EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project



Similar documents
TASK TDSP Web Portal Project Cyber Security Standards Best Practices

External Supplier Control Requirements

Cybersecurity and internal audit. August 15, 2014

TUSKEGEE CYBER SECURITY PATH FORWARD

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

CYBER SECURITY GUIDANCE

Defending Against Data Beaches: Internal Controls for Cybersecurity

N-Dimension Solutions Cyber Security for Utilities

Update On Smart Grid Cyber Security

SECURITY. Risk & Compliance Services

PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE

Cybersecurity. Are you prepared?

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

External Supplier Control Requirements

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

FREQUENTLY ASKED QUESTIONS

for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs

Oil and Gas Industry A Comprehensive Security Risk Management Approach.

Advanced Threat Protection with Dell SecureWorks Security Services

Are you prepared to be next? Invensys Cyber Security

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

Lessons from Defending Cyberspace

Is the PCI Data Security Standard Enough?

Cyber security: Practical Utility Programs that Work

Plans for CIP Compliance

Oil & Gas Industry Towards Global Security. A Holistic Security Risk Management Approach.

Data Security Concerns for the Electric Grid

Document ID. Cyber security for substation automation products and systems

Enterprise Security Governance. Robert Coles Chief Information Security Officer and Global Head of Digital Risk & Security

Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper

ENSURING SECURITY IN AND FACILITATING INTERNATIONAL TRADE. Measures toward enhancing maritime cybersecurity. Submitted by Canada SUMMARY

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015

Security Management. Keeping the IT Security Administrator Busy

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Panel Session: Lessons Learned in Smart Grid Cybersecurity

Best Practices in ICS Security for System Operators. A Wurldtech White Paper

Summary of CIP Version 5 Standards

Energy Cybersecurity Regulatory Brief

Cybersecurity for the C-Level

Cyber Security and Privacy - Program 183

Cyber Adversary Characterization. Know thy enemy!

Protecting Organizations from Cyber Attack

GEARS Cyber-Security Services

NERC CIP VERSION 5 COMPLIANCE

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples

SCADA Security: Challenges and Solutions

Cyber Security for NERC CIP Version 5 Compliance

Protecting against cyber threats and security breaches

Cisco Security Optimization Service

Seven Strategies to Defend ICSs

Using the HITRUST CSF to Assess Cybersecurity Preparedness 1 of 6

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

Cyber Essentials Scheme

Enterprise Security Tactical Plan

The Protection Mission a constant endeavor

Water Sector Approach to Cybersecurity Risk Management

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

CIP Supply Chain Risk Management (RM ) Statement of Jacob S. Olcott Vice President, BitSight Technologies January 28, 2016

Protecting Your Organisation from Targeted Cyber Intrusion

How To Protect Water Utilities From Cyber Attack

Addressing Dynamic Threats to the Electric Power Grid Through Resilience

Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System

Risk Management, Equipment Protection, Monitoring and Incidence Response, Policy/Planning, and Access/Audit

Security Issues with Integrated Smart Buildings

Cyber Security Strategy

future data and infrastructure

AUTHORED BY: George W. Gray CTO, VP Software & Information Systems Ivenix, Inc. ADDRESSING CYBERSECURITY IN INFUSION DEVICES

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises

William Hery Research Professor, Computer Science and Engineering NYU-Poly

LogRhythm and NERC CIP Compliance

SCADA Security Training

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

Security Policy JUNE 1, SalesNOW. Security Policy v v

FERC, NERC and Emerging CIP Standards

White Paper. April Security Considerations for Utilities Utilities Tap Into the Power of SecureWorks

North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)

74% 96 Action Items. Compliance

Cybersecurity Awareness. Part 1

Threat and Hazard Identification and Risk Assessment

Ovation Security Center Data Sheet

PCI DSS Requirements - Security Controls and Processes

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Transcription:

EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1

Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies to identify the electricity sector s top 10 threats EEI contracted with The Chertoff Group to assist with the effort. 2

EEI Member Survey Results Top 10 Threats Insider threat (assumes malicious intent) Advanced Persistent Threats (unknown to defender) Human Failure (no malicious intent) Loss of Situational Awareness Attacks Designed to Damage Equipment or Threaten Safety (e.g. Stuxnet, Aurora or follow on variants) Compromise of Commonly Used Systems/Hardware Disruption of Energy or Generation Management System Models Information Integrity (accuracy and/or completeness of information used to make operational decisions) Third Party Support (Supply Chain Threats, Vendor Management) Compromise of Smart Grid /AMI Infrastructure 3

Approach to Threat Identification The threat scenarios are events that are High Impact/Low Frequency. This project is synchronized with the NERC Critical Infrastructure Strategic Roadmap. The likelihood of these attacks is a function of the intent, capability, and motivation of each adversary in addition to the extent tof mitigation for each vulnerability they seek to exploit. 4

Categories of Mitigation Actions Tactical Resilience can be best achieved by employing a combination of the following mitigation actions: Preparedness: Actions that involve a combination of planning, resources, training, exercising, and organizing to build, sustain, and improve operational capabilities for a wide range of potential incidents. Prevention: Actions to avoid an incident or to intervene to stop an incident from occurring. It involves applying intelligence and other information to a range of countermeasures aimed at deterring, preempting, interdicting, or disrupting illegal or harmful activity. Response: Immediate actions to save lives, protect property, and meet basic operational needs during an incident. Response also includes the execution of emergency plans and actions to support short term term recovery. Recovery: The development, coordination, and execution of serviceand site restoration plans; evaluation of the incident to identify lessons learned; post incident id reporting; and development of initiatives to mitigate the effects of future incidents. Modified from FEMA National Response Framework 5

