Cyber security: Practical Utility Programs that Work



Similar documents
Smart Grid America: Securing your network and customer data. Michael Assante Vice President and Chief Security Officer March 9, 2010

EEI Business Continuity. Threat Scenario Project (TSP) April 4, EEI Threat Scenario Project

RE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity

Addressing Dynamic Threats to the Electric Power Grid Through Resilience

Panel Session: Lessons Learned in Smart Grid Cybersecurity

Executive Summary. Cybersecurity cannot be completely solved, and will remain a risk we must actively manage.

Written Statement of Richard Dewey Executive Vice President New York Independent System Operator

April 8, Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

Energy Cybersecurity Regulatory Brief

Cyber Security and Privacy - Program 183

AURORA Vulnerability Background

CRITICAL INFRASTRUCTURE PROTECTION BUILDING ORGANIZATIONAL RESILIENCE

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, February 12, 2013

Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper

IEEE-Northwest Energy Systems Symposium (NWESS)

Resilient and Secure Solutions for the Water/Wastewater Industry

CYBER SECURITY GUIDANCE

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

Asset Management Challenges and Options, Including the Implications and Importance of Aging Infrastructure

Critical Infrastructure Security and Resilience

Summary of CIP Version 5 Standards

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education

Establishing A Secure & Resilient Water Sector. Overview. Legislative Drivers

What Risk Managers need to know about ICS Cyber Security

The Importance of Cybersecurity Monitoring for Utilities

NERC Cyber Security Standards

Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc.

Cyber Security Controls Assessment : A Critical Discipline of Systems Engineering

How To Write A National Cybersecurity Act

TUSKEGEE CYBER SECURITY PATH FORWARD

STATEMENT OF PATRICIA HOFFMAN ACTING ASSISTANT SECRETARY FOR ELECTRICITY DELIVERY AND ENERGY RELIABILITY U.S. DEPARTMENT OF ENERGY BEFORE THE

DHS, National Cyber Security Division Overview

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)

Claes Rytoft, ABB, Security in Power Systems. ABB Group October 29, 2009 Slide 1

Preventing and Defending Against Cyber Attacks November 2010

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security

State Roles in Enhancing the Cybersecurity of Energy Systems and Infrastructure

U.S. Cyber Security Readiness

Cybersecurity: Mission integration to protect your assets

UNITED STATES DEPARTMENT OF AGRICULTURE Rural Utilities Service. Bulletin 1730B-2. SUBJECT: Guide for Electric System Emergency Restoration Plan

Legislative Language

Supplemental Tool: Executing A Critical Infrastructure Risk Management Approach

Performs the Federal coordination role for supporting the energy requirements associated with National Special Security Events.

CIP Supply Chain Risk Management (RM ) Statement of Jacob S. Olcott Vice President, BitSight Technologies January 28, 2016

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

Update On Smart Grid Cyber Security

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

CyberSecurity Solutions. Delivering

Increasing Energy Reliability & Resiliency NGA Policy Institute for Governors' Energy Advisors Denver Colorado, September 11, 2013

Actions and Recommendations (A/R) Summary

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

Risk Management, Equipment Protection, Monitoring and Incidence Response, Policy/Planning, and Access/Audit

Data Security Concerns for the Electric Grid

CYBERSECURITY RISK MANAGEMENT

Assessment of natural hazards, man made hazards, technical and societal related risks and associated impact.

ASX CLEAR (FUTURES) OPERATING RULES Guidance Note 10

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

Critical Infrastructure

The Comprehensive National Cybersecurity Initiative

Report on CAP Cybersecurity November 5, 2015

ASX SETTLEMENT OPERATING RULES Guidance Note 10

The Battlefield. critical infrastructure:

Cyber Security :: Insights & Recommendations for Secure Operations. N-Dimension Solutions, Inc.

Defensible Strategy To. Cyber Incident Response

Best Practices in ICS Security for System Operators. A Wurldtech White Paper

SCADA Security Training

Subject: Critical Infrastructure Identification, Prioritization, and Protection

Priority III: A National Cyberspace Security Awareness and Training Program

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement

September 4, appearing before you today. I am here to testify about issues and challenges in providing for

December 17, 2003 Homeland Security Presidential Directive/Hspd-7

PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE

New York State Energy Planning Board. Cyber Security and the Energy Infrastructure

Transcription:

Cyber security: Practical Utility Programs that Work Securing Strategic National Assets APPA National Conference 2009 Michael Assante Vice President & CSO, NERC June 15, 2009

