Cyber Security Standards: Version 5 Revisions. Security Reliability Program 2015



Similar documents
152 FERC 61,054 UNITED STATES OF AMERICA FEDERAL ENERGY REGULATORY COMMISSION. 18 CFR Part 40. [Docket No. RM ]

Notable Changes to NERC Reliability Standard CIP-010-3

Summary of CIP Version 5 Standards

CIP v5/v6 Implementation Plan CIP v5 Workshop. Tony Purgar October 2-3, 2014

CIP R2 BES Assets Containing Low Impact BCS. Lisa Wood, CISA, CBRA, CBRM Compliance Auditor Cyber Security

Notable Changes to NERC Reliability Standard CIP-005-5

Cyber Security Standards Update: Version 5

Cyber Security Standards Update: Version 5 with Revisions

CIP Cyber Security Security Management Controls

Cyber Security Compliance (NERC CIP V5)

NERC Cyber Security Standards

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)

Implementation Plan for Version 5 CIP Cyber Security Standards

NovaTech NERC CIP Compliance Document and Product Description Updated June 2015

NERC CIP VERSION 5 COMPLIANCE

NERC CIP Tools and Techniques

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

Standard CIP 007 3a Cyber Security Systems Security Management

CIP Cyber Security Electronic Security Perimeter(s)

Information Shield Solution Matrix for CIP Security Standards

Cyber Security for NERC CIP Version 5 Compliance

Alberta Reliability Standard Cyber Security Implementation Plan for Version 5 CIP Security Standards CIP-PLAN-AB-1

Completed. Document Name. NERC CIP Requirements CIP-002 Critical Cyber Asset Identification R1 Critical Asset Identifaction Method

Reclamation Manual Directives and Standards

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

TOP 10 CHALLENGES. With suggested solutions

ReliabilityFirst CIP Evidence List CIP-002 through CIP-009 are applicable to RC, BA, IA, TSP, TO, TOP, GO, GOP, LSE, NERC, & RE

Standard CIP Cyber Security Systems Security Management

Document ID. Cyber security for substation automation products and systems

Redesigning automation network security

Technology Solutions for NERC CIP Compliance June 25, 2015

Lessons Learned CIP Reliability Standards

Voluntary Cybersecurity Initiatives in Critical Infrastructure. Nadya Bartol, CISSP, SGEIT, 2014 Utilities Telecom Council

CIP Ben Christensen Senior Compliance Risk Analyst, Cyber Security

SecFlow Security Appliance Review

TRIPWIRE NERC SOLUTION SUITE

The first step in protecting Critical Cyber Assets is identifying them. CIP-002 focuses on this identification process.

Verve Security Center

Critical Controls for Cyber Security.

Automating NERC CIP Compliance for EMS. Walter Sikora 2010 EMS Users Conference

How to Integrate NERC s Requirements in an Ongoing Automation and Integration Project Framework

NERC CIP Whitepaper How Endian Solutions Can Help With Compliance

Cyber Security Response to Physical Security Breaches

Supporting our customers with NERC CIP compliance. James McQuiggan, CISSP

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards

Alberta Reliability Standard Cyber Security System Security Management CIP-007-AB-5

Strong Security in NERC CIP Version 5: Unidirectional Security Gateways

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Alberta Reliability Standard Cyber Security Personnel & Training CIP-004-AB-5.1

When this standard has received ballot approval, the text boxes will be moved to the Guidelines and Technical Basis section of the Standard.

SUBJECT: Effective Date Policy Number Security of Mobile Computing, Data Storage, and Communication Devices

EnergySec Partnered Webinar with MetricStream Transitioning to NERC CIP Version 5: What Does it Mean for Electric Utilities JANUARY 28, 2015

NERC CIP Substation Cyber Security Update. John M Shaw Presentation to UTC Region 7 February 19, 2009 jshaw@garrettcom.com

Industrial Security for Process Automation

Department of Defense INSTRUCTION. Security of Unclassified DoD Information on Non-DoD Information Systems

Secure Remote Substation Access Solutions

John M Shaw Presentation to UTC Region 7 February 19, 2009 jshaw@garrettcom.com

Secure Remote Substation Access Interest Group Part 3: Review of Top Challenges, CIPv5 mapping, and looking forward to 2014!

SYMMETRY WHITE PAPER. Support for Critical Infrastructure Protection (CIP) Cyber Security Standards. Adam Shane

LogRhythm and NERC CIP Compliance

NERC CIP Compliance Gaining Oversight with ConsoleWorks

Alberta Reliability Standard Cyber Security Security Management Controls CIP-003-AB-5

INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc.

