Utilities JANUARY 28, 2015

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Entity Name ( Acronym) NCRnnnnn Risk Assessment Questionnaire

CIP R2 BES Assets Containing Low Impact BCS. Lisa Wood, CISA, CBRA, CBRM Compliance Auditor Cyber Security

Redesigning automation network security

Standard CIP 004 3a Cyber Security Personnel and Training

Information Shield Solution Matrix for CIP Security Standards

Completed. Document Name. NERC CIP Requirements CIP-002 Critical Cyber Asset Identification R1 Critical Asset Identifaction Method

NovaTech NERC CIP Compliance Document and Product Description Updated June 2015

Lessons Learned CIP Reliability Standards

4.1.1 Generator Owner Transmission Owner that owns synchronous condenser(s)

A. Introduction. B. Requirements. Standard PER System Personnel Training

Critical Infrastructure Security: The Emerging Smart Grid. Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn

TRIPWIRE NERC SOLUTION SUITE

149 FERC 61,140 UNITED STATES OF AMERICA FEDERAL ENERGY REGULATORY COMMISSION. 18 CFR Part 40. [Docket No. RM ; Order No.

The first step in protecting Critical Cyber Assets is identifying them. CIP-002 focuses on this identification process.

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards

Voluntary Cybersecurity Initiatives in Critical Infrastructure. Nadya Bartol, CISSP, SGEIT, 2014 Utilities Telecom Council

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System

ISACA North Dallas Chapter

SecFlow Security Appliance Review

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

BPA Policy Cyber Security Program

NERC CIP Compliance. Dave Powell Plant Engineering and Environmental Performance. Presentation to 2009 BRO Forum

NERC CIP Whitepaper How Endian Solutions Can Help With Compliance

Midwest Reliability Organization Procedure For NERC PRC-012

Standard CIP Cyber Security Security Management Controls

Technology Solutions for NERC CIP Compliance June 25, 2015

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Verve Security Center

NERC CIP Compliance 10/11/2011

Cyber Security and Privacy - Program 183

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Top 10 Compliance Issues for Implementing Security Programs

Security Controls What Works. Southside Virginia Community College: Security Awareness

Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Secure Remote Substation Access Interest Group Part 3: Review of Top Challenges, CIPv5 mapping, and looking forward to 2014!

NERC-CIP S MOST WANTED

How to Integrate NERC s Requirements in an Ongoing Automation and Integration Project Framework

Top Ten Compliance Issues for Implementing the NERC CIP Reliability Standard

121 FERC 61,143 UNITED STATES OF AMERICA FEDERAL ENERGY REGULATORY COMMISSION

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

TOP 10 CHALLENGES. With suggested solutions

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

Cyber Security for NERC CIP Version 5 Compliance

Reclamation Manual Directives and Standards

Supplier IT Security Guide

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07

Security Policy for External Customers

Critical Controls for Cyber Security.

Secure Substation Automation for Operations & Maintenance

CIP Electronic Security Perimeter (ESP) - Dan Mishra FRCC Compliance Workshop May 09-13, 2011

FERC, NERC and Emerging CIP Standards

Managed Hosting & Datacentre PCI DSS v2.0 Obligations

CTR System Report FISMA

NERC CIP Compliance Gaining Oversight with ConsoleWorks

Security and Privacy Controls for Federal Information Systems and Organizations

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---


DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Continuous Compliance for Energy and Nuclear Facility Cyber Security Regulations

NERC CIP Substation Cyber Security Update. John M Shaw Presentation to UTC Region 7 February 19, 2009 jshaw@garrettcom.com

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Transcription:

Cyber Security Standards Update: Version 5 with Revisions Security Reliability Program 2015

Agenda CIP Standards History Version 5 Format Impact Levels NOPR Final Rule References 2 RELIABILITY ACCOUNTABILITY

Pre-Version 1 FERC Request for Standard Market Design CIP Standards History o Request from FERC Staff to develop language May 8, 2002 o Modeled after ISO17799 o Transmitted to FERC on July 25, 2002 o Included in Standard Market Design NOPR as Appendix G Urgent Action 1200 o Follow-on to SMD Appendix G work o SAR Developed in 2003, approved April 7, 2003 o UA1200 approved by industry June 26, 2003 3 RELIABILITY ACCOUNTABILITY

Version 1 CIP Standards History SAR Effort started August 2003 Requirements drafting started June 8, 2004 Filed with FERC August 28, 2006 Approved by FERC January 18, 2008 Effective July 1, 2008 through January 1, 2010 (phased) 4 RELIABILITY ACCOUNTABILITY

CIP Standards History Version 2 SAR started February 2008 Requirements development started October 6, 2008 Low-hanging fruit Filed with FERC May 22, 2009 Approved by FERC September 30, 2009 Effective April 1, 2010 Version 3 (current effective version) Compliance filing to Version 2 Filed with FERC December 29, 2009 Approved by FERC March 31, 2010 Effective October 1, 2010 5 RELIABILITY ACCOUNTABILITY

CIP Standards History Version 4 Critical Asset bright-lines Approved by Industry on December 30, 2010 Filed with FERC on February 10, 2011 Approved by FERC on April 19, 2012 Superseded by Version 5 in FERC Order 791 on November 22, 2013 6 RELIABILITY ACCOUNTABILITY

Version 5 7 RELIABILITY ACCOUNTABILITY

CIP Standards Version 5 D1 Post for 60-day comment and concurrent ballot period November 7, 2011 to January 6, 2012 20-day ballot period (December 17, 2011 January 6, 2012) Multiple separate ballots o One for each standard (10 standards) o One for Implementation Plan o One for Definitions o Single ballot pool 8 RELIABILITY ACCOUNTABILITY

