Alberta Reliability Standard Cyber Security Physical Security of BES Cyber Systems CIP-006-AB-5



Similar documents
Alberta Reliability Standard Cyber Security Configuration Change Management and Vulnerability Assessments CIP-010-AB-1

Alberta Reliability Standard Cyber Security Personnel & Training CIP-004-AB-5.1

Alberta Reliability Standard Cyber Security Security Management Controls CIP-003-AB-5

Alberta Reliability Standard Cyber Security System Security Management CIP-007-AB-5

Summary of CIP Version 5 Standards

CIP Cyber Security Security Management Controls

North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

NERC Cyber Security Standards

When this standard has received ballot approval, the text boxes will be moved to the Guidelines and Technical Basis section of the Standard.

CIP Cyber Security Electronic Security Perimeter(s)

Cyber Security Compliance (NERC CIP V5)

The first step in protecting Critical Cyber Assets is identifying them. CIP-002 focuses on this identification process.

ReliabilityFirst CIP Evidence List CIP-002 through CIP-009 are applicable to RC, BA, IA, TSP, TO, TOP, GO, GOP, LSE, NERC, & RE

Meeting NERC CIP Access Control Standards. Presented on February 12, 2014

Voluntary Cybersecurity Initiatives in Critical Infrastructure. Nadya Bartol, CISSP, SGEIT, 2014 Utilities Telecom Council

Information Shield Solution Matrix for CIP Security Standards

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Cyber Security Standards Update: Version 5

Standard CIP 007 3a Cyber Security Systems Security Management

Implementation Plan for Version 5 CIP Cyber Security Standards

Standard CIP Cyber Security Systems Security Management

Standard CIP 004 3a Cyber Security Personnel and Training

Cyber Security Standards Update: Version 5 with Revisions

NERC CIP Tools and Techniques

Alberta Reliability Standard Cyber Security Implementation Plan for Version 5 CIP Security Standards CIP-PLAN-AB-1

Entity Name ( Acronym) NCRnnnnn Risk Assessment Questionnaire

NERC s New BES Definition: How Many CHP Units Will It Impact?

Completed. Document Name. NERC CIP Requirements CIP-002 Critical Cyber Asset Identification R1 Critical Asset Identifaction Method

Midwest Reliability Organization Procedure For NERC PRC-012

CIP v5/v6 Implementation Plan CIP v5 Workshop. Tony Purgar October 2-3, 2014

Technology Solutions for NERC CIP Compliance June 25, 2015

Open Enterprise Architectures for a Substation Password Management System

NERC CIP Compliance with Security Professional Services

LogRhythm and NERC CIP Compliance

BSM for IT Governance, Risk and Compliance: NERC CIP

Safety Share Who is Cleco? CIP-005-3, R5 How What

Standard CIP Cyber Security Security Management Controls

Scope of Restoration Plan

Voluntary Cyber Security Standards for Industrial Control Systems v

References Appendices I. INTRODUCTION... 6 A. Background... 6 B. Standards... 6

SecFlow Security Appliance Review

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards

Continuous Compliance for Energy and Nuclear Facility Cyber Security Regulations

NERC CIP Whitepaper How Endian Solutions Can Help With Compliance

NERC-CIP S MOST WANTED

NovaTech NERC CIP Compliance Document and Product Description Updated June 2015

Verve Security Center

Secure Substation Automation for Operations & Maintenance

NERC CIP VERSION 5 COMPLIANCE

Supporting our customers with NERC CIP compliance. James McQuiggan, CISSP

Reclamation Manual Directives and Standards

Lessons Learned CIP Reliability Standards

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

CIP R2 BES Assets Containing Low Impact BCS. Lisa Wood, CISA, CBRA, CBRM Compliance Auditor Cyber Security

Automating NERC CIP Compliance for EMS. Walter Sikora 2010 EMS Users Conference

Physical Protection Policy Sample (Required Written Policy)

Generation Interconnection Feasibility Study Report-Web Version. PJM Generation Interconnection Request Queue Position Z1-055

TRIPWIRE NERC SOLUTION SUITE

Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, CASE: Implementation of Cyber Security for Yara Glomfjord

Notable Changes to NERC Reliability Standard CIP-005-5

NERC CIP Compliance Gaining Oversight with ConsoleWorks

San Diego Gas & Electric Company FERC Order 717 Transmission Function Employee Job Descriptions June 4, Electric Grid Operations

Master/Local Control Center Procedure No. 13 (M/LCC 13) Communications Between the ISO and Local Control Centers

San Diego Gas & Electric Company FERC Order 717 Transmission Function Employee Job Descriptions August 10, Electric Grid Operations

Agenda do Mini-Curso. Sérgio Yoshio Fujii. Ethan Boardman.

