How to protect the substations from physical or cyber intrusion. IEEE T&D 2014 Chicago

Similar documents
CIP Cyber Security Configuration Change Management and Vulnerability Assessments

Help for the Developers of Control System Cyber Security Standards

NERC CIP Tools and Techniques

Redesigning automation network security

NERC CIP VERSION 5 COMPLIANCE

Cyber Security Compliance (NERC CIP V5)

How to Integrate NERC s Requirements in an Ongoing Automation and Integration Project Framework

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

Summary of CIP Version 5 Standards

Implementation Plan for Version 5 CIP Cyber Security Standards

Alberta Reliability Standard Cyber Security Configuration Change Management and Vulnerability Assessments CIP-010-AB-1

Alberta Reliability Standard Cyber Security Security Management Controls CIP-003-AB-5

Cyber Security and Privacy - Program 183

Cyber Security focus in ABB: a Key issue. 03 Luglio 2014, Roma 1 Conferenza Nazionale Cyber Security Marco Biancardi, ABB SpA, Power System Division

The Advantages of an Integrated Factory Acceptance Test in an ICS Environment

How To Protect Your Network From Attack

Property of NBC Universal

Notable Changes to NERC Reliability Standard CIP-010-3

How To Protect A Smart Grid From Cyber Security Threats

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Secure Machine to Machine Communication on the example of Smart Grids

Cybersecurity in a Mobile IP World

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

Process Control System Cyber Security Standards an Overview

Cyber security measures in protection and control IEDs

ISACA rudens konference

NERC CIP Version 5 and the PI System

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

Symphony Plus Cyber security for the power and water industries

Guide to Developing a Cyber Security and Risk Mitigation Plan

future data and infrastructure

Securing Distribution Automation

Document ID. Cyber security for substation automation products and systems

Voluntary Cybersecurity Initiatives in Critical Infrastructure. Nadya Bartol, CISSP, SGEIT, 2014 Utilities Telecom Council

An Evaluation of Security Posture Assessment Tools on a SCADA Environment

Consulting International

Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, CASE: Implementation of Cyber Security for Yara Glomfjord

INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT

TRIPWIRE NERC SOLUTION SUITE

NERC-CIP S MOST WANTED

Models for Cyber Security Analysis

CONCEPTS IN CYBER SECURITY

GE Measurement & Control. Cyber Security for NERC CIP Compliance

NERC Cyber Security Standards

Change and Configuration Management

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

IEEE-Northwest Energy Systems Symposium (NWESS)

This chapter provides an overview of cyber security issues and activities by state and federal organizations Cyber security is an ongoing, high

Cyber Security Standards: Version 5 Revisions. Security Reliability Program 2015

What Risk Managers need to know about ICS Cyber Security

A Concise Model to Evaluate Security of SCADA Systems based on Security Standards

CSMS. Cyber Security Management System. Conformity Assessment Scheme

April 8, Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

Automating NERC CIP Compliance for EMS. Walter Sikora 2010 EMS Users Conference

FREQUENTLY ASKED QUESTIONS

BPA Policy Cyber Security Program

Standard CIP 007 3a Cyber Security Systems Security Management

Practical Considerations for Security

NovaTech NERC CIP Compliance Document and Product Description Updated June 2015

ISACA North Dallas Chapter

FFIEC Cybersecurity Assessment Tool

North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)

LogRhythm and NERC CIP Compliance

Cyber Security Seminar KTH

Industrial Security for Process Automation

NIST Special Publication (SP) , Revision 2, Security Considerations in the System Development Life Cycle

Information Shield Solution Matrix for CIP Security Standards

Secure Remote Substation Access Interest Group Part 3: Review of Top Challenges, CIPv5 mapping, and looking forward to 2014!

Protecting productivity with Plant Security Services

Practical Steps To Securing Process Control Networks

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Information Bulletin

Certified Information Security Manager (CISM)

GE Measurement & Control. Cyber Security for Industrial Controls

Who s Doing the Hacking?

Muscle to Protect Your Grid July Sustainable and Cost-effective Muscle to Protect Your Grid

Alberta Reliability Standard Cyber Security Implementation Plan for Version 5 CIP Security Standards CIP-PLAN-AB-1

Which cybersecurity standard is most relevant for a water utility?

Security Regulations and Standards for SCADA and Industrial Controls

Secure Remote Substation Access Solutions

State of the State of Control System Cyber Security

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System

GE Intelligent Platforms. Meeting NERC Change Control Requirements for HMI/SCADA and Control Systems

Ernie Hayden CISSP CEH GICSP Executive Consultant

How To Write A Cybersecurity Framework

Cyber Security for NERC CIP Version 5 Compliance

Hanh Do, Director, Information Systems Audit Division, GAA. HUD s Controls Over Selected Configuration Management Activities Need Improvement

Cyber Security for Substation Automation, Protection and Control Systems

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Airports and their SCADA Systems. Dr Leigh Armistead, CISSP. Peregrine Technical Solutions

Smart Grid Information Security

EEI Business Continuity. Threat Scenario Project (TSP) April 4, EEI Threat Scenario Project

Verve Security Center

Reclamation Manual Directives and Standards

Cyber Security. Smart Grid

Secure SCADA Network Technology and Methods

CYBERBOK Cyber Crime Security Essential Body of Knowledge: A Competency and Functional Framework for Cyber Crime Management

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

Standard CIP Cyber Security Systems Security Management

CIP Cyber Security Security Management Controls

Transcription:

How to protect the substations from physical or cyber intrusion IEEE T&D 2014 Chicago

2 Substations represent a critical element of the national infrastructure aimed at the security and wellness of the population.