CIP Standards Version 5 D2 Post for 40-day comment and concurrent ballot period April 12, 2012 to May 21, 2012 10-day ballot period (May 11, 2012 May 21, 2012) Multiple separate ballots osingle ballot pool osame ballot pool as initial draft 9 RELIABILITY ACCOUNTABILITY

CIP Standards Version 5 D3 Post for 30-day comment and concurrent ballot period September 11, 2012 to October 10, 2012 10-day ballot period (October 1, 2012 October 10, 2012) Multiple separate ballots osingle ballot pool osame ballot pool as initial draft 10 RELIABILITY ACCOUNTABILITY

CIP Standards Version 5 D4 Post for 10-day recirculation ballot period October 26, 2012 to November 5, 2012 No substantial changes made to standards oclarifications and corrections based on comments received from Draft 3 Changes to existing votes from last successive ballot ono action maintain Draft 3 vote Multiple separate ballots osingle ballot pool osame ballot pool as initial draft 11 RELIABILITY ACCOUNTABILITY

Version 5 Ballot Results 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% Initial Ballot (January 2012) Successive Ballot (May 2012) Successive Ballot (October 2012) Recirculation Ballot (November 2012) 12 RELIABILITY ACCOUNTABILITY

FERC Approval Process Filed with FERC February 1, 2013 (after 5:00 PM on 1/31) FERC Docket RM13-5 10,483 page filing (yes, ten thousand pages) Available on NERC Website at: o http://www.nerc.com/news/headlines%20dl/final_petition_cip_v5_0 1-31-13%20and%20Exhibits%20A-E.pdf o http://www.nerc.com/filingsorders/us/nerc%20filings%20to%20ferc %20DL/Exhibit%20F%20(Part%201%20of%202).pdf o http://www.nerc.com/filingsorders/us/nerc%20filings%20to%20ferc %20DL/Exhibit%20F%20(Part%202%20of%202).pdf o http://www.nerc.com/filingsorders/us/nerc%20filings%20to%20ferc %20DL/Exhibits%20G-H.pdf FERC version at http://elibrary.ferc.gov/idmws/common/opennat.asp?fileid=13167892 (76MB file) Filings to Canadian Regulators made on February 7, 2013 13 RELIABILITY ACCOUNTABILITY

CIP Standards Version 5 CIP-002-5: BES Cyber Asset and BES Cyber System Categorization CIP-003-5: Security Management Controls CIP-004-5: Personnel and Training CIP-005-5: Electronic Security Perimeter(s) CIP-006-5: Physical Security of BES Cyber Systems CIP-007-5: Systems Security Management CIP-008-5: Incident Reporting and Response Planning CIP-009-5: Recovery Plans for BES Cyber Assets and Systems CIP-010-1: Configuration Management and Vulnerability Assessments CIP-011-1: Information Protection 14 RELIABILITY ACCOUNTABILITY

SDT s Development Goals Goal 1: To address the remaining requirements-related directives from all CIP related FERC orders, all approved interpretations, and CAN topics within applicable existing requirements. Goal 2: To develop consistent identification criteria of BES Cyber Systems and application of cyber security requirements that are appropriate for the risk presented to the BES. Goal 3: To provide guidance and context for each Standard Requirement. Goal 4: To leverage current stakeholder investments used for complying with existing CIP requirements. Goal 5: To minimize technical feasibility exceptions. Goal 6: To develop requirements that foster a culture of security and due diligence in the industry to complement a culture of compliance. Goal 7: To develop a realistic and comprehensible implementation plan for the industry. 15 RELIABILITY ACCOUNTABILITY

CIP Standards Version 5 New / Modified Terms: BES Cyber Asset BES Cyber System BES Cyber System Information CIP Exceptional Circumstance CIP Senior Manager Control Center Cyber Assets Cyber Security Incident Dial-up Connectivity Electronic Access Control and Monitoring Systems (EACMS) Electronic Access Point (EAP) Electronic Security Perimeter (ESP) External Routable Connectivity Interactive Remote Access Intermediate System Physical Access Control Systems (PACS) Physical Security Perimeter (PSP) Protected Cyber Asset (PCA) Reportable Cyber Security Incident 16 RELIABILITY ACCOUNTABILITY

BES Cyber Systems Cyber Assets: Programmable electronic devices, and communication networks including the hardware, software, and data in those devices. 17 RELIABILITY ACCOUNTABILITY

BES Cyber Systems BES Cyber Asset: A Cyber Asset that if rendered unavailable, degraded, or misused would, within 15 minutes of its required operation, misoperation, or non-operation, adversely impact one or more Facilities, systems, or equipment, which, if destroyed, degraded, or otherwise rendered unavailable when needed, would affect the reliable operation of the Bulk Electric System. Redundancy of affected Facilities, systems, and equipment shall not be considered when determining adverse impact. Each BES Cyber Asset is included in one or more BES Cyber Systems. (A Cyber Asset is not a BES Cyber Asset if, for 30 consecutive calendar days or less, it is directly connected to a network within an ESP, a Cyber Asset within an ESP, or to a BES Cyber Asset, and it is used for data transfer, vulnerability assessment, maintenance, or troubleshooting purposes.) 18 RELIABILITY ACCOUNTABILITY

BES Cyber Systems BES Cyber System: One or more BES Cyber Assets logically grouped by a responsible entity to perform one or more reliability tasks for a functional entity. 19 RELIABILITY ACCOUNTABILITY

