Smart Grid Security: Threats, Vulnerabilities & Potential Countermeasures. Everardo Trujillo, Smart Grid Principal October 4th, 2012

Similar documents
SCADA Security Training

Document ID. Cyber security for substation automation products and systems

Smart Grid Security: A Look to the Future

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Panel Session: Lessons Learned in Smart Grid Cybersecurity

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

EEI Business Continuity. Threat Scenario Project (TSP) April 4, EEI Threat Scenario Project

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System

Cyber Security Seminar KTH

Cyber Security Metrics Dashboards & Analytics

Defending Against Data Beaches: Internal Controls for Cybersecurity

Supporting our customers with NERC CIP compliance. James McQuiggan, CISSP

Update On Smart Grid Cyber Security

Facilitated Self-Evaluation v1.0

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT

Cyber security measures in protection and control IEDs

Cybersecurity: What CFO s Need to Know

Italy. EY s Global Information Security Survey 2013

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

An Oracle White Paper May Smart Grid Basics. Turning Information into Power

Jim Sheppard, Director of Business Processes CenterPoint Energy, Texas, USA

Asset Management Challenges and Options, Including the Implications and Importance of Aging Infrastructure

Energy Cybersecurity Regulatory Brief

Security Orchestration with IF-MAP

How To Protect Water Utilities From Cyber Attack

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security

Security Analytics for Smart Grid

Cyber Security. Smart Grid

Security Coordination with IF-MAP

Why we Need Standards for Breaking the Smart Grid

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

A New Layer of Security to Protect Critical Infrastructure from Advanced Cyber Attacks. Alex Leemon, Sr. Manager

MANAGE THIRD PARTY RISKS

SCADA Security: Challenges and Solutions

ARC INDUSTRY FORUM 2015

Enabling the SmartGrid through Cloud Computing

NERC CIP VERSION 5 COMPLIANCE

Executive Summary. Cybersecurity cannot be completely solved, and will remain a risk we must actively manage.

September 20, 2013 Senior IT Examiner Gene Lilienthal

Including Threat Actor Capability and Motivation in Risk Assessment for Smart Grids

GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems

Symphony Plus Cyber security for the power and water industries

Security in the smart grid

How To Create Situational Awareness

How Much Cyber Security is Enough?

Best Practices to Improve Breach Readiness

Practical Steps To Securing Process Control Networks

William Hery Research Professor, Computer Science and Engineering NYU-Poly

future data and infrastructure

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

CG Automation Solutions USA

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

Enterprise Security Platform for Government

Industrial Control System Cyber Security

Cyber Security and Privacy - Program 183

Frost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends

Cyber Infrastructure for the Smart Grid

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

Risk Management, Equipment Protection, Monitoring and Incidence Response, Policy/Planning, and Access/Audit

IoT & SCADA Cyber Security Services

How-To Guide: Cyber Security. Content Provided by

The Internet of Things (IoT) Opportunities and Risks

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia

Test di sicurezza in ambienti Smart Grid e SCADA

GE Measurement & Control. Cyber Security for Industrial Controls

Ovation Security Center Data Sheet

Verve Security Center

GOOD PRACTICE GUIDE PROCESS CONTROL AND SCADA SECURITY

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Reducing Configuration Complexity with Next Gen IoT Networks

Netzwerkvirtualisierung? Aber mit Sicherheit!

Security Issues with Integrated Smart Buildings

Industrial Cyber Security 101. Mike Spear

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Robert Malmgren. Smart Grid. Security Challenges - Legacy and Infrastructure Burdens

The State of Industrial Control Systems Security and National Critical Infrastructure Protection

CDM Hardware Asset Management (HWAM) Capability

External Supplier Control Requirements

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

ARC Forum Orlando 2015 Building a Secure Industrial Internet of Things

Sophistication of attacks will keep improving, especially APT and zero-day exploits

The Importance of Cybersecurity Monitoring for Utilities

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

TUSKEGEE CYBER SECURITY PATH FORWARD

PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

Top 10 Tips to Keep Your Small Business Safe

Cybersecurity. Are you prepared?