Alberta Reliability Standard Cyber Security Configuration Change Management and Vulnerability Assessments CIP-010-AB-1

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Ohio Supercomputer Center

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

FERC, NERC and Emerging CIP Standards

TRANSMISSION MAINTENANCE COORDINATION COMMITTEE (TMCC) MINUTES January 16, 2014 Meeting from ISO Headquarters Folsom, California

Control System Integrity (CSI) Tools and Processes to Automate CIP Compliance for Control Systems

WHITE PAPER CYBER SECURITY AND ELECTRIC UTILITY COMMUNICATIONS WHAT NERC/CIP MEANS FOR YOUR MICROWAVE

Meeting NERC CIP Access Control Standards. Presented on February 12, 2014

Cyber Security and Privacy - Program 183

Consulting International

Security Policy for External Customers

Security Regulations and Standards for SCADA and Industrial Controls

Standard CIP 004 3a Cyber Security Personnel and Training

1 Purpose Scope Roles and Responsibilities Physical & Environmental Security Access Control to the Network...

Security Control Standard

149 FERC 61,140 UNITED STATES OF AMERICA FEDERAL ENERGY REGULATORY COMMISSION. 18 CFR Part 40. [Docket No. RM ; Order No.

North American Electric Reliability Corporation (NERC) Cyber Security Standard

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

IT Networking and Security

Continuous Compliance for Energy and Nuclear Facility Cyber Security Regulations

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Cyber Self Assessment

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Recommended Wireless Local Area Network Architecture

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

Transcription:

Cyber Security Standards: Version 5 Revisions Security Reliability Program 2015

Overview of Development Activities The Team Standard Drafting Team (SDT) appointed to address these revisions in Project 2014-02. Maggy Powell, Exelon Philip Huff, AECC David Revill, GTC Jay Cribb, Southern Company Forrest Krigbaum, BPA David Dockery, AECI Greg Goodrich, NYISO Christine Hasha, ERCOT Steve Brain, Dominion Scott Saunders, SMUD 2 RELIABILITY ACCOUNTABILITY

CIP Standards Version 5 CIP-002-5.1*: BES Cyber Asset and BES Cyber System Categorization CIP-003-6**: Security Management Controls CIP-004-6**: Personnel and Training CIP-005-5: Electronic Security Perimeter(s) CIP-006-6: Physical Security of BES Cyber Systems CIP-007-6**: Systems Security Management * - Changed Devices to Systems in background section ** - Developed as version 7 3 RELIABILITY ACCOUNTABILITY

CIP Standards Version 5 CIP-008-5: Incident Reporting and Response Planning CIP-009-6: Recovery Plans for BES Cyber Assets and Systems CIP-010-2***: Configuration Management and Vulnerability Assessments CIP-011-2***: Information Protection *** - Developed as version 3 4 RELIABILITY ACCOUNTABILITY

Overview of Development Activities Key Objectives Four directive areas One year filing deadline Outreach during development and comment period 5 RELIABILITY ACCOUNTABILITY

FERC Final Rule Issued November 3, 2013 Effective February 3, 2014 Four directives: Identify Assess and Correct language Communication Networks Low Impact BES Cyber Systems Transient Devices First two had one-year deadline Filing deadline February 3, 2015 6 RELIABILITY ACCOUNTABILITY

Identify, Assess, and Correct FERC preferred to not have compliance language included within technical requirement SDT responded by deleting language from 17 requirements RAI (Risk-based Compliance Monitoring and Enforcement) concepts replaced need for IAC language 7 RELIABILITY ACCOUNTABILITY

Communication Networks FERC Directed creation of definition of communication networks and requirements to address issues: Locked wiring closets Disconnected or locked spare jacks Protection of cabling by conduit or cable trays 8 RELIABILITY ACCOUNTABILITY

Communication Networks SDT responded by adding CIP-006 Part 1.10 to address protections of non programmable components of communication networks that are inside an ESP, but outside of a PSP SDT also modified CIP-007 Part 1.2 to address unused physical ports on nonprogrammable communication components and devices at high and medium impact Control Centers Formal definition determined by SDT to be unnecessary at this time 9 RELIABILITY ACCOUNTABILITY

Transient Devices Described in Final Rule as devices connected for less than 30-days (USB, laptop, etc) FERC directed modifications to address the following concerns: Device authorization Software authorization Security patch management Malware prevention Unauthorized physical access Procedures for connecting to different impact level systems 10 RELIABILITY ACCOUNTABILITY

Transient Devices SDT developed two additional definitions Removable Media Transient Cyber Assets Added CIP-010 Requirement R4 dealing with issue Detailed requirements in attachment and measures in a separate attachment Separated into three areas: o Transient Cyber Assets managed by Responsible Entity o Transient Cyber Assets managed by other parties o Removable Media Modified CIP-004 Part 2.1 to address training on risks associated with Transient Cyber Assets and Removable Media 11 RELIABILITY ACCOUNTABILITY