Electronic Perimeters External Routable Connectivity: The ability to access a BES Cyber System from a Cyber Asset that is outside of its associated Electronic Security Perimeter via a bidirectional routable protocol connection. Dial-up Connectivity: A data communication link that is established when the communication equipment dials a phone number and negotiates a connection with the equipment on the other end of the link. 20 RELIABILITY ACCOUNTABILITY

Electronic Perimeters Electronic Security Perimeter ( ESP ) : The logical border surrounding a network to which Critical Cyber Assets BES Cyber Systems are connected using a routable protocol and for which access is controlled. Electronic Access Point ( EAP ): A Cyber Asset interface on an Electronic Security Perimeter that allows routable communication between Cyber Assets outside an Electronic Security Perimeter and Cyber Assets inside an Electronic Security Perimeter. 21 RELIABILITY ACCOUNTABILITY

Electronic Perimeters Electronic Access Control or Monitoring Systems ( EACMS ): Cyber Assets that perform electronic access control or electronic access monitoring of the Electronic Security Perimeter(s) or BES Cyber Systems. This includes Intermediate Devices. Protected Cyber Assets ( PCA ): One or more Cyber Assets connected using a routable protocol within or on an Electronic Security Perimeter that is not part of the highest impact BES Cyber System within the same Electronic Security Perimeter. The impact rating of Protected Cyber Assets is equal to the highest rated BES Cyber System in the same ESP. A Cyber Asset is not a Protected Cyber Asset if, for 30 consecutive calendar days or less, it is connected either to a Cyber Asset within the ESP or to the network within the ESP, and it is used for data transfer, vulnerability assessment, maintenance, or troubleshooting purposes. 22 RELIABILITY ACCOUNTABILITY

Interactive Remote Access Interactive Remote Access: User-initiated access by a person employing a remote access client or other remote access technology using a routable protocol. Remote access originates from a Cyber Asset that is not an Intermediate System and not located within any of the Responsible Entity s Electronic Security Perimeter(s) or at a defined Electronic Access Point (EAP). Remote access may be initiated from: 1) Cyber Assets used or owned by the Responsible Entity, 2) Cyber Assets used or owned by employees, and 3) Cyber Assets used or owned by vendors, contractors, or consultants. Interactive remote access does not include system-to-system process communications. 23 RELIABILITY ACCOUNTABILITY

Interactive Remote Access Intermediate System: A Cyber Asset or collection of Cyber Assets performing access control to restrict Interactive Remote Access to only authorized users. The Intermediate System must not be located inside the Electronic Security Perimeter. 24 RELIABILITY ACCOUNTABILITY

Physical Perimeters Physical Security Perimeter ( PSP ): The physical, completely enclosed ( six-wall ) border surrounding computer rooms, telecommunications rooms, operations centers, and other locations in which Critical Cyber Assets are housed and for which access is controlled. The physical border surrounding locations in which BES Cyber Assets, BES Cyber Systems, or Electronic Access Control or Monitoring Systems reside, and for which access is controlled. 25 RELIABILITY ACCOUNTABILITY

Physical Perimeters Physical Access Control Systems ( PACS ): Cyber Assets that control, alert, or log access to the Physical Security Perimeter(s), exclusive of locally mounted hardware or devices at the Physical Security Perimeter such as motion sensors, electronic lock control mechanisms, and badge readers. 26 RELIABILITY ACCOUNTABILITY

Control Centers Control Center: One or more facilities hosting operating personnel that monitor and control the Bulk Electric System (BES) in real-time to perform the reliability tasks, including their associated data centers, of: 1) a Reliability Coordinator, 2) a Balancing Authority, 3) a Transmission Operator for transmission Facilities at two or more locations, or 4) a Generator Operator for generation Facilities at two or more locations. 27 RELIABILITY ACCOUNTABILITY

Retired Terms Critical Assets Critical Cyber Assets CIP Standards Version 5 28 RELIABILITY ACCOUNTABILITY

CIP Standards Version 5 CIP-002 Eliminates the Critical Asset step of the identification process Builds on bright line concepts introduced in CIP-002-4 Version 3/4 Critical Asset control centers High Other Version 3/4 Critical Assets Medium Some Version 3/4 non-critical assets Medium Transmission now looking at a capacity calculation rather than number of lines at a voltage level o See http://www.nerc.com/docs/pc/rmwg/pas/index_team/ SRI_Equation_Refinement_May6_2011.pdf Catch-all category for non-specifically categorized Low o Something everywhere within the BES o Programmatic requirement: CIP-003-5 Requirement R2 29 RELIABILITY ACCOUNTABILITY

CIP Standards Version 5 High Impact Large Control Centers CIP-003 to 009 V3/V4 plus Medium Impact Generation and Transmission Control Centers Similar to CIP-003 to 009 V3/V4 All other BES Cyber Systems (Low Impact) must implement a policy to address: Cybersecurity Awareness Physical Security Controls Electronic Access Controls Incident Response V3/V4 Critical Non-Critical Large Control Centers Generation and Transmission Control Centers Generation and Transmission Small Control Centers Generation and Transmission V5 High Medium Low Non-Impactful (Distribution, Marketing, Business) 30 RELIABILITY ACCOUNTABILITY

