Ben Christensen Senior CIP Enforcement Analyst

Slides:



Advertisements
Similar presentations
Configuration Management
Advertisements

Software Quality Assurance Plan
Keshav Sarin Manager, Compliance Risk Analysis
Configuration Management
Identification and Disposition of Official University Records University of Texas at Arlington Records Management.
CIP Cyber Security – Security Management Controls
Key Reliability Standard Spot Check Frank Vick Compliance Team Lead.
Secure Systems Research Group - FAU Process Standards (and Process Improvement)
Software Quality Assurance Plan
JEFF WILLIAMS INFORMATION SECURITY OFFICER CALIFORNIA STATE UNIVERSITY, SACRAMENTO Payment Card Industry Data Security Standard (PCI DSS) Compliance.
1 Compliance Guidance for Initial Compliance Review Dates Lew Folkerth 2Q2010 Webinar June 22, 2010.
Auditing Computer Systems
Darren T. Nielsen, M.Ad., CISA, CPP, PCI, PSP, CBRA, CBRM Senior Compliance Auditor, Cyber Security Salt Lake City, UT Office CIP-006 V3 to CIP-006 V5.
Project Cyber Security Order 706 January 10, 2012 Most of the material presented has been compiled from NERC webinars and drafting team meetings.
1 Ports and Services An Audit Approach ReliabilityFirst CIP Webinar Thursday, September 30, 2010 Lew Folkerth, Senior Engineer - Compliance.
Bryan J. Carr, PMP, CISA Compliance Auditor, Cyber Security
SAE AS9100 Quality Systems - Aerospace Model for Quality Assurance
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
I NDULGENC E There is no need for oversight or management direction. All staff members are superstars and act in the best interest of the company.
Chapter 10: Auditing the Expenditure Cycle
Chapter 4-1 The Islamic University of Gaza Accounting Information System The Expenditure Cycle : Purchases and Cash Disbursements Procedures Dr. Hisham.
NIST framework vs TENACE Protect Function (Sestriere, Gennaio 2015)
Computer Security: Principles and Practice
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Stephen S. Yau CSE , Fall Security Strategies.
General Ledger and Reporting System
Payment Card Industry (PCI) Data Security Standard
Examine Quality Assurance/Quality Control Documentation
Chapter 7 Database Auditing Models
Workshop Summary ISPS Drills & Exercises Workshop Port Moresby 2006.
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
Information Asset Classification
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Security Operations. 2 Domain Objectives Protection and Control of Data Processing Resources Media Management Backups and Recovery Change Control Privileged.
1 Preparing a System Security Plan. 2 Overview Define a Security Plan Pitfalls to avoid Required Documents Contents of the SSP The profile Certification.
K E M A, I N C. NERC Cyber Security Standards and August 14 th Blackout Implications OSI PI User Group April 20, 2004 Joe Weiss
Lisa Wood, CISA, CBRM, CBRA Compliance Auditor, Cyber Security
Information Systems Security Computer System Life Cycle Security.
1 Hot Topics in the CIP Standards Second Quarter 2010 Questions by Audience Answers by RFC Staff June 22, 2010.
Implementing the New Reliability Standards Status of Draft Cyber Security Standards CIP through CIP Larry Bugh ECAR Standard Drafting Team.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
NO FRAUD LEFT BEHIND The Effect of New Risk Assessment Auditing Standards on Schools Runyon Kersteen Ouellette.
Service Transition & Planning Service Validation & Testing
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
1 CIP Cyber Security – Personnel & Training Steve Garn CIP Compliance Workshop Baltimore, MD August 19-20, 2009 © ReliabilityFirst Corporation.
CIP Systems Security Management A Compliance Perspective
I.Information Building & Retrieval Learning Objectives: the process of Information building the responsibilities and interaction of each data managing.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Meet and Confer Rule 26(f) of the Federal Rules of Civil Procedure states that “parties must confer as soon as practicable - and in any event at least.
Emission Inventory Quality Assurance/Quality Control (QA/QC) Melinda Ronca-Battista ITEP/TAMS Center.
Date CIP Standards Update Chris Humphreys Texas RE CIP Compliance.
Configuration Management and Change Control Change is inevitable! So it has to be planned for and managed.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
Slides copyright 2010 by Paladin Group, LLC used with permission by UMBC Training Centers, LLC.
ISO/IEC 27001:2013 Annex A.8 Asset management
Data Coordinators Conference – 2014 Laura Marroquin CASEWORKER/JCMS Specialist Everything New Data Coordinators Should Know.
Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly.
Project management Topic 8 Configuration Management.
Kevin Watson and Ammar Ammar IT Asset Visibility.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Introduction for the Implementation of Software Configuration Management I thought I knew it all !
Software Project Configuration Management
Software Configuration Management
Introduction to the Federal Defense Acquisition Regulation
Retain Data Commensurate with Value
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Purchases and Cash Disbursements Procedures
Larry Bugh ECAR Standard Drafting Team Chair June 1, 2005
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Capital Assets Through the Eyes of an Auditor
Presentation transcript:

Ben Christensen Senior CIP Enforcement Analyst May 15, 2014 SLC, UT

Pop Quiz!! Who invented the electric motor? William Sturgeon Thomas Davenport Michael Faraday

Pop Quiz!! Who invented the electric motor? Michael Faraday

Agenda Help entities understand and prepare for the upcoming CIP 010-1 Differences and relations to current requirements Possible pitfalls to look for while implementing CIP 010-1 WECC’s audit approach Best practices

CIP 010-1

Purpose of CIP 010-1 Prevent and detect unauthorized changes to BES Cyber Systems. Specify vulnerability assessment requirements in support of protecting BES Cyber Systems from compromise. Document and maintain device baselines and periodically verify they are accurate.

Applicable Systems

CIP 010-1 Similarities with V.3 CIP 003-3 R6: Change Control and Configuration Management CIP 007-3 R1: Test procedures CIP 005-3 R4 and CIP 007-3 R8: Cyber Vulnerability Assessment(s) CIP 007-3 R9 and CIP 005-3 R5: Documentation review and maintenance

POP Quiz!! Who invented the modern automobile? Henry Ford Karl Benz Ransom Olds

Pop Quiz!! Who invented the modern automobile? Karl Benz

CIP 010-1 R1

CIP 010-1 R1.1 Applicable to Protected Cyber Assets (PCA) and specifies information required in device baselines CIP 010-1 R1.1 CIP 003-3 R6

CIP-010-1 R1.1 - Possible Pitfall #1 CIP 003-3 R6 was previously not applicable to Non-CCAs that resided within an ESP. Thus entity did not create baselines or update procedures to ensure baselines were maintained for these devices.

CIP-010-1 R1.1 - Possible Pitfall #2 Entity does not ensure documented baselines for all devices contain operating system, commercial/open source software, custom software, logical ports, and security patches applied.

CIP-010-1 R1.1 Approach Ensure entity has documented baselines for all devices (or group of devices) in applicable BES Cyber Systems Verify Baselines include operating system/firmware, commercial software, custom software, logical network accessible ports, and security patches applied

CIP 010-1 R1.1 Best Practice Use combination of automated tools and manual walkthroughs/verifications to ensure lists and baselines are accurate Minimize applications on devices to only what is necessary Include step to periodically verify accuracy of applicable device lists and baselines

CIP 010-1 R1.1 Best Practice Discussions and careful planning should be conducted on the method for maintaining device baselines Review CIP 007 R3 presentation from Oct 2013 CIPUG for common methods to maintain information What method is best for your organization: Commercial Software Custom Software Spreadsheet

CIP 010-1 R1.1 Best Practice Consider Moving away from spreadsheets and other manual methods, look into more advanced methods for retaining information. See Joe B presentation from October 2011 CIPUG on advantages of moving from spreadsheet to relational database Includes some labeling schema tips as well for when implementing a database for device management

CIP 010-1 R1.2 Applicable to PCA and requires changes to be authorized

CIP-010-1 R1.2 - Possible Pitfall Entity cannot demonstrate all changes made to baseline(s) were authorized

CIP 010-1 R1.2 - Approach Ensure all changes made to baselines have been authorized.

CIP 010-1 R1.2 – Best Practice Update procedural documentation to include at minimum: Who can authorize changes, and to what When authorization needs to occur How the authorization will be documented, stored, and tracked Segregation of duties The implementer should be different from the authorizer

CIP 010-1 R1.3 Baselines must be updated within 30 days of change

CIP 010-1 R1.3 – Possible Pitfall Entity cannot demonstrate baselines are updated within 30 days of changes made

CIP 010-1 R1.3 - Approach Ensure entity is updating baselines within 30 days of when change was made. Start date will be determined by reviewing work orders, tracking sheet, or other documentation that details when the change actually occurred.

