Safety Share Who is Cleco? CIP-005-3, R5 How What



Similar documents
Cyber Security Compliance (NERC CIP V5)

Summary of CIP Version 5 Standards

Supporting our customers with NERC CIP compliance. James McQuiggan, CISSP

Notable Changes to NERC Reliability Standard CIP-005-5

Lessons Learned CIP Reliability Standards

Using Monitoring, Logging, and Alerting to Improve ICS Security ICSJWG 2015 Fall Meeting October 27, 2015

Cyber Security for NERC CIP Version 5 Compliance

North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

Technology Solutions for NERC CIP Compliance June 25, 2015

NERC CIP VERSION 5 COMPLIANCE

Entity Name ( Acronym) NCRnnnnn Risk Assessment Questionnaire

Automating NERC CIP Compliance for EMS. Walter Sikora 2010 EMS Users Conference

Secure Remote Substation Access Solutions

The first step in protecting Critical Cyber Assets is identifying them. CIP-002 focuses on this identification process.

Alberta Reliability Standard Cyber Security Physical Security of BES Cyber Systems CIP-006-AB-5

CIP R1 & R2: Configuration Change Management

Redesigning automation network security

RuggedCom Solutions for

GE Measurement & Control. Cyber Security for NERC CIP Compliance

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

NovaTech NERC CIP Compliance Document and Product Description Updated June 2015

NERC CIP Compliance Gaining Oversight with ConsoleWorks

Secure Remote Substation Access Interest Group Part 3: Review of Top Challenges, CIPv5 mapping, and looking forward to 2014!

NERC CIP Whitepaper How Endian Solutions Can Help With Compliance

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

2012 CIP Spring Compliance Workshop May Testing, Ports & Services and Patch Management

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System

TOP 10 CHALLENGES. With suggested solutions

LogRhythm and NERC CIP Compliance

Control System Integrity (CSI) Tools and Processes to Automate CIP Compliance for Control Systems

ReliabilityFirst CIP Evidence List CIP-002 through CIP-009 are applicable to RC, BA, IA, TSP, TO, TOP, GO, GOP, LSE, NERC, & RE

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

Standard CIP 007 3a Cyber Security Systems Security Management

Verve Security Center

Reclamation Manual Directives and Standards

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

SecFlow Security Appliance Review

Notable Changes to NERC Reliability Standard CIP-010-3

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

SANS Top 20 Critical Controls for Effective Cyber Defense

North American Electric Reliability Corporation (NERC) Cyber Security Standard

RUGGEDCOM CROSSBOW. Secure Access Management Solution. siemens.com/ruggedcom. Edition 10/2014. Brochure

CIP v5/v6 Implementation Plan CIP v5 Workshop. Tony Purgar October 2-3, 2014

NERC CIP Version 5 and the PI System

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards

Ovation Security Center Data Sheet

NERC Cyber Security Standards

Alberta Reliability Standard Cyber Security System Security Management CIP-007-AB-5

GE Measurement & Control. Cyber Security for NEI 08-09

Teleran PCI Customer Case Study

How ByStorm Software enables NERC-CIP Compliance

Standard CIP Cyber Security Systems Security Management

GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems

Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr. Compliance Auditor Cyber Security

The Comprehensive Guide to PCI Security Standards Compliance

Cisco Network Switches Juniper Firewall Clusters

How To Manage Security On A Networked Computer System

Our Security. History of IDS Cont d In 1983, Dr. Dorothy Denning and SRI International began working on a government project.

University of Central Florida Class Specification Administrative and Professional. Information Security Officer

Ovation Security Center Data Sheet

SonicWALL PCI 1.1 Implementation Guide

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security?

Patching & Malicious Software Prevention CIP-007 R3 & R4

NERC CIP Tools and Techniques

Information Technology Branch Access Control Technical Standard

TRIPWIRE NERC SOLUTION SUITE

Welcome to the CIP Workshop!