The Electric Grid - Challenges Energy Policy Objectives

The Electric Grid Generation Transmission Distribution 5,000 plants 65% of monthly bill Employs approx. 120,000 people 160,000 miles 5% of average customer monthly bill Employs approx. 15,000 people Over 1,000,000 miles 30% of average customer monthly bill Employs approx. 400,000 people The electric infrastructure underpins all others and is vital for both economic and national security

Common Hazards Storms (ice, hurricane, wind), tornados, earthquakes, flooding Squirrels and possums Aging staffs, skilled staff availability and labor disputes Fuel disruptions and reduced onsite supplies Aging infrastructures and critical components Vegetation-related T&D outages Lack of preventative maintenance System congestion and operations close to load limits Voltage/reactive reserve availability Mal-operating system protection and controls System complexity and coordination breakdowns Accidents & other human activity Investment uncertainty, renewable mandates and environmental regulation Physical security incidents

Competing System Goals The most efficient system operates exactly at its operating limits with little redundancy Every component is critical Every component utilized to its maximum Very economical as long as nothing breaks A resilient system has sufficient redundancies in the right places to withstand losses of any component No one component is critical Components far from their operating limits Very robust but expensive to build and operate

Technology Transformation We are at a transformational moment a moment in history when our interconnected world presents us, at once, with great promise but also great peril. President Obama, May 2009

Change & Enduring Structures SCADA 765 kv system Electric Capacity In Decline & Aging Infrastructure CIA disclosure Greater Internet Use EBR-I First Nuclear NE Blackout I SCADA EMS NE Blackout II Smart Grid Pulverized Coal Generation Digital Replace EM in Newcon Aurora Research 1920 1951 1960 1965 1975 1985 1995 2001 2003 2006 Risk over time: Threats are LOW Vulnerabilities are LOW Consequences are LOW Threats are LOW* Vulnerabilities are MED+ Consequences are MED Threats are MED Vulnerabilities are HIGH Consequences are HIGH 2009

Electric Infrastructure Security Landscape Change 1900-2001 2001 - Present Few homeland threats Perceived security Limited digital technology change (manageable complexity) Ample human and material resources Threat potential increasing Recognized national security issue Aging infrastructure undergoing technology enhancements Increasing complexity Limited transmission investment

Cyber & the Pace of Change It's the great irony of our Information Age -- the very technologies that empower us to create and to build also empower those who would disrupt and destroy. President Obama, May 2009

Cyber Risk & the Grid

Unique Nature of Cyber Threats Understanding of cyber technologies change frequently New vulnerabilities & technical exploits Growing system complexity & connectivity/access paths (e.g. Smart Grid) Potential threats can be unknown and arise very quickly Can require rapid and often confidential responses Attackers are intelligent and watching Attacker s advantage - unbounded attack scenarios (vulnerabilities, technical threats, and consequences) Cyber threats can arise virtually anytime and anywhere across the vast array of communicating devices on the grid Probably don t have all information and expertise Attacks might not happen making measurement difficult (human dilemma) Cyber Security threats are unlike any other threat to the electric grid.

Control System Security Snapshot ICS-Specific Vulnerabilities ICS-Attack Tools Electric ICS Port Probes Vulnerabilities that can affect ICS Source: Critical Intelligence info@critical-intelligence.com

Increased Attention 1Q 09 - ICS Attack Presentations Critical intelligence noted six presentations at open information security conferences covering ICS vulnerabilities in the first quarter and a total of 20 in 2009. The security conferences include (25C3, Black Hat DC, Shmoocon, Source Boston) Source: Critical Intelligence info@critical-intelligence.com

Threat Actors & Scenarios to Consider Threat Actors: Extremist (single issue groups) Terrorist Organized Criminals Nation States Lone wolf Insiders Viral Threat Scenarios: Physical Attacks Cyber Attacks Blended Attacks EMP/RF Energy, EMC Pandemics WMD (RDD, etc.)