Transient Cyber Assets Transient Cyber Asset: A Cyber Asset that (i) is capable of transmitting or transferring executable code, (ii) is not included in a BES Cyber System, (iii) is not a Protected Cyber Asset (PCA), and (iv) is directly connected (e.g., using Ethernet, serial, Universal Serial Bus, or wireless, including near field or Bluetooth communication) for 30 consecutive calendar days or less to a BES Cyber Asset, a network within an ESP, or a PCA. Examples include, but are not limited to, Cyber Assets used for data transfer, vulnerability assessment, maintenance, or troubleshooting purposes. 12 RELIABILITY ACCOUNTABILITY

Transient Cyber Assets (continued) Removable Media: Storage media that (i) are not Cyber Assets, (ii) are capable of transferring executable code, (iii) can be used to store, copy, move, or access data, and (iv) are directly connected for 30 consecutive calendar days or less to a BES Cyber Asset, a network within an ESP, or a Protected Cyber Asset. Examples include, but are not limited to, floppy disks, compact disks, USB flash drives, external hard drives, and other flash memory cards/drives that contain nonvolatile memory. 13 RELIABILITY ACCOUNTABILITY

Low Impact BES Cyber Systems FERC concerned with lack of objective criteria for evaluating Low Impact protections Introduces unacceptable level of ambiguity and potential inconsistency into the compliance process Open to alternative approaches the criteria NERC proposes for evaluating a responsible entities protections for Low impact facilities should be clear, objective and commensurate with their impact on the system, and technically justified. No detailed inventory required list of locations / Facilities OK 14 RELIABILITY ACCOUNTABILITY

Low Impact BES Cyber Systems (continued) SDT maintained all low impact requirements in CIP-003 Low-only entities only need to comply with CIP-002 and CIP- 003 Added CIP-003 Part 1.2 dealing with security policy for low impact BES Cyber Systems Added Attachments dealing with the technical requirement and measures Kept four original areas 15 RELIABILITY ACCOUNTABILITY

Low Impact BES Cyber Systems (continued) Security Awareness reinforce, at least every 15 calendar months, cyber security practices Incident Response Modeled from medium impact 6 elements (of 9: collapsed process requirements and update requirements together; no documentation of deviations or specific record retention but still need to demonstrate compliance) Physical Security control physical access based on need 16 RELIABILITY ACCOUNTABILITY

Low Impact BES Cyber Systems (continued) 17 RELIABILITY ACCOUNTABILITY

Low Impact BES Cyber Systems (continued) Electronic Security Two new definitions LERC and LEAP Similar to but different from ERC and EAP concepts at medium & high permit only necessary inbound and outbound bi-directional routable protocol access authentication for all Dial-up Connectivity Seven reference model drawings showing LERC & LEAP in Guidelines and Technical Basis section 18 RELIABILITY ACCOUNTABILITY

Low Impact BES Cyber Systems (continued) ERC - External Routable Connectivity - The ability to access a BES Cyber System from a Cyber Asset that is outside of its associated Electronic Security Perimeter via a bi-directional routable protocol connection. LERC Low Impact External Routable Connectivity - Direct user initiated interactive access or a direct device to device connection to a low impact BES Cyber System(s) from a Cyber Asset outside the asset containing those low impact BES Cyber System(s) via a bi directional routable protocol connection. Point to point communications between intelligent electronic devices that use routable communication protocols for time sensitive protection or control functions between Transmission station or substation assets containing low impact BES Cyber Systems are excluded from this definition (examples of this communication include, but are not limited to, IEC 61850 GOOSE or vendor proprietary protocols). 19 RELIABILITY ACCOUNTABILITY

Low Impact BES Cyber Systems (continued) EAP - Electronic Access Point - A Cyber Asset interface on an Electronic Security Perimeter that allows routable communication between Cyber Assets outside an Electronic Security Perimeter and Cyber Assets inside an Electronic Security Perimeter. LEAP Low Impact BES Cyber System Electronic Access Point - A Cyber Asset interface that controls Low Impact External Routable Connectivity. The Cyber Asset containing the LEAP may reside at a location external to the asset or assets containing low impact BES Cyber Systems. 20 RELIABILITY ACCOUNTABILITY

Low Impact BES Cyber Systems (continued) 21 RELIABILITY ACCOUNTABILITY

Low Impact BES Cyber Systems (continued) 22 RELIABILITY ACCOUNTABILITY

Low Impact BES Cyber Systems (continued) 23 RELIABILITY ACCOUNTABILITY

Low Impact BES Cyber Systems (continued) 24 RELIABILITY ACCOUNTABILITY

Low Impact BES Cyber Systems (continued) 25 RELIABILITY ACCOUNTABILITY

Low Impact BES Cyber Systems (continued) 26 RELIABILITY ACCOUNTABILITY

Low Impact BES Cyber Systems (continued) 27 RELIABILITY ACCOUNTABILITY

Implementation Plan Phased implementation plan: IAC no change (4/1/16) Communication Networks 9 months after the effective date of the standard Transient Devices 9 months after the effective date of the standard Low Impact o Latter of 4/1/17 or 9 months after the effective date of the standard for policy, plan, security awareness, and response o Latter of 9/1/18 or 9 months after the effective date of the standard for physical and electronic security 28 RELIABILITY ACCOUNTABILITY