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

LogLogic. Application Security Use Case: PCI Compliance. Jaime D Anna Sr Dir of Product Strategy, TIBCO Software

Cyber Security Standards Update: Version 5

FairWarning Mapping to PCI DSS 3.0, Requirement 10

CorreLog Alignment to PCI Security Standards Compliance

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

IT Security and OT Security. Understanding the Challenges

NERC CIP Substation Cyber Security Update. John M Shaw Presentation to UTC Region 7 February 19, 2009 jshaw@garrettcom.com

8/27/2015. Brad Schuette IT Manager City of Punta Gorda (941) Don t Wait Another Day

Plans for CIP Compliance

GE Measurement & Control. Cyber Security for Industrial Controls

Implementation Plan for Version 5 CIP Cyber Security Standards

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Top Ten Compliance Issues for Implementing the NERC CIP Reliability Standard

Client Security Risk Assessment Questionnaire

Completed. Document Name. NERC CIP Requirements CIP-002 Critical Cyber Asset Identification R1 Critical Asset Identifaction Method

Guidelines for Planning an Integrated Security Operations Center

John M Shaw Presentation to UTC Region 7 February 19, 2009 jshaw@garrettcom.com

Cyber Security focus in ABB: a Key issue. 03 Luglio 2014, Roma 1 Conferenza Nazionale Cyber Security Marco Biancardi, ABB SpA, Power System Division

Creating Added Value for the IT Service Management Practice. How ConsoleWorks Creates Value for ITSM Best Practices

CONTROL SYSTEM VENDOR CYBER SECURITY TRENDS INTERIM REPORT

White Paper. Protecting Databases from Unauthorized Activities Using Imperva SecureSphere

Transcription:

1

Safety Share Who is Cleco? CIP-005-3, R5 How What AGENDA 2

SAFETY SHARE 3

Statistics: General Customers: approx. 279,000 retail customers across Louisiana Non-contiguous transmission and service area Generation: 2,560 MW regulated 775 MW un-regulated 691 MW jointly owned Transmission Lines: approx. 1,300 miles (primarily 138 & 230 KV) Distribution Lines: approx. 11,500 miles 4

Cleco Service Territory 5

SPP NERC Regional Entity (RE) is SPP SPP acts as Cleco s Reliability Coordinator Member, Southwest Power Pool (SPP) Cleco is NOT a member of the SPP RTO Cleco is a Transmission Provider under its own FERC approved OATT 6

CIP-005, R3 How did we approach? Industrial Defender s SEM (Security Event Monitor) Industrial Defender and EMS vendor worked together to integrate SEM into EMS package. Logs, monitors, and alerts for events on Cyber Assets within ESP 7

Hardware/Software Hardware SEMs located at Primary & Backup facilities Software Each CA or CCA host sends log to each SEM 8

Network Event Log HIDS Event log Event Log RIDS Event Log HIDS HIDS Event Log Event Log HIDS: Host Intrusion Detection System RIDS: Remote Intrusion Detection System 9

Logging SEM configured to log events for: All successful and unsuccessful logins Privileged user activity Access to shared accounts Logs reviewed weekly by CTOC Support 10

Example Interactive Login Events on guard-esp from December 10th - 27th: --------------------------------------------------------------------------------------- Dec 10 10:25:23 000.111.222.33 time=10:25:23 devname=guard-esp device_id=serial number log_id=0104041990 type=event subtype=admin pri=information fwver=040004 vd=root user= account ui=https(000.111.222.33) action=login status=success reason=none profile="super_admin" msg="administrator account logged in successfully from https(000.111.222.33) Dec 10 10:34:39 000.111.222.33 time=10:34:39 devname=guard-esp device_id=serial number log_id=0104041990 type=event subtype=admin pri=information fwver=040004 vd=root user= account ui=https(000.111.222.33) action=login status=success reason=none profile="super_admin" msg="administrator account logged in successfully from https(000.111.222.33) Dec 10 15:58:17 000.111.222.33 time=15:58:17 devname=guard-esp device_id=serial number log_id=0104041990 type=event subtype=admin pri=information fwver=040004 vd=root user= account ui=https(000.111.222.33) action=login status=success reason=none profile="super_admin" msg="administrator account logged in successfully from https(000.111.222.33) Dec 11 07:46:23 000.111.222.33 time=07:46:23 devname=guard-esp device_id=serial number log_id=0104041990 type=event subtype=admin pri=information fwver=040004 vd=root user= account ui=https(000.111.222.33) action=login status=success reason=none profile="super_admin" msg="administrator account logged in successfully from https(000.111.222.33) Dec 27 09:35:26 000.111.222.33 time=09:35:26 devname=guard-esp device_id=serial number log_id=0104041990 type=event subtype=admin pri=information fwver=040004 vd=root user= account ui=https(000.111.222.33) action=login status=success reason=none profile="super_admin" msg="administrator account logged in successfully from https(000.111.222.33)" Note: Bold items have been altered for security. 11