Cyber Events and Power Systems CIA discloses they have information of cyber attacks against power system controls outside the US. Resulted in multi-city outage Extortion as the prime motivation US Power companies have been penetrated Media reports & government officials Connectivity to substations & digital hardware exist Market Surveys (modems, SCADA, Internet, wireless, etc ) Restoration time is critical, Availability is priority Websites, presentations and books devoted to hacking our systems CNN Aurora disclosure & video Senate Energy & Natural Resources Committee Chairman Jeff Bingham at recent classified briefing I found the briefing chilling 15

Recent Wall Street Journal & Media Reports Cyber spies have penetrated the U.S. electrical grid and left behind software systems that could be used to disrupt the system. Current and former national security officials The Russians and Chinese have attempted to map our infrastructure. Senior intelligence official U.S. Intelligence agencies detected the intrusions, not the companies in charge of the infrastructure. Officials There are intrusions and they are growing. There were a lot last year. Former DHS official Utilities are reluctant to speak about the dangers. PJM

Greatest Challenge to Overcome The potential for an intelligent cyber attacker to exploit a common vulnerability that impacts many assets at once, and from a distance is one of the most concerning aspects of this challenge Common or single point of failure (horizontal nature of technology) Universal points for commands/action Still need to prioritize our effort (investment, time and attention) Essentially, we re working to protect the grid against an armed and moving target that has a closet full of camouflage, so to speak. It s no easy task. Cyber threats can develop in the shadows and arise in minutes, exhibiting different characteristics than those preceding them, and are being driven by intelligent threat actors attempting to manipulate system components to achieve their objective (all the while enjoying the attacker s advantage). Michael Assante, CSO of NERC, 2009

Cyber Security & the Grid

Addressing Cyber Risk Requires a different approach, that must include: Constant vigilance Urgent action (as technologies change, threats arise, and vulnerabilities are identified) Information must be disseminated to the individuals who need it most as quickly and securely as possible Layered defense (CIP Standards, Active risk identification & management, Communications) Involved risk decision making model Identify, measure, and manage risk, scope and pinpoint specific issues, and determine the timeframe in which they must be addressed.

Reliability & Security Goals Understand what is possible Mitigate consequences of a successful attack Reduce the attractiveness of the power grid as a target Shift the majority of our focus from prevention to engineering in resilience & safety, restoration, and system recovery From now on, our digital infrastructure -- the networks and computers we depend on every day -- will be treated as they should be: as a strategic national asset. Protecting this infrastructure will be a national security priority. We will ensure that these networks are secure, trustworthy and resilient. We will deter, prevent, detect, and defend against attacks and recover quickly from any disruptions or damage. President Obama, May 2009

Foundations of Protection Leadership & Culture Bi-directional communications Skilled people Dynamic & resourced security operations Awareness & Coordination Foundational standards System Resilience & Capacity

CIP Standards The critical infrastructure protection standards approved through Order No. 706 are a sound starting point for the electric industry to address cybersecurity. Designed as a foundation for sound practices Good housekeeping requirements intended to help protect asset owners from unstructured cyber threats NERC s Reliability Standards development process enables the progressive and continuous improvement of Reliability Standards. Important milestone to help ensure grid reliability by improving the resiliency of control system cyber assets and enhancing their ability to withstand cyber-based attacks

Limitations of the CIP Standards The CIP Reliability Standards alone cannot eliminate the threat of a cyber disruption of critical national infrastructure NERC has jurisdiction only to propose reliability standards for the bulk power system CIP Reliability Standards cannot address other critical assets such as telecommunications systems, for example, or electricity distribution systems The open process by which Reliability Standards are developed, while demonstrably successful in producing standards that have significantly enhanced the reliability of the grid, may not be ideally suited to sensitive subject matter where confidentiality is required Standards take time to modify (foundational but static) Specific cyber security risk can be very dynamic Compliance can t be at the expense of developing necessary and more flexible security management approaches Cyber Security standards are a foundation, designed to be built upon.

Electric Sector Coordination Government Regulators Governmental NEB Provincial Govts. Government CIP Public Safety Canada RCMP NRCAN NERC iero ES-ISAC FERC Regulator DOE Sector Specific Agency DHS NIPP Utility Industry Canadian Registered Entities Canadian Electric Association NERC Committees CIPC ESSG & ESCC 19 CIKR sectors U.S. Registered Entities U.S. Remaining Sector Entities Electric Associations (EEI, NRECA, APPA, EPSA)

A Changing World Cartoon credit: The Economist 2009

Barriers to Reducing Risk Constant increase in complexity associated with new technology deployments and applications Organizational complexity of the grid in North America Lack of positive economic motivation for utilities to increase security Growing dependence on communications A more complex and distant global supply chain Skilled cybersecurity professionals

Question & Answer Contacts: Michael Assante Vice President & CSO michael.assante@nerc.net 609.452.8060 It's now clear this cyber threat is one of the most serious economic and national security challenges we face as a nation. President Obama, May 2009

About NERC International regulatory authority for electric reliability in North America Develop & enforce reliability standards Analyze system outages and near-misses & recommend improved practices Assess current and future reliability