Smart Grid Cyber Security. The Smart Grid. What is a Smart Grid?

Similar documents
Smart Grid Security. Cyber Security for Process Control Systems Summer School. June 16-20, 2008 At the Abbey Resort on Lake Geneva Fontana, Wisconsin

Secure Substation Automation for Operations & Maintenance

Securing Distribution Automation

Authentication in WLAN

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

NERC CIP Whitepaper How Endian Solutions Can Help With Compliance

Designing a security policy to protect your automation solution

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System

Advanced Authentication

EEI Business Continuity. Threat Scenario Project (TSP) April 4, EEI Threat Scenario Project

GE Measurement & Control. Cyber Security for NERC CIP Compliance

Security Management. Keeping the IT Security Administrator Busy

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards

Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager

future data and infrastructure

Jort Kollerie SonicWALL

Bellevue University Cybersecurity Programs & Courses

Security Goals Services

CSC Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

Network Security 101 Multiple Tactics for Multi-layered Security

Information Security Services

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

HIPAA Security Alert

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0

GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems

WHITE PAPER CYBER SECURITY AND ELECTRIC UTILITY COMMUNICATIONS WHAT NERC/CIP MEANS FOR YOUR MICROWAVE

Tim Bovles WILEY. Wiley Publishing, Inc.

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

IDRBT Working Paper No. 11 Authentication factors for Internet banking

NERC CIP Substation Cyber Security Update. John M Shaw Presentation to UTC Region 7 February 19, 2009 jshaw@garrettcom.com

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Information Security Basic Concepts

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.

Using BroadSAFE TM Technology 07/18/05

John M Shaw Presentation to UTC Region 7 February 19, 2009 jshaw@garrettcom.com

AMI security considerations

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

SCADA/Business Network Separation: Securing an Integrated SCADA System

Standard CIP 007 3a Cyber Security Systems Security Management

Fundamentals of Network Security - Theory and Practice-

Intelligent Security Design, Development and Acquisition

CIP Cyber Security Electronic Security Perimeter(s)

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

Cryptography and Network Security

Basics of Internet Security

Redesigning automation network security

NovaTech NERC CIP Compliance Document and Product Description Updated June 2015

The Importance of Cybersecurity Monitoring for Utilities

Making the most out of substation IEDs in a secure, NERC compliant manner

Practical Considerations for Security

E-Commerce Security Perimeter (ESP) Identification and Access Control Process

Secure SCADA Network Technology and Methods

Defense in Cyber Space Beating Cyber Threats that Target Mesh Networks

Cyber Security for NERC CIP Version 5 Compliance

Standard CIP Cyber Security Systems Security Management

TELE 301 Network Management. Lecture 18: Network Security

Security in the smart grid

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Security Implications Associated with Mass Notification Systems

Content Teaching Academy at James Madison University

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Best Practices for Network Security. Name. University/College. Unit Name. Unit Code. Lecturer

Security Policy JUNE 1, SalesNOW. Security Policy v v

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

NERC CIP Tools and Techniques

INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and

William Hery Research Professor, Computer Science and Engineering NYU-Poly

A Concise Model to Evaluate Security of SCADA Systems based on Security Standards

Document ID. Cyber security for substation automation products and systems

CISCO IOS NETWORK SECURITY (IINS)

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Implementing Cisco IOS Network Security

Central Agency for Information Technology

Network/Cyber Security

SCADA Security: Challenges and Solutions

CRYPTOGRAPHY AS A SERVICE

Chapter 1: Introduction

SCADA SYSTEMS AND SECURITY WHITEPAPER

WHITEPAPER. Smart Grid Security Myths vs. Reality

Entrust IdentityGuard

OPC UA vs OPC Classic

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

Chapter 10. Cloud Security Mechanisms

Network Security Guidelines. e-governance

TCG Trusted Network Connect IF-MAP Metadata for ICS Security. Document Draft Comments. Prepared by Joseph J. Januszewski, III, CISSP

HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics

How To Secure A Wireless Utility Network

Skoot Secure File Transfer

6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Lecture VII : Public Key Infrastructure (PKI)

Symphony Plus Cyber security for the power and water industries

Passing PCI Compliance How to Address the Application Security Mandates

Transcription:

GE Energy Smart Grid Cyber John D. McDonald, P.E. GM, Marketing IEEE PES Past President IEEE Division VII Director IEEE Fellow POWERING POTENTIA L The Smart Grid What is a Smart Grid? The integration of two infrastructures to provide customer value Increases energy efficiency and operational productivity Electrical infrastructure Increases power system reliability and quality of service Information infrastructure Empowers everyone to meet environmental objectives An Integrated Systems Solution to a Complex Set of Challenges 2/ The Power Delivery System of the Future Must Have Advanced Capabilities To achieve benefits identified by stakeholders, the intelligent grid must be: Self-Healing and Adaptive to correct problems before they become emergencies Interactive with consumers and markets Optimized to make best use of resources and equipment Predictive rather than reactive, to prevent emergencies ahead rather than solve after Distributed assets and information across geographical and organizational boundaries Integrated to merge all critical information More Secure from threats from all hazards Enabling The Power Delivery System of the Future Don Von Dollen - EPRI IntelliGrid, April 6, 20053/ 1