Alerts Automatic alerts for unauthorized access attempts: Three failed login attempts in one minute 12

Alarm 13

Email Example From: ctocadmin@cleco.com [ctocadmin@cleco.com] Sent: Thursday, February 21, 2013 11:28 AM To: CTOCSupport Subject: Alert from Industrial Defender SEM Console Feb 21, 2013 11:28:16 AM 0 Windows event logs: Failure audit dominator Rtn-to-Norm 14

Investigate When alert is received: CTOC Support will investigate the cause of the event Determine if malicious or accidental If malicious or cannot be proven accidental, report per Incident Reporting and Response procedure 15

? 16

Louis C. Guidry, P.E. Manager NERC Compliance & Training Work 318-484-7495 Cell 318-308-9121 louis.guidry@cleco.com 17

2013 SPP CIP Compliance Workshop CIP-005 R3: Monitoring Electronic Access May 21, 2013

Agenda System Overview Westar s Approach to CIP-005 R3 CCAs, PCAs, and EACMs Other EACMs [CIP-005 R1.5] PACSs [CIP-006 R2.2] Recommendations CIP Version 5 Plans Integrated Security Monitoring Approach Enterprise Security Incident and Event Monitor Questions

Westar System Overview Statistics 2,400 Employees 700,000 Customers 3,300 Miles of Transmission 7100 MW of Total Generation Generation Capacity Mix Coal Fired - 3429MW Gas/Oil (Steam) - 1059MW Gas/Oil (CT/CC/IC) - 1772MW Wind - 695MW Nuclear - 545MW 9% 7% 46% 24% 14%

Westar System Overview

CIP-005 R3 - Westar s Approach EMS Cyber Assets Automated Approach TDi s ConsoleWorks monitors electronic access into the EMS ESPs including, but not limited to following devices: EMS Communication Servers VPN Devices ConsoleWorks Appliances Provides automated logging, monitoring, and alerting of events on in-scope Cyber Assets. Primary and Secondary ConsoleWorks Provides redundancy and failover capability Syslogs pushed to ConsoleWorks Alert notifications via page

CIP-005 R3 - Westar s Approach

CIP-005 R3 - Westar s Approach

CIP-005 R3 - Westar s Approach EACM Cyber Assets Hybrid Approach Splunk monitors electronic access into the ESPs Firewall syslogs are sent to a centralized monitoring console loaded with Splunk for indexing, Custom scripts execute hourly monitoring for alerts, Script then emails the reports to IT Security Analyst for review. Provides automated logging and monitoring of in-scope Cyber Assets. Manual script for alerts and responses. Primary and Secondary Logging Consoles Provides redundancy and failover capability

CIP-005 R3 - Westar s Approach

CIP-005 R3 - Westar s Approach PACS Cyber Assets Manual Approach Physical Access Controls System (PACS) Monitoring PACS electronically monitors 24x7 using its own logging mechanism. PACS application is unable to automatically alert on attempted or actual unauthorized access events. TFE in-place to accommodate compensating controls Implemented a process where a custom script is used to extract and capture systems events. Monthly review of attempted or actual unauthorized access events using an exception tracking log.

Recommendations Best Practices Provide examples of an alert generated for a failed login. Make certain each alert has a documented response. Describe in your procedures the different types of events that will trigger an alert. Evidence Documented procedure, Attempted or actual unauthorized access logs, and Examples of automated or manual alerts.

CIP Version 5 Plans Integrated Security Monitoring Approach Information Technology (IT) EMS Security Monitoring Operational Technology (OT) Substation Protection and Controls Plant Instrument and Controls (I&C)

CIP Version 5 Plans Enterprise Security Incident and Event Monitor Automated detection for all known or suspected malicious communications for both inbound and outbound communications from the Electronic Access Points. Automated event logging and alerting from all NERC CIP BES Cyber Systems and/or Cyber Assets. Log parsing, normalization, correlation, analysis, and alerting. Application logs, System logs, Network device logs, Network flow data, Control systems

Questions? Eric Ervin Manager, NERC CIP (785) 575-1626 eric.ervin@westarenergy.com