CIP-002-5 Notes when reading NERC Standards: Capitalization is very important. Capitalized words refer to terms in the NERC Glossary of Terms Used in Reliability Standards (http://www.nerc.com/pa/stand/glossary%20of%20terms /Glossary_of_Terms.pdf) Non-capitalized terms do not refer to NERC glossary terms o i.e., Real-time is not the same as real-time o Facilities is not the same as facilities Terms with well known and authoritative definitions defer to those authoritative sources (e.g., FACTS ) Not all terms used have either NERC Glossary definitions or authoritative definitions (e.g., plant ) 31 RELIABILITY ACCOUNTABILITY

High Impact Rating (H): Version 5 Impact Rating Criteria Each BES Cyber System used by and located at any of the following: 1.1. Each Control Center or backup Control Center used to perform the functional obligations of the Reliability Coordinator. (V4 1.14) 1.2. Each Control Center or backup Control Center used to perform the functional obligations of the Balancing Authority: 1) for generation equal to or greater than an aggregate of 3000 MW in a single Interconnection, or 2) for one or more of the assets that meet criterion 2.3, 2.6, or 2.9. (V4 1.15) 1.3. Each Control Center or backup Control Center used to perform the functional obligations of the Transmission Operator for one or more of the assets that meet criterion 2.2, 2.4, 2.5, 2.7, 2.8, 2.9, or 2.10. (V4 1.16) 1.4 Each Control Center or backup Control Center used to perform the functional obligations of the Generator Operator for one or more of the assets that meet criterion 2.1, 2.3, 2.6, or 2.9. (V4 1.17) 32 RELIABILITY ACCOUNTABILITY

Version 5 Impact Rating Criteria Medium Impact Rating (M): Each BES Cyber System, not included in Section 1 above, associated with any of the following: 2.1. Commissioned generation, by each group of generating units at a single plant location, with an aggregate highest rated net Real Power capability of the preceding 12 calendar months equal to or exceeding 1500 MW in a single Interconnection. For each group of generating units, the only BES Cyber Systems that meet this criterion are those shared BES Cyber Systems that could, within 15 minutes, adversely impact the reliable operation of any combination of units that in aggregate equal or exceed 1500 MW in a single Interconnection. (V4 1.1) 2.2. Each BES reactive resource or group of resources at a single location (excluding generation Facilities) with an aggregate maximum Reactive Power nameplate rating of 1000 MVAR or greater (excluding those at generation Facilities). The only BES Cyber Systems that meet this criterion are those shared BES Cyber Systems that could, within 15 minutes, adversely impact the reliable operation of any combination of resources that in aggregate equal or exceed 1000 MVAR. (V4 1.2) 33 RELIABILITY ACCOUNTABILITY

Version 5 Impact Rating Criteria 2.3. Each generation Facility that its Planning Coordinator or Transmission Planner designates, and informs the Generator Owner or Generator Operator, as necessary to avoid an Adverse Reliability Impact in the planning horizon of more than one year. (V4 1.3) 2.4. Transmission Facilities operated at 500 kv or higher. For the purpose of this criterion, the collector bus for a generation plant is not considered a Transmission Facility, but is part of the generation interconnection Facility. (V4 1.6) 34 RELIABILITY ACCOUNTABILITY

Version 5 Impact Rating Criteria 2.5. Transmission Facilities that are operating between 200 kv and 499 kv at a single station or substation, where the station or substation is connected at 200 kv or higher voltages to three or more other Transmission stations or substations and has an "aggregate weighted value" exceeding 3000 according to the table below. The "aggregate weighted value" for a single station or substation is determined by summing the "weight value per line" shown in the table below for each incoming and each outgoing BES Transmission Line that is connected to another Transmission station or substation. For the purpose of this criterion, the collector bus for a generation plant is not considered a Transmission Facility, but is part of the generation interconnection Facility. (V4 1.7) Voltage Value of a Line less than 200 kv (not applicable) 200 kv to 299 kv 700 300 kv to 499 kv 1300 500 kv and above 0 Weight Value per Line (not applicable) 35 RELIABILITY ACCOUNTABILITY

Version 5 Impact Rating Criteria 2.6. Generation at a single plant location or Transmission Facilities at a single station or substation location that are identified by its Reliability Coordinator, Planning Coordinator, or Transmission Planner as critical to the derivation of Interconnection Reliability Operating Limits (IROLs) and their associated contingencies. (V4 1.8 & 1.9) 2.7. Transmission Facilities identified as essential to meeting Nuclear Plant Interface Requirements. (v4 1.11) 2.8. Transmission Facilities, including generation interconnection Facilities, providing the generation interconnection required to connect generator output to the Transmission Systems that, if destroyed, degraded, misused, or otherwise rendered unavailable, would result in the loss of the generation Facilities identified by any Generator Owner as a result of its application of Attachment 1, criterion 2.1 or 2.3. (V4 1.10) 36 RELIABILITY ACCOUNTABILITY

Version 5 Impact Rating Criteria 2.9. Each Special Protection System (SPS), Remedial Action Scheme (RAS), or automated switching System that operates BES Elements, that, if destroyed, degraded, misused or otherwise rendered unavailable, would cause one or more Interconnection Reliability Operating Limits (IROLs) violations for failure to operate as designed or cause a reduction in one or more IROLs if destroyed, degraded, misused, or otherwise rendered unavailable. (V4 1.12) 2.10. Each system or group of Elements that performs automatic Load shedding under a common control system, without human operator initiation, of 300 MW or more implementing undervoltage load shedding (UVLS) or underfrequency load shedding (UFLS) under a load shedding program that is subject to one or more requirements in a NERC or regional reliability standard. (v4 1.13) 37 RELIABILITY ACCOUNTABILITY