CIP 010-1 R1.3 – Best Practices Procedures for updating baselines should address: Who will communicate the changes made to the baselines How changes will be communicated Who the changes are communicated to When the changes will be made

CIP 010-1 R1.3 – Best Practices Maintain a version history when updating documentation. Version number Who performed the update to the documentation Who made the change to the device Who authorized the change What was changed

POP Quiz!! Who invented the printing press?

POP Quiz!! Who invented the printing press? Johannes Gutenberg

CIP 010-1 R1.4 Impact due to a change must consider security controls in CIP 005 and CIP 007 CIP 010-1 R1.4 CIP 007-3 R1

CIP 010-1 R1.4 – Possible Pitfall Entity verifies same controls for all changes made to any baseline. Thus entity does not account for different environments, devices, or changes when determining what controls could be impacted May be ok if all controls are verified every time

CIP 010-1 R1.4 - Approach Verify all changes made to device baselines are documented Ensure controls that may be impacted were identified and documented prior to the change Why were some controls not included? Review evidence supporting identified controls were not adversely impacted

CIP 010-1 R1.4 – Best Practices Procedures should include: Documenting date all steps taken to support cyber security controls were identified prior to change taking place How are potential impacted cyber security controls identified? Who does this? How will adverse impacts will be detected Who does this and when?

CIP 010-1 R1.4 – Best Practices Include a peer review step for reviewing what controls may be impacted and when verifying controls weren’t adversely impacted Coordinate testing processes between departments, business units, etc. to ensure consistency

CIP 010-1 R1.5 CIP 010-1 R1.5 CIP 007-3 R1

CIP 010-1 R1.5 cont.. Only applicable to High Impact systems Specific to security controls that must be tested Security Controls in CIP 005 and CIP 007 New test environment requirements Document if test environment was used Document differences between test and production environment Measures taken to account for these differences

CIP 010-1 R1.5 Possible Pitfall Entity does not document differences between production and testing environment Entity does not take measures to account for differences in the production and testing environment.

CIP 010-1 R1.5 - Approach For each change that deviates from existing baseline: List of cyber security controls tested Test results List of differences between the production and test environments Descriptions of how any differences were accounted for When testing occurred.

CIP 010-1 R1.5 – Best Practices Use checklist or other task managing tool to reduce likelihood of not testing all controls Document specific test procedures for all cyber assets or group of assets? Describe the test procedures Describe the test environment and how It reflects the production environment

CIP 010-1 R2

POP Quiz!! When was the atomic bomb first invented?

POP Quiz!! When was the atomic bomb first invented? July 1945

CIP 010-1 R2.1 Must actively search for unauthorized changes to baseline Automated preferred but can be manual Must document and investigate unauthorized changes CIP 010-1 R2.1 CIP 003-3 R6

CIP-010-1 R2.1 – Possible Pitfall Not consistently monitoring for changes every 35 days Entity begins process at end of month Thus entity continuously misses 35 day deadline as it does not have enough time to complete review Documentation is inconsistent and SMEs can’t keep track if specific devices have automated or manual process for tracking configuration changes

CIP 010-1 R2.1 - Approach logs from a system that is monitoring configurations Work orders, tracking sheets, raw data evidence of manual investigations Records investigating detected unauthorized changes

CIP 010-1 R2 – Best Practice Consider using a commercial or open source File Integrity Monitoring software for continuous monitoring Start monitoring process with enough advance to complete review Consider using an automated task managing tool

CIP 010-1 R2 – Best Practice What if you find an unauthorized change? What change(s) have been made without authorization Who made the change(s)? When were the change(s) made? How can a similar issue be prevented?

CIP 010-1 R1 and R2 QUIZ Time

CIP 010-1 R1 and R2 Entities are required to test all changes in a test environment that reflects the production environment. False

CIP 010-1 R1 and R2 Entity baselines are required to include: TRUE Operating system/Firmware Commercial/open source software Custom software Logical ports All security patches applied TRUE But what about devices where some of these don’t apply?

CIP 010-1 R3

CIP 010-1 R3.1 No more annual requirement, and CVA can be active or paper CIP 005-3 R4 CIP 010-1 R3.1 CIP 007-3 R8

CIP-010-1 R3.1 – Possible Pitfall Entity conducts initial Vulnerability Assessment in January then not again until April the next year (16 months) Remember the CIP 003 pitfalls

CIP-010-1 R3.1 – Approach Verify when last CVA was conducted Verify current CVA was conducted within 15 calendar months of previous CVA Evidence could include: A document listing the date of the assessment and the output of any tools used to perform the assessment.