Smart Grid Simplified Architecture Corporate Systems Non- Systems Backhaul Protection I/O Merging Unit Monitoring & Caps Switches & Reclosers Customer Portal DSM Dist. Gen. 4/ Cyber Standards NERC CIP To reduce risks to the reliability of the bulk electric systems from any compromise of critical cyber assets (computers, software and communication networks) that support those systems. 5/ Network NERC Cyber (Draft 4 approved) CIP-002-01 Critical Cyber Assets CIP-003-01 Management Controls CIP-004-01 Personnel & Training CIP-005-01 Electronic CIP-007-01 Physical CIP-008-01 Systems Management CIP-009-01 Incident Reporting and Response Planning http://www.nerc.com/~filez/standards/cyber--permanent.html 6/ 2

Secure Substation Architectures Key NERC Requirements: Define Critical Cyber Assets Define & Create Electronic s Provide Support Dial-up and/or Wide Area Track and Report Access by User Audit Trail of Success or Failure Remove User Access (in 24 hours) for Termination for Cause Provide for User Access Rights Gateway & s Strong Two Factor User Authentication for Interactive Access Disable Unused Ports And Services Appropriate Use Banner Malicious Software Prevention Other Common Requirements: Support access to SCADA and Non-SCADA Data Communication Line Encryption Support Centralized Management 7/ Failure Mode and Effects Analysis of 1. Function: Describe the function to be analyzed to secure against a specific cyber incident. 2. Failure Mode: Understanding the threat 3. Failure Causes: Understanding the types of attacks 4. Identify Failure Effects and Criticality: How serious are the consequences 5. Understand Solutions: What are the current methods of securing against the attack? 6. Match solution to analysis: Establish a system to match the analysis 8/ Simplified Smart Grid Architecture Backhaul 9/ 3

Smart Grid Functionality Information & Data Access Device Control System or End Device Configuration Network Management and Performance Automation Systems Databases Data Calculations Cyber Physical 10 / Understanding the Threat Protecting against - The Hacker The Vandal The Terrorist The Disgruntled Employee The Competitor The Customer The System Types of attack - Eavesdropping Traffic Analysis Replaying Spoofing Cracking Social Engineering Denial of Service Destruction Reconfigure Malware 11 / Understanding Consequences and Risks Analysis of Areas of Attack: Control Take control of switches (meters or substations) Information Interrupt or corrupt data flow Configuration Change configuration to open door for future action Safety Compromise safety of people or things 12 / 4

Strong Techniques RADIUS server Centralized security server with AAA Authentication, Authorization and Accounting Extensible Authentication Protocol (EAP)- Transport Layer (TLS) Commonly used in wireless systems X.509 is a standard for Public Key Infrastructure (PKI) and Privilege il Management Infrastructure t (PMI) Ephemeral Cryptographic Key Management DHE-DSS Diffie-Hellman Key Exchange - Digital Standard Secure Communication (message integrity, encryption, and replay protection) Encryption / Hashing / Digital Signature 13 / Factors of Authentication 1. What You Know Passwords are widely used to identify a User, but only verify that somebody knows the password. 2. What You Have Digital certificates in the User's computer add more security than a password, and smart cards verify that Users have a physical token in their possession, but either can be stolen. 3. What You Are Biometrics such as fingerprints and iris recognition are more difficult but not impossible to forge. 4. What You Do Dynamic biometrics such as hand writing a signature and voice recognition are the most secure; however, replay attacks can fool the system. NERC CIP: Two Factors required for Interactive Access 14 / Digital Signatures Using asymmetric encryption for authentication Uses a one-way-hash that is similar to a CRC or checksum 1. Alice hashes the Message 3. Alice sends message and signature to Bob 5. Bob hashes the message, too. Hash Hash Encrypt Decrypt 2. Alice signs with her PRIVATE Key 4. Only her PUBLIC key can decrypt the hash If Bob s hashed value matches Alice s, it s the same message Alice signed 15 / 5

Smart Grid Architecture Backhaul 16 / Establishing Secure Communications - Encryption Blocks attacks along channels 17 / Applying s with AAA Blocks attacks at s 18 / 6

Secure the with Private Keys and AAA Blocks attacks at end devices 19 / Physical Blocks physical 6-wall attacks 20 / Summary NERC and Corporate Requirements Functions to Protect Understanding the threat Understanding the types of attacks How likely and serious are the consequences Current security methods Deploy a matching solution 21 / 7