Patching & Malicious Software Prevention CIP-007 R3 & R4

Secure Remote Substation Access Interest Group Part 3: Review of Top Challenges, CIPv5 mapping, and looking forward to 2014!

Critical Infrastructure Security: The Emerging Smart Grid. Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn

Internal Controls And Good Utility Practices. Ruchi Ankleshwaria Manager, Compliance Risk Analysis

Audit, Finance and Legislative Committee Mayor Craig Lowe, Chair Mayor-Commissioner Pro Tem Thomas Hawkins, Member

BPA Policy Cyber Security Program

Smart Grid America: Securing your network and customer data. Michael Assante Vice President and Chief Security Officer March 9, 2010

FERC, NERC and Emerging CIP Standards

Control System Integrity (CSI) Tools and Processes to Automate CIP Compliance for Control Systems

ForeScout CounterACT and Compliance June 2012 Overview Major Mandates PCI-DSS ISO 27002

4.1.1 Generator Owner Transmission Owner that owns synchronous condenser(s)

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Plans for CIP Compliance

Supplier Information Security Addendum for GE Restricted Data

Ovation Security Center Data Sheet

Federal Cyber-Security Law and Policy: The Role of the Federal Energy Regulatory Commission

MONITORING AND VULNERABILITY MANAGEMENT PCI COMPLIANCE JUNE 2014

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Transcription:

Alberta Reliability Stard Final Proposed Draft Version 2.0 September 9, 2014 A. Introduction 1. Title: 2. Number: 3. Purpose: To manage physical access to BES cyber systems by specifying a physical security plan in support of protecting BES cyber systems against compromise that could lead to misoperation or instability in the bulk electric system. 4. Applicability: 4.1. For the purpose of the requirements contained herein, the following list of entities will be collectively referred to as Responsible Entities. For requirements in this stard where a specific entity or subset of entities are the applicable entity or entities, the entity or entities are specified explicitly. 4.1.1. [Intentionally left blank.] 4.1.2. a legal owner of an electric distribution system that owns one or more of the following facilities, systems, equipment for the protection or restoration of the bulk electric system: 4.1.2.1. each underfrequency load shedding or under voltage load shed system that: 4.1.2.1.1. is part of a load shedding program that is subject to one or more requirements in a reliability stard; 4.1.2.1.2. performs automatic load shedding under a common control system owned by the entity in subsection 4.1.2., without human operator initiation, of 300 MW or more; 4.1.2.2. each remedial action scheme where the remedial action scheme is subject to one or more requirements in a reliability stard; 4.1.2.3. each protection system (excluding underfrequency load shedding under voltage load shed) that applies to transmission where the protection system is subject to one or more requirements in a reliability stard; 4.1.2.4. each cranking path group of elements meeting the initial switching requirements from a blackstart resource up to including the first point of supply /or point of delivery of the next generating unit or aggregated generating facility to be started; 4.1.3. the operator of a generating unit the operator of an aggregated generating facility; 4.1.4. the legal owner of a generating unit the legal owner of an aggregated generating facility; 09-09 Page 1 of 10

Alberta Reliability Stard 4.1.5. [Intentionally left blank.] 4.1.6. [Intentionally left blank.] 4.1.7. the operator of a transmission facility; 4.1.8. the legal owner of a transmission facility; 4.1.9. the ISO. 4.2. For the purpose of the requirements contained herein, the following facilities, systems, equipment owned by each Responsible Entity in subsection 4.1 above are those to which these requirements are applicable. For requirements in this stard where a specific type of facilities, system, or equipment or subset of facilities, systems, equipment are applicable, these are specified explicitly. 4.2.1. One or more of the following facilities, systems equipment owned by a legal owner of an electric distribution system or a legal owner of a transmission facility for the protection or restoration of the bulk electric system: 4.2.1.1. each underfrequency load shedding or under voltage load shed system that: 4.2.1.1.1. is part of a load shedding program that is subject to one or more requirements in a reliability stard; 4.2.1.1.2. performs automatic load shedding under a common control system owned by one or more of the entities in subsection 4.2.1, without human operator initiation, of 300 MW or more; 4.2.1.2. each remedial action scheme where the remedial action scheme is subject to one or more requirements in a reliability stard; 4.2.1.3. each protection system (excluding underfrequency load shedding under voltage load shed) that applies to transmission where the protection system is subject to one or more requirements in a reliability stard; 4.2.1.4. each cranking path group of elements meeting the initial switching requirements from a blackstart resource up to including the first point of supply /or point of delivery of the next generating unit or aggregated generating facility to be started; 4.2.2. Responsible Entities listed in subsection 4.1 other than a legal owner of an electric distribution system are responsible for: 4.2.2.1. each transmission facility that is part of the bulk electric system except each transmission facility that: 4.2.2.1.1. is a transformer with fewer than 2 windings at 100 kv or higher; 4.2.2.1.2. radially connects only to load; 4.2.2.1.3. radially connects only to one or more generating units or aggregated generating facilities with a combined maximum authorized real power of less than or equal to 67.5 MW; or 4.2.2.1.4. radially connects to load one or more generating units or aggregated Page 2 of 10