Presenters Overview of standards related to cyber security Marc Lacroix Substation physical security standard Craig Preuss Development of IEEE PC 37-240 Mike Dood Introduction to Lemnos - Scott D. Sternfeld

Objectives Presentation of major threats, physical or virtual, that may impact the integrity of the substation. Introduction to recent development of standards, intended to mitigate such threats, will be presented. Share their experience in the implementation of mitigation approaches. Future standards development, such as Lemnos, will be described.

Overview of standards related to cyber security Marc Lacroix - Vizimax inc.

Complexity of Power Systems Ref: IEC 62351-10

Office/Power System Security Requirements Ref: IEC 62351-10

Mapping of Security Standards Ref: IEC 62351-10

9 ISO 27001 Information technology Security techniques Information security management systems Requirements specifies a set of information security management requirements designed to be used for certification purposes.

10 IEEE 1686 The standard defines functions and features that must be provided in substation intelligent electronic devices to accommodate critical infrastructure protection programs. It addresses security in terms of access, operation, configuration, firmware revision, and data retrieval from IEDs.

ISA99 11

12 CIGRE D22.2 Treatment of Information Security for Electric Power Utilities Risk Assessment of Information and Communication Systems Security Frameworks for Electric Power Utilities Security Technologies Guideline

13 NIST 800-53 Recommended Security Controls for Federal Information Systems Provides guidelines for selecting and specifying technical and organizational security controls and connected processes for information systems supporting the executive agencies of the federal government to meet the requirements of FIPS 200

NERC CIP CIP Title / Content 001 002 003 004 005 006 007 008 009 010 011 Sabotage Reporting Reporting disturbances or unusual occurrences, suspected or determined to be caused by sabotage to appropriate authorities Critical Cyber Asset Identification Identification and documentation of Critical Cyber Assets using risk-based assessment methodologies Security Management Controls Documentation and implementation of Cyber Security Policy reflecting commitment and ability to secure Critical Cyber Assets Personnel and Training Maintenance and documentation of security awareness programs to ensure personnel knowledge on proven security practices Electronic Security Protection Identification and protection of Electronic Security Perimeters and their access points surrounding Critical Cyber Assets Physical Security Program Creation and maintenance of physical security controls, including processes, tools, and procedures to monitor perimeter access Systems Security Management Definition and maintenance of methods, procedures, and processes to secure Cyber Assets within the Electronic Security Perimeter to do not adversely affect existing Cyber Security Controls. Incident Reporting & Response Planning Development and maintenance of a Cyber Security Incident response plan that addresses classification, response actions and reporting Recovery Plans for Critical Cyber Assets Creation and review of recovery plans for Critical Cyber Assets Bulk Electrical System Cyber System Categorization (draft) Categorization of BES systems that execute or enable functions essential to reliable operation of the BES into three different classes. Bulk Electrical System Cyber System Protection (draft) Mapping of security requirements to BES system categories defined in CIP-010

15 62351 IEC 62351 Definition of Security Services Standardization Status Part 1 Introduction and overview Technical Specifications Part 2 Glossary of terms Technical Specifications Part 3 Profiles Including TCP/IP Technical Specifications Part 4 Profiles Including MMS Technical Specifications Part 5 Security for IEC 60870-5 and Derivatives Technical Specifications

16 62351 IEC 62351 Definition of Security Services Standardization Status Part 6 Security for IEC 61850 Technical Specifications Part 7 Part 8 Part 9 Network and system management (NSM) data object models Role-Based Access Control for Power systems management Data and Communication Security - Key Management Technical Specifications Technical Specifications In preparation Part 10 Security architecture guidelines Technical Specifications Part 11 Security for XML Documents In preparation

Mapping of IEC 62351 to protocols Ref: IEC 62351-10

Cyber Security Categories 18

Countermeasures 19

20

21

22

23

24

25 Security Domains Security Domain Required Protection Level Applies to Public Low Assets, supporting the communication over public networks Corporate Medium Assets, supporting the business operation with baseline security not essential to the power system reliability and availability Business Critical System Operation Critical High Very high Assets, supporting the critical operation, which are not critical to power system reliability and availability. Assets directly related to the availability and reliability of power generation and distribution infrastructure Example Systems 3 rd party networks, Internet Office level business network Finance network, human resource systems, ERP systems Control systems, SCADA networks

Mapping of Security Domains Ref: IEC 62351-10