Version 5 Impact Rating Criteria 2.11. Each Control Center or backup Control Center, not already included in High Impact Rating (H) above, used to perform the functional obligations of the Generator Operator for an aggregate highest rated net Real Power capability of the preceding 12 calendar months equal to or exceeding 1500 MW in a single Interconnection. (V4 1.15) 2.12. Each Control Center or backup Control Center used to perform the functional obligations of the Transmission Operator not included in High Impact Rating (H), above. (V4 1.16) 2.13. Each Control Center or backup Control Center, not already included in High Impact Rating (H) above, used to perform the functional obligations of the Balancing Authority for generation equal to or greater than an aggregate of 1500 MW in a single Interconnection. (V4 1.17) 38 RELIABILITY ACCOUNTABILITY

Low Impact Rating (L) Version 5 Impact Rating Criteria BES Cyber Systems not included in Sections 1 or 2 above that are associated with any of the following assets and that meet the applicability qualifications in Section 4 - Applicability, part 4.2 Facilities, of this standard: 3.1. Control Centers and backup Control Centers. 3.2. Transmission stations and substations. 3.3. Generation resources. 3.4. Systems and facilities critical to system restoration, including Blackstart Resources and Cranking Paths and initial switching requirements. (V4 1.4 & 1.5) 3.5. Special Protection Systems that support the reliable operation of the Bulk Electric System. (V4 1.12) 3.6. For Distribution Providers, Protection Systems specified in Applicability section 4.2.1 above. (V4 1.12 & 1.13) 39 RELIABILITY ACCOUNTABILITY

Non-CCA assets in Version 3 are also covered Non-Critical Cyber Assets within an ESP are now named Protected Cyber Assets, are associated with a BES Cyber System, and called out in the Applicable Systems column EACMS and PACS are associated with a BES Cyber System, and are called out in the Applicable Systems column CIP Standards Version 5 40 RELIABILITY ACCOUNTABILITY

CIP Standards Version 5 High Water Marking Within an ESP, all systems are treated as if they are at the highest impact level of any system in the same ESP Includes non-impactful Cyber Assets (e.g., market systems, distribution systems, corporate systems) (See definition of PCA) Market System Medium Impact BES Cyber System High Impact BES Cyber System All treated as High Impact BES Cyber Systems Low Impact BES Cyber System All treated as Medium Impact BES Cyber Systems 42 RELIABILITY ACCOUNTABILITY

CIP Standards Version 5 Rationale, Guidance & Changes, Main Requirement and Measure Applicable Systems for requirement part Requirement part text Requirement part Measure text Requirement part Reference Requirement part change rationale 43 RELIABILITY ACCOUNTABILITY

Format CIP Standards Version 5 Following Results-based Standards format Background section before requirements Requirement and Measurement next to each other Rationale and guidance developed in parallel with requirements Two posting formats one with guidance/rationale text boxes inline; other with guidance and rational text grouped at end Still must audit only to the requirement Guidelines and Technical Basis section at end 44 RELIABILITY ACCOUNTABILITY

CIP Standards Version 5 Applicable Systems column in tables What systems the row in the table apply to Listed in each standard Specific phrases consistent across all standards A requirement part (row) may have multiple applicability statements Examples: o High Impact BES Cyber Systems o Medium Impact BES Cyber Systems o Medium Impact BES Cyber Systems at Control Centers o Medium Impact BES Cyber Systems with External Routable Connectivity o Protected Cyber Assets o Electronic Access Control Systems 45 RELIABILITY ACCOUNTABILITY

Connectivity No longer a blanket exemption CIP Standards Version 5 Now listed in applicability section Routable Connectivity or Dial-up Connectivity Routable protocol applicability now applies where large volume, real-time communications requirements are listed e.g., logging Low Impact CIP-003-5 Requirement R2 Programmatic controls (i.e., have a program for ) Requires physical and cyber security protections for locations containing low Does not require lists of every low impact BES Cyber System 46 RELIABILITY ACCOUNTABILITY

TFEs CIP Standards Version 5 Attempting to minimize required TFEs (e.g., anti-malware on switches) Reduced from 14 requirements/subs to 8 requirements (13 parts) But still have TFEs (including new ones where existing V1 V4 problems exist) Have added per Cyber Asset capability language to allow strict compliance with the language of the requirement, without requiring a TFE (~5 requirements) Measures Guidance to auditors as well as entities An example of evidence may include, but is not limited to, No longer a meaningless restatement of the requirement 47 RELIABILITY ACCOUNTABILITY

Bulleted lists vs. numbered lists Bulleted lists are separated by or CIP Standards Version 5 Bulleted lists imply that not all of the items in the list are required Numbered lists are separated by and Numbered lists imply that all of the items in the lists are required Both bulleted and numbered lists are used in both requirements and measures 48 RELIABILITY ACCOUNTABILITY

Features of Version 5 Closes out directives in FERC Order No. 706 (also, FERC Order No. 761 imposed March 31, 2013, filing deadline) Results-based standards Focus on reliability and security-related result Non-technology specific Smarter use of Technical Feasibility Exception (TFE) process Plain language of the requirement, i.e., per device capability Risk-informed systems approach Adopt solutions and tailor security based on function and risk No longer a harsh in or out demarcation for applicability Impact and connectivity informs applicability 49 RELIABILITY ACCOUNTABILITY

Systems approach illustration Features of Version 5 Cyber Assets function together as a complex system Identify the system and apply requirements to the whole rather than the part High Watermarking inside boundary 50 RELIABILITY ACCOUNTABILITY