Transcription:

Smart Grid Security: Threats, Vulnerabilities & Potential Countermeasures Everardo Trujillo, Smart Grid Principal October 4th, 2012 1 - Confiden)al & Proprietary -

WHAT IS SMART GRID? A smart grid (SG) delivers electricity from suppliers to consumers using digital technology to save energy, reduce cost and increase reliability and transparency. It is a modernized electricity network which is being utilized as a way of addressing energy independence, global warming and emergency resilience issues. CA Energy Commission The Smart Grid will empower customers to have better control over their energy usage, increased renewable generation, integrates plug-in electric vehicles and reduced greenhouse gas emissions while maintaining and improving system reliability, operational efficiency and customer privacy. SDG&E 2

WHAT IS SMART GRID? A Smart Grid should have the following characteristics: Self healing from power disturbance events Enabling active participation by consumers in demand response Operating resiliently against physical and cyber attack Accommodating all generation and storage options Enabling new products, services, and markets Optimizing assets and operating efficiently 3

WHAT IS SMART GRID? 4 - Confiden'al & Proprietary -

SMART GRID BENEFITS Smart Grid technology enables us to monitor electricity consumption & more efficiently control supply to consumers. Improves power reliability & quality. Improves resilience to disruption. Enables predictive maintenance and self-healing responses to system disturbances. Expanded deployment of renewable energy resources. Automates maintenance & operation. Enables transition to plug-in electric vehicles & new energy storage options 5

SMART GRID THREATS Link to embedded clip: http://www.youtube.com/watch?v=zqsymnuvedi SITUATIONS LIKE THIS ONE KEEPS US SECURITY GUYS UP AT NIGHT! This same technology/system, if corrupted, could also be used to carry out real-time surveillance, determine personal behavior patterns, & possibly facilitate identity theft, consumption theft, etc. 6

SMART GRID THREATS United States Computer Emergency Readiness Team (US-CERT) identifies the following threat sources for Control Systems: National Governments Terrorists Industrial Spies & Organized Crime Groups Hacktivists Hackers 7

SMART GRID THREATS 8

SMART GRID THREATS 9 - Confiden'al & Proprietary -

SMART GRID THREATS Lack of Awareness (Utilities & Vendors) Customer data storage (ASP) Physical Threats Unintentional (earthquakes, fires, RF interference, wind, floods) Intentional (device tampering, theft) Supply Chain (rouge chips) Cyber Threats Customer Privacy (exposure to customer data) Theft (customer theft of usage) Terrorists (DoS, Backdoors) Social Engineering Spear phishing Insider threat, disgruntled employee 10

SMART GRID VULNERABILITIES PEOPLE Lack of understanding of security risk to control systems Not understanding the technical & security impacts of not having security policies or their implementation on Control Systems Control System owners not having cybersecurity skills needed to protect against cyber attacks. Over all security awareness (USB devices, spear phishing) PROCESS Insufficient standardization of process and regulations North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) National Institute of Standards and Technology (NISTR 7628 Volume 1) Lack of training for Control System administrators 11

SMART GRID VULNERABILITIES TECHNOLOGY Control networks rarely have a QA system Unsecured protocols for device management Network Communication Use of unsecured communication protocols (MODBUS, DNP3, FTP) Network Architecture not adequate for security needs Endpoint security Firmware no support for incremental security changes No formal SDLC by vendor, prevents proper implementation of security controls UI to devices Lack of Patch Management By both vendors & utilities 12

COUNTERMEASURES PEOPLE AWARENESS! Upper Management support (top down) PROCESS RFP evaluation of vendors should include security section Contractual language should include security section DHS Cyber Security Procurement Language for Control System (link) Utilities to formally publish internal security program (policies, guidelines, procedures) and ensure compliance NERC-CIP, currently being considered to expand to distribution Consistent security standards are needed for SG devices, sanctioned by a government agency Supply chain verification Manufacturer installing rouge chipsets, malware, etc. 13

COUNTERMEASURES TECHNOLOGY We can t wait Search for 3 rd party solutions to address technical deficiencies ICS Firewalls, ICS Gateways, ICS config management solution, Logging Hardening guides for end point devices Establish a relationship with vendors Regulations are needed from a Government perspective Specific regulations in regards to SG security requirements Vendors to provide anti tampering mechanisms, alerting capabilities Ruggedized devices that can withhold heat, water, dust, etc. Deploy sensors (report back to utility) Vulnerability Management Test, and re-test. 3 rd party pen testing 14

Questions Everardo Trujillo: etrujillo@semprautilities.com - Confiden)al & 15