Presentation on theme: "TC 57 IEC TC57 WG15 - Security Status & Roadmap, July 2008 Frances Cleveland Convenor WG15."— Presentation transcript:
TC 57 IEC TC57 WG15 - Security Status & Roadmap, July 2008 Frances Cleveland Convenor WG15
TC 57 WG15 Status October Topics Scope of WG15 Current Status Roadmap of Future Work
TC 57 WG15 Status October Scope of WG15 on Security Undertake the development of standards for security of the communication protocols defined by the IEC TC 57, specifically the IEC series, the IEC series, the IEC series, the IEC series, and the IEC series. Undertake the development of standards and/or technical reports on end-to-end security issues.
TC 57 WG15 Status October Security Functions vs. Threats Unauthorized Access to Information Unauthorized Modification or Theft of Information Denial of Service or Prevention of Authorized Access Denial of Action that took place, or Claim of Action that did not take place Resource Exhaustion Integrity Violation Planted in System Virus/Worms Trojan Horse Trapdoor Service Spoofing Stolen/Altered Eavesdropping Traffic Analysis EM/RF Interception Indiscretions by Personnel Media Scavenging Listening After-the-Fact Denial of Service Interactions Masquerade Bypassing Controls Authorization Violation Physical Intrusion Man-in-the-Middle Integrity Violation Theft Replay Intercept/Alter Repudiation Modification Repudiation - Actively Being Addressed - Desired Confidentiality IntegrityAvailability Non-Repudiation
Security Functions, Threats, and WG15 Work Pattern Unauthorized Modification or Theft of Information Integrity Unauthorized Access to Information Confidentiality Denial of Service or Prevention of Authorized Access Availability Denial of Action that took place, or Claim of Action that did not take place Non-Repudiation Corporate Security Policy and Management Cigre, Utilities Security Management Security Testing, Monitoring, Change Control, and Updating Security Compliance Reporting Security Risk Assessment of Assets Security Policy Exchange Security Attack Litigation During-Attack Coping and Post-Attack Recovery Security Incident and Vulnerability Reporting Firewalls with Access Control Lists (ACL) Intrusion Detection Systems (IDS) Audit Logging Anti-Virus/ Spy-ware IEC62351 Security for TASE.2, DNP, Public Key Infrastructure (PKI) Transport Level Security (TLS) Virtual Private Network (VPN) AGA 12-1 “bump- in-the-wire” WPA2/80211.i for wireless Digital Signatures CRC Symmetric and Asymmetric Encryption (AES, DES) Network and System Management (NSM) Credential Establishment, Conversion, and Renewal CertificatesPasswords Authentication Data Backup Identity Establishment, Quality, and Mapping Role-Based Access Control Certificate and Key Management Tele- comm Being Addressed by many other bodies New Work
TC 57 WG15 Status October IEC Part 1: Introduction Mapping of TC57 Communication Standards to IEC Security Standards IEC Part 2: Glossary IEC Part 3: Profiles Including TCP/IP IEC Part 4: Profiles Including MMS IEC Part 5: IEC & Derivatives IEC Part 6: IEC IEC TASE.2 IEC & DNP3 IEC & Serial DNP IEC GOOSE, GSE, SMV IEC over MMS IEC Part 7: MIBs for Network Management
TC 57 WG15 Status October IEC 62351: Data and Communications Security Part 1:Introduction Part 2:Glossary Part 3:Security for profiles including TCP/IP Part 4:Security for profiles including MMS Part 5:Security for IEC and derivatives Part 6:Security for IEC profiles Part 7:Objects for Network Management Status of Security Documents, May 2007 Submitted as Technical Specifications in Dec 2006, being finalized by IEC Submitted as DTS ver 2 January Comments being awaited Issued as CD, (NWIP)
TC 57 WG15 Status October For increased power system reliability and security in the future, the two closely intertwined infrastructures must be designed, implemented, and managed as a whole … Central Generating Plant Step-Up Transformer Distribution Substation Transmission Substation Distribution Substation Distribution Substation Commercial Industrial Commercial Gas Turbine Diesel Engine Cogeneration Diesel Engine Fuel cell Micro- turbine Wind Residential Photo voltaics Batteries Data Concentrator Control Center Operators, Engineers, & Other Users 2. Information Infrastructure 1.Power System Infrastructure
TC 57 WG15 Status October Security Monitoring Architecture Using NSM
TC 57 WG15 Status October NERC’s Top Ten Vulnerabilities for Control Systems 1. Inadequate policies, procedures, and culture that govern control system security. 2. Inadequately designed control system networks that lack sufficient defense-in-depth mechanisms. 3. Remote access to the control system without appropriate access control. 4. System administration mechanisms and software used in control systems are not adequately scrutinized or maintained. 5. Use of inadequately secured WiFi wireless communication for control. 6. Use of a non-dedicated communications channel for command and control and/or inappropriate use of control system network bandwidth for non-control purposes. 7. Insufficient application of tools to detect and report on anomalous or inappropriate activity. 8. Unauthorized or inappropriate applications or devices on control system networks. 9. Control systems command and control data not authenticated. 10. Inadequately managed, designed, or implemented critical support infrastructure
TC 57 WG15 Status October Format of Normative Clauses of Part 7 – Using Naming and Style
TC 57 WG15 Status October TC57 Security (62351) Roadmap As of July 2008 Current WorkNWIPs to be IssuedOn-Going Coordination Parts 1, 3, 4, 6 – Finalized as TS Standards Party 2: Glossary – CDV Part 5: Security for IEC Protocols – CDV Part 7: Network and System Management /MIBs as CD Part 8: Role-Based Access Control Activities by 2008To be issued 2008Current and Future Remote Changing of Update Keys for IEC Implementation Specification for IEC Conformance testing and interoperability testing Security for Access to CIM (Interfaces and RBAC) Security Architecture IEC TC65C WG10 ISA, CIGRE D2.22 EPRI,NERC, PCSF National Labs IEEE PSRC IEEE Security P1711, P1686, P1689 TC57 WG03 TC57 WG07?
TC 57 WG15 Status October Role-Based Access Control The scope of the proposed work is to define a specification for the use of Role Based Access Control not only in field devices but also for a whole system, consisting of field devices, station control and network control – the complete pyramid, in order to support end to end security. The specification will refer to the standards IEC CIM, IEC and IEC and also to ANSI INCITS