Paradigm shift that builds on experience Features of Version 5 Informed by and responsive to implementation and audit lessons from Versions 1 through 3 Framework for establishing a culture of security Balanced flexibility Demonstrates clear accountability for Critical Infrastructure Protection, yet... Allows adaptation of requirements to individual operations Specifies what to achieve, but broad in how to get there 51 RELIABILITY ACCOUNTABILITY

CIP Standards Version 5 Proposed Effective Date (from CIP-002-5; all standards use the same language): 1. 24 Months Minimum CIP-002-5 shall become effective on the later of July 1, 2015, or the first calendar day of the ninth calendar quarter after the effective date of the order providing applicable regulatory approval. 2. In those jurisdictions where no regulatory approval is required CIP-002-5 shall become effective on the first day of the ninth calendar quarter following Board of Trustees approval, or as otherwise made effective pursuant to the laws applicable to such ERO governmental authorities. 52 RELIABILITY ACCOUNTABILITY

Implementation issues: CIP Standards Version 5 Specified initial performance of all periodic requirements in implementation plan 24 months following regulatory approval for all requirements Identity Verification does not need to be repeated Discussion of unplanned re-categorization to a higher impact level Discussion of disaster recovery actions Discussion of requirements applied to access control systems (physical and electronic), and Protected Cyber Assets 53 RELIABILITY ACCOUNTABILITY

Applicability Section: Section 4.1 Functional Entities CIP Standards Version 5 o Describes which asset owners, based on their functional model designation, and specific ownership of assets, must comply with the standards o May have no qualifications applies to all entities registered for that function Section 4.2 Facilities o Describes which assets must comply with the standards o May have no qualifications applies to all BES assets owned by that function 54 RELIABILITY ACCOUNTABILITY

Applicability Example: CIP Standards Version 5 For Distribution Providers only those registered DPs that own specifically called out pieces of equipment, such as UFLS systems, must comply with the standards For those DPs, only the specifically called out pieces of equipment must comply with the standards If a DP does not own any called out equipment, it does not need to comply with the standards If a DP owns a piece of called out equipment, only that called out equipment must comply with the standards 55 RELIABILITY ACCOUNTABILITY

CIP Standards Version 5 56 RELIABILITY ACCOUNTABILITY

CIP Standards Version 5 57 RELIABILITY ACCOUNTABILITY

CIP Standards Version 5 58 RELIABILITY ACCOUNTABILITY

CIP-002-5 through CIP-009-5, CIP-010-1, CIP-011-1 Results-based Standard format Requirements and measures together Guidance and rational in text boxes Looks bigger CIP Standards Version 5 ~1 printout for Version 5 compared to ~¼ printout for Version 3/4 Includes much more guidance and rationale for each requirement 59 RELIABILITY ACCOUNTABILITY

CIP Standards Version 5 CIP-002 2 Requirements; 5 Parts; Attachment with bright lines for High and Medium CIP-003 4 Requirements; 13 Parts CIP-004 5 Requirements; 18 Parts CIP-005 2 Requirements; 8 Parts CIP-006 3 Requirements; 13 Parts CIP-007 5 Requirements; 20 Parts CIP-008 3 Requirements; 9 Parts CIP-009 3 Requirements; 10 Parts CIP-010 3 Requirements; 10 Parts CIP-011 2 Requirements; 4 Parts Total: 32 Requirements; 110 Parts 60 RELIABILITY ACCOUNTABILITY

Version 3 Requirement Counts CIP-002 4 Requirements; 0 sub-requirements CIP-003 6 Requirements; 18 sub-requirements CIP-004 4 Requirements; 12 sub-requirements CIP-005 5 Requirements; 26 sub-requirements CIP-006 8 Requirements; 15 sub-requirements CIP-007 9 Requirements; 34 sub-requirements CIP-008 2 Requirements; 6 sub-requirements CIP-009 5 Requirements; 2 sub-requirements Total: 43 Requirements; 113 sub-requirements 61 RELIABILITY ACCOUNTABILITY

Sub-Requirements CIP Standards Version 5 Each Requirement / Sub-Requirement is a compliance touch-point Non-compliance with a sub-requirement stands on its own Sub-requirements have independent VSLs (unless rolled-up) Requirement Parts Only the Requirement is a compliance touch-point Cannot be independently in non-compliance with a Part VSLs written only at the Requirement level (making very long and complicated VSL language) Parts allow flexibility in development and implementation of the requirement 62 RELIABILITY ACCOUNTABILITY

Version 5 Technical Webinar Draft 1 Technical Webinar on format and CIP-002 Industry lead November 15, 2011 Draft 1 Technical webinar on CIP-003 through CIP-011 Industry lead November 29, 2011 (http://www.nerc.com/pa/stand/pages/webinars.aspx) 63 RELIABILITY ACCOUNTABILITY

Version 5 Webinars Draft 2 Technical Webinar SDT Lead April 10, 2012 Draft 3 Technical Webinar SDT Lead September 21, 2012 (http://www.nerc.com/pa/stand/pages/webinars.aspx) 64 RELIABILITY ACCOUNTABILITY

CIP Standards Version 5 Annual interaction with CAN-0010 now 15 months Monthly requirements changed to 35 days Measures are examples with bulleted lists; format, wording Compliance artifacts in requirements (e.g., documentation of ) LSE (removed), replaced with DP LSE functions changed since original standards development timeframe 300 MW threshold on UFLS/UVLS No justification for a different value Notifications: IROL, must run (resolving as part of V4) IROL s in WECC 65 RELIABILITY ACCOUNTABILITY

