Cyber Security. Smart Grid



Similar documents
Cyber Security The Leadership Opportunity for Joint Action Agencies APPA Joint Action Workshop

How Much Cyber Security is Enough?

The Importance of Cybersecurity Monitoring for Utilities

Document ID. Cyber security for substation automation products and systems

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT

Risk Management, Equipment Protection, Monitoring and Incidence Response, Policy/Planning, and Access/Audit

Cyber Security :: Insights & Recommendations for Secure Operations. N-Dimension Solutions, Inc.

Cyber Security Seminar KTH

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Secure SCADA Network Technology and Methods

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System

RuggedCom Solutions for

Symphony Plus Cyber security for the power and water industries

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

NERC CIP Compliance with Security Professional Services

Current IBAT Endorsed Services

AUP28 - Implementing Security and IP Protection

Industrial Security for Process Automation

Network Security. Intertech Associates, Inc.

Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc.

CIP Electronic Security Perimeter (ESP) - Dan Mishra FRCC Compliance Workshop May 09-13, 2011

EFFECTIVE APPROACHES TO CYBERSECURITY FOR UTILITIES TERRY M. JARRETT HEALY & HEALY ATTORNEYS AT LAW, LLC OCTOBER 24, 2013

Protecting Critical Infrastructure. Secure Fashion. Kevin McPoland GarrettCom

Cyber Security for Substation Automation, Protection and Control Systems

North American Electric Reliability Corporation (NERC) Cyber Security Standard

NERC CIP Whitepaper How Endian Solutions Can Help With Compliance

Cyber Security and Privacy - Program 183

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Industrial Cyber Security. Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities

Verve Security Center

Altus UC Security Overview

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Cyber Security Risk Mitigation Checklist

Waterfall for NERC-CIP Compliance

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

CONTENTS. PCI DSS Compliance Guide

Firewall Environments. Name

Next Gen Firewall and UTM Buyers Guide

Effective Defense in Depth Strategies

PCI Requirements Coverage Summary Table

Cisco Security Optimization Service

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

ISACA rudens konference

Secure Access into Industrial Automation and Control Systems Industry Best Practice and Trends. Serhii Konovalov Venkat Pothamsetty Cisco

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

Building Secure Networks for the Industrial World

The Internet of Things (IoT) and Industrial Networks. Guy Denis Rockwell Automation Alliance Manager Europe 2015

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Innovative Defense Strategies for Securing SCADA & Control Systems

How To Secure A Wireless Utility Network

Defending Against Data Beaches: Internal Controls for Cybersecurity

NERC CIP Substation Cyber Security Update. John M Shaw Presentation to UTC Region 7 February 19, 2009 jshaw@garrettcom.com

Critical Infrastructure Security: The Emerging Smart Grid. Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn

Payment Card Industry Data Security Standard

LogRhythm and NERC CIP Compliance

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

74% 96 Action Items. Compliance

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security

Utility Modernization Cyber Security City of Glendale, California

Invensys Security Compliance Platform

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

UNIDIRECTIONAL SECURITY GATEWAYS. Utilizing Unidirectional Security Gateways to Achieve Cyber Security for Industrial Environments

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Move over, TMG! Replacing TMG with Sophos UTM

ICANWK406A Install, configure and test network security

John M Shaw Presentation to UTC Region 7 February 19, 2009 jshaw@garrettcom.com

Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, CASE: Implementation of Cyber Security for Yara Glomfjord

Simplify Your Network Security with All-In-One Unified Threat Management

SOC & HIPAA Compliance

Network protection and UTM Buyers Guide

External Supplier Control Requirements

10 Strategies to Optimize IT Spending in an Economic Downturn. Wong Kang Yeong, CISA, CISM, CISSP Regional Security Architect, ASEAN

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s

Chapter 1 The Principles of Auditing 1

Cyber security measures in protection and control IEDs

Managed Security Services for Data

Nominee: Barracuda Networks

Update On Smart Grid Cyber Security

SCADA Security: Challenges and Solutions

Are you prepared to be next? Invensys Cyber Security

IT Security and OT Security. Understanding the Challenges

Ovation Security Center Data Sheet

The Protection Mission a constant endeavor

Chapter 15. Firewalls, IDS and IPS

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Secure Access into Industrial Automation and Control Systems Best Practice and Trends

SCADA/Business Network Separation: Securing an Integrated SCADA System

Unified Threat Management, Managed Security, and the Cloud Services Model

Overcoming PCI Compliance Challenges

Dr. György Kálmán

Designing a security policy to protect your automation solution

Advantages of Managed Security Services

Transcription:

Cyber Security for the Smart Grid Peter David Vickery Executive Vice President N-Dimension Solutions Inc. APPA National Conference June 21, 2010 Cyber Security Solutions For <Client Name> Cyber Security for the Smart Grid