CIP 010-1 R3.2 – Best Practices Vulnerability assessment should include at minimum: Network and access point discovery Port and service Identification Review of default accounts, passwords, and network management community strings Wireless access point review

CIP-010-1 R3.1 – Best Practice Consider keeping Vulnerability Assessments for devices or groups of devices on the same cycle Implement a task managing tool to help track needed tasks and deadlines Review NIST SP800‐115 for guidance on conducting a vulnerability assessment

POP Quiz!! What was the first home video game console? Atari 2600 Magnavox Odyssey VES RCA Studio II

Magnavox Odyssey POP Quiz!! What was the first home video game console? Developed in 1972 Magnavox Odyssey

CIP 010-1 R3.2 CIP 005-3 R4 CIP 010-1 R3.2 CIP 007-3 R8

CIP 010-1 R3.2 cont.. Only applicable to High Impact BES systems Required to be performed at least every 36 months CVA must be active and can be performed in production or test environment Test environment must reflect production Document differences between test and production environment Take and document measures to address the differences between test and production environment

CIP 010-1 R3.2 – Possible Pitfall Entity does not conduct active Vulnerability Assessments at least every 36 months Entity does manual review on devices that are technically feasible to have active review

CIP 010-1 R3.2 – Approach Verify active Vulnerability Assessments conducted at least every 36 months Description of test environment and how differences were account for (if test environment used for assessment) Raw data outputs of assessment for applicable devices

CIP 010-1 R3.2 – Best Practices Vulnerability assessment should include at minimum: Network and access point discovery Port and service Identification Review of default accounts, passwords, and network management community strings Wireless access point review

CIP 010-1 R3.2 – Best Practice Where possible conduct the Vulnerability Assessment on the production environment Implement a task managing tool to help track needed tasks and deadlines Document SMEs responsible for conducting the Vulnerability Assessment and for what cyber assets

CIP 010-1 R3.3 New devices need an active Vulnerability Assessment prior to deployment CIP 010-1 R3.3 CIP 007-3 R1

CIP-010-1 R3.3 – Possible Pitfall Entity adds new asset to production without first conducting active Vulnerability Assessment

CIP 010-1 R3.3 – Approach Ensure all newly added assets have had active vulnerability scan conducted prior to device being added to production Verify all necessary controls were verified as part of assessment Verify raw data output of vulnerability assessment can be provided

CIP 010-1 R3.3 – Best Practice Document specific procedures that include: Responsible personnel for conducting the test When testing needs to occur Where testing should occur How the testing should be conducted for each cyber asset or group of cyber assets Use a checklist and/or peer reviews to reduce chance of human error

CIP 010-1 R3.4 Document planned completion date for each remediation action CIP 005-3 R4 CIP 010-1 R3.4 CIP 007-3 R8

CIP-010-1 R3.4 – Possible Pitfall Entity is not actively maintaining an action plan to remediate vulnerabilities found in the CVA. Entity is not documenting or updating planned date of completion for remediation actions

CIP-010-1 R3.4 – Approach Document results or the review or assessment List of action items to remediate issues Status of the action items Documented proposed dates of completion for the action plan

CIP-010-1 R3.4 – Best Practice Tie actions outlined in the plan to specific SMEs Use an automated task managing tool to track all required tasks and ensure they are being completed Have steps to ensure action plan is updated and reflects actual proposed completion date of actions

CIP 010-1 R3 QUIZ Time

CIP 010-1 R3 Entities are required to test all changes in a test environment that reflects the production environment. False Active CVA not required for Medium impact facilities or for like devices with similar baseline configurations

CIP 010-1 R3 Entity’s will be required to meet expected completion date of action plans to remediate issues found during Vulnerability Assessment However, entity can update the expected date if more time is needed. If the update is reasonable, justified, and done prior to the due date TRUE

Additional Resources CIP-010-1 NERC version 4 to version 5 mapping Glossary of Terms Used in NERC Reliability Standards NIST SP800‐115 – Security testing

Summary Know what is required for each BES cyber system(s) Create and Maintain device baselines Track and manage deadlines Review referenced NIST documents for added guidance

Ben Christensen Senior CIP Enforcement Analyst May 15, 2014 SLC, UT

Agenda Help entities understand and prepare for the upcoming CIP 011-1 standard Differences and relations to current requirements Possible pitfalls to look for while implementing CIP 011-1 Implementation tips

CIP 011-1 General Pitfalls Identify, Assess, and Correct (IAC) FERC has conditionally approved CIP 011-1 on the basis that NERC’s Standard Drafting Team make clarifications or remove the IAC language BES Cyber System Pay special attention to the applicable BES cyber systems in each requirement