CIP Standards Version 5 Definition / threshold of Control Center Includes data centers Connectivity (routable, dial-up) Low Impact (policy only) List not required Date tracking (PRA, training, access, etc) Access revocation (reassignments, timing, immediate) Removed 99.9% availability phrasing Difficult to track and audit Interactive Remote Access Clarify encryption and multi-factor authentication points Remove examples from requirements / purpose of encryption 66 RELIABILITY ACCOUNTABILITY

CIP Standards Version 5 Ports & Services Physical ports - FERC Directive No remediation plan if install patches within 35 days Allow updates to existing plans rather than new plans all the time Periodic review of patch sources not individual patches Anti-malware clarify system level Per device capability clauses added Password changing / pseudorandom passwords (RuggedCom vulnerability impacts) Evidence Retention (compliance vs. security monitoring) 67 RELIABILITY ACCOUNTABILITY

CIP Standards Version 5 Take back reporting requirement from EOP-004 into CIP-008 Guidance on active vs. passive vulnerability assessment V4 bypass language still in implementation plan 68 RELIABILITY ACCOUNTABILITY

Issued April 18, 2013 Version 5 NOPR Posted at http://www.ferc.gov/whats-new/commmeet/2013/041813/e-7.pdf 75 pages Comments due June 24, 2013 (60 days after publication in Federal Register) Contains 48 specific requests for comment (may be overlap) Proposes 11 directives for change Proposes 16 areas where FERC may direct changes 69 RELIABILITY ACCOUNTABILITY

Major Themes: Identify, Assess and Correct language Impact Categorization Version 5 NOPR o No reference to studies supporting bright-line thresholds o No consideration of coordinated attack on multiple low impact systems o Only based on BES impact (i.e., no assessment of confidentiality, integrity or availability ) Low Impact BES cyber Systems o Specificity of requirements o Lack of inventory 70 RELIABILITY ACCOUNTABILITY

Definitions: Version 5 NOPR o 15 minute impact in BES Cyber Asset o Generation Control Centers (vs. control rooms) o Removal of communication networks from Cyber Asset o Use of reliability tasks phrase o Intermediate System vs. intermediate device 71 RELIABILITY ACCOUNTABILITY

Implementation Plan o Proposes to accept the Version 4 bypass language o Are 24 /36 months necessary? Violation Risk Factors o Inconsistent with prior versions Violation Severity Levels Version 5 NOPR o Inconsistent with Commission guidelines o May need to be modified based on outcome of IAC discussion 72 RELIABILITY ACCOUNTABILITY

New Topics (post Order No. 706) Communications Security Version 5 NOPR o Including encryption, protections for serial communications Remote Access (more than proposed Version 5 language?) o May already be covered by Version 5 language NIST topics o Maintenance devices o Separation of duties o Threat / risk based categorization o May include other areas May be others 73 RELIABILITY ACCOUNTABILITY

NERC Response: 60 page response (largest response) Version 5 NOPR o (http://www.nerc.com/filingsorders/us/nerc%20filings%20to%20ferc% 20DL/NERC%20Comments%20to%20CIPV5%20NOPR%20_%20FINAL.pdf) Supports standards as filed: o IAC: - Discusses meaning of IAC language - Reliability Benefit of IAC Language - Compliance obligations of IAC language - Consistency with NIST Framework o BES Cyber Asset Categorization and Protection - Supports Facility rating approach - Protections of low impact BES Cyber Assets - Supports not requiring inventory of low impact BES Cyber Assets 74 RELIABILITY ACCOUNTABILITY

NERC Response (continued): o Definitions: BES Cyber Asset - 15-minute parameter - 30-day exclusion o Definitions: Control Center - Geographically disperse generating plants o Definitions: Cyber Assets - Removal of communications networks o Definitions: Reliability Tasks - Well-understood term o Definitions: Intermediate Devices - Filing oversight Version 5 NOPR 75 RELIABILITY ACCOUNTABILITY

NERC Response (continued): Version 5 NOPR o Implementation Plan: - 24- and 36-month timeframes appropriate and necessary - Transition guidance and pilot program o VRF & VSL - Severity of violation as expressed in duration of violation - Not two separate violations o Other Technical Concerns - Technical conferences to discuss issues - Use Reliability Standards Development Process o Remote Access - Concerns addressed in CIP-004 76 RELIABILITY ACCOUNTABILITY

NOPR Comments: 65 files submitted from 62 parties 782 pages Generally supportive of NERC positions o Issues with IAC language o Issues with RFA analysis and estimates (cost & time) Next Steps: Version 5 NOPR FERC must read, summarize and react to all comments while writing final rule 77 RELIABILITY ACCOUNTABILITY

Version 5 Final Rule Final Rule Issued November 22, 2013 Docket RM13-5 Order No. 791 146 page rule Published in Federal Register December 3, 2013 78 RELIABILITY ACCOUNTABILITY

Final Rule Highlights Effective Date of Final Rule: February 3, 2014 Effective Date for Compliance with all non-periodic requirements: April 1, 2016 for High and Medium Impact April 1, 2017 for Low Impact Compliance with initial performance of periodic requirements as discussed in the Implementation Plan, using an Effective Date of April 1, 2016 79 RELIABILITY ACCOUNTABILITY

Approved technical requirements Approved 19 definitions Approved implementation plan Approved bypass of Version 4 Approve, with modifications, VRF / VSL Final Rule Highlights 80 RELIABILITY ACCOUNTABILITY