Selected Partner of the APPA As stated by the Federal Energy Regulatory Commission, cyber attacks can damage generation and distribution facilities in ways that cause widespread disruption of electric service and undermine our government, economy, and the health and safety of millions of citizens. We selected N-Dimension Solutions Inc. as the official cyber security partner of Hometown Connections because the firm offers a deep knowledge of cyber security, a proven methodology, and a commitment to addressing the unique requirements of public power systems of all sizes. - Tim Blodgett, the President and CEO of Hometown Connections -2-

About N-Dimension Solutions Cyber Security Solutions Provider laser focused on the Power & Energy market Member of: NIST Cyber Security Committees: Cyber Security Working Group (CSWG) Smart Grid Interoperability Panel (SGIP) NERC and NERC s Demand-Side Management Task Force Cyber Security Technical Working Groups (IEEE P1711, AMI-SEC) Advisory Committee for U. of Illinois Trusted Computing Infrastructure for Power Developed comprehensive power & energy cyber security and NERC CIP assessment methodology Developed cyber security product family specifically for the Smart Grid Published thought leader on cyber security for the emerging Smart Grid Recognized as an industry leader by Pike Research Active across North America and globally in delivering Smart Grid cyber security solutions in conjunction with our business partners -3-

Industry Leading Partners Smart Grid Integration Communications Asian Distribution Distribution ib ti & P&E Consulting ASP Delivery Hardened Platforms SCADA & Smart Grid Systems -4-

Technology Evolution Internet Services Firewall Workplaces IP Enterprise Optimization Suite Enterprise Network Third Party Application Server Mobile Operator Network Connectivity Server Historian Server Application Server Engineering Workplace Control Network Modbus DNP3 Device Network Redundant -5-

What Are The Most Likely Attacks? Malware impairing operations no human behind the attack no awareness that victim is a utility Malware exploited for extortion targeted at insecure enterprises with significant ability to pay Dormant malware activated some day in the future terrorists, nation states Hacker attacks against US power system terrorists, nation states combined cyber/physical attack Insiders These attacks seek out poorly secured systems -6-

Lifecycle Approach to Cyber Security 1. Preparation Preparation create/review policy statements t t conduct a risk analysis establish/review security team structure 2. Prevention Prevention 3. Response deploy security countermeasures approve security changes monitor security posture Response respond to security violations restoration review -7-

Defense in Depth Perimeter Protection Firewall, IPS, VPN, AV Host IDS, Host AV DMZ Interior Security Firewall, IDS, VPN, AV Host IDS, Host AV IEEE P1711, IEC 62351 NAC Scanning Monitoring Management Processes IDS IPS DMZ VPN AV NAC Intrusion Detection System Intrusion Prevention System DeMilitarized Zone Virtual Private Network (encrypted) Anti-Virus (anti-malware) Network Admission Control -8-

N-Dimension s Products and Services Professional Services Cyber Security Services for Smart Grid Operational Environments Technical Solutions n-platform UTM n-central Management System Industry Partners Solution Augmentation Turnkey ASP Service + Addresses Pain Points in Target Sector + Integrated Solution -9-

Perimeter Defense-in-Depth Firewall IDS Remote Access VPN Site-to-Site VPN DMZ Site-to-site VPN Proxy Anti-Virus IDS NAC -10-

Interior Defense-in-Depth IDS Port Scan Vuln Scan Firewall NAC SSL VPN IPSEC VPN SCADA VPN Firewall Port Scan IDS Access Control SSL VPN IPSEC VPN SCADA VPN Firewall IDS -11-

Central Log and Event Management Internal: Log, Analyze, Report, Compliance Outsourced Smart Grid Security Service -12-

ASP Service Description Based on term agreement with each participating Utility Pricing is for all elements of the service including: Initial design Configuration and hardware / software installation Level 1, 2 and 3 customer support Cyber node hardware / software Maintenance including hardware replacement if required Software updates Reports, audits, logs 24x7x365 Cyber Security Monitoring Secure Utility Web portal Annual Cyber Security Policy Review Add-on capabilities within term e.g. AMI and additional substations Contract extension option after initial term -13-

ASP Service Program Benefits High ease-of-procurement and ease-of-use Cost efficiencies: typically < 0.1% of utility s O&M budget 7x24x365 coverage by subject matter experts No need to expend capital nor hire and train expensive specialists Utility retains control of its cyber data through remote access to their specific data, customized reports and real-time insight via secured web portal Additional end points and operating areas (e.g. AMI and additional substations) can be added within the term of the agreement Program aligns with NERC-CIP standards Approach is endorsed d by insurance providers as demonstration of duty of care -14-