April 1, 2016 - CIP V5 Approved Effective Date IAC, CN revisions - November 13, 2014 LI, TD revisions - February 12, 2015 Implementation Plan NERC If FERC approves CIPV5R in: Board Standard/Requirement Revision Adoption 3Q15 4Q15 1Q16 CIP-002-5 not up for revision 1-Apr-16 1-Apr-16 1-Apr-16 CIP-003-6 1-Apr-16 1-Apr-16 1-Jul-16 CIP-003-6, R1, part 1.1 H/M - Policy 1-Apr-16 1-Apr-16 1-Apr-16 CIP-003-6, R1, part 1.2 LI - Policy 1-Apr-17 1-Apr-17 1-Apr-17 CIP-003-6, R2 LI - Plan 1-Apr-17 1-Apr-17 1-Apr-17 CIP-003-6, Att 1, Sect. 1 LI - Sec Awareness 1-Apr-17 1-Apr-17 1-Apr-17 CIP-003-6, Att 1, Sect. 2 LI - Phys Security 1-Sep-18 1-Sep-18 1-Sep-18 CIP-003-6, Att 1, Sect. 3 LI - Elec. Access 1-Sep-18 1-Sep-18 1-Sep-18 CIP-003-6, Att 1, Sect. 4 LI - Incident Resp 1-Apr-17 1-Apr-17 1-Apr-17 CIP-004-6 TCA & RM added to Training 1-Apr-16 1-Apr-16 1-Jul-16 CIP-005-5 not up for revision 1-Apr-16 1-Apr-16 1-Apr-16 CIP-006-6 1-Apr-16 1-Apr-16 1-Jul-16 CIP-006-6, R1, part 1.10* CN 1-Jan-17 1-Jan-17 1-Apr-17 CIP-007-6 1-Apr-16 1-Apr-16 1-Jul-16 CIP-007-6, R1, part 1.2* CN, RM capitalized 1-Jan-17 1-Jan-17 1-Apr-17 CIP-008-5 not up for revision 1-Apr-16 1-Apr-16 1-Apr-16 CIP-009-6 1-Apr-16 1-Apr-16 1-Jul-16 CIP-010-2 1-Apr-16 1-Apr-16 1-Jul-16 CIP-010-2, R4 TD 1-Jan-17 1-Jan-17 1-Apr-17 CIP-011-2 TCA & RM added to Guidelines 1-Apr-16 1-Apr-16 1-Jul-16 TCA, RM Glossary Terms TD 1-Jan-17 1-Jan-17 1-Apr-17 BCA, PCA Glossary Terms TD 1-Jan-17 1-Jan-17 1-Apr-17 LERC, LEAP Glossary Terms LIA 1-Apr-17 1-Apr-17 1-Apr-17 V5 E- Date 29 RELIABILITY ACCOUNTABILITY

Current Status NERC Board approved responses to IAC and Communication Networks directives on November 13, 2014 NERC Board approved responses to Low Impact and Transient Device directives on February 12, 2015 Board action adjusted version numbers to -6 and -2 All four directive areas filed with FERC on February 13, 2015 (10- day extension granted due to scheduled NERC board meeting) FERC must go through its approval process 30 RELIABILITY ACCOUNTABILITY

Version X IAC/CN Only CIP-003-X/CIP-010-X CIP-003-6/CIP-010-2 CIP-003-6/CIP- 010-2 July Initial Ballot October Additional Ballot October Final Ballot CIP Version What? CIP-003-6/CIP-010-2 Lows/Transients CIP-003-6/CIP-010-2 November Board Adoption January Additional Ballot January Final Ballot CIP-003-7/CIP-010-3 4 directives CIP-003-7/CIP-010-3 4 directives February Board Adoption CIP-003-6/CIP-004-6/CIP-006-6/ CIP-007-6/CIP-009-6/CIP-010-2/CIP-011-2 FERC Filing 2/13/2015 31 RELIABILITY ACCOUNTABILITY

Project 2014-02 Development History: CIP Version 5 Revisions page: References http://www.nerc.com/pa/stand/pages/project-2014-xx- Critical-Infrastructure-Protection-Version-5-Revisions.aspx CIP Version 5 Transition page: http://www.nerc.com/pa/ci/pages/transition-program.aspx 32 RELIABILITY ACCOUNTABILITY

Questions Scott Mix, CISSP Senior CIP Technical Manager Scott.Mix@nerc.net