Alberta Reliability Stard generating facilities that have a combined maximum authorized real power of less than or equal to 67.5 MW; 4.2.2.1.5. does not connect a blackstart resource; 4.2.2.2. a reactive power resource that is dedicated to supplying or absorbing reactive power that is connected at 100 kv or higher, or through a dedicated transformer with a high-side voltage of 100 kv or higher, except those reactive power resources operated by an end-use customer for its own use; 4.2.2.3. a generating unit that is: 4.2.2.3.1. directly connected to the bulk electric system has a maximum authorized real power rating greater than 18 MW unless the generating unit is part of an industrial complex; 4.2.2.3.2. within a power plant which: 4.2.2.3.2.1. is not part of an aggregated generating facility; 4.2.2.3.2.2. is directly connected to the bulk electric system; 4.2.2.3.2.3. has a combined maximum authorized real power rating greater than 67.5 MW unless the power plant is part of an industrial complex; 4.2.2.3.3. within an industrial complex with supply transmission service greater than 67.5 MW; or 4.2.2.3.4. a blackstart resource; 4.2.2.4. an aggregated generating facility that is: 4.2.2.4.1. directly connected to the bulk electric system has a maximum authorized real power rating greater than 67.5 MW unless the aggregated generating facility is part of an industrial complex; 4.2.2.4.2. within an industrial complex with supply transmission service greater than 67.5 MW; or 4.2.2.4.3. a blackstart resource; 4.2.2.5. control centres backup control centres. 4.2.3. The following are exempt from reliability stard : 4.2.3.1. [Intentionally left blank.] 4.2.3.2. cyber assets associated with communication networks data communication links between discrete electronic security perimeters. 4.2.3.3. [Intentionally left blank.] 4.2.3.4. for the legal owner of an electric distribution system, the systems equipment that are not included in subsection 4.2.1 above. 4.2.3.5. Responsible Entities that identify that they have no BES cyber systems categorized as High Impact or Medium Impact according to the CIP 002-AB 5.1 identification Page 3 of 10

Alberta Reliability Stard 5. [Intentionally left blank.] 6. [Intentionally left blank.] categorization processes. B. Requirements Measures R1. Each Responsible Entity shall implement, in a manner that identifies, assesses, corrects deficiencies, one or more documented physical security plans that collectively include all of the applicable requirement parts in CIP 006-AB 5 Table R1 Physical Security Plan. M1. Evidence must include each of the documented physical security plans that collectively include all of the applicable requirement parts in CIP 006-AB 5 Table R1 Physical Security Plan additional evidence to demonstrate implementation of the plan or plans as described in the Measures column of the table. Table R1 Physical Security Plan 1.1 systems without external routable connectivity Physical access control systems associated with: High Impact BES cyber systems, or Medium Impact BES cyber systems with external routable connectivity 1.2 routable connectivity Define operational or procedural controls to restrict physical access. Utilize at least one physical access control to allow unescorted physical access into each applicable physical security perimeter to only those individuals who have authorized unescorted physical access. documentation that operational or procedural controls exist. language in the physical security plan that describes each physical security perimeter how unescorted physical access is controlled by one or more different methods proof that unescorted physical access is restricted to only authorized individuals, such as a list of authorized individuals accompanied by access logs. Page 4 of 10

Alberta Reliability Stard Table R1 Physical Security Plan 1.3 High Impact BES cyber systems 1.4 High Impact BES cyber systems routable connectivity 1.5 High Impact BES cyber systems routable connectivity Where technically feasible, utilize two or more different physical access controls (this does not require two completely independent physical access control systems) to collectively allow unescorted physical access into physical security perimeters to only those individuals who have authorized unescorted physical access. Monitor for unauthorized access through a physical access point into a physical security perimeter. Issue an alarm or alert in response to detected unauthorized access through a physical access point into a physical security perimeter to the personnel identified in the bulk electric system cyber security incident response plan within 15 minutes of detection. language in the physical security plan that describes the physical security perimeters how unescorted physical access is controlled by two or more different methods proof that unescorted physical access is restricted to only authorized individuals, such as a list of authorized individuals accompanied by access logs. documentation of controls that monitor for unauthorized access through a physical access point into a physical security perimeter. language in the physical security plan that describes the issuance of an alarm or alert in response to unauthorized access through a physical access control into a physical security perimeter additional evidence that the alarm or alert was issued communicated as Page 5 of 10