Purpose Prevent unauthorized access to BES Cyber System Information

BES Cyber System Information Information about the BES Cyber System that could be used to gain unauthorized access or pose a security threat to the BES Cyber System – NERC glossary

BES Cyber System Information Includes: Security procedures/information BES Cyber Systems PACS EACMS List of devices with IP addresses Network diagrams

BES Cyber System Information Does NOT include: Individual pieces of information that by themselves do not pose a threat or could not be used to allow unauthorized access Devices names Individual IP addresses ESP names Policy statements

CIP 011-1 Similarities with V.3 CIP 003-3 R4: Information Protection CIP 007-3 R7: Disposal or Redeployment

CIP 011-1 similarities to V.3 CIP 011-1 R1.1 CIP 011-1 R1.2

CIP 011-1 R1 - Intro

CIP 011-1 R1 CIP 011-1 R1.1 CIP 011-1 R1.2 CIP 003-3 R4

CIP-011-1 R1.1 Language No longer a requirement to classify BES cyber system information CIP 011-1 R1.1 CIP 003-3 R4

CIP 011-1 R1.2 Procedures for protecting information must now address storage, transit, and use CIP 011-1 R1.1 CIP 003-3 R4

CIP 011-1 R1.1 - Evidence Documented BES Cyber System Information method How you identify BES Cyber System Information (labels, classification)? Repository or electronic and physical locations to house BES Cyber System Information

CIP 011-1 R1.2 - Evidence Procedure for protecting BES Cyber System Storage Transit Use Records information was handled per your procedures Change control ticket

CIP 011-1 R1 Possible Pitfall Information Protection plan does not address storage, transit, and use of BES Cyber System Information

CIP 011-1 R1 - Implementation tips Consider different variables when determining how to properly protect information during transit, storage, and use Digital information stored locally Physical information stored in a PSP or not Information being held by vendors or accessed by vendors

CIP 011-1 R1 QUIZ

CIP 011-1 R1 Which of the following would be considered BES Cyber System Information? Device host name ESP diagram PSP name Inventory list with network addresses

CIP 011-1 R1 Which of the following would be considered BES Cyber System Information? Device host name ESP diagram PSP name Inventory list with network addresses

CIP 011-1 R2

CIP 011-1 R2.1 Focus is now on preventing unauthorized retrieval instead of data destruction CIP 011-1 R2.1 CIP 007-3 R7

CIP 011-1 R2.2 Focus is now on preventing unauthorized retrieval instead of data destruction CIP 011-1 R2.2 CIP 007-3 R7

CIP 011-1 R2.1 – Evidence Records of sanitization actions Clearing Purging Destroying Records tracking Encryption Held in PSP

CIP 011-1 R2.2 – Evidence Records showing media was destroyed prior to disposal Other records of actions taken to prevent unauthorized retrieval of BES Cyber System Information

CIP 011-1 R2 – Possible Pitfall Entity secures cyber assets no longer used that contain BES cyber system information in a location that is not restricted to only those individuals with access to the BES cyber system information

CIP 011-1 R2 – Implementation tips Review NIST SP800-88 for guidance on developing media sanitation processes Where possible erase, destroy, degauss, or encrypt data as soon as possible after a device is no longer needed to reduce mishandling of devices or BES cyber system information

CIP 011-1 – Scenario 1 What if I have a 3rd party host my email? Do I need to protect this information under CIP-011-1?

CIP 011-1 – Scenario 2 I have hard copies of my network diagrams located in a secure facility. Do I need to include these in my CIP-011-1 program?

Purpose Prevent unauthorized access to BES Cyber System information

It Depends CIP 011-1 – Scenario 1 What if I have a 3rd party host my email? Do I need to protect this information under CIP-011-1? It Depends

CIP 011-1 – Scenario 1 What type of information is stored on the exchange server? BES Cyber System Information How do your procedures account for emails containing this information?

CIP 011-1 – Scenario 2 I have hard copies of my network diagrams located in a secure facility. Do I need to include these in my CIP-011-1 program? YES

CIP 011-1 – Scenario 2 What type of information is on the diagrams? BES Cyber System Information List of all IP addresses List of all network access points What do your procedures state about securing hard copies? What facilities might contain this information?

Additional Resources CIP-011-1 NERC version 4 to version 5 mapping Glossary of Terms Used in NERC Reliability Standards NIST SP800-88 – Disposal guidance

Summary Purpose Differences Pitfalls Implementation tips

Questions? Ben Christensen 801.819.7666 bchristensen@wecc.biz