Submit modified VRF / VSL within 90 days Submit two directed changes and one informational filing within one year IAC Communications Networks Survey: 15-minute clause Two other directed changes do not have specified time frame Low Impact BES Cyber Systems Transient Devices Final Rule Highlights 81 RELIABILITY ACCOUNTABILITY

Address concerns with IAC Language Prefer to have compliance language removed from requirements Allow for flexibility for addressing concerns Supports move away from zero tolerance compliance approach for the 17 requirements IAC language ambiguous, concerns about inconsistent application, unclear expectations placed on industry Submit within one year IAC Language 82 RELIABILITY ACCOUNTABILITY

BES Cyber Asset Categorization Allow impact-based categorization May revisit in future Not persuaded to move blackstart from Low to Medium, but may revisit Does not consider connectivity, but may revisit Confirm that Low will not include non-bes assets 83 RELIABILITY ACCOUNTABILITY

Low Impact requirements Lack of objective criteria for evaluating Low Impact protections Introduces unacceptable level of ambiguity and potential inconsistency into the compliance process Open to alternative approaches the criteria NERC proposes for evaluating a responsible entities protections for Low impact facilities should be clear, objective and commensurate with their impact on the system, and technically justified. No detailed inventory required list of locations / Facilities OK 84 RELIABILITY ACCOUNTABILITY

Survey industry about impacts of 15-minute parameter, during transition period What Cyber Assets are included / excluded by the 15- minute parameter Informational filing to FERC in one year 15-Minute Parameter Commission may revisit issue following informational filing 85 RELIABILITY ACCOUNTABILITY

30-day exemption in Definition Do not direct change to definition Directed modifications to address transient devices issues 86 RELIABILITY ACCOUNTABILITY

Devices connected for less than 30-days (USB, laptop, etc) Transient Devices Direct modifications to address the following concerns: Device authorization Software authorization Security patch management Malware prevention Unauthorized physical access Procedures for connecting to different impact level systems 87 RELIABILITY ACCOUNTABILITY

Control Center Accept definition without change 88 RELIABILITY ACCOUNTABILITY

Approve definition of Cyber Asset without change Direct creation of definition of communication networks and requirements to address issues: Locked wiring closets Disconnected or locked spare jacks Communications Network Protection of cabling by conduit or cable trays Submit within one year Include discussion in FERC Staff-led conference 89 RELIABILITY ACCOUNTABILITY

No need to define phrase Refers to Functional Model tasks Reliability Tasks 90 RELIABILITY ACCOUNTABILITY

Intermediate Devices Accept errata filing (Intermediate Devices -> Intermediate Systems) 91 RELIABILITY ACCOUNTABILITY

Approve implementation Plan as filed 24-month for High & Medium 36-month for Low Bypass Version 4 Support NERC proposal to develop transition guidance and pilot program Declined to extend implementation plan Not persuaded to allow early shift to V5 Implementation Plan However, issues of early compliance can be addressed by NERC and Registered Entities as appropriate. 92 RELIABILITY ACCOUNTABILITY

Approve 30 (of 32) VRFs Move two VRFs from Lower to Medium Modify VSLs: IAC Language Address typographical errors Clarify unexplained elements Submit within 90 days Additional VSL changes will be required for any changed requirement IAC VRF / VSL 93 RELIABILITY ACCOUNTABILITY

FERC Staff-led Conference FERC Staff-led conference within 180 days NIST Framework for categorizations (C-I-A) Communications security Remote access Differences between CIP & NIST May produce new or modified directives 94 RELIABILITY ACCOUNTABILITY

Issued Dec 13, 2013 Errata Notice Corrects P 16 of order to confirm effective date of standard: This errata notice serves to correct P 16. Specifically, the reference to eighth in the seventh line of P 16 is changed to [ninth]. The sentence as revised would thus read, NERC requests that the CIP version 5 Standards become effective on the first day of the [ninth] calendar quarter after a Final Rule is issued in this docket. 95 RELIABILITY ACCOUNTABILITY

VRF/VSL Compliance Filing Updated VRFs & VSLs filed with FERC on May 15, 2014 Response to Order No. 791 VRF modifications filed for: CIP-006-5, Requirement R3 CIP-004-5.1, Requirement R4 VSL modifications filed for CIP-003-5, Requirements R1 and R2 CIP-004-5.1, Requirement R4 CIP-008-5, Requirement R2 CIP-009-5, Requirement R3 Filing approved on July 9, 2014 by Letter Order 96 RELIABILITY ACCOUNTABILITY

Steps Forward Any change to the requirements language must be made pursuant to the NERC Standards Process Manual Standards Drafting Team will need to be involved Opportunity for industry command and ballot Two directives with timeframes Must file in prescribed timeframe Desire to address all directives as soon as possible VRF/VSL changes and Survey will happen outside of standards development process 97 RELIABILITY ACCOUNTABILITY

References Project 2008-06 Development History: Version 4 page: http://www.nerc.com/pa/stand/pages/project_2008-06_cyber_security_phaseii_standards.aspx Version 4 Guidance Document http://www.nerc.com/pa/stand/pages/project_2008-06_cip-002-4_guidance_clean_20101220.pdf Version 5 page: http://www.nerc.com/pa/stand/pages/project_2008-06_cyber_security_version_5_cip_standards.aspx Version 5 Transition Guidance http://www.nerc.com/pa/ci/documents/v3- V5%20Transition%20Guidance%20FINAL.pdf 98 RELIABILITY ACCOUNTABILITY

Questions Scott Mix, CISSP Senior CIP Technical Manager Scott.Mix@nerc.net