Alberta Reliability Stard Table R1 Physical Security Plan 1.6 Physical access control systems associated with: High Impact BES cyber systems, or Medium Impact BES cyber systems with external routable connectivity 1.7 Physical access control systems associated with: High Impact BES cyber systems, or Medium Impact BES cyber systems with external routable connectivity 1.8 High Impact BES cyber systems Monitor each physical access control system for unauthorized physical access to a physical access control system. Issue an alarm or alert in response to detected unauthorized physical access to a physical access control system to the personnel identified in the bulk electric system cyber security incident response plan within 15 minutes of the detection. Log (through automated means or by personnel who control entry) entry of each individual with authorized unescorted physical access identified in the bulk electric system cyber security incident response plan, such as manual or electronic alarm or alert logs, cell phone or pager logs, or other evidence that documents that the alarm or alert was generated communicated. documentation of controls that monitor for unauthorized physical access to a physical access control system. language in the physical security plan that describes the issuance of an alarm or alert in response to unauthorized physical access to physical access control systems additional evidence that the alarm or alerts was issued communicated as identified in the bulk electric system cyber security incident response plan, such as alarm or alert logs, cell phone or pager logs, or other evidence that the alarm or alert was generated communicated. language in the physical security plan that describes logging recording of Page 6 of 10

Alberta Reliability Stard Table R1 Physical Security Plan into each physical security perimeter, with information to identify the individual date time of entry. routable connectivity 1.9 High Impact BES cyber systems routable connectivity Retain physical access logs of entry of individuals with authorized unescorted physical access into each physical security perimeter for at least ninety days. physical entry into each physical security perimeter additional evidence to demonstrate that this logging has been implemented, such as logs of physical access into physical security perimeters that show the individual the date time of entry into physical security perimeter. dated documentation such as logs of physical access into physical security perimeters that show the date time of entry into physical security perimeter. R2. Each Responsible Entity shall implement, in a manner that identifies, assesses, corrects deficiencies, one or more documented visitor control programs that include each of the applicable requirement parts in CIP 006-AB 5 Table R2 Visitor Control Program. M2. Evidence must include one or more documented visitor control programs that collectively include each of the applicable requirement parts in CIP 006-AB 5 Table R2 Visitor Control Program additional evidence to demonstrate implementation as described in the Measures column of the table. Table R2 Visitor Control Program 2.1 High Impact BES cyber systems Require continuous escorted access of visitors (individuals Page 7 of 10

Alberta Reliability Stard Table R2 Visitor Control Program who are provided access but are not authorized for unescorted physical access) within each physical security perimeter, except during CIP exceptional circumstances. routable connectivity 2.2 High Impact BES cyber systems routable connectivity 2.3 High Impact BES cyber systems routable connectivity Require manual or automated logging of visitor entry into exit from the physical security perimeter that includes date time of the initial entry last exit, the visitor s name, the name of an individual point of contact responsible for the visitor, except during CIP exceptional circumstances. Retain visitor logs for at least ninety days. language in a visitor control program that requires continuous escorted access of visitors within physical security perimeters additional evidence to demonstrate that the process was implemented, such as visitor logs. language in a visitor control program that requires continuous escorted access of visitors within physical security perimeters additional evidence to demonstrate that the process was implemented, such as dated visitor logs that include the required information. documentation showing logs have been retained for at least ninety days. Page 8 of 10

Alberta Reliability Stard Table R2 Visitor Control Program R3. Each Responsible Entity shall implement one or more documented physical access control system maintenance testing programs that collectively include each of the applicable requirement parts in CIP 006-AB 5 Table R3 Maintenance Testing Program. M3. Evidence must include each of the documented physical access control system maintenance testing programs that collectively include each of the applicable requirement parts in CIP 006-AB 5 Table R3 Maintenance Testing Program additional evidence to demonstrate implementation as described in the Measures column of the table. Table R3 Maintenance Testing Program 3.1 Physical access control systems associated with: High Impact BES cyber systems, or Medium Impact BES cyber systems with external routable connectivity Locally mounted hardware or devices at the physical security perimeter associated with: High Impact BES cyber systems, or Medium Impact BES cyber systems with external routable connectivity Revision History Maintenance testing of each physical access control system locally mounted hardware or devices at the physical security perimeter at least once every 24 months to ensure they function properly. a maintenance testing program that provides for testing each physical access control system locally mounted hardware or devices associated with each applicable physical security perimeter at least once every 24 months additional evidence to demonstrate that this testing was done, such as dated maintenance records, or other documentation showing testing maintenance has been performed on each applicable device or system at least once every 24 months. Effective Date Description Page 9 of 10

Alberta Reliability Stard The first day of the calendar quarter (January 1, April 1, July 1 or October 1) that follows eight (8) full calendar quarters after approval by the Commission. New Issue Page 10 of 10