Categories of Mitigation Actions Strategic Categories of Mitigation Actions Strategic Seek more robust information sharing: with federal entities to provide utilities greater intelligence and warning of ongoing or anticipated attack methods and targets through long term, sustainable utility to utility threat information exchanges Stimulate industry wide development and application of security standards for information and operational systems Engage control system vendors to develop enhanced security features in their products given the electric sector s need for interconnectivity between operational and business networks Conduct a large scale (multi regional, national, or international) table top exercise modeling a catastrophic incident/attack that is designed to reveal any gaps between the roles and expectations of government and industry Develop a shared and universal "Power Grid Risk and Resilience" risk assessment methodology that utilities can use to assess the role each utility plays in maintaining the stability and security of the shared power grid Please note: Because these Strategic Actions have general applicability, they are not aligned against the following individual threat scenarios. 6

EEI Threa 7at Scenario Threat Scenario Summary

XII. Mitigation Actions Common to Cyber Threats PHASES Preparedness Prevention Response MITIGATION ACTIONS Identify critical cyber assets that support reliable operation of the utility s enterprise Create and maintain security management controls to protect the system s critical cyber assets Create and maintain a cybersecurity and awareness training program Create and maintain a physical and virtual security perimeter around critical cyber assets Establish technical and procedural controls that enforce access authentication and accountability (including strong password protection mechanisms) Use information sharing resources to monitor credible sources of vulnerabilities and threats Develop and test incident response plans Perform testing to ensure changes to the asset baseline do not impact cybersecurity controls Enforce a process that only enables those ports and services required for normal and emergency ops Use appropriate anti virus and other malware prevention tools (including signature updates) Implement automated tools and process controls that provide for the continuous monitoring of situational awareness indicators Periodically undertake a cyber vulnerability assessment Maintain an active patch management program Actively monitor situational awareness indicators to assess successful cyber intrusions Implement emergency response plans and use an incident management system Recovery Implement disaster recovery and business continuity plans 8

DESCRIPT TION XII. Threat Scenario 1 Coordinated Cyber Attack on Bulk Electric System Infrastructure A coordinated campaign exploiting operational (process control) technology and networks for access that results in the simultaneous or near simultaneous targeting of multiple key systems, software, and data on a utility s networked infrastructure or the controlling systems of the electrical grid. Although initiated primarily through cyber pathways, the attack may be designed to damage or destroy physical systems. In addition to interrupting the effective operation of the electric grid, this attack could intercept control signals that block or alter information resulting in loss of situational awareness. Likely Target Types Commonly used systems/hardware: Control center communications Generation breaker relays Substation communication processors EMS or GMS software ICS/DCS/SCADA Smart Grid components Advanced Metering Infrastructure Potential Threat Actors State sponsored (and surrogates) Sophisticated terrorist organizations (and surrogates) Mercenary criminal organizations Elite hacker organizations Disgruntled insiders Co opted third party maintenance providers Specific Attack Paths APT Attack Paths (see slide 19) Via communication links Via connected WAN Via rogue devices or portable media Via telecommunication network Via wireless network Via remote connection Physical access to system Likely Impact of Successful Attack A successful campaign of coordinated cyber attacks could result in prolonged blackouts in one or more regions due to: loss of control and/or situational awareness; disruption of communications and industrial control systems; compromise ofics/dcs/scada models and loss ofinformation integrity oravailability; breakdown ofcritical processes (e.g. configuration management, change management, incident response); loss of communication between EMS/GMS to RTUs; and physical destruction of critical equipment. In addition to lost productivity costs, future costs for re fortifying cyber systems and restoring public confidence in a secure and resilient power grid could be significant. 9

PHASES Preparedness Prevention Response XII. Threat Scenario Coordinated Cyber Attack MITIGATION ACTIONS Mitigation Actions Common to all Cyber Threats Inspect common protocols for known vulnerabilities Ensure that field devices have physical and communications security protection Develop and test incident response plans Isolate operational and business networks to the greatest extent possible Harden the operational network to close backdoors and vulnerabilities in the network perimeter Ensure that links between operational network and control center(s) are via dedicated communications paths (not a public network or Internet) Monitor operations network to detect malicious activity and suspect traffic Minimize unprotected remote accessto terminal end points and telemetry in the operational network Use wireless communications technology selectively and with appropriate safeguards in the operational network Disable EMS/SCADA control ofall Bulk Electric System Elements Coordinate with neighboring utilities and Reliability Coordinators on data validation points Disable Automated Generator Control and consider islanding strategies Implement emergency response plans and use an incident management system Recovery Implement disaster recovery and business continuity plans 10

Evaluating Mitigation Actions Against Threats EEI Resiliency Self Assessment What is your utility s state of resiliency against the major threats facing the electric sector? The following threat scenarios explore high consequence, low frequency events and the recommended practices used to mitigate them. Each threat scenario is designed to define the significant threats faced by the electric sector. Each threat scenario is followed by recommended Mitigation Actions to help identify areas for improving the resiliency of the company and the electric grid. This review is intended to provide the basis for a dialogue between CEO, CIO, and other company personnel. How to use this self assessment: 1. The group chosen to engage in this dialogue should review each threat scenario and associated mitigation actions. 2. Discuss which of the mitigation actions your company does, and does not employ. 3. Identify gaps that leave your company at risk and identify specific actions that should be taken to become more resilient in the face of each of these threat scenarios. 11

EEI Threat Scenario 12 Timetable

Questions Mark Engels Director Enterprise Technology Security and Compliance Dominion Resources Services Mark.Engels@dom.com 13